Chapter 5 Viewing MPLS Logical Inventory

Viewing MPLS TE Tunnel Information

Tunnel ID—The identifier that, along with the router IP addresses of the two tunnel edges, identifies the PWE3 tunnel.

Peer Router IP—The IP of the peer tunnel edge, which is used as the MPLS router ID.

Signaling Protocol—The protocol used by MPLS to build the tunnel, for example, LDP or TDP.

Sending Alarms—This option is currently unavailable.

For information on viewing Links in MPLS TE tunnels see Chapter 8, “Impact Analysis in MPLS Networks” and Chapter 9, “Using Cisco ANA PathTracer in MPLS Networks.”

Viewing MPLS TE Tunnel Information

The Traffic Engineering Tunnels branch displays specific TE tunnel information. The name of the table is displayed at the top of the Properties window in the title bar. The following information is displayed in the Tunnel Edges table:

Name—The name of the TE tunnel (in Cisco devices it is the interface name).

Tunnel Destination—The IP address of the device in which the tunnel ends.

Administrative Status—The administrative state of the tunnel, namely, up or down.

Operational Status—The operational state of the tunnel, namely, up or down.

Outgoing Label—The TE tunnel’s MPLS label distinguishing the LSP selection in the next device.

Description—A textual description of the tunnel.

Outgoing Interface—The interface through which the tunnel exits the device.

Bandwidth (Kbps)—Bandwidth specification for this tunnel.

Setup Priority—The tunnel’s priority upon path setup.

Hold Priority—The tunnel’s priority after path setup, when other tunnels try to remove it and claim its resources.

Affinity—The tunnel’s preferential bits for specific links.

Affinity Mask—Dictates which bits from the tunnel’s affinity should be compared to which bits of the link’s attribute bits.

Auto Route—If enabled, destinations behind the tunnel are routed through the tunnel.

Lockdown—If enabled, the tunnel cannot be rerouted.

Path Type—The tunnel path type, either dynamic or explicit. If dynamic, the tunnel is routed along the ordinary routing decisions after taking into account the tunnel constraints such as attributes, priority, and bandwidth. If explicit, the route is explicitly mapped with the included and excluded links.

Average Rate, Burst and Peak—Flow specification measured for this tunnel (in Kb/s).

LSP ID—LSP identification number.

Sending Alarms—This option is currently unavailable.

EXP Bit—The MPLS experimental bit used for policy-based tunnel selection (PBTS) traffic. This information is available only for Cisco CRS-1 routers running Cisco IOS XR 3.6 software in MPLS or MPLS VPN networks.

 

 

Cisco Active Network Abstraction 3.6.6 MPLS User Guide

 

 

 

 

 

 

OL-19192-01

 

 

5-13

 

 

 

 

 

Page 55
Image 55
Cisco Systems 3.6.6 manual Viewing Mpls TE Tunnel Information

3.6.6 specifications

Cisco Systems has continually evolved its networking solutions to address the demands of modern enterprises, with the introduction of the Cisco Systems 3.6.6 version being no exception. This version integrates cutting-edge technologies designed to enhance network performance, security, and management efficiency, catering to the increasingly complex needs of businesses across various sectors.

One of the standout features of Cisco Systems 3.6.6 is its enhanced support for automation and orchestration. This version incorporates advanced automation tools, allowing IT teams to deploy and configure network resources more rapidly and efficiently. With features such as Cisco DNA Center’s intent-based networking, organizations can streamline operations and reduce manual intervention, leading to quicker service delivery and reduced operational costs.

Security remains a top priority, and Cisco Systems 3.6.6 includes improved security protocols that help protect sensitive data and critical infrastructure. The integration of Cisco SecureX provides a unified view of security across the network, enabling organizations to respond to threats in real-time, manage vulnerabilities proactively, and maintain compliance with regulatory standards. The incorporation of machine learning and AI-driven analytics ensures that potential threats are identified and mitigated before they can escalate.

Interoperability is another key characteristic of version 3.6.6, allowing existing Cisco hardware and software to work seamlessly together. This flexibility ensures that enterprises can leverage their current investments while adopting newer technologies without the need for a complete overhaul of their existing network architecture.

Additionally, Cisco Systems 3.6.6 has enhanced support for IoT devices, integrating robust frameworks that enable organizations to manage and secure an increasing number of connected devices. With the proliferation of IoT in various industries, this feature is vital for maintaining efficiency and security, as it allows for better monitoring and control over the connected ecosystem.

In conclusion, Cisco Systems 3.6.6 embodies a comprehensive approach to modern networking challenges. Its emphasis on automation, advanced security features, interoperability, and IoT support positions it as a pivotal solution for businesses looking to enhance their operational capabilities and embrace digital transformation. As organizations worldwide adapt to an ever-evolving technological landscape, Cisco Systems 3.6.6 stands out as a reliable partner in navigating these complexities.