HP 6125XLG Configuration Manual

Blade switch high availability configuration guide
Table of Contents

Advertisement

HP 6125XLG Blade Switch

High Availability

Configuration Guide

Part number: 5998-3724
Software version: Release 2306
Document version: 6W100-20130912

Advertisement

Table of Contents
loading

Summary of Contents for HP 6125XLG

  • Page 1: High Availability

    HP 6125XLG Blade Switch High Availability Configuration Guide Part number: 5998-3724 Software version: Release 2306 Document version: 6W100-20130912...
  • Page 2 HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
  • Page 3: Table Of Contents

    Contents Configuring Ethernet OAM ········································································································································· 1   Overview ············································································································································································ 1   Major functions of Ethernet OAM ·························································································································· 1   Ethernet OAMPDUs ·················································································································································· 1   How Ethernet OAM works ······································································································································ 1   Protocols and standards ·········································································································································· 4   Ethernet OAM configuration task list ······························································································································ 4  ...
  • Page 4 Configuration prerequisites ··········································································································································· 30   Enabling DLDP ································································································································································ 30   Setting the interval to send advertisement packets ····································································································· 30   Setting the DelayDown timer ········································································································································ 30   Setting the port shutdown mode ··································································································································· 31   Configuring DLDP authentication ·································································································································· 31  ...
  • Page 5 Fast VRRP state flapping ······································································································································· 88   Configuring BFD ························································································································································· 89   Introduction to BFD ························································································································································· 89   BFD session establishment ···································································································································· 89   BFD session modes and operating modes ·········································································································· 89   Supported features ················································································································································ 90   Protocols and standards ······································································································································· 91  ...
  • Page 6: Configuring Ethernet Oam

    Configuring Ethernet OAM Overview Ethernet Operation, Administration and Maintenance (OAM) is a tool that monitors Layer 2 link status and addresses common link-related issues on the "last mile." Ethernet OAM improves Ethernet management and maintainability. You can use it to monitor the status of the point-to-point link between two directly connected devices.
  • Page 7 Ethernet OAM connection establishment Ethernet OAM connection is the basis of all the other Ethernet OAM functions. OAM connection establishment is also known as the "Discovery phase," where an Ethernet OAM entity discovers the remote OAM entity to establish a session. In this phase, two connected OAM entities exchange Information OAMPDUs to advertise their OAM configuration and capabilities to each other for a comparison.
  • Page 8 Ethernet OAM link events Description An errored frame event occurs when the number of detected error frames in Errored frame event the detection window (specified detection interval) exceeds the predefined threshold. An errored frame period event occurs when the number of frame errors in Errored frame period event the detection window (specified number of received frames) exceeds the predefined threshold.
  • Page 9: Protocols And Standards

    Protocols and standards IEEE 802.3ah, Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications Ethernet OAM configuration task list Tasks at a glance (Required.) Configuring basic Ethernet OAM functions (Optional.) Configuring the Ethernet OAM connection detection timers (Optional.) Configuring link monitoring •...
  • Page 10: Configuring The Ethernet Oam Connection Detection Timers

    Configuring the Ethernet OAM connection detection timers After an Ethernet OAM connection is established, the Ethernet OAM entities exchange Information OAMPDUs at the handshake packet transmission interval to detect the availability of the Ethernet OAM connection. If an Ethernet OAM entity receives no Information OAMPDU within the Ethernet OAM connection timeout time, the Ethernet OAM connection is considered disconnected.
  • Page 11: Configuring Errored Symbol Event Detection

    Configuring errored symbol event detection An errored symbol event occurs when the number of detected symbol errors in the detection window (specified number of received symbols) exceeds the predefined threshold. You can configure this command in system view or interface view. The configuration in system view takes effect on all ports, and the configuration in interface view takes effect on the specified port.
  • Page 12: Configuring Errored Frame Period Event Detection

    To configure errored frame event detection on a port: Step Command Remarks Enter system view. system-view interface interface-type Enter Ethernet interface view. interface-number Configure the errored frame oam errored-frame window By default, an interface uses the event detection window. window-value value configured globally.
  • Page 13: Configuring Errored Frame Seconds Event Detection

    Configuring errored frame seconds event detection CAUTION: Make sure the errored frame seconds triggering threshold is less than the errored frame seconds detection window. Otherwise, no errored frame seconds event can be generated. An errored frame seconds event occurs when the number of times that errored frame seconds are detected on a port in the detection window (specified detection interval) exceeds the predefined threshold.
  • Page 14: Configuring Ethernet Oam Remote Loopback

    Step Command Remarks Enter system view. system-view interface interface-type Enter Ethernet interface view. interface-number Configure the action the port oam remote-failure By default, the port only logs the takes after it receives an { connection-expired | Ethernet OAM event it receives Ethernet OAM event from the critical-event | dying-gasp | from the remote end.
  • Page 15: Enabling Ethernet Oam Remote Loopback On The Port

    Enabling Ethernet OAM remote loopback on the port Step Command Remarks Enter system view. system-view interface interface-type Enter Ethernet interface view. interface-number Enable Ethernet OAM remote By default, Ethernet OAM remote oam remote-loopback start loopback on the port. loopback is disabled. Rejecting the Ethernet OAM remote loopback request from a remote port The Ethernet OAM remote loopback function impacts other services.
  • Page 16: Ethernet Oam Configuration Example

    Purpose Command Display the statistics on Ethernet OAM link error display oam link-event { local | remote } [ interface events after an Ethernet OAM connection is interface-type interface-number ] established. Clear statistics on Ethernet OAM packets and Ethernet reset oam [ interface interface-type interface-number ] OAM link error events.
  • Page 17 Use the display oam critical-event command to display the statistics of Ethernet OAM critical link events. For example: # Display the statistics of Ethernet OAM critical link events on all the ports of Device A. [DeviceA] display oam critical-event -----------[Ten-GigabitEthernet1/1/5] ----------- Local link status : UP Event statistics...
  • Page 18: Configuring Cfd

    Configuring CFD Overview Connectivity Fault Detection (CFD), which conforms to IEEE 802.1ag Connectivity Fault Management (CFM), is an end-to-end per-VLAN link layer OAM mechanism used for link connectivity detection, fault verification, and fault location. Basic CFD concepts Maintenance domain A maintenance domain (MD) defines the network or part of the network where CFD plays its role. An MD is identified by its MD name.
  • Page 19 An MA serves the specified VLAN or no VLAN. An MA that serves a VLAN is considered carrying VLAN attribute. An MA that serves no VLAN is considered having no VLAN attribute. An MP can receive packets sent by other MPs in the same MA. The level of an MA equals the level of the MD that the MA belongs to.
  • Page 20 Figure 3 Procedure of creating MIPs Figure 4 demonstrates a grading example of the CFD module. Four levels of MDs (0, 2, 3, and 5) are designed. The bigger the number, the higher the level and the larger the area covered. MPs are configured on the ports of Device A through Device F.
  • Page 21: Cfd Functions

    CFD functions CFD works effectively only in networks that are configured correctly. Its functions, which are implemented through the MPs, include: • Continuity check (CC) Loopback (LB) • Linktrace (LT) • Continuity check Connectivity faults are usually caused by device faults or configuration errors. Continuity check checks the connectivity between MEPs.
  • Page 22: Configuring Basic Cfd Settings

    Tasks at a glance Configuring basic CFD settings: • (Required.) Enabling CFD • (Required.) Configuring service instances • (Required.) Configuring MEPs • (Required.) Configuring MIP auto-generation rules Configuring CFD functions: • (Required.) Configuring CC on MEPs • (Optional.) Configuring LB on MEPs •...
  • Page 23: Configuring Meps

    Step Command Remarks cfd service-instance instance-id ma-id { icc-based icc-name | integer ma-num | string ma-name By default, no service instance Create a service instance. | vlan-based [ vlan-id ] } exists. [ ma-index index-value ] md md-name [ vlan vlan-id ] Configuring MEPs CFD is implemented through various operations on MEPs.
  • Page 24: Configuring Cfd Functions

    Changes occur to the VLAN attribute of a port. • • The rule specified in the cfd mip-rule command changes. An MA with no VLAN attribute is mainly used to detect direct link status. It cannot generate MIPs. For an MA with VLAN attribute, if the same or higher level MEP exists on the interface, no MIP is generated for the MA on the interface.
  • Page 25: Configuring Lb On Meps

    Configurations in Layer 2 aggregate interface view take effect on the aggregate interface and all • its member ports. Configurations on a member port take effect only when the member port leaves the aggregation • group. To configure CC on a MEP: Step Command Remarks...
  • Page 26: Displaying And Maintaining Cfd

    Step Command Remarks cfd linktrace service-instance Find the path between a instance-id mep mep-id { target-mac Available in any view. source MEP and a target MEP. mac-address | target-mep target-mep-id } [ ttl ttl-value ] [ hw-only ] Enter system view. system-view Enable LT messages automatic cfd linktrace auto-detection [ size...
  • Page 27 In MD_A, Device B is designed to have MIPs when its port is configured with low level MEPs. Port • Ten-GigabitEthernet 1/1/7 is configured with MEPs of MD_B, and the MIPs of MD_A can be configured on this port. You should configure the MIP generation rule of MD_A as explicit. •...
  • Page 28 [DeviceB] cfd md MD_B level 3 [DeviceB] cfd service-instance 2 ma-id vlan-based md MD_B vlan 100 Configure Device D as you configure Device B. # Create MD_B (level 3) on Device C, and create service instance 2 (in which the MA is identified by a VLAN and serves VLAN 100).
  • Page 29: Verifying The Configuration

    [DeviceA] interface ten-gigabitethernet 1/1/5 [DeviceA-Ten-GigabitEthernet1/1/5] cfd cc service-instance 1 mep 1001 enable [DeviceA-Ten-GigabitEthernet1/1/5] quit # On Device B, enable the sending of CCM frames for MEP 2001 in service instance 2 on Ten-GigabitEthernet 1/1/7. [DeviceB] interface ten-gigabitethernet 1/1/7 [DeviceB-Ten-GigabitEthernet1/1/7] cfd cc service-instance 2 mep 2001 enable [DeviceB-Ten-GigabitEthernet1/1/7] quit # On Device D, enable the sending of CCM frames for MEP 4001 in service instance 2 on Ten-GigabitEthernet 1/1/5, and enable the sending of CCM frames for MEP 4002 in service...
  • Page 30: Configuring Dldp

    Configuring DLDP Overview Unidirectional links occur when one end of a link can receive packets from the other end, but the other end cannot receive packets sent by the first end. Unidirectional fiber links include the following types: Occur when fibers are cross-connected. •...
  • Page 31: Basic Concepts

    Basic concepts DLDP neighbor states If port A and B are on the same link and port A can receive link-layer packets from port B, port B is a DLDP neighbor of port A. Two ports that can exchange packets are neighbors. Table 6 DLDP neighbor states DLDP timer Description...
  • Page 32: How Dldp Works

    DLDP timer Description If a port is physically down, the device triggers the DelayDown timer (the default is 1 second and is configurable), rather than removing the corresponding neighbor entry. DelayDown timer When the DelayDown timer expires, the device removes the corresponding DLDP neighbor information if the port is down, and does not perform any operation if the port is up.
  • Page 33 Port 1 receives the RecoverProbe packet from Port 4, and returns a RecoverEcho packet. Port 4 cannot receive any RecoverEcho packet from Port 1, so Port 4 cannot become the neighbor of Port 1. Port 3 can receive the RecoverEcho packet from Port 1, but Port 3 is not the intended destination, so Port 3 cannot become the neighbor of Port 1.
  • Page 34: Configuration Restrictions And Guidelines

    packet to Port 2. At the same time, Port 1 deletes the neighborship with Port 2, and starts the RecoverProbe timer. Port 2 stays in Inactive state during this process. Detecting multiple neighbors When multiple devices are connected through a hub, enable DLDP on all interfaces connected to the hub to detect unidirectional links among the neighbors.
  • Page 35: Configuration Prerequisites

    Configuration prerequisites Configure the full duplex mode for the ports at two ends of the link, and configure a speed for the two ports, rather than letting them negotiate a speed. Enabling DLDP To properly configure DLDP on the device, you must enable DLDP globally and on each port. To enable DLDP: Step Command...
  • Page 36: Setting The Port Shutdown Mode

    Step Command Remarks Enter system view. system-view The default is 1 second. Set the DelayDown timer. dldp delaydown-timer time The DelayDown timer setting applies to all DLDP-enabled ports. Setting the port shutdown mode On detecting a unidirectional link, the ports can be shut down in one of the following two modes. Auto mode.
  • Page 37: Displaying And Maintaining Dldp

    Step Command Remarks By default, no password is configured for DLDP authentication. If you do not configure the Configure the password for dldp authentication-password authentication password after you DLDP authentication. { cipher cipher | simple simple } configure the authentication mode, the authentication mode is none no matter which authentication mode you configure.
  • Page 38 <DeviceA> system-view [DeviceA] dldp global enable # Configure Ten-GigabitEthernet 1/1/5 to operate in full duplex mode and at 10000 Mbps, and enable DLDP on the port. [DeviceA] interface ten-gigabitethernet 1/1/5 [DeviceA-Ten-GigabitEthernet1/1/5] duplex full [DeviceA-Ten-GigabitEthernet1/1/5] speed 10000 [DeviceA-Ten-GigabitEthernet1/1/5] dldp enable [DeviceA-Ten-GigabitEthernet1/1/5] quit # Configure Ten-GigabitEthernet 1/1/6 to operate in full duplex mode and at 10000 Mbps, and enable DLDP on the port.
  • Page 39 DLDP unidirectional-shutdown mode: Auto DLDP delaydown-timer value: 1s Number of enabled ports: 2 Interface Ten-GigabitEthernet1/1/5 DLDP port state: Bidirectional Number of the port’s neighbors: 1 Neighbor MAC address: 0023-8956-3600 Neighbor port index: 1 Neighbor state: Confirmed Neighbor aged time: 11s Interface Ten-GigabitEthernet1/1/6 DLDP port state: Bidirectional Number of the port’s neighbors: 1...
  • Page 40: Manually Shutting Down Unidirectional Links

    Number of enabled ports: 2 Interface Ten-GigabitEthernet1/1/5 DLDP port state: Unidirectional Number of the port’s neighbors: 0 (Maximum number ever detected: 1) Interface Ten-GigabitEthernet1/1/6 DLDP port state: Unidirectional Number of the port’s neighbors: 0 (Maximum number ever detected: 1) The output shows that the DLDP port status of both Ten-GigabitEthernet 1/1/5 and Ten-GigabitEthernet 1/1/6 is unidirectional, which indicates that DLDP detects unidirectional links on them and automatically shuts down the two ports.
  • Page 41 Figure 11 Network diagram Configuration procedure Configure Device A: # Enable DLDP globally. <DeviceA> system-view [DeviceA] dldp enable # Configure Ten-GigabitEthernet 1/1/5 to operate in full duplex mode and at 10000 Mbps, and enable DLDP on the port. [DeviceA] interface ten-gigabitethernet 1/1/5 [DeviceA-Ten-GigabitEthernet1/1/5] duplex full [DeviceA-Ten-GigabitEthernet1/1/5] speed 10000 [DeviceA-Ten-GigabitEthernet1/1/5] dldp enable...
  • Page 42 [DeviceB-Ten-GigabitEthernet1/1/6] dldp enable [DeviceB-Ten-GigabitEthernet1/1/6] quit # Set the port shutdown mode to manual. [DeviceB] dldp unidirectional-shutdown manual Verify the configuration: After the configurations are complete, you can use the display dldp command to display the DLDP configuration globally and on ports. # Display the DLDP configuration globally and on all the DLDP-enabled ports of Device A.
  • Page 43 %Jul 12 08:29:25:004 2012 DeviceA IFNET/3/PHY_UPDOWN: Ten-GigabitEthernet1/1/5 link status is UP. %Jul 12 08:29:25:005 2012 DeviceA IFNET/5/LINK_UPDOWN: Line protocol on the interface Ten-GigabitEthernet1/1/5 is UP. %Jul 12 08:29:25:893 2012 DeviceA IFNET/3/PHY_UPDOWN: Ten-GigabitEthernet1/1/6 link status is UP. %Jul 12 08:29:25:894 2012 DeviceA IFNET/5/LINK_UPDOWN: Line protocol on the interface Ten-GigabitEthernet1/1/6 is UP.
  • Page 44 [DeviceA-Ten-GigabitEthernet1/1/6] shutdown Correct the fiber connections and bring up the two ports: # Bring up Ten-GigabitEthernet 1/1/6. [DeviceA-Ten-GigabitEthernet1/1/6] undo shutdown The following log information is displayed on Device A: [DeviceA-Ten-GigabitEthernet1/1/6]%Jul 12 08:46:17:677 2012 DeviceA IFNET/3/PHY_UPDOWN: Ten-GigabitEthernet1/1/6 link status is UP. %Jul 12 08:46:17:678 2012 DeviceA IFNET/5/LINK_UPDOWN: Line protocol on the interface Ten-GigabitEthernet1/1/6 is UP.
  • Page 45: Configuring Vrrp

    Configuring VRRP The interfaces that VRRP involves can be only Layer 3 Ethernet interfaces and VLAN interfaces unless otherwise specified. You can configure an Ethernet port as a Layer 3 interface by using the port link-mode route command (see Layer 2—LAN Switching Configuration Guide). Overview Typically, you can configure a default gateway for every host on a LAN.
  • Page 46: Vrrp Standard Mode

    Load balancing mode—Extends the VRRP standard mode to distribute load across VRRP group • members. For more information, see "VRRP load balancing mode." VRRP has two versions: VRRPv2 and VRRPv3. VRRPv2 supports IPv4 VRRP. VRRPv3 supports IPv4 VRRP and IPv6 VRRP. VRRP standard mode In VRRP standard mode, only the master in the VRRP group can provide gateway service.
  • Page 47: Authentication Method

    Preemptive mode—A backup starts a new master election and takes over as master when it detects • that it has a higher priority than the current master. Preemptive mode makes sure the router with the highest priority in a VRRP group always acts as the master. Authentication method To avoid attacks from unauthorized users, VRRP member routers add authentication keys in VRRP packets to authenticate one another.
  • Page 48: Master Election

    Master election Routers in a VRRP group determine their roles by priority. When a router joins a VRRP group, it has a backup role. The router role changes according to the following situations: • If the backup does not receive any VRRP advertisement when the timer (3 × advertisement interval + Skew_Time) expires, it becomes the master.
  • Page 49 Figure 14 VRRP in master/backup mode Assume that Router A is acting as the master to forward packets to external networks, and Router B and Router C are backups in listening state. When Router A fails, Router B and Router C elect a new master to forward packets for hosts on the subnet.
  • Page 50: Vrrp Load Balancing Mode

    VRRP group 1—Router A is the master. Router B and Router C are the backups. • • VRRP group 2—Router B is the master. Router A and Router C are the backups. VRRP group 3—Router C is the master. Router A and Router B are the backups. •...
  • Page 51 Figure 16 Virtual MAC address assignment Network Router A Router B Master Backup Virtual IP: 10.1.1.1/24 Virtual MAC: 000f-e2ff-0012 Virtual MAC: 000f-e2ff-0011 Allocate Virtual MAC 000f-e2ff-0012 to Router B Gateway IP: 10.1.1.1/24 Gateway IP: 10.1.1.1/24 Host A Host B When an ARP request arrives, the master (Router A) selects a virtual MAC address based on the load balancing algorithm to answer the ARP request.
  • Page 52: Virtual Forwarder

    Figure 18 Sending packets to different routers for forwarding Virtual forwarder Virtual forwarder creation Virtual MAC addresses enable traffic distribution across routers in a VRRP group. To enable routers in the VRRP group to forward packets, VFs must be created on them. Each VF is associated with a virtual MAC address in the VRRP group and forwards packets that are sent to this virtual MAC address.
  • Page 53 On a router that does not own the VF, if the weight of the VF is higher than or equal to the lower limit • of failure, the priority of the VF is calculated as weight/(number of local AVFs +1). If the weight of the VF is lower than the lower limit of failure, the priority of the VF is 0.
  • Page 54: Protocols And Standards

    Redirect timer—Before this timer expires, the master still uses the virtual MAC address • corresponding to the failed AVF to respond to ARP/ND requests from hosts, and the VF owner can share traffic load if the VF owner resumes normal operation within this time. When this timer expires, the master stops using the virtual MAC address corresponding to the failed AVF to respond to ARP/ND requests from hosts.
  • Page 55: Specifying An Ipv4 Vrrp Operating Mode

    Specifying an IPv4 VRRP operating mode A VRRP group can operate in either of the following modes: • Standard mode—Only the master can forward packets. Load balancing mode—All members that have an AVF can forward packets. • After an IPv4 VRRP operating mode is configured on a router, all IPv4 VRRP groups on the router operate in the specified operating mode.
  • Page 56: Configuring The Router Priority, Preemptive Mode, And Tracking Function

    When a router is the IP address owner in a VRRP group, do not configure the network command on • the interface to use the IP address of the interface, or the virtual IP address of the VRRP group, to establish a neighbor relationship with the adjacent router.
  • Page 57: Configuring Ipv4 Vrrp Packet Attributes

    Step Command Remarks By default, the router in a VRRP Enable the preemptive mode vrrp vrid virtual-router-id group operates in preemptive for the router in a VRRP group preempt-mode [ delay mode and the preemption delay and configure the preemption delay-value ] time is 0 seconds, which means an delay time.
  • Page 58: Configuring Vf Tracking

    Configuring VF tracking You can configure VF tracking in both standard mode and load balancing mode, but the function takes effect only in load balancing mode. In load balancing mode, you can establish the collaboration between the VFs and NQA or BFD through the tracking function.
  • Page 59: Displaying And Maintaining Ipv4 Vrrp

    Displaying and maintaining IPv4 VRRP Execute display commands in any view and the reset command in user view. Task Command display vrrp [ interface interface-type interface-number [ vrid Display states of IPv4 VRRP groups. virtual-router-id ] ] [ verbose ] Display statistics for IPv4 VRRP display vrrp statistics [ interface interface-type interface-number [ vrid groups.
  • Page 60: Creating A Vrrp Group And Assigning A Virtual Ipv6 Address

    Step Command Remarks Enter system view. system-view • Specify the standard mode: undo vrrp ipv6 mode Use one of the commands. Specify an IPv6 VRRP • Specify the load balancing By default, VRRP operates in operating mode. mode: standard mode. vrrp ipv6 mode load-balance Creating a VRRP group and assigning a virtual IPv6 address A VRRP group can work properly after you create it and assign at least one virtual IPv6 address for it.
  • Page 61: Configuring The Router Priority, Preemptive Mode, And Tracking Function

    Step Command Remarks (Optional.) Assign a virtual By default, no global unicast vrrp ipv6 vrid virtual-router-id IPv6 address, which is a address is assigned for an IPv6 virtual-ip virtual-address global unicast address. VRRP group. Configuring the router priority, preemptive mode, and tracking function Configuration guidelines The running priority of an IP address owner is always 255, and you do not need to configure it.
  • Page 62: Configuring The Ipv6 Vrrp Advertisement Interval

    When the weight of a VF owner is higher than or equal to the lower limit of failure, its priority is • always 255 and does not change with the weight. To guarantee that an LVF can take over the VF owner as the AVF when the upstream link of the VF owner fails, the reduced weight for the VF owner must be higher than 245 so the weight of the VF owner can drop below the lower limit of failure.
  • Page 63: Disabling An Ipv6 Vrrp Group

    Disabling an IPv6 VRRP group You can temporarily disable an IPv6 VRRP group. After being disabled, the VRRP group stays in initialized state, and its configurations remain unchanged. You can change the configuration of a VRRP group when it is disabled. Your changes take effect when you enable the VRRP group again. To disable an IPv6 VRRP group: Step Command...
  • Page 64 Figure 20 Network diagram Configuration procedure Configure Switch A: # Configure VLAN 2. <SwitchA> system-view [SwitchA] vlan 2 [SwitchA-vlan2] port ten-gigabitethernet 1/1/5 [SwitchA-vlan2] quit [SwitchA] interface vlan-interface 2 [SwitchA-Vlan-interface2] ip address 10.1.1.1 255.255.255.0 # Create VRRP group 1 on VLAN-interface 2, and set its virtual IP address to 10.1.1.111. [SwitchA-Vlan-interface2] vrrp vrid 1 virtual-ip 10.1.1.111 # Assign Switch A a higher priority than Switch B in VRRP group 1, so Switch A can become the master.
  • Page 65 [SwitchB-Vlan-interface2] vrrp vrid 1 preempt-mode delay 5 Verify the configuration: # Ping Host B from Host A. (Details not shown.) # Display detailed information about VRRP group 1 on Switch A. [SwitchA-Vlan-interface2] display vrrp verbose IPv4 Virtual Router Information: Running Mode : Standard Total number of virtual routers : 1 Interface Vlan-interface2...
  • Page 66: Multiple Vrrp Groups Configuration Example

    Master IP : 10.1.1.2 The output shows that when Switch A fails, Switch B takes over to forward packets from Host A to Host B. # Recover the link between Host A and Switch A, and display detailed information about VRRP group 1 on Switch A.
  • Page 67 Figure 21 Network diagram Configuration procedure Configure Switch A: # Configure VLAN 2. <SwitchA> system-view [SwitchA] vlan 2 [SwitchA-vlan2] port ten-gigabitethernet 1/1/5 [SwitchA-vlan2] quit [SwitchA] interface vlan-interface 2 [SwitchA-Vlan-interface2] ip address 10.1.1.1 255.255.255.128 # Create VRRP group 1, and set its virtual IP address to 10.1.1.100. [SwitchA-Vlan-interface2] vrrp vrid 1 virtual-ip 10.1.1.100 # Assign Switch A a higher priority than Switch B in VRRP group 1, so Switch A can become the master in the group.
  • Page 68 [SwitchB-Vlan-interface2] ip address 10.1.1.2 255.255.255.128 # Create VRRP group 1, and set its virtual IP address to 10.1.1.100. [SwitchB-Vlan-interface2] vrrp vrid 1 virtual-ip 10.1.1.100 [SwitchB-Vlan-interface2] quit # Configure VLAN 3. [SwitchB] vlan 3 [SwitchB-vlan3] port ten-gigabitethernet 1/1/6 [SwitchB-vlan3] quit [SwitchB] interface vlan-interface 3 [SwitchB-Vlan-interface3] ip address 10.1.1.131 255.255.255.128 # Create VRRP group 2, and set its virtual IP address to 10.1.1.200.
  • Page 69: Vrrp Load Balancing Configuration Example

    Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time Auth Type : None Virtual IP : 10.1.1.100 Master IP : 10.1.1.1 Interface Vlan-interface3 VRID Adver Timer : 100 Admin Status : Up State : Master Config Pri : 110 Running Pri...
  • Page 70 Figure 22 Network diagram Network Switch A Switch B Switch C Vlan-int3 Vlan-int3 Vlan-int3 Backup Master Backup AVF 3 AVF 1 AVF 2 XGE1/1/5 XGE1/1/5 XGE1/1/5 Vlan-int2 Vlan-int2 Vlan-int2 IP: 10.1.1.2/24 IP: 10.1.1.3/24 IP: 10.1.1.4/24 VIP: 10.1.1.1/24 VIP: 10.1.1.1/24 VIP: 10.1.1.1/24 IP: 10.1.1.5/24 IP: 10.1.1.6/24 IP: 10.1.1.7/24...
  • Page 71 [SwitchA] interface vlan-interface 2 [SwitchA-Vlan-interface2] vrrp vrid 1 weight track 1 reduced 250 Configure Switch B: # Configure VLAN 2. <SwitchB> system-view [SwitchB] vlan 2 [SwitchB-vlan2] port ten-gigabitethernet 1/1/5 [SwitchB-vlan2] quit # Configure VRRP to operate in load balancing mode. [SwitchB] vrrp mode load-balance # Create VRRP group 1, and set its virtual IP address to 10.1.1.1.
  • Page 72 # Configure the VFs in VRRP group 1 to monitor track entry 1, and decrease their weights by 250 when the track entry transits to Negative. [SwitchC] interface vlan-interface 2 [SwitchC-Vlan-interface2] vrrp vrid 1 weight track 1 reduced 250 Verify the configuration: # Verify that Host A can ping the external network.
  • Page 73 Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer : 100 Admin Status : Up State : Backup Config Pri : 110 Running Pri : 110 Preempt Mode : Yes Delay Time Auth Type : None Virtual IP : 10.1.1.1 Member IP List : 10.1.1.3 (Local, Backup) 10.1.1.2 (Master)
  • Page 74 10.1.1.3 (Backup) Forwarder Information: 3 Forwarders 1 Active Config Weight : 255 Running Weight : 255 Forwarder 01 State : Listening Virtual MAC : 000f-e2ff-0011 (Learnt) Owner ID : 0000-5e01-1101 Priority : 127 Active : 10.1.1.2 Forwarder 02 State : Listening Virtual MAC : 000f-e2ff-0012 (Learnt) Owner ID...
  • Page 75 Owner ID : 0000-5e01-1101 Priority Active : 10.1.1.4 Forwarder 02 State : Initialize Virtual MAC : 000f-e2ff-0012 (Learnt) Owner ID : 0000-5e01-1103 Priority Active : 10.1.1.3 Forwarder 03 State : Initialize Virtual MAC : 000f-e2ff-0013 (Learnt) Owner ID : 0000-5e01-1105 Priority Active : 10.1.1.4...
  • Page 76 State : Active Virtual MAC : 000f-e2ff-0013 (Owner) Owner ID : 0000-5e01-1105 Priority : 255 Active : local Forwarder Weight Track Information: Track Object State : Positive Weight Reduced : 250 The output shows that when VLAN-interface 3 on Switch A fails, the weights of the VFs on Switch A drop below the lower limit of failure.
  • Page 77: Ipv6 Vrrp Configuration Examples

    IPv4 Virtual Router Information: Running Mode : Load Balance Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer : 100 Admin Status : Up State : Master Config Pri : 110 Running Pri : 110 Preempt Mode : Yes Delay Time Auth Type...
  • Page 78 Figure 23 Network diagram Virtual IPv6 address: FE80::10 1::10/64 XGE1/1/5 Vlan-int2 FE80::1 1::1/64 Switch A Gateway: 1::10/64 Internet XGE1/1/5 Host B Host A Vlan-int2 FE80::2 1::2/64 Switch B Configuration procedure Configure Switch A: # Configure VLAN 2. <SwitchA> system-view [SwitchA] vlan 2 [SwitchA-vlan2] port ten-gigabitethernet 1/1/5 [SwitchA-vlan2] quit [SwitchA] interface vlan-interface 2...
  • Page 79 # Create VRRP group 1 and set its virtual IPv6 addresses to FE80::10 and 1::10. [SwitchB-Vlan-interface2] vrrp ipv6 vrid 1 virtual-ip fe80::10 link-local [SwitchB-Vlan-interface2] vrrp ipv6 vrid 1 virtual-ip 1::10 # Configure Switch B to operate in preemptive mode, and set the preemption delay to 5 seconds. [SwitchB-Vlan-interface2] vrrp ipv6 vrid 1 preempt-mode delay 5 # Enable Switch B to send RA messages, so Host A can learn the default gateway address.
  • Page 80: Multiple Vrrp Groups Configuration Example

    Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer : 100 Admin Status : Up State : Master Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time Auth Type : None Virtual IP : FE80::10 1::10 Virtual MAC...
  • Page 81 Figure 24 Network diagram Configuration procedure Configure Switch A: # Configure VLAN 2. <SwitchA> system-view [SwitchA] vlan 2 [SwitchA-vlan2] port ten-gigabitethernet 1/1/5 [SwitchA-vlan2] quit [SwitchA] interface vlan-interface 2 [SwitchA-Vlan-interface2] ipv6 address fe80::1 link-local [SwitchA-Vlan-interface2] ipv6 address 1::1 64 # Create VRRP group 1, and set its virtual IPv6 addresses to FE80::10 to 1::10. [SwitchA-Vlan-interface2] vrrp ipv6 vrid 1 virtual-ip fe80::10 link-local [SwitchA-Vlan-interface2] vrrp ipv6 vrid 1 virtual-ip 1::10 # Assign Switch A a higher priority than Switch B in VRRP group 1, so Switch A can become the...
  • Page 82 [SwitchA-Vlan-interface3] vrrp ipv6 vrid 2 virtual-ip 2::10 # Enable Switch A to send RA messages, so hosts in VLAN 3 can learn the default gateway address. [SwitchA-Vlan-interface3] undo ipv6 nd ra halt Configure Switch B: # Configure VLAN 2. <SwitchB> system-view [SwitchB-vlan2] port ten-gigabitethernet 1/1/5 [SwitchB-vlan2] quit [SwitchB] interface vlan-interface 2...
  • Page 83: Vrrp Load Balancing Configuration Example

    Auth Type : None Virtual IP : FE80::10 1::10 Virtual MAC : 0000-5e00-0201 Master IP : FE80::1 Interface Vlan-interface3 VRID Adver Timer : 100 Admin Status : Up State : Backup Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time Auth Type...
  • Page 84 Network requirements Switch A, Switch B, and Switch C form a load balanced VRRP group and use the virtual IPv6 addresses FE80::10 and 1::10 to provide gateway service for subnet 1::/64, as shown in Figure Hosts on subnet 1::/64 learn 1::10 as their default gateway from RA messages sent by the switches. Configure VFs on Switch A, Switch B, or Switch C to monitor their respective VLAN-interface 3.
  • Page 85 [SwitchA-Vlan-interface2] vrrp ipv6 vrid 1 priority 120 # Configure Switch A to operate in preemptive mode, so it can become the master whenever it operates properly. Set the preemption delay to 5 seconds to avoid frequent status switchover. [SwitchA-Vlan-interface2] vrrp ipv6 vrid 1 preempt-mode delay 5 # Enable Switch A to send RA messages, so hosts on subnet 1::/64 can learn the default gateway address.
  • Page 86: Gateway Address

    # Configure VLAN 2. <SwitchC> system-view [SwitchC] vlan 2 [SwitchC-vlan2] port ten-gigabitethernet 1/1/5 [SwitchC-vlan2] quit # Configure VRRP to operate in load balancing mode. [SwitchC] vrrp ipv6 mode load-balance # Create VRRP group 1, and set its virtual IPv6 addresses to FE80::10 and 1::10. [SwitchC] interface vlan-interface 2 [SwitchC-Vlan-interface2] ipv6 address fe80::3 link-local [SwitchC-Vlan-interface2] ipv6 address 1::3 64...
  • Page 87 Forwarder 01 State : Active Virtual MAC : 000f-e2ff-4011 (Owner) Owner ID : 0000-5e01-1101 Priority : 255 Active : local Forwarder 02 State : Listening Virtual MAC : 000f-e2ff-4012 (Learnt) Owner ID : 0000-5e01-1103 Priority : 127 Active : FE80::2 Forwarder 03 State : Listening...
  • Page 88 Owner ID : 0000-5e01-1103 Priority : 255 Active : local Forwarder 03 State : Listening Virtual MAC : 000f-e2ff-4013 (Learnt) Owner ID : 0000-5e01-1105 Priority : 127 Active : FE80::3 Forwarder Weight Track Information: Track Object State : Positive Weight Reduced : 250 # Display detailed information about VRRP group 1 on Switch C.
  • Page 89 Forwarder Weight Track Information: Track Object State : Positive Weight Reduced : 250 The output shows that Switch A is the master in VRRP group 1, and each of the three switches has one AVF and two LVFs. # Disconnect the link of VLAN-interface 3 on Switch A and display detailed information about VRRP group 1 on Switch A.
  • Page 90 Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer : 100 Admin Status : Up State : Backup Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time Auth Type : None Virtual IP : FE80::10 1::10 Member IP List : FE80::3 (Local, Backup)
  • Page 91 Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time Auth Type : None Virtual IP : FE80::10 1::10 Member IP List : FE80::3 (Local, Backup) FE80::1 (Master) FE80::2 (Backup) Forwarder Information: 2 Forwarders 1 Active Config Weight : 255 Running Weight : 255...
  • Page 92: Troubleshooting Vrrp

    Owner ID : 0000-5e01-1103 Priority : 255 Active : local Forwarder 03 State : Listening Virtual MAC : 000f-e2ff-4013 (Learnt) Owner ID : 0000-5e01-1105 Priority : 127 Active : FE80::3 Forwarder Weight Track Information: Track Object State : Positive Weight Reduced : 250 The output shows that when Switch A fails, Switch B becomes the master because it has a higher priority than Switch C, and the VF for virtual MAC address 000f-e2ff-4011 is removed.
  • Page 93: Fast Vrrp State Flapping

    Solution Ping between these masters, and do the following checks: • If the ping fails, examine network connectivity. If the ping succeeds, check for configuration inconsistencies in the number of virtual IP addresses, • virtual IP addresses, and authentication. For IPv4 VRRP, also make sure a consistent version of VRRP is configured on all routers in the VRRP group.
  • Page 94: Configuring Bfd

    Configuring BFD The term "interface" in this chapter refers to Layer 3 interfaces, including VLAN interfaces and Layer 3 Ethernet interfaces. You can configure an Ethernet port as a Layer 3 interface by using the port link-mode route command (see Layer 2—LAN Switching Configuration Guide). Introduction to BFD Bidirectional forwarding detection (BFD) provides a general-purpose, standard, medium- and protocol-independent fast failure detection mechanism.
  • Page 95: Supported Features

    Control packets—Encapsulated into UDP packets with port number 3784 for single-hop detection • or port number 4784 for multi-hop detection. Echo packet mode The local end of the link sends echo packets to establish BFD sessions and monitor link status. The peer end does not establish BFD sessions and only forwards the packets back to the originating end.
  • Page 96: Protocols And Standards

    Protocols and standards RFC 5880, Bidirectional Forwarding Detection (BFD) • • RFC 5881, Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop) RFC 5882, Generic Application of Bidirectional Forwarding Detection (BFD) • RFC 5883, Bidirectional Forwarding Detection (BFD) for Multihop Paths •...
  • Page 97 Step Command Remarks Enter system view. system-view Specify the mode for bfd session init-mode { active | By default, active is specified. establishing a BFD session. passive } interface interface-type Enter interface view. interface-number Configure the authentication bfd authentication-mode simple By default, single-hop BFD packets mode for single-hop control key-id { cipher cipher-string | plain...
  • Page 98: Displaying And Maintaining Bfd

    Step Command Remarks Configure the minimum bfd multi-hop The default setting is 400 interval for transmitting min-transmit-interval value milliseconds. multi-hop BFD control packets. Displaying and maintaining BFD Execute the display command in any view and the reset command in user view. Task Command Display BFD session information.
  • Page 99: Configuring Track

    Configuring Track Overview The Track module works between application and detection modules, as shown in Figure 26. It shields the differences between various detection modules from application modules. Collaboration is enabled after you associate the Track module with a detection module and an application module.
  • Page 100: Collaboration Application Example

    BFD. • • Interface management module. Collaboration between the Track module and an application module The following application modules can be associated with the Track module: • VRRP. Static routing. • Policy-based routing. • When configuring a track entry for an application module, you can set a notification delay to avoid immediate notification of status changes, which can cause communication failure.
  • Page 101: Associating The Track Module With A Detection Module

    Tasks at a glance Remarks (Required.) Associating the Track module with an application module: • Associating Track with VRRP Use one of the methods. • Associating Track with static routing • Associating Track with PBR Associating the Track module with a detection module Associating Track with NQA NQA supports multiple test types to analyze network performance, services, and service quality.
  • Page 102: Associating Track With Interface Management

    If the BFD detects that the link is operating properly, the Track module sets the track entry to the • Positive state. Configuration prerequisites Before you associate Track with BFD, configure the source IP address of BFD echo packets. For more information, see "Configuring BFD."...
  • Page 103: Associating The Track Module With An Application Module

    Step Command Remarks • Create a track entry, associate it with the interface management module to monitor the link status of an interface, and specify the delay time for the Track module to notify the associated application module when the track entry status changes: track track-entry-number interface interface-type interface-number [ delay...
  • Page 104: Associating Track With Static Routing

    Monitor the master on a backup. If a fault occurs on the master, the backup operating in switchover • mode will switch to the master immediately to maintain normal communication. When VRRP is operating in load balancing mode, associate the Track module with the VRRP Virtual Forwarder (VF) to change the priority of the active VF (AVF) according to its uplink state.
  • Page 105 The disadvantage of using static routes is that they cannot adapt to network topology changes. Faults or topological changes in the network can make the routes unreachable, causing network breaks. To prevent this problem, configure another route to back up the static route. When the static route is reachable, packets are forwarded through the static route.
  • Page 106: Associating Track With Pbr

    Associating Track with PBR PBR is a routing mechanism based on user-defined policies. Different from the traditional destination-based routing mechanism, PBR allows you to use a policy (based on such criteria as the source address and packet length) to route packets. You can specify the VPN instance, packet priority, outgoing interface, next hop, default outgoing interface, default next hop, and other parameters to guide the forwarding of packets that match specific ACLs or have specific lengths.
  • Page 107: Displaying And Maintaining Track Entries

    Step Command Remarks Define an ACL match By default, no packets are if-match acl acl-number criterion. filtered. By default, no next hop is set. apply ip-address next-hop [ vpn-instance Set the next hop, and You can set two next hops vpn-instance-name ] { ip-address [ direct ] associate it with a track entry.
  • Page 108 Figure 27 Network diagram Configuration procedure Create VLANs and assign corresponding ports to them. Configure the IP address of each VLAN interface as shown in Figure 27. (Details not shown.) Configure an NQA test group on Switch A: # Create an NQA test group with the administrator name admin and the operation tag test. <SwitchA>...
  • Page 109 # Set the authentication mode of VRRP group 1 to simple, and the authentication key to hello. [SwitchA-Vlan-interface2] vrrp vrid 1 authentication-mode simple hello # Configure the master to send VRRP packets at an interval of 500 centiseconds. [SwitchA-Vlan-interface2] vrrp vrid 1 timer advertise 500 # Configure Switch A to operate in preemptive mode, and set the preemption delay to 5 seconds.
  • Page 110 Admin Status : Up State : Backup Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time Become Master : 2200ms left Auth Type : Simple : ****** Virtual IP : 10.1.1.10 Master IP : 10.1.1.1 The output shows that in VRRP group 1, Switch A is the master, and Switch B is a backup.
  • Page 111: Configuring Bfd For A Vrrp Backup To Monitor The Master

    Configuring BFD for a VRRP backup to monitor the master Network requirements As shown in Figure 28, Switch A and Switch B belong to VRRP group 1, whose virtual IP address is • 192.168.0.10. The default gateway of the hosts in the LAN is 192.168.0.10. When Switch A operates correctly, the •...
  • Page 112 Configure BFD on Switch B: # Configure the source address of BFD echo packets as 10.10.10.10. <SwitchB> system-view [SwitchB] bfd echo-source-ip 10.10.10.10 Create the track entry to be associated with the BFD session on Switch B: # Create track entry 1 to be associated with the BFD session to check whether Switch A is reachable.
  • Page 113 VRRP Track Information: Track Object State : Positive Switchover # Display information about track entry 1 on Switch B. <SwitchB> display track 1 Track ID: 1 State: Positive Duration: 0 days 0 hours 0 minutes 32 seconds Notification delay: Positive 0, Negative 0 (in seconds) Tracked object: BFD session mode: Echo Outgoing interface: Vlan-interface2...
  • Page 114: Configuring Bfd For The Vrrp Master To Monitor The Uplinks

    Configuring BFD for the VRRP master to monitor the uplinks Network requirements As shown in Figure 29, Switch A and Switch B belong to VRRP group 1, whose virtual IP address is • 192.168.0.10. The default gateway of the hosts in the LAN is 192.168.0.10. •...
  • Page 115 Configure VRRP on Switch A: # Create VRRP group 1, and configure the virtual IP address of the group as 192.168.0.10. Configure the priority of Switch A in VRRP group 1 as 110. Configure VRRP group 1 to monitor the status of track entry 1.
  • Page 116 <SwitchB> display vrrp verbose IPv4 Virtual Router Information: Running Mode : Standard Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer : 100 Admin Status : Up State : Backup Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time...
  • Page 117: Static Routing-Track-Nqa Collaboration Configuration Example

    Total number of virtual routers : 1 Interface Vlan-interface2 VRID Adver Timer : 100 Admin Status : Up State : Master Config Pri : 100 Running Pri : 100 Preempt Mode : Yes Delay Time Auth Type : None Virtual IP : 192.168.0.10 Virtual MAC : 0000-5e00-0101...
  • Page 118 Figure 30 Network diagram Configuration procedure Create VLANs and assign corresponding ports to them. Configure the IP address of each VLAN interface as shown in Figure 30. (Details not shown.) Configure Switch A: # Configure a static route to 30.1.1.0/24, with the address of the next hop as 10.1.1.2 and the default priority 60.
  • Page 119 [SwitchA] nqa schedule admin test start-time now lifetime forever # Configure track entry 1, and associate it with reaction entry 1 of the NQA test group (with the administrator admin, and the operation tag test). [SwitchA] track 1 nqa entry admin test reaction 1 Configure Switch B: # Configure a static route to 30.1.1.0/24, with the address of the next hop as 10.2.1.4.
  • Page 120 [SwitchD] track 1 nqa entry admin test reaction 1 Verifying the configuration # Display information about the track entry on Switch A. [SwitchA] display track all Track ID: 1 State: Positive Duration: 0 days 0 hours 0 minutes 32 seconds Notification delay: Positive 0, Negative 0 (in seconds) Tracked object: NQA entry: admin test...
  • Page 121 Destination/Mask Proto Cost NextHop Interface 10.1.1.0/24 Direct 0 10.1.1.1 Vlan2 10.1.1.1/32 Direct 0 127.0.0.1 InLoop0 10.2.1.0/24 Static 60 10.1.1.2 Vlan2 10.3.1.0/24 Direct 0 10.3.1.1 Vlan3 10.3.1.1/32 Direct 0 127.0.0.1 InLoop0 20.1.1.0/24 Direct 0 20.1.1.1 Vlan6 20.1.1.1/32 Direct 0 127.0.0.1 InLoop0 30.1.1.0/24 Static 80 10.3.1.3...
  • Page 122: Static Routing-Track-Bfd Collaboration Configuration Example

    Static routing-Track-BFD collaboration configuration example Network requirements As shown in Figure 31, Switch A, Switch B, and Switch C are connected to two segments 20.1.1.0/24 and 30.1.1.0/24. Configure static routes on these routers so that the two segments can communicate with each other.
  • Page 123 [SwitchA] ip route-static 30.1.1.0 24 10.2.1.2 track 1 # Configure a static route to 30.1.1.0/24, with the address of the next hop as 10.3.1.3 and the priority 80. [SwitchA] ip route-static 30.1.1.0 24 10.3.1.3 preference 80 # Configure the source address of BFD echo packets as 10.10.10.10. [SwitchA] bfd echo-source-ip 10.10.10.10 # Configure track entry 1, and associate it with the BFD session.
  • Page 124 Destinations : 9 Routes : 9 Destination/Mask Proto Cost NextHop Interface 10.2.1.0/24 Direct 0 10.2.1.1 Vlan2 10.2.1.1/32 Direct 0 127.0.0.1 InLoop0 10.3.1.0/24 Direct 0 10.3.1.1 Vlan3 10.3.1.1/32 Direct 0 127.0.0.1 InLoop0 20.1.1.0/24 Direct 0 20.1.1.1 Vlan5 20.1.1.1/32 Direct 0 127.0.0.1 InLoop0 30.1.1.0/24 Static 60...
  • Page 125: Vrrp-Track-Interface Management Collaboration Configuration Example

    # When the master route fails, the hosts in 20.1.1.0/24 can still communicate with the hosts in 30.1.1.0/24. [SwitchA] ping -a 20.1.1.1 30.1.1.1 PING 30.1.1.1: 56 data bytes, press CTRL_C to break Reply from 30.1.1.1: bytes=56 Sequence=1 ttl=254 time=2 ms Reply from 30.1.1.1: bytes=56 Sequence=2 ttl=254 time=1 ms Reply from 30.1.1.1: bytes=56 Sequence=3 ttl=254 time=1 ms Reply from 30.1.1.1: bytes=56 Sequence=4 ttl=254 time=2 ms...
  • Page 126 Figure 32 Network diagram Configuration procedure Create VLANs and assign corresponding ports to them. Configure the IP address of each VLAN interface as shown in Figure 32. (Details not shown.) Configure a track entry on Switch A: # Configure track entry 1 and associate it with the link status of the uplink interface VLAN-interface [SwitchA] track 1 interface vlan-interface 3 Configure VRRP on Switch A: # Create VRRP group 1 and configure the virtual IP address 10.1.1.10 for the group.
  • Page 127 VRID Adver Timer : 100 Admin Status : Up State : Master Config Pri : 110 Running Pri : 110 Preempt Mode : Yes Delay Time Auth Type : None Virtual IP : 10.1.1.10 Virtual MAC : 0000-5e00-0101 Master IP : 10.1.1.1 VRRP Track Information: Track Object...
  • Page 128 Track Object State : Negative Pri Reduced : 30 # After shutting down the uplink interface on Switch A, display detailed information about VRRP group 1 on Switch B. [SwitchB-Vlan-interface2] display vrrp verbose IPv4 Virtual Router Information: Running Mode : Standard Total number of virtual routers : 1 Interface Vlan-interface2 VRID...
  • Page 129: Support And Other Resources

    Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.com/support Before contacting HP, collect the following information: Product model names and numbers • Technical support registration number (if applicable) • • Product serial numbers Error messages •...
  • Page 130: Conventions

    Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. Square brackets enclose syntax choices (keywords or arguments) that are optional. Braces enclose a set of required syntax choices separated by vertical bars, from which { x | y | ...
  • Page 131 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
  • Page 132: Index

    Index DLDP password authentication, DLDP plaintext authentication, active virtual forwarder. Use DLDP plaintext mode, advertising DLDP simple authentication, DLDP advertisement packet send interval, VRRP MD5 authentication, DLDP advertisement timer, VRRP simple authentication, VRRP advertisement interval, automatic alarm CFD MIP auto-generation rule, Ethernet OAM fault detection, DLDP automatic unidirectional link shutdown, application...
  • Page 133 CFD loopback on MEP, basic concepts, CFD MEPs, basic configuration, CFD MIP auto-generation rules, configuration, 13, 16, CFD service instance, continuity check function, 16, DLDP, 25, 29, continuity check on MEP, DLDP authentication, displaying, DLDP automatic unidirectional link shutdown, enabling, Ethernet OAM, 1, 4, function configuration, Ethernet OAM basics,...
  • Page 134 VRRP-Track-NQA collaboration, DLDP automatic unidirectional link shutdown, confirmed DLDP neighbor state, DLDP configuration, 25, 29, connecting DLDP manual unidirectional link shutdown, Ethernet OAM connection detection timer, Ethernet OAM basic configuration, Ethernet OAM connection establishment, Ethernet OAM configuration, 1, 4, Ethernet OAM port action configuration, IPv4 VRRP configuration (on switch), Connectivity Fault Detection.
  • Page 135 DLDP configuration, 1, 4, advertisement packet send interval, connection detection timer, authentication configuration, connection establishment, authentication modes, displaying, automatic unidirectional link shutdown, errored frame event detection, basic concepts, errored frame period event detection, configuration, 25, 29, errored frame seconds event detection, configuration restrictions, errored symbol event detection, DelayDown timer,...
  • Page 136 Ethernet OAM. Use Ethernet OAM VRRP configuration (on switch), static routing-Track-BFD collaboration, 1 17 IPv6 BGP static routing-Track-NQA collaboration, 1 12 BFD supported, Track application collaboration, IPv6 IS-IS Track BFD/VRRP backup master monitor, BFD supported, Track BFD/VRRP master uplink monitor, IPv6 PIM Track configuration, 94, 95, BFD supported,...
  • Page 137 CFD function, CFD basic configuration, CFD functions, CFD configuration, 13, 16, CFD linktrace on MEP configuration, CFD continuity check on MEP, load balancing CFD function configuration, IPv4 VRRP group creation, CFD linktrace on MEP configuration, IPv4 VRRP group disable, CFD loopback on MEP configuration, IPv4 VRRP operating mode specification, CFD maintenance association, IPv4 VRRP packet attribute,...
  • Page 138 IPv4 VRRP router preemptive mode, CFD functions, IPv6 VRRP router preemptive mode, CFD linktrace on MEP configuration, VRRP load-balancing operating mode, CFD loopback on MEP configuration, VRRP load-balancing operation, CFD maintenance association, VRRP router non-preemptive mode, CFD maintenance point, VRRP router preemptive mode, CFD MEP configuration, VRRP standard operating mode, CFD MEP list,...
  • Page 139 Track/BFD association, non-authentication mode (DLDP), Track/detection module association, Track/interface management association, static routing-Track-NQA collaboration, 1 12 Track/NQA association, Track/NQA association, Track/policy-based routing association, VRRP tracking, Track/static routing association, VRRP-Track-NQA collaboration, Track/VRRP association, VRRP application, VRRP master election, CFD basic configuration, VRRP timers, CFD configuration, 13, 16, VRRP tracking,...
  • Page 140 DLDP port state, configuring CFD MIP auto-generation rules, Ethernet OAM port action configuration, configuring CFD service instance, Ethernet OAM remote loopback configuring DLDP, 29, configuration, configuring DLDP authentication, Ethernet OAM remote loopback on port, configuring DLDP automatic unidirectional link Ethernet OAM remote loopback on specific shutdown, port, configuring Ethernet OAM, 4,...
  • Page 141 configuring Track, 95, CFD, configuring Track BFD/VRRP backup master Ethernet OAM, monitor, VRRP, configuring Track BFD/VRRP master uplink monitor, recoverprobe timer (DLDP), configuring VRRP virtual forwarder rejecting Ethernet OAM remote loopback request from tracking, 53, remote port, configuring VRRP-Track-interface management remote collaboration, Ethernet OAM configuration,...
  • Page 142 Track/static routing association, DLDP neighbor state, Track/static routing collaboration, DLDP port state, VRRP configuration, static rule BFD supported static routing, CFD MIP auto-generation rule, static routing CFD MIP default rule, static routing-Track-BFD collaboration, 1 17 CFD MIP explicit rule, static routing-Track-NQA collaboration, 1 12 Track/application module collaboration, Track/static routing association,...
  • Page 143 VRRP Skew-Time, DLDP automatic unidirectional link shutdown, Track DLDP manual unidirectional link shutdown, application collaboration, DLDP port state, application module association, BFD association, version (VRRP), BFD supported, virtual BFD/VRRP backup master monitor IPv4 VRRP virtual IP address assignment, configuration, IPv6 VRRP virtual IP address assignment, BFD/VRRP master uplink monitor VRRP virtual forwarder, configuration,...
  • Page 144 troubleshooting fast state flapping, troubleshooting multiple masters appear in group, virtual forwarder, virtual forwarder backup, virtual forwarder creation, virtual forwarder weight/priority, virtual MAC address assignment, VRRP-Track-interface management collaboration, VRRP-Track-NQA collaboration, weight (VRRP virtual forwarder), WLAN Track/application module collaboration,...

Table of Contents