[j-nsp] EoMPLS, terminating RFB1483 atm pvc's

Peter Krupl peter.krupl at ventelo.dk
Tue Dec 5 05:54:35 EST 2006


Hi Group,

Does anybody in here know a way to adjust the operational MTU, value
associated with a l2 tunnel, terminating into an atm pvc with RFB1483 encaps. ?

This illustrates my problem:

------------------------------SNIP---------------------------------------
ERX01-BOR#sh atm subinterface atm 2/1
                                     Circuit                   Interface
  Interface    ATM-Prot VCD  VPI VCI  Type   Encap MTU  Status   Type   
-------------- -------- ---- --- --- ------- ----- ---- ------ ---------
ATM 2/1.1010   RFC-1483 1010  10  10 PVC     SNAP  1546 up     Static   <-------

ERX01-BOR#sh conf int atm 2/1.1010
interface atm 2/1.1010
 atm atm1483 mtu 1546
 atm pvc 1010 10 10 aal5snap 0 0 0
 encapsulation bridge1483
 mpls-relay 10.20.30.40 9999 group-id 34

ERX01-BOR#sh mpls l2transport interface atm 2/1.1010
MPLS shim interface ATM2/1.1010
  Remote PE address is 10.20.30.40
  Virtual circuit ID is 9999
  Group ID is 0 by default
  Control word is not preferred by default
  Don't send sequence numbers by default
  Relay format is ethernet by default
  Administrative state is enabled
  Operational state is down (shim interface does not have a next-hop)
  Operational MTU is 1500
  Received:
    0 packets
    0 bytes
    0 errors
    0 discards
  Sent:
    0 packets
    0 bytes
    0 errors
    0 discards
  received mtu 0

  queue 0: traffic class best-effort, bound to atm-vc ATM2/1.1010
    Queue length 0 bytes 
    Forwarded packets 0, bytes 0
    Dropped committed packets 0, bytes 0
    Dropped conformed packets 0, bytes 0
    Dropped exceeded packets 0, bytes 0


------------------------------SNIP---------------------------------------

Does anybody know if this can be solved ? Should it be put on my juniper wishlist
for Christmas ?



Med venlig hilsen/Kind regards
Peter Åris Krüpl
Netværksspecialist

Ventelo Webpartner
Århusgade 88
2100 København Ø
Denmark

-- 
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.5.430 / Virus Database: 268.15.7/569 - Release Date: 05-12-2006 03:00
 



More information about the juniper-nsp mailing list