This document provides instructions for configuring basic performance routing (PfR) on Cisco IOS devices. It describes PfR components like the PfR master controller and border router. It also explains the PfR network performance loop, which includes profiling traffic, measuring performance, applying policies, enforcing policies, and verifying the results. The document includes configuration examples for setting up a PfR master controller and border router.
This document discusses jitter, latency, and delay in network communications. It provides definitions and explanations of these terms:
1. Jitter is the variation in the delay of received packets caused by network congestion, queuing, or errors, rather than packets being transmitted at an even pace. This can cause gaps in audio if packets are missing.
2. Delay and latency refer to the time it takes a bit to be transmitted from source to destination. Jitter is a type of delay that varies over time.
3. Solutions to reduce jitter include increasing the receive jitter buffer size and delay, using larger RTP packets, and lowering audio quality.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
The document discusses the interworking strategy and parameters for multicarrier networks in Hanoi, Vietnam. It proposes two scenarios for the random camping strategy across U2100 F1, F2, and F3 carriers in the idle and connected modes. It also provides settings for inter-RAT handover between U900, U2100 and GSM networks.
The document discusses LTE system signaling procedures. It begins with objectives of understanding LTE architecture, elementary procedures of interfaces like S1, X2 and Uu, and procedures for service setup, release and handover. It then covers topics like system architecture, bearer service architecture, elementary procedures on Uu including connection establishment and release, and procedures on S1 and X2 interfaces. The document aims to help readers understand LTE signaling flows and procedures.
The document provides an overview of NBAP (Node B Application Part) procedures. It discusses:
1. The Iub interface between RNC and Node B and how NBAP is used for signaling.
2. The main functions of NBAP including cell configuration management, transport channel management, and radio link management.
3. The different types of NBAP procedures including common procedures for tasks like cell setup/deletion and dedicated procedures for radio link management.
4. Key elements of NBAP communication like messages, information elements, and error handling.
In This Presentation, Following Topics for PCRF advanced, with details of E// SAPC, are clarified and presented.
Connectivity to the SAPC
O&M Process
Bundle Configuration
Redirection
Threshold Configuration
LDAP
Database etc
The document provides an overview of PGW/GGSN configuration on a Juniper router, including configuring routing instances, APNs, CDRs, QoS, and other optional configurations like SACC, PISC, and credit control. It describes configuring connectivity and routing, GTP properties, L2TP, DHCP, RADIUS, PDP context properties, and quality of service. The document also lists additional resources for further study of 3GPP specifications and vendor documentation.
This document discusses jitter, latency, and delay in network communications. It provides definitions and explanations of these terms:
1. Jitter is the variation in the delay of received packets caused by network congestion, queuing, or errors, rather than packets being transmitted at an even pace. This can cause gaps in audio if packets are missing.
2. Delay and latency refer to the time it takes a bit to be transmitted from source to destination. Jitter is a type of delay that varies over time.
3. Solutions to reduce jitter include increasing the receive jitter buffer size and delay, using larger RTP packets, and lowering audio quality.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
The document discusses the interworking strategy and parameters for multicarrier networks in Hanoi, Vietnam. It proposes two scenarios for the random camping strategy across U2100 F1, F2, and F3 carriers in the idle and connected modes. It also provides settings for inter-RAT handover between U900, U2100 and GSM networks.
The document discusses LTE system signaling procedures. It begins with objectives of understanding LTE architecture, elementary procedures of interfaces like S1, X2 and Uu, and procedures for service setup, release and handover. It then covers topics like system architecture, bearer service architecture, elementary procedures on Uu including connection establishment and release, and procedures on S1 and X2 interfaces. The document aims to help readers understand LTE signaling flows and procedures.
The document provides an overview of NBAP (Node B Application Part) procedures. It discusses:
1. The Iub interface between RNC and Node B and how NBAP is used for signaling.
2. The main functions of NBAP including cell configuration management, transport channel management, and radio link management.
3. The different types of NBAP procedures including common procedures for tasks like cell setup/deletion and dedicated procedures for radio link management.
4. Key elements of NBAP communication like messages, information elements, and error handling.
In This Presentation, Following Topics for PCRF advanced, with details of E// SAPC, are clarified and presented.
Connectivity to the SAPC
O&M Process
Bundle Configuration
Redirection
Threshold Configuration
LDAP
Database etc
The document provides an overview of PGW/GGSN configuration on a Juniper router, including configuring routing instances, APNs, CDRs, QoS, and other optional configurations like SACC, PISC, and credit control. It describes configuring connectivity and routing, GTP properties, L2TP, DHCP, RADIUS, PDP context properties, and quality of service. The document also lists additional resources for further study of 3GPP specifications and vendor documentation.
This document provides an overview of UMTS basics including standards, network architecture, interfaces, domains, UTRAN components, mobility management, security, radio interface concepts, protocols, and codecs. It serves as an introduction to analyzing UMTS UTRAN signaling procedures which are described in detail later in the document.
This presentations contains introductory to Intermediate topics on Ericsson Juniper M120 based GGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in GGSN and engineers can further learn from the basic topics shared in this presentation.
LTE Release 10, also known as LTE-Advanced, provides significant enhancements over LTE Release 8 including support for wider bandwidths up to 100MHz using carrier aggregation, advanced MIMO techniques up to 8-layer transmission, heterogeneous networks and interference coordination, and relaying to improve coverage and throughput. It aims to fulfill the requirements for ITU's IMT-Advanced specification.
This chapter discusses the GPRS Mobility Management (GMM) and Session Management (SM) protocols. Section 3.1 covers GMM tasks such as procedures, routing areas, and state transitions. Section 3.2 covers SM, including the PDP state model, elements involved in PDP contexts, and PDP parameters. Section 3.3 discusses GMM/SM message formats. Sections 3.4 and 3.5 cover specific GMM and SM procedures.
In This Presentation, Following Optional Configuration for PGW/GGSN is clarified and presented.
PISC/SACC Over View
Traffic
Inspection, Analysis
Authorization and QoS
Configuration
Rating Group, Service Set
Header Rule Set , Header Rule
HTTP/WSP Rule
Rating Group Mapping
In This Presentation, Following Topics for PCRF basic, with details of E// SAPC, are clarified and presented.
SAPC definition
Functional View
Service Aware Policy Control
Bearer Resource Control
Cross Control Functions
Information Model and O&M
Platform
The document describes Gs interface concepts and combined procedures for GPRS and circuit-switched services. It discusses Gs association establishment and release, combined routing area updates, attach procedures, and detach procedures. The key points are:
1. The Gs interface coordinates location information between SGSN and MSC/VLR for combined circuit-switched and packet-switched services.
2. Combined procedures allow updating location information for both domains with a single request. This includes routing area updates, attach procedures when a subscriber becomes attached to both networks, and detach procedures.
3. The Gs association links the subscriber records in SGSN and MSC/VLR and must be established for
This document outlines the 3GPP specifications process for developing new mobile network systems and features. It follows a three stage process:
Stage 1 defines service requirements. Stage 2 defines the network architecture, elements, and high-level flows. Stage 3 defines protocols, state machines, and messages.
This process was applied to developing LTE, where Stage 1 documents defined requirements like throughput rates and latency. Stage 2 documents described the overall LTE system architecture. Numerous Stage 3 specifications then defined the protocols that enable LTE.
This presentation explains how to simplify networking by avoiding router limitations and multihoming with Juniper’s MX80. Read on to learn configurations and useful commands.
This document provides an overview of LTE network architecture and technology. It discusses the evolution of LTE from previous standards to meet increasing demands for high data rates. The key aspects covered include LTE network architecture components like eNBs, MMEs, S-GWs and P-GWs; multiple access techniques used in LTE including OFDMA for downlink and SC-FDMA for uplink; frame structure consisting of 10ms radio frames with 0.5ms slots; and channel bandwidths and resource block structure.
1. The document introduces GPRS (General Packet Radio Service), which provides packet-mode transmission within cellular networks and interconnects with external packet networks like the Internet.
2. It describes the GPRS network architecture and components, including the SGSN and GGSN nodes. Mobility and session management functions are explained along with quality of service aspects.
3. Procedures for wireless Internet access via GPRS are outlined, involving GPRS and IP attachment as well as data transfer using SNDCP and PPP protocols. The coexistence of GPRS and GSM services is also addressed.
Unified MPLS. Построение современных и масштабируемых MPLS-сетей. Cisco Russia
The document discusses Cisco's unified MPLS technology. Some key points:
- MPLS is an effective packet transport technology and enables virtualization of transport services.
- Unified MPLS provides a scalable solution for a single transport infrastructure for both mobile and wireline services.
- Unified MPLS from the access network to the core network can minimize operational costs by providing a single control plane and service unification.
This document provides an overview of key 3GPP protocols, specifications, nodes and interfaces related to LTE networks. It includes a table listing common 3GPP acronyms and their definitions, as well as diagrams illustrating the 3GPP system architecture and key interfaces between network nodes.
RANAP is the protocol used over the Iu interface to connect the WCDMA RAN to the core network. It carries NAS messages between the core network nodes and UEs. RANAP uses SS7 over ATM for signaling and supports either transparent mode or support mode for transporting user data over the Iu user plane. The main functions of RANAP include establishing and releasing signaling connections, transferring NAS messages for mobility management and call control, and setting up GTP tunnels for user data transport.
This document describes discontinuous reception (DRX) and signaling control features for LTE networks, including DRX, dynamic DRX, and high-mobility-triggered idle mode. It provides an overview of these features, their technical principles, related features, network impacts, and engineering guidelines. The document contains detailed sections on DRX parameters for various scenarios, dynamic DRX principles, and deployment and maintenance guidelines.
The document provides an overview of the message flow for a packet switched call between a UE and core network. Key steps include:
1) The UE performs cell search and selection before establishing an RRC connection and registering with the core network.
2) The UE then sends an attach request and exchanges authentication and security messages with the core network.
3) Once attached, the UE can activate a packet data protocol context and exchange user plane data for the packet switched call.
This document provides an overview of the LTE protocol stack, focusing on the data link layer (L2) which includes the MAC, RLC, and PDCP sublayers. It describes the architecture and functions of MAC including logical and transport channels, HARQ, scheduling, random access procedure, discontinuous reception, and more. It also covers the RLC sublayer including its different modes (TM, UM, AM) and functions like segmentation, reassembly and error correction. Finally it discusses the PDCP sublayer and its roles in header compression, security, and handover support. The document is intended to provide a systematic understanding of the LTE protocol stack for engineers working in areas like development, testing, optimization and trouble
This document provides an overview of RRC procedures in LTE as specified in 3GPP 36.331. It describes important changes in the RRC specification for LTE compared to legacy 3G systems, including having only two RRC states (RRC_IDLE and RRC_CONNECTED) compared to five states in 3G, and three defined signaling radio bearers compared to four in 3G. The purpose is to help developers and test engineers understand LTE RRC features and procedures. Key procedures described include paging, RRC connection establishment, reconfiguration, re-establishment, security activation, and handover.
The document provides an overview of LTE technology in 10 minutes by answering frequently asked interview questions about LTE. It begins by stating the purpose is to provide essential LTE knowledge quickly. It then lists 20 questions about LTE topics like bandwidths, resource blocks, throughput, UE states, handover types, measurements and control channels. For each question it provides a concise 1-2 sentence answer. It concludes by introducing the author and encouraging the reader to contact them with any additional questions.
The document provides information on network optimization services offered by GTL including pre-launch optimization, continuous optimization, and swap management. It discusses the need for optimization to maintain network performance, quality, and maximize existing infrastructure. The optimization process involves identifying clusters, drive testing, data analysis, parameter tuning, and reconfiguration. Key performance indicators are monitored at the network and cell level. Reports provide analysis and recommendations to improve coverage, throughput, and resolve issues. The virtual optimization center allows centralized expertise and use of tools to optimize networks remotely.
PFRv3 – новое поколение технологии Performance Routing для интеллектуального ...Cisco Russia
PFRv3 – новое поколение технологии Performance Routing для интеллектуального управления трафиком.
Запись вебинара: https://cisco.webex.com/ciscosales/lsr.php?RCID=996604735650402b828d47ff1f7b7578
Клуб Cisco - ciscoclub.ru
This document provides an overview of UMTS basics including standards, network architecture, interfaces, domains, UTRAN components, mobility management, security, radio interface concepts, protocols, and codecs. It serves as an introduction to analyzing UMTS UTRAN signaling procedures which are described in detail later in the document.
This presentations contains introductory to Intermediate topics on Ericsson Juniper M120 based GGSNs with great details on HW, SW and platform specific CLI. This can be relevant for Introductory to Advance level of knowledge in GGSN and engineers can further learn from the basic topics shared in this presentation.
LTE Release 10, also known as LTE-Advanced, provides significant enhancements over LTE Release 8 including support for wider bandwidths up to 100MHz using carrier aggregation, advanced MIMO techniques up to 8-layer transmission, heterogeneous networks and interference coordination, and relaying to improve coverage and throughput. It aims to fulfill the requirements for ITU's IMT-Advanced specification.
This chapter discusses the GPRS Mobility Management (GMM) and Session Management (SM) protocols. Section 3.1 covers GMM tasks such as procedures, routing areas, and state transitions. Section 3.2 covers SM, including the PDP state model, elements involved in PDP contexts, and PDP parameters. Section 3.3 discusses GMM/SM message formats. Sections 3.4 and 3.5 cover specific GMM and SM procedures.
In This Presentation, Following Optional Configuration for PGW/GGSN is clarified and presented.
PISC/SACC Over View
Traffic
Inspection, Analysis
Authorization and QoS
Configuration
Rating Group, Service Set
Header Rule Set , Header Rule
HTTP/WSP Rule
Rating Group Mapping
In This Presentation, Following Topics for PCRF basic, with details of E// SAPC, are clarified and presented.
SAPC definition
Functional View
Service Aware Policy Control
Bearer Resource Control
Cross Control Functions
Information Model and O&M
Platform
The document describes Gs interface concepts and combined procedures for GPRS and circuit-switched services. It discusses Gs association establishment and release, combined routing area updates, attach procedures, and detach procedures. The key points are:
1. The Gs interface coordinates location information between SGSN and MSC/VLR for combined circuit-switched and packet-switched services.
2. Combined procedures allow updating location information for both domains with a single request. This includes routing area updates, attach procedures when a subscriber becomes attached to both networks, and detach procedures.
3. The Gs association links the subscriber records in SGSN and MSC/VLR and must be established for
This document outlines the 3GPP specifications process for developing new mobile network systems and features. It follows a three stage process:
Stage 1 defines service requirements. Stage 2 defines the network architecture, elements, and high-level flows. Stage 3 defines protocols, state machines, and messages.
This process was applied to developing LTE, where Stage 1 documents defined requirements like throughput rates and latency. Stage 2 documents described the overall LTE system architecture. Numerous Stage 3 specifications then defined the protocols that enable LTE.
This presentation explains how to simplify networking by avoiding router limitations and multihoming with Juniper’s MX80. Read on to learn configurations and useful commands.
This document provides an overview of LTE network architecture and technology. It discusses the evolution of LTE from previous standards to meet increasing demands for high data rates. The key aspects covered include LTE network architecture components like eNBs, MMEs, S-GWs and P-GWs; multiple access techniques used in LTE including OFDMA for downlink and SC-FDMA for uplink; frame structure consisting of 10ms radio frames with 0.5ms slots; and channel bandwidths and resource block structure.
1. The document introduces GPRS (General Packet Radio Service), which provides packet-mode transmission within cellular networks and interconnects with external packet networks like the Internet.
2. It describes the GPRS network architecture and components, including the SGSN and GGSN nodes. Mobility and session management functions are explained along with quality of service aspects.
3. Procedures for wireless Internet access via GPRS are outlined, involving GPRS and IP attachment as well as data transfer using SNDCP and PPP protocols. The coexistence of GPRS and GSM services is also addressed.
Unified MPLS. Построение современных и масштабируемых MPLS-сетей. Cisco Russia
The document discusses Cisco's unified MPLS technology. Some key points:
- MPLS is an effective packet transport technology and enables virtualization of transport services.
- Unified MPLS provides a scalable solution for a single transport infrastructure for both mobile and wireline services.
- Unified MPLS from the access network to the core network can minimize operational costs by providing a single control plane and service unification.
This document provides an overview of key 3GPP protocols, specifications, nodes and interfaces related to LTE networks. It includes a table listing common 3GPP acronyms and their definitions, as well as diagrams illustrating the 3GPP system architecture and key interfaces between network nodes.
RANAP is the protocol used over the Iu interface to connect the WCDMA RAN to the core network. It carries NAS messages between the core network nodes and UEs. RANAP uses SS7 over ATM for signaling and supports either transparent mode or support mode for transporting user data over the Iu user plane. The main functions of RANAP include establishing and releasing signaling connections, transferring NAS messages for mobility management and call control, and setting up GTP tunnels for user data transport.
This document describes discontinuous reception (DRX) and signaling control features for LTE networks, including DRX, dynamic DRX, and high-mobility-triggered idle mode. It provides an overview of these features, their technical principles, related features, network impacts, and engineering guidelines. The document contains detailed sections on DRX parameters for various scenarios, dynamic DRX principles, and deployment and maintenance guidelines.
The document provides an overview of the message flow for a packet switched call between a UE and core network. Key steps include:
1) The UE performs cell search and selection before establishing an RRC connection and registering with the core network.
2) The UE then sends an attach request and exchanges authentication and security messages with the core network.
3) Once attached, the UE can activate a packet data protocol context and exchange user plane data for the packet switched call.
This document provides an overview of the LTE protocol stack, focusing on the data link layer (L2) which includes the MAC, RLC, and PDCP sublayers. It describes the architecture and functions of MAC including logical and transport channels, HARQ, scheduling, random access procedure, discontinuous reception, and more. It also covers the RLC sublayer including its different modes (TM, UM, AM) and functions like segmentation, reassembly and error correction. Finally it discusses the PDCP sublayer and its roles in header compression, security, and handover support. The document is intended to provide a systematic understanding of the LTE protocol stack for engineers working in areas like development, testing, optimization and trouble
This document provides an overview of RRC procedures in LTE as specified in 3GPP 36.331. It describes important changes in the RRC specification for LTE compared to legacy 3G systems, including having only two RRC states (RRC_IDLE and RRC_CONNECTED) compared to five states in 3G, and three defined signaling radio bearers compared to four in 3G. The purpose is to help developers and test engineers understand LTE RRC features and procedures. Key procedures described include paging, RRC connection establishment, reconfiguration, re-establishment, security activation, and handover.
The document provides an overview of LTE technology in 10 minutes by answering frequently asked interview questions about LTE. It begins by stating the purpose is to provide essential LTE knowledge quickly. It then lists 20 questions about LTE topics like bandwidths, resource blocks, throughput, UE states, handover types, measurements and control channels. For each question it provides a concise 1-2 sentence answer. It concludes by introducing the author and encouraging the reader to contact them with any additional questions.
The document provides information on network optimization services offered by GTL including pre-launch optimization, continuous optimization, and swap management. It discusses the need for optimization to maintain network performance, quality, and maximize existing infrastructure. The optimization process involves identifying clusters, drive testing, data analysis, parameter tuning, and reconfiguration. Key performance indicators are monitored at the network and cell level. Reports provide analysis and recommendations to improve coverage, throughput, and resolve issues. The virtual optimization center allows centralized expertise and use of tools to optimize networks remotely.
PFRv3 – новое поколение технологии Performance Routing для интеллектуального ...Cisco Russia
PFRv3 – новое поколение технологии Performance Routing для интеллектуального управления трафиком.
Запись вебинара: https://cisco.webex.com/ciscosales/lsr.php?RCID=996604735650402b828d47ff1f7b7578
Клуб Cisco - ciscoclub.ru
Cisco ios xr mpls configuration guide for the cisco crs router,Pablo Guillen
This document provides a summary of MPLS configuration guidelines for Cisco IOS XR software. It describes how to implement MPLS Label Distribution Protocol (LDP) and Resource Reservation Protocol (RSVP) as well as MPLS forwarding and traffic engineering. The document includes sections on configuring MPLS features such as LDP discovery, label advertisement control, graceful restart, RSVP authentication, traffic engineered tunnels, fast reroute, and interarea tunneling.
The Cisco CCNP Implementing Cisco IP Routing (Route) v2.0 course is designed for the network engineers who want to upgrade their skills about IP Routing. Throughout the course, you will learn about the routing protocols, different remote connectivity options and their impact on routing and implement RIPng.
Course details: https://bit.ly/2qQrJHz
Summit 16: The Hitchhiker/Hacker's Guide to NFV BenchmarkingOPNFV
The document summarizes benchmarking methodologies and tools for network function virtualization (NFV). It discusses standards from groups like ETSI and IETF, as well as open source projects from OPNFV. Traditional approaches to benchmarking physical network devices need to evolve to address virtual network functions (VNFs) and their supporting infrastructure. New methods are needed to test virtual switches, controllers, and other infrastructure components in NFV environments.
Cisco systems temario curso de especialista experto en redes e internet ccnp1 2d
The document describes a Cisco CCNP certification training course that consists of 4 modules totaling approximately 280 hours. The modules cover topics such as routing, switching, remote access, troubleshooting, and optimization of IP and WAN connections. The courses are taught in Spanish but course materials are only available in English.
Cisco systems temario curso de especialista experto en redes e internet ccnp1 2d
The document describes a Cisco CCNP certification training course that consists of 4 modules totaling approximately 280 hours. The modules cover topics such as routing, switching, remote access, troubleshooting, and optimization of IP and WAN connections. The courses are taught in Spanish but course materials are only available in English.
This document provides an overview and user guide for ArubaOS 7.3. It covers system basics, profiles management, interface configuration and management, stacking, VLANs, port channels, OAM, and other features. The document includes sections on legal notices, open source software, warranty, and copyright. It provides configuration examples and instructions for using both the CLI and web interface.
Srihitha Technologies provides Loadrunner and Performance Testing Online Training in Ameerpet by real time Experts. For more information about Loadrunner and Performance Testing online training in Ameerpet call 9885144200 / 9394799566.
The chapter discusses IP routing and routing protocols. It explains the goals of routing which include stability, robustness, dynamic path updates, and secure information transmission. It also covers routing metrics, interior and exterior routing protocols, static and dynamic routing, routing tables, and the Routing Information Protocol (RIP). RIP uses hop count as its metric and supports up to 15 hops between routers. Enhancements in RIPv2 include multicast updates, triggered updates, classless operation, and authentication.
The document discusses radio frequency (RF) optimization for cellular networks. It describes the need for pre-launch and continuous optimization to ensure network performance. The optimization process involves drive testing, data analysis, parameter adjustment, and hardware configuration. Key performance indicators are monitored at the network and cell levels to identify issues and guide optimization efforts.
This document provides an overview of premise-based optimization solutions and how they work. It discusses how a premise-based optimization product can leverage multiple internet connections to optimize quality, cost, and resiliency for business communications. It explores the components, functionality, and deployment of premise-based optimization solutions, focusing on Internap's Flow Control Platform solution.
The Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide provides instructions for configuring Cisco 1800 series routers. The guide is organized into four parts that cover getting started, configuring Ethernet and DSL access, additional features, and reference information. It is intended for network administrators of varying experience levels and includes configuration examples, commands, and concepts to help users configure the routers.
The Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide provides instructions for configuring Cisco 1800 series routers. The guide is organized into four parts that cover getting started, configuring Ethernet and DSL access, additional features, and reference information. Part 1 introduces basic router configuration. Part 2 focuses on sample network deployments and configuring PPP and NAT connections over Ethernet and ATM interfaces. Part 3 describes additional configuration options and troubleshooting. Part 4 contains reference appendices.
This document provides instructions and configuration examples for setting up and customizing a basic Border Gateway Protocol (BGP) network using Cisco IOS software. It discusses BGP routing processes, peers, peer templates, route aggregation, route filtering, route redistribution, default routes, and address family configuration. The document also covers 4-byte autonomous system number support in BGP.
The document discusses key concepts in production planning and control in SAP PP/PP including:
1. The standard production planning and control cycle including SOP, demand management, MRP, planned orders, and production execution.
2. Master data used in PP such as material master, BOM, routing, and production versions which define how items are produced.
3. The interfaces between PP and other SAP modules like SD, MM, and CO which are involved in production planning and control.
4. Planning techniques like MRP, LTP, and capacity planning which ensure proper planning and availability of materials, resources, and capacity.
This document provides an overview of the FedRAMP process for obtaining security authorization for cloud systems. It describes the objectives of FedRAMP, including establishing a standardized approach to assessing and authorizing cloud systems. The document then outlines the key stages of the FedRAMP process from the perspective of a cloud service provider, including initiation, security assessment, and continuous monitoring. It provides examples of documents involved in each stage, such as the system security plan, security assessment plan, and continuous monitoring materials. The overall goal of FedRAMP is to increase security and oversight of cloud systems supporting government agencies.
Web Scale Reasoning and the LarKC ProjectSaltlux Inc.
The LarKC project aims to build an integrated pluggable platform for large-scale reasoning. It supports parallelization, distribution, and remote execution. The LarKC platform provides a lightweight core that gives standardized interfaces for combining plug-in components, while the real work is done in the plug-ins. There are three types of LarKC users: those building plug-ins, configuring workflows, and using workflows.
JN0-649 Enterprise Routing and Switching Professional (JNCIP-ENT) By Certs Wa...Certs Warrior
JN0-649 Enterprise Routing and Switching Professional (JNCIP-ENT)
Vendor Name: Juniper
Code: JN0-649
-----------------------------------------------------------------------
For More Details Visit: https://t.ly/rEkAL
https://www.certswarrior.com/exam/jn0-649/
https://www.youtube.com/watch?v=LdCqhlkYQlY
-----------------------------------------------------------------------
JN0-649 Exam Details:
Enterprise Routing and Switching, Professional (JNCIP-ENT)
The Enterprise Routing and Switching track enables you to demonstrate competence with networking technology in general and Juniper Networks enterprise routing and switching platforms. JNCIP-ENT, the professional-level certification in this track, is designed for experienced networking professionals with advanced knowledge of the Juniper Networks Junos OS. The written exam verifies your understanding of advanced routing technologies and related platform configuration and troubleshooting skills.
This track includes four certifications:
JNCIA-Junos: Junos, Associate. For details, see JNCIA-Junos.
JNCIS-ENT: Enterprise Routing and Switching, Specialist. For details, see JNCIS-ENT.
JNCIP-ENT: Enterprise Routing and Switching, Professional. For details, see the sections below.
JNCIE-ENT: Enterprise Routing and Switching, Expert. For details, see JNCIE-ENT.
------------------------------------------------------------------------------------------------
#exam #code #JN0649 #enterprise #routing #switching #professional #JNCIPENT
#questions #answers #pdfdumps #dumps #examdumps #exampdfdumps #CertsWarrior
----------------------------------------------------------------------
About Certs Warrior:
---------------------------------
We always provide the latest certification exam questions, and answers with PDF dumps, practice tests, mock exams, and study guide materials to crack your final test with 100% success.
Certs Warrior is a group of experts who provide the most accurate and important IT exam preparation content. We are 100% beyond any doubt that you will pass your exam effectively with what we offer 100% full cashback guarantee. Our most senior advancement group works with utmost accuracy and efficiency to guarantee your completion in creating, planning and executing the questions and answers in our pdf about guides.
-----------------------------------------------------------------------------------------------------------------------
For More Videos Visit Our Website:
Certs Warrior: https://t.ly/AguN3
Please Don't Forget To Like, Comment, Share, And Subscribe To Our Official YouTube Channel #CertsWarrior:.
https://www.youtube.com/channel/UCin9hCQky99UQxOavz8n0TA
----------------------------------------------------------------------
This document provides an overview and agenda for a BIG-IP System and TMOS architecture course. The course covers topics such as initial setup of BIG-IP, load balancing techniques, profiles, persistence, network address translation, iApps, backups, high availability, logging, troubleshooting with tcpdump, and components of the TMOS operating system including iRules. The agenda includes 15 sections that progress from basic configuration to more advanced topics, providing attendees with knowledge to effectively manage and optimize the F5 BIG-IP system.
3. CONTENTS
Configuring Basic Performance Routing 1
Finding Feature Information 1
Information About Configuring Basic Performance Routing 2
Performance Routing Overview 2
Performance Routing Versus Optimized Edge Routing 2
Migration from Optimized Edge Routing to Performance Routing 3
Performance Routing Versus Classic Routing Technologies 3
Basic Performance Routing Deployment 3
PfR Border Router 4
PfR Master Controller 4
PfR Component Version 4
Key Chain Authentication for PfR 4
PfR-Managed Network Interfaces 5
PfR Network Performance Loop 6
Profile Phase 7
Measure Phase 7
Apply Policy Phase 8
Enforce Phase 8
Verify Phase 8
PfR and the Enterprise Network 9
Typical Topology on Which PfR is Deployed 9
How to Configure Basic Performance Routing 10
Setting Up the PfR Master Controller 10
Setting Up a PFR Border Router 15
What to Do Next 18
Configuration Examples for Configuring Basic Performance Routing 18
Example Configuring the PfR Master Controller 19
Example Configuring a PfR Border Router 19
Where to Go Next 19
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
iii
4. Contents
Additional References 20
Feature Information for Configuring Basic Performance Routing 20
Understanding Performance Routing 23
Finding Feature Information 23
Prerequisites for Understanding Performance Routing 23
Information About Understanding Performance Routing 24
Profile Phase Concepts 24
Traffic Class Profiling Overview 24
Automatic Traffic Class Learning 25
Prefix Traffic Class Learning Using PfR 25
Application Traffic Class Learning Using PfR 26
Learn List Configuration Mode 26
Manual Traffic Class Configuration 27
Prefix Traffic Class Configuration Using PfR 27
Application Traffic Class Configuration Using PfR 28
Measure Phase Concepts 28
Traffic Class Performance Measurement Overview 29
Traffic Class Performance Measurement Techniques 30
Passive Monitoring 31
Active Monitoring 32
Combined Monitoring 34
Fast Failover Monitoring 34
Special Monitoring 35
Link Utilization Measurement Techniques 35
Apply Policy Phase Concepts 36
Apply Policy Phase Overview 36
PfR Policy Decision Point 37
Traffic Class Performance Policies 38
PfR Link Policies 40
PfR Link Grouping 41
PfR Network Security Policies 42
PfR Policy Operational Options and Parameters 42
PfR Timers Parameters 42
PfR Mode Options 43
PfR Policy Application 44
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
iv
5. Contents
Priority Resolution for Multiple PfR Policies 44
Enforce Phase Concepts 45
PfR Enforce Phase Overview 45
PfR Traffic Class Control Techniques 46
PfR Exit Link Selection Control Techniques 47
PfR Entrance Link Selection Control Techniques 49
Verify Phase Concepts 49
Verify Phase Overview 49
Where To Go Next 50
Additional References 50
Feature Information for Understanding Performance Routing 51
Configuring Advanced Performance Routing 57
Finding Feature Information 57
Prerequisites for Configuring Advanced Performance Routing 57
Information About Advanced Performance Routing 58
Performance Routing Overview 58
Advanced Performance Routing Deployment 59
Profile Phase 59
Measure Phase 59
Apply Policy Phase 60
Enforce Phase 60
Verify Phase 60
PfR Active Probing Target Reachability 61
ICMP Echo Probes 61
Jitter 61
MOS 61
How to Configure Advanced Performance Routing 61
Profiling Phase Tasks 62
Defining a Learn List for Automatically Learned Application Traffic Classes Using an
Access List 62
Manually Selecting Prefix-Based Traffic Classes Using a Prefix List 66
Displaying and Resetting Traffic Class and Learn List Information 68
Measuring Phase Tasks 70
Modifying the PfR Link Utilization for Outbound Traffic 70
Modifying the PfR Exit Link Utilization Range 72
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
v
6. Contents
Configuring and Verifying PfR Passive Monitoring 73
Configuring PfR Active Probing Using the Longest Match Target Assignment 75
Configuring PfR Voice Probes with a Forced Target Assignment 77
Configuring PfR Voice Probes for Fast Failover 81
Configuring the Source Address of an Active Probe 86
Apply Policy Phase Tasks 88
Configuring and Applying a PfR Policy to Learned Traffic Classes 88
Preventing PfR Optimization of Learned Prefixes 92
Configuring Policy Rules for PfR Maps 94
Configuring Multiple PfR Policy Conflict Resolution 95
Configuring Black Hole Routing Using a PfR Map 97
Configuring Sinkhole Routing Using a PfR Map 98
Enforce Phase Tasks 100
Controlling Application Traffic 100
Verify Phase Task 103
Manually Verifying the PfR Route Enforce Changes 103
Configuration Examples for Advanced Performance Routing 105
Profile Phase Tasks Examples 105
Example Defining a Learn List for Automatically Learned Prefix-Based Traffic Classes 105
Example Defining a Learn List for Automatically Learned Application Traffic Classes
Using an Access List 106
Example Manually Selecting Prefix-Based Traffic Classes Using a Prefix List 106
Example Manually Selecting Application Traffic Classes Using an Access List 107
Measure Phase Tasks Examples 107
Example Modifying the PfR Link Utilization for Outbound Traffic 107
Example Modifying the PfR Exit Link Utilization Range 107
Example TCP Probe for Longest Match Target Assignment 107
UDP Probe for Forced Target Assignment Example 108
Example Configuring PfR Voice Probes for Fast Failover 108
Example Configuring the Source Address of an Active Probe 110
Apply Policy Phase Tasks Examples 110
Example Configuring and Applying a PfR Policy to Learned Traffic Classes 111
Example Configuring and Applying a PfR Policy to Configured Traffic Classes 111
Example Preventing PfR Optimization of Learned Prefixes 111
Example Configuring Policy Rules for PfR Maps 112
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
vi
7. Contents
Example Configuring Multiple PfR Policy Conflict Resolution 112
Example Configuring an Exit Link Load Balancing PfR Policy 112
Example Configuring Black Hole Routing Using a PfR Map 113
Example Configuring Sinkhole Routing Using a PfR Map 113
Enforce Phase Tasks Examples 113
Example Setting a Tag Value for Injected PfR Static Routes 113
Example Setting a BGP Local Preference Value for PfR Controlled BGP Routes 113
Example Controlling Application Traffic 114
Verify Phase Task Example 114
Example Manually Verifying the PfR Route Control Changes 114
Where to Go Next 115
Additional References 115
Feature Information for Configuring Advanced Performance Routing 116
BGP Inbound Optimization Using Performance Routing 121
Finding Feature Information 121
Information About BGP Inbound Optimization Using Performance Routing 121
BGP Inbound Optimization 122
Prefix Traffic Class Learning Using PfR 122
PfR Link Utilization Measurement 122
PfR Link Policies 123
PfR Entrance Link Selection Control Techniques 124
PfR Map Operation for Inside Prefixes 125
How to Configure BGP Inbound Optimization Using Performance Routing 125
Configuring PfR to Automatically Learn Traffic Classes Using Inside Prefixes 126
Manually Selecting Inside Prefixes for PfR Monitoring 128
Modifying the PfR Link Utilization for Inbound Traffic 129
Modifying the PfR Entrance Link Utilization Range 131
Configuring and Applying a PfR Policy to Learned Inside Prefixes 132
Configuring and Applying a PfR Policy to Configured Inside Prefixes 135
Configuration Examples for BGP Inbound Optimization Using Performance Routing 137
Example Configuring PfR to Automatically Learn Traffic Classes Using Inside Prefixes 138
Example Manually Selecting Inside Prefixes for PfR Monitoring 138
Example Modifying the PfR Link Utilization for Inbound Traffic 138
Example Modifying the PfR Entrance Link Utilization Range 138
Example Configuring and Applying a PfR Policy to Learned Inside Prefixes 138
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
vii
8. Contents
Example Configuring and Applying a PfR Policy to Configured Inside Prefixes 139
Additional References 139
Feature Information for BGP Inbound Optimization Using Performance Routing 140
Configuring Performance Routing Cost Policies 143
Finding Feature Information 143
Prerequisites for Performance Routing Cost Policies 143
Information About Performance Routing Cost Policies 143
Overview of PfR Link Policies 144
Traffic Load (Utilization) Policy 144
Range Policy 144
Cost Policy 145
Cost Policy Billing Models 145
Link Utilization Rollup Calculations 145
Monthly Sustained Utilization Calculation 146
How to Configure Performance Routing Cost Policies 148
Configuring a Basic PfR Cost-Based Policy 148
Using a PfR Cost Policy to Minimize Billing and Load Balance Traffic 153
Verifying and Debugging PfR Cost-Minimization Policies 161
Configuration Examples for Performance Routing Cost Policies 163
Example Configuring a Basic PfR Cost-Based Policy 163
Example Using a PfR Cost Policy to Minimize Billing and Load Balance Traffic 164
Where to Go Next 166
Additional References 166
Feature Information for Configuring Performance Routing Cost Policies 167
PfR Data Export v1.0 NetFlow v9 Format 169
Finding Feature Information 169
Information About PfR Data Export v1.0 NetFlow v9 Format 169
NetFlow Version 9 Data Export Format 169
Benefits of the PfR Data Export v1.0 NetFlow v9 Format Feature 170
How to Enable the PfR Data Export v1.0 NetFlow v9 Format Feature 170
Enabling the PfR Data Export v1.0 NetFlow v9 Format Feature 170
Verifying the PfR Data Export v1.0 NetFlow v9 Format Configuration 172
Configuration Examples for the PfR Data Export v1.0 NetFlow v9 Format Feature 173
Example Enabling the PfR Data Export v1.0 NetFlow v9 Format Feature 173
Additional References 174
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
viii
9. Contents
Feature Information for PfR Data Export v1.0 NetFlow v9 Format 175
Using Performance Routing to Control EIGRP Routes with mGRE DMVPN Hub-and-Spoke
Support 177
Finding Feature Information 177
Prerequisites for Using PfR to Control EIGRP Routes 177
Restrictions for Using PfR to Control EIGRP Routes 178
Information About Using PfR to Control EIGRP Routes 178
PfR EIGRP Route Control 178
PfR and mGRE Dynamic Multipoint VPN 179
How to Configure PfR to Control EIGRP Routes 181
Enabling PfR EIGRP Route Control and Setting a Community Value 181
Disabling PfR EIGRP Route Control 182
Manually Verifying the PfR EIGRP-Controlled Routes 183
Troubleshooting Tips 185
Configuration Examples for Using PfR to Control EIGRP Routes 185
Example Enabling PfR EIGRP Route Control and Setting a Community Value 186
Where to Go Next 186
Additional References 186
Feature Information for Using PfR to Control EIGRP Routes 187
Performance Routing Link Groups 189
Finding Feature Information 189
Information About Performance Routing Link Groups 189
Performance Routing Link Grouping 189
How to Configure Performance Routing Link Groups 191
Implementing Performance Routing Link Groups 191
Configuration Examples for Performance Routing Link Groups 196
Example Implementing Performance Routing Link Groups 196
Where to Go Next 196
Additional References 196
Feature Information for Performance Routing Link Groups 197
Performance Routing with NAT 199
Finding Feature Information 199
Restrictions for Performance Routing with NAT 199
Information About Performance Routing with NAT 200
PfR and NAT 200
Network Address Translation (NAT) 201
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
ix
10. Contents
Inside Global Addresses Overloading 201
How to Configure Performance Routing with NAT 201
Configuring PfR to Control Traffic with Static Routing in Networks Using NAT 201
Configuration Examples for Performance Routing with NAT 205
Example Configuring PfR to Control Traffic with Static Routing in Networks Using NAT 205
Where to Go Next 206
Additional References 206
Feature Information for Performance Routing with NAT 207
Performance Routing with NBAR CCE Application Recognition 209
Finding Feature Information 209
Prerequisites for PfR with NBAR CCE Application Recognition 209
Information About PfR with NBAR CCE Application Recognition 210
Performance Routing Traffic Class Profiling 210
PfR Application Mapping Using NBAR 211
How to Configure PfR with NBAR CCE Application Recognition 214
Defining a Learn List to Automatically Learn Traffic Classes Using NBAR Application
Mapping 214
Manually Selecting Traffic Classes Using NBAR Application Mapping 218
Displaying and Resetting Information About Traffic Classes Identified Using NBAR 220
Configuration Examples for PfR with NBAR CCE Application Recognition 223
Example Defining a Learn List to Automatically Learn Traffic Classes Using NBAR
Application Mapping 224
Example Manually Selecting Traffic Classes Using NBAR Application Mapping 224
Where To Go Next 225
Additional References 225
Feature Information for PfR with NBAR CCE Application Recognition 226
Performance Routing - Protocol Independent Route Optimization (PIRO) 229
Finding Feature Information 229
Information About Performance Routing PIRO 229
Protocol Independent Route Optimization (PIRO) 229
How to Configure Performance Routing PIRO 230
Verifying and Debugging Protocol Independent Route Optimization Route Control Changes 230
Where to Go Next 233
Additional References 233
Feature Information for Performance Routing PIRO 234
PfR RSVP Control 237
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
x
11. Contents
Finding Feature Information 237
Information About PfR RSVP Control 237
PfR and RSVP Control 237
Equivalent-Path Round-Robin Resolver 239
RSVP Post Dial Delay Timer for Best Path Selection 239
RSVP Signaling Retries for Alternative Reservation Path 239
Performance Statistics from PfR Commands 240
How to Configure PfR RSVP Control 240
Configuring PfR RSVP Control Using a Learn List 240
Displaying PfR RSVP Control Information 244
Displaying PfR Performance and Statistics Information 248
Configuration Examples for PfR RSVP Control 253
Example Defining Traffic Classes Using RSVP Flows 253
Additional References 253
Feature Information for PfR RSVP Control 254
PfR Simplification Phase 1 257
Finding Feature Information 257
Information About PfR Simplification Phase 1 257
Dynamic Tunnels Between PfR Border Routers 258
CLI and Default Value Changes to Simplify PfR 258
Load Balancing With Link Groups and Resolver Changes 259
Automatic Enable of Throughput Learning 261
Automatic PBR Route Control When No Parent Route Exists 261
Dynamic PBR Support for PfR 261
How to Configure PfR Simplification Phase 1 261
Displaying PfR Border Routers Dynamic Tunnel Information 262
Enabling PfR Route Observe Mode 265
Disabling Automatic PBR Route Control 266
Configuration Examples for PfR Simplification Phase 1 267
Example: Verifying PfR Simplification Default Changes 267
Additional References 268
Feature Information for PfR Simplification Phase 1 269
PfR SNMP MIB v1.0 (Read Only) 273
Finding Feature Information 273
Information About PfR SNMP MIB v1.0 (Read Only) 273
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
xi
12. Contents
PfR MIB Support 273
PfR MIB Tables 274
Additional References 276
Feature Information for PfR SNMP MIB v1.0 (Read Only) 277
Static Application Mapping Using Performance Routing 279
Finding Feature Information 279
Prerequisites for Static Application Mapping Using Performance Routing 279
Information About Static Application Mapping Using Performance Routing 280
Performance Routing Traffic Class Profiling 280
Static Application Mapping Using PfR 281
Learn List Configuration Mode 283
How to Configure Static Application Mapping Using Performance Routing 284
Defining a Learn List to Automatically Learn Traffic Classes Using Static Application
Mapping 284
Manually Selecting Traffic Classes Using Static Application Mapping 289
Displaying and Resetting Traffic Class and Learn List Information 290
Configuration Examples for Static Application Mapping Using Performance Routing 292
Example Defining a Learn List to Automatically Learn Traffic Classes Using Static
Application Mapping 292
Example Defining a Learn List for Automatically Learned Prefix-Based Traffic Classes 293
Example Defining a Learn List for Automatically Learned Application Traffic Classes
Using an Access List 293
Example Manually Selecting Traffic Classes Using Static Application Mapping 294
Example Manually Selecting Prefix-Based Traffic Classes Using a Prefix List 294
Example Manually Selecting Application Traffic Classes Using an Access List 294
Where To Go Next 295
Additional References 295
Feature Information for Static Application Mapping Using Performance Routing 295
Performance Routing Traceroute Reporting 299
Finding Feature Information 299
Information About Performance Routing Traceroute Reporting 299
PfR Logging and Reporting 299
PfR Troubleshooting Using Traceroute Reporting 300
How to Configure Performance Routing Traceroute Reporting 300
Configuring PfR Traceroute Reporting 301
Configuration Examples for Performance Routing Traceroute Reporting 303
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
xii
13. Contents
Example Configuring PfR Traceroute Reporting 303
Where to Go Next 304
Additional References 304
Feature Information for Performance Routing Traceroute Reporting 305
PfR Target Discovery v1.0 307
Finding Feature Information 307
Information About PfR Target Discovery 307
PfR Target Discovery 308
Target Discovery Data Distribution 309
Master Controller Peering Using SAF 309
Master Controller Peering Configuration Options 311
How to Configure PfR Target Discovery 311
Configuring PfR Target Discovery and MC Peering for a Hub Site in Multihop Networks 311
Configuring PfR Target Discovery and MC Peering for a Branch Office in Multihop Networks
313
Enabling Static Definition of Targets and IP Prefix Ranges Using PfR Target Discovery 314
Displaying PfR Target Discovery Information 316
Configuration Examples for PfR Target Discovery 318
Example: Configuring PfR Target Discovery in Multihop Networks in Dynamic Mode 318
Example: Configuring PfR Target Discovery in SAF-Everywhere Networks Using Dynamic
Mode 320
Example: Configuring PfR Target Discovery Using Static Definition of Targets and IP Prefix
Ranges 322
Additional References 325
Feature Information for PfR Target Discovery 326
PfR Voice Traffic Optimization Using Active Probes 327
Finding Feature Information 327
Prerequisites for PfR Voice Traffic Optimization Using Active Probes 327
Information About PfR Voice Traffic Optimization Using Active Probes 328
Voice Quality on IP Networks 328
Probes Used by PfR 329
PfR Voice Traffic Optimization Using Active Probes 329
PfR Voice Performance Metrics 330
PfR Active Probe Forced Target Assignment 330
How to Configure PfR Voice Traffic Optimization Using Active Probes 331
Identifying Traffic for PfR Using a Prefix List 331
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
xiii
14. Contents
Identifying Voice Traffic to Optimize Using an Access List 332
Identifying Voice Traffic to Optimize Using an Access List 333
Configuring PfR Voice Probes with a Target Assignment 334
Configuration Examples for PfR Voice Traffic Optimization Using Active Probes 340
Example Optimizing Only Voice Traffic Using Active Probes 341
Example Optimizing Traffic (Including Voice Traffic) Using Active Probes 342
Where to Go Next 343
Additional References 343
Feature Information for PfR Voice Traffic Optimization Using Active Probes 344
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
xiv
15. Configuring Basic Performance Routing
Performance Routing (PfR) provides additional intelligence to classic routing technologies to track the
performance of, or verify the quality of, a path between two devices over a Wide Area Networking
(WAN) infrastructure to determine the best egress or ingress path for application traffic.
Cisco Performance Routing complements classic IP routing technologies by adding intelligence to select
best paths to meet application performance requirements. The first phase of Performance Routing
technology intelligently optimizes application performance over enterprise WANs and to and from the
Internet. This technology will evolve to help enable application performance optimization throughout the
enterprise network through an end-to-end, performance-aware network.
This document contains an introduction to the basic concepts and tasks required to implement
Performance Routing. For more detailed concepts, see the Understanding Performance Routing module,
and for more advanced concepts and configuration tasks and examples, see the Configuring Advanced
Performance Routing module.
Note The PfR configuration modules refer to the PfR syntax introduced in Cisco IOS Release 15.1(2)T. If you
are running Cisco IOS Release 15.1(1)T, or an earlier release, or any 12.2SR or 12.2SX image, you need
to consult the Cisco IOS Optimized Edge Routing Overview module to help you locate all the Optimized
Edge Routing documentation.
• Finding Feature Information, page 1
• Information About Configuring Basic Performance Routing, page 2
• How to Configure Basic Performance Routing, page 10
• Configuration Examples for Configuring Basic Performance Routing, page 18
• Where to Go Next, page 19
• Additional References, page 20
• Feature Information for Configuring Basic Performance Routing, page 20
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature
information and caveats, see the release notes for your platform and software release. To find information
about the features documented in this module, and to see a list of the releases in which each feature is
supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
1
16. Performance Routing Overview
Information About Configuring Basic Performance Routing
Information About Configuring Basic Performance Routing
• Performance Routing Overview, page 2
• Performance Routing Versus Optimized Edge Routing, page 2
• Migration from Optimized Edge Routing to Performance Routing, page 3
• Performance Routing Versus Classic Routing Technologies, page 3
• Basic Performance Routing Deployment, page 3
• PfR Border Router, page 4
• PfR Master Controller, page 4
• PfR Component Version, page 4
• Key Chain Authentication for PfR, page 4
• PfR-Managed Network Interfaces, page 5
• PfR Network Performance Loop, page 6
• PfR and the Enterprise Network, page 9
Performance Routing Overview
Performance Routing (PfR) is an advanced Cisco technology to allow businesses to complement classic
routing technologies with additional serviceability parameters to select the best egress or ingress path. It
complements these classic routing technologies with additional intelligence. PfR can select an egress or
ingress WAN interface based upon parameters like reachability, delay, cost, jitter, MOS score, or it can use
interface parameters like load, throughput and monetary cost. Classic routing (for example, EIGRP, OSPF,
RIPv2, and BGP) generally focuses upon creating a loop-free topology based upon the shortest or least cost
path.
PfR gains additional intelligence using measurement instrumentation. It uses interface statistics, Cisco IP
SLA for active monitoring, and NetFlow for passive monitoring. No prior knowledge or experience of IP
SLA or NetFlow is required, PfR automatically enables these technologies without any manual
configuration.
Cisco Performance Routing selects an egress or ingress WAN path based on parameters that affect
application performance, including reachability, delay, cost, jitter, and Mean Opinion Score (MOS). This
technology can reduce network costs by facilitating more efficient load balancing and by increasing
application performance without WAN upgrades.
PfR is an integrated Cisco IOS solution that allows you to monitor IP traffic flows and then define policies
and rules based on traffic class performance, link load distribution, link bandwidth monetary cost, and
traffic type. PfR provides active and passive monitoring systems, dynamic failure detection, and automatic
path correction. Deploying PfR enables intelligent load distribution and optimal route selection in an
enterprise network.
Performance Routing Versus Optimized Edge Routing
Cisco Performance Routing takes advantage of the vast intelligence embedded in Cisco IOS Software to
determine the optimal path based upon network and application policies. Cisco Performance Routing is an
evolution of the Cisco IOS Optimized Edge Routing (OER) technology with a much broader scope. OER
was originally designed to provide route control on a per destination prefix basis, but Performance Routing
has expanded capabilities that facilitate intelligent route control on a per application basis. The expanded
capabilities provide additional flexibility and more granular application optimization than OER.
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
2
17. Migration from Optimized Edge Routing to Performance Routing
Information About Configuring Basic Performance Routing
Migration from Optimized Edge Routing to Performance Routing
If you are migrating to Performance Routing from an implementation of Optimized Edge Routing in an
earlier Cisco IOS Release image, you must be aware of the following information to ensure a smooth
migration path. In Cisco IOS Release 15.1(2)T, the OER syntax is still recognized. When you enter OER
syntax the software changes the syntax to the new PfR syntax in the running configuration. When the
running configuration is saved, the PfR version of the syntax is saved. If you need to reload an older Cisco
IOS image, we recommend that you save backup copies of all configuration scripts with the OER syntax
version because the new PfR syntax will not run in an older Cisco IOS software image.
With CSCtr26978, the OER syntax is removed and old configuration scripts with the OER syntax will no
longer run.
Performance Routing Versus Classic Routing Technologies
PfR was developed to identify and control network performance issues that traditional IP routing cannot
address. In traditional IP routing, each peer device communicates its view of reachability to a prefix
destination with some concept of a cost related to reaching the metric. The best path route to a prefix
destination is usually determined using the least cost metric, and this route is entered into the routing
information base (RIB) for the device. As a result, any route introduced into the RIB is treated as the best
path to control traffic destined for the prefix destination. The cost metric is configured to reflect a statically
engineered view of the network, for example, the cost metric is a reflection of either a user preference for a
path or a preference for a higher bandwidth interface (inferred from the type of interface). The cost metric
does not reflect the state of the network or the state of the performance of traffic traveling on that network
at that time. Traditional IP routed networks are therefore adaptive to physical state changes in the network
(for example, interfaces going down) but not to performance changes (degradation or improvement) in the
network. Occasionally, degradation in traffic can be inferred from either the degradation in performance of
the routing device or the loss of session connectivity, but these traffic degradation symptoms are not a
direct measure of the performance of the traffic and cannot be used to influence decisions about best-path
routing.
To address performance issues for traffic within a network, PfR manages traffic classes. Traffic classes are
defined as subsets of the traffic on the network, and a subset may represent the traffic associated with an
application, for example. The performance of each traffic class is measured and compared against
configured or default metrics defined in an PfR policy. PfR monitors the traffic class performance and
selects the best entrance or exit for the traffic class. If the subsequent traffic class performance does not
conform to the policy, PfR selects another entrance or exit for the traffic class.
Basic Performance Routing Deployment
PfR is configured on Cisco routers using Cisco IOS command-line interface (CLI) configurations.
Performance Routing comprises two components: the Master Controller (MC) and the Border Router (BR).
A PfR deployment requires one MC and one or more BRs. Communication between the MC and the BR is
protected by key-chain authentication. Depending on your Performance Routing deployment scenario and
scaling requirements, the MC may be deployed on a dedicated router or may be deployed along with the
BR on the same physical router.
A PfR-managed network must have at least two egress interfaces that can carry outbound traffic and can be
configured as external interfaces, see the figure below. These interfaces should connect to an ISP or WAN
link (Frame-Relay, ATM) at the network edge. The router must also have one interface (reachable by the
internal network) that can be configured as an internal interface for passive monitoring. There are three
interface configurations required to deploy PfR: external interfaces, internal interfaces, and local interfaces.
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
3
18. PfR Border Router
Information About Configuring Basic Performance Routing
PfR Border Router
The BR component resides within the data plane of the edge router with one or more exit links to an ISP or
other participating network.The BR uses NetFlow to passively gather throughput and TCP performance
information. The BR also sources all IP service-level agreement (SLA) probes used for explicit application
performance monitoring. The BR is where all policy decisions and changes to routing in the network are
enforced. The BR participates in prefix monitoring and route optimization by reporting prefix and exit link
measurements to the master controller and then by enforcing policy changes received from the master
controller. The BR enforces policy changes by injecting a preferred route to alter routing in the network. A
BR process can be enabled on the same router as a master controller process.
PfR Master Controller
The MC is a single router that acts as the central processor and database for the Performance Routing
system. The MC component does not reside in the forwarding plane and, when deployed in a standalone
fashion, has no view of routing information contained within the BR. The master controller maintains
communication and authenticates the sessions with the BRs. The role of the MC is to gather information
from the BR or BRs to determine whether or not traffic classes are in or out of policy, and to instruct the
BRs how to ensure that traffic classes remain in policy using route injection or dynamic PBR injection.
PfR Component Version
When new PfR functionality is introduced that changes the API between the MC and the BR, the version
number for the Performance Routing components, master controller and border router, is incremented. The
version number of the master controller must be equal or higher to the version number for the border
routers.The version numbers for both the master controller and the border routers are displayed using the
show pfr master command. In the following partial output, the MC version is shown in the first paragraph
and the BR versions are shown in the last column of the information for the border routers.
Router# show pfr master
OER state: ENABLED and ACTIVE
Conn Status: SUCCESS, PORT: 7777
Version: 2.0
Number of Border routers: 2
Number of Exits: 2
.
.
.
Border Status UP/DOWN AuthFail Version
1.1.1.2 ACTIVE UP 00:18:57 0 2.0
1.1.1.1 ACTIVE UP 00:18:58 0 2.0
.
.
.
The version numbers are not updated at each Cisco IOS software release for a specific release train, but if
the Cisco IOS software image is the same release on the devices configured as a master controller and all
the border routers, then the versions will be compatible.
Key Chain Authentication for PfR
Communication between the master controller and the border router is protected by key-chain
authentication. The authentication key must be configured on both the master controller and the border
router before communication can be established. The key-chain configuration is defined in global
configuration mode on both the master controller and the border router before key-chain authentication is
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
4
19. PfR-Managed Network Interfaces
Information About Configuring Basic Performance Routing
enabled for master controller-to-border router communication. For more information about key
management, see the "Managing Authentication Keys" section of the Configuring IP Routing Protocol-
Independent Features chapter in the Cisco IOS IP Routing: Protocol Independent Configuration Guide.
PfR-Managed Network Interfaces
A PfR-managed network must have at least two egress interfaces that can carry outbound traffic and that
can be configured as external interfaces. These interfaces should connect to an ISP or WAN link (Frame-
Relay, ATM) at the network edge. The router must also have one interface (reachable by the internal
network) that can be configured as an internal interface for passive monitoring. There are three interface
configurations required to deploy PfR:
• External interfaces are configured as PfR-managed exit links to forward traffic. The physical external
interface is enabled on the border router. The external interface is configured as a PfR external
interface on the master controller. The master controller actively monitors prefix and exit link
performance on these interfaces. Each border router must have at least one external interface, and a
minimum of two external interfaces are required in an PfR-managed network.
• Internal interfaces are used only for passive performance monitoring with NetFlow. No explicit
NetFlow configuration is required. The internal interface is an active border router interface that
connects to the internal network. The internal interface is configured as an PfR-internal interface on
the master controller. At least one internal interface must be configured on each border router.
• Local interfaces are used only for master controller and border router communication. A single
interface must be configured as a local interface on each border router. The local interface is identified
as the source interface for communication with the master controller.
Tip If a master controller and border router process are enabled on the same router, a loopback interface should
be configured as the local interface.
The following interface types can be configured as external and internal interfaces:
• ATM
• Basic Rate Interface (BRI)
• CTunnel
• Dialer
• Ethernet
• Fast Ethernet
• Gigabit Ethernet
• High-Speed Serial Interface (HSSI)
• Loopback (supported in Cisco IOS 15.0(1)M and later releases)
• Multilink
• Multilink Frame Relay (MFR)
• Null
• Packet-over-SONET (POS)
• Port Channel
• Serial
• Tunnel
• VLAN
The following interface types can be configured as local interfaces:
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
5
20. PfR Network Performance Loop
Information About Configuring Basic Performance Routing
• Async
• Bridge Group Virtual Interface (BVI)
• Code division multiple access Internet exchange (CDMA-Ix)
• CTunnel
• Dialer
• Ethernet
• Group-Async
• Loopback
• Multilink
• Multilink Frame Relay (MFR)
• Null
• Serial
• Tunnel
• Virtual host interface (Vif)
• Virtual-PPP
• Virtual-Template
• Virtual-TokenRing
Note A virtual-TokenRing interface can be configured as a local interface. However, Token Ring interfaces are
not supported and cannot be configured as external, internal, or local interfaces.
Note PfR does not support Ethernet interfaces that are Layer 2 only, for example, Ethernet switched interfaces.
Performance Routing DMVPN mGre Support
• PfR does not support split tunneling.
• PfR supports hub-to-spoke links only. Spoke-to-spoke links are not supported.
• PfR is supported on DMVPN Multipoint GRE (mGRE) deployments. Any multipoint interface
deployment that has multiple next hops for the same destination IP address is not supported (for
example, Ethernet).
PfR Network Performance Loop
Every traditional routing protocol creates a feedback loop among devices to create a routing topology.
Performance Routing infrastructure includes a performance routing protocol that is communicated in a
client-server messaging mode. The routing protocol employed by PfR runs between a network controller
called a master controller and performance-aware devices called border routers. This performance routing
protocol creates a network performance loop in which the network profiles which traffic classes have to be
optimized, measures and monitors the performance metrics of the identified traffic classes, applies policies
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
6
21. Configuring Basic Performance Routing
Profile Phase
to the traffic classes, and routes the identified traffic classes based on the best performance path. The
diagram below shows the five PfR phases: profile, measure, apply policy, enforce, and verify.
Figure 1 PfR Network Performance Loop
To understand how PfR operates in a network, you should understand and implement the five PfR phases.
The PfR performance loop starts with the profile phase followed by the measure, apply policy, control, and
verify phases. The flow continues after the verify phase back to the profile phase to update the traffic
classes and cycle through the process.
• Profile Phase, page 7
• Measure Phase, page 7
• Apply Policy Phase, page 8
• Enforce Phase, page 8
• Verify Phase, page 8
Profile Phase
In medium to large networks there are hundreds of thousands of routes in the RIB to which a device is
trying to route traffic. Because performance routing is a means of preferring some traffic over another, a
subset of the total routes in the RIB has to be selected to optimize for performance routing. PfR profiles
traffic in one of two ways, automatic learning or manual configuration.
• Automatic Learning—The device profiles the traffic that has to be performance routed (optimized) by
learning the flows that pass through the device and by selecting those flows that have the highest delay
or the highest throughput.
• Manual configuration—In addition to, or instead of learning, you can configure a class of traffic to
performance route.
Measure Phase
After profiling traffic classes that are to be performance routed, PfR measures the performance metrics of
these individual traffic classes. There are two mechanisms--passive monitoring and active monitoring--to
measure performance metrics, and one or both could be deployed in the network to accomplish this task.
Monitoring is the act of measuring at periodic intervals.
Passive monitoring is the act of measuring the performance metrics of the traffic flow as the flow is
traversing the device in the data path. Passive monitoring uses NetFlow functionality and cannot be
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
7
22. Configuring Basic Performance Routing
Apply Policy Phase
employed for measuring performance metrics for some traffic classes, and there are some hardware or
software limitations.
Active monitoring consists of generating synthetic traffic using IP Service Level Agreements (SLAs) to
emulate the traffic class that is being monitored. The synthetic traffic is measured instead of the actual
traffic class. The results of the synthetic traffic monitoring are applied to performance route the traffic class
represented by the synthetic traffic.
Both passive and active monitoring modes can be applied to the traffic classes. The passive monitoring
phase may detect traffic class performance that does not conform to an PfR policy, and then active
monitoring can be applied to that traffic class to find the best alternate performance path, if available.
Support for NetFlow or IP SLAs configuration is enabled automatically.
Apply Policy Phase
After collecting the performance metrics of the class of traffic to be optimized, PfR compares the results
with a set of configured low and high thresholds for each metric configured as a policy. When a metric, and
consequently a policy, goes out of bounds, it is an Out-of-Policy (OOP) event. The results are compared on
a relative basis--a deviation from the observed mean--or on a threshold basis--the lower or upper bounds of
a value--or a combination of both.
There are two types of policies that can be defined in PfR: traffic class policies and link policies. Traffic
class policies are defined for prefixes or for applications. Link policies are defined for exit or entrance links
at the network edge. Both types of PfR policies define the criteria for determining an OOP event. The
policies are applied on a global basis in which a set of policies is applied to all traffic classes, or on a more
targeted basis in which a set of policies is applied to a selected (filtered) list of traffic classes.
With multiple policies, many performance metric parameters, and different ways of assigning these policies
to traffic classes, a method of resolving policy conflicts was created. The default arbitration method uses a
default priority level given to each performance metric variable and each policy. Different priority levels
can be configured to override the default arbitration for all policies, or a selected set of policies.
Enforce Phase
In the PfR enforce phase (also called the control phase) of the performance loop, the traffic is controlled to
enhance the performance of the network. The technique used to control the traffic depends on the class of
traffic. For traffic classes that are defined using a prefix only, the prefix reachability information used in
traditional routing can be manipulated. Protocols such as Border Gateway Protocol (BGP) or RIP are used
to announce or remove the prefix reachability information by introducing or deleting a route and its
appropriate cost metrics.
For traffic classes that are defined by an application in which a prefix and additional packet matching
criteria are specified, PfR cannot employ traditional routing protocols because routing protocols
communicate the reachability of the prefix only and the control becomes device specific and not network
specific. This device specific control is implemented by PfR using policy-based routing (PBR)
functionality. If the traffic in this scenario has to be routed out to a different device, the remote border
router should be a single hop away or a tunnel interface that makes the remote border router look like a
single hop.
Verify Phase
During the PfR enforce phase if a traffic class is OOP, then PfR introduces controls to influence (optimize)
the flow of the traffic for the traffic class that is OOP. A static route and a BGP route are examples of
controls introduced by PfR into the network. After the controls are introduced, PfR will verify that the
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
8
23. PfR and the Enterprise Network
Typical Topology on Which PfR is Deployed
optimized traffic is flowing through the preferred exit or entrance links at the network edge. If the traffic
class remains OOP, PfR will drop the controls that were introduced to optimize the traffic for the OOP
traffic class and cycle through the network performance loop.
PfR and the Enterprise Network
Enterprise networks use multiple Internet Service Provider (ISP) or WAN connections at the network edge
for reliability and load distribution. Existing reliability mechanisms depend on link state or route removal
on the border router to select the best exit link for a prefix or set of prefixes. Multiple connections protect
enterprise networks from catastrophic failures but do not protect the network from brownouts, or soft
failures, that occur because of network congestion. Existing mechanisms can respond to catastrophic
failures at the first indication of a problem. However, blackouts and brownouts can go undetected and often
require the network operator to take action to resolve the problem. When a packet is transmitted between
external networks (nationally or globally), the packet spends the vast majority of its life cycle on the WAN
segments of the network. Optimizing WAN route selection in the enterprise network provides the end-user
with the greatest performance improvement, even better than LAN speed improvements in the local
network.
Although many of the examples used to describe PfR deployment show ISPs as the network with which the
edge devices communicate, there are other solutions. The network edge can be defined as any logical
separation in a network: can be another part of the network such as a data center network within the same
location, as well as WAN and ISP connections. The network, or part of the network, connected to the
original network edge devices must have a separate autonomous system number when communicating
using BGP.
PfR is implemented as an integrated part of Cisco core routing functionality. Deploying PfR enables
intelligent network traffic load distribution and dynamic failure detection for data paths at the network
edge. While other routing mechanisms can provide both load distribution and failure mitigation, only PfR
can make routing adjustments based on criteria other than static routing metrics, such as response time,
packet loss, path availability, and traffic load distribution. Deploying PfR allows you to optimize network
performance and link load utilization while minimizing bandwidth costs and reducing operational expenses.
• Typical Topology on Which PfR is Deployed, page 9
Typical Topology on Which PfR is Deployed
The figure below shows a typical PfR-managed enterprise network of a content provider. The enterprise
network has three exit interfaces that are used to deliver content to customer access networks. The content
provider has a separate service level agreement (SLA) with a different ISP for each exit link. The customer
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
9
24. Setting Up the PfR Master Controller
How to Configure Basic Performance Routing
access network has two edge routers that connect to the Internet. Traffic is carried between the enterprise
network and the customer access network over six service provider (SP) networks.
Figure 2 A Typical PfR Deployment
BR1
SLA A
Master
Master
Controller
Controller
SP A SP B CR1
BR2
Customer
eBGP
access
CR2
SLA B Client(s)
SP C SP D SP E
Server(s)
BR3 Content
iBGP and/or Consumer
EIGRP, IS-IS, SLA C
OSPF, RIP
SP F
117546
Enterprise/Content Transit
Provider Service Providers
PfR monitors and controls outbound traffic on the three border routers (BRs). PfR measures the packet
response time and path availability from the egress interfaces on BR1, BR2 and BR3. Changes to exit link
performance on the border routers are detected on a per-prefix basis. If the performance of a prefix falls
below default or user-defined policy parameters, routing is altered locally in the enterprise network to
optimize performance and to route around failure conditions that occur outside of the enterprise network.
For example, an interface failure or network misconfiguration in the SP D network can cause outbound
traffic that is carried over the BR2 exit interface to become congested or fail to reach the customer access
network. Traditional routing mechanisms cannot anticipate or resolve these types of problems without
intervention by the network operator. PfR can detect failure conditions and automatically alter routing
inside of the network to compensate.
How to Configure Basic Performance Routing
• Setting Up the PfR Master Controller, page 10
• Setting Up a PFR Border Router, page 15
Setting Up the PfR Master Controller
Perform this task to set up the PfR master controller to manage an PfR-managed network. This task must be
performed on the router designated as the PfR master controller. For an example network configuration of a
master router and two border routers, see the figure below. Communication is first established between the
master controller and the border routers with key-chain authentication being configured to protect the
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
10
25. Configuring Basic Performance Routing
How to Configure Basic Performance Routing
communication session between the master controller and the border routers. Internal and external border
router interfaces are also specified.
Figure 3 Master Controller and Border Router Diagram
ISP1/WAN1
BR2
MC
170913
ISP2/WAN2
BR1
To disable a master controller and completely remove the process configuration from the running
configuration, use theno pfr mastercommand in global configuration mode.
To temporarily disable a master controller, use the shutdown (PfR) command in PfR master controller
configuration mode. Entering the shutdown (PfR) command stops an active master controller process but
does not remove any configuration parameters. The shutdown (PfR) command is displayed in the running
configuration file when enabled.
Interfaces must be defined and reachable by the master controller and the border routers before a PfR-
managed network can be configured.
To set up a PfR-managed network, you must configure static routing or a routing protocol peering or
redistribution between border routers and peer routers in order for PfR to control routing. PfR must be able
to find a parent route for the best path using a static route, BGP, EIGRP or RIB (using Protocol
Independent Route Optimization (PIRO).
Tip We recommend that the master controller be physically close to the border routers to minimize
communication response time in PfR-managed networks. If traffic is to be routed between border routers,
the border routers also should be physically close each other to minimize the number of hops.
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
11
26. Configuring Basic Performance Routing
How to Configure Basic Performance Routing
SUMMARY STEPS
1. enable
2. configure terminal
3. key chain name-of-chain
4. key key-id
5. key-string text
6. exit
7. Repeat Step 6
8. Repeat Step 3 through Step 7 with appropriate changes to configure key chain authentication for each
border router.
9. pfr master
10. logging
11. border ip-address [key-chain key-chain-name]
12. interface type number external
13. exit
14. interface type number internal
15. exit
16. Repeat Step 11 through Step 15 with appropriate changes to establish communication with each border
router.
17. keepalive timer
18. end
19. show running-config
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
12
27. Configuring Basic Performance Routing
How to Configure Basic Performance Routing
Command or Action Purpose
Step 3 key chain name-of-chain Enables key-chain authentication and enters key-chain configuration mode.
• Key-chain authentication protects the communication session between the
master controller and the border router. The key ID and key string must
Example:
match in order for communication to be established.
Router(config)# key chain • In this example, a key chain is created for use with border router 1.
border1_PFR
Step 4 key key-id Identifies an authentication key on a key chain.
• The key ID must match the key ID configured on the border router.
Example:
Router(config-keychain)# key 1
Step 5 key-string text Specifies the authentication string for the key and enters key-chain key
configuration mode.
• The authentication string must match the authentication string configured
Example:
on the border router.
Router(config-keychain-key)# key- • Any encryption level can be configured.
string b1
• In this example, a key string is created for use with border router 1.
Step 6 exit Exits key-chain key configuration mode and returns to key-chain configuration
mode.
Example:
Router(config-keychain-key)# exit
Step 7 Repeat Step 6 Exits key-chain configuration mode and returns to global configuration mode.
Step 8 Repeat Step 3 through Step 7 with --
appropriate changes to configure key
chain authentication for each border
router.
Step 9 pfr master Enters PfR master controller configuration mode to configure a router as a
master controller.
• A master controller and border router process can be enabled on the same
Example:
router (for example, in a network that has a single router with two exit
Router(config)# pfr master links to different service providers).
Step 10 logging Enables syslog messages for a master controller or border router process.
• The notice level of syslog messages is enabled by default.
Example: Note With CStx06699, PfR syslog levels are added to minimize the number of
messages displayed, and a syslog notice is added to display when 30
Router(config-pfr-mc)# logging
percent of the traffic classes are out-of-policy.
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
13
28. Configuring Basic Performance Routing
How to Configure Basic Performance Routing
Command or Action Purpose
Step 11 border ip-address [key-chain key- Enters PfR-managed border router configuration mode to establish
chain-name] communication with a border router.
• An IP address is configured to identify the border router.
Example: • At least one border router must be specified to create an PfR-managed
network. A maximum of ten border routers can be controlled by a single
Router(config-pfr-mc)# border master controller.
10.1.1.2 key-chain border1_PFR
• The value for the key-chain-name argument must match the key-chain
name configured in Step 3.
Note The key-chain keyword and key-chain-name argument must be entered
when a border router is initially configured. However, this keyword is
optional when reconfiguring an existing border router.
Step 12 interface type number external Configures a border router interface as an PfR-managed external interface.
• External interfaces are used to forward traffic and for active monitoring.
Example: • A minimum of two external border router interfaces are required in an PfR-
managed network. At least one external interface must be configured on
Router(config-pfr-mc-br)# each border router. A maximum of 20 external interfaces can be controlled
interface Ethernet 1/0 external by single master controller.
Tip Configuring an interface as an PfR-managed external interface on a router
enters PfR border exit interface configuration mode. In this mode, you can
configure maximum link utilization or cost-based optimization for the
interface.
Note Entering the interface (PfR) command without the external orinternal
keyword places the router in global configuration mode and not PfR
border exit configuration mode. The no form of this command should be
applied carefully so that active interfaces are not removed from the router
configuration.
Step 13 exit Exits PfR-managed border exit interface configuration mode and returns to
PfR-managed border router configuration mode.
Example:
Router(config-pfr-mc-br-if)# exit
Step 14 interface type number internal Configures a border router interface as an PfR controlled internal interface.
• Internal interfaces are used for passive monitoring only. Internal interfaces
do not forward traffic.
Example:
• At least one internal interface must be configured on each border router.
Router(config-pfr-mc-br)#
interface Ethernet 0/0 internal
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
14
29. Setting Up a PFR Border Router
How to Configure Basic Performance Routing
Command or Action Purpose
Step 15 exit Exits PfR-managed border router configuration mode and returns to PfR master
controller configuration mode.
Example:
Router(config-pfr-mc-br)# exit
Step 16 Repeat Step 11 through Step 15 with --
appropriate changes to establish
communication with each border
router.
Step 17 keepalive timer (Optional) Configures the length of time that an PfR master controller will
maintain connectivity with an PfR border router after no keepalive packets have
been received.
Example:
• The example sets the keepalive timer to 10 seconds. The default keepalive
Router(config-pfr-mc)# keepalive timer is 60 seconds.
10
Step 18 end Exits PfR Top Talker and Top Delay learning configuration mode and returns
to privileged EXEC mode.
Example:
Router(config-pfr-mc-learn)# end
Step 19 show running-config (Optional) Displays the running configuration to verify the configuration
entered in this task.
Example:
Router# show running-config
Setting Up a PFR Border Router
Perform this task to set up a PfR border router. This task must be performed at each border router in your
PfR-managed network. Communication is first established between the border router and the master
controller with key-chain authentication being configured to protect the communication session between
the border router and the master controller. A local interface is configured as the source for communication
with the master controller, and external interfaces are configured as PfR-managed exit links.
Tip If a master controller and border router process is enabled on the same router, a loopback interface should
be configured as the local interface.
To disable a border router and completely remove the process configuration from the running
configuration, use the no pfr border command in global configuration mode.
To temporarily disable a border router process, use the shutdown (PfR) command in PfR border router
configuration mode. Entering the shutdown (PfR) command stops an active border router process but does
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
15
30. Configuring Basic Performance Routing
How to Configure Basic Performance Routing
not remove any configuration parameters. The shutdown (PfR) command is displayed in the running
configuration file when enabled.
Tip We recommend that the border routers be physically close to one another to minimize the number of hops.
The master controller also should be physically close to the border routers to minimize communication
response time in PfR-managed networks.
• Perform the Setting Up the PfR Master Controller task to set up the master controller and define the
interfaces and establish communication with the border routers.
• Each border router must have at least one external interface that is either used to connect to an ISP or
is used as an external WAN link. A minimum of two external interfaces are required in a PfR-managed
network.
• Each border router must have at least one internal interface. Internal interfaces are used for only
passive performance monitoring with NetFlow. Internal interfaces are not used to forward traffic.
• Each border router must have at least one local interface. Local interfaces are used only for master
controller and border router communication. A single interface must be configured as a local interface
on each border router.
Note
• Internet exchange points where a border router can communicate with several service providers over
the same broadcast media are not supported.
• When two or more border routers are deployed in a PfR-managed network, the next hop to an external
network on each border router, as installed in the RIB, cannot be an IP address from the same subnet.
SUMMARY STEPS
1. enable
2. configure terminal
3. key chain name-of-chain
4. key key-id
5. key-string text
6. exit
7. Repeat Step 6
8. pfr border
9. local type number
10. master ip-address key-chain key-chain-name
11. end
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
16
31. Configuring Basic Performance Routing
How to Configure Basic Performance Routing
DETAILED STEPS
Command or Action Purpose
Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Step 3 key chain name-of-chain Enables key-chain authentication and enters key-chain configuration mode.
• Key-chain authentication protects the communication session between
both the master controller and the border router. The key ID and key
Example:
string must match in order for communication to be established.
Router(config)# key chain
border1_PFR
Step 4 key key-id Identifies an authentication key on a key chain and enters key-chain key
configuration mode.
• The key ID must match the key ID configured on the master controller.
Example:
Router(config-keychain)# key 1
Step 5 key-string text Specifies the authentication string for the key.
• The authentication string must match the authentication string
configured on the master controller.
Example:
• Any level of encryption can be configured.
Router(config-keychain-key)# key-
string b1
Step 6 exit Exits key-chain key configuration mode and returns to key-chain
configuration mode.
Example:
Router(config-keychain-key)# exit
Step 7 Repeat Step 6 Exits key-chain configuration mode and returns to global configuration
mode.
Example:
Router(config-keychain)# exit
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
17
32. Configuring Basic Performance Routing
What to Do Next
Command or Action Purpose
Step 8 pfr border Enters PfR border router configuration mode to configure a router as a
border router.
• The border router must be in the forwarding path and contain at least
Example:
one external and internal interface.
Router(config)# pfr border
Step 9 local type number Identifies a local interface on a PfR border router as the source for
communication with an PfR master controller.
• A local interface must be defined.
Example:
Tip A loopback should be configured when a single router is configured to
Router(config-pfr-br)# local
Ethernet 0/0 run both a master controller and border router process.
Step 10 master ip-address key-chain key-chain- Enters PfR-managed border router configuration mode to establish
name communication with a master controller.
• An IP address is used to identify the master controller.
Example: • The value for the key-chain-name argument must match the key-chain
name configured in Step 3.
Router(config-pfr-br)# master
10.1.1.1 key-chain border1_PFR
Step 11 end Exits PfR Top Talker and Top Delay learning configuration mode and
returns to privileged EXEC mode.
Example:
Router(config-pfr-br)# end
• What to Do Next, page 18
What to Do Next
If your network is configured to use only static routing, no additional routing protocol peering or static
redistribution configuration is required. The PfR-managed network should be operational, as long as valid
static routes that point to external interfaces on the border routers are configured. You can proceed to the
“Where to Go Next” section for information about further PfR customization.
Configuration Examples for Configuring Basic Performance
Routing
Performance Routing Configuration Guide, Cisco IOS Release 15.2MT
18