Page 2
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V G, V G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners Notice The information in this document is subject to change without notice.
Page 3
Preface The H3C S5800&S5820X documentation set includes 12 configuration guides, which describe the software features for the S5800&S5820X Switch Series and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply software features to different network scenarios.
Configuration guide Added and modified features Added features: ITU-T Y.1731 Modified features: • Change configuring the LB function in system view to configuring the LB function in any view • Change configuring the LT function in system view to configuring the LT function in any view DLDP —...
Page 5
Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features. About the H3C S5800&S5820X documentation set The H3C S5800&S5820X documentation set includes: Category...
Page 6
Interface Cards User available for the products. Manual Describes the benefits, features, hardware H3C OAP Cards User specifications, installation, and removal of the OAP Manual cards available for the products. H3C Low End Series...
Obtaining documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support & Documents > Technical Documents] –...
Contents High availability overview··········································································································································· 1 Availability requirements··················································································································································1 Availability evaluation ······················································································································································1 High availability technologies ·········································································································································2 Fault detection technologies ····································································································································2 Protection switchover technologies·························································································································3 Ethernet OAM configuration ······································································································································· 5 Ethernet OAM overview ···················································································································································5 Background········································································································································································5 Major functions of Ethernet OAM ···································································································································5 Ethernet OAMPDUs··················································································································································5 How Ethernet OAM works ······································································································································7 Protocols and Standards··········································································································································9 Ethernet OAM configuration task list ······························································································································9 Configuring basic Ethernet OAM functions····················································································································9...
Page 9
Displaying and maintaining CFD ································································································································· 29 CFD configuration example ·········································································································································· 30 DLDP configuration·····················································································································································36 Overview········································································································································································· 36 Background ···························································································································································· 36 How DLDP works ··················································································································································· 37 DLDP configuration task list ··········································································································································· 43 Enabling DLDP ································································································································································ 43 Setting DLDP mode························································································································································· 44 Setting the interval for sending advertisement packets ······························································································ 44 Setting the DelayDown timer·········································································································································...
Page 10
Smart Link collaboration mechanisms ················································································································· 96 Smart Link configuration task list ·································································································································· 96 Configuring a smart link device ··································································································································· 97 Configuration prerequisites ·································································································································· 97 Configuring protected VLANs for a smart link group························································································ 97 Configuring member ports for a smart link group ····························································································· 97 Configuring role preemption for a smart link group··························································································...
Page 11
Configuring router priority, preemptive mode and tracking function ····························································136 Configuring VF tracking······································································································································137 Configuring VRRP packet attributes ···················································································································138 Displaying and maintaining VRRP for IPv6·······································································································139 IPv4-based VRRP configuration examples ·················································································································139 Single VRRP group configuration example ·······································································································139 VRRP interface tracking configuration example ·······························································································142 VRRP with multiple VLANs configuration example···························································································145 VRRP load balancing mode configuration example ························································································148 IPv6-based VRRP configuration examples ·················································································································156...
Page 12
Configuring BFD for a VRRP backup to monitor the master············································································202 Configuring BFD for the VRRP master to monitor the uplinks··········································································205 Static routing-track-NQA collaboration configuration example ·····································································209 Static routing-track-BFD collaboration configuration example········································································213 VRRP-track-interface management collaboration configuration example (the master monitors the uplink interface)·······························································································································································217 Index ········································································································································································...
High availability overview Communication interruptions can seriously affect widely-deployed value-added services such as IPTV and video conference. Therefore, the basic network infrastructures must be able to provide high availability. The following are the effective ways to improve availability: Increasing fault tolerance •...
MTTR = fault detection time + hardware replacement time + system initialization time + link recovery time + routing time + forwarding recovery time. A smaller value of each item means a smaller MTTR and a higher availability. High availability technologies As previously mentioned, increasing MTBF or decreasing MTTR can enhance the availability of a network.
Technology Introduction Reference Monitor link is a port collaboration function. It is usually used in Monitor link conjunction with Layer 2 topology protocols. The idea is to configuration in the Monitor Link monitor the states of uplink ports and adapt the up/down state of High Availability downlink ports to the up/down state of uplink ports, triggering Configuration Guide...
Page 16
Technology Introduction Reference Layer 3—IP Routing Fast Reroute (FRR) provides a quick per-link or per-node protection Configuration Guide, on an LSP. In this approach, once a link or node fails on a path, MPLS Configuration FRR comes up to reroute the path to a new link or node to bypass Guide/Configuration the failed link or node.
Ethernet OAM configuration This chapter includes these sections: Ethernet OAM overview • Ethernet OAM configuration task list • Configuring basic Ethernet OAM functions • Configuring the Ethernet OAM connection detection timers • Configuring OAM remote loopback • • Displaying and maintaining Ethernet OAM configuration Ethernet OAM configuration example •...
Page 18
Figure 1 Formats of different types of Ethernet OAMPDUs Table 4 Description of the fields in an OAMPDU Field Description Destination MAC address of the Ethernet OAMPDU It is a slow protocol multicast address 0180c2000002. As slow protocol Dest addr packet cannot be forwarded by bridges, Ethernet OAMPDUs cannot be forwarded.
How Ethernet OAM works This section describes the working procedures of Ethernet OAM. Ethernet OAM connection establishment Ethernet OAM connection is the base of all the other Ethernet OAM functions. OAM connection establishment is also known as the “Discovery phase”, where an Ethernet OAM entity discovers remote OAM entities and establishes sessions with them.
Page 20
exchange of Event Notification OAMPDUs. When detecting a link error event listed in 7, the local Table OAM entity sends an Event Notification OAMPDU to notify the remote OAM entity. With the log information, network administrators can keep track of network status in time. Table 7 Ethernet OAM link error events Ethernet OAM link events Description...
NOTE: S5800&S5820X Switch Series is able to receive information OAMPDUs carrying the critical link events • listed in Table Only the Gigabit optical ports are able send information OAMPDUs carrying Link Fault events. • S5800&S5820X Switch Series is able to send information OAMPDUs carrying Dying Gasp events when •...
After the timeout timer of an Ethernet OAM connection expires, the local OAM entity ages out its connection with the peer OAM entity, causing the OAM connection to be disconnected. H3C recommends setting the connection timeout timer at least fives times the handshake packet transmission interval,...
Configuring link monitoring NOTE: After Ethernet OAM connections are established, the link monitoring periods and thresholds configured in this section take effect on all Ethernet ports automatically. Configuring errored symbol event detection An errored symbol event occurs when the number of detected symbol errors over a specific detection interval exceeds the configured threshold.
To do… Use the command… Remarks Configure the errored frame Optional oam errored-frame-period threshold period event triggering threshold-value 1 by default threshold Configuring errored frame seconds event detection An errored frame seconds event occurs when the number of error frame seconds detected on a port over a detection interval exceeds the error threshold.
To do… Use the command… Remarks Enter system view system-view — Required Enable Ethernet OAM remote oam loopback interface loopback on a specified port interface-type interface-number Disabled by default. Enable Ethernet OAM remote loopback in interface view Follow these steps to enable Ethernet OAM remote loopback in interface view: To do…...
To do… Use the command… Remarks Enter system view system-view — interface interface-type Enter Layer 2 Ethernet port view — interface-number Required Reject the Ethernet OAM remote By default, a port does not reject loopback request from a remote oam loopback reject-request the Ethernet OAM remote port loopback request from a remote...
Page 27
Configuration procedure Configure Switch A # Configure GigabitEthernet 1/0/1 to operate in passive Ethernet OAM mode and enable Ethernet OAM for it. <SwitchA> system-view [SwitchA] interface gigabitethernet 1/0/1 [SwitchA-GigabitEthernet1/0/1] oam mode passive [SwitchA-GigabitEthernet1/0/1] oam enable [SwitchA-GigabitEthernet1/0/1] quit # Set the errored frame detection interval to 20 seconds and set the errored frame event triggering threshold to 10.
Page 28
[SwitchA] display oam critical-event Port : GigabitEthernet1/0/1 Link Status : Up Event statistic : ------------------------------------------------------------------------- Link Fault Dying Gasp Critical Event The output shows that no critical link event occurred on the link between Switch A and Switch B. You can use the display oam link-event command to display the statistics of Ethernet OAM link error events.
CFD configuration This chapter includes these sections: Overview • CFD configuration task list • Displaying and maintaining CFD • CFD configuration example • Overview Connectivity Fault Detection (CFD), which conforms to IEEE 802.1ag Connectivity Fault Management (CFM) and ITU-T Y.1731, is an end-to-end per-VLAN link layer Operations, Administration and Maintenance (OAM) mechanism used for link connectivity detection, fault verification, and fault location.
Page 30
CFD exchanges messages and performs operations on a per-domain basis. By planning MDs properly in a network, you can use CFD to locate failure points rapidly. Maintenance association A maintenance association (MA) is a set of maintenance points (MPs) in an MD. An MA is identified by the “MD name + MA name”.
As shown in 5, an inward-facing MEP does not send packets to its host port. Rather, it sends Figure packets to other ports on the device. • A MIP is internal to an MD. It cannot send CFD packets actively; however, it can handle and respond to CFD packets.
Page 32
Loopback (LB) • • Linktrace (LT) Alarm indication signal (AIS) • Loss measurement (LM) • • Delay measurement (DM) Test (TST) • Connectivity faults are usually caused by device faults or configuration errors. CC checks the connectivity between MEPs. This function is implemented through periodic sending of CCMs by the MEPs. As a multicast message, a CCM sent by one MEP is intended to be received by all the other MEPs in the same MA.
calculates and records the link transmission delay and jitter (delay variation) according to the transmission time and reception time. 1DM frames are multicast frames. Two-way frame delay measurement The source MEP sends a delay measurement message (DMM), which carries the transmission time, to the target MEP.
Tasks Remarks Configuring CC on MEPs Required Configuring LB on MEPs Optional Configuring LT on MEPs Optional Configuring AIS Optional Configuring CFD functions Configuring LM Optional Configuring one-way DM Optional Configuring two-way DM Optional Configuring TST Optional NOTE: A port blocked by STP cannot receive or send CFD messages except in the following cases: The port is configured as an outward-facing MEP.
Configuring service instances Before configuring the MEPs and MIPs, you must first configure service instances. A service instance is a set of service access points (SAPs), and belongs to an MA in an MD. A service instance is indicated by an integer to represent an MA in an MD. The MD and MA define the level and VLAN attribute of the messages handled by the MPs in a service instance.
Before creating MEPs, configure the MEP list first. An MEP list is a collection of local MEPs allowed to be configured in an MA and the remote MEPs to be monitored. Follow these steps to configure a MEP: To do... Use the command...
Follow these steps to configure the rules for generating MIPs: To do... Use the command... Remarks Enter system view system-view — Required Configure the rules for generating cfd mip-rule { explicit | default } By default, neither MIPs nor the MIPs service-instance instance-id rules for generating MIPs are...
The relationship between the interval field value in the CCM messages, the interval between CCM messages and the timeout time of the remote MEP is illustrated in Table Table 9 Relationship of interval field value, interval between CCM messages, and timeout time of the remote MEP Interval between CCM Interval field value...
To do... Use the command... Remarks cfd linktrace service-instance instance-id mep mep-id Required Find the path between a source { target-mep target-mep-id | MEP and a target MEP Available in any view target-mac mac-address } [ ttl ttl-value ] [ hw-only ] Enter system view system-view —...
CAUTION: The LM function takes effect only in CFD IEEE 802.1ag. Configuring one-way DM The one-way DM function measures the one-way frame delay between two MEPs, and monitors and manages the link transmission performance. Follow these steps to configure one-way DM: To do…...
To do... Use the command... Remarks display cfd dm one-way history Display the one-way DM result on [ service-instance instance-id [ mep Available in any view the specified MEP mep-id ] ] [ | { begin | exclude | include } regular-expression ] display cfd tst [ service-instance instance-id Display the TST result on the...
Page 43
Figure 8 Network diagram for CFD configuration Configuration procedure Configure a VLAN and assign ports to it On each device shown in 8, create VLAN 100 and assign ports GigabitEthernet 1/0/1 through Figure GigabitEthernet 1/0/4 to VLAN 100. Enable CFD # Enable CFD on Device A.
Page 44
[DeviceC] cfd md MD_B level 3 [DeviceC] cfd ma MA_B md MD_B vlan 100 [DeviceC] cfd service-instance 2 md MD_B ma MA_B Configure MEPs # On Device A, configure a MEP list in service instance 1; create and enable inward-facing MEP 1001 in service instance 1 on GigabitEthernet 1/0/1.
Page 45
# On Device A, enable the sending of CCM frames for MEP 1001 in service instance 1 on GigabitEthernet 1/0/1. [DeviceA] interface gigabitethernet 1/0/1 [DeviceA-GigabitEthernet1/0/1] cfd cc service-instance 1 mep 1001 enable [DeviceA-GigabitEthernet1/0/1] quit # On Device B, enable the sending of CCM frames for MEP 2001 in service instance 2 on GigabitEthernet 1/0/3.
Page 46
Verify the LT function # Identify the path between MEP 1001 and MEP 5001 in service instance 1 on Device A. [DeviceA] cfd linktrace service-instance 1 mep 1001 target-mep 5001 Linktrace to MEP 5001 with the sequence number 1001-43462 MAC Address Last MAC Relay Action 0010-FC00-6512...
Page 47
[DeviceA] cfd dm two-way service-instance 1 mep 1001 target-mep 4002 Frame delay: Reply from 0010-FC00-6512: 10ms Reply from 0010-FC00-6512: 9ms Reply from 0010-FC00-6512: 11ms Reply from 0010-FC00-6512: 5ms Reply from 0010-FC00-6512: 5ms Average: 8ms Send DMM frames: 5 Received: 5 Lost: 0 Frame delay variation: 5ms Average: 3ms...
DLDP configuration This chapter includes these topics: Overview • DLDP configuration task list • Displaying and maintaining DLDP • DLDP configuration examples • Troubleshooting DLDP • Overview Background Unidirectional links occur when one end of a link can receive packets from the other end, but the other end cannot receive packets sent by the first end.
Figure 9 Correct and incorrect fiber connections The Device link detection protocol (DLDP) detects unidirectional links (fiber links or twisted-pair links) and can be configured to shut down the related port automatically or prompt users to take actions to avoid network problems.
Page 50
State Indicates… All neighbors are bi-directionally reachable or DLDP has been in active state for Advertisement more than five seconds. This is a relatively stable state where no unidirectional link has been detected. DLDP enters this state if it receives a packet from an unknown neighbor. In this state, DLDP sends packets to check whether the link is unidirectional.
Page 51
DLDP timer Description In enhanced mode, this timer is triggered if no packet is received from a neighbor when the entry timer expires. Enhanced timer is set to 1 second. Enhanced timer After the Enhanced timer is triggered, the switch sends up to eight probe packets to the neighbor at a frequency of one packet per second.
Page 52
Figure 10 A scenario for enhanced DLDP mode NOTE: In normal DLDP mode, only fiber cross-connected unidirectional links can be detected. • In enhanced DLDP mode, the following types of unidirectional links can be detected: fiber • cross-connected links, and fiber pairs with one fiber or broken or not connected. When a fiber of a fiber pair is broken or not connected, the port that can receive optical signals is in Disable state, and the other port is in Inactive state.
Page 53
DLDP state Type of DLDP packets sent Advertisement Normal Advertisement packet Probe Probe packet Disable Disable packet and then RecoverProbe packet NOTE: A switch sends Flush packets when it transits to Initial state from Active, Advertisement, Probe, or DelayDown state but does not send them when it transits to the Initial state from Inactive or Disable state. A received DLDP packet is processed with the following methods.
Page 54
Packet type Processing procedure Checks whether the If yes, no process is performed. Disable packet local port is in Disable If not, the local port transits to Disable state. state Checks whether the If not, no process is performed. RecoverProbe local port is in Disable packet If yes, returns RecoverEcho packets.
Table 16 Description on DLDP neighbor states DLDP neighbor state Description A neighbor is in this state when it is just detected and is being probed. A Unknown neighbor is in this state only when it is being probed. It transits to Two way state or Unidirectional state after the probe operation finishes.
STP convergence time. If the interval is too long, STP loops may occur before unidirectional links are detected and shut down. If the interval is too short, the number of advertisement packets will increase. H3C recommends you use the default interval in most cases. Follow these steps to set the interval to send Advertisement packets:...
Instead, the DLDP state machine generates log and traps to prompt you to manually shut down unidirectional link ports with the shutdown command. H3C recommends you do as prompted. Then the DLDP state machine transits to the Disable state.
To do… Use the command… Remarks Optional dldp unidirectional-shutdown { auto | Set port shutdown mode manual } auto by default NOTE: On a port with both remote OAM loopback and DLDP enabled, if the port shutdown mode is auto •...
Resetting DLDP state in system view Resetting DLDP state in system view applies to all ports of the switch. Follow these steps to reset DLDP in system view: To do… Use the command… Remarks Enter system view system-view — Reset DLDP state dldp reset Required Resetting DLDP state in port view or port group view...
Page 60
Figure 11 Network diagram for configuring automatic shutdown of unidirectional links Correct fiber connection Cross-connected fibers Device A Device A GE1/0/49 GE1/0/50 GE1/0/49 GE1/0/50 GE1/0/49 GE1/0/50 GE1/0/49 GE1/0/50 Device B Device B Ethernet Fiber link Tx end Rx end optical port Configuration procedure Configuration on Device A # Enable DLDP globally.
Page 61
Configuration on Device B # Enable DLDP globally, configure GigabitEthernet 1/0/49 and GigabitEthernet 1/0/50 to operate in full duplex mode and at 1000 Mbps, and then enable DLDP on the two ports. <DeviceB> system-view [DeviceB] dldp enable [DeviceB] interface gigabitethernet 1/0/49 [DeviceB-GigabitEthernet1/0/49] duplex full [DeviceB-GigabitEthernet1/0/49] speed 1000 [DeviceB-GigabitEthernet1/0/49] dldp enable...
Page 62
Neighbor port index : 60 Neighbor state : two way Neighbor aged time : 12 The output indicates that both GigabitEthernet 1/0/49 and GigabitEthernet 1/0/50 are in Advertisement state, which means both links are bidirectional. # Enable system information monitoring on Device A, and enable the display of log and trap information.
Manually shutting down unidirectional links Network requirements • As shown in 12, Device A and Device B are connected with two fiber pairs. Figure Configure DLDP to send information when a unidirectional link is detected, to remind the network • administrator to manually shut down the faulty port.
Page 64
[DeviceA-GigabitEthernet1/0/50] dldp enable [DeviceA-GigabitEthernet1/0/50] quit # Set the DLDP mode to enhanced. [DeviceA] dldp work-mode enhance # Set the port shutdown mode to manual. [DeviceA] dldp unidirectional-shutdown manual Configuration on Device B # Enable DLDP globally, configure GigabitEthernet 1/0/49 and GigabitEthernet 1/0/50 to operate in full duplex mode and at 1000 Mbps, and then enable DLDP on the two ports.
Page 65
Interface GigabitEthernet1/0/50 DLDP port state : advertisement DLDP link state : up The neighbor number of the port is 1. Neighbor mac address : 0023-8956-3600 Neighbor port index : 60 Neighbor state : two way Neighbor aged time : 12 The output indicates that both GigabitEthernet 1/0/49 and GigabitEthernet 1/0/50 are in Advertisement state, which means both links are bidirectional.
The output indicates that the link status of both GigabitEthernet 1/0/49 and GigabitEthernet 1/0/50 is down. Assume that in this example, the unidirectional links are caused by cross-connected fibers. Correct the fiber connections, and then bring up the ports shut down earlier. # On Device A, bring up GigabitEthernet 1/0/49 and GigabitEthernet 1/0/50: [DeviceA-GigabitEthernet1/0/50] undo shutdown [DeviceA-GigabitEthernet1/0/50]...
RRPP configuration This chapter includes these sections: RRPP overview • RRPP configuration task list • Displaying and maintaining RRPP • RRPP configuration examples • Troubleshooting • RRPP overview The Rapid Ring Protection Protocol (RRPP) is a link layer protocol designed for Ethernet rings. RRPP can prevent broadcast storms caused by data loops when an Ethernet ring is healthy, and rapidly restore the communication paths between the nodes in the event that a link is disconnected on the ring.
Basic concepts in RRPP Figure 13 RRPP networking diagram RRPP domain Interconnected devices with the same domain ID and control VLANs constitute an RRPP domain. An RRPP domain contains the following elements—primary ring, subring, control VLAN, master node, transit node, primary port, secondary port, common port, edge port, and so on.
Page 69
IP address configuration is prohibited on the control VLAN interfaces. Data VLAN A data VLAN is a VLAN dedicated to transferring data packets. Both RRPP ports and non-RRPP ports can be assigned to a data VLAN. Node Each device on an RRPP ring is a node. The role of a node is configurable. RRPP has the following node roles: Master node—Each ring has one and only one master node.
As shown in Figure 13, Device B and Device C lie on Ring 1 and Ring 2. Device B’s Port 1 and Port 2 and Device C’s Port 1 and Port 2 access the primary ring, so they are common ports. Device B’s Port 3 and Device C’s Port 3 access only the subring, so they are edge ports.
RRPP timers When RRPP checks the link state of an Ethernet ring, the master node sends Hello packets out the primary port according to the Hello timer, and determines whether its secondary port receives the Hello packets based on the Fail timer. The Hello timer specifies the interval at which the master node sends Hello packets out the primary •...
Page 72
Ring recovery After the ports belonging to the RRPP domain on the transit nodes, the edge nodes, or the assistant-edge nodes are brought up again, the master node may find the ring is restored after a period of time. A temporary loop may arise in the data VLAN during this period, resulting in a broadcast storm.
The master node sends Fast-Hello packets out its primary port at the interval specified by the • Fast-Hello timer. If the secondary port receives the Fast-Hello packets sent by the local master node before the Fast-Fail timer expires, the entire ring is in the Health state; otherwise, the ring transits into the Disconnect state.
Page 74
Figure 15 Schematic diagram for a tangent-ring network Intersecting rings As shown in Figure 16, two or more rings are in the intersecting-ring network topology, with two common nodes between rings. You only need to define an RRPP domain, and configure one ring as the primary ring and the other rings as subrings.
Page 75
Figure 17 Schematic diagram for a dual-homed-ring network Single-ring load balancing In a single-ring network, you can achieve load balancing by configuring multiple domains. As shown in Figure 18, Ring 1 is configured as the primary ring of both Domain 1 and Domain 2. Domain 1 and Domain 2 are configured with different protected VLANs.
Figure 19 Schematic diagram for an intersecting-ring load balancing network Protocols and standards RFC 3619, Extreme Networks' Ethernet Automatic Protection Switching (EAPS) Version 1 RRPP configuration task list CAUTION: RRPP does not have an auto election mechanism, so you must configure each node in the ring network •...
Task Remarks Optional Configuring RRPP timers Perform this task on the master node in the RRPP domain. Optional Enabling fast detection Perform this task on the master node, edge node, and Configuring assistant-edge node in the RRPP domain. RRPP fast detection Optional Configuring fast detection...
NOTE: When you configure existing VLANs as control VLANs, the system prompts errors. • To ensure proper forwarding of RRPPDUs, do not enable QinQ or VLAN mapping on the control • VLANs. To ensure that RRPPDUs can be sent and received correctly, do not configure the default VLAN of a port •...
Configuring RRPP ports Perform this configuration on each node’s ports intended for accessing RRPP rings. Follow these steps to configure RRPP ports: To do… Use the command… Remarks Enter system view system-view — interface interface-type Enter port view — interface-number Required Configure the link type of the port port link-type trunk...
Page 80
Specifying a master node Perform this configuration on a device to be configured as a master node. Follow these steps to specify a master node: To do… Use the command… Remarks Enter system view system-view — Enter RRPP domain view rrpp domain domain-id —...
Specifying an assistant-edge node When configuring an assistant-edge node, you must first configure the primary ring before configuring the subrings. Perform this configuration on a device to be configured as an assistant-edge node. Follow these steps to specify an assistant-edge node: To do…...
To configure fast detection on the master node of a subring, make sure that the edge node and • assistant-edge node of the subring supports fast detection. Otherwise, H3C does not recommend configuring fast detection on the master node of the subring.
To do… Use the command… Remarks Enter system view system-view — Enter RRPP domain view rrpp domain domain-id — Optional Configure the Fast-Fail timer timer fast-fail-timer fast-fail-value By default, the Fast-Fail timer is 600ms. Optional timer fast-hello-timer Configure the Fast-Hello timer By default, the Fast-Hello timer is fast-hello-value 200ms.
Displaying and maintaining RRPP To do… Use the command… Remarks display rrpp brief [ | { begin | exclude | Display brief RRPP information include } regular-expression ] Display RRPP group configuration display rrpp ring-group [ ring-group-id ] [ | information { begin | exclude | include } regular-expression ] display rrpp verbose domain domain-id [ ring...
Page 85
Configuration procedure Configuration on Device A # Create VLANs 1 through 30, map these VLANs to MSTI 1, and activate the MST region configuration. <DeviceA> system-view [DeviceA] vlan 1 to 30 [DeviceA] stp region-configuration [DeviceA-mst-region] instance 1 vlan 1 to 30 [DeviceA-mst-region] active region-configuration [DeviceA-mst-region] quit # Disable physical state change suppression and STP on GigabitEthernet 1/0/1 and GigabitEthernet...
[DeviceB-mst-region] quit # Disable physical state change suppression and STP on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2, configure the two ports as trunk ports, and assign them to VLANs 1 through 30, and configure them to trust the 802.1p precedence of the received packets. [DeviceB] interface gigabitethernet 1/0/1 [DeviceB-GigabitEthernet1/0/1] undo link-delay [DeviceB-GigabitEthernet1/0/1] undo stp enable...
Page 87
Device A, Device B, Device C and Device D form primary ring 1, and Device B, Device C and • Device E form subring 2. • Device A is the master node of primary ring 1, with GigabitEthernet 1/0/1 as the primary port and GigabitEthernet 1/0/2 the secondary port.
Page 88
[DeviceA] interface gigabitethernet 1/0/2 [DeviceA-GigabitEthernet1/0/2] undo link-delay [DeviceA-GigabitEthernet1/0/2] undo stp enable [DeviceA-GigabitEthernet1/0/2] port link-type trunk [DeviceA-GigabitEthernet1/0/2] port trunk permit vlan 1 to 30 [DeviceA-GigabitEthernet1/0/2] qos trust dot1p [DeviceA-GigabitEthernet1/0/2] quit # Create RRPP domain 1, configure VLAN 4092 as the primary control VLAN of RRPP domain 1, and configure the VLANs mapped to MSTI 1 as the protected VLANs of RRPP domain 1.
Page 89
[DeviceB-GigabitEthernet1/0/3] undo stp enable [DeviceB-GigabitEthernet1/0/3] port link-type trunk [DeviceB-GigabitEthernet1/0/3] port trunk permit vlan 1 to 30 [DeviceB-GigabitEthernet1/0/3] qos trust dot1p [DeviceB-GigabitEthernet1/0/3] quit # Create RRPP domain 1, configure VLAN 4092 as the primary control VLAN of RRPP domain 1, and configure the VLANs mapped to MSTI 1 as the protected VLANs of RRPP domain 1.
Page 90
[DeviceC-GigabitEthernet1/0/2] quit [DeviceC] interface gigabitethernet 1/0/3 [DeviceC-GigabitEthernet1/0/3] undo link-delay [DeviceC-GigabitEthernet1/0/3] undo stp enable [DeviceC-GigabitEthernet1/0/3] port link-type trunk [DeviceC-GigabitEthernet1/0/3] port trunk permit vlan 1 to 30 [DeviceC-GigabitEthernet1/0/3] qos trust dot1p [DeviceC-GigabitEthernet1/0/3] quit # Create RRPP domain 1, configure VLAN 4092 as the primary control VLAN of RRPP domain 1, and configure the VLANs mapped to MSTI 1 as the protected VLANs of RRPP domain 1.
Page 91
[DeviceD-GigabitEthernet1/0/2] port link-type trunk [DeviceD-GigabitEthernet1/0/2] port trunk permit vlan 1 to 30 [DeviceD-GigabitEthernet1/0/2] qos trust dot1p [DeviceD-GigabitEthernet1/0/2] quit # Create RRPP domain 1, configure VLAN 4092 as the primary control VLAN of RRPP domain 1, and configure the VLANs mapped to MSTI 1 as the protected VLANs of RRPP domain 1. [DeviceD] rrpp domain 1 [DeviceD-rrpp-domain1] control-vlan 4092 [DeviceD-rrpp-domain1] protected-vlan reference-instance 1...
[DeviceE-rrpp-domain1] protected-vlan reference-instance 1 # Configure Device E as the master node of subring 2, with GigabitEthernet 1/0/1 as the primary port and GigabitEthernet 1/0/2 as the secondary port, and enable ring 2. [DeviceE-rrpp-domain1] ring 2 node-mode master primary-port gigabitethernet 1/0/1 secondary-port gigabitethernet 1/0/2 level 1 [DeviceE-rrpp-domain1] ring 2 enable [DeviceE-rrpp-domain1] quit...
Page 93
Figure 22 Network diagram for intersecting-ring load balancing configuration Configuration procedure Configuration on Device A # Create VLANs 10 and 20, map VLAN 10 to MSTI 1 and VLAN 20 to MSTI 2, and activate MST region configuration. <DeviceA> system-view [DeviceA] vlan 10 [DeviceA-vlan10] quit [DeviceA] vlan 20...
Page 94
[DeviceA-GigabitEthernet1/0/2] port link-type trunk [DeviceA-GigabitEthernet1/0/2] undo port trunk permit vlan 1 [DeviceA-GigabitEthernet1/0/2] port trunk permit vlan 10 20 [DeviceA-GigabitEthernet1/0/2] qos trust dot1p [DeviceA-GigabitEthernet1/0/2] quit # Create RRPP domain 1, configure VLAN 100 as the primary control VLAN of RRPP domain 1, and configure the VLAN mapped to MSTI 1 as the protected VLAN of RRPP domain 1.
Page 96
# Configure Device B as the assistant-edge node of subring 3 in RRPP domain 1, with GigabitEthernet 1/0/4 as the edge port, and enable subring 3. [DeviceB-rrpp-domain1] ring 3 node-mode assistant-edge edge-port gigabitethernet 1/0/4 [DeviceB-rrpp-domain1] ring 3 enable [DeviceB-rrpp-domain1] quit # Create RRPP domain 2, configure VLAN 105 as the primary control VLAN of RRPP domain 2, and configure the VLAN mapped to MSTI 2 as the protected VLAN of RRPP domain 2.
Page 97
[DeviceC-GigabitEthernet1/0/2] undo link-delay [DeviceC-GigabitEthernet1/0/2] undo stp enable [DeviceC-GigabitEthernet1/0/2] port link-type trunk [DeviceC-GigabitEthernet1/0/2] undo port trunk permit vlan 1 [DeviceC-GigabitEthernet1/0/2] port trunk permit vlan 10 20 [DeviceC-GigabitEthernet1/0/2] qos trust dot1p [DeviceC-GigabitEthernet1/0/2] quit # Disable physical state change suppression and STP on GigabitEthernet 1/0/3, configure the port as a trunk port, remove it from VLAN 1, and assign it to VLAN 20, and configure it to trust the 802.1p precedence of the received packets.
Page 98
[DeviceC-rrpp-domain2] control-vlan 105 [DeviceC-rrpp-domain2] protected-vlan reference-instance 2 # Configure Device C as the transit node of primary ring 1 in RRPP domain 2, with GigabitEthernet 1/0/1 as the primary port and GigabitEthernet 1/0/2 as the secondary port, and enable ring 1. [DeviceC-rrpp-domain2] ring 1 node-mode transit primary-port gigabitethernet 1/0/1 secondary-port gigabitethernet 1/0/2 level 0 [DeviceC-rrpp-domain2] ring 1 enable...
Page 99
# Create RRPP domain 1, configure VLAN 100 as the primary control VLAN of RRPP domain 1, and configure the VLAN mapped to MSTI 1 as the protected VLAN of RRPP domain 1. [DeviceD] rrpp domain 1 [DeviceD-rrpp-domain1] control-vlan 100 [DeviceD-rrpp-domain1] protected-vlan reference-instance 1 # Configure Device D as the transit node of primary ring 1 in RRPP domain 1, with GigabitEthernet 1/0/1 as the primary port and GigabitEthernet 1/0/2 as the secondary port, and enable ring 1.
Page 100
[DeviceE-GigabitEthernet1/0/2] port link-type trunk [DeviceE-GigabitEthernet1/0/2] undo port trunk permit vlan 1 [DeviceE-GigabitEthernet1/0/2] port trunk permit vlan 20 [DeviceE-GigabitEthernet1/0/2] qos trust dot1p [DeviceE-GigabitEthernet1/0/2] quit # Create RRPP domain 2, configure VLAN 105 as the primary control VLAN, and configure the VLAN mapped to MSTI 2 as the protected VLAN.
# Create RRPP domain 1, configure VLAN 100 as the primary control VLAN, and configure the VLAN mapped to MSTI 1 as the protected VLAN. [DeviceF] rrpp domain 1 [DeviceF-rrpp-domain1] control-vlan 100 [DeviceF-rrpp-domain1] protected-vlan reference-instance 1 # Configure Device F as the master node of subring 3 in RRPP domain 1, with GigabitEthernet 1/0/1 as the primary port and GigabitEthernet 1/0/2 as the secondary port, and enable subring 3.
Page 102
Figure 23 Network diagram for fast detection configuration Configuration procedure Configuration on Device A # Disable physical state change suppression and STP on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2, configure the two ports as trunk ports, and assign them to all VLANs, and configure them to trust the 802.1p precedence of the received packets.
Page 103
# Enable fast detection, and set the Fast-Hello timer and Fast-Fail timer to 100 milliseconds and 300 milliseconds respectively. The value of the Fast-Fail timer must be equal to or greater than three times the Fast-Hello timer. [DeviceA-rrpp-domain1] fast-detection enable [DeviceA-rrpp-domain1] timer fast-hello-timer 100 [DeviceA-rrpp-domain1] timer fast-fail-timer 300 [DeviceA-rrpp-domain1] quit...
[DeviceD-GigabitEthernet1/0/2] port link-type trunk [DeviceD-GigabitEthernet1/0/2] port trunk permit vlan all [DeviceD-GigabitEthernet1/0/2] qos trust dot1p [DeviceD-GigabitEthernet1/0/2] quit # Create RRPP domain 1, configure VLAN 4092 as the primary VLAN of RPPP domain 1, and configure the VLANs mapped to MSTIs 0 through 32 as the protected VLANs of RRPP domain 1. [DeviceD] rrpp domain 1 [DeviceD-rrpp-domain1] control-vlan 4092 [DeviceD-rrpp-domain1] protected-vlan reference-instance 0 to 32...
Smart Link configuration This chapter includes these sections: Smart Link overview • Configuring a smart link device • Configuring an associated device • Displaying and maintaining Smart Link • Smart Link configuration examples • Smart Link overview Background To avoid single-point failures and guarantee network reliability, downstream devices are usually dual uplinked to upstream devices.
The problem with STP, however, is that STP convergence time is long, which makes it not suitable for users who have high demand on convergence speed. RRPP can meet users’ demand on convergence speed, but it involves complicated networking and configurations and is mainly used in ring-shaped networks. NOTE: Layer 2—LAN Switching Configuration Guide For more information about STP and RRPP, see the...
messages in the receive control VLAN and refresh their MAC address forwarding entries and ARP/ND entries. Flush message Flush messages are used by a smart link group to notify other devices to refresh their MAC address forwarding entries and ARP/ND entries when link switchover occurs in the smart link group. Flush messages are common multicast data packets, and will be dropped by a blocked receiving port.
You can configure protected VLANs for a smart link group by referencing MSTIs. Smart Link collaboration mechanisms Collaboration between Smart Link and Monitor Link Smart Link cannot sense by itself when faults occur on the uplink of the upstream devices, or when faults are cleared.
NOTE: A smart link device is a network device that supports Smart Link and is configured with a smart link • group and a transmit control VLAN for flush message transmission. Device C and Device D in Figure 24 are two examples of smart link devices. An associated device is a network device that supports Smart Link, and receives flush messages sent •...
To do… Use the command… Remarks Enter system view system-view — Create a smart link group and smart-link group group-id — enter smart link group view Configure member ports for a port interface-type Required smart link group interface-number { master | slave } In port view Follow these steps to configure member ports for a smart link group in port view: To do…...
To do… Use the command… Remarks Optional Enable flush update in the flush enable [ control-vlan vlan-id ] By default, flush update is enabled, specified control VLAN and VLAN 1 is the control VLAN. CAUTION: The control VLAN configured for a smart link group must be different from that configured for any other •...
To do… Use the command… Remarks Enter system view system-view — Enter Ethernet port view or Layer 2 interface interface-type — aggregate port view interface-number Required Configure the control VLANs for smart-link flush enable By default, no control VLAN exists receiving flush messages [ control-vlan vlan-id-list ] for receiving flush messages.
Page 113
Figure 25 Network diagram for single smart link group configuration Device A Device B Device E GE1/0/3 GE1/0/3 Master link Slave link Smart link group GE1/0/1 GE1/0/1 GE1/0/2 GE1/0/2 Device C Device D Configuration procedure Configuration on Device C # Create VLANs 1 through 30, map these VLANs to MSTI 1, and activate the MST region configuration. <DeviceC>...
Page 114
# In smart link group 1, enable flush message sending, and specify VLAN 10 as the control VLAN. [DeviceC-smlk-group1] flush enable control-vlan 10 [DeviceC-smlk-group1] quit # Bring up ports GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2. [DeviceC] interface gigabitethernet1/0/1 [DeviceC-GigabitEthernet1/0/1] undo shutdown [DeviceC-GigabitEthernet1/0/1] quit [DeviceC] interface gigabitethernet 1/0/2 [DeviceC-GigabitEthernet1/0/2] undo shutdown...
Page 115
[DeviceD] interface gigabitethernet 1/0/2 [DeviceD-GigabitEthernet1/0/2] undo shutdown [DeviceD-GigabitEthernet1/0/2] quit Configuration on Device B # Create VLANs 1 through 30. <DeviceB> system-view [DeviceB] vlan 1 to 30 # Configure GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3 as trunk ports that permit VLANs 1 through 30, enable flush message receiving on them, and specify VLAN 10 and VLAN 20 as the control VLANs for receiving flush messages.
Configuration on Device A # Create VLANs 1 through 30. <DeviceA> system-view [DeviceA] vlan 1 to 30 # Configure GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 as trunk ports that permit VLANs 1 through 30, enable flush message receiving on them, and specify VLAN 10 and VLAN 20 as the control VLANs for receiving flush messages.
Page 117
Device C is a smart link device, and Device A, Device B, and Device D are associated devices. • Traffic of VLANs 1 through 200 on Device C are dually uplinked to Device A by Device B and Device D. •...
Page 118
# Create smart link group 1, and configure all VLANs mapped to MSTI 1 as the protected VLANs for smart link group 1. [DeviceC] smart-link group 1 [DeviceC-smlk-group1] protected-vlan reference-instance 1 # Configure GigabitEthernet 1/0/1 as the master port and GigabitEthernet 1/0/2 as the slave port for smart link group 1.
Page 119
[DeviceB-GigabitEthernet1/0/2] port link-type trunk [DeviceB-GigabitEthernet1/0/2] port trunk permit vlan 1 to 200 [DeviceB-GigabitEthernet1/0/2] smart-link flush enable control-vlan 10 101 [DeviceB-GigabitEthernet1/0/2] quit Configuration on Device D # Create VLAN 1 through VLAN 200. <DeviceD> system-view [DeviceD] vlan 1 to 200 # Configure GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 as trunk ports and assign them to VLANs 1 through 200;...
Page 120
Preemption mode: ROLE Control VLAN: 10 Protected VLAN: Reference Instance 1 Member Role State Flush-count Last-flush-time ----------------------------------------------------------------------------- GigabitEthernet1/0/1 MASTER ACTVIE 16:37:20 2010/02/21 GigabitEthernet1/0/2 SLAVE STANDBY 17:45:20 2010/02/21 Smart link group 2 information: Device ID: 000f-e23d-5af0 Preemption mode: ROLE Preemption delay: 1(s) Control VLAN: 101 Protected VLAN: Reference Instance 2 Member...
Monitor Link configuration This chapter includes these sections: Overview • Configuring Monitor Link • Displaying and maintaining Monitor Link • Monitor Link configuration example • Overview Monitor Link is a port collaboration function. Monitor Link usually works together with Layer 2 topology protocols.
When any uplink port goes up, the monitor link group goes up and brings up all its downlink ports. CAUTION: H3C does not recommend to manually shut down or bring up the downlink ports in a monitor link group. Configuring Monitor Link Configuration prerequisites Before assigning a port to a monitor link group, make sure the port is not the member port of any aggregation group or service loopback group.
To do… Use the command… Remarks Enter system view system-view — Enter monitor link group view monitor-link group group-id — Configure member ports for the monitor link port interface-type interface-number Required group { uplink | downlink } In port view Follow these steps to configure member ports for a monitor link group in port view: To do…...
Page 124
Figure 28 Network diagram for monitor link configuration Device A Device B Device D Device C Configuration procedure Configuration on Device C # Create VLANs 1 through 30, map these VLANs to MSTI 1, and activate MST region configuration. <DeviceC> system-view [DeviceC] vlan 1 to 30 [DeviceC] stp region-configuration [DeviceC-mst-region] instance 1 vlan 1 to 30...
Page 125
# Create VLANs 1 through 30. <DeviceA> system-view [DeviceA] vlan 1 to 30 # Configure GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 as trunk ports, assign them to VLANs 1 through 30, and enable flush message receiving on them. [DeviceA] interface gigabitethernet 1/0/1 [DeviceA-GigabitEthernet1/0/1] port link-type trunk [DeviceA-GigabitEthernet1/0/1] port trunk permit vlan 1 to 30 [DeviceA-GigabitEthernet1/0/1] smart-link flush enable...
Page 126
[DeviceD-GigabitEthernet1/0/1] smart-link flush enable [DeviceD-GigabitEthernet1/0/1] quit [DeviceD] interface gigabitethernet 1/0/2 [DeviceD-GigabitEthernet1/0/2] port link-type trunk [DeviceD-GigabitEthernet1/0/2] port trunk permit vlan 1 to 30 [DeviceD-GigabitEthernet1/0/2] smart-link flush enable [DeviceD-GigabitEthernet1/0/2] quit # Create monitor link group 1, and then configure GigabitEthernet 1/0/1 as an uplink port and GigabitEthernet 1/0/2 as a downlink port for monitor link group 1.
Configuring a default route for network hosts facilitates your configuration, but also requires high performance stability of the device that acts as the gateway. Using more egress gateways is a common way to improve system reliability, but introduces the problem of routing among the egresses. Virtual Router Redundancy Protocol (VRRP) is designed to address this problem.
Page 129
Figure 30 Network diagram for VRRP Virtual router Router A Host A Router B Network Host B Router C Host C As shown in 30, Router A, Router B, and Router C form a virtual router, which has its own IP Figure address.
Authentication mode To avoid attacks from unauthorized users, VRRP adds authentication keys into packets for authentication. VRRP provides two authentication modes: • simple—Simple text authentication A router sending a packet fills an authentication key into the packet, and the router receiving the packet compares its local authentication key with that of the received packet.
Page 131
Figure 31 Format of a VRRPv2 packet Figure 32 Format of a VRRPv3 packet Version Type Virtual Rtr ID Priority Count IPv6 Addrs Auth Type Adver Int Checksum IPv6 address 1 IPv6 address n Authentication data 1 Authentication data 2 A VRRP packet comprises the following fields: •...
IP Address/IPv6 Address—Virtual IPv4 or IPv6 address entry of the VRRP group. The Count IP Addrs • or Count IPv6 Addrs field defines the number of the virtual IP v4 or IPv6 addresses. • Authentication Data—Authentication key. This field is used only for simple authentication and is 0 for any other authentication modes.
Tracking a track entry By monitoring a track entry, you can: • Monitor an uplink and change the priority of the router according to the state of the uplink. If the uplink fails, hosts in the LAN cannot access external networks through the router. In this case, the state of the monitored track entry is negative and the priority of the router decreases by a specified value.
Figure 34 VRRP in load sharing mode VRRP group 1 VRRP group 2 VRRP group 3 Router A Backup Master Backup Host A Router B Backup Backup Master Network Host B Router C Master Backup Backup Host C A router can be in multiple VRRP groups and hold a different priority in a different group. As shown in 34, three VRRP groups are present: Figure...
NOTE: VRRP load balancing mode is based on VRRP standard protocol mode, so mechanisms, such as master election, preemption, and tracking functions, in the standard protocol mode are also supported in the load balancing mode. In addition, VRRP load balancing mode has new mechanisms, which are introduced in the following sections.
Page 136
Figure 36 Answer ARP requests Different hosts send packets to different routers according to the requested virtual MAC addresses. For example, as shown in 37, Host A regards the virtual MAC address of Router A as the Figure gateway MAC address, so it sends packets to Router A for forwarding; Host B regards the virtual MAC address of Router B as the gateway MAC address, so it sends packets to Router B for forwarding.
Virtual forwarder Creating a virtual forwarder Virtual MAC addresses help different hosts transmit packets to different routers in a VRRP group. To enable the routers in the VRRP group to forward the packets, create virtual forwarders (VFs) on the routers. Each VF associates with a virtual MAC address in the VRRP group and forwards packets destined to this virtual MAC address.
Page 138
Figure 38 VF information Figure 38 illustrates the VF information on each router in the VRRP group and how the routers back up one another. The master, Router A, assigns virtual MAC addresses 000f-e2ff-001 1, 000f-e2ff-0012, and 000f-e2ff-0013 to itself, Router B, and Router C respectively. The VFs corresponding to these three virtual MAC addresses, VF 1, VF 2, and VF 3, are created on each of the three routers, and the VFs corresponding to the same virtual MAC address on different routers back up one another.
Timeout Timer—The duration that the new AVF takes over the VF owner. Before this timer times out, • all the routers in the VRRP group keep the failed AVF, and the new AVF forwards the packets destined for the virtual MAC address corresponding to the failed AVF. When this timer times out, all the routers in the VRRP group remove the failed AVF, and the new AVF stops forwarding the packets destined for the virtual MAC address corresponding to the failed AVF.
Task Remarks Optional When VRRP works in load Specifying the type of MAC addresses mapped to virtual IP addresses balancing mode, this configuration is not effective. Creating a VRRP group and configuring virtual IP address Required Configuring router priority, preemptive mode and tracking function Optional Optional The VF tracking function is...
If you specify another virtual IP address for the VRRP group later, the virtual IP address is added to the virtual IP address list of the VRRP group. NOTE: H3C does not recommend you to create VRRP groups on the VLAN interface of a super VLAN because network performance might be adversely affected. Configuration prerequisites...
IP address on the segment where the VRRP group resides or the IP address of an interface on a router in the VRRP group. In the latter case, the router is called the IP address owner. When a router is the IP address owner in a VRRP group, H3C recommends you not to use the IP address •...
To do… Use the command… Remarks Enter system view system-view — Enter VLAN interface view or Layer interface interface-type — 3 Ethernet interface view interface-number Optional Configure router priority in the vrrp vrid virtual-router-id priority VRRP group priority-value 100 by default. Optional Configure the router in the VRRP vrrp vrid virtual-router-id...
To do… Use the command… Remarks Enter the specified VLAN interface interface interface-type view or Layer 3 Ethernet interface — interface-number view Configure the VF to monitor a Required vrrp vrid virtual-router-id weight specified track entry and specify track track-entry-number [ reduced No track entry is specified by the amount by which the weight weight-reduced ]...
NOTE: You might configure different authentication modes and authentication keys for the VRRP groups on an • interface. However, members of the same VRRP group must use the same authentication mode and authentication key. Excessive traffic might cause a backup to trigger a change of its status because the backup does not •...
Configuring VRRP for IPv6 VRRP for IPv6 configuration task list Complete these tasks to configure VRRP for IPv6: Task Remarks Configuring a VRRP working mode Optional Optional Specifying the type of MAC addresses mapped to virtual When VRRP works in load balancing mode, this IPv6 addresses configuration is not effective.
If you specify another virtual IPv6 address for the VRRP group later, the virtual IPv6 address is added to the virtual IPv6 address list of the VRRP group. NOTE: H3C does not recommend you to create VRRP groups on the VLAN interface of a super VLAN because, network performance might be adversely affected. Configuration prerequisites...
IPv6 address of a VRRP group. NOTE: When a router is the IP address owner in a VRRP group, H3C recommends you not to use the IPv6 • address of the interface—virtual IPv6 address of the VRRP group—to establish an OSPFv3 neighbor relationship with the adjacent router, that is, not to use the ospfv3 area command to enable OSPFv3 on Layer 3—IP Routing...
To do… Use the command… Remarks vrrp ipv6 vrid virtual-router-id track Optional Configure the interface to be interface interface-type No interface is being tracked by tracked interface-number [ reduced default. priority-reduced ] vrrp ipv6 vrid virtual-router-id track Optional Configure VRRP to track a track-entry-number [ reduced specified track entry Not configured by default.
NOTE: You can configure the VF tracking function when VRRP works in either standard protocol mode or load • balancing mode; however, the VF tracking function is effective only when VRRP works in load balancing mode. By default, the weight of a VF is 255, and its lower limit of failure is 10. •...
Displaying and maintaining VRRP for IPv6 To do… Use the command… Remarks display vrrp ipv6 [ verbose ] [ interface interface-type interface-number [ vrid Display VRRP group status Available in any view virtual-router-id ] ] [ | { begin | exclude | include } regular-expression ] display vrrp ipv6 statistics [ interface interface-type Display VRRP group statistics...
Page 152
Configuration procedure Configure Switch A # Configure VLAN 2. <SwitchA> system-view [SwitchA] vlan 2 [SwitchA-vlan2] port gigabitethernet 1/0/5 [SwitchA-vlan2] quit [SwitchA] interface vlan-interface 2 [SwitchA-Vlan-interface2] ip address 202.38.160.1 255.255.255.0 # Create VRRP group 1 and set its virtual IP address to 202.38.160.1 1 1. [SwitchA-Vlan-interface2] vrrp vrid 1 virtual-ip 202.38.160.111 # Set the priority of Switch A in VRRP group 1 to 1 10, which is higher than that of Switch B, so that Switch A can become the master.
Page 153
Virtual IP : 202.38.160.111 Virtual MAC : 0000-5e00-0101 Master IP : 202.38.160.1 # Display the detailed information of VRRP group 1 on Switch B. [SwitchB-Vlan-interface2] display vrrp verbose IPv4 Standby Information: Run Mode : Standard Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2 VRID...
VRID Adver Timer Admin Status : Up State : Master Config Pri : 110 Running Pri : 110 Preempt Mode : Yes Delay Time Auth Type : None Virtual IP : 202.38.160.111 Virtual MAC : 0000-5e00-0101 Master IP : 202.38.160.1 The output shows that after Switch A resumes normal operation, it becomes the master, and packets sent from host A to host B are forwarded by Switch A.
Page 155
[SwitchA-Vlan-interface2] ip address 202.38.160.1 255.255.255.0 # Create a VRRP group 1 and set its virtual IP address to 202.38.160.1 1 1. [SwitchA-Vlan-interface2] vrrp vrid 1 virtual-ip 202.38.160.111 # Configure the priority of Switch A in the VRRP group to 1 10, which is higher than that of Switch B, so that Switch A can become the master.
Page 156
Interface Vlan-interface2 VRID Adver Timer Admin Status : Up State : Master Config Pri : 110 Running Pri : 110 Preempt Mode : Yes Delay Time Auth Type : Simple : hello Virtual IP : 202.38.160.111 Virtual MAC : 0000-5e00-0101 Master IP : 202.38.160.1 VRRP Track Information:...
# When VLAN-interface 3 on Switch A is not available, the detailed information of VRRP group 1 on Switch B is displayed. [SwitchB-Vlan-interface2] display vrrp verbose IPv4 Standby Information: Run Mode : Standard Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer...
Page 158
Configuration procedure Configure Switch A # Configure VLAN 2. <SwitchA> system-view [SwitchA] vlan 2 [SwitchA-vlan2] port gigabitethernet 1/0/5 [SwitchA-vlan2] quit [SwitchA] interface vlan-interface 2 [SwitchA-Vlan-interface2] ip address 202.38.160.1 255.255.255.128 # Create a VRRP group 1 and set its virtual IP address to 202.38.160.100. [SwitchA-Vlan-interface2] vrrp vrid 1 virtual-ip 202.38.160.100 # Configure the priority of Switch A in VRRP group 1 as 1 10, which is higher than that of Switch B, so that Switch A can become the master in VRRP group 1.
Page 159
[SwitchB-Vlan-interface3] vrrp vrid 2 priority 110 Verify the configuration To verify your configuration, use the display vrrp verbose command. # Display the detailed information of the VRRP group on Switch A. [SwitchA-Vlan-interface3] display vrrp verbose IPv4 Standby Information: Run Mode : Standard Run Method : Virtual MAC...
Virtual MAC : 0000-5e00-0102 Master IP : 202.38.160.131 The output shows that in VRRP group 1 Switch A is the master, Switch B is the backup and hosts with the default gateway of 202.38.160.100/25 accesses the Internet through Switch A; in VRRP group 2 Switch A is the backup, Switch B is the master and hosts with the default gateway of 202.38.160.200/25 accesses the Internet through Switch B.
Page 161
[SwitchA-vlan2] port gigabitethernet 1/0/5 [SwitchA-vlan2] quit # Configure VRRP to work in load balancing mode. [SwitchA] vrrp mode load-balance # Create VRRP group 1 and configure its virtual IP address as 10.1.1.1. [SwitchA] interface vlan-interface 2 [SwitchA-Vlan-interface2] ip address 10.1.1.2 24 [SwitchA-Vlan-interface2] vrrp vrid 1 virtual-ip 10.1.1.1 # Set the priority of Switch A in VRRP group 1 to 120, which is higher than that of Switch B and that of Switch C, so that Switch A can become the master.
Page 162
# Configure the VFs to monitor track entry 1, making the weight of Switch B decrease by more than 245—250 in this example—when track entry 1 turns to negative. In such a case, another router with a higher weight can take over. [SwitchB] interface vlan-interface 2 [SwitchB-Vlan-interface2] vrrp vrid 1 weight track 1 reduced 250 Configure Switch C...
Page 163
10.1.1.3 (Backup) 10.1.1.4 (Backup) Forwarder Information: 3 Forwarders 1 Active Config Weight : 255 Running Weight : 255 Forwarder 01 State : Active Virtual MAC : 000f-e2ff-0011 (Owner) Owner ID : 0000-5e01-1101 Priority : 255 Active : local Forwarder 02 State : Listening Virtual MAC...
Page 164
Priority : 127 Active : 10.1.1.2 Forwarder 02 State : Active Virtual MAC : 000f-e2ff-0012 (Owner) Owner ID : 0000-5e01-1103 Priority : 255 Active : local Forwarder 03 State : Listening Virtual MAC : 000f-e2ff-0013 (Learnt) Owner ID : 0000-5e01-1105 Priority : 127 Active...
Page 165
State : Active Virtual MAC : 000f-e2ff-0013 (Owner) Owner ID : 0000-5e01-1105 Priority : 255 Active : local Forwarder Weight Track Information: Track Object State : Positive Weight Reduced : 250 The output shows that in VRRP group 1, Switch A is the master and Switch B and Switch C are the backups. Each of the three switches has one AVF and two LVFs that act as the backups.
Page 166
Track Object State : Negative Weight Reduced : 250 # Use the display vrrp verbose command to display the detailed information of VRRP group 1 on Switch [SwitchC-Vlan-interface2] display vrrp verbose IPv4 Standby Information: Run Mode : Load Balance Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2...
Page 167
# When the timeout timer—about 1800 seconds—expires, display the detailed information of VRRP group 1 on Switch C. [SwitchC-Vlan-interface2] display vrrp verbose IPv4 Standby Information: Run Mode : Load Balance Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer...
Auth Type : None Virtual IP : 10.1.1.1 Member IP List : 10.1.1.3 (Local, Master) 10.1.1.4 (Backup) Forwarder Information: 2 Forwarders 1 Active Config Weight : 255 Running Weight : 255 Forwarder 02 State : Active Virtual MAC : 000f-e2ff-0012 (Owner) Owner ID : 0000-5e01-1103 Priority...
Page 169
Figure 43 Network diagram for single VRRP group configuration Configuration procedure Configure Switch A # Configure VLAN 2. <SwitchA> system-view [SwitchA] ipv6 [SwitchA] vlan 2 [SwitchA-vlan2] port gigabitethernet 1/0/5 [SwitchA-vlan2] quit [SwitchA] interface vlan-interface 2 [SwitchA-Vlan-interface2] ipv6 address fe80::1 link-local [SwitchA-Vlan-interface2] ipv6 address 1::1 64 # Create a VRRP group 1 and set its virtual IPv6 addresses to FE80::10 and 1::10.
Page 170
[SwitchB] interface vlan-interface 2 [SwitchB-Vlan-interface2] ipv6 address fe80::2 link-local [SwitchB-Vlan-interface2] ipv6 address 1::2 64 # Create a VRRP group 1 and set its virtual IPv6 addresses to FE80::10 and 1::10. [SwitchB-Vlan-interface2] vrrp ipv6 vrid 1 virtual-ip fe80::10 link-local [SwitchB-Vlan-interface2] vrrp ipv6 vrid 1 virtual-ip 1::10 # Configure Switch B to work in preemptive mode, with the preemption delay set to 5 seconds.
When Switch A fails, you can still ping Host B on Host A. To view the detailed information of the VRRP group on Switch B, use the display vrrp ipv6 verbose command. # When Switch A fails, the detailed information of VRRP group 1 on Switch B is displayed. [SwitchB-Vlan-interface2] display vrrp ipv6 verbose IPv6 Standby Information: Run Mode...
Page 172
When Switch A operates normally, packets sent from Host A to Host B are forwarded by Switch A. • If VLAN-interface 3 through which Switch A connects to the Internet is not available, packets sent from Host A to Host B are forwarded by Switch B. •...
Page 173
[SwitchA-Vlan-interface2] vrrp ipv6 vrid 1 preempt-mode timer delay 5 # Set VLAN-interface 3 on Switch A to be tracked, and configure the amount by which the priority value decreases to be more than 10—30 in this example, so that when VLAN interface 3 fails, the priority of Switch A in VRRP group 1 decreases to a value lower than 100, so Switch B can become the master.
Page 174
Virtual IP : FE80::10 1::10 Virtual MAC : 0000-5e00-0201 Master IP : FE80::1 VRRP Track Information: Track Interface: Vlan3 State : Up Pri Reduced : 30 # Display the detailed information of VRRP group 1 on Switch B. [SwitchB-Vlan-interface2] display vrrp ipv6 verbose IPv6 Standby Information: Run Mode : Standard...
Run Mode : Standard Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer : 400 Admin Status : Up State : Master Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time Auth Type...
Page 176
Configuration procedure Configure Switch A # Configure VLAN 2. <SwitchA> system-view [SwitchA] ipv6 [SwitchA] vlan 2 [SwitchA-vlan2] port gigabitethernet 1/0/5 [SwitchA-vlan2] quit [SwitchA] interface vlan-interface 2 [SwitchA-Vlan-interface2] ipv6 address fe80::1 link-local [SwitchA-Vlan-interface2] ipv6 address 1::1 64 # Create VRRP group 1 and set its virtual IPv6 addresses to FE80::10 to 1::10. [SwitchA-Vlan-interface2] vrrp ipv6 vrid 1 virtual-ip fe80::10 link-local [SwitchA-Vlan-interface2] vrrp ipv6 vrid 1 virtual-ip 1::10 # Set the priority of Switch A in VRRP group 1 to 1 10, which is higher than that of Switch B, so that Switch...
Page 177
# Enable Switch B to send RA messages, so that hosts in VLAN 2 can learn the default gateway address. [SwitchB-Vlan-interface2] undo ipv6 nd ra halt [SwitchB-Vlan-interface2] quit # Configure VLAN 3. [SwitchB] vlan 3 [SwitchB-vlan3] port gigabitethernet 1/0/6 [SwitchB-vlan3] quit [SwitchB] interface vlan-interface 3 [SwitchB-Vlan-interface3] ipv6 address fe90::2 link-local [SwitchB-Vlan-interface3] ipv6 address 2::2 64...
# Display the detailed information of the VRRP group on Switch B. [SwitchB-Vlan-interface3] display vrrp ipv6 verbose IPv6 Standby Information: Run Mode : Standard Run Method : Virtual MAC Total number of virtual routers : 2 Interface Vlan-interface2 VRID Adver Timer : 100 Admin Status : Up...
Page 180
[SwitchA-Vlan-interface2] undo ipv6 nd ra halt [SwitchA-Vlan-interface2] quit # Create track entry 1 to associate with the physical status of VLAN-interface 3 on Switch A. When the track entry becomes negative, it means that the interface fails. [SwitchA] track 1 interface vlan-interface 3 # Configure the VFs to monitor track entry 1, making the weight of Switch A decrease by more than 245—250 in this example—when track entry 1 turns to negative.
Page 181
[SwitchC] vlan 2 [SwitchC-vlan2] port gigabitethernet 1/0/5 [SwitchC-vlan2] quit # Configure VRRP to work in load balancing mode. [SwitchC] vrrp mode load-balance # Create VRRP group 1 and configure its virtual IPv6 addresses as FE80::10 and 1::10. [SwitchC] interface vlan-interface 2 [SwitchC-Vlan-interface2] ipv6 address fe80::3 link-local [SwitchC-Vlan-interface2] ipv6 address 1::3 64 [SwitchC-Vlan-interface2] vrrp ipv6 vrid 1 virtual-ip fe80::10 link-local...
Page 182
Config Weight : 255 Running Weight : 255 Forwarder 01 State : Active Virtual MAC : 000f-e2ff-4011 (Owner) Owner ID : 0000-5e01-1101 Priority : 255 Active : local Forwarder 02 State : Listening Virtual MAC : 000f-e2ff-4012 (Learnt) Owner ID : 0000-5e01-1103 Priority : 127...
Page 183
Forwarder 02 State : Active Virtual MAC : 000f-e2ff-4012 (Owner) Owner ID : 0000-5e01-1103 Priority : 255 Active : local Forwarder 03 State : Listening Virtual MAC : 000f-e2ff-4013 (Learnt) Owner ID : 0000-5e01-1105 Priority : 127 Active : FE80::3 Forwarder Weight Track Information: Track Object State : Positive...
Page 184
Virtual MAC : 000f-e2ff-4013 (Owner) Owner ID : 0000-5e01-1105 Priority : 255 Active : local Forwarder Weight Track Information: Track Object State : Positive Weight Reduced : 250 The output shows that in VRRP group 1, Switch A is the master and Switch B and Switch C are the backups. Each of the three switches has one AVF and two LVFs acting as the backups.
Page 185
Track Object State : Negative Weight Reduced : 250 # Use the display vrrp ipv6 verbose command to display the detailed information of VRRP group 1 on Switch C. [SwitchC-Vlan-interface2] display vrrp ipv6 verbose IPv6 Standby Information: Run Mode : Load Balance Run Method : Virtual MAC Total number of virtual routers : 1...
Page 186
# When the timeout timer—about 1800 seconds—expires, display the detailed information of VRRP group 1 on Switch C. [SwitchC-Vlan-interface2] display vrrp ipv6 verbose IPv6 Standby Information: Run Mode : Load Balance Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer...
Preempt Mode : Yes Delay Time Auth Type : None Virtual IP : FE80::10 1::10 Member IP List : FE80::2 (Local, Master) FE80::3 (Backup) Forwarder Information: 2 Forwarders 1 Active Config Weight : 255 Running Weight : 255 Forwarder 02 State : Active Virtual MAC...
Page 188
If the ping succeeds, check that their configurations are consistent in terms of number of virtual IP • addresses, virtual IP addresses, advertisement interval, and authentication. Frequent VRRP state transition. Analysis: The VRRP advertisement interval is set too short. Solution: Increase the interval to send VRRP advertisement or introduce a preemption delay.
Stateful failover configuration This chapter includes these sections: Overview • Introduction to stateful failover configuration • Enabling stateful failover • Configuring the backup VLAN • Displaying and maintaining stateful failover • • Stateful failover configuration example Configuration guidelines • Overview Introduction to stateful failover Some customers require the key entries or access points of their networks, such as the Internet access point of an enterprise or a database server of a bank, to be highly reliable to ensure continuous data...
If one device fails, the other device can take over the services by using VRRP or a dynamic routing protocol (such as OSPF) to avoid service interruption. In this document, the stateful failover feature supports backing up portal, and DHCP services. Figure 48 Network diagram for stateful failover Introduction to stateful failover states The stateful failover states include:...
Introduction to stateful failover configuration To implement stateful failover on two devices, you need to perform the following configurations: Routing configuration. Configure VRRP or a dynamic routing protocol on the devices and the • uplink/downlink devices to ensure that the traffic can automatically switch to the other device when a device fails.
Configuring the backup VLAN After you specify a VLAN as a backup VLAN, the interfaces added to the VLAN can serve as stateful failover interfaces to transmit stateful failover packets. Follow these steps to configure a backup VLAN: To do… Use the command…...
Page 193
Figure 50 Network diagram for stateful failover Configuration procedure Configure Device A. # Create VLAN 100. <DeviceA> system-view [DeviceA] vlan 100 # Assign GigabitEthernet 1/0/1 to VLAN 100. [DeviceA-vlan100] port gigabitethernet 1/0/1 [DeviceA-vlan100] quit # Specify VLAN 100 as a backup VLAN. [DeviceA] dhbk vlan 100 # Enable symmetric-path mode stateful failover.
The configurations on Device D are similar to those on Device A (omitted). Configuration guidelines Stateful failover can be implemented only between two devices rather than among more than two • devices. The same numbered interfaces must exist on the two devices. Otherwise, session backup fails. For •...
BFD configuration This chapter includes these sections: Introduction to BFD • Configuring BFD basic functions • Enabling trap • Displaying and maintaining BFD • NOTE: The term router or router icon in this document refers to both routers and Layer 3 switches. Introduction to BFD Devices must quickly detect communication failures so that measures can be taken in time to ensure service continuity and enhance network availability.
Page 196
Operation of BFD Figure 51 BFD session establishment (on OSPF routers) BFD session establishment: A protocol sends Hello messages to discover neighbors and establish neighborships. After establishing neighborships, the protocol notifies BFD of the neighbor information, including destination and source addresses. BFD uses the information to establish BFD sessions.
BFD detection methods Single-hop detection: Detects the IP connectivity between two directly connected systems. • • Multi-hop detection: Detects any of the paths between two systems. These paths have multiple hops and may be overlapped. Bidirectional detection: Sends detection packets at two sides of a bidirectional link to detect the •...
Page 198
echo packets have a format similar to the format of BFD control packets (except that the Desired Min TX Interval and Required Min RX Interval fields are null) with UDP port number 3785. Figure 2 illustrates the packet format. Figure 1 BFD packet format Vers: Protocol version.
Demand (D): If set, Demand mode is active in the transmitting system (the system wishes to operate • in Demand mode, knows that the session is up in both directions, and is directing the remote system to cease the periodic transmission of BFD Control packets). If clear, Demand mode is not active in the transmitting system.
draft-ietf-bfd-multihop-08, BFD for Multihop Paths • • draft-ietf-bfd-generic-05, Generic Application of BFD Configuring BFD basic functions The BFD basic function configuration is the basis for configuring BFD for other protocols. Configuration prerequisites Before configuring BFD basic functions, complete the following tasks: •...
To do… Use the command… Remarks Optional For relevant information, see the Configure the minimum interval for description of the Required Min RX bfd min-receive-interval value receiving BFD control packets Interval field in “BFD packet format.” The value defaults to 400. Optional For relevant information, see the Configure the detection time...
NOTE: For the description of the snmp-agent trap enable bfd command, see the snmp-agent trap enable • Network Management and Monitoring Command Reference command ( Network Management and Monitoring Configuration For the information center configuration, see the • Guide Displaying and maintaining BFD To do…...
Track configuration This chapter includes these sections: Track overview • Track configuration task list • Associating the track module with a detection module • Associating the track module with an application module • Displaying and maintaining track entries • • Track configuration examples Track overview Introduction to collaboration...
If the tracked object functions normally, for example, the target interface is up or the target network • is reachable, the state of the track entry is Positive. • If the tracked object functions abnormally, for example, the target interface is down or the target network is unreachable, the state of the track entry is Negative.
Complete these tasks to configure the track module: Task Remarks Associating track with NQA Required Associating the track module Associating track with BFD with a detection module Use any of the approaches. Associating track with interface management Associating track with VRRP Required Associating the track module Associating track with static routing...
Associating track with BFD BFD supports the control packet mode and echo mode. Only echo-mode BFD can be associated with a track entry. When associated with a track entry, the BFD functions as follows: If BFD detects the link fails, it informs the track entry of the link failure. The track module then sets the •...
To do… Use the command… Remarks Create a track entry, associate it with the interface management module to track track-entry-number interface monitor the physical status of an interface-type interface-number [ delay interface, and specify the delay time { negative negative-time | positive for the track module to notify the positive-time } * ] Required...
Page 208
To do… Use the command… Remarks Enter system view system-view — interface interface-type Enter interface view — interface-number Required Create a VRRP group and vrrp vrid virtual-router-id virtual-ip No VRRP group is created by configure its virtual IP address virtual-address default.
Associating track with static routing A static route is a manually configured route. With a static route configured, packets to the specified destination are forwarded through the path specified by the administrator. The disadvantage of using static routes is that they cannot adapt to network topology changes. Faults or topological changes in the network can make the routes unreachable, causing network breaks.
Associating track with PBR Policy-based routing (PBR) is a routing mechanism based on user-defined policies. Different from the traditional destination-based routing mechanism, PBR enables you to use a policy (based on the source address, and other criteria) to route packets. PBR cannot detect the availability of any action taken on packets.
Displaying and maintaining track entries To do… Use the command… Remarks display track { track-entry-number | Display information about the all } [ | { begin | exclude | Available in any view specified or all track entries include } regular-expression ] Track configuration examples VRRP-track-NQA collaboration configuration example (the master monitors the uplink)
Page 212
# Configure the test type as ICMP-echo. [SwitchA-nqa-admin-test] type icmp-echo # Configure the destination address as 10.1.2.2. [SwitchA-nqa-admin-test-icmp-echo] destination ip 10.1.2.2 # Set the test frequency to 100 ms. [SwitchA-nqa-admin-test-icmp-echo] frequency 100 # Configure reaction entry 1, specifying that five consecutive probe failures trigger the track-NQA collaboration.
Page 213
Verify the configuration After configuration, ping Host B on Host A, and you can see that Host B is reachable. Use the display vrrp command to view the configuration result. # Display detailed information about VRRP group 1 on Switch A. [SwitchA-Vlan-interface2] display vrrp verbose IPv4 Standby Information: Run Mode...
Admin Status : Up State : Backup Config Pri : 110 Running Pri : 80 Preempt Mode : Yes Delay Time Auth Type : Simple : hello Virtual IP : 10.1.1.10 Master IP : 10.1.1.2 VRRP Track Information: Track Object State : Negative Pri Reduced : 30 # Display detailed information about VRRP group 1 on Switch B when there is a fault on the link between...
Page 215
Figure 55 Network diagram for monitoring the master on the backup Internet Virtual router Switch A Switch B Virtual IP address: Master Backup 192.168.0.10 Vlan-int2 Vlan-int2 192.168.0.101/24 192.168.0.102/24 L2 switch BFD probe packets VRRP packets Configuration procedure Create VLANs, and assign ports to the VLANs, and configure the IP address of each VLAN interface as shown in Figure 55.
Page 216
[SwitchB] interface vlan-interface 2 [SwitchB-Vlan-interface2] vrrp vrid 1 virtual-ip 192.168.0.10 [SwitchB-Vlan-interface2] vrrp vrid 1 track 1 switchover [SwitchB-Vlan-interface2] return Verify the configuration # Display the detailed information of VRRP group 1 on Switch A. <SwitchA> display vrrp verbose IPv4 Standby Information: Run Mode : Standard Run Method...
Local IP : 192.168.0.102 The output shows that when the status of the track entry becomes Positive, Switch A is the master and Switch B the backup. # Enable VRRP state debugging and BFD event debugging on Switch B. <SwitchB> terminal debugging <SwitchB>...
Page 218
Figure 56 Network diagram for monitoring uplinks using BFD Internet Master Backup uplink device uplink device Vlan-int3 1.1.1.2/24 Uplink Uplink Vlan-int3 1.1.1.1/24 Switch A Switch B Virtual router Master Virtual IP address: Backup 192.168.0.10 Vlan-int2 Vlan-int2 192.168.0.101/24 192.168.0.102/24 L2 switch BFD probe packets VRRP packets Configuration procedure...
Page 219
[SwitchB] interface vlan-interface 2 [SwitchB-Vlan-interface2] vrrp vrid 1 virtual-ip 192.168.0.10 [SwitchB-Vlan-interface2] return Verify the configuration # Display the detailed information of the VRRP group on Switch A. <SwitchA> display vrrp verbose IPv4 Standby Information: Run Mode : Standard Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2...
Page 220
The output shows that when the status of track entry 1 becomes Positive, Switch A is the master and Switch B the backup. # When the uplink of Switch A goes down, the status of track entry 1 becomes Negative. <SwitchA>...
Static routing-track-NQA collaboration configuration example Network requirements As shown in Figure 57, Switch A, Switch B, Switch C, and Switch D are connected to two segments 20.1.1.0/24 and 30.1.1.0/24. Configure static routes on these switches so that the two segments can communicate with each other, and configure route backup to improve reliability of the network.
Page 222
# Configure a static route to 30.1.1.0/24, with the address of the next hop as 10.1.1.2 and the default priority 60. This static route is associated with track entry 1. <SwitchA> system-view [SwitchA] ip route-static 30.1.1.0 24 10.1.1.2 track 1 # Configure a static route to 30.1.1.0/24, with the address of the next hop as 10.3.1.3 and the priority 80.
Page 223
<SwitchD> system-view [SwitchD] ip route-static 20.1.1.0 24 10.2.1.2 track 1 # Configure a static route to 20.1.1.0/24, with the address of the next hop as 10.4.1.3 and the priority [SwitchD] ip route-static 20.1.1.0 24 10.4.1.3 preference 80 # Configure a static route to 10.1.1.1, with the address of the next hop as 10.2.1.2. [SwitchD] ip route-static 10.1.1.1 24 10.2.1.2 # Create an NQA test group with the administrator admin and the operation tag test.
Page 224
10.3.1.0/24 Direct 0 10.3.1.1 Vlan3 10.3.1.1/32 Direct 0 127.0.0.1 InLoop0 20.1.1.0/24 Direct 0 20.1.1.1 Vlan6 20.1.1.1/32 Direct 0 127.0.0.1 InLoop0 30.1.1.0/24 Static 60 10.1.1.2 Vlan2 127.0.0.0/8 Direct 0 127.0.0.1 InLoop0 127.0.0.1/32 Direct 0 127.0.0.1 InLoop0 The output shows the NQA test result: the master route is available (the status of the track entry is Positive), and Switch A forwards packets to 30.1.1.0/24 through Switch B.
Reply from 30.1.1.1: bytes=56 Sequence=1 ttl=254 time=2 ms Reply from 30.1.1.1: bytes=56 Sequence=2 ttl=254 time=1 ms Reply from 30.1.1.1: bytes=56 Sequence=3 ttl=254 time=1 ms Reply from 30.1.1.1: bytes=56 Sequence=4 ttl=254 time=2 ms Reply from 30.1.1.1: bytes=56 Sequence=5 ttl=254 time=1 ms --- 30.1.1.1 ping statistics --- 5 packet(s) transmitted 5 packet(s) received...
Page 226
Configure static routing-track-BFD collaboration to determine whether the master route is available • in real time. If the master route is unavailable, BFD can quickly detect the route failure to make the backup route take effect, and Switch B forwards packets to 20.1.1.0/24 through Switch C and Switch A.
Page 227
# Configure a static route to 30.1.1.0/24, with the address of the next hop as 10.4.1.2. <SwitchC> system-view [SwitchC] ip route-static 30.1.1.0 24 10.4.1.2 # Configure a static route to 20.1.1.0/24, with the address of the next hop as 10.3.1.1. [SwitchB] ip route-static 20.1.1.0 24 10.3.1.1 Verify the configuration # Display information of the track entry on Switch A.
Page 228
BFD Session: Packet type: Echo Interface : Vlan-interface2 Remote IP : 10.2.1.2 Local IP : 10.2.1.1 # Display the routing table of Switch A. [SwitchA] display ip routing-table Routing Tables: Public Destinations : 9 Routes : 9 Destination/Mask Proto Cost NextHop Interface 10.2.1.0/24...
5 packet(s) received 0.00% packet loss round-trip min/avg/max = 1/1/2 ms VRRP-track-interface management collaboration configuration example (the master monitors the uplink interface) Network requirements As shown in Figure 59, Host A needs to access Host B on the Internet. The default gateway of Host •...
Page 230
Configure VRRP on Switch B. <SwitchB> system-view [SwitchB] interface vlan-interface 2 # Create VRRP group 1, and configure the virtual IP address 10.1.1.10 for the group. [SwitchB-Vlan-interface2] vrrp vrid 1 virtual-ip 10.1.1.10 Verify the configuration After configuration, ping Host B on Host A, and you can see that Host B is reachable. Use the display vrrp command to view the configuration result.
Page 231
# After shutting down the uplink interface on Switch A, display detailed information about VRRP group 1 on Switch A. [SwitchA-Vlan-interface3] display vrrp verbose IPv4 Standby Information: Run Mode : Standard Run Method : Virtual MAC Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer...
Index A B C D E H I M O R S T V Displaying and maintaining BFD,190 Displaying and maintaining CFD,29 Activating an RRPP domain,69 Displaying and maintaining DLDP,47 Associating the track module with a detection Displaying and maintaining Ethernet OAM module,193 configuration,14 Associating the track module with an application...
Page 233
Resetting DLDP state,46 RRPP configuration examples,72 Track configuration examples,199 RRPP configuration task list,64 Track configuration task list,192 RRPP overview,55 Track overview,191 Troubleshooting,92 Troubleshooting DLDP,54 Setting DLDP mode,44 Troubleshooting VRRP,175 Setting the DelayDown timer,45 Setting the interval for sending advertisement packets,44 VRRP load balancing mode,122 Setting the port shutdown...
Need help?
Do you have a question about the S5820X SERIES and is the answer not in the manual?
Questions and answers