CC

Hands-on

So how does one test for interoperability with different switches and their respective network operating systems that we encounter during brownfield deployments?
The answer involves building a physical and virtual testbed that maximizes test case coverage with minimal physical infrastructure.

PICOS is an enterprise NOS that unlocks the power of ASICs and therefore it needs to be tested on physical switches and for protocol interoperability I leverage GNS3.


The Physical Setup

The cluster is cabled up as per the quickstart instructions. VOIP phones are connected to leaf 3 and 4.
The 70xx number is the port on the terminal server followed by the IP last octect of the DHCP configured mgmt eth0 port address.

The circles are single interface hosts and the ovals are dual interface hosts. These hosts are distributed across 4 PCs with quad port interfaces. The PCs are running GNS3 and are Linux hosts that are connected to the physical interfaces on the PCs.

  • The top number is IP last octect+vnc-port. So the 4 PCs are 90, 91, 92 and 93 and the VNC ports for the hosts range from 1 to 5.
  • The middle number is the ethernet port number on the PC.
  • The bottom number is the port number on the switch.

The cloud connections are interface connections to the GNS3 servers with the IP last octect of 38 and 89. The G38 server topology is shown below.


The Virtual Setup

This single setup running on the G38 GNS3 server allows me to simply reconect a few virtual wires and create a different upstream deployment toplogy for the CC managed switch cluster to connect to and test reachability to different hosts.

  • AS1-2 are Arista spine switches in an MLAG
  • AL1-2 are Arista leaf switches - an Ostinato host is connected to these switches
  • AL3-4 are Arista leaf switches in an MLAG - U16 is an MLAG connected Ubuntu host
  • ATL1-2 are Arister third layer leaf switches in an MLAG - U16-sub is an MLAG connected Ubuntu host
  • CS1-4 are Cisco L2 switches
  • R2x1-2 are Cisco router
  • ToolboxXX are DHCP servers for VLAN 10,11,12 and 33. Toolbox10 also serves as the DHCP relay server for the additional VLANs
  • The setup also has TACACS+, Syslog, SNMP servers.

The G38 server is connected to an ESXi server that hosts additional VMs

  • Cisco Callmanager
  • Cisco ACS
  • packetFense
  • Zabbix
  • PRTG

An additional PC running a pfsense server acts as the internet gateway, DNS and NTP server.

VLAN 10,11, and 12 are the mgmt, data and voice VLANs and VLAN 33 holds the eth0 ports of the physical switches.


Configuration walk through

There are 6 CC deployment topologies documented in the CC deployment guide.

Two each of: - L2 to L2 - L2 to L3 - L3 to L3

Here we analyze one of them - L3 to L3 #2

Topology Description

External only VLANS

  • VLAN 30 - mgmt
  • VLAN 31 - data
  • VLAN 32 - voice

Cluster only VLANS with VRRP VIPs and DHCP relay to upstream DHCP server

  • VLANS 2101, 2102 - data
  • VLANS 2201, 2202 - voice

OSPF routing on spines

Upstream: connection to upstream network is over trunks connected to sub-interfaces on the routers. There are no L2 loops in the topology and the routers run their VRRP/HSRP sessions for VLAN 30, 31 and 32 over the LAG link between the spines.
The upstream routers learn of the 2101, 2102, 2201, 2202 networks via OSPF updates.

Cluster Wide Configuration

Initial setup - this can also be done using the GUI

CC-) setup init 1-6

rem !! install licenses
manage_license install peer
switch_reinit peer
manage_license install peer
switch_reinit self

manage_license install 1
rem !! manage_license install 2 ... 6

switch_reinit 1-6


CC-) setup net
Please wait few seconds ...
Please enter a blank space to erase configured values.
Please enter the Uplink Ports, e.g. te-1/1/48 ():te-1/1/48
Please enter the Mgmt Vlan ID():30
Please enter the IP Address1 for Mgmt Vlan, e.g. 192.168.1.12/24 ():172.16.130.101/24
Please enter the IP Address2 for Mgmt Vlan, e.g. 192.168.1.13/24 ():172.16.130.102/24
Please enter the VIP():172.16.130.100
Please enter the Gateway, e.g. 192.168.1.14 ():172.16.130.10
Please enter the NTP server, e.g. 192.168.1.16 ():172.16.10.69
Please enter the timezone, e.g. UTC ():PST8PDT

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 


CC-) setup mgmt
Please wait few seconds ...
Please enter a blank space to erase configured values.
Please enter the Cluster Name():LAB-0909
Please enter the Login Banner():Installed on Sept 09
Please enter the Tacacs Server, e.g. 192.168.1.15 (): 172.16.100.20
Please enter the Tacacs Secret-key(): testlab
Please enter the Syslog server, e.g. 192.168.1.17 ():172.16.100.7  
Please enter the Snmp server, e.g. 192.168.1.18 ():172.16.100.8
Please enter the Snmpwalk username, e.g. cc-user ():cc-test-user
Please enter the New Password():

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 

Enable the uplinks on the spines

rem !! CC LAB Specific
send self,peer configure
send self,peer set interface gigabit-ethernet te-1/1/48 speed 1000
rem send self,peer set interface gigabit-ethernet te-1/1/45 speed 1000
rem send self,peer set interface gigabit-ethernet te-1/1/46 speed 1000

send self,peer commit
send self,peer exit

Setup the VLANS

send "" configure
send "" set vlans vlan-id 2101 description "int-data-1"
send "" set vlans vlan-id 2102 description "int-data-2"
send "" set vlans vlan-id 2201 description "int-voice-1"
send "" set vlans vlan-id 2202 description "int-voice-2"
send "" set vlans voice-vlan
send "" set protocol lldp compliance cdp true
send "" set protocols spanning-tree force-version 4
send "" set protocols spanning-tree pvst vlan %2101-2102% enable true
send "" set protocols spanning-tree pvst vlan %2201-2202% enable true

send self,peer set protocols spanning-tree pvst vlan %30-32% enable true
send self,peer set protocols spanning-tree pvst vlan 4094 bridge-priority 8192
send self,peer set protocols spanning-tree pvst vlan %30-32% bridge-priority 4096
send self,peer set protocols spanning-tree pvst vlan %2101-2102% bridge-priority 4096
send self,peer set protocols spanning-tree pvst vlan %2201-2202% bridge-priority 4096

send self,peer set vlans vlan-id 31 description "ext-data"
send self,peer set vlans vlan-id 32 description "ext-voice"
send self,peer set protocols spanning-tree pvst vlan %31-32% enable true
send self,peer set interface gigabit-ethernet te-1/1/48 family ethernet-switching vlan members %31-32%
send self,peer set interface aggregate-ethernet ae48 family ethernet-switching vlan members %30-32%
send self,peer set interface aggregate-ethernet ae48 family ethernet-switching vlan members %2101-2102%
send self,peer set interface aggregate-ethernet ae48 family ethernet-switching vlan members %2201-2202%
send self,peer set interface aggregate-ethernet ae%1-6% family ethernet-switching vlan members 2101
send self,peer set interface aggregate-ethernet ae%1-6% family ethernet-switching vlan members 2102
send self,peer set interface aggregate-ethernet ae%1-6% family ethernet-switching vlan members 2201
send self,peer set interface aggregate-ethernet ae%1-6% family ethernet-switching vlan members 2202

send 1-6 set interface aggregate-ethernet ae1 family ethernet-switching vlan members %2101-2102%
send 1-6 set interface aggregate-ethernet ae1 family ethernet-switching vlan members %2201-2202%

send "" commit

Setup the L3 configuration for the VLANS on the spines

send self,peer set vlans vlan-id 31 l3-interface vlan31
send self,peer set vlans vlan-id 32 l3-interface vlan32
send self,peer set vlans vlan-id 2101 l3-interface vlan2101
send self,peer set vlans vlan-id 2102 l3-interface vlan2102
send self,peer set vlans vlan-id 2201 l3-interface vlan2201
send self,peer set vlans vlan-id 2202 l3-interface vlan2202

send self,peer set protocols ospf4 router-id 0.0.0.1
rem !! if you dont want the upstream network to reach inside the cluster declare the area as a stub
rem !! send self,peer set protocols ospf4 area 0.0.0.130 area-type stub

rem !! loopback 1.area#.chassis#.[1|2]
rem !! send self set vlan-interface loopback address 1.130.1.1 prefix-length 32
send self set vlan-interface interface vlan31 vif vlan31 address 172.16.131.101 prefix-length 24
send self set vlan-interface interface vlan32 vif vlan32 address 172.16.132.101 prefix-length 24
send self set vlan-interface interface vlan2101 vif vlan2101 address 172.16.211.101 prefix-length 24
send self set vlan-interface interface vlan2102 vif vlan2102 address 172.16.212.101 prefix-length 24
send self set vlan-interface interface vlan2201 vif vlan2201 address 172.16.221.101 prefix-length 24
send self set vlan-interface interface vlan2202 vif vlan2202 address 172.16.222.101 prefix-length 24
rem !! send self set protocols ospf4 area 0.0.0.130 interface loobpack vif loopback address 1.130.1.1
send self set protocols ospf4 area 0.0.0.130 interface vlan31 vif vlan31 address 172.16.131.101
send self set protocols ospf4 area 0.0.0.130 interface vlan32 vif vlan32 address 172.16.132.101
send self set protocols ospf4 area 0.0.0.130 interface vlan2101 vif vlan2101 address 172.16.211.101
send self set protocols ospf4 area 0.0.0.130 interface vlan2102 vif vlan2102 address 172.16.212.101
send self set protocols ospf4 area 0.0.0.130 interface vlan2201 vif vlan2201 address 172.16.221.101
send self set protocols ospf4 area 0.0.0.130 interface vlan2202 vif vlan2202 address 172.16.222.101

rem !! send peer set vlan-interface loopback address 1.130.1.2 prefix-length 32
send peer set vlan-interface interface vlan31 vif vlan31 address 172.16.131.102 prefix-length 24
send peer set vlan-interface interface vlan32 vif vlan32 address 172.16.132.102 prefix-length 24
send peer set vlan-interface interface vlan2101 vif vlan2101 address 172.16.211.102 prefix-length 24
send peer set vlan-interface interface vlan2102 vif vlan2102 address 172.16.212.102 prefix-length 24
send peer set vlan-interface interface vlan2201 vif vlan2201 address 172.16.221.102 prefix-length 24
send peer set vlan-interface interface vlan2202 vif vlan2202 address 172.16.222.102 prefix-length 24
rem !! send self set protocols ospf4 area 0.0.0.130 interface loobpack vif loopback address 1.130.1.2
send peer set protocols ospf4 area 0.0.0.130 interface vlan31 vif vlan31 address 172.16.131.102
send peer set protocols ospf4 area 0.0.0.130 interface vlan32 vif vlan32 address 172.16.132.102
send peer set protocols ospf4 area 0.0.0.130 interface vlan2101 vif vlan2101 address 172.16.211.102
send peer set protocols ospf4 area 0.0.0.130 interface vlan2102 vif vlan2102 address 172.16.212.102
send peer set protocols ospf4 area 0.0.0.130 interface vlan2201 vif vlan2201 address 172.16.221.102
send peer set protocols ospf4 area 0.0.0.130 interface vlan2202 vif vlan2202 address 172.16.222.102 

send self,peer set protocols vrrp interface vlan31 vif vlan31 vrid 31 ip 172.16.131.100
send self,peer set protocols vrrp interface vlan32 vif vlan32 vrid 32 ip 172.16.132.100
send self,peer set protocols vrrp interface vlan2101 vif vlan2101 vrid 211 ip 172.16.211.100
send self,peer set protocols vrrp interface vlan2102 vif vlan2102 vrid 212 ip 172.16.212.100
send self,peer set protocols vrrp interface vlan2201 vif vlan2201 vrid 221 ip 172.16.221.100
send self,peer set protocols vrrp interface vlan2202 vif vlan2202 vrid 222 ip 172.16.222.100

send self,peer set protocols dhcp relay vlan-interface vlan%2101-2102% disable false
send self,peer set protocols dhcp relay vlan-interface vlan%2101-2102% dhcp-server-address1 172.16.100.2
send self,peer set protocols dhcp relay vlan-interface vlan%2201-2202% disable false
send self,peer set protocols dhcp relay vlan-interface vlan%2201-2202% dhcp-server-address1 172.16.100.2
send self,peer set protocols dhcp snooping port te-1/1/48 trust true

send self,peer commit

Port Specific Configuration - customize

Setup the user ports on the spines

rem !! ports
send self,peer set interface gigabit-ethernet te-1/1/%33-34% description "User Port"
send self,peer set interface gigabit-ethernet te-1/1/33 family ethernet-switching native-vlan-id 2101
send self,peer set protocols spanning-tree pvst interface te-1/1/%33-34% bpdu-guard true
send self,peer set interface gigabit-ethernet te-1/1/%33-34% storm-control broadcast ratio 1

send self,peer commit

Setup the user ports on the leafs

send 1,6 set interface gigabit-ethernet ge-1/1/%1-4% description "User Port"
send 1,6 set interface gigabit-ethernet ge-1/1/%1-4% family ethernet-switching port-mode "trunk"
send 1,6 set interface gigabit-ethernet ge-1/1/1 family ethernet-switching native-vlan-id 2101
send 1,6 set interface gigabit-ethernet ge-1/1/2 family ethernet-switching native-vlan-id 2102
send 1,6 set interface gigabit-ethernet ge-1/1/3 family ethernet-switching native-vlan-id 2101
send 1,6 set interface gigabit-ethernet ge-1/1/4 family ethernet-switching native-vlan-id 2102
send 1,6 set interface gigabit-ethernet ge-1/1/1 voice-vlan vlan-id 2201
send 1,6 set interface gigabit-ethernet ge-1/1/2 voice-vlan vlan-id 2202
send 1,6 set interface gigabit-ethernet ge-1/1/3 voice-vlan vlan-id 2201
send 1,6 set interface gigabit-ethernet ge-1/1/4 voice-vlan vlan-id 2202
send 1,6 set protocols lldp interface ge-1/1/%1-4% compliance cdp true
send 1,6 set protocols spanning-tree pvst interface ge-1/1/%1-4% bpdu-guard true
send 1,6 set interface gigabit-ethernet ge-1/1/%1-4% storm-control broadcast ratio 1

send 1,6 commit
config_copy 1 2-5

Enable PoE on the leafs with PoE

send 3 set poe interface all enable true
send 3 set poe interface all threshold-mode 1
send 3 set poe interface all max-power 32
send 3 set poe power management-mode 3
send 3 set poe interface ge-1/1/%1-4% enable true
send 3 set poe interface ge-1/1/%1-4% detection-type 3

send 3 commit
config_copy 3 4

Setup the LAG port on the Leaf 3

rem !! LAG
send 3 delete interface gigabit-ethernet ge-1/1/%1-2% voice-vlan
send 3 set interface aggregate-ethernet ae11 description "User LAG"
send 3 set interface aggregate-ethernet ae11 aggregated-ether-options lacp enable true
send 3 set interface aggregate-ethernet ae11 family ethernet-switching port-mode "trunk"
send 3 set interface aggregate-ethernet ae11 family ethernet-switching native-vlan-id 2101
send 3 set protocols spanning-tree pvst interface ae11 bpdu-guard true
send 3 set interface aggregate-ethernet ae11 storm-control broadcast ratio 1
send 3 set interface gigabit-ethernet ge-1/1/%1-2% ether-options 802.3ad "ae11"

send 3 commit

Convert user port to MLAG port on the Spine

rem !! MLAG spine
send self,peer set interface aggregate-ethernet ae34 description "User MLAG"
send self,peer set interface aggregate-ethernet ae34 aggregated-ether-options mlag domain-id 34
send self,peer set interface aggregate-ethernet ae34 aggregated-ether-options mlag reload-delay 300
send self,peer set interface aggregate-ethernet ae34 aggregated-ether-options lacp enable true
send self,peer set interface aggregate-ethernet ae34 family ethernet-switching port-mode "trunk"
send self,peer set interface aggregate-ethernet ae34 family ethernet-switching native-vlan-id 2102
send self,peer set protocols spanning-tree pvst interface ae34 bpdu-guard true
send self,peer set interface aggregate-ethernet ae34 storm-control broadcast ratio 1
send self,peer set interface gigabit-ethernet te-1/1/34 ether-options 802.3ad "ae34"

rem !! CHECK peer IP values
send self set interface aggregate-ethernet ae34 aggregated-ether-options mlag peer 192.168.1.2 peer-link "ae48"
send peer set interface aggregate-ethernet ae34 aggregated-ether-options mlag peer 192.168.1.1 peer-link "ae48"
rem !! CHECK peer IP values

send self,peer commit

Setup MLAG and then add the MLAG ports on Leaf 1 & Leaf 2

rem !! MLAG leafs
rem !! mlag system-id: 88:Chassis#:Leaf1#:Leaf2#
send 1,2 set interface mlag system-id 00:00:88:01:01:02
send 1,2 delete interface gigabit-ethernet ge-1/1/%1-2% voice-vlan

send 1,2 set vlans vlan-id 4093 l3-interface "vlan4093"
send 1,2 set protocols spanning-tree pvst vlan 4093 enable true

send 1,2 set interface aggregate-ethernet ae48 aggregated-ether-options lacp enable true
send 1,2 set interface aggregate-ethernet ae48 family ethernet-switching native-vlan-id 4093
send 1,2 set interface aggregate-ethernet ae48 family ethernet-switching port-mode "trunk"

rem !! CHECK interface names for 2.11
send 1,2 set interface gigabit-ethernet te-1/1/%5-6% speed "10000"
send 1,2 set interface gigabit-ethernet te-1/1/%5-6% ether-options 802.3ad "ae48"
rem !! CHECK interface names for 2.11 53-54

send 1,2 set interface aggregate-ethernet ae%11-12% description "User MLAG"
send 1,2 set interface aggregate-ethernet ae%11-12% aggregated-ether-options mlag reload-delay 300
send 1,2 set interface aggregate-ethernet ae%11-12% aggregated-ether-options lacp enable true
send 1,2 set interface aggregate-ethernet ae%11-12% family ethernet-switching port-mode "trunk"
send 1,2 set interface aggregate-ethernet ae11 family ethernet-switching native-vlan-id 2101
send 1,2 set interface aggregate-ethernet ae12 family ethernet-switching native-vlan-id 2102
send 1,2 set protocols spanning-tree pvst interface ae%11-12% bpdu-guard true
send 1,2 set interface aggregate-ethernet ae%11-12% storm-control broadcast ratio 1

send 1,2 set interface aggregate-ethernet ae11 aggregated-ether-options mlag domain-id 1
send 1,2 set interface gigabit-ethernet ge-1/1/1 ether-options 802.3ad "ae11"

send 1,2 set interface aggregate-ethernet ae12 aggregated-ether-options mlag domain-id 2
send 1,2 set interface gigabit-ethernet ge-1/1/2 ether-options 802.3ad "ae12"

send 1 set vlan-interface interface vlan4093 vif vlan4093 address 192.168.10.101 prefix-length 24
send 1 set interface aggregate-ethernet ae%11-12% aggregated-ether-options mlag peer 192.168.10.102 peer-link "ae48"

send 2 set vlan-interface interface vlan4093 vif vlan4093 address 192.168.10.102 prefix-length 24
send 2 set interface aggregate-ethernet ae%11-12% aggregated-ether-options mlag peer 192.168.10.101 peer-link "ae48"

send 1,2 commit


These QoS configurations deploy a specific policy and should be included in the configuration above after customizations. Its recommended to add this after you are comfortable managing your cluster with CC

QoS: Queueing

send self,peer,1 set class-of-service forwarding-class voip local-priority 7
send self,peer,1 set class-of-service forwarding-class routing local-priority 6 
send self,peer,1 set class-of-service forwarding-class video local-priority 5 
send self,peer,1 set class-of-service forwarding-class control local-priority 4
send self,peer,1 set class-of-service forwarding-class mc local-priority 3  
send self,peer,1 set class-of-service forwarding-class bulkdata local-priority 1
send self,peer,1 set class-of-service forwarding-class default local-priority 0 

send self,peer,1 set class-of-service classifier c1 trust-mode dscp

send self,peer,1 set class-of-service classifier c1 forwarding-class voip code-point 46
send self,peer,1 set class-of-service classifier c1 forwarding-class routing code-point 48
send self,peer,1 set class-of-service classifier c1 forwarding-class routing code-point 56
send self,peer,1 set class-of-service classifier c1 forwarding-class video code-point 32
send self,peer,1 set class-of-service classifier c1 forwarding-class video code-point 34
send self,peer,1 set class-of-service classifier c1 forwarding-class control code-point 24
send self,peer,1 set class-of-service classifier c1 forwarding-class control code-point 26
send self,peer,1 set class-of-service classifier c1 forwarding-class bulkdata code-point 10
send self,peer,1 set class-of-service classifier c1 forwarding-class bulkdata code-point 14
send self,peer,1 set class-of-service classifier c1 forwarding-class bulkdata code-point 22
send self,peer,1 set class-of-service classifier c1 forwarding-class mc code-point 16 
send self,peer,1 set class-of-service classifier c1 forwarding-class mc code-point 28
send self,peer,1 set class-of-service classifier c1 forwarding-class mc code-point 30
send self,peer,1 set class-of-service classifier c1 forwarding-class mc code-point 36
send self,peer,1 set class-of-service classifier c1 forwarding-class default code-point 0

send 1 set class-of-service scheduler svoip1g guaranteed-rate 300000
send 1 set class-of-service scheduler srouting1g guaranteed-rate 49000
send 1 set class-of-service scheduler svideo1g guaranteed-rate 98000
send 1 set class-of-service scheduler scontrol1g guaranteed-rate 49000
send 1 set class-of-service scheduler sbulkdata1g guaranteed-rate 98000
send 1 set class-of-service scheduler smc1g guaranteed-rate 315000
send 1 set class-of-service scheduler sdefault1g guaranteed-rate 91000

send 1 set class-of-service scheduler srouting1g mode WFQ
send 1 set class-of-service scheduler svideo1g mode WFQ
send 1 set class-of-service scheduler scontrol1g mode WFQ
send 1 set class-of-service scheduler sbulkdata1g mode WFQ
send 1 set class-of-service scheduler smc1g mode WFQ
send 1 set class-of-service scheduler sdefault1g mode WFQ

send 1 set class-of-service scheduler-profile 1G forwarding-class voip scheduler svoip1g
send 1 set class-of-service scheduler-profile 1G forwarding-class routing scheduler srouting1g
send 1 set class-of-service scheduler-profile 1G forwarding-class video scheduler svideo1g
send 1 set class-of-service scheduler-profile 1G forwarding-class control scheduler scontrol1g
send 1 set class-of-service scheduler-profile 1G forwarding-class bulkdata scheduler sbulkdata1g
send 1 set class-of-service scheduler-profile 1G forwarding-class mc scheduler smc1g
send 1 set class-of-service scheduler-profile 1G forwarding-class default scheduler sdefault1g

send self,peer,1 set class-of-service scheduler svoip10g guaranteed-rate 3000000
send self,peer,1 set class-of-service scheduler srouting10g guaranteed-rate 490000
send self,peer,1 set class-of-service scheduler svideo10g guaranteed-rate 980000
send self,peer,1 set class-of-service scheduler scontrol10g guaranteed-rate 490000
send self,peer,1 set class-of-service scheduler sbulkdata10g guaranteed-rate 980000
send self,peer,1 set class-of-service scheduler smc10g guaranteed-rate 3150000
send self,peer,1 set class-of-service scheduler sdefault10g guaranteed-rate 910000

send self,peer,1 set class-of-service scheduler srouting10g mode WFQ
send self,peer,1 set class-of-service scheduler svideo10g mode WFQ
send self,peer,1 set class-of-service scheduler scontrol10g mode WFQ
send self,peer,1 set class-of-service scheduler sbulkdata10g mode WFQ
send self,peer,1 set class-of-service scheduler smc10g mode WFQ
send self,peer,1 set class-of-service scheduler sdefault10g mode WFQ

send self,peer,1 set class-of-service scheduler-profile 10G forwarding-class voip scheduler svoip10g
send self,peer,1 set class-of-service scheduler-profile 10G forwarding-class routing scheduler srouting10g
send self,peer,1 set class-of-service scheduler-profile 10G forwarding-class video scheduler svideo10g
send self,peer,1 set class-of-service scheduler-profile 10G forwarding-class control scheduler scontrol10g
send self,peer,1 set class-of-service scheduler-profile 10G forwarding-class bulkdata scheduler sbulkdata10g
send self,peer,1 set class-of-service scheduler-profile 10G forwarding-class mc scheduler smc10g
send self,peer,1 set class-of-service scheduler-profile 10G forwarding-class default scheduler sdefault10g

send self,peer set class-of-service scheduler svoip40g guaranteed-rate 12000000
send self,peer set class-of-service scheduler srouting40g guaranteed-rate 1960000
send self,peer set class-of-service scheduler svideo40g guaranteed-rate 3920000
send self,peer set class-of-service scheduler scontrol40g guaranteed-rate 1960000
send self,peer set class-of-service scheduler sbulkdata40g guaranteed-rate 3920000
send self,peer set class-of-service scheduler smc40g guaranteed-rate 12600000
send self,peer set class-of-service scheduler sdefault40g guaranteed-rate 3640000

send self,peer set class-of-service scheduler srouting40g mode WFQ
send self,peer set class-of-service scheduler svideo40g mode WFQ
send self,peer set class-of-service scheduler scontrol40g mode WFQ
send self,peer set class-of-service scheduler sbulkdata40g mode WFQ
send self,peer set class-of-service scheduler smc40g mode WFQ
send self,peer set class-of-service scheduler sdefault40g mode WFQ

send self,peer set class-of-service scheduler-profile 40G forwarding-class voip scheduler svoip40g
send self,peer set class-of-service scheduler-profile 40G forwarding-class routing scheduler srouting40g
send self,peer set class-of-service scheduler-profile 40G forwarding-class video scheduler svideo40g
send self,peer set class-of-service scheduler-profile 40G forwarding-class control scheduler scontrol40g
send self,peer set class-of-service scheduler-profile 40G forwarding-class bulkdata scheduler sbulkdata40g
send self,peer set class-of-service scheduler-profile 40G forwarding-class mc scheduler smc40g
send self,peer set class-of-service scheduler-profile 40G forwarding-class default scheduler sdefault40g

QoS: ACL Marking and Rate-limiting

send self,peer set firewall policer p1 if-exceeding count-mode kbit
send self,peer set firewall policer p1 if-exceeding rate-limit 3300000
send self,peer set firewall policer p1 then action discard
send self,peer set firewall policer p2 if-exceeding count-mode kbit
send self,peer set firewall policer p2 if-exceeding rate-limit 10000000
send self,peer set firewall policer p2 then action discard
send self,peer commit

send 1 set firewall policer p1 if-exceeding count-mode kbit
send 1 set firewall policer p1 if-exceeding rate-limit 330000
send 1 set firewall policer p1 then action discard
send 1 set firewall policer p2 if-exceeding count-mode kbit
send 1 set firewall policer p2 if-exceeding rate-limit 1000000
send 1 set firewall policer p2 then action discard
send 1 commit

rem !! send self,peer set firewall filter marking input interface te-1/1/%1-48%
rem !! send self,peer commit

send 1 set firewall filter marking input interface ge-1/1/%1-48%
send 1 commit

send self,peer,1 set class-of-service forwarding-class 0 local-priority 0
send self,peer,1 set class-of-service forwarding-class 1 local-priority 1
send self,peer,1 set class-of-service forwarding-class 2 local-priority 2
send self,peer,1 set class-of-service forwarding-class 3 local-priority 3
send self,peer,1 set class-of-service forwarding-class 4 local-priority 4
send self,peer,1 set class-of-service forwarding-class 5 local-priority 5
send self,peer,1 set class-of-service forwarding-class 6 local-priority 6
send self,peer,1 set class-of-service forwarding-class 7 local-priority 7
send self,peer,1 commit

send self,peer,1 set firewall filter marking sequence 1 from protocol udp
send self,peer,1 set firewall filter marking sequence 1 from destination-port 16384..32767
send self,peer,1 set firewall filter marking sequence 1 from ip trust-mode dscp
send self,peer,1 set firewall filter marking sequence 1 from ip value 46
send self,peer,1 set firewall filter marking sequence 1 then policer p1
send self,peer,1 set firewall filter marking sequence 1 then dscp 46
send self,peer,1 set firewall filter marking sequence 1 then forwarding-class 7
send self,peer,1 set firewall filter marking sequence 2 from protocol udp
send self,peer,1 set firewall filter marking sequence 2 from source-port 16384..32767
send self,peer,1 set firewall filter marking sequence 2 from ip trust-mode dscp
send self,peer,1 set firewall filter marking sequence 2 from ip value 46
send self,peer,1 set firewall filter marking sequence 2 then policer p1
send self,peer,1 set firewall filter marking sequence 2 then dscp 46
send self,peer,1 set firewall filter marking sequence 2 then forwarding-class 7
send self,peer,1 set firewall filter marking sequence 3 from protocol udp
send self,peer,1 set firewall filter marking sequence 3 from destination-port 16384..32767
send self,peer,1 set firewall filter marking sequence 3 from ip trust-mode dscp
send self,peer,1 set firewall filter marking sequence 3 from ip value 34
send self,peer,1 set firewall filter marking sequence 3 then policer p2
send self,peer,1 set firewall filter marking sequence 3 then dscp 34
send self,peer,1 set firewall filter marking sequence 3 then forwarding-class 5
send self,peer,1 set firewall filter marking sequence 4 from protocol udp
send self,peer,1 set firewall filter marking sequence 4 from source-port 16384..32767
send self,peer,1 set firewall filter marking sequence 4 from ip trust-mode dscp
send self,peer,1 set firewall filter marking sequence 4 from ip value 34
send self,peer,1 set firewall filter marking sequence 4 then policer p2
send self,peer,1 set firewall filter marking sequence 4 then dscp 34
send self,peer,1 set firewall filter marking sequence 4 then forwarding-class 5
send self,peer,1 set firewall filter marking sequence 5 from protocol udp
send self,peer,1 set firewall filter marking sequence 5 from destination-port 16384..32767
send self,peer,1 set firewall filter marking sequence 5 from ip trust-mode dscp
send self,peer,1 set firewall filter marking sequence 5 from ip value 0
send self,peer,1 set firewall filter marking sequence 5 then policer p2
send self,peer,1 set firewall filter marking sequence 5 then dscp 0
send self,peer,1 set firewall filter marking sequence 5 then forwarding-class 0
send self,peer,1 set firewall filter marking sequence 6 from protocol udp
send self,peer,1 set firewall filter marking sequence 6 from source-port 16384..32767
send self,peer,1 set firewall filter marking sequence 6 from ip trust-mode dscp
send self,peer,1 set firewall filter marking sequence 6 from ip value 0
send self,peer,1 set firewall filter marking sequence 6 then policer p2
send self,peer,1 set firewall filter marking sequence 6 then dscp 0
send self,peer,1 set firewall filter marking sequence 6 then forwarding-class 0
send self,peer,1 set firewall filter marking sequence 7 from protocol tcp
send self,peer,1 set firewall filter marking sequence 7 from destination-port 2000
send self,peer,1 set firewall filter marking sequence 7 then policer p2
send self,peer,1 set firewall filter marking sequence 7 then dscp 24
send self,peer,1 set firewall filter marking sequence 7 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 8 from protocol tcp
send self,peer,1 set firewall filter marking sequence 8 from destination-port 2001
send self,peer,1 set firewall filter marking sequence 8 then policer p2
send self,peer,1 set firewall filter marking sequence 8 then dscp 24
send self,peer,1 set firewall filter marking sequence 8 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 9 from protocol tcp
send self,peer,1 set firewall filter marking sequence 9 from destination-port 2002
send self,peer,1 set firewall filter marking sequence 9 then policer p2
send self,peer,1 set firewall filter marking sequence 9 then dscp 24
send self,peer,1 set firewall filter marking sequence 9 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 10 from protocol tcp
send self,peer,1 set firewall filter marking sequence 10 from source-port 2000
send self,peer,1 set firewall filter marking sequence 10 then policer p2
send self,peer,1 set firewall filter marking sequence 10 then dscp 24
send self,peer,1 set firewall filter marking sequence 10 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 11 from protocol tcp
send self,peer,1 set firewall filter marking sequence 11 from source-port 2001
send self,peer,1 set firewall filter marking sequence 11 then policer p2
send self,peer,1 set firewall filter marking sequence 11 then dscp 24
send self,peer,1 set firewall filter marking sequence 11 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 12 from protocol tcp
send self,peer,1 set firewall filter marking sequence 12 from source-port 2002
send self,peer,1 set firewall filter marking sequence 12 then policer p2
send self,peer,1 set firewall filter marking sequence 12 then dscp 24
send self,peer,1 set firewall filter marking sequence 12 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 13 from protocol tcp
send self,peer,1 set firewall filter marking sequence 13 from destination-port 2443
send self,peer,1 set firewall filter marking sequence 13 then policer p2
send self,peer,1 set firewall filter marking sequence 13 then dscp 24
send self,peer,1 set firewall filter marking sequence 13 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 14 from protocol tcp
send self,peer,1 set firewall filter marking sequence 14 from source-port 2443
send self,peer,1 set firewall filter marking sequence 14 then policer p2
send self,peer,1 set firewall filter marking sequence 14 then dscp 24
send self,peer,1 set firewall filter marking sequence 14 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 15 from protocol tcp
send self,peer,1 set firewall filter marking sequence 15 from destination-port 1719
send self,peer,1 set firewall filter marking sequence 15 then policer p2
send self,peer,1 set firewall filter marking sequence 15 then dscp 24
send self,peer,1 set firewall filter marking sequence 15 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 16 from protocol tcp
send self,peer,1 set firewall filter marking sequence 16 from destination-port 1720
send self,peer,1 set firewall filter marking sequence 16 then policer p2
send self,peer,1 set firewall filter marking sequence 16 then dscp 24
send self,peer,1 set firewall filter marking sequence 16 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 17 from protocol tcp
send self,peer,1 set firewall filter marking sequence 17 from source-port 1719
send self,peer,1 set firewall filter marking sequence 17 then policer p2
send self,peer,1 set firewall filter marking sequence 17 then dscp 24
send self,peer,1 set firewall filter marking sequence 17 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 18 from protocol tcp
send self,peer,1 set firewall filter marking sequence 18 from source-port 1720
send self,peer,1 set firewall filter marking sequence 18 then policer p2
send self,peer,1 set firewall filter marking sequence 18 then dscp 24
send self,peer,1 set firewall filter marking sequence 18 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 19 from protocol udp
send self,peer,1 set firewall filter marking sequence 19 from destination-port 2427
send self,peer,1 set firewall filter marking sequence 19 then policer p2
send self,peer,1 set firewall filter marking sequence 19 then dscp 24
send self,peer,1 set firewall filter marking sequence 19 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 20 from protocol udp
send self,peer,1 set firewall filter marking sequence 20 from source-port 2427
send self,peer,1 set firewall filter marking sequence 20 then policer p2
send self,peer,1 set firewall filter marking sequence 20 then dscp 24
send self,peer,1 set firewall filter marking sequence 20 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 21 from protocol tcp
send self,peer,1 set firewall filter marking sequence 21 from destination-port 2428
send self,peer,1 set firewall filter marking sequence 21 then policer p2
send self,peer,1 set firewall filter marking sequence 21 then dscp 24
send self,peer,1 set firewall filter marking sequence 21 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 22 from protocol tcp
send self,peer,1 set firewall filter marking sequence 22 from source-port 2428
send self,peer,1 set firewall filter marking sequence 22 then policer p2
send self,peer,1 set firewall filter marking sequence 22 then dscp 24
send self,peer,1 set firewall filter marking sequence 22 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 23 from protocol udp
send self,peer,1 set firewall filter marking sequence 23 from destination-port 5060
send self,peer,1 set firewall filter marking sequence 23 then policer p2
send self,peer,1 set firewall filter marking sequence 23 then dscp 24
send self,peer,1 set firewall filter marking sequence 23 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 24 from protocol udp
send self,peer,1 set firewall filter marking sequence 24 from source-port 5060
send self,peer,1 set firewall filter marking sequence 24 then policer p2
send self,peer,1 set firewall filter marking sequence 24 then dscp 24
send self,peer,1 set firewall filter marking sequence 24 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 25 from protocol udp
send self,peer,1 set firewall filter marking sequence 25 from destination-port 5061
send self,peer,1 set firewall filter marking sequence 25 then policer p2
send self,peer,1 set firewall filter marking sequence 25 then dscp 24
send self,peer,1 set firewall filter marking sequence 25 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 26 from protocol udp
send self,peer,1 set firewall filter marking sequence 26 from source-port 5061
send self,peer,1 set firewall filter marking sequence 26 then policer p2
send self,peer,1 set firewall filter marking sequence 26 then dscp 24
send self,peer,1 set firewall filter marking sequence 26 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 27 from protocol tcp
send self,peer,1 set firewall filter marking sequence 27 from destination-port 42028
send self,peer,1 set firewall filter marking sequence 27 then policer p2
send self,peer,1 set firewall filter marking sequence 27 then dscp 24
send self,peer,1 set firewall filter marking sequence 27 then forwarding-class 4
send self,peer,1 set firewall filter marking sequence 28 from protocol tcp
send self,peer,1 set firewall filter marking sequence 28 from source-port 42028
send self,peer,1 set firewall filter marking sequence 28 then policer p2
send self,peer,1 set firewall filter marking sequence 28 then dscp 24
send self,peer,1 set firewall filter marking sequence 28 then forwarding-class 4

send self,peer,1 set firewall filter marking sequence 57 from protocol tcp
send self,peer,1 set firewall filter marking sequence 57 from destination-port 21
send self,peer,1 set firewall filter marking sequence 57 then policer p2
send self,peer,1 set firewall filter marking sequence 57 then dscp 22
send self,peer,1 set firewall filter marking sequence 57 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 58 from protocol tcp
send self,peer,1 set firewall filter marking sequence 58 from source-port 21
send self,peer,1 set firewall filter marking sequence 58 then policer p2
send self,peer,1 set firewall filter marking sequence 58 then dscp 22
send self,peer,1 set firewall filter marking sequence 58 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 59 from protocol tcp
send self,peer,1 set firewall filter marking sequence 59 from destination-port 20
send self,peer,1 set firewall filter marking sequence 59 then policer p2
send self,peer,1 set firewall filter marking sequence 59 then dscp 22
send self,peer,1 set firewall filter marking sequence 59 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 60 from protocol tcp
send self,peer,1 set firewall filter marking sequence 60 from source-port 20
send self,peer,1 set firewall filter marking sequence 60 then policer p2
send self,peer,1 set firewall filter marking sequence 60 then dscp 22
send self,peer,1 set firewall filter marking sequence 60 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 61 from protocol tcp
send self,peer,1 set firewall filter marking sequence 61 from destination-port 22
send self,peer,1 set firewall filter marking sequence 61 then policer p2
send self,peer,1 set firewall filter marking sequence 61 then dscp 22
send self,peer,1 set firewall filter marking sequence 61 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 62 from protocol tcp
send self,peer,1 set firewall filter marking sequence 62 from source-port 22
send self,peer,1 set firewall filter marking sequence 62 then policer p2
send self,peer,1 set firewall filter marking sequence 62 then dscp 22
send self,peer,1 set firewall filter marking sequence 62 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 63 from protocol tcp
send self,peer,1 set firewall filter marking sequence 63 from destination-port 445
send self,peer,1 set firewall filter marking sequence 63 then policer p2
send self,peer,1 set firewall filter marking sequence 63 then dscp 22
send self,peer,1 set firewall filter marking sequence 63 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 64 from protocol tcp
send self,peer,1 set firewall filter marking sequence 64 from source-port 445
send self,peer,1 set firewall filter marking sequence 64 then policer p2
send self,peer,1 set firewall filter marking sequence 64 then dscp 22
send self,peer,1 set firewall filter marking sequence 64 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 65 from protocol udp
send self,peer,1 set firewall filter marking sequence 65 from destination-port 69
send self,peer,1 set firewall filter marking sequence 65 then policer p2
send self,peer,1 set firewall filter marking sequence 65 then dscp 22
send self,peer,1 set firewall filter marking sequence 65 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 66 from protocol udp
send self,peer,1 set firewall filter marking sequence 66 from source-port 69
send self,peer,1 set firewall filter marking sequence 66 then policer p2
send self,peer,1 set firewall filter marking sequence 66 then dscp 22
send self,peer,1 set firewall filter marking sequence 66 then forwarding-class 1

send self,peer,1 set firewall filter marking sequence 75 from protocol udp
send self,peer,1 set firewall filter marking sequence 75 from destination-port 790
send self,peer,1 set firewall filter marking sequence 75 then policer p2
send self,peer,1 set firewall filter marking sequence 75 then dscp 22
send self,peer,1 set firewall filter marking sequence 75 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 76 from protocol tcp
send self,peer,1 set firewall filter marking sequence 76 from destination-port 5282
send self,peer,1 set firewall filter marking sequence 76 then policer p2
send self,peer,1 set firewall filter marking sequence 76 then dscp 10
send self,peer,1 set firewall filter marking sequence 76 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 77 from protocol tcp
send self,peer,1 set firewall filter marking sequence 77 from source-port 5282
send self,peer,1 set firewall filter marking sequence 77 then policer p2
send self,peer,1 set firewall filter marking sequence 77 then dscp 10
send self,peer,1 set firewall filter marking sequence 77 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 78 from protocol udp
send self,peer,1 set firewall filter marking sequence 78 from destination-port 11577
send self,peer,1 set firewall filter marking sequence 78 then policer p2
send self,peer,1 set firewall filter marking sequence 78 then dscp 22
send self,peer,1 set firewall filter marking sequence 78 then forwarding-class 1
send self,peer,1 set firewall filter marking sequence 79 from protocol udp
send self,peer,1 set firewall filter marking sequence 79 from source-port 11577
send self,peer,1 set firewall filter marking sequence 79 then policer p2
send self,peer,1 set firewall filter marking sequence 79 then dscp 22
send self,peer,1 set firewall filter marking sequence 79 then forwarding-class 1

send self,peer,1 set firewall filter marking sequence 159 from protocol udp
send self,peer,1 set firewall filter marking sequence 159 from source-port 1645
send self,peer,1 set firewall filter marking sequence 159 then policer p2
send self,peer,1 set firewall filter marking sequence 159 then dscp 16
send self,peer,1 set firewall filter marking sequence 159 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 160 from protocol udp
send self,peer,1 set firewall filter marking sequence 160 from destination-port 1645
send self,peer,1 set firewall filter marking sequence 160 then policer p2
send self,peer,1 set firewall filter marking sequence 160 then dscp 16
send self,peer,1 set firewall filter marking sequence 160 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 161 from protocol udp
send self,peer,1 set firewall filter marking sequence 161 from source-port 1646
send self,peer,1 set firewall filter marking sequence 161 then policer p2
send self,peer,1 set firewall filter marking sequence 161 then dscp 16
send self,peer,1 set firewall filter marking sequence 161 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 162 from protocol udp
send self,peer,1 set firewall filter marking sequence 162 from destination-port 1646
send self,peer,1 set firewall filter marking sequence 162 then policer p2
send self,peer,1 set firewall filter marking sequence 162 then dscp 16
send self,peer,1 set firewall filter marking sequence 162 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 163 from protocol tcp
send self,peer,1 set firewall filter marking sequence 163 from source-port 1645
send self,peer,1 set firewall filter marking sequence 163 then policer p2
send self,peer,1 set firewall filter marking sequence 163 then dscp 16
send self,peer,1 set firewall filter marking sequence 163 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 164 from protocol tcp
send self,peer,1 set firewall filter marking sequence 164 from destination-port 1645
send self,peer,1 set firewall filter marking sequence 164 then policer p2
send self,peer,1 set firewall filter marking sequence 164 then dscp 16
send self,peer,1 set firewall filter marking sequence 164 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 165 from protocol tcp
send self,peer,1 set firewall filter marking sequence 165 from source-port 1646
send self,peer,1 set firewall filter marking sequence 165 then policer p2
send self,peer,1 set firewall filter marking sequence 165 then dscp 16
send self,peer,1 set firewall filter marking sequence 165 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 166 from protocol tcp
send self,peer,1 set firewall filter marking sequence 166 from destination-port 1646
send self,peer,1 set firewall filter marking sequence 166 then policer p2
send self,peer,1 set firewall filter marking sequence 166 then dscp 16
send self,peer,1 set firewall filter marking sequence 166 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 167 from protocol udp
send self,peer,1 set firewall filter marking sequence 167 from source-port 1812
send self,peer,1 set firewall filter marking sequence 167 then policer p2
send self,peer,1 set firewall filter marking sequence 167 then dscp 16
send self,peer,1 set firewall filter marking sequence 167 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 168 from protocol udp
send self,peer,1 set firewall filter marking sequence 168 from destination-port 1812
send self,peer,1 set firewall filter marking sequence 168 then policer p2
send self,peer,1 set firewall filter marking sequence 168 then dscp 16
send self,peer,1 set firewall filter marking sequence 168 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 169 from protocol udp
send self,peer,1 set firewall filter marking sequence 169 from source-port 1813
send self,peer,1 set firewall filter marking sequence 169 then policer p2
send self,peer,1 set firewall filter marking sequence 169 then dscp 16
send self,peer,1 set firewall filter marking sequence 169 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 170 from protocol udp
send self,peer,1 set firewall filter marking sequence 170 from destination-port 1813
send self,peer,1 set firewall filter marking sequence 170 then policer p2
send self,peer,1 set firewall filter marking sequence 170 then dscp 16
send self,peer,1 set firewall filter marking sequence 170 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 171 from source-port 4500
send self,peer,1 set firewall filter marking sequence 171 then policer p2
send self,peer,1 set firewall filter marking sequence 171 then dscp 30
send self,peer,1 set firewall filter marking sequence 171 then forwarding-class 3
send self,peer,1 set firewall filter marking sequence 172 from protocol udp
send self,peer,1 set firewall filter marking sequence 172 from destination-port 4500
send self,peer,1 set firewall filter marking sequence 172 then policer p2
send self,peer,1 set firewall filter marking sequence 172 then dscp 30
send self,peer,1 set firewall filter marking sequence 172 then forwarding-class 3

send self,peer,1 set firewall filter marking sequence 999 then forward
send self,peer,1 commit


Configuration tips

pre configuration
send "" configure showleafs

post configuration
send "" commit
send "" exit
showleafs

abort current configurartion
send "" exit discard
showleafs

CC service status
send "" show system management send "" start shell sh
send "" sudo service picos-cc status

SNMPwalk example

http://snmplabs.com/snmpfwd/index.html

snmpwalk -u cc-test-user -v 3 -n spine-1 172.16.100.100:1161

snmpwalk -u cc-test-user -v 3 -n leaf-1 172.16.100.100:1161

for traps we redirect via iptables on spines
iptables -t nat -vnL PREROUTING --line-number
tcpdump -i eth0 -n -s0 port 162 and udp

The SNMP trap server is configured as part of setup-mgmt o The SNMP walk user name configured as part of setup-mgmt is different from the SNMP user name configured in the CLI