Chapter 132 Ethernet Oam Connectivity Fault Management; Ethernet Oam Connectivity Fault Management—Overview; Series Switch - Juniper JUNOS OS 10.3 - SOFTWARE Manual

For ex series ethernet switches
Hide thumbs Also See for JUNOS OS 10.3 - SOFTWARE:
Table of Contents

Advertisement

CHAPTER 132
Ethernet OAM Connectivity Fault
Management
Ethernet OAM Connectivity Fault Management—Overview
Understanding Ethernet OAM Connectivity Fault Management for an EX Series Switch
Copyright © 2010, Juniper Networks, Inc.
Ethernet OAM Connectivity Fault Management—Overview on page 3763
Example of Ethernet OAM Connectivity Fault Management Configuration on page 3764
Configuring Ethernet OAM Connectivity Fault Management on page 3768
Configuration Statements for Ethernet OAM Connectivity Fault Management on page 3772
Operational Mode Commands for Ethernet OAM Connectivity Fault
Management on page 3793
Understanding Ethernet OAM Connectivity Fault Management for an EX Series
Switch on page 3763
Ethernet interfaces on Juniper Networks EX Series Ethernet Switches and Juniper Networks
Junos operating system (Junos OS) for EX Series switches support the IEEE 802.1ag
standard for Operation, Administration, and Management (OAM). The IEEE 802.1ag
specification provides for Ethernet connectivity fault management (CFM). CFM monitors
Ethernet networks that might comprise one or more service instances for
network-compromising connectivity faults.
The major features of CFM are:
Fault monitoring using the continuity check protocol. This is a neighbor discovery and
health check protocol that discovers and maintains adjacencies at the VLAN or link
level.
Path discovery and fault verification using the linktrace protocol.
Fault isolation using the loopback protocol.
CFM partitions the service network into various administrative domains. For example,
operators, providers, and customers might be part of different administrative domains.
Each administrative domain is mapped into one maintenance domain providing enough
information to perform its own management, thus avoiding security breaches and making
end-to-end monitoring possible.
3763

Advertisement

Table of Contents
loading

Table of Contents