Page 2
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V G, V G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners Notice The information in this document is subject to change without notice.
Page 3
The H3C S5500-EI & S5500-SI documentation set includes 10 configuration guides, which describe the software features for the H3C S5500-EI & S5500-SI Switch Series Release 2210, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply software features to different network scenarios.
New features (only available 4-byte AS number suppression S5500-EI) IPv6 static routing Support for VPN instances RIPng S5500-EI only: Support for VPN instances • Collaboration with BFD OSPFv3 (only available on the S5500-EI) • Support for VPN instances • Collaboration with BFD...
Page 5
Port numbering in examples The port numbers in this document are for illustration only and might be unavailable on your device. About the S5500-EI & S5500-SI documentation set The H3C S5500-EI & S5500-SI documentation set includes: Documents Purposes Product description and specifications Marketing brochures Describe product specifications and benefits.
Obtaining documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support &...
Page 9
Tuning and optimizing RIP networks ···························································································································· 32 Configuring RIP timers··········································································································································· 32 Configuring split horizon and poison reverse···································································································· 32 Configuring the maximum number of load balanced routes ············································································ 33 Enabling zero field check on incoming RIPv1 messages ·················································································· 33 Enabling source IP address check on incoming RIP updates············································································ 34 Configuring RIPv2 message authentication ········································································································...
Page 10
Configuring OSPF inbound route filtering ·········································································································· 82 Configuring ABR Type-3 LSA filtering ················································································································· 83 Configuring an OSPF cost for an interface ········································································································ 83 Configuring the maximum number of OSPF routes ··························································································· 84 Configuring the maximum number of load-balanced routes ············································································ 84 Configuring OSPF preference ······························································································································...
Page 11
Basic concepts ·····················································································································································131 IS-IS area ······························································································································································133 IS-IS network type ················································································································································135 IS-IS PDU format···················································································································································136 Supported IS-IS features······································································································································142 Protocols and standards ·····································································································································144 IS-IS configuration task list···········································································································································144 Configuring IS-IS basic functions ································································································································145 Configuration prerequisites ································································································································145 Enabling IS-IS ·······················································································································································146 Configuring the IS level and circuit level ··········································································································146 Configuring the network type of an interface as P2P······················································································147 Configuring IS-IS routing information control············································································································147 Configuration prerequisites ································································································································147...
Page 12
IS-IS authentication configuration example·······································································································184 Configuring BFD for IS-IS····································································································································186 BGP configuration ··················································································································································· 190 BGP overview ·······························································································································································190 Formats of BGP messages ··································································································································190 BGP path attributes ·············································································································································193 BGP route selection ·············································································································································197 iBGP and IGP synchronization ··························································································································199 Settlements for problems in large scale BGP networks ···················································································199 BGP GR ································································································································································202 MP-BGP·································································································································································203 Protocols and standards ·····································································································································203...
Page 13
Configuring BGP community ······························································································································227 Configuring a BGP route reflector ·····················································································································228 Configuring a BGP confederation ·····················································································································228 Configuring BGP GR ···················································································································································229 Enabling trap ································································································································································230 Enabling logging of peer state changes····················································································································230 Configuring BFD for BGP ············································································································································231 Displaying and maintaining BGP ·······························································································································231 Displaying BGP····················································································································································231 Resetting BGP connections ·································································································································232 Clearing BGP information ··································································································································233 BGP configuration examples·······································································································································233...
Page 14
Configuring the maximum number of equal cost routes for load balancing ················································271 Applying IPsec policies for RIPng ·······························································································································272 Displaying and maintaining RIPng ·····························································································································273 RIPng configuration examples·····································································································································273 Configuring RIPng basic functions ·····················································································································273 Configuring RIPng route redistribution ··············································································································276 Configuring RIPng IPsec policies ·······················································································································278 OSPFv3 configuration·············································································································································...
Page 15
Configuring OSPFv3 IPsec policies ···················································································································311 Troubleshooting OSPFv3 configuration ·····················································································································314 No OSPFv3 neighbor relationship established ································································································314 Incorrect routing information ······························································································································315 IPv6 IS-IS configuration ··········································································································································· 316 Introduction to IPv6 IS-IS ··············································································································································316 Configuring IPv6 IS-IS basic functions························································································································316 Configuration prerequisites ································································································································316 Configuration procedure ····································································································································316 Configuring IPv6 IS-IS routing information control ···································································································317 Configuration prerequisites ································································································································317 Configuration procedure ····································································································································317...
Page 17
Configuring PBR (using a QoS policy)·······················································································································384 Configuring a QoS policy ··································································································································384 Applying the QoS policy ····································································································································384 Displaying and maintaining PBR configuration ········································································································385 PBR configuration (using a PBR policy) ·············································································································385 PBR configuration (using a QoS policy)············································································································386 PBR configuration examples········································································································································387 Configuring local PBR based on packet type···································································································387 Configuring interface PBR based on packet type ····························································································388 IPv4 PBR configuration example (using a QoS policy) ···················································································390 IPv6 PBR configuration example (using a QoS policy) ···················································································391...
IP routing basics NOTE: router The term in this document refers to both routers and Layer 3 switches. • The types of interfaces that appear in any figures other than the network diagrams for configuration • examples are for illustration only. Some of them might be unavailable on your switch. interface •...
Each entry in the FIB table specifies a physical interface that packets destined for a certain address should go out to reach the next hop—the next router—or the directly connected destination. NOTE: Layer 3—IP Services Configuration Guide For more information about the FIB table, see Routing table information Display the brief information of a routing table by using the display ip routing-table command.
Table 1 Dynamic routing protocols Criterion Categories • Interior gateway protocols (IGPs)—Work within an autonomous system (AS). Examples include RIP, OSPF, and IS-IS. Optional scope • Exterior gateway protocols (EGPs)—Work between ASs. The most popular one is BGP. • Distance-vector protocols—RIP and BGP. BGP is also considered a path-vector protocol.
Load sharing A routing protocol can be configured with multiple equal-cost routes to the same destination. These routes have the same preference and will all be used to accomplish load sharing if there is no route with a higher preference available. NOTE: At present, routing protocols supporting load sharing include static routing/IPv6 static routing, RIP/RIPng, OSPF/OSPFv3, BGP/IPv6 BGP, and IS-IS/IPv6 IS-IS.
Page 22
To do… Use the command… Remarks display ip routing-table [ vpn-instance vpn-instance-name ] ip-address [ mask | Display information about routes to mask-length ] [ longer-match ] [ verbose ] Available in any view the specified destination [ | { begin | exclude | include } regular-expression ] display ip routing-table [ vpn-instance Display information about routes...
Page 23
To do… Use the command… Remarks display ipv6 routing-table [ vpn-instance Display IPv6 routing information of vpn-instance-name ] protocol protocol Available in any view a routing protocol [ inactive | verbose ] [ | { begin | exclude | include } regular-expression ] display ipv6 routing-table [ vpn-instance Display IPv6 routing statistics vpn-instance-name ] statistics [ | { begin |...
Static routing configuration NOTE: The term router in this document refers to both routers and Layer 3 switches. • The S5500-SI Switch Series does not support VPN and BFD related parameters or FRR. • Introduction Static route Static routes are manually configured. If a network’s topology is simple, you only need to configure static routes for the network to work properly.
When specifying the output interface, observe the following rules: • If the output interface is a Null 0 interface, no next hop address is required. If you specify a broadcast interface (such as an Ethernet interface or VLAN interface) as the output •...
NOTE: When you configure a static route, the static route does not take effect if you specify the next hop address • first and then configure it as the IP address of a local interface, such as Ethernet interface and VLAN interface.
Follow these steps to configure a static route with BFD control packet mode enabled (indirect session): To do… Use the command… Remarks Enter system view system-view — ip route-static dest-address { mask | mask-length } next-hop-address bfd control-packet bfd-source ip-address [ preference preference-value ] [ tag tag-value ] [ description Required Configure a static route...
Figure 1 Network diagram As shown in Figure 1, upon a link failure, FRR designates a backup next hop by using a routing policy for routes matching the specified criteria. Packets are directed to the backup next hop to avoid traffic interruption.
Static route configuration examples Basic static route configuration example Network requirements The IP addresses and masks of the switches and hosts are shown in Figure 2. Static routes are required for interconnection between any two hosts. Figure 2 Network diagram Configuration procedure Configure IP addresses for interfaces.
Page 30
Destination/Mask Proto Cost NextHop Interface 0.0.0.0/0 Static 60 1.1.4.2 Vlan500 1.1.2.0/24 Direct 0 1.1.2.3 Vlan300 1.1.2.3/32 Direct 0 127.0.0.1 InLoop0 1.1.4.0/30 Direct 0 1.1.4.1 Vlan500 1.1.4.1/32 Direct 0 127.0.0.1 InLoop0 127.0.0.0/8 Direct 0 127.0.0.1 InLoop0 127.0.0.1/32 Direct 0 127.0.0.1 InLoop0 # Display the IP routing table of Switch B.
<1 ms <1 ms <1 ms 1.1.4.1 1 ms <1 ms <1 ms 1.1.2.2 Trace complete. Static route FRR configuration example Network requirements Switch S, Switch A, and Switch D are interconnected through static routes, as illustrated in Figure Configure static route FRR so that when the link between Switch S and Switch D fails, traffic can be switched to Link B immediately.
BFD for static routes configuration example (direct session) Network requirements As shown in Figure 4, configure static routes to subnet 120.1.1.0/24 on Switch A, static routes to subnet 121.1.1.0/24 on Switch B, and static routes to subnets 120.1.1.0/24 and 121.1.1.0/24 on Switch C. Enable BFD so that when the link between Switch A and Switch B through the Layer 2 switch fails, BFD can detect the failure immediately and Switch A and Switch B can communicate through Switch C.
Page 34
[SwitchB] ip route-static 121.1.1.0 24 vlan-interface 10 12.1.1.1 bfd control-packet [SwitchB] ip route-static 121.1.1.0 24 vlan-interface 13 13.1.1.2 preference 65 [SwitchB] quit # Configure static routes on Switch C. <SwitchC> system-view [SwitchC] ip route-static 120.1.1.0 24 vlan-interface 13 13.1.1.1 [SwitchC] ip route-static 121.1.1.0 24 vlan-interface 11 10.1.1.102 Verify the configuration.
Public Routing Table : Static Summary Count : 2 Static Routing table Status : < Active> Summary Count : 1 Destination/Mask Proto Cost NextHop Interface 120.1.1.0/24 Static 65 10.1.1.100 Vlan11 Static Routing table Status : < Inactive> Summary Count : 1 Destination/Mask Proto Cost...
Page 36
[SwitchA] interface loopback 1 [SwitchA-LoopBack1] bfd min-transmit-interval 500 [SwitchA-LoopBack1] bfd min-receive-interval 500 [SwitchA-LoopBack1] bfd detect-multiplier 9 [SwitchA-LoopBack1] quit [SwitchA] ip route-static 120.1.1.0 24 2.2.2.9 bfd control-packet bfd-source 1.1.1.9 [SwitchA] ip route-static 120.1.1.0 24 vlan-interface 11 10.1.1.100 preference 65 [SwitchA] quit # Configure static routes on Switch B and enable BFD control packet mode for the static route through Switch D.
Page 37
Destination/Mask Proto Cost NextHop Interface 120.1.1.0/24 Static 60 2.2.2.9 Vlan10 Static Routing table Status : <Inactive> Summary Count : 1 Destination/Mask Proto Cost NextHop Interface 120.1.1.0/24 Static 65 10.1.1.100 Vlan11 # Enable BFD debugging on Switch A. When the link between Switch A and Switch D fails, Switch A can detect the failure.
RIP configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. • The S5500-SI Switch Series does not support VPN and BFD related parameters or FRR. • RIP overview RIP is a simple Interior Gateway Protocol (IGP), mainly used in small-sized networks, such as academic networks and simple LANs.
Suppress timer—Defines how long a RIP route stays in suppressed state. When the metric of a route • is 16, the route enters the suppressed state. In suppressed state, only routes coming from the same neighbor and whose metric is less than 16 will be received by the router to replace unreachable routes.
Supports plain text authentication and MD5 authentication to enhance security. • NOTE: RIPv2 has two types of message transmission: broadcast and multicast. Multicast is the default type using 224.0.0.9 as the multicast address. The interface working in the RIPv2 broadcast mode can also receive RIPv1 messages.
Differences from RIPv1: • Version–Version of RIP. For RIPv2 the value is 0x02. Route tag • IP address—Destination IP address. It can be a natural network address, subnet address, or host • address. • Subnet mask—Mask of the destination address. Unlike RIPv1, RIPv2 can carry subnet information. Next hop—If set to 0.0.0.0, it indicates that the originator of the route is the best next hop.
Configuring RIP basic functions Configuration prerequisites Before configuring RIP basic functions, complete the following tasks: Configure the link layer protocol • • Configure an IP address on each interface, and ensure all adjacent routers are reachable to each other Configuration procedure Enabling RIP and a RIP interface Follow these steps to enable RIP: To do…...
Page 44
To do… Use the command… Remarks Optional Enable the interface to receive RIP rip input messages Enabled by default Optional Enable the interface to send RIP rip output messages Enabled by default Configuring a RIP version You can configure a RIP version in RIP view or interface view under the following conditions. If neither global nor interface RIP version is configured, the interface sends RIPv1 broadcasts and •...
To do… Use the command… Remarks Optional By default, if an interface has no RIP version specified, the global version takes effect. If no global RIP Specify a RIP version for the rip version { 1 | 2 [ broadcast | version is specified, the interface interface multicast ] }...
Enabling RIPv2 route automatic summarization You can disable RIPv2 route automatic summarization if you want to advertise all subnet routes. Follow these steps to enable RIPv2 route automatic summarization: To do… Use the command… Remarks Enter system view system-view –– rip [ process-id ] [ vpn-instance Enter RIP view ––...
To do… Use the command… Remarks Required Disable RIP from receiving host undo host-route routes Enabled by default NOTE: RIPv2 can be disabled from receiving host routes, but RIPv1 cannot. Advertising a default route Under the following conditions, you can configure RIP to advertise a default route with a specified metric to RIP neighbors: In RIP view, you can configure all the interfaces of the RIP process to advertise a default route;...
To do… Use the command… Remarks Enter system view system-view –– rip [ process-id ] [ vpn-instance Enter RIP view –– vpn-instance-name ] filter-policy { acl-number | gateway ip-prefix-name | ip-prefix Required Configure the filtering of incoming ip-prefix-name [ gateway routes Not configured by default ip-prefix-name ] } import...
To do… Use the command… Remarks Optional Configure a default metric for default cost value The default metric of a redistributed redistributed routes route is 0. import-route protocol [ process-id Required Redistribute routes from another | all-processes | allow-ibgp ] [ cost No redistribution is configured by protocol cost | route-policy...
Enabling split horizon The split horizon function disables an interface from sending routes received from the interface to prevent routing loops between adjacent routers. Follow these steps to enable split horizon: To do… Use the command… Remarks Enter system view system-view —...
To do… Use the command… Remarks Enter system view system-view –– rip [ process-id ] [ vpn-instance Enter RIP view –– vpn-instance-name ] Optional Enable zero field check on checkzero received RIPv1 messages Enabled by default Enabling source IP address check on incoming RIP updates You can enable source IP address check on incoming RIP updates.
NOTE: This feature does not apply to RIPv1 because RIPv1 does not support authentication. Although you can specify an authentication mode for RIPv1 in interface view, the configuration does not take effect. Specifying a RIP neighbor Usually, RIP sends messages to broadcast or multicast addresses. On non-broadcast or multicast links, you must manually specify RIP neighbors.
To do… Use the command… Remarks Enable a RIP process and enter RIP rip [ process-id ] [ vpn-instance –– view vpn-instance-name ] Optional Configure the maximum number of By default, an interface sends up to RIP packets that can be sent at the output-delay time count count three RIP packets every 20 specified interval...
To do… Use the command… Remarks rip [ process-id ] [ vpn-instance Enter RIP view — vpn-instance-name ] Enable RIP FRR and reference a Required fast-reroute route-policy routing policy to designate a route-policy-name Disabled by default. backup next hop Configuring BFD for RIP NOTE: High Availability Configuration Guide For more information about BFD, see...
To do… Use the command… Remarks Required Specify a RIP neighbor peer ip-address By default, RIP does not unicast updates to any peer. interface interface-type Enter interface view — interface-number Required Enable BFD on the RIP interface rip bfd enable Disabled by default NOTE: Unidirectional detection in BFD echo packet mode only works for RIP neighbors that are directly...
Page 56
Figure 10 Network diagram Configuration procedure Configure an IP address for each interface. (Details not shown) Configure basic RIP functions. # Configure Switch A. [SwitchA] rip [SwitchA-rip-1] network 192.168.1.0 [SwitchA-rip-1] network 172.16.0.0 [SwitchA-rip-1] network 172.17.0.0 # Configure Switch B. [SwitchB] rip [SwitchB-rip-1] network 192.168.1.0 [SwitchB-rip-1] network 10.0.0.0 # Display the RIP routing table of Switch A.
10.0.0.0/8 192.168.1.2 10.2.1.0/24 192.168.1.2 10.1.1.0/24 192.168.1.2 The output shows that RIPv2 uses classless subnet mask. NOTE: RIPv1 routing information has a long aging time, so it will exist until it ages out after RIPv2 is configured. Configuring RIP route redistribution Network requirements In the following figure, two RIP processes are running on Switch B, which communicates with Switch A through RIP 100 and with Switch C through RIP 200.
Page 58
[SwitchB] rip 200 [SwitchB-rip-200] network 12.0.0.0 [SwitchB-rip-200] version 2 [SwitchB-rip-200] undo summary [SwitchB-rip-200] quit # Enable RIP 200 and specify RIP version 2 on Switch C. <SwitchC> system-view [SwitchC] rip 200 [SwitchC-rip-200] network 12.0.0.0 [SwitchC-rip-200] network 16.0.0.0 [SwitchC-rip-200] version 2 [SwitchC-rip-200] undo summary # Display the routing table of Switch C.
1.1.4.0/24, cost 2, nexthop 1.1.1.2 1.1.5.0/24, cost 2, nexthop 1.1.1.2 The output shows that only one RIP route reaches network 1.1.5.0/24, with the next hop as Switch B (1.1.1.2) and a cost of 2. Configuring RIP to advertise a summary route Network requirements In the following figure, Switch A and Switch B run OSPF, Switch D runs RIP, and Switch C runs OSPF and RIP.
Configuring BFD for RIP (single-hop detection in BFD echo packet mode) Network requirements In the following figure, Switch A and Switch C are interconnected through a Layer 2 switch. VLAN-interface 100 of the two switches runs RIP process 1, BFD is enabled on VLAN-interface 100 of Switch A.
Configuring BFD for RIP (bidirectional detection in BFD control packet mode) Network requirements In the following figure, Switch A is connected to Switch C through Switch B. VLAN-interface 100 on Switch A, VLAN-interface 200 on Switch C, and VLAN-interface 200 and VLAN-interface 100 on Switch B run RIP process 1.
Page 70
CAUTION: If you specify null 0 interface as the output interface for a static route, do not specify the IP address of a directly connected network as the destination IP address. Verify the configuration. # Display the BFD session information of Switch A. <SwitchA>...
# Display the BFD information of Switch A. Switch A has deleted the neighbor relationship with Switch C and no output information is displayed. <SwitchA> display bfd session # Display the RIP routes of RIP process 1 on Switch A. The RIP route learned from Switch C is no longer existent.
Page 72
When all links function, route oscillation occurs on the RIP network. After displaying the routing table, you may find some routes intermittently appear and disappear in the routing table. Analysis: In the RIP network, make sure that all the same timers within the entire network are identical and have logical relationships between them.
OSPF configuration Open Shortest Path First (OSPF) is a link state interior gateway protocol developed by the OSPF working group of the Internet Engineering Task Force (IETF). Now, OSPF version 2 (RFC 2328) is used. NOTE: Unless otherwise noted, OSPF refers to OSPFv2 throughout this document. •...
Page 74
Each router uses the SPF algorithm to compute a shortest path tree showing the routes to the nodes • in the AS. The router itself is the root of the tree. Router ID An OSPF process running on a router must have its own router ID. This ID is a 32-bit unsigned integer that uniquely identifies the router in the AS.
Adjacency: Two OSPF neighbors establish an adjacency relationship to synchronize their LSDBs. Therefore, any two neighbors without exchanging route information do not establish an adjacency. Area based OSPF network partition Network partition In a large OSPF routing domain, the LSDB becomes very huge and SPF computation consumes many storage and CPU resources.
Page 76
A virtual link is established between two ABRs through a non-backbone area and is configured on both ABRs to take effect. The non-backbone area is called a transit area. In the following figure, Area 2 has no direct physical link to the backbone area 0. You can configure a virtual link between the two ABRs to connect Area 2 to the backbone area.
Page 77
A totally stub area cannot have an ASBR because AS external routes cannot be distributed into the • stub area. • Virtual links cannot transit totally stub areas. NSSA area Similar to a stub area, an NSSA area does not import AS external LSAs (Type-5 LSAs), but can import Type-7 LSAs generated by the NSSA ASBR.
Router types Classification of routers The following are OSPF router types and their positions in the AS: Internal router All interfaces on an internal router belong to one OSPF area. Area Border Router (ABR) An ABR belongs to more than two areas, one of which must be the backbone area. It connects the backbone area to a non-backbone area.
The intra-area and inter-area routes describe the network topology of the AS. The external routes describe routes to external ASs. OSPF classifies external routes as Type- 1 or Type-2. A Type- 1 external route has high credibility. The cost from a router to the destination of the Type- 1 external route = the cost from the router to the corresponding ASBR + the cost from the ASBR to the destination of the external route.
DR and BDR Introduction On a broadcast or NBMA network, any two routers need to establish an adjacency to exchange routing information with each other. If n routers are present on the network, n(n- 1 )/2 adjacencies are required. In addition, any topology change on the network results in traffic for route synchronization, which consumes many system and bandwidth resources.
OSPF packet formats OSPF packets are directly encapsulated into IP packets. OSPF uses the IP protocol number 89. The format of an OSPF LSU packet is shown in Figure Figure 24 OSPF packet format OSPF packet header OSPF packets are classified into five types that have the same packet header. Figure 25 OSPF packet header Major fields of the OSPF packet header are as follows: Version: OSPF version number, which is 2 for OSPFv2.
Page 82
Figure 26 Hello packet format Major fields of the hello packet are as follows: Network mask: Network mask associated with the router’s sending interface. If two routers have • different network masks, they cannot become neighbors. HelloInterval: Interval for sending hello packets. If two routers have different intervals, they cannot •...
Page 83
Figure 27 DD packet format Version Packet length Router ID Area ID Checksum AuType Authentication Authentication Interface MTU Options 0 0 0 0 0 I DD sequence number LSA header LSA header Major fields of the DD packets are as follows: •...
Page 84
Figure 28 LSR packet format Major fields of the LSR packets are as follows: • LS type: Type of the LSA to be requested. Type 1 for example indicates the Router LSA. Link state ID: Determined by LSA type. • •...
Page 85
Figure 30 LSAck packet format LSA header format All LSAs have the same header. Figure 31 LSA header format Major fields of the LSA header are as follows: LS age: Time, in seconds, elapsed since the LSA was originated. An LSA ages in the LSDB (added •...
Page 86
Figure 32 Router LSA format Major fields of the Router LSA are as follows: Link state ID: ID of the router that originated the LSA. • V (Virtual Link): Set to 1 if the router that originated the LSA is a virtual link endpoint. •...
Page 87
Figure 33 Network LSA format Major fields of the Network LSA are as follows: Link state ID: The interface address of the DR. • • Network mask: The mask of the network (a broadcast or NBMA network). Attached router: The IDs of the routers, which are adjacent to the DR, including the DR itself. •...
Page 88
An AS external LSA is originated by an ASBR, and describes routing information to a destination outside the AS. Figure 35 AS external LSA format Major fields of the AS external LSA are as follows: • Link state ID: The IP address of another AS to be advertised. When describing a default route, the Link state ID is always set to default destination (0.0.0.0) and the network mask is set to 0.0.0.0 Network mask: The IP address mask for the advertised destination •...
Figure 36 NSSA external LSA format Supported features Multi-process This feature allows multiple OSPF processes to run on a router both simultaneously and independently. Routing information interactions between different processes simulate interactions between different routing protocols. Multiple OSPF processes can use the same RID. An interface of a router can only belong to a single OSPF process.
NOTE: High Availability Configuration Guide For more information about BFD, see Bidirectional forwarding detection (BFD) provides a single mechanism to quickly detect and monitor the connectivity of links between OSPF neighbors, reducing network convergence time. Protocols and standards RFC 1765, OSPF Database Overflow •...
You can specify a router ID when creating the OSPF process. Any two routers in an AS must have different router IDs. In practice, the ID of a router is the IP address of one of its interfaces. If you specify no router ID when creating the OSPF process, the global router ID is used. H3C •...
H3C recommends configuring a description for each OSPF process to help identify purposes of • processes and for ease of management and memorization. H3C recommends configuring a description for each area to help identify purposes of areas and for • ease of management and memorization.
NOTE: You must use the stub command on routers attached to a stub area. • Using the default-cost command only takes effect on the ABR of a stub area. • The backbone area cannot be a totally stub area. • A (totally) stub area cannot have an ASBR because AS external routes cannot be distributed into the stub •...
To do… Use the command… Remarks ospf [ process-id | router-id Enter OSPF view router-id | vpn-instance — vpn-instance-name ] * Enter area view area area-id — Required vlink-peer router-id [ hello seconds | retransmit seconds | trans-delay You must configure this command on seconds | dead seconds | simple both ends of a virtual link.
Configuring the OSPF network type for an interface as broadcast Follow these steps to configure the OSPF network type for an interface as broadcast: To do… Use the command… Remarks Enter system view system-view — interface interface-type Enter interface view —...
NOTE: The router priority configured with the ospf dr-priority command and the one configured with the peer command have the following differences. The former is for actual DR election. • The latter is to indicate whether a neighbor has the election right or not. If you configure the router •...
To do… Use the command… Remarks Required Configure the OSPF network type By default, the network type of an ospf network-type p2p for the interface as P2P interface depends on the link layer protocol. Configuring OSPF route control This section describes how to control the advertisement and reception of OSPF routing information, as well as route redistribution from other protocols.
Configuring route summarization when redistributing routes into OSPF on an ASBR Without route summarization, an ASBR advertises each redistributed route in a separate ASE LSA. After a summary route is configured, the ASBR advertises only the summary route in an ASE LSA instead of more specific routes, which reduces the number of LSAs in the LSDB.
Configuring ABR Type-3 LSA filtering You can configure an ABR to filter Type-3 LSAs advertised to an area. Follow these steps to configure Type-3 LSA filtering on an ABR: To do… Use the command… Remarks Enter system view system-view — ospf [ process-id | router-id router-id | Enter OSPF view —...
Configuring the maximum number of OSPF routes Follow these steps to configure the maximum number of routes: To do… Use the command… Remarks Enter system view system-view — ospf [ process-id | router-id router-id | Enter OSPF view — vpn-instance vpn-instance-name ] * Optional Configure the maximum number of maximum-routes { external | inter | intra }...
Configuring OSPF route redistribution Configure route redistribution into OSPF On a router running OSPF and other routing protocols, you can configure OSPF to redistribute routes from other protocols such as RIP, IS-IS, BGP, static, and direct routes, and advertise them in Type-5 LSAs or Type-7 LSAs.
Configure the default parameters for redistributed routes You can configure default parameters, such as the cost, upper limit, tag and type for redistributed routes. Tags indicate information related to protocols. For example, when redistributing BGP routes, OSPF uses tags to identify AS IDs. Follow these steps to configure the default parameters for redistributed routes: To do…...
Configuration prerequisites Before configuring OSPF network optimization, complete the following tasks: Configure IP addresses for interfaces • Configure OSPF basic functions • Configuring OSPF packet timers You can configure the following timers on OSPF interfaces as needed. Hello timer—Interval for sending hello packets. It must be identical on OSPF neighbors. The longer •...
Specifying LSA transmission delay Each LSA in the LSDB has an age that is incremented by 1 every second, but the age does not change during transmission. It is necessary to add a transmission delay into the age time especially for low-speed links.
To do… Use the command… Remarks Optional Configure the LSA arrival interval lsa-arrival-interval interval 1000 milliseconds by default NOTE: The interval set with the lsa-arrival-interval command must be smaller than or equal to the interval set with the lsa-generation-interval command. Specifying the LSA generation interval You can adjust the LSA generation interval to protect network resources and routers from being over consumed by frequent network changes.
NOTE: Different OSPF processes can disable the same interface from receiving and sending OSPF packets. The • silent-interface command disables only the interfaces associated with the current process rather than interfaces associated with other processes. After an OSPF interface is set to silent, other interfaces on the router can advertise direct routes of the •...
To do… Use the command… Remarks Required Configure the authentication mode authentication-mode { md5 | simple } Not configured by default. Return to OSPF view quit — Return to system view quit — Enter interface view interface interface-type interface-number — Configure the authentication mode ospf authentication-mode simple [ cipher | (simple authentication) for the...
RFC 1583 Enabled by default NOTE: To avoid routing loops, H3C recommends configuring all the routers to be either compatible or incompatible with RFC 1583. Logging neighbor state changes Follow these steps to enable the logging of neighbor state changes: To do…...
To do… Use the command… Remarks Configure OSPF to give Required priority to receiving and ospf packet-process prioritized-treatment Not configured by default. processing hello packets Configuring the LSU transmit rate Sending large numbers of LSU packets affects router performance and consumes too much network bandwidth.
Page 112
Figure 37 Network diagram for OSPF FRR Figure 37, after you enable FRR on Router B, OSPF automatically calculates or designates a backup next hop when a link failure is detected. Packets are directed to the backup next hop. At the same time, OSPF calculates the shortest path based on the new network topology, and forwards packets over the path after routing convergence.
To do… Use the command… Remarks ospf [ process-id | router-id Enter OSPF view router-id | vpn-instance — vpn-instance-name ] * Enable OSPF FRR to designate a Required fast-reroute route-policy backup next hop by using a routing route-policy-name Not configured by default. policy Configuring OSPF Graceful Restart OSPF GR involves the following:...
To do… Use the command… Remarks Required Enable the out-of-band enable re-synchronization capability out-of-band-resynchronization Disabled by default Required Enable non-IETF standard Graceful graceful-restart [ nonstandard ] Restart capability for OSPF Disabled by default Optional Configure Graceful Restart interval graceful-restart interval timer for OSPF 120 seconds by default Configuring the OSPF GR Helper...
Triggering OSPF Graceful Restart Performing a Master/Slave switchover, or performing the following configuration on an OSPF router, will trigger OSPF Graceful Restart. Follow these steps to trigger OSPF Graceful Restart: To do… Use the command… Remarks Required reset ospf [ process-id ] process Trigger OSPF Graceful Restart graceful-restart Available in user view...
To do… Use the command… Description Required Enable BFD echo packet single-hop detection ospf bfd enable echo Not enabled by on the interface default Displaying and maintaining OSPF To do… Use the command… Remarks display ospf [ process-id ] brief [ | { begin | Available in any Display OSPF brief information exclude | include } regular-expression ]...
Page 119
Authentication Sequence: [ 0 ] Neighbor state change count: 5 Neighbors Area 0.0.0.1 interface 10.2.1.1(Vlan-interface200)'s neighbors Router ID: 10.4.1.1 Address: 10.2.1.2 GR State: Normal State: Full Mode: Nbr is Master Priority: 1 DR: 10.2.1.1 BDR: 10.2.1.2 MTU: 0 Dead timer due in 32 Neighbor is up for 06:03:12 Authentication Sequence: [ 0 ] Neighbor state change count: 5...
Routing for ASEs Destination Cost Type NextHop AdvRouter 3.1.2.0/24 Type2 10.3.1.1 10.4.1.1 Total Nets: 6 Intra Area: 2 Inter Area: 3 ASE: 1 NSSA: 0 Configuring OSPF to advertise a summary route Network requirements As shown in Figure Switch A and Switch B are in AS 200, which runs OSPF. •...
# Configure OSPF to redistribute routes from BGP on Switch B. [SwitchB] ospf [SwitchB-ospf-1] import-route bgp # Configure OSPF to redistribute routes from BGP on Switch C. [SwitchC] ospf [SwitchC-ospf-1] import-route bgp # Display the OSPF routing table of Switch A. [SwitchA] display ip routing-table Routing Tables: Public Destinations : 8...
Page 125
Figure 41 Network diagram Switch A Area 0 Switch B Vlan-int100 10.1.1.1/24 Vlan-int100 10.1.1.2/24 Vlan-int200 Vlan-int200 10.2.1.1/24 10.3.1.1/24 Vlan-int200 Vlan-int200 Area 1 Area 2 10.3.1.2/24 10.2.1.2/24 Stub ASBR Vlan-int300 Vlan-int300 10.4.1.1/24 10.5.1.1/24 Switch C Switch D Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure OSPF basic functions.
Page 126
Destination Cost Type NextHop AdvRouter 3.1.2.0/24 Type2 10.2.1.1 10.5.1.1 Total Nets: 6 Intra Area: 2 Inter Area: 3 ASE: 1 NSSA: 0 NOTE: In the above output, because Switch C resides in a normal OSPF area, its routing table contains an external route.
[SwitchA] ospf [SwitchA-ospf-1] area 1 [SwitchA-ospf-1-area-0.0.0.1] stub no-summary [SwitchA-ospf-1-area-0.0.0.1] quit # Display OSPF routing information on Switch C. [SwitchC] display ospf routing OSPF Process 1 with Router ID 10.4.1.1 Routing Tables Routing for Network Destination Cost Type NextHop AdvRouter Area 0.0.0.0/0 Inter 10.2.1.1...
Page 128
Configure Area 1 as an NSSA area. # Configure Switch A. <SwitchA> system-view [SwitchA] ospf [SwitchA-ospf-1] area 1 [SwitchA-ospf-1-area-0.0.0.1] nssa default-route-advertise no-summary [SwitchA-ospf-1-area-0.0.0.1] quit [SwitchA-ospf-1] quit # Configure Switch C. <SwitchC> system-view [SwitchC] ospf [SwitchC-ospf-1] area 1 [SwitchC-ospf-1-area-0.0.0.1] nssa [SwitchC-ospf-1-area-0.0.0.1] quit [SwitchC-ospf-1] quit NOTE: If Switch C in the NSSA area wants to obtain routes to other areas within the AS, you must configure the...
Routing Tables Routing for Network Destination Cost Type NextHop AdvRouter Area 10.2.1.0/24 Inter 10.3.1.1 10.3.1.1 0.0.0.2 10.3.1.0/24 Transit 10.3.1.2 10.3.1.1 0.0.0.2 10.4.1.0/24 Inter 10.3.1.1 10.3.1.1 0.0.0.2 10.5.1.0/24 Stub 10.5.1.1 10.5.1.1 0.0.0.2 10.1.1.0/24 Inter 10.3.1.1 10.3.1.1 0.0.0.2 Routing for ASEs Destination Cost Type NextHop...
Page 130
[SwitchA-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255 [SwitchA-ospf-1-area-0.0.0.0] quit [SwitchA-ospf-1] quit # Configure Switch B. <SwitchB> system-view [SwitchB] router id 2.2.2.2 [SwitchB] ospf [SwitchB-ospf-1] area 0 [SwitchB-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255 [SwitchB-ospf-1-area-0.0.0.0] quit [SwitchB-ospf-1] quit # Configure Switch C. <SwitchC> system-view [SwitchC] router id 3.3.3.3 [SwitchC] ospf [SwitchC-ospf-1] area 0 [SwitchC-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255...
Page 131
Authentication Sequence: [ 0 ] Router ID: 4.4.4.4 Address: 192.168.1.4 GR State: Normal State: Full Mode: Nbr is Master Priority: 1 DR: 192.168.1.4 BDR: 192.168.1.3 MTU: 0 Dead timer due in 31 Neighbor is up for 00:01:28 Authentication Sequence: [ 0 ] Switch D becomes the DR, and Switch C is the BDR.
Page 132
Dead timer due in 33 Neighbor is up for 00:11:15 Authentication Sequence: [ 0 ] The DR and BDR have not changed. NOTE: In the above output, you can find the priority configuration does not take effect immediately. Restart OSPF process. # Restart the OSPF process of Switch D.
[SwitchA] display ospf interface OSPF Process 1 with Router ID 1.1.1.1 Interfaces Area: 0.0.0.0 IP Address Type State Cost 192.168.1.1 Broadcast DR 192.168.1.1 192.168.1.3 [SwitchB] display ospf interface OSPF Process 1 with Router ID 2.2.2.2 Interfaces Area: 0.0.0.0 IP Address Type State Cost...
192.1.1.1(Vlan100) from Full to Down OSPF 100: Intf 192.1.1.1 Rcv InterfaceDown State BackupDR -> Down. OSPF 100 nonstandard GR Started for OSPF Router OSPF 100 notify RM that OSPF process will enter GR. OSPF 100 created GR wait timer, timeout interval is 40(s). OSPF 100 created GR Interval timer,timeout interval is 120(s).
Page 138
Figure 46 Network diagram Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure OSPF basic functions. (See “Configuring OSPF basic functions”) Configure OSPF to redistribute routes. # On Switch C, configure a static route destined for network 3.1.1.0/24. <SwitchC>...
Page 139
127.0.0.1/32 Direct 0 127.0.0.1 InLoop0 On Switch C, filter out route 3.1.3.0/24. # Configure the IPv4 prefix list. [SwitchC] ip ip-prefix prefix1 index 1 deny 3.1.3.0 24 [SwitchC] ip ip-prefix prefix1 index 2 permit 3.1.1.0 24 [SwitchC] ip ip-prefix prefix1 index 3 permit 3.1.2.0 24 # Reference the prefix list to filter out route 3.1.3.0/24.
Tag: 0 # Display route 1.1.1.1/32 on Switch D. You can find the backup next hop information. [SwitchD] display ip routing-table 1.1.1.1 verbose Routing Table : Public Summary Count : 1 Destination: 1.1.1.1/32 Protocol: OSPF Process ID: 1 Preference: 10 Cost: 1 IpPrecedence: QosLcId:...
Page 144
[SwitchB-Vlan-interface10] ospf bfd enable [SwitchB-Vlan-interface10] bfd min-transmit-interval 500 [SwitchB-Vlan-interface10] bfd min-receive-interval 500 [SwitchB-Vlan-interface10] bfd detect-multiplier 6 Verify the configuration. The following operations are performed on Switch A. The operations on Switch B and Switch C are similar, and are not shown. # Display the BFD information of Switch A.
Page 145
%Nov 12 18:34:48:823 2005 SwitchA BFD/5/LOG: Sess[10.1.0.102/10.1.0.100, vlan10], Sta : UP->DOWN, Diag: 1 %Nov 12 18:34:48:824 2005 SwitchA RM/4/RMLOG:OSPF-NBRCHANGE: Process 1, Neighbour 10.1.0.102 (vlan10) from Full to Down *0.50673825 SwitchA BFD/8/SCM:Sess[10.1.0.102/10.1.0.100, vlan10],Oper: Reset *0.50673825 SwitchA BFD/8/EVENT:Send sess-down Msg, [Src:10.1.0.102, Dst:10.1.0.100, vlan10] Protocol: OSPF *0.50673826 SwitchA RM/7/RMDEBUG:OSPF-BFD: Message Type rcv BFD down, Connect Type direct-connect, Src IP Address 10.1.0.102, Src IFIndex 5, Dst IP Address 10.1.0.100...
Page 147
Solution Use the display ospf peer command to display neighbors. Use the display ospf interface command to display OSPF interface information. Use the display ospf lsdb command to display the LSDB to check its integrity. Display information about area configuration using the display current-configuration configuration ospf command.
IS-IS configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. • The S5500-SI Switch Series does not support IS-IS. • IS-IS overview Intermediate System-to-Intermediate System (IS-IS) is a dynamic routing protocol designed by the International Organization for Standardization (ISO) to operate on the connectionless network protocol (CLNP).
Page 149
IS-IS address format NSAP As shown in Figure 49, an NSAP address consists of the Initial Domain Part (IDP) and the Domain Specific Part (DSP). The IDP is equal to the network ID of an IP address, and the DSP is equal to the subnet and host ID.
A network entity title (NET) indicates the network layer information of an IS, and does not include transport layer information. It is a special NSAP address with the SEL being 0. The length of the NET is equal to the NSAP, and is in the range of 8 bytes to 20 bytes. A NET comprises the following parts: Area ID—Its length is in the range of 1 to 13 bytes.
Page 151
Figure 50 IS-IS topology 1 Figure 51 is another IS-IS topology. The Level- 1 -2 routers connect to the Level- 1 and Level-2 routers, and form the IS-IS backbone together with the Level-2 routers. No area is defined as the backbone in this topology.
The routing information of a Level- 1 area is sent to the Level-2 area through the Level- 1 -2 router; therefore, the Level-2 router knows the routing information of the entire IS-IS routing domain. But the Level- 1 -2 router does not share the information of other Level- 1 areas and the Level-2 area with the Level- 1 area by default.
NOTE: On IS-IS broadcast networks, all routers are adjacent with each other. However, the DIS is responsible for the synchronization of their LSDBs. IS-IS PDU format PDU header format IS-IS packets are encapsulated into link layer frames. The Protocol Data Unit (PDU) consists of two parts, the headers and the variable length fields.
Page 154
Type PDU Type Acronym Point-to-Point IS-IS hello PDU P2P IIH Level-1 Link State PDU L1 LSP Level-2 Link State PDU L2 LSP Level-1 Complete Sequence Numbers PDU L1 CSNP Level-2 Complete Sequence Numbers PDU L2 CSNP Level-1 Partial Sequence Numbers PDU L1 PSNP Level-2 Partial Sequence Numbers PDU L2 PSNP...
Page 155
Priority: DIS priority. • • LAN ID: Includes the system ID and a one-byte pseudonode ID. Figure 56 shows the hello packet format on the point-to-point networks. Figure 56 P2P IIH format Instead of the priority and LAN ID fields in the LAN IIH, the P2P IIH has a Local Circuit ID field. LSP packet format The Link State PDU (LSP) carries link state information.
Page 156
Figure 57 L1/L2 LSP format Major fields of the L1/L2 LSP are as follows: PDU length: Total length of the PDU in bytes • Remaining lifetime: LSP remaining lifetime in seconds • LSP ID: Consists of the system ID, the pseudonode ID (one byte) and the LSP fragment number (one •...
Page 157
Figure 58 LSDB overload • IS type: Type of the router generating the LSP. SNP format A sequence number PDU (SNP) acknowledges the latest received LSPs. It is similar to an Acknowledge packet, but more efficient. SNP involves Complete SNP (CSNP) and Partial SNP (PSNP), which are further divided into Level- 1 CSNP, Level-2 CSNP, Level- 1 PSNP and Level-2 PSNP.
Page 158
Figure 60 L1/L2 PSNP format No. of Octets Intradomain routing protocol discriminator Length indicator Version/Protocol ID extension ID length PDU type Version Reserved Maximum area address PDU length Source ID ID length+1 Variable length fields The variable fields of PDU comprise multiple Code-Length-Value (CLV) triplets. Figure 61 CLV format Table 3 shows that different PDUs contain different CLVs.
CLV Code Name PDU Type IP Interface Address IIH, LSP Supported IS-IS features Multiple instances and processes IS-IS supports multiple instances and processes. Multiple processes allow an IS-IS process to work in concert with a group of interfaces. A router can run multiple IS-IS processes, and each process corresponds to a unique group of interfaces.
Page 160
The LSP fragment extension feature allows an IS-IS router to generate more LSP fragments. Up to 50 additional virtual systems can be configured on the router, and each virtual system is capable of generating 256 LSP fragments to enable the IS-IS router to generate up to 13056 LSP fragments. Terms Originating system •...
Dynamic host name mapping mechanism The dynamic host name mapping mechanism provides the mappings between the host names and the system IDs for the IS-IS routers. The dynamic host name information is announced in the dynamic host name CLV of an LSP. This mechanism also provides the mapping between a host name and the DIS of a broadcast network, which is announced in the dynamic host name TLV of a pseudonode LSP.
Task Remarks Configuring IS-IS link cost Optional Specifying a priority for IS-IS Required Configuring the maximum number of equal cost routes Optional Configuring IS-IS Configuring IS-IS route summarization Optional routing information Advertising a default route Optional control Configuring IS-IS route redistribution Optional Configuring IS-IS route filtering Optional...
Disabled by default Configuring the IS level and circuit level If only one area is available, H3C recommends you to perform the following operations: Configure the IS level of all routers as Level- 1 or Level-2 rather than different levels because the •...
Configuring the network type of an interface as P2P Interfaces with different network types operate differently. For example, broadcast interfaces on a network must elect the DIS and flood CSNP packets to synchronize the LSDBs, but P2P interfaces on a network do not need to elect the DIS, and have a different LSDB synchronization mechanism.
Page 165
equals 40; if the interface bandwidth does not exceed 622 Mbps, the interface cost equals 30; if the interface bandwidth does not exceed 2500 Mbps, the interface cost equals 20; if the interface bandwidth exceeds 2500 Mbps, the interface cost equals 10. If none of the above costs are used, a default cost of 10 applies.
To do… Use the command… Remarks Configure a bandwidth Optional reference value for automatic bandwidth-reference value 100 Mbps by default IS-IS cost calculation Specifying a priority for IS-IS A router can run multiple routing protocols. When routes to the same destination are found by multiple routing protocols, the route learned by the protocol with the highest priority can be adopted.
Follow these steps to configure route summarization: To do… Use the command... Remarks Enter system view system-view — isis [ process-id ] [ vpn-instance Enter IS-IS view — vpn-instance-name ] Required summary ip-address { mask | mask-length } Configure IS-IS route [ avoid-feedback | generate_null0_route | tag No route summarization is summarization...
To do… Use the command… Remarks Required import-route protocol [ process-id | No route is redistributed by all-processes | allow-ibgp ] [ cost cost | Redistribute routes from default. cost-type { external | internal } | [ level-1 | another routing protocol If no level is specified, routes are level-1-2 | level-2 ] | route-policy redistributed into the Level-2...
To do… Use the command… Remarks isis [ process-id ] [ vpn-instance Enter IS-IS view — vpn-instance-name ] filter-policy { acl-number | ip-prefix Required Configure the filtering of routes ip-prefix-name | route-policy redistributed from another routing Not configured by route-policy-name } export [ protocol protocol or IS-IS process default [ process-id ] ]...
To do… Use the command… Remarks Optional Specify the interval for sending isis timer hello seconds [ level-1 | hello packets level-2 ] 10 seconds by default Specify the interval for sending Optional isis timer csnp seconds [ level-1 | CSNP packets on the DIS of a level-2 ] 10 seconds by default...
Disabling an interface from sending or receiving IS-IS packets After being disabled from sending or receiving hello packets, an interface cannot form a neighbor relationship, but can advertise directly connected networks in LSPs through other interfaces. This can save bandwidth and CPU resources, and ensures other routers know networks directly connected to the interface.
Page 172
Specify the LSP refresh interval and generation interval Each router needs to refresh LSPs generated by itself at a configurable interval and send them to other routers to prevent valid routes from being aged out. A smaller refresh interval speeds up network convergence but consumes more bandwidth.
Page 173
If the IS-IS routers have different interface MTUs, H3C recommends configuring the maximum size of generated LSP packets to be smaller than the smallest interface MTU in this area. If they are not, the routers must dynamically adjust the LSP packet size to fit the smallest interface MTU, which takes time and affects other services.
Configuring SPF parameters When the LSDB changes on a router, a route calculation starts. Frequent route calculations consume a lot of system resources. You can set an appropriate interval for SPF calculations to improve efficiency. Follow these steps to configure the SPF parameters: To do…...
To do… Use the command… Remarks set-overload [ on-startup [ [ start-from-nbr system-id Required Set the overload bit [ timeout1 [ nbr-timeout ] ] ] | timeout2 ] [ allow { external Not set by default | interlevel } * ] Configuring system ID to host name mappings In IS-IS, a system ID identifies a router or host uniquely.
To do… Use the command... Remarks interface interface-type Enter interface view — interface-number Optional Not configured by default. This command takes effect only on a Configure a DIS name isis dis-name symbolic-name router with dynamic system ID to host name mapping configured. This command is not supported on P2P interfaces.
To do… Use the command… Remarks Enter system view system-view — Enter interface view interface interface-type interface-number — Required Specify the authentication mode isis authentication-mode { md5 | simple } Not authentication is and password password [ level-1 | level-2 ] [ ip | osi ] configured by default.
Configuring IS-IS GR NOTE: The IS-IS GR and IS-IS NSR features are mutually exclusive. Restarting IS-IS on a router causes network disconnections and route reconvergence. With the Graceful Restart (GR) feature, the restarting router—known as the GR Restarter—can notify the event to its GR capable neighbors.
NSR is introduced to solve the problem. It backs up IS-IS link state information from the master device to the slave device. After a master/slave switchover, NSR can complete link state recovery and route re-generation without requiring the cooperation of other devices. Follow these steps to configure IS-IS NSR: To do…...
Enable IS-IS • Configure IS-IS FRR to automatically calculate a backup next hop Follow these steps to configure IS-IS FRR: To do… Use the command… Remarks Enter system view system-view — Required Configure the source address of bfd echo-source-ip ip-address echo packets Not configured by default.
To do… Use the command… Remarks Enter system view system-view — isis [ process-id ] [ vpn-instance Enter IS-IS view — vpn-instance-name ] Required Bind the IS-IS process with MIBs isis mib-binding process-id By default, MIBs are bound with IS-IS process 1. Configuring BFD for IS-IS Follow these steps to enable BFD on an IS-IS interface: To do…...
To do… Use the command… Remarks display isis name-table [ process-id | vpn-instance Display the host-name-to-system-ID Available in any vpn-instance-name ] [ | { begin | exclude | mapping table view include } regular-expression ] display isis peer [ statistics | verbose ] [ process-id Available in any Display IS-IS neighbor information | vpn-instance vpn-instance-name ] [ | { begin |...
Page 183
Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure IS-IS. # Configure Switch A. <SwitchA> system-view [SwitchA] isis 1 [SwitchA-isis-1] is-level level-1 [SwitchA-isis-1] network-entity 10.0000.0000.0001.00 [SwitchA-isis-1] quit [SwitchA] interface vlan-interface 100 [SwitchA-Vlan-interface100] isis enable 1 [SwitchA-Vlan-interface100] quit # Configure Switch B. <SwitchB>...
Page 184
[SwitchD-Vlan-interface300] quit Verify the configuration. # Display the IS-IS LSDB of each switch to check the LSP integrity. [SwitchA] display isis lsdb Database information for ISIS(1) -------------------------------- Level-1 Link State Database LSPID Seq Num Checksum Holdtime Length ATT/P/OL -------------------------------------------------------------------------- 0000.0000.0001.00-00* 0x00000004 0xdf5e 1096 0/0/0...
DIS election configuration Network requirements As shown in Figure 64, Switch A, B, C, and D reside in IS-IS area 10 on a broadcast network (Ethernet). Switch A and Switch B are Level- 1 -2 switches, Switch C is a Level- 1 switch, and Switch D is a Level-2 switch. Change the DIS priority of Switch A to make it elected as the Level- 1 -2 DIS router.
Page 188
[SwitchC] interface vlan-interface 100 [SwitchC-Vlan-interface100] isis enable 1 [SwitchC-Vlan-interface100] quit # Configure Switch D. <SwitchD> system-view [SwitchD] isis 1 [SwitchD-isis-1] network-entity 10.0000.0000.0004.00 [SwitchD-isis-1] is-level level-2 [SwitchD-isis-1] quit [SwitchD] interface vlan-interface 100 [SwitchD-Vlan-interface100] isis enable 1 [SwitchD-Vlan-interface100] quit # Display information about IS-IS neighbors of Switch A. [SwitchA] display isis peer Peer information for ISIS(1) ----------------------------...
Page 189
IPV4.State IPV6.State Type Down 1497 L1/L2 Yes/No # Display information about IS-IS interfaces of Switch D. [SwitchD] display isis interface Interface information for ISIS(1) --------------------------------- Interface: Vlan-interface100 IPV4.State IPV6.State Type Down 1497 L1/L2 No/Yes NOTE: By using the default DIS priority, Switch C is the Level-1 DIS, and Switch D is the Level-2 DIS. The pseudonodes of Level-1 and Level-2 are 0000.0000.0003.01 and 0000.0000.0004.01, respectively.
Page 190
IPV4.State IPV6.State Type Down 1497 L1/L2 Yes/Yes NOTE: After the DIS priority configuration, Switch A becomes the Level-1-2 DIS, and the pseudonode is 0000.0000.0001.01. # Display information about IS-IS neighbors and interfaces of Switch C. [SwitchC] display isis peer Peer information for ISIS(1) ---------------------------- System Id: 0000.0000.0002 Interface: Vlan-interface100...
Configuring IS-IS route redistribution Network requirements As shown in Figure 65, Switch A, Switch B, Switch C, and Switch D reside in the same AS. They use IS-IS to interconnect. Switch A and Switch B are Level- 1 routers, Switch D is a Level-2 router, and Switch C is a Level- 1 -2 router.
[SwitchD] isis 1 [SwitchD–isis-1] import-route rip level-2 # Display IS-IS routing information on Switch C. [SwitchC] display isis route Route information for ISIS(1) ----------------------------- ISIS(1) IPv4 Level-1 Forwarding Table ------------------------------------- IPV4 Destination IntCost ExtCost ExitInterface NextHop Flags -------------------------------------------------------------------------- 10.1.1.0/24 NULL VLAN100 Direct D/L/-...
Page 195
Figure 66 Network diagram for IS-IS GR configuration GR restarter Switch A Vlan-int100 10.0.0.1/24 Vlan-int100 Vlan-int100 10.0.0.2/24 10.0.0.3/24 Switch B Switch C GR helper GR helper Configuration procedure Configure IP addresses of the interfaces on each switch and configure IS-IS. Follow Figure 66 to configure the IP address and subnet mask of each interface.
T2 Timer Status: Remaining Time: 59 IS-IS(1) Level-2 Restart Status Restart Interval: 150 SA Bit Supported Total Number of Interfaces = 1 Restart Status: RESTARTING Number of LSPs Awaited: 3 T3 Timer Status: Remaining Time: 140 T2 Timer Status: Remaining Time: 59 IS-IS NSR configuration example Network requirements Switch S, Switch A, and Switch B belong to the same IS-IS routing domain as illustrated in...
Page 197
if routes from Switch A to the loopback interface on Switch B and from Switch B to the loopback interface on Switch A exist. # When a master/slave switchover occurs on Switch S, display IS-IS neighbors and routes on Switch A. <SwitchA>...
Interface: vlan200 Circuit Id: 0000.0000.0001.01 State: Up HoldTime: 25s Type: L1(L1L2) PRI: 64 System Id: 0000.0000.0001 Interface: vlan200 Circuit Id: 0000.0000.0001.01 State: Up HoldTime: 27s Type: L2(L1L2) PRI: 64 <SwitchB> display isis route Route information for ISIS(1) ----------------------------- ISIS(1) IPv4 Level-1 Forwarding Table ------------------------------------- IPV4 Destination IntCost...
Page 199
Figure 68 Network diagram for IS-IS FRR configuration Switch A Link B Link A Loop 0 Loop 0 1.1.1.1/32 4.4.4.4/32 Vlan-int200 Vlan-int200 13.13.13.1/24 13.13.13.2/24 Switch S Switch D Configuration procedure Configure IP addresses for the interfaces on each switch and configure IS-IS. Follow Figure 68 to configure the IP address and subnet mask of each interface on the switches.
IS-IS authentication configuration example Network requirements As shown in Figure 69, Switch A, Switch B, Switch C and Switch D reside in the same IS-IS routing domain. Switch A, Switch B, and Switch C belong to Area 10, and Switch D belongs to Area 20. Configure relationship authentication between neighbors.
Page 205
[SwitchB-Vlan-interface10] bfd detect-multiplier 8 [SwitchB-Vlan-interface10] return Verify the configuration. The following configurations are made on Switch A. Configurations for Switch B are similar. (Details not shown) # Display the BFD information of Switch A. <SwitchA> display bfd session Total Session Num: 1 Init Mode: Active Session Working Under Ctrl Mode: LD/RD...
Page 206
#Aug 14:54:05:363 2008 SwitchA ISIS/4/ADJ_CHANGE:TrapID(1.3.6.1.2.1.138.0.17<isisAdjacencyChange>), ISIS Level-2 Adjencency IN Circuit-983041 State Change. #Aug 14:54:05:364 2008 SwitchA ISIS/4/ADJ_CHANGE:TrapID(1.3.6.1.2.1.138.0.17<isisAdjacencyChange>), ISIS Level-1 Adjencency IN Circuit-983041 State Change. %Aug 8 14:54:05:365 2008 SwitchA IFNET/4/LINK UPDOWN: Vlan-interface10 link status is DOWN %Aug 8 14:54:05:366 2008 SwitchA IFNET/4/UPDOWN: Line protocol on the interface Vlan-interface10 is DOWN %Aug 14:54:05:367...
BGP configuration The Border Gateway Protocol (BGP) is a dynamic inter-AS Exterior Gateway Protocol. NOTE: router The term refers to both routers and Layer 3 switches, and BGP refers to BGP-4 in this document. • The S5500-SI Switch Series does not support BGP. •...
Page 208
Keepalive • • Route-refresh They have the same header. Figure 71 BGP message header • Marker—The 16-byte field is used to delimit BGP messages. The Marker must be all ones. Length—The two-byte unsigned integer indicates the total length of the message. •...
Page 209
Optional parameters—Used for multiprotocol extensions and other functions. • Update The update messages are used to exchange routing information between peers. It can advertise feasible routes or remove multiple unfeasible routes. Figure 73 BGP update message format Each update message can advertise a group of feasible routes with identical attributes, and the routes are contained in the network layer reachability information (NLRI) field.
Keepalive Keepalive messages are sent between peers to maintain connectivity. Its format contains only the message header. Route-refresh A route-refresh message is sent to a peer to request the specified address family routing information. Figure 75 BGP route-refresh message format AFI—Address family identifier •...
Page 211
Name Category CLUSTER_LIST Optional non-transitive Usage of BGP path attributes ORIGIN ORIGIN is a well-known mandatory attribute that defines the origin of routing information (how a route became a BGP route). This attribute has the following types: • IGP—Has the highest priority. Routes added to the BGP routing table using the network command have the IGP attribute.
Page 212
Use the AS_PATH attribute for route selection and filtering. BGP gives priority to the route with the shortest AS_PATH length, if other factors are the same. As shown in Figure 76, the BGP router in AS50 gives priority to the route passing AS40 for sending data to the destination 8.0.0.0. In some applications, you can apply a routing policy to control BGP route selection by modifying the AS_PATH length.
Page 213
Figure 78 MED attribute MED = 0 Router B 2.1.1.1 D = 9.0.0.0 IBGP Next_hop = 2.1.1.1 9.0.0.0 MED = 0 EBGP Router D Router A IBGP EBGP D = 9.0.0.0 IBGP Next_hop = 3.1.1.1 MED = 100 3.1.1.1 AS 10 Router C AS 20 MED = 100...
based on the COMMUNITY attribute values. This simplifies routing policy usage and facilitates management and maintenance. Well-known community attributes are as follows: • Internet: By default, all routes belong to the Internet community. Routes with this attribute can be advertised to all BGP peers. No_Export: After received, routes with this attribute cannot be advertised out the local AS or out the •...
Page 215
IGP routing protocols such as RIP and OSPF compute metrics of routes, and then implement load • balancing over routes with the same metric and to the same destination. The route selection criterion is metric. • BGP has no route computation algorithm, so it cannot implement load balancing according to metrics of routes.
A BGP speaker advertises routes learned through iBGP to eBGP peers. If BGP and IGP • synchronization is disabled, those routes are advertised to eBGP peers directly. If the feature is enabled, only after IGP advertises those routes, can BGP advertise the routes to eBGP peers. •...
Page 217
When a route flap occurs, the routing protocol sends an update to its neighbor, and then the neighbor must recalculate routes and modify the routing table. Frequent route flaps consume large bandwidth and CPU resources, which could affect network operation. In most cases, BGP is used in complex networks, where route changes are more frequent.
Page 218
Besides using well-known community attributes, you can define extended community attributes by using a community list to define a routing policy. Route reflector iBGP peers must be fully meshed to maintain connectivity. If n routers exist in an AS, the number of iBGP connections is n (n- 1 )/2, and large amounts of network and CPU resources are consumed.
NOTE: After route reflection is disabled between clients, routes can still be reflected between a client and a non-client. Confederation Confederation is another method to manage growing iBGP connections in ASs. This method splits an AS into multiple sub-ASs. In each sub-AS, iBGP peers are fully meshed, and, as shown in Figure intra-confederation eBGP connections are established between sub-ASs.
session. If neither party has the GR capability, the session established between them will not be GR capable. When a Master/Slave switchover occurs on the GR Restarter, sessions on it will go down. Then, GR-capable peers will mark all routes associated with the GR Restarter as stale. However, during the configured GR Time, they still use these routes for packet forwarding.
Task Remarks Configuring the BGP keepalive interval and Optional holdtime Configuring the interval for sending the same Optional update Configuring BGP soft-reset Optional Enabling the BGP ORF capability Optional Tuning and optimizing BGP networks Enabling 4-byte AS number suppression Optional Enabling quick eBGP session reestablishment Optional Enabling MD5 authentication for TCP connections...
If a BGP router has multiple links to a peer, and the source interface fails, BGP must reestablish TCP connections, causing network oscillation. To enhance stability of BGP connections, H3C recommends using a loopback interface as the source interface.
To do… Use the command… Remarks Enter BGP view bgp as-number — Required By default, BGP uses the outbound Specify the source interface for peer { group-name | ip-address } interface of the best route to the BGP establishing TCP connections to a connect-interface interface-type peer or peer group as the source peer or peer group...
Injecting a local network In BGP view, you can inject a local network to allow BGP to advertise to BGP peers. The origin attribute of routes advertised in this way is IGP. You can also reference a routing policy to flexibly control route advertisement.
To do… Use the command… Remarks Required import-route protocol [ { process-id Not redistributed by default Enable route redistribution from a | all-processes } [ allow-direct | The allow-direct keyword is routing protocol into BGP med med-value | route-policy available only when the specified route-policy-name ] * ] routing protocol is OSPF.
To do… Use the command… Remarks aggregate ip-address { mask | mask-length } Required [ as-set | attribute-policy route-policy-name | Configure manual route detail-suppressed | origin-policy Not configured by summarization route-policy-name | suppress-policy default. route-policy-name ]* Advertising a default route to a peer or peer group After this task is configured, the BGP router sends a default route with the next hop being itself to the specified peer or peer group.
To do… Use the command… Remarks Required filter-policy { acl-number | ip-prefix ip-prefix-name } export Configure at least one command. Configure the filtering of [ direct | isis process-id | ospf redistributed routes Not configured by default. process-id | rip process-id | | You can configure a filtering policy static ] as needed.
in addition to the reachability check of the next hop, the BGP router must find an active IGP route with the same destination network segment before it can advertise the iBGP route (use the display ip routing-table protocol command to check the IGP route state). Follow these steps to enable BGP and IGP synchronization: To do…...
To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Required dampening [ half-life-reachable Configure BGP route dampening half-life-unreachable reuse suppress ceiling | Not configured by route-policy route-policy-name ] * default. Configuring a shortcut route An eBGP route received has a priority of 255, which is lower than a local route.
Configuring preferences for BGP routes A router can run multiple routing protocols with each having a preference. If they find the same route, the route found by the routing protocol with the highest preference is selected. This task allows you to configure preferences for external, internal, and local BGP routes, and reference a routing policy to set preferences for matching routes as needed.
Page 232
To do… Use the command… Remarks Optional Configure the default MED value default med med-value 0 by default Enable the comparison of MED of routes from different ASs Follow these steps to enable the comparison of MED of routes from different ASs: To do…...
problem. The following output is the BGP routing table on Router D after the comparison of MED of routes from each AS is enabled. Network 10.0.0.0 learned from Router C is the optimal route. Network NextHop LocPrf PrefVal Path/Ogn *>i 10.0.0.0 3.3.3.3 200e...
Figure 87 Next hop attribute configuration 1 If a BGP router has two peers on a common broadcast network, it does not set itself as the next hop for routes sent to an eBGP peer by default. As shown in Figure 88, Router A and Router B establish an eBGP neighbor relationship, and Router B and Router C establish an iBGP neighbor relationship.
Page 235
To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Optional Permit local AS number to appear in routes peer { group-name | ip-address } from a peer or peer group and specify the By default, the local AS allow-as-loop [ number ] appearance times...
Page 236
Figure 89 AS number substitution configuration AS 100 PE 1 PE 2 MPLS backbone EBGP_Update:10.1.1.1/32 EBGP_Update:10.1.1.1/32 VPNv4_Update:10.1.0.0/16 AS_PATH:100,100 AS_PATH:800 RD:10.1.1.1/32 AS_PATH:800 CE 1 CE 2 AS 800 AS 800 As shown in the above figure, CE 1 and CE 2 use the same AS number of 800. If AS number substitution for CE 2 is configured on PE 2, and PE 2 receives a BGP update sent from CE 1, PE 2 replaces AS number 800 as its own AS number 100.
To do… Use the command… Remarks Required Configure BGP to ignore the first AS number By default, BGP checks the ignore-first-as of eBGP route updates first AS number of eBGP route updates. Tuning and optimizing BGP networks Configuration prerequisites BGP connections must be created. Configuring the BGP keepalive interval and holdtime After establishing a BGP connection, two routers send keepalive messages periodically to each other to keep the connection.
NOTE: The maximum keepalive interval must be one third of the holdtime and no less than one second. The • holdtime is no less than three seconds unless it is set to 0. The intervals set with the peer timer command are preferred to those set with the timer command. •...
To do… Use the command… Remarks peer { group-name | ip-address } Optional Enable BGP route refresh for a peer or peer capability-advertise group Enabled by default route-refresh Configure manual soft-reset If a BGP peer does not support route-refresh, you must save updates from the peer on the local router by using the peer keep-all-routes command, and use the refresh bgp command to refresh the BGP routing table.
To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Required Enable BGP route refresh for a peer { group-name | ip-address } peer or peer group capability-advertise route-refresh Enabled by default. Optional By default, standard BGP ORF Enable the non-standard ORF peer { group-name | ip-address }...
NOTE: If the peer device supports 4-byte AS numbers, do not enable the 4-byte AS number suppression function; otherwise, the BGP peer relationship cannot be established. Enabling quick eBGP session reestablishment If the router receives no keepalive messages from a BGP peer within the holdtime, it disconnects from the peer.
To do… Use the command… Remarks Optional Configure the maximum number of BGP balance number Load balancing is not routes for load balancing enabled by default. Forbiding session establishment with a peer or peer group Follow these steps to forbid session establishment with a peer or peer group: To do…...
Page 243
To do… Use the command… Remarks Enter BGP view bgp as-number — Create an iBGP peer group group group-name [ internal ] Required Add a peer into the iBGP peer peer ip-address group Required group group-name Configure an eBGP peer group If peers in an eBGP group belong to the same external AS, the eBGP peer group is a pure eBGP peer group;...
To do… Use the command… Remarks Required The AS number can be either specified or not specified in the peer ip-address group command. If specified, the AS Add the peer into the group group-name [ as-number number must be the same as that as-number ] specified for the peer with the peer ip-address as-number as-number...
To do… Use the command… Remarks or peer group default. Advertise the extended peer { group-name | ip-address } community attribute to a advertise-ext-community peer or peer group Required Apply a routing policy to routes advertised to a peer { group-name | ip-address } Not configured by peer or peer group route-policy route-policy-name export...
Configure a BGP confederation After you split an AS into multiple sub ASs, you can configure a router in a sub AS as follows: Enable BGP and specify the AS number of the router. Specify the confederation ID. From an outsider’s perspective, the sub ASs of the confederation is a single AS, which is identified by the confederation ID.
To do… Use the command… Remarks Enable BGP and enter its view bgp as-number — Required Enable GR Capability for BGP graceful-restart Disabled by default Configure the maximum time allowed Optional graceful-restart timer restart for the peer to reestablish a BGP timer 150 seconds by default session...
Configuring BFD for BGP BGP maintains neighbor relationships based on the keepalive timer and holdtime timer, which are set in seconds. BGP defines that the holdtime interval must be at least three times the keepalive interval. This slows down link failure detection; once a failure occurs on a high-speed link, a large quantity of packets will be dropped.
To do… Use the command… Remarks display bgp routing-table as-path-acl Display routing information as-path-acl-number [ | { begin | exclude | include } matching the AS path ACL regular-expression ] Display BGP CIDR routing display bgp routing-table cidr [ | { begin | exclude | information include } regular-expression ] display bgp routing-table community...
To do… Use the command… Remarks Reset the BGP connections to a peer group reset bgp group group-name Reset all iBGP connections reset bgp internal Reset all IPv4 unicast BGP connections reset bgp ipv4 all Clearing BGP information To do… Use the command…...
Page 252
[SwitchA-bgp] quit # Configure Switch B. [SwitchB] bgp 65009 [SwitchB-bgp] peer 3.1.1.2 as-number 65008 [SwitchB-bgp] quit # Display BGP peer information on Switch B. [SwitchB] display bgp peer BGP local router ID : 2.2.2.2 Local AS number : 65009 Total number of peers : 2 Peers in established state : 2 Peer MsgRcvd...
Page 253
Total Number of Routes: 1 BGP Local router ID is 3.3.3.3 Status codes: * - valid, ^ - VPNv4 best, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf...
Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf PrefVal Path/Ogn i 2.2.2.2/32 2.2.2.2 *>i 3.1.1.0/24 2.2.2.2 *>i 8.1.1.0/24 3.1.1.2 65008i * i 9.1.1.0/24 2.2.2.2 The output shows that the route 8.1.1.0 becomes valid with the next hop as Switch A. Verification.
Page 255
<SwitchB> system-view [SwitchB] ospf 1 [SwitchB-ospf-1] area 0 [SwitchB-ospf-1-area-0.0.0.0] network 2.2.2.2 0.0.0.0 [SwitchB-ospf-1-area-0.0.0.0] network 9.1.1.0 0.0.0.255 [SwitchB-ospf-1-area-0.0.0.0] quit [SwitchB-ospf-1] quit # Configure Switch C. <SwitchC> system-view [SwitchC] ospf 1 [SwitchC-ospf-1] import-route direct [SwitchC-ospf-1] area 0 [SwitchC-ospf-1-area-0.0.0.0] network 9.1.1.0 0.0.0.255 [SwitchC-ospf-1-area-0.0.0.0] quit [SwitchC-ospf-1] quit Configure the eBGP connection.
Page 256
Status codes: * - valid, ^ - VPNv4 best, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf PrefVal Path/Ogn *>...
--- 8.1.1.1 ping statistics --- 5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 2/2/2 ms BGP load balancing configuration Network requirements As shown in Figure 92, all the switches run BGP. Switch A resides in AS 65008, Switch B and Switch C in AS 65009.
Since Switch A has two routes to reach AS 65009, configuring load balancing over the two BGP routes on Switch A can improve link utilization. # Configure Switch A. [SwitchA] bgp 65008 [SwitchA-bgp] balance 2 [SwitchA-bgp] quit Verify the configuration. # Display the BGP routing table on Switch A.
BGP Local router ID is 3.3.3.3 Status codes: * - valid, ^ - VPNv4 best, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf...
Page 262
Figure 94 Network diagram Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure BGP connections. # Configure Switch A. <SwitchA> system-view [SwitchA] bgp 100 [SwitchA-bgp] router-id 1.1.1.1 [SwitchA-bgp] peer 192.1.1.2 as-number 200 # Inject network 1.0.0.0/8 to the BGP routing table. [SwitchA-bgp] network 1.0.0.0 [SwitchA-bgp] quit # Configure Switch B.
# Configure Switch C. [SwitchC] bgp 200 [SwitchC-bgp] peer 193.1.1.2 reflect-client [SwitchC-bgp] peer 194.1.1.2 reflect-client [SwitchC-bgp] quit Verify the configuration. # Display the BGP routing table on Switch B. [SwitchB] display bgp routing-table Total Number of Routes: 1 BGP Local router ID is 200.1.2.2 Status codes: * - valid, ^ - VPNv4 best, >...
Page 264
Figure 95 Network diagram Switch C Switch B Switch F Vlan-int600 Vlan-int300 Vlan-int200 AS 65002 AS 65003 Vlan-int100 Switch D AS 100 Vlan-int100 Vlan-int400 Vlan-int400 Switch A Vlan-int200 Vlan-int500 AS 65001 Vlan-int200 Vlan-int500 Switch E AS 200 Device Interface IP address Device Interface IP address...
Page 266
Total Number of Routes: 1 BGP Local router ID is 2.2.2.2 Status codes: * - valid, ^ - VPNv4 best, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf...
Origin : igp Attribute value : MED 0, localpref 100, pref-val 0, pre 255 State : valid, internal, best, Not advertised to any peers yet The output information shows the following: • Switch F can send route information to Switch B and Switch C through the confederation by establishing only an eBGP connection with Switch A.
Page 269
Method I: Configure a higher MED value for the route 1.0.0.0/8 advertised from Switch A to peer • 192.1.1.2. # Define an ACL numbered 2000 to permit route 1.0.0.0/8. [SwitchA] acl number 2000 [SwitchA-acl-basic-2000] rule permit source 1.0.0.0 0.255.255.255 [SwitchA-acl-basic-2000] quit # Define two routing policies, apply_med_50, which sets the MED for route 1.0.0.0/8 to 50, and apply_med_100, which sets the MED for route 1.0.0.0/8 to 100.
[SwitchC-route-policy] apply local-preference 200 [SwitchC-route-policy] quit # Apply routing policy localpref to routes from peer 193.1.1.1. [SwitchC] bgp 200 [SwitchC-bgp] peer 193.1.1.1 route-policy localpref import [SwitchC-bgp] quit # Display the routing table on Switch D. [SwitchD] display bgp routing-table Total Number of Routes: 2 BGP Local router ID is 194.1.1.1 Status codes: * - valid, ^ - VPNv4 best, >...
# Inject network 8.0.0.0/8 to the BGP routing table. [SwitchA-bgp] network 8.0.0.0 # Enable GR capability for BGP. [SwitchA-bgp] graceful-restart Configure Switch B. # Configure IP addresses for interfaces. (Details not shown) # Configure the eBGP connection. <SwitchB> system-view [SwitchB] bgp 65009 [SwitchB-bgp] router-id 2.2.2.2 [SwitchB-bgp] peer 200.1.1.2 as-number 65008 # Configure the iBGP connection.
Page 272
Figure 98 Network diagram Device Interface IP address Device Interface IP address Switch A Vlan-int100 3.0.1.1/24 Switch C Vlan-int101 3.0.2.2/24 Vlan-int200 2.0.1.1/24 Vlan-int201 2.0.2.2/24 Switch B Vlan-int100 3.0.1.2/24 Switch D Vlan-int200 2.0.1.2/24 Vlan-int101 3.0.2.1/24 Vlan-int201 2.0.2.1/24 Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure OSPF to make sure that Switch A and Switch C are reachable to each other.
Page 274
The following operations are made on Switch C. Operations on Switch A are similar. (Details not shown) # Display detailed BFD session information. <SwitchC> display bfd session verbose Total Session Num: 1 Init Mode: Active IP Session Working Under Ctrl Mode: Local Discr: 17 Remote Discr: 13 Source IP: 3.0.2.2...
Page 275
Destination: 1.1.1.0/24 Protocol: BGP Process ID: 0 Preference: 0 Cost: 100 NextHop: 2.0.1.1 Interface: Vlan-interface201 BkNextHop: 0.0.0.0 BkInterface: RelyNextHop: 2.0.2.1 Neighbor : 2.0.1.1 Tunnel ID: 0x0 Label: NULL State: Invalid Adv Age: 00h08m54s Tag: 0 The output shows that Switch C has two routes to reach network 1.1.1.0/24: Switch C<—>Switch B<—>Switch A, which is the active route;...
Troubleshooting BGP BGP peer relationship not established Symptom Display BGP peer information by using the display bgp peer command. The state of the connection to a peer cannot become established. Analysis To become BGP peers, any two routers must establish a TCP session using port 179 and exchange Open messages successfully.
IPv6 static routing configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. • The S5500-SI Switch Series does not support VPN-related parameters. • Introduction to IPv6 static routing Static routes are manually configured. They work well in simple networks. Proper configuration and use can improve network performance and ensure enough bandwidth for important applications.
RIPng configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. • The S5500-SI Switch Series does not support VPN-related parameters. • Introduction to RIPng RIP next generation (RIPng) is an extension of RIP-2 for IPv4. Most RIP concepts are applicable in RIPng. RIPng for IPv6 has the following basic differences from RIP: •...
RIPng packet format Basic format A RIPng packet consists of a header and multiple route table entries (RTEs). The maximum number of RTEs in a packet depends on the IPv6 MTU of the sending interface. Figure 100 RIPng basic packet format Packet header description: Command: Type of message.
RIPng packet processing procedure Request packet When a RIPng router first starts or needs to update entries in its routing table, usually a multicast request packet is sent to ask for needed routes from neighbors. The receiving RIPng router processes RTEs in the request. If only one RTE exists with the IPv6 prefix and prefix length both being 0, and with a metric value of 16, the RIPng router will respond with the entire routing table information in response messages.
Configuring RIPng basic functions This section presents the information to configure the basic RIPng features. You must enable RIPng first before configuring other tasks, but it is not necessary for RIPng-related interface configurations, such as assigning an IPv6 address. Configuration prerequisites Before configuring RIPng basic functions, complete the following tasks: •...
Define an IPv6 address prefix list before using it for route filtering. See the chapter “Routing policy • configuration” for related information. Configuring an additional routing metric An additional routing metric can be added to the metric of an inbound or outbound RIP route. The outbound additional metric is added to the metric of a sent route.
Configuring a RIPng route filtering policy Reference a configured IPv6 ACL or prefix list to filter received or advertised routing information. You can also filter outbound routes redistributed from a routing specific routing protocol. Follow these steps to configure a RIPng route filtering policy: To do…...
Tuning and optimizing the RIPng network This section describes how to tune and optimize the performance of the RIPng network, as well as applications under special network environments. Before tuning and optimizing the RIPng network, complete the following tasks: Configure a network layer address for each interface •...
NOTE: H3C recommends enabling split horizon to prevent routing loops. Configuring the poison reverse function The poison reverse function enables a route learned from an interface to be advertised through the interface. However, the metric of the route is set to 16 (unreachable).
Applying IPsec policies for RIPng To protect routing information and defend attacks, RIPng supports using an IPsec policy to authenticate protocol packets. Outbound RIPng packets carry the Security Parameter Index (SPI) defined in the relevant IPsec policy. A device uses the SPI carried in a received packet to match against the configured IPsec policy. If they match, the device accepts the packet;...
Displaying and maintaining RIPng To do… Use the command… Remarks display ripng [ process-id | Display configuration information vpn-instance vpn-instance-name ] Available in any view of a RIPng process [ | { begin | exclude | include } regular-expression ] display ripng process-id database Display routes in the RIPng [ | { begin | exclude | include }...
Page 292
Route Flags: A - Aging, S - Suppressed, G - Garbage-collect ---------------------------------------------------------------- Peer FE80::200:2FF:FE64:8904 on Vlan-interface100 Dest 1::/64, via FE80::200:2FF:FE64:8904, cost 1, tag 0, A, 31 Sec Dest 4::/64, via FE80::200:2FF:FE64:8904, cost 2, tag 0, A, 31 Sec Dest 5::/64, via FE80::200:2FF:FE64:8904, cost 2, tag 0, A, 31 Sec Dest 3::/64,...
Configuring RIPng route redistribution Network requirements Two RIPng processes are running on Switch B, which communicates with Switch A through RIPng 100 and with Switch C through RIPng 200. Configure route redistribution on Switch B, letting the two RIPng processes redistribute routes from each other.
Page 297
[SwitchB-ipsec-proposal-tran1] quit [SwitchB] ipsec policy policy001 10 manual [SwitchB-ipsec-policy-manual-policy001-10] proposal tran1 [SwitchB-ipsec-policy-manual-policy001-10] sa spi outbound esp 12345 [SwitchB-ipsec-policy-manual-policy001-10] sa spi inbound esp 12345 [SwitchB-ipsec-policy-manual-policy001-10] sa string-key outbound esp abcdefg [SwitchB-ipsec-policy-manual-policy001-10] sa string-key inbound esp abcdefg [SwitchB-ipsec-policy-manual-policy001-10] quit # On Switch C, create an IPsec proposal named tran1, and set the encapsulation mode to transport mode, the security protocol to ESP, the encryption algorithm to DES, and authentication algorithm to SHA1;...
OSPFv3 configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. • The S5500-SI Switch Series does not support OSPFv3. • Introduction to OSPFv3 OSPFv3 overview Open Shortest Path First version 3 (OSPFv3) supports IPv6 and complies with RFC 2740 (OSPF for IPv6). OSPFv3 and OSPFv2 have the following similarities: 32-bits router ID and area ID •...
Packet length—Packet length in bytes, including header. • • Instance ID—Instance ID for a link. 0—Reserved. It must be 0. • OSPFv3 LSA types OSPFv3 sends routing information in LSAs, which, as defined in RFC 2740, have the following types: Router-LSA—Originated by all routers.
After sending an LSA to its adjacency, a router waits for an acknowledgment from the adjacency. If no response is received after the retransmission interval elapses, the router will send the LSA again. The retransmission interval must be longer than the round-trip time of the LSA. LSA delay time Each LSA has an age in the local LSDB (incremented by one per second), but an LSA does not age on transmission.
Task Remarks Configuring an OSPFv3 cost for an interface Optional Configuring the maximum number of OSPFv3 Optional load-balanced routes Configuring a priority for OSPFv3 Optional Configuring OSPFv3 route redistribution Optional Configuring OSPFv3 timers Optional Configuring a DR priority for an interface Optional Tuning and optimizing OSPFv3 Ignoring MTU check for DD packets...
To do… Use the command… Remarks Specify a router ID router-id router-id Required interface interface-type Enter interface view — interface-number Required Enable an OSPFv3 process on the ospfv3 process-id area area-id interface [ instance instance-id ] Not enabled by default Configuring OSPFv3 area parameters The stub area and virtual link features of OSPFv3 are the same as OSPFv2.
NOTE: You cannot remove an OSPFv3 area directly. The area can be removed only when you remove all • configurations in area view and all interfaces attached to the area become down. All the routers attached to a stub area must be configured with the stub command. The keyword •...
Configuration prerequisites Before configuring OSPFv3 network types, complete the following tasks: Configure IPv6 functions • Configure OSPFv3 basic functions • Configuring the OSPFv3 network type for an interface Follow these steps to configure the OSPFv3 network type for an interface: To do…...
Configuring OSPFv3 route summarization If contiguous network segments exist in an area, use the abr-summary command to summarize them into one network segment on the ABR. The ABR will advertise only the summary route. Any LSA in the specified network segment will not be advertised, reducing the LSDB size in other areas. Follow these steps to configure route summarization: To do…...
To do… Use the command… Remarks Enter system view system-view — interface interface-type Enter interface view — interface-number Optional The default cost depends on the interface type: Configure an OSPFv3 cost ospfv3 cost value [ instance 1 for a VLAN interface; 0 for a loopback for the interface instance-id ] interface;...
Configuring OSPFv3 route redistribution Follow these steps to configure OSPFv3 route redistribution: To do… Use the command… Remarks Enter system view system-view — Enter OSPFv3 view ospfv3 [ process-id ] — Optional Specify a default cost for default cost value redistributed routes Defaults to 1 Required...
Configuration prerequisites Before tuning and optimizing OSPFv3 networks, complete the following tasks: Enable IPv6 packet forwarding • Configure OSPFv3 basic functions • Configuring OSPFv3 timers Follow these steps to configure OSPFv3 timers: To do… Use the command… Remarks Enter system view system-view —...
Configuring a DR priority for an interface Follow these steps to configure a DR priority for an interface: To do… Use the command… Remarks Enter system view system-view — Enter interface view interface interface-type interface-number — Optional Configure a DR priority ospfv3 dr-priority priority [ instance instance-id ] Defaults to 1 NOTE:...
Enable the logging of neighbor state changes Follow these steps to enable the logging of neighbor state changes: To do… Use the command… Remarks Enter system view system-view — Enter OSPFv3 view ospfv3 [ process-id ] — Required Enable the logging of neighbor log-peer-change state changes Enabled by default...
Configuring GR Helper You can configure the GR Helper capability on a GR Helper. Follow these steps to configure GR Helper To do… Use the command… Remarks Enter system view system-view — Enter OSPFv3 view ospfv3 [ process-id ] — Optional Enable the GR Helper graceful-restart helper enable...
Applying IPsec policies for OSPFv3 To protect routing information and defend attacks, OSPFv3 can authenticate protocol packets by using an IPsec policy. Outbound OSPFv3 packets carry the Security Parameter Index (SPI) defined in the relevant IPsec policy. A device uses the SPI carried in a received packet to match against the configured IPsec policy. If they match, the device accepts the packet;...
To do… Use the command… Remarks Enter system view system-view — Enter OSPFv3 view ospfv3 [ process-id ] — Enter OSPF area view area area-id — vlink-peer router-id [ hello seconds | Required Apply an IPsec policy on a retransmit seconds | trans-delay seconds virtual link | dead seconds | instance instance-id | Not configured by default...
Page 316
3.3.3.3 Full/DR 00:00:39 Vlan100 OSPFv3 Area ID 0.0.0.1 (Process 1) ---------------------------------------------------------------------- Neighbor ID State Dead Time Interface Instance ID 1.1.1.1 Full/Backup 00:00:38 Vlan200 # Display OSPFv3 neighbor information on Switch C. [SwitchC] display ospfv3 peer OSPFv3 Area ID 0.0.0.0 (Process 1) ---------------------------------------------------------------------- Neighbor ID State...
Page 317
[SwitchC-ospfv3-1] area 2 [SwitchC-ospfv3-1-area-0.0.0.2] stub [SwitchC-ospfv3-1-area-0.0.0.2] default-cost 10 # Display OSPFv3 routing table information on Switch D. A default route is added, and its cost is the cost of a direct route plus the configured cost. [SwitchD] display ospfv3 routing E1 - Type 1 external route, IA - Inter area route, - Intra area route...
NextHop : directly-connected Interface: Vlan400 Configuring OSPFv3 DR election Network requirements As shown in Figure 108: • The priority of Switch A is 100, the highest priority on the network, so it will be the DR. The priority of Switch C is 2, the second highest priority on the network, so it will be the BDR. •...
[SwitchC-Vlan-interface100] ospfv3 dr-priority 2 [SwitchC-Vlan-interface100] quit # Display neighbor information on Switch A. DR priorities have been updated, but the DR and BDR are not changed. [SwitchA] display ospfv3 peer OSPFv3 Area ID 0.0.0.0 (Process 1) ---------------------------------------------------------------------- Neighbor ID State Dead Time Interface Instance ID...
Page 321
Configure OSPFv3 process 2 to redistribute direct routes and the routes from OSPFv3 process 1 on Switch B and set the default metric for redistributed routes to 3. Then, Switch C can learn the routes destined for 1::0/64 and 2::0/64, and Switch A cannot learn the routes destined for 3::0/64 or 4::0/64.
After all switches function properly, perform a master/slave switchover on Switch A to trigger an OSPFv3 GR operation. Configuring BFD for OSPFv3 Network requirements Figure 1 1 1, configure OSPFv3 on Switch A, Switch B and Switch C and configure BFD over the link Switch A<—>L2 Switch<—>Switch B.
Page 326
[SwitchB] ospfv3 [SwitchB-ospf-1] router-id 2.2.2.2 [SwitchB-ospf-1] quit [SwitchB] interface vlan-interface 10 [SwitchB-Vlan-interface10] ospfv3 1 area 0 [SwitchB-Vlan-interface10] quit [SwitchB] interface vlan-interface 13 [SwitchB-Vlan-interface13] ospfv3 1 area 0 [SwitchB-Vlan-interface13] quit # Configure Switch C. Enable OSPFv3 and configure the router ID as 3.3.3.3. <SwitchC>...
Page 327
Local Discr: 1441 Remote Discr: 1450 Source IP: FE80::20F:FF:FE00:1202 (link-local address of VLAN-interface 10 on Switch A) Destination IP: FE80::20F:FF:FE00:1200 (link-local address of VLAN-interface 10 on Switch B) Session State: Up Interface: Vlan10 Hold Time: # Display routes to 2001:4::0/64 on Switch A, and you can see that Switch A communicates with Switch B through the Layer 2 switch.
# Display the BFD information of Switch A. You can see that Switch A has removed its neighbor relationship with Switch B and therefore no information is output. <SwitchA> display bfd session # Display routes to 2001:4::0/64 on Switch A, and you can see that Switch A communicates with Switch B through Switch C.
Page 329
[SwitchA-ospfv3-1] quit [SwitchA] interface vlan-interface 200 [SwitchA-Vlan-interface200] ospfv3 1 area 1 [SwitchA-Vlan-interface200] quit # Configure Switch B: enable OSPFv3 and configure the router ID as 2.2.2.2. <SwitchB> system-view [SwitchB] ipv6 [SwitchB] ospfv3 1 [SwitchB-ospfv3-1] router-id 2.2.2.2 [SwitchB-ospfv3-1] quit [SwitchB] interface vlan-interface 100 [SwitchB-Vlan-interface100] ospfv3 1 area 0 [SwitchB-Vlan-interface100] quit [SwitchB] interface vlan-interface 200...
Page 330
tran1, set the SPIs of the inbound and outbound SAs to 12345, and the keys for the inbound and outbound SAs using ESP to abcdefg; create an IPsec proposal named tran2, and set the encapsulation mode to transport mode, the security protocol to ESP, the encryption algorithm to DES, and authentication algorithm to SHA1;...
Incorrect routing information Symptom OSPFv3 cannot find routes to other areas. Analysis The backbone area must maintain connectivity to all other areas. If a router connects to more than one area, at least one area must be connected to the backbone. The backbone cannot be configured as a stub area.
IPv6 IS-IS configuration NOTE: IPv6 IS-IS supports all IPv4 IS-IS features, but advertises IPv6 routing information. This document • describes only IPv6 IS-IS exclusive configuration tasks. For other configuration tasks, see the chapter “IS-IS configuration.” router The term in this document refers to both routers and Layer 3 switches. •...
To do… Use command to… Remarks Enter system view system-view –– Required Enable an IS-IS process and enter isis [ process-id ] IS-IS view Not enabled by default Required Configure the network entity title network-entity net for the IS-IS process Not configured by default Required Enable IPv6 for the IS-IS process...
To do… Use command to… Remarks Optional Configure the maximum number of redistributed Level 1/Level 2 ipv6 import-route limit number The default varies with IPv6 routes devices. ipv6 filter-policy { acl6-number | ipv6-prefix Optional Configure the filtering of ipv6-prefix-name | route-policy Not configured by outgoing redistributed routes route-policy-name } export [ protocol...
NOTE: High Availability Configuration Guide For more information about BFD, see Displaying and maintaining IPv6 IS-IS To do… Use the command… Remarks display isis brief [ | { begin | exclude | Display brief IPv6 IS-IS information Available in any view include } regular-expression ] display isis debug-switches { process-id | Display the status of the debug...
IPv6 IS-IS configuration examples IPv6 IS-IS basic configuration example Network requirements As shown in Figure 1 13, Switch A, Switch B, Switch C, and Switch D reside in the same autonomous system, and all are enabled with IPv6. Switch A and Switch B are Level- 1 switches, Switch D is a Level-2 switch, and Switch C is a Level- 1 -2 switch. Switch A, Switch B, and Switch C are in area 10, and Switch D is in area 20.
Page 339
Flag : D/L/- Cost : 10 Next Hop : Direct Interface: Vlan100 Destination: 2001:2:: PrefixLen: 64 Flag : R/-/- Cost : 20 Next Hop : FE80::200:FF:FE0F:4 Interface: Vlan100 Destination: 2001:3:: PrefixLen: 64 Flag : R/-/- Cost : 20 Next Hop : FE80::200:FF:FE0F:4 Interface: Vlan100 Flags: D-Direct, R-Added to RM, L-Advertised in LSPs, U-Up/Down Bit Set...
Page 340
Destination: 2001:2:: PrefixLen: 64 Flag : D/L/- Cost : 10 Next Hop : Direct Interface: Vlan200 Destination: 2001:3:: PrefixLen: 64 Flag : D/L/- Cost : 10 Next Hop : Direct Interface: Vlan300 Flags: D-Direct, R-Added to RM, L-Advertised in LSPs, U-Up/Down Bit Set ISIS(1) IPv6 Level-2 Forwarding Table ------------------------------------- Destination: 2001:1::...
Flag : D/L/- Cost : 10 Next Hop : Direct Interface: Vlan300 Destination: 2001:4::1 PrefixLen: 128 Flag : D/L/- Cost Next Hop : Direct Interface: Loop1 Flags: D-Direct, R-Added to RM, L-Advertised in LSPs, U-Up/Down Bit Set Configuring BFD for IPv6 IS-IS Network requirements As shown in Figure 1...
Page 343
[SwitchB-Vlan-interface10] bfd detect-multiplier 6 Verify configuration. The following operations are made on Switch A. Operations for Switch B are similar and are not shown here. # Display the BFD information of Switch A. <SwitchA> display bfd session Total Session Num: 1 Init Mode: Active IPv6 Session Working Under Ctrl Mode: Local Discr: 1441...
Page 344
# When the link between Switch B and the Layer-2 switch fails, BFD can quickly detect the failure. #Aug 8 14:54:05:362 2009 SwitchA IFNET/4/INTERFACE UPDOWN: Trap 1.3.6.1.6.3.1.1.5.3<linkDown>: Interface 983041 is Down, ifAdminStatus is 1, ifOperStatus is 2 #Aug 8 14:54:05:363 2009 SwitchA ISIS/4/ADJ_CHANGE:TrapID(1.3.6.1.2.1.138.0.17< isisAdjacencyChange>), ISIS Level-2 Adjencency IN Circuit-983041 State Change.
IPv6 BGP configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. • This chapter describes only configuration for IPv6 BGP. For BGP related information, see the chapter • “BGP configuration.” • The S5500-SI Switch Series does not support IPv6 BGP. IPv6 BGP overview BGP-4 was designed to carry only IPv4 routing information, so other network layer protocols such as IPv6 are not supported.
IPv6 BGP configuration task list Complete the following tasks to configure IPv6 BGP: Task Remarks Specifying an IPv6 BGP peer Required Injecting a local IPv6 route Optional Configuring a preferred value for routes from a Optional peer or peer group Specifying the source interface for establishing TCP Optional connections...
TCP connections, causing network oscillation. To enhance stability of IPv6 BGP connections, H3C recommends using a loopback interface as the source interface. Follow these steps to specify the source interface for establishing TCP connections to a BGP peer or peer group: To do…...
NOTE: To establish a BGP connection, specify on the local router the source interface for establishing the TCP connection to the peer on the peering BGP router. Otherwise, the local BGP router may fail to establish TCP connection to the peer when using the outbound interface of the best route as the source interface. Allowing the establishment of an indirect eBGP connection Follow these steps to allow the establishment of eBGP connection to an indirectly connected peer or peer group:...
To do… Use the command… Remarks Enter IPv6 address family view ipv6-family — Optional Disable session establishment to an IPv6 peer { ipv6-group-name | peer or peer group ipv6-address } ignore Not disabled by default Logging IPv6 peer or peer group state changes Follow these steps to configure to log on the session and event information of an IPv6 peer or peer group: To do…...
To do… Use the command… Remarks Required import-route protocol [ process-id [ med Enable route redistribution from another med-value | route-policy route-policy-name ] Not enabled by routing protocol default. NOTE: If the default-route imported command is not configured, using the import-route command cannot redistribute any IGP default route.
To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Enter IPv6 address family view ipv6-family — filter-policy { acl6-number | ipv6-prefix Required Configure the filtering of outgoing ipv6-prefix-name } export [ protocol routes Not configured by default.
To do… Use the command… Remarks Specify an AS path ACL to filter peer { ipv6-group-name | Required routing information imported from ipv6-address } as-path-acl Not specified by default. an IPv6 peer or peer group as-path-acl-number import Specify an IPv6 prefix list to filter peer { ipv6-group-name | Required routing information imported from...
NOTE: To ensure an iBGP peer can find the correct next hop, configure routes advertised to the IPv6 iBGP peer • or peer group to use the local router as the next hop. If BGP load balancing is configured, the local router specifies itself as the next hop of routes sent to an IPv6 iBGP peer or peer group regardless of whether the peer next-hop-local command is configured.
To do… Use the command… Remarks Optional Configure to carry only the public peer { ipv6-group-name | AS number in updates sent to a By default, IPv6 BGP updates carry ipv6-address } public-as-only peer or peer group a private AS number. Substitute the local AS number for Optional the AS number of an IPv6 peer or...
To do… Use the command… Remarks Enter IPv6 address family view ipv6-family — Specify keepalive timer keepalive keepalive hold interval and holdtime holdtime Optional Configure The keepalive interval defaults to Configure keepalive IPv6 BGP peer { ipv6-group-name | 60 seconds, holdtime defaults to interval and holdtime for timers ipv6-address } timer keepalive...
To do… Use the command… Remarks Return to user view return refresh bgp ipv6 { all | ipv6-address | group Required Soft-reset BGP connections ipv6-group-name | external | internal } { export manually | import } NOTE: If the peer keep-all-routes command is used, all routes from the peer or peer group are saved regardless of whether the filtering policy is available.
Table 6 Description of the both, send, and receive parameters and the negotiation result Local parameter Peer parameter Negotiation result receive The ORF sending capability is enabled locally and send the ORF receiving capability is enabled on the both peer. send The ORF receiving capability is enabled locally and receive...
To do… Use the command… Remarks Required Configure the maximum number of balance number By default, no load balancing is load balanced routes enabled. Enabling MD5 authentication for TCP connections IPv6 BGP employs TCP as the transport protocol. To enhance security, configure IPv6 BGP to perform MD5 authentication when establishing a TCP connection.
To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Enter IPv6 address family ipv6-family — view Required Apply an IPsec policy to a peer { group-name | ip-address } ipsec-policy peer or peer group policy-name Not configured by default NOTE:...
Page 362
To do… Use the command… Remarks peer ipv6-address group Required Add a peer into the group ipv6-group-name [ as-number Not added by default as-number ] Creating a pure eBGP peer group Follow these steps to configure a pure eBGP group: To do…...
Configuring IPv6 BGP community Advertise community attribute to an IPv6 peer or peer group Follow these steps to advertise community attribute to an IPv6 peer or peer group: To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number —...
• Because the route reflector forwards routing information between clients, you must make clients of a route reflector fully meshed. If clients are fully meshed, H3C recommends disabling route reflection between clients to reduce routing costs. If a cluster has multiple route reflectors, you must specify the same cluster ID for these route reflectors to •...
Displaying and maintaining IPv6 BGP Displaying BGP To do… Use the command… Remarks Display IPv6 BGP peer group display bgp ipv6 group [ ipv6-group-name ] [ | { begin Available in information | exclude | include } regular-expression ] any view Display IPv6 BGP advertised display bgp ipv6 network [ | { begin | exclude | routing information...
[SwitchD-bgp-af-ipv6] peer 102::1 as-number 200 Configure route reflector. # Configure Switch C as a route reflector, and configure Switch B and Switch D as its clients. [SwitchC-bgp-af-ipv6] peer 101::2 reflect-client [SwitchC-bgp-af-ipv6] peer 102::2 reflect-client Use the display bgp ipv6 routing-table command on Switch B and Switch D; both of them learned the network 1::/64.
Page 371
[SwitchB-bgp] quit Configure the eBGP connection. # Configure Switch C. <SwitchC> system-view [SwitchC] ipv6 [SwitchC] bgp 65009 [SwitchC-bgp] router-id 3.3.3.3 [SwitchC-bgp] ipv6-family [SwitchC-bgp-af-ipv6] group ebgp external [SwitchC-bgp-af-ipv6] peer 3::1 as-number 65008 [SwitchC-bgp-af-ipv6] peer 3::1 group ebgp [SwitchC-bgp-af-ipv6] quit [SwitchC-bgp] quit # Configure Switch B.
Page 372
IPsec proposal tran2, set the SPIs of the inbound and outbound SAs to 54321, and the keys for the inbound and outbound SAs using ESP to gfedcba. [SwitchB] ipsec proposal tran1 [SwitchB-ipsec-proposal-tran1] encapsulation-mode transport [SwitchB-ipsec-proposal-tran1] transform esp [SwitchB-ipsec-proposal-tran1] esp encryption-algorithm des [SwitchB-ipsec-proposal-tran1] esp authentication-algorithm sha1 [SwitchB-ipsec-proposal-tran1] quit [SwitchB] ipsec policy policy001 10 manual...
Route refresh capability has been enabled ORF advertise capability based on prefix (type 64): Local: both Negotiated: send Peer Preferred Value: 0 IPsec policy name: policy001, SPI :12345 Routing policy configured: No routing policy is configured BGP Peer is 3::2, remote AS 65009, Type: EBGP link BGP version 4, remote router ID 3.3.3.3...
Page 375
and notify it to IPv6 BGP. Then the link Switch A<—>Switch D<—>Switch C takes effect immediately. Figure 118 Network diagram Device Interface IP address Device Interface IP address Switch A Vlan-int100 3000::1/64 Switch C Vlan-int101 3001::3/64 Vlan-int200 2000::1/64 Vlan-int201 2001::3/64 Switch B Vlan-int100 3000::2/64...
Page 377
Configure the minimum interval for receiving BFD control packets as 500 milliseconds. • [SwitchC-Vlan-interface101] bfd min-receive-interval 500 Configure the detect multiplier as 7. • [SwitchC-Vlan-interface101] bfd detect-multiplier 7 [SwitchC-Vlan-interface101] return Verify the configuration. The following operations are made on Switch C. Operations on Switch A and Switch B are similar and are not shown.
The output shows that Switch C has one route to reach network 1200::0/64, that is, Switch C<—>Switch D<—>Switch A. Troubleshooting IPv6 BGP configuration IPv6 BGP peer relationship not established Symptom Display BGP peer information by using the display bgp ipv6 peer command. The state of the connection to the peer cannot become established.
Routing policy configuration Routing policies are used to receive, advertise, and redistribute only specific routes and modify the attributes of some routes. NOTE: Routing policy in this chapter involves both IPv4 routing policy and IPv6 routing policy. • The S5500-SI Switch Series does not support OSPF, BGP, IS-IS, OSPFv3, IPv6 BGP, IPv6 IS-IS, or FRR. •...
Page 381
An IP prefix list is configured to match the destination address of routing information. You can use the gateway option to allow only routing information from certain routers to be received. For gateway option information, see the chapters “RIP configuration” and “OSPF configuration.” An IP prefix list, identified by name, can comprise multiple items.
Routing policy configuration task list Complete the following tasks to configure a routing policy: Task Defining an IP-prefix list Defining an AS path list Defining filters Defining a community list Defining an extended community list Creating a routing policy Defining if-match clauses Configuring a routing policy Defining apply clauses Defining a continue clause...
[Sysname] ip ip-prefix abc index 10 deny 10.1.0.0 16 [Sysname] ip ip-prefix abc index 20 deny 10.2.0.0 16 [Sysname] ip ip-prefix abc index 30 deny 10.3.0.0 16 [Sysname] ip ip-prefix abc index 40 permit 0.0.0.0 0 less-equal 32 Define an IPv6 prefix list Identified by name, each IPv6 prefix list can comprise multiple items.
Follow these steps to define a community list: To do… Use the command… Remarks Enter system view system-view — ip community-list { basic-comm-list-num | basic Define a basic comm-list-name } { deny | permit } Required to define community list [ community-number-list ] [ internet | no-advertise either Define a...
To do… Use the command… Remarks Enter system view system-view — Create a routing policy, specify a route-policy route-policy-name { deny | permit } node for it, and enter routing policy Required node node-number view NOTE: If a routing policy node has the permit keyword specified, routing information matching all the if-match •...
To do… Use the command… Remarks if-match community Optional Match BGP routing information whose { { basic-community-list-number | community attribute is specified in the Not configured by comm-list-name } [ whole-match ] | community lists default. adv-community-list-number }&<1-16> Optional Match routes having the specified cost if-match cost value Not configured by default.
Page 387
To do… Use the command… Remarks Required route-policy route-policy-name Enter routing policy view { deny | permit } node node-number Not created by default. Optional Set the AS-PATH attribute for BGP apply as-path as-number&<1-10> routing information [ replace ] Not set by default. Delete the community attribute of Optional apply comm-list { comm-list-number...
To do… Use the command… Remarks apply fast-reroute Optional { backup-interface interface-type Configure FRR interface-number [ backup-nexthop Not configured by default. ip-address ] } NOTE: • The difference between IPv4 and IPv6 apply clauses is the command for setting the next hop for routing information.
192.168.2.0/24 Type2 192.168.1.2 192.168.2.2 Total Nets: 5 Intra Area: 1 Inter Area: 0 ASE: 4 NSSA: 0 Applying a routing policy to IPv6 route redistribution Network requirements As shown in Figure 120: Enable RIPng on Switch A and Switch B. •...
[SwitchA-route-policy] quit [SwitchA] route-policy static2ripng permit node 10 [SwitchA-route-policy] quit # Enable RIPng and apply the routing policy to static route redistribution. [SwitchA] ripng [SwitchA-ripng-1] import-route static route-policy static2ripng Configure Switch B. # Configure the IPv6 address for VLAN-interface 100. [SwitchB] ipv6 [SwitchB] interface vlan-interface 100 [SwitchB-Vlan-interface100] ipv6 address 10::2 32...
Page 394
Figure 121 Network diagram Configuration procedure Configure IP addresses for the interfaces. (Details not shown) Configure BGP. # Configure Switch A. <SwitchA> system-view [SwitchA] bgp 100 [SwitchA-bgp] router-id 1.1.1.1 [SwitchA-bgp] peer 1.1.1.2 as-number 300 # Configure Switch B. <SwitchB> system-view [SwitchB] bgp 200 [SwitchB-bgp] router-id 2.2.2.2 [SwitchB-bgp] peer 1.1.2.2 as-number 300...
Page 395
[SwitchA-bgp] network 6.6.6.6 24 # On Switch B, inject routes 7.7.7.7/24, 8.8.8.8/24, and 9.9.9.9/24 to BGP. [SwitchB-bgp] network 7.7.7.7 24 [SwitchB-bgp] network 8.8.8.8 24 [SwitchB-bgp] network 9.9.9.9 24 # Display the BGP routing table information of Switch D. [SwitchD-bgp] display bgp routing-table Total Number of Routes: 6 BGP Local router ID is 4.4.4.4 Status codes: * - valid, >...
Status codes: * - valid, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf PrefVal Path/Ogn *> 4.4.4.0/24 1.1.3.1 300 100i...
Policy-based routing configuration NOTE: The S5500-SI Switch Series does not support PBR. Introduction to PBR Policy-based routing (PBR) is a routing mechanism based on user-defined policies. Different from the traditional destination-based routing mechanism, PBR enables you to use a policy (based on the source address or other criteria) to route packets.
Concepts Policy A policy is used to route IP packets. A policy can consist of one or multiple nodes. Node A node is identified by a node number. The node with the smallest node number has the highest priority. A policy node consists of if-match and apply clauses. An if-match clause specifies a match criterion on a node, and an apply clause specifies an action to be taken on packets.
NOTE: ACL and QoS Configuration Guide For more information about QoS policies, see Configuring PBR (using a PBR policy) Defining a policy Follow these steps to define a policy: To do… Use the command… Remarks Enter system view system-view –– policy-based-route policy-name Create a policy or policy node and [ deny | permit ] node...
NOTE: If a policy has a node with no if-match clause configured, all packets can pass the policy node. • However, an action is taken according to the match mode, and the packets will not go to the next policy node for a match.
PBR and track Associated with a Track object, PBR can sense topology changes faster. You can associate PBR with a track entry when configuring the outgoing interface, default outgoing interface, next hop, and default next hop to dynamically determine link reachability. The PBR configuration takes effect when the status of the associated Track object is Positive or Invalid.
Applied globally—affects the traffic sent or received on all ports • • Applied to an interface—affects the traffic sent or received on the interface Applied to a VLAN—affects the traffic sent or received on all ports in the VLAN • NOTE: A QoS policy used for PBR applies only to traffic received on all ports, on an interface, or on all ports in a VLAN.
To do… Use the command… Remarks display ip policy-based-route setup Display the specified PBR routing { interface interface-type interface-number | Available in any view information local | policy-name } [ | { begin | exclude | include } regular-expression ] display ip policy-based-route statistics { interface interface-type interface-number | Display PBR statistics...
PBR configuration examples Configuring local PBR based on packet type Network requirements As shown in Figure 122, configure PBR on Switch A, so that all TCP packets are forwarded to next hop 1.1.2.2 and other packets are forwarded according to the routing table. Switch A is directly connected to Switch B and Switch C.
Configure Switch C. # Configure the IP address of VLAN-interface 20. <SwitchC> system-view [SwitchC] interface vlan-interface 20 [SwitchC-Vlan-interface20] ip address 1.1.3.2 255.255.255.0 [SwitchC-Vlan-interface20] quit Verify the configuration. # Telnet to Switch B (1.1.2.2/24) from Switch A. The operation succeeds. # Telnet to Switch C (1.1.3.2/24) from Switch A. The operation fails. <SwitchA>...
Page 406
Figure 123 Network diagram Configuration procedure NOTE: In this example, static routes are configured to ensure the reachability among devices. Configure Switch A. # Define ACL 3101 to match TCP packets. <SwitchA> system-view [SwitchA] acl number 3101 [SwitchA-acl-adv-3101] rule permit tcp [SwitchA-acl-adv-3101] quit # Configure Node 5 of policy aaa to forward TCP packets to next hop 1.1.2.2.
[SwitchA-Vlan-interface20] ip address 1.1.3.1 255.255.255.0 Configure Switch B. # Configure a static route to subnet 10.1 10.0.0/24. <SwitchB> system-view [SwitchB] ip route-static 10.110.0.0 24 1.1.2.1 # Configure the IP address of VLAN-interface 10. [SwitchB] interface vlan-interface 10 [SwitchB-Vlan-interface10] ip address 1.1.2.2 255.255.255.0 [SwitchB-Vlan-interface10] quit Configure Switch C.
Configuration procedure # Configure ACL 2000. <SwitchA> system-view [SwitchA] acl number 2000 [SwitchA-acl-basic-2000] rule 0 permit source any [SwitchA-acl-basic-2000] quit # Define a match criterion for class a to match ACL 2000. [SwitchA] traffic classifier a [SwitchA-classifier-a] if-match acl 2000 [SwitchA-classifier-a] quit # Configure the action of redirecting traffic to the next hop 202.1.1.2 for behavior a.
Page 409
<SwitchA> system-view [SwitchA] acl ipv6 number 2000 [SwitchA-acl6-basic-2000] rule 0 permit source any [SwitchA-acl6-basic-2000] quit # Define a match criterion for class a to match IPv6 ACL 2000. [SwitchA] traffic classifier a [SwitchA-classifier-a] if-match acl ipv6 2000 [SwitchA-classifier-a] quit # Configure the action of redirecting traffic to the next hop 202::2 for behavior a. [SwitchA] traffic behavior a [SwitchA-behavior-a] redirect next-hop 202::2 [SwitchA-behavior-a] quit...
The term Layer 3 interface in this chapter refers to route-mode (or Layer 3) Ethernet ports. You can set an Ethernet port to operate in route mode by using the port link-mode route command (see Layer 2—LAN Switching Configuration Guide). The MCE function is only available on the S5500-EI switch series. • MCE overview MPLS L3VPN overview MPLS L3VPN is a type of PE-based L3VPN technology for service provider VPN solutions.
Figure 126 Network diagram for MPLS L3VPN model VPN 1 VPN 2 Site 1 Site 3 Site 2 VPN 2 Site 4 VPN 1 CEs and PEs mark the boundary between the service providers and the customers. After a CE establishes adjacency with a directly connected PE, it advertises its VPN routes to the PE and learns remote VPN routes from the PE.
Page 412
Address space overlapping Each VPN independently manages the addresses it uses. The assembly of such addresses for a VPN is called an address space. The address spaces of VPNs may overlap. For example, if both VPN 1 and VPN 2 use the addresses on network segment 10.1 10.10.0/24, address space overlapping occurs.
An RD can be in one of the following formats distinguished by the Type field: • When the value of the Type field is 0, the Administrator subfield occupies two bytes, the Assigned number subfield occupies four bytes, and the RD format is 16-bit AS number:32-bit user-defined number.
How MCE works Figure 128 shows how an MCE maintains the routing entries of multiple VPNs and how an MCE exchanges VPN routes with PEs. Figure 128 Network diagram for the MCE function VPN 1 VPN 2 Site 1 Site 1 VLAN-int2 VLAN-int7 VLAN-int8...
Page 415
BGP within the VPN, the routes may be learned by other MCE devices, generating route loops. To prevent route loops, configure route tags for different VPN instances on each MCE. H3C recommends that you assign the same route tag to the same VPN on all MCEs.
connected with multiple sites in the same VPN, you can configure the MCE as a route reflector (RR) and configure the egress routers of the sites as clients, making the MCE reflect routing information between the sites. This eliminates the necessity for BGP connections between sites, reducing the number of BGP connections and simplifying network configuration.
Page 417
Follow these steps to create and configure a VPN instance: To do… Use the command… Remarks Enter system view system-view — Create a VPN instance and enter ip vpn-instance vpn-instance-name Required VPN instance view Configure an RD for the VPN route-distinguisher Required instance...
The VPN instance determines which routes it can accept and redistribute according to the • import-extcommunity in the VPN target. • The VPN instance determines how to change the VPN targets attributes for routes to be advertised according to the export-extcommunity in the VPN target. Follow these steps to configure route related attributes of a VPN instance: To do…...
Configuration prerequisites Before you configure routing on an MCE, complete the following tasks: On the MCE, configure VPN instances, and bind the VPN instances with the interfaces connected • to the VPN sites and those connected to the PE. • Configure the link layer and network layer protocols on related interfaces to ensure IP connectivity.
Page 420
To do… Use the command… Remarks Required Enable RIP on the interface network network-address By default, RIP is disabled on an attached to the specified network interface. import-route protocol [ process-id ] Required Redistribute remote site routes [ allow-ibgp ] [ cost cost | By default, no route is redistributed advertised by the PE route-policy route-policy-name |...
Page 421
NOTE: An OSPF process that is bound with a VPN instance does not use the public network router ID • configured in system view. Therefore, you must configure a router ID when starting the OSPF process. All OSPF processes for the same VPN must be configured with the same OSPF domain ID to ensure correct route advertisement.
Page 422
Configuring eBGP between MCE and VPN site To use eBGP for exchanging routing information between an MCE and VPN sites, you must configure a BGP peer for each VPN instance on the MCE, and redistribute the IGP routes of each VPN instance on the VPN sites.
Page 423
After you configure a BGP VPN instance, the BGP route exchange for the VPN instance is the same with the normal BGP VPN route exchange. For more information about BGP, see Layer 3—IP Routing Configuration Guide. Configure a VPN site Follow these steps to configure a VPN site: To do…...
NOTE: After you configure a VPN site as an iBGP peer of the MCE, the MCE does not advertise the BGP routes learned from the VPN site to other iBGP peers, including VPNv4 peers. Only when you configure the VPN site as a client of the RR (the MCE), does the MCE advertise routes learned from it to other iBGP peers.
Page 425
To do… Use the command… Remarks Enter system view system-view — Create a RIP process for a rip [ process-id ] vpn-instance VPN instance and enter RIP Required vpn-instance-name view Required Enable RIP on the interface attached to the specified network network-address By default, RIP is disabled on network...
Page 426
To do… Use the command… Remarks Optional Configure the default parameters for The default cost is 1, the default maximum default { cost cost | limit limit | tag tag | redistributed routes number of routes redistributed per time is type type } * (cost, route number, 1000, the default tag is 1, and default...
Page 427
Configuring eBGP between MCE and PE Follow these steps to configure eBGP between MCE and PE: To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Enter BGP-VPN instance view ipv4-family vpn-instance vpn-instance-name Required Configure the PE as the eBGP peer { group-name | ip-address }...
To do… Use the command… Remarks Optional By default, each RR in a cluster uses its own router ID as the cluster ID. Specify a cluster ID for the reflector cluster-id cluster-id If more than one RR exists in a route reflector cluster, use this command to configure the same cluster ID...
Page 429
To do… Use the command… Remarks display fib vpn-instance vpn-instance-name Display information about the FIB [ acl acl-number | ip-prefix ip-prefix-name ] Available in any view of a VPN instance [ | { begin | exclude | include } regular-expression ] display fib vpn-instance vpn-instance-name Display information about the FIB ip-address [ mask | mask-length ] [ |...
To do… Use the command… Remarks reset bgp vpn-instance vpn-instance-name ip-address flap-info Clear route flap history information reset bgp vpn-instance vpn-instance-name about a BGP peer of a VPN Available in user view flap-info [ ip-address [ mask | instance mask-length ] | as-path-acl as-path-acl-number | regexp as-path-regexp ] NOTE:...
Page 431
Figure 129 Network diagram Configuration procedure Assume that the system name of the MCE device is MCE, the system names of the edge devices of VPN 1 and VPN 2 are VR1 and VR2 respectively, and the system name of PE 1 is PE1. Configure the VPN instances on the MCE and PE 1.
Page 432
[MCE-Vlan-interface10] ip address 10.214.10.3 24 # Configure VLAN 20, add port GigabitEthernet 1/0/2 to VLAN 20, bind VLAN-interface 20 with VPN instance vpn2, and specify an IP address for VLAN-interface 20. [MCE-Vlan-interface10] quit [MCE] vlan 20 [MCE-vlan20] port gigabitethernet 1/0/2 [MCE-vlan20] quit [MCE] interface vlan-interface 20 [MCE-Vlan-interface20] ip binding vpn-instance vpn2...
Page 433
# Run RIP in VPN 2. Create RIP process 20 and bind it with VPN instance vpn2 on the MCE, so that the MCE can learn the routes of VPN 2 and add them to the routing table of the VPN instance vpn2. [MCE] rip 20 vpn-instance vpn2 # Advertise subnet 10.214.20.0.
Page 434
[MCE-Vlan-interface30] ip binding vpn-instance vpn1 [MCE-Vlan-interface30] ip address 30.1.1.1 24 [MCE-Vlan-interface30] quit # On the MCE, create VLAN 40 and VLAN-interface 40, bind the VLAN interface with VPN instance vpn2, and configure an IP address for the VLAN interface. [MCE] vlan 40 [MCE-vlan40] quit [MCE] interface vlan-interface 40 [MCE-Vlan-interface40] ip binding vpn-instance vpn2...
[PE1-ospf-10-area-0.0.0.0] quit [PE1-ospf-10] quit # On PE 1, display the routing table of VPN1. [PE1] display ip routing-table vpn-instance vpn1 Routing Tables: vpn1 Destinations : 5 Routes : 5 Destination/Mask Proto Cost NextHop Interface 30.1.1.0/24 Direct 0 30.1.1.2 Vlan30 30.1.1.2/32 Direct 0 127.0.0.1 InLoop0...
Page 436
Figure 130 Network diagram Configuration procedure Configure VPN instances. # Create VPN instances on the MCE and PE 1, and bind the VPN instances with VLAN interfaces. For the configuration procedure, see “Using OSPF to advertise VPN routes to the PE.”...
Page 437
127.0.0.1/32 Direct 0 127.0.0.1 InLoop0 192.168.0.0/24 OSPF 10.214.10.2 Vlan10 The output shows that the MCE has learned the private route of VPN 1 through OSPF process 10. # On MCE, bind OSPF process 20 with VPN instance vpn2 to learn the routes of VPN 2. The configuration procedure is similar to that for OSPF process 10.
Page 438
192.168.0.0/24 30.1.1.1 Vlan30 # Perform similar configuration on the MCE and PE 1 for VPN 2. Redistribute the OSPF routes of VPN instance vpn2 into the eBGP routing table. (Details not shown) The following output shows that PE 1 has learned the private route of VPN 2 through BGP: [PE1] display ip routing-table vpn-instance vpn2 Routing Tables: vpn2 Destinations : 5...
IPv6 MCE configuration NOTE: The IPv6 MCE function is available only on the S5500-EI switch series. Overview In an IPv6 MPLS L3 VPN, an IPv6 MCE advertises IPv6 routing information between the VPN and the connected PE and forwards IPv6 packets. An IPv6 MCE operates in the same way as an IPv4 MCE. For more information, see the chapter ”MCE configuration.”...
Page 440
Associating a VPN instance with an interface After creating and configuring a VPN instance, you need to associate the VPN instance with the interface for connecting the CE. Any LDP-capable interface can be associated with a VPN instance. For information about LDP-capable interfaces, see the chapter “MPLS basics configuration.” Follow these steps to associate a VPN instance with an interface: To do…...
NOTE: Route related attributes configured in VPN instance view are applicable to both IPv4 VPNs and IPv6 • VPNs. You can configure route related attributes for IPv6 VPNs in both VPN instance view and IPv6 VPN view. • Those configured in IPv6 VPN view take precedence. •...
Page 442
To do… Use the command… Remarks Optional Configure the default precedence ipv6 route-static default-preference for IPv6 static routes default-preference-value 60 by default Configuring RIPng between IPv6 MCE and VPN site A RIPng process belongs to the public network or a single IPv6 VPN instance. If you create a RIPng process without binding it to an IPv6 VPN instance, the process belongs to the public network.
Page 443
To do… Use the command… Remarks Required Create an OSPFv3 process for a ospfv3 [ process-id ] vpn-instance Perform this configuration on the VPN instance and enter OSPFv3 vpn-instance-name IPv6 MCE. On a VPN site, view configure normal OSPFv3. Set the router ID router-id router-id Required Required...
Page 444
To do… Use the command… Remarks Optional By default, no routes from any ipv6 import-route protocol other routing protocol are [ process-id ] [ allow-ibgp ] [ cost Redistribute remote site routes redistributed to IPv6 IS-IS. cost | [ level-1 | level-1-2 | advertised by the PE If you do not specify the route level level-2 ] | route-policy...
NOTE: After you configure an IPv6 BGP VPN instance, the IPv6 BGP route exchange for the IPv6 VPN instance is Layer the same with the normal IPv6 BGP VPN route exchange. For more information about IPv6 BGP, see 3—IP Routing Configuration Guide Configure a VPN site.
Page 446
Configuring RIPng between IPv6 MCE and PE Follow these steps to configure RIPng between IPv6 MCE and PE: To do… Use the command… Remarks Enter system view system-view — Create a RIPng process for ripng [ process-id ] vpn-instance an IPv6 VPN instance and Required vpn-instance-name enter RIPng view...
Page 447
NOTE: Layer 3—IP Routing Configuration Guide For more information about OSPFv3, see Configuring IPv6 IS-IS between IPv6 MCE and PE Follow these steps to configure IPv6 IS-IS between IPv6 MCE and PE: To do… Use the command… Remarks Enter system view system-view —...
To do… Use the command… Remarks Required import-route protocol [ process-id [ med Redistribute the VPN routes med-value | route-policy By default, No route route-policy-name ] * ] redistribution is configured. Optional Configure a filtering policy to filter-policy { acl6-number | ipv6-prefix filter the routes to be ip-prefix-name } export [ direct | isisv6 By default, BGP does not filter...
To do… Use the command… Remarks display ipv6 fib vpn-instance Display a VPN instance’s FIB vpn-instance-name ipv6-address entries that match the specified Available in any view [ prefix-length ] [ | { begin | exclude | destination IPv6 address include } regular-expression ] Display information about BGP display bgp vpnv6 all peer [ ipv4-address VPNv6 peers established between...
Page 450
Figure 131 Network diagram Configuration procedure Assume that the system name of the IPv6 MCE device is MCE, the system names of the edge devices of VPN 1 and VPN 2 are VR1 and VR2 respectively, and the system name of PE 1 is PE1. Configure the VPN instances on the MCE and PE 1.
Page 451
# Bind VLAN-interface 10 with VPN instance vpn1, and configure an IPv6 address for the VLAN interface. [MCE] interface vlan-interface 10 [MCE-Vlan-interface10] ip binding vpn-instance vpn1 [MCE-Vlan-interface10] ipv6 address 2001:1::1 64 [MCE-Vlan-interface10] quit # Configure VLAN 20, add port GigabitEthernet 1/0/2 to VLAN 20, bind VLAN-interface 20 with VPN instance vpn2, and assign an IPv6 address to VLAN-interface 20.
Page 452
# On VR 2, assign IPv6 address 2002:1::2/64 to the interface connected to the MCE and 2012::2/64 to the interface connected to VPN 2. (Details not shown) # Configure RIPng, and advertise subnets 2012::/64 and 2002:1::/64. <VR2> system-view [VR2] ripng 20 [VR2-ripng-20] quit [VR2] interface vlan-interface 20 [VR2-Vlan-interface20] ripng 20 enable...
Page 453
Destination: 2002:1::1/128 Protocol : Direct NextHop : ::1 Preference: 0 Interface : InLoop0 Cost Destination: 2012::/64 Protocol : RIPng NextHop : FE80::20F:E2FF:FE3E:9CA2 Preference: 100 Interface : Vlan20 Cost Destination: FE80::/10 Protocol : Direct NextHop : :: Preference: 0 Interface : NULL0 Cost The output shows that the MCE has learned the private route of VPN 2.
Page 454
[PE1] interface vlan-interface 30 [PE1-Vlan-interface30] ip binding vpn-instance vpn1 [PE1-Vlan-interface30] ipv6 address 30::2 64 [PE1-Vlan-interface30] quit # On PE 1, create VLAN 40 and VLAN-interface 40, bind VLAN-interface 40 with VPN instance vpn2 and configure an IPv6 address for the VLAN-interface 40. [PE1] vlan 40 [PE1-vlan40] quit [PE1] interface vlan-interface 40...
Page 455
Destination: 30::2/128 Protocol : Direct NextHop : ::1 Preference: 0 Interface : InLoop0 Cost Destination: 2012:1::/64 Protocol : OSPFv3 NextHop : FE80::202:FF:FE02:2 Preference: 150 Interface : Vlan30 Cost Destination: FE80::/10 Protocol : Direct NextHop : :: Preference: 0 Interface : NULL0 Cost The output shows that PE 1 has learned the private route of VPN 1 through OSPFv3.
Index A B C D E I M O P R S T Configuring OSPF FRR,94 Configuring OSPF Graceful Restart,96 Applying IPsec policies for OSPFv3,295 Configuring OSPF network types,78 Applying IPsec policies for RIPng,272 Configuring OSPF route control,81 Configuring OSPFv3 area parameters,285 Configuring OSPFv3 GR,293...
Need help?
Do you have a question about the S5500-EI and is the answer not in the manual?
Questions and answers