Professional Documents
Culture Documents
V200R001C00
Issue 01
Date 2012-03-15
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Intended Audience
This document provides the basic concepts, configuration procedures, and configuration
examples in different application scenarios of the reliability supported by the S9700.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
&<1-n> The parameter before the & sign can be repeated 1 to n times.
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all changes made in previous issues.
Contents
2.2.8 (Optional) Enabling a Physical Interface to Notify the VPLS orVLL Module When Receiving a Flush
Packet................................................................................................................................................................23
2.2.9 (Optional) Setting the Holdtime of the Smart Link Switchover..............................................................23
2.2.10 Enabling the Functions of the Smart Link Group..................................................................................24
2.2.11 Checking the Configuration...................................................................................................................24
2.3 Configuring a Flow Control Policy in a Smart Link Group.............................................................................25
2.3.1 Establishing the Configuration Task.......................................................................................................25
2.3.2 Locking Data Flows on the Master Interface..........................................................................................26
2.3.3 Locking Data Flows on the Slave Interface.............................................................................................27
2.3.4 Switching Data Flows Manually.............................................................................................................27
2.3.5 Checking the Configuration.....................................................................................................................28
2.4 Configuring a Monitor Link Group..................................................................................................................28
2.4.1 Establishing the Configuration Task.......................................................................................................28
2.4.2 Creating a Monitor Link Group...............................................................................................................30
2.4.3 Configuring the Uplink and Downlink Interfaces in a Monitor Link Group..........................................30
2.4.4 Setting the Revertive Switching Interval of a Monitor Link group.........................................................31
2.4.5 Checking the Configuration.....................................................................................................................32
2.5 Maintaining the Smart Link..............................................................................................................................32
2.5.1 Debugging the Smart Link......................................................................................................................32
2.6 Configuration Examples...................................................................................................................................33
2.6.1 Example for Configuring Load Balancing Between Active and Standby Links of a Smart Link Group
..........................................................................................................................................................................33
2.6.2 Example for Connecting the CE to the VPLS in Dual-Homing Mode Through Smart Link..................37
2.6.3 Example for Associating Smart Link with Multicast Services................................................................41
2.6.4 Example for Applying the Smart Link Functions...................................................................................47
4 RRPP Configuration...................................................................................................................77
6.6.1 Example for Configuring the One-way Frame Delay Measurement in a VLAN..................................372
6.6.2 Example for Configuring the Two-way Frame Delay Measurement in a VLAN.................................376
7 BFD Configuration....................................................................................................................382
7.1 BFD Overview................................................................................................................................................384
7.2 BFD Features Supported by the S9700..........................................................................................................384
7.3 Configuring Single-hop BFD.........................................................................................................................388
7.3.1 Establishing the Configuration Task.....................................................................................................388
7.3.2 Enabling BFD Globally.........................................................................................................................389
7.3.3 (Optional) Setting the Multicast IP Address of BFD............................................................................389
7.3.4 Creating a BFD Session.........................................................................................................................390
7.3.5 Checking the Configuration...................................................................................................................391
7.4 Configuring the Multi-Hop BFD....................................................................................................................392
7.4.1 Establishing the Configuration Task.....................................................................................................392
7.4.2 Enabling BFD Globally.........................................................................................................................393
7.4.3 Creating a BFD Session.........................................................................................................................393
7.4.4 Checking the Configuration...................................................................................................................394
7.5 Configuring a BFD Session with Automatically Negotiated Discriminators.................................................396
7.5.1 Establishing the Configuration Task.....................................................................................................396
7.5.2 Enabling BFD Globally.........................................................................................................................396
7.5.3 Configuring a Static BFD Session with Automatically Negotiated Discriminators.............................397
7.5.4 Checking the Configuration...................................................................................................................397
7.6 Adjusting BFD Parameters.............................................................................................................................398
7.6.1 Establishing the Configuration Task.....................................................................................................398
7.6.2 Adjusting the BFD Detection Time.......................................................................................................399
7.6.3 Adding the Description of a BFD Session.............................................................................................400
7.6.4 Configuring the BFD WTR...................................................................................................................401
7.6.5 Setting the Priority of BFD Packets......................................................................................................401
7.6.6 Checking the Configuration...................................................................................................................402
7.7 Globally Configuring the Destination Port Number for the Multi-Hop BFD Control Packet.......................403
7.7.1 Establishing the Configuration Task.....................................................................................................403
7.7.2 Globally Configuring the Destination Port Number..............................................................................404
7.7.3 Checking the Configuration...................................................................................................................405
7.8 Configuring the Delay of a BFD Session to Go Up.......................................................................................406
7.8.1 Establishing the Configuration Task.....................................................................................................406
7.8.2 Configuring the Delay for BFD Session Status Change to Up..............................................................406
7.8.3 Checking the Configuration...................................................................................................................407
7.9 Configuring a BFD Session with the One-Arm Echo Function.....................................................................408
7.9.1 Establishing the Configuration Task.....................................................................................................408
7.9.2 Enable BFD Globally............................................................................................................................409
7.9.3 Establishing a BFD Session...................................................................................................................409
7.9.4 Checking the Configuration...................................................................................................................410
7.10 Configuring the TTL Function Globally......................................................................................................411
1 DLDP Configuration
This chapter describes the principle, configuration procedure, and configuration example of the
Device Link Detection Protocol (DLDP).
GE2/0/1 GE2/0/2
GE2/0/1 GE2/0/2
SwitchB
TX RX
GE2/0/1
GE2/0/1
RX TX
SwitchB
DLDP can detect the link status of fibers or copper twisted pairs. If a unidirectional link exists,
DLDP automatically disables the interface or prompts the user to manually disable the interface.
This prevents network faults. Currently, the S9700 supports DLDP detection for up to 4096
neighbors.
As a link layer protocol, DLDP works with the physical layer protocol to detect the link status.
The auto negotiation mechanism on the physical link detects physical signals and faults on the
physical link, and DLDP identifies the remote device and unidirectional link and disables
unreachable interfaces. The auto negotiation mechanism and DLDP work together to detect and
close unidirectional links on the physical and logical interfaces. If the interfaces on both ends
of the link work normally on the physical layer, DLDP checks the connection and packet
exchange between the two interfaces on the link layer. This process cannot be implemented
through the auto negotiation mechanism.
Applicable Environment
On a network, unidirectional link faults often occur. To prevent network faults caused by
unidirectional links, you can enable DLDP on interfaces at two ends of a pair of fibers or a copper
twisted pair to monitor the link status. If a unidirectional link exists, DLDP automatically
disables the interface connected to the link or prompts you to manually disable the interface.
Unidirectional links can be tested only when the devices on both ends of the fibers and copper
twisted pairs support DLDP functions.
Pre-configuration Tasks
Before configuring DLDP, complete the following task:
l Configuring the interfaces at both ends to work in non-auto-negotiation mode
Data Preparation
To configure DLDP, you need the following data.
No. Data
Procedure
Step 1 Run:
system-view
NOTE
Step 4 Run:
dldp enable
----End
Context
If DLDP works in normal mode, the system can identify only one type of unidirectional link,
that is, the crossed connection of fibers. In this mode, the system does not use any timer, so it
cannot detect that a bidirectional link changes to a unidirectional link.
If DLDP works in enhanced mode, the system can identify two types of unidirectional links,
that is, the crossed connection of fibers and the connection where one fiber is disconnected. To
detect the unidirectional link caused by disconnection of one fiber, you need to manually set the
rate and full-duplex mode of the interconnected ports; otherwise, DLDP does not take effect
even if it is enabled. When a bidirectional link changes to a unidirectional link, the port where
the Tx fiber receives optical signals is in Disable state, and the port where the Tx fiber receives
no optical signals is in Inactive state.
Procedure
Step 1 Run:
system-view
----End
Context
If the S9700 needs to work with the following Huawei switches to provide the DLDP function,
this task is required. The software versions of the following switches must support the DLDP
function:
l S8500
l S7800
l S6500
l S5600
l S5100-EI
l S3900
l S3500
l S3100
Procedure
Step 1 Run:
system-view
The S9700 is configured to use the BPDU MAC address 010F-E200-0001 to send DLDP packets.
The MAC addresses used for sending DLDP packets on the S9700 and on the old Huawei
switches are different. Therefore, the S9700 must be configured to use BPDU MAC address
10F-E200-0001 to send DLDP packets.
Step 3 Run:
interface interface-type interface-number
If devices at both ends are S9700s, the interfaces at both ends must use the same DLDP
compatible mode. That is, you must enable or disable the DLDP compatible mode
simultaneously on the interfaces.
Step 5 Run:
dldp compatible-mode local-mac mac-address
The DLDP packets sent in the DLDP compatible mode contain MAC addresses.
After the DLDP compatible mode is enabled on the S9700, the peer device of the S9700 may
discover multiple neighbors, causing DLDP flapping. The dldp compatible-mode local-mac
command can prevent this problem.
NOTE
At least one bit in the MAC address must be 0, and the MAC address cannot be a multicast MAC address.
----End
Context
Do as follows on the S9700 that needs to run DLDP.
Procedure
Step 1 Run:
system-view
NOTE
Ensure that the interval for sending Advertisement packets is the same on the local and remote devices that
are connected through fibers or copper twisted pairs.
----End
Procedure
Step 1 Run:
system-view
----End
Context
When a unidirectional link is detected, DLDP blocks the corresponding interface in either of the
following ways:
l Manual mode: This mode can prevent DLDP from blocking the interface immediately to
affect packet forwarding when the network performance is poor. It is a compromise mode
used to prevent an interface from being blocked because of incorrect judgment of the
system. In this mode, DLDP detects the unidirectional link, and the network administrator
blocks the interface manually. When the DLDP state machine detects a unidirectional link,
the system records the log and sends trap messages to prompt you the network administrator
to block the interface manually. Then the DLDP state machine changes to the Disable state.
l Automatic mode: It is the default mode. When a unidirectional link is detected, the DLDP
state machine changes to the Disable state, and the system records the log, sends trap
messages, and sets the interface state to Blocking.
Procedure
Step 1 Run:
system-view
The mode of blocking interfaces when a unidirectional link fault is detected is set.
By default, DLDP automatically blocks the interface when a unidirectional link fault is detected.
An interface in DLDP Down state still sends RecoverProbe packets periodically. If correct
RecoverEcho packets are received, it indicates that the unidirectional link changes to the
bidirectional link and the DLDP status becomes Up.
----End
Procedure
Step 1 Run:
system-view
The DLDP authentication mode used between the interfaces of the S9700 and the remote device
is set.
By default, the DLDP authentication mode used between the interfaces of the S9700 and the
remote device is none. That is, DLDP packets are not authenticated.
NOTE
Ensure that the local and remote devices use the same authentication mode and same authentication
password; otherwise, the DLDP authentication fails. DLDP works normally only after the DLDP
authentication succeeds.
----End
Procedure
Step 1 Run the display dldp [ interface interface-type interface-number ] command to check the DLDP
configuration and neighbor entries.
----End
Example
Run the display dldp command, and you can view the operation mode of DLDP, interval for
sending Advertisement packets, value of the Delay Down timer, interface disabling mode, and
authentication mode of DLDP packets.
<Quidway> display dldp
DLDP global status : enable
DLDP interval : 5s
DLDP work-mode : enhance
DLDP authentication-mode : simple, password is 123
DLDP unidirectional-shutdown : auto
DLDP delaydown-timer : 2s
The number of enabled ports is : 2.
Interface GigabitEthernet2/0/1
DLDP port state : advertisement
DLDP link state : up
The neighbor number of the port is : 1.
Neighbor mac address : 0000-0000-0100
Neighbor port index : 21
Neighbor state : two way
Neighbor aged time : 13
Interface GigabitEthernet2/0/2
DLDP port state : advertisement
DLDP link state : up
The neighbor number of the port is : 1.
Neighbor mac address : 0000-0000-1100
Neighbor port index : 22
Neighbor state : two way
Neighbor aged time : 12
Applicable Environment
When a unidirectional link is detected, the corresponding interface enters the Disable state. The
system prompts you to disable the interface or sets the interface state to DLDP Down
automatically according to the configuration. To enable the interface to detect unidirectional
links again, you can reset the DLDP state of the interface. The DLDP status of the interface after
recovery depends on the physical status of the interface. If the physical status is Down, the DLDP
status of the interface changes to Inactive. If the physical status is Up, the DLDP status changes
to Active.
Pre-configuration Tasks
None.
Data Preparation
To reset the DLDP status, you need the following data.
No. Data
Context
The dldp reset command takes effect only when DLDP is enabled globally and on interfaces.
When you reset the DLDP status globally, the DLDP status is reset for all the disabled interfaces
on the S9700.
Procedure
Step 1 Run:
system-view
----End
Context
If you reset the DLDP status on an interface or interface group, the DLDP status is reset for the
interface or all the disabled interfaces in the interface group.
The dldp reset command takes effect only when DLDP is enabled globally and on interfaces.
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run the display dldp [ interface interface-type interface-number ] command to check the DLDP
configuration and neighbor entries.
----End
Example
Run the display dldp command, and you can view the status of an interface after the DLDP
status is reset.
<Quidway> display dldp
DLDP global status : enable
DLDP interval : 5s
DLDP work-mode : enhance
DLDP authentication-mode : simple, password is : 123
DLDP unidirectional-shutdown : auto
DLDP delaydown-timer : 2s
The number of enabled ports is 2.
The number of global neighbors is : 2.
Interface GigabitEthernet2/0/1
DLDP port state : advertisement
DLDP link state : up
The neighbor number of the port is : 1.
Neighbor mac address : 0000-0000-0100
Neighbor port index : 21
Neighbor state : two way
Neighbor aged time : 13
Interface GigabitEthernet2/0/2
DLDP port state : advertisement
DLDP link state : up
The neighbor number of the port is : 1.
Neighbor mac address : 0000-0000-1100
Neighbor port index : 22
Neighbor state : two way
Neighbor aged time : 12
Context
CAUTION
Statistics of DLDP cannot be restored after you clear them. So, confirm the action before you
use the command.
Procedure
Step 1 Run the reset dldp statistics [ interface interface-type interface-number ] command in the user
view to clear the statistics of DLDP packets on an interface.
----End
Networking Requirements
As shown in Figure 1-3, two S9700s are connected through a pair of optical fibers. On a fiber,
RX indicate the receive end, and TX indicates the transmit end. DLDP is enabled on the
interconnected interfaces. If the Rx fiber on Switch A fails, Switch A cannot receive optical
signals. In this case, GE 2/0/1 of Switch A becomes Down and cannot send or receive any
packets. However, the Tx fiber on Switch B still sends optical signals, and Switch B can receive
optical signals because the Tx fiber on Switch A is working normally. Therefore, the link status
on Switch B is still Up. If Switch B does not receive any DLDP packet from Switch A within
the neighbor aging time, GE 2/0/1 of Switch B changes to unidirectional state. To prevent
network faults, DLDP disables GE 2/0/1 of Switch B.
TX RX
GE2/0/1
GE2/0/1
RX TX
SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure the interfaces at both ends to work in non-auto-negotiation mode.
2. Enable DLDP.
3. Set the operation mode of DLDP.
4. Set the interval for sending Advertisement packets.
Data Preparation
To complete the configuration, you need the following data:
l Type and number of each interface
l Interval for sending Advertisement packets
l Value of the Delay Down timer
Procedure
Step 1 Configure the interface on Switch A to work in non-auto negotiation mode.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] interface gigabitethernet 2/0/1
[SwitchA-GigabitEthernet2/0/1] undo negotiation auto
[SwitchA-GigabitEthernet2/0/1] quit
Step 7 Configure DLDP to automatically shut down the interface where a unidirectional link is detected.
[SwitchA] dldp unidirectional-shutdown auto
Step 8 Set the authentication mode of DLDP packets to simple password authentication and set the
password to 123456.
[SwitchA] dldp authentication-mode simple 12345
Interface GigabitEthernet2/0/1
DLDP port state: advertisement
DLDP link state: up
The neighbor number of the port is: 1.
Neighbor mac address:781d-ba57-c24a
Remove the Rx fiber from Switch A to simulate a unidirectional link between GE 2/0/1 ofSwitch
A and GE 2/0/1 of Switch B, as shown in Figure 1-3. You find that DLDP blocks the GE
2/0/1 interface of Switch B.
# Run the display dldp on Switch A, and you can find that the DLDP status of GE 2/0/1 is
inactive. Run the display dldp on Switch B, and you can find that the DLDP status of GE
2/0/1 is disable.
[SwitchA] display dldp interface gigabitethernet 2/0/1
Interface GigabitEthernet2/0/1
DLDP port state: inactive
DLDP link state: down
The neighbor number of the port is: 0
[SwitchB] display dldp interface gigabitethernet 2/0/1
Interface GigabitEthernet2/0/1
DLDP port state: disable
DLDP link state: up
The neighbor number of the port is: 0
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
dldp enable
dldp interval 80
dldp delaydown-timer 4
dldp authentication-mode simple 12345
#
interface GigabitEthernet2/0/1
dldp enable
undo negotiation auto
#
return
#
sysname SwitchB
#
dldp enable
dldp interval 80
dldp delaydown-timer 4
dldp authentication-mode simple 12345
#
interface GigabitEthernet2/0/1
dldp enable
undo negotiation auto
#
return
This chapter describes the principle, configuration procedure, and configuration example of the
Smart Link and Monitor Link.
IP/MPLS
core
network
SwitchA
SwitchB SwitchC
Active link
Inactive link
As shown in Figure 2-1, Switch D and Switch E are connected to user devices, and both are
connected to Switch B and Switch C. Configure the Smart Link on Switch D and Switch E and
add the two uplink interfaces to the respective Smart Link group to avoid loops. In this manner,
interrupted services can be restored in milliseconds.
Pre-configuration Tasks
Before configuring the basic functions of a Smart Link group, complete the following task:
l Ensuring that the Multiple Spanning Tree Protocol (MSTP), Rapid Ring Protection
Protocol (RRPP), and Smart Ethernet Protection (SEP) are not enabled on the master and
slave interfaces of the Smart Link group
Data Preparation
To configure basic functions of the Smart Link group, you need the following data.
No. Data
No. Data
Procedure
Step 1 Run:
system-view
A Smart Link group is created and the Smart Link group view is displayed.
The S9700 supports a maximum of 16 Smart Link groups.
Step 3 (Optional)Run:
protected-vlan reference-instance { instance-id1 [ to instance-id2 ] }&<1-10>
An instance is bound to the Smart Link group as the protected instance. The functions of the
Smart link group take effect only on the VLANs bound to the protected instance. For details
about STP instance configuration, see Configuring and Activating an MST Region.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
stp disable
Step 4 Run:
quit
Step 5 Run:
smart-link group group-id
Step 6 Run:
port interface-type interface-number master
An interface is added to the Smart Link group and is specified as the master interface.
Step 7 Run:
port interface-type interface-number slave
Another interface is added to the Smart Link group and is specified as the slave interface.
A Smart Link group consists of a master interface and a slave interface. By default, a Smart Link
group does not have interfaces.
----End
Context
When the active and standby links of the Smart Link group switch, the existing forwarding
entries no longer apply to the new topology. All the MAC address entries and ARP entries on
the network need to be updated. Then the Smart Link group sends Flush packets to ask other
devices to update the MAC address table and ARP entries.
Because manufacturers define the format of Flush packets differently, the Flush packets
described here are used only for the intercommunication between Huawei S-series switches. In
addition, the function of receiving Flush packets must be enabled on the remote switch.
If you run flush send control-vlan vlan-id [ password simple password ] command in the Smart
Link group view, the Smart Link group is enabled to send Flush packets that contain the specified
control VLAN ID and password. The VLAN ID specified by vlan-id must already exist on the
S9700. If the specified VLAN ID does not exist on the S9700, Flush packets cannot be sent.
Do as follows on the S9700.
Procedure
Step 1 Run:
system-view
The S9700 is enabled to send Flush packets, and the control VLAN ID and password contained
in Flush packets are set.
A control VLAN cannot be a VLAN mapping a load-balancing instance.
The control VLAN ID and password contained in Flush packets on both devices must be the
same. That is, the control VLAN ID and password in Flush packets sent by the device must be
the same as the control VLAN ID and password in Flush packets received by the device.
NOTE
After the flush send control-vlan command is run, the interface cannot be added to the control VLAN. You need
to configure the interface to allow the packets of the control VLAN to pass through.
----End
Context
Do as follows on the S9700.
Procedure
Step 1 Run:
system-view
A domain supports up to 49 instances, among which Instance 0 is the default instance and does
not need to be created.
Step 4 Run:
active region-configuration
After configuring the domain name, VLAN mapping table, or MSTP revision level, you must
run the active region-configuration command for the configuration to take effect.
Step 5 Run:
quit
Step 6 Run:
smart-link group group-id
Step 7 Run:
load-balance instance { instance-id1 [ to instance-id2 ] } &<1-10> slave
Packets of the VLANs bound to the specified instance are sent from the slave interface to
implement load balancing.
----End
Context
When the active link in a Smart Link group fails, the traffic is automatically switched to the
standby link. The original active link does not preempt the traffic but remains blocked after
recovering from the fault. To switch the traffic back to the active link, you can adopt either of
the following methods:
l Enable the revertive switching of a Smart Link group. The switching is automatically
performed after the revertive switching timer times out.
l Run the smart-link manual switch command to perform the link switching forcibly.
NOTE
The link switching is performed only when the two member interfaces in a group are both Up.
Procedure
Step 1 Run:
system-view
Step 2 Run:
smart-link group group-id
Step 3 Run:
restore enable
The wait to recover (WTR) time of the Smart Link group is set.
----End
Context
An interface receives Flush packets only when it is configured with the control VLAN ID and
added to this VLAN.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
The view of the downlink interface of the SwitchA, SwitchB, or SwitchC is displayed.
Step 3 Run:
smart-link flush receive control-vlan vlan-id [ password simple password ]
The interface is enabled to receive Flush packets, and the control VLAN ID and password
contained in Flush packets are set.
The control VLAN ID and password contained in Flush packets on both devices must be the
same. That is, the control VLAN ID and password in Flush packets sent by the device must be
the same as the control VLAN ID and password in Flush packets received by the device.
----End
Context
If a CE is dual-homed to the VPLS or VLL network through VLANIF interfaces, dot1q sub-
interfaces or QinQ sub-interfaces of PEs, you can associate Smart Link with VPLS or VLL on
the corresponding physical interfaces of PEs. If a VLANIF interface, dot1q sub-interface or
QinQ sub-interface of a PE connected to the CE is bound to a VSI instance, you can run the
smart-link flush receive and smart-link { vpls-notify | vll-notify } enable commands on the
corresponding physical interface to enable the physical interface to notify the VPLS or VLL
module after receiving a Flush packet. After the VPLS or VLL module receives the notification,
it deletes the MAC address in the bound VSI instance and sends a notification to the remote
device, requesting the remote device to update the corresponding MAC address entry.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
smart-link { vpls-notify | vll-notify } enable
The interface is enabled to notify the VPLS or VLL module when receiving a Flush packet.
By default, an interface does not notify the VPLS or VLL module when receiving a Flush packet.
NOTE
You can associate Smart Link with VPLS only when a CE is connected to the VPLS network through a
VLANIF interface, dot1q sub-interfaces or QinQ sub-interfaces of a PE.
----End
Context
If the Smart Link switchover is performed because of temporary interruption, packet forwarding
and system performance are affected. To address this problem, you can set the holdtime of the
Smart Link switchover. If the interface of the Smart Link group repeatedly alternates between
Up and Down states, the status of the Smart Link group is not immediately changed, but is
changed according to the Up or Down status obtained by an interface of the Smart Link group
until the holdtime expires. In this manner, Smart Link switchover caused by link interruption is
suppressed.
Procedure
Step 1 Run:
system-view
----End
Context
After the functions of the Smart Link group are enabled, the standby interface in the group is
blocked. After the functions of the Smart Link group are disabled, the blocked standby interface
is recovered.
Procedure
Step 1 Run:
system-view
----End
Procedure
l Run the display smart-link group { all | group-id } command to check information about
a Smart Link group.
l Run the display smart-link flush command to check information about the received Flush
packets.
----End
Example
Run the display smart-link group { all | group-id } command to check information about a
Smart Link group. The following information is displayed:
<Quidway> display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
Wtr-time is: 30 sec.
Load-Balance Instance: 1 to 2
There is no protected-vlan reference-instance
DeviceID: 0018-2000-0083 Control-vlan ID: 20
Member Role State Flush Count Last-Flush-Time
------------------------------------------------------------------------
GigabitEthernet1/0/1 Master Active 1 2008/11/21 16:37:20 UTC
+05:00
GigabitEthernet1/0/2 Slave Inactive 2 2008/11/21 17:45:20 UTC
+05:00
SwitchB SwitchC
Smart Link
group
Active link
SwitchD SwitchE
Inactive link
Pre-configuration Tasks
Before configuring a flow control policy for the Smart Link group, complete the following task:
l 2.2 Configuring a Smart Link Group
Data Preparation
None.
CAUTION
If data flows are locked on the master interface, they cannot be switched to the slave interface
automatically when the master interface fails. As a result, traffic is interrupted.
Procedure
Step 1 Run:
system-view
----End
CAUTION
If data flows are locked on the slave interface, they cannot be switched to the master interface
automatically when the slave interface fails. As a result, traffic is interrupted.
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run the display smart-link group { all | group-id } command to check information about a
Smart Link group.
----End
Example
Run the display smart-link group { all | group-id } command. If lock is displayed, it indicates
that data flows are locked on the master interface. If force is displayed, it means that data flows
are locked on the slave interface.
<Quidway> display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
Link status:lock
Wtr-time is: 30 sec.
Load-Balance Instance: 1 to 2
There is no protected-vlan reference-instance
DeviceID: 0018-2000-0083 Control-vlan ID: 20
Member Role State Flush Count Last-Flush-Time
------------------------------------------------------------------------
GigabitEthernet1/0/1 Master Active 1 2008/11/21 16:37:20 UTC
+05:00
GigabitEthernet1/0/2 Slave Inactive 2 2008/11/21 17:45:20 UTC
+05:00
of the uplink, you need to configure the Monitor Link function on the device connected to the
active link to monitor the status of the uplink. When a fault occurs on an uplink, the active link
of the Smart Link group is rapidly blocked. In this way, the Smart Link group can detect the
fault and switch the traffic to the standby link to reduce the service interruption duration.
When the uplink interface belongs to a Smart Link group, the uplink interface is considered as
faulty only if the maser and slave interfaces of the Smart Link group are in standby state
(including the Down state).
IP/MPLS
core
network
SwitchC
Active link
User1 User2 Inactive link
As shown in Figure 2-3, the link between Switch A and Router breaks. Although Smart Link
is enabled on Switch C and Switch D, link switching is not performed because the active link
does not fail. In this case, services are interrupted. To enable the Smart Link group to respond
more quickly to the faults of the uplink, you need to configure the Monitor Link function on the
device connected to the active link Monitor Link to monitor the status of the uplink. When a
fault occurs, the active link of the Smart Link group is blocked quickly. The Smart Link group
can then detect the fault and switch the traffic to the inactive link. This shortens the service
interruption duration.
Pre-configuration Tasks
Before configuring the basic functions of the Monitor Link group, complete the following tasks:
l 2.2 Configuring a Smart Link Group.
l Ensuring that no interface in the Monitor Link group is added to an Eth-Trunk, Smart Link
group and other Monitor Link group.
Data Preparation
To configure the basic functions of the Monitor Link group, you need the following data.
No. Data
Procedure
Step 1 Run:
system-view
A Monitor Link group is created and the Monitor Link group view is displayed.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
monitor-link group group-id
The Monitor Link group view is displayed. The S9700 supports a maximum of 16 Monitor Link
groups.
Step 3 Run:
port interface-type interface-number { downlink [ downlink-id ] | uplink }
An interface is configured as the uplink interface or downlink interface of the Monitor Link
group.
Or run:
smart-link group group-id uplink
A Smart Link group is configured as the uplink interface of the Monitor Link group.
NOTE
The status of the uplink interface determines the status of the Monitor Link group. Therefore, after the
downlink interface is added to the Monitor Link group, the result of the shutdown or undo shutdown
command can be retained before the status of the uplink interface changes. When the status of the uplink
interface changes, the status of the downlink interfaces changes as follows:
l When an uplink interface in Up state is added to the Monitor Link group or when an uplink interface
in Down state becomes Up, all the downlink interfaces in the Monitor Link group become Up.
l When an uplink interface is deleted from the Monitor Link group or when an uplink interface in Up
state becomes Down, all the downlink interfaces in the Monitor Link group become Down.
To add a Smart Link group to a Monitor Link group, you need to delete the existing uplink interface of the
Monitor Link group. The Smart Link group and common interfaces are incompatible when serving as the
uplink interface for a Monitor Link group.
----End
Context
Do as follows on SwitchA and SwitchB.
Procedure
Step 1 Run:
system-view
Step 2 Run:
monitor-link group group-id
Step 3 Run:
timer recover-time recover-time
By default, the revertive switching of a Monitor Link group is enabled and the interval of
revertive switching is 3 seconds.
----End
Procedure
Step 1 Run the display monitor-link group { all | group-id } command to check information about a
Monitor Link group.
----End
Example
Run the display monitor-link group { all | group-id } [ | count ] [ | { begin | include |
exclude } regular-expression ], and you can view basic information about the interfaces in the
Monitor Link group, including the role and status of the interfaces and the time when the
interfaces become Up or Down for the last time.
<Quidway> display monitor-link group 1
Monitor Link group 1 information :
Recover-timer is 5 sec.
Member Role State Last-up-time Last-down-
time
GigabitEthernet1/0/1 UpLk UP 0000/00/00 00:00:00 UTC+00:00 0000/00/00
00:00:00 UTC+00:00
GigabitEthernet1/0/2 DwLk[1] DOWN 0000/00/00 00:00:00 UTC+00:00 0000/00/00
00:00:00 UTC+00:00
Context
NOTE
Debugging affects the performance of the system. So, after debugging, run the undo debugging all
command to disable it immediately.
Procedure
l Run the debugging smart-link { all | error | event | fsm-machine } [ group group-id ] to
enable debugging of the Smart Link.
l Run the debugging smart-link flush { all | receive | send } command to enable debugging
of Flush packets.
----End
Figure 2-4 Networking diagram for configuring load balancing between active and standby links
of a Smart Link group
SwitchB SwitchC
GE1/0/2 GE1/0/2
GE1/0/1 GE1/0/1
Smart Link
group
GE1/0/1 GE1/0/2
SwitchA Active link
Inactive link
VLAN
100 500
Configuration Roadmap
The configuration roadmap is as follows:
1. On Switch A, configure Smart Link multi-instance and add the uplink interfaces to the
Smart Link group.
2. Configure load balancing on Switch A.
3. Enable revertive switching on Switch A.
4. Enable Switch A to send Flush packets.
5. Enable Switch B and Switch C to receive Flush packets.
6. Enable Smart Link on Switch A.
Data Preparation
To complete the configuration, you need the following data:
l IDs of instances and IDs of the VLANs bound to the instances on Switch A
l ID of a Smart Link group
l Numbers of the uplink interfaces on Switch A
l Control VLAN ID and password contained in Flush packets
Procedure
Step 1 On Switch A, configure the control VLAN and add the interfaces to the control VLAN.
<SwitchA> system-view
[SwitchA] vlan batch 10 100 500
[SwitchA] interface gigabitethernet 1/0/1
[SwitchA-GigabitEthernet1/0/1] port link-type trunk
[SwitchA-GigabitEthernet1/0/1] port trunk allow-pass vlan 10 100 500
[SwitchA-GigabitEthernet1/0/1] quit
[SwitchA] interface gigabitethernet 1/0/2
[SwitchA-GigabitEthernet1/0/2] port link-type trunk
[SwitchA-GigabitEthernet1/0/2] port trunk allow-pass vlan 10 100 500
[SwitchA-GigabitEthernet1/0/2] quit
The configurations of Switch B and Switch C are similar to the configuration of Switch A, and
are not mentioned here.
Step 2 Configure VLAN mapping on Switch A.
[SwitchA] stp region-configuration
[SwitchA-mst-region] instance 10 vlan 100 500
[SwitchA-mst-region] active region-configuration
[SwitchA-mst-region] quit
Step 3 Add the uplink interfaces to the Smart Link group and specify the master and slave interfaces.
Ensure that STP is disabled on the uplink interfaces.
# Configure Switch A.
[SwitchA] interface gigabitethernet 1/0/1
[SwitchA-GigabitEthernet1/0/1] stp disable
[SwitchA-GigabitEthernet1/0/1] quit
[SwitchA] interface gigabitethernet 1/0/2
[SwitchA-GigabitEthernet1/0/2] stp disable
[SwitchA-GigabitEthernet1/0/2] quit
Step 5 Enable the revertive switching and set the wait-to-restore (WTR) time.
# Configure Switch A.
[SwitchA-smlk-group1] restore enable
[SwitchA-smlk-group1] timer wtr 30
# Configure Switch C.
[SwitchC] interface gigabitethernet 1/0/1
[SwitchC-GigabitEthernet1/0/1] smart-link flush receive control-vlan 10 password
simple 123
[SwitchC-GigabitEthernet1/0/1] quit
[SwitchC] interface gigabitethernet 1/0/2
[SwitchC-GigabitEthernet1/0/2] smart-link flush receive control-vlan 10 password
simple 123
[SwitchC-GigabitEthernet1/0/2] quit
------------------------------------------------------------------------
GigabitEthernet1/0/1 Master Active 1 2009/01/05 10:33:46 UTC
+05:00
GigabitEthernet1/0/2 Slave Inactive 0 0000/00/00 00:00:00 UTC
+05:00
# Run the shutdown command to shut down GE 1/0/1, and you can find that GE 1/0/1 is in
Inactive state and GE 1/0/2 is in Active state.
[SwitchA-GigabitEthernet1/0/1] shutdown
[SwitchA-GigabitEthernet1/0/1] display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
Wtr-time is: 30 sec.
Load-Balance Instance: 10
There is no protected-vlan reference-instance
DeviceID: 0018-2000-0083 Control-vlan ID: 10
Member Role State Flush Count Last-Flush-Time
------------------------------------------------------------------------
GigabitEthernet1/0/1 Master Inactive 1 2009/01/05 10:33:46 UTC
+05:00
GigabitEthernet1/0/2 Slave Active 1 2009/01/05 10:34:46 UTC
+05:00
# Run the undo shutdown command to enable GE 1/0/1 and wait for 30 seconds. Then you can
find that GE 1/0/1 is in Active state and GE 1/0/2 is in Inactive state.
[SwitchA-GigabitEthernet1/0/1] undo shutdown
[SwitchA-GigabitEthernet1/0/1] display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
Wtr-time is: 30 sec.
Load-Balance Instance: 10
There is no protected-vlan reference-instance
DeviceID: 0018-2000-0083 Control-vlan ID: 10
Member Role State Flush Count Last-Flush-Time
------------------------------------------------------------------------
GigabitEthernet1/0/1 Master Active 2 2009/01/05 10:35:46 UTC
+05:00
GigabitEthernet1/0/2 Slave Inactive 1 2009/01/05 10:34:46 UTC
+05:00
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10 100 500
#
stp region-configuration
instance 10 vlan 100 500
active region-configuration
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 10 100 500
stp disable
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 10 100 500
stp disable
#
smart-link group 1
load-balance instance 10 slave
restore enable
smart-link enable
port GigabitEthernet1/0/1 master
port GigabitEthernet1/0/2 slave
timer wtr 30
flush send control-vlan 10 password simple 123
#
return
Networking Requirements
As shown in Figure 2-5, CE-A is dual homed to the VPLS network through dot1q sub-interfaces
of PE-D and PE-C. Smart Link runs between two interfaces of CE-A; only the primary link
transmits service data.
If the primary link fails, Smart Link unblocks the blocked interface. Then, service data is
transmitted to the connected PE from this interface. After receiving Flush packets of CEs, the
PEs notifies the VPLS module of clearing the forwarding entries of the local VSI. In addition,
the PEs notifies the devices connected to the PEs of clearing the forwarding entries of the VSI
by sending LDP MAC WITHDRAW messages. In this case, the returning traffic of CE-B can
be switched to the normal link.
Figure 2-5 Networking diagram for connecting the CE to the VPLS in dual-homing mode
through Smart Link
PE-D PE-E
Smart Link GE1/0/1.5
GE1/0/1.5
GE1/0/1
GE1/0/2 VPLS
User1 GE1/0/1 User2
GE1/0/2 GE1/0/2.5
GE1/0/2.5 CE-B
CE-A
PE-C PE-F
Active link
Inactive link
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure VPLS.
2. Enable Smart Link on CE-A.
3. Enable revertive switching on CE-A.
4. Enable CE-A to send Flush packets.
5. Enable PE-C and PE-D to receive Flush packets and enable their interfaces to notify the
VPLS module when receiving Flush packets.
6. Enable VPLS functions on PEs.
Data Preparation
To complete the configuration, you need the following data:
l IDs of the VSIs on CE-A and IDs of the VLANs bound to the VSIs
l IDs of the Smart Link groups
l Number of the uplink interface of CE-A
l Control VLAN ID and password contained in Flush packets
Procedure
Step 1 Configure the dot1q sub-interfaces.
For details, see "QinQ Configuration" in the S9700 Core Routing Switch Configuration Guide
- Ethernet.
Step 2 On CE-A, create a VLAN and add the uplink interface to the VLAN.
For details, see "VLAN Configuration" in the S9700 Core Routing Switch Configuration Guide
- Ethernet.
Step 3 Add the uplink interfaces to the Smart Link group and specify the active and standby interfaces.
Ensure that STP is disabled on the uplink interfaces.
# Disable STP on interfaces.
Step 4 Enable revertive switching and set the interval of revertive switching.
[CE-A-smlk-group1] restore enable
[CE-A-smlk-group1] timer wtr 30
Step 7 Enable PE-C and PE-D to receive Flush packets and enable the interface to notify the VPLS
module when receiving Flush packets.
# Configure PE-C.
[PE-C] interface gigabitethernet 1/0/2
[PE-C-GigabitEthernet1/0/2] smart-link flush receive control-vlan 10 password
simple 123
[PE-C-GigabitEthernet1/0/2] smart-link vpls-notify enable
[PE-C-GigabitEthernet1/0/2] quit
[PE-C] interface gigabitethernet 1/0/1
[PE-C-GigabitEthernet1/0/1] smart-link flush receive control-vlan 10 password
simple 123
[PE-C-GigabitEthernet1/0/1] quit
# Configure PE-D.
[PE-D] interface gigabitethernet 1/0/1
[PE-D-GigabitEthernet1/0/1] smart-link flush receive control-vlan 10 password
simple 123
[PE-D-GigabitEthernet1/0/1] smart-link vpls-notify enable
[PE-D-GigabitEthernet1/0/1] quit
[PE-D] interface gigabitethernet 1/0/2
[PE-D-GigabitEthernet1/0/2] smart-link flush receive control-vlan 10 password
simple 123
[PE-D-GigabitEthernet1/0/2] quit
Step 8 Configure the VPLS network on PE-C, PE-D, PE-E, and PE-F.
The configuration procedures are not mentioned here. For details, see "VPLS Configuration" in
the S9700 Core Routing Switch Configuration Guide - VPN.
# Run the display smart-link group command to view information about the Smart Link group
on CE-A. If the following information is displayed, the configuration is successful.
# Run the shutdown command to shut down GE 1/0/1, and you can find that GE 1/0/1 is in
Inactive state and GE 1/0/2 is in Active state.
[CE-A-GigabitEthernet1/0/1] shutdown
[CE-A-GigabitEthernet1/0/1] display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
Wtr-time is: 30 sec.
There is no Load-Balance
There is no protected-vlan reference-instance
DeviceID: 0018-2000-0083 Control-vlan ID: 10
Member Role State Flush Count Last-Flush-Time
------------------------------------------------------------------------
GigabitEthernet1/0/1 Master Inactive 1 2009/01/05 10:33:46 UTC
+05:00
GigabitEthernet1/0/2 Slave Active 1 2009/01/05 10:37:58 UTC
+05:00
# After a period, run the display mac-address command on CE-B to check MAC addresses,
and you can find that the outgoing interface of CE-A is GE 1/0/1. This indicates that the active
and standby switchover on CE-A triggers the switching of returning services on the link of CE-
B.
----End
Configuration Files
NOTE
For the configurations related to VPLS, see "QinQ Configuration" in the S9700 Core Routing Switch
Configuration Guide - Ethernet.
l Configuration file of CE-A
#
sysname CE-A
#
vlan batch 10
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 10
stp disable
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 10
stp disable
#
smart-link group 1
restore enable
smart-link enable
port GigabitEthernet1/0/1 master
port GigabitEthernet1/0/2 slave
timer wtr 30
flush send control-vlan 10 password simple 123
#
return
Networking Requirements
As shown in Figure 2-6, Switch A is connected to Switch B and Switch C through two links;
Smart Link is run between GE 1/0/2 and GE 1/0/3 of Switch A; multicast users access GE 1/0/1.
At the beginning, multicast data is sent to multicast users through the primary link. When the
primary link fails, the active and standby switchover of the Smart Link group occurs. Then,
multicast data is sent to users through the slave link.
Figure 2-6 Networking diagram for associating Smart Link with multicast services
SwitchB
Monitor Link
Smart Link GE1/0/3
GE1/0/2
GE1/0/1 GE1/0/2
GE1/0/4 Internet
GE1/0/5
LSW SwitchA GE1/0/3 SwitchD Multicast
GE1/0/3 GE1/0/4 Source
Monitor Link
SwitchC Active link
Inactive link
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure Smart Link and IGMP snooping on Switch A.
2. Enable Switch B, Switch C, and Switch D to receive Flush packets and configure IGMP
snooping.
3. Enable the IGMP snooping querier function on Switch D.
Data Preparation
To complete the configuration, you need the following data:
l IDs of the VSIs on Switch A and IDs of the VLANs bound to the VSIs
l IDs of the Smart Link groups
l Number of the uplink interface of Switch A
l Control VLAN ID and password contained in Flush packets
l Addresses of static multicast groups, 225.1.1.1, 225.1.1.2, and 225.1.1.3
l VLAN ID of multicast users being 3
Procedure
Step 1 Configure Switch A.
1. Create a VLAN and add interfaces to the VLAN.
[SwitchA] vlan 3
[SwitchA-vlan3] quit
[SwitchA] interface gigabitethernet 1/0/2
[SwitchA-GigabitEthernet1/0/2] port link-type trunk
[SwitchA-GigabitEthernet1/0/2] port trunk allow-pass vlan 3
[SwitchA-GigabitEthernet1/0/2] stp disable
[SwitchA-GigabitEthernet1/0/2] quit
[SwitchA] interface gigabitethernet 1/0/3
[SwitchA-GigabitEthernet1/0/3] port link-type trunk
[SwitchA-GigabitEthernet1/0/3] port trunk allow-pass vlan 3
[SwitchA-GigabitEthernet1/0/3] stp disable
[SwitchA-GigabitEthernet1/0/3] quit
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] vlan 3
[SwitchC-vlan3] quit
[SwitchC] interface gigabitethernet 1/0/3
[SwitchC-GigabitEthernet1/0/3] port link-type trunk
[SwitchC-GigabitEthernet1/0/3] port trunk allow-pass vlan 3
[SwitchC-GigabitEthernet1/0/3] quit
[SwitchC] interface gigabitethernet 1/0/4
[SwitchC-GigabitEthernet1/0/4] port link-type trunk
[SwitchC-GigabitEthernet1/0/4] port trunk allow-pass vlan 3
[SwitchC-GigabitEthernet1/0/4] quit
# Users connected to the LSW can receive multicast channels with the IP addresses as 225.1.1.1,
225.1.1.2, and 225.1.1.3.
# Run the shutdown command to shut down GE 1/0/2, and you can find that GE 1/0/2 is in
Inactive state and GE 1/0/3 is in Active state.
[SwitchA-GigabitEthernet1/0/2] shutdown
[SwitchA-GigabitEthernet1/0/2] display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
Wtr-time is: 30 sec.
There is no Load-Balance
There is no protected-vlan reference-instance
DeviceID: 0018-2000-0083 Control-vlan ID: 3
Member Role State Flush Count Last-Flush-Time
------------------------------------------------------------------------
GigabitEthernet1/0/2 Master Inactive 1 2009/01/05 10:33:46 UTC
+05:00
GigabitEthernet1/0/3 Slave Active 1 2009/01/05 10:37:58 UTC
+05:00
# Users connected to the LSW can still receive multicast channels with the IP address as
225.1.1.1, 225.1.1.2, and 225.1.1.3. This indicates that the active and standby switchover of the
Smart Link group on Switch A results in the switching of the transmission path of multicast data
on Switch D.
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
igmp-snooping enable
igmp-snooping send-query enable
#
vlan 3
igmp-snooping enable
#
interface GigabitEthernet1/0/1
port hybrid tagged vlan 3
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 3
stp disable
#
interface GigabitEthernet1/0/3
port link-type trunk
port trunk allow-pass vlan 3
stp disable
#
smart-link group 1
restore enable
smart-link enable
port GigabitEthernet1/0/2 master
port GigabitEthernet1/0/3 slave
timer wtr 30
flush send control-vlan 3 password simple 123
#
return
l Configuration file of Switch B
#
sysname SwitchB
#
igmp-snooping enable
igmp-snooping send-query enable
#
vlan 3
igmp-snooping enable
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 3
smart-link flush receive control-vlan 3 password simple 123
#
interface GigabitEthernet1/0/3
port link-type trunk
port trunk allow-pass vlan 3
#
monitor-link group 1
port GigabitEthernet1/0/3 uplink
port GigabitEthernet1/0/2 downlink 1
#
return
l Configuration file of Switch C
#
sysname SwitchC
#
igmp-snooping enable
igmp-snooping send-query enable
#
vlan 3
igmp-snooping enable
#
interface GigabitEthernet1/0/3
port link-type trunk
port trunk allow-pass vlan 3
smart-link flush receive control-vlan 3 password simple 123
#
interface GigabitEthernet1/0/4
port link-type trunk
port trunk allow-pass vlan 3
#
monitor-link group 1
port GigabitEthernet1/0/4 uplink
IP/MPLS
core
network
SwitchC
Active link
User1 User2 Inactive link
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure Smart Link groups on Switch A and Switch C, and add uplink interfaces to the
groups.
2. Configure Monitor Link groups on Switch A and Switch B.
3. Enable Switch A and Switch C to send Flush packets.
4. Enable Switch A and Switch C to receive Flush packets.
Data Preparation
To complete the configuration, you need the following data:
l IDs of the Monitor Link groups and the numbers of the downlinks
Procedure
Step 1 Configure the same control VLAN on Switch A, Switch B, and Switch C. Add the interfaces of
the Smart Link group or Monitor Link group to this VLAN.
The configuration procedures are not mentioned here. For details, see VLAN Configuration in
the S9700 Core Routing Switch Configuration Guide - Ethernet.
Step 2 Create Smart Link groups and enable the functions of the groups.
# Configure Switch A.
<SwitchA> system-view
[SwitchA] smart-link group 1
[SwitchA-smlk-group1] quit
# Configure Switch C.
<SwitchC> system-view
[SwitchC] smart-link group 2
[SwitchC-smlk-group1] quit
Step 3 Add interfaces to Smart Link groups and specify the master and slave interfaces of each Smart
Link group
# Configure Switch A.
[SwitchA] interface gigabitethernet1/0/1
[SwitchA-GigabitEthernet1/0/1] stp disable
[SwitchA-GigabitEthernet1/0/1] quit
[SwitchA] interface gigabitethernet1/0/2
[SwitchA-GigabitEthernet1/0/2] stp disable
[SwitchA-GigabitEthernet1/0/2] quit
[SwitchA]smart-link group 1
[SwitchA-smlk-group1] port gigabitethernet 1/0/1 master
[SwitchA-smlk-group1] port gigabitethernet 1/0/2 slave
# Configure Switch C.
[SwitchC] interface gigabitethernet1/0/1
[SwitchC-GigabitEthernet1/0/1] stp disable
[SwitchC-GigabitEthernet1/0/1] quit
[SwitchC] interface gigabitethernet1/0/2
[SwitchC-GigabitEthernet1/0/2] stp disable
[SwitchC-GigabitEthernet1/0/2] quit
[SwitchC] smart-link group 2
[SwitchC-smlk-group2] port gigabitethernet 1/0/1 master
[SwitchC-smlk-group2] port gigabitethernet 1/0/2 slave
Step 4 Enable revertive switching and set the interval of revertive switching.
# Configure Switch A.
[SwitchA-smlk-group1] restore enable
[SwitchA-smlk-group1] timer wtr 30
# Configure Switch C.
[SwitchC-smlk-group2] restore enable
[SwitchC-smlk-group2] timer wtr 30
# Configure Switch A.
[SwitchA-smlk-group1] flush send control-vlan 10 password simple 123
[SwitchA-smlk-group1] quit
[SwitchA] interface gigabitethernet 2/0/1
[SwitchA-GigabitEthernet2/0/1] smart-link flush receive control-vlan 10 password
simple 123
[SwitchA-GigabitEthernet2/0/1] quit
[SwitchA] interface gigabitethernet 2/0/2
[SwitchA-GigabitEthernet2/0/2] smart-link flush receive control-vlan 10 password
simple 123
[SwitchA-GigabitEthernet2/0/2] quit
# Configure Switch B.
<SwitchB> system-view
[SwitchB] interface gigabitethernet 2/0/1
[SwitchB-GigabitEthernet2/0/1] smart-link flush receive control-vlan 10 password
simple 123
[SwitchB-GigabitEthernet2/0/1] quit
[SwitchB] interface gigabitethernet 2/0/2
[SwitchB-GigabitEthernet2/0/2] smart-link flush receive control-vlan 10 password
simple 123
[SwitchB-GigabitEthernet2/0/2] quit
# Configure Switch C.
[SwitchC-smlk-group2] flush send control-vlan 10 password simple 123
Step 7 Create Monitor Link groups and add the uplink and downlink interfaces to the Monitor Link
groups.
# Configure Switch A.
[SwitchA] monitor-link group 1
[SwitchA-mtlk-group1] smart-link group 1 uplink
[SwitchA-mtlk-group1] port gigabitethernet 2/0/1 downlink 1
# Configure Switch B.
[SwitchB] monitor-link group 2
[SwitchB-mtlk-group2] port gigabitethernet 1/0/1 uplink
[SwitchB-mtlk-group2] port gigabitethernet 2/0/1 downlink 1
Step 8 Set the revertive switching interval of the Monitor Link groups.
# Configure Switch A.
[SwitchA-mtlk-group1] timer recover-time 10
# Configure Switch B.
[SwitchB-mtlk-group2] timer recover-time 10
There is no Load-Balance
There is no protected-vlan reference-instance
DeviceID: 0018-2000-0083 Control-vlan ID: 10
Member Role State Flush Count Last-Flush-Time
------------------------------------------------------------------------
GigabitEthernet1/0/1 Master Active 1 2009/01/05 10:33:46 UTC
+05:00
GigabitEthernet1/0/2 Slave Inactive 0 0000/00/00 00:00:00 UTC
+05:00
<SwitchA> display monitor-link group 1
Monitor Link group 1 information :
Recover-timer is 3 sec.
Member Role State Last-up-time Last-down-tim
e
Smart-link1 UpLk UP 0000/00/00 00:00:00 UTC+05:00 0000/0
0/00 00:00:00 UTC+05:00
GigabitEthernet2/0/1 DwLk[1] UP 0000/00/00 00:00:00 UTC+05:00 0000/0
0/00 00:00:00 UTC+05:00
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 10
stp disable
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 10
stp disable
#
interface GigabitEthernet2/0/1
port link-type trunk
port trunk allow-pass vlan 10
smart-link flush receive control-vlan 10 password simple 123
#
interface GigabitEthernet2/0/2
port link-type trunk
port trunk allow-pass vlan 10
smart-link flush receive control-vlan 10 password simple 123
#
smart-link group 1
smart-link enable
port GigabitEthernet1/0/1 master
port GigabitEthernet1/0/2 slave
timer wtr 30
restore enable
flush send control-vlan 10 password simple 123
#
monitor-link group 1
smart-link group 1 uplink
port GigabitEthernet2/0/1 downlink 1
timer recover-time 10
#
return
vlan batch 10
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 10
#
interface GigabitEthernet2/0/1
port link-type trunk
port trunk allow-pass vlan 10
smart-link flush receive control-vlan 10 password simple 123
#
interface GigabitEthernet2/0/2
port link-type trunk
port trunk allow-pass vlan 10
smart-link flush receive control-vlan 10 password simple 123
#
monitor-link group 2
port GigabitEthernet1/0/1 uplink
port GigabitEthernet2/0/1 downlink 1
timer recover-time 10
#
return
Ethernet Ring Protection Switching (ERPS) is a standard protocol issued by the ITU-T to prevent
loops on ring networks. ERPS provides carrier-class relaibility with a fast convergence speed.
ERPS takes effect on a ring network if all devices on a ring network support it.
Background
On a complex network, loops are inevitable. With the requirement for network redundancy
backup, network designers tend to deploy multiple physical links between two devices, one of
which is the master and the others are the backup. Loops are likely or bound to occur in such a
situation.
To prevent loops from occuring, the S9700 provided by Huawei supports the ring network
protocols shown in Table 3-1. At present, Ethernet networks must have a shorter failover time
to meet service requirements. The Spanning Tree Protocol (STP), however, does not meet the
requirement in terms of the convergence performance. The Rapid Ring Protection Protocol
(RRPP) and Smart Ethernet Protection (SEP) are proprietary ring protocols, which cannot be
used for communication between Huawei and non-Huawei devices on a ring network.
ERPS is a standard protocol issued by the ITU-T to prevent loops on ring networks. It takes
effect on a ring network if all devices on a ring network support it.
ERPS Overview
Loops will cause broadcast storms, thereby exhausting network resources and paralyzing the
network. Loops also cause flapping of the MAC address table and damages MAC address entries.
ERPS is a protocol defined by the ITU-T to block specified ports to prevent loops at Layer 2.
ERPS provides carrier-class relaibility with a fast convergence speed.
Network
NPE1 NPE2
LSW1 LSW4
ERPS
LSW2 RPL
LSW3
RPL Owner
CE
Blocked Port
l ERPS ring
An ERPS ring consists of interconnected Layer 2 switching devices configured with the
same control VLAN. An ERPS ring is the basic unit for ERPS.
l Node
A node refers to a Layer 2 switching device added to an ERPS ring. A maximum of two
ports on a node can be added to the same ERPS ring.
l Port role
As defined in ERPS, a port can be an RPL Owner port or an ordinary port. The link where
the RPL Owner port resides is a ring protection link (RPL).
RPL Owner port
An ERPS ring has only one RPL Owner port, which is configured by a user. Blocking
the RPL Owner port prevents loops on the ERPS ring.
When the node where the RPL Owner port resides receives an RAPS PDU indicating
that a link or a node on the ring fails, it unblocks the RPL Owner port to allow the port
to send and receive traffic. This mechanism ensures non-stop traffic forwarding.
Ordinary port
On an ERPS ring, the ports other than the RPL Owner port are ordinary ports.
An ordinary port monitors the status of the directly-connected ERPS link, and sends
RAPS PDUs to inform the other ports if the link status changes.
l Port status
On an ERPS ring, an ERPS-enabled port can be in either of the following states:
Forwarding: In this state, the port forwards user traffic, and sends and receives ERPS
PDUs.
Discarding: In this state, the port only sends ERPS PDUs.
ERPS is a protocol defined by the ITU-T to block specified ports to prevent loops at Layer 2.
Note the following aspects when configuring ERPS:
1. ERPS breaks loops only if an ERPS ring is created, the control VLAN and protected
instance are configured on the ERPS ring, and ports are added to and port roles are specified
on the the ERPS ring.
2. The WTR timer and guard timer need to be configured differently for the ERPS ring
according to real-world situations.
3. The ERPS ring can be assotiated with a fault detection protocol to reduce the traffic
interruption time.
Control VLAN
A control VLAN is configured for an ERPS ring to transmit ERPS packets.
Each ERPS ring must be configured with a control VLAN. After an interface is added to an
ERPS ring configured with a control VLAN, the interface is added to the control VLAN
automatically.
Different EPRS rings cannot be configured with the same control VLAN ID.
Unlike control VLANs, data VLANs are used to transmit data packets.
Protected instance
On a Layer 2 device running ERPS, the VLAN in which ERPS packets and data packets are
transmitted must be mapped to a protected instance so that ERPS forwards or blocks these
packets based on rules. Otherwise, VLAN packets probably cause broadcast storms on the ring
network. This will cause the network to be unavailable.
Timer
There are three timers used by ERPS: guard timer, WTR timer, and WTR timer.
l Guard Timer
After a faulty link or a faulty node recovers, the nodes on the two ends of the link or the
faulty node sends RAPS packets to inform the other nodes of the link or node recovers and
starts a Guard timer. Before the timer expires, each involved node does not process any
RAPS packet to avoid receiving out-of-date RAPS packets indicating that the link or node
fails. If the involved node receives an RAPS packet indicating that another port fails , the
local port enters the Forwarding state.
l WTR Timer
If the RPL owner port is unblocked owning to a link or node failure, the involved port may
not go Up immediately after the link or node recovers. To prevent the RPL owner port
alternates between the Up and Down states, the node where the RPL owner port resides
starts a WTR timer after receiving an RAPS packet indicating the link or node recovery. If
the node receives an RAPS packet indicating that another port fails before the timer expires,
it terminates the WTR timer. If the node does not receive any RAPS packet indicating that
another port fails before the timer expires, it unblocks the RPL owner port when the timer
expires and sends an RAPS packet indicating that the RPL owner port is blocked. After
receiving this RAPS packet, the other nodes set their ports on the ring to the Forwarding
state.
l Holdoff Timer
On different Layer 2 networks running EPRS, there may be different requirements on
protective switchover. For example, if multiple services are provided, you may hope that
the protective switchover is not performed immidiately after a server fails, ensuring that
clients do not sense the failure. In this case, you can set a Holdoff timer. If the fault occurs,
the fault is not immediately sent to ERPS untill the Holdoff timer times out.
ERPS Multi-instance
On a common ERPS network, a physical ring can be configured with a single ERPS ring and a
single blocked port can be specified on the ring. If the ERPS ring is complete, the blocked port
prevents all user data from passing through. As a result, all user data travels through a single
path over the ERPS ring, and the other link on the blocked port becomes idle, causing bandwidth
wastes.
The ERPS multi-instance allows two logical ERPS rings on a physical ring. On the ERPS ring
shown in Figure 3-2, all devices, ports, and control VLANs work based on basic ERPS rules.
A physical ring has two blocked ports. Each blocked port verifies the completeness of the
physical ring and blocks or forwards data without affecting others.
One or two ERPS rings can be configured over a physical ring. Each ERPS ring is configured
with an EPRS protected instance. Each protected instance represents a range of VLANs. The
topology calculated for a specific ERPS ring does not apply to another ERPS ring and does not
affect other rings.
With a specific protected instance for each ERPS ring, a blocked port takes effect only on VLANs
of a specific ERPS ring. Different VLANs can use separate paths, implementing traffic load
balancing and link backup.
Network
NPE1 NPE2
LSW3 GE1/0/1
LSW4
GE1/0/2
GE1/0/1
GE1/0/2
ERPS
GE1/0/2
GE1/0/1
LSW1 GE1/0/2
GE1/0/1
P2 LSW2
P1
CE1
CE2
VLAN: VLAN:
100~200 300~400
ERPS ring1
ERPS ring2
Blocked Port1
Blocked Port2
Data Flow1
Data Flow2
Applicable Environment
Generally, redundant links are used to access an upper-layer network to provide link backup and
enhance network reliability. The use of redundant links, however, may produce loops. causing
broadcast storms and rendering the MAC address table unstable. As a result, the communication
quality deteriorates, and communication services may even be interrupted. ERPS can be
deployed on the ring network to block redundant links and unblock them if a link fault occurs.
NOTE
Only one protocol, that is, RRPP, STP, SEP, or ERPS, can be configured on one port.
Pre-configuration Tasks
Before configuring ERPS functions, complete the following tasks:
Data Preparation
To configure ERPS functions, you need the following data.
No. Data
1 ERPS ring ID
4 Protected instance ID
Procedure
Step 1 Run:
system-view
Step 2 Run:
erps ring ring-id
An ERPS ring is created and the view of the ERPS ring is displayed.
If an ERPS ring needs to be deleted, ensure that no interfaces are added to the ERPS ring. If any
interface is added to the ERPS ring, a prompt message is displayed when the ERPS ring is being
deleted. In this case, run the undo erps ring command in the interface view or the undo port
command in the ERPS ring view to remove the interface. and run the undo erps ring command
to delete the ERPS ring.
----End
Follow-up Procedure
To facilitate the maintenance of devices on the ERPS ring, run the description command to
configure description information such as ERPS ring ID for these devices.
Context
The same control VLAN must be configured for all devices on an ERPS ring, and different
control VLANs must be configured for different ERPS rings.
Procedure
Step 1 Run:
system-view
Step 2 Run:
erps ring ring-id
Step 3 Run:
control-vlan vlan-id
The control VLAN is configured for the ERPS ring to forward ERPS protocol packets.
The control VLAN specified by the parameter vlan-id must be newly created. It can neither be
referenced by RRPP or SEP, nor be used in port trunk, default, VLAN mapping, or VLAN
stacking mode.
l If any interface has been added to the ERPS ring, the control VLAN cannot be modified. If
the configured control VLAN needs to be deleted, run the undo erps ring command in the
interface view or the undo port command in the ERPS ring view, and run the undo control-
vlan command to delete the control VLAN.
l If no interface is added to the ERPS ring, you can modify the control VLAN for multiple
times. Only the latest configuration takes effect.
l After the control VLAN is correctly created, the command to create ordinary VLANs vlan
batch vlan-id1 [ to vlan-id2 ] &<1-10> is automatically displayed in the configuration file.
After an interface is added to an ERPS ring configured with a control VLAN, the interface
is added to the control VLAN automatically. Note the following information:
If the type of the interface added to the ERPS ring is trunk, the port trunk allow-pass
vlan vlan-id command is displayed automatically in the configuration file.
If the type of the interface added to the ERPS ring is hybrid, the port hybrid tagged
vlan vlan-id command is displayed automatically in the configuration file.
----End
Procedure
Step 1 Run:
system-view
system-view
The mapping relationships between protected intances and VLANs are specified.
The parameter instance-id in this command must the same as the parameter instance-id in
the protected-instance command.
4. Run:
active region-configuration
----End
3.3.5 Adding Layer 2 Ports to ERPS Ring and Configuring Port Roles
After an ERPS ring is created, ERPS breaks loops only if Layer 2 ports are added to the ERPS
ring and port roles are configured.
Prerequisites
Before adding interfaces to an ERPS ring, ensure that:
l STP and RRPP are not enabled on Layer 2 interfaces that are added to the ERPS ring.
If STP is enabled on these interfaces, run the stp disable command to disable STP.
If RRPP is enabled on these interfaces, run the rrpp disable command to disable RRPP.
l The control VLAN and protected instance are configured using the control-vlan and
protected-instance commands.
Context
As defined in ERPS, a port can be an RPL owner port or an ordinary port. The link where the
RPL owner port resides is the ring protection link.
l RPL Owner port
An ERPS ring has only one RPL Owner port, which is configured by a user. Blocking the
RPL Owner port prevents loops on the ERPS ring.
When the node where the RPL owner port resides receives an RAPS packet indicating that
a link or a node on the ring fails, it unblocks the RPL owner port to allow the port to send
and receive traffic. This mechanism ensures non-stop traffic forwarding.
l Ordinary port
On an ERPS ring, the ports other than the RPL owner port are ordinary ports.
An ordinary port monitors the status of the directly-connected ERPS link, and sends RAPS
packets to inform the other ports if the link status changes.
l In the interface view, add the interface to the ERPS ring and configure the port role.
NOTE
At presnet, as MAC address Update packets cannot be independantly sent, configuring the direct link
between two upstream nodes as an RPL is not recommended.
Before changing the port role, use the shutdown command to disable the port; after the role changing is
completed, use the undo shutdown command to enable the port. Otherwise, the traffic is interrupted.
Procedure
Step 1 Run:
system-view
The port is added to the ERPS ring and the port role is specified.
l In the interface view, add the port to the ERPS ring and configure the port role.
1. Run:
interface interface-type interface-number
The port is added to the ERPS ring and the port role is specified.
----End
Context
ERPS timers consists of:
l Guard Timer
After a faulty link or a faulty node recovers, the nodes on the two ends of the link or the
faulty node sends RAPS packets to inform the other nodes of the link or node recovers and
starts a Guard timer. Before the timer expires, each involved node does not process any
RAPS packet to avoid receiving out-of-date RAPS packets indicating that the link or node
fails. If the involved node receives an RAPS packet indicating that another port fails , the
local port enters the Forwarding state.
l WTR Timer
If the RPL owner port is unblocked owning to a link or node failure, the involved port may
not go Up immediately after the link or node recovers. To prevent the RPL owner port
alternates between the Up and Down states, the node where the RPL owner port resides
starts a WTR timer after receiving an RAPS packet indicating the link or node recovery. If
the node receives an RAPS packet indicating that another port fails before the timer expires,
it terminates the WTR timer. If the node does not receive any RAPS packet indicating that
another port fails before the timer expires, it unblocks the RPL owner port when the timer
expires and sends an RAPS packet indicating that the RPL owner port is blocked. After
receiving this RAPS packet, the other nodes set their ports on the ring to the Forwarding
state.
l Holdoff Timer
On different Layer 2 networks running EPRS, there may be different requirements on
protective switchover. For example, if multt-layer services are provided, users hope that
the protective switchover is not performed immidiately after a server fails, ensuring that
clients do not sense the failure. In this case, you can set a Holdoff timer. If the fault occurs,
the fault is not immediately sent to ERPS until the Holdoff timer times out.
Procedure
Step 1 Run:
system-view
Step 2 Run:
erps ring ring-id
----End
Context
In addition to determining whether packets can be forwarded, the MEL value of an ERPS ring
can also be used to facilitate the communications with other vendors' devices. The same MEL
value ensures smooth communications between devices.
Procedure
Step 1 Run:
system-view
----End
Prerequisites
All configurations of the ERPS ring are complete.
Procedure
l Run the display erps [ ring ring-id ] [ verbose ] command to check information about the
ERPS ring.
----End
Example
Run the display erps [ ring ring-id ] command to view information about the ERPS ring. For
example:
<Quidway> display erps ring 1
D : Discarding
F : Forwarding
R : RPL Owner
Ring Control WTR Timer Guard Timer Port 1 Port 2
ID VLAN (min) (csec)
-----------------------------------------------------------------------
1 10 6 100 (F)GE1/0/1 (D,R)GE1/0/2
-----------------------------------------------------------------------
Run the display erps [ ring ring-id ] [ verbose ] command to view detailed information about
the ERPS ring. For example:
Context
CAUTION
ERPS statistics cannot be restored after being reset. Therefore, exercise caution when resetting
ERPS statistics.
Procedure
Step 1 Run:
display erps [ ring ring-id ] statistics
Statistics of the packets sent and received on ERPS interfaces are displayed. Note that the
command is run in the user view.
Step 2 Run:
reset erps [ ring ring-id ] statistics
ERPS statistics are cleared. Note that the command is run in the user view.
----End
Networking Requirements
As shown in Figure 3-3, Switches A to E form a ring network on the aggregation layer. They
aggregate Layer 2 traffic from customer networks to the Layer 3 network. The Switches on the
ring network run the ERPS protocol to implement Layer 2 protection switching.
Packets sent from customer networks belong to VLANs 100 through 200. To prevent loops on
the ring network, specify an RPL owner port so that data packets from the CEs are transmitted
as follows:
l Packets sent from CE1 are forwarded through SwitchB and SwitchA.
l Packets sent from CE2 are forwarded through SwitchC, SwitchB, and SwitchA.
l Packets sent from CE3 are forwarded through SwitchD and SwitchE.
Network
NPE1 NPE2
GE1/0/2 SwitchE
SwitchA
GE1/0/1
GE1/0/1 GE1/0/2
GE1/0/2
GE1/0/1 ERPS SwitchD
SwitchB
GE1/0/1
GE1/0/2 RPL
GE1/0/1
GE1/0/2
RPL Owner CE3
CE1 SwitchC
VLAN100-
VLAN100- 200
200 CE2
VLAN100-
200
Blocked Port
Data Flow1
Data Flow2
Data Flow3
Configuration Roadmap
The configuration roadmap is as follows:
1. Create an ERPS ring, and configure a control VLAN and protected instance.
2. Add Layer 2 ports connecting the Switches to the ERPS ring and configure a port as the
RPL owner.
3. Set the guard timer and WTR timer for the ERPS ring.
4. Create VLANs and add ports to VLANs on Switches A to E to implement Layer 2
forwarding.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Create VLANs and add ports to VLANs on Switches A to E to implement Layer 2 forwarding.
# Configure SwitchA.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan batch 100 to 200
[SwitchA] interface gigabitethernet 1/0/1
[SwitchA-GigabitEthernet1/0/1] port link-type trunk
[SwitchA-GigabitEthernet1/0/1] port trunk allow-pass vlan 100 to 200
[SwitchA-GigabitEthernet1/0/1] quit
[SwitchA] interface gigabitethernet 1/0/2
[SwitchA-GigabitEthernet1/0/2] port link-type trunk
[SwitchA-GigabitEthernet1/0/2] port trunk allow-pass vlan 100 to 200
[SwitchA-GigabitEthernet1/0/2] quit
# Configure SwitchB.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan batch 100 to 200
[SwitchB] interface gigabitethernet 1/0/1
[SwitchB-GigabitEthernet1/0/1] port link-type trunk
[SwitchB-GigabitEthernet1/0/1] port trunk allow-pass vlan 100 to 200
[SwitchB-GigabitEthernet1/0/1] quit
[SwitchB] interface gigabitethernet 1/0/2
[SwitchB-GigabitEthernet1/0/2] port link-type trunk
[SwitchB-GigabitEthernet1/0/2] port trunk allow-pass vlan 100 to 200
[SwitchB-GigabitEthernet1/0/2] quit
# Configure SwitchC.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] vlan batch 100 to 200
[SwitchC] interface gigabitethernet 1/0/1
[SwitchC-GigabitEthernet1/0/1] port link-type trunk
[SwitchC-GigabitEthernet1/0/1] port trunk allow-pass vlan 100 to 200
[SwitchC-GigabitEthernet1/0/1] quit
[SwitchC] interface gigabitethernet 1/0/2
[SwitchC-GigabitEthernet1/0/2] port link-type trunk
[SwitchC-GigabitEthernet1/0/2] port trunk allow-pass vlan 100 to 200
[SwitchC-GigabitEthernet1/0/2] quit
# Configure SwitchD.
<Quidway> system-view
[Quidway] sysname SwitchD
[SwitchD] vlan batch 100 to 200
[SwitchD] interface gigabitethernet 1/0/1
[SwitchD-GigabitEthernet1/0/1] port link-type trunk
[SwitchD-GigabitEthernet1/0/1] port trunk allow-pass vlan 100 to 200
[SwitchD-GigabitEthernet1/0/1] quit
[SwitchD] interface gigabitethernet 1/0/2
[SwitchD-GigabitEthernet1/0/2] port link-type trunk
[SwitchD-GigabitEthernet1/0/2] port trunk allow-pass vlan 100 to 200
[SwitchD-GigabitEthernet1/0/2] quit
# Configure SwitchE.
<Quidway> system-view
[Quidway] sysname SwitchE
Step 2 Create an ERPS ring, configure VLAN 10 as the control VLAN to transmit ERPS protocol
packets, and bind VLANs 100 through 200 to a protected instance.
# Configure SwitchA.
[SwitchA] erps ring 1
[SwitchA-erps-ring1] control-vlan 10
[SwitchA-erps-ring1] protected-instance 1
[SwitchA-erps-ring1] quit
[SwitchA] stp region-configuration
[SwitchA-mst-region] instance 1 vlan 10 100 to 200
[SwitchA-mst-region] active region-configuration
[SwitchA-mst-region] quit
# Configure SwitchB.
[SwitchB] erps ring 1
[SwitchB-erps-ring1] control-vlan 10
[SwitchB-erps-ring1] protected-instance 1
[SwitchB-erps-ring1] quit
[SwitchB] stp region-configuration
[SwitchB-mst-region] instance 1 vlan 10 100 to 200
[SwitchB-mst-region] active region-configuration
[SwitchB-mst-region] quit
# Configure SwitchC.
[SwitchC] erps ring 1
[SwitchC-erps-ring1] control-vlan 10
[SwitchC-erps-ring1] protected-instance 1
[SwitchC-erps-ring1] quit
[SwitchC] stp region-configuration
[SwitchC-mst-region] instance 1 vlan 10 100 to 200
[SwitchC-mst-region] active region-configuration
[SwitchC-mst-region] quit
# Configure SwitchD.
[SwitchD] erps ring 1
[SwitchD-erps-ring1] control-vlan 10
[SwitchD-erps-ring1] protected-instance 1
[SwitchD-erps-ring1] quit
[SwitchD] stp region-configuration
[SwitchD-mst-region] instance 1 vlan 10 100 to 200
[SwitchD-mst-region] active region-configuration
[SwitchD-mst-region] quit
# Configure SwitchE.
[SwitchE] erps ring 1
[SwitchE-erps-ring1] control-vlan 10
[SwitchE-erps-ring1] protected-instance 1
[SwitchE-erps-ring1] quit
[SwitchE] stp region-configuration
[SwitchE-mst-region] instance 1 vlan 10 100 to 200
[SwitchE-mst-region] active region-configuration
[SwitchE-mst-region] quit
Step 3 Add ports to the ERPS ring and configure GE1/0/2 of SwitchC as the RPL owner.
# Configure SwitchA.
[SwitchA] interface gigabitethernet 1/0/1
[SwitchA-GigabitEthernet1/0/1] stp disable
[SwitchA-GigabitEthernet1/0/1] erps ring 1
[SwitchA-GigabitEthernet1/0/1] quit
[SwitchA] interface gigabitethernet 1/0/2
[SwitchA-GigabitEthernet1/0/2] stp disable
[SwitchA-GigabitEthernet1/0/2] erps ring 1
[SwitchA-GigabitEthernet1/0/2] quit
# Configure SwitchB.
[SwitchB] interface gigabitethernet 1/0/1
[SwitchB-GigabitEthernet1/0/1] stp disable
[SwitchB-GigabitEthernet1/0/1] erps ring 1
[SwitchB-GigabitEthernet1/0/1] quit
[SwitchB] interface gigabitethernet 1/0/2
[SwitchB-GigabitEthernet1/0/2] stp disable
[SwitchB-GigabitEthernet1/0/2] erps ring 1
[SwitchB-GigabitEthernet1/0/2] quit
# Configure SwitchC.
[SwitchC] interface gigabitethernet 1/0/1
[SwitchC-GigabitEthernet1/0/1] stp disable
[SwitchC-GigabitEthernet1/0/1] erps ring 1
[SwitchC-GigabitEthernet1/0/1] quit
[SwitchC] interface gigabitethernet 1/0/2
[SwitchC-GigabitEthernet1/0/2] stp disable
[SwitchC-GigabitEthernet1/0/2] erps ring 1 rpl owner
[SwitchC-GigabitEthernet1/0/2] quit
# Configure SwitchD.
[SwitchD] interface gigabitethernet 1/0/1
[SwitchD-GigabitEthernet1/0/1] stp disable
[SwitchD-GigabitEthernet1/0/1] erps ring 1
[SwitchD-GigabitEthernet1/0/1] quit
[SwitchD] interface gigabitethernet 1/0/2
[SwitchD-GigabitEthernet1/0/2] stp disable
[SwitchD-GigabitEthernet1/0/2] erps ring 1
[SwitchD-GigabitEthernet1/0/2] quit
# Configure SwitchE.
[SwitchE] interface gigabitethernet 1/0/1
[SwitchE-GigabitEthernet1/0/1] stp disable
[SwitchE-GigabitEthernet1/0/1] erps ring 1
[SwitchE-GigabitEthernet1/0/1] quit
[SwitchE] interface gigabitethernet 1/0/2
[SwitchE-GigabitEthernet1/0/2] stp disable
[SwitchE-GigabitEthernet1/0/2] erps ring 1
[SwitchE-GigabitEthernet1/0/2] quit
Step 4 Set the guard timer and WTR timer for the ERPS ring.
# Configure SwitchA.
[SwitchA] erps ring 1
[SwitchA-erps-ring1] wtr-timer 6
[SwitchA-erps-ring1] guard-timer 100
[SwitchA-erps-ring1] quit
# Configure SwitchB.
[SwitchB] erps ring 1
[SwitchB-erps-ring1] wtr-timer 6
[SwitchB-erps-ring1] guard-timer 100
[SwitchB-erps-ring1] quit
# Configure SwitchC.
[SwitchC] erps ring 1
[SwitchC-erps-ring1] wtr-timer 6
[SwitchC-erps-ring1] guard-timer 100
[SwitchC-erps-ring1] quit
# Configure SwitchD.
[SwitchD] erps ring 1
[SwitchD-erps-ring1] wtr-timer 6
[SwitchD-erps-ring1] guard-timer 100
[SwitchD-erps-ring1] quit
# Configure SwitchE.
[SwitchE] erps ring 1
[SwitchE-erps-ring1] wtr-timer 6
[SwitchE-erps-ring1] guard-timer 100
[SwitchE-erps-ring1] quit
l Run the display erps ring 1 verbose command to view detailed information about the ERPS
ring, and ports of SwitchC that have been added to the ring.
[SwitchC] display erps ring 1 verboseRing ID : 1
Description : Ring 1
Control Vlan : 10
Protected Instance : 1
WTR Timer Setting (min) : 6 Running (s) : 0
Guard Timer Setting (csec) : 100 Running (csec) : 0
Holdoff Timer Setting (deciseconds) : 0 Running (deciseconds) : 0
Ring State : Idle
RAPS_MEL : 7
Time since last topology change : 0 days 0h:33m:4s
-------------------------------------------------------------------------------
-
Port Port Role Port Status Signal Status
-------------------------------------------------------------------------------
-
GE1/0/1 Common Forwarding Non-failed
GE1/0/2 RPL Owner Discarding Non-failed
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 10 100 to 200
#
stp region-configuration
instance 1 vlan 10 100 to 200
active region-configuration
#
erps ring 1
control-vlan 10
protected-instance 1
wtr-timer 6
guard-timer 100
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 10 100 to 200
stp disable
erps ring 1
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 10 100 to 200
stp disable
erps ring 1
#
return
l Configuration file of SwitchB
#
sysname SwitchB
#
vlan batch 10 100 to 200
#
stp region-configuration
instance 1 vlan 10 100 to 200
active region-configuration
#
erps ring 1
control-vlan 10
protected-instance 1
wtr-timer 6
guard-timer 100
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 10 100 to 200
stp disable
erps ring 1
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 10 100 to 200
stp disable
erps ring 1
#
return
l Configuration file of SwitchC
#
sysname SwitchC
#
vlan batch 10 100 to 200
#
stp region-configuration
instance 1 vlan 10 100 to 200
active region-configuration
#
erps ring 1
control-vlan 10
protected-instance 1
wtr-timer 6
guard-timer 100
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 10 100 to 200
stp disable
erps ring 1
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 10 100 to 200
stp disable
erps ring 1 rpl owner
#
return
l Configuration file of SwitchD
#
sysname SwitchD
#
vlan batch 10 100 to 200
#
stp region-configuration
instance 1 vlan 10 100 to 200
active region-configuration
#
erps ring 1
control-vlan 10
protected-instance 1
wtr-timer 6
guard-timer 100
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 10 100 to 200
stp disable
erps ring 1
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 10 100 to 200
stp disable
erps ring 1
#
return
l Configuration file of SwitchE
#
sysname SwitchE
#
vlan batch 10 100 to 200
#
stp region-configuration
instance 1 vlan 10 100 to 200
active region-configuration
#
erps ring 1
control-vlan 10
protected-instance 1
wtr-timer 6
guard-timer 100
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 10 100 to 200
stp disable
erps ring 1
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 10 100 to 200
stp disable
erps ring 1
#
return
4 RRPP Configuration
The Rapid Ring Protection Protocol (RRPP) features fast convergence, because the convergence
time is irrelevant to the number of the nodes on the ring.
The S9700 supports the RRPP version defined by Huawei and RRPP version defined by the national
standards of China. The Huawei version supports certain proprietary protocols of Huawei. The RRPP
version defined by the national standards of China is mainly provided for users in China, and the Huawei
version is used for users in other countries.
RRPP Domain
Master SwitchB
Node Edge Transit
SwitchD Node Transit Node
RRPP Sub-Ring 1
SwitchA
RRPP Major-Ring
SwitchE
l RRPP domain
An RRPP domain consists of a group of interconnected switches with the same domain ID
and control VLAN ID. An RRPP domain consists of the elements such as the RRPP major
ring and subring, control VLAN, master node, transit node, and primary port and secondary
port.
An RRPP domain is identified by its ID, which is an integer.
l RRPP ring
Physically, an RRPP ring corresponds to an Ethernet ring. An RRPP ring is a part of its
RRPP domain. An RRPP domain consists of one RRPP ring or multiple crossed RRPP
rings.
l RRPP major ring and subring
If an RRPP domain consists of multiple crossed RRPP rings, you can configure one ring
as the major ring and other rings as subrings by setting their levels.
An RRPP domain has only one major ring.
Protocol packets of subrings are transmitted in the major ring as data packets, and protocol
packets of the major ring are transmitted only in the major ring.
l Control VLAN
A VLAN that transmits RRPP protocol packets in an RRPP domain is called a control
VLAN. A control VLAN can contain only RRPP ports.
An RRPP domain is configured with two control VLANs: the primary control VLAN and
the sub control VLAN. You need to specify only the primary control VLAN. The VLAN
whose ID is one more than the ID of the primary control VLAN becomes the sub control
VLAN.
Different from a control VLAN, a data VLAN is used to transmit data packets. The data
VLAN can contain both the RRPP ports and non-RRPP ports.
l Master node
On an Ethernet ring, each switch is called a node. Each RRPP ring must have only one
master node.
l Transit node
On an RRPP ring, all nodes except the master node are transit nodes.
A transit node monitors the status of its directly connected RRPP links. When the link status
changes, the transit node informs the master node. The master node then determines the
policy for reacting to the change of the link status.
l Edge transit node
Edge transit node is a role of a switch on a subring. On the major ring, the switch functions
as a transit node or the master node. A switch can be configured as the master node on the
major ring and the edge transit node simultaneously.
The two edge transit nodes on two crossed rings are of the same level.
l Edge node and assistant edge node (supported by the RRPP version defined by Huawei)
An edge node or assistant edge node is configured on a subring. It functions as a transit
node on the major ring.
On a subring, either of the two nodes that are on the crossed points of the major ring and
subring can be configured as the edge node. A subring must have only one edge node. Then,
the other node is the assistant edge node.
l Primary interface and secondary interface
On the master node and transit nodes, you can configure one of the two interfaces connected
to the Ethernet ring as the primary interface and the other as the secondary interface.
l Common interface and edge interface (supported by the RRPP version defined by Huawei)
On an edge node or an assistant edge node, the interface shared by the subring and major
ring is called the common interface. An interface located only on a subring is called an
edge interface.
RRPP Snooping
As shown in Figure 4-2, UPE A, UPE B, and NPE D comprise an RRPP ring. UPE A functions
as the master node, UPE B functions as the transit node, and VLAN 100 functions as the control
VLAN.
The RRPP ring accesses the VPLS network through sub-interfaces GE 1/0/0.100 and GE
2/0/0.100 on NPE D. Sub-interfaces allow only packets in the control VLAN of the RRPP ring
to pass through. In this manner, NPE D can transparently transmit RRPP control packets through
the sub-interfaces at both ends to ensure the structure integrity of the RRPP ring. The RRPP
protocol, however, is not run on NPE D.
NPE D transmits data packets of VLANs 10 to 20 on the RRPP ring through sub-interfaces, or
the VLANIF interface. Data packets on the RRPP ring are transparently transmitted to the upper-
layer network through the VPLS network. For details on access and transmission principle, see
S9700 Core Routing Switch Configuration Guide - VPN.
GE1/0/0.100 GE2/0/0.100
NPED
GE RRPP ring
Control VLAN:100
P User VLAN:10~20
UPEA UPEB
S
The change of the RRPP ring status cannot be detected on the VPLS network because NPE nodes
cannot respond to the RRPP control packets. When the RRPP ring topology changes, each node
on the VPLS network forwards outgoing data according to the MAC address table generated
before the RRPP ring topology changes. As a result, the outgoing traffic cannot be forwarded.
After RRPP snooping is enabled on the sub-interfaces GE 1/0/0.100 and GE 2/0/0.100 of NPE
D, NPE D can respond to the RRPP control packets. Then, NPE D can synchronize the change
of the RRPP ring status and refresh the MAC address table of the VSI. This ensures that outgoing
traffic is forwarded.
RRPP Multi-Instance
l Multi-instance
In the RRPP networking, one RRPP ring contains only one master node. When the master
node is in Complete state, the blocked secondary interface rejects all the data packets. In
this manner, all the data packets are transmitted through the same path on the RRPP ring.
The link of the secondary interface on the master node is idle, which wastes bandwidth.
The RRPP multi-instance feature is implemented based on domains. In the RRPP domain,
all the interfaces, nodes, and topologies conform to the RRPP principle. In the RRPP multi-
instance networking, multiple domains can be configured on an RRPP ring.
Each domain contains one or more instances, and each instance represents a VLAN range.
The VLANs in a domain are protected VLANs in the RRPP domain. A protected VLAN
can be a data VLAN, the control VLAN on the major ring, or the control VLAN on a subring
in the RRPP domain.
In the RRPP multi-instance networking, a ring can contain multiple master nodes. Load
balancing and link backup can be implemented based on the blocking state of the secondary
interface on the master node.
As shown in Figure 4-3, Switch A, Switch B, Switch C, Switch D, and Switch E form a
ring with multiple instances. Two domains are configured on the ring. Switch C is the
master node in domain 2 and Switch D is the master node in domain 1. The primary and
secondary interfaces on each master node are marked in Figure 4-3.
Domain 1 is configured with instance 1, which represents VLANs 100 to 200. When Switch
D is in Complete state, its secondary interface is blocked. Therefore, packets of VLANs
100 to 200 are transmitted though the path Switch A -> Switch C -> Switch E.
Domain 2 is configured with Instance 2, which represents VLANs 201 to 400. When Switch
C is in Complete state, its secondary interface is blocked. Therefore, packets of VLANs
201 to 400 are transmitted though the path Switch B -> Switch D -> Switch E.
Instance1:
VLAN 100-200
SwitchE
Backbone
network
Instance2:
VLAN 201-400
SwitchB P
S(Block) Master 1
SwitchD
Block
P Primary port
S Secondary port
In the networking of crossed rings with multiple RRPP instances, if multiple subrings exist,
the following may occur:
Multiple subrings share the same edge node and the same assistant edge node. In addition,
the edge node and assistant edge node are located on the same major ring. That is, the Edge-
Hello packets of the edge node are transmitted to the assistant edge node along the same
path.
SwitchE
Master
SwitchA SwitchC
Master SwitchB
SwitchD
SwitchF
domain 1
domain 2
To reduce the number of Edge-Hello packets sent and received on a switch and improve
the system performance, you can add the subrings with the same edge node and same
assistant edge node to a ring group. Then configure a member subring to add Edge-Hello
packets to check the channel of protocol packets on the major ring.
There are four subrings in Figure 4-4, namely, ring 2 in domain 1, ring 3 in domain 1, ring
2 in domain 2, and ring 3 in domain 2. The subrings have the same major ring; therefore,
they can be added to a ring group. After the subrings are added to a ring group, only one
subring sends Edge-Hello packets, reducing the number of Edge-Hello packets.
l Link-Up-Delay timer
To avoid flapping on the ring caused by frequent changes of transmission paths, you can
set a Link-Up-Delay timer on the master node.
If master node receives its own Hello packet before the Failed timer expires, it transits to
the Complete state after a certain delay. This reduces link flapping on the ring.
The master node processes the Hello packets received from the secondary interface only
after the Link-Up-Delay timer expires.
Applicable Environment
RRPP is used for the networking of the single-ring or multiple crossed rings. When configuring
RRPP, you must configure all nodes on the RRPP ring.
NOTE
Pre-Configuration Tasks
Before configuring RRPP functions, complete the following tasks:
Data Preparation
To configure RRPP functions, you need the following data.
No. Data
4 Values of the Hello timer and Fail timer in the RRPP domain
Context
Do as follows on the S9700 that you want to add to an RRPP domain with multiple instances.
Procedure
Step 1 Run:
system-view
Step 2 Run:
stp region-configuration
The default algorithm is used to determine the mapping between instances and VLANs.
The vlan-mapping modulo command is used to map a VLAN to the instance with the ID being
(VLAN ID - 1)%modulo + 1. Assume that modulo is set to 16. The S9700 maps VLAN 1 to
instance 1, VLAN 2 to instance 2, VLAN 16 to instance 16, and so forth.
The control VLANs of the major ring and the subrings must be contained in the VLAN list.
A domain supports up to 49 instances, among which instance 0 is the default instance and does
not need to be created.
Step 4 Run:
active region-configuration
----End
Context
Do as follows on the S9700 on which interfaces need to be added to the RRPP ring.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
RRPP rings can be configured only on Ethernet interfaces, GE interfaces, and Eth-Trunk
interfaces.
An interface cannot be configured as an RRPP interface if the Smart Link, LDT, MUX VLAN
or MSTP is configured on the interface.
An RRPP interface needs to allow packets of control VLANs and data VLANs to pass through;
therefore, the RRPP interface must be configured as a trunk interface or hybrid interface.
Step 4 Run:
port trunk allow-pass vlan { { vlan-id1 [ to vlan-id2 ] } &<1-10> | all }
or run:
port hybrid tagged vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
IDs of the data VLANs whose packets are allowed to pass through the RRPP interface are
specified.
After you specify the control VLAN by running the control-vlan command in the RRPP domain
view and run the ring node-mode command, all the interfaces on the RRPP ring allow packets
of this control VLAN to pass through. Therefore, you need only to specify the data VLANs in
this step.
NOTE
If RRPP snooping is enabled on the VLANIF interface of a VLAN, the RRPP interfaces cannot be added
to the VLAN.
Step 5 Run:
stp disable
By default, STP is enabled on all interfaces of the S9700. Before creating an RRPP ring, disable
STP on the interfaces that need to be added to the RRPP ring.
----End
Context
Do as follows on all switches in the RRPP domain:
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
When creating the RRPP domain, you must specify the domain ID. If the domain exists, the
domain view is directly displayed.
----End
Context
Do as follows on all switches in the RRPP domain:
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
Step 3 Run:
control-vlan vlan-id
The control VLAN specified by vlan-id and the sub-control VLAN specified by vlan-id+1 must
be uncreated and not used in port trunk, mapping, or stacking mode.
An RRPP domain is configured with two control VLANs: the primary control VLAN and the
sub control VLAN. You need to specify only the primary control VLAN. The VLAN whose ID
is one more than the ID of the primary control VLAN becomes the sub control VLAN.
After configuring the control VLAN, you cannot directly modify it. You can only delete the
control VLAN by deleting the domain, and then reconfigure the control VLAN. The sub-control
VLAN is also deleted when you delete the domain.
NOTE
----End
Context
Do as follows on all S9700s in the RRPP domain.
Procedure
Step 1 Run:
system-view
When configure the list of protected VLANs, pay attention to the following points:
l Protected VLANs must be configured before you configure an RRPP ring.
l You can delete or change existing protected VLANs before configuring an RRPP ring. The protected
VLANs cannot be changed after the RRPP ring is configured.
l In the same physical topology, the control VLAN of a domain cannot be configured as a protected
VLAN of another domain.
l The control VLAN must be included in the protected VLANs; otherwise, the RRPP ring cannot be
configured.
l The control VLAN can be mapped to other instances before the RRPP ring is created. After the RRPP
ring is created, the mapping cannot be changed unless you delete the RRPP domain.
l When the mapping between an instance and VLANs changes, the protected VLANs of the RRPP
domain also change.
l All the VLANs allowed by an RRPP interface should be configured as protected VLANs.
----End
Context
Do as follows on the master node in the RRPP domain.
Procedure
Step 1 Run:
system-view
----End
Context
NOTE
By default, STP is enabled on all interfaces of the S9700. RRPP and STP cannot be enabled on the same
interface. Therefore, before creating an RRPP ring, you need to use the stp disable command to disable
STP on the interfaces to be added to the RRPP ring.
Procedure
Step 1 Run:
system-view
In the Huawei RRPP version, the master node on a subring cannot function as an edge node or
an assistant edge node.
An S-series, an F-series or X-series board supports 8 rings, and an E-series board supports 12
rings, including major rings and subrings.
Run:
ring ring-id node-mode transit secondary-port interface-type interface-number
The system automatically sets the level of the ring where the edge node is located to 1.
NOTE
The secondary-port parameter is available only when the RRPP standard version is specified using the
rrpp working-mode command.
l For the Huawei RRPP version:
Run:
ring ring-id node-mode { edge | assistant-edge } common-port interface-type
interface-number edge-port interface-type interface-number
The edge node and assistant edge node of a subring are configured.
The common port of the edge node and assistant edge node must be on the major ring.
The system automatically sets the level of the ring where the edge node and assistant edge node
reside to 1.
----End
Context
NOTE
l The RRPP ring can be activated only when both the RRPP ring and RRPP protocol are enabled.
l RRPP and RRPP snooping cannot be configured on the same interface.
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
----End
Context
NOTE
The RRPP ring can be activated only when both the RRPP ring and RRPP protocol are enabled.
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on the master node in the RRPP domain:
Procedure
Step 1 Run:
system-view
----End
Procedure
l Run the display stp region-configuration command to check the mapping between MSTIs
and VLANs.
l Run the display rrpp brief [ domain domain-id ] command to check brief information
about an RRPP domain.
l Run the display rrpp verbose domain domain-id [ ring ring-id ] command to check
detailed information about an RRPP domain.
l Run the display rrpp statistics domain domain-id [ ring ring-id ] command to check the
statistics of packets in an RRPP domain.
----End
Example
Run the display stp region-configuration command, and you can view the mapping between
MSTIs and VLANs. The following is an example:
<Quidway> display stp region-configuration
Oper configuration
Format selector :0
Region name :00e0cd568d00
Revision level :0
Run the display rrpp brief command, and you can view information such as the node mode,
RRPP status, control VLAN, protected VLAN, and values of timers. The following is an
example:
<Quidway> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 30 sub 31
Protected VLAN : Reference Instance 10
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
-------------------------------------------------------------------------------
1 0 M GigabitEthernet1/0/2 GigabitEthernet1/0/3 No
Run the display rrpp verbose command, and you can view detailed information such as the
control VLAN, protected VLAN, timers, node mode, and port status. The following is an
example:
<Quidway> display rrpp verbose domain 1 ring 1
Domain Index : 1
Control VLAN : major 400 sub 401
Protected VLAN : Reference Instance 30
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/1 Port status: UP
Secondary port : GigabitEthernet1/0/2 Port status: BLOCKED
Run the display rrpp statistics command, and you can view the statistics of sent and received
packets. The following is an example:
<Quidway> display rrpp statistics domain 1 ring 1
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Is Active : Yes
Primary port : GigabitEthernet1/0/1
Packet LINK COMMON COMPLETE EDGE MAJOR Packet
-------------------------------------------------------------------------------
Send 2934 0 1 1 0 0 2936
Rcv 0 1 0 0 0 0 1
Secondary port: GigabitEthernet1/0/2
Packet LINK COMMON COMPLETE EDGE MAJOR Packet
-------------------------------------------------------------------------------
Send 0 0 1 0 0 0 1
Rcv 2928 1 0 0 0 0 2929
Applicable Environment
RRPP multi-instance can be applied to a more complicated networking. As shown in Figure
4-5, two RRPP sub-rings are formed after CEs are dual-homed to UPEs, and an RRPP ring is
constructed by four UPEs and one PE-AGG. The PE-AGG delivers the user data to the backbone
network.
Backbone
network
PE-AGG
UPEC
UPED
domain 1 ring 1
IPTV VLAN101-200
domain 2 ring 1
HSI VLAN601-800 UPEB
UPEA
domain 1 ring2: domain 1 ring 3:
IPTV VLAN101-200 IPTV VLAN101-200
CEA
CEC
IPTV HSI
IPTV HSI
VLAN101-200 VLAN600-800 VLAN101-200 VLAN600-800
domain 1
domain 2
In the preceding figure, the IPTV service and HSI service are respectively carried in two domains
that share the same RRPP ring. By applying RRPP multi-instance, you can realize balanced
traffic loads for both services, that is, the IPTV service is carried in domain 1, and the HSI service
is carried in domain 2.
NOTE
Pre-configuration Tasks
Before configuring RRPP multi-instance, complete the following tasks:
Data Preparation
To configure RRPP multi-instance, you need the following data.
No. Data
8 (Optional) Values of the Hello timer and Fail timer in RRPP domains
Context
Do as follows on the S9700 that you want to add to an RRPP domain with multiple instances.
Procedure
Step 1 Run:
system-view
The default algorithm is used to determine the mapping between instances and VLANs.
The vlan-mapping modulo command is used to map a VLAN to the instance with the ID being
(VLAN ID - 1)%modulo + 1. Assume that modulo is set to 16. The S9700 maps VLAN 1 to
instance 1, VLAN 2 to instance 2, VLAN 16 to instance 16, and so forth.
The control VLANs of the major ring and the subrings must be contained in the VLAN list.
A domain supports up to 49 instances, among which instance 0 is the default instance and does
not need to be created.
By default, all VLANs are mapped to instance 0.
Step 4 Run:
active region-configuration
----End
Context
Do as follows on the S9700 on which interfaces need to be added to the RRPP ring.
Procedure
Step 1 Run:
system-view
RRPP rings can be configured only on Ethernet interfaces, GE interfaces, and Eth-Trunk
interfaces.
An interface cannot be configured as an RRPP interface if the Smart Link, LDT, MUX VLAN
or MSTP is configured on the interface.
An RRPP interface needs to allow packets of control VLANs and data VLANs to pass through;
therefore, the RRPP interface must be configured as a trunk interface or hybrid interface.
Step 4 Run:
port trunk allow-pass vlan { { vlan-id1 [ to vlan-id2 ] } &<1-10> | all }
or run:
port hybrid tagged vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
IDs of the data VLANs whose packets are allowed to pass through the RRPP interface are
specified.
After you specify the control VLAN by running the control-vlan command in the RRPP domain
view and run the ring node-mode command, all the interfaces on the RRPP ring allow packets
of this control VLAN to pass through. Therefore, you need only to specify the data VLANs in
this step.
NOTE
If RRPP snooping is enabled on the VLANIF interface of a VLAN, the RRPP interfaces cannot be added
to the VLAN.
Step 5 Run:
stp disable
By default, STP is enabled on all interfaces of the S9700. Before creating an RRPP ring, disable
STP on the interfaces that need to be added to the RRPP ring.
----End
Context
Do as follows on all switches in the RRPP domain:
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on all S9700s in the RRPP domain.
Procedure
Step 1 Run:
system-view
When configure the list of protected VLANs, pay attention to the following points:
l Protected VLANs must be configured before you configure an RRPP ring.
l You can delete or change existing protected VLANs before configuring an RRPP ring. The protected
VLANs cannot be changed after the RRPP ring is configured.
l In the same physical topology, the control VLAN of a domain cannot be configured as a protected
VLAN of another domain.
l The control VLAN must be included in the protected VLANs; otherwise, the RRPP ring cannot be
configured.
l The control VLAN can be mapped to other instances before the RRPP ring is created. After the RRPP
ring is created, the mapping cannot be changed unless you delete the RRPP domain.
l When the mapping between an instance and VLANs changes, the protected VLANs of the RRPP
domain also change.
l All the VLANs allowed by an RRPP interface should be configured as protected VLANs.
----End
Context
Do as follows on all switches in the RRPP domain:
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
Step 3 Run:
control-vlan vlan-id
The control VLAN specified by vlan-id and the sub-control VLAN specified by vlan-id+1 must
be uncreated and not used in port trunk, mapping, or stacking mode.
An RRPP domain is configured with two control VLANs: the primary control VLAN and the
sub control VLAN. You need to specify only the primary control VLAN. The VLAN whose ID
is one more than the ID of the primary control VLAN becomes the sub control VLAN.
After configuring the control VLAN, you cannot directly modify it. You can only delete the
control VLAN by deleting the domain, and then reconfigure the control VLAN. The sub-control
VLAN is also deleted when you delete the domain.
NOTE
----End
Context
NOTE
By default, STP is enabled on all interfaces of the S9700. RRPP and STP cannot be enabled on the same
interface. Therefore, before creating an RRPP ring, you need to use the stp disable command to disable
STP on the interfaces to be added to the RRPP ring.
Procedure
Step 1 Run:
system-view
NOTE
The secondary-port parameter is available only when the RRPP standard version is specified using the
rrpp working-mode command.
l For the Huawei RRPP version:
Run:
ring ring-id node-mode { edge | assistant-edge } common-port interface-type
interface-number edge-port interface-type interface-number
The edge node and assistant edge node of a subring are configured.
The common port of the edge node and assistant edge node must be on the major ring.
The system automatically sets the level of the ring where the edge node and assistant edge node
reside to 1.
----End
Context
NOTE
l The RRPP ring can be activated only when both the RRPP ring and RRPP protocol are enabled.
l RRPP and RRPP snooping cannot be configured on the same interface.
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
Step 3 Run:
ring ring-id enable
----End
Context
NOTE
The RRPP ring can be activated only when both the RRPP ring and RRPP protocol are enabled.
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp enable
----End
Context
Do as follows on the edge node or assistant edge node:
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp ring-group ring-group-id
The ring group can be only created on edge nodes or assistant edge nodes.
In an RRPP ring group, the nodes of all sub-rings must have the same type. That is, all of them
must be all edge nodes or assistant edge nodes.
Step 3 Run:
domain domain-id ring { ring-id1 [ to ring-id2 ] } &<1-10>
The edge nodes of sub-rings in a ring group are the same device. Similarly, the assistant edge
nodes of sub-rings in a ring group are the same device.
l To add activated sub-rings in the ring group, configure relevant commands firstly on the
assistant edge node and then on the edge node.
l To delete activated sub-rings from the ring group, configure relevant commands firstly on
the edge node and then on the assistant edge node.
----End
Context
The delay can take effect only when it is configured on a master node.
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp linkup-delay-timer linkup-delay-timer-value
The value of linkup-delay-timer-value must be smaller than or equal to the value of the Fail timer
minus 2 times HELLO timer in any domain.
----End
4.4.12 (Optional) Setting the Hello Timer and Fail Timer of an RRPP
Domain
Two timers, that is, the Hello timer and the Fail timer are used when master nodes are sending
and receiving RRPP protocol packets. The Hello timer is used when primary ports are sending
Hello packets. The Fail timer is used when secondary ports are receiving the Hello packets sent
by the local node.
Context
Do as follows on the master node in the RRPP domain:
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
Step 3 Run:
timer hello-timer hello-value fail-timer fail-value
The value of the Fail timer is equal to or more than three times the value of the Hello timer.
The value of the Edge-hello timer defaults to half the value of the Hello timer of the master node
on the major ring.
Set consistent Hello timers and Fail timers on all the nodes in the same RRPP ring domain;
otherwise, the edge ports of the edge nodes might be unstable.
----End
Procedure
l Run the display stp region-configuration command to check the mapping between MSTIs
and VLANs.
l Run the display rrpp brief [ domain domain-id ] command to check brief information
about an RRPP domain.
l Run the display rrpp verbose domain domain-id [ ring ring-id ] command to check
detailed information about an RRPP domain.
l Run the display rrpp statistics domain domain-id [ ring ring-id ] command to check the
statistics of packets in an RRPP domain.
----End
Example
Run the display stp region-configuration command, and you can view the mapping between
MSTIs and VLANs. The following is an example:
<Quidway> display stp region-configuration
Oper configuration
Format selector :0
Region name :00e0cd568d00
Revision level :0
Run the display rrpp brief command, and you can view information such as the node mode,
RRPP status, control VLAN, protected VLAN, and values of timers. The following is an
example:
<Quidway> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 30 sub 31
Protected VLAN : Reference Instance 10
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
-------------------------------------------------------------------------------
1 0 M GigabitEthernet1/0/2 GigabitEthernet1/0/3 No
Run the display rrpp verbose command, and you can view detailed information such as the
control VLAN, protected VLAN, timers, node mode, and port status. The following is an
example:
Run the display rrpp statistics command, and you can view the statistics of sent and received
packets. The following is an example:
<Quidway> display rrpp statistics domain 1 ring 1
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Is Active : Yes
Primary port : GigabitEthernet1/0/1
Packet LINK COMMON COMPLETE EDGE MAJOR Packet
-------------------------------------------------------------------------------
Send 2934 0 1 1 0 0 2936
Rcv 0 1 0 0 0 0 1
Secondary port: GigabitEthernet1/0/2
Packet LINK COMMON COMPLETE EDGE MAJOR Packet
-------------------------------------------------------------------------------
Send 0 0 1 0 0 0 1
Rcv 2928 1 0 0 0 0 2929
Context
CAUTION
RRPP statistics cannot be restored once cleared. Therefore, confirm the action before you use
the command.
To clear the RRPP statistics, run the following reset command in the user view:
Procedure
Step 1 Run the reset rrpp statistics domain domain-id [ ring ring-id ] command in the user view to
clear the statistics of RRPP.
----End
Context
CAUTION
Debugging affects the performance of the system. Therefore, after debugging, run the undo
debugging all command to disable it immediately.
When there is an RRPP running fault, run the following debugging command in the user view
to view the debugging information. The debugging information helps to locate and analyze the
fault.
Procedure
Step 1 Run the debugging rrpp [ domain domain-id [ ring ring-id ] ] { error | event | packet | all }
command in the user view to debug RRPP.
----End
GE2/0/2
GE2/0/1 GE2/0/1
Ring 1
GE2/0/2 GE2/0/2
SwitchC
GE2/0/1
SwitchA
Primary Port
Secondary port
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Map instance 1 to VLANs 100 to 300.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] stp region-configuration
[SwitchA-mst-region] instance 1 vlan 20 21 100 to 300
[SwitchA-mst-region] active region-configuration
[SwitchA-mst-region] quit
The configurations of SwitchB and SwitchC are similar to the configuration of SwitchA. The
detailed configurations are omitted here.
# On the master node of ring 1, namely SwitchA, create RRPP domain 1 and configure VLAN
20 as the main control VLAN.
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] control-vlan 20
[SwitchA-rrpp-domain-region1] quit
# On the transit node of ring 1, namely SwitchB, create RRPP domain 1 and configure VLAN
20 as the main control VLAN.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] rrpp domain 1
[SwitchB-rrpp-domain-region1] control-vlan 20
[SwitchB-rrpp-domain-region1] quit
# On the master node of ring 1, namely SwitchC, create RRPP domain 1 and configure VLAN
20 as the main control VLAN.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] control-vlan 20
[SwitchC-rrpp-domain-region1] quit
Step 3 Configure the interfaces to be added to the RRPP ring as trunk interfaces, allow VLANs 100 to
300 on the interfaces, and disable STP on the interfaces.
# Configure SwitchA.
[SwitchA] interface gigabitethernet 2/0/1
[SwitchA-GigabitEthernet2/0/1] port link-type trunk
[SwitchA-GigabitEthernet2/0/1] port trunk allow-pass vlan 100 to 300
[SwitchA-GigabitEthernet2/0/1] stp disable
[SwitchA-GigabitEthernet2/0/1] quit
[SwitchA] interface gigabitethernet 2/0/2
[SwitchA-GigabitEthernet2/0/2] port link-type trunk
[SwitchA-GigabitEthernet2/0/2] port trunk allow-pass vlan 100 to 300
[SwitchA-GigabitEthernet2/0/2] stp disable
[SwitchA-GigabitEthernet2/0/2] quit
# Configure SwitchB.
[SwitchB] interface gigabitethernet 2/0/1
[SwitchB-GigabitEthernet2/0/1] port link-type trunk
[SwitchB-GigabitEthernet2/0/1] port trunk allow-pass vlan 100 to 300
[SwitchB-GigabitEthernet2/0/1] stp disable
[SwitchB-GigabitEthernet2/0/1] quit
[SwitchB] interface gigabitethernet 2/0/2
[SwitchB-GigabitEthernet2/0/2] port link-type trunk
[SwitchB-GigabitEthernet2/0/2] port trunk allow-pass vlan 100 to 300
[SwitchB-GigabitEthernet2/0/2] stp disable
[SwitchB-GigabitEthernet2/0/2] quit
# Configure SwitchC.
[SwitchC] interface gigabitethernet 2/0/1
[SwitchC-GigabitEthernet2/0/1] port link-type trunk
[SwitchC-GigabitEthernet2/0/1] port trunk allow-pass vlan 100 to 300
[SwitchC-GigabitEthernet2/0/1] stp disable
[SwitchC-GigabitEthernet2/0/1] quit
[SwitchC] interface gigabitethernet 2/0/2
[SwitchC-GigabitEthernet2/0/2] port link-type trunk
[SwitchC-GigabitEthernet2/0/2] port trunk allow-pass vlan 100 to 300
[SwitchC-GigabitEthernet2/0/2] stp disable
[SwitchC-GigabitEthernet2/0/2] quit
# Configure the protection VLAN on SwitchB and configure SwitchB as the transit node of
RRPP ring 1 and specify the primary interface and secondary interface.
[SwitchB] rrpp domain 1
[SwitchB-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchB-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 2/0/1 secondary-port gigabitethernet 2/0/2 level 0
[SwitchB-rrpp-domain-region1] ring 1 enable
[SwitchB-rrpp-domain-region1] quit
# Configure the protection VLAN on SwitchC and configure SwitchC as the transit node of
RRPP ring 1 and specify the primary interface and secondary interface.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchC-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 2/0/1 secondary-port gigabitethernet 2/0/2 level 0
[SwitchC-rrpp-domain-region1] ring 1 enable
[SwitchC-rrpp-domain-region1] quit
After configuring an RRPP ring, enable RRPP on each node on the ring so that the RRPP ring
can be activated.
After the configurations are complete and network become stable, run the following commands
to verify the configuration. Take SwitchA for example.
l Run the display rrpp brief command on SwitchA. The following information is displayed:
<SwitchA> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 20 sub 21
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
---------------------------------------------------------------------------
1 0 M GigabitEthernet2/0/1 GigabitEthernet2/0/2 Yes
You can find that RRPP is enabled on SwitchA. The main control VLAN of domain 1 is
VLAN 20 and the sub control VLAN is VLAN 21. SwitchA is the master node of ring 1. GE
2/0/1 is the primary interface, and GE 2/0/2 is the secondary interface.
l Run the display rrpp verbosedomain command on SwitchA. Detailed information about
RRPP domain 1 is displayed as follows:
<SwitchA> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 20 sub 21
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet2/0/1 Port status: UP
Secondary port : GigabitEthernet2/0/2 Port status: BLOCKED
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 20 to 21 100 to 300
#
rrpp enable
#
stp region-
configuration
instance 1 vlan 20 to 21 100 to
300
active region-
configuration
#
rrpp domain 1
control-vlan 20
protected-vlan reference-instance 1
ring 1 node-mode master primary-port GigabitEthernet 2/0/1 secondary-port
GigabitEthernet 2/0/2 level 0
ring 1 enable
#
interface GigabitEthernet2/0/1
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
interface GigabitEthernet2/0/2
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
Networking Requirements
As shown in Figure 4-7, Switch A, Switch B, Switch C, and Switch D support the RRPP
function. Switch A, Switch B, and Switch D are on ring 1 of domain 1, which is the major ring.
Switch A, Switch C, and Switch D are on ring 2 of domain 1, which is the subring. Switch A
and Switch D are edge transit nodes on ring 2 of domain 1.
The main control VLAN ID is 10. The RRPP rings transmit data of VLAN 2 to VLAN 9.
Figure 4-7 Networking diagram of crossed RRPP rings with a single instance (GB version)
SwitchC
GE1/0/2 GE1/0/3
sub- ring
GE1/0/1
SwitchA
GE1/0/1 GE1/0/2
GE1/0/2
GE1/0/3 SwitchD
GE1/0/1
SwitchB GE2/0/1 major ring
GE2/0/2
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure ring 1 (major ring) of domain 1 on Switch A, Switch B, and Switch C. Configure
VLAN 10 as the main control VLAN. Add the interfaces on the major ring and subring to
VLAN 2 to VLAN 9 so that the interfaces allow service packets of these VLANs to pass
through.
2. Configure ring 2 (subring) of domain 1 on Switch A, Switch B, and Switch D.
3. Configure Switch B as the master node of the major ring and configure Switch A and Switch
D as transit nodes of the major ring.
4. Configure Switch B as the master node of the major ring and configure Switch A and Switch
D as edge transit nodes of the major ring.
Data Preparation
To complete the configuration, you need the following data:
l Numbers of the interfaces to be added to the RRPP rings
l Control VLAN IDs and data VLAN IDs
Procedure
Step 1 Configure Switch B as the master node of the major ring.
# Create data VLANs 2 to 9 on Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan batch 2 to 9
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
[SwitchB] stp region-configuration
[SwitchB-mst-region] instance 1 vlan 2 to 11
[SwitchB-mst-region] active region-configuration
[SwitchB-mst-region] quit
# On Switch B, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchB] rrpp enable
[SwitchB] rrpp domain 1
[SwitchB-rrpp-domain-region1] control-vlan 10
[SwitchB-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchB-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchB] interface gigabitethernet2/0/1
[SwitchB-GigabitEthernet2/0/1] port link-type trunk
[SwitchB-GigabitEthernet2/0/1] port trunk allow-pass vlan 2 to 9
[SwitchB-GigabitEthernet2/0/1] stp disable
[SwitchB-GigabitEthernet2/0/1] quit
[SwitchB] interface gigabitethernet2/0/2
[SwitchB-GigabitEthernet2/0/2] port link-type trunk
[SwitchB-GigabitEthernet2/0/2] port trunk allow-pass vlan 2 to 9
[SwitchB-GigabitEthernet2/0/2] stp disable
[SwitchB-GigabitEthernet2/0/2] quit
# Configure the primary interface and secondary interface of the master node on the major ring.
[SwitchB] rrpp domain 1
[SwitchB-rrpp-domain-region1] ring 1 node-mode master primary-port gigabitethernet
2/0/1 secondary-port gigabitethernet 2/0/2 level 0
[SwitchB-rrpp-domain-region1] ring 1 enable
[SwitchB-rrpp-domain-region1] quit
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
[SwitchC] stp region-configuration
[SwitchC-mst-region] instance 1 vlan 2 to 11
[SwitchC-mst-region] active region-configuration
[SwitchC-mst-region] quit
# On SwitchC, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchC] rrpp enable
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] control-vlan 10
[SwitchC-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchC-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchC] interface gigabitethernet1/0/1
[SwitchC-GigabitEthernet1/0/1] port link-type trunk
[SwitchC-GigabitEthernet1/0/1] port trunk allow-pass vlan 2 to 9
[SwitchC-GigabitEthernet1/0/1] stp disable
[SwitchC-GigabitEthernet1/0/1] quit
[SwitchC] interface gigabitethernet1/0/2
[SwitchC-GigabitEthernet1/0/2] port link-type trunk
[SwitchC-GigabitEthernet1/0/2] port trunk allow-pass vlan 2 to 9
[SwitchC-GigabitEthernet1/0/2] stp disable
[SwitchC-GigabitEthernet1/0/2] quit
# Configure the primary interface and secondary interface of the master node on the RRPP
subring.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] ring 2 node-mode master primary-port gigabitethernet
1/0/1 secondary-port gigabitethernet 1/0/2 level 1
[SwitchC-rrpp-domain-region1] ring 2 enable
[SwitchC-rrpp-domain-region1] quit
Step 3 Configure Switch A as the transit node of the major ring and the edge node of the subring.
# Create data VLANs 2 to 9 on Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan batch 2 to 9
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
[SwitchA] stp region-configuration
[SwitchA-mst-region] instance 1 vlan 2 to 11
[SwitchA-mst-region] active region-configuration
[SwitchA-mst-region] quit
# On SwitchA, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchA] rrpp enable
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] control-vlan 10
[SwitchA-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchA-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchA] interface gigabitethernet1/0/1
[SwitchA-GigabitEthernet1/0/1] port link-type trunk
[SwitchA-GigabitEthernet1/0/1] port trunk allow-pass vlan 2 to 9
[SwitchA-GigabitEthernet1/0/1] stp disable
[SwitchA-GigabitEthernet1/0/1] quit
[SwitchA] interface gigabitethernet1/0/2
[SwitchA-GigabitEthernet1/0/2] port link-type trunk
[SwitchA-GigabitEthernet1/0/2] port trunk allow-pass vlan 2 to 9
[SwitchA-GigabitEthernet1/0/2] stp disable
[SwitchA-GigabitEthernet1/0/2] quit
[SwitchA] interface gigabitethernet1/0/3
# Configure the primary interface and secondary interface of the transit node on the major ring.
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 1/0/2 secondary-port gigabitethernet 1/0/1 level 0
[SwitchA-rrpp-domain-region1] ring 1 enable
[SwitchA-rrpp-domain-region1] quit
# Configure the edge interface of the edge transit node on the sub ring.
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] ring 2 node-mode transit secondary-port
gigabitethernet 1/0/3
[SwitchA-rrpp-domain-region1] ring 2 enable
[SwitchA-rrpp-domain-region1] quit
Step 4 Configure Switch D as the transit node of the major ring and the edge node of the subring.
# Create data VLANs 2 to 9 on Switch D.
<Quidway> system-view
[Quidway] sysname SwitchD
[SwitchD] vlan batch 2 to 9
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
[SwitchD] stp region-configuration
[SwitchD-mst-region] instance 1 vlan 2 to 11
[SwitchD-mst-region] active region-configuration
[SwitchD-mst-region] quit
# On Switch D, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchD] rrpp enable
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] control-vlan 10
[SwitchD-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchD-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchD] interface gigabitethernet1/0/1
[SwitchD-GigabitEthernet1/0/1] port link-type trunk
[SwitchD-GigabitEthernet1/0/1] port trunk allow-pass vlan 2 to 9
[SwitchD-GigabitEthernet1/0/1] stp disable
[SwitchD-GigabitEthernet1/0/1] quit
[SwitchD] interface gigabitethernet1/0/2
[SwitchD-GigabitEthernet1/0/2] port link-type trunk
[SwitchD-GigabitEthernet1/0/2] port trunk allow-pass vlan 2 to 9
[SwitchD-GigabitEthernet1/0/2] stp disable
[SwitchD-GigabitEthernet1/0/2] quit
[SwitchD] interface gigabitethernet1/0/3
[SwitchD-GigabitEthernet1/0/3] port link-type trunk
[SwitchD-GigabitEthernet1/0/3] port trunk allow-pass vlan 2 to 9
[SwitchD-GigabitEthernet1/0/3] stp disable
[SwitchD-GigabitEthernet1/0/3] quit
# Configure the primary interface and secondary interface of the transit node on the major ring.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 1/0/2 secondary-port gigabitethernet 1/0/1 level 0
[SwitchD-rrpp-domain-region1] ring 1 enable
[SwitchD-rrpp-domain-region1] quit
# Configure the edge interface of the edge transit node on the sub ring.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] ring 2 node-mode transit secondary-port
gigabitethernet 1/0/3
[SwitchD-rrpp-domain-region1] ring 2 enable
[SwitchD-rrpp-domain-region1] quit
After the configurations are complete and network become stable, run the following commands
to verify the configuration:
l Run the display rrpp brief command on Switch B. The following information is displayed:
<SwitchB> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , EM - Edge Master, ET - Edge Transit
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
The output information indicates that RRPP is enabled on Switch B. The main control VLAN
is VLAN 10, and the sub control VLAN is VLAN 11. Switch B is the master node on the
major ring, with GE 2/0/1 as the primary interface and GE 2/0/2 as the secondary interface.
l Run the display rrpp verbosedomain command on Switch B. The following information
is displayed:
<SwitchB> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet2/0/1 Port status: UP
Secondary port: GigabitEthernet2/0/2 Port status: BLOCKED
You can find that the ring is in the Complete state, and the secondary interface of the master
node is blocked.
l Run the display rrpp brief command on Switch C. The following information is displayed:
<SwitchC> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , EM - Edge Master, ET - Edge Transit
The output information indicates that RRPP is enabled on Switch C. The main control VLAN
is VLAN 10, and the sub control VLAN is VLAN 11. Switch C is the master node on the
subring, with GE 1/0/1 as the primary interface and GE 1/0/2 as the secondary interface.
l Run the display rrpp verbosedomain command on Switch C. The following information
is displayed:
<SwitchC> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 2
Ring Level : 1
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/1 Port status: UP
Secondary port: GigabitEthernet1/0/2 Port status: BLOCKED
You can find that the subring is in Complete state, and the secondary interface of the master
node on the subring is blocked.
l Run the display rrpp brief command on Switch A. The following information is displayed:
<SwitchA> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , EM - Edge Master, ET - Edge Transit
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary Secondary/Edge Is
ID Level Mode Port Port Enabled
-------------------------------------------------------------------------
1 0 T GigabitEthernet1/0/2 GigabitEthernet1/0/1 Yes
2 1 ET GigabitEthernet1/0/2 GigabitEthernet1/0/3 Yes
GigabitEthernet1/0/1
You can find that RRPP is enabled on Switch A. The main control VLAN is VLAN 10, and
the sub control VLAN is VLAN 11. Switch A is the transit node of the major ring, with GE
1/0/2 as the primary interface and GE 1/0/1 as the secondary interface.
Switch A is also an edge transit node on ring 2, with GE 1/0/3 as the edge interface.
l Run the display rrpp verbosedomain command on Switch A. The following information
is displayed:
<SwitchA> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/2 Port status: UP
Secondary port: GigabitEthernet1/0/1 Port status: UP
RRPP Ring : 2
Ring Level : 1
Node Mode : Edge Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Secondary port: GigabitEthernet1/0/3 Port status: UP
l Run the display rrpp brief command on Switch D. The following information is displayed:
<SwitchD> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , EM - Edge Master, ET - Edge Transit
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary Secondary/Edge Is
ID Level Mode Port Port Enabled
-------------------------------------------------------------------------
1 0 T GigabitEthernet1/0/2 GigabitEthernet1/0/1 Yes
2 1 ET GigabitEthernet1/0/2 GigabitEthernet1/0/3 Yes
GigabitEthernet1/0/1
You can find that RRPP is enabled on Switch D. The main control VLAN is VLAN 10, and
the sub control VLAN is VLAN 11. Switch D is the transit node of the major ring, with GE
1/0/2 as the primary interface and GE 1/0/1 as the secondary interface. Switch D is also the
edge transit node of the major ring, with GE 1/0/3 as the edge interface.
l Run the display rrpp verbosedomain command on Switch D. The following information
is displayed:
<SwitchD> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/2 Port status: UP
Secondary port: GigabitEthernet1/0/1 Port status: UP
RRPP Ring : 2
Ring Level : 1
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 1 to 11
#
rrpp enable
rrpp working-mode GB
#
stp region-
configuration
instance 1 vlan 2 to
11
active region-
configuration
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port Gigabitethernet1/0/2 secondary-port
Gigabitethernet1/0/1 level 0
ring 1 enable
ring 2 node-mode transit secondary-port Gigabitethernet1/0/3
ring 2 enable
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet1/0/3
port link-type trunk
port trunk allow-pass vlan 2 to 9 11
stp disable
#
return
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
ring 1 node-mode master primary-port Gigabitethernet2/0/1 secondary-port
Gigabitethernet2/0/2 level 0
ring 1 enable
#
interface GigabitEthernet2/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet2/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
return
l Configuration file of the Switch C
#
sysname SwitchC
#
vlan batch 1 to 11
#
rrpp enable
rrpp working-mode GB
#
stp region-
configuration
instance 1 vlan 2 to
11
active region-
configuration
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
ring 2 node-mode master primary-port GigabitEthernet1/0/1 secondary-port
GigabitEthernet1/0/2 level 1
ring 2 enable
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 9 11
stp disable
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 9 11
stp disable
#
return
l Configuration file of Switch D
#
sysname SwitchD
#
vlan batch 1 to 11
#
rrpp enable
rrpp working-mode GB
#
stp region-
configuration
instance 1 vlan 2 to
11
active region-
configuration
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/2 secondary-port
GigabitEthernet1/0/1 level 0
ring 1 enable
ring 2 node-mode transit secondary-port GigabitEthernet1/0/3
ring 2 enable
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet1/0/3
port link-type trunk
port trunk allow-pass vlan 2 to 9 11
stp disable
#
return
Networking Requirements
As shown in Figure 4-8, SwitchA, SwitchB, SwitchC, and SwitchD support the RRPP function.
SwitchA, SwitchB, and SwitchD are on ring 1 of domain 1, which is the major ring. SwitchA,
SwitchC, and SwitchD are on ring 2 of domain 1, which is the subring. SwitchA is the edge node
on ring 2 of domain 1, and SwitchD is the assistant edge node on ring 2 of domain 1.
The main control VLAN ID is 10. The RRPP rings transmit data of VLAN 2 to VLAN 9.
Figure 4-8 Networking diagram of crossed RRPP rings with a single instance (Huawei version)
SwitchC
GE1/0/2 GE1/0/3
sub- ring
GE1/0/1
SwitchA
GE1/0/1 GE1/0/2
GE1/0/2
GE1/0/3 SwitchD
GE1/0/1
SwitchB GE2/0/1 major ring
GE2/0/2
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure ring 1 (major ring) of domain 1 on SwitchA, SwitchB, and SwitchC. Configure
VLAN 10 as the main control VLAN. Add the interfaces on the major ring and subring to
VLAN 2 to VLAN 9 so that the interfaces allow service packets of these VLANs to pass
through.
2. Configure ring 2 (subring) of domain 1on SwitchA, SwitchB, and SwitchD.
3. Configure SwitchB as the master node of the major ring and configure SwitchA and
SwitchD as transit nodes of the major ring.
4. Configure SwitchC as the master node of the subring; configure SwitchA as the edge node
of the subring; configure SwitchD as the assistant edge node of the subring.
Data Preparation
To complete the configuration, you need the following data:
l Numbers of the interfaces to be added to the RRPP rings
l Control VLAN IDs and data VLAN IDs
Procedure
Step 1 Configure SwitchB as the master node of the major ring.
# Create data VLANs 2 to 9 on SwitchB.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan batch 2 to 11
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
[SwitchB] stp region-configuration
[SwitchB-mst-region] instance 1 vlan 2 to 11
[SwitchB-mst-region] quit
# On SwitchB, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchB] rrpp enable
[SwitchB] rrpp domain 1
[SwitchB-rrpp-domain-region1] control-vlan 10
[SwitchB-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchB-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchB] interface gigabitethernet 2/0/1
[SwitchB-GigabitEthernet2/0/1] port link-type trunk
[SwitchB-GigabitEthernet2/0/1] port trunk allow-pass vlan 2 to 9
[SwitchB-GigabitEthernet2/0/1] stp disable
[SwitchB-GigabitEthernet2/0/1] quit
[SwitchB] interface gigabitethernet 2/0/2
[SwitchB-GigabitEthernet2/0/2] port link-type trunk
[SwitchB-GigabitEthernet2/0/2] port trunk allow-pass vlan 2 to 9
[SwitchB-GigabitEthernet2/0/2] stp disable
[SwitchB-GigabitEthernet2/0/2] quit
# Configure the primary interface and secondary interface of the master node on the RRPP major
ring.
[SwitchB] rrpp domain 1
[SwitchB-rrpp-domain-region1] ring 1 node-mode master primary-port gigabitethernet
2/0/1 secondary-port gigabitethernet 2/0/2 level 0
[SwitchB-rrpp-domain-region1] ring 1 enable
[SwitchB-rrpp-domain-region1] quit
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
[SwitchC] stp region-configuration
[SwitchC-mst-region] instance 1 vlan 2 to 11
[SwitchC-mst-region] quit
# On SwitchC, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchC] rrpp enable
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] control-vlan 10
[SwitchC-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchC-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchC] interface gigabitethernet 1/0/1
[SwitchC-GigabitEthernet1/0/1] port link-type trunk
[SwitchC-GigabitEthernet1/0/1] port trunk allow-pass vlan 2 to 9
[SwitchC-GigabitEthernet1/0/1] stp disable
[SwitchC-GigabitEthernet1/0/1] quit
[SwitchC] interface gigabitethernet 1/0/2
[SwitchC-GigabitEthernet1/0/2] port link-type trunk
[SwitchC-GigabitEthernet1/0/2] port trunk allow-pass vlan 2 to 9
[SwitchC-GigabitEthernet1/0/2] stp disable
[SwitchC-GigabitEthernet1/0/2] quit
# Configure the primary interface and secondary interface of the master node on the RRPP
subring.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] ring 2 node-mode master primary-port gigabitethernet
1/0/1 secondary-port gigabitethernet 1/0/2 level 1
[SwitchC-rrpp-domain-region1] ring 2 enable
[SwitchC-rrpp-domain-region1] quit
Step 3 Configure SwitchA as the transit node of the major ring and the edge transit node of the subring.
# Create data VLANs 2 to 9 on SwitchA.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan batch 2 to 11
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
# On SwitchA, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchA] rrpp enable
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] control-vlan 10
[SwitchA-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchA-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchA] interface gigabitethernet 1/0/1
[SwitchA-GigabitEthernet1/0/1] port link-type trunk
[SwitchA-GigabitEthernet1/0/1] port trunk allow-pass vlan 2 to 9
[SwitchA-GigabitEthernet1/0/1] stp disable
[SwitchA-GigabitEthernet1/0/1] quit
[SwitchA] interface gigabitethernet 1/0/2
[SwitchA-GigabitEthernet1/0/2] port link-type trunk
[SwitchA-GigabitEthernet1/0/2] port trunk allow-pass vlan 2 to 9
[SwitchA-GigabitEthernet1/0/2] stp disable
[SwitchA-GigabitEthernet1/0/2] quit
[SwitchA] interface gigabitethernet 1/0/3
[SwitchA-GigabitEthernet1/0/3] port link-type trunk
[SwitchA-GigabitEthernet1/0/3] port trunk allow-pass vlan 2 to 9
[SwitchA-GigabitEthernet1/0/3] stp disable
[SwitchA-GigabitEthernet1/0/3] quit
# Configure the primary interface and secondary interface of the transit node on the RRPP major
ring.
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 1/0/2 secondary-port gigabitethernet 1/0/1 level 0
[SwitchA-rrpp-domain-region1] ring 1 enable
[SwitchA-rrpp-domain-region1] quit
# Configure the common interface and edge interface of the edge transit node on the subring.
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] ring 2 node-mode edge common-port gigabitethernet
1/0/2 edge-port gigabitethernet 1/0/3
[SwitchA-rrpp-domain-region1] ring 2 enable
[SwitchA-rrpp-domain-region1] quit
Step 4 Configure SwitchD as the transit node of the major ring and the assistant edge node of the subring.
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
[SwitchD] stp region-configuration
[SwitchD-mst-region] instance 1 vlan 2 to 11
[SwitchD-mst-region] quit
# On SwitchD, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchD] interface gigabitethernet 1/0/1
[SwitchD-GigabitEthernet1/0/1] port link-type trunk
[SwitchD-GigabitEthernet1/0/1] port trunk allow-pass vlan 2 to 9
[SwitchD-GigabitEthernet1/0/1] stp disable
[SwitchD-GigabitEthernet1/0/1] quit
[SwitchD] interface gigabitethernet 1/0/2
[SwitchD-GigabitEthernet1/0/2] port link-type trunk
[SwitchD-GigabitEthernet1/0/2] port trunk allow-pass vlan 2 to 9
[SwitchD-GigabitEthernet1/0/2] stp disable
[SwitchD-GigabitEthernet1/0/2] quit
[SwitchD] interface gigabitethernet 1/0/3
[SwitchD-GigabitEthernet1/0/3] port link-type trunk
[SwitchD-GigabitEthernet1/0/3] port trunk allow-pass vlan 2 to 9
[SwitchD-GigabitEthernet1/0/3] stp disable
[SwitchD-GigabitEthernet1/0/3] quit
# Configure the primary interface and secondary interface of the transit node on the RRPP major
ring.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 1/0/2 secondary-port gigabitethernet 1/0/1 level 0
[SwitchD-rrpp-domain-region1] ring 1 enable
[SwitchD-rrpp-domain-region1] quit
# Configure the common interface and edge interface of the assistant edge node on the RRPP
subring.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] ring 2 node-mode assistant-edge common-port
gigabitethernet 1/0/2 edge-port gigabitethernet 1/0/3
[SwitchD-rrpp-domain-region1] ring 2 enable
[SwitchD-rrpp-domain-region1] quit
After the configurations are complete and network become stable, run the following commands
to verify the configuration:
l Run the display rrpp brief command on SwitchB. The following information is displayed:
<SwitchB> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
------------------------------------------------------------------------------
1 0 M GigabitEthernet2/0/1 GigabitEthernet2/0/2 Yes
You can find that RRPP is enabled on SwitchB. The main control VLAN is VLAN 10, and
the sub control VLAN is VLAN 11.SwitchB is the master node of the major ring, with GE
2/0/1 as the primary interface and GE 2/0/2 as the secondary interface.
l Run the display rrpp verbose domain command on SwitchB. The following information
is displayed:
<SwitchB> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet2/0/1 Port status: UP
Secondary port: GigabitEthernet2/0/2 Port status: BLOCKED
You can find that the ring is in Complete state, and the secondary interface of the master
node is blocked.
l Run the display rrpp brief command on SwitchC. The following information is displayed:
<SwitchC> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
The output information indicates that RRPP is enabled on SwitchC. The main control VLAN
is VLAN 10, and the sub control VLAN is VLAN 11. SwitchC is the master node on the
subring, with GE 1/0/1 as the primary interface and GE 1/0/2 as the secondary interface.
l Run the display rrpp verbose domain command on SwitchC. The following information
is displayed:
<SwitchC> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 2
Ring Level : 1
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/1 Port status: UP
Secondary port: GigabitEthernet1/0/2 Port status: BLOCKED
You can find that the subring is in Complete state, and the secondary interface of the master
node on the subring is blocked.
l Run the display rrpp brief command on SwitchA. The following information is displayed:
<SwitchA> display rrpp brief
Abbreviations for Switch Node Mode :
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
-------------------------------------------------------------------------
1 0 T GigabitEthernet1/0/2 GigabitEthernet1/0/1 Yes
2 1 E GigabitEthernet1/0/2 GigabitEthernet1/0/3 Yes
You can find that RRPP is enabled on SwitchA. The main control VLAN is VLAN 10, and
the sub control VLAN is VLAN 11. SwitchA is the transit node of the major ring, with GE
1/0/2 as the primary interface and GE 1/0/1 as the secondary interface.
SwitchA is also an edge of the subring, with GE 1/0/2 as the common interface and GE 1/0/3
as the edge interface.
l Run the display rrpp verbose domain command on SwitchA. The following information
is displayed:
<SwitchA> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/2 Port status: UP
Secondary port: GigabitEthernet1/0/1 Port status: UP
RRPP Ring : 2
Ring Level : 1
Node Mode : Edge
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Common port : GigabitEthernet1/0/2 Port status: UP
Edge port : GigabitEthernet1/0/3 Port status: UP
l Run the display rrpp brief command on SwitchD. The following information is displayed:
<SwitchD> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
-------------------------------------------------------------------------
1 0 T GigabitEthernet1/0/2 GigabitEthernet1/0/1 Yes
2 1 A GigabitEthernet1/0/2 GigabitEthernet1/0/3 Yes
You can find that RRPP is enabled on SwitchD. The main control VLAN is VLAN 10, and
the sub control VLAN is VLAN 11. SwitchD is the transit node of the major ring, with GE
1/0/2 as the primary interface and GE 1/0/1 as the secondary interface. SwitchD is also the
assistant edge node of the major ring, with GE 1/0/2 as the common interface and GE 1/0/3
as the edge interface.
l Run the display rrpp verbose domain command on SwitchD. The following information
is displayed:
<SwitchD> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/2 Port status: UP
Secondary port: GigabitEthernet1/0/1 Port status: UP
RRPP Ring : 2
Ring Level : 1
Node Mode : Assistant-edge
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Common port : GigabitEthernet1/0/2 Port status: UP
Edge port : GigabitEthernet1/0/3 Port status: UP
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 2 to 11
#
rrpp enable
#
stp region-
configuration
instance 1 vlan 2 to
11
active region-
configuration
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port Gigabitethernet1/0/2 secondary-port
Gigabitethernet1/0/1 level 0
ring 1 enable
ring 2 node-mode edge common-port Gigabitethernet1/0/2 edge-port
Gigabitethernet1/0/3
ring 2 enable
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet1/0/2
port link-type trunk
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 9 11
stp disable
#
return
Networking Requirements
As shown in Figure 4-9, SwitchA, SwitchB, SwitchC, SwitchD, and SwitchE support the RRPP
function. SwitchA, SwitchB, and SwitchC are on ring 2 of domain 2, configure VLAN 20 as the
main control VLAN. SwitchC, SwitchD, and SwitchE are on ring 1 of domain 1, configure
VLAN 10 as the main control VLAN. SwitchC is the tangent point of the two rings.
Domain 2 Domain 1
Configuration Roadmap
The configuration roadmap is as follows:
1. Create an instance and add the control VLANs added to the list of protected VLANs.
2. Configure ring 2 of domain 2 on SwitchA, SwitchB, and SwitchC.
3. Configure ring 1 of domain 1 on SwitchC, SwitchD, and SwitchE.
4. Configure SwitchA as the master node on ring 2, and configure SwitchB and SwitchC as
transit nodes on ring 2.
5. Configure SwitchE as the master node on ring 1, and configure SwitchC and SwitchD as
transit nodes on ring 1.
Data Preparation
To complete the configuration, you need the following data.
l Numbers of the RRPP interfaces
l Control VLAN IDs of ring 1 and ring 2
Procedure
Step 1 Create an instance and add the control VLANs added to the list of protected VLANs.
# Configure SwitchA.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] stp region-configuration
[SwitchA-mst-region] instance 2 vlan 20 to 21
[SwitchA-mst-region] active region-configuration
[SwitchA-mst-region] quit
# Configure SwitchB.
<Quidway> system-view
[Quidway] sysname SwitchB
# Configure SwitchC.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] stp region-configuration
[SwitchC-mst-region] instance 1 vlan 10 to 11
[SwitchC-mst-region] instance 2 vlan 20 to 21
[SwitchC-mst-region] active region-configuration
[SwitchC-mst-region] quit
# Configure SwitchD.
<Quidway> system-view
[Quidway] sysname SwitchD
[SwitchD] stp region-configuration
[SwitchD-mst-region] instance 1 vlan 10 to 11
[SwitchD-mst-region] active region-configuration
[SwitchD-mst-region] quit
# Configure SwitchE.
<Quidway> system-view
[Quidway] sysname SwitchE
[SwitchE] stp region-configuration
[SwitchE-mst-region] instance 1 vlan 10 to 11
[SwitchE-mst-region] active region-configuration
[SwitchE-mst-region] quit
Step 2 Create RRPP domains and configure the control VLANs and protected VLANs of the domains.
# Configure domain 1 on SwitchE, which is the master node of ring 1. Configure VLAN 10 as
the main control VLAN of domain 1, and configure the list of protected VLANs mapping
instance 1.
[SwitchE] rrpp domain 1
[SwitchE-rrpp-domain-region1] control-vlan 10
[SwitchE-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchE-rrpp-domain-region1] quit
# Configure domain 1 on SwitchC, which is the transit node of ring 1. Configure VLAN 10 as
the main control VLAN of domain 1, and configure the list of protected VLANs mapping
instance 1.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] control-vlan 10
[SwitchC-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchC-rrpp-domain-region1] quit
# Configure domain 1 on SwitchD, which is the transit node of ring 1. Configure VLAN 10 as
the main control VLAN of domain 1, and configure the list of protected VLANs of instance 1.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] control-vlan 10
[SwitchD-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchD-rrpp-domain-region1] quit
# Configure domain 2 on SwitchE, which is the master node of ring 2. Configure VLAN 20 as
the main control VLAN of domain 2, and configure the list of protected VLANs mapping
instance 1.
[SwitchA] rrpp domain 2
[SwitchA-rrpp-domain-region2] control-vlan 20
# Configure domain 2 on SwitchB, which is the transit node of ring 2. Configure VLAN 20 as
the main control VLAN of domain 2, and configure the list of protected VLANs of instance 2.
[SwitchB] rrpp domain 2
[SwitchB-rrpp-domain-region2] control-vlan 20
[SwitchB-rrpp-domain-region2] protected-vlan reference-instance 2
[SwitchB-rrpp-domain-region2] quit
# Configure domain 2 on SwitchC, which is the transit node of ring 2. Configure VLAN 20 as
the main control VLAN of domain 2, and configure the list of protected VLANs of instance 2.
[SwitchC] rrpp domain 2
[SwitchC-rrpp-domain-region2] control-vlan 20
[SwitchC-rrpp-domain-region2] protected-vlan reference-instance 2
[SwitchC-rrpp-domain-region2] quit
You can set two timers for the tangent point because the two tangent rings reside in different domains.
# Set the Hold timer and Fail timer for SwitchE, the master node on ring 1.
[SwitchE] rrpp domain 1
[SwitchE-rrpp-domain-region1] timer hello-timer 2 fail-timer 7
# Set the Hold timer and Fail timer for SwitchD, the transit node on ring 1.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] timer hello-timer 2 fail-timer 7
# Set the Hold timer and Fail timer for SwitchC, the transit node on ring 1.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] timer hello-timer 2 fail-timer 7
# Set the Hold timer and Fail timer for SwitchA, the master node on ring 2.
[SwitchA] rrpp domain 2
[SwitchA-rrpp-domain-region2] timer hello-timer 3 fail-timer 10
# Set the Hold timer and Fail timer for SwitchB, the transit node on ring 2.
[SwitchB] rrpp domain 2
[SwitchB-rrpp-domain-region2] timer hello-timer 3 fail-timer 10
# Set the Hold timer and Fail timer for SwitchC, the transit node on ring 2.
[SwitchC] rrpp domain 2
[SwitchC-rrpp-domain-region2] timer hello-timer 3 fail-timer 10
[SwitchB-GigabitEthernet2/0/1] quit
[SwitchB] interface gigabitethernet 2/0/2
[SwitchB-GigabitEthernet2/0/2] stp disable
[SwitchB-GigabitEthernet2/0/2] quit
# Configure SwitchA as the master node of ring 2 and specify the primary and secondary
interfaces.
[SwitchA] rrpp domain 2
[SwitchA-rrpp-domain-region2] ring 2 node-mode master primary-port gigabitethernet
2/0/1 secondary-port gigabitethernet 2/0/2 level 0
[SwitchA-rrpp-domain-region2] ring 2 enable
[SwitchA-rrpp-domain-region2] quit
# Configure SwitchB as a transit node of ring 2 (major ring) and specify the primary and
secondary interfaces.
[SwitchB] rrpp domain 2
[SwitchB-rrpp-domain-region2] ring 2 node-mode transit primary-port
gigabitethernet 2/0/1 secondary-port gigabitethernet 2/0/2 level 0
[SwitchB-rrpp-domain-region2] ring 2 enable
[SwitchB-rrpp-domain-region2] quit
# Configure SwitchC as a transit node of RRPP ring 2 and specify the primary and secondary
interfaces.
[SwitchC] rrpp domain 2
[SwitchC-rrpp-domain-region2] ring 2 node-mode transit primary-port
gigabitethernet 2/0/1 secondary-port gigabitethernet 2/0/2 level 0
[SwitchC-rrpp-domain-region2] ring 2 enable
[SwitchC-rrpp-domain-region2] quit
# Configure SwitchC as a transit node of ring 1 and specify the primary and secondary interfaces.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 1/0/1 secondary-port gigabitethernet 1/0/2 level 0
[SwitchC-rrpp-domain-region1] ring 1 enable
[SwitchC-rrpp-domain-region1] quit
# Configure SwitchD as a transit node of ring 1 and specify the primary and secondary interfaces.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 1/0/1 secondary-port gigabitethernet 1/0/2 level 0
[SwitchD-rrpp-domain-region1] ring 1 enable
[SwitchD-rrpp-domain-region1] quit
Domain Index : 1
Domain Index : 2
Control VLAN : major 20 sub 21
Protected VLAN : Reference Instance 2
Hello Timer : 3 sec(default is 1 sec) Fail Timer : 10 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
---------------------------------------------------------------------------
2 0 T GigabitEthernet2/0/1 GigabitEthernet2/0/2 Yes
You can find that RRPP is enabled on SwitchC. The main control VLAN of domain 1 is
VLAN 10 and the sub control VLAN is VLAN 11. SwitchC is the master node of ring 1,
with GE 1/0/1 as the primary interface and GE 1/0/2 as the secondary interface.
The main control VLAN of domain 2 is VLAN 20, and the sub control VLAN is VLAN 21.
SwitchC is a transit node on ring 2, with GE 2/0/1 as the primary interface and GE 2/0/1 as
the secondary interface.
l Run the display rrpp verbosedomain command on SwitchC to view the domain
information.
# View detailed information about domain 1.
[SwitchC] display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 2 sec(default is 1 sec) Fail Timer : 7 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/1 Port status: UP
Secondary port: GigabitEthernet1/0/2 Port status: UP
RRPP Ring : 2
Ring Level : 0
Node Mode : Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet2/0/1 Port status: UP
Secondary port: GigabitEthernet2/0/2 Port status: UP
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 20 to 21
#
rrpp enable
#
stp region-
configuration
instance 2 vlan 20 to
21
active region-configuration
#
rrpp domain 2
control-vlan 20
protected-vlan reference-instance 2
timer hello-timer 3 fail-timer 10
ring 2 node-mode master primary-port GigabitEthernet 2/0/1 secondary-port
GigabitEthernet 2/0/2 level 0
ring 2 enable
#
interface GigabitEthernet2/0/1
port hybrid tagged vlan 20 to 21
stp disable
#
interface GigabitEthernet2/0/2
port hybrid tagged vlan 20 to 21
stp disable
#
l Configuration file of SwitchB
#
sysname SwitchB
#
vlan batch 20 to 21
#
rrpp enable
#
stp region-
configuration
instance 2 vlan 20 to
21
active region-configuration
#
rrpp domain 2
control-vlan 20
protected-vlan reference-instance 2
timer hello-timer 3 fail-timer 10
ring 2 node-mode transit primary-port GigabitEthernet 2/0/1 secondary-port
GigabitEthernet 2/0/2 level 0
ring 2 enable
#
interface GigabitEthernet2/0/1
port hybrid tagged vlan 20 to 21
stp disable
#
interface GigabitEthernet2/0/2
port hybrid tagged vlan 20 to 21
stp disable
#
return
#
l Configuration file of the SwitchC
#
sysname SwitchC
#
vlan batch 10 to 11 20 to 21
#
rrpp enable
#
stp region-
configuration
instance 1 vlan 10 to 11
instance 2 vlan 20 to
21
active region-configuration
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
timer hello-timer 2 fail-timer 7
ring 1 node-mode transit primary-port GigabitEthernet1/0/1 secondary-port
GigabitEthernet1/0/2 level 0
ring 1 enable
#
rrpp domain 2
control-vlan 20
protected-vlan reference-instance 2
timer hello-timer 3 fail-timer 10
ring 2 node-mode transit primary-port GigabitEthernet2/0/1 secondary-port
GigabitEthernet2/0/2 level 0
ring 2 enable
#
interface GigabitEthernet1/0/1
port hybrid tagged vlan 10 to 11
stp disable
#
interface GigabitEthernet1/0/2
port hybrid tagged vlan 10 to 11
stp disable
#
interface GigabitEthernet2/0/1
port hybrid tagged vlan 20 to 21
stp disable
#
interface GigabitEthernet2/0/2
port hybrid tagged vlan 20 to 21
stp disable
#
return
Networking Requirements
As shown in Figure 4-10, UPE A, UPE B, UPE C, and PE-AGG form a multi-instance RRPP
ring.
Two rings are involved in the networking, ring 1 in domain 1 and ring 1 in domain 2.
VLANs 100 to 300 are configured on CE. Domain 1 and domain 2 share the traffic of packets
from VLANs 100 to 300. Packets from VLANs 100 to 200 are transmitted through domain 1,
and packets from VLANs 201 to 300 are transmitted through domain 2.
Table 4-1 shows the mapping between protected VLANs and instances in domain 1 and domain
2.
Table 4-2 shows the master node of each ring, and the primary port and secondary port on the
master node.
Table 4-2 Master nodes, and primary and secondary ports on the master nodes
Figure 4-10 Networking diagram of single RRPP ring with multiple instances
UPE B
GE1/0/0 GE2/0/0
CE 1
VLAN 100-300
PE-AGG
GE2/0/0 GE1/0/0
Ring 1 Master 1 Backbone
UPEA network
Master 2
GE1/0/0 GE2/0/0
CE 2
VLAN 100-300
Domain 1 ring 1
GE2/0/0 GE1/0/0
Domain 2 ring 1
UPEC
Configuration Roadmap
The configuration roadmap is as follows:
1. Map instance 1 to VLANs 100 to 200. Map instance 2 to VLANs 201 to 300.
2. Add UPE A, UPE B, UPE C, and PE-AGG to ring 1 in domain 1.
3. Add UPE A, UPE B, UPE C, and PE-AGG to ring 1 in domain 2.
4. Configure protected VLANs in domain 1 and domain 2.
5. Configure control VLANs in domain 1 and domain 2.
6. Configure PE-AGG as the master node on ring 1 in domain 1 and configure UPE A, UPE
B, and UPE C as transit nodes.
7. Configure PE-AGG as the master node on ring 1 in domain 2 and configure UPE A, UPE
B, and UPE C as transit nodes.
Data Preparation
To complete the configuration, you need the following data:
l Instance IDs
l Range of the protected VLANs
l IDs of the control VLANs
l Numbers of the RRPP interfaces
Procedure
Step 1 Create instances.
l Configure UPE A.
# Create data VLANs 100 to 300 on UPE A.
<Quidway> system-view
[Quidway] sysname UPEA
[UPEA] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 VLAN 6 and data VLANs 100 to
200 in domain 1.
[UPEA] stp region-configuration
[UPEA-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEA-mst-region] instance 2 vlan 10 11 201 to 300
l # Configure UPE B.
# Create data VLANs 100 to 300 on UPE B.
<Quidway> system-view
[Quidway] sysname UPEB
[UPEB] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEB] stp region-configuration
[UPEB-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEB-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE C.
# Create data VLANs 100 to 300 on UPE C.
<Quidway> system-view
[Quidway] sysname UPEC
[UPEC] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEC] stp region-configuration
[UPEC-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEC-mst-region] instance 2 vlan 10 11 201 to 300
l Configure PE-AGG.
# Create data VLANs 100 to 300 on PE-AGG.
<Quidway> system-view
[Quidway] sysname PE-AGG
[PE-AGG] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[PE-AGG] stp region-configuration
[PE-AGG-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[PE-AGG-mst-region] instance 2 vlan 10 11 201 to 300
l # Configure UPE B.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE B. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEB] interface gigabitethernet 1/0/0
[UPEB-GigabitEthernet1/0/0] port link-type trunk
[UPEB-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet1/0/0] stp disable
[UPEB-GigabitEthernet1/0/0] quit
[UPEB] interface gigabitethernet 2/0/0
[UPEB-GigabitEthernet2/0/0] port link-type trunk
[UPEB-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet2/0/0] stp disable
[UPEB-GigabitEthernet2/0/0] quit
l Configure UPE C.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE C. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEC] interface gigabitethernet 1/0/0
[UPEC-GigabitEthernet1/0/0] port link-type trunk
[UPEC-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet1/0/0] stp disable
[UPEC-GigabitEthernet1/0/0] quit
[UPEC] interface gigabitethernet 2/0/0
[UPEC-GigabitEthernet2/0/0] port link-type trunk
[UPEC-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet2/0/0] stp disable
[UPEC-GigabitEthernet2/0/0] quit
l Configure PE-AGG.
# Disable STP of the interfaces that need to be added to the RRPP ring on PE-AGG. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[PE-AGG] interface gigabitethernet 1/0/0
[PE-AGG-GigabitEthernet1/0/0] port link-type trunk
[PE-AGG-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[PE-AGG-GigabitEthernet1/0/0] stp disable
[PE-AGG-GigabitEthernet1/0/0] quit
[PE-AGG] interface gigabitethernet 2/0/0
[PE-AGG-GigabitEthernet2/0/0] port link-type trunk
[PE-AGG-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[PE-AGG-GigabitEthernet2/0/0] stp disable
[PE-AGG-GigabitEthernet2/0/0] quit
Step 3 Create RRPP domains and configure the protected VLANs and control VLANs.
l Configure UPE A.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEA-rrpp-domain-region1] control-vlan 5
[UPEA-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEA-rrpp-domain-region2] control-vlan 10
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEB-rrpp-domain-region1] control-vlan 5
[UPEB-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEB-rrpp-domain-region2] control-vlan 10
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEC-rrpp-domain-region1] control-vlan 5
[UPEC-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEC-rrpp-domain-region2] control-vlan 10
[UPEC-rrpp-domain-region2] quit
l Configure PE-AGG.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] protected-vlan reference-instance 1
[PE-AGG-rrpp-domain-region1] control-vlan 5
[PE-AGG-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[PE-AGG] rrpp domain 2
[PE-AGG-rrpp-domain-region2] protected-vlan reference-instance 2
[PE-AGG-rrpp-domain-region2] control-vlan 10
[PE-AGG-rrpp-domain-region2] quit
# Configure UPE A as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE A.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEA-rrpp-domain-region2] ring 1 enable
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure UPE B as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE B.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEB-rrpp-domain-region1] ring 1 enable
[UPEB-rrpp-domain-region1] quit
# Configure UPE B as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE B.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEB-rrpp-domain-region2] ring 1 enable
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure UPE C as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEC-rrpp-domain-region1] ring 1 enable
[UPEC-rrpp-domain-region1] quit
# Configure UPE C as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEC-rrpp-domain-region2] ring 1 enable
[UPEC-rrpp-domain-region2] quit
l Configure PE-AGG.
# Configure PE-AGG as the master node of ring 1 in domain 1. Configure GE 1/0/0 as the
primary port and GE 2/0/0 as the secondary port.
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] ring 1 node-mode master primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[PE-AGG-rrpp-domain-region1] ring 1 enable
[PE-AGG-rrpp-domain-region1] quit
# Configure PE-AGG as the master node of ring 1 in domain 2. Configure GE 2/0/0 as the
primary port and GE 1/0/0 as the secondary port.
l # Configure UPE B.
# Enable the RRPP protocol.
[UPEB] rrpp enable
l Configure UPE C.
# Enable the RRPP protocol.
[UPEC] rrpp enable
l Configure PE-AGG.
# Enable the RRPP protocol.
[PE-AGG] rrpp enable
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 T GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 T GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
---------------------------------------------------------------------------
1 0 M GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
---------------------------------------------------------------------------
1 0 M GigabitEthernet2/0/0 GigabitEthernet1/0/0 Yes
The preceding information shows that the RRPP protocol is enabled on PE-AGG.
In domain 1, VLAN 5 is the control VLAN; VLANs mapping instance 1 are the protected
VLANs; PE-AGG is the master node on ring 1. The primary port is GE 1/0/0, and the secondary
port is GE 2/0/0.
In domain 2, VLAN 10 is the control VLAN; VLANs mapping instance 2 are the protected
VLANs; PE-AGG is the master node on ring 1. The primary port is GE 2/0/0, and the secondary
port is GE 1/0/0.
l Run the display rrpp verbose domain command on UPE A. You can obtain the following
results:
# View detailed information about UPE A in domain 1.
[UPEA] display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port: GigabitEthernet2/0/0 Port status: UP
The preceding information shows that VLAN 5 is the control VLAN in domain 1 and VLANs
mapping instance 1 are the protected VLANs. UPE A is a transit node in domain 1 and is in
LinkUp state.
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port: GigabitEthernet2/0/0 Port status: UP
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and VLANs
mapping instance 2 are the protected VLANs. UPE A is a transit node in domain 2 and is in
LinkUp state.
l Run the display rrpp verbose domain command on PE-AGG. You can obtain the following
results:
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port: GigabitEthernet2/0/0 Port status: BLOCKED
The preceding information shows that VLAN 5 is the control VLAN in domain 1 and VLANs
mapping instance 1 are the protected VLANs.
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet2/0/0 Port status: UP
Secondary port: GigabitEthernet1/0/0 Port status: BLOCKED
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and VLANs
mapping instance 2 are the protected VLANs.
----End
Configuration Files
l Configuration file of UPE A
#
sysname UPEA
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
l Configuration file of UPE C
#
sysname UPEC
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
Return
l Configuration file of PE-AGG
#
sysname PE-AGG
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode master primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode master primary-port GigabitEthernet2/0/0 secondary-port
GigabitEthernet1/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
Networking Requirements
As shown in Figure 4-11, UPE A, UPE B, UPE C, UPE D, and PE-AGG form two multi-instance
major rings: ring 1 in domain 1 and ring 1 in domain 2.
CE1, UPE B, and UPE C form two subrings: ring 2 in domain 1 and ring 2 in domain 2. CE1 is
connected to the major rings through GE 3/0/0 of UPE B and GE 3/0/0 of UPE C. UPE B and
UPE C are edge transit nodes.
CE2, UPE B, and UPE C form two subrings: ring 3 in domain 1 and ring 3 in domain 2. CE2 is
connected to the major rings through GE 3/0/1 of UPE B and GE 3/0/1 of UPE C. UPE B and
UPE C are edge transit nodes.
VLANs 100 to 300 are configured on the CE devices. Domain 1 and domain 2 share the traffic
of packets from VLANs 100 to 300. Packets from VLANs 100 to 200 are transmitted through
domain 1, and packets from VLANs 201 to 300 are transmitted through domain 2.
Table 4-3 shows the mapping between protected VLANs and instances in domain 1 and domain
2.
Table 4-4 shows the master node of each ring, and the primary port and secondary port on each
master node.
Table 4-4 Master nodes, and primary and secondary ports on the master nodes
Table 4-5 shows the edge transit nodes and edge nodes on the subrings.
Table 4-5 Edge transit nodes and edge nodes on the subrings
To prevent topology flapping, you need to set the Link-Up timer on the master nodes.
Figure 4-11 Networking diagram of crossed RRPP rings with multiple instances
Backbone
network
GE1/0/0 GE2/0/0
PE-
AGG
Master 1
GE2/0/0 Master 2 GE1/0/0
UPEA Domain 1 ring 1
UPED
GE1/0/0
GE2/0/0
Domain 2 ring 1
Edge Edge
GE2/0/0 Transit Transit GE1/0/0
UPEB GE1/0/0 GE2/0/0 UPEC
GE3/0/0 GE3/0/1
GE3/0/1 GE3/0/0
Master 1 Master 1
Master 2 Master 2
GE2/0/0 Domain 1 ring 2 Domain 1 ring 3 GE1/0/0
CE 1 CE 2
VLAN 100-300 VLAN 100-300
Domain 1
Domain 2
Configuration Roadmap
The configuration roadmap is as follows:
1. Map instance 1 to VLANs 100 to 200. Map instance 2 to VLANs 201 to 300.
2. Add UPE A, UPE B, UPE C, UPE D, and PE-AGG to ring 1 in domain 1 and ring 1 in
domain 2.
3. Add UPE A, UPE B, UPE C, UPE D, and PE-AGG to ring 2 in domain 1 and ring 2 in
domain 2.
4. Add UPE A, UPE B, UPE C, UPE D, and PE-AGG to ring 3 in domain 1 and ring 3 in
domain 2.
Data Preparation
To complete the configuration, you need the following data:
l Instance IDs
l Range of the protected VLANs
l IDs of the control VLANs
l Numbers of the RRPP interfaces
l Link-Up timer
Procedure
Step 1 Create instances.
l Configure CE1.
# Create data VLANs 100 to 300 on CE1.
<Quidway> system-view
[Quidway] sysname CE1
[CE1] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[CE1] stp region-configuration
[CE1-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[CE1-mst-region] instance 2 vlan 10 11 201 to 300
l Configure CE2.
# Create data VLANs 100 to 300 on CE2.
<Quidway> system-view
[Quidway] sysname CE2
[CE2] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[CE2-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE A.
# Create data VLANs 100 to 300 on UPE A.
<Quidway> system-view
[Quidway] sysname UPEA
[UPEA] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEA] stp region-configuration
[UPEA-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEA-mst-region] instance 2 vlan 10 11 201 to 300
l # Configure UPE B.
# Create data VLANs 100 to 300 on UPE B.
<Quidway> system-view
[Quidway] sysname UPEB[UPEB] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEB] stp region-configuration
[UPEB-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEB-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE C.
# Create data VLANs 100 to 300 on UPE C.
<Quidway> system-view
[Quidway] sysname UPEC
[UPEC] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEC-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE D.
# Create data VLANs 100 to 300 on UPE D.
<Quidway> system-view
[Quidway] sysname UPED
[UPED] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPED] stp region-configuration
[UPED-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPED-mst-region] instance 2 vlan 10 11 201 to 300
l Configure PE-AGG.
# Create data VLANs 100 to 300 on PE-AGG.
<Quidway> system-view
[Quidway] sysname PE-AGG
[PE-AGG] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[PE-AGG] stp region-configuration
[PE-AGG-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[PE-AGG-mst-region] instance 2 vlan 10 11 201 to 300
l Configure CE2.
# Disable STP on the interfaces that need to be added to the RRPP ring on CE2. Configure the
RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[CE2] interface gigabitethernet 1/0/0
[CE2-GigabitEthernet1/0/0] port link-type trunk
[CE2-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[CE2-GigabitEthernet1/0/0] stp disable
[CE2-GigabitEthernet1/0/0] quit
[CE2] interface gigabitethernet 2/0/0
[CE2-GigabitEthernet2/0/0] port link-type trunk
[CE2-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[CE2-GigabitEthernet2/0/0] stp disable
[CE2-GigabitEthernet2/0/0] quit
l Configure UPE A.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE A. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEA] interface gigabitethernet 1/0/0
[UPEA-GigabitEthernet1/0/0] port link-type trunk
[UPEA-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEA-GigabitEthernet1/0/0] stp disable
[UPEA-GigabitEthernet1/0/0] quit
[UPEA] interface gigabitethernet 2/0/0
[UPEA-GigabitEthernet2/0/0] port link-type trunk
[UPEA-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEA-GigabitEthernet2/0/0] stp disable
[UPEA-GigabitEthernet2/0/0] quit
l # Configure UPE B.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE B. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEB] interface gigabitethernet 1/0/0
[UPEB-GigabitEthernet1/0/0] port link-type trunk
[UPEB-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet1/0/0] stp disable
[UPEB-GigabitEthernet1/0/0] quit
[UPEB] interface gigabitethernet 2/0/0
[UPEB-GigabitEthernet2/0/0] port link-type trunk
l Configure UPE C.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE C. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEC] interface gigabitethernet 1/0/0
[UPEC-GigabitEthernet1/0/0] port link-type trunk
[UPEC-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet1/0/0] stp disable
[UPEC-GigabitEthernet1/0/0] quit
[UPEC] interface gigabitethernet 2/0/0
[UPEC-GigabitEthernet2/0/0] port link-type trunk
[UPEC-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet2/0/0] stp disable
[UPEC-GigabitEthernet2/0/0] quit
[UPEC] interface gigabitethernet 3/0/0
[UPEC-GigabitEthernet3/0/0] port link-type trunk
[UPEC-GigabitEthernet3/0/0] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet3/0/0] stp disable
[UPEC-GigabitEthernet3/0/0] quit
[UPEC] interface gigabitethernet 3/0/1
[UPEC-GigabitEthernet3/0/1] port link-type trunk
[UPEC-GigabitEthernet3/0/1] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet3/0/1] stp disable
[UPEC-GigabitEthernet3/0/1] quit
l Configure UPE D.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE D. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPED] interface gigabitethernet 1/0/0
[UPED-GigabitEthernet1/0/0] port link-type trunk
[UPED-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPED-GigabitEthernet1/0/0] stp disable
[UPED-GigabitEthernet1/0/0] quit
[UPED] interface gigabitethernet 2/0/0
[UPED-GigabitEthernet2/0/0] port link-type trunk
[UPED-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPED-GigabitEthernet2/0/0] stp disable
[UPED-GigabitEthernet2/0/0] quit
l Configure PE-AGG.
# Disable STP of the interfaces that need to be added to the RRPP ring on PE-AGG. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[PE-AGG] interface gigabitethernet 1/0/0
[PE-AGG-GigabitEthernet1/0/0] port link-type trunk
[PE-AGG-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[PE-AGG-GigabitEthernet1/0/0] stp disable
[PE-AGG-GigabitEthernet1/0/0] quit
[PE-AGG] interface gigabitethernet 2/0/0
[PE-AGG-GigabitEthernet2/0/0] port link-type trunk
[PE-AGG-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
Step 3 Create RRPP domains and configure the protected VLANs and control VLANs.
l Configure CE1.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[CE1] rrpp working-mode gb
[CE1] rrpp domain 1
[CE1-rrpp-domain-region1] protected-vlan reference-instance 1
[CE1-rrpp-domain-region1] control-vlan 5
[CE1-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[CE1] rrpp domain 2
[CE1-rrpp-domain-region2] protected-vlan reference-instance 2
[CE1-rrpp-domain-region2] control-vlan 10
[CE1-rrpp-domain-region2] quit
l Configure CE2.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[CE2] rrpp working-mode gb
[CE2] rrpp domain 1
[CE2-rrpp-domain-region1] protected-vlan reference-instance 1
[CE2-rrpp-domain-region1] control-vlan 5
[CE2-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[CE2] rrpp domain 2
[CE2-rrpp-domain-region2] protected-vlan reference-instance 2
[CE2-rrpp-domain-region2] control-vlan 10
[CE2-rrpp-domain-region2] quit
l Configure UPE A.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEA] rrpp working-mode gb
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEA-rrpp-domain-region1] control-vlan 5
[UPEA-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEA-rrpp-domain-region2] control-vlan 10
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEB] rrpp working-mode gb
[UPEB] rrpp domain 1
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEB-rrpp-domain-region2] control-vlan 10
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEC] rrpp working-mode gb
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEC-rrpp-domain-region1] control-vlan 5
[UPEC-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEC-rrpp-domain-region2] control-vlan 10
[UPEC-rrpp-domain-region2] quit
l Configure UPE D.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPED] rrpp working-mode gb
[UPED] rrpp domain 1
[UPED-rrpp-domain-region1] protected-vlan reference-instance 1
[UPED-rrpp-domain-region1] control-vlan 5
[UPED-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPED] rrpp domain 2
[UPED-rrpp-domain-region2] protected-vlan reference-instance 2
[UPED-rrpp-domain-region2] control-vlan 10
[UPED-rrpp-domain-region2] quit
l Configure PE-AGG.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[PE-AGG] rrpp working-mode gb
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] protected-vlan reference-instance 1
[PE-AGG-rrpp-domain-region1] control-vlan 5
[PE-AGG-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[PE-AGG] rrpp domain 2
[PE-AGG-rrpp-domain-region2] protected-vlan reference-instance 2
[PE-AGG-rrpp-domain-region2] control-vlan 10
[PE-AGG-rrpp-domain-region2] quit
# Configure CE1 as the master node of ring 2 in domain 2. Configure GE 2/0/0 as the primary
port and GE 1/0/0 as the secondary port.
[CE1] rrpp domain 2
[CE1-rrpp-domain-region2] ring 2 node-mode master primary-port gigabitethernet
2/0/0 secondary-port gigabitethernet 1/0/0 level 1
[CE1-rrpp-domain-region2] ring 2 enable
[CE1-rrpp-domain-region2] quit
l Configure CE2.
# Configure CE2 as the master node of ring 3 in domain 1. Configure GE 1/0/0 as the primary
port and GE 2/0/0 as the secondary port.
[CE2] rrpp domain 1
[CE2-rrpp-domain-region1] ring 3 node-mode master primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 1
[CE2-rrpp-domain-region1] ring 3 enable
[CE2-rrpp-domain-region1] quit
# Configure CE2 as the master node of ring 3 in domain 2. Configure GE 2/0/0 as the primary
port and GE 1/0/0 as the secondary port.
[CE2] rrpp domain 2
[CE2-rrpp-domain-region2] ring 3 node-mode master primary-port gigabitethernet
2/0/0 secondary-port gigabitethernet 1/0/0 level 1
[CE2-rrpp-domain-region2] ring 3 enable
[CE2-rrpp-domain-region2] quit
l Configure UPE A.
# Configure UPE A as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE A.
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEA-rrpp-domain-region1] ring 1 enable
[UPEA-rrpp-domain-region1] quit
# Configure UPE A as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE A.
<UPEA> system-view
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEA-rrpp-domain-region2] ring 1 enable
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure UPE B as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE B.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
# Configure UPE B as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE B.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEB-rrpp-domain-region2] ring 1 enable
[UPEB-rrpp-domain-region2] quit
# Configure UPE B as an edge transit node on ring 2 in domain 1 and configure GE 3/0/0 as the
edge port.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] ring 2 node-mode transit secondary-port gigabitethernet
3/0/0
[UPEB-rrpp-domain-region1] ring 2 enable
[UPEB-rrpp-domain-region1] quit
# Configure UPE B as an edge transit node on ring 2 in domain 2 and configure GE 3/0/0 as the
edge port.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] ring 2 node-mode transit secondary-port gigabitethernet
3/0/0
[UPEB-rrpp-domain-region2] ring 2 enable
[UPEB-rrpp-domain-region2] quit
# Configure UPE B as an edge transit node on ring 3 in domain 1 and configure GE 3/0/1 as the
edge port.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] ring 3 node-mode transit secondary-port gigabitethernet
3/0/1
[UPEB-rrpp-domain-region1] ring 3 enable
[UPEB-rrpp-domain-region1] quit
# Configure UPE B as an edge transit node on ring 3 in domain 2 and configure GE 3/0/1 as the
edge port.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] ring 3 node-mode transit secondary-port gigabitethernet
3/0/1
[UPEB-rrpp-domain-region2] ring 3 enable
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure UPE C as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEC-rrpp-domain-region1] ring 1 enable
[UPEC-rrpp-domain-region1] quit
# Configure UPE C as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEC-rrpp-domain-region2] ring 1 enable
[UPEC-rrpp-domain-region2] quit
# Configure UPE C as an edge transit node on ring 2 in domain 1 and configure GE 3/0/0 as the
edge port.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] ring 2 node-mode transit secondary-port gigabitethernet
3/0/0
[UPEC-rrpp-domain-region1] ring 2 enable
[UPEC-rrpp-domain-region1] quit
# Configure UPE C as an edge transit node on ring 2 in domain 2 and configure GE 3/0/0 as the
edge port.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] ring 2 node-mode transit secondary-port gigabitethernet
3/0/0
[UPEC-rrpp-domain-region2] ring 2 enable
[UPEC-rrpp-domain-region2] quit
# Configure UPE C as an edge transit node on ring 3 in domain 1 and configure GE 3/0/1 as the
edge port.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] ring 3 node-mode transit secondary-port gigabitethernet
3/0/1
[UPEC-rrpp-domain-region1] ring 3 enable
[UPEC-rrpp-domain-region1] quit
# Configure UPE C as an edge transit node on ring 3 in domain 2 and configure GE 3/0/1 as the
edge port.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] ring 3 node-mode transit secondary-port gigabitethernet
3/0/1
[UPEC-rrpp-domain-region2] ring 3 enable
[UPEC-rrpp-domain-region2] quit
l Configure UPE D.
# Configure UPE D as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE D.
[UPED] rrpp domain 1
[UPED-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPED-rrpp-domain-region1] ring 1 enable
[UPED-rrpp-domain-region1] quit
# Configure UPE D as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE D.
[UPED] rrpp domain 2
[UPED-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPED-rrpp-domain-region2] ring 1 enable
[UPED-rrpp-domain-region2] quit
l Configure PE-AGG.
# Configure PE-AGG as the master node of ring 1 in domain 1. Configure GE 1/0/0 as the
primary port and GE 2/0/0 as the secondary port.
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] ring 1 node-mode master primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[PE-AGG-rrpp-domain-region1] ring 1 enable
[PE-AGG-rrpp-domain-region1] quit
# Configure PE-AGG as the master node of ring 1 in domain 2. Configure GE 2/0/0 as the
primary port and GE 1/0/0 as the secondary port.
After configuring an RRPP ring, you need to enable RRPP on each node on the ring to activate
the RRPP ring. The configuration procedure is as follows:
l Configure CE1.
l Configure CE2.
l Configure UPE A.
l # Configure UPE B.
l Configure UPE C.
l Configure UPE D.
l Configure PE-AGG.
l Configure CE2.
l Configure PE-AGG.
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 T GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
2 1 ET GigabitEthernet1/0/0 GigabitEthernet3/0/0 Yes
GigabitEthernet2/0/0
3 1 ET GigabitEthernet1/0/0 GigabitEthernet3/0/1 Yes
GigabitEthernet2/0/0
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 T GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
2 1 ET GigabitEthernet1/0/0 GigabitEthernet3/0/0 Yes
GigabitEthernet2/0/0
3 1 ET GigabitEthernet1/0/0 GigabitEthernet3/0/1 Yes
GigabitEthernet2/0/0
The preceding information shows that the RRPP protocol is enabled on UPE B.
In domain 1:
VLAN 5 is the control VLAN and VLANs mapping instance 1 are the protected VLANs.
UPE B is a transit node on ring 1; GE 1/0/0 is the primary port; GE 2/0/0 is the secondary port.
UPE B is an edge transit node on ring 2. GE 3/0/0 is the edge port.
UPE B is an edge transit node on ring 3. GE 3/0/1 is the edge port.
In domain 2:
VLAN 10 is the control VLAN and VLANs mapping instance 2 are the protected VLANs.
UPE B is a transit node on ring 1. The primary port is GE 1/0/0, and the secondary port is GE
2/0/0.
UPE B is an edge transit node on ring 2. GE 3/0/0 is the edge port.
UPE B is an edge transit node on ring 3. GE 3/0/1 is the edge port.
l Run the display rrpp brief command on PE-AGG. The following information is displayed:
[PE-AGG] display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , EM - Edge Master, ET - Edge Transit
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary Secondary/Edge Is
ID Level Mode Port Port Enabled
---------------------------------------------------------------------------
1 0 M GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 3 sec(default is 3 sec)
Ring Ring Node Primary Secondary/Edge Is
ID Level Mode Port Port Enabled
---------------------------------------------------------------------------
1 0 M GigabitEthernet2/0/0 GigabitEthernet1/0/0 Yes
The preceding information shows that the RRPP protocol is enabled on PE-AGG, and the link-
Up timer is 1 second.
In domain 1, VLAN 5 is the control VLAN; VLANs mapping instance 1 are the protected
VLANs; PE-AGG is the master node on ring 1. The primary port is GE 1/0/0, and the secondary
port is GE 2/0/0.
In domain 2, VLAN 10 is the control VLAN; VLANs mapping instance 2 are the protected
VLANs; PE-AGG is the master node on ring 1. The primary port is GE 2/0/0, and the secondary
port is GE 1/0/0.
l Run the display rrpp verbose domain command on UPE B. You can obtain the following
results:
# View detailed information about UPE B in domain 1.
[UPEB] display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active: Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port : GigabitEthernet2/0/0 Port status: UP
RRPP Ring :
2
Ring Level :
1
Node Mode :
Edge Transit
Ring State :
LinkUp
Is Enabled :
Enable Is Active: Yes
Primary port :
GigabitEthernet1/0/0 Port status: UP
GigabitEthernet2/0/0 Port status: UP
Secondary port : GigabitEthernet3/0/0 Port status: UP
RRPP Ring :
3
Ring Level :
1
Node Mode :
Edge Transit
Ring State :
LinkUp
Is Enabled :
Enable Is Active: Yes
Primary port :
GigabitEthernet1/0/0 Port status: UP
GigabitEthernet2/0/0 Port status: UP
Secondary port : GigabitEthernet3/0/1 Port status: UP
The preceding information shows that VLAN 5 is the control VLAN in domain 1 and VLANs
mapping instance 1 are the protected VLANs.
UPE B is a transit node on ring 2 in domain 1 and is in LinkUp state. GE 3/0/0 is the edge port.
UPE B is an edge transit node on ring 3 in domain 1 and is in LinkUp state. GE 3/0/1 is the edge
port.
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active: Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port : GigabitEthernet2/0/0 Port status: UP
RRPP Ring :
2
Ring Level :
1
Node Mode :
Edge Transit
Ring State :
LinkUp
Is Enabled :
Enable Is Active: Yes
Primary port :
GigabitEthernet1/0/0 Port status: UP
GigabitEthernet2/0/0 Port status: UP
Secondary port : GigabitEthernet3/0/0 Port status: UP
RRPP Ring :
3
Ring Level :
1
Node Mode :
Edge Transit
Ring State :
LinkUp
Is Enabled :
Enable Is Active: Yes
Primary port :
GigabitEthernet1/0/0 Port status: UP
GigabitEthernet2/0/0 Port status: UP
Secondary port : GigabitEthernet3/0/1 Port status: UP
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and VLANs
mapping instance 2 are the protected VLANs.
UPE B is a transit node on ring 2 in domain 2 and is in LinkUp state. GE 3/0/0 GE 3/0/0 is the
edge port.
UPE B is an edge transit node on ring 3 in domain 2 and is in LinkUp state. GE 3/0/1 is the edge
port.
l Run the display rrpp verbose domain command on PE-AGG. You can obtain the following
results:
# View detailed information about PE-AGG in domain 1.
<PE-AGG> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active: Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port : GigabitEthernet2/0/0 Port status: BLOCKED
The preceding information shows that VLAN 5 is the control VLAN in domain 1 and VLANs
mapping instance 1 are the protected VLANs.
PE-AGG is the master node in domain 1 and is in Complete state.
The primary port is GE 1/0/0, and the secondary port is GE 2/0/0.
# View detailed information about PE-AGG in domain 2.
[PE-AGG] display rrpp verbose domain 2
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active: Yes
Primary port : GigabitEthernet2/0/0 Port status: UP
Secondary port : GigabitEthernet1/0/0 Port status: BLOCKED
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and VLANs
mapping instance 2 are the protected VLANs.
PE-AGG is the master node in domain 2 and is in Complete state.
The primary port is GE 2/0/0, and the secondary port is GE 1/0/0.
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp working-mode GB
rrpp enable
rrpp linkup-delay-timer 1
#
stp region-configuration
#
sysname UPEA
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp working-mode GB
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
l Configuration file of UPE B
#
sysname UPEB
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp working-mode GB
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
ring 2 node-mode transit secondary-port GigabitEthernet3/0/0
ring 2 enable
ring 3 node-mode transit secondary-port GigabitEthernet3/0/1
ring 3 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
ring 2 node-mode transit secondary-port GigabitEthernet3/0/0
ring 2 enable
interface GigabitEthernet3/0/0
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
interface GigabitEthernet3/0/1
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
Return
l Configuration file of UPE D
#
sysname UPED
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp working-mode GB
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
l Configuration file of PE-AGG
#
sysname PE-AGG
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp working-mode GB
rrpp enable
rrpp linkup-delay-timer 1
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode master primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode master primary-port GigabitEthernet2/0/0 secondary-port
GigabitEthernet1/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
Table 4-7 shows the master node of each ring, and the primary port and secondary port on each
master node.
Table 4-7 Master nodes, and primary and secondary ports on the master nodes
Ring ID Master Primary Secondary Port Ring Type
Node Port
Table 4-8 shows the edge nodes, assistant edge nodes, public port, and edge port of the subrings.
Table 4-8 Edge nodes, assistant edge nodes, public port, and edge port of the subrings
Ring Edge Comm Edge Port Edge- Common Edge Port
ID Node on Port Assistant Port
Node
To reduce the Edge-Hello packets sent on the major ring and increase available bandwidth, you
can add the four subrings to a ring group.
To prevent topology flapping, you need to set the Link-Up timer on the master nodes.
Figure 4-12 Networking diagram of crossed RRPP rings with multiple instances
Backbone
network
GE1/0/0 GE2/0/0
PE-AGG
Master 1
GE2/0/0 Master 2 GE1/0/0
UPE A Domain 1 ring UPED
GE1/0/0 1
GE2/0/0
Domain 2 ring
1
Assistan
GE2/0/0 Edge GE1/0/0
t
UPE B GE1/0/0 GE2/0/0 UPEC
GE3/0/0 GE3/0/1
GE3/0/1 GE3/0/0
Master 1 Master 1
Master 2 Domain 1 ring Domain 1 ring Master 2
GE2/0/0 GE1/0/0
2 3
CE 1 CE 2
VLAN 100-300 VLAN 100-300
Domain 1
Domain 2
Configuration Roadmap
The configuration roadmap is as follows:
1. Map instance 1 to VLANs 100 to 200. Map instance 2 to VLANs 201 to 300.
2. Add UPE A, UPE B, UPE C, UPE D, and PE-AGG to ring 1 in domain 1 and ring 1 in
domain 2.
3. Add CE1, UPE B, and UPE C to ring 2 in domain 1 and ring 2 in domain 2.
4. Add CE2, UPE B, and UPE C to ring 3 in domain 1 and ring 3 in domain 2.
5. Configure protected VLANs in domain 1 and domain 2.
Data Preparation
To complete the configuration, you need the following data:
l Instance IDs
l Range of the protected VLANs
l IDs of the control VLANs
l Numbers of the RRPP interfaces
l ID of the ring group
l Link-Up-Delay timer
Procedure
Step 1 Create instances.
l Configure CE1.
# Create data VLANs 100 to 300 on CE1.
<Quidway> system-view
[Quidway] sysname CE1
[CE1] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[CE1] stp region-configuration
[CE1-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[CE1-mst-region] instance 2 vlan 10 11 201 to 300
l Configure CE2.
# Create data VLANs 100 to 300 on CE2.
<Quidway> system-view
[Quidway] sysname CE2
[CE2] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[CE2] stp region-configuration
[CE2-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[CE2-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE A.
# Create data VLANs 100 to 300 on UPE A.
<Quidway> system-view
[Quidway] sysname UPEA
[UPEA] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[UPEA] stp region-configuration
[UPEA-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[UPEA-mst-region] instance 2 vlan 10 11 201 to 300
l # Configure UPE B.
# Create data VLANs 100 to 300 on UPE B.
<Quidway> system-view
[Quidway] sysname UPEB
[UPEB] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[UPEB] stp region-configuration
[UPEB-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[UPEB-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE C.
# Create data VLANs 100 to 300 on UPE C.
<Quidway> system-view
[Quidway] sysname UPEC
[UPEC] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[UPEC] stp region-configuration
[UPEC-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[UPEC-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE D.
# Create data VLANs 100 to 300 on UPE D.
<Quidway> system-view
[Quidway] sysname UPED
[UPED] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[UPED] stp region-configuration
[UPED-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[UPED-mst-region] instance 2 vlan 10 11 201 to 300
l Configure PE-AGG.
# Create data VLANs 100 to 300 on PE-AGG.
<Quidway> system-view
[Quidway] sysname PE-AGG
[PE-AGG] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[PE-AGG] stp region-configuration
[PE-AGG-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[PE-AGG-mst-region] instance 2 vlan 10 11 201 to 300
[CE1-GigabitEthernet1/0/0] quit
[CE1] interface gigabitethernet 2/0/0
[CE1-GigabitEthernet2/0/0] port link-type trunk
[CE1-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[CE1-GigabitEthernet2/0/0] stp disable
[CE1-GigabitEthernet2/0/0] quit
l Configure CE2.
# Disable STP on the interfaces that need to be added to the RRPP ring on CE2. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[CE2] interface gigabitethernet 1/0/0
[CE2-GigabitEthernet1/0/0] port link-type trunk
[CE2-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[CE2-GigabitEthernet1/0/0] stp disable
[CE2-GigabitEthernet1/0/0] quit
[CE2] interface gigabitethernet 2/0/0
[CE2-GigabitEthernet2/0/0] port link-type trunk
[CE2-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[CE2-GigabitEthernet2/0/0] stp disable
[CE2-GigabitEthernet2/0/0] quit
l Configure UPE A.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE A. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEA] interface gigabitethernet 1/0/0
[UPEA-GigabitEthernet1/0/0] port link-type trunk
[UPEA-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEA-GigabitEthernet1/0/0] stp disable
[UPEA-GigabitEthernet1/0/0] quit
[UPEA] interface gigabitethernet 2/0/0
[UPEA-GigabitEthernet2/0/0] port link-type trunk
[UPEA-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEA-GigabitEthernet2/0/0] stp disable
[UPEA-GigabitEthernet2/0/0] quit
l # Configure UPE B.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE B. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEB] interface gigabitethernet 1/0/0
[UPEB-GigabitEthernet1/0/0] port link-type trunk
[UPEB-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet1/0/0] stp disable
[UPEB-GigabitEthernet1/0/0] quit
[UPEB] interface gigabitethernet 2/0/0
[UPEB-GigabitEthernet2/0/0] port link-type trunk
[UPEB-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet2/0/0] stp disable
[UPEB-GigabitEthernet2/0/0] quit
[UPEB] interface gigabitethernet 3/0/0
[UPEB-GigabitEthernet3/0/0] port link-type trunk
[UPEB-GigabitEthernet3/0/0] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet3/0/0] stp disable
[UPEB-GigabitEthernet3/0/0] quit
[UPEB] interface gigabitethernet 3/0/1
[UPEB-GigabitEthernet3/0/1] port link-type trunk
[UPEB-GigabitEthernet3/0/1] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet3/0/1] stp disable
[UPEB-GigabitEthernet3/0/1] quit
l Configure UPE C.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE C. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEC] interface gigabitethernet 1/0/0
[UPEC-GigabitEthernet1/0/0] port link-type trunk
[UPEC-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
Step 3 Create RRPP domains and configure the protected VLANs and control VLANs.
l Configure CE1.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[CE1] rrpp domain 1
[CE1-rrpp-domain-region1] protected-vlan reference-instance 1
[CE1-rrpp-domain-region1] control-vlan 5
[CE1-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[CE1] rrpp domain 2
[CE1-rrpp-domain-region2] protected-vlan reference-instance 2
[CE1-rrpp-domain-region2] control-vlan 10
[CE1-rrpp-domain-region2] quit
l Configure CE2.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[CE2] rrpp domain 2
[CE2-rrpp-domain-region2] protected-vlan reference-instance 2
[CE2-rrpp-domain-region2] control-vlan 10
[CE2-rrpp-domain-region2] quit
l Configure UPE A.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEA-rrpp-domain-region1] control-vlan 5
[UPEA-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEA-rrpp-domain-region2] control-vlan 10
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEB-rrpp-domain-region1] control-vlan 5
[UPEB-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEB-rrpp-domain-region2] control-vlan 10
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEC-rrpp-domain-region1] control-vlan 5
[UPEC-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEC-rrpp-domain-region2] control-vlan 10
[UPEC-rrpp-domain-region2] quit
l Configure UPE D.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPED] rrpp domain 1
[UPED-rrpp-domain-region1] protected-vlan reference-instance 1
[UPED-rrpp-domain-region1] control-vlan 5
[UPED-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPED] rrpp domain 2
[UPED-rrpp-domain-region2] protected-vlan reference-instance 2
[UPED-rrpp-domain-region2] control-vlan 10
[UPED-rrpp-domain-region2] quit
l Configure PE-AGG.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] protected-vlan reference-instance 1
[PE-AGG-rrpp-domain-region1] control-vlan 5
[PE-AGG-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[PE-AGG] rrpp domain 2
[PE-AGG-rrpp-domain-region2] protected-vlan reference-instance 2
[PE-AGG-rrpp-domain-region2] control-vlan 10
[PE-AGG-rrpp-domain-region2] quit
# Configure PE-AGG as the master node of ring 1 in domain 2. Configure GE 2/0/0 as the
primary port and GE 1/0/0 as the secondary port.
[PE-AGG] rrpp domain 2
[PE-AGG-rrpp-domain-region2] ring 1 node-mode master primary-port
gigabitethernet 2/0/0 secondary-port gigabitethernet 1/0/0 level 0
[PE-AGG-rrpp-domain-region2] ring 1 enable
[PE-AGG-rrpp-domain-region2] quit
l Configure UPE A.
# Configure UPE A as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE A.
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEA-rrpp-domain-region1] ring 1 enable
[UPEA-rrpp-domain-region1] quit
# Configure UPE A as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE A.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] ring 1 node-mode transit primary-port
gigabitethernet 1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEA-rrpp-domain-region2] ring 1 enable
[UPEA-rrpp-domain-region2] quit
l Configure UPE D.
# Configure UPE D as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE D.
[UPED] rrpp domain 1
[UPED-rrpp-domain-region1] ring 1 node-mode transit primary-port
# Configure UPE C as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] ring 1 node-mode transit primary-port
gigabitethernet 1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEC-rrpp-domain-region2] ring 1 enable
[UPEC-rrpp-domain-region2] quit
# Configure UPE B as an edge node of ring 2 in domain 1. Configure GE 2/0/0 as the public
port and GE 3/0/0 as the edge port.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] ring 2 node-mode assistant-edge common-port
gigabitethernet 2/0/0 edge-port gigabitethernet 3/0/0
[UPEC-rrpp-domain-region1] ring 2 enable
[UPEC-rrpp-domain-region1] quit
# Configure UPE B as an edge node of ring 2 in domain 2. Configure GE 2/0/0 as the public
port and GE 3/0/0 as the edge port.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] ring 2 node-mode assistant-edge common-port
gigabitethernet 2/0/0 edge-port gigabitethernet 3/0/0
[UPEC-rrpp-domain-region2] ring 2 enable
[UPEC-rrpp-domain-region2] quit
# Configure UPE C as an edge node of ring 3 in domain 1. Configure GE 1/0/0 as the public
port and GE 3/0/1 as the edge port.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] ring 3 node-mode assistant-edge common-port
gigabitethernet 1/0/0 edge-port gigabitethernet 3/0/1
[UPEC-rrpp-domain-region1] ring 3 enable
[UPEC-rrpp-domain-region1] quit
# Configure UPE C as an edge node of ring 3 in domain 2. Configure GE 2/0/0 as the public
port and GE 3/0/1 as the edge port.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] ring 3 node-mode assistant-edge common-port
gigabitethernet 2/0/0 edge-port gigabitethernet 3/0/1
[UPEC-rrpp-domain-region2] ring 3 enable
[UPEC-rrpp-domain-region2] quit
l Configure CE1.
# Configure CE1 as the master node of ring 2 in domain 1. Configure GE 1/0/0 as the primary
port and GE 2/0/0 as the secondary port.
[CE1] rrpp domain 1
[CE1-rrpp-domain-region1] ring 2 node-mode master primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 1
[CE1-rrpp-domain-region1] ring 2 enable
[CE1-rrpp-domain-region1] quit
# Configure CE1 as the master node of ring 2 in domain 2. Configure GE 2/0/0 as the primary
port and GE 1/0/0 as the secondary port.
[CE1] rrpp domain 2
[CE1-rrpp-domain-region2] ring 2 node-mode master primary-port gigabitethernet
2/0/0 secondary-port gigabitethernet 1/0/0 level 1
[CE1-rrpp-domain-region2] ring 2 enable
[CE1-rrpp-domain-region2] quit
l Configure CE2.
# Configure CE2 as the master node of ring 3 in domain 1. Configure GE 1/0/0 as the primary
port and GE 2/0/0 as the secondary port.
# Configure CE2 as the master node of ring 3 in domain 2. Configure GE 2/0/0 as the primary
port and GE 1/0/0 as the secondary port.
[CE2] rrpp domain 2
[CE2-rrpp-domain-region2] ring 3 node-mode master primary-port gigabitethernet
2/0/0 secondary-port gigabitethernet 1/0/0 level 1
[CE2-rrpp-domain-region2] ring 3 enable
[CE2-rrpp-domain-region2] quit
l Configure UPE A.
# Enable the RRPP protocol.
[UPEA] rrpp enable
l Configure UPE D.
# Enable the RRPP protocol.
[UPED] rrpp enable
l # Configure UPE B.
# Enable the RRPP protocol.
[UPEB] rrpp enable
l Configure UPE C.
# Enable the RRPP protocol.
[UPEC] rrpp enable
l Configure CE1.
# Enable the RRPP protocol.
[CE1] rrpp enable
l Configure CE2.
# Enable the RRPP protocol.
[CE2] rrpp enable
l Configure CE2.
# Set the link-Up timer to 1 second.
[CE2] rrpp linkup-delay-timer 1
l Configure PE-AGG.
# Set the link-Up timer to 1 second.
[PE-AGG] rrpp linkup-delay-timer 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
-------------------------------------------------------------------------------
--
1 0 T GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
2 1 E GigabitEthernet1/0/0 GigabitEthernet3/0/0 Yes
3 1 E GigabitEthernet1/0/0 GigabitEthernet3/0/1 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
-------------------------------------------------------------------------------
--
1 0 T GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
2 1 E GigabitEthernet1/0/0 GigabitEthernet3/0/0 Yes
3 1 E GigabitEthernet1/0/0 GigabitEthernet3/0/1 Yes
VLAN 5 is the control VLAN and VLANs mapping instance 1 are the protected VLANs.
UPE B is a transit node on ring 1; GE 1/0/0 is the primary port; GE 2/0/0 is the secondary
port.
UPE B is an edge transit node on ring 2. GE 1/0/0 is the public port and GE 3/0/0 is the edge
port.
UPE B is an edge transit node on ring 3. GE 1/0/0 is the public port and GE 3/0/1 is the edge
port.
In domain 2:
VLAN 10 is the control VLAN and VLANs mapping instance 2 are the protected VLANs.
UPE B is a transit node on ring 1. GE 1/0/0 is the primary port, and GE 2/0/0 is the secondary
port.
UPE B is an edge transit node on ring 2. GE 1/0/0 is the public port and GE 3/0/0 is the edge
port.
UPE B is an edge transit node on ring 3. GE 1/0/0 is the public port and GE 3/0/1 is the edge
port.
l Run the display rrpp brief command on PE-AGG. The following information is displayed:
[PE-AGG] display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
-------------------------------------------------------------------------------
--
1 0 M GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
-------------------------------------------------------------------------------
--
1 0 M GigabitEthernet2/0/0 GigabitEthernet1/0/0 Yes
The preceding information shows that the RRPP protocol is enabled on PE-AGG, and the
link-Up timer is 2 seconds.
In domain 1, VLAN 5 is the control VLAN; VLANs mapping instance 1 are the protected
VLANs; PE-AGG is the master node on ring 1. GE 1/0/0 is the primary port, and GE 2/0/0
is the secondary port.
In domain 2, VLAN 10 is the control VLAN; VLANs mapping instance 2 are the protected
VLANs; PE-AGG is the master node on ring 1. GE 2/0/0 is the primary port, and GE 1/0/0
is the secondary port.
l Run the display rrpp verbose domain command on UPE B. You can obtain the following
results:
# View detailed information about UPE B in domain 1.
<[UPEB] display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port: GigabitEthernet2/0/0 Port status: UP
RRPP Ring : 2
Ring Level : 1
Node Mode : Edge
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Common port : GigabitEthernet1/0/0 Port status: UP
Edge port : GigabitEthernet3/0/0 Port status: UP
RRPP Ring : 3
Ring Level : 1
Node Mode : Edge
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Common port : GigabitEthernet1/0/0 Port status: UP
Edge port : GigabitEthernet3/0/1 Port status: UP
The preceding information shows that VLAN 5 is the control VLAN in domain 1, and VLANs
mapping instance 1 are the protected VLANs.
UPE B is a transit node on ring 1 in domain 1 and is in LinkUp state.
UPE B is a transit node on ring 2 in domain 1 and is in LinkUp state. GE 1/0/0 is the public
port, and GE 3/0/0 is the edge port.
UPE B is a transit node on ring 3 in domain 1 and is in LinkUp state. GE 1/0/0 is the public
port, and GE 3/0/1 is the edge port.
# View detailed information about UPE B in domain 2.
<UPEB> display rrpp verbose domain 2
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port: GigabitEthernet2/0/0 Port status: UP
RRPP Ring : 2
Ring Level : 1
Node Mode : Edge
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Common port : GigabitEthernet1/0/0 Port status: UP
Edge port : GigabitEthernet3/0/0 Port status: UP
RRPP Ring : 3
Ring Level : 1
Node Mode : Edge
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Common port : GigabitEthernet1/0/0 Port status: UP
Edge port : GigabitEthernet3/0/1 Port status: UP
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and
VLANs mapping instance 2 are the protected VLANs.
UPE B is a transit node in domain 2 and is in LinkUp state.
UPE B is a transit node on ring 2 in domain 2 and is in LinkUp state. GE 1/0/0 is the public
port, and GE 3/0/0 is the edge port.
UPE B is a transit node on ring 3 in domain 2 and is in LinkUp state. GE 1/0/0 is the public
port, and GE 3/0/1 is the edge port.
l Run the display rrpp verbose domain command on PE-AGG. You can obtain the following
results:
# View detailed information about PE-AGG in domain 1.
[PE-AGG] display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port: GigabitEthernet2/0/0 Port status: BLOCKED
The preceding information shows that VLAN 5 is the control VLAN in domain 1, and VLANs
mapping instance 1 are the protected VLANs.
PE-AGG is the master node in domain 1 and is in Complete state.
GE 1/0/0 is the primary port, and GE 2/0/0 is the secondary port.
# View detailed information about PE-AGG in domain 2.
[PE-AGG] display rrpp verbose domain 2
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet2/0/0 Port status: UP
Secondary port: GigabitEthernet1/0/0 Port status: BLOCKED
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and
VLANs mapping instance 2 are the protected VLANs.
PE-AGG is the master node in domain 2 and is in Complete state.
GE 2/0/0 is the primary port, and GE 1/0/0 is the secondary port.
l Run the display rrpp ring-group command on UPE B to view the configuration of the ring
group.
# View the configuration of ring group 1.
[UPEB] display rrpp ring-group 1
Ring Group 1:
domain 1 ring 2 to 3
domain 2 ring 2 to 3
domain 1 ring 2 send Edge-Hello packet
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
rrpp linkup-delay-timer 1
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 2 node-mode master primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 1
ring 2 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 2 node-mode master primary-port GigabitEthernet2/0/0 secondary-port
GigabitEthernet1/0/0 level 1
ring 2 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
return
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 3 node-mode master primary-port GigabitEthernet2/0/0 secondary-port
GigabitEthernet1/0/0 level 1
ring 3 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
return
l Configuration file of UPE A
#
sysname UPEA
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
l Configuration file of UPE B
#
sysname UPEB
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
ring 2 node-mode edge common-port GigabitEthernet1/0/0 edge-port
GigabitEthernet3/0/0
ring 2 enable
ring 3 node-mode edge common-port GigabitEthernet1/0/0 edge-port
GigabitEthernet3/0/1
ring 3 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
ring 2 node-mode edge common-port GigabitEthernet1/0/0 edge-port
GigabitEthernet3/0/0
ring 2 enable
ring 3 node-mode edge common-port GigabitEthernet1/0/0 edge-port
GigabitEthernet3/0/1
ring 3 enable
#
rrpp ring group 1
domain 1 ring 2 to 3
domain 2 ring 2 to 3
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet3/0/0
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
interface GigabitEthernet3/0/1
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
return
l Configuration file of UPE C
#
sysname UPEC
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
Networking Requirements
As shown in Figure 4-13, UPE A, UPE B, UPE C, and UPE D form two multi-instance rings:
ring 1 in domain 1 and ring 1 in domain 2. UPE D, UPE E, UPE F, and UPE G form ring 1 in
domain 3. Packets of the data VLANs connected to CE are forwarded to the backbone network
through the two tangent rings.
VLANs 100 to 300 are configured on CE. Domain 1 and domain 2 share the traffic of packets
from VLANs 100 to 300. Packets from VLANs 100 to 200 are transmitted through domain 1,
and packets from VLANs 201 to 300 are transmitted through domain 2.
Table 4-9 shows the mapping between protected VLANs and instances in domain 1, domain 2,
and domain 3.
Table 4-10 shows the master node of each ring, and the primary port and secondary port on each
master node.
Table 4-10 Master nodes, and primary and secondary ports on the master nodes
Ring ID Master Node Primary Port Secondary Port
Figure 4-13 Networking diagram of tangent RRPP rings with multiple instances
UPEB UPEE
GE1/0/0 GE2/0/0 GE1/0/0 GE2/0/0
Domain 1 ring 1
Configuration Roadmap
The configuration roadmap is as follows:
1. Map instance 1 to VLANs 100 to 200. Map instance 2 to VLANs 201 to 300.
2. Add UPE A, UPE B, UPE C, and UPE D to ring 1 in domain 1 and ring 1 in domain 2.
3. Add UPE D, UPE E, UPE F, and UPE G to ring 1 in domain 3.
4. Configure protected VLANs in domain 1 and domain 2.
5. Configure control VLANs in domain 1 and domain 2.
6. Configure the control VLAN in domain 3.
7. Configure UPE D as the master node and configure UPE A, UPE B, and UPE C as transit
nodes on ring 1 in domain 1 and ring 1 in domain 2.
8. Configure UPE F as the master node and configure UPE D, UPE E, and UPE G as transit
nodes on ring 1 in domain 3.
Data Preparation
To complete the configuration, you need the following data:
l Instance IDs
l Range of the protected VLANs
l IDs of the control VLANs
l Numbers of the RRPP interfaces
Procedure
Step 1 Create instances.
l Configure UPE A.
# Create data VLANs 100 to 300 on UPE A.
<Quidway> system-view
[Quidway] sysname UPEA
[UPEA] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEA] stp region-configuration
[UPEA-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEA-mst-region] instance 2 vlan 10 11 201 to 300
l # Configure UPE B.
# Create data VLANs 100 to 300 on UPE B.
<Quidway> system-view
[Quidway] sysname UPEB
[UPEB] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEB] stp region-configuration
[UPEB-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEB-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE C.
# Create data VLANs 100 to 300 on UPE C.
<Quidway> system-view
[Quidway] sysname UPEC
[UPEC] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEC] stp region-configuration
[UPEC-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEC-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE D.
# Create data VLANs 100 to 300 on UPE D.
<Quidway> system-view
[Quidway] sysname UPED
[UPED] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPED] stp region-configuration
[UPED-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPED-mst-region] instance 2 vlan 10 11 201 to 300
# Create instance 3 and map it to control VLANs VLAN 20 and VLAN 21 in domain 3.
[UPED-mst-region] instance 3 vlan 20 21
l Configure UPE E.
# Create data VLANs 100 to 300 on UPE E.
<Quidway> system-view
[Quidway] sysname UPEE
[UPEE] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 20 and VLAN 21 and data VLANs 100
to 300 in domain 3.
[UPEE] stp region-configuration
[UPEE-mst-region] instance 1 vlan 20 21 100 to 300
l Configure UPE F.
# Create data VLANs 100 to 300 on UPE F.
<Quidway> system-view
[Quidway] sysname UPEF
[UPEF] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 20 and VLAN 21 and data VLANs 100
to 300 in domain 3.
[UPEF] stp region-configuration
[UPEF-mst-region] instance 1 vlan 20 21 100 to 300
l Configure UPE G.
# Create data VLANs 100 to 300 on UPE G.
<Quidway> system-view
[Quidway] sysname UPEG
[UPEG] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 20 and VLAN 21 and data VLANs 100
to 300 in domain 3.
[UPEG] stp region-configuration
[UPEG-mst-region] instance 1 vlan 20 21 100 to 300
l # Configure UPE B.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE B. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEB] interface gigabitethernet 1/0/0
[UPEB-GigabitEthernet1/0/0] port link-type trunk
[UPEB-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet1/0/0] stp disable
[UPEB-GigabitEthernet1/0/0] quit
[UPEB] interface gigabitethernet 2/0/0
[UPEB-GigabitEthernet2/0/0] port link-type trunk
[UPEB-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet2/0/0] stp disable
[UPEB-GigabitEthernet2/0/0] quit
l Configure UPE C.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE C. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEC] interface gigabitethernet 1/0/0
[UPEC-GigabitEthernet1/0/0] port link-type trunk
[UPEC-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet1/0/0] stp disable
[UPEC-GigabitEthernet1/0/0] quit
[UPEC] interface gigabitethernet 2/0/0
[UPEC-GigabitEthernet2/0/0] port link-type trunk
[UPEC-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet2/0/0] stp disable
[UPEC-GigabitEthernet2/0/0] quit
l Configure UPE D.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE D. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPED] interface gigabitethernet 1/0/0
[UPED-GigabitEthernet1/0/0] port link-type trunk
[UPED-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPED-GigabitEthernet1/0/0] stp disable
[UPED-GigabitEthernet1/0/0] quit
[UPED] interface gigabitethernet 1/0/1
[UPED-GigabitEthernet1/0/1] port link-type trunk
[UPED-GigabitEthernet1/0/1] port trunk allow-pass vlan 100 to 300
[UPED-GigabitEthernet1/0/1] stp disable
[UPED-GigabitEthernet1/0/1] quit
[UPED] interface gigabitethernet 2/0/0
[UPED-GigabitEthernet2/0/0] port link-type trunk
[UPED-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPED-GigabitEthernet2/0/0] stp disable
[UPED-GigabitEthernet2/0/0] quit
[UPED] interface gigabitethernet 2/0/1
[UPED-GigabitEthernet2/0/1] port link-type trunk
[UPED-GigabitEthernet2/0/1] port trunk allow-pass vlan 100 to 300
[UPED-GigabitEthernet2/0/1] stp disable
[UPED-GigabitEthernet2/0/1] quit
l Configure UPE E.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE E. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEE] interface gigabitethernet 1/0/0
[UPEE-GigabitEthernet1/0/0] port link-type trunk
[UPEE-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEE-GigabitEthernet1/0/0] stp disable
[UPEE-GigabitEthernet1/0/0] quit
[UPEE] interface gigabitethernet 2/0/0
[UPEE-GigabitEthernet2/0/0] port link-type trunk
[UPEE-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEE-GigabitEthernet2/0/0] stp disable
[UPEE-GigabitEthernet2/0/0] quit
l Configure UPE F.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE F. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEF] interface gigabitethernet 1/0/0
[UPEF-GigabitEthernet1/0/0] port link-type trunk
[UPEF-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEF-GigabitEthernet1/0/0] stp disable
[UPEF-GigabitEthernet1/0/0] quit
[UPEF] interface gigabitethernet 2/0/0
[UPEF-GigabitEthernet2/0/0] port link-type trunk
[UPEF-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEF-GigabitEthernet2/0/0] stp disable
[UPEF-GigabitEthernet2/0/0] quit
l Configure UPE G.
# Disable the STP function on the interfaces to be added to the RRPP ring on UPE G. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEG] interface gigabitethernet 1/0/0
[UPEG-GigabitEthernet1/0/0] port link-type trunk
[UPEG-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEG-GigabitEthernet1/0/0] stp disable
[UPEG-GigabitEthernet1/0/0] quit
[UPEG] interface gigabitethernet 2/0/0
[UPEG-GigabitEthernet2/0/0] port link-type trunk
[UPEG-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEG-GigabitEthernet2/0/0] stp disable
[UPEG-GigabitEthernet2/0/0] quit
Step 3 Create RRPP domains and configure the protected VLANs and control VLANs.
l Configure UPE A.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEA-rrpp-domain-region1] control-vlan 5
[UPEA-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEA-rrpp-domain-region2] control-vlan 10
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEB-rrpp-domain-region1] control-vlan 5
[UPEB-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEB-rrpp-domain-region2] control-vlan 10
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEC-rrpp-domain-region1] control-vlan 5
[UPEC-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEC-rrpp-domain-region2] control-vlan 10
[UPEC-rrpp-domain-region2] quit
l Configure UPE D.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPED] rrpp domain 1
[UPED-rrpp-domain-region1] protected-vlan reference-instance 1
[UPED-rrpp-domain-region1] control-vlan 5
[UPED-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPED] rrpp domain 2
[UPED-rrpp-domain-region2] protected-vlan reference-instance 2
[UPED-rrpp-domain-region2] control-vlan 10
[UPED-rrpp-domain-region2] quit
l Configure UPE E.
# Configure VLAN 20 as the control VLAN in domain 3.
[UPEE] rrpp domain 3
[UPEE-rrpp-domain-region3] protected-vlan reference-instance 1
[UPEE-rrpp-domain-region3] control-vlan 20
[UPEE-rrpp-domain-region3] quit
l Configure UPE F.
# Configure VLAN 20 as the control VLAN in domain 3.
[UPEF] rrpp domain 3
[UPEF-rrpp-domain-region3] protected-vlan reference-instance 1
[UPEF-rrpp-domain-region3] control-vlan 20
[UPEF-rrpp-domain-region3] quit
l Configure UPE G.
# Configure VLAN 20 as the control VLAN in domain 3.
[UPEG] rrpp domain 3
[UPEG-rrpp-domain-region3] protected-vlan reference-instance 1
[UPEG-rrpp-domain-region3] control-vlan 20
[UPEG-rrpp-domain-region3] quit
# Configure UPE A as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE A.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEA-rrpp-domain-region2] ring 1 enable
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure UPE B as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE B.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEB-rrpp-domain-region1] ring 1 enable
[UPEB-rrpp-domain-region1] quit
# Configure UPE B as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE B.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
l Configure UPE C.
# Configure UPE C as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEC-rrpp-domain-region1] ring 1 enable
[UPEC-rrpp-domain-region1] quit
# Configure UPE C as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEC-rrpp-domain-region2] ring 1 enable
[UPEC-rrpp-domain-region2] quit
l Configure UPE D.
# Configure UPE D as the master node of ring 1 in domain 1. Configure GE 1/0/0 as the primary
port and GE 2/0/0 as the secondary port.
[UPED] rrpp domain 1
[UPED-rrpp-domain-region1] ring 1 node-mode master primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPED-rrpp-domain-region1] ring 1 enable
[UPED-rrpp-domain-region1] quit
# Configure UPE D as the master node of ring 1 in domain 2. Configure GE 2/0/0 as the primary
port and GE 1/0/0 as the secondary port.
[UPED] rrpp domain 2
[UPED-rrpp-domain-region2] ring 1 node-mode master primary-port gigabitethernet
2/0/0 secondary-port gigabitethernet 1/0/0 level 0
[UPED-rrpp-domain-region2] ring 1 enable
[UPED-rrpp-domain-region2] quit
# Configure UPE D as a transit node of ring 1 in domain 3 and specify primary and secondary
ports on UPE D.
[UPED] rrpp domain 3
[UPED-rrpp-domain-region3] ring 1 node-mode transit primary-port gigabitethernet
1/0/1 secondary-port gigabitethernet 2/0/1 level 0
[UPED-rrpp-domain-region3] ring 1 enable
[UPED-rrpp-domain-region3] quit
l Configure UPE E.
# Configure UPE E as a transit node of ring 1 in domain 3 and specify primary and secondary
ports on UPE E.
[UPEE] rrpp domain 3
[UPEE-rrpp-domain-region3] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEE-rrpp-domain-region3] ring 1 enable
[UPEE-rrpp-domain-region3] quit
l Configure UPE F.
# Configure UPE F as the master node of ring 1 in domain 3. Configure GE 1/0/0 as the primary
port and GE 2/0/0 as the secondary port.
l Configure UPE G.
# Configure UPE G as a transit node of ring 1 in domain 3 and specify primary and secondary
ports on UPE G.
[UPEG] rrpp domain 3
[UPEG-rrpp-domain-region3] ring 1 node-mode transit primary-port gigabitethernet
1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEG-rrpp-domain-region3] ring 1 enable
[UPEG-rrpp-domain-region3] quit
After configuring an RRPP ring, you need to enable RRPP on each node on the ring to activate
the RRPP ring. The configuration procedure is as follows:
l Configure UPE A.
l # Configure UPE B.
l Configure UPE C.
l Configure UPE D.
l Configure UPE E.
l Configure UPE F.
l Configure UPE G.
After the preceding configurations are complete and the network topology becomes stable,
perform the following operations to verify the configuration. Here, UPE D is taken for example.
l Run the display rrpp brief command on UPE D. The following information is displayed:
[UPED] display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 M GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 M GigabitEthernet2/0/0 GigabitEthernet1/0/0 Yes
Domain Index : 3
Control VLAN : major 20 sub 21
Protected VLAN : Reference Instance 1 to 3
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 T GigabitEthernet1/0/1 GigabitEthernet2/0/1 Yes
The preceding information shows that the RRPP protocol is enabled on UPE D.
In domain 1:
VLAN 5 is the control VLAN and VLANs mapping instance 1 are the protected VLANs.
UPE D is the master on ring 1; GE 1/0/0 is the primary port; GE 2/0/0 is the secondary port.
In domain 2:
VLAN 10 is the control VLAN and VLANs mapping instance 2 are the protected VLANs.
UPE D is the master node on ring 1. The primary port is GE 2/0/0, and the secondary port is GE
1/0/0.
In domain 3:
VLAN 20 is the control VLAN and VLANs mapping instance 1 to 3 are the protected VLANs.
UPE D is a transit node on ring 1. The primary port is GE 1/0/1, and the secondary port is GE
2/0/1.
l Run the display rrpp verbose domain command on UPE D. You can obtain the following
results:
# View detailed information about UPE D in domain 1.
[UPED] display rrpp verbose domain 1
Domain Index : 1
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active: Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port : GigabitEthernet2/0/0 Port status: BLOCKED
The preceding information shows that VLAN 5 is the control VLAN in domain 1 and VLANs
mapping instance 1 are the protected VLANs.
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active: Yes
Primary port : GigabitEthernet2/0/0 Port status: UP
Secondary port : GigabitEthernet1/0/0 Port status: BLOCKED
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and VLANs
mapping instance 2 are the protected VLANs.
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active: Yes
Primary port : GigabitEthernet1/0/1 Port status: UP
Secondary port : GigabitEthernet2/0/1 Port status: UP
The preceding information shows that VLAN 20 is the control VLAN in domain 3 and VLANs
mapping instance 1 to 3 are the protected VLANs.
----End
Configuration Files
l Configuration file of UPE A
#
sysname UPEA
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
l Configuration file of UPE C
#
sysname UPEC
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
Return
l Configuration file of UPE D
#
sysname UPED
#
vlan batch 5 to 6 10 to 11 20 to 21 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
instance 3 vlan 20 to 21
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode master primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode master primary-port GigabitEthernet2/0/0 secondary-port
GigabitEthernet1/0/0 level 0
ring 1 enable
rrpp domain 3
control-vlan 20
protected-vlan reference-instance 1 2 3
ring 1 node-mode transit primary-port GigabitEthernet1/0/1 secondary-port
GigabitEthernet2/0/1 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet2/0/1
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
return
#
sysname UPEF
#
vlan batch 20 to 21 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 20 to 21 100 to 300
active region-configuration
#
rrpp domain 3
control-vlan 20
protected-vlan reference-instance 1
ring 1 node-mode master primary-port GigabitEthernet1/0/0 secondary-port
GigabitEthernet2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
return
This chapter describes Ethernet OAM and its configurations, and how to implement link-level
Ethernet OAM detection and network-level Ethernet OAM detection to improve network
reliability.
Background
The Ethernet has developed as the major Local Area Network (LAN) technology because it
features easy implementation and low cost. Recently, along with the applications of Gigabit
Ethernet and the later 10-Gigabit Ethernet, Ethernet has been extended to the Wide Area Network
(WAN).
Compared with WANs, reliability and stability are not highly required for LANs. Therefore, a
mechanism for network Operations, Administration and Maintenance (OAM) is always required
for the Ethernet. The lack of the OAM mechanism prevents Ethernet from effectively functioning
as the Internet Service Provider (ISP) network. In this manner, Ethernet OAM is becoming a
trend.
Functions
Ethernet OAM has the following functions:
l Fault management
Ethernet OAM can detect the network connectivity by sending detection messages
regularly or through manual triggering.
Ethernet OAM can locate faults on the Ethernet by using means similar to the Packet
Internet Groper (ping) and traceroute tools on IP networks.
Ethernet OAM can work with the Automatic Protection Switching (APS) to trigger
protection switching when detecting connectivity faults. This ensures service
interruption in no more than 50 ms to achieve carrier-class reliability.
l Performance management
Performance management is used to measure the packet loss ratio, delay, and jitter during
the transmission of packets. It also collects statistics on various kinds of traffic.
Performance management is implemented at the access point of users. By using the
performance management tools, the ISP can monitor the network status and locate faults
through the Network Management System (NMS). The ISP checks whether the forwarding
capacity of the network complies with the Service Level Agreement (SLA) signed with
users.
Ethernet OAM improves network management and maintenance capabilities on the Ethernet
and guarantees a steady network.
EFM OAM
802.3ah, also referred to as Ethernet in the First Mile (EFM), defines the specifications of the
Ethernet physical layer and OAM used for user access. EFM OAM detects the link in the last
mile. EFM OAM is a link-level OAM mechanism. The S9700 provides the following EFM OAM
functions:
l Peer discovery
When the EFM OAM function is enabled on an interface of the S9700 and the peer interface,
the two interfaces match their EFM OAM configurations by sending and responding to
OAM Protocol Data Units (OAMPDUs). If the EFM OAM configurations on both
interfaces match, the two interfaces start the EFM OAM handshake. During the handshake,
the two interfaces send OAMPDUs periodically to maintain the neighbor relationship.
l Link monitoring
When an interface detects an errored frame event or an errored frame error seconds event,
the interface sends an OAMPDU to notify the peer device of the event.
An errored frame event occurs when the number of errored frames detected on an
interface reaches or exceeds the specified threshold within a certain period.
An errored code event occurs when the number of errored codes reaches or exceeds the
specified threshold within a certain period.
An errored frame seconds occurs when that the number of errored frame seconds
detected on an interface reaches or exceeds the specified threshold within a certain
period.
The detection duration is measured in seconds. If at least one errored frame is detected
within a second, this second is called an errored frame second.
l Fault notification
When an errored frame event or severe fault event occurs on the local device, the local node
sends fault notification messages to notify the peer device. At the same time, the local
device records the fault event in the log and reports the fault to the NMS. Fault events
include the following:
System reboot
LPU reset
Fault of a physical link
Timeout of OAMPDUs
Errors reported by the OAM module
Power off
When receiving the notification message, the peer records the event contained in the
message to the log and reports it to the NMS.
l Remote loopback
When a local interface sends non-OAMPDUs to the peer, the peer does not forward the
non-OAMPDUs according to their destination MAC addresses. Instead, the peer loops back
non-OAMPDUs to the local interface. This is called remote loopback. Remote loopback
can be used to locate the link fault and test the link quality.
Each interface enabled with EFM OAM works in a certain mode. EFM OAM has two operation
modes: active mode and passive mode. OAM discovery and remote loopback are initiated only
by the interface in active mode.
Ethernet CFM
802.1ag, referred to as Connectivity Fault Management (CFM), defines the OAM function used
to detect the connectivity of the Ethernet bearer network.
l Terms
MD
A maintenance domain (MD) is a network or a part of the network where CFM is
performed. Devices in an MD are managed by a single ISP.
Default MD
According to IEEE Standard 802.1ag-2007, each device can be configured with one
default MD. The default MD must be of a higher level than all MDs to which MEPs
configured on the local device belong. In addition, the default MD must be of the same
level as the high-level MD. The default MD transmits high-level CCMs and creates
MIPs to reply LTR packets.
MA
A maintenance association (MA) is a part of an MD. An MD can be divided into one
or multiple MAs. On the S9700, an MA is associated with a VLAN. Ethernet CFM
checks connectivity in each MA.
MEP
A maintenance association end point (MEP) is an edge node of an MA.
For a network device running Ethernet CFM, its MEP is called the local MEP. For the
other devices in the same MA, their MEPs are called the remote maintenance association
end points (RMEPs).
CAUTION
One Trunk interface can be configured with only one MEP.
MIP
A maintenance association intermediate point (MIP) is an internal node of an MA.
MIPs reside on the interfaces on the S9700 and are automatically created by the
S9700.
l Connectivity check
Ethernet CFM divides a network into one MD or multiple MDs. Each MD is divided into
one MA or multiple MAs. The MEPs in an MA exchange Continuity Check messages
(CCMs) periodically to detect the connectivity between them.
l Fault acknowledgement
802.1ag MAC ping
Similar to ping, 802.1ag MAC ping sends test packets and waits for a reply to test
whether the destination device is reachable. 802.1ag MAC ping is initiated by a MEP
and destined for an RMEP or MIP in the same MA.
Gmac ping
Gmac ping works similarly to 802.1ag MAC ping. A MEP, however, is not required to
initiate Gmac ping. The destination node may not be an RMEP or a MIP. Gmac ping
can be implemented without configuring the MD, MA, or MEP on the source device,
the intermediate device, and the destination device.
l Fault location
802.1ag MAC trace
Similar to traceroute (or tracert for short), 802.1ag MAC trace sends test packets and
waits for a reply to test the path between the local device and the destination device and
to locate faults. 802.1ag MAC trace is initiated by a MEP and destined for an RMEP or
MIP in the same MA.
Gmac trace
Gmac trace works similarly to 802.1ag MAC trace. A MEP, however, is not required
to initiate Gmac trace. The destination node may not be an RMEP or a MIP. That is,
Gmac trace can be implemented without configuring the MD, MA, or MEP on the source
device, the intermediate device, and the destination device. All the intermediate devices
can respond with a Linktrace Reply (LTR).
Fault Association
You can configure the following types of association between an EFM OAM module and an
interface.
l After EFM OAM detects a fault, the OAM management module blocks the interface
intermittently. That is, the module shuts down the interface for seven seconds, and then it
unblocks the interface.
l When EFM OAM detects a fault, the interface bound to the EFM OAM module is shut
down or a Port-Down event is sent. When the interface is Down, a fault notification message
is sent to the EFM OAM module of the peer device through association.
l Association between an EFM OAM module and an interface
After association between an EFM OAM module and an interface is configured, when the
EFM OAM module detects a link fault, no packets except OAMPDUs can be forwarded
through the bound interface, and Layer 2 and Layer 3 services are blocked. Therefore, the
association between an EFM OAM module and an interface may greatly affect services.
When the current interface detects link fault recovery through EFM OAM, all packets can
be forwarded on the interface and Layer 2 and Layer 3 services are unblocked.
In addition, you can configure the association between EFM OAM and an interface only
after EFM OAM at both ends are in detect state.
l Association between EFM OAM modules
After a fault is detected, the OAM management module transmits a fault notification
message through association.
An EFM OAM module on an interface transmits a fault message to an EFM OAM
module on the other interface.
EFM OAM modules on the two interfaces report faults to each other.
l Association between an Ethernet CFM module and an interface
You can configure the following types of association between an Ethernet CFM module
and an interface.
When a connectivity fault is detected on the link between the MEP and the RMEP in
an MA, the OAM management module blocks the interface intermittently. That is, the
module shuts down the interface for seven seconds, and then unblocks the interface.
After Ethernet CFM detects a fault, the interface associated with the Ethernet CFM
module is shut down or a Down event is sent. When the interface becomes Down, the
Ethernet CFM status bound to the interface also becomes Down.
l Association between an Ethernet CFM module and an EFM OAM module
When the Ethernet CFM module detects a fault in an MA, the OAM management module
reports the fault to the peer device enabled with EFM OAM through the interface. When
the EFM OAM module detects a fault, the OAM management module reports the fault to
the MA through the interface. The fault report mode can be the following:
An Ethernet CFM module sends a fault notification message to an EFM OAM module.
An EFM OAM module a fault notification message to an Ethernet CFM module.
An Ethernet CFM module and an EFM OAM module report faults to each other.
l Association between Ethernet CFM modules
When the Ethernet CFM module detects a fault in an MA, the OAM management module
reports the fault to the bound MA at the other side. The fault report mode can be the
following:
An Ethernet CFM module at one side sends a fault notification message to an Ethernet
CFM module at the other side.
Ethernet CFM modules at both sides report faults to each other.
l Association between an Ethernet CFM module and a BFD session
When the Ethernet CFM module detects a fault in an MA, the OAM management module
reports the fault to the bound BFD session. When a BFD session detects a fault, it reports
the fault to the bound MA. The fault report mode can be the following:
An Ethernet CFM module transmits a fault notification message to a BFD session.
The BFD session transmits the fault notification message to the Ethernet CFM module.
An Ethernet CFM module and a BFD session report faults to each other.
l Association between an EFM OAM module and a BFD session
When an EFM OAM module detects a fault in an MA, the OAM management module
reports the fault to the bound BFD session through association. When a BFD session detects
a fault, it reports the fault to the bound MA through association. The fault report mode can
be the following:
An EFM OAM module transmits a fault notification message to a BFD session.
The BFD session transmits the fault notification message to the EFM OAM module.
An EFM OAM module and a BFD session report faults to each other.
You cannot configure association between an Ethernet OAM module and Ethernet 0/0/0.
Applicable Environment
As shown in Figure 5-1, you can perform the configuration task to detect the connectivity
between two directly connected devices.
interface 1 interface 2
(Active mode) (Passive mode)
Pre-configuration Tasks
None.
Data Preparation
To configure EFM OAM, you need the following data.
No. Data
Context
Do as follows on the devices at both ends of the link:
Procedure
Step 1 Run:
system-view
Step 2 Run:
efm enable
----End
Context
NOTE
The working mode of EFM OAM on the interface can be configured only after EFM OAM is enabled
globally and before EFM OAM is enabled on the interface. The working mode of EFM OAM on the
interface cannot be modified after EFM OAM is configured on the interface.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
efm mode { active | passive }
At least one interface at both ends of the link must be configured to work in active mode. The
interface in active mode initiates OAM discovery after EFM OAM is enabled on the interface.
Instead of initiating OAM discovery, the interface in passive mode waits for an OAMPDU sent
from the interface in active mode. If both interfaces are configured to work in active mode, you
can implement link detection. If both interfaces are configured to work in passive mode, OAM
discovery fails.
NOTE
You must run the bpdu bridge enable command on the interface configured with EFM OAM to enable
the BPDU tunnel function; otherwise, OAM PDUs are discarded.
----End
Context
Do as follows on the devices at both ends of the link:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
----End
Context
Do as follows on the devices at both ends of the link:
Procedure
Step 1 Run:
system-view
----End
Prerequisites
The configurations of the EFM OAM function are complete.
Procedure
l Run the display efm { all | interface interface-type interface-number } command to check
information about EFM OAM on an interface.
l Run the display efm session { all | interface interface-type interface-number } command
to check the status of the EFM OAM protocol on an interface.
----End
Example
Run the display efm command. You can view all the EFM OAM configurations on the local
interface and part of the EFM OAM configurations on the remote interface. For example:
<Quidway> display efm interface gigabitethernet2/0/1
Item Value
----------------------------------------------------
Interface: GigabitEthernet2/0/1
EFM Enable Flag: enable
Mode: active
Loopback IgnoreRequest: no
OAMPDU MaxSize: 128
OAMPDU Timeout: 3000
ErrCodeNotification: disable
ErrCodePeriod: 1
ErrCodeThreshold: 1
ErrFrameNotification: disable
ErrFramePeriod: 1
ErrFrameThreshold: 1
ErrFrameSecondNotification: disable
ErrFrameSecondPeriod: 60
ErrFrameSecondThreshold: 1
Hold Up Time: 0
ThresholdEvtTriggerErrDown: disable
TriggerIfDown: disable
TriggerMacRenew: disable
Remote MAC: 00e0-fc7f-724f
Remote EFM Enable Flag: enable
Remote Mode: passive
Remote MaxSize: 128
Remote Loopback IgnoreRequest: no
Remote State: --
Run the display efm session command. If the EFM OAM protocol on the interface is in the
Detect state, it means that the configuration succeeds. The two interfaces succeed in negotiation
and enter the Detect state.
<Quidway> display efm session interface gigabitethernet2/0/1
Interface EFM State Loopback Timeout
--------------------------------------------------------------------
GigabitEthernet2/0/1 detect --
Applicable Environment
Link monitoring can be used to detect and locate faults at the link layer in different scenarios.
It uses the event notification OAMPDU. When a link fails, the local link notifies the remote
OAM entity of the fault after detecting a fault through events.
Pre-configuration Tasks
Before configuring EFM OAM link monitoring, complete the following tasks:
l Configuring EFM OAM
Data Preparation
To configure EFM OAM link monitoring, you need the following data.
No. Data
1 (Optional) Period and threshold for detecting errored frames of EFM OAM
2 (Optional) Period and threshold for detecting errored codes of EFM OAM
3 (Optional) Period and threshold for detecting errored frame seconds of EFM OAM
Context
Do as follows on the devices at one end or both ends of the link:
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on the devices at one end or both ends of the link:
Procedure
Step 1 Run:
system-view
----End
Context
An errored frame second is a one-second interval during which at least one errored frame is
detected. It specifies the seconds when errored frames are deteced.
Do as follows on the devices at one end or both ends of the link:
Procedure
Step 1 Run:
system-view
The period for detecting errored frame seconds on the interface is set.
By default, the period for detecting errored frame seconds on an interface is 60 seconds.
Step 4 Run:
efm error-frame-second threshold threshold
The threshold for detecting errored frame seconds on the interface is set.
By default, the threshold for detecting errored frame seconds on an interface is 1.
Step 5 Run:
efm error-frame-second notification enable
----End
Context
When an interface on a link is enabled to detect errored frames, errored codes, or errored frame
seconds, the link is considered unavailable, if the number of errored frames, errored codes, or
errored frame seconds detected by the interface reaches or exceeds the threshold within a set
period. The errored frame event, errored code event, and errored frame seconds summary event
are called threshold crossing events. In this case, you can associate a threshold crossing event
with the interface so that the system sets the administrative state of the interface to Down. As a
result, the link actually goes Down and all services on the interface are interrupted.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
efm threshold-event trigger error-down
----End
Follow-up Procedure
After a threshold crossing event is associated with an interface, you can configure the interface
to go administratively Up by using either of the following methods:
l Run the efm holdup-timer command in the interface view to configure the interface to go
administratively Up after the auto-recovery delay.
l Run the shutdown command and then the undo shutdown command in the interface view
to restore the administrative state of the interface to Up.
Prerequisites
The configurations of the EFM OAM link monitoring function are complete.
Procedure
l Run the display efm { all | interface interface-type interface-number } command to check
information about EFM OAM on an interface.
l Run the display efm session { all | interface interface-type interface-number } command
to check the status of the EFM OAM protocol on an interface.
----End
Example
Run the display efm command. You can view information about link monitoring on the
interface. For example:
<Quidway> display efm interface gigabitethernet1/0/0
Item Value
----------------------------------------------------------
Interface: GigabitEthernet1/0/0
EFM Enable Flag: enable
Mode: active
Loopback IgnoreRequest: no
OAMPDU MaxSize: 128
OAMPDU Timeout: 3000
ErrCodeNotification: enable
ErrCodePeriod: 1
ErrCodeThreshold: 1
ErrFrameNotification: enable
ErrFramePeriod: 1
ErrFrameThreshold: 1
ErrFrameSecondNotification: enable
ErrFrameSecondPeriod: 60
ErrFrameSecondThreshold: 1
Hold Up Time: 0
ThresholdEvtTriggerErrDown: enable
TriggerIfDown: disable
TriggerMacRenew: disable
RemoteMAC 00e0-fc7f-7258
Remote EFM Enable Flag enable
Remote Mode passive
Remote MaxSize 128
Remote Loopback IgnoreRequest: no
Remote State: --
Applicable Environment
CAUTION
Forwarding of service data is affected after EFM OAM remote loopback is enabled. Enable EFM
OAM remote loopback on the link that need not forward service data.
You can perform the configuration task to detect the packet loss ratio on a link.
As shown in Figure 5-2, enable EFM OAM on Switch A and SwitchB and enable remote
loopback on GE 1/0/1 on Switch A. Send test packets from Switch A to SwitchB. You can get
the packet loss ratio on the link by observing the receiving of test packets on Switch A.
Figure 5-2 Diagram of testing the packet loss ratio on the link
Test packets
EFM OAM
SwitchA SwitchB
GE 1/0/1 GE2/0/1
(Active mode) (Passive mode)
Pre-configuration Tasks
Before testing the packet loss ratio on the link, complete the following tasks:
Data Preparation
To test the packet loss ratio on the link, you need the following data.
No. Data
2 Destination MAC address, VLAN ID, outbound interface, size, number, and sending
rate of test packets
Context
EFM OAM remote loopback is a method of monitoring link performance. Its working process
is as follows:
1. An OAM entity working in active mode initiates a remote loopback request to the remote
OAM entity.
2. The remote OAM entity ignores or accepts the request.
Procedure
Step 1 Enable a device that initiates a request with the remote loopback function.
1. Run:
system-view
CAUTION
Remote loopback may cause an exception in forwarding of data packets and protocol
packets; therefore, you are not advised to configure other services on the loopback interface.
By default, the timeout period for remote loopback is 20 minutes. After the timeout period,
remote loopback is automatically disabled. You can set the timeout period to 0 for a link
to remain in the remote loopback state.
The following requirements must be met to implement remote loopback:
l The EFM OAM protocols on the local interface and the peer are in the Detect state.
l EFM OAM on the local interface works in active mode.
Before changing the value of timeout timeout, run the efm loopback stop command to
disable remote loopback on the interface.
You can use the display efm session command to check whether the EFM OAM protocols
running on the local interface and the peer are in the Detect state.
Step 2 (Optional) Configure a receiving device to ignore the remote loopback request.
1. Run:
system-view
By default, the interface accepts and processes the remote loopback request.
----End
Context
Do as follows on the device with an active interface on the link:
Procedure
Step 1 Run:
system-view
----End
Follow-up Procedure
The parameter in this command cannot be modified when test packets are being sent.
Press Ctrl+C to stop sending test packets.
Context
Do as follows on the device with an active interface on the link:
Procedure
Step 1 Run:
display test-packet result
You can obtain the packet loss ratio on the link based on the preceding data.
----End
Context
Do as follows on the device with an active interface on the link:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
efm loopback stop
If EFM OAM remote loopback is left enabled, the link fails to forward service data for a long
time. To prevent this, EFM OAM remote loopback on the S9700 can be automatically disabled
after a timeout period. By default, the timeout period for remote loopback is 20 minutes. After
20 minutes, remote loopback stops. If you need to disable remote loopback manually, perform
the preceding operation procedures.
----End
Procedure
Step 1 Run the display efm session { all | interface interface-type interface-number } command to
check the status of the EFM OAM session on an interface.
----End
Example
Run the display efm session command on the device with an active interface on the link. If the
EFM OAM protocol on the active interface is in the Loopback (control) state, which indicates
that the active interface initiates remote loopback, the configuration is successful.
<SwitchA> display efm session interface gigabitethernet 1/0/1
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet1/0/1 Loopback(control) 20
Run the display efm session command on the device with a passive interface on the link. If the
EFM OAM protocol on the passive interface is in the Loopback (be controlled) state, which
indicates that the passive interface responds to remote loopback, it indicates that the
configuration is successful.
<SwitchB> display efm session interface gigabitethernet 2/0/1
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet2/0/1 Loopback(be controlled) --
Run the display efm session command on either of the devices on the link. If the EFM OAM
protocol on the interface is in the Detect or Discovery state, the configuration is successful.
<SwitchA> display efm session interface gigabitethernet 1/0/1
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet1/0/1 detect --
Applicable Environment
As shown in Figure 5-3, EFM OAM is enabled on Switch A and Switch B. EFM OAM is
associated with GE 1/0/1 on Switch A. When the EFM OAM module on Switch A detects a
connectivity fault between Switch A and Switch B, no other packets except EFM protocol
packets can be forwarded on the interface GE 1/0/1 and Layer 2 and Layer 3 services are blocked.
Therefore, the association of EFM OAM and the current interface may greatly affect services.
When the current interface detects the link fault recovery through EFM OAM, all packets can
be forwarded on the interface and Layer 2 and Layer 3 services are unblocked.
Pre-configuration Tasks
Before associating EFM OAM with an interface, complete the following tasks:
Data Preparation
To associate EFM OAM with an interface, you need the following data.
No. Data
Context
After EFM OAM is enabled on an interface, the status of this interface changes when the interface
receives an OAM PDU control request packet with the Link Fault Status flag.
There are two ways to associate EFM OAM with an interface:
l Associating an error event with an interface and setting the interface to the blocking state
when the error event occurs.
l Associating an error event with an interface and setting the interface to the disabled state
when the error event occurs.
l Associating a threshold crossing event with an interface.
Do as follows on the devices at one end or both ends of the link:
Procedure
l Associate an error event with an interface and set the interface to the blocking state when
the error event occurs.
Setting the interface to the blocking state is applicable to a scenario where traffic can be
switched back automatically after the faulty link recovers. After the associated interface is
blocked, all traffic is interrupted except EFM protocol packets.
1. Run:
system-view
The efm trigger if-down command is valid in the interface view only after EFM OAM
is enabled on the interface with the efm enable command.
When EFM OAM is associated with the current interface and detects a link fault on
the current interface, no other packets except EFM protocol packets can be forwarded
on the interface and Layer 2 and Layer 3 services are blocked. Therefore, the
association between EFM OAM and an interface may greatly affect services. When
EFM OAM on an interface detects link fault recovery, all packets can be forwarded
on the interface and Layer 2 and Layer 3 services are unblocked.
Before configuring the association between EFM OAM and an interface, ensure that
the EFM OAM protocol on both ends of the link is in the detect state.
If Layer 2 and Layer 3 services are blocked due to a misoperation, you can run the
undo efm trigger if-down command in the interface view to restore services.
l Associate an error event with an interface and set the interface to the disabled state when
the error event occurs.
1. Run:
system-view
After the efm trigger error-downcommand is used to associate an error event with
an interface, protocol status of the interface goes Down and all services on the interface
are interrupted when EFM OAM detects faults specified by critical-event, dying-
gasp, link-fault, or timeout. Even if EFM OAM on the interface detects link fault
recovery , protocol status of the interface do not change. Traffic can be switched back
only after you have manually detected link quality.
----End
Context
Do as follows on the device at one end or devices at both ends of a link:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
efm holdup-timer time
After the efm trigger if-down command is used to associate EFM OAM with an interface, when
EFM OAM detects a connectivity fault, the faulty state displayed on the interface remains
unchanged within the set timeout period of the faulty-state hold timer, even though the fault is
rectified. EFM OAM does not detect whether the connectivity fault is cleared until the timeout
period of the faulty-state hold timer expires.
----End
Prerequisites
The configurations of Associating EFM OAM with an Interface function are complete.
Procedure
Step 1 Run the display efm { all | interface interface-type interface-number } command to check the
EFM OAM configuration information on an interface.
----End
Example
Run the display efm command. If the item "TriggerIfDown" is displayed as "enable", it means
that the configuration succeeds.
<Quidway> display efm interface gigabitethernet 1/0/1
Item Value
----------------------------------------------------
Interface: GigabitEthernet1/0/1
EFM Enable Flag: enable
Mode: active
Loopback IgnoreRequest: no
OAMPDU MaxSize: 128
OAMPDU Timeout: 3000
ErrCodeNotification: disable
ErrCodePeriod: 1
ErrCodeThreshold: 1
ErrFrameNotification: disable
ErrFramePeriod: 1
ErrFrameThreshold: 1
ErrFrameSecondNotification: disable
ErrFrameSecondPeriod: 60
ErrFrameSecondThreshold: 1
Hold Up Time: 0
ThresholdEvtTriggerErrDown: enable
TriggerIfDown: enable
TriggerMacRenew: disable
Remote MAC: 0018-8200-0001
Remote EFM Enable Flag: enable
Remote Mode: passive
Remote MaxSize: 128
Remote Loopback IgnoreRequest: no
Remote State: --
Applicable Environment
As shown in Figure 5-4, EFM OAM is enabled on PE1 and PE2. When a fault occurs on a link
between PEs, a CE needs to detect the fault to ensure reliable service transmission. In this case,
the associations between EFM OAM sessions and interfaces can be configured. Take PE2 as an
example. When an EFM OAM session detects a link fault, the EFM OAM session on PE2 notifies
the OAM management module of the fault. This triggers the physical status of GE 1/0/2
associated with the EFM OAM session to become Down. CE2 can then detect the fault and
switch traffic to a backup path, which ensures reliable service transmission.
Figure 5-4 Networking diagram of the association between an EFM OAM session and an
interface
GE1/0/1 GE1/0/1
GE1/0/2 GE1/0/2
CE1 CE2
If the bidirectional association between an EFM OAM session and an interface is configured on
a PE, when GE 1/0/2 that connects PE2 to CE2 goes Down, the OAM management module
sends fault information to the EFM OAM session associated with GE 1/0/2. EFM OAMPDUs
carrying the fault information are sent to the OAM management module on PE1, which triggers
the physical status of GE 1/0/2 to become Down. CE1 can then detect the fault and switch traffic
to a backup path, which ensures reliable service transmission.
Pre-configuration Tasks
Before configuring the association between an EFM OAM session and an interface (in the OAM
management view), complete the following task:
Data Preparation
To configure the association between an EFM OAM session and an interface (in the OAM
management view), you need the following data.
No. Data
1 Type and number of each interface associated with an EFM OAM session
Context
During the configuration of the association between an EFM OAM session and an interface,
Step 3, Step 4, and Step 5 are optional and can be performed as required.
Procedure
Step 1 Run:
system-view
Step 2 Run:
oam-mgr
Step 3 Run:
oam-bind ingress efm interface interface-type1 interface-number1 trigger if-down
egress interface interface-type2 interface-number2
The unidirectional transmission of fault information from an EFM OAM session to an interface
is configured.
When the EFM OAM session detects a fault, the physical status of the interface associated with
the EFM OAM session becomes Down.
interface interface-type1 interface-number1 specifies the interface enabled with EFM OAM.
interface interface-type2 interface-number2 specifies the interface associated with the EFM
OAM session.
Step 4 Run:
oam-bind ingress interface interface-type1 interface-number1 egress efm interface
interface-type2 interface-number2 trigger if-down
The unidirectional transmission of fault information from an interface to an EFM OAM session
is configured.
When an interface associated with an EFM OAM session goes Down, the OAM management
module can send fault information to the EFM OAM session associated with the interface, and
then the EFM OAM session sends the fault information to the remote device.
interface interface-type1 interface-number1 specifies the interface associated with the EFM
OAM session.
interface interface-type2 interface-number2 specifies the interface enabled with EFM OAM.
Step 5 Run:
oam-bind efm interface interface-type1 interface-number1 trigger if-down interface
interface-type2 interface-number2
The bidirectional transmission of fault information between an EFM OAM session and an
interface is configured.
interface interface-type1interface-number1 specifies the interface enabled with EFM OAM.
interface interface-type2 interface-number2 specifies the interface associated with the EFM
OAM session.
NOTE
If Step 5 is performed, both the oam-bind ingress efm interface md-name ma ma-name trigger if-
down egress interface interface-type interface-number command and the oam-bind ingress interface
interface-type interface-number egress cfm md md-name ma ma-name trigger if-down command are
displayed in the configuration file, indicating fault notification in opposite directions.
----End
Prerequisites
All configurations of the association between an EFM OAM session and an interface are
complete.
Procedure
Step 1 Run the display this command in the OAM management view to check whether an EFM OAM
session and an interface are successfully associated.
----End
Example
Run the display this command. You can view all associations between EFM OAM sessions and
interfaces.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress interface GigabitEthernet1/0/1 egress efm interface
GigabitEthernet1/0/2 trigger if-down
oam-bind ingress efm interface GigabitEthernet1/0/2 trigger if-down egress
interface GigabitEthernet1/0/1
#
return
an interface of a device, the local EFM OAM session notifies the OAM management module of
the fault. The OAM management module sends fault information to the EFM OAM session on
the remote device through a corresponding outgoing interface. Then, the remote EFM OAM
session notifies the OAM management module on the remote device of the fault. In this manner,
the remote device is notified of the fault.
Applicable Environment
EFM OAM detects the link between directly-connected devices. As shown in Figure 5-5, EFM
OAM is enabled on Switch 1 and Switch 2, and Switch 3. When a fault occurs on the link between
Switch 2 and Switch 3, Switch 1 needs to detect the fault to ensure reliable service transmission.
In this case, you can configure the association between EFM OAM sessions. When the EFM
OAM session between Switch 2 and Switch 3 detects a link fault, the EFM OAM session on
Switch 2 notifies the OAM management module of the fault. The OAM management module
sends fault information to the remote EFM OAM session through GE 1/0/3. Then, the remote
EFM OAM session notifies Switch 1 of the fault. In this manner, the fault information is
transmitted between EFM OAM sessions, and traffic can be switched to a backup path, which
ensures reliable service transmission.
Figure 5-5 Networking diagram of the association between EFM OAM sessions
Pre-configuration Tasks
Before configuring the association between EFM OAM sessions, complete the following task:
l 5.3 Configuring Basic EFM OAM
Data Preparation
To configure the association between EFM OAM sessions, you need the following data.
No. Data
Context
During the configuration of the association between EFM OAM sessions, Step 3, and Step 4 are
optional and can be performed as required.
Procedure
Step 1 Run:
system-view
Step 2 Run:
oam-mgr
Step 3 Run:
oam-bind ingress efm interface interface-type interface-number egress efm
interface interface-type interface-number
The unidirectional transmission of fault information from one EFM OAM session to the other
EFM OAM session is configured.
Step 4 Run:
oam-bind efm interface interface-type interface-number efm interface interface-
type interface-number
The bidirectional transmission of fault information between two EFM OAM sessions is
configured.
NOTE
If Step 4 is performed, two oam-bind ingress efm interface interface-type interface-number egress efm
interface interface-type interface-number commands are displayed in the configuration file, indicating
fault notification in opposite directions.
----End
Prerequisites
All configurations of the association between EFM OAM sessions are complete.
Procedure
l Run the display this command in the OAM management view. You can view whether the
association between EFM OAM sessions is configured.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet1/0/1 egress efm interface
GigabitEthernet1/0/2
oam-bind ingress efm interface GigabitEthernet1/0/2 egress efm
interfaceGigabitEthernet1/0/1
#
return
----End
Applicable Environment
CFM is mainly used to monitor the connectivity of end-to-end links or direct links.
As shown in Figure 5-6, the Layer 2 network is connected to the Layer 3 network through PE3.
l CFM can be deployed to monitor the link connectivity between Layer 2 network devices,
for exmaple, between the CE and PE1 and between PE1 and PE2.
l CFM can be deployed to monitor the link connectivity between a Layer 2 network device
and a device connecting the Layer 2 network to the Layer 3 network, such as the link
connectivity between the CE and PE3 and between PE2 and PE3.
IP Core
CFM
MEP
MIP
You need to ensure that the following conditions be met before implementing automatic end-
to-end connectivity detection on the Ethernet:
l MDs are classified based on the ISP that manages the devices. All the devices that are
managed by a single ISP and enabled with CFM can be configured in an MD.
One default MD can be configured on each device, that it transmits high-level CCMs and
generates MIPs to reply LTR packets.
l MAs are classified based on different SIs. An MA is associated with a VLAN. A VLAN
generally maps to an SI. When the MA is classified, fault detection in connectivity can be
carried out on the network where an SI is transmitted.
l You need to determine the interfaces on which devices are located at the edge of the MA,
that is, to determine that MEPs must be configured on the interfaces on which devices.
When implementing automatic connectivity detection on directly connected links, you also need
to ensure that:
l The devices at both ends must be configured in the same MA within an MD.
l An MA can be either associated with a VLAN or not.
l MEPs must be configured on the interfaces at both ends of the directly connected link.
Pre-configuration Tasks
None.
Data Preparation
To configure Ethernet CFM, you need the following data.
No. Data
4 ID of a MEP, name of the interface on which the MEP resides, type of the MEP
5 (Optional) ID of an RMEP and MAC address of the interface where the RMEP resides
Context
Do as follows on the switch that requires Ethernet CFM:
Procedure
Step 1 Run:
system-view
----End
5.9.3 Creating an MD
An MD refers to a network or a part of a network under the management of Ethernet CFM. One
MD is managed by a single ISP.
Context
Do as follows on the switch that requires Ethernet CFM:
Procedure
Step 1 Run:
system-view
NOTE
The 802.1ag packets from a lower-level MD are discarded when being transmitted through the same level
MD or a higher-level MD. The 802.1ag packets from a higher-level MD can be transmitted through a lower-
level MD.
----End
Context
Do as follows on each S9700 device that requires Ethernet CFM:
Procedure
Step 1 Run:
system-view
NOTE
The default MD must be of a higher level than all MDs to which MEPs configured on the local device
belong. In addition, the default MD must be of the same level as the high-level MD. The default MD
transmits high-level CCMs and generates MIPs to reply LTR packets.
----End
5.9.5 Creating an MA
An MD can be divided into one or multiple MAs. Ethernet CFM detects connectivity of each
MA separately.
Context
Do as follows on the S9700 that requires Ethernet CFM:
Procedure
Step 1 Run:
system-view
----End
Follow-up Procedure
An MA is associated with a VLAN only.
l If you need to create multiple MAs in an MD, repeat Step 3 and Step 4.
l If you need to create multiple MAs in multiple MDs, repeat Step 2 to Step 4.
Context
When creating a MEP in an MA, pay attention to the following points:
l When creating an inward MEP, ensure that the MA has been associated with a VLAN and
the interface on which the MEP is located has been added to the VLAN. An inward MEP
sends 802.1ag packets through all the interfaces in the VLAN associated with the MA
except the interface on which the MEP is located. That is, an inward MEP broadcasts
802.1ag packets in the VLAN associated with the MA.
l Protocol packets sent from the outward MEP are forwarded by this interface.
The requirements for the MEPs created in an MA on the same S9700 are as follows:
Procedure
Step 1 Run:
system-view
----End
Follow-up Procedure
Perform the preceding steps as required:
l To create multiple MEPs in an MA, repeat Step 4.
l To create MEPs in multiple MAs, repeat Step 3 and Step 4.
l To create MEPs in multiple MDs, repeat Step 2 to Step 4.
Context
If you need to detect the connectivity between a device and an RMEP, you need to create the
RMEP first.
Do as follows on the edge devices of an MA:
Procedure
Step 1 Run:
system-view
Step 4 Run:
remote-mep mep-id mep-id [ mac mac-address ]
----End
Follow-up Procedure
l If you need to create multiple RMEPs in an MA, repeat Step 4.
l If you need to create multiple RMEPs in multiple MAs, repeat Step 3 and Step 4.
l If you need to create multiple RMEPs in multiple MDs, repeat Step 2 to Step 4.
Context
Do as follows on each S9700 where Ethernet CFM needs to be configured.
Procedure
Step 1 Run:
system-view
Step 2 run:
Run:
cfm md md-name [ format { no-md-name | dnsname-and-mdname | mac-address | md-
name } ] [ level level ]
Or, run:
cfm default md [ level level ]
The default MD view is displayed.
Step 3 Run:
mip create-type { default | explicit | none }
By default, the global MIP creation rule is none. An interface creates MIPs according to the
global MIP creation rule. If the MIP creation rule is set on an interface, the rule set on the interface
takes effect. The rule is classified into the following types:
l default: A MIP can be created on an interface if neither a MEP of a higher level nor a MIP
of a lower level is configured on the interface.
l explicit: A MIP cannot be created on an interface if no MEP of a lower level exists. A MIP
can be created on an interface if neither a MEP of a higher level nor a MIP of a lower level
exists.
l none: No MIP can be created on an interface.
If the MIP creation rule is default or explicit, a device creates a MIP automatically according
to the rule.
----End
Context
Do as follows on the edge devices on which MEPs reside within MAs:
Procedure
Step 1 Run:
system-view
The interval for the MEP sending or detecting CCMs within the local MA is set.
By default, the interval for the MEP sending or detecting CCMs within an MA is 1 second.
l The sending of CCMs is enabled by using the mep ccm-send enable command.
l The receiving of CCMs is enabled by using the remote-mep ccm-receive enable command.
If any of the preceding conditions is met in an MA, the interval for sending or detecting CCMs
in the MA cannot be modified. If you want to modify the interval for sending or detecting CCMs
in an MA, you must run the related undo commands to disable the sending or receiving of CCMs.
Step 5 Run:
mep ccm-send [ mep-id mep-id ] enable
The receiving of CCMs from the RMEP within the same MA is enabled on the local MEP.
By default, the local MEP cannot receive CCMs from the RMEP.
When the local device is enabled to receive CCMs from an RMEP, and if connectivity faults are
detected between the local device and the RMEP through CC detection, the local device prompts
alarms of RMEP connectivity.
If mep-id mep-id is not specified, all the MEPs in the MA are enabled to receive CCMs from
all the RMEPs.
----End
Follow-up Procedure
l If you need to enable the CC detection in multiple MAs, repeat Step 3 to Step 6.
l If you need to enable the CC detection in multiple MDs, repeat Step 2 to Step 6.
Context
Do as follows on each device:
Procedure
Step 1 Run:
system-view
----End
Procedure
l Run the display cfm md [ md-name ] command to check the configuration of an MD.
l Run the display cfm ma [ md md-name [ ma ma-name ] ] command to check detailed
information about an MA.
l Run the display cfm mep [ md md-name [ ma ma-name [ mep-id mep-id ] ] ] command
to check detailed information about a MEP.
l Run the display cfm remote-mep md md-name ma ma-name [ mep-id mep-id ] or display
cfm remote-mep [ md md-name [ ma ma-name ] ] [ cfm-state { up | down | disable } ]
command to check detailed information about an RMEP.
l Run the display cfm mip [ interface interface-type interface-number | level level ]
command to check information about a MIP.
----End
Example
If an MD is created successfully, you can view the MD and the level of the MD after running
the display cfm md command.
<Quidway> display cfm md md1
MD Name : md1
MD Name Format : string
Level : 0
MIP Create-type : none
SenderID TLV-type : defer
MA list :
MA Name : ma1
MA Name Format : string
Interval : 1000
Vlan ID : 10
VSI Name : --
L2VC ID : --
MA Name : ma
MA Name Format :
string
Interval : 1000
Vlan ID : --
VSI Name : --
L2VC ID :
--
# Display information about the MEP with the ID being 10 in ma1 of md1.
<Quidway> display cfm mep md md1 ma ma1 mep-id 10
MD Name : md1
MD Name Format : md-name
Level : 0
MA Name : ma1
MEP ID : 11
Vlan ID : 221
VSI Name : --
Interface Name : GigabitEthernet1/0/1
CCM Send : disabled
Direction : inward
MAC Address : 0018-2000-0083
Run the display cfm remote-mep command. If information about the RMEP is displayed, it
indicates that the configuration is successful.
<Quidway> display cfm remote-mep
The total number of RMEPs is : 2
The status of RMEPS : 2 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md2
Level : 7
MA Name : ma3
RMEP ID : 110
Vlan ID : 20
VSI Name : --
MAC : 0000-0121-0222
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
Alarm Status : None
MD Name : md2
Level : 4
MA Name : ma3
RMEP ID : 30
Vlan ID : --
VSI Name : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
Alarm Status : None
Run the display cfm mip command. If information about the MIP is displayed, the configuration
is successful.
<Quidway> display cfm mip
Interface Name Level
-----------------------------------
GigabitEthernet1/0/1GigabitEthernet0/0/1 0
Application Environment
If Ethernet CFM is enabled, you can adjust related parameters according to your requirement.
In different application environments, you can adjust the following parameters:
At the set RMEP activation time, if the local MEP does not receive any CCMs in three
consecutive sending intervals, this means that a connectivity fault occurs between the local
MEP and the RMEP. In addition, the local device displays the alarm of the RMEP
connectivity fault.
l Anti-jitter time during alarm restoration
All the RMEPs of each MA use the following timers:
Alarm generation timer: Its interval is set to the anti-jitter time during alarm generation.
Alarm restoration timer: Its interval is set to the anti-jitter time during alarm restoration.
When the RMEP detects an alarm, the alarm generation timer is activated. After the timer
expires, the alarm is notified to the device. When the RMEP detects that the alarm is
restored, the alarm restoration timer is activated. After the timer expires, the alarm
restoration event is notified to the device.
If the RMEP frequently detects the alarm and alarm restoration signals, this means that
alarm flapping occurs.
To suppress alarm flapping, you can set the anti-jitter time during alarm generation.
l VLAN or VLAN chain
All interfaces of the specified VLAN generate MIPs according to the configured MIP
generation rule in the MD.
Pre-configuration Tasks
None.
Data Preparation
To adjust parameters of Ethernet CFM, you need the following data.
No. Data
Context
Do as follows on each edge device in an MA:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
active time time
----End
Context
Do as follows on each device:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
alarm finish time time
----End
Context
Do as follows on each device:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
alarm occur time time
----End
Applicable Environment
When you need to check connectivity between two devices manually, you can configure the
local device to send test packets and wait response packets on the local device to check whether
the remote device is reachable. Based on the type of the link to be tested, you can adopt the
following methods to check the link connectivity:
l To check connectivity of the link between MEPs or between a MEP and a MIP in the same
MA on a network with MDs, MAs, and MEPs, use 802.1ag MAC ping.
l To check connectivity of the link between two devices on a network without MDs, MAs,
and MEPs, use Gmac ping.
Pre-configuration Tasks
Before performing 802.1ag MAC ping, complete the following task:
Data Preparation
To test connectivity of the Ethernet, you need the following data.
No. Data
3 (Optional) Number, size, timeout period, and outgoing interface of MAC ping packets
Context
Similar to the ping operation, 802.1ag MAC ping checks whether the destination device is
reachable by sending test packets and receiving response packets. In addition, the ping operation
time can be calculated at the transmitting end for network performance analysis.
Procedure
Step 1 A device is usually configured with multiple MDs and MAs. To precisely detect the connectivity
of a link between two or more devices, perform either of the following operations on the
switch with a MEP at one end of the link to be tested.
l MA view:
1. Run:
system-view
The connectivity between a MEP and a MEP or a MIP on other devices is tested.
l All views except the MA view:
Run:
The connectivity between a MEP and a MEP or a MIP on other devices is tested.
The intermediate device on the link to be tested only forwards LBMs and LBRs. In this manner,
the MD, MA, or MEP are not required to be configured on the intermediate device.
----End
Context
Perform Step 1 and Step 2 on the switchs at both ends of the link to be tested. Perform Step 3
on any of the switchs.
Procedure
Step 1 Run:
system-view
Step 2 Run:
ping mac enable
Step 3 Run:
ping mac mac-address vlan vlan-id [ interface interface-type interface-number | -c
count | -s packetsize |-t timeout | -p priority-value ] *
The connectivity between the switch and the remote device is tested.
A MEP is not required to initiate Gmac ping. The destination node does not need to be a MEP
or a MIP. Gmac ping can be implemented without configuring the MD, MA, or MEP on the
source device, the intermediate device, and the destination device.
The two devices must be enabled with 802.1ag of the same version. If the local device is enabled
with IEEE 802.1ag Draft 7 and the peer is enabled with IEEE Standard 802.1ag-2007, the local
device cannot ping through the peer device when the ping mac command is run to detect
connectivity of the link between the local and peer devices.
----End
Applicable Environment
By sending test packets on the local device and checking the received response packets, you can
check the reachability of the path from the local device to the destination device and locate the
faulty node on the path. You can use different methods according to the type of the link to be
tested:
l To locate faults on the link between MEPs or between a MEP and a MIP in the same MA
on a network where MDs, MAs, and MEPs are configured, use 802.1ag MAC trace.
l To locate faults on the link between two devices on a network where MDs, MAs, or MEPs
are not configured, use the Gmac trace.
Pre-configuration Tasks
Before performing 802.1ag MAC trace, complete the following task:
l Configuring Basic Ethernet CFM Functions
Data Preparation
To perform 802.1ag MAC trace, you need the following data.
No. Data
Context
Similar to tracerout or tracert, 802.1ag MAC trace tests the path between the local device and a
destination device or locates failure points by sending test packets and receiving reply packets.
Procedure
Step 1 A device is usually configured with multiple MDs and MAs. To determine the forwarding path
for sending packets from a MEP to another MEP or a MIP in an MA or failure points, perform
either of the following operations on the switch with a MEP at one end of the link to be tested.
l MA view
1. Run:
system-view
The connectivity fault between the local switch and the remote switch is located.
Run the trace mac-8021ag command without md md-name ma ma-name in the MA view
to determine a forwarding path or failure point in a specified MA.
Run the trace mac-8021ag md md-name ma ma-name command in the MA view to
determine a forwarding path or failure point in a specified MA.
l All views except the MA view:
Run:
trace mac-8021ag mep mep-id mep-id md md-name ma ma-name { mac mac-address |
remote-mep mep-id mep-id } [ interface interface-type interface-number | -t
timeout | ttl ttl ] *
The connectivity fault between the switch and the remote switch is located.
----End
Context
You need to configure the switchs at both ends and the intermediate switch on the link to be
tested.
Procedure
Step 1 Configuring the switchs at both Ends and the Intermediate switch
Do as follows on the switchs at both ends and the intermediate switch on the link to be tested:
1. Run:
system-view
The connectivity fault between the switch and the remote switch is located.
A MEP is not required to initiate Gmac trace. The destination node does not need to be a
MEP or a MIP. Gmac trace can be implemented without configuring the MD, MA, or MEP
on the source device, the intermediate device, and the destination device.
The two devices must be enabled with 802.1ag of the same version. If the local device is
enabled with IEEE 802.1ag Draft 7 and the peer device is enabled with IEEE Standard
802.1ag-2007, the faulty node cannot be located when the trace mac command is run to
detect connectivity of the link between the local and peer devices.
----End
Applicable Environment
After association between an Ethernet CFM module and an interface is configured, if a MEP
detects a connectivity fault between the MEP and a specified RMEP in the same MA, the OAM
management module blocks and then unblocks the interface where the MEP is located so that
other modules can detect the fault.
Figure 5-7 Application scenario of association between an Ethernet CFM module and an
interface (1)
Ethernet CFM
Figure 5-8 Application scenario of association between an Ethernet CFM module and an
interface (2)
Ethernet CFM
GE1/0/1 Link1 GE1/0/1
GE1/0/2 Link2 GE1/0/2
SwitchA SwitchB
Link3
GE1/0/3 GE1/0/3
Active link
Inactive link MEPs in MA1
MEPs in MA2
Aggregation group in MEPs in MA3
static LACP mode
Figure 5-7 and Figure 5-8 show the application of CFM on a direct link and a multi-hop link
respectively. Ethernet CFM is configured between SwitchA and SwitchB, and the Ethernet CFM
module is associated with GE 1/0/1 of SwitchA. When the CFM OAM module on SwitchA
detects a connectivity fault between SwitchA and SwitchB, the OAM management module
blocks and then unblocks GE 1/0/1 so that the other interfaces on SwitchA can detect the fault.
Figure 5-9 Application scenario of association between an Ethernet CFM module and an
interface (3)
SwitchC
GE2/0/1 GE2/0/2
M Ethe
rn et C F rn et C
GE1/0/1 Ethe FM GE1/0/1
Eth-Trunk1 Eth-Trunk1
SwitchA SwitchB
GE1/0/2 Ethe FM GE1/0/2
rnet C
CFM rnet
Ethe
GE2/0/1 GE2/0/2
SwitchD
Aggregation group in 1:1 Active link MEPs in MA1
active/standby mode Inactive link MEPs in MA2
MEPs in MA3
MEPs in MA4
A link aggregation group (LAG) in static LACP mode is configured on SwitchA and SwitchB.
Ethernet CFM is enabled on SwitchA and SwitchB; SwitchA and SwitchB belong to the same
MD; MEPs are configured on all the member interfaces of the LAG; MEPs on the interfaces of
the same link belong to the same MA; MEPs on interfaces on different links belong to different
MAs. MEPs at both ends of a link send CCMs to check connectivity of the link. The association
between an Ethernet CFM module and an interface is configured.
When a connectivity fault occurs on Link1, the OAM modules on SwitchA and SwitchB block
and unblock their GE 1/0/1 interfaces respectively. In this manner, the LACP module detects
the connectivity fault on Link1 and switches the service data from Link1 to the inactive Link3.
This implements protection switching within 50 ms to achieve carrier-class reliability.
Figure 5-10 Application scenario of association between an Ethernet CFM module and an
interface (4)
SwitchC
GE2/0/1 GE2/0/2
CFM Ethe
rnet rn et C
GE1/0/1 Ethe FM GE1/0/1
Eth-Trunk1 Eth-Trunk1
SwitchA SwitchB
Ethe
GE1/0/2 rnet CFM GE1/0/2
CFM rnet
Ethe
GE2/0/1 GE2/0/2
SwitchD
Aggregation group in 1:1 Active link MEPs in MA1
active/standby mode Inactive link MEPs in MA2
MEPs in MA3
MEPs in MA4
An LAG in 1:1 backup mode is configured on SwitchA and SwitchB. Ethernet CFM is
configured between SwitchA and SwitchC, SwitchA and SwitchD, SwitchB and SwitchC, and
SwitchB and SwitchD. The Ethernet CFM modules are associated with GE 1/0/1 and GE
1/0/2 respectively on SwitchA and SwitchB.
When a connectivity fault occurs on the link between SwitchA and SwitchC, the Ethernet CFM
module detects the fault and reports the fault to the OAM management module. The OAM
management module blocks and then unlocks GE 1/0/1. Then the LAG detects the fault and
switches data to the inactive link. The process of handling faults on other links is similar to that
on the link between SwitchA and SwitchC. This implements protection switching within 50 ms
to achieve carrier-class reliability.
Pre-configuration Tasks
Before configuring association between an Ethernet CFM module and an interface, complete
the following tasks:
Data Preparation
To configure association between an Ethernet CFM module and an interface, you need the
following data.
No. Data
No. Data
Context
Do as follows on the S9700 configured with the link aggregation group in static LACP mode:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
cfm md md-name ma ma-name remote-mep mep-id mep-id trigger if-down
It is required that outward-facing MEPs be created in the specified MA and the current interface
is configured with outward-facing MEPs before you use the cfm md md-name ma ma-name
remote-mep mep-id mep-id trigger if-down command.
An interface can be associated with an RMEP only. You need to delete the current configurations
to modify the mapping between the interface and the RMEP.
If multiple member interfaces exist in the link aggregation group, you should repeat Step 2 and
Step 3 to associate Ethernet CFM with all the member interfaces.
----End
Prerequisites
The configurations of Associating Ethernet CFM with an Interface function are complete.
Procedure
Step 1 Run the display cfm remote-mep [ md md-name [ ma ma-name [ mep-id mep-id ] ] ] command
to check detailed information about an RMEP.
----End
Example
Run the display cfm remote-mep command. If the "Trigger If-down" field for the RMEP is
displayed as "enable", it means that the configuration succeeds.
<Quidway> display cfm remote-mep
The total number of RMEPs is : 1
The status of RMEPS : 0 up, 1 down, 0 disable
--------------------------------------------------
MD Name : md110
Level : 0
MA Name : ma110
RMEP ID : 2
VLAN ID : --
VSI Name : --
L2VC ID : 110 tagged
MAC : 0025-9eb1-bce6
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : down
Alarm Status : RemoteAlarm
Applicable Environment
As shown in Figure 5-11, Ethernet CFM is enabled on PE1 and PE2. When a fault occurs on a
link between PEs, a CE needs to detect the fault to ensure reliable service transmission. In this
case, the associations between Ethernet CFM and interfaces need to be configured. Take PE2
as an example. When detecting a link fault, Ethernet CFM notifies the OAM management
module of the fault on PE2. This triggers the physical status of GE 1/0/2 associated with Ethernet
CFM to become Down. CE2 can then detect the fault and switch traffic to a backup path, which
ensures reliable service transmission.
Figure 5-11 Networking diagram of the association between Ethernet CFM and an interface
GE1/0/1 GE1/0/1
GE1/0/2 GE1/0/2
CE1 CE2
If the bidirectional association between Ethernet CFM and an interface is configured on PE2,
the OAM management module sends fault information to Ethernet CFM associated with GE
1/0/2 when GE 1/0/2 goes Down on PE2 connected to CE2. Ethernet CFM messages carrying
fault information are sent to the OAM module on PE1, which triggers the physical status of GE
1/0/2 on PE1 to become Down. CE1 can then detect the fault and switch traffic to a backup path,
which ensures reliable service transmission.
Pre-configuration Tasks
Before configuring the association between Ethernet CFM and an interface (in the OAM
management view), complete the following task:
l Configuring Basic Ethernet CFM Functions
Data Preparation
To configure the association between Ethernet CFM and an interface (in the OAM management
view), you need the following data.
No. Data
3 Name of an MD and MA
Context
Do as follows on the device that needs the association.
Procedure
Step 1 Run:
system-view
Table 5-1 Configuration schemes for Ethernet CFM and interface association
Scenario Configuration Scheme 1 Configuration Scheme 2
----End
Prerequisites
All configurations of the association between Ethernet CFM and an interface are complete.
Procedure
Step 1 Run the display this command in the OAM management view to check whether Ethernet CFM
and an interface are successfully associated.
----End
Example
Run the display this command. You can view all associations between Ethernet CFM and
interfaces.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress interface GigabitEthernet1/0/1 egress cfm md md1 ma ma1 trigger
if-down
oam-bind ingress cfm md md1 ma ma1 trigger if-down egress interface
GigabitEthernet1/0/2
#
return
Applicable Environment
IEEE 802.1ah is designed for the last mile of the Ethernet to detect the direct link between a CE
device and a PE device. IEEE 802.1ag is designed for a group of services or certain network
devices to detect faults on the network. It functions between CE devices, PE devices, or CE and
PE devices. As shown in Figure 5-12, EFM OAM runs between CE1 and PE1, and between
CE2 and PE2; Ethernet CFM runs between CE1 and CE2. After Ethernet OAM is associated
with Ethernet CFM, the Ethernet CFM module can detect faults on the link between CE1 and
PE2 and notify CE2.
GE1/0/1 GE1/0/1
GE1/0/2 GE1/0/2
EFM OAM EFM OAM
CE1 CE2
Pre-configuration Tasks
Before associating EFM OAM and Ethernet CFM, complete the following tasks:
Data Preparation
To associate EFM OAM and Ethernet CFM, you need the following data.
No. Data
1 Interface to be associated
Procedure
Step 1 Run:
system-view
The EFM OAM and Ethernet CFM modules are configured to send fault messages to each
other.
l Run:
oam-bind ingress efm interface interface-type interface-number egress cfm md md-
name ma ma-name
The EFM OAM module is configured to send fault messages to the Ethernet CFM module.
l Run:
oam-bind ingress cfm md md-name ma ma-name egress efm interface interface-type
interface-number
The Ethernet CFM module is configured to send fault messages the EFM OAM module.
NOTE
If you run oam-bind cfm md md-name ma ma-name efm interface interface-type interface-number
command, two records of the oam-bind ingress efm interface interface-type interface-number egress
cfm md md-name ma ma-name and oam-bind ingress cfm md md-name ma ma-name egress efm
interface interface-type interface-number commands are displayed. In the records, the directions where
fault notification messages are transmitted are reverse.
----End
Procedure
Step 1 In the OAM management view, run the display this command to check association between
EFM OAM and Ethernet CFM.
[Quidway-oam-mgr]display this
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet1/0/1 egress cfm md md1 ma ma1
oam-bind ingress cfm md md1 ma ma1 egress efm interface GigabitEthernet1/0/1
#
----End
Figure 5-13 Networking diagram for configuring association between Ethernet CFM and
Ethernet CFM
GE1/0/1 GE1/0/1
GE1/0/2 GE1/0/2
Ethernet CFM Ethernet CFM
CE1 CE2
Pre-configuration Tasks
Before configuring association between Ethernet CFM and Ethernet CFM, complete the
following task:
l 5.9 Configuring Basic Ethernet CFM
Data Preparation
To configure association between Ethernet CFM and Ethernet CFM, you need the following
data.
No. Data
Context
Do as follows on the devices where association between Ethernet CFM and Ethernet CFM needs
to be configured.
Procedure
Step 1 Run:
system-view
Step 2 Run:
oam-mgr
Unidirectional fault transmission is enabled between Ethernet CFM modules at the two ends of
the link.
Bidirectional fault transmission is enabled between Ethernet CFM modules at the two ends of
the link.
NOTE
After bidirectional transmission of fault messages is configured, the system displays two configuration
records of unidirectional fault message transmission, whose directions are mutually reverse.
----End
Procedure
Step 1 In the OAM management view, run the display this command to check association between
Ethernet CFM and Ethernet CFM.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress cfm md md1 ma ma1 egress cfm md md1 ma ma2
oam-bind ingress cfm md md1 ma ma2 egress cfm md md1 ma ma1
#
----End
Pre-configuration Tasks
Before configuring association between Ethernet CFM and SEP, complete the following tasks:
l Configuring Basic Ethernet CFM Functions
l Configuring Basic SEP Functions
Data Preparation
To configure association between Ethernet CFM and SEP, you need the following data.
No. Data
1 Number of the interface where association between Ethernet CFM and SEP is
configured
3 SEP segment
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run the display this command in the OAM management view to check association between
Ethernet CFM and SEP.
[Quidway-oam-mgr] display this
#
oam-mgr
----End
Applicable Environment
As shown in Figure 5-14, CEs access PEs in dual-homing mode. To implement the end-to-end
link detection, you can configure BFD between PEs. Ethernet OAM runs between CEs and PEs.
When detecting faults, BFD at the core side notifies Ethernet OAM of the faults through PEs
and the traffic is switched to the backup path between CEs.
802.1ag/802.3ah 802.1ag/802.3ah
BFD
CE1
CE2
PE3 PE4
Pre-configuration Tasks
Before associating Ethernet OAM with BFD, complete the following tasks:
Data Preparation
To associate Ethernet OAM with BFD, you need the following data.
No. Data
2 Name of an MD and an MA
6 BFD names
Context
Configure Ethernet OAM to run between CEs and PEs. For details, see "Configuring EFM
OAM" and "Configuring Ethernet CFM".
Context
Do as follows on the PEs:
Procedure
Step 1 Run:
system-view
The bidirectional transmission of fault messages between Ethernet CFM and BFD is
configured.
l Run:
oam-bind ingress efm interface interface-type interface-number egress bfd-
session bfd-session-id
The bidirectional transmission of fault messages between EFM OAM and BFD is configured.
----End
Prerequisites
After the preceding configuration, when BFD enabled between PE1 and PE2 detects faults, EFM
OAM and CFM notify CE1 of the faults and then traffic is switched to the bypass tunnel for
CE1.
Context
CAUTION
Debugging affects the performance of the system. So, after debugging, run the undo debugging
all command to disable it immediately.
When an EFM OAM fault occurs, run the following debugging command in the user view to
view the debugging information to locate and analyze the fault.
Procedure
Step 1 Run the debugging efm interface interface-type interface-number { all | error | event |
message | packet { all | receive | send } | process } command in the user view to enable the
debugging of the EFM OAM module on the specified interface.
----End
SwitchA SwitchB
User Internet
network
GE1/0/1 GE2/0/1
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable EFM OAM globally on Switch A and Switch B.
2. Configure EFM OAM on GE 1/0/1 of Switch A to work in passive mode.
3. Enable EFM OAM on GE 2/0/1 on Switch B. Enable EFM OAM on GE 1/0/1 on Switch
A.
4. Configure GE 2/0/1 of Switch B to detect the errored frames, errored codes, and errored
frame seconds.
Data Preparation
To complete the configuration, you need the following data:
l Period for detecting errored frames on GE2/0/1 of Switch B (5 seconds) and threshold of
number of errored frames (5)
l Period for detecting errored codes on GE2/0/1 of Switch B (5 seconds) and threshold of
number of errored codes (5)
l Period for detecting errored frame seconds on GE 2/0/1 of Switch B (120 seconds) and
threshold of number of errored frame seconds (5)
Procedure
Step 1 Enable EFM OAM globally.
Step 4 Configure GE 2/0/1 of Switch B to detect the errored frames, errored codes, and errored frame
seconds.
# Run the display efm command on Switch B. If the function of detecting errored frames, errored
codes, and errored frame seconds on GE 2/0/1 is configured corrected, the following information
is displayed:
[SwitchB] display efm interface gigabitethernet 2/0/1
Item Value
-------------------------------------
Interface: GigabitEthernet2/0/1
EFM Enable Flag: enable
Mode: active
Loopback IgnoreRequest: no
OAMPDU MaxSize: 128
OAMPDU Timeout: 5000
ErrCodeNotification: enable
ErrCodePeriod: 5
ErrCodeThreshold: 5
ErrFrameNotification: enable
ErrFramePeriod: 5
ErrFrameThreshold: 5
ErrFrameSecondNotification: enable
ErrFrameSecondPeriod: 120
ErrFrameSecondThreshold: 5
Hold Up Time: 0
ThresholdEvtTriggerErrDown: disable
TriggerIfDown: disable
TriggerMacRenew: disable
Remote MAC: 0010-0010-0010
Remote EFM Enable Flag: enable
Remote Mode: passive
Remote MaxSize: 128
Remote Loopback IgnoreRequest: --
Remote State: --
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
efm enable
#
interface GigabitEthernet1/0/1
efm mode passive
efm enable
bpdu bridge enable
#
return
#
efm enable
#
interface GigabitEthernet2/0/1
efm enable
efm error-frame period 5
efm error-frame threshold 5
efm error-frame notification enable
efm error-frame-second period 120
efm error-frame-second threshold 5
efm error-frame-second notification enable
efm error-code period 5
efm error-code threshold 5
efm error-code notification enable
bpdu bridge enable
#
return
Figure 5-16 Networking diagram for testing the packet loss ratio on the link
SwitchA SwitchB
User Internet
network
GE1/0/1 GE2/0/1
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable EFM OAM on Switch A and Switch B. Configure EFM OAM on GE 1/0/1 of Switch
A to work in passive mode.
2. Enable EFM OAM remote loopback on Switch B.
3. Send test packets from Switch B to Switch A.
4. Check the returned test packets on Switch B.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure basic functions of EFM OAM.
# Enable EFM OAM globally on Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] efm enable
Run the display efm session command on Switch A. If the EFM OAM protocol on GE 1/0/1 is
in Loopback (be controlled) state, that is, GE 1/0/1 responds to remote loopback, the
configuration is successful. The displayed information is as follows:
[SwitchA] display efm session interface gigabitethernet1/0/1
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet1/0/1 Loopback(be controlled) --
You can obtain the packet loss ratio on the link based on the preceding data.
NOTE
By default, the timeout interval for remote loopback is 20 minutes. After 20 minutes, remote loopback
stops. To disable remote loopback, you can perform the preceding step.
Run the display efm session command on Switch A or Switch B. If the EFM OAM protocol on
the interfaces is in Detect or Discovery state, the configuration is successful. The displayed
information on Switch B is as follows:
[SwitchB] display efm session interface gigabitethernet2/0/1
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet2/0/1 Detect --
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
efm enable
#
interface GigabitEthernet1/0/1
efm mode passive
efm enable
bpdu bridge enable
#
return
Networking Requirements
As shown in Figure 5-17, the Ethernet is managed by two ISPs. Switch A, Switch B, and Switch
D are managed by ISP 1; Switch C, Switch E, Switch F, Switch G, Switch H, and Switch I are
managed by ISP 2. Connectivity of links needs to be tested on the network.
Figure 5-17 Networking diagram for configuring basic functions of Ethernet CFM
VLAN2
GE1/0/1
SwitchA SwitchE
SwitchI GE1/0/0
GE1/0/0 GE1/0/1
SwitchB
VLAN2 GE1/0/2 MD2 SwitchF
GE1/0/1 GE1/0/1
SwitchD
GE1/0/0 GE1/0/2
GE1/0/0 SwitchC
MD1 SwitchG
SwitchH
MD1 MD2
MEP in MA1 MEP in MA3
MEP in MA2
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l Level of MD 1: 6
l Level of MD 2: 4
Procedure
Step 1 Create VLANs and add interfaces to the VLANs. The configuration procedure is not mentioned
here.
Step 2 Create MD 1.
# Create MD 1 on Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] cfm enable
[SwitchA] cfm md md1 level 6
# Create MD 1 on SwitchB to I.
The configurations of these Switches are similar to the configuration of Switch A, and are not
mentioned here.
# Create MA 1 in MD 1 on Switch A.
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] map vlan 2
[SwitchA-md-md1-ma-ma1] quit
# Create MA 1 in MD 1 on Switches B to I.
The configurations of these Switches are similar to the configuration of Switch A, and are not
mentioned here.
# Create MA 2 in MD 1 on Switch A.
[SwitchA-md-md1] ma ma2
[SwitchA-md-md1-ma-ma2] map vlan 3
[SwitchA-md-md1-ma-ma2] quit
[SwitchA-md-md1] quit
# Create MA 2 in MD 1 on Switches B to H.
The configurations of these Switches are similar to the configuration of Switch A, and are not
mentioned here.
The configurations of these Switches are similar to the configuration of Switch A, and are not
mentioned here.
# Enable sending and receiving of CCMs on Switch C, Switch D, Switch E, Switch G, Switch
H and Switch I.
The configurations of these Switches are similar to the configuration of Switch A, and are not
mentioned here.
Run the display cfm remote-mep command to view detailed information about the RMEP. You
can view the RMEP status and check whether the CFM configuration is successful.
MD Name : md2
Level : 4
MA Name : ma3
RMEP ID : 3
Vlan ID : 4
VSI Name : --
L2VC ID : --
MAC : 0000-0121-0333
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
Alarm Status : RemoteAlarm
MD Name : md1
Level : 6
MA Name : ma1
RMEP ID : 3
Vlan ID : 2
VSI Name : --
L2VC ID : --
MAC : 0000-0121-0666
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
Alarm Status : RemoteAlarm
MD Name : md1
Level : 6
MA Name : ma2
RMEP ID : 2
Vlan ID : 3
VSI Name : --
L2VC ID : --
MAC : 0000-0121-0888
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
Alarm Status : RemoteAlarm
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 2 to 4
#
cfm enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 2 to 4
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 4
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 4
#
cfm md md1 level 6
ma ma1
map vlan 2
ma ma2
map vlan 3
#
cfm md md2 level 4
ma ma3
map vlan 4
mep mep-id 1 interface gigabitethernet 1/0/0 inward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
remote-mep mep-id 3
remote-mep ccm-receive mep-id 3 enable
#
return
#
cfm md md2 level 4
ma ma3
map vlan 4
mep mep-id 3 interface gigabitethernet 1/0/0 inward
mep ccm-send mep-id 3 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
#
return
#
cfm enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 2
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 2
#
cfm md md1 level 6
ma ma1
map vlan 2
mep mep-id 1 interface gigabitethernet 1/0/1 inward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
remote-mep mep-id 3
remote-mep ccm-receive mep-id 3 enable
#
return
Networking Requirements
As shown in Figure 5-18, Switch B and Switch C are managed by ISP 1, and Switch A, Switch
D, Switch E, and Switch F are managed by ISP 2. The CFM function can be enabled after the
default MD is configured on the device in a low-level MD.
Figure 5-18 Networking diagram for configuring the default MD for Ethernet CFM
VLAN3
GE1/0/2
SwitchC
SwitchB GE1/0/2
SwitchE
/1
/1
1 /0
GE
1 /0
VLAN2
GE
GE1/0/3 SwitchF
GE1/0/1 SwitchD
GE1/0/2 SwitchA GE1 GE1/0/1
/0 /3
VLAN3 VLAN2
MEP of MA1
MEP of MA2
MIP
Configuration Roadmap
The configuration roadmap is as follows:
1. Create VLANs and add interfaces to the VLANs.
2. Create MD 1 at level 6 on all the devices except for Switch B and Switch C.
Create MD 2 at level 4 on Switch B and Switch C.
3. Create the default MD at level 6 on Switch B and Switch C, associate the default MD with
VLAN 2 and VLAN 3, and set the MIP creation rule to default.
4. Create and configure MA 1 in MD 1 on all the devices except for Switch E. Associate MA
1 with VLAN 2.
Create and configure MA 2 in MD 1 on all the devices except for Switch F. Associate MA
2 with VLAN 3.
5. Create and configure MEPs and RMEPs on MA 1 in MD 1 of Switch A and Switch F.
Create and configure MEPs and RMEPs on MA 2 in MD 1 of Switch A and Switch E.
6. Enable the function of sending and receiving CCMs.
Data Preparation
To complete the configuration, you need the following data:
l IDs of VLANs to which the sub-interfaces are to be added
l Level of MD 1: 6
l Level of MD 2: 4
l Level of the default MD: 6
Procedure
Step 1 Create VLANs and add interfaces to the VLANs. The configuration procedure is not mentioned
here.
Step 2 Create MD 1.
# Create MD 1 on Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] cfm enable
[SwitchA] cfm md md1 level 6
[SwitchA-md-md1] quit
# Create MD 2 on Switch C.
The configuration on Switch C is similar to the configuration on Switch B, and is not mentioned
here.
Step 4 Create the default MD and associate the default MD with VLAN 2 and VLAN 3 on Switch B
and Switch C.
# Create the default MD and associate the default MD to VLAN 2 and VLAN 3 on Switch B.
[SwitchB] cfm default md level 6
[SwitchB-default-md] vlan 2 to 3
[SwitchB-default-md] quit
# Create the default MD and associate the default MD to VLAN 2 and VLAN 3 on SwitchC.
The configuration on Switch C is similar to the configuration on Switch B, and is not mentioned
here.
Step 5 Set the MIP creation rule in the default MD on Switch B and Switch C.
The configuration on Switch C is similar to the configuration on Switch B, and is not mentioned
here.
Step 6 Create and configure MA 1 in MD 1 on all the devices except for Switch B and Switch C.
# Create MA 1 in MD 1 on Switch A.
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] map vlan 2
[SwitchA-md-md1-ma-ma1] quit
The configurations on Switch D and Switch F are similar to the configuration on Switch A, and
are not mentioned here.
Step 7 Create and configure MA 2 in MD 1 on all the devices except for Switch B and Switch C.
# Create MA 2 in MD 1 on Switch A.
[SwitchA-md-md1] ma ma2
[SwitchA-md-md1-ma-ma2] map vlan 3
[SwitchA-md-md1-ma-ma2] quit
[SwitchA-md-md1] quit
The configurations on Switch D and Switch E are similar to the configuration on Switch A, and
are not mentioned here.
# Enable the function of receiving CCMs from all the RMEPs on Switch A.
[SwitchA-md-md1-ma-ma2] remote-mep ccm-receive enable
# Enable the function of sending CCMs in all MEPs and the function of receiving CCMs from
all the RMEPs on Switch E and Switch F.
The configurations on Switch E and Switch F are similar to the configuration on Switch A, and
are not mentioned here.
Step 11 Verify the configuration.
After the preceding configurations are complete and the network becomes stable, run the
following commands to verify the configuration. Take Switch A and Switch B for example.
l Run the display cfm default md command on Switch B, and you can view the following
information:
[SwitchB] display cfm default md
Level MIP-Create-type SenderID TLV-type VLAN-List
-------------------------------------------------------------------------------
---------
6 default SendIdDefer 2 to 3
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 2 to 3
#
cfm enable
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 2
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 3
#
interface GigabitEthernet1/0/3
port link-type trunk
port trunk allow-pass vlan 2 to 3
#
cfm md md1 level 6
ma ma1
map vlan 2
mep mep-id 2 interface gigabitethernet 1/0/1 inward
mep ccm-send mep-id 2 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
ma ma2
map vlan 3
mep mep-id 1 interface gigabitethernet 1/0/2 inward
interface GigabitEthernet1/0/3
port link-type trunk
port trunk allow-pass vlan 2 to 3
#
cfm md md1 level 6
ma ma1
map vlan 2
ma ma2
map vlan 3
#
return
Networking Requirements
As shown in Figure 5-19, EFM OAM is configured between Switch B and Switch C. When GE
2/0/0 on Switch B becomes Down, the EFM OAM module reports the fault to GE 1/0/0 on
Switch C through the association mechanism. Then GE 1/0/0 is triggered to go Down.
Figure 5-19 Networking diagram for configuring association between an EFM OAM module
and an interface
SwitchA SwitchB SwitchC
GE1/0/0 GE2/0/0
GE1/0/0 GE2/0/0
EFM OAM
Interface associated with
EFM OAM
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure EFM OAM between Switch B and Switch C.
2. On Switch B, configure association between an EFM OAM module and GE 1/0/0.
Procedure
Step 1 Configure EFM OAM between Switch B and Switch C.
# Configure Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] efm enable
[SwitchB] interface gigabitethernet 2/0/0
[SwitchB-GigabitEthernet2/0/0] bpdu bridge enable
[SwitchB-GigabitEthernet2/0/0] efm mode passive
[SwitchB-GigabitEthernet2/0/0] efm enable
[SwitchB-GigabitEthernet2/0/0] quit
# Configure Switch C.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] efm enable
[SwitchC] interface gigabitethernet2/0/0
[SwitchC-GigabitEthernet2/0/0] bpdu bridge enable
[SwitchC-GigabitEthernet2/0/0] efm enable
Run the display efm session interface command on Switch B to check the EFM OAM status,
and you can find that EFM OAM is in detect state.
[SwitchB] display efm session interface gigabitethernet 2/0/0
Interface EFM State Loopback Timeout
--------------------------------------------------------------------
GigabitEthernet2/0/0 detect
# Enable GE 1/0/0 on Switch B and the EFM OAM module between Switch B and Switch C to
report faults to each other.
[SwitchB] oam-mgr
[SwitchB-oam-mgr] oam-bind efm interface gigabitethernet 2/0/0 trigger if-down
interface gigabitethernet 1/0/0
CRC: 0, Giants: 0
Jabbers: 0, Throttles: 0
Runts: 0, DropEvents: 0
Alignments: 0, Symbols: 0
Ignoreds: 0, Frames: 0
Collisions: 0, ExcessiveCollisions: 0
Late Collisions: 0, Deferreds: 0
Buffers Purged: 0
----End
Configuration Files
l Configuration file of Switch B
#
sysname SwitchB
#
efm enable
#
interface GigabitEthernet1/0/0
#
interface GigabitEthernet2/0/0
Figure 5-20 Example for associating EFM OAM with BFD for IP
P
1 GE
2 /0 / 2 /0 /
GE 2
Loopback1 Loopback1
1.1.1.1/32 Loopback1 3.3.3.3/32
1 5.5.5.5/32 GE
2 /0 / 2 /0 /
GE LSP 1
PE1 PE3
Loopback1 Loopback1
GE1/0/0 2.2.2.2/32 4.4.4.4/32 GE1/0/0
GE2/0/0 GE2/0/0
PE2 PE4
LSP
GE1/0/0 GE1/0/0
GE1/0/0
GE1/0/1 GE1/0/0
GE1/0/1
CE1 CE2
GE1/0/2
Loopback1 - 1.1.1.1/32
Loopback1 - 2.2.2.2/32
Loopback1 - 3.3.3.3/32
Loopback1 - 4.4.4.4/32
Loopback1 - 5.5.5.5/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Set IP addresses of interfaces.
2. Configure OSPF on the backbone network.
3. Create MPLS LDP sessions between PE1 and PE3, and between PE2 and PE4.
4. Configure PWs on PEs by using PW templates.
5. Configure the Martini VLL on the interfaces connecting PEs and CEs.
6. Create BFD sessions for IP between PE1 and PE3, and between PE2 and PE4.
7. Configure EFM OAM on PEs and CEs.
8. Associate BFD for IP with Ethernet CFM on PEs.
Data Preparation
To complete the configuration, you need the following data:
l Name of the remote peer of MPLS LDP
l VC IDs of the active PW and the standby PW
l Names of PW templates
l Names of BFD sessions for IP, and local and remote discriminators
Procedure
Step 1 Configure the VLANs that the interfaces belong to according to Figure 5-20.
The configuration details are not mentioned here.
Step 2 Assign IP addresses to VLANIF interfaces on the CEs.
# Configure CE1.
<Quidway> system-view
[Quidway] sysname CE1
[CE1] interface vlanif 10
[CE1-Vlanif10] ip address 10.1.1.1 24
[CE1-Vlanif10] quit
[CE1] interface vlanif 50
[CE1-Vlanif50] ip address 10.1.2.1 24
[CE1-Vlanif50] quit
[CE1] interface vlanif 80
[CE1-Vlanif80] ip address 10.1.3.1 24
[CE1-Vlanif80] quit
# Configure CE2.
<Quidway> system-view
[Quidway] sysname CE2
[Quidway] sysname CE2
[CE2] interface vlanif 40
[CE2-Vlanif40] ip address 10.1.1.2 24
[CE2-Vlanif40] quit
[CE2] interface vlanif 70
[CE2-Vlanif70] ip address 10.1.2.2 24
[CE2-Vlanif70] quit
Step 3 On the MPLS backbone network, configure IP addresses for interfaces and an IGP so that PEs
and P on the backbone network can interwork.
# Configure PE1.
<Quidway> system-view
[Quidway] sysname PE1
[PE1] interface loopback1
[PE1-LoopBack1] ip address 1.1.1.1 32
[PE1-LoopBack1] quit
[PE1] interface vlanif 20
[PE1-Vlanif20] ip address 100.1.13.1 24
[PE1-Vlanif20] quit
[PE1] ospf 1
[PE1-ospf-1] area 0
[PE1-ospf-1-area-0.0.0.0] network 1.1.1.1 0.0.0.0
[PE1-ospf-1-area-0.0.0.0] network 100.1.13.0 0.0.0.255
[PE1-ospf-1-area-0.0.0.0] quit
[PE1-ospf-1] quit
# Configure the P.
<Quidway> system-view
[Quidway] sysname P
[P] interface loopback1
[P-LoopBack1] ip address 5.5.5.5 32
[P-LoopBack1] quit
[P] interface vlanif 20
[P-Vlanif20] ip address 100.1.13.2 24
[P-Vlanif20] quit
[P] interface vlanif 30
[P-Vlanif30] ip address 100.1.31.1 24
[P-Vlanif30] quit
[P] ospf 1
[P-ospf-1] area 0
[P-ospf-1-area-0.0.0.0] network 5.5.5.5 0.0.0.0
[P-ospf-1-area-0.0.0.0] network 100.1.13.0 0.0.0.255
[P-ospf-1-area-0.0.0.0] network 100.1.31.0 0.0.0.255
[P-ospf-1-area-0.0.0.0] quit
[P-ospf-1] quit
# Configure PE3.
<Quidway> system-view
[Quidway] sysname PE3
[PE3] interface loopback1
[PE3-LoopBack1] ip address 3.3.3.3 32
[PE3-LoopBack1] quit
[PE3] interface vlanif 30
[PE3-Vlanif30] ip address 100.1.31.2 24
[PE3-Vlanif30] quit
[PE3] ospf 1
[PE3-ospf-1] area 0
[PE3-ospf-1-area-0.0.0.0] network 3.3.3.3 0.0.0.0
[PE3-ospf-1-area-0.0.0.0] network 100.1.31.0 0.0.0.255
[PE3-ospf-1-area-0.0.0.0] quit
[PE3-ospf-1] quit
# Configure PE2.
<Quidway> system-view
[Quidway] sysname PE2
[PE2] interface loopback1
[PE2-LoopBack1] ip address 2.2.2.2 32
[PE2-LoopBack1] quit
[PE2] interface vlanif 60
[PE2-Vlanif60] ip address 100.1.24.1 24
[PE2-Vlanif60] quit
[PE2] ospf 1
[PE2-ospf-1] area 0
[PE2-ospf-1-area-0.0.0.0] network 2.2.2.2 0.0.0.0
[PE2-ospf-1-area-0.0.0.0] network 100.1.24.0 0.0.0.255
# Configure PE4.
<Quidway> system-view
[Quidway] sysname PE4
[PE4] interface loopback1
[PE4-LoopBack1] ip address 4.4.4.4 32
[PE4-LoopBack1] quit
[PE4] interface vlanif 60
[PE4-Vlanif60] ip address 100.1.24.2 24
[PE4-Vlanif60] quit
[PE4] ospf 1
[PE4-ospf-1] area 0
[PE4-ospf-1-area-0.0.0.0] network 4.4.4.4 0.0.0.0
[PE4-ospf-1-area-0.0.0.0] network 100.1.24.0 0.0.0.255
[PE2-ospf-1-area-0.0.0.0] quit
[PE2-ospf-1] quit
After the configuration, run the display ip routing-table command on the PEs, and you can
view that PE1 and PE2, and PE1 and PE3 have learned the routes on the Loopback1 interface
of each other.
Take the display on PE1 as an example:
[PE1] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 11 Routes : 11
# Configure the P.
[P] mpls lsr-id 5.5.5.5
[P] mpls
[P-mpls] quit
# Configure PE3.
[PE3] mpls lsr-id 3.3.3.3
[PE3] mpls
[PE3-mpls] quit
[PE3] mpls ldp
[PE3-mpls-ldp] quit
[PE3] interface vlanif 30
[PE3-Vlanif30] mpls
[PE3-Vlanif30] mpls ldp
[PE3-Vlanif30] quit
# Configure PE2.
[PE2] mpls lsr-id 2.2.2.2
[PE2] mpls
[PE2-mpls] quit
[PE2] mpls ldp
[PE2-mpls-ldp] quit
[PE2] interface vlanif 60
[PE2-Vlanif60] mpls
[PE2-Vlanif60] mpls ldp
[PE2-Vlanif60] quit
# Configure PE4.
[PE4] mpls lsr-id 4.4.4.4
[PE4] mpls
[PE4-mpls] quit
[PE4] mpls ldp
[PE4-mpls-ldp] quit
[PE4] interface vlanif 60
[PE4-Vlanif60] mpls
[PE4-Vlanif60] mpls ldp
[PE4-Vlanif60] quit
After the configuration, run the display tunnel-info all command on PEs. You can view that
MPLS LSP tunnels are set up between PE1 and PE3, and between PE2 and PE4.
Take the display on PE1 and PE2 as an example.
[PE1] display tunnel-info all
* -> Allocated VC Token
Tunnel ID Type Destination Token
----------------------------------------------------------------------
0x10025 lsp 3.3.3.3 5
0x10026 lsp -- 6
0x10027 lsp 5.5.5.5 7
0x10028 lsp -- 8
[PE2] display tunnel-info all
* -> Allocated VC Token
Tunnel ID Type Destination Token
----------------------------------------------------------------------
0x10021 lsp 4.4.4.4 1
NOTE
In this example, PE2 and PE4 are directly connected and you do not need to manually configure remote
LDP sessions between them.
# Configure PE1.
[PE1] mpls ldp remote-peer pe3
[PE1-mpls-ldp-remote-pe3] remote-ip 3.3.3.3
[PE1-mpls-ldp-remote-pe3] quit
# Configure PE3.
[PE3] mpls ldp remote-peer pe1
[PE3-mpls-ldp-remote-pe1] remote-ip 1.1.1.1
[PE3-mpls-ldp-remote-pe1] quit
After the configuration, run the display mpls ldp session command on PEs. You can see that
the LDP peer relationship is in Operational state. This indicates that the LDP sessions are set
up.
Take the display on PE1 as an example:
[PE1] display mpls ldp session
# Configure PE3.
[PE3] mpls l2vpn
[PE3-l2vpn] mpls l2vpn default martini
[PE3-l2vpn] quit
[PE3] pw-template 3to1
[PE3-pw-template-3to1] peer-address 1.1.1.1
[PE3-pw-template-3to1] control-word
[PE3-pw-template-3to1] quit
[PE3] interface vlanif 40
[PE3-Vlanif40] mpls l2vc pw-template 3to1 100
[PE3-Vlanif40] ip address 10.1.1.1 24
[PE3-Vlanif40] quit
# Configure PE2.
[PE2] mpls l2vpn
[PE2-l2vpn] mpls l2vpn default martini
[PE2-l2vpn] quit
[PE2] pw-template 2to4
[PE2-pw-template-2to4] peer-address 4.4.4.4
[PE2-pw-template-2to4] control-word
[PE2-pw-template-2to4] quit
[PE2] interface vlanif 50
[PE2-Vlanif50] mpls l2vc pw-template 2to4 101
[PE2-Vlanif50] ip address 10.1.2.2 24
[PE2-Vlanif50] quit
# Configure PE4.
[PE4] mpls l2vpn
[PE4-l2vpn] mpls l2vpn default martini
[PE4-l2vpn] quit
[PE4] pw-template 4to2
[PE4-pw-template-4to2] peer-address 2.2.2.2
[PE4-pw-template-4to2] control-word
[PE4-pw-template-4to2] quit
[PE4] interface vlanif 70
[PE4-Vlanif70] mpls l2vc pw-template 4to2 101
[PE4-Vlanif70] ip address 10.1.2.1 24
[PE4-Vlanif70] quit
After the configuration, run the display mpls l2vc command on PEs. You can view that PWs
are set up and are in Active state.
Run OSPF on CE1 and CE2 and advertise the route to 10.1.3.0/24 to CE2. To ensure that traffic
is transmitted through the path CE1 PE1 P PE3 CE2, increase the cost of OSPF on
VLANIF 50 of CE1 and VLANIF 70 of CE2. For example, change the cost to 10.
# Configure CE1.
[CE1] ospf 1
[CE1-ospf-1] area 0.0.0.0
[CE1-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[CE1-ospf-1-area-0.0.0.0] network 10.1.2.0 0.0.0.255
[CE1-ospf-1-area-0.0.0.0] network 10.1.3.0 0.0.0.255
[CE1-ospf-1-area-0.0.0.0] quit
[CE1-ospf-1] quit
[CE1] interface vlanif 50
[CE1-Vlanif50] ospf cost 10
[CE1-Vlanif50] quit
# Configure CE2.
[CE2] ospf 1
[CE2-ospf-1] area 0.0.0.0
[CE2-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[CE2-ospf-1-area-0.0.0.0] network 10.1.2.0 0.0.0.255
[CE2-ospf-1-area-0.0.0.0] quit
[CE2-ospf-1] quit
[CE2] interface vlanif 70
[CE2-Vlanif70] ospf cost 10
[CE2-Vlanif70] quit
Run the display ip routing-table command on CE1, and you can view that the outgoing interface
for the route from CE1 to 10.1.3.0/24 is VLANIF 40. That is, the traffic is transmitted through
the primary path.
[CE1] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 10 Routes : 10
NOTE
The local discriminators and remote discriminators of the two ends on a BFD session should be correctly
associated. That is, the local discriminator of the local system and the remote discriminator of the remote
system are the same, and the remote discriminator of the local system and the local discriminator of the
remote system are the same. The configuration cannot be changed.
# Configure PE1.
[PE1] bfd
[PE1-bfd] quit
[PE1] bfd 1to3 bind peer-ip 100.1.31.2
[PE1-bfd-session-1to3] discriminator local 1
[PE1-bfd-session-1to3] discriminator remote 3
[PE1-bfd-session-1to3] commit
[PE1-bfd-session-1to3] quit
# Configure PE3.
[PE3] bfd
[PE3-bfd] quit
[PE3] bfd 3to1 bind peer-ip 100.1.13.1
[PE3-bfd-session-3to1] discriminator local 3
[PE3-bfd-session-3to1] discriminator remote 1
[PE3-bfd-session-3to1] commit
[PE3-bfd-session-3to1] quit
# Configure PE2.
[PE2] bfd
[PE2-bfd] quit
[PE2] bfd 2to4 bind peer-ip 100.1.24.2
[PE2-bfd-session-2to4] discriminator local 2
[PE2-bfd-session-2to4] discriminator remote 4
[PE2-bfd-session-2to4] commit
[PE2-bfd-session-2to4] quit
# Configure PE4.
[PE4] bfd
[PE4-bfd] quit
[PE4] bfd 4to2 bind peer-ip 100.1.24.1
[PE4-bfd-session-4to2] discriminator local 4
[PE4-bfd-session-4to2] discriminator remote 2
[PE4-bfd-session-4to2] commit
[PE4-bfd-session-4to2] quit
After the configuration, BFD sessions are set up between PE1 and PE3, and between PE2 and
PE4. Run the display bfd session all command, and you can view that the status of the BFD
sessions is Up.
Take the display on PE1 as an example.
[PE1] display bfd session all
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
1 3 100.1.31.2 Up S_IP_PEER -
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
Run the display bfd configuration all command. You can view information about the BFD
configuration, and you can view that the Commit field is True.
[PE1] display bfd configuration all
--------------------------------------------------------------------------------
CFG Name CFG Type LocalDiscr MIndex SessNum Commit AdminDown
--------------------------------------------------------------------------------
1to3 S_IP_PEER 13 4096 1 True False
--------------------------------------------------------------------------------
Total Commit/Uncommit CFG Number : 1/0
# Configure PE1.
[PE1] efm enable
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] bpdu bridge enable
[PE1-GigabitEthernet1/0/0] efm enable
[PE1-GigabitEthernet1/0/0] quit
# Configure PE2.
[PE2] efm enable
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] bpdu bridge enable
[PE2-GigabitEthernet1/0/0] efm enable
[PE2-GigabitEthernet1/0/0] quit
# Configure PE3.
[PE3] efm enable
[PE3] interface gigabitethernet 1/0/0
[PE3-GigabitEthernet1/0/0] bpdu bridge enable
[PE3-GigabitEthernet1/0/0] efm enable
[PE3-GigabitEthernet1/0/0] quit
# Configure PE4.
[PE4] efm enable
[PE4] interface gigabitethernet 1/0/0
[PE4-GigabitEthernet1/0/0] bpdu bridge enable
[PE4-GigabitEthernet1/0/0] efm enable
[PE4-GigabitEthernet1/0/0] quit
# Configure CE1.
[CE1] efm enable
[CE1] interface gigabitethernet 1/0/0
[CE1-GigabitEthernet1/0/0] bpdu bridge enable
[CE1-GigabitEthernet1/0/0] efm mode passive
[CE1-GigabitEthernet1/0/0] efm enable
[CE1-GigabitEthernet1/0/0] quit
[CE1] interface gigabitethernet 1/0/1
[CE1-GigabitEthernet1/0/1] bpdu bridge enable
[CE1-GigabitEthernet1/0/1] efm mode passive
[CE1-GigabitEthernet1/0/1] efm enable
[CE1-GigabitEthernet1/0/1] quit
# Configure CE2.
[CE2] efm enable
[CE2] interface gigabitethernet 1/0/0
[CE2-GigabitEthernet1/0/0] bpdu bridge enable
[CE2-GigabitEthernet1/0/0] efm mode passive
[CE2-GigabitEthernet1/0/0] efm enable
[CE2-GigabitEthernet1/0/0] quit
[CE2] interface gigabitethernet 1/0/1
[CE2-GigabitEthernet1/0/1] bpdu bridge enable
[CE2-GigabitEthernet1/0/1] efm mode passive
[CE2-GigabitEthernet1/0/1] efm enable
[CE2-GigabitEthernet1/0/1] quit
After the configuration, run the display cfm remote-mep command on PEs and CEs to check
the CFM OAM status. You can view that the CFM OAM is Up. Take the display on CE1 as an
example.
# Configure PE3.
[PE3] oam-mgr
[PE3-oam-mgr] oam-bind efm interface GigabitEthernet 1/0/0 bfd-session 3
[PE3-oam-mgr] quit
# Configure PE2.
[PE2] oam-mgr
[PE2-oam-mgr] oam-bind efm interface GigabitEthernet 1/0/0 bfd-session 2
[PE2-oam-mgr] quit
# Configure PE4.
[PE4] oam-mgr
[PE4-oam-mgr] oam-bind efm interface GigabitEthernet 1/0/0 bfd-session 4
[PE4-oam-mgr] quit
After the configuration, run the display this command in the OAM management view on PEs
to check association. Take the display on PE1 as an example:
[PE1-oam-mgr] display this
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet1/0/0 egress bfd-session 1
oam-bind ingress bfd-session 1 egress efm interface GigabitEthernet1/0/0
#
Run the display bfd session all verbose command on PEs to check the BFD session status, and
you can view that the bound application is ETHOAM. Take the display on PE1 as an example:
[PE1] display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 4096 (One Hop) State : Up Name : 1to3
--------------------------------------------------------------------------------
Local Discriminator : 1 Remote Discriminator : 3
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Peer IP Address
Bind Session Type : Static
Bind Peer IP Address : 100.1.31.2
NextHop Ip Address : 100.1.31.1
Bind Interface : -
FSM Board Id : 0 TOS-EXP : 7
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Actual Tx Interval (ms): 13000 Actual Rx Interval (ms): 13000
Local Detect Multi : 3 Detect Interval (ms) : -
Echo Passive : Disable Acl Number : -
Destination Port : 3784 TTL : 255
Proc Interface Status : Disable Process PST : Disable
WTR Interval (ms) : -
Active Multi : 3
Last Local Diagnostic : Control Detection Time Expired
Bind Application : ETHOAM
Session TX TmrID : 17261 Session Detect TmrID : -
Session Init TmrID : - Session WTR TmrID : -
Run the display mpls l2vc interface command on PE1 or PE3, and you can view that the
status of VC and BFD becomes Down. Take the display on PE1 as an example:
<PE1> display mpls l2vc interface vlanif 10
*client interface : Vlanif10 is up
Administrator PW : no
session state : down
AC state : up
VC state : down
VC ID : 100
VC type : VLAN
destination : 3.3.3.3
local group ID : 0 remote group ID : 0
local VC label : 21504 remote VC label : 21504
local AC OAM State : up
local PSN State : up
local forwarding state : forwarding
local status code : 0x0
Check the routing table on CE1. You can find that the outgoing interface of the route to 10.1.3.0
is VLANIF 70. That is, L2VPN traffic is switched to the standby path.
[CE1] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 8 Routes : 8
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
vlan batch 10 50 80
#
efm enable
#
interface Vlanif10
ip address 10.1.1.1 255.255.255.0
#
interface Vlanif50
ip address 10.1.2.1 255.255.255.0
#
interface Vlanif80
ip address 10.1.3.1 255.255.255.0
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 10
efm mode passive
efm enable
bpdu bridge enable
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 50
efm mode passive
efm enable
bpdu bridge enable
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 80
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
network 10.1.3.0 0.0.0.255
#
return
l Configuration file of CE2
#
sysname CE2
#
vlan batch 40 70
#
efm enable
#
interface Vlanif40
ip address 10.1.1.2 255.255.255.0
#
interface Vlanif70
ip address 10.1.2.2 255.255.255.0
ospf cost 10
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 40
efm mode passive
efm enable
bpdu bridge enable
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 70
efm mode passive
efm enable
bpdu bridge enable
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
#
return
l Configuration file of PE1
#
sysname PE1
#
vlan batch 10 20
#
efm enable
#
bfd
#
mpls lsr-id 1.1.1.1
mpls
#
mpls l2vpn
mpls l2vpn default martini
#
pw-template 1to3
peer-address 3.3.3.3
control-word
#
mpls ldp
#
mpls ldp remote-peer 3.3.3.3
remote-ip 3.3.3.3
#
interface Vlanif10
ip address 10.1.1.2 255.255.255.0
mpls l2vc pw-template 1to3
#
interface Vlanif20
ip address 100.1.13.1 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 10
port hybrid tagged vlan 10
efm enable
bpdu bridge enable
#
interface GigabitEthernet2/0/1
port hybrid pvid vlan 20
port hybrid tagged vlan 20
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 100.1.13.0 0.0.0.255
#
bfd 1to3 bind peer-ip 100.1.31.2
discriminator local 1
discriminator remote 3
commit
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet1/0/0 egress bfd-session 1
oam-bind ingress bfd-session 1 egress interface GigabitEthernet1/0/0
#
return
l Configuration file of P
#
sysname P
#
vlan batch 20 30
#
mpls lsr-id 5.5.5.5
mpls
#
mpls ldp
#
interface Vlanif20
ip address 100.1.13.2 255.255.255.0
mpls
mpls ldp
#
interface Vlanif30
ip address 100.1.31.1 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/1
port hybrid pvid vlan 20
port hybrid tagged vlan 20
#
interface GigabitEthernet2/0/2
port hybrid pvid vlan 30
port hybrid tagged vlan 30
#
interface LoopBack1
ip address 5.5.5.5 255.255.255.255
#
ospf 1
area 0.0.0.0
network 5.5.5.5 0.0.0.0
network 100.1.13.0 0.0.0.255
network 100.1.31.0 0.0.0.255
#
return
l Configuration file of PE3
#
sysname PE3
#
vlan batch 30 40
#
efm enable
#
bfd
#
mpls lsr-id 3.3.3.3
mpls
#
mpls l2vpn
mpls l2vpn default martini
#
pw-template 3to1
peer-address 1.1.1.1
control-word
#
mpls ldp
#
mpls ldp remote-peer 1.1.1.1
remote-ip 1.1.1.1
#
interface Vlanif30
ip address 100.1.31.2 255.255.255.0
mpls
mpls ldp
#
interface Vlanif40
ip address 10.1.1.1 255.255.255.0
mpls l2vc pw-template 3to1
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 40
port hybrid tagged vlan 40
efm enable
bpdu bridge enable
#
interface GigabitEthernet2/0/1
#
bfd 2to4 bind peer-ip 100.1.24.2
discriminator local 2
discriminator remote 4
commit
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet1/0/0 egress bfd-session 2
oam-bind ingress bfd-session 2 egress efm interface GigabitEthernet1/0/0
#
return
#
return
Figure 5-21 Networking diagram for configuring association between EFM OAM modules
SwitchA SwitchB SwitchC
GE1/0/0 GE2/0/0
GE1/0/0 GE2/0/0
EFM OAM EFM OAM
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable EFM OAM globally on Switch A, Switch B, and Switch C.
2. Configure EFM OAM on GE 1/0/0 of Switch B and GE 2/0/0 of Switch C to work in passive
mode.
3. Enable EFM OAM on interfaces of the S9700s.
4. Configure association between EFM OAM modules on Switch B.
Procedure
Step 1 Enable EFM OAM globally.
# Configure Switch A.
<SwitchA> system-view
[SwitchA] efm enable
# Configure SwitchB.
<SwitchB> system-view
[SwitchB] efm enable
# Configure Switch C.
<SwitchC> system-view
[SwitchC] efm enable
# Configure SwitchC.
[SwitchC] interface gigabitethernet 2/0/0
[SwitchC-GigabitEthernet2/0/0] bpdu bridge enable
[SwitchC-GigabitEthernet2/0/0] efm mode passive
[SwitchC-GigabitEthernet2/0/0] quit
# Configure Switch B.
[SwitchB] interface gigabitethernet 1/0/0
[SwitchB-GigabitEthernet1/0/0] efm enable
[SwitchB-GigabitEthernet1/0/0] quit
[SwitchB] interface gigabitethernet 2/0/0
[SwitchB-GigabitEthernet2/0/0] bpdu bridge enable
[SwitchB-GigabitEthernet2/0/0] efm enable
[SwitchB-GigabitEthernet2/0/0] quit
# Configure Switch C.
[SwitchC] interface gigabitethernet 2/0/0
[SwitchC-GigabitEthernet2/0/0] efm enable
[SwitchC-GigabitEthernet2/0/0] quit
Run the display efm session all command to check the EFM OAM status, and you can find that
EFM OAM is in detect state. Take the display on Switch B as an example.
[SwitchB] display efm session all
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet1/0/0 detect --
GigabitEthernet2/0/0 detect --
In the OAM management view, run the display this command to check association. You can
find that there are two unidirectional association configuration records, whose directions are
mutually reverse.
[SwitchB-oam-mgr] display this
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet1/0/0 egress efm interface Gigabi
tEthernet2/0/0
oam-bind ingress efm interface GigabitEthernet2/0/0 egress efm interface Gigabi
tEthernet1/0/0
#
# Fault messages between SwitchA and SwitchB are transmitted to SwitchC through the
association mechanism. Then alarms are generated on SwitchC.
<SwitchC>
Mar 9 2010 14:52:33 SwitchC %%01EFM/2/NONTHRESHOLD(l): OID 1.3.6.1.4.1.2011.5
.25.136.1.6.5 Non-threshold-crossing event occurred. (InterfaceName=GigabitEther
net1/0/0, EventLogIndex=0, EventLogTimestamp=148983996, EventLogOui=[01.80.c2 (h
ex)], EventLogType=258, EventLogLocation=2, EventLogRunningTotal=0 3)
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
efm enable
#
interface GigabitEthernet1/0/0
efm enable
bpdu bridge enable
#
return
Figure 5-22 Networking diagram for associating an Ethernet CFM module with an interface
CFM OAM
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure Ethernet CFM on SwitchA and SwitchB.
2. Associate an Ethernet CFM module with GE 1/0/1 on SwitchA.
Procedure
Step 1 Create VLANs and add interfaces to the VLANs.
# Configure SwitchA.
[SwitchA] vlan 10
[SwitchA-vlan10] quit
[SwitchA] interface gigabitethernet 1/0/0
[SwitchA-GigabitEthernet1/0/0] port link-type trunk
[SwitchA-GigabitEthernet1/0/0] port trunk allow-pass vlan 10
[SwitchA-GigabitEthernet1/0/0] quit
# Configure SwitchB.
[SwitchB] vlan 10
[SwitchB-vlan10] quit
[SwitchB] interface gigabitethernet 2/0/1
[SwitchB-GigabitEthernet2/0/1] port link-type trunk
[SwitchB-GigabitEthernet2/0/1] port trunk allow-pass vlan 10
[SwitchB-GigabitEthernet2/0/1] quit
[SwitchA]cfm md md1
[SwitchA-md-md1]ma ma1
[SwitchA-md-md1-ma-ma1] map vlan 10
[SwitchA-md-md1-ma-ma1] ccm-interval 1000
[SwitchA-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 1/0/0 outward
[SwitchA-md-md1-ma-ma1] remote-mep mep-id 1
[SwitchA-md-md1-ma-ma1] mep ccm-send enable
[SwitchA-md-md1-ma-ma1] remote-mep ccm-receive enable
[SwitchA-md-md1-ma-ma1] quit
Run the display cfm mep and display cfm remote-mep commands on SwitchA or SwitchB. If
information about the MEP and RMEP is displayed, it indicates that the configuration is
successful. The displayed information on SwitchB is as follows:
[SwitchB]display cfm mep md md1
The total number of MEPs is : 1
--------------------------------------------------
MD Name : md1
MD Name Format : md-name
Level : 0
MA Name : ma1
MEP ID : 1
Vlan ID : 10
VSI Name : --
L2VC ID : --
Interface Name : GigabitEthernet2/0/1
CCM Send : enabled
Direction : outward
MAC Address : 0018-2000-0083
[SwitchB] display cfm remote-mep md md1
The total number of RMEPs is : 1
The status of RMEPS : 1 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md1
Level : 0
MA Name : ma1
RMEP ID : 2
Vlan ID : 10
VSI Name : --
L2VC ID : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
Alarm Status : RemoteAlarm
[SwitchA] oam-mgr
[SwitchA-oam-mgr] oam-bind cfm md md1 ma ma1 trigger if-down interface
GigabitEthernet 1/0/1
After the interface of SwitchA is shut down, the OAM management module reports the fault to
GE 1/0/1. Then GE 1/0/1 is triggered to go Down.
[SwitchA] display interface gigabitethernet1/0/1
GigabitEthernet1/0/1 current state : TRIGGER DOWN
(1AG)
Line protocol current state : DOWN
Description:HUAWEI, Quidway Series, GigabitEthernet1/0/1 Interface
Switch Port,PVID : 1,The Maximum Frame Length is 9216
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0018-2000-0083
Last physical up time : 2009-08-06 01:45:45 UTC+03:00 DST
Last physical down time : 2009-08-03 00:56:27 UTC+03:00 DST
Current system time: 2009-08-06 01:49:45
Port Mode: COMMON FIBER
Speed : 1000, Loopback: NONE
Duplex: FULL, Negotiation: ENABLE
Mdi : NORMAL
Last 300 seconds input rate 846159384 bits/sec, 961545 packets/sec
Last 300 seconds output rate 846162200 bits/sec, 961548 packets/sec
Input peak rate 12066605600 bits/sec,Record time: 2009-07-26 20:05:07
Output peak rate 12066653800 bits/sec,Record time: 2009-07-26 20:05:07
CRC: 0, Giants: 0
Jabbers: 0, Throttles: 2
Runts: 0, DropEvents: 0
Alignments: 0, Symbols: 0
Ignoreds: 0, Frames: 0
Collisions: 0, ExcessiveCollisions: 0
Late Collisions: 0, Deferreds: 0
Buffers Purged: 0
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 10
#
cfm enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 10
#
interface GigabitEthernet1/0/1
#
cfm md md1
ma ma1
map vlan 10
ccm-interval 10000
mep mep-id 2 interface GigabitEthernet1/0/0 outward
mep ccm-send mep-id 2 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
#
oam-mgr
oam-bind ingress interface GigabitEthernet1/0/1 egress cfm md md1 ma ma1
oam-bind ingress cfm md md1 ma ma1 trigger if-down egress interface
GigabitEthernet1/0/1
#
return
#
sysname SwitchB
#
vlan batch 10
#
cfm enable
#
interface GigabitEthernet2/0/1
port link-type trunk
port trunk allow-pass vlan 10
#
cfm md md1
ma ma1
map vlan 10
ccm-interval 10000
mep mep-id 1 interface GigabitEthernet2/0/1 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
#
return
Figure 5-23 Networking diagram for configuring association between an EFM OAM module
and an Ethernet CFM module
SwitchA SwitchB SwitchC SwitchD
EFM CFM EFM
VLAN10 VLAN10
Configuration Roadmap
The configuration roadmap is as follows:
Procedure
Step 1 Create VLAN 10 and add interfaces to VLAN 10.
# Configure SwitchA.
[Quidway] system-view
[Quidway] sysname SwitchA
[SwitchA] efm enable
[SwitchA] interface gigabitethernet 1/0/0
[SwitchA-GigabitEthernet1/0/0] bpdu bridge enable
[SwitchA-GigabitEthernet1/0/0] efm mode passive
[SwitchA-GigabitEthernet1/0/0] efm enable
[SwitchA-GigabitEthernet1/0/0] quit
# Configure Switch B.
[Quidway] system-view
[Quidway] sysname SwitchB
[SwitchB] efm enable
[SwitchB] interface gigabitethernet 1/0/0
[SwitchB-GigabitEthernet1/0/0] bpdu bridge enable
[SwitchB-GigabitEthernet1/0/0] efm enable
[SwitchB-GigabitEthernet1/0/0] quit
# Configure Switch B.
[SwitchB] cfm enable
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] map vlan 10
[SwitchB-md-md1-ma-ma1] mep mep-id 1 interface gigabitethernet 2/0/0 outward
[SwitchB-md-md1-ma-ma1] remote-mep mep-id 2
[SwitchB-md-md1-ma-ma1] mep ccm-send enable
# Configure Switch C.
[Quidway] system-view
[Quidway] sysname SwitchC
[SwitchC] cfm enable
[SwitchC] cfm md md1
[SwitchC-md-md1] ma ma1
[SwitchC-md-md1-ma-ma1] map vlan 10
[SwitchC-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 2/0/0 outward
[SwitchC-md-md1-ma-ma1] remote-mep mep-id 1
[SwitchC-md-md1-ma-ma1] mep ccm-send enable
[SwitchC-md-md1-ma-ma1] remote-mep ccm-receive enable
[SwitchC-md-md1-ma-ma1] return
# Configure Switch D.
[SwitchD] efm enable
[SwitchD] interface gigabitethernet 1/0/0
[SwitchD-GigabitEthernet1/0/0] bpdu bridge enable
[SwitchD-GigabitEthernet1/0/0] efm mode passive
[SwitchD-GigabitEthernet1/0/0] efm enable
[SwitchD-GigabitEthernet1/0/0] quit
Step 5 Configure association between an EFM OAM module and an Ethernet CFM module.
# Associate EFM OAM between Switch A and Switch B with Ethernet CFM between Switch
B and Switch C in both directions. That is, enable the EFM OAM and Ethernet CFM modules
to send trap messages to each other.
[SwitchB] oam-mgr
[SwitchB-oam-mgr] oam-bind cfm md md1 ma ma1 efm interface gigabitethernet 1/0/0
# Associate EFM OAM between Switch C and Switch D with Ethernet CFM between Switch
B and Switch C in both directions. That is, enable the EFM OAM and Ethernet CFM modules
to send trap messages to each other.
[SwitchC] oam-mgr
[SwitchC-oam-mgr] oam-bind cfm md md1 ma ma1 efm interface gigabitethernet 1/0/0
After the preceding configuration is complete, when EFM OAM between Switch A and Switch
B detects a fault, Ethernet CFM reports the fault to EFM OAM running between Switch C and
Switch D.
<SwitchD>
Nov 23 2007 18:31:27-05:00 SwitchD %%01EFM/2/NONTHRESHOLD(l)[0]:OID 1.3.6.1.4.
1.2011.5.25.136.1.6.5 Non-threshold-crossing event occurred. (InterfaceName=Giga
bitEthernet1/0/0, EventLogIndex=0, EventLogTimestamp=7357971, EventLogOui=[01.80
.c2 (hex)], EventLogType=258, EventLogLocation=1, EventLogRunningTotal=0 1)
Nov 23 2007 18:31:27-05:00 SwitchD %%01OAMMGR/4/CFM_TO_EFM(l)[1]:802.1AG notif
ied malfunction to 802.3AH. (Ma=ma1, Md=md1, InterfaceName=GigabitEthernet1/0/0,
FaultState=1)
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10
#
efm enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 10
efm mode passive
efm enable
bpdu bridge enable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 10
#
return
Networking Requirements
As shown in Figure 5-24, Ethernet CFM is configured between Switch A and Switch B, and
between Switch B and Switch C. When a fault occurs on the link between Switch A and Switch
B, Ethernet CFM is triggered to send fault messages to Switch C. Then, alarms are generated
on Switch C.
Figure 5-24 Networking diagram for configuring association between Ethernet CFM and
Ethernet CFM
SwitchA SwitchB SwitchC
GE1/0/0 GE2/0/0
GE1/0/0 GE2/0/0
CFM CFM
MEP in MA1
MEP in MA2
Configuration Roadmap
The configuration roadmap is as follows:
Procedure
Step 1 Create VLANs and add interfaces to the VLANs.
# Configure Switch A.
[SwitchA] cfm enable
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] map vlan 10
[SwitchA-md-md1-ma-ma1] mep mep-id 1 interface gigabitethernet 1/0/0 outward
[SwitchA-md-md1-ma-ma1] remote-mep mep-id 2
[SwitchA-md-md1-ma-ma1] mep ccm-send enable
[SwitchA-md-md1-ma-ma1] remote-mep ccm-receive enable
[SwitchA-md-md1-ma-ma1] quit
[SwitchA-md-md1] quit
# Configure Switch B.
[SwitchB] cfm enable
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] map vlan 10
[SwitchB-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 1/0/0 outward
[SwitchB-md-md1-ma-ma1] remote-mep mep-id 1
[SwitchB-md-md1-ma-ma1] mep ccm-send enable
[SwitchB-md-md1-ma-ma1] remote-mep ccm-receive enable
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
# Configure Switch B.
# Configure Switch C.
[SwitchC] cfm enable
[SwitchC] cfm md md1
[SwitchC-md-md1] ma ma2
[SwitchC-md-md1-ma-ma2] map vlan 20
[SwitchC-md-md1-ma-ma2] mep mep-id 2 interface gigabitethernet 2/0/0 outward
[SwitchB-md-md1-ma-ma2] remote-mep mep-id 1
[SwitchC-md-md1-ma-ma2] mep ccm-send enable
[SwitchC-md-md1-ma-ma2] remote-mep ccm-receive enable
[SwitchC-md-md1-ma-ma2] quit
[SwitchC-md-md1] quit
Run the display cfm remote-mep command on Switch B to check the CFM status, and you can
find that the CFM status is Up.
[SwitchB] display cfm remote-mep
The total number of RMEPs is : 2
The status of RMEPS : 2 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md1
Level : 0
MA Name : ma1
RMEP ID : 1
Vlan ID : 10
VSI Name : --
L2VC ID : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
MD Name : md2
Level : 0
MA Name : ma2
RMEP ID : 2
Vlan ID : 20
VSI Name : --
L2VC ID : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10
#
cfm enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 10
#
cfm md md1
ma ma1
map vlan 10
mep mep-id 1 interface GigabitEthernet1/0/0 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
#
return
Figure 5-25 Networking diagram for associating Ethernet CFM and RRPP multi-instance
UPEB
GE/1/0/0 GE2/0/0
CE1 PE-AGG
VLAN 100-300 GE2/0/0 GE/1/0/0
Ring 1 Backbone
UPEA Master 1 network
GE/1/0/0 GE2/0/0
Domain 1 ring 1
GE2/0/0 GE/1/0/0
UPEC
For details on the protected VLAN in domain 1, and the instance that the protected VLAN
belongs to, see Table 5-2.
For details on the master node and primary and secondary interfaces on the master node of the
ring, see Table 5-3.
Table 5-3 Master node, and primary and secondary interfaces on the master node
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l IDs of instances
l Range of the protected VLANs
l IDs of the control VLANs
l Numbers of the RRPP interfaces
Procedure
Step 1 Create instances.
l Configure UPEA.
# Create data VLANs 100 to 300 on UPEA.
[UPEA] vlan batch 100 to 300
# Create instance 1, and map control VLANs 5 and 6 and data VLANs 100 to 200 in domain
1 to instance 1.
<UPEA> system-view
[UPEA] stp region-configuration
[UPEA-mst-region] instance 1 vlan 5 6 100 to 300
l Configure UPEB.
# Create data VLANs 100 to 300 on UPEB.
[UPEB] vlan batch 100 to 300
# Create instance 1, and map control VLANs 5 and 6 and data VLANs 100 to 300 in domain
1 to instance 1.
<UPEB> system-view
[UPEB] stp region-configuration
[UPEB-mst-region] instance 1 vlan 5 6 100 to 300
l Configure UPEC.
# Create data VLANs 100 to 300 on UPEC.
[UPEC] vlan batch 100 to 300
# Create instance 1, and map control VLANs 5 and 6 and data VLANs 100 to 300 in domain
1 to instance 1.
<UPEC> system-view
[UPEC] stp region-configuration
[UPEC-mst-region] instance 1 vlan 5 6 100 to 300
l Configure PE-AGG.
# Create data VLANs 100 to 300 on PE-AGG.
[PE-AGG] vlan batch 100 to 300
# Create instance 1, and map control VLANs 5 and 6 and data VLANs 100 to 200 in domain
1 to instance 1.
<PE-AGG> system-view
[PE-AGG] stp region-configuration
[PE-AGG-mst-region] instance 1 vlan 5 6 100 to 300
l Configure UPEB.
# On UPEB, disable STP on the interfaces to be added to the RRPP ring. Configure the RRPP
interfaces to allow packets of VLANs 100 to 300 to pass through.
<UPEB> system-view
[UPEB] interface gigabitethernet 1/0/0
[UPEB-GigabitEthernet1/0/0] port link-type trunk
[UPEB-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet1/0/0] stp disable
[UPEB-GigabitEthernet1/0/0] quit
[UPEB] interface gigabitethernet 2/0/0
[UPEB-GigabitEthernet2/0/0] port link-type trunk
[UPEB-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet2/0/0] stp disable
[UPEB-GigabitEthernet2/0/0] quit
l Configure UPEC.
# On UPEC, disable STP on the interfaces to be added to the RRPP ring. Configure the RRPP
interfaces to allow packets of VLANs 100 to 300 to pass through.
<UPEC> system-view
[UPEC] interface gigabitethernet 1/0/0
[UPEC-GigabitEthernet1/0/0] port link-type trunk
[UPEC-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet1/0/0] stp disable
[UPEC-GigabitEthernet1/0/0] quit
[UPEC] interface gigabitethernet 2/0/0
[UPEC-GigabitEthernet2/0/0] port link-type trunk
[UPEC-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet2/0/0] stp disable
[UPEC-GigabitEthernet2/0/0] quit
l Configure PE-AGG.
# On PE-AGG, disable STP on the interfaces to be added to the RRPP ring. Configure the
RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
<PE-AGG> system-view
[PE-AGG] interface gigabitethernet 1/0/0
[PE-AGG-GigabitEthernet1/0/0] port link-type trunk
[PE-AGG-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 to 300
[PE-AGG-GigabitEthernet1/0/0] stp disable
[PE-AGG-GigabitEthernet1/0/0] quit
[PE-AGG] interface gigabitethernet 2/0/0
[PE-AGG-GigabitEthernet2/0/0] port link-type trunk
[PE-AGG-GigabitEthernet2/0/0] port trunk allow-pass vlan 100 to 300
[PE-AGG-GigabitEthernet2/0/0] stp disable
[PE-AGG-GigabitEthernet2/0/0] quit
Step 3 Create RRPP domains and configure protected VLANs and control VLANs.
l Configure UPEA.
# Configure the VLANs mapping instance 1 as protected VLANs in domain 1, and configure
VLAN 5 as the control VLAN.
<UPEA> system-view
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEA-rrpp-domain-region1] control-vlan 5
[UPEA-rrpp-domain-region1] quit
l Configure UPEB.
# Configure the VLANs mapping instance 1 as protected VLANs in domain 1, and configure
VLAN 5 as the control VLAN.
<UPEB> system-view
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEB-rrpp-domain-region1] control-vlan 5
[UPEB-rrpp-domain-region1] quit
l Configure UPEC.
# Configure the VLANs mapping instance 1 as protected VLANs in domain 1, and configure
VLAN 5 as the control VLAN.
<UPEC> system-view
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEC-rrpp-domain-region1] control-vlan 5
[UPEC-rrpp-domain-region1] quit
l Configure PE-AGG.
# Configure the VLANs mapping instance 1 as protected VLANs in domain 1, and configure
VLAN 5 as the control VLAN.
<PE-AGG> system-view
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] protected-vlan reference-instance 1
[PE-AGG-rrpp-domain-region1] control-vlan 5
[PE-AGG-rrpp-domain-region1] quit
l Configure UPEB.
# Configure UPEB as a transit node of ring 1 in domain 1 and specify primary and secondary
interfaces.
<UPEB> system-view
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEB-rrpp-domain-region1] ring 1 enable
[UPEB-rrpp-domain-region1] quit
l Configure UPEC.
# Configure UPEC as a transit node of ring 1 in domain 1 and specify primary and secondary
interfaces.
<UPEC> system-view
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[UPEC-rrpp-domain-region1] ring 1 enable
[UPEC-rrpp-domain-region1] quit
l Configure PE-AGG.
# Configure PE-AGG as the master node of ring 1 in domain 1, GE 1/0/0 as the primary
interface, and GE 2/0/0 as the secondary interface.
<PE-AGG> system-view
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] ring 1 node-mode master primary-port
gigabitethernet 1/0/0 secondary-port gigabitethernet 2/0/0 level 0
[PE-AGG-rrpp-domain-region1] ring 1 enable
[PE-AGG-rrpp-domain-region1] quit
l Configure UPEB.
# Enable RRPP.
<UPEB> system-view
[UPEB] rrpp enable
l Configure UPEC.
# Enable RRPP.
<UPEC> system-view
[UPEC] rrpp enable
l Configure PE-AGG.
# Enable RRPP.
<PE-AGG> system-view
[PE-AGG] rrpp enable
After the preceding configurations are complete and the network topology becomes stable,
perform the following operations to verify the configuration. Take the display on UPEA and
PE-AGG as examples.
l On UPEA, run the display rrpp brief or display rrpp verbose domain command. The result
is as follows:
# Check the brief information of RRPP on UPEA.
<UPEA> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 3 sec(default is 3 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 T GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
RRPP is enabled on UPEA, VLAN 5 is the control VLAN and VLANs mapping instance 1
are the protected VLANs in domain 1, and UPE A is a transit node on ring 1; GE 1/0/0 is the
primary interface, and GE 2/0/0 is the secondary interface.
# Check detailed information about UPEA in domain 1.
<UPEA> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 3 sec(default is 3 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port: GigabitEthernet2/0/0 Port status: UP
The preceding information shows that VLAN 5 is the control VLAN in domain 1, and VLANs
mapping instance 1 are the protected VLANs; UPEA is a transit node in domain 1 and is in
LinkUp state; RRPP is enabled on UPEA.
# Check the brief information of RRPP on PE-AGG.
<PE-AGG> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 3 sec(default is 3 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
---------------------------------------------------------------------------
1 0 M GigabitEthernet1/0/0 GigabitEthernet2/0/0 Yes
The preceding information shows that RRPP is enabled on PE-AGG. In domain 1, VLAN 5
is the major control VLAN, VLANs mapping instance 1 are the protected VLANs, and PE-
AGG is the master node on ring 1; GE 1/0/0 is the primary interface, and GE 2/0/0 is the
secondary interface.
# Check detailed information about PE-AGG in domain 1.
<PE-AGG> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 3 sec(default is 3 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port: GigabitEthernet2/0/0 Port status: BLOCKED
The preceding information shows that VLAN 5 is the control VLAN in domain 1, and VLANs
mapping instance 1 are the protected VLANs. PE-AGG is the master node in domain 1 and
is in Complete state. GE 1/0/0 is the primary interface, and GE 2/0/0 is the secondary
interface.
# Configure UPEA.
[UPEA] cfm md md1
[UPEA-md-md1] ma ma1
[UPEA-md-md1-ma-ma1] map vlan 100
[UPEA-md-md1-ma-ma1] mep mep-id 1 interface GigabitEthernet2/0/0 outward
[UPEA-md-md1-ma-ma1] remote-mep mep-id 2
[UPEA-md-md1-ma-ma1] remote-mep ccm-receive mep-id 2 enable
[UPEA-md-md1-ma-ma1] mep ccm-send enable
[UPEA-md-md1-ma-ma1] quit
[UPEA-md-md1] ma ma2
[UPEA-md-md1-ma-ma2] map vlan 100
[UPEA-md-md1-ma-ma2] mep mep-id 3 interface GigabitEthernet1/0/0 outward
[UPEA-md-md1-ma-ma2] remote-mep mep-id 4
[UPEA-md-md1-ma-ma2] remote-mep ccm-receive mep-id 4 enable
[UPEA-md-md1-ma-ma2] mep ccm-send enable
[UPEA-md-md1-ma-ma2] quit
# Configure PE-AGG.
[PE-AGG] cfm md md1
[PE-AGG-md-md1] ma ma1
[PE-AGG-md-md1-ma-ma1] map vlan 100
[PE-AGG-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet1/0/0 outward
[PE-AGG-md-md1-ma-ma1] remote-mep mep-id 1
[PE-AGG-md-md1-ma-ma1] remote-mep ccm-receive mep-id 1 enable
[PE-AGG-md-md1-ma-ma1] mep ccm-send enable
[PE-AGG-md-md1-ma-ma1] quit
[PE-AGG-md-md1] ma ma2
[PE-AGG-md-md1-ma-ma2] map vlan 100
[PE-AGG-md-md1-ma-ma2] mep mep-id 4 interface gigabitethernet2/0/0 outward
On UPEA or PE-AGG, run the display cfm remote-mep command to check the status of
Ethernet CFM. You can find that Ethernet CFM is in Up state. Take the display on PE-AGG as
an example.
[PE-AGG] display cfm remote-mep
The total number of RMEPs is : 2
The status of RMEPS : 2 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md1
Level : 0
MA Name : ma1
RMEP ID : 1
Vlan ID : 100
VSI Name : --
L2VC ID : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
MD Name : md1
Level : 0
MA Name : ma2
RMEP ID : 3
Vlan ID : 100
VSI Name : --
L2VC ID : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
MD Name : md1
Level : 0
MA Name : ma2
RMEP ID : 3
Vlan ID : 100
VSI Name : --
L2VC ID : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
Run the display this interface command on PE-AGG to check the status of GE 1/0/0, and you
can find that GE 1/0/0 is in TRIGGER DOWN (1AG) state.
[PE-AGG-GigabitEthernet1/0/0] display this interface
GigabitEthernet1/0/0 current state : TRIGGER DOWN
(1AG)
Line protocol current state : DOWN
Description:HUAWEI, Quidway Series, GigabitEthernet1/0/0 Interface
Switch Port,PVID : 1,The Maximum Frame Length is 9216
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0018-2000-0083
Last physical up time : -
Last physical down time : 2009-07-22 18:00:16 DST
Current system time: 2009-07-22 19:00:16
Port Mode: COMMON FIBER
Speed : 1000, Loopback: NONE
Duplex: FULL, Negotiation: ENABLE
Mdi : NORMAL
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Input peak rate 0 bits/sec,Record time: -
Output peak rate 0 bits/sec,Record time: -
CRC: 0, Giants: 0
Jabbers: 0, Throttles: 0
Runts: 0, DropEvents: 0
Alignments: 0, Symbols: 0
Ignoreds: 0, Frames: 0
Collisions: 0, ExcessiveCollisions: 0
Late Collisions: 0, Deferreds: 0
Buffers Purged: 0
Run the display rrpp verbose domain 1 command on PE-AGG to check the status of the RRPP
ring and interface, and following information is displayed:
<PE-AGG> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 3 sec(default is 3 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Failed
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/0 Port status: DOWN
Secondary port: GigabitEthernet2/0/0 Port status: UP
The status of the RRPP ring becomes Failed and the secondary interface changes from
BLOCKED to UP.
Re-enable GE 1/0/0 of UPEB, and you can find that the CFM status on PE-AGG becomes UP.
Run the display rrpp verbose domain 1 command on PE-AGG to check the status of the RRPP
ring and interface, and you can find that the RRPP ring becomes Complete as follows:
<PE-AGG> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 3 sec(default is 3 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet1/0/0 Port status: UP
Secondary port: GigabitEthernet2/0/0 Port status: BLOCKED
----End
Configuration Files
l Configuration file of UPEA
#
sysname UPEA
#
vlan batch 5 to 6 100 to 300
#
rrpp enable
#
cfm enable
#
stp region-configuration
instance 1 vlan 5 6 100 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 1/0/0 secondary-port
GigabitEthernet 2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 100 to 300
stp disable
#
cfm md md1
ma ma1
map vlan 100
mep mep-id 1 interface GigabitEthernet2/0/0 outward
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 100 to 300
stp disable
#
Return
l Configuration file of PE-AGG
#
sysname PE-AGG
#
vlan batch 5 to 6 100 to 300
#
rrpp enable
#
cfm enable
#
stp region-configuration
instance 1 vlan 5 6 100 to 200
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode master primary-port GigabitEthernet 1/0/0 secondary-port
GigabitEthernet 2/0/0 level 0
ring 1 enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 100 to 300
stp disable
#
interface GigabitEthernet2/0/0
port link-type trunk
port trunk allow-pass vlan 5 to 6 100 to 300
stp disable
#
cfm md md1
ma ma1
map vlan 100
mep mep-id 2 interface GigabitEthernet1/0/0 outward
mep ccm-send mep-id 2 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
ma ma2
map vlan 100
mep mep-id 4 interface GigabitEthernet2/0/0 outward
mep ccm-send mep-id 4 enable
remote-mep mep-id 3
remote-mep ccm-receive mep-id 3 enable
#
oam-mgr
oam-bind ingress interface GigabitEthernet1/0/0 egress cfm md md1 ma ma1 trigger
if-down
oam-bind ingress interface GigabitEthernet2/0/0 egress cfm md md1 ma ma2 trigger
if-down
oam-bind ingress cfm md md1 ma ma1 trigger if-down egress interface
GigabitEthernet1/0/0
oam-bind ingress cfm md md1 ma ma2 trigger if-down egress interface
GigabitEthernet2/0/0
#
return
Networking Requirements
As shown in Figure 5-26, each CE is connected to two PEs through sub-interfaces. Ethernet
CFM (802.1ag) is configured between GE 1/0/1 of CE1 and GE 1/0/1 of PE2 and between GE
1/0/2 of CE1 and GE 1/0/2 of PE1. MSTP is run on directly connected interfaces between CE1
and PE1 and between CE1 and PE2; PE1 is configured as the root switch; PE2 is configured as
the secondary root switch; MSTP blocks interfaces of the secondary root switch to prevent loops.
When Ethernet CFM detects faults on the link between CE1 and PE1, OAM Manager notifies
the MSTP module of the fault. Then, the interface notifies MSTP through association of OAM
Manager and interface. The secondary root switch becomes the root switch of a specified MSTI.
Protection of links connected to the VPLS network is implemented.
Figure 5-26 Networking diagram for associating Ethernet CFM with MSTP
PE1
GE1/0/1
GE1/0/2.1
GE1/0/2
C E1 VPLS network
GE1/0/1 PE3
GE1/0/1.1
GE1/0/2
PE2
Configuration Roadmap
NOTE
In this example, only the configuration of MSTP, CFM, and association is mentioned. The VPLS
configuration, however, is not mentioned.
1. Create VLANs.
2. Create sub-interfaces on PE1 and PE2 and add the sub-interfaces to a VLAN so that PE1
and PE2 can be connected to the VPLS network.
3. Configure PE1 as the CIST root.
4. Configure PE1, PE2, and CE1 to be in the same MST region named RG1 and create MSTI
1.
5. In RG1, PE1 functions as the CIST root and the root switch of MSTI 1, and PE2 functions
as the secondary root switch of MSTI 1.
6. Configure root protection on PE2.
7. Configure Ethernet CFM between PE1 and CE1, and between PE2 and CE1.
8. Configure association of Ethernet CFM and interfaces. After the root switch fails, the
secondary root switch immediately switches to the root switch of the specified MSTI.
Data Preparation
To complete the configuration, you need the following data:
l MST region named RG1 that PE1, PE2, PE3, and CE1 belongs to
l Numbers of the GE interfaces, as shown in Figure 5-26
l VLAN IDs 1 to 19
Procedure
Step 1 Configure MSTP on PE1.
# Create VLANs 1-20.
<PE1> system-view
[PE1] vlan batch 1 to 19
# Configure PE1 to use Huawei private algorithm to calculate the path cost.
[PE1] stp pathcost-standard legacy
# Configure PE2 to use Huawei private algorithm to calculate the path cost.
[PE2] stp pathcost-standard legacy
# Configure CE1 to use Huawei private algorithm to calculate the path cost.
[CE1] stp pathcost-standard legacy
After the configuration, run the display stp brief command on PEs and CE1 to check the status
and protection type of the interface, as follows:
[PE1] display stp brief
MSTID Port Role STP State Protection
0 GigabitEthernet1/0/2 DEST FORWARDING ROOT
1 GigabitEthernet1/0/2 DEST FORWARDING ROOT
[PE2] display stp brief
MSTID Port Role STP State Protection
0 GigabitEthernet1/0/1 DEST DISCARDING Root
1 GigabitEthernet1/0/1 DEST DISCARDING Root
# Configure PE1.
[PE1] cfm md md1
[PE1-md-md1] ma ma1
[PE1-md-md1-ma-ma1] map vlan 10
[PE1-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet1/0/2 outward
[PE1-md-md1-ma-ma1] remote-mep mep-id 1
[PE1-md-md1-ma-ma1] remote-mep ccm-receive mep-id 1 enable
[PE1-md-md1-ma-ma1] mep ccm-send enable
[PE1-md-md1-ma-ma1] quit
# Configure PE2.
[PE2] cfm md md1
[PE2-md-md1] ma ma2
[PE2-md-md1-ma-ma2] map vlan 10
[PE2-md-md1-ma-ma2] mep mep-id 4 interface gigabitethernet1/0/1 outward
[PE2-md-md1-ma-ma2] remote-mep mep-id 3
[PE2-md-md1-ma-ma2] remote-mep ccm-receive mep-id 3 enable
[PE2-md-md1-ma-ma2] mep ccm-send enable
[PE2-md-md1-ma-ma2] quit
On CE1 or PE, run the display cfm remote-mep command to check the status of Ethernet CFM,
and you can find that ma1 is in Up state and ma2 is in Down. Take the display on CE1 as an
example.
[CE1] display cfm remote-mep
The total number of RMEPs is : 2
The status of RMEPS : 1 up, 1 down, 0 disable
--------------------------------------------------
MD Name : md1
Level : 0
MA Name : ma1
RMEP ID : 2
Vlan ID : 10
VSI Name : --
MAC : --
MD Name : md1
Level : 0
MA Name : ma2
RMEP ID : 4
Vlan ID : 10
VSI Name : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : down
# Configure PE1.
[PE1] oam-mgr
[PE1-oam-mgr] oam-bind cfm md md1 ma ma1 trigger if-down interface GigabitEthernet
1/0/2
# Configure PE2.
[PE2-oam-mgr] oam-bind cfm md md1 ma ma2 trigger if-down interface GigabitEthernet
1/0/1
Run the display interface command on PE1 to check the status of GE 1/0/2, and you can find
that GE 1/0/2 is in TRIGGER DOWN (1AG) state.
[PE1] display interface gigabitethernet 1/0/2
GigabitEthernet1/0/2 current state : TRIGGER DOWN
(1AG)
Line protocol current state : DOWN
Description:HUAWEI, Quidway Series, GigabitEthernet1/0/2 Interface
Switch Port, PVID : 10, TPID : 8100(Hex), The Maximum Frame Length is 9216
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0022-0033-0044
Last physical up time : -
Last physical down time : 2009-03-13 19:57:53
Port Mode: COMMON FIBER
Speed : 1000, Loopback: NONE
Duplex: FULL, Negotiation: ENABLE
Mdi : NORMAL
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Input peak rate 0 bits/sec, Record time: -
Output peak rate 0 bits/sec, Record time: -
CRC: 0, Giants: 0
Jabbers: 0, Fragments: 0
Runts: 0, DropEvents: 0
Alignments: 0, Symbols: 0
Ignoreds: 0, Frames: 0
Collisions: 0, ExcessiveCollisions: 0
Late Collisions: 0, Deferreds: 0
Buffers Purged: 0
Run the display stp brief command on PE2 to check the status and protection type of the
interface. The displayed information is as follows:
----End
Configuration Files
l Configuration file of PE1
#
sysname PE1
#
vlan batch 1 to 19
#
stp instance 1 root primary
#
cfm enable
#
stp region-configuration
region-name RG1
instance 1 vlan 1 to 20
active region-configuration
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 1 to 19
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 1 to 19
stp root-protection
#
interface GigabitEthernet1/0/2.1
dot1q termination vid 20
#
cfm md md1
ma ma1
map vlan 10
mep mep-id 2 interface GigabitEthernet1/0/2 outward
mep ccm-send mep-id 2 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
#
oam-mgr
oam-bind ingress interface GigabitEthernet1/0/2 egress cfm md md1 ma ma1 trigger
if-down
oam-bind ingress cfm md md1 ma ma1 trigger if-down egress interface GigabitEthe
rnet1/0/2
#
return
l Configuration file of PE2
#
sysname PE2
#
vlan batch 1 to 19
#
stp instance 1 root secondary
#
cfm enable
#
stp region-configuration
region-name RG1
instance 1 vlan 1 to 20
active region-configuration
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 1 to 19
#
interface GigabitEthernet1/0/1.1
dot1q termination vid 20
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 1 to 19
#
cfm md md1
ma ma2
map vlan 10
mep mep-id 4 interface GigabitEthernet1/0/1 outward
mep ccm-send mep-id 4 enable
remote-mep mep-id 3
remote-mep ccm-receive mep-id 3 enable
#
oam-mgr
oam-bind ingress interface GigabitEthernet1/0/1 egress cfm md md1 ma ma2 trigger
if-down
oam-bind ingress cfm md md1 ma ma2 trigger if-down egress interface GigabitEthe
rnet1/0/1
#
return
l Configuration file of CE1
#
sysname CE1
#
vlan batch 1 to 20
#
cfm enable
#
stp region-configuration
region-name RG1
instance 1 vlan 1 to 20
active region-configuration
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 1 to 20
#
interface GigabitEthernet1/0/2
port link-type trunk
port trunk allow-pass vlan 1 to 20
#
#
cfm md md1
ma ma1
map vlan 10
Y.1731 defines frame loss detection and frame delay measurement between MEPs, which is
similar to the fault detection defined in IEEE 802.1ag.
MEP1 MEP2
MA
802.1ag/Y.1731
When a user considers that the purchased Ethernet tunnel services are of low quality or when
an operator needs to conduct their regular service level agreement (SLA) monitoring, ITU-T
Recommendation Y.1731, as defining performance testing tools, is applicable. For example,
ITU-T Recommendation Y.1731 supports the sending and receiving of Continuity Check
Messages (CCMs) to calculate frame loss ratio and bidirectional frame delay and jitter.
MEP1 MEP2
MA
Y.1731
DMM
DMR
MEP1 MEP2
MA
Y.1731
The two-way frame delay measurement is generally performed on end-to-end MEPs. A MEP
receives a DM frame and returns a DMR frame to carry out the two-way frame delay
measurement. After the two-way frame delay measurement is configured, a MEP periodically
sends DM frames with the TxTimeStampf value (timestamp at the time of sending the DM
frame). After receiving the DM frame, the remote MEP adds the RxTimeStampf value
(timestamp at the time of receiving the DM frame) to the DM frame, generates a DMR frame
with the TxTimeStampb value (timestamp at the time of sending the DMR frame), and sends
the message to the requesting MEP. Every field in the DM frame is copied to the DMR frame
except that the source and destination MAC addresses are swapped and the message type is
changed from DM to DMR. Upon receiving the DMR frame, the requesting MEP calculates the
two-way frame delay based on the following formula:
The frame delay variation, namely, frame jitter, can be calculated based on the frame delay.
Jitter: is used as a measure of the variability over time of the frame delay across a network, and
is the absolute difference value between two delays.
Applicable Environment
You can configure the one-way frame delay measurement to collect statistics about the delay in
bidirectional service traffic transmission.
The one-way frame delay measurement is commonly performed on point-to-point MEPs. After
a MEP receives a Delay Measurement (DM) message from the remote MEP, it calculates the
time delay experienced across the network by comparing the timestamp in the DM frame and
the local time. During the one-way frame delay measurement, ensure that clocks on MEPs are
synchronous.
NOTE
Before enabling the one-way delay measurement in the VLAN on the local device, you must configure the
DM frame reception function on the remote device.
Pre-configuration Tasks
Before configuring the one-way delay measurement in the VLAN, complete the following tasks:
l Configuring synchronize clock, For the configuration procedure, see NTP Configuration
l Configuring VLAN, For the configuration procedure, see VLAN Configuration
l 5.9 Configuring Basic Ethernet CFM
Data Preparation
To configure the one-way delay measurement in the VLAN, you need the following data:
No. Data
2 ID of the MEP, name of the interface on which the MEP resides, and type of the MEP
Context
Do as follows on the devices configured with MEPs:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
map vlan vlan-id
----End
Context
Do as follows on the devices configured with MEPs:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
delay-measure one-way threshold threshold-value
----End
Context
Do as follows on a remote MEP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
delay-measure one-way receive mep mep-id
----End
Context
To implement the one-way frame delay measurement, you need to specify the remote MEP ID
or the destination MAC address, the interval for sending DM frames, and the number of DM
frames sent each time.
To implement one-way frame delay measurement, you need to specify the RMEP ID or the
destination MAC address, the interval for sending DM frames, and the measurement period.
l If the local MEP has not learned the MAC address of the RMEP, you must specify the
destination MAC address for one-way frame delay measurement.
l If the local MEP has learned the MAC address of the RMEP, you can specify the RMEP
ID for one-way frame delay measurement.
One-way frame delay measurement is implemented between the transmitting and receiving
MEPs by exchanging DM frames. After one-way frame delay measurement is configured, a
MEP periodically sends DM frames with the TxTimeStampf (the timestamp at the transmission
time of the DM frame). After receiving a DM frame, the RMEP parses the value of the
TxTimeStampf and compares this value with the RxTimef (the time at the reception of the DM
frame) and then calculates the one-way frame delay as:
Frame delay = RxTimef - TxTimeStampf
Procedure
Step 1 Run:
system-view
----End
Prerequisites
All the configurations of the one-way frame delay measurement in a VLAN are complete.
Procedure
l Run the display y1731 statistic-type oneway-delay md md-name ma ma-name [ count
count-value ] command to check the performance statistics collected through Y.1731.
----End
Example
After the configurations, run the display y1731 statistic-type command on the devices where
MEPs reside, and you can view the value of the average delay.
[SwitchB] display y1731 statistic-type oneway-delay md md1 ma ma1
Latest one-way delay statistics:
--------------------------------------------------------------------------------
Index Delay(usec) Delay variation(usec)
--------------------------------------------------------------------------------
1 -2001626137 -
2 -2001625996 141
3 -2001625852 144
4 -2001625704 148
5 -2001625565 139
6 -2001625559 6
7 -2001625407 152
8 -2001625004 403
9 -2001609680 15324
10 -2001624860 15180
--------------------------------------------------------------------------------
Average delay(usec) : -2001623976 Average delay variation(usec) : 3515
Maximum delay(usec) : -2001609680 Maximum delay variation(usec) : 15324
Minimum delay(usec) : -2001626137 Minimum delay variation(usec) :
6
Applicable Environment
You can configure the two-way frame delay measurement to collect statistics about the delay in
bidirectional service traffic transmission.
The two-way frame delay measurement is commonly performed on end-to-end MEPs. After a
remote MEP receives a DMM frame from a local MEP, the remote MEP adds the RxTimeStampf
value (timestamp at the time of receiving the DMM frame) to the DMM frame, generates a DMR
frame with the TxTimeStampb value, and sends the message to the local MEP. Every field in
the DMM frame is copied to the DMR frame except that the source and destination MAC
addresses are swapped and the message type is changed from DMM to DMR. Upon receiving
the DMR frame, the local MEP calculates the two-way frame delay based on the timestamps.
NOTE
Before enabling the two-way delay measurement in the VLAN on the local device, you must configure the
DMM frame reception function on the remote device.
Pre-configuration Tasks
Before configuring the two-way delay measurement in the VLAN, complete the following tasks:
l Configuring VLAN, For the configuration procedure, see VLAN Configuration
l 5.9 Configuring Basic Ethernet CFM
Data Preparation
To configure the two-way delay measurement in the VLAN, you need the following data:
No. Data
2 ID of the MEP, name of the interface on which the MEP resides, and type of the MEP
Context
Do as follows on the devices configured with MEPs:
Procedure
Step 1 Run:
system-view
Step 4 Run:
map vlan vlan-id
----End
Context
Do as follows on the devices configured with MEPs on two ends of the link:
Procedure
Step 1 Run:
system-view
----End
Context
The following operations must performed on both the local and remote MEP devices.
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
----End
Context
To implement the two-way frame delay measurement, you need to specify the remote MEP ID
or the destination MAC address, the interval for sending DMM frames, and the number of DMM
frames sent each time.
l If the local MEP has not learnt the MAC address of the remote MEP, you must specify the
destination MAC address for the two-way frame delay measurement.
l If the local MEP has learnt the MAC address of the remote MEP, you can specify the remote
MEP ID for the two-way frame delay measurement.
The two-way frame delay measurement is performed on end-to-end MEPs. A MEP receives a
DMM frame and returns a DMR frame to carry out the two-way frame delay measurement. After
the two-way frame delay measurement is configured, a MEP periodically sends DMM frames
with the TxTimeStampf value (timestamp at the time of sending the DMM frame). After
receiving the DMM frame, the remote MEP adds the RxTimeStampf value (timestamp at the
time of receiving the DMM frame) to the DMM frame, generates a DMR frame with the
TxTimeStampb value (timestamp at the time of sending the DMR frame), and sends the message
to the requesting MEP. Every field in the DMM frame is copied to the DMR frame except that
the source and destination MAC addresses are swapped and the message type is changed from
DMM to DMR. Upon receiving the DMR frame, the requesting MEP calculates the two-way
frame delay based on the following formula:
Two-way frame delay = (RxTimeb - TxTimeStampf) - (TxTimeStampb - RxTimeStampf)
Do as follows on the devices configured with MEPs on two ends of the link:
Procedure
Step 1 Run:
system-view
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
delay-measure two-way send mep mep-id { mac mac-address | remote-mep mep-id }
interval { 1000 | 10000 } count count-value [ peer-ip peer-ip [ vc-id vc-id ] ]
----End
Prerequisites
All the configurations of the two-way frame delay measurement in a VLAN are complete.
Procedure
l Run the display y1731 statistic-type twoway-delay md md-name ma ma-name [ count
count-value ] command to check the performance statistics collected through Y.1731.
----End
Example
After the configurations, run the display y1731 statistic-type command on the devices where
MEPs reside, and you can view the value of the average delay.
<Quidway> display y1731 statistic-type twoway-delay md md1 ma ma1
Latest two-way delay statistics:
--------------------------------------------------------------------------------
Index Delay(usec) Delay variation(usec)
--------------------------------------------------------------------------------
1 1093 -
2 1190 97
3 1154 36
4 1088 66
5 1156 68
--------------------------------------------------------------------------------
Average delay(usec) : 1136 Average delay variation(usec) : 66
Maximum delay(usec) : 1190 Maximum delay variation(usec) : 97
Minimum delay(usec) : 1088 Minimum delay variation(usec) :
36
Applicable Environment
As shown in Figure 6-4, MEPs configured on CE1 and CE2 are in MD1 of level 6; MEPs
configured on PE1 and PE2 are in MD2 of level 3. If the MEP in the MD of level 6 detects a
fault, the MEP sends an alarm to the NMS. After a certain period, if the MEP in the MD of level
3 also detects the fault, the MEP sends a same alarm to the NMS. In this case, you can configure
the AIS function on PE1 and PE2 to suppress the MEP in the MD of a higher level from sending
alarms to the NMS.
CE1
AIS packets PE1 PE2 AIS packets CE2
VLAN
VLAN/QinQ VLAN/QinQ
MD2 Level 3
MD1 Level 6
Pre-configuration Tasks
Before configuring VLAN AIS, complete the following tasks:
l Switching the version of Ethernet CFM to standard
l Enabling Ethernet CFM globally
l Creating an MD and an MA
l Creating an MEP
Data Preparation
To configure VLAN AIS, you need the following data.
No. Data
1 Names of an MD and an MA
2 ID of the MEP, name of the interface on which the MEP resides, and type of the MEP
3 VLAN ID bound to an MA
No. Data
Context
Do as follows in the MDs in a VLAN:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
map vlan vlan-id
----End
Context
Do as follows in the MD of a lower level in a VLAN:
Procedure
Step 1 Run:
system-view
NOTE
If the range of VLANs to which AIS packets are to be sent is set, setting the interval for sending AIS packets
to 60s is recommended.
Step 7 Run:
ais level level-value
----End
Context
Do as follows in the MD of a higher level in a VLAN:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
----End
Prerequisites
Configuring VALN AIS is complete.
Procedure
l Run the display cfm ma command to check the detailed information about an MA.
----End
Example
Running the display cfm ma command in an MD of a lower level, you can find that the value
of the Sending Ais Packet field is Yes.
<Quidway> display cfm ma md md1 ma ma1
The total number of MAs is 1
MD Name : md1
MD Name Format :
Level : 3
MIP Create-type : none
SenderID TLV-type : Defer
MA Name : ma1
Interval : 1000
Priority : 4
Vlan ID : --
VSI Name : --
MEP Number : 1
RMEP Number : 2
Suppressing Alarms : No
Sending Ais Packet : Yes
Running the display cfm ma command in an MD of a higher level, you can find that the value
of the Suppressing Alarms field is Yes.
The total number of MAs is 1
MD Name : md2
MD Name Format :
Level : 6
MIP Create-type : none
SenderID TLV-type : Defer
MA Name : ma2
Interval : 10000
Priority : 4
Vlan ID : 7
VSI Name : --
MEP Number : 21
RMEP Number : 22
Suppressing Alarms : Yes
Sending Ais Packet : No
Networking Requirements
As shown in Figure 6-5, the one-way frame delay measurement is deployed on Switch A. The
interval for sending DM frames is set to 10 seconds and the number of DM frames sent each
time is also set to 10.
Figure 6-5 Networking diagram of configuring the one-way frame delay measurement in a
VLAN
SwitchC SwitchD
GE2/0/0 GE2/0/0
GE1/0/0 GE1/0/0
GE1/0/0 GE1/0/0
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure VLANs on Switch A, Switch B, Switch C, and Switch D.
2. Configure MDs and MAs on Switch A and Switch B.
3. Configure outward-facing MEPs on Switch A and Switch B.
4. Set the alarm thresholds of the one-way frame delay measurement on Switch A.
5. Enable the one-way frame delay measurement for the VLANs on Switch A
Data Preparation
To complete the configuration, you need the following data:
l VLAN ID
l Alarm threshold of the one-way frame delay measurement
l Names of the MD and MA
Procedure
Step 1 Configuring synchronize clock, For the configuration procedure, see NTP Configuration
# Configure Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan 2
[SwitchB-vlan2] quit
[SwitchB] interface gigabitethernet 1/0/0
[SwitchB-GigabitEthernet1/0/0] port link-type trunk
[SwitchB-GigabitEthernet1/0/0] port trunk allow-pass vlan 2
[SwitchB-GigabitEthernet1/0/0] quit
# Configure Switch C.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] vlan 2
[SwitchC-vlan2] quit
[SwitchC] interface gigabitethernet 1/0/0
[SwitchC-GigabitEthernet1/0/0] port link-type trunk
[SwitchC-GigabitEthernet1/0/0] port trunk allow-pass vlan 2
[SwitchC-GigabitEthernet1/0/0] quit
[SwitchC] interface gigabitethernet 2/0/0
[SwitchC-GigabitEthernet2/0/0] port link-type trunk
# Configure Switch D.
<Quidway> system-view
[Quidway] sysname SwitchD
[SwitchD] vlan 2
[SwitchD-vlan2] quit
[SwitchD] interface gigabitethernet 2/0/0
[SwitchD-GigabitEthernet2/0/0] port link-type trunk
[SwitchD-GigabitEthernet2/0/0] port trunk allow-pass vlan 2
[SwitchD-GigabitEthernet2/0/0] quit
[SwitchD] interface gigabitethernet 1/0/0
[SwitchD-GigabitEthernet1/0/0] port link-type trunk
[SwitchD-GigabitEthernet1/0/0] port trunk allow-pass vlan 2
[SwitchD-GigabitEthernet1/0/0] quit
# Configure Switch A.
[SwitchA] cfm enable
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] map vlan 2
[SwitchA-md-md1-ma-ma1] quit
[SwitchA-md-md1] quit
# Configure Switch B.
[SwitchB] cfm enable
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] map vlan 2
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
# Configure Switch A.
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] mep mep-id 1 interface gigabitethernet 1/0/0 outward
[SwitchA-md-md1-ma-ma1] remote-mep mep-id 2
[SwitchA-md-md1-ma-ma1] mep ccm-send mep-id 1 enable
[SwitchA-md-md1-ma-ma1] remote-mep ccm-receive mep-id 2 enable
[SwitchA-md-md1-ma-ma1] quit
[SwitchA-md-md1] quit
# Configure Switch B.
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 1/0/0 outward
[SwitchB-md-md1-ma-ma1] remote-mep mep-id 1
[SwitchB-md-md1-ma-ma1] mep ccm-send mep-id 2 enable
[SwitchB-md-md1-ma-ma1] remote-mep ccm-receive mep-id 1 enable
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
Step 5 Set the alarm threshold for the one-way frame delay measurement to 1000 on Switch A.
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] delay-measure one-way threshold 1000
[SwitchA-md-md1-ma-ma1] quit
[SwitchA-md-md1] quit
# Configure Switch B.
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] delay-measure one-way receive mep 2
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 2
#
cfm enable
#
interface gigabitethernet1/0/0
port link-type trunk
port trunk allow-pass vlan 2
#
cfm md md1
ma ma1
map vlan 2
mep mep-id 1 interface gigabitethernet1/0/0 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
Networking Requirements
As shown in Figure 6-6, the two-way frame delay measurement is deployed both on Switch A
and Switch B. The interval for sending DMM frames is set to 10 seconds and the number of
DMM frames sent each time is also set to 10.
Figure 6-6 Networking diagram of configuring the two-way frame delay measurement in a
VLAN
SwitchC SwitchD
GE2/0/0 GE2/0/0
GE1/0/0 GE1/0/0
GE1/0/0 GE1/0/0
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure VLANs on Switch A, Switch B, Switch C, and Switch D.
2. Configure MDs and MAs on Switch A and Switch B.
3. Configure outward-facing MEPs on Switch A and Switch B.
4. Set the alarm thresholds of the two-way frame delay measurement on Switch A and Switch
B.
5. Enable the two-way frame delay measurement for the VLANs on Switch A and Switch B.
Data Preparation
To complete the configuration, you need the following data:
l VLAN ID
l Alarm threshold of the two-way frame delay measurement
l Names of the MD and MA
Procedure
Step 1 Configure VLANs.
# Configure Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan 2
[SwitchA-vlan2] quit
[SwitchA] interface gigabitethernet 1/0/0
[SwitchA-GigabitEthernet1/0/0] port link-type trunk
[SwitchA-GigabitEthernet1/0/0] port trunk allow-pass vlan 2
[SwitchA-GigabitEthernet1/0/0] quit
# Configure Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan 2
[SwitchB-vlan2] quit
[SwitchB] interface gigabitethernet 1/0/0
[SwitchB-GigabitEthernet1/0/0] port link-type trunk
[SwitchB-GigabitEthernet1/0/0] port trunk allow-pass vlan 2
[SwitchB-GigabitEthernet1/0/0] quit
# Configure Switch C.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] vlan 2
[SwitchC-vlan2] quit
[SwitchC] interface gigabitethernet 1/0/0
[SwitchC-GigabitEthernet1/0/0] port link-type trunk
[SwitchC-GigabitEthernet1/0/0] port trunk allow-pass vlan 2
[SwitchC-GigabitEthernet1/0/0] quit
[SwitchC] interface gigabitethernet 2/0/0
[SwitchC-GigabitEthernet2/0/0] port link-type trunk
[SwitchC-GigabitEthernet2/0/0] port trunk allow-pass vlan 2
[SwitchC-GigabitEthernet2/0/0] quit
# Configure Switch D.
<Quidway> system-view
[Quidway] sysname SwitchD
[SwitchD] vlan 2
[SwitchD-vlan2] quit
[SwitchD] interface gigabitethernet 2/0/0
[SwitchD-GigabitEthernet2/0/0] port link-type trunk
[SwitchD-GigabitEthernet2/0/0] port trunk allow-pass vlan 2
[SwitchD-GigabitEthernet2/0/0] quit
[SwitchD] interface gigabitethernet 1/0/0
[SwitchD-GigabitEthernet1/0/0] port link-type trunk
[SwitchD-GigabitEthernet1/0/0] port trunk allow-pass vlan 2
[SwitchD-GigabitEthernet1/0/0] quit
# Configure Switch B.
[SwitchB] cfm enable
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] map vlan 2
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
# Configure Switch B.
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 1/0/0 outward
[SwitchB-md-md1-ma-ma1] remote-mep mep-id 1
[SwitchB-md-md1-ma-ma1] mep ccm-send mep-id 2 enable
[SwitchA-md-md1-ma-ma1] remote-mep ccm-receive mep-id 1 enable
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
Step 4 Set the alarm threshold for the two-way frame delay measurement to 1000.
# Configure Switch A.
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] delay-measure two-way threshold 1000
[SwitchA-md-md1-ma-ma1] quit
[SwitchA-md-md1] quit
# Configure Switch B.
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] delay-measure two-way threshold 1000
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
# Configure Switch B.
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] delay-measure two-way receive mep 2
[SwitchB-md-md1-ma-ma1] delay-measure two-way send mep 2 remote-mep 1 interval
10000 count 10
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
--------------------------------------------------------------------------------
1 0 -
2 0 0
3 0 0
4 0 0
5 0 0
6 0 0
7 0 0
8 0 0
9 0 0
10 0 0
--------------------------------------------------------------------------------
Average delay(usec) : 0 Average delay variation(usec) : 0
Maximum delay(usec) : 0 Maximum delay variation(usec) : 0
Minimum delay(usec) : 0 Minimum delay variation(usec) :
0
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 2
#
cfm enable
#
interface GigabitEthernet1/0/0
port link-type trunk
port trunk allow-pass vlan 2
#
cfm md md1
ma ma1
map vlan 2
mep mep-id 1 interface GigabitEthernet1/0/0 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
delay-measure two-way threshold 1000
delay-measure two-way receive mep 1
#
return
7 BFD Configuration
By configuring a BFD session with the one-arm Echo function, you can fast detect and monitor
a direct link between a BFD-capable device and a BFD-incapable device.
7.10 Configuring the TTL Function Globally
Configuring the TTL globally helps you connect the current device and a device running an early
version.
7.11 Configuring the Interval for Trap Messages Are Sent
The interval at which trap messages are sent is set, helping a device to suppress BFD trap
messages.
7.12 Configuring Association Between a BFD Session and an Interface (Triggering the Physical
Status of the Interface Associated with the BFD Session to Become Down)
Association between a BFD session and an interface is applicable to the scenario where a CE is
directly connected to a PE. BFD is enabled on PEs and a BFD session is associated with an
interface. When the BFD session detects a link fault, the BFD module notifies the OAM
management module on the local PE of the fault. This triggers the physical status of the interface
to become Down.
7.13 Configuring Association Between BFD Sessions
After the association between BFD sessions is configured, the local BFD session can detect a
fault and then notify the OAM management module of the fault. The OAM management module
sends fault information to the associated BFD session. The associated BFD session then sends
BFD packets carrying the fault information to the OAM management module on the remote
device. In this manner, the fault is notified to the remote device.
7.14 Maintaining BFD
This section describes how to maintain BFD by deleting BFD statistics, and monitoring BFD
operations.
7.15 Configuration Examples
This section provides several configuration examples of BFD.
l Hardware detection signals, such as those provided by the Synchronous Digital Hierarchy
(SDH) alarm function, are used to detect a link fault rapidly.
l If the hardware detection method is unavailable, the Hello mechanism of a routing protocol
is used to detect faults.
l Detects faults rapidly along paths between neighboring forwarding engines, with light loads
and high speeds.
l Uses a single mechanism to monitor any kind of medium and protocol layer in real time.
Detection time and costs vary.
The S9700s send BFD control packets based on the negotiated period. If an S9700 does not
receive the packet of the peer within the detection time, the S9700 sets the BFD session in Down
state. The upper-layer application can take actions according to the status of the BFD session.
NOTE
Currently, on the S9700, OSPF, BGP, IS-IS, MPLS, MPLS LDP, RSVP-TE, PWE3, and PIM can
dynamically trigger the establishment of BFD sessions.
When the two ends of a BFD session create discriminators in different modes:
l If the discriminators on the local end are specified manually, the discriminators on the
remote end must also be specified manually.
l If you configure a static BFD session with automatically negotiated discriminators on the
local end, you can configure a static BFD session with automatically negotiated
discriminators or configure a dynamic BFD session on the peer end.
l If a static BFD session with automatically negotiated discriminators and a dynamic BFD
session are configured at the local end, the following principles are applicable:
If the dynamic BFD session and static BFD session with automatically negotiated
discriminators share the same configurations (the source address, destination address,
outbound interface, and VPN index), the two BFD sessions coexist.
If the dynamic BFD session named DYN_local discriminator is configured earlier than
the static BFD session with automatically negotiated discriminators, the name of the
dynamic BFD session is changed to the name of the static BFD session.
The two BFD sessions use the smaller values of BFD parameters.
Single-Hop BFD
Single-hop BFD detects connectivity of the forwarding link between two directly connected
devices.
Between the two systems detected by the single-hop BFD session, only one BFD session can be
set up on a specified interface enabled with a specified data protocol. Therefore, each BFD
session is bound to an interface. On the S9700, BFD sessions are bound to Layer 2 interfaces.
The S9700 provides single-hop BFD for the link fault between IS-IS peer nodes. By detecting
the link fault between IS-IS peer nodes, the S9700 fast reports the fault to IS-IS, triggering IS-
IS fast convergence.
Multi-Hop BFD
Multi-hop BFD detects IP connectivity of paths between two non-directly-connected devices.
These paths may span multiple hops or overlap. Multi-hop BFD is often used to detect reachable
routes between two devices.
The S9700 provides multi-hop BFD for static routes. Generally, static routes do not have the
detection mechanism. When a network fails, the administrator needs to check the static routes
manually. You can use multi-hop BFD to check the status of static routes. The RM module
determines whether a static route is available according to the status of the BFD session.
Association Between the BFD Session Status and the Interface Status
When a transmission device exists on a directly connected link, BFD can detect a fault faster
than the detection mechanism of the link protocol on the interface. The link protocol status of
the trunk interface or the VLAN interface depends on the link protocol status of member
interfaces.
Therefore, to notify the BFD detection result to the application rapidly, each interface is added
with an attribute in the interface management module of the S9700, that is, the BFD status. The
BFD status indicates the status of the BFD session that is bound to the interface. The system
determines the interface status according to the link status, protocol status, and BFD status, and
then notifies the interface status to the application.
The association between the BFD session status and the interface status means that the BFD
session status in the IFNET module is modified when the BFD session status changes. This
function is valid for the single-hop BFD session that is bound to an outbound interface and uses
the default multicast address.
l After the BFD session is bound to an interface,
When the BFD session goes Down, the status of the interface that is bound to the BFD
session also goes Down. The application on the interface is notified of the interface
status change.
When the BFD session status goes Up, the status of the interface that is bound to the
BFD session also goes Up.
This function aims to fast report BFD detection results to the application.
NOTE
For details on how to configure BFD for static routes, see Configuring BFD for IPv4 Static Routes on a
Public Network in the S9700 Core Routing Switch Configuration Guide - IP Routing.
The S9700 uses BFD to check the protected interfaces and to trigger the LDP FRR
switching.
l BFD for IP FRR and BFD for VPN FRR
On the S9700, IP FRR and VPN FRR are triggered after BFD reports detection faults to
the upper-layer application.
l BFD can provide reliability for MPLS-based applications, such as VPN FRR, TE FRR, and
VLL FRR, to protect services.
For details on how to configure BFD for PIM, see the S9700 Core Routing Switch Configuration Guide -
Multicast.
BFD for PW
BFD can quickly detect faults on the PW between the local and remote PEs to support FRR on
the VLL and reduce the impact of link faults on the services. The S9700 can set up a static BFD
session with manually configured discriminators or a dynamic BFD session to detect faults on
a PW.
The S9700 combines BFD and VCCV ping to detect the connectivity of the PW dynamically.
In this manner, the S9700 triggers fast switchover of the upper-layer services to protect them.
NOTE
For details on how to configure BFD for PWs, see the S9700 Core Routing Switch Configuration Guide
- VPN.
NOTE
For details on how to configure BFD for VSI PWs, see the S9700 Core Routing Switch Configuration
Guide - VPN.
Applicable Environment
To fast check directly connected links, configure single-hop BFD.
Pre-configuration Tasks
Before configuring single-hop BFD, complete the following tasks:
Data Preparation
To configure single-hop BFD, you need the following data.
No. Data
No. Data
2 Peer IP address, local interface type and number for the directly-connected link
detected by BFD, and default multicast address used by BFD if it checks the physical
layer status of the link
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run:
system-view
To implement single-hop BFD on a Layer 2 forwarding link, BFD needs to use a multicast IP
address. By default, BFD uses the multicast IP address 224.0.0.184.
NOTE
l If this multicast IP address is used by other protocols on the network, you must change the multicast
IP address. The S9700s at both ends of the BFD session must use the same multicast IP address.
l If multiple BFD sessions exist on a path, for example, Layer 3 interfaces are connected through Layer
2 switching devices that support BFD, you must configure different default multicast IP addresses for
the devices where different BFD sessions are established. In this manner, BFD packets can be correctly
forwarded.
----End
Context
Do as follows on S9700s at both ends of the link to be detected.
Procedure
Step 1 Run:
system-view
When you set the discriminators, ensure that the local discriminator at the local end is the same
as the remote discriminator at the peer end; otherwise, the BFD session fails to be set up. After
local and remote discriminators are set successfully, they cannot be modified.
NOTE
For the BFD sessions that use the default multicast IP address, the local and remote discriminators must
be different.
----End
Procedure
l Run the display bfd configuration { all | static } [ for-vsi-pw | for-ip | for-lsp | for-pw
| for-te ] [ verbose ] command to check the configuration of BFD.
l Run the display bfd interface [ interface-type interface-number ] command to check
information about the interface where BFD is enabled.
l Run the display bfd session { all | static } [ for-ip | for-lsp | for-pw | for-te | for-vsi-
pw ] [ verbose ] command to check information about a BFD session.
l Run the display bfd statistics session { all | static } [ for-ip | for-lsp | for-pw | for-te |
for-vsi-pw ] command to check the statistics on a BFD session.
----End
Example
Run the display bfd configuration command, and you can view the configuration of a BFD
session.
<Quidway> display bfd configuration static name bfd1 verbose
--------------------------------------------------------------------------------
BFD Session Configuration Name : bfd1
--------------------------------------------------------------------------------
Local Discriminator : 10 Remote Discriminator : 20
BFD Bind Type : Interface(Vlanif511)
Bind Session Type : Static
Bind Peer IP Address : 11.1.1.2
Bind Interface : Vlanif110
TOS-EXP : 7 Local Detect Multi : 3
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
WTR Interval (ms) : - Process PST : Disable
Proc Interface Status : Disable
Bind Application : No Application Bind
Session Description : -
--------------------------------------------------------------------------------
Run the display bfd interface command, and you can view information about the BFD session
on a specified interface.
<Quidway> display bfd interface gigabitethernet 3/0/1
--------------------------------------------------------------------------------
Interface Name MIndex Sess-Count BFD-State
--------------------------------------------------------------------------------
GigabitEthernet3/0/1 1025 1 up
Run the display bfd session command, and you can view information about a BFD session.
<Quidway> display bfd session all
--------------------------------------------------------------------------------
Run the display bfd statistics session command, and you can view the statistics on a BFD
session.
<Quidway> display bfd statistics session static for-ip
--------------------------------------------------------------------------------
Session MIndex : 4097 (One Hop) State : Init Name : 9to6
--------------------------------------------------------------------------------
Session Type : Static
Bind Type : IP
Local/Remote Discriminator : 20/10
Received Packets : 97
Send Packets : 314
Received Bad Packets : 169
Send Bad Packets : 0
Down Count : 32
ShortBreak Count : 0
Send Lsp Ping Count : 0
Dynamic Session Delete Count : 0
Create Time : 2007/10/14 16:48:13
Last Down Time : 2007/10/14 17:09:11
Total Time From Last DOWN : ---D:--H:--M:--S
Total Time From Create : 000D:00H:20M:59S
--------------------------------------------------------------------------------
Applicable Environment
To rapidly detect the faults occur during IP switch forwarding, configure the multi-hop BFD.
Pre-configuration Tasks
Before configuring multi-hop BFD, complete the following tasks:
Data Preparation
To configure the multi-hop BFD, you need the following data.
No. Data
1 Remote IP address
Context
Perform the following procedure on the switch:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
----End
Context
If Unicast Reverse Path Forwarding (URPF) is enabled on a device on the transmission path of
BFD packets, this device checks the source IP address of the BFD packets. In this case, you can
specify the correct source IP address of BFD packets by setting the source-ip parameter when
creating a BFD session to prevent BFD packets from being discarded.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd cfg-name bind peer-ip peer-ip [ vpn-instance vpn-instance-name ] [ source-ip
source-ip ]
l When creating a BFD session for the first time, you must bind the BFD session to the peer
IP address. In addition, the configuration of the BFD session cannot be changed after being
created.
l When the BFD configuration items are created, the system checks only the format of the IP
address rather than the correctness. A BFD session cannot be established if an incorrect peer
IP address or source IP address is bound.
l When BFD and URPF are used together, URPF checks the source IP address of the received
BFD packets. In this case, you need to specify the correct source IP address of BFD packets
by setting the source-ip parameter when creating a BFD session to prevent BFD packets
from being discarded incorrectly.
Step 3 Set the identifiers.
l Run:
discriminator local discr-value
----End
Procedure
l Run the display bfd configuration { all | static } [ for-vsi-pw | for-ip | for-lsp | for-pw
| for-te ] [ verbose ] and display bfd configuration { static name cfg-name |
discriminator local-discr-value | dynamic | peer-ip peer-ip [ vpn-instance vpn-name ] |
static-auto } [ verbose ] commands to check the configuration of BFD.
l Run the display bfd session { all | static } [ for-ip | for-lsp | for-pw | for-te | for-vsi-
pw ] [ verbose ] and display bfd session { dynamic | discriminator discr-value | peer-
ip peer-ip [ vpn-instance vpn-name ] | static-auto } [ verbose ] commands to check
information about a BFD session.
l Run the display bfd statistics session { all | static } [ for-ip | for-lsp | for-pw | for-te |
for-vsi-pw ] and display bfd statistics session { dynamic | discriminator discr-value |
peer-ip peer-ip [ vpn-instance vpn-name ] | static-auto } commands to check the statistics
on a BFD session.
----End
Example
Run the display bfd configuration command, and you can view the configuration of a BFD
session.
<Quidway> display bfd configuration static name bfd1 verbose
--------------------------------------------------------------------------------
BFD Session Configuration Name : bfd1
--------------------------------------------------------------------------------
Local Discriminator : 22 Remote Discriminator : 11
Run the display bfd session command, and you can view information about a BFD session.
<Quidway> display bfd session discriminator 22 verbose
--------------------------------------------------------------------------------
Session MIndex : 4096 (One Hop) State : Up Name : bfd1
--------------------------------------------------------------------------------
Local Discriminator : 22 Remote Discriminator : 11
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Interface(GigabitEthernet3/0/1)
Bind Session Type : Static
Bind Peer IP Address : 224.0.0.184
NextHop Ip Address : 224.0.0.184
Bind Interface : GigabitEthernet3/0/1
FSM Board Id : 0 TOS-EXP : 7
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Actual Tx Interval (ms): 1000 Actual Rx Interval (ms): 1000
Local Detect Multi : 3 Detect Interval (ms) : 3000
Echo Passive : Disable Acl Number : -
Destination Port : 3784 TTL : 255
Proc Interface Status : Disable Process PST : Disable
WTR Interval (ms) : - Local Demand Mode : Disable
Active Multi : 3
Last Local Diagnostic : No Diagnostic
Bind Application : No Application Bind
Session TX TmrID : 16394 Session Detect TmrID : 16395
Session Init TmrID : - Session WTR TmrID : -
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0
Session Description : -
--------------------------------------------------------------------------------
Run the display bfd statistics session command, and you can view statistics a BFD session.
<Quidway> display bfd statistics session all
--------------------------------------------------------------------------------
Session MIndex : 4096 (One Hop) State : Up Name : bfd1
--------------------------------------------------------------------------------
Session Type : Static
Bind Type : IP
Local/Remote Discriminator : 22/11
Received Packets : 178
Send Packets : 177
Received Bad Packets : 0
Send Bad Packets : 0
Down Count : 0
ShortBreak Count : 0
Send Lsp Ping Count : 0
Dynamic Session Delete Count : 0
Create Time : 2007/10/14 22:26:53
Last Down Time : 0000/00/00 00:00:00
Total Time From Last DOWN : ---D:--H:--M:--S
Total Time From Create : 000D:00H:03M:03S
--------------------------------------------------------------------------------
Applicable Environment
If a dynamic BFD session is used by a remote device, a static BFD session with automatically
negotiated discriminators must be created on a local device to interwork with the remote device
and support a static route tracking BFD.
Pre-configuration Tasks
Before configuring a BFD session with automatically negotiated discriminators, complete the
following tasks:
Data Preparation
To complete the configuration, you need the following data.
No. Data
2 IP addresses of local and remote ends of a link checked by BFD, and name and
number of the local interface
Context
Perform the following procedure on the switch that uses a static BFD session with automatically
negotiated discriminators to detect link faults:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
----End
Context
Do as follows on the Switch where the static BFD session with automatically negotiated
discriminators is used to detect the link.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd cfg-name bind peer-ip ip-address [ vpn-instance vpn-name ] [ interface
interface-type interface-number] source-ip ip-address auto
A BFD session with different parameters is created according to the detected link type.
l When creating a single-hop BFD session for the first time, you must bind the single-hop BFD
session to the peer IP address and the local address. In addition, the configuration of the
single-hop BFD session cannot be changed after being created.
l Specify the source IP address.
l Specify the peer IP address instead of the multicast IP address.
----End
Context
The configurations of creating a static BFD session with automatically negotiated discriminators
are complete.
Procedure
Step 1 Run the display bfd session { all | static | dynamic | discriminator discr-value | peer-ip peer-
ip [ vpn-instance vpn-name ] } [ verbose ] command to check information about a BFD session.
----End
Example
# Display detailed information about all the BFD sessions.
<Quidway> display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 4098 (One Hop) State : Up Name : staticbfd
--------------------------------------------------------------------------------
Local Discriminator : 8192 Remote Discriminator : 8192
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Interface(Vlanif3)
Bind Session Type : Static_Auto
Bind Peer IP Address : 10.10.10.119
NextHop Ip Address : 10.10.10.119
Bind Interface : Vlanif3
Bind Source IP Address : 10.10.10.116
FSM Board Id : 0 TOS-EXP : 7
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Actual Tx Interval (ms): 1000 Actual Rx Interval (ms): 1000
Local Detect Multi : 3 Detect Interval (ms) : 3000
Echo Passive : Disable Acl Number : -
Destination Port : 3784 TTL : 255
Proc Interface Status : Disable Process PST : Disable
WTR Interval (ms) : - Local Demand Mode : Disable
Active Multi : 3
Last Local Diagnostic : No Diagnostic
Bind Application : AUTO
Session TX TmrID : 16396 Session Detect TmrID : 16397
Session Init TmrID : - Session WTR TmrID : -
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0 | OAMF-0
Session Description : -
--------------------------------------------------------------------------------
You can view that a BFD session with the type as Static_Auto is established. The local
discriminator and the remote discriminator of this BFD session are 8192 and 8192 respectively,
which are obtained through automatic negotiation.
Applicable Environment
After a BFD session is set up, the sending interval, receiving interval, and local detection
multiplier are adjusted on the basis of network status and performance requirements.
The Wait to Recovery (WTR) time for a BFD session is set to prevent frequent master/slave
switchovers caused by BFD session flapping.
The description of a BFD session is added to describe a link monitored by a BFD session.
If none of the preceding parameters is set, the default configurations are used.
Pre-configuration Tasks
Before adjusting BFD parameters, you need to set up a BFD session.
Data Preparation
To adjust BFD parameters, you need the following data.
No Data
Context
To reduce the usage of system resource, when detecting that the BFD session becomes Down,
the system sets the intervals for sending and receiving BFD packets at the local end to a random
value between 1000 and 3000 milliseconds. When the BFD session recovers, the intervals set
by the user are used.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd configuration-name
Step 3 Run:
min-tx-interval interval
By default, if the Flexible Service Unit (FSU) is used, the interval for sending BFD control
packets is 10 ms; if the FSU is not used, the interval for sending BFD control packets is 1000
ms
NOTE
If the FSU is installed, the interval for sending packets can be set to 0 ms, 20 ms, 50 ms, 100 ms, or 1000
ms. If the FSU is not installed, the interval can only be set to 100 ms or 1000 ms.
Step 4 Run:
detect-multiplier multiplier
----End
Context
NOTE
The description command takes effect only on statically configured BFD sessions not on BFD sessions
that are dynamically configured or BFD sessions that are created by using automatically negotiated
discriminators.
Procedure
Step 1 Run:
system-view
----End
Context
The WTR time for a BFD session is used to prevent frequent master/slave switchovers caused
by BFD session flapping. If a BFD session changes from Down to Up, BFD reports the change
to an upper-layer application after the WTR time expires.
Do as follows on the switch:
Procedure
Step 1 Run:
system-view
----End
l Check whether packets of different priorities on the same link can be forwarded.
l Ensure that BFD packets with a higher priority are forwarded first.
Do as follows on the S9700.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd configuration-name
----End
Procedure
Step 1 Run the display bfd configuration { all | static } [ for-vsi-pw | for-ip | for-lsp | for-pw | for-
te ] [ verbose ] and display bfd configuration { static name cfg-name | discriminator local-
discr-value | dynamic | peer-ip peer-ip [ vpn-instance vpn-name ] | static-auto } [ verbose ]
commands to check the configuration of BFD.
Step 2 Run the display bfd session { all | static } [ for-ip | for-lsp | for-pw | for-te | for-vsi-pw ]
[ verbose ] and display bfd session { dynamic | discriminator discr-value | peer-ip peer-ip
[ vpn-instance vpn-name ] | static-auto } [ verbose ] command to check information about a
BFD session.
----End
Example
# Run the display bfd configuration command, and you can view the configuration of BFD.
<Quidway> display bfd configuration static for-ip verbose
--------------------------------------------------------------------------------
BFD Session Configuration Name : multi
--------------------------------------------------------------------------------
Local Discriminator : 321 Remote Discriminator : 123
BFD Bind Type : Peer IP Address
Bind Session Type : Static
Bind Peer IP Address : 10.111.111.2
TOS-EXP : 6 Local Detect Multi : 3
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
WTR Interval (ms) : 1800000 Process PST : Disable
Proc Interface Status : Disable
Local Demand Mode : Disable
Bind Application : No Application Bind
Session Description : -
--------------------------------------------------------------------------------
Run the display bfd session command, and you can view information about a BFD session.
Applicable Environment
The BFD control packet is encapsulated in the UDP packet for transmission, using the source
port in the range of 49152 to 65535 and destination port 3784 or 4784. According to the
RFC5883, the destination port 4784 is used for the multi-hop BFD control packet. On the
S9700 of the earlier version, however, destination port 3784 is used for the multi-hop BFD
control packet.
The destination port number of the multi-hop BFD control packet can be configured globally
according to the requirements:
l To interwork with the device running the version earlier than the S9700, the device running
the S9700 can be configured with destination port 3784 for the multi-hop BFD control
packet.
l To interwork with the non-Huawei device, the device running the S9700 can be configured
with destination port 4784 for the multi-hop BFD control packet.
Pre-configuration Tasks
Before globally configuring the destination port number for the multi-hop BFD control packet,
complete the following tasks:
l Installing the device and turning it on properly
l Connecting interfaces correctly
Data Preparation
To globally configure the destination port number for the multi-hop BFD control packet, you
need the following data.
No. Data
Context
Do as follows on each device:
Procedure
Step 1 Run:
system-view
BFD is enabled globally on the local node and the BFD view is displayed.
Step 3 Run:
multi-hop destination-port { 3784 | 4784 }
The destination port number is configured globally for the multi-hop BFD control packet.
NOTE
If destination port 3784 is used by the multi-hop BFD control packets on a switch, the switch can
successfully negotiate with the switch on which destination port 4784 is used by the multi-hop BFD control
packets. At the same time, on the switch that is configured with destination port 3784, destination port
3784 is automatically updated to destination port 4784. To change the destination port number, run the
shutdown command to terminate the BFD session on destination port, then, run the multi-hop destination-
port command on destination ports 4784 and 3784, and finally run the undo shutdown command to restore
the BFD session.
----End
Prerequisites
All global configurations of the destination port number of the multi-hop BFD control packet
are completed.
Context
NOTE
You can view information about the BFD session and its statistics only after only after BFD session
parameters are configured and the BFD session is set up successfully.
Procedure
l Run the display bfd session { all | discriminator discr-value | dynamic | peer-ip peer-
ip [ vpn-instance vpn-instance-name ] | static } [ verbose ] command to view information
about the BFD session.
l Run the display bfd statistics command to view information about statistics of global BFD.
----End
Example
After the configuration, run the display bfd session all verbose command.According to the
preceding command output, you can view that destination port 3784 is used for the multi-hop
BFD control packet.
<Quidway> display bfd session all verbose
---------------------------------------------------------------------
Session MIndex : 16384 (Multi Hop) State : Up Name : test
---------------------------------------------------------------------
Local Discriminator : 111 Remote Discriminator : 222
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Interface(Vlanif10)
Bind Session Type : Static
Bind Peer IP Address : 100.1.1.2
NextHop Ip Address : 100.1.1.2
Bind Interface : Vlanif10
FSM Board Id : 6 TOS-EXP : 6
Min Tx Interval (ms) : 10 Min Rx Interval (ms) :10
Actual Tx Interval (ms): 10 Actual Rx Interval (ms): 10
Local Detect Multi : 3 Detect Interval (ms) : 30
Echo Passive : Disable Acl Number : -
Destination Port : 3784 TTL : 254
Applicable Environment
If BFD is Up on a network, the interface bound to BFD goes Up and traffic can be switched
back to the interface. If the interface goes Up before the status of the routing protocol changes,
no route is available for forwarding and switching back traffic. As a result, traffic is dropped.
The time when the routing protocol goes Up and the time when the interface goes Up must be
synchronous.
Pre-configuration Tasks
Before configuring the delay of BFD session status change to Up, ensure that the switch runs
properly.
Data Preparation
To complete the configuration, you need the following data.
No. Data
1 Delay time
Context
Perform the following procedure on the switchs on which the setup of the BFD session needs
to be delayed:
Procedure
Step 1 Run:
system-view
----End
Prerequisites
The configurations of the delay of a BFD session to go Up are complete.
Procedure
Step 1 Run the display bfd statistics [ slot slot-id ] command to check statistics about global BFD.
----End
Example
# After the configuration, restart the switch. After the restart, run the display bfd statistics
command.The System Session Delay Up Timer field in the command output. This field displays
the status of the current system delay Up time. OFF indicates that the system is in the normal
state; Xs indicates that after X seconds, the system recovers, and the BFD session goes Up.
<Quidway> display bfd statistics
Current Display Board Number : Main ; Current Product Register Type: S9700
IP Multihop Destination Port : 3784
Total Up/Down Session Number : 0/1
Current Session Number :
Static session : 0 Dynamic session : 0
E_Dynamic session : 0 STATIC_AUTO session : 1
LDP_LSP session : 0 STATIC_LSP session : 0
TE_TUNNEL session : 0 TE_LSP session : 0
PW session : 0 IP session : 1
VSI PW session : 0
--------------------------------------------------------------------------------
PAF/LCS Name Maxnum Minnum Create
--------------------------------------------------------------------------------
BFD_CFG_NUM 8192 1 1
BFD_IF_NUM 512 1 1
BFD_SESSION_NUM 8192 1 1
BFD_IO_SESSION_NUM 512 1 0
BFD_PER_TUNNEL_CFG_NUM 16 1 0
--------------------------------------------------------------------------------
IO Board Current Created Session Statistics Information :(slot/number)
--------------------------------------------------------------------------------
0/1 1/0 2/0 3/0
4/0 5/0 6/0 7/0
8/0 9/0 10/0 11/0
12/0 13/0 14/0 15/0
16/0
--------------------------------------------------------------------------------
Current Total Used Discriminator Num : 1
--------------------------------------------------------------------------------
IO Board Reserved Sessions Number Information :(slot/number)
--------------------------------------------------------------------------------
0/0 1/0 2/0 3/0
4/0 5/0 6/0 7/0
8/0 9/0 10/0 11/0
12/0 13/0 14/0 15/0
16/0
--------------------------------------------------------------------------------
BFD HA Information :
--------------------------------------------------------------------------------
Core Current HA Status : Normal
Shell Current HA Status : Normal
--------------------------------------------------------------------------------
BFD for LSP Information :
--------------------------------------------------------------------------------
Ability of auto creating BFD session on egress : Disable
Period of LSP Ping : 60
System Session Delay Up Timer : OFF
--------------------------------------------------------------------------------
Applicable Environment
On two directly-connected devices, one device supports BFD and the other does not. To fast
detect a link fault, you can create a BFD session with the one-arm Echo function on the BFD-
capable device. After the BFD-capable device sends a BFD Echo packet to the BFD-incapable
device, the BFD-incapable device directly loops back the packet, thus achieving fast detection
on the link.
Pre-configuration Tasks
Before configuring the BFD session with the one-arm Echo function, complete the following
tasks:
Data Preparation
To configure the BFD session with the one-arm Echo function, you need the following data.
No. Data
Context
Do as follows on the BFD-supported device at one end of a link.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
----End
Context
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd cfg-name bind peer-ip peer-ip [ vpn-instance vpn-instance-name ] interface
interface-type interface-number [ source-ip source-ip ] one-arm-echo
NOTE
l A BFD session with the one-arm Echo function can detect only single-hop links.
l When configuring the one-arm Echo function on the S9700 switch, set the source-ip source-ip to the
IP address of an interface (not the outbound interface) on the switch. Ensure that the peer device can
ping this IP address.
Step 3 Run:
discriminator local discr-value
The discriminator is set for the BFD session that one-arm Echo function configured.
The one-arm Echo function can be configured only on the BFD-capable device at one end of a
link. A BFD session with this function must be configured with a local discriminator rather than
a remote discriminator.
Step 5 Run:
commit
NOTE
After configuring the local discriminator parameter and any other required parameters for a BFD session
with the one-arm Echo function, you must run the commit command to make the configuration take effect.
----End
Prerequisites
The configurations of the one-arm Echo function are complete.
Procedure
l Run the display bfd configuration { all | static [ name cfg-name ] | discriminator local-
discr-value | dynamic | peer-ip peer-ip [ vpn-instance vpn-instance-name ] } [ verbose ]
command to check the configuration of a BFD session.
l Run the display bfd interface [ interface-type interface-number ] command to check
information about an interface configured with BFD.
l Run the display bfd session { all | discriminator discr-value | dynamic | peer-ip peer-
ip [ vpn-instance vpn-instance-name ] | static } [ verbose ] command to check information
about a BFD session.
l Run the display bfd statistics session { all | static | dynamic | discriminator discr-
value | peer-ip [ vpn-instance vpn-instance-name ] } command to check statistics about
BFD sessions.
----End
Example
After a BFD session with the one-arm Echo function has been successfully configured, run the
display bfd session all verbose command, and you can view detailed information about the
session.
<Quidway> display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 256 (One Hop) State : Up Name : atob
--------------------------------------------------------------------------------
Local Discriminator : 1 Remote Discriminator : -
Session Detect Mode : Asynchronous One-arm-echo Mode
BFD Bind Type : Interface(gigabitEthernet1/0/0)
Bind Session Type : Static
Bind Peer IP Address : 10.1.1.2
NextHop Ip Address : 10.1.1.2
Bind Interface : EigabitEthernet1/0/0
FSM Board Id : 0 TOS-EXP : 7
Echo Rx Interval (ms) : 100
Actual Tx Interval (ms): 1000 Actual Rx Interval (ms): 1000
Local Detect Multi : 3 Detect Interval (ms) : 3000
Echo Passive : Disable Acl Number : -
Destination Port : 3784 TTL : 255
Proc Interface Status : Disable Process PST : Disable
WTR Interval (ms) : - Local Demand Mode : Disable
Active Multi : 3
Last Local Diagnostic : Control Detection Time Expired
Bind Application : No Application Bind
Session TX TmrID : 87 Session Detect TmrID : 88
Session Init TmrID : - Session WTR TmrID : -
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0
Session Description : -
--------------------------------------------------------------------------------
The command output shows that a single-hop BFD session has been created and its status is Up.
Applicable Environment
If devices running different versions interwork with each other, the TTL values and detection
modes on both ends of a BFD session are different, resulting in BFD packet loss. The TTL is
set globally to enable Huawei devices to interwork with Huawei devices running different
S9700 versions and non-Huawei devices.
Pre-configuration Tasks
Before configuring the TTL globally, complete the following tasks:
l Connecting interfaces correctly
l Configuring the IP address of each Layer 3 interface correctly
Data Preparation
To configure the TTL globally, you need the following data.
No. Data
Context
Do as follows on each device:
Procedure
Step 1 Run:
system-view
BFD is enabled globally on the local device and the BFD view is displayed.
Step 3 Run:
peer-ip peer-ip mask-length ttl { single-hop | multi-hop } ttl-value
NOTE
l By default, in a static BFD session, the TTL for single-hop BFD packets is 255, and the TTL for multi-
hop BFD packets is 254; in a dynamic BFD session, the TTL for single-hop BFD packets is 255 and
the TTL for multi-hop BFD packets is 253.
l If a TTL is set for packets in a multi-hop BFD session that is in the same segment as a single-hop BFD
session, the single BFD session must be configured with the same IP address, a longer mask than that
for the multi-hop BFD session, and a TTL.
----End
Prerequisites
The configurations of the global TTL are completed.
Procedure
l Run the display bfd session { all | discriminator discr-value | dynamic | peer-ip peer-
ip [ vpn-instance vpn-instance-name ] | static } [ verbose ] command to view information
about the BFD session.
l Run the display bfd ttl command to view information about the globally configured TTL.
----End
Example
After the configurations are successful, run the display bfd ttl command, and you can view
information about the global TTL.
<Quidway> display bfd ttl
--------------------------------------------------------------------------
Peer IP Mask Type Value
---------------------------------------------------------------------------
1.1.1.0 24 Single-hop 255
---------------------------------------------------------------------------
Applicable Environment
If BFD is enabled with the SNMP trap function, the NMS receives messages indicating that the
BFD session is Up or Down. If the BFD session flaps, the NMS will receive a large number of
trap messages. In this case, BFD trap messages need to be suppressed. Setting the interval at
which trap messages are sent prevents overflow of trap messages.
Pre-configuration Tasks
Before configuring the interval at which trap messages are sent, enable BFD globally.
Data Preparation
To configure the interval at which trap messages are sent, you need the following data.
No. Data
Context
Do as follows on the switch that needs to be configured with the interval at which trap messages
are sent:
Procedure
Step 1 Run:
system-view
----End
Prerequisites
The configurations of the interval at which trap messages are sent are complete.
Procedure
l Run the display current-configuration configuration bfd command to view the
configuration of the BFD trap function.
----End
Example
Run the display current-configuration configuration bfd command, and you can view that
the interval at which trap messages are sent is 300 seconds.
<Quidway> display current-configuration configuration bfd
#
bfd
snmp-agent bfd trap-interval 300
#
return
Applicable Environment
You can configure the association between a BFD session and an interface to enable the BFD
session or the interface to send messages to each other in case of failure. As shown in Figure
7-1, CE1 is directly connected to PE1 and PE3, and CE2 is directly connected to PE2 and PE4.
BFD sessions are created between PE1 and PE2 and between PE3 and PE4. When a fault occurs
on a link between PEs, a CE needs to detect the fault to ensure reliable service transmission. In
this case, the associations between BFD sessions and interfaces can be configured. When the
BFD session between PE1 and PE2 detects a link fault, the BFD module on a PE notifies the
OAM management module of the fault. This triggers the physical status of GE 1/0/1 on a PE
directly connected to a CE to become Down. The CE can then detect the fault and switch traffic
to a backup path, which ensures reliable service transmission.
Figure 7-1 Networking diagram of the association between a BFD session and an interface
PE1 PE2
GE1/0/1 GE1/0/1
BFD
CE1 CE2
PE3 PE4
Primary Link
Backup Link
Assume that the bidirectional association between a BFD session and an interface is configured
on each PE. When GE 1/0/1 on PE1 connected to CE1 becomes Down, PE1 notifies the OAM
management module of the fault, and then the OAM management module forwards fault
information to the BFD session associated with GE 1/0/1. The fault information is sent to the
OAM management module on PE2 through BFD, which triggers the physical status of GE 1/0/1
to become Down. In this manner, CE2 can detect the fault and switch traffic to a backup path,
which ensures reliable service transmission.
NOTE
Currently, the association between a BFD session and an interface is inapplicable to links detected by the
BFD session for PWs.
The BFD session can be associated with the interface connecting a PE to a CE but not the interface
connecting two PEs (that is, the outbound interface of the BFD session).
Pre-configuration Tasks
Before configuring the association between a BFD session and an interface, complete the
following task:
Data Preparation
To configure the association between a BFD session and an interface, you need the following
data.
No. Data
No. Data
Context
Do as follows on the device that needs the association:
Procedure
Step 1 Run:
system-view
The bidirectional transmission of fault information between a BFD session and an interface
is configured.
NOTE
----End
Prerequisites
All configurations of the association between a BFD session and an interface is complete.
Procedure
Step 1 Run the display this command in the OAM management view to check whether a BFD session
and an interface are successfully associated.
----End
Example
Run the display this command. You can view all associations between BFD sessions and
interfaces.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress interface GigabitEthernet0/0/1 egress bfd-session 1 trigger if-
down
oam-bind ingress bfd-session 1 trigger if-down egress interface
GigabitEthernet1/0/1
#
return
Application Environment
As shown in Figure 7-2, BFD sessions are created between CE1 and PE1, between CE2 and
PE2, and between PE1 and PE2. When a fault occurs on a link between CE1 and PE1, CE2 needs
to detect the fault to ensure reliable service transmission. In this case, the association between
BFD sessions needs to be configured. When the BFD session between CE1 and PE1 detects a
fault, the BFD session on PE1 notifies the OAM management module of the fault. The OAM
management module notifies the associated BFD session on PE2. The BFD session sends the
fault information to the OAM management module on PE2. Then, the OAM management
module on PE2 notifies CE2 through BFD of the fault. CE2 can then detect the fault.
BFD
Pre-configuration Tasks
Before configuring the association between BFD sessions, complete the following task:
l Creating BFD sessions
Data Preparation
To configure the association between BFD sessions, you need the following data.
No. Data
Context
Do as follows on the device that needs the association:
Procedure
Step 1 Run:
system-view
Step 2 Run:
oam-mgr
The unidirectional transmission of fault information from one BFD session to the other BFD
session is configured.
After the configuration, when detecting a fault, BFD session bfd-session-id1 can send fault
messages to BFD session bfd-session-id2.
l Run:
oam-bind bfd-session bfd-session-id bfd-session bfd-session-id
The bidirectional transmission of fault information between two BFD sessions is configured.
NOTE
If Step 4 is performed, two oam-bind ingress bfd-session bfd-session-id egress bfd-session bfd-
sessionid commands are displayed in the configuration file, indicating fault notification in opposite
directions.
----End
Prerequisites
All configurations of the association between BFD sessions are complete.
Procedure
Step 1 Run the display this command in the OAM management view to check whether two BFD
sessions are successfully associated.
----End
Example
Run the display this command. You can view all associations between BFD sessions.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress bfd-session 1 egress bfd-session 2
oam-bind ingress bfd-session 2 egress bfd-session 1
#
return
Context
CAUTION
BFD statistics cannot be restored after being deleted. Exercise caution when using the command.
Procedure
l Run the reset bfd statistics { all | discriminator discr-value } command in the user view
to delete BFD statistics.
----End
Context
CAUTION
Debugging affects system performance. After debugging is complete, run undo debugging
all command to disable debugging immediately.
If a BFD fault occurs, run the following debugging command in the user view to locate the fault.
Procedure
Step 1 Run the debugging bfd { all | defect-detect | error | event | fsm | ha | packet | process | product-
interface | session-management | timer } command in the user view to enable the debugging
of the BFD module.
----End
Context
For configuration examples of BFD for static LDP, see Example for Configuring Static BFD
for Static LSPs in the S9700 Core Routing Switch Configuration Guide - MPLS.
For configuration examples of BFD for LDP LSPs, see Example for Configuring Static BFD
for LDP LSPs and Example for Configuring Dynamic BFD for LDP LSPs in the S9700 Core
Routing Switch Configuration Guide - MPLS.
For configuration examples of BFD for MPLS TE tunnels, see Example for Configuring Static
BFD for CR-LSPs, Example for Configuring Static BFD for TE Tunnels, Example for
Configuring Dynamic BFD for CR-LSPs, and Example for Configuring Dynamic BFD for
RSVP in the S9700 Core Routing Switch Configuration Guide - MPLS.
Figure 7-3 Networking diagram of single-hop BFD (for Layer 2 forwarding link)
GE1/0/1 GE1/0/1
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a BFD session on Switch A to detect the direct link from Switch A to Switch B.
2. Configure a BFD session on Switch B to detect the direct link from Switch B to Switch A.
Data Preparation
To complete the configuration, you need the following data:
l Type and number of the interface bound to the BFD session
l Local and remote identifiers of the BFD session
Use the default values of the minimum sending interval, the minimum receiving interval, and
the local detection multiplier of BFD control packets.
Procedure
Step 1 Configure single-hop BFD on Switch A.
# Enable BFD on Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] bfd
[SwitchA-bfd] quit
After the configuration, run the display bfd session command on Switch A and Switch B, and
you can find that a single-hop BFD session is set up and is in Up state.
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
bfd
#
bfd atob bind peer-ip default-ip interface GigabitEthernet1/0/1
discriminator local 1
discriminator remote 2
#
return
Networking Requirements
The S9700s are connected through the VLANIF interface at Layer 3. To detect the connectivity
of the link between two directly connected S9700s, you can configure single-hop BFD to bind
the BFD session to the VLANIF interface and its IP address.
As shown in Figure 7-4, a BFD session is created to detect the connectivity of the link between
Switch A and Switch B.
Figure 7-4 Networking diagram for configuring single-hop BFD on a VLANIF interface
VLANIF 13 VLANIF 13
10.1.1.5/24 10.1.1.6/24
GE1/0/1 GE1/0/1
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
5. Create a BFD session on Switch B to detect the link between Switch B and Switch A.
Data Preparation
To complete the configuration, you need the following data:
l Numbers of VLANIF interfaces bound to BFD sessions
l IP addresses of VLANIF interfaces
l Local and remote discriminators of BFD sessions
Default values of minimum intervals for sending BFD control packets, minimum intervals for
receiving BFD control packets, and local detection multipliers
Procedure
Step 1 On Switch A and Switch B, create VLAN 13, configure GE 1/0/1 interfaces as hybrid interfaces,
and add GE 1/0/1 interfaces to VLAN 13.
# Configure Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan 13
[SwitchA-vlan13] quit
[SwitchA] interface gigabitethernet1/0/1
[SwitchA-GigabitEthernet1/0/1] port hybrid pvid vlan 13
[SwitchA-GigabitEthernet1/0/1] port hybrid untagged vlan 13
[SwitchA-GigabitEthernet1/0/1] quit
# Configure Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan 13
[SwitchB-vlan13] quit
[SwitchB] interface gigabitethernet1/0/1
[SwitchB-GigabitEthernet1/0/1] port hybrid pvid vlan 13
[SwitchB-GigabitEthernet1/0/1] port hybrid untagged vlan 13
[SwitchB-GigabitEthernet1/0/1] quit
Step 2 Set IP addresses of VLANIF 13 interfaces so that Switch A can communicate with Switch B at
Layer 3.
# Configure Switch A.
[SwitchA] interface vlanif13
[SwitchA-Vlanif13] ip address 10.1.1.5 24
[SwitchA-Vlanif13] quit
# Configure Switch B.
[SwitchB] interface vlanif13
[SwitchB-Vlanif13] ip address 10.1.1.6 24
[SwitchB-Vlanif13] quit
After the configuration, run the display interface vlanif command on Switch A or Switch B.
You can view that the status of VLANIF 13 is Up.
[SwitchA] display interface vlanif 13
Vlanif13 current state : UP
Line protocol current state : UP
Last line protocol up time : 2007-10-19 11:46:42 UTC-08:00
Description:HUAWEI, Quidway Series, Vlanif13 Interface
Route Port,The Maximum Frame Length is 1500
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 13
#
bfd
#
interface Vlanif13
ip address 10.1.1.5 255.255.255.0
#
interface GigabitEthernet1/0/1
port hybrid pvid vlan 13
port hybrid untagged vlan 13
#
bfd atob bind peer-ip 10.1.1.6 interface Vlanif13
discriminator local 1
discriminator remote 2
#
return
VLAN 10 VLAN 20
SwitchA
SwitchB SwitchC
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a BFD session on Switch A to detect the multi-hop path from Switch A to Switch
C.
2. Configure a BFD session on Switch C to detect the multi-hop path from Switch C to Switch
A.
Data Preparation
To complete the configuration, you need the following data:
Use the default values of the minimum sending interval, the minimum receiving interval, and
the local detection multiplier of a BFD control packet.
Procedure
Step 1 Add interfaces to VLANs, create VLANIF interfaces, and assign an IP address to each VLANIF
interface.
The configurations of Switch B and Switch C are the same as the configuration of Switch A,
and are not mentioned here.
Step 2 Configure a reachable static route between Switch A and Switch C.
[SwitchA] ip route-static 10.2.0.0 16 10.1.1.2
The configuration of Switch C is the same as the configuration of Switch A, and is not mentioned
here.
Step 3 Configure multi-hop BFD on Switch A and Switch C.
# Create a BFD session with Switch C on Switch A.
[SwitchA] bfd
[SwitchA-bfd] quit
[SwitchA] bfd atoc bind peer-ip 10.2.1.2
[SwitchA-bfd-session-atoc] discriminator local 10
[SwitchA-bfd-session-atoc] discriminator remote 20
[SwitchA-bfd-session-atoc] quit
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10
#
bfd
#
interface Vlanif10
ip address 10.1.1.1 255.255.0.0
#
interface GigabitEthernet1/0/1
port hybrid pvid vlan 10
port hybrid untagged vlan 10
#
bfd atoc bind peer-ip 10.2.1.2
discriminator local 10
discriminator remote 20
commit
#
ip route-static 10.2.0.0 255.255.0.0 10.1.1.2
#
return
#
return
7.15.4 Example for Associating the BFD Status with the Interface
Status
Networking Requirements
As shown in Figure 7-6, transmission devices exist on the link. After the BFD status is associated
with the interface status, the status change of the BFD session between GE 1/0/0 of Switch A
and GE 1/0/0 of Switch B affects the protocol status of the interfaces when the link between
transmission devices fails. Fast convergence of routes is triggered.
Figure 7-6 Networking diagram for associating the BFD session status with the interface status
VLAINF10 VLAINF10
10.1.1.1/24 10.1.1.2/24
GE1/0/0 GE1/0/0
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Use the default values of the minimum sending interval, the minimum receiving interval, and
the local detection multiplier of a BFD control packet.
Procedure
Step 1 Set the IP addresses of the interfaces through which Switch A and Switch B are directly
connected.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan 10
[SwitchA-vlan10] quit
[SwitchA] interface gigabitethernet 1/0/0
[SwitchA-GigabitEthernet1/0/0] port hybrid pvid vlan 10
[SwitchA-GigabitEthernet1/0/0] port hybrid untagged vlan 10
[SwitchA-GigabitEthernet1/0/0] quit
[SwitchA] interface vlanif 10
[SwitchA-Vlanif10] ip address 10.1.1.1 24
[SwitchA-Vlanif10] quit
# Run the display bfd session all verbose command on Switch A and Switch B, and you can
find that a single-hop BFD session is set up and is in Up state. Take Switch A for example. The
display is as follows:
[SwitchA] display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 16384 (One Hop) State : Up Name : atob
--------------------------------------------------------------------------------
Local Discriminator : 10 Remote Discriminator : 20
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Interface(GigabitEthernet1/0/0)
Bind Session Type : Static
Bind Peer Ip Address : 224.0.0.184
NextHop Ip Address : 224.0.0.184
Bind Interface : GigabitEthernet1/0/0
FSM Board Id : 3 TOS-EXP : 7
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Actual Tx Interval (ms): 13000 Actual Rx Interval (ms): 13000
Local Detect Multi : 3 Detect Interval (ms) : 3000
Echo Passive : Disable Acl Number : --
Destination Port : 3784 TTL : 255
Proc interface status : Enable Process PST : Disable
WTR Interval (ms) : --
Active Multi : 3
Last Local Diagnostic : No Diagnostic
Bind Application : No Application Bind
Session TX TmrID : -- Session Detect TmrID : --
Session Init TmrID : -- Session WTR TmrID : --
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0
Session Description : --
--------------------------------------------------------------------------------
Step 3 Associate the BFD session status with the interface status.
After the configuration is complete, run the display bfd session all verbose command on Switch
A and Switch B, and you can find that the Proc interface status displays field is Enable.
Run the shutdown command on GE 1/0/0 of Switch B so that the BFD session is Down.
Run the display bfd session all verbose and display interface gigabitethernet 1/0/0 commands
on Switch A, and you can find that the status of the BFD session is Down, and the status of GE
1/0/0 is Up (BFD status down).
[SwitchA] display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 16384 (One Hop) State : Down Name : atob
--------------------------------------------------------------------------------
Local Discriminator : 10 Remote Discriminator : 20
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Interface(GigabitEthernet1/0/0)
Bind Session Type : Static
Bind Peer Ip Address : 224.0.0.184
NextHop Ip Address : 224.0.0.184
Bind Interface : GigabitEthernet1/0/0
FSM Board Id : 3 TOS-EXP : 7
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Actual Tx Interval (ms): 1000 Actual Rx Interval (ms): 1000
Local Detect Multi : 3 Detect Interval (ms) : 3000
Echo Passive : Disable Acl Number : --
Destination Port : 3784 TTL : 255
Proc interface status : Enable Process PST : Disable
WTR Interval (ms) : --
Active Multi : 3
Last Local Diagnostic : Neighbor Signaled Session Down
Bind Application : IFNET
Session TX TmrID : -- Session Detect TmrID : --
Session Init TmrID : -- Session WTR TmrID : --
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0
Session Description : --
--------------------------------------------------------------------------------
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10
#
bfd
#
interface Vlanif10
ip address 10.1.1.1 255.255.255.0
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 10
port hybrid untagged vlan 10
#
bfd atob bind peer-ip default-ip interface GigabitEthernet1/0/0
discriminator local 10
discriminator remote 20
process-interface-status
#
return
l Configuration file of Switch B
#
sysname SwitchB
#
vlan batch 10
#
bfd
#
interface Vlanif10
ip address 10.1.1.2 255.255.255.0
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 10
port hybrid untagged vlan10
#
bfd btoa bind peer-ip default-ip interface GigabitEthernet1/0/0
discriminator local 20
discriminator remote 10
process-interface-status
#
return
homing mode. Normally, the traffic is forwarded through the primary path CE1 -> PE1 -> PE3
-> CE2. If the BFD session between the PEs detects a fault on the link, a fault notification
message is encapsulated into a BFD packet and then sent to the OAM management module.
After receiving the BFD packet, the OAM management module triggers the physical status of
the interface bound to the BFD session to go Down.
NOTE
The CEs must be directly connected to the PEs and no Layer 2 devices are deployed between CE and PE.
Figure 7-7 Networking diagram for configuring association between a BFD session and an
interface
GE 1/0/2
PE1 Vlanif20 PE3
20.1.1.1/24
GE 1/0/2
GE 1/0/1 Vlanif30
Vlanif10 GE 1/0/1
Vlanif20 30.1.1.1/24
10.1.1.2/24
20.1.1.2/24
GE 1/0/1 GE 1/0/1
GE 1/0/3 CE2 GE 1/0/3
Vlanif10 Vlanif30
Vlanif100 Vlanif110
10.1.1.1/24 30.1.1.2/24
100.1.1.1/24 110.1.1.1/24
CE1
GE 1/0/2 GE 1/0/2
Vlanif40 Vlanif60
40.1.1.1/24 GE 1/0/2 60.1.1.1/24
Vlanif50
GE 1/0/1 GE 1/0/2
50.1.1.1/24
Vlanif40 Vlanif60
40.1.1.2 GE 1/0/1 60.1.1.2/24
PE2 Vlanif50 PE4
50.1.1.2/24
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Default values of the minimum interval for sending packets, the minimum interval for receiving
packets, and the local detection multiplier
Procedure
Step 1 Set IP addresses.
Configure VLANs allowed by interfaces and assign IP addresses to VLANIF interfaces. For
details, see Figure 7-7.
Run OSPF on CEs and PEs. To ensure that traffic is transmitted through the path CE1 -> PE1 -
> PE3 -> CE2, increase the OSPF cost of VLANIF 40 on CE1 and VLANIF 60 on CE2. For
example, change the cost to 10.
# Configure PE1.
[PE1] ospf 1
[PE1-ospf-1] area 0.0.0.0
[PE1-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[PE1-ospf-1-area-0.0.0.0] network 20.1.1.0 0.0.0.255
[PE1-ospf-1-area-0.0.0.0] quit
[PE1-ospf-1] quit
The configurations of PE2, PE3, and PE4 are similar to the configuration of PE1, and are not
mentioned here.
# Configure CE1.
[CE1] ospf 1
[CE1-ospf-1] area 0.0.0.0
[CE1-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[CE1-ospf-1-area-0.0.0.0] network 40.1.1.0 0.0.0.255
[CE1-ospf-1-area-0.0.0.0] network 100.1.1.0 0.0.0.255
[CE1-ospf-1-area-0.0.0.0] quit
[CE1-ospf-1] quit
[CE1] interface vlanif 40
[CE1-Vlanif40] ospf cost 10
[CE1-Vlanif40] quit
# Configure CE2.
[CE2] ospf 1
[CE2-ospf-1] area 0.0.0.0
[CE2-ospf-1-area-0.0.0.0] network 30.1.1.0 0.0.0.255
[CE2-ospf-1-area-0.0.0.0] network 60.1.1.0 0.0.0.255
[CE2-ospf-1-area-0.0.0.0] network 110.1.1.0 0.0.0.255
[CE2-ospf-1-area-0.0.0.0] quit
[CE2-ospf-1] quit
[CE2] interface vlanif 60
[CE2-Vlanif60] ospf cost 10
[CE2-Vlanif60] quit
Run the display ip routing-table command on CE1, and you can view that the outbound
interface for the route from CE1 to 110.1.1.0/24 is VLANIF 10. That is, traffic is transmitted
along the primary path.
[CE1] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 15 Routes : 15
# Configure PE1.
[PE1] bfd
[PE1-bfd] quit
[PE1] bfd pe1tope3 bind peer-ip 20.1.1.2 interface Vlanif20
[PE1-bfd-session-pe1tope3] discriminator local 1
[PE1-bfd-session-pe1tope3] discriminator remote 2
[PE1-bfd-session-pe1tope3] commit
[PE1-bfd-session-pe1tope3] quit
# Configure PE3.
[PE3] bfd
[PE3-bfd] quit
[PE3] bfd pe3tope1 bind peer-ip 20.1.1.1 interface Vlanif20
[PE3-bfd-session-pe3tope1] discriminator local 2
[PE3-bfd-session-pe3tope1] discriminator remote 1
[PE3-bfd-session-pe3tope1] quit
# Configure PE1.
[PE1] oam-mgr
[PE1-oam-mgr] oam-bind bfd-session 1 trigger if-down interface gigabitethernet
1/0/1
[PE1-oam-mgr] quit
# Configure PE3.
[PE3] oam-mgr
[PE3-oam-mgr] oam-bind bfd-session 2 trigger if-down interface gigabitethernet
1/0/2
[PE3-oam-mgr] quit
Run the shutdown command on GE 1/0/1 of PE3 to simulate the link fault. After receiving the
fault notification message encapsulated into a BFD packet that is sent by the OAM management
module, CE1 can detect the link fault between PE1 and PE3.
Run the display bfd session all verbose command on PE1, and you can view that the BFD
session becomes Down and the value of Bind Application is ETHOAM.
[PE1] display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 258 (Multi Hop) State : Down Name : pe1tope3
--------------------------------------------------------------------------------
Local Discriminator : 1 Remote Discriminator : 2
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Peer IP Address
Bind Session Type : Static
Bind Peer IP Address : 20.1.1.2
NextHop Ip Address : 20.1.1.2
Bind Interface :
Vlanif20
FSM Board Id : 0 TOS-EXP : 7
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Actual Tx Interval (ms): 1000 Actual Rx Interval (ms): 1000
Local Detect Multi : 3 Detect Interval (ms) : 3000
Echo Passive : Disable Acl Number : -
Destination Port : 3784 TTL : 254
Proc Interface Status : Disable
WTR Interval (ms) : -
Active Multi : 3
Last Local Diagnostic : No Diagnostic
Bind Application : ETHOAM
Session TX TmrID : 1068 Session Detect TmrID : 1069
Session Init TmrID : - Session WTR TmrID : -
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0
Session Description : -
--------------------------------------------------------------------------------
Run the display ip routing table command on CE1 to check the route from CE1 to CE2. The
next hop of 110.1.1.0/24 is 40.1.1.2. That is, the traffic is forwarded through the backup path.
[CE1] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 15 Routes : 15
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
vlan batch 10 40 100
#
bfd
#
interface Vlanif10
ip address 10.1.1.1 255.255.255.252
#
interface Vlanif40
ip address 40.1.1.1 255.255.255.252
ospf cost 10
#
interface Vlanif100
ip address 100.1.1.1 255.255.255.252
#
interface GigabitEthernet1/0/1
port hybrid pvid vlan 10
port hybrid untagged vlan 10
#
interface GigabitEthernet1/0/2
port hybrid pvid vlan 40
port hybrid untagged vlan 40
#
interface GigabitEthernet1/0/3
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 40.1.1.0 0.0.0.255
network 100.1.1.0 0.0.0.255
#
return
#
ospf 1
area 0.0.0.0
network 30.1.1.0 0.0.0.255
network 60.1.1.0 0.0.0.255
network 110.1.1.0 0.0.0.255
#
return
l Configuration file of PE1
#
sysname PE1
#
vlan batch 10 20
#
bfd
#
interface Vlanif10
ip address 10.1.1.2 255.255.255.252
#
interface Vlanif20
ip address 20.1.1.1 255.255.255.252
#
interface GigabitEthernet1/0/1
port hybrid pvid vlan 10
port hybrid untagged vlan 10
#
interface GigabitEthernet1/0/2
port hybrid pvid vlan 20
port hybrid untagged vlan 20
#
bfd pe1tope3 bind peer-ip 20.1.1.2 interface Vlanif20
discriminator local 1
discriminator remote 2
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 20.1.1.0 0.0.0.255
#
oam-mgr
oam-bind ingress interface GigabitEthernet1/0/1 egress bfd-session 1 trigger
if-down
oam-bind ingress bfd-session 1 trigger if-down egress interface
GigabitEthernet1/0/1
#
return
l Configuration file of PE3
#
sysname PE3
#
vlan batch 20 30
#
bfd
#
interface Vlanif20
ip address 20.1.1.2 255.255.255.252
#
interface Vlanif30
ip address 30.1.1.1 255.255.255.252
#
interface GigabitEthernet1/0/1
port hybrid pvid vlan 20
port hybrid untagged vlan 20
#
interface GigabitEthernet1/0/2
port hybrid pvid vlan 30
port hybrid untagged vlan 30
#
Networking Requirements
As shown in Figure 7-8, BFD runs between PEs and between PEs and CEs. CE1 is connected
to PE1 and PE2, and CE2 is connected to PE3 and PE4 in dual-homing mode. Normally, the
traffic is forwarded through the primary path CE1 -> PE1 -> PE3 -> CE2. When a fault occurs
on the link between PE1 and PE3, a fault notification message is transmitted to CE1 and CE2
through association between the status of BFD sessions on PE1 and PE3. Then, the traffic is
switched to the standby path CE1 -> PE2 -> PE4 -> CE2.
In this case, you can deploy association between the status of BFD sessions. When the BFD
session between the PEs detects a fault, a fault notification message is encapsulated into a BFD
packet and sent to the remote CE through the OAM management module. Then the CE detects
the fault and switches the traffic to the backup link.
Figure 7-8 Networking diagram for configuring association between the status of BFD sessions
GE 1/0/2
PE1 Vlanif20 PE3
20.1.1.1/24 GE 1/0/2
GE 1/0/1 Vlanif30
Vlanif10 GE 1/0/1
Vlanif20 30.1.1.1/24
10.1.1.2/24
20.1.1.2/24
GE 1/0/1 GE 1/0/1
CE1 Vlanif10 Vlanif30 CE2
10.1.1.1/24 30.1.1.2/24
GE 1/0/2 GE 1/0/2
Vlanif40 Vlanif60
40.1.1.1/24 GE 1/0/2 60.1.1.1/24
GE 1/0/1 Vlanif50 GE 1/0/2
Vlanif40 50.1.1.1/24 Vlanif60
40.1.1.2 GE 1/0/1 60.1.1.2/24
PE2 Vlanif50 PE4
50.1.1.2/24
Configuration Roadmap
The configuration roadmap is as follows:
1. Create BFD sessions between CE1 and PE1, between PE1 and PE3, and between PE3 and
CE2.
2. On PE1, configure bidirectional transmission of fault notification messages between CE1
and PE1 and between PE1 and PE3.
3. On PE3, configure bidirectional transmission of fault notification messages between PE1
and PE3 and between PE3 and CE2.
NOTE
Data Preparation
To complete the configuration, you need the following data:
l VLAN IDs of frames that are allowed on the interfaces
l Peer IP address bound to the BFD session
l Local interface that sends and receives BFD control packets
l Local discriminator and remote discriminator of the BFD session
Default values of the minimum interval for sending packets, the minimum interval for receiving
packets, and the local detection multiplier
Procedure
Step 1 Set IP addresses.
Configure the VLAN IDs of frames allowed by interfaces and assign IP addresses to VLANIF
interfaces. For details, see Figure 7-8.
The configuration details are not mentioned here.
Step 2 Configure the routing protocol.
In this example, OSPF is used.
Run OSPF on CE and PE devices. To ensure that traffic is transmitted through the path CE1 ->
PE1 -> PE3 -> CE2, increase the OSPF cost on VLANIF 40 of CE1 and VLANIF 60 of CE2.
For example, change the cost to 10.
# Configure PE1.
[PE1] ospf 1
[PE1-ospf-1] area 0.0.0.0
[PE1-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[PE1-ospf-1-area-0.0.0.0] network 20.1.1.0 0.0.0.255
[PE1-ospf-1-area-0.0.0.0] quit
[PE1-ospf-1] quit
The configurations of PE2, PE3, and PE4 are similar to the configuration of PE1, and are not
mentioned here.
# Configure CE1.
[CE1] ospf 1
[CE1-ospf-1] area 0.0.0.0
[CE1-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[CE1-ospf-1-area-0.0.0.0] network 40.1.1.0 0.0.0.255
[CE1-ospf-1-area-0.0.0.0] network 100.1.1.0 0.0.0.255
[CE1-ospf-1-area-0.0.0.0] quit
[CE1-ospf-1] quit
[CE1] interface vlanif 40
[CE1-Vlanif40] ospf cost 10
[CE1-Vlanif40] quit
# Configure CE2.
[CE2] ospf 1
[CE2-ospf-1] area 0.0.0.0
[CE2-ospf-1-area-0.0.0.0] network 30.1.1.0 0.0.0.255
[CE2-ospf-1-area-0.0.0.0] network 60.1.1.0 0.0.0.255
[CE2-ospf-1-area-0.0.0.0] network 110.1.1.0 0.0.0.255
[CE2-ospf-1-area-0.0.0.0] quit
[CE2-ospf-1] quit
[CE2] interface vlanif 60
[CE2-Vlanif60] ospf cost 10
[CE2-Vlanif60] quit
Run the display ip routing-table command on CE1, and you can view that the outgoing interface
for the route from CE1 to 110.1.1.0/24 is VLANIF 10. That is, the traffic is transmitted through
the primary path.
[CE1] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 15 Routes : 15
# Configure PE1.
[PE1] bfd
[PE1-bfd] quit
# Configure PE3.
[PE3] bfd
[PE3-bfd] quit
[PE3] bfd pe3toce2 peer-ip 30.1.1.2 interface vlanif 30
[PE3-bfd-session-pe3toce2] discriminator local 32
[PE3-bfd-session-pe3toce2] discriminator remote 23
[PE3-bfd-session-pe3toce2] quit
[PE3] bfd pe3tope1 peer-ip 20.1.1.1 interface vlanif 20
[PE3-bfd-session-pe3tope1] discriminator local 31
[PE3-bfd-session-pe3tope1] discriminator remote 13
[PE3-bfd-session-pe3tope1] quit
# Configure CE2.
[CE2] bfd
[CE2-bfd] quit
[CE2] bfd ce2tope3 peer-ip 30.1.1.1 interface vlanif 10
[CE2-bfd-session-ce2tope3] discriminator local 23
[CE2-bfd-session-ce2tope3] discriminator remote 32
[CE2-bfd-session-ce2tope3] quit
After the configuration, run the display bfd session all command on PEs and CEs, and you can
view that the status of the BFD sessions is Up. Take the display on PE1 as an example.
[PE1] display bfd session all
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
11 10 10.1.1.1 Up S_IP_IF Vlanif10
13 31 20.1.1.2 Up S_IP_IF Vlanif20
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
# Configure PE3.
[PE1] oam-mgr
[PE1-oam-mgr] oam-bind bfd-session 31 bfd-session 32
[PE1-oam-mgr] quit
--------------------------------------------------------------------------------
13 31 20.1.1.2 Down S_IP_IF Vlanif20
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
Run the display bfd session all verbose command on CE1 or CE3, and you can view that the
status of the BFD session is Down. Take the display on CE1 as an example:
[CE1]display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 4096 (One Hop) State : Down Name : ce1tope1
--------------------------------------------------------------------------------
Local Discriminator : 10 Remote Discriminator : 11
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Interface(Vlanif10)
Bind Session Type : Static
Bind Peer IP Address : 10.1.1.2
NextHop Ip Address : 10.1.1.2
Bind Interface : Vlanif10
FSM Board Id : 0 TOS-EXP : 7
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Actual Tx Interval (ms): 1000 Actual Rx Interval (ms): 1000
Local Detect Multi : 3 Detect Interval (ms) : -
Echo Passive : Disable Acl Number : -
Destination Port : 3784 TTL : 255
Proc Interface Status : Disable Process PST : Disable
WTR Interval (ms) : -
Last Local Diagnostic : No Diagnostic
Bind Application : ETHOAM
Session TX TmrID : 16392 Session Detect TmrID : -
Session Init TmrID : - Session WTR TmrID : -
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0 | OAMF-1
Session Description : -
--------------------------------------------------------------------------------
Run the display ip routing table command on CE1 to check the route from CE1 to CE2. The
next hop of 110.1.1.0/24 is 40.1.1.2. That is, the traffic is forwarded through the standby path.
[CE1] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 15 Routes : 15
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
vlan batch 10 40 100
#
bfd
#
interface Vlanif10
ip address 10.1.1.1 255.255.255.252
#
interface Vlanif40
ip address 40.1.1.1 255.255.255.252
ospf cost 10
#
interface Vlanif100
ip address 100.1.1.1 255.255.255.252
#
interface GigabitEthernet1/0/1
port hybrid pvid vlan 10
port hybrid untagged vlan 10
#
interface GigabitEthernet1/0/2
port hybrid pvid vlan 40
port hybrid untagged vlan 40
#
interface GigabitEthernet1/0/3
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
bfd ce1tope1 bind peer-ip 10.1.1.2 interface Vlanif10
discriminator local 10
discriminator remote 11
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 40.1.1.0 0.0.0.255
network 100.1.1.0 0.0.0.255
#
return
#
interface GigabitEthernet1/0/3
port hybrid pvid vlan 110
port hybrid untagged vlan 110
#
bfd ce2tope3 bind peer-ip 30.1.1.1 interface Vlanif30
discriminator local 23
discriminator remote 32
#
ospf 1
area 0.0.0.0
network 30.1.1.0 0.0.0.255
network 60.1.1.0 0.0.0.255
network 110.1.1.0 0.0.0.255
#
return
l Configuration file of PE1
#
sysname PE1
#
vlan batch 10 20
#
bfd
#
interface Vlanif10
ip address 10.1.1.2 255.255.255.252
#
interface Vlanif20
ip address 20.1.1.1 255.255.255.252
#
interface GigabitEthernet1/0/1
port hybrid pvid vlan 10
port hybrid untagged vlan 10
#
interface GigabitEthernet1/0/2
port hybrid pvid vlan 20
port hybrid untagged vlan 20
#
bfd pe1toce1 bind peer-ip 10.1.1.1 interface Vlanif10
discriminator local 11
discriminator remote 10
#
bfd pe1tope3 bind peer-ip 20.1.1.2 interface Vlanif20
discriminator local 13
discriminator remote 31
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 20.1.1.0 0.0.0.255
#
oam-mgr
oam-bind ingress bfd-session 11 egress bfd-session 13
oam-bind ingress bfd-session 13 egress bfd-session 11
#
return
l Configuration file of PE3
#
sysname PE3
#
vlan batch 20 30
#
bfd
#
interface Vlanif20
ip address 20.1.1.2 255.255.255.252
#
interface Vlanif30
A VRRPor VRRP6 backup group allows a backup to take over network traffic from a master
if the master fails.
Gateway:10.0.0.1
IP Address:10.0.0.2/24
10.0.0.1/24
Gateway:10.0.0.1
IP Address:10.0.0.3/24 Network
Gateway:10.0.0.1 SwitchA
IP Address:10.0.0.4/24
Ethernet
A common method to improve the system reliability is to deploy multiple egress gateways. In
addition, a mechanism for selecting one of routes to these gateways is required.
VRRP is a fault-tolerant protocol defined in RFC 3768. VRRP allows the hosts to select one of
routes to multiple egress gateways by separating logical devices from physical devices.
On a LAN (for example, an Ethernet) with multicast and broadcast capabilities, VRRP uses
logical gateways to provide high availability for transmission links, preventing a gateway failure
from interrupting services, without changing the configuration of routing protocols.
Master/Backup Mode
In VRRP, it is the basic mode for the backup of IP addresses. In the master/backup mode, a
VRRP backup group consists of a master switch and multiple backup switches. Different
switches have different priorities in this backup group. The switch with the highest priority serves
as the master switch.
and the backup device cannot communicate in time. After the AMB/SMB switchover of the
original master device, if its priority is higher than the current master device, it automatically
becomes the master device. During the AMB/SMB switchover, the system is busy processing
packets. Thus, the gratuitous ARP packets sent by the master device are blocked or processed
abnormally, and the system must refresh the MAC entries of the downstream switch through
subsequent packets. As a result, user packets are dropped in this period of time.
VRRP smooth switching can solve such a problem. After the AMB/SMB switchover takes place
on the master device and the new AMB is started, if the priority of the current backup device is
higher than that of the current master device, the backup device becomes the master device
automatically. At this time, VRRP saves the currently configured interval and adjusts the interval
for sending a VRRP Advertisement packet to the configured interval. After receiving a VRRP
Advertisement packet, the backup device learns the new interval carried in the packet. This
ensures the stability of the VRRP backup group during or after the AMB/SMB switchover of
the master device and prevents packet loss.
After VRRP smooth switching is enabled, the learning function takes precedence over the
preemption function. That is, if the interval carried in the received packet is inconsistent with
the current interval and the priority carried in the received packet is lower than the current
priority, VRRP performs the learning and timer resetting functions first, and then the preemption
function.
VRRP smooth switching also depends on the system. If the system is quite busy since the AMB/
SMB switchover and cannot schedule the operation on the VRRP module, VRRP smooth
switching cannot take effect.
mVRRP
Many VRRP backup groups run between switchs for different services. If each VRRP backup
group needs to maintain its own state machine, a large number of VRRP packets are generated
between switchs. To simplify the process and reduce the bandwidth occupied by protocol
packets, you can configure a VRRP backup group to be an mVRRP backup group and bind it
to other backup group members. Then, the status of the backup group member is determined by
the status of the bound mVRRP backup group.
VRRP6
VRRP for IPv6, also called VRRP6, is a fault-tolerant protocol functioning as an extension to
the VRRP protocol. VRRP6 groups multiple switchs into one virtual router. When the next hop
of a host fails, VRRP6 can switch services to another switch through a certain mechanism. This
thus ensures coherence and reliability of communications.
The following table shows the comparison between VRRP6 and VRRP for IPv4 based on
functions.
Applicable Environment
The VRRP backup group works in master/backup mode or load balancing mode.
Pre-configuration Tasks
Before configuring the VRRP backup group, complete the following tasks:
l Configuring network layer attributes for the interface to connect the network
Data Preparation
To configure the VRRP backup group, you need the following data.
No. Data
1 Backup group ID
Context
Do as follows on each switch of a backup group:
Perform the following step as required to configure VRRP for IPv4 or VRRP for IPv6.
CAUTION
When both VRRP and DHCP relay are configured on the network, neither the DHCP snooping
function nor the arp learning dhcp-trigger command can be configured on the VRRP master
and backup devices.
Procedure
l For VRRP for IPv4(VRRP), run the following commands:
1. Run:
system-view
NOTE
When you assign the first virtual IP address to a VRRP backup group, the system
creates this backup group. Then, when you assign another virtual IP address to the
backup group, the system adds this address into the virtual IP address list of this backup
group.
For users who require equivalent VRRP reliability, a backup group can be configured
with multiple virtual IP addresses. Different addresses serve different user groups.
This is easy to manage and can prevent users' default gateway addresses from varying
with the VRRP configuration. A maximum number of 16 virtual IP addresses can be
configured for a backup group.
For a VRRP backup working in load balancing mode, you need to repeat the procedure
to configure multiple backup groups on an interface. At least two backup groups are
required on an interface. Backup groups are identified by VRIDs and their virtual IP
addresses cannot be identical.
NOTE
You can configure up to 255 VRRP groups on each interface of the S9700. To configure 255
VRRP groups on an interface, you need to set the CPCAR of VRRP packets to 256 kbps.
CAUTION
l When configuring VRRP and static ARP simultaneously on the S9700, do not use
the IP addresses in the static ARP entries as the virtual IP addresses of VRRP
groups. Otherwise, incorrect host routes are generated, which affects forwarding
between devices.
l The virtual MAC address of a VRRP backup group cannot be configured as a static
MAC address or blackhole MAC address.
l Do not create VRRP groups on the VLANIF interfaces corresponding to super
VLANs because the configuration degrades the system performance.
3. Run:
vrrp6 vrid virtual-router-id virtual-ip virtual-ipv6-address [ link-
local ]
A VRRP6 backup group is configured and a virtual IPv6 address is assigned to the
VRRP6 backup group.
NOTE
link-local indicates the virtual IPv6 address assigned to a VRRP6 backup group is a
link local address. The link local address is an IPv6 address with the prefix being FE80.
The link local address takes effect only on a local link because it is used by neighboring
nodes along the link to communicate with each other. An IPv6 switch never forwards
packets carrying link local addresses. To assign a virtual IPv6 address to a VRRP6
backup group, ensure that the first virtual IPv6 address is a link local address.
After the first virtual IPv6 address is assigned to a VRRP6 backup group, the system
creates the VRRP6 backup group. When another virtual IPv6 address is assigned to
the VRRP6 backup group, the system adds the virtual IPv6 address to the virtual IPv6
address list of the VRRP6 backup group.
In load balancing mode, you need to repeat this step to configure multiple VRRP6
backup groups. At least two VRRP6 backup groups need to be created and each
VRRP6 backup group is identified by a distinct VRID. In addition, virtual IPv6
addresses of VRRP6 backup groups must be different.
----End
Context
In master/backup mode, only one backup group is created. switchs have different priorities in
this backup group. The switch with the highest priority serves as the master and other switchs
are backups.
In load balancing mode, two backup groups or more are created. Every switch has different
priorities in different backup groups. Every switch plays a role based on its priority in a specific
backup group. Different priorities are set for every switch to allow that the masters of VRRP
backup groups are distributed on different switchs.
Perform the following step as required to configure VRRP for IPv4 (VRRPv4) or VRRP for
IPv6 (VRRPv6).
Procedure
l For VRRP for IPv4, run the following commands:
1. Run:
system-view
By default, the priority is 100. Priority 0 is reserved for special purpose. Priority 255
is reserved for the IP address owner and this priority cannot be configured. A priority
ranges from 1 to 254.
l For VRRP for IPv6, run the following commands:
1. Run:
system-view
By default, the priority is 100. Priority 0 is reserved for special use, and priority 255
is reserved for the IP address owner whose priority cannot be configured. The value
of a priority ranges from 1 to 254.
----End
Context
Perform the following steps on a VRRP switch that is configured with a super-VLAN:
Procedure
Step 1 Run:
system-view
----End
Prerequisites
The configurations of the VRRP backup group function are complete.
Procedure
l Run the display vrrp [ interface interface-type interface-number [ virtual-router-id ] ]
[ brief ] command to check the status of VRRP backup group.
l Run the display vrrp6 [ interface interface-type interface-number [ vrid virtual-router-
id ] ] [ brief ] command to check the status and the configurations of the VRRP6 backup
group.
----End
Example
In the master/backup mode, after the configuration, you can run the display vrrp command to
view the status of a VRRP backup group.
<Quidway> display vrrp
Vlanif100 | Virtual Router 1
State : Master
Virtual IP : 10.1.1.111
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 20s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
In the load balancing mode, after the configuration, you can run the display vrrp command to
view the status of a switch in different backup groups.
<Quidway> display vrrp
After the configuration, run the display vrrp6 command on the switch, and you can view
information about the VRRP6 backup group.
<Quidway> display vrrp6
Vlanif100 | Virtual Router 1
State : Master
Virtual IP : FE80::1:2
PriorityRun : 200
PriorityConfig : 200
MasterPriority : 200
Preempt : YES Delay Time : 0s
TimerRun : 100s
TimerConfig : 100s
Virtual Mac : 0000-5e00-0201
Uncheck hop limit : YES
Accept Mode : ON
Config type : normal-vrrp
Track If : GigabitEthernet3/0/4 priority reduced : 70
IF State : UP
Applicable Environment
VRRP tracking interface status provides the backup function when the interface where the VRRP
backup group resides is faulty or when another interface on the switch is faulty.
Interface status tracking works as follows:
1. When a tracked interface goes Down, the priority of the switch that houses the interface is
automatically reduced by a specific amount so that it is lower than prioties of other
switchs in the group.
2. A master/backup switchover within the VRRP backup group is completed. The switch with
the highest priority becomes the master switch.
Pre-configuration Tasks
Before configuring VRRP to track the status of an interface, complete the following tasks:
l Configuring network layer attributes for interfaces to connect the network
l Configuring a VRRP backup group
Data Preparation
To configure VRRP to track the status of an interface, you need the following data.
No. Data
1 Backup group ID
2 Interfaces to be tracked and the values by which the priority increases or decreases
Context
The backup is performed when other interfaces on a switch are unavailable. This feature is
required in NAT applications.
Do as follows on the switch that has an interface to be tracked:
Perform the following step as required to configure VRRP for IPv4 or VRRP for IPv6.
Procedure
l For VRRP for IPv4, run the following commands:
1. Run:
system-view
NOTE
You can configure up to eight tracked interfaces on a VRRP group. If an S9700 is the IP address
owner, interfaces of the S9700 cannot be tracked.
l For VRRP for IPv6, run the following commands:
1. Run:
system-view
Prerequisites
The configurations of enabling VRRP to track the status of an interface are complete.
Procedure
l Run the display vrrp [ interface interface-type interface-number [ virtual-router-id ] ]
[ brief ] command to check the VRRP status.
l Run the display vrrp6 [ interface interface-type interface-number [ vrid virtual-router-
id ] ] [ brief ] command to check the status and the configurations of a VRRP6 backup
group.
----End
Example
Run the display vrrp command or the display vrrp6 command to view the Track IF field and
the IF State field. The Track IF field indicates the type and number of the tracked interface,
and the IF State field indicates the interface status, which is either Up or Down.
<Quidway> display vrrp
Vlanif100 | Virtual Router 1
State : Master
Virtual IP : 10.1.1.111
PriorityRun : 130
PriorityConfig : 130
MasterPriority : 130
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
PriorityRun : 200
PriorityConfig : 200
MasterPriority : 200
Preempt : YES Delay Time : 0s
TimerRun : 100s
TimerConfig : 100s
Virtual Mac : 0000-5e00-0201
Uncheck hop limit : YES
Accept Mode : ON
Config type : normal-vrrp
Track If : GigabitEthernet2/0/1 priority reduced : 70
IF State : UP
Applicable Environment
VRRP tracks BFD sessions or EFM OAM. The VRRP module is notified of any change in BFD
or EFM sessions and this triggers a fast VRRP switchover.
If a VRRP backup group tracks several BFD sessions, a change in the status of a BFD session
does not affect the status of other BFD sessions.
If one of normal BFD sessions tracked by a VRRP backup group changes in status, the master/
backup switchover is triggered by changing priorities of routers in the VRRP backup group.
After the tracked normal BFD session recovers, the priorities of routers in the VRRP backup
group are restored to their original values.
Pre-configuration Tasks
Before configuring a fast VRRP switchover, complete the following tasks:
Data Preparation
To configure a fast VRRP switchover, you need the following data.
No. Data
1 Backup group ID
Context
Perform the following steps on the switch that needs to perform a fast VRRP switchover:
NOTE
l Before configuring a fast VRRP switchover, if VRRP tracks a peer BFD session, you must configure
a peer BFD session on both the master router and the backup router in a VRRP backup group. Otherwise,
VRRP flapping occurs.
l When configuring a VRRP backup group to track the status of a BFD session, note the following points:
l If the parameter session-name bfd-configure-name is specified, the VRRP backup group can track
the status of only static BFD sessions with automatically negotiated discriminators.
l If the parameter session-id is specified, the VRRP backup group can track the status of only static
BFD sessions.
Perform the following steps as required on a device enabled with VRRP for IPv4 or for VRRP
for IPv6.
Procedure
l For VRRP for IPv4:
1. Run:
system-view
The view of the interface configured with a VRRP backup group is displayed.
3. Run:
vrrp vrid virtual-router-id track bfd-session { bfd-session-id | session-
name bfd-name } [ increased value-increased | reduced value-reduced ]
higher than that of a master switch whose priority is changed. In this manner, the
VRRP status can be switched fast.
When a VRRP backup group monitors both BFD sessions and interfaces, the
maximum number of BFD sessions and interfaces is 8. If increased value-
increased is specified, the value of the increased VRRP backup group priority can
exceed the priority of the master VRRP backup group when all the tracked BFD
sessions or interfaces go Down. Otherwise, if the VRRP backup group takes
precedence of the peer because its priority is increased when one or part of tracked
BFD sessions or interfaces go Down, the additional increasing of the priority is of no
significance when other BFD sessions or interfaces go Down.
NOTE
When configuring a VRRP backup group to track the status of a BFD session, note the following
points:
l If the parameter session-name bfd-configure-name is specified, the VRRP backup group
can track the status of only dynamic BFD sessions.
l If the parameter session-id is specified, the VRRP backup group can track the status of only
static BFD sessions.
l For VRRP for IPv6:
1. Run:
system-view
The view of the interface configured with the VRRP backup group is displayed.
3. Run:
vrrp6 vrid virtual-router-id track bfd-session { session-id | session-
name bfd-configure-name } [ increased value-increased | reduced value-
reduced ]
NOTE
When configuring the value by which the priority increases or decreases, note that if the priority
of the Backup switch in a backup group is higher than that of the Master switch whose priority
is changed, the fast switchover is performed.
When configuring a VRRP6 backup group to track the status of a BFD session, note the
following points:
l If the parameter session-name bfd-configure-name is specified, the VRRP backup group
can track the status of only dynamic BFD sessions.
l If the parameter session-id is specified, the VRRP backup group can track the status of only
static BFD sessions.
----End
Context
A VRRP-enabled S9700 can track a local forwarding interface connected to a network, but not
an interface along a network-side link connected to the local forwarding interface. If the interface
along the network-side link goes Down, the VRRP backup group cannot detect the fault but
continues to send packets along the link, causing user traffic loss.
To monitor the connectivity of the interface on the network-side link, an NQA ICMP test instance
can be configured on the NQA-supported S9700 and send test packets to the IP address.
The VRRP backup group can be associated with the NQA ICMP test instance. The NQA ICMP
test instance reports the link status to the VRRP backup group. This mechanism enables the
VRRP backup group to monitor the link connecting the master S9700 to the external network.
If the link fails, hosts on a LAN cannot access an external network through the master switch.
NQA detects this fault and notifies VRRP of the fault. The VRRP backup group lowers the
master switch's priority by a configured value. The backup switch with the highest priority will
become the new master switch and take over traffic. The process ensures that the communication
between the hosts and the external network is not interrupted. After the link recovers, NQA
detects the status change and instructs the VRRP backup group to restore the priority of the
previous master switch.
Figure 8-2 shows a network where a VRRP backup group tracks an NQA test instance. NQA
helps the VRRP backup group monitor the link between the master switch and a network.
Figure 8-2 Networking diagram for association between VRRP and an NQA test instance
Master SwitchC
SwitchA
20.1.1.1/24
Switch
NQA agent
Internet
SwitchB SwitchD
Backup
HostA
VRRP
Virtual IP Address:10.1.1.10
A VRRP backup group can track a maximum of eight NQA test instances.
CAUTION
l Before associating a VRRP backup group with an NQA test instance, ensure that the NQA
test instance is successfully created. For information about how to create an NQA test
instance, see "NQA Configuration" in the S9700 Core Routing Switch Configuration Guide
- Network Management.
l Only NQA ICMP test instances can be associated with a VRRP backup group.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number[.subinterface-number ]
The view of the interface where the VRRP backup group is configured is displayed.
Step 3 Run:
vrrp vrid virtual-router-id track nqa admin-name test-name [ reduced value-
reduced ]
The VRRP backup group is configured to track the NQA test instance.
reduced value-reduced specifies the value by which the VRRP priority value reduces if the
tracked NQA test instance reports a detection failure. The value ranges from 1 to 255. The
smallest priority value is 0. The priority value 0 is reserved. If a VRRP Advertisement packet
carrying the priority value of 0 is received, the backup device immediately preempts the Master
state.
----End
Context
To improve device reliability, two user gateways working in master/backup mode are connected
to a network, and VRRP is enabled on these gateways to determine their master and backup
states. Although a VRRP backup group has been configured, if an uplink route to a network
becomes unreachable, access-side users still use the VRRP backup group to forwards user data
along the uplink route, causing user data loss.
Association between the VRRP backup group and route can prevent user data loss. The VRRP
backup group can be configured to track the uplink route to the network. If the route is withdrawn
or becomes inactive, the route management (RM) module notifies the VRRP backup group of
the change. After receiving the notification, the VRRP backup group changes its master device's
VRRP priority, and performs a master/backup switchover.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number [ .subinterface-number ]
The view of the interface where the VRRP backup group is configured is displayed.
Step 3 Run:
vrrp vrid virtual-router-id track ip route ip-address { mask-address | mask-
length } [ vpn-instance vpn-instance-name ] [ reduced value-reduced ]
By default, if the tracked route is withdrawn or becomes inactive, the master device in the VRRP
backup group reduces its VRRP priority value by 10.
reduced value-reduced specifies the value by which the VRRP priority decreases if the tracked
route is withdrawn or becomes inactive. The value ranges from 1 to 255. The priority value 0 is
reserved. If a VRRP Advertisement packet carrying the priority value of 0 is received, the backup
device immediately preempts the Master state.
----End
Procedure
Step 1 Run the display vrrp [ interface interface-type interface-number [ virtual-router-id ] ]
command to view information about a specified VRRP group.
----End
Example
Run the display vrrp command, and you can find that the tracked BFD session is in Up state.
For example:
<Quidway> display vrrp
Vlanif211 | Virtual Router 10
State : Master
Virtual IP : 11.1.1.10
PriorityRun : 90
PriorityConfig : 90
MasterPriority : 90
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-010a
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
Track BFD : 1 Priority reduced : 10
BFD-session state : UP
Applicable Environment
A switch on a secure security considers all received and sent VRRP packets real and valid by
default. The router does not authenticate packets and there is no need to configure an
authentication key.
VRRP provides simple text authentication and MD5 authentication for routers on networks that
are vulnerable to attacks. In simple text authentication mode, a string of 1 to 8 characters can be
configured as an authentication key. In MD5 authentication mode, a string of 1 to 8 characters
in plain text or a string of 24 characters in encrypted text can be configured as the authentication
key.
Pre-configuration Tasks
Before configuring the VRRP security function, complete the following tasks:
l Configuring network layer attributes for interfaces to connect the network
l Configuring the VRRP backup group
Data Preparation
To configure the VRRP security function, you need the following data.
No. Data
1 Backup group ID
Context
Perform the following steps on the switch that needs to be configured with an authentication
mode for VRRP packets:
Procedure
Step 1 Run:
system-view
----End
Prerequisites
The configurations of the VRRP security function are complete.
Procedure
Step 1 Run the display vrrp [ interface interface-type interface-number [ virtual-router-id ] ]
command to check the status of VRRP.
----End
Example
After the configuration is complete, run the display vrrp command to view the packet
authentication mode.
<Quidway> display vrrp
Vlanif100 | Virtual Router 1
State : Master
Virtual IP : 10.1.1.111
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 20s
TimerRun : 1s
TimerConfig : 1s
Auth Type : MD5 Auth key : >6M*PO438G/Q=^Q`MAF4<1!!
Virtual Mac : 0000-5e00-0101
Check TTL : YES
In the above command output, the Auth Type field displays MD5, and the Auth key field
displays >6M*PO438G/Q=^Q`MAF4<1!!. That is, VRRP backup group 1 is using MD5
authentication, and the authentication key is >6M*PO438G/Q=^Q`MAF4<1!!.
Applicable Environment
In the network where VRRP backup groups are configured, the backup switch switches to the
master switch because the original master switch and backup switch cannot communicate in
time when the original master switch performs the AMB/SMB switchover. After the AMB/SMB
switchover, the original master switch preempts to be the master switch again because its priority
is higher than the priority of the original backup switch.
Because the system is too busy during the switchover, the master router cannot send Hello
packets normally and the backup router cannot receive packets timely. In this case, the backup
router preempts to be the master router. Then, the link switchover is performed and this causes
packet loss.
Enabling VRRP smooth switching on a switch can optimize the VRRP performance and reduce
the impact on the user traffic.
Pre-configuration Tasks
None.
Data Preparation
To configure VRRP smooth switching, you need the following data.
No. Data
1 Interval for the master switch to send VRRP packets during VRRP smooth switching
Context
Do as follows on the switch of a VRRP backup group:
Procedure
Step 1 Run:
vrrp timer-advertise learning enable
The function of learning the interval for receiving VRRP packets is enabled.
Step 2 Run:
vrrp smooth-switching timer timer-value
VRRP smooth switching is enabled, and the interval carried in the VRRP packet during VRRP
smooth switching is configured.
By default, VRRP smooth switching is enabled, and the interval carried in the VRRP packet is
100 seconds.
Before running the command, you must enable the function of learning the interval for receiving
VRRP packets. When the learning function is disabled, VRRP smooth switching is also disabled.
NOTE
l If the interval set by the master switch for sending VRRP broadcast packets is much greater than the
interval set by the backup switch, the backup switch resets the "masterdown" time after the backup
switch is restarted and the interface recovers. The master switch may not send packets after the
"masterdown" time of the backup switch expires. In this case, the backup switch becomes the master
switch. As a result, two master switchs exist.
l During the AMB/SMB switchover, the master switch sends VRRP smooth switching packets at the
configured interval. If the time configured by the master switch for VRRP smooth switching, such as
1s, is shorter than the configured interval for sending VRRP broadcast packets, such as 10s, VRRP
packets are sent at the interval of 10s, and the interval carried in the VRRP packet is 1s. As a result,
the status of the backup switch continuously flaps.
----End
Prerequisites
The configurations of the VRRP smooth switching function are complete.
Procedure
Step 1 Run the display vrrp [ interface interface-type interface-number [ virtual-router-id ] ]
command to check the status of the VRRP backup group.
----End
Example
After configuring VRRP smooth switching, perform the AMB/SMB switchover on the device.
During the AMB/SMB switchover, the status of the VRRP backup group does not switch, and
thus the user traffic is not affected. After the AMB/SMB switchover, all VRRP configurations
of the new AMB are consistent with those of the original AMB.
<Quidway> display vrrp
Vlanif100 | Virtual Router 1
State : Master
Virtual IP : 10.10.10.158
PriorityRun : 180
PriorityConfig : 180
MasterPriority : 180
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
Applicable Environment
You can configure parameters for VRRP packets to optimize the backup group functions.
l By increasing the interval at which the VRRP backup group sends VRRP advertisement
packets, you can reduce the network load caused by negotiation packets.
l Configurations of intervals for sending VRRP packets affect the master router election
differently in VRRP for IPv4 and VRRP6 as follows:
In VRRP for IPv4, the members in a VRRP backup group are configured with the same
interval for sending VRRP packets, which prevents multiple backup routers from being
switched to master routers simultaneously in one VRRP backup group.
In VRRP6, only can one master router work in a VRRP6 backup group in spite of the
fact that members are configured with different intervals for sending VRRP packets.
l By configuring the preemption mode and preemption delay time of the switch in the backup
group, you can increase or reduce the speed of the master/backup switchover.
l By enabling the test on the reachability of the virtual IP address, you can ping the virtual
IP address to check the network connectivity.
l By prohibiting the system from checking number of hops in VRRP packets, you can
improve the compatibility of Huawei routers with different vendors' routers.
Pre-configuration Tasks
Before adjusting and optimizing VRRP, complete the following tasks:
Data Preparation
To adjust and optimize VRRP, you need the following data.
No. Data
Context
The master switch sends VRRP advertisement packets to other backup switchs at preset intervals.
If the backup switchs do not receive VRRP advertising messages when a timer expires, the
backup switch with the highest priority automatically becomes the master switch.
Perform the following steps on the switch to adjust the interval for sending VRRP advertisement
packets:
Perform the following step as required to configure VRRP for IPv4 or VRRP for IPv6.
Procedure
l For VRRP for IPv4, run the following commands:
1. Run:
system-view
The default interval for sending VRRP advertisement packets is 1 second. If multiple
backup groups exist, sending VRRP advertisement packets at very short intervals may
lead to frequent VRRP switchover. If this is the case, you can increase the interval.
NOTE
l If the advertise-interval parameters set for two VRRP devices are the same, the two devices
can work in master and slave mode.
l If the advertise-interval parameters set for two VRRP devices are different, both the two
devices are in master state.
l For VRRP6, run the following commands:
1. Run:
system-view
The interval for sending VRRP6 advertisement packets is configured for the master
router.
By default, the interval is 100 centiseconds, namely, 1 second.
The master device sends VRRP6 advertisement messages at the interval to the backup
devices in the group to notify that the master device works normally. If the backup
devices do not receive any VRRP6 advertisement message after the interval expires,
the backup device with the highest priority becomes the master device automatically.
----End
Context
Perform the following steps on the VRRP backup switch of which the latency of preemption
needs to be adjusted:
Perform the following step as required to configure VRRP for IPv4 or VRRP for IPv6.
Procedure
l For VRRP for IPv4, run the following commands:
1. Run:
system-view
The preemption mode is enabled by default and the delay period is 0. This means that
preemption is immediate. If the priority of a backup switch becomes higher than that
of the current master switch, the backup immediately becomes a new master switch.
The original master switch becomes a backup switch. After a preemption delay time
is set, the backup switch is delayed to preempt the master switch status.
If the IP address owner recovers from a fault, it switches to be the master switch
immediately regardless any preemption delay that may have been set. The preemption
delay refers to a delay period for the backup switch to be switched to be the master
switch. The preemption delay is unavailable for the IP address owner. If a VRRP
backup group needs to be configured with a preemption delay, the master virtual
switch cannot be configured as the IP address owner.
Run the undo vrrp vrid virtual-router-id preempt-mode command to restore the
default preemption mode.
NOTE
On each switch to be configured with a delay mode in a VRRP backup group, it is recommended
to configure backup switchs with the immediate preemption mode (whose delay time is 0
seconds) and configure the master switch with the preemption mode (whose delay time is
specified). Configuring the delay time for the master switch can ensure that the original primary
link has enough time to restore and work stably, and then switch back. At the same time, the
backup link works normally. If the data is switched back to the original primary link, the
application is not affected.
l For VRRP6, run the following commands:
1. Run:
system-view
The delay time of preemption is configured on the switch in the VRRP6 backup group.
The preemption mode is enabled by default and the preemption delay time is 0 seconds.
This means that preemption is immediately. If the priority of a backup router becomes
higher than that of the master router, the backup router immediately becomes a new
master router. The original master router becomes a backup router. After a preemption
delay time is set, a switchover between a backup router and the master router is delayed
for the amount of time specified by the value.
You can run the vrrp6 vrid preempt-mode disable command to adopt the non-
preemption mode on the switch of the VRRP6 backup group. In non-preemption mode,
after a certain switch becomes the master router in the backup group and works
normally, another switch cannot preempt the master router even if its priority is set to
a value higher than that of the master router.
When the IPv6 address owner recovers from a fault, the router immediately becomes
the master router despite the set delay time. The preemption delay refers to a period
during which a backup router waits for preempting the master router, whereas an IPv6
address owner is irrelevant to the preemption delay. In a VRRP6 backup group that
needs to be configured with the preemption delay, the master router cannot be
configured as the IPv6 address owner.
You can run the undo vrrp6 vrid preempt-mode command to restore the default
preemption mode.
NOTE
To configure the preemption mode for each switch in a VRRP6 backup group, you are
recommended to configure the immediate preemption mode on each backup router by setting
the delay time to 0 seconds, and configure the delayed preemption mode on the master router
by setting a delay time. This allows a transition period for the uplink status and the downlink
status to restore consistency on an unstable network, and thus prevents user devices from
learning the incorrect address of the master router due to dual master routers or frequent
preemption.
----End
Context
On the S9700, you can ping the virtual IP address to check the following items:
Do as follows on the switch that needs to be enabled with a reachable virtual IP address:
Procedure
Step 1 Run:
system-view
Step 2 Run:
vrrp virtual-ip ping enable
By default, the ping function is enabled. The master switch responds to ping packets to the virtual
IP address of this backup group.
Pinging a virtual address may cause ICMP attacks. Run the undo vrrp virtual-ip ping
enable command to disable the function of testing reachability of a virtual IP address.
----End
Context
The system detects number of hops in received VRRP packets, as defined in RFC 3768. The
packets with the number of hops not being 255 are discarded.
In certain networking environments where Huawei devices and non-Huawei devices work
together, checking the number of hops in VRRP packets may result in VRRP packets being
discarded mistakenly. To prevent this, you can disable the system from checking the number of
hops in VRRP packets.
Do as follows on the switch that is prohibited from checking the number of hops of VRRP
packets:
Perform the following step as required to configure VRRP for IPv4 or VRRP6.
Procedure
l For VRRP for IPv4,
1. Run:
system-view
By default, the hop limit in VRRP6 packets is checked. You can run the undo vrrp6
un-check hop-limit command to enable the switch to check the hop limit in VRRP6
packets.
----End
Context
Perform the following procedure on the switch to send gratuitous ARP packets:
Procedure
Step 1 Run:
system-view
Step 2 Run:
vrrp gratuitous-arp timeout time
A timeout period is configured for the master switch to send gratuitous ARP packets.
The master switch sends ARP packets with the virtual MAC address. By default, the master
router sends a gratuitous ARP packet every 120 seconds.
Run the undo vrrp gratuitous-arp timeout command in the system view to restore the default
timeout period for sending gratuitous ARP packets.
Run the vrrp gratuitous-arp timeout disable command in the system view to disable the master
switch from sending gratuitous ARP packets.
----End
Prerequisites
The configurations for adjusting and optimizing VRRP functions are complete.
Procedure
l Run the display vrrp [ interface interface-type interface-number [ virtual-router-id ] ]
[ brief ] command to check the status of VRRP.
l Run the display vrrp6 [ interface interface-type interface-number [ vrid virtual-router-
id ] ] [ brief ] command to check the status and configurations of the VRRP6 backup group.
----End
Example
Run the display vrrp command to view modified VRRP parameters. In this example, the
TimerRun field and the TimerConfig field display 20. The default interval of 1 second for
sending VRRP advertisement packets is modified to 20 seconds.
<Quidway> display vrrp
Vlanif100 | Virtual Router 1
State : Master
Virtual IP : 100.1.1.111
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 0s
TimerRun : 20s
TimerConfig : 20s
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
<Quidway> display vrrp6
GigabitEthernet1/0/0 | Virtual Router 1
State : Master
Virtual IP : FE80::1:2
PriorityRun : 200
PriorityConfig : 200
MasterPriority : 200
Preempt : YES Delay Time : 0s
TimerRun : 200s
TimerConfig : 20s
Virtual Mac : 0000-5e00-0201
Uncheck hop limit : YES
Accept Mode : ON
Config type : normal-vrrp
Track If : GigabitEthernet3/0/4 priority reduced : 70
IF State : UP
Application Environment
Figure 8-3 mVRRP determines the dual-homing of the master and slave switches
NPE1
mVRRP
UPE
NPE2
As shown in Figure 8-3, when the convergence layer of the Metro Ethernet (ME) dual NPEs
are deployed for high reliability. The master and standby switches are determined by mVRRP
between NPEs.
The mVRRP backup group is actually the ordinary VRRP backup group. The difference is that
the mVRRP backup group can be bound to other backup groups of different services. The status
of the backup group of related services depends on the binding relationship.
The mVRRP backup group can be bound to several backup group members. The mVRRP backup
group cannot be bound to other management backup groups.
According to different applications, the binding relationship of the mVRRP backup group is as
follows:
l The VRRP backup group is bound to the mVRRP backup group: UPEs are dual-homed to
NPEs. VRRP is run between NPEs. The master NPE and backup NPE are determined by
the configured priority of VRRP. Multiple VRRP backup groups run between NPEs with
different services.
If each VRRP backup group needs to maintain its own state machine, a huge number of
VRRP packets exist among NPEs. To simplify the process and decrease occupancy of
bandwidth, you can set one VRRP backup group as the mVRRP backup group. Other
backup group members are bound to the mVRRP backup group. The master and slave
switches are determined directly by the binding relationship.
l The service interfaces are bound to the mVRRP backup group. If the UPEs are dual-homed
to NPEs through two physical links. You can bind the member interfaces to the mVRRP
backup group to determine the master member interfaces and the slave interfaces.
Pre-configuration Tasks
Before configuring mVRRP, complete the following tasks:
l Configuring attributes of network layer of interfaces for connectivity
Data Preparation
To configure mVRRP, you need the following data.
No. Data
2 Virtual IP address of the mVRRP and virtual IP addresses of VRRP backup group
members
5 PW peer IP address
Context
Do as follows on each switch of an mVRRP backup group:
Perform the following step as required to configure VRRP for IPv4 or VRRP for IPv6.
Procedure
l For VRRP for IPv4:
1. Run:
system-view
A backup group is created and a virtual IP address is assigned to the backup group.
4. Run:
vrrp vrid virtual-router-id priority priority-value
1. Run:
system-view
A VRRP6 backup group is created, and a virtual IPv6 address is assigned to the VRRP
backup group.
4. Run:
vrrp6 vrid virtual-router-id priority priority-value
----End
Context
Do as follows on each switch on which the member VRRP backup groups need to be bound to
an mVRRP backup group.
Procedure
l For VRRP for IPv4:
1. Run:
system-view
The status of the member VRRP backup group is determined by the mVRRP backup
group. Therefore, the member VRRP backup group needs not a priority.
4. Run:
vrrp vrid virtual-router-id1 track admin-vrrp interface interface-type
interface-number [ .subinterface-number ] vrid virtual-router-id2
The member VRRP backup group is bound to the mVRRP backup group.
After the member VRRP backup group is bound to the mVRRP backup group, the
state machine of the member VRRP backup group becomes dependent. That is, the
member VRRP backup group deletes the protocol timer, and no longer sends or
receives packets, and implements its state machine by directly copying the status of
the mVRRP backup group. The backup member can be bound to only one mVRRP.
NOTE
Only a single member VRRP backup group can be configured on a single interface.
l For VRRP for IPv6:
1. Run:
system-view
A member VRRP6 backup group is created, and a virtual IPv6 address is assigned to
the member VRRP6 backup group.
The status of the member VRRP6 backup group is determined by the mVRRP6 backup
group. Therefore, the member VRRP6 backup group does not need a priority.
4. Run:
vrrp6 vrid virtual-router-id1 track admin-vrrp6 interface interface-type
interface-number vrid virtual-router-id2
The member VRRP6 backup group is bound to the mVRRP6 backup group.
After the member VRRP6 backup group is bound to the mVRRP backup group, the
state machine of the member VRRP6 backup group becomes dependent. That is, the
member VRRP6 backup group deletes the protocol timer, and no longer sends or
receives packets, and implements its state machine by directly copying the status of
the mVRRP6 backup group. A member VRRP6 backup group can be bound to only
one mVRRP6 backup group.
NOTE
Only a single member VRRP6 backup group can be configured on a single interface.
----End
Prerequisites
The configurations of the mVRRP backup groups function are complete.
Procedure
l Run the display vrrp binding admin-vrrp [ interface interface-type1 interface-
number1 ] [ vrid virtual-router-id ] member-vrrp [ interface interface-type2 interface-
number2 ] [ vrid virtual-router-id ] command to check the binding between the mVRRP
backup group and the member VRRP backup groups.
l Run the display vrrp binding admin-vrrp [ interface interface-type1 interface-
number1 ] [ vrid virtual-router-id ] member-interface [ interface interface-type2
interface-number2 ] command to check the binding between the mVRRP backup group
and member VRRP backup groups.
l Run the display vrrp admin-vrrp command to check the status of all mVRRP backup
groups in the current configuration.
----End
Example
After the configuration, you can run the display vrrp binding admin-vrrp command to view
all binding information about the member VRRP backup group, interface member, and PW
member.
<Quidway> display vrrp binding admin-vrrp
Interface: Vlanif 100, admin-vrrp vrid: 6, state: Master
Member-vrrp number: 1
Interface: Vlanif 200, vrid: 8, state: Master
Member-interface number: 1
Interface: Vlanif 300, state: Up
Applicable Environment
Currently, VRRPv2 is adopted. VRRP for IPv4 supports both VRRPv2 packets and VRRPv3
packets, whereas VRRP for IPv6 supports only VRRPv3 packets. You can undertake this
configuration task to upgrade the VRRP version as required.
Pre-configuration Tasks
Before configuring VRRP version upgrade, complete the following tasks:
Data Preparation
To configure VRRP version upgrade, you need the following data.
No. Data
Context
Do as follows on each switch in a VRRP backup group.
Procedure
Step 1 Run:
system-view
----End
Prerequisites
The configurations of VRRP version upgrade are complete.
Procedure
l Run the display vrrp protocol-information command to view VRRP version information.
----End
Example
After the configuration, run the display vrrp protocol-information command, and you can
view that the VRRP protocol version is v3 and the mode for sending Advertisement packets is
send v3 only.
<Quidway> display vrrp protocol-information
VRRP protocol information is shown as below:
VRRP protocol version : v3
Send advertisement packet mode : send v3 only
Context
CAUTION
Debugging affects the performance of the system. After debugging, run the undo debugging
all command to disable it immediately.
When a VRRP fault occurs, run the following debugging commands in the user view to debug
VRRP and locate the fault.
Procedure
l Run the debugging vrrp packet command in the user view to enable the debugging of
VRRP packets.
l Run the debugging vrrp state command in the user view to enable the debugging of VRRP
status.
l Run the debugging vrrp timer command in the user view to enable the debugging of VRRP
timer.
----End
Networking Requirements
As shown in Figure 8-4, Host A communicates with Host B through the default gateway.
l The VRRP group that consists of SwitchA and SwitchB functions as the default gateway
of Host A.
l SwitchA functions as the gateway. When SwitchA fails, SwitchB becomes the gateway.
l After SwitchA recovers, it preempts to be the master router within 20 seconds.
Backup group 1
Virtual IP Address:
10.1.1.111 SwitchA
Master
GE1/0/0
GE2/0/0
GE1/0/1
SwitchC
HostA GE1/0/0
10.1.1.100/24 HostB
GE1/0/2
GE1/0/0 20.1.1.100/24
GE2/0/0
Ethernet SwitchB
Backup
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure VLANIF interfaces and assign IP addresses to the VLANIF interface.
2. Configure the OSPF protocol between SwitchA, SwitchB, and SwitchC to implement
interworking between them.
3. Create VRRP group 1 on VLANIF 100 of SwitchA. Set the highest priority for SwitchA
in the VRRP group to ensure that SwitchA functions as the master. Configure the
preemption mode on SwitchA.
4. Create VRRP group 1 on VLANIF 100 of SwitchB and use the default priority.
Data Preparation
To complete the configuration, you need the following data:
l ID and virtual IP address of the VRRP group
l Priorities of SwitchA and SwitchB in the VRRP group
l Preemption mode
Procedure
Step 1 Configure VLANIF interfaces and assign IP addresses to the VLANIF interface.
# Create VLANs and add physical interfaces to VLANs.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan batch 100 200
[SwitchA] interface gigabitethernet1/0/0
[SwitchA-GigabitEthernet1/0/0] port hybrid pvid vlan 100
[SwitchA-GigabitEthernet1/0/0] port hybrid untagged vlan 100
[SwitchA-GigabitEthernet1/0/0] quit
The configurations of SwitchB and SwitchC are similar to the configuration of SwitchA, and
are not mentioned here.
# Configure an IP address for the VLANIF interface on SwitchA.
[SwitchA] interface vlanif 100
[SwitchA-Vlanif100] ip address 10.1.1.1 24
[SwitchA-Vlanif100] quit
[SwitchA] interface vlanif 200
[SwitchA-Vlanif200] ip address 192.168.1.1 24
[SwitchA-Vlanif200] quit
Step 2 Configure the OSPF protocol between SwitchA, SwitchB, and SwitchC.
# Configure SwitchA.
[SwitchA] ospf 1
[SwitchA-ospf-1] area 0
[SwitchA-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[SwitchA-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255
[SwitchA-ospf-1-area-0.0.0.0] quit
[SwitchA-ospf-1] quit
# Configure SwitchB.
[SwitchB] ospf 1
[SwitchB-ospf-1] area 0
[SwitchB-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[SwitchB-ospf-1-area-0.0.0.0] network 192.168.2.0 0.0.0.255
[SwitchB-ospf-1-area-0.0.0.0] quit
[SwitchB-ospf-1] quit
# Configure SwitchC.
[SwitchC] ospf 1
[SwitchC-ospf-1] area 0
[SwitchC-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255
[SwitchC-ospf-1-area-0.0.0.0] network 192.168.2.0 0.0.0.255
[SwitchC-ospf-1-area-0.0.0.0] network 20.1.1.0 0.0.0.255
[SwitchC-ospf-1-area-0.0.0.0] quit
[SwitchC-ospf-1] quit
# Configure the default gateway address of Host A to 10.1.1.111 and the default gateway address
of Host B to 20.1.1.1.
Step 3 Configure a VRRP group.
# On SwitchA, assign an IP address to the VLANIF interface. Create VRRP group 1 and set the
priority of SwitchA in the VRRP group to 120 so that SwitchA functions as the master.
[SwitchA] interface Vlanif 100
[SwitchA-Vlanif100] vrrp vrid 1 virtual-ip 10.1.1.111
[SwitchA-Vlanif100] vrrp vrid 1 priority 120
[SwitchA-Vlanif100] vrrp vrid 1 preempt-mode timer delay 20
[SwitchA-Vlanif100] quit
# On SwitchB, assign an IP address to the VLANIF interface. Create VRRP group 1 and retain
the default priority of SwitchB in the VRRP group so that SwitchB functions as the backup.
[SwitchB] interface vlanif 100
[SwitchB-Vlanif100] vrrp vrid 1 virtual-ip 10.1.1.111
[SwitchB-Vlanif100] quit
Virtual IP : 10.1.1.111
Master IP : 10.1.1.1
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 20s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
<SwitchB> display vrrp
Vlanif100 | Virtual Router 1
state : Backup
Virtual IP : 10.1.1.111
Master IP : 10.1.1.1
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 120
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
Run the display ip routing-table command on SwitchA and SwitchB. You can find a direct
route to the virtual IP address in the routing table of SwitchA. In the routing table of SwitchB,
this direct route is an OSPF route. The displayed information on SwitchA and SwitchB is as
follows:
<SwitchA> display ip routing-table
Route Flags: R - relied, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 9 Routes : 10
Destination/Mask Proto Pre Cost Flags NextHop Interface
10.1.1.0/24 Direct 0 0 D 10.1.1.1 Vlanif100
10.1.1.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
20.1.1.0/24 OSPF 10 2 D 192.168.1.2 Vlanif200
127.0.0.0/8 Direct 0 0 D 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
192.168.1.0/24 Direct 0 0 D 192.168.1.1 Vlanif200
192.168.1.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
192.168.1.2/32 Direct 0 0 D 192.168.1.2 Vlanif200
192.168.2.0/24 OSPF 10 2 D 10.1.1.2 Vlanif100
<SwitchB> display ip routing-table
Route Flags: R - relied, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 9 Routes : 10
Destination/Mask Proto Pre Cost Flags NextHop Interface
10.1.1.0/24 Direct 0 0 D 10.1.1.2 Vlanif100
10.1.1.2/32 Direct 0 0 D 127.0.0.1 InLoopBack0
20.1.1.0/24 OSPF 10 2 D 192.168.2.2 Vlanif200
127.0.0.0/8 Direct 0 0 D 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
192.168.1.0/24 OSPF 10 2 D 10.1.1.1 Vlanif100
192.168.2.0/24 Direct 0 0 D 192.168.2.1 Vlanif200
192.168.2.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
192.168.2.2/32 Direct 0 0 D 192.168.2.2 Vlanif200
Run the shutdown command on VLANIF 100 of SwitchA to simulate a link fault.
Run the display vrrp command on SwitchB to view information about the VRRP status. You
can find that SwitchB is the master switch.
<SwitchB> display vrrp
Vlanif100 | Virtual Router 1
state : Master
Virtual IP : 10.1.1.111
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 100
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 100 200
#
interface Vlanif100
ip address 10.1.1.1 255.255.255.0
vrrp vrid 1 virtual-ip 10.1.1.111
vrrp vrid 1 priority 120
vrrp vrid 1 preempt-mode timer delay 20
#
interface Vlanif200
ip address 192.168.1.1 255.255.255.0
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
interface GigabitEthernet2/0/0
port hybrid pvid vlan 200
port hybrid untagged vlan 200
#
ospf 1
area 0.0.0.0
network 192.168.1.0 0.0.0.255
network 10.1.1.0 0.0.0.255
#
return
Networking Requirements
As shown in Figure 8-5,
l Switch A is the master device in VRRP group 1 and the backup device in VRRP group 2.
l Switch B is the master device in VRRP group 2 and the backup device in VRRP group 1.
l Host A on the internal network uses VRRP group 1 as the gateway, and Host C uses VRRP
group 2 as the gateway. The VRRP groups share data flows and back up each other.
Backup group 2
Virtual IP Address: SwitchA
10.1.1.112 group 1:Master
group 2:Backup
GE2/0/0
GE1/0/0
HostA
GE1/0/1
10.1.1.100/24
SwitchC GE1/0/0
GE1/0/2 HostB
20.1.1.100/24
HostC GE2/0/0
10.1.1.101/24 GE1/0/0
SwitchB
Ethernet group 2:Master
Backup group 1 group 1:Backup
Virtual IP Address:
10.1.1.111
Configuration Roadmap
The configuration roadmap is as follows:
1. Implement networking between Switch A, Switch B, and Switch C.
2. Create two VRRP groups on VLANIF 100 of Switch A. Configure Switch A as the master
device in VRRP group 1 and the backup device in VRRP group 2.
3. Create two VRRP groups on VLANIF 100 of Switch B. Configure Switch B as the master
device in VRRP group 2 and the backup device in VRRP group 1.
Data Preparation
To complete the configuration, you need the following data:
l IDs and virtual IP addresses of the VRRP groups
l Priorities of Switch A and Switch B in the VRRP groups
For details, see OSPF Configuration.
Procedure
Step 1 Configure interworking between devices on the network.
# Configure the default gateway of Host A to the virtual IP address 10.1.1.111 of VRRP group
1, the default gateway of Host B to 20.1.1.1, and the default gateway of Host C to the virtual IP
address 10.1.1.112 of VRRP group 2.
# Configure OSPF between Switch A, Switch B, and Switch C.
Step 2 Configure VRRP groups.
# On Switch A, assign an IP address to VLANIF 100. Create VRRP group 1 and set the priority
of Switch A in VRRP group 1 to 120 so that Switch A functions as the master. Create VRRP
group 2 and retain the default priority (100) of Switch A in VRRP group 2 so that Switch A
functions as the backup device in VRRP group 2.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] interface Vlanif 100
[SwitchA-Vlanif100] ip address 10.1.1.1 24
[SwitchA-Vlanif100] vrrp vrid 1 virtual-ip 10.1.1.111
[SwitchA-Vlanif100] vrrp vrid 1 priority 120
[SwitchA-Vlanif100] vrrp vrid 2 virtual-ip 10.1.1.112
[SwitchA-Vlanif100] quit
# On Switch B, assign an IP address to VLANIF 100. Create VRRP group 1 and retain the default
priority (100) of Switch B in VRRP group 1 so that Switch B functions as the backup. # Create
VRRP group 2 on Switch B and set the priority of Switch B in VRRP group 2 to 120 so that
Switch B functions as the master in VRRP group 2.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] interface Vlanif 100
[SwitchB-Vlanif100] ip address 10.1.1.2 24
[SwitchB-Vlanif100] vrrp vrid 1 virtual-ip 10.1.1.111
[SwitchB-Vlanif100] vrrp vrid 2 virtual-ip 10.1.1.112
[SwitchB-Vlanif100] vrrp vrid 2 priority 120
[SwitchB-Vlanif100] quit
Run the display vrrp command on Switch A, you can find that Switch A is the master in VRRP
group 1 and the backup in VRRP group 2.
[SwitchA] display vrrp
Vlanif100 | Virtual Router 1
state : Master
Virtual IP : 10.1.1.111
Master IP : 10.1.1.1
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
Vlanif100 | Virtual Router 2
state : Backup
Virtual IP : 10.1.1.112
Master IP : 10.1.1.2
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 120
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0102
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 100 200
#
interface Vlanif100
ip address 10.1.1.1 255.255.255.0
vrrp vrid 1 virtual-ip 10.1.1.111
vrrp vrid 1 priority 120
vrrp vrid 2 virtual-ip 10.1.1.112
#
interface Vlanif200
ip address 192.168.1.1 255.255.255.0
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
interface GigabitEthernet2/0/0
port hybrid pvid vlan 200
port hybrid untagged vlan 200
#
ospf 1
area 0.0.0.0
network 192.168.1.0 0.0.0.255
network 10.1.1.0 0.0.0.255
#
return
#
return
Networking Requirements
As shown in Figure 8-6, Switch A, Switch B, Switch C, Switch D and the Universal Medium
Gateway (UMG) form a simple next generation network (NGN).
l The UMG connects to Switch A and Switch B through Switch C and Switch D.
l Switch A and Switch B run VRRP. Switch A functions as the master, and Switch B
functions as the backup.
When Switch A fails, or when the GE link between Switch A and Switch B fails, the active/
standby switchover should be completed within 1 second. That is, fast switchover is required
on the bearer network.
Backbone
Network
GE2/0/0 GE2/0/0
SwitchA SwitchB
GE1/0/0 GE1/0/0
Backup group 10
Virtual IP address: 10.1.1.3/24
SwitchC SwitchD
VLAN
UMG
Configuration Roadmap
The configuration roadmap is as follows:
1. Implement networking between the Switches.
2. Configure a BFD session on Switch A and Switch B to monitor Switch A and its downlink
Switch A - Switch C - Switch D - Switch B.
3. Enable VRRP to track the BFD session on Switch B. When the BFD session becomes
Down, the priority of Switch B increases by 40 and then the switchover is triggered.
NOTE
Data Preparation
To complete the configuration, you need the following data:
l Local and remote discriminators of the BFD session
l ID and virtual IP address of the VRRP group
l Priorities of the S9700s in the VRRP group
Procedure
Step 1 Configure interworking between the Switches.
Assign IP addresses to all interfaces. # Configure OSPF between Switch A, Switch B, and Switch
C.
For details, see 8.12.1 Example for Configuring VRRP in Master/Backup Mode.
Step 2 Create a BFD session.
# Create a BFD session on Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] bfd
[SwitchA-bfd] quit
[SwitchA] bfd atob bind peer-ip 10.1.1.2 interface vlanif 200
[SwitchA-bfd-session-atob] discriminator local 1
[SwitchA-bfd-session-atob] discriminator remote 2
[SwitchA-bfd-session-atob] min-rx-interval 50
[SwitchA-bfd-session-atob] min-tx-interval 50
[SwitchA-bfd-session-atob] commit
[SwitchA-bfd-session-atob] quit
Run the display bfd session command on Switch A and Switch B, and you can see that the BFD
session is Up. Take Switch A for example. The display is as follows:
[SwitchA] display bfd session all
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
1 2 10.1.1.2 Up Static Vlanif200
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
# Create VRRP group 10 on Switch B and set the priority of Switch B in VRRP group 10 to 140
so that Switch B functions as the backup in VRRP group 10.
[SwitchB] interface vlanif 100
[SwitchB-Vlanif100] vrrp vrid 10 virtual-ip 10.1.1.3
[SwitchB-Vlanif100] vrrp vrid 10 priority 140
# Configure VRRP to track the status of the BFD session on the backup device. If the BFD
session becomes Down, the priority of Switch B increases by 40.
[SwitchB-Vlanif100] vrrp vrid 10 track bfd-session 2 increased 40
[SwitchB-Vlanif100] quit
Run the display vrrp command on Switch A or Switch B, and you can see that Switch A is the
master and Switch B is the backup. You can also view the tracked BFD session and its status on
Switch B.
[SwitchA] display vrrp
Vlanif100 | Virtual Router 10
state : Master
Virtual IP : 10.1.1.3
Master IP : 10.1.1.1
PriorityRun : 160
PriorityConfig : 160
MasterPriority : 160
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0110
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
[SwitchB] display vrrp
Vlanif100 | Virtual Router 10
state : Backup
Virtual IP : 10.1.1.3
Master IP : 10.1.1.1
PriorityRun : 140
PriorityConfig : 140
MasterPriority : 160
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0110
Check TTL : YES
Run the display vrrp command on Switch A, and you can see that the status of Switch A changes
to Initialize.
[SwitchA] display vrrp
Vlanif100 | Virtual Router 10
state : Initialize
Virtual IP : 10.1.1.3
Master IP : 10.1.1.1
PriorityRun : 160
PriorityConfig : 160
MasterPriority : 0
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0110
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
Run the display vrrp command on Switch B, and you can see that Switch B becomes the master,
and the status of the BFD session changes to Down.
[SwitchB] display vrrp
Vlanif100 | Virtual Router 10
state : Master
Virtual IP : 10.1.1.3
Master IP : 10.1.1.2
PriorityRun : 180
PriorityConfig : 140
MasterPriority : 180
Preempt : YES Delay Time : 0s
TimerRun : 1s
TimerConfig : 1s
Auth Type : NONE
Virtual Mac : 0000-5e00-0110
Check TTL : YES
Config type : normal-vrrp
Track BFD : 2 Priority increased : 40
BFD-Session State : DOWN
Config track link-bfd down-number : 0
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 100 200
#
bfd
#
#
interface Vlanif100
ip address 10.1.1.1 255.255.255.0
vrrp vrid 10 virtual-ip 10.1.1.3
vrrp vrid 10 priority 160
#
interface Vlanif200
ip address 192.168.0.1 255.255.255.0
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
interface GigabitEthernet2/0/0
port hybrid pvid vlan 200
port hybrid untagged vlan 200
#
bfd atob bind peer-ip 10.1.1.2 interface Vlanif 200
discriminator local 1
discriminator remote 2
min-tx-interval 50
min-rx-interval 50
commit
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 192.168.0.0 0.0.0.255
#
return
l Configuration file of Switch B
#
sysname SwitchB
#
vlan batch 100 200
#
bfd
#
interface Vlanif100
ip address 10.1.1.2 255.255.255.0
vrrp vrid 10 virtual-ip 10.1.1.3
vrrp vrid 10 priority 140
vrrp vrid 10 track bfd-session 2 increased 40
#
interface Vlanif200
ip address 192.168.0.2 255.255.255.0
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
interface GigabitEthernet2/0/0
port hybrid pvid vlan 200
port hybrid untagged vlan 200
#
bfd btoa bind peer-ip 10.1.1.1 interface Vlanif 200
discriminator local 2
discriminator remote 1
min-tx-interval 50
min-rx-interval 50
commit
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 192.168.0.0 0.0.0.255
#
return
Virtual IP Address:
2000::1
GE1/0/0
SwitchA
Vlanif100
Master
2000::2
HostA
GE1/0/0
Vlanif100 SwitchB
HostB 2000::3
Network
Backup
Ethernet
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IPv6 addresses for interfaces.
2. Configure virtual IPv6 addresses.
Data Preparation
To complete the configuration, you need the following data:
l VRRP6 group ID
l Priorities of the Switches in the VRRP6 group
l IPv6 addresses to be configured for interfaces
l Virtual IPv6 addresses to be configured for interfaces in the VRRP6 group
Procedure
Step 1 Enable IPv6 forwarding.
# Configure SwitchA.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] ipv6
# Configure SwitchB.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] ipv6
# Configure SwitchB.
[SwitchB] vlan 100
[SwitchB-vlan100] quit
[SwitchB] interface gigabitethernet1/0/0
[SwitchB-Gigabitethernet1/0/0] port hybrid pvid vlan 100
[SwitchB-Gigabitethernet1/0/0] port hybrid untagged vlan 100
[SwitchB-Gigabitethernet1/0/0] quit
[SwitchB] interface vlanif 100
[SwitchB-Vlanif100] ipv6 enable
[SwitchB-Vlanif100] ipv6 address fe80::3 link-local
[SwitchB-Vlanif100] ipv6 address 2000::3 64
# Configure SwitchB.
[SwitchB-Vlanif100] vrrp6 vrid 24 virtual-ip fe80::1 link-local
[SwitchB-Vlanif100] vrrp6 vrid 24 virtual-ip 2000::1
Step 4 Set the priority of SwitchB to a value lower than the priority of SwitchA.
[SwitchB-Vlanif100] vrrp6 vrid 24 priority 25
Virtual IP : FE80::1
2000::1
Master IP : FE80::200:FF:FE00:24
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 0
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-0201
Uncheck hop limit : NO
Accept Mode : ON
Config type : normal-vrrp
Config track link-bfd down-number : 0
[SwitchB] display vrrp6 interface vlanif100
Vlanif100 | Virtual Router 24
State : Backup
Virtual IP : FE80::1
2000::1
Master IP : FE80::200:FF:FE00:24
PriorityRun : 25
PriorityConfig : 100
MasterPriority : 0
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-0201
Uncheck hop limit : NO
Accept Mode : ON
Config type : normal-vrrp
Config track link-bfd down-number : 0
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 100
#
ipv6
#
interface vlanif 100
ipv6 enable
ipv6 address 2000::2/64
vrrp6 vrid 24 virtual-ip FE80::1 link-local
vrrp6 vrid 24 virtual-ip 2000::1
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
return
Networking Requirements
As shown in Figure 8-8,
l Switch A is the master device in VRRP group 1 and the backup device in VRRP group 2.
l Switch B is the master device in VRRP group 2 and the backup device in VRRP group 1.
l Host A on the LAN uses the virtual IPv6 address of VRRP group 1 as the gateway address,
and Host B uses the virtual IPv6 address of VRRP group 2 as the gateway address. The
two VRRP groups load balance traffic and back up each other.
Backup group 1
Virtual IP Address
2000::100 SwitchA
group 1:Master
group 2:Backup
GE2/0/0
GE1/0/0
GE1/0/1
HostA
2000::3/64 GE2/0/0
SwitchC
HostC
GE1/0/2 2003::1/64
Configuration Roadmap
The configuration roadmap is as follows:
1. Create VRRP group 1 and VRRP group 2 on VLANIF 100 of Switch A. Ensure that Switch
A is the master device in VRRP group 1 and the backup device in VRRP group 2.
2. Create VRRP group 1 and VRRP group 2 on VLANIF 100 of Switch B. Ensure that Switch
B is the backup device in VRRP group 1 and the master device in VRRP group 1.
Data Preparation
To complete the configuration, you need the following data:
l IPv6 addresses of the interfaces
l IDs and virtual IPv6 addresses of the VRRP groups
l Priorities of the switches in each VRRP group
Procedure
Step 1 Configure IP addresses for the interfaces. The configuration procedure is not mentioned here.
Step 2 Configure OSPFv3 on Switch A, Switch B, and Switch C so that they can communicate with
each other. The configuration procedure is not mentioned here.
Step 3 Configure the hosts.
Set the default gateway address of Host A to 2000::10, which is the virtual IPv6 address of VRRP
group 1. Set the default gateway address of Host B to 2000::60, which is the virtual IPv6 address
of VRRP group 2. Set the default gateway address of Host C to 2003::2.
Step 4 Configure VRRP6 groups.
# Create VRRP group 1 and VRRP group 2 on VLANIF 100 of Switch A. Set the priority of
Switch A in VRRP group 1 to 120 so that Switch A becomes the master device in VRRP group
1. Use the default priority of Switch A in VRRP group 2 so that Switch A becomes the backup
device in VRRP group 2.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] interface vlanif100
[SwitchA-Vlanif100] vrrp6 vrid 1 virtual-ip FE80::1 link-local
[SwitchA-Vlanif100] vrrp6 vrid 1 virtual-ip 2000::100
[SwitchA-Vlanif100] vrrp6 vrid 1 priority 120
[SwitchA-Vlanif100] vrrp6 vrid 2 virtual-ip FE80::2 link-local
[SwitchA-Vlanif100] vrrp6 vrid 2 virtual-ip 2000::60
[SwitchA-Vlanif100] quit
# Create VRRP group 1 and VRRP group 2 on VLANIF 100 of Switch B. Use the priority of
Switch B in VRRP group 1 to 120 so that Switch B becomes the backup device in VRRP group
1. Set the priority of Switch B in VRRP group 2 to 120 so that Switch B becomes the master
device in VRRP group 2.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] interface vlanif 100
[SwitchB-Vlanif100] vrrp6 vrid 1 virtual-ip FE80::1 link-local
[SwitchB-Vlanif100] vrrp6 vrid 1 virtual-ip 2000::100
[SwitchB-Vlanif100] vrrp6 vrid 2 virtual-ip FE80::2 link-local
[SwitchB-Vlanif100] vrrp6 vrid 2 virtual-ip 2000::60
[SwitchB-Vlanif100] vrrp6 vrid 2 priority 120
[SwitchB-Vlanif100] quit
Run the display vrrp6 command on Switch B, and you can find that VRRP group 1 and VRRP
group 2 are created on SwitchB. Switch B is the backup device in VRRP group 1 and the master
device in VRRP group 2.
[SwitchB] display vrrp6
Vlanif100 | Virtual Router 1
State : Backup
Virtual IP : FE80::1
2000::100
Master IP : FE80::200:FF:FE00:24
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 120
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-0201
Uncheck hop limit : NO
Accept Mode : ON
Config type : normal-vrrp
Config track link-bfd down-number : 0
Vlanif100 | Virtual Router 2
State : Master
Virtual IP : FE80::2
2000::60
Master IP : FE80::218:82FF:FED1:B6DF
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-0102
Uncheck hop limit : NO
Accept Mode : ON
Config type : normal-vrrp
Config track link-bfd down-number : 0
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 100 200
#
ipv6
#
ospfv3 1
router-id 1.1.1.1
#
interface Vlanif100
ipv6 enable
ipv6 address 2000::1/64
vrrp6 vrid 1 virtual-ip FE80::1 link-local
vrrp6 vrid 1 virtual-ip 2000::100
vrrp6 vrid 1 priority 120
vrrp6 vrid 2 virtual-ip FE80::2 link-local
vrrp6 vrid 2 virtual-ip 2000::60
ospfv3 1 area 0.0.0.0
#
interface Vlanif200
ipv6 enable
ipv6 address 2002::1/64
ospfv3 1 area 0.0.0.0
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 100
port hybrid pvid untagged 100
#
interface GigabitEthernet2/0/0
port hybrid pvid vlan 200
port hybrid pvid untagged 200
#
return
#
sysname SwitchB
#
vlan batch 100 400
#
ipv6
#
ospfv3 1
router-id 2.2.2.2
#
interface Vlanif100
ipv6 enable
ipv6 address 2000::2/64
vrrp6 vrid 1 virtual-ip FE80::1 link-local
vrrp6 vrid 1 virtual-ip 2000::100
vrrp6 vrid 2 virtual-ip FE80::2 link-local
vrrp6 vrid 2 virtual-ip 2000::60
vrrp6 vrid 2 priority 120
ospfv3 1 area 0.0.0.0
#
interface Vlanif200
ipv6 enable
ipv6 address 2001::1/64
ospfv3 1 area 0.0.0.0
#
interface GigabitEthernet1/0/0
port hybrid pvid vlan 100
port hybrid pvid untagged 100
#
interface GigabitEthernet2/0/0
port hybrid pvid vlan 400
port hybrid pvid untagged 400
#
return
l Configuration file of Switch C
#
sysname SwitchC
#
vlan batch 200 300 400
#
ipv6
#
ospfv3 1
router-id 3.3.3.3
#
interface Vlanif200
ipv6 enable
ipv6 address 2002::2
ospfv3 1 area 0.0.0.0
#
interface Vlanif300
ipv6 enable
ipv6 address 2003::2/64
ospfv3 1 area 0.0.0.0
#
interface Vlanif400
ipv6 enable
ipv6 address 2001::2/64
ospfv3 1 area 0.0.0.0
#
interface GigabitEthernet1/0/1
port hybrid pvid vlan 200
port hybrid pvid untagged 200
#
interface GigabitEthernet1/0/2
port hybrid pvid vlan 300
port hybrid pvid untagged 300
#
interface GigabitEthernet2/0/0
The collection of configuration examples of association of BFD and an interface, BFD and other
protocols, Ethernet OAM and an interface, and Ethernet OAM and other protocols are listed.
This helps engineers find required information.
Context
The S9700 supports fault transmission between BFD, Ethernet CFM, EFM OAM, and an
interface.
The manual provides the following configuration examples of association:
l 5.20.5 Example for Configuring Association Between an EFM OAM Module and an
Interface
l 5.20.6 Example for Associating EFM OAM with BFD for IP
l 5.20.7 Example for Configuring Association Between EFM OAM Modules
l 5.20.8 Example for Configuring Association Between an Ethernet CFM Module and
an Interface
l 5.20.9 Example for Configuring Association Between an EFM OAM Module and an
Ethernet CFM Module
l 5.20.10 Example for Configuring Association Between Ethernet CFM with Ethernet
CFM
l 5.20.11 Example for Associating Ethernet CFM with RRPP
l 5.20.12 Example for Associating Ethernet CFM with MSTP
l 7.15.4 Example for Associating the BFD Status with the Interface Status
l 7.15.5 Example for Configuring Association Between a BFD Session and an Interface
l 7.15.6 Example for Configuring Association Between the Status of BFD Sessions
This chapter describes the working principle and configuration of MAC swap loopback.
Tester
SwitchB Users
SwitchA
SMAC DMAC DATA
the switch swaps source and destination MAC addresses of all Ethernet frames that match the
remote MAC swap loopback configuration and sends the Ethernet frames back to the tester
through this interface. The tester then analyzes network performance based on Ethernet frames
sent from the tested switch.
A remote MAC swap loopback test modifies only Ethernet frames matching the MAC swap
loopback configuration on an interface, and other Ethernet frames can still be forwarded on the
interface. However, if a large number of test packets are sent, test packets occupy bandwidth of
other services on the interface.
Tester
SwitchB
SwitchA Users
SMAC DMAC DATA
Applicable Environment
Before using an S9700 to provide services for users, perform a local MAC swap loopback test
on the S9700 to check whether the S9700 can provide services properly. This test checks
connectivity and QoS CAR of the network between an S9700 downlink interface and a remote
device. The local MAC swap loopback test can also check whether VLAN mapping and VLAN
stacking are configured successfully on the downlink interface.
A local MAC swap loopback test checks connectivity and performance of the network between
a tester and a tested switch, and performance of the tested switch.
Pre-configuration Tasks
Before configuring local MAC swap loopback, complete the following tasks:
l Creating a VLAN and adding the interface where you want to perform the local MAC swap
loopback test to the VLAN
l Configuring QoS CAR if you want to test QoS CAR on the network
For the configuration procedure, see the S9700 Core Routing Switch Configuration Guide
- QoS.
Data Preparation
To configure local MAC swap loopback, you need the following data.
No. Data
1 Type and number of the interface where the local MAC swap loopback test needs to
be performed
2 Type and number of the outbound interface that sends loopback packets to the tester
Context
Before performing a local MAC swap loopback test, configure the source MAC address,
destination MAC address, and VLAN ID of test packets on the S9700. Only the packets with
the specified source MAC address, destination MAC address, and VLAN ID are looped back.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
MAC swap loopback tests cannot be performed on an Eth-Trunk interface or its member
interfaces.
Step 3 Run:
loopback local swap-mac source-mac source-mac-address dest-mac dest-mac-address
vlan vlan-id [ inner-vlan inner-vlan-id ] interface interface-type interface-
number [ timeout { time-value | none } ]
NOTE
The SA and XSA boards support loopback of only single-tagged Ethernet frames.
CAUTION
When a local MAC swap test is performed on an interface, services on the interface are
interrupted, but services on other interfaces are not affected. If a large number of test packets
are sent, test packets occupy bandwidth of other services on the interface that sends test packets
back to the tester.
If single VLAN tag is configured on the S9700, the test packets cannot be double-tagged.
----End
Context
A loopback test deteriorates network performance. If a large number of test packets are sent,
bandwidth of other services is occupied. To ensure network performance, enable the MAC swap
loopback function when the loopback test begins and disable it immediately after the loopback
test is complete.
Procedure
Step 1 Run:
system-view
----End
Context
A loopback test deteriorates network performance. If a large number of test packets are sent,
bandwidth of other services is occupied. Therefore, disable the MAC swap loopback function
immediately after the loopback test is complete.
Procedure
Step 1 Run:
system-view
----End
Prerequisites
All configurations of local MAC swap loopback are complete.
Procedure
l Run the display loopback swap-mac information command to view the configuration of
local MAC swap loopback.
----End
Example
Run the display loopback swap-mac information command to check whether MAC swap
loopback is configured correctly. After test packets are sent, run this command to view the
statistics on received test packets and discarded packets.
<Quidway> display loopback swap-mac information
Loopback type : local
Applicable Environment
Before using an S9700 to provide services for users, perform a remote MAC swap loopback test
to check whether the S9700 can provide services properly. This test checks connectivity and
performance of the network between an S9700 uplink interface and a remote device. The remote
MAC swap loopback test can also check whether VLAN mapping and VLAN stacking are
configured successfully on the uplink interface.
A remote MAC swap loopback test checks connectivity and performance of the network between
a tester and a tested switch but does not check performance of the tested switch.
Pre-configuration Tasks
Before configuring remote MAC swap loopback, complete the following task:
l Creating a VLAN and adding the interface where you want to perform the remote MAC
swap loopback test to the VLAN
l Configuring VLAN mapping or VLAN stacking as required.
Data Preparation
To configure remote MAC swap loopback, you need the following data.
No. Data
1 Type and number of the interface where the remote MAC swap loopback test needs
to be performed
Context
Before performing a remote MAC swap loopback test, configure the source MAC address,
destination MAC address, and VLAN ID of test packets on the S9700. Only the packets with
the specified source MAC address, destination MAC address, and VLAN ID are looped back.
Procedure
Step 1 Run:
system-view
CAUTION
A remote MAC swap loopback test modifies only Ethernet frames matching the MAC swap
loopback configuration on an interface, and other Ethernet frames can still be forwarded on the
interface. However, if a large number of test packets are sent, test packets occupy bandwidth of
other services on the interface.
If single VLAN tag is configured on the S9700, the test packets cannot be double-tagged.
----End
Context
A loopback test deteriorates network performance. If a large number of test packets are sent,
bandwidth of other services is occupied. To ensure network performance, enable the MAC swap
loopback function when the loopback test begins and disable it immediately after the loopback
test is complete.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
MAC swap loopback tests cannot be performed on an Eth-Trunk interface or its member
interfaces.
Step 3 Run:
loopback swap-mac start
To ensure service provisioning on the interface, run the loopback swap-mac stop command to
disable the MAC swap loopback function immediately after the loopback test is complete.
----End
Context
A loopback test deteriorates network performance. If a large number of test packets are sent,
bandwidth of other services is occupied. Therefore, disable the MAC swap loopback function
immediately after the loopback test is complete.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
MAC swap loopback tests cannot be performed on an Eth-Trunk interface or its member
interfaces.
Step 3 Run:
loopback swap-mac stop
A MAC swap loopback test stops when you disable the MAC swap loopback function or the
loopback test times out. To perform the loopback test again, run the loopback swap-mac
start command.
----End
Prerequisites
All configurations of remote MAC swap loopback are complete.
Procedure
l Run the display loopback swap-mac information command to view the configuration of
remote MAC swap loopback.
----End
Example
Run the display loopback swap-mac information command to check whether remote MAC
swap loopback is configured correctly. After test packets are sent, run this command to check
the number of received loopback packets.
<Quidway> display loopback swap-mac information
Loopback type : remote
Loopback state : running
Loopback test time(s) : 60
Loopback interface : GigabitEthernet1/0/0
Loopback output interface : GigabitEthernet1/0/0
Loopback source MAC : 0001-0001-0001
Loopback destination MAC : 0002-0002-0002
Loopback vlan : 10
Loopback inner vlan : 0
Loopback packets : 0
Tester
Users
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Create a VLAN, configure GE1/0/1 as a trunk interface and GE1/0/2 as a hybrid interface,
and add the interfaces to the VLAN.
2. Configure local MAC swap loopback on SwitchB.
3. Enable the MAC swap loopback function on SwitchB.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Create VLAN 100, configure GE1/0/1 as trunk interface and GE1/0/2 as a hybrid interface, and
add the interfaces to VLAN 100.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan batch 100
[SwitchB] interface gigabitethernet1/0/1
[SwitchB-GigabitEthernet1/0/1] port link-type trunk
[SwitchB-GigabitEthernet1/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet1/0/1] quit
[SwitchB] interface gigabitethernet1/0/2
[SwitchB-GigabitEthernet1/0/2] port hybrid pvid vlan 100
[SwitchB-GigabitEthernet1/0/2] port hybrid untagged vlan 100
Step 2 Configure local MAC swap loopback on GE1/0/2 and specify GE1/0/1 as the outbound interface
of loopback Ethernet frames. Enable the MAC swap loopback function.
[SwitchB-GigabitEthernet1/0/2] loopback local swap-mac source-mac 0018-2000-0085
dest-mac 018-2000-0070 vlan 100 interface gigabitethernet 1/0/1 timeout 80
[SwitchB-GigabitEthernet1/0/2] loopback swap-mac start
[SwitchB-GigabitEthernet1/0/2] quit
----End
Configuration Files
l Configuration file of SwitchB
#
sysname SwitchB
#
vlan batch 100
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 100
#
interface GigabitEthernet1/0/2
port hybrid pvid vlan 100
port hybrid untagged vlan 100
loopback local swap-mac source-mac 0018-2000-0085 dest-mac 0018-2000-0070
vlan
100 interface GigabitEthernet1/0/1 timeout 80
#
return
Tester
Ethernet GE1/0/1
Users
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Create a VLAN, configure GE1/0/1 as a trunk interface, and add the interface to the VLAN.
2. Configure remote MAC swap loopback on SwitchB.
3. Enable the MAC swap loopback function on SwitchB.
Data Preparation
To complete the configuration, you need the following data:
l VLAN ID: 100
l Source and destination MAC addresses of test Ethernet frames: 0018-2000-0085 and
0018-2000-0070
l Timeout period of the loopback test: 80s
Procedure
Step 1 Create VLAN 100, configure GE1/0/1 as a trunk interface, and add GE1/0/1 to VLAN 100.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan batch 100
[SwitchB] interface gigabitethernet1/0/1
[SwitchB-GigabitEthernet1/0/1] port link-type trunk
[SwitchB-GigabitEthernet1/0/1] port trunk allow-pass vlan 100
[SwitchB-GigabitEthernet1/0/1] quit
Step 2 Configure remote MAC swap loopback and enable the MAC swap loopback function on
GE1/0/1.
[SwitchB-GigabitEthernet1/0/1] loopback remote swap-mac source-mac 0018-2000-0085
dest-mac 018-2000-0070 vlan 100 timeout 80
[SwitchB-GigabitEthernet1/0/1] loopback swap-mac start
[SwitchB-GigabitEthernet1/0/1] quit
----End
Configuration Files
l Configuration file of SwitchB
#
sysname SwitchB
#
vlan batch 100
#
interface GigabitEthernet1/0/1
port link-type trunk
port trunk allow-pass vlan 100
loopback remote swap-mac source-mac 0018-2000-0085 dest-mac 0018-2000-0070
vlan
100 timeout 80
#
return
This chapter describes the principle and configuration of hot backup and active/standby
switchover.
To ensure uninterrupted service provisioning, network devices must have high reliability. High
reliability of the communications equipment means a low probability of service interruption
caused by the fault of the equipment itself.
In theory, to reduce the probability of service interruption to 0, you must have the software and
hardware designed without any flaw, which is impossible in reality.
Therefore, in addition to upgrading the quality of the software and hardware, you need to adopt
the backup mode to improve the reliability of the communications equipment.
For the critical node in a communications system, multiple units of the same function are
provided so that these units can take over the work of each other in the case of faults. This is
called backup mode. Among the multiple units, some are in active mode and are responsible for
the normal running of the node, whereas others are in standby mode. When the active units fail,
they are automatically replaced by the standby units immediately, which ensures normal
operation of the communications system.
1:1 backup In 1:1 backup mode, two units are used. One is the active unit, and the
other is the standby unit. The standby unit backs up configurations of
the active unit and certain dynamic information. If the active unit fails,
the standby replaces the active unit immediately, which ensures normal
operations.
Load balancing In load balancing mode, multiple units share the load of the system. If
one of the units fails, the other units take over its service to ensure normal
operation.
1+1 backup In 1+1 backup mode, both the two units function at the same time. If one
of the units fails, services on this unit are switched to the other unit, and
the other unit is able to support the normal operation of the entire system.
1+1 backup can be considered as a special mode of load balancing.
Main control The S9700 uses two main control boards. When the master main control
board board fails, the slave main control board substitutes for master main control
board to ensure normal operation.
CMU The S9700 uses two CMUs. When the master CMU fails, the slave CMU
substitutes for master CMU to ensure normal monitoring function of the
S9700.
Fan frame Multiple fans can be installed on the S9700. When a fan fails, other fans
adjust their rotation speed to ensure good heat dissipation on the S9700.
Power module Multiple power modules can be installed on the S9700. For more information
about Power module, refer to Configuration and Operation Modes of Power
Supplies.
High reliability of the main control boards is realized through hot backup and active/standby
switchover.
Before performing an active/standby switchover, ensure that the two main control boards have the same
configuration. If their configurations are different, the active/standby switchover will fail. If one main
control board has an FSU installed but the other one has no FSU installed, the active/standby switchover
will also fail.
Active/standby switchover can be performed only when the slave main control board is in real-time backup
state.
l The master main control board is removed when the S9700 is running.
l The operator runs the switchover command.
l The master main control board fails.
In any of the preceding situations, active/standby switchover is triggered on the S9700. Services
can be switched to the slave main control board smoothly.
Applicable Environment
After the S9700 starts, the main control board in the specified slot becomes the slave main control
board, and the other main control board automatically becomes the master main control board.
When two main control boards are installed, you can perform this configuration task after
upgrading the system software of the slave main control board. In this manner, you can make
the system software of the slave main control board take effect without affecting services on the
S9700.
Pre-configuration Tasks
None.
Data Preparation
To configure the slave main control board, you need the following data.
No. Data
Procedure
Step 1 Run:
system-view
Step 2 Run:
slave default slot-id
By default, the main control board with the smaller slot ID is the master one, and the one with
the larger slot ID is the slave one. The default master and slave main control boards of the
S9700 series are as follows:
l The master main control board of the is in slot 4, and the slave main control board is in slot
5.
l The master main control board of the is in slot 7, and the slave main control board is in slot
8.
l The master main control board of the is in slot 13, and the slave main control board is in slot
14.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
slave restart
NOTE
The slave restart command may interrupt services on the device. Therefore, exercise caution when using this
command.
----End
Procedure
Step 1 Run the display slave default command to view the slot ID of the slave main control board used
after the next startup.
----End
Example
Run the display slave default command, and you can find that the slave main control board
used after the next startup is in slot 4.
<Quidway> display slave default
Info: Default slave slot is 4.
Applicable Environment
When two main control boards are installed on the S9700, you can perform active/standby
switchover manually.
Pre-configuration Tasks
Before performing active/standby switchover, complete the following task:
l Ensuring that the slave main control board is in real-time backup mode
Data Preparation
None.
Procedure
Step 1 Run:
system-view
Step 2 Run:
slave switchover enable
You can perform the following task only when the active/standby switchover is enabled: 11.4.3
Performing Active/Standby Switchover
----End
Context
NOTE
Active/standby switchover can be performed only when the slave main control board is in real-
time backup state. You can run the display switchover state command to view the hot backup
state of the slave main control board. If the slave main control board is in real-time backup state,
the following information is displayed:
Slave MPU: Receiving realtime and routine data.
During the switchover on the S9700, do not remove, install, or reset the master and slave main
control boards, LPUs, power modules, or fan frames. Otherwise, the S9700 restarts or fails.
Procedure
Step 1 Run:
system-view
Step 2 Run:
slave switchover
NOTE
The slave switchover command may interrupt services on the device. Therefore, exercise caution when using
this command.
----End
Follow-up Procedure
After switchover, the master main control board is restarted and then enters the standby state;
the slave main control board enters the active state.
Procedure
Step 1 Run the display switchover state command to check the backup state of the active and standby
main control boards.
----End
Example
Run the display switchover state command, and you can view the backup state of the master
and slave main control boards.
<Quidway> display switchover state
Slot 4 HA FSM State(master): realtime or routine backup.
Slot 5 HA FSM State(slave): receiving realtime or routine data.
11.5.1 Viewing the Status of the Master and Slave Main Control
Boards
Procedure
Step 1 Run the display device command to check the status of the master and slave main control board.
----End
Example
Run the display device command, and you can view the status of the master and slave main
control board.
<Quidway>display device
S9303's Device status:
Slot Sub Type Online Power Register Alarm Primary
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1 - G24CA Present PowerOn Registered Normal NA
2 - G24CA Present PowerOn Registered Normal NA
3 - G48SD Present PowerOn Registered Normal NA
4 - MCUA Present PowerOn Registered Normal Master
5 - MCUA Present PowerOn Registered Normal Slave
PWR1 - - Present PowerOn Registered Normal NA
Context
CAUTION
Debugging affects the performance of the system. So, after debugging, run the undo debugging
all command to disable it immediately.
When a fault occurs during hot backup or active/standby switchover, run the following
debugging command in the user view to locate the fault.
Procedure
Step 1 Run the debugging ha { all | message | resendipc | state } command to enable debugging of
hot backup and active/standby switchover.
----End
Configuration Roadmap
The configuration roadmap is as follows:
1. Run the slave switchover command to make the slave main control board active.
Data Preparation
To complete the configuration, you need the following data:
l Slot IDs of the master and slave main control board In this example, the master main control
board is in slot 4, and the slave main control board is in slot 5.
Procedure
Step 1 Enable active/standby switchover.
<Quidway> system-view
[Quidway] slave switchover enable
Run the slave switchover command when the slave main control board is in real-time backup
state. Then the slave main control board becomes active, and the master main control board is
restarted.
[Quidway] slave switchover
[Quidway] Warning: This operation will switch the slave board to the master board.
Continue?[Y/N]:
Step 3 Check the hot backup state of the master main control board.
[Quidway] display switchover state
Slot 4 HA FSM State(slave): receiving realtime and routine data.
As shown in the preceding output, the master main control board is in real-time backup state,
indicating that the active/standby switchover is successful. You can replace the main control
board if necessary.
----End
Configuration Files
None.