Flow Monitoring
Flow Monitoring
Published: 2014-10-12
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
Monitoring, Sampling, and Collection Services Interfaces Feature Guide for Routing Devices
Copyright © 2014, Juniper Networks, Inc.
All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
http://www.juniper.net/support/eula.html. By downloading, installing or using such software, you agree to the terms and conditions of
that EULA.
core-dump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
data-fill . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
data-format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
data-size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
destination (Interfaces) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
destination-interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
destination-ipv4-address (RFC 2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . 268
destination-mac-address (RFC2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . 268
destination-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
destination-udp-port (RFC 2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . 270
destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
direction (RFC2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
disable (Forwarding Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
dscp-code-point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
duplicates-dropped-periodicity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
dynamic-flow-capture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
engine-id (Forwarding Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
engine-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
export-format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
extension-service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
family (Monitoring) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
family (RFC2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
family (Sampling) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
file (Sampling) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
file (Trace Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
file-specification (File Format) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
file-specification (Interface Mapping) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
filename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
filename-prefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
flow-active-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
flow-collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
flow-export-destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
flow-export-rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
flow-inactive-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
flow-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
flow-table-size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
flow-tap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
ftp (Flow Collector Files) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
ftp (Transfer Log Files) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
g-duplicates-dropped-periodicity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
g-max-duplicates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
hard-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
hard-limit-target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
hardware-timestamp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
history-size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
host-outbound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
udp-tcp-port-swap (RFC 2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . . 301
options-template-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
output (Accounting) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
output (Monitoring) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
output (Port Mirroring) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
output (Sampling) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
output-interface-index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
passive-monitor-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
password (Flow Collector File Servers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
password (Transfer Log File Servers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
peer-as-billing-template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
pic-memory-threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
pop-all-labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
port (Flow Monitoring) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
port (RPM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
port (TWAMP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
pre-rewrite-tos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
probe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
probe-count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
probe-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
probe-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
probe-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
probe-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
rate (Forwarding Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
receive-options-packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
receive-ttl-exceeded . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
reflect-mode (RFC2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
required-depth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
retry (Services Flow Collector) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
retry-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
rfc2544-benchmarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
routing-instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
routing-instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
rpm (Interfaces) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
rpm (Services) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
run-length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
sample-once . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
sampling (Forwarding Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
sampling (Interfaces) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
server-inactivity-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
service-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
service-type (RFC2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
services (RPM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
shared-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
soft-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
soft-limit-clear . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
source-address (Forwarding Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
source-address (Services) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
source-addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
source-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
source-ipv4-address (RFC 2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . 367
source-mac-address (RFC2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . 367
source-udp-port (RFC 2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
stamp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
target (Services RPM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
tests (RFC 2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
test-interface (RFC 2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
test-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
test-name (RFC 2544 Benchmarking) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
traceoptions (Forwarding Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
traceoptions (RPM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
transfer-log-archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
ttl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
twamp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
twamp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
template (Forwarding Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
template-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
template-refresh-rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
trio-flow-offload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
udp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
username (Services) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
variant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
version9 (Forwarding Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
video-monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
world-readable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
Chapter 14 Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
clear passive-monitoring statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
clear services accounting statistics inline-jflow . . . . . . . . . . . . . . . . . . . . . . . . . . 398
clear services accounting statistics inline-jflow . . . . . . . . . . . . . . . . . . . . . . . . . . 399
clear services dynamic-flow-capture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
clear services flow-collector statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
clear services rpm twamp server connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
clear services video-monitoring mdi errors fpc-slot . . . . . . . . . . . . . . . . . . . . . . . 403
clear services video-monitoring mdi statistics fpc-slot . . . . . . . . . . . . . . . . . . . . 404
request services flow-collector change-destination primary interface . . . . . . . . 405
request services flow-collector change-destination secondary interface . . . . . 406
request services flow-collector test-file-transfer . . . . . . . . . . . . . . . . . . . . . . . . . 407
Part 6 Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Supported Platforms
For the features described in this document, the following platforms are supported:
• M Series
• MX Series
• T Series
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
1. From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
load merge relative configuration mode command:
For more information about the load command, see the CLI User Guide.
Documentation Conventions
Caution Indicates a situation that might result in loss of data or hardware damage.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xx defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
• Junos OS CLI User Guide
• Identifies RFC and Internet draft titles.
• RFC 1997, BGP Communities Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include the
statements, commands, files, and stub statement at the [edit protocols
directories; configuration hierarchy levels; ospf area area-id] hierarchy level.
or labels on routing platform • The console port is labeled CONSOLE.
components.
< > (angle brackets) Encloses optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Encloses a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
Bold text like this Represents graphical user interface (GUI) • In the Logical Interfaces box, select
items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of menu In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Documentation Feedback
• Online feedback rating system—On any page at the Juniper Networks Technical
Documentation site at http://www.juniper.net/techpubs/index.html, simply click the
stars to rate the content, and use the pop-up form to provide us with information about
your experience. Alternately, you can use the online feedback form at
https://www.juniper.net/cgi-bin/docbugreport/.
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need post-sales technical support, you can access
our tools and resources online or open a case with JTAC.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
• Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Using a Juniper Networks M Series Multiservice Edge or T Series Core Router or EX9200
switch, a selection of PICs (including the Monitoring Services PIC, Adaptive Services [AS]
PIC, Multiservices PIC, or Multiservices DPC) and other networking hardware, you can
monitor traffic flow and export the monitored traffic. Monitoring traffic allows you to do
the following:
• Gather and export detailed information about IP version 4 (IPv4) traffic flows between
source and destination nodes in your network.
• Sample all incoming IPv4 traffic on the monitoring interface and present the data in
cflowd record format.
• Direct filtered traffic to different packet analyzers and present the data in its original
format (port mirror).
Although the Monitoring Services PIC was designed initially for use as an offline passive
flow monitoring tool, it can also be used in an active flow monitoring topology. In contrast,
the AS or Multiservices PIC is designed exclusively for active flow monitoring. To use
either the Monitoring Services PIC, AS PIC, or Multiservices PIC for active flow monitoring,
you must install the PIC in an M Series or T Series router. The router participates in both
the monitoring application and in the normal routing functionality of the network.
Starting with Junos OS Release 11.4, support for active monitoring is extended to logical
systems running on T Series and MX Series routers. A logical system is a partition created
from a physical router that performs independent routing tasks. Several logical systems
in a single router with their own interfaces, policies, instances, and routing tables can
perform functions handled by several different routers. A shared services PIC handles
flows from all the logical systems. Only version 9 flows, IPv4, and MPLS templates are
supported. See “Example: Configuring Active Monitoring on Logical Systems” on page 10
for a sample configuration that enables active monitoring on a logical system.
Specified packets can be filtered and sent to the monitoring interface. For the Monitoring
Services PIC, the interface name contains the mo- prefix. For the AS or Multiservices PIC,
the interface name contains the sp- prefix.
NOTE: If you upgrade from the Monitoring Services PIC to the Adaptive
Services or Multiservices PIC for active flow monitoring, you must change
the name of your monitoring interface from mo-fpc/pic/port to sp-fpc/pic/port.
The major active flow monitoring actions you can configure at the [edit forwarding-options]
hierarchy level are as follows:
• Sampling, with the [edit forwarding-options sampling] hierarchy. This option sends a
copy of the traffic stream to an AS or Monitoring Services PIC, which extracts limited
information (such as the source and destination IP address) from some of the packets
in a flow. The original packets are forwarded to the intended destination as usual.
• Discard accounting, with the [edit forwarding-options accounting] hierarchy. This option
quarantines unwanted packets, creates cflowd records that describe the packets, and
discards the packets instead of forwarding them.
• Port mirroring, with the [edit forwarding-options port-mirroring] hierarchy. This option
makes one full copy of all packets in a flow and delivers the copy to a single destination.
The original packets are forwarded to the intended destination.
Unlike passive flow monitoring, you do not need to configure a monitoring group. Instead,
you can send filtered packets to a monitoring services or adaptive services interface (mo-
or sp-) by using sampling or discard accounting. Optionally, you can configure port
mirroring or multiple port mirroring to direct packets to additional interfaces.
These active flow monitoring options provide a wide variety of actions that can be
performed on network traffic flows. However, the following restrictions apply:
• The router or switch can perform sampling or port mirroring at any one time.
• The router or switch can perform forwarding or discard accounting at any one time.
Because the Monitoring Services, AS, and Multiservices PICs allow only one action to be
performed at any one time, the following configuration options are available:
.1
10.60.2.x
.2 fe-1/0/0
mo-2/0/0.0
10.1.1.x 10.2.2.x
.1 .2 .1 .2
1 F 2
ge-2/3/0 ge-3/0/0
Active monitoring router
(J Series, M Series,
or T Series) g003104
In Figure 1 on page 5, traffic from Router 1 arrives on the monitoring router’s Gigabit
Ethernet ge-2/3/0 interface. The exit interface on the monitoring router leading to
destination Router 2 is ge-3/0/0, but this could be any interface type (such as SONET,
Gigabit Ethernet, and so on). The export interface leading to the cflowd server is fe-1/0/0.
To enable active monitoring, configure a firewall filter on the interface ge-2/3/0 with the
following match conditions:
• Traffic matching certain firewall conditions is sent to the Monitoring Services PIC using
filter-based forwarding. This traffic is quarantined and not forwarded to other routers.
• All other traffic is port-mirrored to the Monitoring Services PIC. Port mirroring copies
each packet and sends the copies to the port-mirroring next hop (in this case, a
Monitoring Services PIC). The original packets are forwarded out of the router as usual.
The flow-monitoring application performs traffic flow monitoring and enables lawful
interception of traffic between two routers or switches. Traffic flows can either be
passively monitored by an offline router or switch or actively monitored by a router
participating in the network.
mo-fpc/pic/port {
unit logical-unit-number {
family inet {
address address {
destination address;
}
filter {
group filter-group-number;
input filter-name;
output filter-name;
}
sampling {
[ input output ];
}
}
}
multiservice-options {
(core-dump | no-core-dump);
(syslog | no-syslog);
flow-control-options {
down-on-flow-control;
dump-on-flow-control;
reset-on-flow-control;
}
}
}
Specify the physical and logical location of the flow-monitoring interface. You cannot
use unit 0, because it is already used by internal processes. Specify the source and
destination addresses. The filter statement allows you to associate an input or output
filter or a filter group that you have already configured for this purpose. The sampling
statement specifies the traffic direction: input, output, or both.
NOTE: Boot images for monitoring services interfaces are specified at the
[edit chassis images pic] hierarchy level. You must include the following
configuration to make the flow monitoring feature operable:
[edit system]
ntp {
boot-server ntp.juniper.net;
server 172.17.28.5;
}
processes {
ntp enable;
}
For more information, see the Junos OS Administration Library for Routing
Devices.
monitoring name {
family inet {
output {
cflowd hostname port port-number;
export-format format;
flow-active-timeout seconds;
flow-export-destination {
collector-pic;
}
flow-inactive-timeout seconds;
interface interface-name {
engine-id number;
engine-type number;
input-interface-index number;
output-interface-index number;
source-address address;
}
}
}
A monitoring instance is a named entity that specifies collector information under the
monitoring name statement. The following sections describe the properties you can
configure:
The source-address statement specifies the traffic source for transmission of cflowd
information; you must configure it manually. If you provide a different source-address
statement for each monitoring services output interface, you can track which interface
processes a particular cflowd record.
By default, the input-interface-index value is the SNMP index of the input interface. You
can override the default by including a specific value. The input-interface-index and
output-interface-index values are exported in fields present in the cflowd version 5 flow
format.
Exporting Flows
To configure the cflowd version number, include the export-format statement at the [edit
forwarding-options monitoring name output] hierarchy level. By default, version 5 is used.
Version 8 enables the router software to aggregate the flow information using broader
criteria and reduce cflowd traffic. Version 8 aggregation is performed periodically (every
few seconds) on active flows and when flows are allowed to expire. Because the
aggregation is performed periodically, active timeout events are ignored.
For more information on cflowd properties, see “Enabling Flow Aggregation” on page 86.
To configure time periods for active flow monitoring and intervals of inactivity, include
the flow-active-timeout and flow-inactive-timeout statements at the [edit
forwarding-options monitoring name output] hierarchy level:
• The flow-active-timeout statement specifies the time interval between flow exports
for active flows. If the interval between the time the last packet was received and the
time the flow was last exported exceeds the configured value, the flow is exported.
This timer is needed to provide periodic updates when a flow has a long duration. The
active timeout setting enables the router to retain the start time for the flow as a
constant and send out periodic cflowd reports. This in turn allows the collector to
register the start time and determine that a flow has survived for a duration longer
than the configured active timeout.
NOTE: In active flow monitoring, the cflowd records are exported after a
time period that is a multiple of 60 seconds and greater than or equal to
the configured active timeout value. For example, if the active timeout
value is 90 seconds, the cflowd records are exported at 120-second
intervals. If the active timeout value is 150 seconds, the cflowd records are
exported at 180-second intervals, and so forth.
• The flow-inactive-timeout statement specifies the interval of inactivity for a flow that
triggers the flow export. If the interval between the current time and the time that the
last packet for this flow was received exceeds the configured inactive timeout value,
the flow is allowed to expire.
If the flow stops transmitting for longer than the configured inactive timeout value, the
router or switch purges it from the flow table and exports the cflowd record. As a result,
the flow is forgotten as far as the PIC is concerned and if the same 5-tuple appears
again, it is assigned a new start time and considered a new flow.
Both timers are necessary. The active timeout setting is needed to provide information
for flows that constantly transmit packets for a long duration. The inactive timeout setting
enables the router or switch to purge flows that have become inactive and would waste
tracking resources.
complete example, see the Junos OS, Release 14.2. For information on cflowd, see
“Enabling Flow Aggregation” on page 86.
[edit forwarding-options]
monitoring group1 {
family inet {
output {
cflowd 192.168.245.2 port 2055;
export-format cflowd-version-5;
flow-active-timeout 60;
flow-inactive-timeout 30;
interface mo-4/0/0.1 {
engine-id 1;
engine-type 1;
input-interface-index 44;
output-interface-index 54;
source-address 192.168.245.1;
}
interface mo-4/1/0.1 {
engine-id 2;
engine-type 1;
input-interface-index 45;
output-interface-index 55;
source-address 192.168.245.1;
}
interface mo-4/2/0.1 {
engine-id 3;
engine-type 1;
input-interface-index 46;
output-interface-index 56;
source-address 192.168.245.1;
}
interface mo-4/3/0.1 {
engine-id 4;
engine-type 1;
input-interface-index 47;
output-interface-index 57;
source-address 192.168.245.1;
}
}
}
}
This example shows a sample configuration that allows you to configure active monitoring
on a logical system. The following section shows the configuration on the master router:
[edit forwarding-options]
sampling {
instance inst1 {
input {
rate 1;
}
family inet;
output {
flow-server 2.2.2.2 {
port 2055;
version9 {
template {
ipv4;
}
}
}
}
interface sp-0/1/0 {
source-address 10.11.12.13;
}
}
}
family mpls;
output {
flow-server 2.2.2.2 {
port 2055;
version9 {
template {
mpls;
}
}
}
}
interface sp-0/1/0 {
source-address 10.11.12.13;
}
}
}
services {
flow-monitoring {
version9 {
template ipv4 {
flow-active-timeout 60;
flow-inactive-timeout 60;
ipv4-template;
template-refresh-rate {
packets 1000;
seconds 10;
}
option-refresh-rate {
packets 1000;
seconds 10;
}
}
template mpls {
mpls-template;
}
}
}
}
The configuration for the logical router uses the input parameters and the output interface
for sampling from the master router. Each logical router should have separate template
definitions for the flow-server configuration. The following section shows the configuration
on the logical router:
logical-systems {
ls-1 {
firewall {
family inet {
filter test-sample {
term term-1 {
then {
sample;
accept;
}
}
}
}
}
interfaces {
ge-0/0/1 {
unit 0 {
family inet {
filter {
input test-sample;
output test-sample;
}
}
}
}
}
forwarding-options {
sampling {
instance sample-inst1 {
family inet;
output {
flow-server 2.2.2.2 {
port 2055;
version9 {
template {
ipv4-ls1;
}
}
}
}
}
}
family mpls;
output {
flow-server 2.2.2.2 {
port 2055;
version9 {
template {
mpls-ls1;
}
}
}
}
}
}
}
services {
flow-monitoring {
version9 {
template ipv4-ls1 {
flow-active-timeout 60;
flow-inactive-timeout 60;
ipv4-template;
template-refresh-rate {
packets 1000;
seconds 10;
}
option-refresh-rate {
packets 1000;
seconds 10;
}
}
template mpls-ls1 {
mpls-template;
}
}
}
}
}
}
As with the other services that support warm standby, you can issue the
request interfaces (revert | switchover) command to switch manually between
the primary and secondary flow monitoring interfaces.
For more information, see Configuring AS or Multiservices PIC Redundancy. For information
on operational mode commands, see the CLI Explorer.
interface {
rsp0 {
redundancy-options {
primary sp-0/0/0;
secondary sp-1/3/0;
}
unit 0 {
family inet;
}
}
}
interface {
ge-0/2/0 {
unit 0 {
family inet {
filter {
input as_sample;
}
}
address 10.58.255.49/28;
}
}
}
forwarding-options {
sampling {
instance instance1 { # named instances of sampling parameters
input {
rate 1;
run-length 0;
max-packets-per-second 65535;
}
family inet {
output {
flow-server 10.10.10.2 {
port 5000;
version 5;
}
flow-active-timeout 60;
interface rsp0 {
source-address 10.10.10.1;
}
}
}
}
}
}
firewall {
filter as_sample {
term t1 {
then {
sample;
accept;
}
}
}
}
Flow Offloading
The Junos OS enables you to configure flow offloading for PICS on MX Series routers
using Modular Port Concentrator (MPCs) with Modular Interface Cards (MICs). Flows
are offloaded to Fast Update Filters (FUFs) on the Packet Forwarding Engine. Offloading
produces the greatest benefits when applied to long-lasting or high-bandwidth flows.
The maximum number of active offloads is 200,000 per PIC. When offloaded flows are
deleted, more flows can be offloaded.
In the following example, flows are offloaded when they consist of no less than 1024
bytes:
Using a Juniper Networks M Series Multiservice Edge or T Series Core Router, a selection
of PICs (including the Monitoring Services PIC, Adaptive Services [AS] PIC, Multiservices
PIC, or Multiservices DPC) and other networking hardware, you can monitor traffic flow
and export the monitored traffic. Monitoring traffic allows you to do the following:
• Gather and export detailed information about IP version 4 (IPv4) traffic flows between
source and destination nodes in your network.
• Sample all incoming IPv4 traffic on the monitoring interface and present the data in
cflowd record format.
• Direct filtered traffic to different packet analyzers and present the data in its original
format (port mirror).
The router used for passive monitoring does not route packets from the monitored
interface, nor does it run any routing protocols related to those interfaces; it only receives
traffic flows, collects intercepted traffic, and exports it to cflowd servers and packet
analyzers. Figure 2 on page 18 shows a typical topology for the passive flow-monitoring
application.
1
cflowd
collector
S
Passive monitoring Packet analy
zer
S
station
(M40e, M160,
M320, or T Series
router)
Packet analy
zer
2
g015501
S Optical Splitter
Traffic travels normally between Router 1 and Router 2. To redirect IPv4 traffic, you insert
an optical splitter on the interface between these two routers. The optical splitter copies
and redirects the traffic to the monitoring station, which is an M40e, M160, M320, or T
Series router. The optical cable connects only the receive port on the monitoring station,
never the transmit port. This configuration allows the monitoring station to receive traffic
from the router being monitored but never to transmit it back.
If you are monitoring traffic flow, the Internet Processor II application-specific integrated
circuit (ASIC) in the router forwards a copy of the traffic to the Monitoring Services,
Adaptive Services, or Multiservices PIC in the monitoring station. If more than one
monitoring PIC is installed, the monitoring station distributes the load of the incoming
traffic across the multiple PICs. The monitoring PICs generate flow records in cflowd
version 5 format, and the records are then exported to the cflowd collector.
If you are performing lawful interception of traffic between the two routers, the Internet
Processor II ASIC filters the incoming traffic and forwards it to the Tunnel Services PIC.
Filter-based forwarding is then applied to direct the traffic to the packet analyzers.
Optionally, the intercepted traffic or the cflowd records can be encrypted by the ES PIC
or IP Security (IPsec) services and then sent to a cflowd server or packet analyzer.
You can monitor IPv4 traffic from another router if you have the following components
installed in an M Series, MX Series, or T Series router:
IPv6 passive monitoring is not supported on Monitoring Services PICs. You must configure
port mirroring to forward the packets from the passive monitored ports to other interfaces.
Interfaces configured on the following FPCs and PIC support IPv6 passive monitoring on
the T640 and T1600 routers:
• Enhanced II FPC1
• Enhanced II FPC2
• Enhanced II FPC3
• 4-port 10-Gigabit Ethernet LAN/WAN PIC with XFP (supported on both WAN-PHY
and LAN-PHY mode for both IPv4 and IPv6 addresses)
When you configure an interface in passive monitoring mode, the Packet Forwarding
Engine silently drops packets coming from that interface and destined to the router itself.
Passive monitoring mode also stops the Routing Engine from transmitting any packet
from that interface. Packets received from the monitored interface can be forwarded to
monitoring interfaces. If you include the passive-monitor-mode statement in the
configuration:
• The ATM interface is always up, and the interface does not receive or transmit incoming
control packets, such as Operation, Administration, and Maintenance (OAM) and
Interim Local Management Interface (ILMI) cells.
• The SONET/SDH interface does not send keepalives or alarms and does not participate
actively on the network.
• Gigabit and Fast Ethernet interfaces can support both per-port passive monitoring and
per-VLAN passive monitoring. The destination MAC filter on the receive port of the
Ethernet interfaces is disabled.
• Ethernet interfaces do not support the stacked-vlan-tagging statement for both IPv4
and IPv6 packets in passive monitoring mode.
On monitoring services interfaces, you enable passive flow monitoring by including the
family statement at the [edit interfaces interface-name unit logical-unit-number] hierarchy
level, specifying the inet option:
For the monitoring services interface, you can configure multiservice physical interface
properties. For more information, see “Configuring Flow-Monitoring Interfaces” on page 6.
For conformity with the cflowd record structure, you must include the
receive-options-packets and receive-ttl-exceeded statements at the [edit interfaces
interface-name unit logical-unit-number family inet] hierarchy level:
To configure a default label value for MPLS packets, include the default-route statement
at the [edit protocols mpls interface interface-name label-map] hierarchy level:
For more information about static labels, see the Junos OS MPLS Applications Library for
Routing Devices.
The Junos OS can forward only IPv4 packets to a Monitoring Services, Adaptive Services,
or Multiservices PIC. IPv4 and IPv6 packets with MPLS labels cannot be forwarded to a
monitoring PIC. By default, if packets with MPLS labels are forwarded to the monitoring
PIC, they are discarded. To monitor IPv4 and IPv6 packets with MPLS labels, you must
remove the MPLS labels as the packets arrive on the interface.
You can remove up to two MPLS labels from an incoming packet by including the
pop-all-labels statement at the [edit interfaces interface-name (atm-options |
fastether-options | gigether-options | sonet-options) mpls] hierarchy level:
By default, the pop-all-labels statement takes effect for incoming packets with one or
two labels. You can specify the number of MPLS labels that an incoming packet must
have for the pop-all-labels statement to take effect by including the required-depth
statement at the [edit interfaces interface-name (atm-options | fastether-options |
gigether-options | sonet-options) mpls pop-all-labels] hierarchy level:
The required depth can be 1, 2, or [ 1 2 ]. If you include the required-depth 1 statement, the
pop-all-labels statement takes effect for incoming packets with one label only. If you
include the required-depth 2 statement, the pop-all-labels statement takes effect for
incoming packets with two labels only. If you include the required-depth [ 1 2 ] statement,
the pop-all-labels statement takes effect for incoming packets with one or two labels.
A required depth of [ 1 2 ] is equivalent to the default behavior of the pop-all-labels
statement.
When you remove MPLS labels from incoming packets, note the following:
• The pop-all-labels statement has no effect on IP packets with three or more MPLS
labels.
• When you enable MPLS label removal, you must configure all ports on a PIC with the
same label popping mode and required depth.
• You use the pop-all-labels statement to enable passive monitoring applications, not
active monitoring applications.
• You cannot apply MPLS filters or accounting to the MPLS labels because the labels
are removed as soon as the packet arrives on the interface.
• On ATM2 interfaces, you must use a label value greater than 4095 because the lower
range of MPLS labels is reserved for label-switched interface (LSI) and virtual private
LAN service (VPLS) support. For more information, see the Junos OS VPNs Library for
Routing Devices.
• The following ATM encapsulation types are not supported on interfaces with MPLS
label removal:
• atm-ccc-cell-relay
• atm-ccc-vc-mux
• atm-mlppp-llc
• atm-tcc-snap
• atm-tcc-vc-mux
• ether-over-atm-llc
• ether-vpls-over-atm-llc
In this example, the Gigabit Ethernet interface can accept all Ethernet packets. It strips
VLAN tags (if there are any) and up to two MPLS labels blindly, and passes IPv4 packets
to the monitoring interface. With this configuration, it can monitor IPv4, VLAN+IPv4,
VLAN+MPLS+IPv4, and VLAN+MPLS+MPLS+IPv4 labeled packets.
The Fast Ethernet interface can accept only packets with VLAN ID 100. All other packets
are dropped. With this configuration, it can monitor VLAN (ID=100)+IPv4, VLAN
(ID=100)+MPLS+IPv4, and VLAN (ID=100)+MPLS+MPLS+IPv4 labeled packets.
[edit firewall]
family inet {
filter input-monitoring-filter {
term def {
then {
count counter;
accept;
}
}
}
}
[edit interfaces]
ge-0/0/0 {
passive-monitor-mode;
gigether-options {
mpls {
pop-all-labels;
}
}
unit 0 {
family inet {
filter {
input input-monitoring-filter;
}
}
}
}
fe-0/1/0 {
passive-monitor-mode;
vlan-tagging;
fastether-options {
mpls {
pop-all-labels required-depth [ 1 2 ];
}
}
unit 0 {
vlan-id 100;
family inet {
filter {
input input-monitoring-filter;
}
}
}
}
mo-1/0/0 {
unit 0 {
family inet {
receive-options-packets;
receive-ttl-exceeded;
}
}
unit 1 {
family inet;
}
}
[edit forwarding-options]
monitoring mon1 {
family inet {
output {
export-format cflowd-version-5;
cflowd 50.0.0.2 port 2055;
interface mo-1/0/0.0 {
source-address 50.0.0.1;
}
}
}
}
[edit routing-instances]
monitoring-vrf {
instance-type vrf;
interface ge-0/0/0.0;
interface fe-0/1/0.0;
interface mo-1/0/0.1;
route-distinguisher 68:1;
vrf-import monitoring-vrf-import;
vrf-export monitoring-vrf-export;
routing-options {
static {
route 0.0.0.0/0 next-hop mo-1/0/0.1;
}
}
}
[edit policy-options]
policy-statement monitoring-vrf-import {
then {
reject;
}
}
policy-statement monitoring-vrf-export {
then {
reject;
}
}
In this example, the Gigabit Ethernet interface can accept all Ethernet packets. It strips
VLAN tags (if there are any) and up to two MPLS labels blindly, and passes IPv6 packets
to the monitoring interface. With this configuration, the Gigabit Ethernet interface can
monitor IPv6, VLAN+IPv6, VLAN+MPLS+IPv6, and VLAN+MPLS+MPLS+IPv6 labeled
packets.
The vlan-tagged Gigabit Ethernet interface can accept only packets with VLAN ID 100.
All other packets are dropped. With this configuration, it can monitor VLAN (ID=100)+IPv6,
VLAN (ID=100)+MPLS+IPv6, and VLAN (ID=100)+MPLS+MPLS+IPv6 labeled packets.
[edit interfaces]
xe-0/1/0 {
passive-monitor-mode;
unit 0 {
family inet6 {
filter {
input port-mirror6;
}
address 2001::1/128;
}
}
}
xe-0/1/2 {
passive-monitor-mode;
vlan-tagging;
unit 0 {
vlan-id 100;
family inet6 {
filter {
input port-mirror6;
}
}
}
}
xe-0/1/1 {
unit 0 {
family inet6 {
address 2000::1/128;
}
}
}
[edit firewall]
family inet6 {
filter port-mirror6 {
term term2 {
then {
count count_pm;
port-mirror;
accept;
}
}
}
}
[edit forwarding options]
port-mirroring {
input {
rate 1;
}
family inet6 {
output {
interface xe-0/1/1.0 {
next-hop 2000::3;
}
no-filter-check;
}
}
}
You can process and export multiple cflowd records with a flow collector interface. You
create a flow collector interface on a Monitoring Services II or Multiservices 400 PIC. The
flow collector interface combines multiple cflowd records into a compressed ASCII data
file and exports the file to an FTP server. To convert a services PIC into a flow collector
interface, include the flow-collector statement at the [edit chassis fpc fpc-slot pic pic-slot
monitoring-services application] hierarchy level.
You can use the services PIC for either flow collection or monitoring, but not for both
types of service simultaneously. When converting the PIC between service types, you
must configure the flow-collector statement, take the PIC offline, and then bring the PIC
back online. Restarting the router does not enable the new service type.
To activate flow collector services after the services PIC is converted into a flow collector,
include the flow-collector statement at the [edit services] hierarchy level.
After you activate the flow collector, you need to configure the following components:
• File specifications
This section describes the following tasks for configuring flow collection:
To configure a destination for flow collection files, include the destinations statement
at the [edit services flow-collector] hierarchy level:
To specify the destination FTP server, include the ftp:url statement. The value url is the
FTP server address for the primary flow collection destination and can include macros.
When you include macros in the ftp:url statement, a directory can be created only for a
single level. For example, the path ftp://10.2.2.2/%m/%Y expands to
ftp://10.2.2.2/01/2005, and the software attempts to create the directory 01/2005 on
the destination FTP server. If the 01/ directory already exists on the destination FTP server,
the software creates the /2005/ directory one level down. If the 01/ directory does not
exist on the destination FTP server, the software cannot create the /2005/ directory, and
the FTP server destination will fail. For more information about macros, see ftp.
To specify the FTP server password, include the password “password” statement. The
password must be enclosed in quotation marks. You can specify up to two destination
FTP servers. The first destination specified is considered the primary destination.
To configure an IP address and identifier for the packet analyzer, include the
analyzer-address and analyzer-id statements at the [edit services flow-collector] hierarchy
level:
To configure the flow collection file format, include the file-specification statement at
the [edit services flow-collector] hierarchy level:
To set the data file format, include the data-format statement. To set the file name
format, include the name-format statement. To set the export timer and file size
thresholds, include the transfer statement and specify values for the timeout and
record-level options.
In this example, cFlowd-py69Ni69-0 is the static portion used verbatim, %D is the date
in YYYYMMDD format, %T is the time in HHMMSS format, %I is the value of ifAlias, %N
is the generation number, and bcp.bi.gz is a user-configured string. A number of macros
are supported for expressing the date and time information in different ways; for a
complete list, see the summary section for name-format.
To configure the default flow collector and file specifications for all input interfaces,
include the file-specification and collector statements at the [edit services flow-collector
interface-map] hierarchy level. To override the default settings and apply flow collector
and file specifications to a specific input interface, include the file-specification and
collector statements at the [edit services flow-collector interface-map interface-name]
hierarchy level.
To configure a transfer log, include the transfer-log-archive statement at the [edit services
flow-collector] hierarchy level:
To configure the destination for archiving files, include the archive-sites statement. Specify
the filename as follows:
• maximum-age—Specifies the duration a file remains on the server. The range is 1 through
360 minutes.
• Amount of time the flow collector interface waits between successive retries
To configure retry settings, include the retry and retry-delay statements at the [edit
services flow-collector] hierarchy level:
retry number;
retry-delay seconds;
The retry value can be from 0 through 10. The retry-delay value can be from 0 through
60 seconds.
To specify a flow collector interface as the destination for cflowd records coming from
a services PIC, include the collector-pic statement at the [edit forwarding-options
monitoring group-name family inet output flow-export-destination] hierarchy level:
You can select either the flow collector interface or a cflowd server as the destination
for cflowd records, but not both at the same time.
You can select the services PIC to run in either flow collection mode or monitoring mode,
but not both.
To set the services PIC to run in flow collection mode, include the flow-collector statement
at the [edit chassis fpc slot-number pic pic-number monitoring-services application]
hierarchy level:
For further information on configuring chassis properties, see the Junos OS Administration
Library for Routing Devices.
To specify flow collection interfaces, you configure the cp interface at the [edit interfaces]
hierarchy level:
[edit interfaces]
cp-fpc/pic/port {
...
}
Junos Capture Vision (known as dynamic flow capture in Junos OS Releases earlier than
13.2) enables you to capture packet flows on the basis of dynamic filtering criteria.
Specifically, you can use this feature to forward passively monitored packet flows that
match a particular filter list to one or more destinations using an on-demand control
protocol.
• Control source—A client that monitors electronic data or voice transfer over the network.
The control source sends filter requests to the Juniper Networks router using the
Dynamic Task Control Protocol (DTCP), specified in draft-cavuto-dtcp-03.txt at
http://www.ietf.org/internet-drafts. The control source is identified by a unique identifier
and an optional list of IP addresses.
• Monitoring platform—A T Series or M320 router containing one or more Dynamic Flow
Capture (DFC) PICs, which support dynamic flow capture processing. The monitoring
platform processes the requests from the control sources, creates the filters, monitors
incoming data flows, and sends the matched packets to the appropriate content
destinations.
NOTE: The Junos Capture Vision PIC (either a Monitoring Services III PIC or
Multiservices 400 PIC) forwards the entire packet content to the content
destination, rather than to a content record as is done with cflowd or flow
aggregation version 9 templates.
Figure 3 on page 36 shows a sample topology. The number of control sources and content
destinations is arbitrary.
The liberal sequence window feature implements a negative window for the sequence
numbers received in the DTCP packets. It enables the Junos Capture Vision application
to accept not only DTCP packets with sequence numbers greater than those previously
received, but also DTCP packets with lesser sequence numbers, up to a certain limit. This
limit is the negative window size; the positive and negative window sizes are +256 and
–256 respectively, relative to the current maximum sequence number received. No
configuration is required to activate this feature; the window sizes are hard-coded and
nonconfigurable.
Junos Capture Vision does not support interception of VPLS and MPLS traffic. The
application cannot intercept Address Resolution Protocol (ARP) or other Layer 2 exception
packets. The interception filter can be configured to timeout based on factors like total
time (seconds), idle time (seconds), total packets or total data transmitted (bytes).
This section describes the following tasks for configuring Junos Capture Vision:
To configure a capture group, include the capture-group statement at the [edit services
dynamic-flow-capture] hierarchy level:
capture-group client-name {
content-destination identifier {
address address;
hard-limit bandwidth;
hard-limit-target bandwidth;
soft-limit bandwidth;
soft-limit-clear bandwidth;
ttl hops;
}
control-source identifier {
allowed-destinations [ destinations ];
minimum-priority value;
no-syslog;
notification-targets address port port-number;
service-port port-number;
shared-key value;
source-addresses [ addresses ];
}
duplicates-dropped-periodicity seconds;
input-packet-rate-threshold rate;
interfaces interface-name;
max-duplicates number;
pic-memory-threshold percentage percentage;
}
To specify the capture-group, assign it a unique client-name that associates the information
with the requesting control sources.
content-destination identifier {
address address;
hard-limit bandwidth;
hard-limit-target bandwidth;
soft-limit bandwidth;
soft-limit-clear bandwidth;
ttl hops;
}
Assign the content-destination a unique identifier. You must also specify its IP address
and you can optionally include additional settings:
• address—The DFC PIC interface appends an IP header with this destination address
on the matched packet (with its own IP header and contents intact) and sends it out
to the content destination.
• ttl—The time-to-live (TTL) value for the IP-IP header. By default, the TTL value is 255.
Its range is 0 through 255.
soft-limit-clear < soft-limit < hard-limit-target < hard-limit. When the content bandwidth
exceeds the soft-limit setting:
1. A congestion notification message is sent to each control source of the criteria that
point to this content destination
2. If the control source is configured for syslog, a system log message is generated.
3. A latch is set, indicating that the control sources have been notified. No additional
notification messages are sent until the latch is cleared, when the bandwidth falls
below the soft-limit-clear value.
1. Junos Capture Vision begins deleting criteria until the bandwidth falls below the
hard-limit-target value.
The application evaluates criteria for deletion using the following data:
• Priority—Lower priority criteria are purged first, after adjusting for control source
minimum priority.
control-source identifier {
allowed-destinations [ destination-identifiers ];
minimum-priority value;
no-syslog;
notification-targets address port port-number;
service-port port-number;
shared-key value;
source-addresses [ addresses ];
}
Assign the control-source statement a unique identifier. You can also include values for
the following statements:
lower the value, the higher the priority. By default, minimum-priority has a value of 0
and the allowed range is 0 through 254.
• notification-targets—One or more destinations to which the DFC PIC interface can log
information about control protocol-related events and other events such as PIC bootup
messages. You configure each notification-target entry with an IP address value and
a User Datagram Protocol (UDP) port number.
• service-port—UDP port number to which the control protocol requests are directed.
Control protocol requests that are not directed to this port are discarded by DFC PIC
interfaces.
• shared-key—20-byte authentication key value shared between the control source and
the DFC PIC monitoring platform.
To configure a DFC PIC interface, include the interfaces statement at the [edit services
dynamic-flow-capture capture-group client-name] hierarchy level:
interfaces interface-name;
You specify DFC interfaces using the dfc- identifier at the [edit interfaces] hierarchy level.
You must specify three logical units on each DFC PIC interface, numbered 0, 1, and 2. You
cannot configure any other logical interfaces.
The following example shows the configuration necessary to set up a DFC PIC interface
and intercept both IPv4 and IPv6 traffic:
}
}
unit 1 { # receive data packets on this logical interface
family inet; # receive IPv4 traffic for interception
family inet6; # receive IPv6 traffic for interception
}
unit 2 { # send out copies of matched packets on this logical interface
family inet;
}
In addition, you must configure Junos Capture Vision to run on the DFC PIC in the correct
chassis location. The following example shows this configuration at the [edit chassis]
hierarchy level:
fpc 0 {
pic 0 {
monitoring-services application dynamic-flow-capture;
}
}
For more information on configuring chassis properties, see the Junos OS Administration
Library for Routing Devices.
firewall {
family inet {
filter high {
term all {
then forwarding-class network-control;
}
}
}
}
file dfc.log {
dfc any;
}
no-syslog;
When you include the traceoptions configuration, you can also specify the trace file name,
maximum number of trace files, the maximum size of trace files, and whether the trace
file can be read by all users or not.
To enable tracing options for Junos Capture Vision events, include the following
configuration at the [edit services dynamic-flow-capture] hierarchy level:
traceoptions{
file filename <files number> <size size> <world-readable | non-world-readable>;
}
To disable tracing for Junos Capture Vision events, delete the traceoptions configuration
from the [edit services dynamic-flow-capture] hierarchy level.
NOTE: In Junos OS releases earlier than 9.2R1, tracing of Junos Capture Vision
was enabled by default, and the logs were saved to the/var/log/dfcd directory.
Configuring Thresholds
You can optionally specify threshold values for the following situations in which warning
messages will be recorded in the system log:
input-packet-rate-threshold rate;
pic-memory-threshold percentage percentage;
If these statements are not configured, no threshold messages are logged. The threshold
settings are configured for the capture group as a whole.
To configure this limitation, include the max-duplicates statement at the [edit services
dynamic-flow-capture capture-group client-name] hierarchy level:
max-duplicates number;
You can also apply the limitation on a global basis for the DFC PIC by including the
g-max-duplicates statement at the [edit services dynamic-flow-capture] hierarchy level:
g-max-duplicates number;
By default, the maximum number of duplicates is set to 3. The range of allowed values
is 1 through 64. A setting for max-duplicates for an individual capture-group overrides the
global setting.
In addition, you can specify the frequency with which the application sends notifications
to the affected control sources that duplicates are being dropped because the threshold
has been reached. You configure this setting at the same levels as the maximum
duplicates settings, by including the duplicates-dropped-periodicity statement at the
[edit services dynamic-flow-capture capture-group client-name] hierarchy level or the
g-duplicates-dropped-periodicity statement at the [edit services dynamic-flow-capture]
hierarchy level:
duplicates-dropped-periodicity seconds;
g-duplicates-dropped-periodicity seconds;
The following example includes all parts of a complete Junos Capture Vision configuration.
filter {
output high; #Firewall filter to route control packets
# through 'network-control' forwarding class. Control packets
# are loss sensitive.
}
address 10.1.0.0/32 { # DFC PIC address
destination 10.36.100.1; # DFC PIC address used by
# the control source to correspond with the
# monitoring platform
}
}
unit 1 { # receive data packets on this logical interface
family inet;
family inet6;
}
unit 2 { # send out copies of matched packets on this logical interface
family inet;
}
services dynamic-flow-capture {
capture-group g1 {
interfaces dfc-0/0/0;
input-packet-rate-threshold 90k;
pic-memory-threshold percentage 80;
control-source cs1 {
source-addresses 10.36.41.1;
service-port 2400;
notification-targets {
10.36.41.1 port 2100;
}
shared-key "$9$ASxdsYoX7wg4aHk";
allowed-destinations cd1;
}
content-destination cd1 {
address 10.36.70.2;
ttl 244;
}
}
}
Configur3 filter-based forwarding (FBF) to the Junos Capture Vision PIC interface, logical
unit 1.
For more information about configuring passive monitoring interfaces, see “Enabling
Passive Flow Monitoring” on page 18.
interfaces so-1/2/0 {
encapsulation ppp;
unit 0 {
passive-monitor-mode;
family inet {
filter {
input catch;
}
}
}
}
firewall {
filter catch {
interface-specific;
term def {
then {
count counter;
routing-instance fbf_inst;
}
}
}
family inet {
filter high {
term all {
then forwarding-class network-control;
}
}
}
}
Configure a forwarding routing instance. The next hop points specifically to the logical
interface corresponding to unit 1, because only this particular logical unit is expected to
relay monitored data to the Junos Capture Vision PIC.
routing-instances fbf_inst {
instance-type forwarding;
routing-options {
static {
route 0.0.0.0/0 next-hop dfc-0/0/0.1;
}
}
}
[edit]
routing-options {
interface-routes {
rib-group inet common;
}
rib-groups {
common {
import-rib [ inet.0 fbf_inst.inet.0 ];
}
}
forwarding-table {
export pplb;
}
}
interfaces fe-4/1/2 {
description "to cs1 from dfc";
unit 0 {
family inet {
address 10.36.41.2/30;
}
}
}
interfaces ge-7/0/0 {
description "to cd1 from dfc";
unit 0 {
family inet {
address 10.36.70.1/30;
}
}
}
Junos Capture Vision (previously known as dynamic flow capture) enables you to capture
packet flows on the basis of dynamic filtering criteria, using Dynamic Tasking Control
Protocol (DTCP) requests. Junos Packet Vision is a Junos OS application that performs
lawful intercept of packet flows, using Dynamic Tasking Control Protocol (DTCP). The
application extends the use of DTCP to intercept IPv4 and IPv6 packets in an active
monitoring router and send a copy of packets that match filter criteria to one or more
content destinations. Junos Packet Vision was previously know as flow-tap application.
• Lawful intercept
Junos Packet Vision is supported on M Series and T Series routers, except M160 and TX
Matrix routers. Junos Packet Vision filters are applied on all IPv4 traffic and do not add
any perceptible delay in the forwarding path. Junos Packet Vision filters can also be
applied on IPv6 traffic. For security, filters installed by one client are not visible to others
and the CLI configuration does not reveal the identity of the monitored target. A lighter
version of the application is supported on MX Series routers only.
The Junos Packet Vision (previously known as Flow-Tap) architecture consists of one
or more mediation devices that send requests to a Juniper Networks router to monitor
incoming data and forward any packets that match specific filter criteria to a set of one
or more content destinations:
• Mediation device—A client that monitors electronic data or voice transfer over the
network. The mediation device sends filter requests to the Juniper Networks router
using the DTCP. The clients are not identified for security reasons, but have permissions
defined by a set of special login classes. Each system can support up to 16 different
mediation devices for each user, up to a maximum of 64 mediation devices for the
whole system.
filter combined_LEA_filter {
term LEA1_filter {
from {
source-address 1.2.3.4;
destination-address 3.4.5.6;
}
then {
flow-tap;
}
}
term LEA2_filter {
from {
source-address 10.1.1.1;
source-port 23;
}
then {
flow-tap;
}
}
}
Figure 4 on page 49 shows a sample topology that uses two mediation devices and two
content destinations.
IP traffic
Juniper
Networks
router
Mediation LEA1 request Packet Forwarding
device 1 LEA1 response Engine filter
OK
Content
destination 1
Forwarded
Copied Original packet
packet packet
g040869
LEA = Law Enforcing Authority
This topic explains Junos Packet Vision (previously known as Flow-Tap) configuration,
and contains the following sections:
interface sp-fpc/pic/port.unit-number;
You can assign any Adaptive Services or Multiservices PIC in the active monitoring router
for Junos Packet Vision, and use any logical unit on the PIC.
You can specify the type of traffic for which you want to apply the Junos Packet Vision
service by including the family inet | inet6 statement. If the family statement is not included,
the Junos Packet Vision service is, by default, applied to the IPv4 traffic. To apply Junos
Packet Vision service to IPv6 traffic, you must include the family inet6 statement in the
configuration. To enable the Junos Packet Vision service for IPv4 and IPv6 traffic, you
must explicitly configure the family statement for both inet and inet6 families.
You must also configure the logical interface at the [edit interfaces] hierarchy level:
interface sp-fpc/pic/port {
unit logical-unit-number {
family inet;
family inet6;
}
}
NOTE: If you do not include the family inet6 statement in the configuration,
IPv6 flows will not be intercepted.
flow-tap-dtcp {
ssh {
connection-limit value;
rate-limit value;
}
}
To configure client permissions for viewing and modifying Junos Packet Vision
configurations and for receiving tapped traffic, include the permissions statement at the
[edit system login class class-name] hierarchy level:
permissions [permissions];
The permissions needed to use Junos Packet Vision features are as follows:
You can also specify user permissions on a RADIUS server, for example:
For details on [edit system] and RADIUS configuration, see the Junos OS Administration
Library for Routing Devices.
• You cannot configure Junos Capture Vision and Junos Packet Vision features on the
same router simultaneously.
• On routers that support LMNR-based FPCs, you cannot configure the Junos Packet
Vision for IPv6 along with port mirroring or sampling of IPv6 traffic. This restriction
applies even if the router does not have any LMNR-based FPC installed in it. However,
there is no restriction on configuring Junos Packet Vision on routers that are configured
for port mirroring or sampling of IPv4 traffic.
• Junos Packet Vision does not support interception of MPLS and virtual private LAN
service (VPLS).
• Junos Packet Vision cannot intercept Address Resolution Protocol (ARP) and other
Layer 2 exceptions.
• IPv4 and IPv6 intercept filters can coexist on a system, subject to a combined maximum
of 100 filters.
• When Junos Capture Vision process or the Adaptive Services or Multiservices PIC
configured for Junos Packet Vision restarts, all filters are deleted and the mediation
devices are disconnected.
• Only the first fragment of an IPv4 fragmented packet stream is sent to the content
destination.
• Port mirroring might not work in conjunction with Junos Packet Vision.
• Running the Junos Packet Vision over an IPsec tunnel on the same router can cause
packet loops and is not supported.
• M10i routers do not support the standard Junos Packet Vision, but do support
FlowTapLite (see “Configuring FlowTapLite” on page 52). Junos Packet Vision and
FlowTapLite cannot be configured simultaneously on the same chassis.
• PIC-based flow-tap is not supported on M7i and M10i routers equipped with an
Enhanced Compact Forwarding Engine Board (CFEB-E).
Configuring FlowTapLite
A lighter version of the flow-tap application is available on MX Series routers and also
on M320 routers with Enhanced III Flexible PIC Concentrators (FPCs). All of the
functionality resides in the Packet Forwarding Engine rather than a service PIC or Dense
Port Concentrator (DPC).
FlowTapLite uses the same DTCP-SSH architecture to install the Dynamic Tasking
Control Protocol (DTCP) filters and authenticate the users as the original flow-tap
application and supports up to 3000 filters per chassis.
To configure FlowTapLite, include the flow-tap statement at the [edit services] hierarchy
level:
flow-tap {
tunnel-interface interface-name;
}
For the Packet Forwarding Engine to encapsulate the intercepted packet, it must send
the packet to a tunnel logical (vt-) interface. You need to allocate a tunnel interface and
assign it to the dynamic flow capture process for FlowTapLite to use. To create the tunnel
interface, include the following configuration:
chassis {
fpc number {
pic number {
tunnel-services {
bandwidth (1g | 10g);
}
}
}
}
NOTE: Currently FlowTapLite supports only one tunnel interface per instance.
For more information about this configuration, see the Junos OS Administration Library
for Routing Devices.
To configure the logical interfaces and assign them to the dynamic flow capture process,
include the following configuration:
interfaces {
vt-fpc/pic/port {
unit 0 {
family inet;
family inet6;
}
}
}
NOTE: If a service PIC or DPC is available, you can use its tunnel interface for
the same purpose.
NOTE: If you do not include the family intet6 statement in the configuration,
IPv6 flows will not be intercepted.
The following example shows all parts of a complete Junos Packet Vision configuration
with IPv4 and IPv6 flow intercepts
NOTE: The following example applies only to M Series and T Series routers,
except M160 and TX Matrix routers. For MX Series routers, because the
flow-tap application resides in the Packet Forwarding Engine rather than a
service PIC or Dense Port Concentrator (DPC), the Packet Forwarding Engine
must send the packet to a tunnel logical (vt-) interface to encapsulate the
intercepted packet. In such a scenario, you need to allocate a tunnel interface
and assign it to the dynamic flow capture process for FlowTapLite to use.
services {
flow-tap {
interface sp-1/2/0.100;
}
}
interfaces {
sp-1/2/0 {
unit 100 {
family inet;
family inet6;
}
}
}
system {
services {
flow-tap-dtcp {
ssh {
connection-limit 5;
rate-limit 5;
}
}
}
login {
class ft-class {
permissions flow-tap-operation;
}
user ft-user1 {
class ft-class;
authentication {
encrypted-password “xxxx”;
}
}
}
}
The following example shows a FlowTapLite configuration that intercepts IPv4 and IPv6
flows:
system {
login {
class flowtap {
permissions flow-tap-operation;
}
user ftap {
uid 2000;
class flowtap;
authentication {
encrypted-password "$1$nZfwNn4L$TWi/oxFwFZyOyyxN/87Jv0"; ##
SECRET-DATA
}
}
}
services {
flow-tap-dtcp {
ssh;
}
}
}
chassis {
fpc 0 {
pic 0 {
tunnel-services {
bandwidth 10g;
}
}
}
}
interfaces {
vt-0/0/0 {
unit 0 {
family inet;
family inet6;
}
}
}
services {
flow-tap {
tunnel-interface vt-0/0/0.0;
}
}
Traffic sampling enables you to copy traffic to a Physical Interface Card (PIC) that
performs flow accounting while the router forwards the packet to its original destination.
You can configure the router to perform sampling in either of two locations:
• On the Routing Engine, using the sampled process. To select this method, use a filter
(input or output) with a matching term that contains the then sample statement.
NOTE: Routing Engine based sampling is not supported on VPN routing and
forwarding (VRF) instances.
• Create a firewall filter to apply to the logical interfaces being sampled by including the
filter statement at the [edit firewall family family-name] hierarchy level. In the filter
then statement, you must specify the action modifier sample and the action accept.
filter filter-name {
term term-name {
then {
sample;
accept;
}
}
}
For more information about firewall filter actions and action modifiers, see the Routing
Policies, Firewall Filters, and Traffic Policers Feature Guide for Routing Devices.
• Apply the filter to the interfaces on which you want to sample traffic by including the
address and filter statements at the [edit interfaces interface-name unit
logical-unit-number family family-name] hierarchy level:
address address {
}
filter {
input filter-name;
}
The following prerequisites apply to M, MX, and T Series routers when you configure
traffic sampling on interfaces and in firewall filters:
• If you configure a sample action in a firewall filter for an inet or inet6 family on an
interface without configuring the forwarding-options settings, operational problems
might occur if you also configure port mirroring or flow-tap functionalities. In such a
scenario, all the packets that match the firewall filter are incorrectly sent to the service
PIC.
• If you include the then sample statement at the [edit firewall family inet filter filter-name
term term-name] hierarchy level to specify a sample action in a firewall filter for IPv4
packets, you must also include the family inet statement at the [edit forwarding-options
sampling] hierarchy level or the instance instance-name family inet statement at the
[edit forwarding-options sampling] hierarchy level. Similarly, if you include the then
sample statement at the [edit firewall family inet6 filter filter-name term term-name]
hierarchy level to specify a sample action in a firewall filter for IPv6 packets, you must
also include family inet6 statement at the [edit forwarding-options sampling] hierarchy
level or the instance instance-name family inet6 statement at the [edit
forwarding-options sampling] hierarchy level. Otherwise, a commit error occurs when
you attempt to commit the configuration.
• Also, if you configure traffic sampling on a logical interface by including the sampling
input or sampling output statements at the [edit interface interface-name unit
logical-unit-number] hierarchy level, you must also include the family inet | inet6
statement at the [edit forwarding-options sampling] hierarchy level, or the instance
instance-name family inet | inet6 statement at the [edit forwarding-options sampling]
hierarchy level.
sampling {
input {
rate number;
run-length number;
max-packets-per-second number;
maximum-packet-length bytes;
}
When you use Routing Engine-based sampling, specify the threshold traffic value by
including the max-packets-per-second statement. The value is the maximum number of
packets to be sampled, beyond which the sampling mechanism begins dropping packets.
The range is from 0 through 65,535. A value of 0 instructs the Packet Forwarding Engine
not to sample any packets. The default value is 1000.
Specify the sampling rate by setting the values for rate and run-length (see
Figure 5 on page 61).
The rate statement specifies the ratio of packets to be sampled. For example, if you
configure a rate of 10, x number of packets out of every 10 is sampled, where x=run length
+ 1. By default, the rate is 0, which means that no traffic is sampled.
The run-length statement specifies the number of matching packets to sample following
the initial one-packet trigger event. By default, the run length is 0, which means that no
more traffic is sampled after the trigger event. The range is from 0 through 20. Configuring
a run length greater than 0 allows you to sample packets following those already being
sampled.
To collect the sampled packets in a file, include the file statement at the [edit
forwarding-options sampling output] hierarchy level. Output file formats are discussed
later in the chapter.
disable;
Sampling Once
To explicitly sample a packet for active monitoring only once, include the sample-once
statement at the [edit forwarding-options sampling] hierarchy level:
sample-once;
Setting this option avoids duplication of packets in cases where sampling is enabled at
both the ingress and egress interfaces and simplifies analysis of the sampled traffic.
On MPC-based interfaces, you can configure ToS rewrite either using class-of-service
(CoS) configuration by including the rewrite-rules dscp rule_name statement at the [edit
class-of-service interfaces interface-name unit logical-unit-number] hierarchy level or using
firewall filter configuration by including the dscp statement at the [edit firewall family
family-name filter filter-name term term-name then] hierarchy level. If ToS rewrite is
configured, the egress mirrored or sampled copies contain the post-rewrite ToS values
by default. With the pre-rewrite-tos configuration, you can retain the prerewrite ToS value
in the sampled or mirrored packets.
NOTE:
• If ToS rewrite is configured on the egress interface by using both CoS and
firewall filter configuration, and if the pre-rewrite-tos statement is also
configured, then the egress sampled packets contain the DSCP value set
using the firewall filter configuration. However, if the pre-rewrite-tos
statement is not configured, the egress sampled packets contain the DSCP
value set by the CoS configuration.
aggregate-export-interval seconds;
flow-active-timeout seconds;
flow-inactive-timeout seconds;
extension-service service-name;
flow-server hostname {
aggregation {
autonomous-system;
destination-prefix;
protocol-port;
source-destination-prefix {
caida-compliant;
}
source-prefix;
}
autonomous-system-type (origin | peer);
(local-dump | no-local-dump);
port port-number;
source-address address;
version format;
version9 {
template template-name;
}
}
interface interface-name {
engine-id number;
engine-type number;
source-address address;
}
file {
disable;
filename filename;
files number;
size bytes;
(stamp | no-stamp);
(world-readable | no-world-readable);
}
To configure inline flow monitoring on MX Series routers, include the inline-jflow statement
at the [edit forwarding-options sampling instance instance-name family (inet | inet6 | mpls)
output] hierarchy level. Inline sampling exclusively supports a new format called IP_FIX
that uses UDP as the transport protocol. When you configure inline sampling, you must
include the version-ipfix statement at the [edit forwarding-options sampling instance
instance-name family (inet | inet6 | mpls) output flow-server address] hierarchy level and
also at the [edit services flow-monitoring] hierarchy level. For more information about
configuring inline flow monitoring, see “Configuring Inline Active flow Monitoring” on
page 78.
To configure flow sampling version 9 output, you need to include the template statement
at the [edit forwarding-options sampling output version9] hierarchy level. For information
on cflowd, see “Enabling Flow Aggregation” on page 86.
file {
disable;
filename filename;
files number;
size bytes;
(stamp | no-stamp);
(world-readable | no-world-readable);
}
Traffic sampling output is saved to an ASCII text file. The following is an example of the
traffic sampling output that is saved to a file in the/var/tmp directory. Each line in the
output file contains information for one sampled packet. You can optionally display a
timestamp for each line.
The column headers are repeated after each group of 1000 packets.
# Apr 7 15:48:50
Time Dest Src Dest Src Proto TOS Pkt Intf IP TCP
To set the timestamp option for the file my-sample, enter the following:
Whenever you toggle the timestamp option, a new header is included in the file. If you
set the stamp option, the Time field is displayed.
# Apr 7 15:48:50
# Time Dest Src Dest Src Proto TOS Pkt Intf IP TCP
# addr addr port port len num frag flags
# Feb 1 20:31:21
# Dest Src Dest Src Proto TOS Pkt Intf IP TCP
# addr addr port port len num frag flags
To trace traffic sampling operations, include the traceoptions statement at the [edit
forwarding-options sampling] hierarchy level:
traceoptions {
no-remote-trace;
file filename <files number> <size bytes> <match expression> <world-readable |
no-world-readable>;
}
[edit interfaces]
so-0/0/1 {
unit 0 {
family inet {
filter {
input sample-sonet;
}
address 10.127.68.254/32 {
destination 172.16.74.7;
}
}
}
}
[edit forwarding-options]
sampling {
input {
family inet {
rate 100;
run-length 2;
}
}
family inet {
output {
file {
filename sonet-samples.txt;
files 40;
size 5m;
}
}
}
}
The following configuration gathers statistical information about every packet entering
the router on a specific Gigabit Ethernet port originating from a single source IP address
of 172.16.92.31, and collects it in a file named samples-172-16-92-31.txt.
[edit interfaces]
ge-4/1/1 {
unit 0 {
family inet {
filter {
input one-ip;
}
address 10.45.92.254;
}
}
}
Finally, gather statistics on all the candidate samples; in this case, gather all statistics:
[edit forwarding-options]
sampling {
input {
family inet {
rate 1;
}
}
family inet {
output {
file {
filename samples-172-16-92-31.txt;
files 100;
size 100k;
}
}
}
}
Create a filter:
[edit interfaces]
t3-7/0/2 {
unit 0 {
family inet {
filter {
input ftp-stats;
}
address 10.35.78.254/32 {
destination 10.35.78.4;
}
}
}
}
[edit forwarding-options]
sampling {
input {
family inet {
rate 10;
}
}
family inet {
output {
file {
filename t3-ftp-traffic.txt;
files 50;
size 1m;
}
}
}
}
You can configure active sampling by defining a sampling instance that specifies a name
for the sampling parameters and bind the instance name to an FPC, MPC, or DPC. This
configuration enables you to define multiple named sampling parameter sets associated
with multiple destinations and protocol families per sampling destination. With the
cflowd version 5 and version 8 and flow aggregation version 9, you can use templates
to organize the data gathered from sampling.
To implement this feature, you include the instance statement at the [edit
forwarding-options sampling] hierarchy level.
• This configuration is supported on the IP version 4 (inet), IP version 6 (ipv6), and MPLS
protocol families.
• You can configure the router to perform sampling in either of two locations:
• On the Routing Engine, using the sampled process. To select this method, use a filter
(input or output) with a matching term that contains the then sample statement.
• You can configure the rate and run-length options at the [edit forwarding-options
sampling input] hierarchy level to apply common values for all families on a global
basis. Alternatively, you can configure these options at the [edit forwarding-options
sampling instance instance-name input] hierarchy level to apply specific values for each
instance or at the [edit forwarding-options sampling instance instance-name family
family input] hierarchy level to apply specific values for each protocol family you
configure.
To associate the defined instance with a particular FPC, MPC, or DPC, you include the
sampling-instance statement at the [edit chassis fpc number] hierarchy level, as in the
following example:
chassis {
fpc 2 {
sampling-instance samp1;
}
}
To associate a sampling instance with an FPC in the MX Series Virtual Chassis master
or backup router, use the sampling-instance instance-name statement at the [edit
chassis member member-number fpc slot slot-number] hierarchy level, where
member-number is 0 (for the master router) or 1 (for the backup router), and slot-number
is a number in the range 0 through 11.
Discard accounting is similar to traffic sampling, but varies from it in two ways:
• In discard accounting, the packet is intercepted by the monitoring PIC and is not
forwarded to its destination.
• Traffic sampling allows you to limit the number of packets sampled by configuring the
max-packets-per-second, rate, and run-length statements. Discard accounting does
not provide these options, and a high packet count can potentially overwhelm the
monitoring PIC.
A discard instance is a named entity that specifies collector information under the
accounting name statement. Discard instances are referenced in firewall filter term
statements by including the then discard accounting name statement.
Most of the other statements are also found at the [edit forwarding-options sampling]
hierarchy level. For information on cflowd, see “Enabling Flow Aggregation” on page 86.
The flow-active-timeout and flow-inactive-timeout statements are described in
“Configuring Flow Monitoring” on page 6.
You cannot use rate-limiting with discard accounting; however, you can specify the
duration of the interval for exporting aggregated accounting information by including the
aggregate-export-interval statement in the configuration. This enables you to put a
boundary on the amount of traffic exported to a flow-monitoring interface.
This topic provides an overview of the inline active flow monitoring feature and IPFIX and
Version 9 flow collection templates used for inline active flow monitoring.
Inline active flow monitoring provides for higher scalability and performance as the scaling
and performance are not dependent on the capacity of the services interface. It is also
cost effective in more than one way as there is no need to invest in additional hardware
or to dedicate a PIC slot for the services PIC. You can make full use of the available slots
for handling traffic on the device.
Junos OS Release 13.2 extends inline active flow monitoring support to VPLS flows. Now,
you can configure inline active flow monitoring for IPv4, IPv6, and VPLS traffic.
The inline active flow monitoring configuration can be broadly classified into four
categories:
1. Configurations at the [edit services flow-monitoring] hierarchy level—At this level, you
configure the template properties for inline flow monitoring.
services flow-monitoring] hierarchy level) with the sampling instance. At this level,
you also configure the flow-server IP address and port number as well as the flow
export rate.
3. Configurations at the [edit chassis] hierarchy level—At this level, you associate the
sampling instance with the FPC on which the media interface is present. If you are
configuring sampling of IPv6 flows, you must also specify the flow hash table size.
4. Configurations at the [edit firewall] hierarchy level—At this level you configure a firewall
filter for the family of traffic to be sampled. You must attach this filter to the interface
on which you want to sample the traffic.
Inline active flow monitoring supports version 9 and IPFIX flow collection templates.
Support for version 9 template was introduced in Junos OS Release 13.2, and is limited
to IPv4 flows. IPFIX template is supported for IPv4, IPv6, and VPLS flows. IPFIX template
uses UDP as the transport protocol, whereas version 9 is transport protocol-independent.
Before you configure inline active flow monitoring, you should ensure that you have
adequately-sized hash tables for IPv4 and IPv6 flow sampling. These tables can use one
to fifteen 256k areas, and each table is assigned a default value of one such area. When
anticipated traffic volume requires larger tables, allocate larger tables.
• You can configure inline active flow monitoring only on MX Series routers with
Trio-based line cards and T4000 routers with Type 5 FPCs.
• You can configure only one sampling instance on an Flexible PIC Concentrator (FPC).
• You can configure only one type of sampling–either PIC-based sampling or inline
sampling–per family in a sampling instance. However, you can configure PIC-based
and inline sampling for different families in a sampling instance.
• You can configure only one collector for inline active flow monitoring.
• For inline configurations, each family can support only one collector.
• The user-defined sampling instance gets precedence over the global instance. When
a user-defined sampling instance is attached to the FPC, the global instance is
removed from the FPC and the user-defined sampling instance is applied to the FPC.
• Flow records and templates cannot be exported if the flow collector is reachable
through any management interface.
• The flow collector should be reachable through the default routing table (inet.0 or
inet6.0). If the flow collector is reachable via a non-default VPN routing and forwarding
table (VRF), flow records and templates cannot be exported.
NOTE: Starting with Junos OS Release 13.3, you can configure the flow
collector to be reachable through non-default VRF instances apart from
being reachable over the default VRF instance. Flow records and templates
can be exported even with non-default VRF instances.
• If the destination of the sampled flow is reachable through multiple paths, the
IP_NEXT_HOP (Element ID 15) and OUTPUT_SNMP (Element ID 14) in the IPv4 flow
record would be set to the Gateway Address and SNMP Index of the first path seen in
the forwarding table.
• If the destination of the sampled flow is reachable through multiple paths, the
IP_NEXT_HOP(Element ID 15) and OUTPUT_SNMP (Element ID 14) in the IPv6 flow
records would be set to 0.
• The Incoming Interface (IIF) and Outgoing Interface (OIF) should be part of the same
VRF. If OIF is in a different VRF, DST_MASK (Element ID 13), DST_AS (Element ID 17),
IP_NEXT_HOP (Element ID 15), and OUTPUT_SNMP (Element ID 14) would be set to
0 in the flow records.
• Each Lookup Chip (LU) maintains and exports flows independent of other LUs. Traffic
received on a media interface is distributed across all LUs in a multi-LU platform. It is
likely that a single flow will be processed by multiple LUs. Therefore, each LU creates
a unique flow and exports it to the flow collector. This can cause duplicate flows records
to be seen on the flow collector. The flow collector should aggregate PKTS_COUNT
and BYTES_COUNT for duplicate flow records to derive a single flow record.
• IPv4 TOS
• IPv4 Protocol
• L4 Source Port
• L4 Destination Port
• Input Interface
• VLAN ID
• Source AS
• Destination AS
• TCP Flags
Output Interface
• IPv6 TOS
• IPv6 Protocol
• L4 Source Port
• L4 Destination Port
• Input Interface
• VLAN ID
• Source AS
• Destination AS
• TCP Flags
Output Interface
• IPv4 TOS
• IPv4 Protocol
• L4 Source Port
• L4 Destination Port
• Input Interface
• VLAN ID
• Source AS
• Destination AS
• TCP Flags
Output Interface
The inline active flow monitoring is implemented on the Packet Forwarding Engine. All
the functions like flow creation, flow update, and flow records export are done by the
Packet Forwarding Engine. The flow records are sent out in industry standard IPFIX format.
The inline active flow monitoring configuration can be broadly classified into four
categories:
1. Configurations at the [edit services flow-monitoring] hierarchy level—At this level, you
configure the template properties for inline flow monitoring.
3. Configurations at the [edit chassis] hierarchy level—At this level, you associate the
sampling instance with the FPC on which the media interface is present. If you are
configuring sampling of IPv6 flows, you mThe template properties inlucdust also
specify the flow hash table size.
4. Configurations at the [edit firewall] hierarchy level—At this level you configure a firewall
filter for the family of traffic to be sampled. You must attach this filter to the interface
on which you want to sample the traffic.
Before you configure inline active flow monitoring, you should ensure that you have
adequately-sized hash tables for IPv4 and IPv6 flow sampling. These tables can use one
to fifteen 256k areas, and each table is assigned a default value of one such area. When
anticipated traffic volume requires larger tables, allocate larger tables.
NOTE: For Junos OS releases earlier than Release 12.1, the following points
are applicable for supporting backward compatibility when you configure
the IPv4 and IPv6 flow table sizes for inline active flow monitoring:
• If you configure the sizes of both the IPv4 and IPv6 flow tables, the flow
tables are created on the Packet Forwarding Engine based on the size that
you specified.
NOTE: The functionality to log the cflowd records in a log file before they are
exported to a cflowd server (by including the local-dump statement at the
[edit forwarding-options sampling instance instance-name family (inet |inet6
|mpls) output flow-server hostname] hierarchy level) is not supported when
you configure inline flow monitoring (by including the inline-jflow statement
at the [edit forwarding-options sampling instance instance-name family inet
output] hierarchy level).
1. Go to the flow-table-size hierarchy level for inline services on the FPC that processes
the monitored flows.
[edit]
user@host# edit chassis fpc 0 inline-services flow-table-size
NOTE: When you set the flow hash table sizes, remember:
• Any change in the configured size of flow hash table sizes initiates an
automatic reboot of the FPC.
• The total number of units used for both IPv4 and IPv6 cannot exceed
15.
To configure inline active flow monitoring on all other MX Series routers (except for MX80
routers), EX Series switches, and T4000 routers with Type 5 FPC:
1. Enable inline active flow monitoring and specify the source address for the traffic.
The output format properties are common to other output formats and are described
in ““Configuring Flow Aggregation to Use IPFIX Flow Templates” on page 101”.
The following is an example of the sampling configuration for an instance that supports
inline active flow monitoring on family inet and PIC-based sampling on family inet6:
[edit forwarding-options]
sampling {
instance {
sample-ins1 {
input {
rate 1;
}
family inet {
output {
flow-server 2.2.2.2 {
port 2055;
version-ipfix {
template {
ipv4;
}
}
}
inline-jflow {
source-address 10.11.12.13;
}
}
}
family inet6 {
output {
flow-server 2.2.2.2 {
port 2055;
version-ipfix {
template {
ipv6;
}
}
}
interface sp-0/1/0 {
source-address 10.11.12.13;
}
}
}
}
}
}
services {
flow-monitoring {
version-ipfix {
template ipv4 {
flow-active-timeout 60;
flow-inactive-timeout 60;
ipv4-template;
template-refresh-rate {
packets 1000;
seconds 10;
}
option-refresh-rate {
packets 1000;
seconds 10;
}
}
}
}
}
• For inline configurations, each family can support only one collector.
[edit]
user@host# set chassis tfeb slot number sampling-instance sampling-instance
The Forwarding Engine Processor slot is always 0 because MX80 routers have only
one Packet Forwarding Engine. In this configuration, the sampling instance is
sample-ins1.
[edit]
user@host# set chassis tfeb slot 0 sampling-instance sample-ins1
2. Under forwarding-options, configure a sampling instance for the flow server and inline
jflow instances (these will be configured in the following steps):
4. Navigate to the output hierarchy and from there, enable a flow server and then specify
the output address and port:
5. Return to the output hierarchy and specify the source address for inline jflow:
The output format properties are common to other output formats and are described
in ““Configuring Flow Aggregation to Use IPFIX Flow Templates” on page 101”.
The following is an example of the sampling configuration for an instance that supports
inline active flow monitoring on MX80 routers:
[edit forwarding-options]
user@host# show
sampling {
instance {
sample-ins1 {
input {
rate 1000;
}
family inet {
flow-server 133..13.13.122{
port 1333;
inline-jflow {
source-address 10.11.12.13;
}
}
}
}
}
NOTE: You need not configure a Flexible PIC Concentrator (FPC) slot because
MX80 routers have only one Packet Forwarding Engine.
Related • Configuring Flow Aggregation to Use IPFIX Flow Templates on page 101
Documentation
• Configuring Inline Active flow Monitoring on page 78
You can collect an aggregate of sampled flows and send the aggregate to a specified
host that runs either the cflowd application available from CAIDA (http://www.caida.org)
or the newer version 9 format defined in RFC 3954, Cisco Systems NetFlow Services Export
Version 9. Before you can perform flow aggregation, the routing protocol process must
export the autonomous system (AS) path and routing information to the sampling
process.
By using flow aggregation, you can obtain various types of byte and packet counts of
flows through a router. The application collects the sampled flows over a period of 1
minute. At the end of the minute, the number of samples to be exported are divided over
the period of another minute and are exported over the course of the same minute.
You configure flow aggregation in different ways, depending on whether you want to
export flow records in cflowd version 5 or 8 format, or the separate version 9 format. The
latter allows you to sample MPLS, IPv4, IPv6, and peer AS billing traffic. You can also
combine configuration statements between the MPLS and IPv4 formats.
Before you can perform flow aggregation, the routing protocol process must export the
autonomous system (AS) path and routing information to the sampling process. To
enable the export of AS path and the routing information to the sampling process, one
or more of the following needs to be configured:
• At the [edit forwarding-options] hierarchy level (for routing instances, at the [edit
routing-instance routing-instance-name forwarding-options] hierarchy level), configure
sampling family or sampling output or sampling instance or monitoring or accounting.
• At the [edit routing-options] hierarchy level (for routing instances, at the [edit
routing-instance routing-instance-name routing-options] hierarchy level), configure
route record.
To enable the collection of cflowd version 5 or version 8 flow formats, include the
flow-server statement:
flow-server hostname {
aggregation {
autonomous-system;
destination-prefix;
protocol-port;
source-destination-prefix {
caida-compliant;
}
source-prefix;
}
autonomous-system-type (origin | peer);
(local-dump | no-local-dump);
port port-number;
version format;
}
You must configure the family inet statement on logical interface unit 0 on the monitoring
interface, as in the following example:
[edit interfaces]
sp-3/0/0 {
unit 0 {
family inet {
...
}
}
}
NOTE: Boot images for monitoring services interfaces are specified at the
[edit chassis images pic] hierarchy level. You must enable the NTP client to
make the cflowd feature operable, by including the following configuration:
[edit system]
ntp {
boot-server ntp.juniper.net;
server 172.17.28.5;
}
processes {
ntp enable;
}
For more information, see the Junos OS Administration Library for Routing
Devices.
You can also configure cflowd version 5 for flow-monitoring applications by including
the cflowd statement at the [edit forwarding-options monitoring name family inet output]
hierarchy level:
cflowd hostname {
port port-number;
}
• You can configure up to one version 5 and one version 8 flow format at the [edit
forwarding-options accounting name output] hierarchy level.
• You can configure up to eight version 5 or one version 8 flow format at the [edit
forwarding-options sampling family (inet | inet6 | mpls) output] hierarchy level for
Routing Engine-based sampling by including the flow-server statement. In contrast,
PIC-based sampling allows you to specify one cflowd version 5 server and one version
8 server simultaneously. However, the two cflowd servers must have different IP
addresses.
• You can configure up to eight version 5 flow formats at the [edit forwarding-options
monitoring name output] hierarchy level. Version 8 flow formats and aggregation are
not supported for flow-monitoring applications.
• Outbound Routing Engine traffic is not sampled. A firewall filter is applied as output
on the egress interface, which samples packets and exports the data. For transit traffic,
egress sampling works correctly. For internal traffic, the next hop is installed in the
Packet Forwarding Engine but sampled packets are not exported.
• Flows are created on the monitoring PIC only after the route record resynchronization
operation is complete, which is 60 seconds after the PIC comes up. Any packets sent
to the PIC would be dropped until the synchronization process is complete.
In the cflowd statement, specify the name or identifier of the host that collects the flow
aggregates. You must also include the User Datagram Protocol (UDP) port number on
the host and the version, which gives the format of the exported cflowd aggregates. To
collect cflowd records in a log file before exporting, include the local-dump statement.
NOTE: You can specify both host (cflowd) sampling and port mirroring in
the same configuration; however, only one action takes effect at any one
time. Port mirroring takes precedence. For more information, see “Configuring
Port Mirroring” on page 121.
For cflowd version 8 only, you can specify aggregation of specific types of traffic by
including the aggregation statement. This conserves memory and bandwidth by enabling
cflowd to export targeted flows rather than all aggregated traffic. To specify a flow type,
include the aggregation statement:
aggregation {
autonomous-system;
destination-prefix;
protocol-port;
source-destination-prefix {
caida-compliant;
}
source-prefix;
}
The protocol-port statement configures aggregation by the protocol and port number;
requires setting the separate cflowd port statement.
Collection of sampled packets in a local ASCII file is not affected by the cflowd statement.
The following commands enable RE- and PIC-based sampling at the set forwarding
options sampling hierarchy level:
The following commands enable RE- and PIC-based sampling at the set interfaces
hierarchy level:
The following commands enable RE- and PIC-based sampling at the set firewall family
hierarchy level:
The following command enables PIC-based sampling at the set forwarding options
sampling hierarchy level:
• set family inet output interface sp-*/*/* source address source address
The following example shows a PIC-based flow aggregation configuration using version
5:
family inet {
output {
flow-inactive-timeout 15;
flow-active-timeout 60;
flow-server 153.104.248.37 {
port 9996;
version 5;
}
interface sp-2/2/0 {
engine-id 4;
source-address 153.104.0.254;
}
}
The following example shows an RE-based flow aggregation configuration using version
5:
family inet {
output {
flow-inactive-timeout 15;
flow-active-timeout 60;
flow-server 153.104.248.37 {
port 9996;
source-address 153.104.0.254;
version 5;
}
}
Use of version 9 allows you to define a flow record template suitable for IPv4 traffic, IPv6
traffic, MPLS traffic, a combination of IPv4 and MPLS traffic, or peer AS billing traffic.
Templates and the fields included in the template are transmitted to the collector
periodically, and the collector need not be aware of the router configuration.
NOTE: Version 9 requires that you install a services PIC, such as the Adaptive
Services PIC or Multiservices PIC in the router. On MX Series routers, the
Multiservices DPC fulfills this requirement. For more information on
determining which services PIC is suitable for your router, see Enabling Service
Packages or the appropriate hardware documentation.
[edit forwarding-options]
sampling {
family (inet | inet6 | mpls);
}
NOTE: If you specify sampling for peer AS billing traffic, the family statement
supports only IPv4 and IPv6 traffic (inet or inet6). Peer AS billing traffic is
enabled only at the global instance hierarchy level and is not available for
per Packet Forwarding Engine instances.
After you specify the family of traffic to be sampled, configure the sampling parameters
such as the maximum packet length (beyond which the packets are truncated). maximum
packets to be sampled per second (beyond which the packets are dropped), the rate
(for example, if you specify 10, every 10th packet is sampled), and run length (which
specify the number of packets to be sampled after the trigger; that is if the rate is set to
10 and run-length to 5, five packets starting the 10th packet are sampled).
• You assign each template a unique name by including the template name statement.
• You then specify each template for the appropriate type of traffic by including the
ipv4-template, ipv6–template, mpls-ipv4-template, mpls-template, or
peer-as-billing-template.
• If the template is used for MPLS traffic, you can also specify up to three label positions
for the MPLS header label data by including the label-position statement; the default
values are [1 2 3].
• Within the template definition, you can optionally include values for the
flow-active-timeout and flow-inactive-timeout statements. These statements have
specific default and range values when they are used in template definitions; the default
is 60 seconds and the range is from 10 through 600 seconds. Values you specify in
template definitions override the global timeout values configured at the [edit
forwarding-options sampling family (inet | inet6 | mpls) output flow-server] hierarchy
level.
• You can also include settings for the option-refresh-rate and template-refresh-rate
statements within a template definition. For both of these properties, you can include
a timer value (in seconds) or a packet count (in number of packets). For the seconds
option, the default value is 60 and the range is from 10 through 600. For the packets
option, the default value is 4800 and the range is from 1 through 480,000.
interfaces interface-name {
unit 0 {
family inet6 {
sampling {
input;
output;
}
}
}
}
Customizing Template ID, Observation Domain ID, and Source ID for Version 9 flow Templates
Use of version 9 and IPFIX allows you to define a flow record template suitable for IPv4
traffic, IPv6 traffic, MPLS traffic, a combination of IPv4 and MPLS traffic, or peer AS billing
traffic. Templates and the fields included in the template are transmitted to the collector
periodically, and the collector need not be aware of the router configuration. Starting
with Junos OS Release 14.1, you can specify the unique identifier for the version 9 and
IPFIX templates. The identifier of a template is locally unique within a combination of a
transport session and an observation domain. Template IDs 0 through 255 are reserved
for template sets, options template sets, and other sets for future use. Template IDs of
data sets are numbered from 256 through 65535. Typically, this information element or
field in the template is used to define the characteristics or properties of other information
elements in a template. After a restart of the export process of templates is performed,
template IDs can be reassigned. In Junos OS releases earlier than Release 14.1, template
IDs and options template IDs were predefined for each address family and could not be
modified.
This functionality to configure template ID, options template ID, observation domain ID,
and source ID is supported on all routers with MPCs (Trio chip-based FPCs).
The following values were assigned by default for the template IDs of IPFIX templates
for the different protocols or address families, until Junos OS Release 13.3:
The corresponding data sets and option data sets contain the value of the template IDs
and options template IDs respectively in the set ID field. This method enables the collector
to match a data record with a template record.
For more information about specifying the source ID, observation domain ID, template
ID, and options template ID for version 9 and IPFIX flows, see “Configuring Observation
Domain ID and Source ID for Version 9 and IPFIX Flows” on page 106 and “Configuring
Template ID and Options Template ID for Version 9 and IPFIX Flows” on page 109.
Restrictions
The following restrictions apply to version 9 templates:
• You cannot apply the two different types of flow aggregation configuration (cflowd
version 5/8 and flow aggregation version 9) at the same time.
• Flow export based on an mpls-ipv4 template assumes that the IPv4 header follows
the MPLS header. In the case of Layer 2 VPNs, the packet on the provider router (P
router) would look like this:
In this case, mpls-ipv4 flows are not created on the PIC, because the IPv4 header does
not directly follow the MPLS header. Packets are dropped on the PIC and are accounted
as parser errors.
• Outbound Routing Engine traffic is not sampled. A firewall filter is applied as output
on the egress interface, which samples packets and exports the data. For transit traffic,
egress sampling works correctly. For internal traffic, the next hop is installed in the
Packet Forwarding Engine but sampled packets are not exported.
• Flows are created on the monitoring PIC only after the route record resynchronization
operation is complete, which is 60 seconds after the PIC comes up. Any packets sent
to the PIC would be dropped until the synchronization process is complete.
NOTE: "Because the forwarding of a packet that arrives with MPLS labels is
performed based on the MPLS label and not based on the IP address
contained in the packet, the packet is sampled at the output interface with
the MPLS label that was popped not being available at the time of sampling.
In such a case, depending on the incoming interface (IIF), the VRF index is
identified and the route for the sampled packet is determined in the VRF
table. Because a specific route is not available in the VRF that is different
from the VRF on which the packet is received, the Output Interface Index,
Source Mask, and Destination Mask fields are incorrectly populated. This
behavior occurs when an IPv4 template is applied as a firewall filter on an
egress interface with sample as the action."
• Input interface
• Output interface
• Number of bytes
• Number of packets
• L4 Source Port
• L4 Destination Port
• IPv4 TOS
• IPv4 Protocol
• TCP Flags
• Destination AS number
• L4 Source Port
• L4 Destination Port
• IPv6 TOS
• IPv6 Protocol
• TCP Flags
• IP Protocol Version
• Destination AS number
• MPLS Label #1
• MPLS Label #2
• MPLS Label #3
• FEC IP Address
The MPLS-IPv4 template includes all the fields found in the IPv4 and MPLS templates.
• Ingress Interface
1. You configure MPLS sampling on an egress interface on the P router and configure
an MPLS flow aggregation template. The route action is label pop because penultimate
hop popping (PHP) is enabled.
Previously, IPv4 packets (only) would have been sent to the PIC for sampling even
though you configured MPLS sampling. No flows should be created, with the result
that the parser fails.
With the current capability of applying MPLS templates, MPLS flows are created.
2. As in the first case, you configure MPLS sampling on an egress interface on the P router
and configure an MPLS flow aggregation template. The route action is label swap
and the swapped label is 0 (explicit null).
The resulting behavior is that MPLS packets are sent to the PIC. The flow being
sampled corresponds to the label before the swap.
3. You configure a Layer 3 VPN network, in which a customer edge router (CE-1) sends
traffic to a provider edge router (PE-A), through the P router, to a similar provider edge
router (PE-B) and customer edge router (CE-2) on the remote end.
The resulting behavior is that you cannot sample MPLS packets on the PE-A to P router
link.
Verification
To verify the configuration properties, you can use the show services accounting
aggregation template template-name name operational mode command.
All other show services accounting commands also support version 9 templates, except
for show services accounting flow-detail and show services accounting aggregation
aggregation-type. For more information about operational mode commands, see the CLI
Explorer.
services {
flow-monitoring {
version9 {
template ip-template {
flow-active-timeout 20;
flow-inactive-timeout 120;
ipv4-template;
}
template mpls-template-1 {
mpls-template {
label-position [1 3 4];
}
}
template mpls-ipv4-template-1 {
mpls-ipv4-template {
label-position [1 5 7];
}
}
template peer-as-billing-template-1 {
peer-as-billing-template;
}
}
}
}
}
firewall {
family mpls {
filter mpls_sample {
term default {
then {
accept;
sample;
}
}
}
}
}
The following sample configuration applies the MPLS sampling filter on a networking
interface and configures the AS PIC to accept both IPv4 and MPLS traffic:
interfaces {
at-0/1/1 {
unit 0 {
family mpls {
filter {
input mpls_sample;
}
}
}
}
sp-7/0/0 {
unit 0 {
family inet;
family mpls;
}
}
}
The following example applies the MPLS version 9 template to the sampling output and
sends it to the AS PIC:
forwarding-options {
sampling {
input {
family mpls {
rate 1;
}
}
family mpls {
output {
flow-active-timeout 60;
flow-inactive-timeout 30;
flow-server 1.2.3.4 {
port 2055;
version9 {
template mpls-ipv4-template-1;
}
}
interface sp-7/0/0 {
source-address 1.1.1.1;
}
}
}
}
}
The following is a sample firewall filter configuration for the peer AS billing traffic:
firewall {
family inet {
filter peer-as-filter {
term 0 {
from {
destination-class dcu-1;
interface ge-2/1/0;
forwarding-class class-1;
}
then count count_team_0;
}
}
term 1 {
from {
destination-class dcu-2;
interface ge-2/1/0;
forwarding-class class-1;
}
then count count_team_1;
}
term 2 {
from {
destination-class dcu-3;
interface ge-2/1/0;
forwarding-class class-1;
}
then count count_team_2;
}
}
}
}
The following sample configuration applies the peer AS firewall filter as a filter attribute
under the forwarding-options hierarchy for CoS-level data traffic usage information
collection:
forwarding-options {
family inet {
filter output peer-as-filter;
}
}
The following sample configuration applies the peer AS DCU policy options to collect
usage statistics for the traffic stream for as-path ingressing at a specific input interface
with the firewall configuration hierarchy applied as Forwarding Table Filters (FTFs). The
configuration functionality with COS capability can be achieved through FTFs for
destination-class usage with forwarding-class for specific input interfaces:
policy-options {
policy-statement P1 {
from {
protocol bgp;
neighbor 10.2.25.5; #BGP router configuration;
as-path AS-1; #AS path configuration;
}
then destination-class dcu-1; #Destination class configuration;
}
policy-statement P2 {
from {
neighbor 1.2.25.5;
as-path AS-2;
}
then destination-class dcu2;
}
policy-statement P3 {
from {
protocol bgp;
neighbor 192.2.1.1;
as-path AS-3;
}
then destination-class dcu3;
}
as-path AS-1 3131:1111:1123;
as-path AS-2 100000;
as-path AS-3 192:29283:2;
}
The following example applies the peer-as-billing version 9 template to enable sampling
of traffic for billing purposes:
forwarding-options {
sampling {
}
input {
rate 1;
}
family inet {
output {
flow-server 10.209.15.58 {
port 300;
version9 {
template {
peer-as;
}
}
}
interface sp-5/2/0 {
source-address 2.3.4.5;
}
}
}
}
}
family inet {
filter {
output peer-as-filter;
}
}
Use of IPFIX allows you to define a flow record template suitable for IPv4 traffic or IPv6
traffic. Templates are transmitted to the collector periodically, and the collector need
not be aware of the router configuration. You can define template refresh rate, flow active
timeout and inactive timeout.
If flow records are being sent for multiple protocol families (for example, for IPv4 and
IPv6), each protocol family flow will have a unique Observation Domain ID.
• You assign each template a unique name by including the template name statement.
• You then specify each template for the appropriate type of traffic by including the
ipv4-template or ipv6–template.
• Within the template definition, you can optionally include values for the
flow-active-timeout and flow-inactive-timeout statements. These statements have
specific default and range values when they are used in template definitions; the default
is 60 seconds and the range is from 10 through 600 seconds.
• You can also include settings for the option-refresh-rate and template-refresh-rate
statements within a template definition. For both of these properties, you can include
a timer value (in seconds) or a packet count (in number of packets). For the seconds
option, the default value is 600 and the range is from 10 through 600. For the packets
option, the default value is 4800 and the range is from 1 through 480,000.
interfaces interface-name {
unit 0 {
family inet6 {
sampling {
input;
output;
}
}
}
}
Restrictions
The following restrictions apply to IPFIX templates:
• Outbound Routing Engine traffic is not sampled. A firewall filter is applied as output
on the egress interface, which samples packets and exports the data. For transit traffic,
egress sampling works correctly. For internal traffic, the next hop is installed in the
Packet Forwarding Engine but sampled packets are not exported.
• Flows are created only after the route record resynchronization operation is complete,
which takes 120 seconds.
• VLAN ID field is not valid for egress traffic, and returns a value of 0 for egress traffic.
• The VLAN ID field is updated when a new flow record is created and so, any change in
VLAN ID after the record has been created might not be updated in the record.
Customizing Template ID, Observation Domain ID, and Source ID for IPFIX flow Templates
Use of version 9 and IPFIX allows you to define a flow record template suitable for IPv4
traffic, IPv6 traffic, MPLS traffic, a combination of IPv4 and MPLS traffic, or peer AS billing
traffic. Templates and the fields included in the template are transmitted to the collector
periodically, and the collector need not be aware of the router configuration. Starting
with Junos OS Release 14.1, you can specify the unique identifier for the version 9 and
IPFIX templates. The identifier of a template is locally unique within a combination of a
transport session and an observation domain. Template IDs 0 through 255 are reserved
for template sets, options template sets, and other sets for future use. Template IDs of
data sets are numbered from 256 through 65535. Typically, this information element or
field in the template is used to define the characteristics or properties of other information
elements in a template. After a restart of the export process of templates is performed,
template IDs can be reassigned. In Junos OS releases earlier than Release 14.1, template
IDs and options template IDs were predefined for each address family and could not be
modified.
This functionality to configure template ID, options template ID, observation domain ID,
and source ID is supported on all routers with MPCs (Trio chip-based FPCs).
The following values were assigned by default for the template IDs of version 9 templates
for the different protocols or address families, until Junos OS Release 13.3:
The corresponding data sets and option data sets contain the value of the template IDs
and options template IDs respectively in the set ID field. This method enables the collector
to match a data record with a template record.
For more information about specifying the source ID, observation domain ID, template
ID, and options template ID for version 9 and IPFIX flows, see “Configuring Observation
Domain ID and Source ID for Version 9 and IPFIX Flows” on page 106 and “Configuring
Template ID and Options Template ID for Version 9 and IPFIX Flows” on page 109.
• IPv4 TOS
• IPv4 Protocol
• L4 Source Port
• L4 Destination Port
• Input Interface
• VLAN ID
• Source AS
• Destination AS
• TCP Flags
Output Interface
• IPv6 TOS
• IPv6 Protocol
• L4 Source Port
• L4 Destination Port
• Input Interface
• VLAN ID
• Source AS
• Destination AS
• TCP Flags
Output Interface
• Fragment Identification
Verification
The following show commands are supported for IPFIX:
services {
flow-monitoring {
version-ipfix {
template ipv4 {
flow-active-timeout 60;
flow-inactive-timeout 70;
template-refresh-rate seconds 30;
option-refresh-rate seconds 30;
ipv4-template;
}
}
}
}
chassis;
fpc 0 {
sampling-instance s1;
}
The following example applies the IPFIX template to enable sampling of traffic for billing:
forwarding-options {
sampling {
instance {
s1 {
input {
rate 10;
}
family inet {
output {
flow-server 11.11.4.2 {
port 2055;
version-ipfix {
template {
ipv4;
}
}
}
inline-jflow {
source-address 11.11.2.1;
}
}
}
}
}
}
}
Configuring Observation Domain ID and Source ID for Version 9 and IPFIX Flows
If you configure the same Observation Domain ID for different template types, such as
for IPv4 and IPv6, it does not impact flow monitoring because the actual or the base
observation domain ID is transmitted in the flow. The actual observation domain ID is
derived from the value you configure and also in conjunction with other parameters such
as the slot number, lookup chip (LU) instance, Packet Forwarding Engine instance. Such
a method of computation of the observation domain ID ensures that this ID is not the
same for two IPFIX devices.
Until Junos OS Release 13.3, the observation domain ID is predefined and is set to a fixed
value, which is derived from the combination of FPC slot, sampling protocol, PFE Instance
and LU Instance fields. This derivation creates a unique observation domain per LU per
family. Starting with Junos OS Release 14.1, you can configure the observation domain
ID, which causes the first 8 bits of the field to be configured.
• FPC slots are expanded to 8 bits to enable more slots to be configured in an MX Series
Virtual Chassis configuration.
• You can configure a value for the observation domain ID in the range of 0 through 255.
• The Protocol field is increased to 3 bits to provide support for additional protocols in
inline flow monitoring.
• You can associate the observation domain ID with templates by using the
observation-domain-id domain-id statement at the [edit services flow- monitoring
version-ipfix template template-name] hierarchy level.
For version 9 flows, a 32-bit value that identifies the Exporter Observation Domain is
called the source ID. NetFlow collectors use the combination of the source IP address
and the source ID field to separate different export streams originating from the same
exporter.
To specify the observation domain ID for IPFIX flows, include the observation-domain-id
domain-id statement at the [edit services flow-monitoring version-ipfix template
template-name] hierarchy level.
To specify the source ID for version 9 flows, include the source-id source-id statement at
the [edit services flow-monitoring version9 template template-name] hierarchy level.
Table 3 on page 107 describes observation domain ID values for different combinations
of the configured domain ID, protocol family, FPC slot, and the Packet Forwarding Engine
and lookup chip instances.
xxxx xxxx
xxxx 1xxx
Configured Protocol xxxx xxxx
Value Family FPC Slot PFE Inst LU Inst xxxx xxxx
xxxx xxxx
xxxx 1xxx
Configured Protocol xxxx xxxx
Value Family FPC Slot PFE Inst LU Inst xxxx xxxx
xxxx xxxx
xxxx 1xxx
Configured Protocol xxxx xxxx
Value Family FPC Slot PFE Inst LU Inst xxxx xxxx
Related • Configuring Template ID and Options Template ID for Version 9 and IPFIX Flows on
Documentation page 109
Configuring Template ID and Options Template ID for Version 9 and IPFIX Flows
Starting with Junos OS Release 14.1, you can define the template ID for version 9 and
IPFIX templates for inline flow monitoring. To specify the template ID for version 9 flows,
include the template-id id statement at the [edit services flow-monitoring version9
template template-name] hierarchy level.
To specify the template ID for version IPFIX flows, include the template-id statement at
the [edit services flow-monitoring version-ipfix template template-name] hierarchy level.
To specify the options template ID for version 9 flows, include the options-template-id
statement at the [edit services flow-monitoring version9 template template-name]
hierarchy level.
To specify the options template ID for version IPFIX flows, include the options-template-id
statement at the [edit services flow-monitoring version-ipfix template template-name]
hierarchy level. The template ID and options template ID can be a value in the range of
1024 through 65535.
The template ID and options template ID can be a value in the range of 1024 through
65535. If you do not configure values for the template ID and options template ID, default
values are assumed for these IDs, which are different for the various address families. If
you configure the same template ID or options template ID value for different address
families, such a setting is not processed properly and might cause unexpected behavior.
For example, if you configure the same template ID value for both IPv4 and IPv6, the
collector validates the export data based on the template ID value that it last receives.
In this case, if IPv6 is configured after IPv4, the value is effective for IPv6 and the default
value is used for IPv4.
The following are the default values of template IDs for IPFIX flows for the different
protocols or address families, until Junos OS Release 13.3:
The following are the default values of template IDs for version 9 flows for the different
protocols or address families, starting with Junos OS Release 14.1:
The following are the default values of template IDs for IPFIX flows for the different
protocols or address families, until Junos OS Release 13.3:
The following are the default values of template IDs for version 9 flows for the different
protocols or address families, starting with Junos OS Release 14.1:
Table 4 on page 111 describes the values of data template and option template IDs for
different protocols with default and configured values for IPFIX flows.
Table 4: Values of Template and Option Template IDs for IPFIX Flows
Family Configured Value Data Template Option Template
Table 5 on page 111 describes the values of data template and option template IDs for
different protocols with default and configured values for version 0 flows.
Table 5: Values of Template and Option Template IDs for Version 9 Flows
Family Configured Value Data Template Option Template
Table 4 on page 111 describes the values of data template and option template IDs for
different protocols with default and configured values for IPFIX flows.
Table 6: Values of Template and Option Template IDs for IPFIX Flows
Observation
Domain Id
xxxx xxxx
xxxx 1xxx
Configured Protocol xxxx xxxx
Value Family FPC Slot PFE Inst LU Inst xxxx xxxx
xxxx xxxx
xxxx 1xxx
Configured Protocol xxxx xxxx
Value Family FPC Slot PFE Inst LU Inst xxxx xxxx
Related • Configuring Observation Domain ID and Source ID for Version 9 and IPFIX Flows on
Documentation page 106
Starting with Junos OS Release 14.2, the following attributes can be contained in IPFIX
flow templates that are sent to the flow collector:
A flow can receive many fragments in a given interval. For a given set of fragments of a
packet, there is a unique fragment Identification. Hence, multiple such values can be
received in a given interval. RFC 5102 for fragmentIdentification 54 does not clearly
indicate which fragment identification needs to be shipped in the flow record information
(first fragment observed after sending the flow record information or the last observed
before shipping the flow record information). However, the last observed fragment
Identification for a given flow is also transmitted to the flow collector.
Unlike in IPv4, IPv6 routers never fragment IPv6 packets. Packets exceeding the size of
the maximum transmission unit of the destination link are dropped and this condition is
signaled by a Packet Too Big ICMPv6 type 2 message to the originating node, similarly
to the IPv4 method when the Don't Fragment (DF) bit is set.
The fragmentIdentification element is supported for both IPv4 and IPv6 flow templates.
The fragmentIdentification element is added in the record template. The
fragmentIdentification attribute is 16 bits in size for IPv4, and 32 bits in size for IPv6. For
IPv6, this field is present in fragment Extension header and Fragment Identifier is updated
as 0 if there is no Fragment extension header.
Ports are a part of the key used to identify a Flow and the subsequent packets after the
first fragmented packet does not have the port information. For a fragmented packet
that is destined to the router, the packets that are split assume different flows (the first
and the subsequent packets). Also, because the port is denoted as zeroes for fragmented
packets, all the traffic destined to a particular destination from a particular source might
be reported as the same flow, although no association exists between them in terms of
destination ports. Fragment ID is not part of the key. Although the fragement ID attribute
is unique between each source and destination, they might end up as same flows in the
intermediate router.
With ports being used in the key for the flow lookup, the fragmented packets of a stream
are accounted in two different flows. The first fragmented packet, which contains the
port information in its packet, is part of one flow. Subsequent packets after the first
fragments, which do not contain the port information, are accounted under a different
flow. Because the second flow does not contain the port information to identify itself, it
consolidates all the other traffic streams with same source IP and destination IP address
prefixes (also includes the non-first fragmented packets sent on different ports).
Destination nodes or endpoints in IPv6 are expected to perform path MTU discovery to
determine the maximum size of packets to send, and the upper-layer protocol is expected
to limit the payload size. However, if the upper-layer protocol is unable to do so, the
sending host may use the Fragment extension header in order to perform end-to-end
fragmentation of IPv6 packets. Any data link layer conveying IPv6 data must be capable
of delivering an IP packet containing 1280 bytes without the need to invoke end-to-end
fragmentation at the IP layer.
The ipv6ExtensionHeaders information element is a set for 32 bit fields. Each bit in this
set represents one IPv6 Extension header. An extension header bit is set if that particular
extension header is observed for the flow. The bit is set to 1 if any observed packet of this
Flow contains the corresponding IPv6 extension header. Otherwise, if no observed packet
of this Flow contained the respective IPv6 extension header, the value of the corresponding
bit is 0. The ipv6ExtensionHeaders element is added in the record template. The number
of flows that are created depends on the number of IPv6 packets that include the IPv6
extender header attribute.
To enable the inclusion of element ID, 54, fragmentIdentification and element ID, 64,
ipv6ExtensionHeaders in IPFIX flow templates that are exported to the flow collector,
include the ipv6-extended-attrib statement at the [edit chassis fpc slot-number inline-
services flow-table-size] hierarchy level. Collection of IP4 fragmentation IDs occurs
automatically without having to configure this setting explicitly.
[edit chassis]
fpc slot-number {
inline-services {
flow-table-size {
ipv6-extended-attrib;
}
}
}
Table 7 on page 115 describes the values of the IPv6 options and their functions that are
contained in IPv6 packets.
2 RH 43 Routing Header
9 AH 51 Authentication header
Related • Configuring Flow Aggregation to Use IPFIX Flow Templates on page 101
Documentation
• ipv6-extended-attrib on page 312
You can configure replication of the sampled flow records for use by multiple flow servers.
You can use either sampling based on the Routing Engine, using cflowd version 5 or
version 8, or sampling based on the services PIC, using flow aggregation version 9, as
described in the following sections:
When you configure cflowd-based sampling, the export packets are replicated to all flow
servers configured to receive them. If two servers are configured to receive v5 records,
both the servers will receive records for a specified flow.
The following configuration example allows replication of export packets to two flow
servers.
forwarding-options {
sampling {
instance inst1 {
input {
rate 1;
}
family inet;
output {
flow-server 10.10.3.2 {
port 2055;
version 5;
source-address 192.168.164.119;
}
flow-server 172.17.20.62 {
port 2055;
version 5;
source-address 192.168.164.119;
}
}
}
}
}
}
This also implies that periodic updates required by version 9 (RFC 3954) are sent to each
configured collector. The following updates are sent periodically as part of this
requirement:
• Options data
• Template definition
The refresh period for options data and template definition is configured on a per-template
basis at the [edit services flow-monitoring] hierarchy level.
forwarding-options {
sampling {
instance inst1 {
input {
rate 1;
}
family inet;
output {
flow-server 10.10.3.2 {
port 2055;
version9 {
template {
ipv4;
}
}
}
flow-server 172.17.20.62 {
port 2055;
version9 {
template {
ipv4;
}
}
}
}
flow-inactive-timeout 30;
flow-active-timeout 60;
interface sp-4/0/0 {
source-address 10.10.3.4;
}
}
}
}
}
To collect the cflowd flows in a log file before they are exported, include the local-dump
statement at the [edit forwarding-options sampling output flow-server hostname] hierarchy
level:
By default, the flows are collected in /var/log/sampled; to change the filename, include
the filename statement at the [edit forwarding-options sampling traceoptions] hierarchy
level. For more information about changing the filename, see “Configuring Traffic Sampling
Output” on page 63.
NOTE: Because the local-dump statement adds extra overhead, you should
use it only while debugging cflowd problems, not during normal operation.
The following is an example of the flow information. The AS number exported is the
origin AS number. All flows that belong under a cflowd header are dumped, followed by
the header itself:
Jun 27 18:35:43 v5 flow entry
Jun 27 18:35:43 Src addr: 192.53.127.1
Jun 27 18:35:43 Dst addr: 192.6.255.15
Jun 27 18:35:43 Nhop addr: 192.6.255.240
Jun 27 18:35:43 Input interface: 5
Jun 27 18:35:43 Output interface: 3
Jun 27 18:35:43 Pkts in flow: 15
Jun 27 18:35:43 Bytes in flow: 600
Jun 27 18:35:43 Start time of flow: 7230
Jun 27 18:35:43 End time of flow: 7271
Jun 27 18:35:43 Src port: 26629
Jun 27 18:35:43 Dst port: 179
Jun 27 18:35:43 TCP flags: 0x10
Jun 27 18:35:43 IP proto num: 6
Jun 27 18:35:43 TOS: 0xc0
Jun 27 18:35:43 Src AS: 7018
Jun 27 18:35:43 Dst AS: 11111
Jun 27 18:35:43 Src netmask len: 16
Jun 27 18:35:43 Dst netmask len: 0
Port mirroring is different from traffic sampling. In traffic sampling, a sampling key based
on the IPv4 header is sent to the Routing Engine. There, the key can be placed in a file,
or cflowd packets based on the key can be sent to a cflowd server. In port mirroring, the
entire packet is copied and sent out through a next-hop interface.
You can configure simultaneous use of sampling and port mirroring, and set an
independent sampling rate and run-length for port-mirrored packets. However, if a packet
is selected for both sampling and port mirroring, only one action can be performed and
port mirroring takes precedence. For example, if you configure an interface to sample
every packet input to the interface and a filter also selects the packet to be port mirrored
to another interface, only the port mirroring would take effect. All other packets not
matching the explicit filter port-mirroring criteria continue to be sampled when forwarded
to their final destination.
To prepare traffic for port mirroring, include the filter statement at the [edit firewall family
inet] hierarchy level:
filter filter-name;
This filter at the [edit firewall family (inet | inet6)] hierarchy level selects traffic to be
port-mirrored:
filter filter-name {
term term-name {
then {
port-mirror;
accept;
}
}
}
or
Specify the port-mirroring destination by including the next-hop statement at the [edit
forwarding-options port-mirroring output interface interface-name] hierarchy level:
next-hop address;
NOTE: For IPv4 port mirroring to reach a next-hop destination, you must
manually include a static Address Resolution Protocol (ARP) entry in the
router configuration.
You can also specify the port-mirroring destination by including the next-hop-group
statement at the [edit forwarding-options port-mirroring family inet6 output] hierarchy
level:
next-hop-group group-name{
group-type inet6;
interface interface-name {
next-hop ipv6-address;
}
next-hop-subgroup group-name{
interface interface-name {
next-hop ipv6-address;
}
}
}
The no-filter-check statement is required when you send port-mirrored traffic to a Tunnel
PIC that has a filter applied to it. en
The interface used to send the packets to the analyzer is the output interface configured
above at the [edit forwarding-options port-mirroring family (inet | inet6) output] hierarchy
level. You can use any physical interface type, including generic routing encapsulation
(GRE) tunnel interfaces. The next-hop address specifies the destination address; this
statement is mandatory for non point-to-point interfaces, such as Ethernet interfaces.
To configure the sampling rate or duration, include the rate or run-length statement at
the [edit forwarding-options port-mirroring input] hierarchy level.
You can trace port-mirroring operations the same way you trace sampling operations.
For more information, see “Tracing Traffic Sampling Operations” on page 65.
For more information about port mirroring, see the following sections:
Configuring Tunnels
In typical applications, you send the sampled packets to an analyzer or a workstation for
analysis, rather than another router. If you must send this traffic over a network, you
should use tunnels. For more information about tunnel interfaces, see Tunnel Properties.
If your router is equipped with a Tunnel PIC, you can forward duplicate packets to multiple
interfaces by configuring a next-hop group. To configure a next-hop group, include the
next-hop-group statement at the [edit forwarding-options] hierarchy level:
[edit forwarding-options]
next-hop-group group-names {
interface interface-name {
next-hop address;
}
}
The interface statement specifies the interface that sends out sampled information. The
next-hop statement specifies the next-hop addresses to which to send the sampled
information.
For IPv6 port mirroring to reach next-hop destination, you can configure a next-hop-group
statement at the [edit forwarding-options port-mirroring family inet6 output] hierarchy
level:
next-hop-group group-name{
group-type inet6;
interface interface-name {
next-hop ipv6-address;
}
next-hop-subgroup group-name{
interface interface-name {
next-hop ipv6-address;
}
}
}
• Next-hop groups are supported for inet, inet6, and bridge family.
NOTE: On MX Series routers with MPCs, port mirroring instances can only
be bound to the FPC level and not up to the PIC level. For MX series routers
with a DPC card, both levels are supported.
On M Series, MX Series, and T Series routers only, you can configure port mirroring using
next-hop groups, also known as multipacket port mirroring, without the presence of a
Tunnel PIC. To configure this functionality, include the next-hop-group statement at the
[edit forwarding-options port-mirror family [inet | inet6] output] or [edit forwarding-options
port-mirror instance instance-name family inet output] hierarchy level:
[edit forwarding-options]
port-mirror {
family inet {
output {
next-hop-group group-name {
interface interface-name {
next-hop address;
}
}
}
}
}
or
[edit forwarding-options]
port-mirror {
family inet6 {
output {
next-hop-group group-name{
group-type inet6;
interface interface-name {
next-hop ipv6-address;
}
next-hop-subgroup group-name{
interface interface-name {
next-hop ipv6-address;
}
}
}
}
}
}
or
[edit forwarding-options]
port-mirror {
instance instance-name {
family (inet | vpls) {
output {
next-hop-group group-name;
}
}
}
}
You define the next-hop group by including the next-hop-group statement at the [edit
forwarding-options] hierarchy level. For an example, see “Examples: Configuring Port
Mirroring” on page 129. This configuration is supported with IPv4 and IPv6 addresses.
NOTE: If you try to bind any derived instance to the FPC, a commit error will
occur.
Using inline port mirroring, a port-mirror instance will have an option to inherit input
parameters from another instance that specifies it, as shown in the following CLI
configuration example:
instance pm2 {
+ input-parameters-instance pm1;
family inet {
output {
interface ge-1/2/3.0 {
next-hop 50.0.0.3;
}
}
}
}
Multiple levels of inheritance are not allowed. One instance can be referred by multiple
instances. An instance can refer to another instance that is defined before it. Forward
references are not allowed and an instance cannot refer to itself, doing so will cause an
error during configuration parsing.
The user can specify an instance that is not bound to the FPC in the firewall filter. The
specified filter should inherit one of the two instances that have been bound to the FPC.
If it does not, the packet is not marked for port-mirroring. If it does, then the packet will
be sampled using the input parameters specified by the referred instance but the copy
will be sent to the its own destination.
When an FBF filter is installed as an output filter, a packet that is forwarded to the filter
has already undergone at least one route lookup. After the packet is classified at the
egress interface by the FBF filter, it is redirected to another routing table for additional
route lookup. Obviously, the route lookup in the latter routing table (designated by an
FBF routing instance) must result in a different next hop from those from the previous
tables the packet has passed through, to avoid packet looping inside the Packet
Forwarding Engine.
For more information about FBF configuration, see the Junos OS Routing Protocols Library
for Routing Devices. For an example of FBF applied to an output interface, see “Examples:
Configuring Port Mirroring” on page 129.
Restrictions
The following restrictions apply to port-mirroring configurations:
• The interface you configure for port mirroring should not participate in any kind of
routing activity.
• The destination address you specify should not have a route to the ultimate traffic
destination. For example, if the sampled IPv4 packets have a destination address of
10.68.9.10 and the port-mirrored traffic is sent to 10.68.20.15 for analysis, the device
associated with the latter address should not know a route to 10.68.9.10. Also, it should
not send the sampled packets back to the source address.
• IPv4 and IPv6 traffic is supported. For IPv6 port mirroring, you must configure the
next-hop router with an IPv6 neighbor before mirroring the traffic, similar to an ARP
request for IPv4 traffic. All the restrictions applied to IPv4 configurations should also
apply to IPv6.
• Because M320 routers do not support multiple bindings of port-mirror instances per
FPC, the port-mirror-instance action is not supported in firewall filters for these routers.
• Port mirroring in the ingress and egress direction is not supported for link services IQ
(lsq-) interfaces.
• On M Series routers other than the M120 and M320 routers, only one family protocol
(either IPv4 or IPv6) is supported at a time.
• You do not need to configure firewall filters on both inbound and outbound interfaces,
but at least one is necessary on the inbound interface to provide the copies of the
packets to send to an analyzer.
• Configuration for both port mirroring and traffic sampling are handled by the same
daemon, so in order to view a trace log file for port mirroring, you must configure the
traceoptions option under traffic sampling.
[edit forwarding-options]
port-mirroring {
input {
rate 1;
}
family inet {
output {
interface sp-1/0/0.0;
}
}
}
Since any traffic directed to unit 0 on a services interface is targeted for monitoring
(cflowd packets are generated for it), the sample port-mirroring configuration indicates
that the customer would like to have cflowd records generated for the port-mirrored
traffic.
[edit forwarding-options]
sampling {
instance instance1 { # named instances of sampling parameters
input {
rate 1;
}
family inet {
output {
flow-server 172.16.28.65 {
port 1230;
}
interface sp-1/0/0 { # If the port-mirrored traffic requires monitoring, this
# interface must be same as that specified in the
# port-mirroring configuration.
source-address 3.1.2.3;
}
}
}
}
}
[edit interfaces]
ge-1/0/0 { # This is the input interface where packets enter the router.
unit 0 {
family inet {
filter {
input mirror_pkts; # Here is where you apply the first filter.
}
address 10.11.0.1/24;
}
}
}
ge-1/1/0 { # This is an exit interface for HTTP packets.
unit 0 {
family inet {
address 10.12.0.1/24;
}
}
}
ge-1/2/0 { # This is an exit interface for HTTP packets.
unit 0 {
family inet {
address 10.13.0.1/24;
}
}
}
so-0/3/0 { # This is an exit interface for FTP packets.
unit 0 {
family inet {
address 10.1.1.1/30;
}
}
}
so-4/3/0 { # This is an exit interface for FTP packets.
unit 0 {
family inet {
address 10.2.2.2/30;
}
}
}
so-7/0/0 { # This is an exit interface for all remaining packets.
unit 0 {
family inet {
address 10.5.5.5/30;
}
}
}
so-7/0/1 { # This is an exit interface for all remaining packets.
unit 0 {
family inet {
address 10.6.6.6/30;
}
}
}
vt-3/3/0 { # The tunnel interface is where you send the port mirrored traffic.
unit 0 {
family inet;
}
unit 1 {
family inet {
filter {
input collect_pkts; # This is where you apply the second firewall filter.
}
}
}
}
[edit forwarding-options]
port-mirroring { # This is required when you configure next-hop groups.
input {
rate 1; # This rate port mirrors one packet for every one received (1:1 = all
# packets).
}
family inet {
output { # This sends traffic to a tunnel interface to prepare for multiport mirroring.
interface vt-3/3/0.1;
no-filter-check;
}
}
}
next-hop-group ftp-traffic { # Point-to-point interfaces require you to specify the interface
# name only.
interface so-4/3/0.0;
interface so-0/3/0.0;
}
next-hop-group http-traffic { # You need to configure a next hop for multipoint interfaces
# (Ethernet).
interface ge-1/1/0.0 {
next-hop 10.12.0.2;
}
interface ge-1/2/0.0 {
next-hop 10.13.0.2;
}
}
next-hop-group default-collect {
interface so-7/0/0.0;
interface so-7/0/1.0;
}
[edit firewall]
family inet {
filter mirror_pkts { # Apply this filter to the input interface.
term catch_all {
then {
count input_mirror_pkts;
port-mirror; # This action sends traffic to be copied and port mirrored.
accept;
}
}
}
filter collect_pkts { # Apply this filter to the tunnel interface.
term ftp-term { # This term sends FTP traffic to an FTP next-hop group.
from {
protocol ftp;
}
then next-hop-group ftp-traffic;
}
term http-term {# This term sends HTTP traffic to an HTTP next-hop group.
from {
protocol http;
}
then next-hop-group http-traffic;
}
term default {# This term sends all remaining traffic to a final next-hop group.
then next-hop-group default-collectors;
}
}
}
2. The route lookup in routing table inet.0 points to the egress interface so-0/0/3.0.
3. The output filter installed at so-0/0/3.0 redirects the packet to routing table fbf.inet.0.
4. The packet matches the entry 10.50.100.0/25, and finally leaves the router from
interface so-2/0/0.0.
[edit interfaces]
so-0/0/3 {
unit 0 {
family inet {
filter {
output fbf;
}
address 10.50.10.2/25;
}
}
}
fe-1/2/0 {
unit 0 {
family inet {
address 10.50.50.2/25;
}
}
}
so-2/0/0 {
unit 0 {
family inet {
address 10.50.20.2/25;
}
}
}
[edit firewall]
filter fbf {
term 0 {
from {
source-address {
10.50.200.0/25;
}
}
then routing-instance fbf;
}
term d {
then count d;
}
}
[edit routing-instances]
fbf {
instance-type forwarding;
routing-options {
static {
route 10.50.100.0/25 next-hop so-2/0/0.0;
}
}
}
[edit routing-options]
interface-routes {
rib-group inet fbf-group;
}
static {
route 10.50.100.0/25 next-hop 10.50.10.1;
}
rib-groups {
fbf-group {
import-rib [ inet.0 fbf.inet.0 ];
}
}
The following example shows configuration of port mirroring using next-hop groups or
multipacket port mirroring:
forwarding-options {
next-hop-group inet_nhg {
group-type inet;
interface ge-2/0/2.101 {
next-hop 10.2.0.2;
}
interface ge-2/2/8.2 {
next-hop 10.8.0.2;
}
}
next-hop-group vpls_nhg {
group-type layer-2;
interface ge-2/0/1.100;
interface ge-2/2/9.0;
inactive: next-hop-subgroup vpls_subg {
interface ge-2/0/1.101;
interface ge-2/2/9.1;
}
}
next-hop-group vpls_nhg_2 {
group-type layer-2;
interface ge-2/2/1.100;
interface ge-2/3/9.0;
}
port-mirror {
disable-all-instances; /* Disable all port-mirroring instances */
disable; /* Disable the global instance */
input {
rate 10; # start mirroring every 10th packet
run-length 4; # mirror 4 additional packets
}
family inet {
output {
next-hop-group inet_nhg;
}
}
family inet6 {
output {
next-hop-group inet6_nhg6 {
group-type inet6;
interface ge-2/0/3.102 {
next-hop 10::1:1:10;
}
interface ge-2/0/4.103 {
next-hop 20::1:1:10;
}
next-hop-subgroup vpls_subg {
interface ge-2/0/.101 {
next-hop 3::1:1:1;
}
interface ge-2/2/9.1 {
next-hop 4::1:1:1;
}
}
}
}
}
family vpls {
output {
next-hop-group vpls_nhg;
}
}
instance {
inst1 {
disable; /* Disable this instance */
input {
rate 1;
maximum-packet-length 200;
}
family inet {
output {
next-hop-group inet_nhg;
}
}
family inet6 {
output {
next-hop-group inet6_nhg6;
}
}
family vpls {
output {
next-hop-group vpls_nhg_2;
}
}
}
}
}
}
The following example shows configuration of port mirroring using next-hop groups or
multipacket port mirroring on a T Series router:
forwarding-options {
next-hop-group inet_nhg {
group-type inet;
interface so-0/0/0.0; # There is no need for the nexthop address on T Series routers
interface ge-2/0/2/.0 {
next-hop 1.2.3.4
}
next-hop-subgroup sub_inet {
interface so-1/2/0.0;
interface ge-6/1/2.0 {
next-hop 6.7.8.9;
}
}
next-hop-group vpls_nhg_2 {
group-type layer-2;
interface ge-2/2/1.100;
interface ge-2/3/9.0;
}
}
port-mirroring {
disable-all-instances; /*Disable all port-mirroring instances */
disable; /* Disable the global instance */
input {
rate 10;
run-length 4;
}
family inet {
output {
next-hop-group inet_nhg;
}
}
family vpls {
output {
next-hop-group vpls_nhg;
}
}
instance {
inst1 {
disable; /* Disable this instance */
input {
rate 1;
maximum-packet-length 200;
}
family inet {
output {
next-hop-group inet_nhg;
}
}
family vpls {
output {
next-hop-group vpls_nhg_2;
}
}
}
}
}
The following example shows configuration of inline port mirroring using PM1, PM2, and
PM3 as our port mirror instances.
instance {
pm1 {
input {
rate 3;
}
family inet {
output {
interface ge-1/2/2.0 {
next-hop 40.0.0.2;
}
}
}
}
pm2 {
input-parameters-instance pm1;
family inet {
output {
interface ge-1/2/3.0 {
next-hop 50.0.0.3;
}
}
}
}
pm3 {
input {
rate 3;
}
family inet6 {
output {
interface ge-1/2/3.0 {
next-hop 5::5:5:1;
}
}
}
}
firewall {
filter pm_filter {
term t1 {
then port-mirror-instance pm2;
}
}
filter nhg6_filter6 {
term t6 {
then next-hop-group inet6-nhg6;
}
}
}
chassis {
fpc 1 {
port-mirror-instance pm1;
}
The packets will be sampled at a rate of 3, and the copy is sent to 50.0.0.3.
Port mirroring is different from traffic sampling. In traffic sampling, a sampling key based
on the IPv4 header is sent to the Routing Engine. There, the key can be placed in a file,
or cflowd packets based on the key can be sent to a cflowd server. In port mirroring, the
entire packet is copied and sent out through a next-hop interface.
You can configure simultaneous use of sampling and port mirroring, and set an
independent sampling rate and run-length for port-mirrored packets. However, if a packet
is selected for both sampling and port mirroring, only one action can be performed, and
port mirroring takes precedence. For example, if you configure an interface to sample
every packet input to the interface and a filter also selects the packet to be port mirrored
to another interface, only the port mirroring would take effect. All other packets not
matching the explicit filter port-mirroring criteria continue to be sampled when forwarded
to their final destination.
On MX Series routers, you can mirror tunnel interface input traffic to multiple destinations.
To this form of multipacket port mirroring, you specify two or more additional destinations
in a next-hop group, define a firewall filter that references the next-hop group as the filter
action, and then apply the filter to a logical tunnel interface (lt-) or virtual tunnel interface
(vt-) on the MX Series router.
[edit]
user@host set forwarding-options port-mirroring family (inet | inet6) output
or
The MX Series router supports up to 30 next-hop groups. Each next-hop group supports
up to 16 next-hop addresses. Each next-hop group must specify at least two addresses.
The next-hop-address can be an IPv4 or IPv6 address.
...
next-hop-group next-hop-group-name {
group-type inet6;
interface logical-interface-name-1;
interface interface-name{
next-hop next-hop-address;
}
next-hop-subgroup subgroup-name{
interface interface-name{
next-hop next-hop-address;
}
}
}
...
• Junos OS Firewall Filters and Traffic Policers Library for Routing Devices
When you need to analyze traffic containing more than one packet type, or you wish to
perform multiple types of analysis on a single type of traffic, you can implement multiple
port mirroring and next-hop groups. You can make up to 16 copies of traffic per group
and send the traffic to next-hop group members. A maximum of 30 groups can be
configured on a router at any given time. The port-mirrored traffic can be sent to any
interface, except aggregated SONET/SDH, aggregated Ethernet, loopback (lo0), or
administrative (fxp0) interfaces. To send port-mirrored traffic to multiple flow servers
or packet analyzers, you can use the next-hop-group statement at the [edit
forwarding-options] hierarchy level.
.2
10.12.1.x 10.13.1.x
Active monitoring station
ge-1/1/0 .1 ge-1/2/0
(J Series, M Series, or T Series router)
so-0/3/0 Packet
10.1.1.x analyzer #2
ge-1/0/0
1 Port VT .1 .2
10.11.1.1 Mirroring cflowd
10.2.2.x
server #2
so-4/3/0
so-7/0/0 .1 so-7/0/1
10.5.5.x 10.6.6.x
.2
Packet cflowd
analyzer #3 server #3
g015505
FT P traffic: sent to packet analyzer #2 and cflowd server #2
Other traffic: sent to packet analyzer #3 and cflowd server #3
Figure 6 on page 139 shows an example of how to configure multiple port mirroring with
next-hop groups. All traffic enters the monitoring router at interface ge-1/0/0. A firewall
filter counts and port-mirrors all incoming packets to a Tunnel Services PIC. A second
filter is applied to the tunnel interface and splits the traffic into three categories: HTTP
traffic, FTP traffic, and all other traffic. The three types of traffic are assigned to three
separate next-hop groups. Each next-hop group contains a unique pair of exit interfaces
that lead to different groups of packet analyzers and flow servers.
[edit]
interfaces {
ge-1/0/0 { # This is the input interface where packets enter the router.
unit 0 {
family inet {
filter {
input mirror_pkts; # Here is where you apply the first filter.
}
address 10.11.1.1/24;
}
}
}
ge-1/1/0 { # This is an exit interface for HTTP packets.
unit 0 {
family inet {
address 10.12.1.1/24;
}
}
}
ge-1/2/0 { # This is an exit interface for HTTP packets.
unit 0 {
family inet {
address 10.13.1.1/24;
}
}
}
so-0/3/0 { # This is an exit interface for FTP packets.
unit 0 {
family inet {
address 10.1.1.1/30;
}
}
}
so-4/3/0 { # This is an exit interface for FTP packets.
unit 0 {
family inet {
address 10.2.2.1/30;
}
}
}
so-7/0/0 { # This is an exit interface for all remaining packets.
unit 0 {
family inet {
address 10.5.5.1/30;
}
}
}
so-7/0/1 { # This is an exit interface for all remaining packets.
unit 0 {
family inet {
address 10.6.6.1/30;
}
}
}
vt-3/3/0 { # The tunnel interface is where you send the port-mirrored traffic.
unit 0 {
family inet;
}
unit 1 {
family inet {
filter {
input collect_pkts; # This is where you apply the second firewall filter.
}
}
}
}
}
forwarding-options {
port-mirroring { # This is required when you configure next-hop groups.
family inet {
input {
rate 1; # This port-mirrors all packets (one copy for every packet received).
}
output { # Sends traffic to a tunnel interface to enable multiport mirroring.
interface vt-3/3/0.1;
no-filter-check;
}
}
}
next-hop-group ftp-traffic { # Point-to-point interfaces require you to specify the
interface so-4/3/0.0; # interface name.
interface so-0/3/0.0;
}
next-hop-group http-traffic { # Configure a next hop for all multipoint interfaces.
interface ge-1/1/0.0 {
next-hop 10.12.1.2;
}
interface ge-1/2/0.0 {
next-hop 10.13.1.2;
}
}
next-hop-group default-collect {
interface so-7/0/0.0;
interface so-7/0/1.0;
}
}
firewall {
family inet {
filter mirror_pkts { # Apply this filter to the input interface.
term catch_all {
then {
count input_mirror_pkts;
port-mirror; # This action sends traffic to be copied and port-mirrored.
}
}
}
filter collect_pkts { # Apply this filter to the tunnel interface.
term ftp-term { # This term sends FTP traffic to an FTP next-hop group.
from {
protocol ftp;
}
then next-hop-group ftp-traffic;
}
term http-term { # This term sends HTTP traffic to an HTTP next-hop group.
from {
protocol http;
}
then next-hop-group http-traffic;
}
term default { # This sends all remaining traffic to a final next-hop group.
then next-hop-group default-collectors;
}
}
}
}
You can also configure RPM services to determine automatically whether a path exists
between a host router and its configured BGP neighbors. You can view the results of the
discovery using an SNMP client. Results are stored in pingResultsTable,
jnxPingResultsTable, jnxPingProbeHistoryTable, and pingProbeHistoryTable.
Probe configuration and probe results are supported by the command-line interface
(CLI) and SNMP.
• ICMP echo
• ICMP timestamp
• UDP echo
• TCP connection
• UDP timestamp
• Jitter of the round-trip time—The difference between the minimum and maximum
round-trip time
• Minimum, maximum, standard deviation, and jitter measurements for egress and
ingress times
• Round-trip time
• Ingress/egress delay
• Standard deviation
• Jitter
Support is also implemented for user-configured CoS classifiers and for prioritization of
RPM packets over regular data packets received on an input interface.
The owner name and test name identifiers of an RPM probe together represent a single
RPM configuration instance. When you specify the test name, you also can configure the
test parameters.
To configure the probe owner, test name, and test parameters, include the probe
statement at the [edit services rpm] hierarchy level:
probe owner {
test test-name {
data-fill data;
data-size size;
destination-interface interface-name;
destination-port port;
dscp-code-point dscp-bits;
hardware-timestamp;
history-size size;
moving-average-size number;
one-way-hardware-timestamp;
probe-count count;
probe-interval seconds;
probe-type type;
routing-instance instance-name;
source-address address;
target (url url | address address);
test-interval interval;
thresholds thresholds;
traps traps;
}
}
Keep the following points in mind when you configure RPM clients and RPM servers:
• You cannot configure an RPM client that is PIC-based and an RPM server that is based
on either the Packet Forwarding Engine or Routing Engine to receive the RPM probes.
• You cannot configure an RPM client that is Packet Forwarding Engine-based and an
RPM server that receives the RPM probes to be on the PIC or Routing Engine.
• The RPM client and RPM server must be located on the same type of module. For
example, if the RPM client is PIC-based, the RPM server must also be PIC-based, and
if the RPM server is Packet Forwarding Engine-based, the RPM client must also be
Packet Forwarding Engine-based.
• To specify a probe owner, include the probe statement at the [edit services rpm]
hierarchy level. The probe owner identifier can be up to 32 characters in length.
• To specify a test name, include the test statement at the [edit services rpm probe
owner] hierarchy level. The test name identifier can be up to 32 characters in length. A
test represents the range of probes over which the standard deviation, average, and
jitter are calculated.
• To specify the contents of the data portion of Internet Control Message Protocol (ICMP)
probes, include the data-fill statement at the [edit services rpm probe owner] hierarchy
level. The value can be a hexadecimal value. The data-fill statement is not valid with
the http-get or http-metadata-get probe types.
• To specify the size of the data portion of ICMP probes, include the data-size statement
at the [edit services rpm probe owner] hierarchy level. The size can be from 0 through
65400 and the default size is 0. The data-size statement is not valid with the http-get
or http-metadata-get probe types.
• The data-size default value is 32 bytes and 32 is the minimum value for
explicit configuration. The UDP timestamp probe type is an exception;
it requires a minimum data size of 44 bytes.
• The data-size must be at least 100 bytes smaller than the default MTU
of the interface of the RPM client interface.
• To specify the User Datagram Protocol (UDP) port or Transmission Control Protocol
(TCP) port to which the probe is sent, include the destination-port statement at the
[edit services rpm probe owner test test-name] hierarchy level. The destination-port
statement is used only for the UDP and TCP probe types. The value can be 7 or from
49160 through 65535.
• To specify the value of the Differentiated Services (DiffServ) field within the IP header,
include the dscp-code-point statement at the [edit services rpm probe owner test
test-name] hierarchy level. The DiffServ code point (DSCP) bits value can be set to a
valid 6-bit pattern; for example, 001111. It also can be set using an alias configured at
• To specify the number of stored history entries, include the history-size statement at
the [edit services rpm probe owner test test-name] hierarchy level. Specify a value from
0 to 512. The default is 50.
• To specify the number of probes within a test, include the probe-count statement at
the [edit services rpm probe owner test test-name] hierarchy level. Specify a value from
1 through 15.
• To specify the time to wait between sending packets, include the probe-interval
statement at the [edit services rpm probe owner test test-name] hierarchy level. Specify
a value from 1 through 255 seconds.
• To specify the packet and protocol contents of the probe, include the probe-type
statement at the [edit services rpm probe owner test test-name] hierarchy level. The
following probe types are supported:
The following probe types support hardware timestamping of probe packets: icmp-ping,
icmp-ping-timestamp, udp-ping, udp-ping-timestamp.
• To specify the routing instance used by ICMP probes, include the routing-instance
statement at the [edit services rpm probe owner test test-name] hierarchy level. The
default routing instance is Internet routing table inet.0.
• To specify the source IP address used for ICMP probes, include the source-address
statement at the [edit services rpm probe owner test test-name] hierarchy level. If the
source IP address is not one of the router’s assigned addresses, the packet will use the
outgoing interface’s address as its source.
• To specify the destination address used for the probes, include the target statement
at the [edit services rpm probe owner test test-name] hierarchy level.
• For HTTP probe types, specify a fully formed URL that includes http:// in the URL
address.
• For all other probe types, specify an IP version 4 (IPv4) address for the target host.
• To specify the time to wait between tests, include the test-interval statement at the
[edit services rpm probe owner test test-name] hierarchy level. Specify a value from 0
through 86400 seconds.
• To specify thresholds used for the probes, include the thresholds statement at the
[edit services rpm probe owner test test-name] hierarchy level. A system log message
is generated when the configured threshold is exceeded. Likewise, an SNMP trap (if
configured) is generated when a threshold is exceeded. The following options are
supported:
• total-loss—Measures total probe loss count indicating test failure, from 0 through
15.
• Traps are sent if the configured threshold is met or exceeded. To set the trap bit to
generate traps, include the traps statement at the [edit services rpm probe owner test
test-name] hierarchy level. The following options are supported:
• test-failure—Generates traps when the total probe loss threshold is met or exceeded.
The RPM TCP and UDP probes are proprietary to Juniper Networks and require a receiver
to receive the probes. To configure a server to receive the probes, include the probe-server
statement at the [edit services rpm] hierarchy level:
The port number specified for the UDP and TCP server can be 7 or from 49160 through
65535.
To configure the maximum number of concurrent probes allowed, include the probe-limit
statement at the [edit services rpm] hierarchy level:
probe-limit limit;
Specify a limit from 1 through 500. The default maximum number is 100.
To account for latency in the communication of probe messages, you can enable
timestamping of the probe packets. You can timestamp the following RPM probe types:
icmp-ping, icmp-ping-timestamp, udp-ping, and udp-ping-timestamp.
On M Series and T Series routers with an Adaptive Services (AS) or Multiservices PIC,
and MX Series routers with a Multiservices DPC, and on EX Series switches, you can
enable hardware timestamping of RPM probe messages. The timestamp is applied on
both the RPM client router (the router or switch that originates the RPM probes) and the
RPM probe server and applies only to IPv4 traffic. It is supported on the following:
• Layer 2, Layer 3, SDK Services, and PFE RPM timestamping interoperate with each
other. Here, the RPM client can be on the Layer 3 sp- interface and the RPM server can
be on an SDK Services package.
destination-interface sp-fpc/pic/port.logical-unit
destination-interface ms-fpc/pic/port.logical-unit
Specify the RPM client router and the RPM server router on the adaptive services logical
interface or the multiservices interface by including the rpm statement at the [edit
interfaces interface-name unit logical-unit-number] hierarchy level:
The logical interface must be dedicated to the RPM task. It requires configuration of the
family inet statement and a /32 address, as shown in the example. This configuration is
also needed for other services such as NAT and stateful firewall. You cannot configure
RPM service on unit 0 because RPM requires a dedicated logical interface; the same unit
cannot support both RPM and other services. Because active flow monitoring requires
unit 0, but RPM can function on any logical interface, a constraint check prevents you
from committing an RPM configuration there.
On MX Series routers, on M-320 routers using the Enhanced Queuing MPC, and on EX
Series switches, you include the hardware-timestamp statement at the [edit services rpm
probe probe-name test test-name] hierarchy level to specify that the probes are to be
timestamped in the Packet Forwarding Engine host processor:
hardware-timestamp;
On the client side, these probes are timestamped in the Packet Forwarding Engine host
processor on the egress DPC on the MX or M-320 Series router or EX Series switch
originating the RPM probes (RPM client). On the responder side (RPM server), the RPM
probes to be timestamped are handled by the Packet Forwarding Engine host processor,
which generates the response instead of the RPM process. The RPM probes are
timestamped only on the router that originates them (RPM client). As a result, only
round-trip time is measured for these probes.
When using the hardware-timestamp, the data-size value for the probe must be at least
100 bytes smaller than the default MTU of the interface of the RPM client interface (see
“Configuring RPM Probes” on page 147). If hardware timestamping of RPM probe messages
is enabled, the maximum data size that you can configure by using the data-size statement
is limited to 1400.
NOTE: The Packet Forwarding Engine-based RPM feature does not support
any stateful firewall configurations. If you need to combine RPM timestamping
with a stateful firewall, you should use the interface-based RPM timestamping
service described earlier in this section. Multiservices DPCs support stateful
firewall processing as well as RPM timestamping.
one-way-hardware-timestamp;
NOTE: If you configure RPM probes for a services interface (sp-), you need
to announce local routes in a specific way for the following routing protocols:
• For OSPF, you can announce the local route by including the services
interface in the OSPF area. To configure this setting, include the interface
sp-fpc/pic/port statement at the [edit protocols ospf area area-number]
hierarchy level.
• For BGP and IS-IS, you must export interface routes and create a policy
that accepts the services interface local route. To export interface routes,
include the point-to-point and lan statements at the [edit routing-options
interface-routes family inet export] hierarchy level. To configure an export
policy that accepts the services interface local route, include the protocol
local, rib inet.0, and route-filter sp-interface-ip-address/32 exact statements
at the [edit policy-options policy-statement policy-name term term-name
from] hierarchy level and the accept action at the [edit policy-options
policy-statement policy-name term term-name then] hierarchy level. For the
export policy to take effect, apply the policy to BGP or IS-IS with the export
policy-name statement at the [edit protocols protocol-name] hierarchy level.
For more information about these configurations, see the Routing Policies,
Firewall Filters, and Traffic Policers Feature Guide for Routing Devices or the
Junos OS Routing Protocols Library for Routing Devices.
Routing the probe packets through the adaptive services or Multiservices PIC also enables
you to filter the probe packets to particular queues. The following example shows the
RPM configuration and the filter that specifies queuing:
services rpm {
probe p1 {
test t1 {
probe-type icmp-ping;
target address 10.8.4.1;
probe-count 10;
probe-interval 10;
test-interval 10;
dscp-code-points af11;
data-size 100;
destination-interface sp-1/2/0.0;
}
}
}
firewall {
filter f1 {
term t1 {
from {
dscp af11;
}
then {
forwarding-class assured-forwarding;
}
}
}
}
interfaces sp-1/2/0 {
unit 2 {
rpm client;
family inet {
address 10.8.4.2/32;
filter {
input f1;
}
}
}
}
interfaces sp-1/2/1 {
unit 2 {
rpm server;
family inet {
address 10.8.3.2/32;
filter {
input f1;
}
}
}
}
For more information about firewall filters, see the Routing Policies, Firewall Filters, and
Traffic Policers Feature Guide for Routing Devices; for more information about queuing,
see the Class of Service Feature Guide for Routing Devices.
Configuring TWAMP
You can configure the Two-Way Active Measurement Protocol (TWAMP) on all M Series
and T Series routers that support Multiservices PICs (running in either Layer 2 or Layer 3
mode), and on MX Series routers. Only the responder (server) side of TWAMP is supported.
For more information on TWAMP, see RFC 5357, A Two-Way Active Measurement Protocol
(TWAMP).
To configure TWAMP properties, include the twamp statement at the [edit services rpm]
hierarchy level:
twamp-server;
The preceding configuration settings that are described define a TWAMP server on the
router that enables a TWAMP client to connect to the server using any media interface
IP address such as a ge- interface. In such a scenario, the router functions as a TWAMP
server and timestamping is performed in the ukernel of the media-facing FPC.
• To specify the list of allowed control client hosts that can connect to this server, include
the client-list statement at the [edit services rpm twamp server] hierarchy level. Each
value you include must be a Classless Interdomain Routing (CIDR) address (IP address
plus mask) that represents a network of allowed hosts. You can include multiple client
lists, each of which can contain a maximum of 64 entries. You must configure at least
one client address to enable TWAMP.
• To specify the maximum number of concurrent connections the server can have to
client hosts, include the maximum-connections statement at the [edit services rpm
twamp server] hierarchy level. The allowed range of values is 1 through 1000 and the
default value is 64. You can also limit the number of connections the server can make
to a particular client host by including the maximum-connections-per-client statement.
The allowed range of values is 1 through 500 and the default value is 64.
• To specify the maximum number of sessions the server can have running at one time,
include the maximum-sessions statement at the [edit services rpm twamp server]
hierarchy level. The allowed range of values is 1 through 2048 and the default value is
64. You can also limit the number of sessions the server can have on a single connection
by including the maximum-sessions-per-connection statement.
• To specify the TWAMP server listening port, include the port statement at the [edit
services rpm twamp server] hierarchy level. The range is 1 through 65,535.
• [edit protocols bgp group group-name]—Default logical system and default routing
instance.
When you configure BGP neighbor discovery through RPM, if you do not specify a logical
system, the RPM probe applies to configured BGP neighbors for all logical systems. If
you do not specify a routing instance, the RPM probe applies to configured BGP neighbors
in all routing instances. You can explicitly configure RPM probes to apply only to the
default logical system, the default routing instance, or to a particular logical system or
routing instance.
To configure BGP neighbor discovery through RPM, configure the probe properties at the
[edit services rpm bgp] hierarchy:
data-fill data;
data-size size;
destination-port port;
history-size size;
logical-system logical-system-name [routing-instances routing-instance-name];
moving-average-size number;
probe-count count;
probe-interval seconds;
probe-type type;
routing-instances instance-name;
test-interval interval;
• To specify the contents of the data portion of Internet Control Message Protocol (ICMP)
probes, include the data-fill statement at the [edit services rpm bgp] hierarchy level.
The value can be a hexadecimal value.
• To specify the size of the data portion of ICMP probes, include the data-size statement
at the [edit services rpm bgp] hierarchy level. The size can be from 0 through 65400
and the default size is 0.
• To specify the User Datagram Protocol (UDP) port or Transmission Control Protocol
(TCP) port to which the probe is sent, include the destination-port statement at the
[edit services rpm bgp] hierarchy level. The destination-port statement is used only for
the UDP and TCP probe types. The value can be 7 or from 49160 through 65535.
• To specify the number of stored history entries, include the history-size statement at
the [edit services rpm bgp] hierarchy level. Specify a value from 0 to 512. The default
is 50.
• To specify the logical system used by ICMP probes, include the logical-system
logical-system-name statement at the [edit services rpm bgp] hierarchy level. If you do
not specify a logical system, the RPM probe applies to configured BGP neighbors for
all logical systems. To apply the probe to only the default logical system, you must set
the value of logical-system-name to null.
• To specify the number of probes within a test, include the probe-count statement at
the [edit services rpm bgp] hierarchy level. Specify a value from 1 through 15.
• To specify the time to wait between sending packets, include the probe-interval
statement at the [edit services rpm bgp] hierarchy level. Specify a value from 1 through
255 seconds.
• To specify the packet and protocol contents of the probe, include the probe-type
statement at the [edit services rpm bgp] hierarchy level. The following probe types are
supported:
• To specify the routing instance used by ICMP probes, include the routing-instances
statement at the [edit services rpm bgp] hierarchy level. The default routing instance
is Internet routing table inet.0. If you do not specify a routing instance, the RPM probe
applies to configured BGP neighbors in all routing instances. To apply the RPM probe
to only the default routing instance, you must explicitly set the value of instance-name
to default.
• To specify the time to wait between tests, include the test-interval statement at the
[edit services bgp probe] hierarchy level. Specify a value from 0 through 86400 seconds.
Configure BGP neighbor discovery through RPM for all logical systems and all routing
instances:
Configure BGP neighbor discovery through RPM for only the following logical systems
and routing instances: LS1/RI1, LS1/RI2, LS2, and RI3:
RI3;
}
}
Configure BGP neighbor discovery through RPM for only the default logical system and
default routing instance:
Tracing operations track all RPM operations and record them in a log file. The logged
error descriptions provide detailed information to help you solve problems faster.
By default, no events are traced. If you include the traceoptions statement at the [edit
services rpm] hierarchy level, the default tracing behavior is the following:
• Important events are logged in a file called rmopd located in the /var/log directory.
• When the log file reaches 128 kilobytes (KB), it is renamed rmopd.0, then rmopd.1, and
so on, until there are three trace files. Then the oldest trace file (rmopd.2) is overwritten.
(For more information about how log files are created, see the Junos OS System Log
Messages Reference.)
• Log files can be accessed only by the user who configures the tracing operation.
You can change this default behavior by using the traceoptions statements. Changing
the defaults is described in the following sections:
The number of files can be from 2 through 1000 files. The file size of each file can be from
10 KB through 1 gigabyte (GB).
For example, set the maximum file size to 2 MB, and the maximum number of files to 20
for a log file named rpmtrace:
When the rpmtrace file reaches 2 MB, it is renamed rpmtrace.0, and a new file called
rpmtrace is created. When the new rpmtrace reaches 2 MB, rpmtrace.0 is renamed
rpmtrace.1 and rpmtrace is renamed rpmtrace.0. This process repeats until there are 20
trace files. Then the oldest file (rpmtrace.19) is overwritten by rpmtrace.18.
flag {
all;
configuration;
error;
ipc;
ppm;
statistics
}
Table 8 on page 163 describes the meaning of the RPM tracing flags.
Configure an RPM instance identified by the probe name probe1 and the test name test1:
}
probe-server {
tcp {
destination-interface lt-0/0/0.0
port 50000;
}
udp {
destination-interface lt-0/0/0.0
port 50001;
}
}
probe-limit 200;
Configure packet classification, using lt- interfaces to send the probe packets to a logical
tunnel input interface. By sending the packet to the logical tunnel interface, you can
configure regular and multifield classifiers, firewall filters, and header rewriting for the
probe packets. To use the existing tunnel framework, the dlci and encapsulation
statements must be configured.
}
}
Configure an input filter on the interface on which the RPM probes are received. This filter
enables prioritization of the received RPM packets, separating them from the regular
data packets received on the same interface.
[edit firewall]
filter recos {
term recos {
from {
source-address {
10.8.4.1/32;
}
destination-address {
10.8.4.2/32;
}
}
then {
loss-priority high;
forwarding-class network-control;
}
}
}
[edit interfaces]
fe-5/0/0 {
unit 0 {
family inet {
filter {
input recos;
}
address 10.8.4.2/24;
}
}
}
Configure an RPM instance and enable RPM for the extension-provider packages on the
adaptive services interface:
unit 0 {
family inet;
}
unit 10 {
rpm client;
family inet {
address 1.1.1.1/32;
}
}
[edit chassis]
fpc 1 {
pic 2 {
adaptive-services {
service-package {
extension-provider {
control-cores 1;
data-cores 1;
object-cache-size 512;
policy-db-size 64;
package jservices-rpm;
syslog {
daemon any;
}
}
}
}
}
}
[edit services]
rpm {
twamp {
server {
authentication-mode none;
port 10000; # Twamp server's listening port
client-list LIST-1 { # LIST-1 is the name of the client-list. Multiple lists can be
configured.
address {
20.0.0.2/30; # IP address of the control client.
}
}
}
}
[edit interfaces sp-5/0/0]
unit 0 {
family inet;
}
unit 10 {
rpm {
twamp-server; # You must configure a separate logical interface on the service PIC
interface for the TWAMP server.
}
family inet {
address 50.50.50.50/32; # This address must be a host address with a 32-bit mask.
}
}
[edit chassis]
fpc 5 {
pic 0 {
adaptive-services {
service-package layer-2; # Configure the service PIC to run in Layer 2 mode.
}
}
}
[edit services]
rpm {
twamp {
server {
maximum-sessions 5;
maximum-sessions-per-connection 2;
maximum-connections 3;
maximum-connections-per-client 1;
port 10000;
server-inactivity-timeout ;
client-list LIST-1 {
address {
20.0.0.2/30;
}
}
}
}
}
Real-time performance monitoring (RPM), which has been supported on the adaptive
services interface, is now supported by the Junos OS extension-provider package. RPM
is supported on all platforms and service PICs that support the extension-provider
package.
NOTE: In Junos OS releases earlier than 12.3 , the extension provider package
was variously known as MP-SDK, Junos Services Framework (JSF), and
eJunos.
To enable RPM for the Junos OS extension-provider package on the adaptive services
interface, configure the object-cache-size, policy-db-size, and package statements at the
[edit chassis fpc slot-number pic pic-number adaptive-services service-package
extension-provider] hierarchy level. For the extension-provider package, package-name
in the package package-name statement is jservices-rpm.
For more information about the extension-provider package, see the SDK Applications
Configuration Guide and Command Reference.
The following example shows how to enable RPM for the extension-provider package
on the adaptive services interface:
chassis fpc 1 {
pic 2 {
adaptive-services {
service-package {
extension-provider {
control-cores 1;
data-cores 1;
object-cache-size 512;
policy-db-size 64;
package jservices-rpm;
syslog daemon any;
}
}
}
}
}
RFC2544 defines a series of tests that can be used to describe the performance
characteristics of a network-interconnecting device, such as a router, and outlines specific
formats to report the results of the tests. These tests can be used to benchmark
interconnected network devices and devise a guideline or a measurement pattern to
analyze the health and efficiency of the network devices. These tests are the standard
benchmarking tests for Ethernet networks and are known as RFC2544-based
benchmarking tests. These tests measure throughput, latency, frame loss rate, and bursty
frames. The test methodology enables you to define various parameters such as different
frame sizes to be examined (64, 128, 256, 512, 1024, 1280, and 1518 bytes), the test time
for each test iteration (10 seconds to 1,728,000 seconds), and the frame format
(IP-over-UDP).
Juniper Networks MX104 3D Universal Edge Routers support only the reflector function
and the corresponding benchmarking tests. These tests display only the reflecting
benchmarking tests. These benchmarking tests display the results of the test. For instance,
in the case of the throughput test, the results display the number of transmitted frames
and the number of received frames.
Table 9 on page 170 describes the different network topologies in which the benchmarking
test is supported.
The Metro Ethernet Forum (MEF) defines two Ethernet service types—E-LAN and
E-Line—and specifies the associated service attributes and parameters. These services
can be supported within the Metro Ethernet Network (MEN) and also supported over
different transport technologies such as SONET, MPLS, and so on. Juniper networks ACX
Series routers and MX104 routers provide support for Layer 2 E-LAN and E-Line services,
pseudowire reflection, as well as IPv4 services. Figure 7 on page 171 shows a sample
topology for the E-LAN and E-Line reflection supported on MX104 routers.
In an E-LAN service, during the benchmarking tests, the initiator or generator transmits
a test packet (unicast) to a reflector. The reflector receives and reflects the test packet
back to the initiator. The test packet is an IP-over-UDP packet with a source and
destination MAC address. A Layer 2 traffic reflection session is identified by the source
MAC address, the destination MAC address, and the egress interface. By default,
RFC2544-based benchmarking tests are performed when there is no other service traffic.
This mode of operation is known as out-of-service mode. The default service mode for
the reflecting egress interface for an E-LAN service is also out-of-service mode. In
out-of-service mode, while the test is running, all the data traffic sent to and from the
UNI port under test on the service is interrupted. Control protocol peering is not interrupted
whereas control protocol packets such as end-to-end CFM sessions are interrupted. If
you do not want the control protocol packets interrupted, you can configure the E-LAN
service mode as in-service mode. In the in-service mode, while the test is running, the
rest of the data traffic flow sent to and from the UNI port under test on the service is not
interrupted. Control protocol packets and control protocol peering are not interrupted.
By default, for E-LAN services, the default behavior of the reflector is to swap MAC
addresses. The reflector swaps the source and destination MAC addresses and sends
the packet back to the initiator. Table 10 on page 172 describes the MAC address swapping
behavior for the service types.
Table 10: MAC Address Swapping Behavior for E-LAN and E-Line Services
Family Direction Default Behavior User-configurable
By default, the IP address and UDP ports are not modified. Optionally, you can configure
the reflector to swap the source and destination IP address and the source and destination
UDP ports.
You can configure an ACX Series router to operate as an initiator. Because the MX104
router supports only reflector functionality, it can be configured to operate as a reflector.
All active RFC2544-based benchmarking tests are stopped when any of the following
events takes place either in the initiator or in the reflector:
System Events:
• Router is restarted.
• Interface on which the tests are configured is deactivated and then reactivated.
• Interface on which the tests are configured is disabled and then enabled.
• Interface on which the tests are configured is deleted and then added.
• Peer router interface, connected to the interface on which the tests are configured, is
disabled and then enabled.
• Maximum Transmission Unit (MTU) size of the interface on which the tests are
configured is modified.
• VLAN configuration (VLAN ID) of the interface on which the tests are configured is
modified.
• Bridge domain configuration (mode) of the interface on which the tests are configured
is modified.
• Member interface, of an aggregated Interface on which the test are configured is deleted
and then added.
After the benchmarking tests are stopped, the test states of the tests are removed and
the user can restart the same test. Other ongoing tests on other interfaces are not
interrupted.
• Example: Configuring RFC 2544-Based Benchmarking Tests for Layer 2 E-LAN Services
in Bridge Domains on page 200
Table 11 on page 174 lists the reflector-specific configuration statements that are supported
on the MX104 routers. Note that an (–) denotes that the command is not supported.
destination-ipv4-address – 13.3R1
destination-mac-address – 14.2R1
destination-udp-port – 13.3R1
disable-signature-check – –
in-service – 14.2R1
ip-swap – 14.2R1
reflect-etype – –
source-ipv4-address – 13.3R1
source-mac-address – 14.2R1
source-udp-port – 13.3R1
test-interface – 13.3R1
udp-tcp-port-swap – 14.2R1
• Example: Configuring RFC 2544-Based Benchmarking Tests for Layer 2 E-LAN Services
in Bridge Domains on page 200
You can configure a benchmarking test to detect and measure performance attributes,
such as throughput, latency, frame loss, and bursty or back-to-back frames, of network
devices. RFC 2544-based benchmarking test is performed by transmitting test packets
from a device that functions as the generator or the initiator. These packets are sent to
a device that functions as the reflector, which receives and returns the packets back to
the initiator.
You must configure a test profile and reference the test profile in a unique test name that
defines the parameters for the test to be performed on a certain device. However, the
test profile is required when the test mode is configured as initiation and termination.
The test-profile parameter is disregarded when the test mode is configured as reflection.
MX104 routers support only the reflection function in the RFC 2544-based benchmarking
tests. A reflection service does not use the parameters specified in the test profile because
the reflection service it returns the frames to the initiator.
The following topics describe how to configure a test name for an RFC 2544-based
benchmarking test on an MX104 router for Layer 3 IPv4 and Ethernet pseudowire networks:
• Configuring a Test Name for an RFC 2544-Based Benchmarking Test for a IPv4
Network on page 175
• Configuring a Test Name for an RFC 2544-Based Benchmarking Test for an Ethernet
Pseudowire: on page 176
Configuring a Test Name for an RFC 2544-Based Benchmarking Test for a IPv4 Network
You can configure a test name by including the test-name test-name statement at the
[edit services rpm rfc2544-benchmarking] hierarchy level. In the test name, you can
configure attributes of the test iteration, such as the address family (type of service, IPv4
or Ethernet), the logical interface, and test duration that are used for a benchmarking
test to be run.
To configure a test name and define its attributes for an IPv4 network:
[edit]
user@host# edit services
2. Configure a instance.
[edit services]
user@host# edit rpm
4. Define a name for the test—for example, test1. The test name identifier can be up to
32 characters in length.
5. Specify the test mode for the packets that are sent during the benchmarking test. The
reflect option causes the test frames to be reflected on the IPv4 network.
6. Configure the address type family for the benchmarking test. The inet option indicates
that the test is run on an IPv4 service.
7. Configure the destination IPv4 address for the test packets. This parameter is required
only if you configure IPv4 family inet. If you do not configure the destination IPv4
address, the default value of 192.168.1.20 is used.
8. Specify the UDP port of the destination to be used in the UDP header for the generated
frames. If you do not specify the UDP port, the default value of 4041 is used.
9. (Optional) Specify the source IPv4 address to be used in generated test frames. If
you do not configure the source IPv4 address for inet family, the source address of
the interface is used to transmit the test frames.
10. Specify the UDP port of the source to be used in the UDP header for the generated
frames. If you do not specify the UDP port, the default value of 4041 is used.
11. Specify the logical interface on which the RFC 2544-based benchmarking test is run.
If you configure an inet family and the test mode to reflect the frames back on the
sender from the other end, then the logical interface is used as the interface to enable
the reflection service (reflection is performed on the packets entering the specified
interface). If you not configure the logical interface for reflection test mode, then a
lookup is performed on the source IPv4 address to determine the interface that hosts
the address.
Configuring a Test Name for an RFC 2544-Based Benchmarking Test for an Ethernet Pseudowire:
You can configure a test name by including the test-name test-name statement at the
[edit services rpm rfc2544-benchmarking] hierarchy level. In the test name, you can
configure attributes of the test iteration, such as the address family (type of serviceIPv4
or Ethernet), the logical interface, and test duration, that are used for a benchmarking
test to be run. The test name combined with the test profile represent a single real-time
performance monitoring (RPM) configuration instance.
To configure a test name and define its attributes for an Ethernet Pseudowire:
[edit]
user@host# edit services
[edit services]
user@host# edit rpm
4. Define a name for the test—for example, test1. The test name identifier can be up to
32 characters in length.
5. Specify the test mode for the packets that are sent during the benchmarking test. The
reflect option causes the test frames to be reflected on the Ethernet pseudowire.
6. Configure the address type family for the benchmarking test. The ccc option indicates
that the test is run on a CCC or Ethernet pseudowire service.
7. Specify the direction of the interface on which the test must be run. This parameter
is valid only for a family. To enable the test to be run in the egress direction of the
interface (network-to-network interface (NNI)), use the egress option. To enable the
test to be run in the ingress direction of the interface (user-to-network interface (UNI)),
use the ingress option.
8. (Optional) Specify the source IPv4 address to be used in generated test frames. If
you do not configure the source IPv4 address for family, the default value of 192.168.1.10
is used.
9. Specify the logical interface on which the RFC 2544-based benchmarking test is run.
• Example: Configuring an RFC 2544-Based Benchmarking Test for Layer 3 IPv4 Services
on page 178
Example: Configuring an RFC 2544-Based Benchmarking Test for Layer 3 IPv4 Services
Requirements
This example uses the following hardware and software components:
Overview
Consider a sample topology in which a router, Router A, functions as an initiator and
terminator of the test frames for an RFC 2544-based benchmarking test. Router A is
connected over a Layer 3 network to another router, Router B, which functions as a
reflector to reflect back the test frames it receives from Router A. IPv4 is used for
transmission of test frames over the Layer 3 network. This benchmarking test is used to
compute the IPv4 service parameters between Router A and Router B. Logical interfaces
on both the routers are configured with IPv4 addresses to measure the performance
attributes, such as throughput, latency, frame loss, and bursty frames, of network devices
for the IPv4 service.
Figure 8 on page 179 shows the sample topology to perform an RFC 2544 test for a Layer
3 IPv4 d
';[service.
Configuration
In this example, you configure the benchmarking test for a Layer 3 IPv4 service that is
between interface ge-0/0/0 on Router A and interface ge-0/0/4 on Router B to detect
and analyze the performance of the interconnecting routers.
CLI Quick To quickly configure this example, copy the following commands, paste them in a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level:
Configuring
Benchmarking Test
Parameters on Router
A
Configuring
Benchmarking Test
Parameters on Router
B
Step-by-Step The following require you to navigate various levels in the configuration hierarchy. For
Procedure information about navigating the CLI, see Using the CLI Editor in Configuration Mode in
the CLI User Guide.
[edit]
user@host# edit interfaces
[edit interfaces]
user@host# edit ge-0/0/0
[edit]
user@host# edit services
[edit services]
user@host# edit rpm
10. Configure an RFC 2544-based benchmarking test for the RPM instance.
14. Specify the periodfor which the test is to be performed in hours, minutes, or seconds
by specifying a number followed by the letter h (for hours), m (for minutes), or s
(for seconds), respectively.
15. Define the theoretical maximum bandwidth for the test in kilobits per second, with
a value from 1 Kbps through 1,000,000 Kbps.
16. Enter the up command to go the previous level in the configuration hierarchy.
17. Enter the up command to go the previous level in the configuration hierarchy.
18. Define a name for the test—for example, test1. The test name identifier can be up
to 32 characters in length.
19. Specify the name of the test profile—for example, throughput—to be associated
with a particular test name.
20. Specify the logical interface, ge-0/0/0.1, on which the RFC 2544-based
benchmarking test is run.
21. Specify the test mode for the packets that are sent during the benchmarking test
as initiation and termination.
22. Configure the address type family, inet, for the benchmarking test.
23. Configure the destination IPv4 address for the test packets.
24. Specify the UDP port of the destination to be used in the UDP header for the
generated frames as 4001.
Step-by-Step The following you to navigate various levels in the configuration hierarchy. For information
Procedure about navigating the CLI, see Using the CLI Editor in Configuration Mode in the CLI User
Guide.
[edit]
user@host# edit interfaces
[edit interfaces]
user@host# edit ge-0/0/4
[edit]
user@host# edit services
[edit services]
user@host# edit rpm
10. Configure an RFC 2544-based benchmarking test for the RPM instance.
11. Define a name for the test—for example, test1. The test name identifier can be up
to 32 characters in length.
12. Specify the logical interface, ge-0/0/4.1, on which the RFC 2544-based
benchmarking test is run.
13. Specify reflect as the test mode for the packets that are sent during the
benchmarking test.
14. Configure the address type family, inet, for the benchmarking test.
15. Configure the destination IPv4 address for the test packets as 200.0.0.1.
16. Specify the UDP port of the destination to be used in the UDP header for the
generated frames as 4001.
After the test is successfully completed at the initiator, you can stop the test at the
reflector by entering the test services rpm rfc2544-benchmarking test test1 command.
Results
tests {
test-name test1 {
test-profile throughput;
interface ge-0/0/0.1;
mode initiate,terminate;
family inet;
dest-address 200.0.0.2
udp-port 4001;
}
}
}
After you have configured the device, enter the commit command in configuration mode.
Verifying the Results of the Benchmarking Test for Layer 3 IPv4 Services
Examine the results of the benchmarking test that is performed on the configured service
between Router A and Router B.
Purpose Verify that the necessary and desired statistical values are displayed for the benchmarking
test that is run on the configured service between Router A and Router B.
Action In operational mode, enter the show services rpm rfc2544-benchmarking (aborted-tests
| active-tests | completed-tests | summary) command to display information about the
results of each category or state of the RFC 2544-based benchmarking test, such as
aborted tests, active tests, and completed tests, for each real-time performance
monitoring (RPM) instance.
This example shows how to configure the benchmarking test for the user-to-network
interface (UNI) direction of an Ethernet pseudowire service.
Requirements
This example uses the following hardware and software components:
Overview
Consider a sample topology in which a router, Router A, functions as a reflector of the
test frames for an RFC 2544-based benchmarking test. The logical customer edge
(CE)-facing interface and inet family are configured on Router A. Router A is not part of
a pseudowire and therefore, a Layer 3 family configuration is required on it. Router A,
which is a customer edge device CE1 is connected to Router B, which functions as a
provider edge device PE1 over an Ethernet pseudowire in the UNI direction with EtherType
or Layer 2 Ethernet payload. The logical interface, family, and UNI direction are configured
on Router B. Router B or PE1 is connected over an Ethernet pseudowire in the NNI direction
to a provider edge device at the remote site, PE2. The link between CE1 and PE1 is an
Ethernet Layer 2 network and it can be configured with any EtherType value. The link
between PE1 and PE2 is an Ethernet line (E-LINE) or an Ethernet Private Line (EPL) that
has Layer 2 payload and Layer 3 transport sent over it. Router B or PE1 functions as an
initiator and terminator of the test frames that are sent to Router A and reflected back
from it.
Figure 9 on page 186 shows the sample topology to perform an RFC 2544 test for the UNI
direction of an Ethernet pseudowire service.
Configuration
In this example, you configure the benchmarking test for the UNI direction of an Ethernet
pseudowire service that is enabled between two routersto detect and analyze the
performance of the interconnecting routers.
CLI Quick To quickly configure this example, copy the following commands, paste them in a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level:
Configuring
Benchmarking Test
Parameters on Router
A
Configuring
Benchmarking Test
Parameters on Router
B
Step-by-Step The following require you to navigate various levels in the configuration hierarchy. For
Procedure information about navigating the CLI, see Using the CLI Editor in Configuration Mode in
the CLI User Guide.
[edit]
user@host# edit interfaces
[edit interfaces]
user@host# edit ge-0/0/0
[edit]
user@host# edit services
[edit services]
user@host# edit rpm
10. Configure an RFC 2544-based benchmarking test for the RPM instance.
14. Specify the period for which the test is to be performed in hours, minutes, or seconds
by specifying a number followed by the letter h (for hours), m (for minutes), or s
(for seconds). In this example, you configure the period as 20 minutes.
15. Define the theoretical maximum bandwidth for the test in kilobits per second, with
a value from 1 Kbps through 1,000,000 Kbps.
16. Enter the up command to go the previous level in the configuration hierarchy.
17. Enter the up command to go the previous level in the configuration hierarchy.
18. Define a name for the test—for example, test1. The test name identifier can be up
to 32 characters in length.
19. Specify the name of the test profile—for example, throughput—to be associated
with a particular test name.
20. Specify the logical interface, ge-0/0/0.1, on which the RFC 2544-based
benchmarking test is run.
21. Specify the test mode for the packets that are sent during the benchmarking test
as initiation and termination.
22. Configure the address type family, inet, for the benchmarking test.
23. Configure the destination IPv4 address for the test packets as 200.0.0.2.
24. Specify the UDP port of the destination to be used in the UDP header for the
generated frames as 4001.
Step-by-Step The following require you to navigate various levels in the configuration hierarchy. For
Procedure information about navigating the CLI, see Using the CLI Editor in Configuration Mode in
the CLI User Guide.
[edit]
user@host# edit interfaces
[edit interfaces]
user@host# edit ge-0/0/4
[edit]
user@host# edit services
[edit services]
user@host# edit rpm
10. Configure an RFC 2544-based benchmarking test for the RPM instance.
11. Define a name for the test—for example, test1. The test name identifier can be up
to 32 characters in length.
12. Specify the logical interface on which the RFC 2544-based benchmarking test is
run.
13. Specify reflect as the test mode for the packets that are sent during the
benchmarking test.
14. Configure the address type family, ccc, for the benchmarking test.
15. Specify the direction of the interface on which the test must be run, which is UNI in
this example.
Results
[edit interfaces]
ge-0/0/0 {
vlan-tagging;
unit 0 {
vlan-id 101;
family inet {
address 200.0.0.1/24;
}
}
}
bandwidth-kbps 500;
}
}
tests {
test-name test1 {
interface ge-0/0/0.1;
test-profile throughput;
mode initiate,terminate;
family inet;
dest-address 200.0.0.2
udp-port 4001;
}
}
}
After you have configured the device, enter the commit command in configuration mode.
Verifying the Results of the Benchmarking Test for UNI Direction of an Ethernet Pseudowire
Service
Examine the results of the benchmarking test that is performed on the configured service
between Router A and Router B.
Purpose Verify that the necessary and desired statistical values are displayed for the benchmarking
test that is run on the configured service between Router A and Router B.
Action In operational mode, enter the show services rpm rfc2544-benchmarking (aborted-tests
| active-tests | completed-tests | summary) command to display information about the
results of each category or state of the RFC 2544-based benchmarking test, such as
aborted tests, active tests, and completed tests, for each real-time performance
monitoring (RPM) instance.
Meaning The output displays the details of the benchmarking test that was performed. For more
information about the show services rpm rfc2544-benchmarking operational command,
see show services rpm rfc2544-benchmarking in the CLI Explorer.
This example shows how to configure the benchmarking test for a network-to-network
interface (NNI) direction of an Ethernet pseudowire service.
Requirements
This example uses the following hardware and software components:
Overview
Consider a sample topology in which a router, Router A, functions as an initiator and
terminator of the test frames for an RFC 2544-based benchmarking test. Router A
operates as a provider edge devicePE1, which is connected to a customer edge device
CE1 on one side and over an Ethernet pseudowire to another router Router B, which
functions as a reflector to reflect back the test frames it receives from Router A. Router
B operates as a provider edge device, PE2, which is the remote router located at the other
side of the service provider core. The UNI direction of CE1 is connected to the NNI direction
of PE1. An MPLS tunnel connects PE1 and PE2 over the Ethernet pseudowire or the
Ethernet line (E-LINE).
with UNI as the direction, and the logical interface under test on Router B is the CE2
interface with NNI as the direction. Data traffic arriving from UNI toward NNI is ignored
while the test is in progress. Packets from NNI are not sent toward the customer edge
because all packets are assumed to be test frames. The family and NNI direction are
configured on routers A and B.
Figure 10 on page 194 shows the sample topology to perform an RFC 2544 test for the
NNI direction of an Ethernet pseudowire service.
Configuration
In this example, you configure the benchmarking test for the NNI direction of an Ethernet
pseudowire service that is enabled between two routersto detect and analyze the
performance of the interconnecting routers.
CLI Quick To quickly configure this example, copy the following commands, paste them in a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level:
Configuring
Benchmarking Test
Parameters on Router
A
Configuring
Benchmarking Test
Parameters on Router
B
Step-by-Step The following require you to navigate various levels in the configuration hierarchy. For
Procedure information about navigating the CLI, see Using the CLI Editor in Configuration Mode in
the CLI User Guide.
[edit]
user@host# edit interfaces
[edit interfaces]
user@host# edit ge-0/0/0
[edit]
user@host# edit services
[edit services]
user@host# edit rpm
10. Configure an RFC 2544-based benchmarking test for the RPM instance.
14. Specify the period—for example, 20 minutes—for which the test is to be performed
in hours, minutes, or seconds by specifying a number followed by the letter h (for
hours), m (for minutes), or s (for seconds).
15. Define the theoretical maximum bandwidth for the test in kilobits per second, with
a value from 1 Kbps through 1,000,000 Kbps.
16. Enter the up command to go the previous level in the configuration hierarchy.
17. Enter the up command to go the previous level in the configuration hierarchy.
18. Define a name for the test—for example, test1. The test name identifier can be up
to 32 characters in length.
19. Specify the name of the test profile—for example, throughput—to be associated
with a particular test name.
20. Specify the logical interface, ge-0/0/0.1, on which the RFC 2544-based
benchmarking test is run.
21. Specify the test mode for the packets that are sent during the benchmarking test
as initiation and termination.
22. Configure the address type family, ccc, for the benchmarking test.
23. Specify the direction of the interface on which the test must be run, which is NNI in
this example.
Step-by-Step The following require you to navigate various levels in the configuration hierarchy. For
Procedure information about navigating the CLI, see Using the CLI Editor in Configuration Mode in
the CLI User Guide.
[edit]
user@host# edit interfaces
[edit interfaces]
user@host# edit ge-0/0/4
[edit]
user@host# edit services
[edit services]
user@host# edit rpm
10. Configure an RFC 2544-based benchmarking test for the RPM instance.
11. Define a name for the test—for example, test1. The test name identifier can be up
to 32 characters in length.
12. Specify the logical interface, ge-0/0/4.1, on which the RFC 2544-based
benchmarking test is run.
13. Specify reflect as the test mode for the packets that are sent during the
benchmarking test.
14. Configure the address type family, ccc, for the benchmarking test.
15. Specify the direction of the interface on which the test must be run, which is NNI in
this example.
Results
tests {
test-name test1 {
interface ge-0/0/0.1;
test-profile throughput;
mode initiate,terminate;
family ccc;
direction nni;
}
}
}
After you have configured the device, enter the commit command in configuration mode.
Verifying the Results of the Benchmarking Test for NNI Direction of an Ethernet Pseudowire
Service
Examine the results of the benchmarking test that is performed on the configured service
between Router A and Router B.
Purpose Verify that the necessary and desired statistical values are displayed for the benchmarking
test that is run on the configured service between Router A and Router B.
Action In operational mode, enter the show services rpm rfc2544-benchmarking (aborted-tests
| active-tests | completed-tests | summary) command to display information about the
results of each category or state of the RFC 2544-based benchmarking test, such as
aborted tests, active tests, and completed tests, for each real-time performance
monitoring (RPM) instance.
Meaning The output displays the details of the benchmarking test that was performed. For more
information about the show services rpm rfc2544-benchmarking operational command,
see show services rpm rfc2544-benchmarking in the CLI Explorer.
This example shows how to configure benchmarking tests for the Layer 2 E-LAN services
in bridge domains. The example covers the four basic tests: throughput, frame-loss,
back-to-back, and latency.
Requirements
This example uses the following hardware and software components:
Overview
Consider a sample topology in which an ACX router functions as an initiator and terminator
of the test frames for an RFC2544-based benchmarking test. ACX router is connected
to a customer edge device CE1, on one side and is connected over a layer 2 network to
an MX104 router. The MX104 router functions as a reflector to reflect the test frames it
receives from the ACX Series initiator back to the initiator. The MX04 router is also
connected to a customer edge device CE2.
Figure 11 on page 201 shows the sample topology to perform all four RFC2544-based
benchmarking tests (throughput, back-to-back frames, latency, and frame-loss) for the
UNI direction on a Layer 2 bridge network.
On the ACX router, ge-1/2/1.0 is the Layer 2 NNI interface and ge-1/1/3.0 is the Layer 2
UNI interface. On the MX104 router, ge-1/1/6.0 is the Layer 2 NNI interface and ge-1/1/5.0
is the Layer 2 UNI interface. The benchmarking tests are used to compute the performance
attributes for an E-LAN service on a bridge domain.
Configuration
In this example, you configure the benchmarking tests for the UNI direction for an E-LAN
service on a Layer 2 bridge domain that is enabled between two routers to detect and
analyze the performance of the interconnected routers. In this example, we start by
configuring the ACX Series router. On the ACX router, you first configure each test by
specifying the test profile, the test attributes, and then define the test by associating the
test with the test profile with the relevant attributes. You can then configure the interface.
On the MX104 router, you will perform the same steps. However, a few attributes such
as the outer VLAN ID, source UDP port, destination UDP port, the duration of each iteration,
and their values are only applicable to the initiator or the ACX router.
CLI Quick To quickly configure this example, copy the following commands, paste them in a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level:
Configuring set services rpm rfc2544-benchmarking profiles test-profile tput test-type throughput
Benchmarking Test set services rpm rfc2544-benchmarking profiles test-profile tput packet-size 128
Parameters on the ACX set services rpm rfc2544-benchmarking profiles test-profile tput bandwidth-kbps 900000
set services rpm rfc2544-benchmarking profiles test-profile b2bt test-type
Series Router
back-back-frames
set services rpm rfc2544-benchmarking profiles test-profile b2bt packet-size 512
set services rpm rfc2544-benchmarking profiles test-profile b2bt bandwidth-kbps 950000
set services rpm rfc2544-benchmarking profiles test-profile lty test-type latency
set services rpm rfc2544-benchmarking profiles test-profile lty packet-size 512
set services rpm rfc2544-benchmarking profiles test-profile lty bandwidth-kbps 1000000
set services rpm rfc2544-benchmarking profiles test-profile frloss test-type frame-loss
set services rpm rfc2544-benchmarking profiles test-profile frloss packet-size 1600
set services rpm rfc2544-benchmarking profiles test-profile frloss bandwidth-kbps
1000000
set services rpm rfc2544-benchmarking tests test-name tput-test test-profile tput
set services rpm rfc2544-benchmarking tests test-name tput-test source-mac-address
00:00:00:00:11:11
set services rpm rfc2544-benchmarking tests test-name tput-test destination-mac-address
00:00:00:00:22:22
set services rpm rfc2544-benchmarking tests test-name tput-test ovlan-id 400
set services rpm rfc2544-benchmarking tests test-name tput-test service-type elan
set services rpm rfc2544-benchmarking tests test-name tput-test mode
initiate-and-terminate
set services rpm rfc2544-benchmarking tests test-name tput-test family bridge
set services rpm rfc2544-benchmarking tests test-name tput-test direction egress
set services rpm rfc2544-benchmarking tests test-name tput-test source-udp-port 200
set services rpm rfc2544-benchmarking tests test-name tput-test destination-udp-port
200
set services rpm rfc2544-benchmarking tests test-name tput-test test-iterator-duration
20
set services rpm rfc2544-benchmarking tests test-name tput-test test-interface ge-1/1/3.0
Step-by-Step The following configuration requires you to configure a test profile for the throughput
Procedure test and reference the test-profile in a unique test-name. The test-name defines the
parameters for the throughput test to be performed on the ACX router.
[edit]
user@host# edit services rpm rfc2544-benchmarking
2. Define a name for the first test profile—for example, tput for the throughput test
profile.
3. Configure the type of test to be performed as throughput, specify the packet size
as 128 bytes, and define the theoretical maximum bandwidth for the test in kilobits
per second (Kbps), with a value from 1 Kbps through 1,000,000 Kbps.
5. Define a name for the throughput test—for example, tput-test. The test name can
be up to 32 characters in length.
6. Specify the name of the test profile, tput, to be associated with the test name.
7. Configure the source and destination MAC address for the test packet.
8. Configure the outer VLAN ID for the test frames and specify the service type under
test to be E-LAN.
9. Specify the test mode for the packets that are sent during the benchmarking test
as initiation and termination.
10. Configure the family type, bridge, for the benchmarking test and specify the direction,
egress. Also, specify the source and destination UDP port to be used in the UDP
headers of the test packet.
11. Specify the duration of each iteration in seconds, with a value from 10 seconds to
1,728,000 seconds, and specify the logical interface, ge-0/2/1.0, on which the
RFC2544-benchmarking tests are run.
Step-by-Step The following configuration requires you to configure a test profile for the back to back
Procedure frames test and reference the test-profile in a unique test-name. The test-name defines
the parameters for the back to back frames test to be performed on the ACX router.
[edit]
user@host# edit services rpm rfc2544-benchmarking
5. Define a name for the back-to-back frames test—for example, b2bt-test. The test
name can be up to 32 characters in length.
6. Specify the name of the test profile, b2bt, to be associated with the test name.
7. Configure the source and destination MAC address for the test packet.
8. Configure the outer VLAN ID for the test frames and specify the service type under
test.
9. Specify the test mode for the packets that are sent during the benchmarking test
as initiation and termination.
10. Configure the family type, bridge, for the benchmarking test and specify the direction,
egress.
11. Specify the duration of each iteration in seconds, with a value from 10 seconds to
1,728,000 seconds. Also, specify the logical interface, ge-0/2/1.0, on which the
RFC2544-based benchmarking test is run.
Step-by-Step The following configuration requires you to configure a test profile for the latency test
Procedure and reference the test-profile in a unique test-name. The test-name defines the
parameters for the latency test to be performed on the ACX router.
[edit]
user@host# edit services rpm rfc2544-benchmarking
3. Configure the type of test to be performed as latency, specify the packet size of the
test packet, and define the maximum bandwidth for the test in kilobits per second,
with a value form 1 Kbps through 1,000,000 Kbps.
4. Enter the up command twice to go to the previous level in the configuration hierarchy.
5. Define a name for the latency test—for example, lty-test. The test name can be up
to 32 characters in length.
6. Specify the name of the test profile, lty, to be associated with the test name.
7. Configure the source and destination MAC address for the test packet.
8. Configure the outer VLAN ID for the test frames and specify the service type under
test.
9. Specify the test mode for the packets that are sent during the benchmarking test
as initiation and termination.
10. Configure the family type, bridge, for the benchmarking test and specify the direction,
egress. Also, specify the source and destination UDP port to be used in the UDP
headers of the test packet.
11. Specify the duration of each iteration in seconds, with a value from 10 seconds to
1,728,000 seconds. Also, specify the logical interface, ge-0/2/1.0, on which the
RFC2544-based benchmarking test is run.
Configuring Frame Loss Benchmarking Test Parameters on the ACX Series Router
Step-by-Step The following configuration requires you to configure a test profile for the frame loss test
Procedure and reference the test-profile in a unique test-name. The test-name defines the
parameters for the frame loss test to be performed on the ACX router.
[edit]
user@host# edit services rpm rfc2544-benchmarking
2. Define a name for the frame loss test profile—for example, frloss.
3. Configure the type of test performed as frame loss, specify the packet size of the
test packet, and define the maximum bandwidth for the test in kilobits per second,
with a value from 1 Kbps through 1,000,000 Kbps.
5. Define a name for the frame loss test—for example, frloss-test. The test name can
be up to 32 characters in length.
6. Specify the name of the test profile, frloss, to be associated with the test name.
7. Configure the source and destination MAC address for the test packet.
8. Configure the outer VLAN ID for the test frames and specify the service type under
test.
9. Specify the test mode for the packets that are sent during the benchmarking test
as initiation and termination.
10. Configure the family type, bridge, for the benchmarking test and specify the direction,
egress. Also, specify the source and destination UDP port to be used in the UDP
headers of the test packet.
11. Specify the duration of each iteration in seconds, with a value from 10 seconds to
1,728,000 seconds. Also, specify the logical interface, ge-0/2/1.0, on which the
RFC2544-based benchmarking test is run.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in
Configuration Mode in the CLI User Guide.
1. Configure the Layer 2 NNI interface on which the tests must be run from the [edit]
hierarchy level.
[edit]
user@host# edit interfaces ge-1/2/1
2. Configure flexible VLAN tagging for the transmission of untagged frames or 802.1Q
single-tagged and dual-tagged frames on the logical interface. You can also specify
the maximum transmission unit (MTU) size for the interface and the encapsulation.
3. Configure a logical unit for the interface, specify the encapsulation, and configure
the VLAN ID on the logical interfaces.
[edit]
user@host# edit interfaces ge-1/1/3
6. Configure a logical unit for the interface and specify the encapsulation and configure
the VLAN ID on the logical interfaces.
7. Configure the bridge domain, bd1, and specify the VLAN ID associated with the
bridge domain and the associated interfaces from the [edit] hierarchy level.
[edit ]
user@host# set bridge-domains bd1 vlan-id 600 interface ge-1/2/1.0
user@host# set bridge-domains bd1 vlan-id 600 intreface ge-1/1/3.0
Step-by-Step The following configuration requires you to configure a unique test-name for the
Procedure benchmarking test on the MX104 router. The test-name defines the parameters for the
benchmarking test to be performed. Because the test interface and test MAC addresses
are the same, you can create a single test configuration at the reflector (MX104).
[edit]
user@host# edit services rpm rfc2544-benchmarking
2. Define a name for the test—for example, l2b-reflector. The test name can be up to
32 characters in length.
3. Specify the source and destination MAC addresses of the test packet.
4. Specify the service type under test and the mode which is reflect, at the reflector.
6. Configure the family type, bridge, for the benchmarking test and specify the direction,
egress. Also, specify the logical interface, ge-1/1/5.0, on which the RFC2544-based
benchmarking test is being run.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in
Configuration Mode in the CLI User Guide.
1. Configure the Layer 2 NNI interface on which the tests must be run.
[edit]
user@host# edit interfaces ge-1/1/6
3. Configure a logical unit for the interface, specify the encapsulation, and configure
the VLAN ID on the logical interface.
[edit]
user@host# edit interfaces ge-1/1/5
6. Configure a logical unit for the interface, specify the encapsulation, and configure
the VLAN ID on the logical interfaces.
7. Configure the bridge domain, bd1, and specify the VLAN ID associated with the
bridge domain, and the associated interfaces from the [edit] hierarchy level.
[edit ]
user@host# set bridge-domains bd1 vlan-id 500 interface ge-1/1/6.0
user@host# set bridge-domains bd1 vlan-id 500 intreface ge-1/1/5.0
Results
In configuration mode, confirm your configuration on the ACX Router and the MX104
Router by entering the show command. If the output does not display the intended
configuration, repeat the configuration instructions in this example to correct it.
[edit interfaces]
ge-1/2/1 {
flexible-vlan-tagging;
mtu 9192;
encapsulation flexible-ethernet-services;
unit 0 {
encapsulation vlan-bridge;
vlan-id 400;
}
}
ge-1/1/3 {
flexible-vlan-tagging;
mtu 9192;
encapsulation flexible-ethernet-services;
unit 0 {
encapsulation vlan-bridge;
vlan-id 400;
}
}
[edit bridge-domains]
bd1 {
vlan-id 600;
interface ge-1/2/1.0;
interface ge-1/1/3.0;
}
tests {
test-name tput-test {
interface ge-1/1/3.0;
test-profile tput;
mode initiate,terminate;
source-mac-address 00:00:00:00:11:11;
destination-mac-address 00:00:00:00:22:22;
ovlan-id 400;
service-type elan;
family bridge;
direction egress;
source-udp-port 200;
destination-udp-port 200;
test-iterator-duration 20;
}
test-name b2b-test {
interface ge-1/1/3.0;
test-profile b2bt;
mode initiate,terminate;
source-mac-address 00:00:00:00:11:11;
destination-mac-address 00:00:00:00:22:22;
ovlan-id 400;
service-type elan;
family bridge;
direction egress;
test-iterator-duration 20;
}
test-name lty-test {
interface ge-1/1/3.0;
test-profile lty;
mode initiate,terminate;
source-mac-address 00:00:00:00:11:11;
destination-mac-address 00:00:00:00:22:22;
ovlan-id 400;
service-type elan;
family bridge;
direction egress;
source-udp-port 200;
destination-udp-port 200;
test-iterator-duration 20;
}
test-name frloss-test {
interface ge-1/1/3.0;
test-profile frloss;
mode initiate,terminate;
source-mac-address 00:00:00:00:11:11;
destination-mac-address 00:00:00:00:22:22;
ovlan-id 400;
service-type elan;
family bridge;
direction egress;
source-udp-port 200;
destination-udp-port 200;
test-iterator-duration 20;
}
}
}
[edit interfaces]
ge-1/1/6 {
flexible-vlan-tagging;
mtu 9192;
encapsulation flexible-ethernet-services;
unit 0 {
encapsulation vlan-bridge;
vlan-id 400;
}
}
ge-1/1/5 {
flexible-vlan-tagging;
mtu 9192;
encapsulation flexible-ethernet-services;
unit 0 {
encapsulation vlan-bridge;
vlan-id 400;
}
}
}
}
[edit bridge-domains]
bd1 {
vlan-id 500;
interface ge-1/1/6.0;
interface ge-1/1/5.0;
Verifying the Results of the Benchmarking Tests for Layer 2 Services (E-LAN) in Bridge Domains
Examine the results of the benchmarking tests that are performed on the configured
service between the ACX Router and the MX104 Router. Start the test on the reflector
first and then start the test on the initiator.
Purpose Verify that the necessary and statistical values are displayed for the benchmarking tests
that are run on the configured service between the ACX router and the MX104 router.
Action In operational mode, enter the show services rpm rfc2544-benchmarking test-id
test-id-number detail command on the ACX router.
Test-profile Configuration:
Test-profile name: tput
Test packet size: 128
Theoretical max bandwidth : 900000 kbps
Test Configuration:
Test mode: Initiate-and-Terminate
Duration in seconds: 20
Test finish wait duration in seconds: 1
Test family: Bridge
Test iterator pass threshold: 0.50 %
Test receive failure threshold: 0.00 %
Test transmit failure threshold: 0.50 %
Result of the iteration runs : Throughput Test complete for packet size 128
Best iteration : 1, Best iteration (pps) : 760135
Best iteration throughput : 100.00 %
Measured
Size overhead rate (pps) pps Packets Packets throughput %
bandwidth (kbps)
128 0 760135 760135 15202700 15202700 100.00 %
900000
Test Configuration:
Test mode: Reflect
Duration in seconds: 864000
Test finish wait duration in seconds: 1
Test family: Bridge
Test iterator pass threshold: 0.50 %
Test receive failure threshold: 0.00 %
Test transmit failure threshold: 0.50 %
You can also use the show services rpm rfc2544-benchmarking (aborted-test | active-tests
| completed-tests | summary) command to display information about the results of each
category or state of the RFC2544-based benchmarking tests for each real-time
performance monitoring (RPM) instance.
Meaning The output displays the details of the benchmarking test that was performed. For more
information about the run show services rpm rfc2544-benchmarking operational command,
see show services rpm rfc2544-benchmarking in the CLI Explorer.
Purpose Verify that the necessary and statistical values are displayed for the benchmarking tests
that are run on the configured service between the ACX router and the MX104 router.
Action In operational mode, enter the show services rpm rfc2544-benchmarking test-id
test-id-number detail command on the ACX router.
Test-profile Configuration:
Test-profile name: b2bt
Test packet size: 128 512
Theoretical max bandwidth : 950000 kbps
Test Configuration:
Test mode: Initiate-and-Terminate
Duration in seconds: 20
Test finish wait duration in seconds: 1
Test family: Bridge
Test iterator pass threshold: 0.50 %
Test receive failure threshold: 0.00 %
Test transmit failure threshold: 0.50 %
Result of the iteration runs : Back-Back Test complete for packet size 128
Best iteration : 1
Measured burst (num sec) : 20 sec
Measured burst (num pkts) : 16047280 packets
(packets) (packets)
1 4464280 4464280 0 20 20
Result of the iteration runs : Back-Back Test complete for packet size 512
Best iteration : 1
Measured burst (num sec) : 20 sec
Measured burst (num pkts) : 4464280 packets
Test Configuration:
Test mode: Reflect
Duration in seconds: 864000
Test finish wait duration in seconds: 1
Test family: Bridge
Test iterator pass threshold: 0.50 %
Test receive failure threshold: 0.00 %
Test transmit failure threshold: 0.50 %
You can also use the show services rpm rfc2544-benchmarking (aborted-test | active-tests
| completed-tests | summary) command to display information about the results of each
category or state of the RFC2544-based benchmarking tests for each real-time
performance monitoring (RPM) instance.
Meaning The output displays the details of the benchmarking test that was performed. For more
information about the run show services rpm rfc2544-benchmarking operational command,
see show services rpm rfc2544-benchmarking in the CLI Explorer.
Purpose Verify that the necessary and statistical values are displayed for the benchmarking tests
that are run on the configured service between the ACX router and the MX104 router.
Action In operational mode, enter the show services rpm rfc2544-benchmarking test-id
test-id-number detail command on the ACX router.
Test-profile Configuration:
Test-profile name: frloss
Test packet size: 1600
Theoretical max bandwidth : 1000000 kbps
Test Configuration:
Test mode: Initiate-and-Terminate
Duration in seconds: 20
Test finish wait duration in seconds: 1
Test family: Bridge
Test iterator pass threshold: 0.50 %
Test receive failure threshold: 0.00 %
Test transmit failure threshold: 0.50 %
Result of the iteration runs : Frame-loss test complete for packet size 1600
Percentage throughput transmitted: 100.00 %
Frame-loss rate (percent) : 0.00 %
Test Configuration:
Test mode: Reflect
Duration in seconds: 864000
Test finish wait duration in seconds: 1
Test family: Bridge
Test iterator pass threshold: 0.50 %
Test receive failure threshold: 0.00 %
Test transmit failure threshold: 0.50 %
You can also use the show services rpm rfc2544-benchmarking (aborted-test | active-tests
| completed-tests | summary) command to display information about the results of each
category or state of the RFC2544-based benchmarking tests for each real-time
performance monitoring (RPM) instance.
Meaning The output displays the details of the benchmarking test that was performed. For more
information about the run show services rpm rfc2544-benchmarking operational command,
see show services rpm rfc2544-benchmarking in the CLI Explorer.
Purpose Verify that the necessary and statistical values are displayed for the benchmarking tests
that are run on the configured service between the ACX router and the MX104 router.
Action In operational mode, enter the show services rpm rfc2544-benchmarking test-id
test-id-number detail command on the ACX router.
Test-profile Configuration:
Test-profile name: lty
Test packet size: 512
Theoretical max bandwidth : 1000000 kbps
Test Configuration:
Test mode: Initiate-and-Terminate
Duration in seconds: 20
Test finish wait duration in seconds: 1
Test family: Bridge
Test iterator pass threshold: 0.50 %
Test receive failure threshold: 0.00 %
Test transmit failure threshold: 0.50 %
Result of the iteration runs : Latency Test complete for packet size 512
Internal overhead per packet: 0
Avg (min) Latency : 43972
Avg (avg) latency : 45224
Avg (Max) latency : 47052
Avg (probe) latency : 45147
Test information :
Test id: 5, Test name: l2b-reflector, Test type: Reflect
Test mode: Reflect
Test packet size: 0
Test state: TEST_STATE_RUNNING
Status: Running
Test start time: 2014-09-24 22:32:55 PDT
Test finish time: TEST_RUNNING
Counters last cleared: Never
Test Configuration:
Test mode: Reflect
Duration in seconds: 864000
Test finish wait duration in seconds: 1
Test family: Bridge
Test iterator pass threshold: 0.50 %
Test receive failure threshold: 0.00 %
Test transmit failure threshold: 0.50 %
You can also use the show services rpm rfc2544-benchmarking (aborted-test | active-tests
| completed-tests | summary) command to display information about the results of each
category or state of the RFC2544-based benchmarking tests for each real-time
performance monitoring (RPM) instance.
Meaning The output displays the details of the benchmarking test that was performed. For more
information about the run show services rpm rfc2544-benchmarking operational command,
see show services rpm rfc2544-benchmarking in the CLI Explorer.
Junos OS supports inline video monitoring using Media Delivery Index (MDI) metrics.
Inline video monitoring is available on MX Series routers using only the following MPCs:
• MPCE1
• MPCE2
• MPC-16XGE
You use the video-monitoring statement at the [edit services] hierarchy level to specify
monitoring criteria for two key indicators of video traffic problems: delay factor and media
loss rate (MLR), and to apply these metrics to flows on designated interfaces.
Before you use the inline video monitoring feature, ensure that you understand the
following terms:
• delay factor —Delay factor is the maximum observed time difference between the
arrival of media data and the drain of media data. The expected drain rate is the
nominal, constant traffic rate for constant bit rate streams or the computed traffic
rate of variable rate media stream packet data.
For typical stream rates of 1 megabit per second and higher, an interval of one second
provides an adequate sample time. The delay factor indicates how long a data stream
must be buffered (delayed) at its nominal bit rate to prevent packet loss.
The delay factor suggests the minimum size of the buffer required at the next
downstream node. As a stream progresses, the variation of the delay factor indicates
packet bunching or packet gaps (jitter). Greater delay factor values also indicate that
more network latency is needed to deliver a stream due to the need to pre-fill a receive
buffer before beginning the drain to guarantee no underflow.
When the nominal drain bit rate at a receiving node is known, the delay factor’s
maximum indicates the size of buffer required to accommodate packet jitter.
• Media rate variation (MRV)—This value is the difference between the expected packet
rate and actual packet rate expressed as a percentage of the expected packet rate.
• Media loss rate (MLR)—This value is the number of media packets lost over a
configurable time interval (interval-duration,) where the flow packets are packets
carrying streaming application information. A single IP packet can contain zero or more
streaming packets. For example, an IP packet typically contains seven 188-byte MPEG
transport stream packets. In this case, a single IP packet loss results in seven lost
packets counted (if those seven lost packets did not include null packets). Including
out-of-order packets is important, because many stream consumer-type devices do
not attempt to reorder packets that are received out of order.
To configure the monitoring process, define criteria templates and apply them to the
interfaces and flows you want to monitor. Monitoring templates include the following
criteria:
• Threshold levels for media rate variation and media loss rate that trigger desired syslog
alerts
For each interface you want to monitor, you can define one or more filters to select flows
for monitoring. Flows are designated as input or output flows and are uniquely identified
by:
• Source IP address
• Source port
• Destination IP address
• Destination port
Junos OS supports the definition of filters for up to 256 flows, which can consist of input
flows, output flows, or a combination of input and output flows. These filters provide
criteria for selecting flows for monitoring. If the selection criteria consist of lists of IP
addresses or ports, you could exceed the maximum number of match conditions for
flows. Video monitoring selects a widely variable number of flows based on flow filters.
The total number of flows that can be measured at a time depends on the specific MPC
card being used, as shown in Table 12 on page 227.
When you do not define input or output flow fliters for a monitored interfaces, all flows
on the interface are subject to monitoring.
MPCE1 1000
MPCE2 2000
MPC-16XGE 4000
NOTE: Junos OS measures both UDP flows (the default) and RTP flows.
Junos OS differentiates media traffic over UDP or RTP by inspecting the first
byte in the UDP payload. If the first byte of the UDP payload is 0x47
(MPEG2-TS sync byte), the traffic is treated as media traffic over UDP. Traffic
is treated as media traffic over RTP if the version field is 2 and the payload
type is 33 in the RTP header. When neither of these criteria are met, the packet
is not considered for video monitoring.
For example,
2. Set the duration for sampling in seconds. Flow media delivery indexing statistics are
updated at the end of this interval.
NOTE: The media rate is the configured media bit rate for the stream. The
media rate is used to establish expected packets per second (pps).
The layer 3 packet rate in packets per second (pps) and is used to establish
expected bits per second (bps).
6. Set media loss rate thresholds for syslog message levels. You can set the threshold
based on number of packets lost, or percentage of packets lost.
Or
7. Set the media rate variation thresholds for syslog message levels. The threshold is
based on the ratio of the difference between the configured media rate and the
monitored media rate to the configured media rate, expressed as a percentage.
2. Identify input flows for monitoring. Flows are uniquely identified by source IP address,
source port, destination IP address, and destination port. You can restrict flow
measurement by specifying values for these identifiers. You can specify individual
addresses or ports or lists of addresses and ports. If you do not specify any identifiers,
all flows on the interface are monitored.
NOTE: You can configure a maximum of 256 flow definitions. If your flow
definitions contain lists of addresses and ports, you may exceed the
number of match conditions. When you exceed the limits for flows or
match conditions, you receive the following constraint message when you
commit:
'interfaces xe-0/2/2.0'
Number of flows or Number of match condition under flows exceeded
limit
error: configuration check-out failed
3. Identify output flows for monitoring, using the same options listed in Step 2.
The following examples show the syslog messages produced when configured video
monitoring thresholds are exceeded.
/var/log/messages
Mar 11 18:36:25 tstrtr01 fpc2 [MDI] DF: 56.71 ms, exceeded threshold for
flow(src:20.0.0.2 dst:30.0.0.2 sport:1024 dport:2048) ingressing at interface
Console Messages
NPC2(tstrtr01 vty)# [Mar 12 01:40:58.411 LOG: Critical] [MDI] MLR : 420, exceeded
threshold for flow (src:20.0.0.2 dst:30.0.0.2 sport:1024 dport:2048) ingressing
at interface xe-2/2/1.0 with template t1.
[Mar 12 01:40:58.411 LOG: Critical] [MDI] MRV : -14.89, exceeded threshold for
flow (src:20.0.0.2 dst:30.0.0.2 sport:1024 dport:2048) ingressing at interface
xe-2/2/1.0 with template t1.
[Mar 12 01:40:59.412 LOG: Critical] [MDI] DF: 141.74 ms, exceeded threshold for
flow(src:20.0.0.2 dst:30.0.0.2 sport:1024 dport:2048) ingressing at interface
xe-2/2/1.0 with template t1.
Configuration Statements
To configure flow monitoring and accounting properties, include the following statements
at the [edit forwarding-options] hierarchy level:
[edit forwarding-options]
accounting name {
output {
aggregate-export-interval seconds;
cflowd hostname {
aggregation {
autonomous-system;
destination-prefix;
protocol-port;
source-destination-prefix {
caida-compliant;
}
source-prefix;
}
autonomous-system-type (origin | peer);
port port-number;
version format;
}
flow-active-timeout seconds;
flow-inactive-timeout seconds;
interface interface-name {
engine-id number;
engine-type number;
source-address address;
}
}
}
monitoring name {
family family {
output {
cflowd hostname port port-number;
export-format format;
flow-active-timeout seconds;
flow-export-destination {
collector-pic;
}
flow-inactive-timeout seconds;
interface interface-name {
engine-id number;
engine-type number;
input-interface-index number;
output-interface-index number;
source-address address;
}
}
}
next-hop-group group-names {
interface interface-name {
next-hop address;
}
}
port-mirroring {
input {
rate rate;
run-length number;
maximum-packet-length bytes
}
family (inet | inet6) {
output {
interface interface-name {
next-hop address;
}
no-filter-check;
}
}
traceoptions {
file filename {
files number;
size bytes;
(world-readable | no-world-readable);
}
}
}
sampling {
disable;
sample-once;
input {
rate number;
run-length number;
max-packets-per-second number;
maximum-packet-length bytes;
}
traceoptions {
no-remote-trace;
file filename <files number> <size bytes> <match expression> <world-readable |
no-world-readable>;
}
family (inet | inet6 | mpls) {
disable;
output {
aggregate-export-interval seconds;
flow-active-timeout seconds;
flow-inactive-timeout seconds;
extension-service service-name;
flow-server hostname {
aggregation {
autonomous-system;
destination-prefix;
protocol-port;
source-destination-prefix {
caida-compliant;
}
source-prefix;
}
autonomous-system-type (origin | peer);
(local-dump | no-local-dump);
port port-number;
source-address address;
version format;
version9 {
template template-name;
}
}
interface interface-name {
engine-id number;
engine-type number;
source-address address;
}
file {
disable;
filename filename;
files number;
size bytes;
(stamp | no-stamp);
(world-readable | no-world-readable);
}
}
}
instance instance-name {
disable;
input {
rate number;
run-length number;
max-packets-per-second number;
maximum-packet-length bytes;
}
family (inet | inet6 | mpls) {
disable;
output {
aggregate-export-interval seconds;
flow-active-timeout seconds;
flow-inactive-timeout seconds;
extension-service service-name;
flow-server hostname {
aggregation {
autonomous-system;
destination-prefix;
protocol-port;
source-destination-prefix {
caida-compliant;
}
source-prefix;
}
autonomous-system-type (origin | peer);
(local-dump | no-local-dump);
port port-number;
source-address address;
version format;
version9 {
template template-name;
}
}
interface interface-name {
engine-id number;
engine-type number;
source-address address;
}
inline-jflow {
source-address address;
flow-export-rate rate;
}
}
}
}
}
NOTE: For the complete [edit forwarding-options] hierarchy, see the Routing
Policies, Firewall Filters, and Traffic Policers Feature Guide for Routing Devices.
This section documents only the statements used in flow monitoring and
accounting services.
To configure flow monitoring and accounting interfaces, include the following statements
at the [edit interfaces] hierarchy level:
[edit interfaces]
mo-fpc/pic/port {
unit logical-unit-number {
family inet {
accounting {
destination-class-usage;
source-class-usage direction;
}
}
address address {
destination address;
}
filter {
group filter-group-number;
input filter-name;
output filter-name;
}
receive-options-packets;
receive-ttl-exceeded;
sampling direction;
}
}
multiservice-options {
(core-dump | no-core-dump);
(syslog | no-syslog);
flow-control-options {
down-on-flow-control;
dump-on-flow-control;
reset-on-flow-control;
}
}
(at-fpc/pic/port | fe-fpc/pic/port | ge-fpc/pic/port) {
passive-monitor-mode;
}
so-fpc/pic/port {
unit logical-unit-number {
passive-monitor-mode;
}
}
[edit services]
dynamic-flow-capture {
capture-group client-name {
content-destination identifier {
address address;
hard-limit bandwidth;
hard-limit-target bandwidth;
soft-limit bandwidth;
soft-limit-clear bandwidth;
ttl hops;
}
control-source identifier {
allowed-destinations [ destinations ];
minimum-priority value;
no-syslog;
notification-targets address port port-number;
service-port port-number;
shared-key value;
source-addresses [ addresses ];
}
duplicates-dropped-periodicity seconds;
input-packet-rate-threshold rate;
interfaces interface-name;
max-duplicates number;
pic-memory-threshold percentage percentage;
}
g-duplicates-dropped-periodicity seconds;
g-max-duplicates number;
traceoptions{
file filename <files number> <size size> <world-readable | non-world-readable>;
}
}
To configure flow collection, include the flow-collector statement at the [edit services]
hierarchy level:
flow-collector {
analyzer-address address;
analyzer-id name;
destinations {
ftp:url {
password "password";
}
file-specification {
variant variant-number {
data-format format;
name-format format;
transfer {
record-level number;
timeout seconds;
}
}
}
interface-map {
collector interface-name;
file-specification variant-number;
interface-name {
collector interface-name;
file-specification variant-number;
}
}
retry number;
retry-delay seconds;
transfer-log-archive {
archive-sites {
ftp:url {
password "password";
username username;
}
}
filename-prefix prefix;
maximum-age minutes;
}
}
}
services {
flow-monitoring {
version9 {
template template-name {
flow-active-timeout seconds;
flow-inactive-timeout seconds;
ipv4-template {
nexthop-options {
mpls {
label-position [ positions ];
}
}
}
ipv6-template;
mpls-template {
label-position [ positions ];
}
mpls-ipv4-template {
label-position [ positions ];
}
option-refresh-rate {
packets packets;
seconds seconds;
}
peer-as-billing-template;
template-refresh-rate {
packets packets;
seconds seconds;
}
peer-as-billing-template;
option-refresh-rate packets;
template-refresh-rate packets;
}
}
}
}
To configure flow-tap services, include the flow-tap statement at the [edit services]
hierarchy level. You can also specify whether you want to apply the flow-tap service to
IPv4 traffic or IPv6 traffic by including the family inet | inet6 statement. If the family
statement is not included in the configuration, the flow-tap service is applied only to the
IPv4 traffic.
flow-tap {
interface interface-name;
Other statements are configured at the [edit interfaces] and [edit system] hierarchy
levels.
[edit services]
rpm {
bgp {
data-fill data;
data-size size;
destination-port port;
history-size size;
logical-system logical-system-name [routing-instances routing-instance-name];
moving-average-size number;
probe-count count;
probe-interval seconds;
probe-type type;
routing-instances instance-name;
test-interval interval;
}
probe owner {
test test-name {
data-fill data;
data-size size;
destination-interface interface-name;
destination-port port;
dscp-code-point dscp-bits;
hardware-timestamp;
history-size size;
moving-average-size number;
one-way-hardware-timestamp;
probe-count count;
probe-interval seconds;
probe-type type;
routing-instance instance-name;
source-address address;
target (url url | address address);
test-interval interval;
thresholds thresholds;
traps traps;
}
}
probe-server {
tcp {
destination-interface interface-name;
port number;
}
udp {
destination-interface interface-name;
port number;
}
}
probe-limit limit;
traceoptions {
file filename <files number> <match regular-expression > <size maximum-file-size>
<world-readable | no-world-readable>;
flag flag;
}
twamp {
server {
authentication-mode (authenticated | encrypted | none);
client-list list-name {
[ address address ];
}
inactivity-timeout seconds;
maximum-connections-duration hours;
maximum-connections count;
maximum-connections-per-client count;
maximum-sessions count;
maximum-sessions-per-connection count;
port number;
server-inactivity-timeout minutes;
}
}
rfc2544-benchmarking {
tests{
test-name test-name {
test-interface interface-name;
mode reflect;
family (inet | ccc);
destination-ipv4-address address;
destination-udp-port port-number;
source-ipv4-address address;
source-udp-port port-number;
direction (egress | ingress);
}
}
}
}
NOTE: RPM does not require an Adaptive Services (AS) or Multiservices PIC
or Multiservices Dense Port Concentrator (DPC) unless you are configuring
RPM timestamping as described in “Configuring RPM Timestamping” on
page 152.
accounting
address (Interfaces)
Related • Junos OS Network Interfaces Library for Routing Devices for other options not associated
Documentation with flow monitoring.
aggregate-export-interval
Description Specify the duration, in seconds, of the interval for exporting aggregate accounting
information.
Options seconds—Duration.
aggregation
Syntax aggregation {
autonomous-system;
destination-prefix;
protocol-port;
source-destination-prefix {
caida-compliant;
}
source-prefix;
}
Description For cflowd version 8 only, specify the type of data to be aggregated; cflowd records and
sends only those flows that match the specified criteria.
allowed-destinations
Description Identify flow capture destinations that are allowed in messages sent from this control
source.
analyzer-address
Description Configure an IP address for the packet analyzer that overrides the default value.
analyzer-id
Description Configure an identifier for the packet analyzer that overrides the default value.
archive-sites
Syntax archive-sites {
ftp:url {
password "password";
username username;
}
}
authentication-mode
Description Specify the authentication or encryption mode support for the TWAMP test protocol.
This statement is required in the configuration; if no authentication or encryption is
specified, you should set the value to none.
autonomous-system-type
Hierarchy Level [edit forwarding-options sampling instance instance-name family (inet |inet6 |mpls) output
flow-server hostname],
[edit forwarding-options sampling family (inet |inet6 |mpls) output flow-server hostname]
Default origin
Options origin—Export origin AS numbers of the packet source address in the Source Autonomous
System cflowd field.
peer—Export peer AS numbers through which the packet passed in the Source
Autonomous System cflowd field.
bgp
Syntax bgp {
data-fill data;
data-size size;
destination-port port;
history-size size;
logical-system logical-system-name <routing-instances routing-instance-name>;
moving-average-size size;
probe-count count;
probe-interval seconds;
probe-type type;
routing-instances instance-name;
test-interval interval;
}
Description Configure BGP neighbor discovery through Real-Time Performance Monitoring (RPM).
capture-group
Description Collect an aggregate of sampled flows and send the aggregate to a specified host system
that runs the collection utility cfdcollect.
You can configure up to one version 5 and one version 8 flow format at the [edit
forwarding-options accounting name output] hierarchy level.
Options hostname—The IP address or identifier of the host system (the workstation running the
cflowd utility).
client-list
Description List of allowed control client hosts that can connect to this server. Each entry is a Classless
Interdomain Routing (CIDR) address (IP address plus mask) that represents a network
of allowed hosts. You can configure more than one list, but you must configure at least
one client address to enable TWAMP. Each list can contain up to 64 entries.
collector
Description Configure the default flow collector interface for interface mapping.
content-destination
control-source
core-dump
Description A useful tool for isolating the cause of a problem. Core dumping is enabled by default.
The directory /var/tmp contains core files. The Junos OS saves the current core file (0)
and the four previous core files, which are numbered from 1 through 4 (from newest to
oldest):
data-fill
Description Specify the contents of the data portion of Internet Control Message Protocol (ICMP)
probes. The data-fill statement is not valid with the http-get or http-metadata-get probe
types.
data-format
Description Specify the data format for a specific file format variant.
data-size
Description Specify the size of the data portion of ICMP probes. The data-size statement is not valid
with the http-get or http-metadata-get probe type.
• The data-size default value is 32 bytes and 32 is the minimum value for
explicit configuration. The UDP timestamp probe type is an exception; it
requires a minimum data size of 52 bytes.
• The data-size must be at least 100 bytes smaller than the default MTU of
the interface of the RPM client interface.
destination (Interfaces)
Description For CoS on ATM interfaces, specify the remote address of the connection.
For point-to-point interfaces only, specify the address of the interface at the remote end
of the connection.
For tunnel and encryption interfaces, specify the remote address of the tunnel.
destination-interface
Description On M Series and T Series routers, specify a services (sp-) interface that adds a timestamp
to RPM probe messages. This feature is supported only with icmp-ping,
icmp-ping-timestamp, udp-ping, and udp-ping-timestamp probe types. You must also
configure the rpm statement on the sp- interface and include the unit 0 family inet
statement with a /32 address.
On M Series, MX Series, and T Series routers, specify a multiservices (ms-) interface that
adds a timestamp to RPM probe messages. This feature is supported only with icmp-ping,
icmp-ping-timestamp, udp-ping, and udp-ping-timestamp probe types. You must also
configure the rpm statement on the ms- interface and include the unit 0 family inet
statement with a /32 address.
To enable RPM for the extension-provider packages on the adaptive services interface,
configure the object-cache-size, policy-db-size, and package statements at the [edit
chassis fpc slot-number pic pic-number adaptive-services service-package
extension-provider] hierarchy level. For the extension-provider package, package-name
in the package package-name statement is jservices-rpm.
Release Information Statement introduced in Junos OS Release 12.3X52 for ACX Series routers.
Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
Description Specify the destination IPv4 address to be used in generated test frames. You must
configure this option if you specify inet as the family. This option is not required if you
specify cccas the family.
Release Information Statement introduced in Junos OS Release 12.3X53 for ACX Series routers.
Statement introduced in Junos OS Release 14.2 for MX104 3D Universal Edge Routers.
Description Specify the destination MAC address used in the generated test frames. This is a
mandatory parameter for family bridge.
Options mac-address—MAC address. Specify the MAC address as six hexadecimal bytes in one
of the following formats: nnnn.nnnn.nnnn or nn:nn:nn:nn:nn:nn—for example,
0011.2233.4455 or 00:11:22:33:44:55.
destination-port
Description Specify the User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) port
to which a probe is sent. This statement is used only for TCP or UDP probe types.
The value for the destination-port can be only 7 when you configure along with hardware
timestamping. A constraint check prevents you for configuring any other value for the
destination port in this case.
This constraint does not apply when you are using one-way hardware timestamping
along with destination-port and either probe-type udp-ping or probe-type
udp-ping-timestamp.
Release Information Statement introduced in Junos OS Release 12.3X52 for ACX Series routers.
Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
Description Specify the UDP port of the destination to be used in the UDP header for the generated
frames. If you do not specify the UDP port, the default value of 4041 is used.
destinations
Syntax destinations {
ftp:url {
password "password";
}
}
Release Information Statement introduced in Junos OS Release 12.3X52 for ACX Series routers.
Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
Description Specify the direction of the interface on which the test must be run. This parameter is
valid only for a ccc family and a bridge family. RFC2544 tests are supported only in the
egress direction or the user-to-network interface (UNI) direction of an E-line or E-LAN
service parameters in a bridge domain between two routers for unicast traffic. You cannot
compute the NNI direction of Ethernet services between two routers for multicast or
broadcast traffic.
Options egress—Run the test in the egress direction of the interface (network-to-network interface
(NNI)). This option is applicable for a ccc and bridge family.
ingress—Run the test in the ingress direction of the interface (user-to-network interface
(UNI)). You cannot configure this option for a bridge family.
Syntax disable;
dscp-code-point
Description Specify the value of the Differentiated Services (DiffServ) field within the IP header. The
DiffServ code point (DSCP) bits value must be set to a valid 6-bit pattern.
Options dscp-bits—A valid 6-bit pattern; for example, 001111, or one of the following configured
DSCP aliases:
• af11—Default: 001010
• af12—Default: 001100
• af13—Default: 001110
• af21—Default: 010010
• af22—Default: 010100
• af42 —Default:100100
• af43 —Default:100110
• be—Default: 000000
• cs1—Default: 001000
• cs2—Default: 010000
• cs3—Default: 011000
• cs4—Default: 100000
• cs5—Default: 101000
• cs6—Default: 110000
• cs7—Default: 111000
• ef—Default: 101110
• nc1—Default: 110000
• nc2—Default: 111000
duplicates-dropped-periodicity
Description Specify the frequency for sending notifications to affected control sources when
transmission of duplicate sets of data is restricted because the max-duplicates threshold
has been reached.
dynamic-flow-capture
Syntax dynamic-flow-capture {
capture-group client-name {
content-destination identifier {
address address;
hard-limit bandwidth;
hard-limit-target bandwidth;
soft-limit bandwidth;
soft-limit-clear bandwidth;
ttl hops;
}
control-source identifier {
allowed-destinations [ destinations ];
minimum-priority value;
no-syslog;
notification-targets address port port-number;
service-port port-number;
shared-key value;
source-addresses [ addresses ];
}
duplicates-dropped-periodicity seconds;
input-packet-rate-threshold rate;
interfaces interface-name;
max-duplicates number;
pic-memory-threshold percentage percentage;
}
g-duplicates-dropped-periodicity seconds;
g-max-duplicates number;
}
Description Specify the engine ID number for flow monitoring and accounting services.
engine-type
Description Specify the engine type number for flow monitoring and accounting services. The engine
type attribute refers to the type of the flow switching engine, such as the route processor
or a line module. The configured engine type is inserted in output cflowd packets. The
Source ID, a 32-bit value to ensure uniqueness for all flows exported from a particular
device, is the equivalent of the engine type and the engine ID fields.
export-format
extension-service
Hierarchy Level [edit forwarding-options sampling instance instance-name family (inet |inet6) output]
[edit forwarding-options sampling family (inet |inet6) output]
[edit services service-set service-set-name]
Options provider-specific rules—Provider-specific subhierarchy for services and service sets. See
the application-specific documentation for details.
Related • service-order
Documentation
• sampling on page 357
family (Monitoring)
Description Specify input and output interfaces and properties for flow monitoring. Only IPv4 (inet)
is supported.
Release Information Statement introduced in Junos OS Release 12.3X52 for ACX Series routers.
Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
bridge option introduced in Junos OS Release 12.3X53 for ACX Series routers.
bridge option introduced in Junos OS Release 14.2 for MX104 3D Universal Edge Routers.
Description Configure the address type family for the benchmarking test.
ccc—Run the test on a circuit cross-connect (CCC) or Ethernet pseudowire service. You
can run the RFC2544-based benchmarking test either in the egress or ingress
direction.
bridge—Indicates that the test is run on a Layer 2 Ethernet line (E- Line) or an Ethernet
LAN (E-LAN) service configured in a bridge domain. You can run the RFC2544-based
benchmarking test only in the egress direction or the user-to-network interface (UNI)
direction of an Ethernet line.
family (Sampling)
Description Configure the protocol family to be sampled. IPv4 (inet) is supported for most purposes,
but you can configure family mpls to collect and export MPLS label information or family
inet6 to collect and export IPv6 traffic using flow aggregation version 9.
file (Sampling)
Syntax file {
disable;
filename filename;
files number;
size bytes;
(stamp | no-stamp);
(world-readable | no-world-readable);
}
Description Configure information about the files that contain trace logging information.
Syntax file-specification {
variant variant-number {
data-format format;
name-format format;
transfer {
record-level number;
timeout seconds;
}
}
}
Description Configure the file format for the flow collection files.
Syntax file-specification {
variant variant-number;
}
filename
Hierarchy Level [edit forwarding-options sampling family (inet |inet6 |mpls) output file]
Options filename—Name of the file in which to place the traffic samples. All files are placed in
the directory /var/tmp.
filename-prefix
files
Description Configure the total number of files to be saved with samples or trace data.
Options number—Maximum number of traffic sampling or trace log files. When a file named
sampling-file reaches its maximum size, it is renamed sampling-file.0, then
sampling-file.1, and so on, until the maximum number of traffic sampling files is
reached. Then the oldest sampling file is overwritten.
Range: 1 through 100 files
Default: 5 files for sampling output; 10 files for trace log information
filter
Syntax filter {
input filter-name;
output filter-name;
group filter-group-number;
}
Description Apply a firewall filter to an interface. You can also use filters for encrypted traffic.
input filter-name—Name of one filter to evaluate when packets are received on the
interface.
output filter-name—Name of one filter to evaluate when packets are transmitted on the
interface.
Related • Routing Policies, Firewall Filters, and Traffic Policers Feature Guide for Routing Devices
Documentation or the Junos OS Administration Library for Routing Devices
flow-active-timeout
Related • Configuring Time Periods when Flow Monitoring is Active and Inactive on page 9
Documentation
• Configuring the Version 9 Template Properties on page 92
flow-collector
Syntax flow-collector {
analyzer-address address;
analyzer-id name;
destinations {
ftp:url {
password "password";
}
}
file-specification {
variant variant-number {
data-format format;
name-format format;
transfer {
record-level number;
timeout seconds;
}
}
}
interface-map {
collector interface-name;
file-specification variant-number;
interface-name {
collector interface-name;
file-specification variant-number;
}
}
retry number;
retry-delay seconds;
transfer-log-archive {
archive-sites {
ftp:url {
password "password";
username username;
}
}
filename-prefix prefix;
maximum-age minutes;
}
}
flow-export-destination
Syntax flow-export-destination {
(cflowd-collector | collector-pic);
}
collector-pic—Collector PIC.
flow-export-rate
Hierarchy Level [edit forwarding-options sampling instance instance-name family inet output inline-jflow]
flow-inactive-timeout
Related • Configuring Time Periods when Flow Monitoring is Active and Inactive on page 9
Documentation
• Configuring the Version 9 Template Properties on page 92
flow-server
Hierarchy Level [edit forwarding-options sampling instance instance-name family (inet |inet6 |mpls) output],
[edit forwarding-options sampling family (inet |inet6 |mpls) output]
Description Collect an aggregate of sampled flows and send the aggregate to a specified host system
that runs the collection utility cfdcollect. Specify a host system to collect sampled flows
using the version 9 format.
You can configure up to one version 5 and one version 8 flow format at the [edit
forwarding-options sampling family (inet | inet6| mpls) output flow-server hostname]
hierarchy level. For the same configuration, you can specify only either version 9 flow
record formats or formats using versions 5 and 8, not both types of formats.
Note that when you configure an IPv6 address for the flow-server statement,
you must also configure an IPv6 address for the inline-jflow source-address
statement at the [edit forwarding-options sampling instance instance-name
family (inet | inet6 | mpls) output] hierarchy level.
flow-table-size
Syntax flow-table-size {
ipv4-flow-table-size units;
ipv6-flow-table-size units;
ipv6-extended-attrib;
}
Description Configure the size of hash tables for inline services sampling.
flow-tap
Syntax flow-tap {
(interface interface-name | tunnel-interface interface-name | family (inet | inet6));
}
Options interface interface-name—Specify the interface name for the flow-tap application.
Syntax ftp:url;
Description Specify the primary and secondary destination FTP server addresses.
Options url—FTP server address. The URL can include the following macros, typed in braces:
• {%D}—Date
• {am_pm}—AM or PM
• {day}—From 01 through 31
• {hour_12}—From 01 through 12
• {hour_24}—From 00 through 23
• {ifalias}—Description string for the logical interface configured using the collector
statement at the [edit services flow-collector interface-map] hierarchy
• {minute}—From 00 through 59
• {month}—From 01 through 12
• {second}—From 00 through 60
• {time}—Time the file is created, using the {hour_24} {minute} {second} macros
• {time_zone}—Time zone code name of the locale; for example, gmt (this macro is not
supported).
• {year_abbr}—From 00 through 99
Syntax ftp:url;
Description Specify the primary and secondary destination FTP server addresses.
g-duplicates-dropped-periodicity
Description Specify the frequency for sending notifications to affected control sources when
transmission of duplicate sets of data is restricted because the g-max-duplicates threshold
has been reached. This setting is applied globally; the duplicates-dropped-periodicity
setting applied at the capture-group level overrides the global setting.
g-max-duplicates
Description Specify the maximum number of content destinations to which DFC PICs can send data
from a single input set of packets. Limiting the number of duplicates reduces the load
on the PIC. This setting is applied globally; the max-duplicates setting applied at the
capture-group level overrides the global setting.
hard-limit
Description Specify a bandwidth threshold at which the dynamic flow capture application begins
deleting criteria, until the bandwidth falls below the hard-limit-target value.
hard-limit-target
Description Specify a bandwidth threshold at which the dynamic flow capture application stops
deleting criteria.
hardware-timestamp
Syntax hardware-timestamp;
Description On MX Series routers, on M-320 routers using the Enhanced Queuing MPC, and on EX
Series switches only, enable timestamping of RPM probe messages in the Packet
Forwarding Engine host processor. This feature is supported only with icmp-ping,
icmp-ping-timestamp, udp-ping, and udp-ping-timestamp probe types.
This constraint does not apply when you are configuring one-way-hardware-timestamp.
history-size
host-outbound
Release Information Statement introduced in Junos OS Release 13.2 on MX Series 3D Universal Edge Routers.
Description Enable Layer 2 port mirroring of host-generated outbound packets only on MPCs on MX
Series 3D Universal Edge routers.
This statement enables all Routing Engine-generated Layer 2 injections to execute egress
logical interface filters.
Syntax udp-tcp-port-swap;
Release Information Statement introduced in Junos OS Release 12.3X53 for ACX Series routers.
Statement introduced in Junos OS Release 14.2 for MX Series routers.
Description Swaps source and destination UDP and TCP ports at the reflected frames.
Syntax in-service;
Release Information Statement introduced in Junos OS Release 12.3X53 for ACX Series routers.
Statement introduced in Junos OS Release 14.2 for MX104 3D Universal Edge Routers.
Description Runs the test in the in-service mode. In this mode, while the test is running, the rest of
the data traffic sent to and from the UNI port under test on the service are not interrupted.
Control protocol packets and control protocol peering are not interrupted.
If this mode is not configured, the test runs in the default out-of-service mode. In the
out-of-service mode, while the test is running, all the data traffic sent to and from the
UNI port under test on the service is interrupted. Control protocol peering is not interrupted
whereas control protocol packets such as CFM sessions are interrupted.
Default The default service mode for the reflecting egress interface for an E-LAN service is
out-of-service mode.
inline-jflow
Syntax inline-jflow {
source-address address;
flow-export-rate rate;
}
Hierarchy Level [edit forwarding-options sampling instance instance-name family inet output]
Description Specify inline flow monitoring for traffic from the designated address.
Syntax input {
maximum-packet-lengthbytes
rate number;
run-length number;
}
input (Sampling)
Syntax input {
max-packets-per-second number;
rate number;
run-length number;
maximum-packet-length bytes;
}
input-interface-index
Description Specify a value for the input interface index that overrides the default supplied by SNMP.
input-packet-rate-threshold
Description Specify a packet rate threshold value that triggers a system log warning message.
instance (Sampling)
Description Specify the AS PIC interface used with the flow-tap application. Any AS PIC available in
the router can be assigned, and any logical interface on the AS PIC can be used.
interface-map
Syntax interface-map {
collector interface-name;
file-specification variant-number;
interface-name {
collector interface-name;
file-specification variant-number;
}
}
Description Match an input interface with a flow collector interface and apply the preset file
specifications to the input interface.
Description Specify the DFC interface used with the control source configured in the same capture
group.
Syntax interfaces {
interface-name {
family {
inet {
input-flows {
input-flow-name {
source-address [ address ];
destination-address [ address ];
source-port [ port ];
destination-port [ port ];
template template-name;
}
}
output-flows {
output-flow-name {
source-address [ address ];
destination-address [ address ];
source-port [ port ];
destination-port [ port ];
template template-name;
}
}
}
}
}
}
Description Define video monitoring for specified input or output flows on selected interfaces.
port—Port number.
Range: 0 through 65,535
Syntax ip-swap;
Release Information Statement introduced in Junos OS Release 12.3X53 for ACX Series routers.
Statement introduced in Junos OS Release 14.2 for MX Series routers.
ipv4-flow-table-size
Description Configure the size of the IPv4 flow table in units of 256K entries.
NOTE: Any changes in the configured size of the flow has table sizes initiates
an automatic reboot of the FPC.
Options units—Number of 256K flow entries available for the IPv4 flow table.
Range: 1 through 15
Default: 15 (3840K)
ipv4-template
Syntax ipv4-template;
Description Specify that the flow aggregation version 9 template is used only for IPv4 records.
ipv6-flow-table-size
Description Configure the size of the IPv6 flow table in units of 256K entries.
NOTE: Any changes in the configured size of the flow has table sizes initiates
an automatic reboot of the FPC.
Options units—Number of 256K flow entries available for the IPv6 flow table.
Range: 1 through 15
Default: 1K
ipv6-extended-attrib
Syntax ipv6-extended-attrib;
Description Enable the inclusion of element ID, 54, fragmentIdentification, and element ID, 64,
ipv6ExtensionHeaders, in IPFIX flow templates that are exported to the flow collector
ipv6-template
Syntax ipv6-template;
Description Specify that the flow aggregation version 9 template is used only for IPv6 records.
label-position
Description Specify positions for up to three labels in the active flow monitoring version 9 template.
Default [1 2 3]
local-dump
Hierarchy Level [edit forwarding-options sampling instance instance-name family (inet |inet6 |mpls) output
flow-server hostname],
[edit forwarding-options sampling family (inet |inet6 |mpls) output flow-server hostname]
Options no-local-dump—Do not dump cflowd records to a log file before exporting.
logical-system
match
max-connection-duration
Description Specify the maximum time a connection can exist between a client and the server.
Options hours—Number of hours a connection can exist between a client and the server.
max-duplicates
Description Specify the maximum number of content destinations to which the DFC PIC can send
data from a single input set of packets. Limiting the number of duplicates reduces the
load on the PIC. This setting overrides the globally applied g-max-duplicates setting.
max-packets-per-second
Description Specify the traffic threshold that must be exceeded before packets are dropped. A value
of 0 instructs the Packet Forwarding Engine not to sample any traffic.
maximum-age
maximum-connections
Description Maximum number of allowed connections between the server and all control client hosts.
maximum-connections-per-client
Description Maximum number of allowed connections between the server and a single control client
host.
maximum-packet-length
Description Set the maximum length of the packet used for port mirroring or traffic sampling. Packets
with lengths greater than the specified maximum are truncated.
Options bytes—Maximum length (in bytes) of the mirrored packet or the sampled packet.
Range: 0 through 9216
Default: 0
For MX Series routers with Modular Port Concentrators (MPCs), port-mirrored or sampled
packets can be truncated (or clipped) to any length in the range of 1 to 255 bytes.
Only 1 to 255 are valid values for packet truncation on these devices. For other devices,
the range is from 0 to 9216. A maximum-packet-length value of zero represents that
truncation is disabled, and the entire packet is mirrored or sampled.
maximum-sessions
Description Maximum number of allowed test sessions the server can have running at one time.
maximum-sessions-per-connection
Description Maximum number of allowed sessions the server can open on a single client connection.
minimum-priority
Release Information Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
Description Specify the test mode for the packets that are sent during the benchmarking test.
Options reflect—Causes the test frames to be reflected on the chosen service (IPv4 or Ethernet).
monitoring
moving-average-size
mpls-ipv4-template
Syntax mpls-ipv4-template {
label-position [ positions ];
}
Description Specify the flow aggregation version 9 properties for templates that combine IPv4 and
MPLS records. The remaining statement is explained separately.
mpls-template
Syntax mpls-template {
label-position [ positions ];
}
Description Specify the flow aggregation version 9 properties for templates used only for MPLS
records. The remaining statement is explained separately.
multiservice-options
Syntax multiservice-options {
(core-dump | no-core-dump);
(syslog | no-syslog);
flow-control-options {
down-on-flow-control;
dump-on-flow-control;
reset-on-flow-control;
}
}
name-format
Description Specify the name format for a specific file format. The files may include supported macros.
Use macros to organize files on the external machine to which they are exported from
the collector PIC.
Options format—Specify the filename format, within quotation marks. The name format can
include the following macros, typed in braces:
• {%D}—Date
• {%I}—Description string for the logical interface configured using the collector
statement at the [edit services flow-collector interface-map] hierarchy level
• {am_pm}—AM or PM
• {day}—From01 through 31
• {hour_12}—From 01 through 12
• {hour_24}—From 00 through 23
• {ifalias}—Description string for the logical interface configured using the collector
statement at the [edit services flow-collector interface-map] hierarchy level
• {minute}—From 00 through 59
• {month}—From 01through 12
• {second}—From 00 through 60
• {time}—Time the file is created, using the {hour_24} {minute} {second} macros
• {time_zone}—Time zone code name of the locale; for example,gmt (this macro is not
supported).
• {year_abbr}—From 00 through 99
Hierarchy Level [edit forwarding-options port-mirroring family (inet | inet6) output interface interface-name]
Description Specify the next-hop address for sending copies of packets to an analyzer.
Description Specify the next-hop address for sending copies of packets to an analyzer.
It is implicitly assumed that a subgroup is up only if more than one interface in the
subgroup is up.
Options address—IP address of the next-hop router. Each next-hop group supports up to 16
next-hop addresses. Up to 30 next-hop groups are supported. Each next-hop group
must have at least two next-hop addresses.
no-filter-check
Syntax no-filter-check;
This statement is required when you send port-mirrored traffic to a Tunnel PIC that has
a filter applied to it.
Syntax no-remote-trace;
no-syslog
Syntax no-syslog;
Description Disable system logging of control protocol requests and responses. By default, these
messages are logged.
notification-targets
Description List of destination IP addresses and User Datagram Protocol (UDP) ports to which DFC
PICs log exception information and control protocol state transitions, such as timeout
values.
observation-domain-id
Description For IPFIX flows, an identifier of an Observation Domain is locally unique to an exporting
process of the templates. The export process uses the Observation Domain ID to uniquely
identify to the collection process in which the flows were metered. We recommend that
you configure this ID to be inquie for each IPFIX flow. A value of 0 indicates that no specific
Observation Domain is identified by this information element. Typically, this attribute is
used to limit the scope of other information elements. If the observation domain is not
unique, the collector cannot uniquely identify an IPFIX device.
If you configure the same Observation Domain ID for different template types, such as
for IPv4 and IPv6, it does not impact flow monitoring because the actual or the base
observation domain ID is transmitted in the flow. The actual observation domain ID is
derived from the value you configure and also in conjunction with other parameters such
as the slot number, lookup chip (LU) instance, Packet Forwarding Engine instance. Such
a method of computation of the observation domain ID ensures that this ID is not the
same for two IPFIX devices.
Options domain-id—Specify a unique identifier for the observation domain for IPFIX flows.
Range: 0 through 255
Related • Configuring Observation Domain ID and Source ID for Version 9 and IPFIX Flows on
Documentation page 106
• Configuring Template ID and Options Template ID for Version 9 and IPFIX Flows on
page 109
one-way-hardware-timestamp
Syntax one-way-hardware-timestamp;
Description Enable timestamping of RPM probe messages for one-way delay and jitter measurements.
You must configure this statement along with the destination-interface statement to
invoke timestamping. This feature is supported only with icmp-ping, icmp-ping-timestamp,
udp-ping, and udp-ping-timestamp probe types.
option-refresh-rate
options-template-id
Description Define a unique options template ID to be used for flow aggregation of version 9 and
IPFIX flows. If you do not configure values for the template ID and options template ID,
default values are assumed for these IDs, which are different for the various address
families. If you configure the same template ID or options template ID value for different
address families, such a setting is not processed properly and might cause unexpected
behavior. For example, if you configure the same template ID value for both IPv4 and
IPv6, the collector validates the export data based on the template ID value that it last
receives. In this case, if IPv6 is configured after IPv4, the value is effective for IPv6 and
the default value is used for IPv4.
Options id—Specify a unique identifier for the options template to be used for version 9 or IPFIX
flows.
Range: 1024 through 65535
Related • Configuring Observation Domain ID and Source ID for Version 9 and IPFIX Flows on
Documentation page 106
• Configuring Template ID and Options Template ID for Version 9 and IPFIX Flows on
page 109
output (Accounting)
Syntax output {
aggregate-export-interval seconds;
cflowd hostname {
aggregation {
autonomous-system;
destination-prefix;
protocol-port;
source-destination-prefix {
caida-compliant;
}
source-prefix;
}
autonomous-system-type (origin | peer);
(local-dump | no-local-dump);
port port-number;
source-address address;
version format;
}
flow-active-timeout seconds;
flow-inactive-timeout seconds;
interface interface-name {
engine-id number;
engine-type number;
source-address address;
}
}
output (Monitoring)
Syntax output {
cflowd hostname port port-number;
export-format format;
flow-active-timeout seconds;
flow-export-destination {
(cflowd-collector | collector-pic);
}
flow-inactive-timeout seconds;
interface interface-name {
engine-id number;
engine-type number;
input-interface-index number;
output-interface-index number;
source-address address;
}
}
Syntax output {
interface interface-name {
next-hop address;
}
no-filter-check;
}
output (Sampling)
Syntax output {
aggregate-export-interval seconds;
flow-active-timeout seconds;
flow-inactive-timeout seconds;
extension-service service-name;
flow-server hostname {
aggregation {
autonomous-system;
destination-prefix;
protocol-port;
source-destination-prefix {
caida-compliant;
}
source-prefix;
}
autonomous-system-type (origin | peer);
(local-dump | no-local-dump);
port port-number;
source-address address;
version format;
version9 {
template template-name;
}
}
interface interface-name {
engine-id number;
engine-type number;
source-address address;
}
file {
disable;
filename filename;
files number;
size bytes;
(stamp | no-stamp);
(world-readable | no-world-readable);
}
inline-jflow {
source-address address;
flow-export-rate rate;
}
}
Hierarchy Level [edit forwarding-options sampling instance instance-name family (inet |inet6 |mpls)],
[edit forwarding-options sampling family (inet |inet6 |mpls)]
Description Configure cflowd or flow monitoring, output files and interfaces, and flow properties.
output-interface-index
Description Specify a value for the output interface index that overrides the default supplied by SNMP.
passive-monitor-mode
Syntax passive-monitor-mode;
Description For Asynchronous Transfer Mode (ATM), SONET/SDH, Fast Ethernet, and Gigabit Ethernet
interfaces only, monitor packet flows from another router. If you include this statement
in the configuration, the SONET/SDH interface does not send keepalives or alarms, and
does not participate actively on the network.
Description Specify the primary and secondary destination FTP server password.
Description Specify the primary and secondary destination FTP server password.
peer-as-billing-template
Syntax peer-as-billing-template;
Description Enables the extraction of bandwidth usage information for billing purposes in PIC-based
sampling configurations. This capability is supported on routers and applies only to IPv4
and IPv6 traffic.
pic-memory-threshold
Description Specify a PIC memory usage percentage that triggers a system log warning message.
pop-all-labels
Syntax pop-all-labels {
required-depth number;
}
Description For passive monitoring on ATM, SONET/SDH, Fast Ethernet, and Gigabit Ethernet
interfaces only, removes up to two MPLS labels from incoming IP packets. For passive
monitoring on T Series devices, removes up to five MPLS labels from incoming IP packets.
This statement has no effect on IP packets with more than two MPLS labels, or IP packets
with more than five MPLS labels on T Series devices. Packets with MPLS labels cannot
be processed by the monitoring PIC; if packets with MPLS labels are forwarded to the
monitoring PIC, they are discarded.
Default If you omit this statement, the MPLS labels are not removed, and the packet is not
processed by the monitoring PIC.
Description Specify the User Datagram Protocol (UDP) port number on the cflowd host system or
flow server.
port (RPM)
Options number—Port number for the probe server. The value can be 7 or 49,160 through 65,535.
port (TWAMP)
pre-rewrite-tos
Syntax pre-rewrite-tos;
Description Preserve prenormalized type-of-service (ToS) value for egress sampled or mirrored
packets. This configuration preserves the prerewrite ToS value for all forms of sampling,
such as Routing Engine-based sampling, port mirroring, flow monitoring, and so on. This
statement is effective for egress sampling only.
probe
Description Specify an owner name. The owner name combined with the test name represent a single
RPM configuration instance.
probe-count
probe-interval
probe-limit
probe-server
Syntax probe-server {
tcp {
destination-interface interface-name;
port number;
}
udp {
destination-interface interface-name;
port number;
}
}
probe-type
• http-get—(Not available at the [edit services rpm bgp] hierarchy level.) Sends a
Hypertext Transfer Protocol (HTTP) get request to a target URL.
Description Set a ratio of the number of packets to be sampled. For example, if you specify a rate of
10, every tenth packet (1 packet out of 10) is sampled.
Native analyzer sessions (that is, the [edit forwarding-options analyzer analyzer-name
input] hierarchy level for MX Series routers) can be configured without specifying input
parameters, which would mean that the instance uses default input values: rate = 1 and
maximum-packet-length = 0.
receive-options-packets
Syntax receive-options-packets;
Description When you enable passive monitoring, this statement is required for conformity with
cflowd records structure.
receive-ttl-exceeded
Syntax receive-ttl-exceeded;
Description When you enable passive monitoring, this statement is required for conformity with
cflowd records structure.
Release Information Statement introduced in Junos OS Release 12.3X52 for ACX Series routers.
Statement introduced in Junos OS Release 14.2 for MX104 3D Universal Edge Routers.
Options mac-rewrite—(ACX Series routers only) Enable rewriting of the MAC address on the
reflected frames. The MAC addresses specified in the source-mac-address and
destination-mac-address options are used.
mac-swap—Swaps the source and destination MAC addresses in the test frame. This is
the default behavior.
NOTE: In bridge families, when the service type is ELAN, MAC addresses
are swapped by default, on the reflected frames. And, when the service
type is ELINE , MAC addresses are not swapped by default.
no-mac-swap—Does not swap the source and destination MAC addresses in the test
frame. The frame is returned to the originator without any modification to the MAC
addresses.
no-ip-swap—(ACX Series routers only) Does not swap the source and destination IP
addresses in the test frame. The frame is returned to the originator without any
modification to the IP addresses. This parameter is applicable for bridge families
and it is optional for bridge families.
no-udp-tcp-port-swap—(ACX Series routers only) Does not swap the TCP and UDP ports
in the test frame. This parameter is applicable for bridge families and it is optional
for bridge families.
required-depth
Description For passive monitoring on ATM, SONET/SDH, Fast Ethernet, and Gigabit Ethernet
interfaces only, specify the number of MPLS labels an incoming packet must have for
the pop-all-labels statement to take effect.
If you include the required-depth 1 statement, the pop-all-labels statement takes effect
for incoming packets with one label only. If you include the required-depth 2 statement,
the pop-all-labels statement takes effect for incoming packets with two labels only.
Description Configure the maximum number of attempts the flow collector interface will make to
transfer log files to the FTP server.
retry-delay
Description Configure the amount of time the flow collector interface waits between retry attempts.
rfc2544-benchmarking
Syntax rfc2544-benchmarking {
tests{
test-name test-name {
test-interface interface-name;
mode reflect;
family (bridge| inet | ccc);
destination-ipv4-address address;
destination-udp-port port-number;
source-ipv4-address address;
source-udp-port port-number;
direction (egress | ingress);
}
}
}
Release Information Statement introduced in Junos OS Release 12.3X52 for ACX Series routers.
Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
Description Configure the parameters for the RFC 2544-based benchmarking test. You must configure
a test profile, which specifies the type of test and the manner in which it must be
performed, and associate the test profile with a test name. The test name that you
configure contains details, such as the address family and the test mode, for the test.
You can associate the same test profile with multiple test names.
routing-instance
Options instance-name—A routing instance configured at the [edit routing-instance] hierarchy level.
Default: Internet routing table inet.0.
routing-instances
rpm (Interfaces)
Description Associate an RPM client (router or switch that originates RPM probes) or RPM server
with a specified interface.
rpm (Services)
Syntax rpm {
bgp {
data-fill data;
data-size size;
destination-port port;
history-size size;
logical-system logical-system-name <routing-instances routing-instance-name>;
moving-average-size number;
probe-count count;
probe-interval seconds;
probe-type type;
routing-instances instance-name;
test-interval interval;
}
Usage Guidelines See “Configuring BGP Neighbor Discovery Through RPM” on page 158.
run-length
Description Set the number of samples following the initial trigger event. The configuration enables
you to sample packets following those already being sampled.
sample-once
Syntax sample-once;
Syntax sampling {
disable;
sample-once;
family (inet | inet6 | mpls) {
disable;
output {
aggregate-export-interval seconds;
extension-service service-name;
file {
disable;
filename filename;
files number;
size bytes;
(stamp | no-stamp);
(world-readable | no-world-readable);
}
flow-active-timeout seconds;
flow-inactive-timeout seconds;
flow-server hostname {
aggregation {
autonomous-system;
destination-prefix;
protocol-port;
source-destination-prefix {
caida-compliant;
}
source-prefix;
}
autonomous-system-type (origin | peer);
(local-dump | no-local-dump);
port port-number;
source-address address;
version format;
version9 {
template template-name;
}
}
interface interface-name {
engine-id number;
engine-type number;
source-address address;
}
}
}
input {
max-packets-per-second number;
maximum-packet-length bytes;
rate number;
run-length number;
}
instance instance-name {
disable;
sampling (Interfaces)
input output—On a single interface, configure at least one expected ingress point and
one expect egress point.
server
Syntax server {
client-list list-name {
[ address address ];
}
inactivity-timeout seconds;
maximum-connections count;
maximum-connections-per-client count;
maximum-sessions count;
maximum-sessions-per-connection count;
port number;
}
server-inactivity-timeout
Description The maximum time the Two-Way Active Measurement Protocol (TWAMP) server has
to finish the TWAMP control protocol negotiation.
Options minutes—Number of minutes the TWAMP server has to finish the TWAMP control protocol
negotiation.
Default: 15 minutes
Range: 1-30 minutes
service-port
Description Identify the User Datagram Protocol (UDP) port number for control protocol requests.
Release Information Statement introduced in Junos OS Release 12.3X53 for ACX Series routers.
Statement introduced in Junos OS Release 14.2 for MX104 3D Universal Edge Routers.
Description Mention the service under test. Possible values are elan and eline. This statement is
applicable only for the bridge family or when the mode is configured as reflect. When the
service type is elan, MAC addresses are swapped by default on the reflected frames. The
no-mac-swap is not supported in this service type. When the service type is eline, MAC
addresses are not swapped by default in the reflected frames. Use the mac-swap option
to swap the addresses.
services (RPM)
shared-key
Options value—Secret authentication value shared between a control source and destination.
size
Description Specify the maximum size of each file containing sample or log data. The file size is
limited by the number of files to be created and the available hard disk space.
When a traffic sampling file named sampling-file reaches the maximum size, it is renamed
sampling-file.0. When the sampling-file again reaches its maximum size, sampling-file.0
is renamed sampling-file.1 and sampling-file is renamed sampling-file.0. This renaming
scheme continues until the maximum number of traffic sampling files is reached. Then
the oldest traffic sampling file is overwritten.
Options bytes—Maximum size of each traffic sampling file or trace log file, in kilobytes
(KB), megabytes (MB), or gigabytes (GB).
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your router
Default: 1 MB for sampling data; 128 KB for log information
soft-limit
Description Specify a bandwidth threshold at which congestion notifications are sent to each control
source of the criteria that point to this content destination. If the control source is
configured with the syslog statement, a log message will also be generated.
soft-limit-clear
Description Specify a bandwidth threshold at which the latch set by the soft-limit threshold is cleared.
source-address (Services)
Description Specify the source IP address used for probes. If the source IP address is not one of the
router’s or switch’s assigned addresses, the packet will use the outgoing interface’s
address as its source.
source-addresses
Description List of IP addresses from which the control source can send control protocol requests
to the Juniper Networks router.
source-id
Description For version 9 flows, a 32-bit value that identifies the Exporter Observation Domain is
called the source ID. NetFlow collectors use the combination of the source IP address
and the source ID field to separate different export streams originating from the same
exporter.
Options source-id—Specify a unique identifier for the source for version 9 flows.
Range: 0 through 255
Related • Configuring Observation Domain ID and Source ID for Version 9 and IPFIX Flows on
Documentation page 106
• Configuring Template ID and Options Template ID for Version 9 and IPFIX Flows on
page 109
Release Information Statement introduced in Junos OS Release 12.3X52 for ACX Series routers.
Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
Description Specify the source IPv4 address to be used in generated test frames. This parameter is
optional for both ccc and inet families. If you do not configure the source IPv4 address
for an inet family, the source address of the interface is used to transmit the test frames.
Release Information Statement introduced in Junos OS Release 12.3X53 for ACX Series routers.
Statement introduced in Junos OS Release 14.2 for MX104 3D Universal Edge Routers.
Description Specify the source MAC address used in generated test frames. This parameter is
applicable for a bridge family.
Options mac-address—Source MAC address. Specify the MAC address as six hexadecimal bytes
in one of the following formats: nnnn.nnnn.nnnn or nn:nn:nn:nn:nn:nn; for example,
0011.2233.4455 or 00:11:22:33:44:55.
Release Information Statement introduced in Junos OS Release 12.3X52 for ACX Series routers.
Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
Description Specify the UDP port of the source to be used in the UDP header for the generated frames.
If you do not specify the UDP port, the default value of 4041 is used.
stamp
Hierarchy Level [edit forwarding-options sampling family (inet |inet6 |mpls) output file]
syslog
Description System logging is enabled by default. The system log information of the Monitoring
Services PIC is passed to the kernel for logging in the/var/log directory.
Description Specify the destination address or URL used for the probes.
Options url url—For HTTP probe types, specify a fully formed URL that includes http:// in the URL
address.
address address—For all other probe types, specify an IPv4 address for the target host.
tcp
Syntax tcp {
destination-interface interface-name;
port port;
}
templates
Syntax templates {
template-name {
interval-duration interval-duration;
inactive-timeout inactive-timeout;
rate {
(layer3 layer3-packets-per-second | media media-bits-per-second);
}
delay-factor {
;
threshold {
(info | warning | critical) delay-factor-threshold;
}
}
media-loss-rate {
disable;
threshold {
(info | warning | critical) percentage mlr-percentage | packet-count mlr-packet-count);
}
}
media-rate-variation {
disable;
threshold {
(info | warning | critical) mrv-variation;
}
}
media-packets-count-in-layer3 media-packets-count-in-layer3;
media-packet-size media-packet-size;
}
}
Description Configure the media delivery index template containing the measurement parameters
for video monitoring.
mrv-variation—Media rate variation threshold. The variation is the ratio of actual media
rate to the configured media rate, expressed as a percentage.
test
Description Specify the range of probes over which the standard deviation, average, and jitter are
calculated. The test name combined with the owner name represent a single RPM
configuration instance.
Syntax tests {
test-name test-name {
test-interface interface-name;
mode reflect;
family (inet | ccc);
destination-ipv4-address address;
destination-udp-port port-number;
source-ipv4-address address;
source-udp-port port-number;
direction (egress | ingress);
}
}
Release Information Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
Description Specify the attributes of the test iteration, such as the address family (type of service,
IPv4 or Ethernet), the logical interface, test duration, and test packet size, that are used
for a benchmarking test to be run. The test name combined with the test profile represent
a single real-time performance monitoring (RPM) configuration instance.
Options tests—Define the test iteration for the RFC 2544-based benchmarking test.
Release Information Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
Description Specify the logical interface on which the RFC 2544-based benchmarking test is run. If
you configure an inet family and the test mode to initiate and terminate test frames on
the same device, the interface you configure is not effective. Instead, the test is run on
the egress logical interface that is determined using route lookup on the specified
destination IPv4 address. If you configure an inet family and the test mode to reflect the
frames back on the sender from the other end, the logical interface is used as the interface
to enable the reflection service (reflection is performed on the packets entering the
specified interface). If you not configure the logical interface for reflection test mode, a
lookup is performed on the source IPv4 address to determine the interface that hosts
the address.
Options interface-name—Name of the logical interface on which the test needs to be run.
test-interval
Release Information Statement introduced in Junos OS Release 13.3 for MX104 3D Universal Edge Routers.
Description Define the name of the RFC 2544-based benchmarking test. For each unique test name
that you configure, you can specify a test profile, which contains the settings for a test
and its type, and also a test interface, which contains the settings for test packets that
are sent and received on the selected interface.
thresholds
Description Specify thresholds used for the probes. A system log message is generated when the
configured threshold is exceeded. Likewise, an SNMP trap (if configured) is generated
when a threshold is exceeded.
Options thresholds—Specify one or more threshold measurements. The following options are
supported:
• total-loss—Measures total probe loss count indicating test failure, from 0 through 15.
Syntax traceoptions {
no-remote-trace;
file filename <files number> <size bytes> <match expression> <world-readable |
no-world-readable>;
}
traceoptions (RPM)
Syntax traceoptions {
file filename <files number> <match regular-expression > <size maximum-file-size>
<world-readable | no-world-readable>;
flag flag;
}
Options file filename—Name of the file to receive the output of the tracing operation. All files are
placed in the directory /var/log.
Default: rmopd
files number—(Optional) Maximum number of trace files to create before overwriting the
oldest one. If you specify a maximum number of files, you also must specify a
maximum file size with the size option.
Range: 2 through 1000
Default: 3 files
match regular-expression—(Optional) Refine the output to include lines that contain the
regular expression.
size maximum-file-size—(Optional) Maximum size of each trace file. By default, the number
entered is treated as bytes. Alternatively, you can include a suffix to the number to
indicate kilobytes (KB), megabytes (MB), or gigabytes (GB). If you specify a maximum
file size, you also must specify a maximum number of trace files with the files option.
Range: 10 KB through 1 GB
Default: 128 KB
no-world-readable—(Default) Disable unrestricted file access. This means the log file
can be accessed only by the user who configured the tracing operation.
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. You can include the following flags:
• all—Trace all operations.
• statistics—Trace statistics.
transfer
Syntax transfer {
record-level number;
timeout seconds;
}
Description Specify when to send the flow collection file. The file is sent when either of the two
conditions is met.
transfer-log-archive
Syntax transfer-log-archive {
archive-sites {
ftp:url {
password "password";
username username;
}
}
filename-prefix prefix;
maximum-age minutes;
}
Description Configure the filename prefix, maximum age, and destination FTP server for log files
containing the transfer activity history for a flow collector interface.
traps
Description Set the trap bit to generate traps for probes. Traps are sent if the configured threshold
is met or exceeded.
Options traps—Specify one or more traps. The following options are supported:
• test-failure—Generates traps when the total probe loss threshold is met or exceeded.
ttl
twamp
Syntax twamp {
server {
authentication-mode mode;
client-list list-name {
[ address address ];
}
inactivity-timeout seconds;
max-connection-duration hours;
maximum-connections count;
maximum-connections-per-client count;
maximum-sessions count;
maximum-sessions-per-connection count;
port number;
server-inactivity-timeout minutes;
}
}
twamp-server
Syntax twamp-server;
Description Specify the service PIC logical interface to provide the TWAMP service.
Hierarchy Level [edit forwarding-options sampling instance instance-name family (inet |inet6 |mpls) output
flow-server hostname version9],
[edit forwarding-options sampling family (inet |inet6 |mpls) output flow-server hostname
version9]
Description Specify flow monitoring version 9 template to be used for output of sampling records.
template-id
Description Define a template ID to be used for flow aggregation of version 9 and IPFIX flows. If you
do not configure values for the template ID and options template ID, default values are
assumed for these IDs, which are different for the various address families. If you configure
the same template ID or options template ID value for different address families, such
a setting is not processed properly and might cause unexpected behavior. For example,
if you configure the same template ID value for both IPv4 and IPv6, the collector validates
the export data based on the template ID value that it last receives. In this case, if IPv6
is configured after IPv4, the value is effective for IPv6 and the default value is used for
IPv4.
Options id—Specify a unique identifier for the template to be used for version 9 or IPFIX flows.
Range: 1024 through 65535
Related • Configuring Observation Domain ID and Source ID for Version 9 and IPFIX Flows on
Documentation page 106
• Configuring Template ID and Options Template ID for Version 9 and IPFIX Flows on
page 109
template-refresh-rate
trio-flow-offload
Description Enable any plug-in or daemon on a PIC to generate a flow offload request to of-load
flows to the Packet Forwarding Engine. This command is available on MX Series routers
with Modular Port Concentrators (MPCs) and Modular Interface Cards (MICs).
Options minimum-bytes—The minimum number of bytes that trigger offloading. When this option
is omitted, offloading is triggered when both the forward and reverse flows of the
session have begun, meaning that at least one packet has flowed in each direction.
udp
Syntax udp {
destination-interface interface-name;
port port;
}
unit
Description Configure a logical interface on the physical device. You must configure a logical interface
to be able to use the physical device.
Related • Junos OS Network Interfaces Library for Routing Devices for other statements that do
Documentation no affect services interfaces.
username (Services)
variant
version
Description Specify the version format of the aggregated flows exported to a cflowd server.
Syntax version9 {
template template-name;
}
Hierarchy Level [edit forwarding-options sampling instance instance-name family (inet |inet6 |mpls) output
flow-server hostname],
[edit forwarding-options sampling family (inet |inet6 |mpls) output flow-server hostname]
Description Specify flow monitoring version 9 properties to apply to output sampling records. The
remaining statements are explained separately.
video-monitoring
Syntax video-monitoring {
templates {
template-name {
interval-duration interval-duration;
inactive-timeout inactive-timeout;
rate {
(layer3 layer3-packets-per-second | media media-bits-per-second);
}
delay-factor {
disable;
threshold {
(info | warning | critical) delay-factor-threshold;
}
}
media-loss-rate {
disable;
threshold {
(info | warning | critical) percentage mlr-percentage | packet-count
mlr-packet-count);
}
}
media-rate-variation {
;
threshold {
(info |warning | critical) mrv-variation;
}
}
media-packets-count-in-layer3 media-packets-count-in-layer3;
media-packet-size media-packet-size;
}
}
interfaces {
interface-name {
family {
inet {
input-flows {
input-flow-name {
source-address [ address ];
destination-address [ address ];
source-port [ port ];
destination-port [ port ];
template template-name;
}
}
output-flows {
output-flow-name {
source-address [ address ];
destination-address [ address ];
source-port [ port ];
destination-port [ port ];
template template-name;
}
}
}
}
}
}
}
Description Define the options for video monitoring using media delivery index options for metrics.
The remaining statements are explained separately.
world-readable
Operational Commands
Description (M40e, M160, and M320 routers and T Series routers only) Clear statistics for one passive
monitoring interface or for all passive monitoring interfaces.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
clear passive-monitoring statistics
user@host> clear passive-monitoring statistics interface mo-5/0/0
Release Information Command introduced in Junos OS Release 14.2 for MX Series routers.
Options fpc-slot slot-number—Clear inline flow statistics for the specified FPC.
Sample Output
clear services accounting statistics inline-jflow
user@host> regress@mobsoln480b# run clear services accounting statistics inline-jflow fpc-slot
5
Statistics Cleared
Release Information Command introduced in Junos OS Release 14.2 for MX Series routers.
Options fpc-slot slot-number—Clear inline flow statistics for the specified FPC.
Sample Output
clear services accounting statistics inline-jflow
user@host> regress@mobsoln480b# run clear services accounting statistics inline-jflow fpc-slot
5
Statistics Cleared
Description (M320 routers and T Series routers only) Clear dynamic flow capture information for
specified capture group.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
clear services dynamic-flow-capture
user@host> clear services dynamic-flow-capture capture-group flow-a
Description (M40e, M160, and M320 routers and T Series routers only) Clear statistics for one flow
collector interface or for all flow collector interfaces.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
clear services flow-collector statistics
user@host> clear services flow-collector statistics interface cp-5/0/0
Flow collector interface: cp-5/0/0
Interface state: Collecting flows
Statistics cleared successfully
Description Clear connections established between the real-time performance monitoring (RPM)
Two-Way Active Measurement Protocol (TWAMP) server and control clients. By default
all established connections are cleared (along with the sessions on those connections).
To clear only a specific connection, specify the connection ID when you issue the
command.
Description Clear all media delivery index statistics counters except for active flows.
Description (M40e, M160, and M320 routers and T Series routers only) Switch to the primary File
Transfer Protocol (FTP) server that is configured as a flow collector.
cp-fpc/pic/port—Specify the flow collector interface name for the primary destination.
clear-files—(Optional) Request clearing of existing data files in the FTP wait queue when
the switch takes place.
clear-logs—(Optional) Request clearing of existing logs when the switch takes place.
immediately | gracefully—(Optional) Specify whether you want the switch to take place
immediately, or to affect only newly created files.
List of Sample Output request services flow-collector change-destination primary interface on page 405
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request services flow-collector change-destination primary interface
user@host> request services flow-collector change-destination primary interface cp-6/0/0
Flow collector interface: cp-6/0/0
Interface state: Collecting flows
Destination change successful
Description (M40e, M160, and M320 routers and T Series routers only) Switch to the secondary File
Transfer Protocol (FTP) server that is configured as a flow collector.
clear-files—(Optional) Request clearing of existing data files in the FTP wait queue when
the switch takes place.
clear-logs—(Optional) Request clearing of existing logs when the switch takes place.
immediately | gracefully—(Optional) Specify whether you want the switch to take place
immediately, or to affect only newly created files.
List of Sample Output request services flow-collector change-destination secondary interface on page 406
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request services flow-collector change-destination secondary interface
user@host> request services flow-collector change-destination secondary interface cp-6/0/0
Flow collector interface: cp-6/0/0
Interface state: Collecting flows
Destination change successful
Description (M40e, M160, and M320 routers, PTX Series, and T Series routers only) Transfer a test
file to the primary or secondary File Transfer Protocol (FTP) server that is configured as
a flow collector. This command verifies that the output side of the flow collector interface
is operating properly.
interface all | cp-fpc/pic/port)—Transfer a test file of flows from all configured flow
collector interfaces or from only the specified interface.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request services flow-collector test-file-transfer
user@router> request services flow-collector test-file-transfer test_file interface cp-7/1/0
channel-one primary
Output Fields Table 13 on page 408 lists the output fields for the show forwarding-options next-hop-group
command. Output fields are listed in the approximate order in which they appear.
Type Next-hop group type, such as inet, inet6 or layer-2. All levels
Members Interfaces Names of interfaces to which next-hop group members belong. brief detail
Member Subgroup Names of subgroups to which next-hop group members belong. brief detail
Sample Output
show forwarding-options next-hop-group terse
user@host> show forwarding-options next-hop-group terse
Next-hop-group Type State
nhg inet up
nhg6 inet6 up
vpls_nhg_2 layer-2 down
Next-hop-group: nhg
Type: inet
State: up
Members Interfaces:
ge-0/2/8.0 next-hop 30.1.1.10
ge-5/1/8.0 next-hop 10.1.1.10
ge-5/1/9.0 next-hop 20.1.1.10
Next-hop-group: nhg6
Type: inet6
State: up
Members Interfaces:
ge-5/1/5.0 next-hop 10::1:1:10
ge-5/1/6.0 next-hop 20::1:1:10
Member Subgroup: nhsg6
Members Interfaces:
ge-5/0/4.0 next-hop 3::1:1:1
ge-5/1/4.0 next-hop 4::1:1:1
Next-hop-group: vpls_nhg_2
Type: layer-2 State: down
Next-hop-group: nhg
Type: inet
State: up
Number of members configured : 3
Number of members that are up : 3
Number of subgroups configured : 0
Number of subgroups that are up : 0
Next-hop-group: nhg6
Type: inet6
State: up
Number of members configured : 2
Number of members that are up : 2
Number of subgroups configured : 1
Number of subgroups that are up : 1
Members Interfaces: State
ge-5/1/5.0 next-hop 10::1:1:10 up
ge-5/1/6.0 next-hop 20::1:1:10 up
Member Subgroup: nhsg6 up
Number of members configured : 2
Number of members that are up : 2
Members Interfaces: State
ge-5/0/4.0 next-hop 3::1:1:1 up
ge-5/1/4.0 next-hop 4::1:1:1 up
Next-hop-group: vpls_nhg_2
Number of members configured : 2
Number of members that are up : 0
Number of subgroups configured : 0
Number of subgroups that are up : 0
Type: layer-2 State: down
Members Interfaces: State
ge-2/2/1.100 down
ge-2/3/9.0 down
Related
Documentation
Output Fields Table 14 on page 411 lists the output fields for the show forwarding-options port-mirroring
command. Output fields are listed in the approximate order in which they appear.
Input parameters
Rate Rate (ratio of packets sampled). detail
Output parameters
Family Protocol family. detail
Sample Output
show forwarding-options port-mirroring terse
user@host> show forwarding-options port-mirroring terse
Instance Name Instance Id State
&global_instance 1 up
inst1 2 up
Description (M320 and M120 routers and T Series routers only) Display status information about the
specified dynamic flow capture interface.
List of Sample Output show interfaces (Dynamic Flow Capture) on page 416
Output Fields Table 15 on page 413 lists the output fields for the show interfaces (Dynamic Flow Capture)
command. Output fields are listed in the approximate order in which they appear.
Physical Interface
Physical interface Name of the physical interface. All levels
Enabled Sate of the interface. Possible values are described in the “Enabled Field” section All levels
under Common Output Fields Description.
Interface index Physical interface index number, which reflects its initialization sequence. detail extensive none
SNMP ifIndex SNMP index number for the physical interface. detail extensive none
Table 15: Dynamic Flow Capture show interfaces Output Fields (continued)
Field Name Field Description Level of Output
Link-level type Encapsulation type used on the physical interface. All levels
MTU Maximum Transmit Unit (MTU). Size of the largest packet to be transmitted. All levels
Device flags Information about the physical device. Possible values are described in the All levels
“Device Flags” section under Common Output Fields Description.
Interface flags Information about the interface. Possible values are described in the “Interface All levels
Flags” section under Common Output Fields Description.
Link flags Information about the link. Possible values are described in the “Link Flags” All levels
section under Common Output Fields Description.
Last flapped Date, time, and how long ago the interface went from down to up. The format detail extensive
is Last flapped: year-month-day hour:minute:second timezone (hour:minute:second
ago). For example, Last flapped: 2002-04-26 10:52:40 PDT (04:33:20 ago).
Input Rate Input rate in bits per second (bps) and packets per second (pps). None specified
Traffic statistics Number and rate of bytes and packets received and transmitted on the physical detail extensive
interface.
• Input rate, Output rate—Number of bits per second (packets per second)
received and transmitted on the interface.
• Input packets, Output packets—Number of packets received and transmitted
on the interface.
Table 15: Dynamic Flow Capture show interfaces Output Fields (continued)
Field Name Field Description Level of Output
Output errors • Carrier transitions—Number of times the interface has gone from down to up. extensive
This number does not normally increment quickly, increasing only when the
cable is unplugged, the far-end system is powered down and then up, or
another problem occurs. If the number of carrier transitions increments quickly,
possibly once every 10 seconds, the cable, the remote system, or the interface
is malfunctioning.
• Errors—Sum of outgoing frame aborts and FCS errors.
• Drops—Number of packets dropped by the output queue of the I/O Manager
ASIC. If the interface is saturated, this number increments once for every
packet dropped by the ASIC RED mechanism.
• Resource errors—Sum of transmit drops.
Logical Interface
Logical interface Name of the logical interface. All levels
Index Logical interface index number, which reflects its initialization sequence. detail extensive none
SNMP ifIndex Logical interface SNMP interface index number. detail extensive none
Flags Information about the logical interface; values are described in the “Logical All levels
Interface Flags” section under Common Output Fields Description.
Input packets Number of packets received on the logical interface. None specified
Output packets Number of packets transmitted on the logical interface. None specified
Traffic statistics Total number of bytes and packets received and transmitted on the logical detail extensive
interface. These statistics are the sum of the local and transit statistics. When
a burst of traffic is received, the value in the output packet rate field might briefly
exceed the peak cell rate. It takes awhile (generally, less than 1 second) for this
counter to stabilize.
Protocol Protocol family configured on the logical interface (such as iso or inet6). detail extensive none
Flags Information about the protocol family flags. Possible values are described in detail extensive none
the “Family Flags” section under Common Output Fields Description.
Addresses, Flags Addresses associated with the logical interface and information about the detail extensive none
address flags. Possible values are described in the “Addresses Flags” section
under Common Output Fields Description.
Table 15: Dynamic Flow Capture show interfaces Output Fields (continued)
Field Name Field Description Level of Output
Destination IP address of the remote side of the connection. detail extensive none
Sample Output
show interfaces (Dynamic Flow Capture)
user@host> show interfaces dfc-0/0/0
Physical interface: dfc-0/0/0, Enabled, Physical link is Up
Interface index: 146, SNMP ifIndex: 36
Type: Adaptive-Services, Link-level type: Dynamic-Flow-Capture, MTU: 9192, Speed:
2488320kbps
Device flags : Present Running
Interface flags: Point-To-Point SNMP-Traps 16384
Link type : Full-Duplex
Link flags : None
Last flapped : 2005-08-26 15:08:36 PDT (01:18:42 ago)
Input rate : 0 bps (0 pps)
Output rate : 44800440 bps (100000 pps)
Description (M Series and T Series routers only) Display status information about the specified flow
collector interface.
List of Sample Output show interfaces extensive (Flow Collector) on page 421
Output Fields Table 16 on page 417 lists the output fields for the show interfaces (Flow Collector)
command. Output fields are listed in the approximate order in which they appear.
Physical Interface
Physical Interface Name of the physical interface type. All levels
Enabled State of the interface type. Possible values are described in the “Enabled All levels
Devices” section under Common Output Fields Description.
Interface index Physical interface index number, which reflects its initialization sequence. detail extensive none
SNMP ifIndex SNMP index number for the physical interface. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Link-level type Encapsulation type used on the physical interface. All levels
MTU Maximum Transmit Unit (MTU). Size of the largest packet to be transmitted. All levels
Device flags Information about the physical device. Possible values are described in the All levels
“Device Flags” section under Common Output Fields Description.
Interface flags Information about the interface. Possible values are described in the “Interface All levels
Flags” section under Common Output Fields Description.
Link flags Information about the link. Possible values are described in the “Link Flags” All levels
section under Common Output Fields Description.
Hold-times Current interface hold-time up and hold-time down. Value is in milliseconds. detail extensive none
Hardware address Media access control (MAC) address of the interface. detail extensive none
Last flapped Date, time, and how long ago the interface went from down to up. The format detail extensive
is Last flapped: year-month-day hour:minute:second timezone (hour:minute:second
ago). For example, Last flapped: 2002-04-26 10:52:40 PDT (04:33:20 ago).
Statistics last Time when the statistics for the interface were last set to zero. detail extensive
cleared
Traffic statistics Number and rate of bytes and packets received and transmitted on the physical detail extensive
interface.
Output errors • Carrier transitions —Number of times the interface has gone from down to up. extensive
This number does not normally increment quickly, increasing only when the
cable is unplugged, the far-end system is powered down and then up, or
another problem occurs. If the number of carrier transitions increments quickly,
possibly once every 10 seconds, the cable, the remote system, or the interface
is malfunctioning.
• Errors—Sum of outgoing frame aborts and FCS errors.
• Drops—Number of packets dropped by the output queue of the I/O Manager
ASIC. If the interface is saturated, this number increments once for every
packet dropped by the ASIC RED mechanism.
• Resource errors—Sum of transmit drops.
Logical Interface
Logical interface Name of the logical interface All levels
Index Logical interface index number, which reflects its initialization sequence. detail extensive none
SNMP ifIndex Logical interface SNMP interface index number. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Flags Information about the logical interface; values are described in the “Logical All levels
Interface Flags” section under Common Output Fields Description.
Traffic statistics Total number of bytes and packets received and transmitted on the logical detail extensive
interface. These statistics are the sum of the local and transit statistics. When
a burst of traffic is received, the value in the output packet rate field might briefly
exceed the peak cell rate. It takes awhile (generally, less than 1 second) for this
counter to stabilize.
Local statistics Statistics for traffic received from and transmitted to the Routing Engine. When detail extensive
a burst of traffic is received, the value in the output packet rate field might briefly
exceed the peak cell rate. It takes awhile (generally, less than 1 second) for this
counter to stabilize.
Transit statistics Statistics for traffic transiting the router. When a burst of traffic is received, the detail extensive
value in the output packet rate field might briefly exceed the peak cell rate. It
takes awhile (generally, less than 1 second) for this counter to stabilize.
Protocol Protocol family configured on the logical interface (such as iso or inet6). detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Route table Route table in which this address exists; for example, Route table:0 refers to detail extensive
inet.0.
Flags Information about the protocol family flags. Possible values are described in detail extensive none
the “Family Flags” section under Common Output Fields Description.
Addresses, Flags Information about the address flags. Possible values are described in the detail extensive none
“Addresses Flags” section under Common Output Fields Description.
Destination IP address of the remote side of the connection. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Sample Output
show interfaces extensive (Flow Collector)
user@host> show interfaces extensive cp-5/0/0
Physical interface: cp-5/0/0, Enabled, Physical link is Up
Interface index: 145, SNMP ifIndex: 52, Generation: 29
Type: Flow-collector, Link-level type: Flow-collection, MTU: 9192,
Clocking: Unspecified, Speed: 800mbps
Device flags : Present Running
Interface flags: Point-To-Point SNMP-Traps 16384
Link type : Full-Duplex
Link flags : None
Physical info : Unspecified
Hold-times : Up 0 ms, Down 0 ms
Current address: Unspecified, Hardware address: Unspecified
Alternate link address: Unspecified
Last flapped : 2005-05-24 16:48:11 PDT (00:12:04 ago)
Statistics last cleared: Never
Traffic statistics:
Input bytes : 2041661287 0 bps
Output bytes : 3795049544 43816664 bps
Input packets: 1365534 0 pps
Output packets: 3865644 3670 pps
Input errors:
Errors: 0, Drops: 0, Framing errors: 0, Runts: 0, Giants: 0,
Policed discards: 0, Resource errors: 0
Output errors:
Carrier transitions: 2, Errors: 0, Drops: 0, MTU errors: 0,
Resource errors: 0
Logical interface cp-5/0/0.0 (Index 74) (SNMP ifIndex 53) (Generation 28)
Flags: Point-To-Point SNMP-Traps Encapsulation: Flow-collection
Traffic statistics:
Input bytes : 1064651568
Output bytes : 37144290
Input packets: 711324
Output packets: 713672
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 1064651568 0 bps
Output bytes : 37144290 0 bps
Input packets: 711324 0 pps
Output packets: 713672 0 pps
Protocol inet, MTU: 9192, Generation: 39, Route table: 0
Flags: Receive-options, Receive-TTL-Exceeded
Addresses, Flags: Is-Preferred Is-Primary
Destination: 4.0.0.2, Local: 4.0.0.1, Broadcast: Unspecified,
Generation: 40
Logical interface cp-5/0/0.1 (Index 75) (SNMP ifIndex 54) (Generation 29)
Flags: Point-To-Point SNMP-Traps Encapsulation: Flow-collection
Traffic statistics:
Input bytes : 976793823
Output bytes : 34099481
Input packets: 652729
Output packets: 655127
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 976793823 0 bps
Output bytes : 34099481 0 bps
Input packets: 652729 0 pps
Output packets: 655127 0 pps
Protocol inet, MTU: 9192, Generation: 40, Route table: 0
Flags: Receive-options, Receive-TTL-Exceeded
Addresses, Flags: Is-Preferred Is-Primary
Destination: 4.1.1.2, Local: 4.1.1.1, Broadcast: Unspecified,
Generation: 42
Logical interface cp-5/0/0.2 (Index 80) (SNMP ifIndex 55) (Generation 30)
Flags: Point-To-Point SNMP-Traps Encapsulation: Flow-collection
Traffic statistics:
Input bytes : 0
Output bytes : 3723079376
Input packets: 0
Output packets: 2495372
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 3723079376 43816664 bps
Input packets: 0 0 pps
Output packets: 2495372 3670 pps
Protocol inet, MTU: 9192, Generation: 41, Route table: 0
Flags: Receive-options, Receive-TTL-Exceeded
Addresses, Flags: Is-Preferred Is-Primary
Destination: 4.2.2.2, Local: 4.2.2.1, Broadcast: Unspecified,
Generation: 44
Logical interface cp-5/0/0.16383 (Index 81) (SNMP ifIndex 56) (Generation 31)
...
Description (M Series and T Series routers only) Display status information about the specified flow
monitoring interface.
List of Sample Output show interfaces extensive (Flow Monitoring) on page 426
Output Fields Table 17 on page 423 lists the output fields for the show interfaces (Flow Monitoring)
command. Output fields are listed in the approximate order in which they appear.
Physical Interface
Physical interface Name of the physical interface. All levels
Enabled State of the interface. Possible values are described in the “Enabled Field” All levels
section under Common Output Fields Description.
Interface index Physical interface index number, which reflects its initialization sequence. detail extensive none
SNMP ifIndex SNMP index number for the physical interface. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Link-level type Encapsulation type used on the physical interface. All levels
MTU Maximum Transmit Unit (MTU). Size of the largest packet to be transmitted. All levels
Device flags Information about the physical device. Possible values are described in the All levels
“Device Flags” section under Common Output Fields Description.
Interface flags Information about the interface. Possible values are described in the “Interface All levels
Flags” section under Common Output Fields Description.
Link flags Information about the link. Possible values are described in the “Link Flags” All levels
section under Common Output Fields Description.
Hold-times Current interface hold-time up and hold-time down. Value is in milliseconds. detail extensive
Hardware address Media access control (MAC) address of the interface. detail extensive none
Last flapped Date, time, and how long ago the interface went from down to up. The format detail extensive
is Last flapped: year-month-day hour:minute:second timezone (hour:minute:second
ago). For example, Last flapped: 2002-04-26 10:52:40 PDT (04:33:20 ago)
Statistics last Time when the statistics for the interface were last set to zero. detail extensive
cleared
Traffic statistics Number and rate of bytes and packets received and transmitted on the physical detail extensive
interface.
Output errors • Carrier transitions—Number of times the interface has gone from down to up. extensive
This number does not normally increment quickly, increasing only when the
cable is unplugged, the far-end system is powered down and then up, or
another problem occurs. If the number of carrier transitions increments quickly,
possibly once every 10 seconds, the cable, the remote system, or the interface
is malfunctioning.
• Errors—Sum of outgoing frame aborts and FCS errors.
• Drops—Number of packets dropped by the output queue of the I/O Manager
ASIC. If the interface is saturated, this number increments once for every
packet dropped by the ASIC Red mechanism.
• Resource errors—Sum of transmit drops.
Logical Interface
Logical interface Name of the logical interface. All levels
Index Logical interface index number, which reflects its initialization sequence. detail extensive none
SNMP ifIndex Logical interface SNMP interface index number. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Flags Information about the logical interface; values are described in the “Logical All levels
Interface Flags” section under Common Output Fields Description.
Traffic statistics Total number of bytes and packets received and transmitted on the logical detail extensive
interface. These statistics are the sum of the local and transit statistics. When
a burst of traffic is received, the value in the output packet rate field might briefly
exceed the peak cell rate. It takes awhile (generally, less than 1 second) for this
counter to stabilize.
Local statistics Statistics for traffic received from and transmitted to the Routing Engine. When detail extensive
a burst of traffic is received, the value in the output packet rate field might briefly
exceed the peak cell rate. It takes awhile (generally, less than 1 second) for this
counter to stabilize.
Transit statistics Statistics for traffic transiting the router. When a burst of traffic is received, the detail extensive
value in the output packet rate field might briefly exceed the peak cell rate. It
takes awhile (generally, less than 1 second) for this counter to stabilize.
Protocol Protocol family configured on the logical interface (such as iso or inet6). detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Route table Route table in which this address exists; for example, Route table:0 refers to detail extensive
inet.0.
Flags Information about the protocol family flags. Possible values are described in detail extensive none
the “Family Flags” section under Common Output Fields Description.
Sample Output
show interfaces extensive (Flow Monitoring)
user@host> show interfaces mo-4/0/0 extensive
Physical interface: mo-4/0/0, Enabled, Physical link is Up
Interface index: 144, SNMP ifIndex: 42, Generation: 28
Description: monitor pic 2
Type: Adaptive-Services, Link-level type: Adaptive-Services, MTU: Unlimited,
Clocking: Unspecified, Speed: 800mbps
Device flags : Present Running
Interface flags: Point-To-Point SNMP-Traps 16384
Link type : Full-Duplex
Link flags : None
Physical info : Unspecified
Hold-times : Up 0 ms, Down 0 ms
Current address: Unspecified, Hardware address: Unspecified
Alternate link address: Unspecified
Last flapped : 2005-05-24 16:43:12 PDT (00:17:46 ago)
Statistics last cleared: Never
Traffic statistics:
Input bytes : 756824218 8328536 bps
Output bytes : 872916185 8400160 bps
Input packets: 508452 697 pps
Output packets: 15577196 18750 pps
Input errors:
Errors: 0, Drops: 0, Framing errors: 0, Runts: 0, Giants: 0,
Policed discards: 0, Resource errors: 0
Output errors:
Carrier transitions: 2, Errors: 0, Drops: 0, MTU errors: 0,
Resource errors: 0
Logical interface mo-4/0/0.0 (Index 83) (SNMP ifIndex 43) (Generation 26)
Flags: Point-To-Point SNMP-Traps Encapsulation: Adaptive-Services
Traffic statistics:
Input bytes : 756781796
Output bytes : 872255328
Input packets: 507233
Output packets: 15575988
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 756781796 8328536 bps
Output bytes : 872255328 8400160 bps
Input packets: 507233 697 pps
Output packets: 15575988 18750 pps
Protocol inet, MTU: Unlimited, Generation: 38, Route table: 0
Flags: None
Logical interface mo-4/0/0.16383 (Index 84) (SNMP ifIndex 58) (Generation 27)
...
Description (M40e, M160, and M320 routers and T Series routers only) Display passive monitoring
error statistics.
Options * | all | mo-fpc/pic/port—Display error statistics for monitoring interfaces. Use a wildcard
character, specify all interfaces, or provide a specific interface name.
Output Fields Table 18 on page 428 lists the output fields for the show passive-monitoring error command.
Output fields are listed in the approximate order in which they appear.
Error information
Packets dropped (no Number of packets dropped because of memory shortage.
memory)
Packets dropped (not Number of packets dropped because they failed the IPv4 version check.
IPv4)
Packets dropped Number of packets dropped because the packet length or IP header length was too small.
(header too small)
Memory allocation Number of flow record memory allocation failures. A small number reflects failures to replenish the
failures free list. A large number indicates the monitoring station is almost out of memory space.
Memory free list failures Number of flow records received from free list that failed. Memory is nearly exhausted or too many
new flows greater than 128 KB are being created per second.
Memory warning Whether the flows have exceeded 1 million packets per second (Mpps) on a Monitoring Services PIC
or 2 Mpps on a Monitoring Services II PIC. The response can be Yes or No.
Memory overload Whether the memory has been overloaded. The response can be Yes or No.
PPS overload Whether the PIC is receiving more packets per second than the configured threshold. The response
can be Yes or No.
BPS overload Whether the PIC is receiving more bits per second than the configured threshold. The response can
be Yes or No.
Sample Output
show passive-monitoring error all
user@host> show passive-monitoring error all
Passive monitoring interface: mo-4/0/0, Local interface index: 44
Interface state: Monitoring
Error information
Packets dropped (no memory): 0, Packets dropped (not IP): 0
Packets dropped (not IPv4): 0, Packets dropped (header too small): 0
Memory allocation failures: 0, Memory free failures: 0
Memory free list failures: 0
Memory warning: No, Memory overload: No, PPS overload: No, BPS overload: No
Description (M40e, M160, and M320 routers and T Series routers only) Display passive flow statistics.
Options * | all | mo-fpc/pic/port—Display passive flow statistics for monitoring interfaces. Use a
wildcard character, specify all interfaces, or provide a specific interface name.
Output Fields Table 19 on page 430 lists the output fields for the show passive-monitoring flow command.
Output fields are listed in the approximate order in which they appear.
Flow information
Flow packets Number of packets received by an operational PIC.
Flow packets 10-second Number of packets per second handled by the PIC and displayed as a 10-second average.
rate
Flow bytes 10-second Number of bytes per second handled by the PIC and displayed as a 10-second average.
rate
Flows packets exported Total number of cflowd packets exported by an operational PIC.
Flows inactive timed out Total number of flows that are exported because of inactivity.
Flows active timed out Total number of long-lived flows that are exported because of an active timeout.
Sample Output
show passive-monitoring flow all
user@host> show passive-monitoring flow all
Passive monitoring interface: mo-4/0/0, Local interface index: 44
Interface state: Monitoring
Flow information
Flow packets: 6533434, Flow bytes: 653343400
Flow packets 10-second rate: 0, Flow bytes 10-second rate: 0
Active flows: 0, Total flows: 1599
Flows exported: 1599, Flows packets exported: 55
Flows inactive timed out: 1599, Flows active timed out: 0
Description (M40e, M160, and M320 routers and T Series routers only) Display passive monitoring
memory and flow record statistics
Options * | all | mo-fpc/pic/port—Display memory and flow record statistics for monitoring
interfaces. Use a wildcard character, specify all interfaces, or provide a specific
interface name.
Output Fields Table 20 on page 432 lists the output fields for the show passive-monitoring memory
command. Output fields are listed in the approximate order in which they appear.
Memory utilization
Allocation count Number of flow records allocated.
Maximum allocated Maximum number of flow records allocated since the monitoring station booted. This number
represents the peak number of flow records allocated at a time.
Allocations per second Flow records allocated per second during the last statistics interval on the PIC.
Frees per second Flow records freed per second during the last statistics interval on the PIC.
Total memory used, Total memory currently used and total amount of memory currently free (in bytes).
Total memory free
Sample Output
show passive-monitoring memory all
user@host> show passive-monitoring memory all
Description (M40e, M160, and M320 routers and T Series routers only) Display passive monitoring
status.
Options * | all | mo-fpc/pic/port—Display status for monitoring interfaces. Use a wildcard character,
specify all interfaces, or provide a specific interface name.
Output Fields Table 21 on page 434 lists the output fields for the show passive-monitoring status
command. Output fields are listed in the approximate order in which they appear.
Group index Integer that represents the monitoring group of which the PIC is a member. Group index is a mapping
from the group name to an index. It is not related to the number of monitoring groups.
Engine type Configured engine type that is inserted in output cflowd packets.
Sample Output
show passive-monitoring status all
user@host> show passive-monitoring status all
Passive monitoring interface: mo-4/0/0, Local interface index: 44
Interface state: Monitoring
Group index: 0
Export interval: 15 secs, Export format: cflowd v5
Protocol: IPv4, Engine type: 1, Engine ID: 1
Description (M40e, M160, and M320 routers and T Series routers only) Display passive monitoring
usage statistics.
Options * | all | mo-fpc/pic/port—Display usage statistics for monitoring interfaces. Use a wildcard
character, specify all interfaces, or provide a specific interface name.
Output Fields Table 22 on page 436 lists the output fields for the show passive-monitoring usage
command. Output fields are listed in the approximate order in which they appear.
CPU utilization
Uptime Time, in milliseconds, that the PIC has been operational.
Interrupt time Total time that the PIC has spent processing packets since the last PIC reset.
Load (5 second) CPU load on the PIC, averaged more than 5 seconds. The number is a percentage obtained by dividing
the time spent on active tasks by the total elapsed time.
Load (1 minute) CPU load on the PIC, averaged more than 1 minute. The number is a percentage obtained by dividing
the time spent on active tasks by the total elapsed time.
Sample Output
show passive-monitoring usage all
user@host> show passive-monitoring usage
Passive monitoring interface: mo-4/0/0, Local interface index: 44
CPU utilization
Uptime: 653155 milliseconds, Interrupt time: 40213754 microseconds
Load (5 second): 20%, Load (1 minute): 17%
Description Display information about the aggregated active flows being processed by the accounting
service.
limit limit-value—(Optional) Limit the display output to this number of flows. The default
is no limit.
order (bytes | packets)—(Optional) Display the flow with the ordering of the highest
number, either by byte count or by packet count.
Additional Information For information about aggregation configuration options, see the Junos OS Services
Interfaces Library for Routing Devices.
List of Sample Output show services accounting aggregation protocol-port detail on page 440
show services accounting aggregation source-destination-prefix on page 440
Output Fields Table 23 on page 439 lists the output fields for the show services accounting aggregation
command. Output fields are listed in the approximate order in which they appear.
Service name Name of a service that was configured at the [edit forwarding-options
accounting] hierarchy level. The default display, (default sampling), indicates
the service was configured at the [edit forwarding-options sampling-level]
hierarchy level.
Input SNMP SNMP index of the interface the packet came in on.
interface index
Output SNMP SNMP index of the interface the packet went out on.
interface index
Start time Actual time when the packet in this aggregation was first seen.
End time Actual time when the packet in this aggregation was last seen.
Sample Output
show services accounting aggregation protocol-port detail
user@host> show service accounting aggregation protocol-port detail
Service Accounting interface: mo-2/0/0, Local interface index: 468
Service name: (default sampling)
Protocol: 6, Source port: 20, Destination port: 20
Start time: 442349, End time: 6425714
Flow count: 194, Packet count: 4294964388, Byte count: 4294781184
List of Sample Output show services accounting aggregation template on page 442
Output Fields Table 24 on page 442 lists the output fields for the show services accounting aggregation
template command. Output fields are listed in the approximate order in which they
appear.
Sample Output
show services accounting aggregation template
user@host> show services accounting aggregation template template-name mpls
MPLS label 1: 299808, MPLS label 2: 0, MPLS label 3: 0
Source address: 11.1.1.2, Destination address: 10.255.15.22, Top Label Address:
22.15.255.10
Source port: 0, Destination port: 0
Protocol: 61, TOS: 0, TCP flags: 0
Source mask: 24, Destination mask: 32
Input SNMP interface index: 503, Output SNMP interface index: 505
Start time: 40780, End time: 157330
Packet count: 3949198, Byte count: 181663062
name (* | all | service-name)—(Optional) Display active flow error statistics. Use a wildcard
character, specify all services, or provide a specific service name.
List of Sample Output show services accounting errors (Monitoring PIC interface) on page 444
show services accounting errors (Service PIC interface) on page 445
show services accounting errors inline-jflow fpc-slot slot-number (when only IPv6 is
configured) on page 445
show services accounting errors inline-jflow fpc-slot slot-number (when both IPv4
and IPv6 are configured) on page 445
show services accounting errors inline-jflow (MX80 Router when both IPv4 and IPv6
are configured) on page 445
Output Fields Table 25 on page 443 lists the output fields for the show services accounting errors
command. Output fields are listed in the approximate order in which they appear.
FPC slot Slot number of the FPC for which the flow information is displayed. (Available only when the inline-jflow
fpc-slot slot-number option is used.)
Service name Name of a service that was configured at the [edit forwarding-options accounting] hierarchy level.
The default display, (default sampling), indicates the service was configured at the
[edit forwarding-options sampling-level] hierarchy level.
Error Information
Packets dropped (not Number of packets dropped because they failed the IPv4 version check.
IPv4)
Packets dropped Number of packets dropped because the packet length or IP header length was too small.
(header too small)
Memory allocation Number of flow record memory allocation failures. A small number reflects failures to replenish the
failures free list. A large number indicates the monitoring station is almost out of memory space.
Memory free list failures Number of flow records received from the free list that failed. Memory is nearly exhausted, or too
many new flows greater than 128 KB are being created per second.
Memory overload Whether the memory has been overloaded. The response can be Yes or No.
PPS overload Whether the PIC is receiving more packets per second than the configured threshold. The response
can be Yes or No.
BPS overload Whether the PIC is receiving more bits per second than the configured threshold. The response can
be Yes or No.
Route Record Lookup Number of times the route record lookup failed.
Failures
Sample Output
show services accounting errors (Monitoring PIC interface)
user@host> show services accounting errors
Service Accounting interface: mo-1/1/0, Local interface index: 15
Service name: (default sampling)
Error information
Packets dropped (no memory): 0, Packets dropped (not IP): 0
Packets dropped (not IPv4): 0, Packets dropped (header too small): 0
Memory allocation failures: 0, Memory free failures: 0
Memory free list failures: 0
Memory overload: No, PPS overload: No, BPS overload: No
Sample Output
show services accounting errors (Service PIC interface)
user@host> show services accounting errors
Service Accounting interface: sp-0/1/0
Service name: (default sampling)
Error information
Service sets dropped: 0, Active timeout failures: 0
Export packet failures: 0, Flow creation failures: 0
Memory overload: No
show services accounting errors inline-jflow fpc-slot slot-number (when only IPv6 is configured)
user@host> show services accounting errors inline-jflow fpc-slot 5
Error information
FPC Slot: 5
Flow Creation Failures: 0
Route Record Lookup Failures: 0, AS Lookup Failures: 0
Export Packet Failures: 0
Memory Overload: No, Memory Alloc Fail Count: 0
show services accounting errors inline-jflow fpc-slot slot-number (when both IPv4 and IPv6 are configured)
user@host> show services accounting errors inline-jflow fpc-slot 5
Error information
FPC Slot: 5
Flow Creation Failures: 0
Route Record Lookup Failures: 0, AS Lookup Failures: 0
Export Packet Failures: 0
Memory Overload: No, Memory Alloc Fail Count: 0
IPv4:
IPv4 Flow Creation Failures: 0
IPv4 Route Record Lookup Failures: 0, IPv4 AS Lookup Failures: 0
IPv4 Export Packet Failures: 0
IPv6:
IPv6 Flow Creation Failures: 0
IPv6 Route Record Lookup Failures: 0, IPv6 AS Lookup Failures: 0
IPv6 Export Packet Failures: 0
show services accounting errors inline-jflow (MX80 Router when both IPv4 and IPv6 are configured)
user@host> show services accounting errors inline-jflow
Error information
TFEB Slot: 0
Flow Creation Failures: 0
Route Record Lookup Failures: 0, AS Lookup Failures: 0
Export Packet Failures: 0
Memory Overload: No
IPv4:
IPv4 Flow Creation Failures: 0
IPv6:
IPv6 Flow Creation Failures: 0
IPv6 Route Record Lookup Failures: 0, IPv6 AS Lookup Failures: 0
IPv6 Export Packet Failures: 0
inline-jflow (fpc-slot slot-number)—(Optional) Display inline flow statistics for the specified
FPC.
List of Sample Output show services accounting flow (flow aggregation v5/v8 configuration) on page 448
show services accounting flow (flow aggregation v9 configuration) on page 448
show services accounting flow name on page 449
show services accounting flow name all on page 449
show services accounting flow (multiple sampling instances) on page 450
show services accounting flow inline-jflow fpc-slot slot-number (for IPv4
flow) on page 450
show services accounting flow inline-jflow fpc-slot slot-number (with IPv4 and IPv6
Configuration) on page 450
show services accounting flow inline-jflow (MX80 Router with IPv4 and IPv6
Configuration) on page 450
Output Fields Table 26 on page 447 lists the output fields for the show services accounting flow command.
Output fields are listed in the approximate order in which they appear.
Service name Name of a service that was configured at the [edit forwarding-options accounting] hierarchy level. The
default display, (default sampling), indicates the service was configured at the [edit forwarding-options
sampling-level] hierarchy level.
Flow Information
FPC Slot Slot number of the FPC for which the flow information is displayed. (Available only when the inline-jflow
fpc-slot slot-number option is used.)
Flow packets 10-second Number of packets per second handled by the PIC and displayed as a 10-second average.
rate
Flow bytes 10-second Number of bytes per second handled by the PIC and displayed as a 10-second average.
rate
Flows packets exported Total number of cflowd packets exported by an operational PIC.
Flows inactive timed out Total number of flows that are exported because of inactivity.
Flows active timed out Total number of long-lived flows that are exported because of an active timeout.
Sample Output
show services accounting flow (flow aggregation v5/v8 configuration)
user@host> show services accounting flow
Service Accounting interface: rsp0, Local interface index: 171
Service name: (default sampling)
Interface state: Accounting
Flow information
Flow packets: 87168293, Flow bytes: 5578770752
Flow packets 10-second rate: 45762, Flow bytes 10-second rate: 2928962
Active flows: 1000, Total flows: 2000
Flows exported: 19960, Flows packets exported: 582
Flows inactive timed out: 1000, Flows active timed out: 29000
show services accounting flow inline-jflow fpc-slot slot-number (for IPv4 flow)
user@host> show services accounting flow inline-jflow fpc-slot 5
Flow information
FPC Slot: 5
Flow Packets: 0, Flow Bytes: 0
Active Flows: 0, Total Flows: 0
Flows Exported: 0, Flow Packets Exported: 0
Flows Inactive Timed Out: 0, Flows Active Timed Out: 0
show services accounting flow inline-jflow fpc-slot slot-number (with IPv4 and IPv6 Configuration)
user@host> show services accounting flow inline-jflow fpc-slot 5
Flow information
FPC Slot: 5
Flow Packets: 0, Flow Bytes: 0
Active Flows: 0, Total Flows: 0
Flows Exported: 0, Flow Packets Exported: 0
Flows Inactive Timed Out: 0, Flows Active Timed Out: 0
IPv4 Flows:
IPv4 Flow Packets: 0, IPv4 Flow Bytes: 0
IPv4 Active Flows: 0, IPv4 Total Flows: 0
IPv4 Flows Exported: 0, IPv4 Flow Packets exported: 0
IPv4 Flows Inactive Timed Out: 0, IPv4 Flows Active Timed Out: 0
IPv6 Flows:
IPv6 Flow Packets: 0, IPv6 Flow Bytes: 0
IPv6 Active Flows: 0, IPv6 Total Flows: 0
IPv6 Flows Exported: 0, IPv6 Flow Packets Exported: 0
IPv6 Flows Inactive Timed Out: 0, IPv6 Flows Active Timed Out: 0
show services accounting flow inline-jflow (MX80 Router with IPv4 and IPv6 Configuration)
user@host> show services accounting flow inline-jflow
Flow information
TFEB Slot: 0
Flow Packets: 0, Flow Bytes: 0
Active Flows: 0, Total Flows: 0
Flows Exported: 0, Flow Packets Exported: 0
Flows Inactive Timed Out: 0, Flows Active Timed Out: 0
IPv4 Flows:
IPv6 Flows:
IPv6 Flow Packets: 0, IPv6 Flow Bytes: 0
IPv6 Active Flows: 0, IPv6 Total Flows: 0
IPv6 Flows Exported: 0, IPv6 Flow Packets Exported: 0
IPv6 Flows Inactive Timed Out: 0, IPv6 Flows Active Timed Out: 0
Description Display information about the flows being processed by the accounting service.
filters—(Optional) Filter the display output of the currently active flow records. The
following filters query actively changing data structures and result in different results
for multiple invocations:
• destination-as—Display flow records filtered by destination autonomous system
information.
limit limit-value—(Optional) Limit the display output to the specified number of flows.
The default is no limit.
order (bytes | packets)—(Optional) Display the flow with the ordering of the highest
number, either by byte count or by packet count.
Additional Information When no PIC is active, or when no route record has been downloaded from the PIC, this
command reports no flows, even though packets are being sampled. This command
displays information about two concurrent sessions only. If a third session is attempted,
the command pauses with no output until one of the previous sessions is completed.
Output Fields Table 27 on page 453 lists the output fields for the show services accounting flow-detail
command. Output fields are listed in the approximate order in which they appear.
Service name Name of a service that was configured at the [edit forwarding-options accounting] All levels
hierarchy level. The default display, (default sampling), indicates the service
was configured at the [edit forwarding-options sampling] hierarchy level.
Input SNMP SNMP index of the interface on which the packet came in. extensive
interface index
Output SNMP SNMP index of the interface on which the packet went out. extensive
interface index
Protocol Name of the protocol used for the packet flow from the corresponding source All levels
address.
Input interface Interface on which the packets were received. All levels
Output interface Interface on which the packets were transmitted. All levels
TCP flags Number of TCP header flags detected in the flow. extensive
Start time Actual time when the packet in this aggregation was first seen. detail extensive
End time Actual time when the packet in this aggregation was last seen. detail extensive
Time since last Amount of time elapsed since the last active timeout, in the format hh:mm:ss. None specified
active timeout
Packet count for Number of packets in the aggregation since the last active timeout. None specified
last active timeout
Byte count for last Number of bytes in the aggregation since the last active timeout. None specified
active timeout
Sample Output
show services accounting flow-detail
In this sample, the output is split into three sections, with ellipses (...) indicating where
the sections are continued.
In this sample, the output is split into three sections, with ellipses (...) indicating where
the sections are continued.
The output of the following command is displayed over 141 columns, not the standard
80 columns. In this sample, the output is split into three sections, with ellipses (...)
indicating where the sections are continued.
List of Sample Output show services accounting memory (Monitoring PIC interface) on page 457
show services accounting memory (Service PIC interface) on page 458
Output Fields Table 28 on page 457 lists the output fields for the show services accounting memory
command. Output fields are listed in the approximate order in which they appear.
Memory Utilization
Local interface index Index counter of the local interface.
Maximum allocated Maximum number of flow records allocated since the monitoring station booted. This number
represents the peak number of flow records allocated at a time.
Allocations per second Flow records allocated per second during the last statistics interval on the PIC.
Frees per second Flow records freed per second during the last statistics interval on the PIC.
Total memory used Total amount of memory currently used (in bytes).
Total memory free Total amount of memory currently free (in bytes).
Sample Output
show services accounting memory (Monitoring PIC interface)
user@host> show services accounting memory
Service Accounting interface: mo-2/0/0, Local interface index: 468
Memory utilization
Sample Output
show services accounting memory (Service PIC interface)
user@host> show services accounting memory
Service Accounting interface: sp-0/1/0
Memory utilization
Allocation count: 1000, Free count: 0
Allocations per second: 0, Frees per second: 0
Total memory used (in bytes): 218158272
Total memory free (in bytes): 587147696
List of Sample Output show services accounting packet-size-distribution name on page 459
Output Fields Table 29 on page 459 lists the output fields for the show services accounting
packet-size-distribution command. Output fields are listed in the approximate order in
which they appear.
Service name Name of a service that was configured at the [edit-forwarding-options accounting] hierarchy level.
The default display, (default sampling), indicates the service was configured at the
[edit-forwarding-options sampling-level] hierarchy level.
Number of packets Count of packets detected in the size between Range start and Range end.
Percentage packets Percentage of the total number of packets that are in this size range.
Sample Output
show services accounting packet-size-distribution name
user@host> show services accounting packet-size-distribution name test3
Service Accounting interface: mo-0/2/0, Local interface index: 163
Service name: test3
Description Display available Physical Interface Cards (PICs) for accounting services.
inline-jflow fpc-slot slot-number—(Optional) Display inline flow accounting status for the
specified FPC. For a two-member MX Series Virtual Chassis, the master router uses
FPC slot numbers 0 through 11 with no offset; the backup router uses FPC slot
numbers 12 through 23, with an offset of 12.
List of Sample Output show services accounting status name (Monitoring PIC interface) on page 462
show services accounting status name (Service PIC interface) on page 462
show services accounting status inline-jflow fpc-slot slot-number (when both IPv4
and IPv6 are configured) on page 463
show services accounting status inline-jflow (MX80 Router when both IPv4 and IPv6
are configured) on page 463
Output Fields Table 30 on page 461 lists the output fields for the show services accounting status
command. Output fields are listed in the approximate order in which they appear.
Service name Name of a service that was configured at the [edit-forwarding-options accounting] hierarchy level.
The default display,(default sampling), indicates the service was configured at the
[edit-forwarding-options sampling-level] hierarchy level.
FPC Slot Slot number of the FPC for which the flow information is displayed.
Group index Integer that represents the monitoring group of which the PIC is a member. Group index is a mapping
from the group name to an index. It is not related to the number of monitoring groups.
Export interval (in Configured export interval for cflowd records, in seconds.
seconds)
Engine type Configured engine type that is inserted in output cflowd packets.
Route Records Set Status of route recording; whether routes are recorded or not.
Configuration Set Status of monitoring configuration; whether monitoring configuration is set or not.
Sample Output
show services accounting status name (Monitoring PIC interface)
user@host> show services accounting status name count1
Service Accounting interface: mo-2/0/0, Local interface index: 468
Service name: count1
Interface state: Accounting
Group index: 0
Export interval (in seconds): 60, Export format: cflowd v8
Protocol: IPv4, Engine type: 55, Engine ID: 5
Sample Output
show services accounting status name (Service PIC interface)
user@host> show services accounting status name
Service Accounting interface: sp-0/1/0
Interface state: Accounting
Export format: 9, Route record count: 0
show services accounting status inline-jflow fpc-slot slot-number (when both IPv4 and IPv6 are configured)
user@host> show services accounting status inline-jflow fpc-slot 5
FPC Slot: 5
IPV4 export format: Version-IPFIX, IPV6 export format: Version-IPFIX
VPLS export format: Not set
IPv4 Route Record Count: 5, IPv6 Route Record Count: 7
Route Record Count: 12, AS Record Count: 1
Route-Records Set: Yes, Config Set: Yes
show services accounting status inline-jflow (MX80 Router when both IPv4 and IPv6 are configured)
user@host> show services accounting status inline-jflow
Status information
TFEB Slot: 0
Export format: IP-FIX
IPv4 Route Record Count: 6, IPv6 Route Record Count: 8
Route Record Count: 14, AS Record Count: 1
Route-Records Set: Yes, Config Set: Yes
Description Display the CPU usage of PIC used for active flow monitoring.
name service-name—(Optional) Display CPU usage for the specified service name.
Additional Information When no route record has been downloaded from the PIC, this command reports no
flows, even though packets are being sampled.
List of Sample Output show services accounting usage (Monitoring PIC interface) on page 465
show services accounting usage (Service PIC interface) on page 465
Output Fields Table 31 on page 464 lists the output fields for the show services accounting usage
command. Output fields are listed in the approximate order in which they appear.
Service name Name of a service that was configured at the [edit-forwarding-options accounting] hierarchy level.
The default display, (default sampling), indicates the service was configured at the
[edit-forwarding-options sampling-level] hierarchy level.
Uptime Time that the PIC has been operational (in milliseconds).
Interrupt time Total time that the PIC has spent processing packets since the last PIC reset (in microseconds).
Load (5 second) CPU load on the PIC, averaged more than 5 seconds. The number is a percentage obtained by dividing
the time spent on active tasks by the total elapsed time.
Load (1 minute) CPU load on the PIC, averaged more than 1 minute. The number is a percentage obtained by dividing
the time spent on active tasks by the total elapsed time.
Sample Output
show services accounting usage (Monitoring PIC interface)
user@host> show services accounting usage
Service Accounting interface: mo-1/1/0, Local interface index: 15
Service name: (default sampling)
CPU utilization
Uptime: 600413856 milliseconds, Interrupt time: 2403 microseconds
Load (5 second): 43%, Load (1 minute): 24%
Sample Output
show services accounting usage (Service PIC interface)
user@host> show services accounting usage
Service Accounting interface: sp-0/1/0
Service name: (default sampling)
CPU utilization
Uptime: 7853940 milliseconds, Interrupt time: 0 microseconds
Load (5 second): 2%, Load (1 minute): 0%
Description (M320 routers and T Series routers only) Display information about the content
destination that receives packets from the dynamic flow capture (DFC) interface.
Output Fields Table 32 on page 466 lists the output fields for the show services dynamic-flow-capture
content-destination command. Output fields are listed in the approximate order in which
they appear.
Matched packets Number of matched packets sent to the content destination. to be provided
Matched bytes Number of matched bytes sent to the content destination. to be provided
Sample Output
show services dynamic-flow-capture content-destination
user@host> show services dynamic-flow-capture content-destination capture-group g1
destination-identifier cd1 terse
Capture group: g1, Content destination: cd1, Criteria: 0, Bandwidth: 0, Matched
packets: 0, Matched bytes: 0, Congestion notifications: 0
Description (M320 routers and T Series routers only) Display information about the control source
that makes dynamic flow capture requests to the dynamic flow capture interface.
Output Fields Table 33 on page 468 lists the output fields for the show services dynamic-flow-capture
control-source scommand. Output fields are listed in the approximate order in which they
appear.
Criteria added, Criteria add Number of criteria added or added and failed.
failed
Requests Number of Add, Delete, List, Refresh, and No-op control protocol
requests.
Failed Number of Add, Delete, List, Refresh, and No-op failed control
protocol requests.
Total notifications Total number of notifications sent and the number of notifications
by category: Restart, Rollover, Timeout, Congestion, Congestion
delete, and Dups (duplicates) dropped.
Criteria deleted Total number of criteria deleted and the number of deleted criteria
by category: Timeout idle, Timeout total, Packets, and Bytes.
Sample Output
show services dynamic-flow-capture control-source
user@host> show services dynamic-flow-capture control-source source-identifier cs0_cg0
capture-group cg_0
Capture group: cg_0, Control source: cs0_cg0
Criteria added: 28, Criteria add failed: 0, Active criteria: 0, Control protocol
requests: 28, Add request rate: 0,
Add request peak rate: 1, Bandwidth across all criteria: 0, Total notifications:
1, Criteria deleted: 28, Sequence number: 0
Requests 28 0 0 0 0
Failed 0 0 0 0 0
Description (M320 routers and T Series routers only) Display statistics information about the capture
group specified for dynamic flow capture.
Output Fields Table 34 on page 470 lists the output fields for the show services dynamic-flow-capture
statistics command. Output fields are listed in the approximate order in which they
appear.
Control protocol drops Control protocol packets dropped for the following reasons:
Input drops Incoming dynamic flow capture packets dropped for the following reasons:
• Unknown packets—Packets dropped because the packet type was not recognized.
• Captured data not IPv4—Packets dropped because they were not IPv4 packets.
• Captured data too small—Packets dropped because they were smaller than the size reported in
their headers.
• Captured data drops—Data packets dropped because of undetermined causes.
• Captured data not matched—Packets dropped because they did not match filter criteria.
• Bandwidth exceeded—Packets dropped because the bandwidth was exceeded.
• Drop rate due to exceeded bandwidth—Rate of traffic dropped because the bandwidth was exceeded.
Sample Output
show services dynamic-flow-capture statistics
user@host> show services dynamic-flow-capture statistics capture-group g1
Input:
Control protocol packets: 643, Captured data packets: 69977, Control IRI packets:
337
Bad request: 0, Unknown control source: 0, Not DTCP: 0, Bad command line: 0,
Bandwidth exceeded: 0,
Input drops:
Unknown packets: 0, Captured data not IPv4: 0, Captured data too small: 0,
Captured data drops: 0, Captured data not matched: 0,
Output:
Output drops:
Flow Statistics:
Active flow cache entries: 40, Active flow cache usage percentage: 0, Flow cache
entries allocated: 40,
Maximum criteria matching one flow: 16, Cached flows purged for memory: 0,
Maximum filters matching one packet: 16
Description (M40e, M160, and M320 routers and T Series routers only) Display information about
flow collector files.
Options all | cp-fpc/pic/port—Display file information for all configured flow collector interfaces
or for the specified interface.
Additional Information No entries are displayed for files that have been successfully transferred.
List of Sample Output show services flow-collector file interface extensive on page 474
Output Fields Table 35 on page 473 lists the output fields for the show services flow-collector file interface
command. Output fields are listed in the approximate order in which they appear.
Filename Name of the file created on the flow collector interface. All levels
Flows Total number of collector flows for which records are present in the file. none specified
Table 35: show services flow-collector file interface Output Fields (continued)
Output Field Output Field Description Level of Output
• Compressed blocks—(extensive output only) Data blocks in the file that have
been compressed. The file is exported only when the compressed block count
and block count become the same.
• Block count—(extensive output only) Total number of data blocks in the file.
• State—Processing state of the file.
• Active—The flow collector interface is writing to the file.
• Export 1—File export is in progress to the primary server.
• Export 2—File export is in progress to the secondary server.
• Wait—File is pending export.
• Transfer attempts 0.—Number of attempts made to transfer the file. If the
file is successfully transferred in the first attempt, this field is 0.
Sample Output
show services flow-collector file interface extensive
user@host> show services flow-collector file interface cp-3/2/0 extensive
Filename: cFlowd-py69Ni69-0-20031112_014301-so_3_0_0_0.bcp.bi.gz
Throughput:
Flow records: 188365, per second: 238, peak per second: 287
Uncompressed bytes: 21267756, per second: 27007, peak per second: 32526
Compressed bytes: 2965643, per second: 0, peak per second: 22999
Status:
Compressed blocks: 156, Block count: 156
State: Active, Transfer attempts: 0
Description (M40e, M160, and M320 routers and T Series routers only) Display the number of packets
received by collector interfaces from monitoring interfaces.
Options all | cp-fpc/pic/port—Display packets received by all configured flow collector interfaces
or by the specified interface.
List of Sample Output show services flow-collector input interface on page 475
show services flow-collector input interface all on page 475
Output Fields Table 36 on page 475 lists the output fields for the show services flow-collector input
interface command. Output fields are listed in the approximate order in which they appear.
Packets Number of packets traveling from the monitoring interface to the flow collector
interface.
Bytes Number of bytes traveling from the monitoring interface to the flow collector
interface.
Sample Output
show services flow-collector input interface
user@host> show services flow-collector input interface cp-3/2/0
Interface Packets Bytes
mo-3/0/0.0 21706 32328568
mo-3/1/0.0 21706 32329096
Description (M40e, M160, and M320 routers and T Series routers only) Display overall statistics for
the flow collector application.
Options all | cp-fpc/pic/port—Display statistics for flow collector applications on all interfaces or
for the specified interface.
List of Sample Output show services flow-collector interface all detail on page 479
show services flow-collector interface all extensive on page 480
show services flow-collector interface all terse on page 482
show services flow-collector interface extensive on page 482
Output Fields Table 37 on page 477 lists the output fields for the show services flow-collector interface
command. Output fields are listed in the approximate order in which they appear.
Interface state Collecting flow state for the interface. All levels
Flows Total uncompressed data size for all files created on this PIC. none specified
Uncompressed
Bytes
Compressed Bytes Total compressed data size for all files created on this PIC. none specified
FTP bytes Total number of bytes transferred to the FTP server, including those dropped none specified
during transfer.
FTP files Total number of FTP transfers attempted by the server. none specified
Memory Bytes used on the PIC and bytes free. detail extensive
Files File statistics, incremented since the PIC last booted: detail extensive
• Compressed bytes—Total compressed data size for all files created on this
PIC.
• per second—Average number of compressed bytes per second.
• peak per second—Peak number of compressed bytes per second.
Packet drops Number of packets dropped for the following causes: extensive
Export channel Export channel 0 is unit 0. Export channel 1 is unit 1. Flow receive channel is detail extensive
unit 2. Server status statistics are the following:
Sample Output
show services flow-collector interface all detail
user@host> show services flow-collector interface all detail
Allocation:
Blocks allocated: 108, per second: 0, peak per second: 0
Blocks freed: 108, per second: 0, peak per second: 10
Blocks unavailable: 0, per second: 0, peak per second: 0
Files:
Files created: 1, per second: 0, peak per second: 0
Files exported: 1, per second: 0, peak per second: 0
Files destroyed: 1, per second: 0, peak per second: 0
Throughput:
Uncompressed bytes: 13742307, per second: 0, peak per second: 593564
Compressed bytes: 3786177, per second: 0, peak per second: 162826
Packet drops:
No memory: 0, Not IP: 0
Not IPv4: 0, Too small: 0
Fragments: 0, ICMP: 0
TCP: 0, Unknown: 0
Not JUNOS flow: 0
File Transfer:
FTP bytes: 3786247, per second: 0, peak per second: 378620
FTP files: 1, per second: 0, peak per second: 0
FTP failure: 0
Export channel: 0
Current server: Primary
Primary server state: OK, Secondary server state: OK
Export channel: 1
Current server: Primary
Primary server state: Unknown, Secondary server state: OK
Description Display the protocols and corresponding ports for which a router or switch is configured
as a real-time performance monitoring (RPM) server.
Output Fields Table 38 on page 483 lists the output fields for the show services rpm active-servers
command. Output fields are listed in the approximate order in which they appear.
Protocol Protocol configured on the receiving probe server. The protocol can
be the User Datagram Protocol (UDP) or the Transmission Control
Protocol (TCP).
Sample Output
show services rpm active-servers
user@host> show services rpm active-servers
Protocol: TCP, Port: 50000, Destination interface name: lt-0/0/0.0
Protocol: UDP, Port: 50001, Destination interface name: lt-0/0/0.0
Description Display standard information about the results of the last 50 probes for each real-time
performance monitoring (RPM) instance.
Options none—Display the results of the last 50 probes for all RPM instances.
since time—(Optional) Display information from the specified time. Specify time as
yyyy-mm-dd.hh:mm:ss.
Output Fields Table 39 on page 484 lists the output fields for the show services rpm history-results
command. Output fields are listed in the approximate order in which they appear.
Probe received Timestamp when the probe result was determined. All levels
Round trip time Average ping round-trip time (RTT), in microseconds. All levels
Probe results Result of a particular probe performed by a remote host. The following detail
information is contained in the results:
Results over current Displays the results for the current test by probe at the time each probe was detail
test completed, as well as the status of the current test at the time the probe was
completed.
Probes sent Number of probes sent with the current test. detail
Probes received Number of probe responses received within the current test. detail
Loss percentage Percentage of lost probes for the current test. detail
Measurement Increment of measurement. Possible values are round-trip time delay and, for detail
the probe type icmp-pin-timestamp, the egress and ingress delay:
Sample Output
show services rpm history-results
user@host> show services rpm history-results
Owner, Test Probe received Round trip time
p1, t1 Wed Aug 12 01:02:35 2009 315 usec
p1, t1 Wed Aug 12 01:02:36 2009 266 usec
p1, t1 Wed Aug 12 01:02:37 2009 314 usec
p1, t1 Wed Aug 12 01:02:38 2009 388 usec
p1, t1 Wed Aug 12 01:02:39 2009 316 usec
p1, t1 Wed Aug 12 01:02:40 2009 271 usec
p1, t1 Wed Aug 12 01:02:41 2009 314 usec
p1, t1 Wed Aug 12 01:02:42 2009 1180 usec
Description Display the results of the most recent real-time performance monitoring (RPM) probes.
Output Fields Table 40 on page 487 lists the output fields for the show services rpm probe-results
command. Output fields are listed in the approximate order in which they appear.
Owner Owner name. When you configure the probe owner statement at the [edit services rpm] hierarchy
level, this field displays the configured owner name. When you configure BGP neighbor discovery
through RPM, the output for this field is Rpm-Bgp-Owner.
Test Name of a test representing a collection of probes. When you configure the test test-name statement
at the [edit services rpm probe owner] hierarchy level, the field displays the configured test name.
When you configure BGP neighbor discovery through RPM, the output for this field is Rpm-BGP-Test-
n, where n is a cumulative number.
Probe type Protocol configured on the receiving probe server: http-get, http-metadata-get, icmp-ping,
icmp-ping-timestamp, tcp-ping, udp-ping, or udp-ping-timestamp.
Routing Instance Name (BGP neighbor discovery) Name of the configured (if any) routing instance, logical system name, or
both, in which the probe is configured:
• When a routing instance is defined within a logical system, the logical system name is followed by
the routing instance name. A slash ( / ) is used to separate the two entities. For example, if the
routing instance called R1 is configured within the logical system called LS, the name in the output
field is LS/R1.
• When a routing instance is configured but the default logical system is used, the name in the output
field is the name of the routing instance.
• When a logical system is configured but the default routing instance is used, the name in the output
field is the name of the logical system followed by default. A slash (/) is used to separate the two
entities. For example, LS/default.
Probe results Raw measurement of a particular probe sample done by a remote host. This data is provided separately
from the calculated results. The following information is contained in the raw measurement:
Results over current test Probes are grouped into tests, and the statistics are calculated for each test. If a test contains 10
probes, the average, minimum, and maximum results are calculated from the results of those 10
probes. If the command is issued while the test is in progress, the statistics use information from the
completed probes.
• Samples—Number of probes.
• Minimum—Minimum RTT, ingress delay, or egress delay measured over the course of the current
test.
• Maximum—Maximum RTT, ingress delay, or egress delay measured over the course of the current
test.
• Average—Average RTT, ingress delay, or egress delay measured over the course of the current
test.
• Peak to peak—Peak-to-peak difference, in microseconds.
• Stddev—Standard deviation, in microseconds.
• Sum—Statistical sum.
Results over last test Results for the most recently completed test. If the command is issued while the first test is in progress,
this information is not displayed
• Probes sent—Number of probes sent for the most recently completed test.
• Probes received—Number of probe responses received for the most recently completed test.
• Loss percentage—Percentage of lost probes for the most recently completed test.
• Test completed—Time the most recent test was completed.
• Measurement—Measurement type. Possible values are round-trip time, positive round-trip jitter,
negative round-trip jitter, egress time, positive egress jitter, negative egress jitter, ingress time,
positive ingress jitter, negative ingress jitter, and, for the probe type icmp-ping-timestamp, the egress
delay and ingress delay.
For each measurement type, the following individual calculated results are provided:
• Samples—Number of probes.
• Minimum—Minimum RTT, ingress delay, or egress delay measured for the most recently completed
test.
• Maximum—Maximum RTT, ingress delay, or egress delay measured for the most recently
completed test.
• Average—Average RTT, ingress delay, or egress delay measured for the most recently completed
test.
• Peak to peak—Peak-to-peak difference, in microseconds.
• Stddev—Standard deviation, in microseconds.
• Sum—Statistical sum.
Results over all tests Displays statistics made for all the probes, independently of the grouping into tests, as well as statistics
for the current test.
• Samples—Number of probes.
• Minimum—Minimum RTT, ingress delay, or egress delay measured over the course of the current
test.
• Maximum—Maximum RTT, ingress delay, or egress delay measured over the course of the current
test.
• Average—Average RTT, ingress delay, or egress delay measured over the course of the current
test.
• Peak to peak—Peak-to-peak difference, in microseconds.
• Stddev—Standard deviation, in microseconds.
• Sum—Statistical sum.
• Invalid client recv timestamp—Number of client receive timestamp less than client send timestamp.
• Invalid server send timestamp—Number of server send timestamp less than server receive timestamp.
• Invalid server processing time—Number of server side spent time greater than RTT.
NOTE: Error Stats is displayed in the output only if non-zero statistics exists.
Sample Output
show services rpm probe-results
user@host> show services rpm probe-results
Owner: ADSN-J4300.ADSN-J2300.D2, Test: 75300002
Target address: 172.16.54.172, Source address: 10.206.0.1,
Probe type: udp-ping-timestamp, Test size: 10 probes
Probe results:
Response received, Tue Feb 6 14:53:15 2007,
Client and server hardware timestamps
Rtt: 575 usec, Egress jitter: 5 usec, Ingress jitter: 8 usec,
Round trip jitter: 12 usec, Egress interarrival jitter: 8 usec,
Ingress interarrival jitter: 7 usec, Round trip interarrival jitter: 7 usec,
Peak to peak: 2309 usec, Stddev: 519 usec, Sum: xxxx usec
Measurement: Positive round trip jitter
Samples: 257, Minimum: 0 usec, Maximum: 2054 usec, Average: 597 usec,
Peak to peak: 2054 usec, Stddev: 427 usec, Sum: xxxx usec
Measurement: Negative round trip jitter
Samples: 302, Minimum: 1 usec, Maximum: 1812 usec, Average: 511 usec,
Peak to peak: 1811 usec, Stddev: 408 usec, Sum: xxxx usec
Measurement: Egress time
Samples: 10, Minimum: 805 usec, Maximum: 2859 usec, Average: 1644 usec,
Peak to peak: 2054 usec, Stddev: 738 usec, Sum: xxxx usec
Measurement: Positive Egress jitter
Samples: 5, Minimum: 5 usec, Maximum: 2054 usec, Average: 876 usec,
Peak to peak: 2049 usec, Stddev: 679 usec, Sum: xxxx usec
Measurement: Negative Egress jitter
Samples: 5, Minimum: 5 usec, Maximum: 1812 usec, Average: 926 usec,
Peak to peak: 1807 usec, Stddev: 665 usec, Sum: xxxx usec
Measurement: Ingress time
Samples: 10, Minimum: 805 usec, Maximum: 2859 usec, Average: 1644 usec,
Peak to peak: 2054 usec, Stddev: 738 usec, Sum: xxxx usec
Measurement: Positive Ingress jitter
Samples: 5, Minimum: 5 usec, Maximum: 2054 usec, Average: 876 usec,
Peak to peak: 2049 usec, Stddev: 679 usec, Sum: xxxx usec
Measurement: Negative Ingress jitter
Samples: 5, Minimum: 5 usec, Maximum: 1812 usec, Average: 926 usec,
Peak to peak: 1807 usec, Stddev: 665 usec, Sum: xxxx usec
Error Stats:
Invalid client recv timestamp: 3, Invalid server send timestamp: 0
Invalid server processing time: 0
Release Information Command introduced in Junos OS Release 12.3X52 for ACX Series routers.
Command introduced in Junos OS Release 13.3R1 for MX104 3D Universal Edge Routers.
Description Display information about the results of each category or state of the RFC 2544-based
benchmarking test, such as aborted tests, active tests, and completed tests, for each
real-time performance monitoring (RPM) instance. You can view the results of each test
state for all of the configured test IDs or for a specific test ID. Also, you can display
statistics about the total number of tests of each state for a high-level, quick analysis.
The values in the output displayed vary, depending on the state in which the test is passing
through, when you issue the command.
You can view the test results of multiple test IDs at the same time by entering the IDs in
a single command. If you enter multiple test ID values, you must separate each number
with a space.
Options aborted-tests—Display the list of tests that were aborted or stopped. This list includes
tests that failed due to various error conditions and tests that you terminated by
entering the test service rpm rfc2544-benchmarking test test-name stop command.
The Status field in the output specifies the reason for the termination of the test.
test-id test-id—Unique identifier of the test for which the test results must be displayed.
active-tests—Display the results of the set of tests that are currently running.
completed-tests—Display the results of the set of tests that were successfully completed.
A completed test is one that passes through all the test steps or states specified in
RFC 2544. A test that is marked as completed after it went through all the states
from the beginning to the end can still be reported as a failed test. For example, a
failed test can be a test that sends the desired number of packets, but does not
receive the frames back from the other end.
List of Sample Output show services rpm rfc2544-benchmarking summary on page 495
show services rpm rfc2544-benchmarking aborted-tests (ACX Series router) on page 495
show services rpm rfc2544-benchmarking completed-tests (ACX Series
router) on page 495
show services rpm rfc2544-benchmarking active-tests (ACX Series router) on page 496
show services rpm rfc2544-benchmarking aborted-tests (MX104 router) on page 496
show services rpm rfc2544-benchmarking completed-tests (MX104 router) on page 496
show services rpm rfc2544-benchmarking active-tests (MX104 router) on page 497
Output Fields Table 41 on page 494 lists the output fields for the show services rpm rfc2544-benchmarking
(aborted-tests | active-tests | completed-tests) command. Output fields are listed in the
approximate order in which they appear.
Test type The type of statistical detail that is collected for the test, based on the configured
test type. Throughput-related, latency, frame-loss, or back-to-back
frames-related information is displayed for ACX Series routers. Reflected
packets-related information is displayed for MX104 routers..
Test mode Mode configured for the test on the router. Test modes are:
• Initiate-and-Terminate: Test frames are initiated from one end and terminated
at the same end. This mode requires a reflector to be configured at the peer
end to enable the test frames to be returned to the source. This mode is
supported only on ACX Series routers
• Reflect: Test frames that originate from one end are reflected at the other
end on the selected service, such as IPv4 or Ethernet.
Test packet size Size of the test packets in bytes. This field is valid only when the test mode is
Initiate-and-Terminate.
Test state State of the test that is in progress or active when the output is displayed.
Status Indicates whether the test is currently in progress or has been terminated. This
field is displayed for tests that are in progress or were aborted by entering the
test services rpm rfc2544-benchmarking test <test-name | test-id> stop command.
Test start time Time at which the test started in Coordinated Universal Time (UTC) format
(YYYY-MM-DD-HH:MM:SS).
Counters last Date, time, and how long ago the statistics for the test were cleared. The format
cleared is year-month-day hour:minute:second:timezone (hour:minute:second ago). For
example, 2010-05-17 07:51:28 PDT (00:04:33 ago). If you did not clear the
statistics previously at any point, Never is displayed.
Sample Output
show services rpm rfc2544-benchmarking summary
user@host> show services rpm rfc2544-benchmarking summary
This output indicates that no test iteration is currently in progress (at the time of issue
of the command), 4 tests were completed successfully, and 52 tests were halted.
Test information :
Test id: 18, Test name: test1, Test type: Throughput
Test mode: Initiate-and-Terminate
Test packet size: 64 1280
Test state: RFC2544_TEST_STATE_COMPLETED
Test start time: 2005-08-05 03:20:34 UTC
Test finish time: 2005-08-05 03:21:23 UTC
Counters last cleared: Never
Release Information Command introduced in Junos OS Release 12.3X52 for ACX Series routers.
Command introduced in Junos OS Release 13.3R1 for MX104 3D Universal Edge Routers.
Description Display information about the results of the RFC 2544-based benchmarking test for a
specific test ID for each real-time performance monitoring (RPM) instance. The values
in the output displayed vary, depending on the state in which the test is passing through,
when you issue the command.
Options none—Display brief information about a specific test ID of the benchmarking test.
test-id test-id—Unique identifier of the test for which the test results must be displayed.
List of Sample Output show services rpm rfc2544-benchmarking test-id detail (Throughput Test on ACX
Series routers ) on page 506
show services rpm rfc2544-benchmarking test-id detail (Latency Test on ACX Series
routers) on page 507
show services rpm rfc2544-benchmarking test-id detail (Frame Loss Test on ACX
Series routers) on page 510
show services rpm rfc2544-benchmarking test-id detail (Back-to-Back Frames Test
on ACX Series routers) on page 511
show services rpm rfc2544-benchmarking test-id detail (Reflection Test on MX104
routers) on page 512
show services rpm rfc2544-benchmarking test-id brief (Reflection Test on MX104
routers) on page 513
show services rpm rfc2544-benchmarking test-id detail (Reflection Test on MX104
routers) on page 513
show services rpm rfc2544-benchmarking test-id brief (Reflection Test on MX104
routers) on page 514
Output Fields Table 42 on page 499 lists the output fields for the show services rpm rfc2544-benchmarking
test-id command. Output fields are listed in the approximate order in which they appear.
Test information Details of the performed RFC 2544 benchmarking test. None specified
Test type The type of statistical detail that is collected for the test, based on the configured None specified
test type. Throughput-related, latency, frame-loss, or back-to-back
frames-related information is displayed for ACX Series routers. Reflected
packets-related information is displayed for MX104 routers.
Test mode Mode configured for the test on the router. Test modes are: None specified
• Initiate-and-Terminate: Test frames are initiated from one end and terminated
at the same end. This mode requires a reflector to be configured at the peer
end to enable the test frames to be returned to the source. This mode is
supported only on ACX Series routers.
• Reflect: Test frames that originate from one end are reflected at the other
end on the selected service, such as IPv4 or Ethernet.
Test packet size Size of the test packets in bytes. This field is valid only when the test mode is None specified
Initiate-and-Terminate.
Test state State of the test that is in progress or active when the output is displayed. For None specified
details about the states, see RFC 2544-Based Benchmarking Test States.
Status Indicates whether the test is currently in progress or has been terminated. None specified
Test start time Time at which the test started in Coordinated Universal Time (UTC) format None specified
(YYYY-MM-DD-HH:MM:SS).
Test finish time Time at which the test completed. None specified
Counters last Date, time, and how long ago the statistics for the test were cleared. The format None specified
cleared is year-month-day hour:minute:second:timezone (hour:minute:second ago). For
example, 2010-05-17 07:51:28 PDT (00:04:33 ago). If you did not clear the
statistics previously at any point, Never is displayed.
Test-profile (ACX Series routers only) Details of the specified test profile detail
Configuration
Test-profile name (ACX Series routers only) Name of the configured test profile that contains the detail
parameters for the test
Test packet size (ACX Series routers only) Size of the test packets in bytes detail
Theoretical max (ACX Series routers only) Theoretical maximum bandwidth configured for the detail
bandwidth test. This value is typically set to the bandwidth of the server being tested. Valid
values are 1 Kbps through 1,000,000 Kbps (1 Gbps). The value defined is the
highest bandwidth value tested for this test.
Table 42: show services rpm rfc2544-benchmarking test-id Output Fields (continued)
Field Name Field Description Level of Output
Test mode Mode configured for the test. Test modes are Initiate-and-Terminate and Reflect. detail
Duration in seconds Period in seconds for which the test has been performed. detail
Test family The underlying service on which the test is run. Test families are: detail
Routing Instance (ACX Series routers only) Name of the routing instance for the test detail
Name
Inet family Details of the configured inet family for an IPv4 service detail
Configuration
Egress Interface Name of the egress interface from which the test frames are sent detail
Source ipv4 Source IPv4 address used in the IP header of the generated test frame. detail
address
Destination ipv4 Destination IPv4 address used in the IP header of the generated test frame. detail
address
Source udp port Source UDP port number used in the UDP header of the generated test frame. detail
Destination udp Destination UDP port number used in the UDP header of the generated test detail
port frame.
Ccc family Details of the configured CCC family for an Ethernet service detail
Configuration
Source MAC (ACX Series routers only) Source MAC address used in generated test frames detail
address for a CCC or Ethernet pseudowire service.
Destination MAC (ACX Series routers only) Destination MAC address used in generated test detail
address frames for a CCC or Ethernet pseudowire service.
Ivlan-id (ACX Series routers only) Inner VLAN ID for test-frames. detail
Ovlan-id (ACX Series routers only) Outer VLAN ID for test-frames. detail
Direction egress Test is run in the egress direction of the interface (NNI) detail
Direction ingress Test is run in the ingress direction of the interface (UNI) detail
Table 42: show services rpm rfc2544-benchmarking test-id Output Fields (continued)
Field Name Field Description Level of Output
Rfc2544 (ACX Series routers only) Details of the throughput test detail
throughput test
information
Initial test load Percentage of the steady state load for the test. detail
percentage
Test iteration mode Mode of the test iteration: Binary or step-down. detail
Test iteration step The test step percentage for tests. If not specified, the default step-percent is detail
percent 10 percent. This parameter is ignored for all type of tests other than frame-loss
tests.
Theoretical max The theoretical limit of the media for the frame size configured for the test. This detail
bandwidth value is typically set to the bandwidth of the server being tested.
Test packet size: Packet size of the test frames in bytes. detail
Duration (sec) Period in seconds for which the test iteration is run detail
Elapsed time Amount of time that has passed, in seconds, since the start of the test. detail
pps Total count of packets-per-second (pps) transmitted during the test. detail
Result of the Results of the completed throughput test for a particular packet size. detail
iteration runs
(Throughput) :
Best iteration Number of the iteration with the highest throughout, among the listed iterations. detail
Best iteration (pps) Packets-per-second (pps) count of the iteration with the highest throughout, detail
among the listed iterations.
Best iteration Percentage of throughput of the iteration with the highest throughout, among detail
throughput the listed iterations.
Table 42: show services rpm rfc2544-benchmarking test-id Output Fields (continued)
Field Name Field Description Level of Output
Offered throughput The offered throughput in percentage of the chosen service (such as Layer 3 or detail summary
(percentage) Ethernet pseudowire).
Measured Available bandwidth of the service based on the calculated throughput. detail summary
bandwidth (kbps)
Rfc2544 latency (ACX Series routers only) Details of the latency test detail
test information
:
Theoretical max Theoretical maximum bandwidth configured for the test. This value is typically detail
bandwidth set to the bandwidth of the server being tested. Valid values are 1 Kbps through
1,000,000 Kbps (1 Gbps). The value defined is the highest bandwidth value
used for this test.
Initial test load Percentage of the steady state load for the test. detail
percentage
Duration in seconds Period in seconds for which the test has been performed. detail
Duration (sec) Period in seconds for which the test iteration is run. detail
Elapsed time Amount of time that has passed, in seconds, since the start of the test. detail
pps Total count of packets-per-second (pps) transmitted during the test. detail
Table 42: show services rpm rfc2544-benchmarking test-id Output Fields (continued)
Field Name Field Description Level of Output
Result of the Results of the latency test completed for a particular packet size. detail
iteration runs
(Latency)
Rfc2544 (ACX Series routers only) Details of the back-to-back frames or bursty detail
Back-Back test frames test.
information :
Initial burst length: Length of the first burst when test frames are sent, as a measure of number of detail
seconds at the rate of Kbps.
Table 42: show services rpm rfc2544-benchmarking test-id Output Fields (continued)
Field Name Field Description Level of Output
Test iteration mode Mode of the test iteration: Binary or step-down. detail
:
Test iteration step The test step percentage for tests. If not specified, the default step-percent is detail
percent 10 percent. This parameter is ignored for all type of tests other than frame-loss
tests.
Theoretical max The theoretical limit of the media for the frame size configured for the test. This detail
bandwidth value is typically set to the bandwidth of the server being tested.
Test packet size: Packet size of the test frames in bytes. detail
Elapsed time Amount of time that has passed, in seconds, since the start of the test. detail
Result of the Results of the back-to-back frames test completed for a certain packet size. detail
iteration runs :
Best iteration : Number of the iteration with the longest burst. detail
Measured burst Time in seconds of the burst of the iteration with the longest burst. detail
(num sec)
Measured burst Number of packets during the burst of the iteration with the longest burst. detail
(num pkts)
Measure Burst Computed burst length in terms of number of packets. detail summary
length (Packets)
Table 42: show services rpm rfc2544-benchmarking test-id Output Fields (continued)
Field Name Field Description Level of Output
Rfc2544 (ACX Series routers only) Details of the frame-loss test. detail
frame-loss test
information :
Initial burst length: Length of the first burst when test frames are sent, as a measure of number of detail
seconds at the rate of Kbps.
Test iteration mode Mode of the test iteration: Binary or step-down. detail
:
Test iteration step The test step percentage for tests. If not specified, the default step-percent is detail
percent 10 percent. This parameter is ignored for all type of tests other than frame-loss
tests.
Theoretical max The theoretical limit of the media for the frame size configured for the test. This detail
bandwidth value is typically set to the bandwidth of the server being tested.
Duration (sec) Period, in seconds, for which the test iteration is run. detail
Offered throughput The offered throughput in percentage of the chosen service (such as Layer 3 or detail
(percentage) Ethernet pseudowire)
Elapsed time Amount of time that has passed, in seconds, since the start of the test. detail
Frame-loss rate % Percentage of frames that must been forwarded by the router under steady detail
state (constant) load, but were not forwarded due to lack of resources.
Result of the Results of the frame-loss test completed for a certain packet size. detail
iteration runs :
Frame-loss rate Percentage of dropped frames for the specified packet size detail
(percent) :
Table 42: show services rpm rfc2544-benchmarking test-id Output Fields (continued)
Field Name Field Description Level of Output
Frame Loss rate Percentage of dropped frames for the specified packet size detail summary
percent
Sample Output
show services rpm rfc2544-benchmarking test-id detail (Throughput Test on ACX Series routers )
user@host> show services rpm rfc2544-benchmarking test-id 19 detail
Test information :
Test id: 19, Test name: test1, Test type: Throughput
Test mode: Initiate-and-Terminate
Test packet size: 64 1280
Test state: RFC2544_TEST_STATE_COMPLETED
Test start time: 2005-07-29 10:25:00 UTC
Test finish time: 2005-07-29 10:26:02 UTC
Counters last cleared: Never
Test-profile Configuration:
Test-profile name: prof_tput
Test packet size: 64 1280
Therotical max bandwidth : 993000 kbps
Test Configuration:
Test mode: Initiate-and-Terminate
Duration in seconds: 20
Test family: INET
Routing Instance Name: default
Result of the iteration runs : Throughput Test complete for packet size 64
Best iteration : 2, Best iteration (pps) : 1349184
Best iteration throughput : 100.00 %
Result of the iteration runs : Throughput Test complete for packet size 1280
Best iteration : 2, Best iteration (pps) : 94896
Best iteration throughput : 100.00 %
show services rpm rfc2544-benchmarking test-id detail (Latency Test on ACX Series routers)
user@host> show services rpm rfc2544-benchmarking test-id 37 detail
Test information :
Test id: 37, Test name: test1, Test type: Latency
Test mode: Initiate-and-Terminate
Test packet size: 64 1280
Test state: RFC2544_TEST_STATE_COMPLETED
Test start time: 2005-07-29 10:26:41 UTC
Test finish time: 2005-07-29 10:36:15 UTC
Counters last cleared: Never
Test-profile Configuration:
Test-profile name: prof_latency
Test packet size: 64 1280
Therotical max bandwidth : 993000 kbps
Test Configuration:
Test mode: Initiate-and-Terminate
Duration in seconds: 10
Test family: INET
Routing Instance Name: default
Result of the iteration runs : Latency Test complete for packet size 64
Avg (min) Latency : 17466
Avg (avg) latency : 18799
Avg (Max) latency : 20360
Avg (probe) latency : 18844
Result of the iteration runs : Latency Test complete for packet size 1280
Avg (min) Latency : 68720
Avg (avg) latency : 70344
show services rpm rfc2544-benchmarking test-id detail (Frame Loss Test on ACX Series routers)
user@host> show services rpm rfc2544-benchmarking test-id 73 detail
Test information :
Test id: 73, Test name: test1, Test type: Frame-Loss
Test mode: Initiate-and-Terminate
Test packet size: 64 1280
Test state: RFC2544_TEST_STATE_COMPLETED
Test start time: 2005-07-29 10:38:41 UTC
Test finish time: 2005-07-29 10:41:19 UTC
Counters last cleared: Never
Test-profile Configuration:
Test-profile name: prof_fl
Test packet size: 64 1280
Therotical max bandwidth : 993000 kbps
Test Configuration:
Test mode: Initiate-and-Terminate
Duration in seconds: 20
Test family: INET
Routing Instance Name: default
Result of the iteration runs : Frame-loss test complete for packet size 64
Frame-loss rate (percent) : 0.00 %
Result of the iteration runs : Frame-loss test complete for packet size 1280
Frame-loss rate (percent) : 0.00 %
show services rpm rfc2544-benchmarking test-id detail (Back-to-Back Frames Test on ACX Series routers)
user@host> show services rpm rfc2544-benchmarking test-id 55 detail
Test information :
Test id: 55, Test name: test1, Test type: Back-Back-Frames
Test mode: Initiate-and-Terminate
Test packet size: 64 1280
Test state: RFC2544_TEST_STATE_COMPLETED
Test start time: 2005-07-29 10:36:54 UTC
Test finish time: 2005-07-29 10:37:57 UTC
Counters last cleared: Never
Test-profile Configuration:
Test-profile name: prof_b2b
Test packet size: 64 1280
Therotical max bandwidth : 993000 kbps
Test Configuration:
Test mode: Initiate-and-Terminate
Duration in seconds: 20
Test family: INET
Routing Instance Name: default
Result of the iteration runs : Back-Back-Frames Test complete for packet size
64
Best iteration : 2
Measured burst (num sec) : 20 sec,
Measured burst (num pkts) : 26983680 packets
Result of the iteration runs : Back-Back-Frames Test complete for packet size
64
Best iteration : 2
Measured burst (num sec) : 20 sec,
Measured burst (num pkts) : 26983680 packets
Result of the iteration runs : Back-Back-Frames Test complete for packet size
12
Best iteration : 2
Measured burst (num sec) : 20 sec,
Measured burst (num pkts) : 1897920 packets
show services rpm rfc2544-benchmarking test-id detail (Reflection Test on MX104 routers)
user@host> show services rpm rfc2544-benchmarking test-id detail 1
Test information :
Test id: 1, Test name: fort_uni_inet_ref, Test type: Reflect
Test mode: Reflect
Test packet size: 0
Test state: RFC2544_TEST_STATE_RUNNING
Status: Running
Test start time: 2013-12-09 16:24:52 IST
Test finish time: TEST_RUNNING
Counters last cleared: Never
Test Configuration:
Test mode: Reflect
Duration in seconds: 864000
Test family: INET
Routing Instance Name: default
show services rpm rfc2544-benchmarking test-id brief (Reflection Test on MX104 routers)
user@host> show services rpm rfc2544-benchmarking test-id brief 1
Test information :
Test id: 1, Test name: fort_uni_inet_ref, Test type: Reflect
Test mode: Reflect
Test packet size: 0
Test state: RFC2544_TEST_STATE_RUNNING
Status: Running
Test start time: 2013-12-09 16:24:52 IST
Test finish time: TEST_RUNNING
Counters last cleared: Never
show services rpm rfc2544-benchmarking test-id detail (Reflection Test on MX104 routers)
user@host> show services rpm rfc2544-benchmarking test-id detail 2
Test information :
Test id: 2, Test name: fort_uni_inet_ref, Test type: Reflect
Test mode: Reflect
Test packet size: 0
Test state: RFC2544_TEST_STATE_RUNNING
Status: Running
Test start time: 2013-12-09 16:39:18 IST
Test finish time: TEST_RUNNING
Counters last cleared: Never
Test Configuration:
Test mode: Reflect
Duration in seconds: 864000
Test family: CCC
Routing Instance Name: default
show services rpm rfc2544-benchmarking test-id brief (Reflection Test on MX104 routers)
user@host> show services rpm rfc2544-benchmarking test-id 2 brief
Test information :
Test id: 2, Test name: fort_uni_inet_ref, Test type: Reflect
Test mode: Reflect
Test packet size: 0
Test state: RFC2544_TEST_STATE_RUNNING
Status: Running
Test start time: 2013-12-09 16:39:18 IST
Test finish time: TEST_RUNNING
Counters last cleared: Never
Description Display information about the connections established between the real-time
performance monitoring (RPM) Two-Way Active Measurement Protocol (TWAMP)
server and control-clients. By default, all established sessions are displayed, unless you
specify a session ID when you issue the command.
Options connection-id—(Optional) Display only information about the specified connection ID.
List of Sample Output show services rpm twamp server connection on page 515
Output Fields Table 43 on page 515 lists the output fields for the show services rpm twamp server
connection command. Output fields are listed in the approximate order in which they
appear.
Table 43: show services rpm twamp server connection Output Fields
Field Name Field Description
Connection ID Connection ID that uniquely identifies the connection between the TWAMP
server and a particular client.
Sample Output
show services rpm twamp server connection
user@host> show services rpm twamp server connection
Connection Client Client Server Server Session Auth
Description Display information about the sessions established between the real-time performance
monitoring (RPM) Two-Way Active Measurement Protocol (TWAMP) server and control
clients. By default, all established sessions are displayed, unless you specify a session
ID when you issue the command.
Options session-id—(Optional) Display only information about the specified session ID.
List of Sample Output show services rpm twamp server session on page 517
Output Fields Table 44 on page 517 lists the output fields for the show services rpm twamp server session
command. Output fields are listed in the approximate order in which they appear.
Table 44: show services rpm twamp server session Output Fields
Field Name Field Description
Session ID Session ID that uniquely identifies the session between the TWAMP
server and a particular client.
Sample Output
show services rpm twamp server session
user@host> show services rpm twamp server session
Session Connection Sender Sender Reflector Reflector
ID ID address port address port
4 44 1.1.1.1 12345 192.168.219.203 890
78 44 3.22.1.55 345 22.2.2.2 89022
234 423 192.168.219.203 2345 2.2.22.2 3333
5 423 221.4.1.1 82345 2.2.2.2 45909
1 423 192.168.1.1 645 32.2.2.23 2394
Options fpc-slot—Number of the fpc slot for which statistics are displayed.
List of Sample Output show services video-monitoring mdi errors fpc-slot on page 519
Output Fields Table 45 on page 519 lists the output fields for the show services video-monitoring mdi
errors fpc-slot fpc-slot command. Output fields are listed in the approximate order in
which they appear.
Table 45: show services video-monitoring mdi errors fpc-slot Output Fields
Field Name Field Description
Flow Insert Error Number of errors during new flow insert operations.
NOTE: New flows usually arrive within a very short time interval (1.5
microseconds). These errors do not represent the loss of entire flows, because
subsequent packets in the flow can establish the flow. All packets are monitored
after a flow has been established. Packet forwarding occurs independently of
the video monitoring, and packets are not dropped due to video monitoring
errors.
Unsupported Media Number of packets dropped because they are not media packets or they are
Packets Count unsupported media packets.
PID Limit Exceeded Number of packets unmonitored because the process identifier (PID) limit
exceeded has been exceeded.
Sample Output
show services video-monitoring mdi errors fpc-slot
user@host> show services video-monitoring mdi errors fpc-slot 2
List of Sample Output show servicesvideo-monitoring mdi flows fpc-slot brief on page 522
show services inline-video-monitoring mdi flows detail on page 523
Output Fields Table 46 on page 522 lists the output fields for the show services inline-video-monitoring
mdi flows fpc-slot fpc-slot command. Output fields are listed in the approximate order
in which they appear.
SP Source port
DP Destination port
Ty Type of flow
Last DF:MLR Delay factor and media loss rate value of last media delivery index record
Avg DF:MLR Average value of delay factor and media loss rate
Last MRV Media rate variation value of last media delivery index record
Sample Output
show servicesvideo-monitoring mdi flows fpc-slot brief
user@host> show services inline-video-monitoring mdi flows fpc-slot 2 brief
--------------------------------------------------------------------------------------------------------------------------------------------
Sno |SIP |SP |DIP |DP |Di|Ty |Last DF:MLR |Avg
DF:MLR |Last MRV |Avg MRV |IFL |Template Name
--------------------------------------------------------------------------------------------------------------------------------------------
1 20.0.0.2 1024 30.0.0.2 2048 I UDP 70.90:1
92.15:8205 -7.09 -9.36 xe-2/2/1.0 t1
Sample Output
show services inline-video-monitoring mdi flows detail
user@host> show services inline-video-monitoring flows fpc-slot 2 detail count 19
Format for RTP flows:
Options fpc-slot—Number of the fpc slot for which statistics are displayed.
List of Sample Output show services video-monitoring mdi stats fpc-slot on page 526
Output Fields Table 47 on page 525 lists the output fields for the show services video-monitoring mdi
stats fpc-slot fpc-slot command. Output fields are listed in the approximate order in
which they appear.
Table 47: show services video-monitoring mdi stats fpc-slot Output Fields
Field Name Field Description
DF Alarm Count Number of delay factor alarms at each of the following levels:
• Info level
• Warning level
• Critical level
MLR Alarm Count Number of media loss rate (MLR) alarms at each of the following levels:
• Info level
• Warning level
• Critical level
MRV alarm count Number of media rate variation (MRV) alarms at each of the following levels:
• Info level
• Warning level
• Critical level
Sample Output
show services video-monitoring mdi stats fpc-slot
user@host> show services video-monitoring mdi stats fpc-slot 2
MDI Stats Information
FPC Slot: 2
Active Flows: 1, Total Inserted Flows: 1, Total Deleted Flows: 0
Total Packets Count: 746284, Total Bytes Count: 1013453672
DF alarm count: 0, Info level: 0, Warning level: 0, Critical level: 0
MLR alarm count: 0, Info level: 0, Warning level: 0, Critical level: 0
MRV alarm count: 0, Info level: 0, Warning level: 0, Critical level: 0
Release Information Command introduced in Junos OS Release 12.3X52 for ACX Series routers.
Command introduced in Junos OS Release 13.3R1 for MX104 3D Universal Edge Routers.
Description Start or stop an RFC 2544-based benchmarking test. You can start or stop all of the test
names that are defined on a router, or start or stop a specific test name. You can also
stop a test based on its test identifier. You can also clear the statistical counters
associated with the test. When you trigger an RFC 2544-based benchmarking test, it
passes through a series of states. These states are displayed in the Test state field in the
brief or displayed output information of the show services rpm rfc2544-benchmarking
command.
NOTE: The RFC 2544 test is stopped at the initiator automatically after the
test successfully completes all of the test steps. You need not explicitly enter
the test services rpm rfc2544-benchmarking test <test-name | test-id> stop
command. However, at the reflector, you must explicitly enter this command
to stop the test after the test is completed at the initiator.
clear-counters—(ACX Series routers only) Clear the statistics associated with the
benchmarking test that was run.
routing-instance—(ACX Series routers only) Name of the routing instance for the test.
test-id—Unique identifier of the test that must be stopped. You can stop a test based on
the test identifier. You can use the test-id option with only the test services rpm
rfc2544-benchmarking stop command.
Additional Information The test session is supported in out-of-service mode for the underlying service. You must
not transmit any traffic to the UNI port, configured as a generator or a reflector, that is
being tested during the duration of the test.
Output Fields To display the results of the benchmarking test, use the show services rpm
rfc2544-benchmarking command.
Sample Output
test services rpm rfc2544-benchmarking
user@host> test services rpm rfc2544-benchmarking test test-name test1 start
Test "test1" id 56 started
The response specifies that a test has been started with test id 56. The test ID can be
further used in show commands to view test output.
Index
• Index on page 531
G J
g-duplicates-dropped-periodicity statement...........297 Junos Packet Vision
usage guidelines.............................................................43 application........................................................................47
g-max-duplicates statement..........................................298 architecture......................................................................48
usage guidelines.............................................................43
L
H label-position statement...................................................313
hard-limit statement..........................................................298 lawful intercept architecture..............................................48
usage guidelines.............................................................38 local-dump statement........................................................313
hard-limit-target statement............................................299 usage guidelines............................................................118
usage guidelines.............................................................38 log output
hardware-timestamp statement..................................299 traffic sampling..............................................................65
history-size statement.......................................................300 logical-system statement
usage guidelines...........................................................158 RPM...................................................................................314
host-outbound statement...............................................300 usage guidelines...........................................................158
I M
in-service (RFC2544 Benchmarking)...........................301 manuals
inactivity-timeout statement comments on..................................................................xxi
RPM..................................................................................302 match statement..................................................................314
inline flow monitoring max-connection-duration statement...........................315
flow statistics, clearing...................................398, 399 max-duplicates statement................................................315
inline-jflow statement usage guidelines.............................................................43
flow monitoring............................................................302 max-packets-per-second statement...........................316
usage guidelines......................................................78, 82 usage guidelines..............................................................61
input-interface-index statement...................................304 maximum-age statement.................................................316
input-packet-rate-threshold statement.....................304 usage guidelines.............................................................30
usage guidelines.............................................................42 maximum-connections statement.................................317
instance statement maximum-connections-per-client statement...........317
sampling.........................................................................305 maximum-packet-length statement............................318
usage guidelines............................................................69 maximum-sessions statement.......................................319
interface statement maximum-sessions-per-connection
flow monitoring statement............................................................................319
usage guidelines...................................................124 media delivery index
flow-tap..........................................................................307 delay factor....................................................................225
usage guidelines....................................................49 media loss rate.............................................................225
interface-map statement.................................................307 media rate variation....................................................225
usage guidelines.............................................................30 mediation devices
interfaces statement Junos Packet Vision......................................................48
DFC...................................................................................308 minimum-priority statement...........................................320
usage guidelines ..................................................40 usage guidelines.............................................................39
flow monitoring mode (RFC 2544 Benchmarking).................................320
usage guidelines....................................................59 monitoring statement..........................................................321
video-monitoring........................................................309 usage guidelines................................................................7
IP addresses moving-average-size statement....................................322
sampling traffic from single IP addresses............67 MPLS
ip-swap (RFC 2544 Benchmarking).............................310 packets
ipv4-template statement....................................................311 passive flow monitoring.....................................20
ipv6-template statement...................................................312 mpls-ipv4-template statement......................................322
R RPM services
rate statement......................................................................348 benchmark test, performing....................................527
usage guidelines......................................................61, 121 benchmarking test
receive-options-packets statement.............................348 configuring..............................................................175
usage guidelines..............................................................18 example, configuring for Layer 2 Reflection,
receive-ttl-exceeded statement....................................349 ELAN, Bridge....................................................200
usage guidelines..............................................................18 example, configuring for Layer 3 IPv4
redundancy services................................................................178
flow monitoring................................................................13 example, configuring for NNI of Ethernet
reflect-mode (RFC2544 Benchmarking)...................350 pseudowires......................................................193
request services flow-collector change-destination example, configuring for UNI of Ethernet
primary interface command.......................................405 pseudowires......................................................185
request services flow-collector change-destination layer 2 overview......................................................171
secondary interface command.................................406 overview..................................................................169
request services flow-collector test-file-transfer reflector commands...........................................174
command...........................................................................407 benchmarking test results
required-depth statement.................................................351 displaying by test state....................................493
usage guidelines..............................................................21 test ID, displaying...............................................498
retry statement......................................................................352 test type, displaying...........................................493
usage guidelines..............................................................31 displaying information of an RFC 2544
retry-delay statement.........................................................352 benchmarking test for a particular test
usage guidelines..............................................................31 type..............................................................................493
RFC 2544 benchmarking test, RPM service displaying information of an RFC 2544
configuring.......................................................................175 benchmarking test for a specific test
example, configuring for Layer 3 IPv4 ID...................................................................................498
services.........................................................................178 probe results
example, configuring for NNI of Ethernet history, displaying...............................................484
pseudowires...............................................................193 recent, displaying................................................487
example, configuring for UNI of Ethernet protocols and ports, displaying.............................483
pseudowires..............................................................185 rpm statement......................................................................355
layer 2 overview..............................................................171 RPM statements
statistical details of a specific test ID, traceoptions..................................................................380
displaying..................................................................498 RPM TWAMP server
statistical details of a test type, connections, clearing.................................................402
displaying...................................................................493 connections, displaying..............................................515
test name, configuring................................................175 sessions, displaying......................................................517
test profile, configuring...............................................175 run-length statement.........................................................356
RFC2544 benchmarking test, RPM service usage guidelines......................................................61, 121
overview...........................................................................169
route-record statement S
usage guidelines............................................................86 sample (firewall filter action)............................................59
routing-instance statement sample-once statement
RPM..................................................................................354 flow monitoring............................................................356
routing-instances statement usage guidelines.............................................................62
RPM..................................................................................354 sampled file..............................................................................65
usage guidelines...........................................................160 sampled.pkts file.....................................................................63
RPM............................................................................................145 sampling
example configuration...............................................163 logical interface...............................................................61
monitoring interface........................................................6
username statement
flow collection...............................................................391
usage guidelines.............................................................30
V
var/log/sampled file..............................................................65
var/tmp/sampled.pkts file..................................................63
variant statement.................................................................391
usage guidelines.............................................................29
version statement
flow monitoring............................................................392
usage guidelines............................................................86
version-ipfix statement
usage guidelines......................................................78, 82
video monitoring
configuring......................................................................227
interface flow criteria........................................229
media delivery indexing....................................227
errors
clearing...................................................................403
displaying...............................................................519
flows
displaying................................................................521
media delivery index See media delivery index
media delivery indexing
syslog messages.................................................229
overview..........................................................................225
platform support..........................................................225
statistics
clearing..................................................................404
displaying...............................................................525
video-monitoring statement
video-monitoring.........................................................393
W
world-readable statement
flow monitoring............................................................394
usage guidelines.............................................................63