Table Of Contents
Virtual Private LAN Services Commands on Cisco IOS XR Software
clear l2vpn bridge-domain (VPLS)
show l2vpn bridge-domain (VPLS)
show l2vpn forwarding bridge-domain (VPLS)
show l2vpn forwarding bridge-domain mac-address (VPLS)
Virtual Private LAN Services Commands on Cisco IOS XR Software
This chapter describes the commands used to configure, monitor, and troubleshoot Virtual Private LAN Services (VPLS).
For detailed information about MPLS concepts, configuration tasks, and examples, refer to the Cisco IOS XR MPLS Configuration Guide.
action (VPLS)
To configure the bridge behavior when the number of learned MAC addresses exceed the MAC limit configured, use the action command in l2vpn bridge group bridge domain MAC limit configuration mode. To disable this feature, use the no form of this command.
action {flood | no-flood | shutdown}
no action {flood | no-flood | shutdown}
Syntax Description
Defaults
No action is taken when the MAC address limit is reached.
Command Modes
l2vpn bridge group bridge domain MAC limit configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the action command to specify the type of action to be taken when the action is violated.
The configured action has no impact if the MAC limit has not been reached.
Task ID
Examples
The following example shows how to configure the bridge bar to flood all unknown unicast packets when more than 10 MACs are learned on the bridge:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# limit
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# action flood
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# maximum 10
Related Commands
aging (VPLS)
To enter the MAC aging configuration submode to set the aging parameters such as time and type, use the aging command in l2vpn bridge group bridge domain configuration mode. To return to the default value for all parameters that are attached to this configuration submode, use the no form of this command.
aging
no aging
Syntax Description
This command has no arguments or keywords.
Defaults
No defaults are attached to this parameter since it is used as a configuration submode. See the defaults that are assigned to the time (VPLS) and the type (VPLS) parameters.
Command Modes
l2vpn bridge group bridge domain configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the aging command to enter l2vpn bridge group bridge domain MAC aging configuration mode.
Task ID
Examples
The following example shows how to enter MAC aging configuration submode and to set the MAC aging time to 120 seconds:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# aging
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-aging)# time 120
Related Commands
bridge-domain (VPLS)
To establish a bridge domain and to enter l2vpn bridge group bridge domain configuration mode, use the bridge-domain command in l2vpn bridge group configuration mode. To return to a single bridge domain, use the no form of this command.
bridge-domain bridge-domain name
no bridge-domain bridge-domain name
Syntax Description
Defaults
The default value is a single bridge domain.
Command Modes
l2vpn bridge group configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the bridge-domain command to enter l2vpn bridge group bridge domain configuration mode.
Task ID
Examples
The following example shows how to configure a bridge domain:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)#Related Commands
Commands DescriptionCreates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain.
Enters L2VPN configuration mode.
bridge group (VPLS)
To create a bridge group so that it can contain bridge domains and then to assign network interfaces to the bridge domain, use the bridge group command in l2vpn configuration mode. To remove all the bridge domains that are created under this bridge group and to remove all network interfaces that are assigned under this bridge group, use the no form of this command.
bridge group bridge group name
no bridge-group bridge group name
Syntax Description
bridge group name
Number of the bridge group to which the interface belongs. The range is from 1 to 255.
Defaults
No bridge group is created.
Command Modes
l2vpn configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the bridge group command to enter l2vpn bridge group configuration mode.
Task ID
Examples
The following example shows that bridge group 1 is assigned:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)#Related Commands
Command DescriptionEstablishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode.
Enters L2VPN configuration mode.
clear l2vpn bridge-domain (VPLS)
To clear the MAC addresses and to restart the bridge domains on the router, use the clear l2vpn bridge-domain command in EXEC mode.
clear l2vpn bridge-domain {all | bd-name name | group group}
Syntax Description
Defaults
No default behavior or values
Command Modes
EXEC
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
This is the method that allows a bridge to forward again after it was put in Shutdown state as a result of exceeding the configured MAC limit.
Task ID
Examples
The following example shows how to clear all the MAC addresses and to restart all the bridge domains on the router:
RP/0/0/CPU0:router# clear l2vpn bridge-domain all
Related Commands
Commands DescriptionDisplays information for the bridge ports such as attachment circuits and pseudowires for the specific bridge domains.
flooding disable (VPLS)
To configure flooding for traffic at the bridge domain level or at the bridge port level, use the flooding disable command in l2vpn bridge group bridge domain configuration mode. To return the bridge to normal flooding behavior when all unknown unicast packets, all broadcast packets, and all multicast packets are flooded over all other bridge domain network interfaces, use the no form of this command.
flooding disable
no flooding disable
Syntax Description
This command has no arguments or keywords.
Defaults
The default behavior is that packets are flooded when their destination MAC address is not found.
Command Modes
l2vpn bridge group bridge domain configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the flooding disable command to override the parent bridge configuration.
By default, bridge ports inherit the flooding behavior of the bridge domain.
When flooding is disabled, all unknown unicast packets, all broadcast packets, and all multicast packets are discarded.
Task ID
Examples
The following example shows how to disable flooding on the bridge domain called bar:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# flooding disable
Related Commands
interface (VPLS)
To add an interface to a bridge domain that allows packets to be forwarded and received from other interfaces that are part of the same bridge domain, use the interface command in l2vpn bridge group bridge domain configuration mode. To remove an interface from a bridge domain, use the no form of this command.
interface interface name
no interfaceinterface name
Syntax Description
interface name
Configures the name of the interface or attachment circuit in rack/slot/instance/port format.
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the interface command to enter l2vpn bridge group bridge domain attachment circuit configuration mode. In addition, the interface command enters the interface configuration submode to configure parameters specific to the interface.
By default, an interface is not part of a bridge.
Task ID
Examples
The following example shows how to configure the bundle Ethernet interface as an attachment circuit:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# interface bundle-ether 5
RP/0/0/CPU0:router(config-l2vpn-bg-bd-ac)#Related Commands
learning disable (VPLS)
To override the MAC learning configuration of a parent bridge or to set the MAC learning configuration of a bridge, use the learning disable command in l2vpn bridge group bridge domain MAC configuration mode. To disable this feature, use the no form of this command.
learning disable
no learning disable
Syntax Description
This command has no arguments or keywords.
Defaults
By default, learning is enabled on all bridge domains and all interfaces on that bridge inherits this behavior.
Command Modes
l2vpn bridge group bridge domain MAC configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
When set, the learning disable command stops all MAC learning either on the specified interface or the bridge domain.
Task ID
Examples
In the following example, MAC learning is disabled on all ports in the bridge domain called bar, which is applied to all interfaces in the bridge unless the interface has its own MAC learning enable command.
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# learning disable
Related Commands
limit (VPLS)
To set the MAC address limit for action, maximum, and notification and to enter l2vpn bridge group bridge domain MAC limit configuration mode, use the limit command in l2vpn bridge group bridge domain MAC configuration mode. To remove all limits that were previously configured under the MAC configuration submodes, use the no form of this command.
limit
no limit
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain MAC configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the limit command to enter l2vpn bridge group bridge domain MAC limit configuration mode. The limit command specifies that one syslog message is sent or a corresponding trap is generated with the MAC limit when the action is violated.
Task ID
Examples
The following example shows how the MAC limit for the bridge bar is set to 100 with an action of shutdown. After the configuration, the bridge allows only up to 100 MAC addresses to be learned until the bridge stops all forwarding. When this happens, a syslog message and an SNMP trap are created.
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# limit
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# maximum 100
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# action shutdown
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# notification both
Related Commands
mac (VPLS)
To enter l2vpn bridge group bridge domain MAC configuration mode, use the mac command in l2vpn bridge group bridge domain configuration mode. To disable all configurations added under the MAC configuration submodes, use the no form of this command.
mac
no mac
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the mac command to enter l2vpn bridge group bridge domain MAC configuration mode.
Task ID
Examples
The following example shows how to enter l2vpn bridge group bridge domain MAC configuration mode:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)#Related Commands
maximum (VPLS)
To configure the specified action when the number of MAC addresses learned on a bridge is reached, use the maximum command in l2vpn bridge group bridge domain MAC limit configuration mode. To disable this feature, use the no form of this command.
maximum {value}
no maximum {value}
Syntax Description
Defaults
The default maximum value is 4000.
Command Modes
l2vpn bridge group bridge domain MAC limit configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
The action can either be flood, no flood, or shutdown. Depending on the configuration, a SYSDB, an SNMP trap notification, or both are issued.
Task ID
Examples
The following example shows when the number of MAC address learned on the bridge exceeds 5000 and the bridge stops learning but continues flooding:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# limit
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# maximum 5000
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# action no-flood
Related Commands
mpls static label (VPLS)
To configure the MPLS static labels and the static labels for the access pseudowire configuration, use the mpls static label command in l2vpn bridge group bridge domain VFI pseudowire configuration mode. To assign the dynamic MPLS labels to either the virtual forwarding interface (VFI) pseudowire or the access pseudowire, use the no form of this command.
mpls static label {local value} {remote value}
no mpls static label {local value} {remote value}
Syntax Description
local value
Configures the local pseudowire label. The range is from 16 to 15999.
remote value
Configures the remote pseudowire label. The range is from 16 to 15999.
Defaults
By default, the router attempts to assign dynamic labels to the pseudowire.
Command Modes
l2vpn bridge group bridge domain VFI pseudowire configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Ensure that both ends of the pseudowire have matching static labels.
Task ID
Examples
The following example shows how to configure the VFI pseudowire 10.1.1.2 with pseudowire ID of 1000 to use MPLS label 800 and remote MPLS label 500:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# vfi model
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi)# neighbor 10.1.1.2 pw-id 1000
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)# mpls static label local 800 remote 500
Related Commands
mtu (VPLS)
To adjust the maximum packet size or maximum transmission unit (MTU) size for the bridge domain, use the mtu command in l2vpn bridge group bridge domain configuration mode. To disable this feature, use the no form of this command.
mtu bytes
no mtu
Syntax Description
Defaults
The default MTU value is 1500.
Command Modes
l2vpn bridge group bridge domain configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Each interface has a default maximum packet size or MTU size. This number generally defaults to the largest size possible for that interface type. On serial interfaces, the MTU size varies, but cannot be set smaller than 64 bytes.
The MTU for the bridge domain includes only the payload of the packet. For example, a configured bridge MTU of 1500 allows tagged packets of 1518 bytes (6 bytes DA, 6 bytes SA, 2 bytes ethertype, or 4 bytes qtag).
Task ID
Examples
The following example specifies an MTU of 1000 bytes:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mtu 1000
Related Commands
neighbor (VPLS)
To add an access pseudowire port to a bridge domain or a pseudowire to a bridge virtual forwarding interface (VFI), use the neighbor command in the appropriate l2vpn bridge group bridge domain configuration submode. To remove the pseudowire either from the bridge or from the VFI, use the no form of this command.
neighbor {A.B.C.D} {pw-id value}
no neighbor {A.B.C.D} {pw-id value}
Syntax Description
A.B.C.D
IP address of the cross-connect peer.
pw-id value
Configures the pseudowire ID and ID value. Range is 1 to 4294967295.
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain configuration
l2vpn bridge group bridge domain VFI configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the neighbor command to enter l2vpn bridge group bridge domain VFI pseudowire configuration mode. Alternatively, use the neighbor command to enter l2vpn bridge group bridge domain access pseudowire configuration mode.
Task ID
Examples
The following example shows how to configure an access pseudowire directly under a bridge domain in l2vpn bridge group bridge domain configuration mode:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# neighbor 10.1.1.2 pw-id 1000
RP/0/0/CPU0:router(config-l2vpn-bg-bd-pw)#The following example shows how to configure the parameters for any pseudowire in l2vpn bridge group bridge domain VFI configuration mode:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi)# neighbor 10.1.1.2 pw-id 1000
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)#Related Commands
notification (VPLS)
To specify the type of notification that is sent when the number of learned MAC addresses exceeds the configured limit, use the notification command in l2vpn bridge group bridge domain MAC limit configuration mode. To use the notification as only a syslog entry, use the no form of this command.
notification {both | none | trap}
no notification {both | none | trap}
Syntax Description
both
Sends syslog and trap notifications when the action is violated.
none
Specifies no notification.
trap
Sends trap notifications when the action is violated.
Defaults
By default, only a syslog message is sent when the number of learned MAC addresses exceeds the maximum configured.
Command Modes
l2vpn bridge group bridge domain MAC limit configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
A syslog message and an SNMP is generated. Alternatively, an SNMP is generated. Finally, no notification is generated.
Task ID
Examples
The following example shows how both a syslog message and an SNMP trap are generated with the bridge bar and learns more MAC addresses than the configured limit:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# limit
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# notification both
Related Commands
pw-class (VFI)
To configure the pseudowire class template name to use for the pseudowire, use the pw-class command in l2vpn bridge group bridge domain VFI pseudowire configuration mode. To delete the pseudowire class, use the no form of this command.
pw-class {class name}
no pw-class {class name}
Syntax Description
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain VFI pseudowire configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Task ID
Examples
The following example shows how to attach the pseudowire class to the pseudowire:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi)# neighbor 10.1.1.2 pw-id 1000
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)# pw-class canada
Related Commands
show l2vpn bridge-domain (VPLS)
To display information for the bridge ports such as attachment circuits and pseudowires for the specific bridge domains, use the show l2vpn bridge-domain command in EXEC mode.
show l2vpn bridge-domain [bd-name bridge-domain name | brief | detail | group bridge-domain group name | interface {type interface-id} | neighbor IP address [pw-id value] | summary]
Syntax Description
Defaults
No default behavior or values
Command Modes
EXEC
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the interface keyword to display only the bridge domain that contains the specified interface as an attachment circuit. In the sample output, only the attachment circuit matches the filter that is displayed. No pseudowires are displayed.
Task ID
Examples
The following sample output shows information for the bridge ports such as attachment circuits and pseudowires for the specific bridge domains:
RP/0/0/CPU0:router# show l2vpn bridge-domain
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslogFilter MAC addresses: 0ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)List of ACs:Gi0/1/0/0, state: up, Static MAC addresses: 2, MSTi: 0 (unprotected)List of Access PWs:List of VFIs:VFI 1Neighbor 1.1.1.1 pw-id 1, state: up, Static MAC addresses: 0Table 94 describes the significant fields shown in the display.
The following example shows sample output for a bridge named bd1:
RP/0/0/CPU0:router# show l2vpn bridge-domain bd-name bd1
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslogFilter MAC addresses: 0ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)List of ACs:Gi0/1/0/0, state: up, Static MAC addresses: 2, MSTi: 0 (unprotected)List of Access PWs:List of VFIs:VFI 1Neighbor 1.1.1.1 pw-id 1, state: up, Static MAC addresses: 0The following sample output shows brief information about the bridges:
RP/0/0/CPU0:router# show l2vpn bridge-domain brief
Bridge Group/Bridge-Domain Name ID State Num ACs/up Num PWs/up-------------------------------- ----- ---------- -------------- --------------g1/bd1 0 up 1/1 1/1Table 95 describes the significant fields shown in the display.
The following sample output shows detailed information:
RP/0/0/CPU0:router# show l2vpn bridge-domain detail
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0MAC learning: enabledMAC withdraw: disabledFlooding:Broadcast & Multicast: enabledUnknown unicast: enabledMAC aging time: 300 s, Type: inactivityMAC limit: 4000, Action: none, Notification: syslogMAC limit reached: yesSecurity: disabledDHCPv4 snooping: disabledMTU: 1500Filter MAC addresses:ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)List of ACs:AC: GigabitEthernet0/1/0/0, state is upType EthernetMTU 1500; XC ID 0x2000001; interworking none; MSTi 0 (unprotected)MAC learning: enabledFlooding:Broadcast & Multicast: enabledUnknown unicast: enabledMAC aging time: 300 s, Type: inactivityMAC limit: 4000, Action: none, Notification: syslogMAC limit reached: yesSecurity: disabledDHCPv4 snooping: disabledStatic MAC addresses:0000.0000.00000001.0002.0003Statistics:packet totals: receive 3919680,send 9328byte totals: receive 305735040,send 15022146List of Access PWs:List of VFIs:VFI 1PW: neighbor 1.1.1.1, PW ID 1, state is up ( established )PW class mpls, XC ID 0xff000001Encapsulation MPLS, protocol LDPPW type Ethernet, control word disabled, interworking nonePW backup disable delay 0 secSequencing not setMPLS Local Remote------------ ------------------------------ -------------------------Label 16003 16003Group ID 0x0 0x0Interface 1 1MTU 1500 1500Control word disabled disabledPW type Ethernet EthernetVCCV CV type 0x2 0x2(LSP ping verification) (LSP ping verification)VCCV CC type 0x2 0x2(router alert label) (router alert label)------------ ------------------------------ -------------------------Create time: 12/03/2008 14:03:00 (17:17:30 ago)Last time status changed: 13/03/2008 05:57:58 (01:22:31 ago)MAC withdraw message: send 0 receive 0Static MAC addresses:Statistics:packet totals: receive 3918814, send 3918024byte totals: receive 305667492, send 321277968VFI Statistics:drops: illegal VLAN 0, illegal length 0The following sample output shows that when a bridge operates in VPWS mode, the irrelevant information for MAC learning is suppressed:
RP/0/0/CPU0:router# show l2vpn bridge-domain detail
Bridge group: foo_group, bridge-domain: foo_bd, id: 0, state: up, ShgId: 0VPWS ModeMTU: 1500ACs: 1 (0 up), VFIs: 1, PWs: 2 (2 up)List of ACs:AC: GigabitEthernet0/5/1/4, state is admin downType Ethernet MTU 1500; XC ID 1; interworking noneStatic MAC addresses:Statistics:packet totals: receive 0,send 0byte totals: receive 0,send 0List of VFIs:VFI foo_vfiPW: neighbor 1.1.1.1, PW ID 1, state is up ( established )PW class not setEncapsulation MPLS, protocol LDPPW type Ethernet, control word enabled, interworking noneSequencing not setMPLS Local Remote------------ ------------------------------ ------------------------------Label 16001 16001Group ID unassigned unknownInterface siva/vfi siva/vfiMTU 1500 1500Control word enabled enabledPW type Ethernet EthernetVCCV CV type 0x2 0x2(LSP ping verification) (LSP ping verification)VCCV CC type 0x3 0x3(control word) (control word)(router alert label) (router alert label)------------ ------------------------------ ------------------------------Create time: 25/06/2007 05:29:42 (2w0d ago)Last time status changed: 27/06/2007 06:50:35 (1w5d ago)Static MAC addresses:PW: neighbor 1.1.1.1, PW ID 2, state is up ( established )PW class not setEncapsulation MPLS, protocol LDPPW type Ethernet, control word enabled, interworking noneSequencing not setMPLS Local Remote------------ ------------------------------ ------------------------------Label 16002 16002Group ID unassigned unknownInterface siva/vfi siva/vfiMTU 1500 1500Control word enabled enabledPW type Ethernet EthernetVCCV CV type 0x2 0x2(LSP ping verification) (LSP ping verification)VCCV CC type 0x3 0x3(control word) (control word)(router alert label) (router alert label)------------ ------------------------------ ------------------------------Create time: 25/06/2007 05:29:42 (2w0d ago)Last time status changed: 27/06/2007 06:50:35 (1w5d ago)Static MAC addresses:Statistics:drops: illegal VLAN 0, illegal length 0Table 96 describes the significant fields shown in the display.
The following sample output shows filter information about the bridge-domain group named g1:
RP/0/0/CPU0:router# show l2vpn bridge-domain group g1
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslogFilter MAC addresses: 0ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)List of ACs:Gi0/1/0/0, state: up, Static MAC addresses: 2, MSTi: 0 (unprotected)List of Access PWs:List of VFIs:VFI 1Neighbor 1.1.1.1 pw-id 1, state: up, Static MAC addresses: 0The following sample output shows display the filter information for the interface on the bridge domain:
RP/0/0/CPU0:router# show l2vpn bridge-domain interface gigabitEthernet 0/1/0/0
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslogFilter MAC addresses: 0ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)List of ACs:Gi0/1/0/0, state: up, Static MAC addresses: 2, MSTi: 0 (unprotected)The following sample output shows that the bridge domain contains the pseudowires to match the filter for the neighbor:
RP/0/0/CPU0:router# show l2vpn bridge-domain neighbor 1.1.1.1
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslogFilter MAC addresses: 0ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)List of Access PWs:List of VFIs:VFI 1Neighbor 1.1.1.1 pw-id 1, state: up, Static MAC addresses: 0The following sample output shows the summary information for the bridge domain:
RP/0/0/CPU0:router# show l2vpn bridge-domain summary
Number of groups: 1, bridge-domains: 1, Up: 1, Shutdown: 0Number of ACs: 1 Up: 1, Down: 0Number of PWs: 1 Up: 1, Down: 0Table 97 describes the significant fields shown in the display.
Related Commands
show l2vpn forwarding bridge-domain (VPLS)
To display information on the bridge that is used by the forwarding layer, use the show l2vpn forwarding bridge-domain command in EXEC mode.
show l2vpn forwarding bridge-domain [bridge-domain-name] {detail | hardware {egress | ingress}} {location node-id}
Syntax Description
Defaults
No default behavior or values
Command Modes
EXEC
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
For each bridge, you can display summary information about the number of bridge ports, number of MAC addresses, and so forth.
The hardware keyword displays detailed information, and is meant for field investigation by a specialized Cisco engineer.
Task ID
Examples
The following sample output shows bridge-domain information for location 0/1/CPU0:
RP/0/0/CPU0:router# show l2vpn forwarding bridge-domain location 0/1/CPU0
Bridge-Domain Name ID Ports addr Flooding Learning State-------------------------------- ------ ----- ------ -------- -------- ---------g1:bd1Bridge-domain name: g1:bd1, id: 0, state: upMAC learning: enabledFlooding:Broadcast & Multicast: enabledUnknown unicast: enabledMAC aging time: 300 s, Type: inactivityMAC limit: 4000, Action: none, Notification: syslogMAC limit reached: yesSecurity: disabledDHCPv4 snooping: profile not known on this nodeBridge MTU: 1500 bytesNumber of bridge ports: 2Number of MAC addresses: 65536Multi-spanning tree instance: 0GigabitEthernet0/1/0/0, state: oper upNumber of MAC: 32770Sent(Packets/Bytes): 0/21838568Received(Packets/Bytes): 5704781/444972918Nbor 1.1.1.1 pw-id 1Number of MAC: 32766Sent(Packets/Bytes): 0/0Received(Packets/Bytes): 5703987/4449109860 2 65536 Enabled Enabled UPThe following sample output shows detailed information for hardware location 0/1/CPU0 from the egress pse:
RP/0/0/CPU0:router# show l2vpn forwarding bridge-domain hardware egress detail location 0/1/CPU0
Bridge-domain name: g1:bd1, id: 0, state: upMAC learning: enabledFlooding:Broadcast & Multicast: enabledUnknown unicast: enabledMAC aging time: 300 s, Type: inactivityMAC limit: 4000, Action: none, Notification: syslogMAC limit reached: yesSecurity: disabledDHCPv4 snooping: profile not known on this nodeBridge MTU: 1500 bytesNumber of bridge ports: 2Number of MAC addresses: 65536Multi-spanning tree instance: 0================ GSR HW Information ================-----------------------------------------------SHG-TX rewrite details----------------------------------------------------------------------------------------------HW Rewrite 0 Detail :-----------------------------------------------Rewrite HW Address : 0x00060000packets 0 bytes 0Raw data:[ 0x04018180 04018190 040181a0 040181b0 ][ 0x04018170 00000000 80360000 000bfff4 ][ 0x00000000 00000000 00000000 00000000 ]-----------------------------------------------SHG-TX encap details-----------------------------------------------outer_etype: 0outer_vlan_id: 0gather_profile: 0inner_vlan_id: 0so_l2_len_adjust: 0-----------------------------------------------SHG-TX mgid details-----------------------------------------------Base MGIDs for default mgidbase_mgid[0]: 0x0003fffbbase_mgid[1]: 0x0003fffbbase_mgid[2]: 0x0003fffbbase_mgid[3]: 0x0003fffbbase_mgid[4]: 0x0003fffbbase_mgid[5]: 0x0003fffbbase_mgid[6]: 0x0003fffbbase_mgid[7]: 0x0003fffbMGID Entries for default mgidoi[0]: 0oq[0]: 16384xc_id[0]: 1mgid_idx[0]: 0x00000000next_mgid[0]: 0x00000000-----------------------------------------------VMR 0 Details-----------------------------------------------vmrid: 0x5f002010Value: 0xc0 0x00 0x1f 0xff 0xff 0xff 0xff 0xff 0xfdMask : 0x00 0x00 0x1f 0xff 0xff 0xff 0xff 0xff 0xe0Result 0x32003000====================================================GigabitEthernet0/1/0/0, state: oper upNumber of MAC: 32770Sent(Packets/Bytes): 749/22989834Received(Packets/Bytes): 5732104/447104112================ GSR HW Information ================-----------------------------------------------BP-TX-AC rewrite details-----------------------------------------------BP is local-----------------------------------------------BP L2 Uidb Details-----------------------------------------------l2fwd_enabled: trueplim_enabled: truel2fwd_type: 4l2_ac_type: 0xconn_id: 0bridge_id: 0shg id: 0unicast flooding enabled: 0multicast flooding enabled: 0broadcast flooding enabled: 0mac learning enabled: 0Is AC Port mode?: 0-----------------------------------------------HW Rewrite 0 Detail :-----------------------------------------------Rewrite HW Address : 0x59eff314packets 0 bytes 0HFA Bits 0x0 gp 0 mtu 1580 (REW)OI 0x3fffc OutputQ 0 Output-port 0x36 local_outputq 0x0Raw data:[ 0x00000000 0036062c 0003fffc 00000000 ][ 0x00000000 00000000 0d103600 00000010 ][ 0x00000000 00000000 00000000 00000000 ]-----------------------------------------------BP OI/OQ Details-----------------------------------------------oi[0]: 0x00000000 oq[0] 16384oi[1]: 0x00000000 oq[1] 65535oi[2]: 0x00000000 oq[2] 65535oi[3]: 0x00000000 oq[3] 65535oi[4]: 0x00000000 oq[4] 65535oi[5]: 0x00000000 oq[5] 65535oi[6]: 0x00000000 oq[6] 65535oi[7]: 0x00000000 oq[7] 65535-----------------------------------------------Sram table entry details-----------------------------------------------sram_data: 0xa000400c====================================================Nbor 1.1.1.1 pw-id 1Number of MAC: 32766Sent(Packets/Bytes): 0/0Received(Packets/Bytes): 5731250/447037500================ GSR HW Information ================-----------------------------------------------BP-TX-AC rewrite details----------------------------------------------------------------------------------------------BP OI/OQ Details-----------------------------------------------oi[0]: 0x00000000 oq[0] 65535oi[1]: 0x00000000 oq[1] 65535oi[2]: 0x00000000 oq[2] 65535oi[3]: 0x00000000 oq[3] 65535oi[4]: 0x00000000 oq[4] 65535oi[5]: 0x00000000 oq[5] 65535oi[6]: 0x00000000 oq[6] 65535oi[7]: 0x00000000 oq[7] 65535-----------------------------------------------BP Encap Info-----------------------------------------------mac_length: 0mac_string:egress_slot: 2num_tags: 1tags: {16001, }if_handle: 0x03000500====================================================The following sample output shows the bridge-domain information for the specified location:
RP/0/0/CPU0:router# show l2vpn forwarding bridge-domain g1:bd1 location 0/1/CPU0
Bridge-Domain Name ID Ports addr Flooding Learning State-------------------------------- ------ ----- ------ -------- -------- ---------g1:bd1 0 2 65536 Enabled Enabled UPTable 98 describes the significant fields shown in the display.
Related Commands
show l2vpn forwarding bridge-domain mac-address (VPLS)
To display the summary information for the MAC address, use the show l2vpn forwarding bridge-domain mac-address command in EXEC mode.
show l2vpn forwarding bridge-domain [bridge-domain-name] mac-address {MAC address | detail | hardware {egress | ingress} | interface type instance | neighbor address {pw-id pw-id}} {location node-id}
Syntax Description
Defaults
No default behavior or values
Command Modes
EXEC
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Task ID
Examples
The following sample output shows the specified location of the bridge-domain name g1:bd1 for the MAC address:
RP/0/0/CPU0:router# show l2vpn forwarding bridge-domain g1:bd1 location 0/1/CPU0
Bridge MACBridge-Domain Name ID Ports addr Flooding Learning State-------------------------------- ------ ----- ------ -------- -------- ---------g1:bd1 0 2 65536 Enabled Enabled UPThe following sample output shows the list of MAC addresses that are learned on a specified bridge and summary information for the addresses:
RP/0/0/CPU0:router# show l2vpn forwarding bridge-domain mac-address location 0/1/CPU0
Mac Address Type Learned from/Filtered on LC learned Age--------------------------------------------------------------------------------0000.0000.0000 static Gi0/1/0/0 N/A N/A0000.0001.0101 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0102 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0103 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0104 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0105 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0106 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0107 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0108 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0109 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.010a dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.010b dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.010c dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.010d dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.010e dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.010f dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0110 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0111 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s0000.0001.0112 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s....The following sample output shows the MAC address on a specified interface on a specified bridge:
RP/0/0/CPU0:router# show l2vpn forwarding bridge-domain g1:bd1 mac-address 1.2.3 location 0/1/CPU0
Mac Address Type Learned from/Filtered on LC learned Age--------------------------------------------------------------------------------0001.0002.0003 static Gi0/1/0/0 N/A N/AThe following sample output shows the hardware information from the egress pse:
RP/0/0/CPU0:router# show l2vpn forwarding bridge-domain g1:bd1 mac-address hardware egress location 0/1/CPU0
Mac Address Type Learned from/Filtered on LC learned Age--------------------------------------------------------------------------------0000.0000.0000 static Gi0/1/0/0 N/A N/A0000.0001.0101 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0102 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0103 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0104 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0105 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0106 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0107 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0108 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0109 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.010a dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.010b dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.010c dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.010d dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.010e dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.010f dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0110 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0111 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0112 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0113 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s0000.0001.0114 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s...The following sample output shows the MAC addresses that are learned on a specified pseudowire on a specified bridge:
RP/0/0/CPU0:router# show l2vpn forwarding bridge-domain mac-address neighbor 1.1.1.1 pw-id 1 location 0/1/CPU0
Mac Address Type Learned from/Filtered on LC learned Age--------------------------------------------------------------------------------0000.0003.0101 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0102 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0103 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0104 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0105 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0106 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0107 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0108 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0109 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.010a dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.010b dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.010c dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.010d dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.010e dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.010f dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0110 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0111 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0112 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0113 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0114 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s0000.0003.0115 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s...The following sample output shows the detailed information for MAC addresses that are learned on a specified interface and on specified bridge of a specified interface card. The sample output lists all the MAC addresses, the learned location, and the current age.
RP/0/0/CPU0:router# show l2vpn forwarding bridge-domain g1:bd1 mac-address interface gigabitEthernet 0/1/0/0 location 0/1/CPU0
Mac Address Type Learned from/Filtered on LC learned Age--------------------------------------------------------------------------------0000.0000.0000 static Gi0/1/0/0 N/A N/A0000.0001.0101 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0102 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0103 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0104 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0105 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0106 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0107 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0108 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0109 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.010a dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.010b dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.010c dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.010d dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.010e dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.010f dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0110 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0111 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0112 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0113 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s0000.0001.0114 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14sRelated Commands
shutdown (Bridge Domain)
To shut down a bridge domain to bring the bridge and all attachment circuits and pseudowires under it to admin down state, use the shutdown command in l2vpn bridge group bridge domain configuration mode. To re-enable the bridge domain, use the no form of this command.
shutdown
no shutdown
Syntax Description
This command has no arguments or keywords.
Defaults
By default, the bridge is not shutdown.
Command Modes
l2vpn bridge group bridge domain configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
When a bridge domain is disabled, all VFIs associated with the bridge domain are disabled. You can still attach or detach members to or from the bridge domain as well as the VFIs associated with the bridge domain.
Task ID
Examples
The following example shows how to disable the bridge domain named bar:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# shutdown
Related Commands
shutdown (VFI)
To disable virtual forwarding interface (VFI), use the shutdown command in l2vpn bridge group bridge domain VFI configuration mode. To re-enable VFI, use the no form of this command.
shutdown
no shutdown
Syntax Description
This command has no arguments or keywords.
Defaults
By default, the VFI is not shutdown.
Command Modes
l2vpn bridge group bridge domain VFI configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Task ID
Examples
The following example shows how to disable VFI:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi)# shutdown
Related Commands
static-address (VPLS)
To add static entries to the MAC address for filtering, use the static-address command in l2vpn bridge group bridge domain MAC configuration mode. To remove entries profiled by the combination of a specified entry information, use the no form of this command.
static -address {MAC address} {drop}
no static -address {MAC address} {drop}
Syntax Description
MAC address
Static MAC address that is used to filter on the bridge domain.
drop
Drops all traffic that is going to the configured MAC address.
Defaults
No static MAC address is configured.
Command Modes
l2vpn bridge group bridge domain MAC configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Task ID
Examples
The following example shows how to add static MAC entries in l2vpn bridge group bridge domain MAC configuration mode. This entry causes all packets with destination MAC address 1.1.1 to be dropped.
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# static-address 1.1.1 drop
Related Commands
static-mac-address (VPLS)
To configure the static MAC address to associate a remote MAC address with a pseudowire or any other bridge interface, use the static-mac-address command in the appropriate l2vpn bridge group bridge domain configuration submode. To disable this feature, use the no form of this command.
static-mac-address {MAC address}
no static-mac-address {MAC address}
Syntax Description
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain VFI pseudowire configuration
l2vpn bridge group bridge domain attachment circuit configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Task ID
Examples
The following example shows how to associate a remote MAC address with a pseudowire:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# vfi model
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi)# neighbor 10.1.1.2 pw-id 1000
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)# static-mac-address 1.1.1
The following example shows how to associate a GigabitEthernet interface from a bridge domain to static MAC address 1.1.1:
RP/0/0/CPU0RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# interface GigabitEthernet 0/1/0/0
RP/0/0/CPU0:router(config-l2vpn-bg-bd-ac)# static-mac-address 1.1.1
The following example shows how to associate an access pseudowire to static MAC address 2.2.2:
RP/0/0/CPU0RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# neighbor 10.1.1.2 pw-id 2000
RP/0/0/CPU0:router(config-l2vpn-bg-bd-pw)# static-mac-address 2.2.2
Related Commands
time (VPLS)
To configure the maximum aging time, use the time command in l2vpn bridge group bridge domain MAC aging configuration mode. To disable this feature, use the no form of this command.
time {seconds}
no time {seconds}
Syntax Description
seconds
MAC address table entry maximum age. The range is from 120 to 1000000 seconds. Aging time is counted from the last time that the switch saw the MAC address. The default value is 300 seconds.
Defaults
seconds: 300
Command Modes
l2vpn bridge group bridge domain MAC aging configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
If no packets are received from the MAC address for the duration of the maximum aging time, the dynamic MAC entry previously learned is removed from the forwarding table.
Task ID
Examples
The following example shows how to increase the maximum aging time to 600 seconds. After 600 seconds of inactivity from a MAC address, the MAC address is removed form the forwarding table.
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# aging
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-aging)# time 600
Related Commands
type (VPLS)
To configure the type for MAC address aging, use the type command in l2vpn bridge group bridge domain MAC aging configuration mode. To disable this feature, use the no form of this command.
type {absolute | inactivity}
no type {absolute | inactivity}
Syntax Description
Defaults
By default, the inactivity type is configured.
Command Modes
l2vpn bridge group bridge domain MAC aging configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
In general, the type is set to inactivity. With an inactivity type configuration, a MAC address is removed from the forwarding table after the MAC address is inactive for the configured aging time.
With an absolute type configuration, a MAC address is always removed from the forwarding table after the aging time has elapsed once it is initially learned.
Task ID
Examples
The following example shows how to configure the MAC address aging type to absolute for every member of the bridge domain named bar:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# aging
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac-aging)# type absolute
Related Commands
vfi (VPLS)
To configure virtual forwarding interface (VFI) parameters and to enter l2vpn bridge group bridge domain VFI configuration mode, use the vfi command in l2vpn bridge group bridge domain configuration mode. To remove all configurations that are made under the specified VFI, use the no form of this command.
vfi {vfi name}
no vfi {vfi name}
Syntax Description
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Use the vfi command to enter l2vpn bridge group bridge domain VFI configuration mode.
On the Cisco XR 12000 Series Router, you cannot configure a pseudowire directly under a bridge domain. Therefore, a psuedowire must be configured under a VFI, which is configured under a bridge domain.
Task ID
Examples
The following example shows how to create a VFI:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi)#Related Commands
withdrawal (VPLS)
To enable MAC address withdrawal for a specified bridge domain, use the withdrawal command in l2vpn bridge group bridge domain MAC configuration mode. To disable this feature, use the no form of this command.
withdrawal
no withdrawal
Syntax Description
This command has no arguments or keywords.
Defaults
By default, MAC address withdrawal is disabled.
Command Modes
l2vpn bridge group bridge domain MAC configuration
Command History
Usage Guidelines
To use this command, you must be in a user group associated with a task group that includes the proper task IDs. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of the Cisco IOS XR System Security Configuration Guide.
Cisco IOS XR supports only the wildcard MAC address withdrawal.
Task ID
Examples
The following example shows how to enable MAC withdrawal:
RP/0/0/CPU0:router# configureRP/0/0/CPU0:router(config)# l2vpnRP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# withdrawal
Related Commands