Escolar Documentos
Profissional Documentos
Cultura Documentos
Section 8
Lab Exercises
Module 1
Basic Configuration
Introduction
Switch to notes view!
Note: The following information explains the format used for the labs and is for information
purposes only.
The CLI system prompt is shown in bolded text followed by # or $, for example:
Node#
or
Node>config>system>security#
As shown above, system commands such configure, show, security, etc. are shown as unbolded.
These commands can be typed in or partially typed in and completed by pressing the Tab,
Space or Enter key. Text that must be manually entered is shown delimited by the < and >
symbols.
This indicates that the year, month, day, and time must be entered manually.
Note: Network nodes store the BOF and configuration files on Compact Flash 3 (CF3). Simulators
store the BOF file on the floppy drive (CF1); configuration files can be stored on CF1 or the
hard drive (CF2), if so equipped.
Try the help commands ( ? ) and auto-completion commands as much as possible. This will greatly
improve your CLI configuration skills and understandings.
Switch
Save thetoBOF
notes
andview!
Configuration File
Note: When a 7750 SR boots up, it will execute the bootloader (boot.ldr) on the Compact Flash
card CF3 (CF1 for a simulator), then load the BOF (bof.cfg), also on CF3 (CF1 for a simulator),
which indicates where to find the image (.tim files) and configuration files (.cfg files), installs
the management Ethernet and serial console port (default value 115200) and (de)activates
persistence, used for the SAM application.
1. View the BOF and verify the configuration and image files and their location on the flash cards
using the file structure. What is the image file used, and where is it stored?
2. Create your personal directory that will contain your configuration file.
3. Change
Service the configuration
Router Operating System (SROS) file in theAllBOF to a filename of your choice in the directory created
Rights Reserved © Alcatel-Lucent 2009
in step 2.
PEx# bof ↵
PEx>bof# primary-config cf3:\<your_directory>\<your_filename>.cfg ↵
PEx>bof# persist on ↵
PEx>bof# save ↵
PEx>bof# exit ↵
PEx#
6. Reboot
Switch
Log In totoYour
notes view!
Node
1. Fill in the IP addresses of the management Ethernet ports and the port numbers of the network
ports for each PE in the network diagram drawing at the end of the module. Make sure these
Management IP-addresses, provided by the instructor, match the respective Node. You can ping
the address from you workstation and verify the activity on the management Ethernet port that
was assigned to you.
2. Check the wiring on the hardware to find the network port numbers.
3. Telnet from your workstation to your assigned Node using the management Ethernet port IP
address configured in the BOF.
Note: By default, Telnet is disabled. This means that the attempt to connect to the PE using
Telnet will fail. Use SSH to connect to your PE. The username and password is “admin”.
4. Verify your SSH connection. Can you see your connection? Does the Remote address match your
workstation’s IP-address?
5. After the SSH connection is established, enable the Telnet-server and retry Step 2. The Telnet
connection should now be allowed.
Node# configure ↵
Node>config# system ↵
Node>config>system# security ↵
Node>config>system>security# telnet-server ↵
Node>config>system>security# info ↵
Note: The “info” command shows the most important, often non-default, settings within a
configuration context. The “info detail” command shows ALL settings, including the default,
within a configuration context.
7. Verify your Telnet connection (see step 4). What has changed in the Connections-list?
Switch
Set to notes
the Login view!
Settings
1. Set the time and date to the local time and date. Verify your configuration.
Note: After you have successfully changed the system name the CLI system prompt will now
display the new system name.
PEx#
6.Switch
Save theto notes view!
configuration. What has changed to the prompt (Release 5)?
Note: The configuration will now be saved to the file and directory specified in step 3. Since the
BOF is now pointing to this file, this configuration will be loaded when the node boots.
PEx# file ↵
PEx>file cf3: \# cd <your_directory> ↵
PEx>file cf3:\<your_directory>\# dir ↵
Note: The “ndx”-files are used for the SAM application software. These will only be created when
the persistence is turned on.
8. Change the backup configuration number to 3 and save the configuration 5 times in a row and
view the directory (see step 7), how many files have been created? How many old configuration
files are stored?
Service Router Operating System (SROS)
All Rights Reserved © Alcatel-Lucent 2009
PEx# config system config-backup 3 ↵
Note: this command will only delete all the old configuration files, the most recent file will not
be removed. Press “y” for each file. Adding “force” to the command deletes the files without
asking for confirmation.
Switch to
Activate notes
the view!
IOMs, MDAs and MDA ports
1. Verify the state of the IOMs. How many IOMs are provisioned?
Note: The “show card detail” command provides more detail information and includes detail
information on the flash cards as well.
2. Provision the IOMs and verify the new state as shown in step 1. What is the state now?
3. Verify the state of the MDAs. How many MDAs are provisioned?
4. Provision the MDAs and verify the new state as shown in step 1. What is the state now?
Service Router Operating System (SROS)
All Rights Reserved © Alcatel-Lucent 2009
PEx>config>card# mda <1> ↵
PEx>config>card>mda# mda-type <equipped mda-type> ↵
Note: you can enable each port one by one, or use a range command to enable a series of ports.
Note: The brackets denoting the range of ports. Auto-completion does not work after closing the
bracket.
7. Verify that all the ports shown in the network diagram are Administratively and Operationally
UP and are configured as network ports (mode) (see step 5). What is their MTU size?
End of Module
Lab Exercises Basic Configuration
Section 8
Lab Exercises
Module 2
Security Configuration
Set theSwitch
Numberto of
notes view!
Login Attempts and Lockout Time
Note: you can configure the number of login attempts allowed in a specified time period. If the
number of login attempts is exceeded, you will be locked out for a specified time.
1. Configure your node to allow three login attempts in a one minute time period. If the number of
log in attempts is exceeded within one minute, you will be locked out for one minute.
2. Logout and try to log in 4 times within a minute with a wrong password. See how long it takes
to be able to receive a new attempt.
PEx# logout ↵
Node# password ↵
Enter current password: <admin> ↵
Enter new password: <pass> ↵
Re-enter new password: <pass> ↵
new password does not meet system password policy
MINOR: CLI Failed to change password.
2. Find out why your new password was not accepted and make the necessary changes to allow
the new password.
3. When you have successfully changed the password, test it by logging out of the node and
logging back in using the new password.
Switch
4. When you to noteschanged
have successfully view! the password, test it by logging out of the node and
logging back in using the new password.
PEx# logout ↵
Note: The management access filter runs on the CPM’s Control Processor and affects traffic
terminating on a node.
1. Create a filter that allows only your and the instructor’s PC-workstation to SSH to your PE.
Note: Do NOT set the default-action to deny before permitting your workstation, or you will be
locked out after typing “y” since management access filter is instantly active.
PEx>config>system>security# management-access-filter ↵
PEx>config>system>security>mgmt-access-filter# default-action permit ↵
PEx>config>system>security>mgmt-access-filter# entry 10 ↵
PEx>config>system>security>mgmt-access-filter>entry# src-ip <IP address of
Service Router Operating System (SROS)
your PC workstation/32> ↵ All Rights Reserved © Alcatel-Lucent 2009
PEx>config>system>security>mgmt-access-filter>entry# dst-port <22> ↵
PEx>config>system>security>mgmt-access-filter>entry# action permit ↵
PEx>config>system>security>mgmt-access-filter>entry# back ↵
PEx>config>system>security>mgmt-access-filter# entry 20 ↵
PEx>config>system>security>mgmt-access-filter>entry# src-ip <IP address of
the instructor’s PC workstation/32> ↵
PEx>config>system>security>mgmt-access-filter>entry# dst-port <22> ↵
PEx>config>system>security>mgmt-access-filter>entry# action permit ↵
PEx>config>system>security>mgmt-access-filter>entry# back ↵
PEx>config>system>security>mgmt-access-filter># entry 30 ↵
PEx>config>system>security>mgmt-access-filter>entry# dst-port <22> ↵
PEx>config>system>security>mgmt-access-filter>entry# action deny ↵
PEx>config>system>security>mgmt-access-filter>entry# exit all ↵
3. Verify that only you can connect to your PE over the management access port, none of the
other students should be able to.
Create Switch
a New to notes
User withview!
No Configuration Authorization
1. Create a new user with your first name (password = your last name) and allow access through
console and ftp.
4. Create an admin-password, which will allow any user to enter a special administrative mode by
entering the enable-admin command.
5. Log out of the router and log back in with the newly created user. Verify the inability to access
the “configure” menu. Then enable the admin rights for the user.
PEx# enable-admin ↵
Password: secret ↵
7. Try to FTP to your dedicated node with the admin/admin login, and then with your new
user/password. Which one works? Why?
End of Module
Lab Exercises Security Configuration
Section 8
Lab Exercises
Module 3
Alarms and Logs
1. Create two log files. File 1 will contain the Main event stream logs and File 2 will contain the
Security event stream. Set the rollover to 120 and the retention to 24.
Note: <cfX:> = Can be cf1:, cf2: or cf3: depending on simulator versus Service Router.
Note: Rollover features configure how often an event or accounting log is rolled over. The
retention time specifies the amount of time the file should be retained on the system, based
on the creation time of the file. The retention time is used as a factor to determine which
files should be deleted first if the file system device nears 100% usage. When a log file is
rolled over, the current log file is closed and a new log file is created. Rollover time is
Serviceexpressed in minutes.
Router Operating Default is 1440, range is 60-2880. Retention time is expressed in hours.
System (SROS)
Default is 12, range is 1-500. All Rights Reserved © Alcatel-Lucent 2009
Note: <cfX:> = Can be cf1:, cf2: or cf3: depending on simulator versus Service Router.
3. CreateSwitch to Direct
two log-ids. notes theview!
Main event stream logs to File 1 and the Security event stream
logs to File 2.
4. Verify the contents of the log files. Verify their location on the compact flash cards.
Note: The file-ids 1 and 2 are now associated with a log file located on cfX: in a newly created
“log” directory. The file format is log<log-id><file-id>-<date>-<time> eg. log0101-20040130-
150447.
Note: Now all the IP packets will be shown briefly on the telnet/ssh session. To de-activate this,
type no debug.
6. CreateSwitch
and applyto notes
a filter view!
on log-id 1 that only records alarms greater then critical.
End of Module
Lab Exercises Alarms and Logs
Section 8
Lab Exercises
Module 4
LAG Configuration
1. Connect two PE’s with three links and disable autonegotiate on the ports facing these links.
Note: Repeat this for every port facing the links that will be included in the LAG.
2. Make sure these ports are not used by a router interface and create a LAG containing these
ports. Enable the global dynamic-cost and a port threshold of 1 which brings the LAG down.
Note: Repeat this for every port facing the links that will be included in the LAG.
PEx>config>lag# dynamic-cost ↵
PEx>config>lag# port-threshold 1 action down ↵
PEx>config>lag# no shutdown ↵
PEx# show lag ↵
PEx# show lag <1> detail ↵
End of Module
Lab Exercises LAG Configuration
Section 8
Lab Exercises
Module 5
System And Network Configuration
Switch to the
Configure notes view!Interface
System
Note: The system interface identifies each node within a network as a logical entity. It is a
loopback interface with no physical port assigned to it. This way, when a port should go down,
the system interface can still be available in the network.
1. Configure the System Interface (‘system’ is a fixed reserved name to identify the node in a
network topology).
2. Verify the state of the configured system interface. Make sure that the interface is
administratively and operationally UP.
Note: Use a name that will easily identify the interface, for example <topex> where x is the PE
number of the neighboring router.
Note: Use the IP-addresses and port numbers as shown on the lab diagram.
<X.X.X.X/X> = the IP-address and subnet mask of the interface.
<Y/Y/Y> = the port number of the interface.
2. Check the router interfaces, they should all be administratively and operationally UP.
Switch
Ping to notes view!
a neighbour
1. Verify the routing table that should now contain the locally attached networks, including the
system interface’s IP-address. What is the preference and metric of the locally connected
networks?
Note: these local destinations were manually configured, no remote addresses are known at this
point.
2. Activate the debug-trace session for the ICMP and ARP packets.
4. Ping the network interfaces of the neighbouring routers. Is the ping successful if you change the
source IP-address to your system address? If not, why not?
Note: the ARP and ICMP messages are going in two directions and the router’s ARP cache will be
updated with a new entry.
5. Re-evaluate the ARP cache. What is the new entry? Where is this entry coming from, verify with
your neighbour.
Note: these messages will only be displayed for the duration of this session. To deactivate the
debug:
PEx# no debug ↵
End of Module
Lab Exercises System And Network Configuration
Section 8
Lab Exercises
Module 6
IGP Configuration
Switch to ISIS
Configure notes view!
Note: In this course only single hierarchical topologies are used. Disable OSPF when enabled.
2. Configure IS-IS on the system interface and all the network interfaces.
Note: It is common practice to configure the interfaces point-to-point rather than the default
broadcast to avoid the DIS overhead.
Service Router Operating System (SROS)
All Rights Reserved © Alcatel-Lucent 2009
PEx>config>router>isis>if# back ↵
Note: The last 2 (3) lines must be entered for all the network interfaces.
Note: With this command the reference bandwidth can be set and the metrics of the links will be
calculated: reference-bandwidth/bandwidth (In OSPF this is done by default).
3. Special case for IS-IS: In regular IS-IS SPF operation, “narrow metrics” are used, meaning the
maximum metric value of any given link will be limited to 63, regardless of the result of
calculation in relation to the reference bandwidth given above.
To overcome this restriction, “wide metrics” can be enabled, which is an additional attribute
carried in the so called “traffic engineering TLVs (Type-Length-Value packet field formats).
Wide metric support necessitates the support for traffic engineering extensions on the IGP,
which is an optionally enabled feature. Some other uses of traffic engineering is discussed
further in the next MPLS section.
4.Switch to configuration.
Verify your notes view!
PEx# show router isis status ↵
Note: this command shows the area-ids this node belongs to. There can be up to 3 area-ids
configured.
Note: There are 4 interfaces. The system interface has a metric of 0, all the links have a metric of
10 by default. A reference bandwidth can be configured (same as OSPF by default).
5. When all the nodes have finished step 3, view the ISIS forwarding database. Make sure all the
networks and system addresses are included and reachable, use Ping to verify. What is the
preference and metric to reach the other PEs?
8. Turn on simple authentication (password) with a matching authentication key (choose one with
your neighbour).
Note: this configuration must match between neighbours’ interfaces or the adjacency will fail.
9. Debug the IS-IS packets. Perform a shut/no shut on IS-IS and evaluate the packets. What is the
difference between Hello-packets with and without authentication?
PEx# no debug ↵
Metrics
1. Verify that the routing table contains all the destinations. What is the metric of the system
interface of the opposite router? Trace the route to this IP-address. What path is taken?
2. Adjust the metric of the outgoing interface used by the path in Step 1 to 5000.
Note: When a router learns more then one route to a certain destination, the best route will be
selected. First the preference of the routing protocol the destination was learned on is
compared and the lowest preference is selected. Then, if this routing protocol still offers
more then one route to the destination, the route with the lowest metric will be selected and
inserted into the routing table. The administrator can influence this process by changing the
preference and the metrics as demonstrated in this lab exercise (metric). When a prefix has
multiple routes with equal preferences and metrics, only one is selected except when ECMP is
activated.
Service Router Operating System (SROS)
All Rights Reserved © Alcatel-Lucent 2009
4. Turn on ECMP up to 2 possible routes and evaluate the routing table once more. Are there
routes occurring twice in the routing table now? How is this possible?
5. Set the metrics back to the default value and disable ECMP.
End of Module
Lab Exercises IGP Configuration
Section 8
Lab Exercises
Module 7
EFM Configuration
Switch
EFM to notes view!
configuration
1. Configure EFM
Ensure EFM on both ends of the link is enabled, if not the interface will go down
2. Display EFM
===============================================
Ethernet Oam (802.3ah)
===============================================
Service Router Operating System (SROS)
Admin State : up All Rights Reserved © Alcatel-Lucent 2009
3. Switch
Configure to notes
Remote view!
Loopback
Enable ability to react to remote loopback OAMPDU’s (enable on both ends of the link)
P1# configure port 1/1/1
P1>config>port# ethernet efm-oam accept-remote-loopback
Initiate remote loopback
P1# oam efm 1/1/1 remote-loopback start
===============================================
Ethernet Oam (802.3ah)
===============================================
Admin State : up
Oper State : operational
Mode : active
Pdu Size : 2047
Config Revision : 1
Service Router Operating System (SROS)
All Rights Reserved © Alcatel-Lucent 2009
Function Support : LB
Transmit Interval : 20000 ms
Multiplier : 5
Tunneling : false
When test is completed stop the test as during remote loopback test operation all other frames
except EFM OAMPDU’s are dropped (all protocol sessions will go down)
End of Module
Lab Exercises EFM Configuration
Section 8
Lab Exercises
Module 7
MPLS Configuration
Switch to LDP
Configure notes view!
Note: repeat the last 2 commands for all the network interfaces.
PEx>config>router>ldp# no shutdown ↵
Note: when LDP is enabled, by default targeted LDP is also enabled. This will be used later on by
the service and can be disabled at this point, but this is not necessary. It must be reactivated
later when Layer 2 VPN’s are configured.
2. Verify
Service the state
Router Operating of (SROS)
System the LDP
parameters.
All RightsHow
Reservedmany sessions
© Alcatel-Lucent 2009 are active? What is the label
distribution, the label retention and control mode? Are the interfaces up?
3. Verify the Label Information Base (LIB). Why are some of the ingress and egress labels empty?
Note: By default LDP will signal labels for the system address of the PE. To have labels
distributed for directly connected networks, an export policy is needed (see Step 8).
4. Verify the Label Forwarding Information Base (LFIB). What label will your router use to send a
packet to the system address (FEC) of your own router, your clockwise router, your opposite
router and your counter clockwise router?
Note: <X.X.X.X> = the IP-address of the system interface of your opposite router.
6. Change the metric of the IGP interface on the diagonal link to your opposite router to 5000 and
retry step 5. Why is the LSP trace different now?
7. Set the metric of the IGP back to it’s default value (no metric).
8. Export the directly connected networks into LDP with an export policy. Verify the LIB and LFIB.
Note: You can use the policy defined in the IGP Lab.
9. Verify again the LIB and LFIB. Which additional entries do you see now in the databases?
Service Router Operating System (SROS)
All Rights Reserved © Alcatel-Lucent 2009
PEx# show router ldp bindings ↵
PEx# show router ldp bindings active↵
PEx>config>router>ldp# no export ↵
End of Module
Lab Exercises MPLS Configuration
Section 8
Lab Exercises
Module 8
Services Configuration
1. Create two customers (100 and 200). Provide the customer a description, contact information and
a phone number.
Note: A customer is locally significant, but it is advisable to be consistent throughout the network
(SAM).
1. Change the port facing the customer (see lab diagram) to an access port.
2. Change the Maximum Transmission Unit (MTU) size of each network port. What minimum value is
necessary?
Note: Since MPLS has been configured on the network interfaces, the port that supports that
interface must have its MTU changed to 1540 bytes. If GRE were used the MTU would have to
be changed to 1560. Configure the MTU size on both network ports on each of the nodes in your
network.
1. Configure a full mesh of SDPs to the other PEs in the network using LDP.
Note: Repeat the above steps for all the other PEs where X is the PE number.
Note: In case the SDPs are remaining in the operationally down state, check
Service Router Operating command
System (SROS) output carefully to look for some clues.
the detail All Rights Reserved © Alcatel-Lucent 2009
Switch
OAM to notes view!
Tools
Note: SDP Ping performs in-band uni-directional or round-trip connectivity tests on SDPs. The SDP
Ping OAM packets are sent in-band, in the tunnel encapsulation, so it will follow the same path
as traffic within the service. The SDP Ping response can be received out-of-band in the control
plane, or in-band using the data plane for a round-trip test.
1. Perform a uni-directional SDP Ping. What is the Path MTU? Why is there no Remote SDP-ID?
Note: You have tested the local SDP but have not performed a round-trip test.
<XX> is the local SDP.
Note: This is a round-trip test, both directions are using the SDP.
Service Router Operating System (SROS)
<XX> is the local SDP and <YY> is the remote SDP.
All Rights Reserved © Alcatel-Lucent 2009
3. Discover the MTU size supported over your SDPs. What is the MTU?
Note: The Path MTU Discovery tool provides a powerful tool that enables a service provider to get
the exact MTU supported between the service ingress and service termination points (accurate to
one byte). It is important to understand the MTU of the entire path end-to-end when
provisioning services, especially for virtual leased line (VLL) services where the service must
support the ability to transmit the largest customer packet.
Switch
Local to notes
Mirror view!
Service
Note: The mirror service feature provides a way to capture packets from a port on a router, and
sends a copy of the traffic to another port on the same router or a port on a remote router
where they can be captured by a packet analyzer or sniffer. Each router can mirror packets from
a specific port or service to any destination point in the network, regardless of interface type or
speed.
Note: The mirror destination defines a mirror service ID and a destination for copies of the packets.
The mirrored frame size that is to be transmitted to the mirror destination can be explicitly
configured by using slicing features. This enables mirroring only the parts needed for analysis.
PEx>config>mirror>mirror-dest>sap$ exit ↵
PEx>config>mirror>mirror-dest# no shutdown ↵
3. Mirror the ingress and egress traffic on a local network port, the mirror source. Use a sniffer
connected to the SAP to verify if the mirror service works.
SwitchMirror
Remote to notes view!
Service
Note: A port can be mirrored to any of the devices in the network. The mirrored frames are sent
from the source over an SDP service tunnel to a destination node, where they can be analyzed.
The mirror SDP uses static label assignments. This static label must match the static label that
you are going to assign on the remote node.
3. Configure your PE as a remote mirror source for your opposite neighbour. Direct the ingress and
egress traffic from the source port to the SDP and assign an egress label.
Note: The mirror services uses an SDP as a tunnel for mirrored frames. Because the mirror service
only sends traffic in one direction, it is not strictly necessary to create a bi-directional SDP.
End of Module
Lab Exercises Services Configuration
Section 8
Lab Exercises
Module 10
VPLS Configuration
Switch
VPLS to notes view!
Configuration
1. Configure a VPLS service 600 according to the lab diagram at the end of this module.
Note: Remove the SAP from the ePipe service to use it for this lab exercise (VPLS service).
Note:The 0 at the end of the sap identifier signifies that null encapsulation (the default) is being
used on the port. Null encapsulation is used if there is only one service being used on the port. If
multiple services will be using the port, you would configure it to use Dot1q or qinq
encapsulation. Now an access port has been assigned to this service on which customer
equipment can be connected.
PEx>config>service>vpls>sap$ back ↵
PEx>config>service>vpls# mesh-sdp <2X>:600 create ↵
PEx>config>service>vpls>mesh-sdp$ back ↵
the participants in the VPLS service. Use the SDPs over RSVP-TE. These SDPs have TLDP enabled
in the previous lab exercise. The :600 binds the SDP to the service. At this point TLDP labels are
signalled to identify the service on all the participants of the VPLS service.
PEx>config>service>vpls# no shutdown ↵
2. Verify the VPLS. What are the labels used to reach the other PEs? What are the labels used to
reach the VPLS service on these remote PEs?
3. Connect CPEs to the SAPs of the VPLS Service and test your VPLS by passing traffic across it such
as a video file or a Ping test. Disconnect a network link and see if traffic gets lost. Verify if the
RSVP-TE backup scenario’s are operational.
Note: An VPLS is the equivalent of a VLAN connecting one or more switches. In order to ping
successfully, all CPEs will have to be members of the same subnet.
4. Switch
Verify theto notes database.
forwarding view! What are the age timers? How can you verify the age timer per
mac entry?
OAM Tools
1. Perform a MAC Ping and a MAC Trace to a remote CPE. What information is gained from this OAM
tool? Verify the forwarding database. What MAC address is added from this operation? Is the
information aging out as it is supposed to?
2. Populate and Purge a random MAC address. What command can flood this information to the
remote PEs participating in the VPLS? Is the information aging out as it is supposed to?
3. Activate a continuous Ping form one CPE to another. Next, perform a CPE Ping to one of the CPEs
as the destination IP-address and the other CPE as the source IP-address. Is the initial continuous
Ping still operational? Why not? How can we resolve this?
End of Module
Lab Exercises VPLS Configuration
Section 8
Lab Exercises
Module 11
MC-LAG Configuration
Switch
LAG to notes view!
Configuration on CE
1. Change the ports facing the Access Switch (see lab diagram) to an access port and disable auto-
negotiate (or set to limited)
LAG Configuration
1. Configure the LAG mode (network or access), encasulation type (null, dot1q) to match the ports.
Configure
Service LACPSystem
Router Operating on the LAG.
(SROS) At leastAllone
Rightsside
Reserved © Alcatel-Lucent 2009
Switch
LAG to notes view!
Configuration on PEs
1. Change the ports facing the Access Switch (see lab diagram) to an access port and disable auto-
negotiate (or set to limited)
LAG Configuration
Service Router Operating System (SROS)
1. Configure the LAG mode (network orAllaccess), encasulation
Rights Reserved © Alcatel-Lucent 2009type (null, dot1q) to match the ports.
SwitchConfiguration
MC-LAG to notes view!
1. Configure multi-chassis redundancy with a peering session toward the redundant PE system
address and enable mc-lag redundancy
MC-LAG Verification
End of Module
Lab Exercises Services Configuration