Professional Documents
Culture Documents
V100R005C01
Issue 02
Date 2010-12-01
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Intended Audience
This document provides the basic concepts, configuration procedures, and configuration
examples in different application scenarios of the reliability supported by the S5300.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
&<1-n> The parameter before the & sign can be repeated 1 to n times.
Change History
Updates between document issues are cumulative. Therefore,the latest document issue contains
all updates made in previous issues.
Contents
3 RRPP Configuration..................................................................................................................3-1
3.1 Introduction to RRPP......................................................................................................................................3-2
3.2 RRPP Features Supported by the S5300.........................................................................................................3-2
3.3 Configuring Basic RRPP Functions................................................................................................................3-6
3.3.1 Establishing the Configuration Task......................................................................................................3-7
3.3.2 Creating Instances..................................................................................................................................3-8
3.3.3 Configuring Interfaces on the RRPP Ring.............................................................................................3-8
3.3.4 Creating an RRPP Domain.....................................................................................................................3-9
3.3.5 Specifying Protected VLANs...............................................................................................................3-10
3.3.6 Creating a Control VLAN....................................................................................................................3-11
3.3.7 Creating an RRPP Ring........................................................................................................................3-11
3.3.8 Enabling the RRPP Ring......................................................................................................................3-12
3.3.9 Enabling the RRPP Protocol................................................................................................................3-13
3.3.10 (Optional) Setting the Hello Timer and Fail Timer of an RRPP Domain..........................................3-13
3.3.11 Checking the Configuration...............................................................................................................3-14
3.4 Configuring RRPP Multi-Instance................................................................................................................3-15
3.4.1 Establishing the Configuration Task....................................................................................................3-16
3.4.2 Creating Instances................................................................................................................................3-18
3.4.3 Configuring Interfaces on the RRPP Ring...........................................................................................3-19
3.4.4 Creating an RRPP Domain...................................................................................................................3-20
3.4.5 Specifying Protected VLANs...............................................................................................................3-20
3.4.6 Creating a Control VLAN....................................................................................................................3-21
5 BFD Configuration.....................................................................................................................5-1
5.1 Introduction to BFD........................................................................................................................................5-2
5.2 BFD Features Supported by the S5300...........................................................................................................5-2
5.3 Configuring Single-Hop BFD.........................................................................................................................5-4
5.3.1 Establishing the Configuration Task......................................................................................................5-4
5.3.2 Enabling BFD Globally..........................................................................................................................5-5
5.3.3 (Optional) Setting the Multicast IP Address of BFD.............................................................................5-5
5.3.4 Creating a BFD Session.........................................................................................................................5-6
5.3.5 (Optional) Configuring the Description of a BFD Session....................................................................5-7
5.3.6 Checking the Configuration...................................................................................................................5-7
5.4 Configuring the BFD Passive Echo Function.................................................................................................5-9
5.4.1 Establishing the Configuration Task......................................................................................................5-9
5.4.2 Configuring the BFD Passive Echo Function......................................................................................5-10
5.4.3 Checking the Configuration.................................................................................................................5-11
5.5 Configuring Multi-Hop BFD........................................................................................................................5-11
5.5.1 Establishing the Configuration Task....................................................................................................5-12
5.5.2 Enabling BFD Globally........................................................................................................................5-12
5.5.3 Creating a BFD Session.......................................................................................................................5-13
5.5.4 (Optional) Configuring the Description of a BFD Session..................................................................5-14
5.5.5 Checking the Configuration.................................................................................................................5-14
5.6 Configuring a Static BFD Session with Automatically Negotiated Discriminators.....................................5-16
5.6.1 Establishing the Configuration Task....................................................................................................5-16
5.6.2 Enabling Global BFD...........................................................................................................................5-16
5.6.3 Configuring a Static BFD Session with Automatically Negotiated Discriminators............................5-17
5.6.4 Checking the Configuration.................................................................................................................5-18
5.7 Adjusting the BFD Detection Parameters.....................................................................................................5-18
5.7.1 Establishing the Configuration Task....................................................................................................5-19
5.7.2 Adjusting the BFD Detection Time.....................................................................................................5-19
5.7.3 Setting the WTR Time of a BFD Session............................................................................................5-20
5.7.4 Setting the Priority of BFD Packets.....................................................................................................5-21
5.7.5 Checking the Configuration.................................................................................................................5-22
5.8 Setting the Interval for Sending Trap Messages...........................................................................................5-23
5.8.1 Establishing the Configuration Task....................................................................................................5-23
5.8.2 Setting the Interval for Sending Trap Messages..................................................................................5-24
5.8.3 Checking the Configuration.................................................................................................................5-24
5.9 Maintaining BFD...........................................................................................................................................5-24
5.9.1 Clearing the Statistics of BFD..............................................................................................................5-25
6 VRRP Configuration.................................................................................................................6-1
6.1 Introduction to VRRP......................................................................................................................................6-3
6.2 VRRP Features Supported by the S5300........................................................................................................ 6-3
6.3 Configuring a VRRP Backup Group...............................................................................................................6-4
6.3.1 Establishing the Configuration Task......................................................................................................6-5
6.3.2 Creating a VRRP Group and Configuring the Virtual IP Address........................................................ 6-6
6.3.3 Setting the Priority of an Interface in a Backup Group..........................................................................6-7
6.3.4 (Optional) Configuring the Sending Mode of VRRP Packets in Super-VLAN.................................... 6-7
6.3.5 Checking the Configuration...................................................................................................................6-8
6.4 Configuring VRRP to Track the Interface Status............................................................................................6-9
6.4.1 Establishing the Configuration Task......................................................................................................6-9
6.4.2 Tracking the Status of an Interface.........................................................................................................6-9
6.4.3 Checking the Configuration.................................................................................................................6-10
6.5 Configuring VRRP to Tracking the BFD Session Status..............................................................................6-11
6.5.1 Establishing the Configuration Task....................................................................................................6-11
6.5.2 Tracking the Status of a BFD Session..................................................................................................6-12
6.5.3 Checking the Configuration.................................................................................................................6-13
6.6 Configuring VRRP Authentication...............................................................................................................6-13
6.6.1 Establishing the Configuration Task....................................................................................................6-13
6.6.2 Setting the Authentication Mode of VRRP Packets.............................................................................6-14
6.6.3 Checking the Configuration.................................................................................................................6-15
6.7 Optimizing the VRRP Performance..............................................................................................................6-16
6.7.1 Establishing the Configuration Task....................................................................................................6-16
6.7.2 Setting the Interval for Sending VRRP Advertisement Packets..........................................................6-17
6.7.3 Setting the Preemption Delay of Switches in a Backup Group............................................................6-18
6.7.4 Disabling a router from Checking Number of Hops in VRRP Packets...............................................6-19
6.7.5 Enabling the Ping to Virtual IP Addresses...........................................................................................6-19
6.7.6 Setting the Interval for Sending Gratuitous ARP Packets....................................................................6-20
6.7.7 Checking the Configuration.................................................................................................................6-20
6.8 Configuring mVRRP Backup Groups...........................................................................................................6-21
6.8.1 Establishing the Configuration Task....................................................................................................6-21
6.8.2 Configuring mVRRP Backup Group...................................................................................................6-23
6.8.3 (Optional) Configuring Member VRRP Backup Groups and Binding them to the mVRRP Backup Group
.......................................................................................................................................................................6-23
6.8.4 Checking the Configuration.................................................................................................................6-24
6.9 Configuring VRRP Version Upgrade...........................................................................................................6-25
6.9.1 Establishing the Configuration Task....................................................................................................6-25
7 VRRP6 Configuration...............................................................................................................7-1
7.1 Introduction to VRRP6....................................................................................................................................7-2
7.2 VRRP6 Features Supported by the S5300......................................................................................................7-2
7.3 Configuring a VRRP6 Backup Group.............................................................................................................7-3
7.3.1 Establishing the Configuration Task......................................................................................................7-3
7.3.2 Creating a Backup Group and Configuring a Virtual IPv6 Address......................................................7-3
7.3.3 Configuring the Priority of the S5300 in a VRRP6 Group....................................................................7-4
7.3.4 Checking the Configuration...................................................................................................................7-5
7.4 Configuring VRRP6 to Track the Status of an Interface.................................................................................7-5
7.4.1 Establishing the Configuration Task......................................................................................................7-6
7.4.2 Configuring VRRP6 to Track the Status of an Interface........................................................................7-6
7.4.3 Checking the Configuration...................................................................................................................7-7
7.5 Configuring VRRP6 to Tracking the BFD Session Status..............................................................................7-8
7.5.1 Establishing the Configuration Task......................................................................................................7-8
7.5.2 Configuring VRRP6 to Tracking the BFD Session Status.....................................................................7-9
7.5.3 Checking the Configuration...................................................................................................................7-9
7.6 Adjusting and Optimizing VRRP6................................................................................................................7-10
7.6.1 Establishing the Configuration Task....................................................................................................7-10
7.6.2 Setting the Interval for Sending VRRP6 Advertisement Messages.....................................................7-11
7.6.3 Setting the Preemption Delay on the S5300.........................................................................................7-12
7.6.4 Disabling Checking of the Hop Limit of VRRP6 Packets...................................................................7-12
7.6.5 Disabling Preemption Mode on an Interface........................................................................................7-13
7.6.6 Checking the Configuration.................................................................................................................7-13
7.7 Configuring mVRRP6 Backup Groups.........................................................................................................7-15
7.7.1 Establishing the Configuration Task....................................................................................................7-15
7.7.2 Configuring mVRRP6 Backup Group.................................................................................................7-17
7.7.3 (Optional) Configuring Member VRRP6 Backup Groups and Binding them to the mVRRP6 Backup
Group.............................................................................................................................................................7-17
7.7.4 Checking the Configuration.................................................................................................................7-18
7.8 Maintaining VRRP6......................................................................................................................................7-18
7.8.1 Resetting VRRP6 Statistics..................................................................................................................7-18
7.9 Configuration Examples................................................................................................................................7-19
7.9.1 Example for Configuring VRRP6 on an Interface...............................................................................7-19
7.9.2 Example for Configuring VRRP6 in Load Balancing Mode...............................................................7-22
Figures
Figure 4-14 Networking diagram for testing the packet loss ratio on the link...................................................4-78
Figure 4-15 Networking diagram for configuring basic functions of Ethernet CFM........................................ 4-81
Figure 4-16 Networking diagram for configuring the default MD for Ethernet CFM.......................................4-89
Figure 4-17 Networking diagram for configuring association between an EFM OAM module and an interface
.............................................................................................................................................................................4-96
Figure 4-18 Networking diagram for configuring association between EFM OAM modules...........................4-98
Figure 4-19 Networking diagram for associating an Ethernet CFM module with an interface.......................4-101
Figure 4-20 Networking diagram for configuring association between an EFM OAM module and an Ethernet CFM
module...............................................................................................................................................................4-105
Figure 4-21 Networking diagram for configuring association between Ethernet CFM and Ethernet CFM....4-109
Figure 4-22 Networking diagram for associating Ethernet CFM with Smart Link.........................................4-113
Figure 4-23 Networking diagram for associating Ethernet CFM and RRPP multi-instance...........................4-119
Figure 4-24 Networking diagram of association between SEP and CFM........................................................4-132
Figure 4-25 Networking diagram of configuring the one-way frame delay measurement in a VLAN...........4-144
Figure 4-26 Networking diagram of configuring the two-way frame delay measurement in a VLAN...........4-149
Figure 5-1 Application scenario of the BFD passive Echo function....................................................................5-9
Figure 5-2 Networking diagram of single-hop BFD (for Layer 2 forwarding link).......................................... 5-26
Figure 5-3 Networking diagram for configuring single-hop BFD on a VLANIF interface...............................5-28
Figure 5-4 Networking diagram of multi-hop BFD...........................................................................................5-32
Figure 6-1 Default gateway of a LAN..................................................................................................................6-3
Figure 6-2 mVRRP determines the dual-homing of the master and slave switchs............................................6-22
Figure 6-3 Networking of a VRRP group in master/backup mode....................................................................6-28
Figure 6-4 Networking of a VRRP group in master/backup mode....................................................................6-34
Figure 6-5 Networking of VRRP fast switchover..............................................................................................6-40
Figure 7-1 mVRRP6 determines the dual-homing of the master and slave routers...........................................7-16
Figure 7-2 Networking of VRRP6..................................................................................................................... 7-20
Figure 7-3 Networking of VRRP in load balancing mode.................................................................................7-23
Tables
1 DLDP Configuration
This chapter describes the principle, configuration procedure, and configuration example of the
Device Link Detection Protocol (DLDP).
GE0/0/1 GE0/0/2
GE0/0/1 GE0/0/2
SwitchB
TX RX
GE0/0/1
GE0/0/1
RX TX
SwitchB
DLDP can detect the link status of fibers or copper twisted pairs. If a unidirectional link exists,
DLDP automatically disables the interface or prompts the user to manually disable the interface.
This prevents network faults. Currently, the S5300 supports DLDP detection for up to 256
neighbors.
As a link layer protocol, DLDP works with the physical layer protocol to detect the link status.
The auto negotiation mechanism on the physical link detects physical signals and faults on the
physical link, and DLDP identifies the remote device and unidirectional link and disables
unreachable interfaces. The auto negotiation mechanism and DLDP work together to detect and
close unidirectional links on the physical and logical interfaces. If the interfaces on both ends
of the link work normally on the physical layer, DLDP checks the connection and packet
exchange between the two interfaces on the link layer. This process cannot be implemented
through the auto negotiation mechanism.
Applicable Environment
On a network, a unidirectional link fault often occurs. To prevent network faults caused by
unidirectional links, you can enable DLDP on interfaces at two ends of a pair of fibers or a copper
twisted pair to monitor the link status. If a unidirectional link exists, DLDP automatically
disables the interface connected to the link or prompts you to manually disable the interface.
Unidirectional links can be tested only when the devices on both ends of the fibers and copper
twisted pairs support DLDP functions.
Pre-configuration Tasks
Before configuring DLDP, complete the following task:
Data Preparation
To configure DLDP, you need the following data.
No. Data
No. Data
Procedure
Step 1 Run:
system-view
Step 2 Run:
dldp enable
Step 3 Run:
interface interface-type interface-number
Or run:
port-group port-group-name
Step 4 Run:
dldp enable
----End
Context
If DLDP works in normal mode, the system can identify only one type of unidirectional link,
that is, the crossed connection of fibers. In this mode, the system does not use any timer, so it
cannot detect that a bidirectional link changes to a unidirectional link.
If DLDP works in enhanced mode, the system can identify two types of unidirectional links,
that is, the crossed connection of fibers and the connection where one fiber is disconnected. To
detect the unidirectional link caused by disconnection of one fiber, you need to manually set the
rate and full-duplex mode of the interconnected ports; otherwise, DLDP does not take effect
even if it is enabled. When a bidirectional link changes to a unidirectional link, the port where
the Tx fiber receives optical signals is in Disable state, and the port where the Tx fiber receives
no optical signals is in Inactive state.
Procedure
Step 1 Run:
system-view
Step 2 Run:
dldp work-mode { enhance | normal }
----End
Context
Do as follows on the S5300 that needs to run DLDP.
Procedure
Step 1 Run:
system-view
Step 2 Run:
dldp interval time
The interval for sending Advertisement packets must be smaller than one third of the STP
convergence time. If the interval is too long, STP loops occur before a unidirectional link is shut
down on a DLDP interface. If the interval is too short, traffic on the network increases.
NOTE
Ensure that the interval for sending Advertisement packets is the same on the local and remote devices that
are connected through fibers or copper twisted pairs.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
dldp delaydown-timer time
If DLDP receives a Port-Down event when it is in Active, Advertisement, or Probe state, DLDP
will enter Inactive state and clear the neighbor information. In certain cases, the port is Down
for a very short time. For example, failure of the Tx fiber on a port may cause jitter of optical
signals on the Rx fiber, that is, the port becomes Down and then becomes Up again. To prevent
the neighbor information from being deleted immediately in this case, DLDP first enters the
DelayDown state and starts the DelayDown timer. Before the DelayDown timer times out, DLDP
retains the neighbor information and responds to only Port-Up events.
l If DLDP does not receive any Port-Up event when the DelayDown timer times out, it deletes
the neighbor information and enters the Inactive state.
l If DLDP receives the Port-Up event before the DelayDown timer times out, it returns to the
previous state.
----End
Context
When a unidirectional link is detected, DLDP blocks the corresponding interface in either of the
following ways:
l Manual mode: This mode can prevent DLDP from blocking the interface immediately to
affect packet forwarding when the network performance is poor. It is a compromise mode
used to prevent an interface from being blocked because of incorrect judgement of the
system. In this mode, DLDP detects the unidirectional link, and the network administrator
blocks the interface manually. When the DLDP state machine detects a unidirectional link,
the system records the log and sends trap messages to prompt you the network administrator
to block the interface manually. Then the DLDP state machine changes to the Disable state.
l Automatic mode: It is the default mode. When a unidirectional link is detected, the DLDP
state machine changes to the Disable state, and the system records the log, sends trap
messages, and sets the interface state to Blocking.
Procedure
Step 1 Run:
system-view
Step 2 Run:
dldp unidirectional-shutdown { auto | manual }
The mode of blocking interfaces when a unidirectional link fault is detected is set.
By default, DLDP automatically blocks the interface when a unidirectional link fault is detected.
An interface in DLDP Down state still sends RecoverProbe packets periodically. If correct
RecoverEcho packets are received, it indicates that the unidirectional link changes to the
bidirectional link and the DLDP status becomes Up.
----End
Procedure
Step 1 Run:
system-view
The DLDP authentication mode used between the interfaces of the S5300 and the remote device
is set.
By default, the DLDP authentication mode used between the interfaces of the S5300 and the
remote device is none. That is, DLDP packets are not authenticated.
NOTE
Ensure that the local and remote devices use the same authentication mode and same authentication
password; otherwise, the DLDP authentication fails. DLDP works normally only after the DLDP
authentication succeeds.
----End
Procedure
Step 1 Run the display dldp [ interface-type interface-number ] command to check the DLDP
configuration and neighbor entries.
----End
Example
Run the display dldp command, and you can view the operation mode of DLDP, interval for
sending Advertisement packets, value of the Delay Down timer, interface disabling mode, and
authentication mode of DLDP packets.
<Quidway> display dldp
DLDP global status : enable
DLDP interval : 5s
Interface GigabitEthernet0/0/1
DLDP port state : advertisement
DLDP link state : up
The neighbor number of the port is 1.
Neighbor mac address : 0000-0000-0100
Neighbor port index : 21
Neighbor state : two way
Neighbor aged time : 13
Interface GigabitEthernet0/0/2
DLDP port state : advertisement
DLDP link state : up
The neighbor number of the port is 1.
Neighbor mac address : 0000-0000-1100
Neighbor port index : 22
Neighbor state : two way
Neighbor aged time : 12
Applicable Environment
When a unidirectional link is detected, the corresponding interface enters the Disable state. The
system prompts you to disable the interface or sets the interface state to DLDP Down
automatically according to the configuration. To enable the interface to detect unidirectional
links again, you can reset the DLDP state of the interface. The DLDP status of the interface after
recovery depends on the physical status of the interface. If the physical status is Down, the DLDP
status of the interface changes to Inactive. If the physical status is Up, the DLDP status changes
to Active.
Pre-configuration Tasks
None.
Data Preparation
To reset the DLDP status, you need the following data.
No. Data
Context
The dldp reset command takes effect only when DLDP is enabled globally and on interfaces.
When you reset the DLDP status globally, the DLDP status is reset for all the disabled interfaces
on the S5300.
Procedure
Step 1 Run:
system-view
----End
Context
If you reset the DLDP status on an interface or interface group, the DLDP status is reset for the
interface or all the disabled interfaces in the interface group.
The dldp reset command takes effect only when DLDP is enabled globally and on interfaces.
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run the display dldp [ interface-type interface-number ] command to check the DLDP
configuration and neighbor entries.
----End
Example
Run the display dldp command, and you can view the status of an interface after the DLDP
status is reset.
<Quidway> display dldp
DLDP global status : enable
DLDP interval : 5s
DLDP work-mode : enhance
DLDP authentication-mode : simple, password is 123
DLDP unidirectional-shutdown : auto
DLDP delaydown-timer : 2s
The number of enabled ports is 2.
The number of global neighbors is: 2.
Interface GigabitEthernet0/0/1
DLDP port state : advertisement
DLDP link state : up
The neighbor number of the port is 1.
Neighbor mac address : 0000-0000-0100
Neighbor port index : 21
Neighbor state : two way
Neighbor aged time : 13
Interface GigabitEthernet0/0/2
DLDP port state : advertisement
DLDP link state : up
The neighbor number of the port is 1.
Neighbor mac address : 0000-0000-1100
Neighbor port index : 22
Neighbor state : two way
Neighbor aged time : 12
Context
CAUTION
Statistics of DLDP cannot be restored after you clear them. So, confirm the action before you
use the command.
Procedure
Step 1 Run the reset dldp statistics [ interface-type interface-number ] command in the user view to
clear the statistics of DLDP packets on an interface.
----End
Networking Requirements
As shown in Figure 1-3, two S5300s are connected through a pair of optical fibers. On a fiber,
RX indicate the receive end, and TX indicates the transmit end. DLDP is enabled on the
interconnected interfaces. If the Rx fiber on SwitchA fails, SwitchA cannot receive optical
signals. In this case, GigabitEthernet0/0/1 of SwitchA becomes Down and cannot send or receive
any packets. However, the Tx fiber on SwitchB still sends optical signals, and SwitchB can
receive optical signals because the Tx fiber on SwitchA is working normally. Therefore, the link
status on SwitchB is still Up. If SwitchB does not receive any DLDP packet from SwitchA within
the neighbor aging time, GigabitEthernet0/0/1 of SwitchB changes to unidirectional state. To
prevent network fauls, DLDP disables GigabitEthernet0/0/1 of SwitchB.
TX RX
GE0/0/1
GE0/0/1
RX TX
SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure the interfaces at both ends to work in non-auto-negotiation mode.
2. Enable DLDP.
3. Set the operation mode of DLDP.
4. Set the interval for sending Advertisement packets.
5. Set the Delay Down timer.
6. Set the mode of disabling the interface when a unidirectional link is detected.
7. Set the authentication mode of DLDP packets.
Data Preparation
To complete the configuration, you need the following data:
l Type and number of each interface
l Interval for sending Advertisement packets
l Value of the Delay Down timer
Procedure
Step 1 Configure the interface on Switch A to work in non-auto negotiation mode.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] undo negotiation auto
[SwitchA-GigabitEthernet0/0/1] quit
Step 7 Configure DLDP to automatically shut down the interface where a unidirectional link is detected.
[SwitchA] dldp unidirectional-shutdown auto
Step 8 Set the authentication mode of DLDP packets to simple password authentication and set the
password to 123456.
[SwitchA] dldp authentication-mode simple 12345
Remove the Rx fiber from Switch A to simulate a unidirectional link between GE 0/0/1 of Switch
A and GE 0/0/1 of Switch B, as shown in Figure 1-3. You find that DLDP blocks the GE
0/0/1 interface of Switch B.
# Run the display dldp on Switch A, and you can find that the DLDP status of GE 0/0/1 is
inactive. Run the display dldp on Switch B, and you can find that the DLDP status of GE
0/0/1 is disable.
<SwitchA> display dldp gigabitethernet 0/0/1
Interface GigabitEthernet0/0/1
DLDP port state: inactive
DLDP link state: down
The neighbor number of the port is: 0
<SwitchB> display dldp gigabitethernet 0/0/1
Interface GigabitEthernet0/0/1
DLDP port state: disable
DLDP link state: up
The neighbor number of the port is: 0
----End
Configuration Files
Configuration file of Switch A
#
sysname SwitchA
#
dldp enable
dldp interval 80
dldp delaydown-timer 4
dldp authentication-mode simple 12345
#
interface GigabitEthernet0/0/1
dldp enable
#
return
This chapter describes the principle, configuration procedure, and configuration example of the
Smart Link and and Monitor Link.
The dual-homing networking is often used. In this networking, STP blocks redundant links,
providing redundancy. When the active link fails, the traffic is switched to the standby link.
Although this scheme can implement redundancy, the performance cannot meet the requirements
of users. Route convergence is performed within several seconds even if the Rapid Spanning
Tree Protocol (RSTP) is used. The convergence speed is unfavorable for the high-end Ethernet
switch used on the core of the carrier-class network.
To address the preceding problem, Huawei introduces Smart Link in dual-homing networking
to implement redundancy of active and standby links and fast transition. In this manner, the high
performance is ensured and the configuration is simplified. In addition, cooperation of interfaces
is used.
The Monitor Link is introduced as a supplement to the Smart Link. This technology supports
the association of interfaces. A Monitor Link group consists of an uplink interface and several
downlink interfaces. If the uplink interface fails, the Monitor Link group automatically disables
the downlink interfaces. When the uplink interface recovers, the downlink interfaces also
recover.
Applicable Environment
As shown in Figure 2-1, each device at the access and convergence layer is connected to two
uplink devices. This networking mode provides higher security and reduces the duration of
service interruption caused by the link failure.
IP/MPLS
core
network
SwitchA
SwitchB SwitchC
Active link
Inactive link
As shown in Figure 2-1, Switch D and Switch E are connected to user devices, and both are
connected to Switch B and Switch C. Configure the Smart Link on Switch D and Switch E and
add the two uplink interfaces to the respective Smart Link group to avoid loops. In this manner,
interrupted services can be restored in milliseconds.
Pre-configuration Tasks
Before configuring the basic functions of a Smart Link group, complete the following task:
l Ensuring that the Multiple Spanning Tree Protocol (MSTP) Rapid Ring Protection Protocol
(RRPP) and Smart Ethernet Protection (SEP) are not enabled on the master and slave
interfaces of the Smart Link group
Data Preparation
To configure basic functions of the Smart Link group, you need the following data.
No. Data
No. Data
Procedure
Step 1 Run:
system-view
A Smart Link group is created and the Smart Link group view is displayed.
The S5300 supports a maximum of 16 Smart Link groups.
Step 3 Run:
protected-vlan reference-instance instance-id [ to instance-id2 ]
An instance is bound to the Smart Link group as the protected instance. The functions of the
Smart link group takes effect only on the VLANs bound to the protected instance.
NOTE
By default, a Smart Link group protects all VLANs and the protected-vlan reference-instance command
is applicable only to multicast services.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
stp disable
Step 4 Run:
quit
Step 5 Run:
smart-link group group-id
Step 6 Run:
port interface-type interface-number master
An interface is added to the Smart Link group and is specified as the master interface.
Step 7 Run:
port interface-type interface-number slave
Another interface is added to the Smart Link group and is specified as the slave interface.
A Smart Link group consists of a master interface and a slave interface. By default, a Smart Link
group does not have interfaces.
----End
Context
When the active and standby links of the Smart Link group switch, the existing forwarding
entries no longer apply to the new topology. All the MAC address entries and ARP entries on
the network need to be updated. Then the Smart Link group sends Flush packets to ask other
devices to update the MAC address table and ARP entries.
Because manufacturers define the format of Flush packets differently, the Flush packets
described here are used only for the intercommunication between Huawei S-series switches. In
addition, the function of receiving Flush packets must be enabled on the remote switch.
If you run flush send control-vlan vlan-id [ password simple password ] command in the Smart
Link group view, the Smart Link group is enabled to send Flush packets that contain the specified
control VLAN ID and password. The VLAN ID specified by vlan-id must already exist on the
S5300. If the specified VLAN ID does not exist on the S5300, Flush packets cannot be sent.
Do as follows on the S5300.
Procedure
Step 1 Run:
system-view
The S5300 is enabled to send Flush packets, and the control VLAN ID and password contained
in Flush packets are set.
A control VLAN cannot be a VLAN mapping a load-balancing instance.
The control VLAN ID and password contained in Flush packets on both devices must be the
same. That is, the control VLAN ID and password in Flush packets sent by the device must be
the same as the control VLAN ID and password in Flush packets received by the device.
NOTE
After the flush send control-vlan command is run, the interface cannot be added to the control VLAN. You need
to configure the interface to allow the packets of the control VLAN to pass through.
----End
Context
Do as follows on the S5300.
Procedure
Step 1 Run:
system-view
Step 3 Run:
instance instance-id vlan { vlan-id1 [ to vlan-id2 ] }&<1-10>
A domain supports up to 49 instances, among which Instance 0 is the default instance and does
not need to be created.
Step 4 Run:
active region-configuration
After configuring the domain name, VLAN mapping table, or MSTP revision level, you must
run the active region-configuration command for the configuration to take effect.
Step 5 Run:
quit
Step 6 Run:
smart-link group group-id
Step 7 Run:
load-balance instance { instance-id1 [ to instance-id2 ] } &<1-10> slave
Packets of the VLANs bound to the specified instance are sent from the slave interface to
implement load balancing.
----End
Context
When the active link in a Smart Link group fails, the traffic is automatically switched to the
standby link. The original active link does not preempt the traffic but remains blocked after
recovering from the fault. To switch the traffic back to the active link, you can adopt either of
the following methods:
l Enable the revertive switching of a Smart Link group. The switching is automatically
performed after the revertive switching timer times out.
l Run the smart-link manual switch command to perform the link switching forcibly.
NOTE
The link switching is performed only when the two member interfaces in a group are both Up.
Procedure
Step 1 Run:
system-view
Step 2 Run:
smart-link group group-id
Step 3 Run:
restore enable
The wait to recover (WTR) time of the Smart Link group is set.
----End
Context
An interface receives Flush packets only when it is configured with the control VLAN ID and
added to this VLAN.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface { gigabitethernet | eth-trunk| xgigabitethernet } interface-number
The view of the downlink interface of the SwitchA, SwitchB, or SwitchC is displayed.
Step 3 Run:
smart-link flush receive control-vlan vlan-id [ password simple password ]
The interface is enabled to receive Flush packets, and the control VLAN ID and password
contained in Flush packets are set.
The control VLAN ID and password contained in Flush packets on both devices must be the
same. That is, the control VLAN ID and password in Flush packets sent by the device must be
the same as the control VLAN ID and password in Flush packets received by the device.
----End
Context
After the functions of the Smart Link group are enabled, the standby interface in the group is
blocked. After the functions of the Smart Link group are disabled, the blocked standby interface
is recovered.
Procedure
Step 1 Run:
system-view
----End
Procedure
l Run the display smart-link group { all | group-id } command to check information about
a Smart Link group.
l Run the display smart-link flush command to check information about the received Flush
packets.
----End
Example
Run the display smart-link group { all | group-id } command to check information about a
Smart Link group. The following information is displayed:
<Quidway> display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
Wtr-time is: 30 sec.
Load-Balance Instance: 1 to 2
There is no protected-vlan reference-instance
DeviceID: 0018-2000-0083 Control-vlan ID: 20
l The functions of the Smart Link group are enabled. Therefore, "Smart link group was
enabled" is displayed.
l The status of the interfaces in the Smart Link group is displayed, including the role of each
interface in the group, number of sent Flush packets, and time when the last Flush packets
are sent. As shown in the preceding information, GigabitEthernet0/0/1 is the master
interface in the Smart Link group; this interface is in the Forwarding state; it sent a Flush
packet at 16:37 on 2008-11-21.
l The control VLAN ID contained in the sent Flush packets is 20.
Run the display smart-link flush command, and you can view information about received Flush
packets.
<Quidway> display smart-link flush
Receive flush packets count: 1191
Receive last flush interface: GigabitEthernet0/0/1
Receive last flush packet time: 16:48:53 UTC+05:00 2009/02/23
Receive last flush packet source mac: 0018-0202-0088
Receive last flush packet control vlan ID: 20
Applicable Environment
As shown in Figure 2-2, the basic functions and revertive switching of the Smart Link group
are enabled on Switch D. During maintenance, the active link in the Smart Link group needs to
be inspected. To prevent the inspection from affecting normal services, you need to configure
a flow control policy for the Smart Link group. Through the configuration, you can forcibly lock
the data flows to the standby link and switch them back to the active link after the inspection is
complete.
SwitchA
SwitchB SwitchC
Smart Link
group
Active link
SwitchD SwitchE
Inactive link
Pre-configuration Tasks
Before configuring a flow control policy for the Smart Link group, complete the following task:
l 2.2 Configuring a Smart Link Group
Data Preparation
None.
CAUTION
If data flows are locked on the master interface, they cannot be switched to the slave interface
automatically when the master interface fails. Thus, traffic is interrupted.
Procedure
Step 1 Run:
system-view
Step 3 Run:
smart-link lock
----End
Context
CAUTION
If data flows are locked on the slave interface, they cannot be switched to the master interface
automatically when the slave interface fails. Thus, traffic is interrupted.
Procedure
Step 1 Run:
system-view
Step 2 Run:
smart-link group group-id
Step 3 Run:
smart-link force
----End
Context
Do as follows on SwitchD shown in Figure 2-2.
Procedure
Step 1 Run:
system-view
Step 2 Run:
smart-link group group-id
----End
Procedure
Step 1 Run the display smart-link group { all | group-id } command to check information about a
Smart Link group.
----End
Example
Run the display smart-link group { all | group-id } command. If lock is displayed, it indicates
that data flows are locked on the master interface. If force is displayed, it means that data flows
are locked on the slave interface.
<Quidway> display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
Link status:lock
Wtr-time is: 30 sec.
Load-Balance Instance: 1 to 2
There is no protected-vlan reference-instance
DeviceID: 0018-2000-0083 Control-vlan ID: 20
Member Role State Flush Count Last-Flush-Time
------------------------------------------------------------------------
GigabitEthernet0/0/1 Master Active 1 2008/11/21 16:37:20 UTC
+05:00
GigabitEthernet0/0/2 Slave Inactive 2 2008/11/21 17:45:20 UTC
+05:00
IP/MPLS
core
network
SwitchC
Active link
User1 User2 Inactive link
As shown in Figure 2-3, the link between Switch A and Router breaks. Although Smart Link
is enabled on Switch C and Switch D, link switching is not performed because the active link
does not fail. In this case, services are interrupted. To enable the Smart Link group to respond
more quickly to the faults of the uplink, you need to configure the Monitor Link function on the
device connected to the active link Monitor Link to monitor the status of the uplink. When a
fault occurs, the active link of the Smart Link group is blocked quickly. The Smart Link group
can then detect the fault and switch the traffic to the standby link. Thus, the duration of service
interruption is shortened.
Pre-configuration Tasks
Before configuring the basic functions of the Monitor Link group, complete the following tasks:
Data Preparation
To configure the basic functions of the Monitor Link group, you need the following data.
No. Data
Context
Do as follows on SwitchA and SwitchB.
Procedure
Step 1 Run:
system-view
Step 2 Run:
monitor-link group group-id
A Monitor Link group is created and the Monitor Link group view is displayed.
----End
Context
Do as follows on SwitchA and SwitchB.
Procedure
Step 1 Run:
system-view
Step 2 Run:
monitor-link group group-id
The Monitor Link group view is displayed. The S5300 supports a maximum of 16 Monitor Link
groups.
Step 3 Run:
port interface-type interface-number { downlink [ downlink-id ] | uplink }
An interface is configured as the uplink interface or downlink interface of the Monitor Link
group.
Or run:
smart-link group group-id uplink
A Smart Link group is configured as the uplink interface of the Monitor Link group.
NOTE
The status of the uplink interface determines the status of the Monitor Link group. Therefore, after the
downlink interface is added to the Monitor Link group, the result of the shutdown or undo shutdown
command can be retained before the status of the uplink interface changes. When the status of the uplink
interface changes, the status of the downlink interfaces changes as follows:
l When an uplink interface in Up state is added to the Monitor Link group or when an uplink interface
in Down state becomes Up, all the downlink interfaces in the Monitor Link group become Up.
l When an uplink interface is deleted from the Monitor Link group or when an uplink interface in Up
state becomes Down, all the downlink interfaces in the Monitor Link group become Down.
To add a Smart Link group to a Monitor Link group, you need to delete the existing uplink interface of the
Monitor Link group. The Smart Link group and common interfaces are incompatible when serving as the
uplink interface for a Monitor Link group.
----End
Context
Do as follows on SwitchA and SwitchB.
Procedure
Step 1 Run:
system-view
Step 2 Run:
monitor-link group group-id
Step 3 Run:
timer recover-time recover-time
By default, the revertive switching of a Monitor Link group is enabled and the interval of
revertive switching is 3 seconds.
----End
Procedure
Step 1 Run the display monitor-link group { all | group-id } command to check information about a
Monitor Link group.
----End
Example
Run the display monitor-link group { all | group-id } [ | count ] [ | { begin | include |
exclude } regular-expression ], and you can view basic information about the interfaces in the
Monitor Link group, including the role and status of the interfaces and the time when the
interfaces become Up or Down for the last time.
<Quidway> display monitor-link group 1
Monitor Link group 1 information :
Recover-timer is 5 sec.
Member Role State Last-up-time Last-down-time
GigabitEthernet0/0/1 UpLk UP 0000/00/00 00:00:00 UTC+00:00 0000/00/00
00:00:00 UTC+00:00
GigabitEthernet0/0/2 DwLk[1] DOWN 0000/00/00 00:00:00 UTC+00:00 0000/00/00
00:00:00 UTC+00:00
Context
NOTE
Debugging affects the performance of the system. So, after debugging, run the undo debugging all
command to disable it immediately.
Procedure
l Run the debugging smart-link { all | error | event | fsm-machine } [ group group-id ] to
enable debugging of the Smart Link.
l Run the debugging smart-link flush { all | receive | send } command to enable debugging
of Flush packets.
----End
MAN
SwitchB
SwitchC
GE0/0/1 GE0/0/1
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure the Smart Link group on SwitchA and add the uplink interfaces to the Smart
Link group.
2. Enable revertive switching on SwitchA.
3. Enable SwitchA to send Flush packets.
4. Enable SwitchB and SwitchC to receive Flush packets.
5. Enable the Smart Link group on SwitchA.
Data Preparation
To complete the configuration, you need the following data:
l Smart Link group ID
l Number of the uplink interface of SwitchA
l Control VLAN ID and password contained in Flush packets
Procedure
Step 1 On SwitchA, configure the control VLAN and add interfaces to the control VLAN.
<SwitchA> system-view
[SwitchA] vlan batch 10
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 10
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 10
[SwitchA-GigabitEthernet0/0/2] quit
The configurations of SwitchB and SwitchC are similar to the configuration of SwitchA, and
are not mentioned here.
Step 2 Add the STP-disabled uplink interface to the Smart Link group and specify it as the master or
slave interface.
# Configure SwitchA.
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GGigabitEthernet0/0/1] stp disable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] stp disable
[SwitchA-GigabitEthernet0/0/2] quit
[SwitchA] smart-link group 1
[SwitchA-smlk-group1] port gigabitethernet 0/0/1 master
[SwitchA-smlk-group1] port gigabitethernet 0/0/2 slave
# Configure SwitchC.
[SwitchC] interface gigabitethernet 0/0/1
[SwitchC-GigabitEthernet0/0/1] smart-link flush receive control-vlan 10 password
simple 123
[SwitchC-GigabitEthernet0/0/1] quit
# Run the shutdown command to shut down GigabitEthernet 0/0/1, and you can find that
GigabitEthernet 0/0/1 is in Inactive state and GigabitEthernet 0/0/2 is in Active state.
[SwitchA-GigabitEthernet0/0/1] undo shutdown
[SwitchA-GigabitEthernet0/0/1]display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
There is no Load-Balance
There is no protected-vlan reference-instance
DeviceID: 0025-9e80-2494 Control-vlan ID:
10
Member Role State Flush Count Last-Flush-Time
----------------------------------------------------------------------
# Run the undo shutdown command to shut down GigabitEthernet 0/0/1, and you can find that
GigabitEthernet 0/0/1 is in Active state and GigabitEthernet 0/0/2 is in Inactive state.
SwitchA-GigabitEthernet0/0/1] undo shutdown
[SwitchAGigabitEthernet0/0/1] display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
There is no Load-Balance
There is no protected-vlan reference-instance
DeviceID: 0025-9e80-2494 Control-vlan ID:
10
Member Role State Flush Count Last-Flush-Time
----------------------------------------------------------------------
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 10
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 10
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 10
stp disable
#
smart-link group 1
restore enable
smart-link enable
port GigabitEthernet0/0/1 master
port GigabitEthernet0/0/2 slave
timer wtr 30
flush send control-vlan 10 password simple 123
#
return
Figure 2-5 Networking diagram for configuring load balancing between active and standby links
of a Smart Link group
MAN
SwitchB
SwitchC
GE0/0/1 GE0/0/1
VLAN
100 500
Configuration Roadmap
The configuration roadmap is as follows:
1. On SwitchA, configure Smart Link multi-instance and add the uplink interfaces to the Smart
Link group.
2. Configure load balancing on SwitchA.
3. Enable revertive switching on SwitchA.
4. Enable SwitchA to send Flush packets.
5. Enable SwitchB and SwitchC to receive Flush packets.
6. Enable Smart Link on SwitchA.
Data Preparation
To complete the configuration, you need the following data:
l IDs of instances and IDs of the VLANs bound to the instances on SwitchA
l ID of a Smart Link group
l Numbers of the uplink interfaces on SwitchA
l Control VLAN ID and password contained in Flush packets
Procedure
Step 1 On SwitchA, configure the control VLAN and add the uplink interfaces to the control VLAN.
<SwitchA> system-view
[SwitchA] vlan batch 10 100 500
The configurations of SwitchB and SwitchC are similar to the configuration of SwitchA, and
are not mentioned here.
Step 3 Add the uplink interfaces to the Smart Link group and specify the master and slave interfaces.
Ensure that STP is disabled on the uplink interfaces.
# Configure SwitchA.
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] stp disable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] stp disable
[SwitchA-GigabitEthernet0/0/2] quit
[SwitchA] smart-link group 1
[SwitchA-smlk-group1] port gigabitethernet 0/0/1 master
[SwitchA-smlk-group1] port gigabitethernet 0/0/2 slave
Step 5 Enable the revertive switching and set the wait-to-restore (WTR) time.
# Configure SwitchA.
[SwitchA-smlk-group1] restore enable
[SwitchA-smlk-group1] timer wtr 30
# Configure SwitchA.
[SwitchA-smlk-group1] flush send control-vlan 10 password simple 123
# Configure SwitchB.
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] smart-link flush receive control-vlan 10 password
simple 123
[SwitchB-GigabitEthernet0/0/1] quit
# Configure SwitchC.
[SwitchC] interface gigabitethernet 0/0/1
[SwitchC-GigabitEthernet0/0/1] smart-link flush receive control-vlan 10 password
simple 123
[SwitchC-GigabitEthernet0/0/1] quit
# Run the display smart-link group command to view information about the Smart Link group
on SwitchA. If the following information is displayed, it indicates that the configuration is
successful.
# Run the shutdown command to shut down GigabitEthernet0/0/1, and you can find that
GigabitEthernet0/0/1 is in Inactive state and GigabitEthernet0/0/2 is in Active state.
[SwitchA-GigabitEthernet0/0/1] undo shutdown
[SwitchA-GigabitEthernet0/0/1] display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
Load-Balance Instance: 10
There is no protected-vlan reference-instance
DeviceID: 0025-9e80-2494 Control-vlan ID:
10
Member Role State Flush Count Last-Flush-Time
----------------------------------------------------------------------
# Run the undo shutdown command to enable GE 1/0/1 and wait for 30 seconds. Then you can
find that GigabitEthernet0/0/1 is in Active state and GigabitEthernet0/0/2 is in Inactive state.
[SwitchA-GigabitEthernet0/0/1] undo shutdown
[SwitchA-GigabitEthernet0/0/1] display smart-link group 1
Smart Link group 1 information :
Smart Link group was enabled
Load-Balance Instance: 10
There is no protected-vlan reference-instance
DeviceID: 0025-9e80-2494 Control-vlan ID:
10
Member Role State Flush Count Last-Flush-Time
----------------------------------------------------------------------
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 10 100 500
#
stp region-configuration
instance 10 vlan 10 100 500
active region-configuration
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 10 100 500
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 10 100 500
stp disable
#
smart-link group 1
load-balance instance 10 slave
restore enable
smart-link enable
port GigabitEthernet0/0/1 master
port GigabitEthernet0/0/2 slave
timer wtr 30
flush send control-vlan 10 password simple 123
#
return
Networking Requirements
As shown in Figure 2-6, Switch C on the MAN is connected to user networks. It accesses the
backbone network through uplink devices Switch A and Switch B in dual-homed mode.
Switch A and Switch C are connected to uplink devices in dual-homed mode. One out of each
link pair needs to be blocked to prevent loops. When the active link fails, the data flows can be
rapidly switched to the standby link to ensure normal services.
IP/MPLS
core
network
SwitchC
Active link
User1 User2 Inactive link
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure Smart Link groups on Switch A and Switch C, and add uplink interfaces to the
groups.
2. Configure Monitor Link groups on Switch Switch A and Switch B.
3. Enable Switch A and Switch C to send Flush packets.
4. Enable Switch A and Switch C to receive Flush packets.
Data Preparation
To complete the configuration, you need the following data:
l Numbers of interfaces on Switch A, Switch B, and Switch C
l IDs of the Smart Link groups
l Control VLAN ID and password contained in Flush packets
l IDs of the Monitor Link groups and the numbers of the downlinks
Procedure
Step 1 Configure the same control VLAN on Switch A, Switch B, and Switch C. Add the interfaces of
the Smart Link group or Monitor Link group to this VLAN.
The configuration procedures are not mentioned here. For details, see "VLAN Configuration"
in the Quidway S5300 Series Ethernet Switches Configuration Guide - Ethernet.
Step 2 Create Smart Link groups and enable the functions of the groups.
# Configure Switch A.
<SwitchA> system-view
[SwitchA] smart-link group 1
[SwitchA-smlk-group1] quit
# Configure Switch C.
<SwitchC> system-view
[SwitchC] smart-link group 2
[SwitchC-smlk-group2] quit
Step 3 Add interfaces to Smart Link groups and specify the master and slave interfaces of each Smart
Link group
# Configure Switch A.
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] stp disable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] stp disable
[SwitchA-GigabitEthernet0/0/2] quit
[SwitchA]smart-link group 1
[SwitchA-smlk-group1] port gigabitethernet 0/0/1 master
[SwitchA-smlk-group1] port gigabitethernet 0/0/2 slave
# Configure Switch C.
[SwitchC] interface gigabitethernet 0/0/1
[SwitchC-GigabitEthernet0/0/1] stp disable
[SwitchC-GigabitEthernet0/0/1] quit
[SwitchC] interface gigabitethernet 0/0/2
[SwitchC-GigabitEthernet0/0/2] stp disable
[SwitchC-GigabitEthernet0/0/2] quit
[SwitchC] smart-link group 2
[SwitchC-smlk-group2] port gigabitethernet 0/0/1 master
[SwitchC-smlk-group2] port gigabitethernet 0/0/2 slave
Step 4 Enable revertive switching and set the interval of revertive switching.
# Configure Switch A.
[SwitchA-smlk-group1] restore enable
[SwitchA-smlk-group1] timer wtr 30
# Configure Switch C.
[SwitchC-smlk-group2] restore enable
[SwitchC-smlk-group2] timer wtr 30
# Configure Switch B.
<SwitchB> system-view
[SwitchB] interface gigabitethernet 0/0/3
[SwitchB-GigabitEthernet0/0/3] smart-link flush receive control-vlan 10 password
simple 123
# Configure Switch C.
[SwitchC-smlk-group2] flush send control-vlan 10 password simple 123
Step 7 Create Monitor Link groups and add the uplink and downlink interfaces to the Monitor Link
groups.
# Configure Switch A.
[SwitchA] monitor-link group 1
[SwitchA-mtlk-group1] smart-link group 1 uplink
[SwitchA-mtlk-group1] port gigabitethernet 0/0/3 downlink 1
# Configure Switch B.
[SwitchB] monitor-link group 2
[SwitchB-mtlk-group2] port gigabitethernet 0/0/1 uplink
[SwitchB-mtlk-group2] port gigabitethernet 0/0/3 downlink 1
Step 8 Set the revertive switching interval of the Monitor Link groups.
# Configure Switch A.
[SwitchA-mtlk-group1] timer recover-time 10
# Configure Switch B.
[SwitchB-mtlk-group2] timer recover-time 10
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 10
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 10
stp disable
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 10
smart-link flush receive control-vlan 10 password simple 123
#
smart-link group 1
smart-link enable
port GigabitEthernet0/0/1 master
port GigabitEthernet0/0/2 slave
timer wtr 30
restore enable
flush send control-vlan 10 password simple 123
#
monitor-link group 1
smart-link group 1 uplink
port GigabitEthernet0/0/3 downlink 1
timer recover-time 10
#
return
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 10
smart-link flush receive control-vlan 10 password simple 123
#
monitor-link group 2
port GigabitEthernet0/0/1 uplink
port GigabitEthernet0/0/3 downlink 1
timer recover-time 10
#
return
3 RRPP Configuration
This chapter describes the basic knowledge, methods, and examples for configuring the Rapid
Ring Protection Protocol (RRPP).
RRPP Domain
Master SwitchB
Node Edge Transit
SwitchD Node Transit Node
RRPP Sub-Ring 1
SwitchA
RRPP Major-Ring
SwitchE
l RRPP domain
An RRPP domain consists of a group of interconnected switches with the same domain ID
and control VLAN ID. An RRPP domain consists of the elements such as the RRPP major
ring and subring, control VLAN, master node, transit node, and primary port and secondary
port.
An RRPP domain is identified by its ID, which is an integer.
l RRPP ring
Physically, an RRPP ring corresponds to an Ethernet ring. An RRPP ring is a part of its
RRPP domain. An RRPP domain consists of one RRPP ring or multiple crossed RRPP
rings.
l RRPP major ring and subring
If an RRPP domain consists of multiple crossed RRPP rings, you can configure one ring
as the major ring and other rings as subrings by setting their levels.
An RRPP domain has only one major ring.
Protocol packets of subrings are transmitted in the major ring as data packets, and protocol
packets of the major ring are transmitted only in the major ring.
l Control VLAN
A VLAN that transmits RRPP protocol packets in an RRPP domain is called a control
VLAN. A control VLAN can contain only RRPP ports.
An RRPP domain is configured with two control VLANs: the primary control VLAN and
the sub control VLAN. You need to specify only the primary control VLAN. The VLAN
whose ID is one more than the ID of the primary control VLAN becomes the sub control
VLAN.
Different from a control VLAN, a data VLAN is used to transmit data packets. The data
VLAN can contain both the RRPP ports and non-RRPP ports.
l Master node
On an Ethernet ring, each switch is called a node. Each RRPP ring must have only one
master node.
l Transit node
On an RRPP ring, all nodes except the master node are transit nodes.
A transit node monitors the status of its directly connected RRPP links. When the link status
changes, the transit node informs the master node. The master node then determines the
policy for reacting to the change of the link status.
l Edge transit node
Edge transit node is a role of a switch on a subring. On the major ring, the switch functions
as a transit node or the master node. A switch can be configured as the master node on the
major ring and the edge transit node simultaneously.
The two edge transit nodes on two crossed rings are of the same level.
l Primary interface and secondary interface
On the master node and transit nodes, you can configure one of the two interfaces connected
to the Ethernet ring as the primary interface and the other as the secondary interface.
RRPP Multi-Instance
l Multi-instance
In the RRPP networking, one RRPP ring contains only one master node. When the master
node is in Complete state, the blocked secondary interface rejects all the data packets. In
this manner, all the data packets are transmitted through the same path on the RRPP ring.
The link of the secondary interface on the master node is idle, which wastes bandwidth.
The RRPP multi-instance feature is implemented based on domains. In the RRPP domain,
all the interfaces, nodes, and topologies conform to the RRPP principle. In the RRPP multi-
instance networking, multiple domains can be configured on an RRPP ring.
Each domain contains one or more instances, and each instance represents a VLAN range.
The VLANs in a domain are protected VLANs in the RRPP domain. A protected VLAN
can be a data VLAN, the control VLAN on the major ring, or the control VLAN on a subring
in the RRPP domain.
In the RRPP multi-instance networking, a ring can contain multiple master nodes. Load
balancing and link backup can be implemented based on the blocking state of the secondary
interface on the master node.
As shown in Figure 3-2, Switch A, Switch B, Switch C, Switch D, and Switch E form a
ring with multiple instances. Two domains are configured on the ring. Switch C is the
master node in domain 2 and Switch D is the master node in domain 1. The primary and
secondary interfaces on each master node are marked in Figure 3-2.
Domain 1 is configured with instance 1, which represents VLANs 100 to 200. When Switch
D is in Complete state, its secondary interface is blocked. Therefore, packets of VLANs
100 to 200 are transmitted though the path Switch A -> Switch C -> Switch E.
Domain 2 is configured with Instance 2, which represents VLANs 201 to 400. When Switch
C is in Complete state, its secondary interface is blocked. Therefore, packets of VLANs
201 to 400 are transmitted though the path Switch B -> Switch D -> Switch E.
Instance1:
VLAN 100-200
SwitchE
Backbone
network
Instance2:
VLAN 201-400
SwitchB P
S(Block) Master 1
SwitchD
Block
P Primary port
S Secondary port
l Ring group
A ring group is configured for the subrings in the networking of crossed rings with multiple
RRPP instances.
In the networking of crossed rings with multiple RRPP instances, if multiple subrings exist,
the following may occur:
Multiple subrings share the same edge node and the same assistant edge node. In addition,
the edge node and assistant edge node are located on the same major ring. That is, the Edge-
Hello packets of the edge node are transmitted to the assistant edge node along the same
path.
SwitchE
Master
SwitchA SwitchC
Master SwitchB
SwitchF
domain 1
domain 2
To reduce the number of Edge-Hello packets sent and received on a switch and improve
the system performance, you can add the subrings with the same edge node and same
assistant edge node to a ring group. Then configure a member subring to add Edge-Hello
packets to check the channel of protocol packets on the major ring.
There are four subrings in Figure 3-3, namely, ring 2 in domain 1, ring 3 in domain 1, ring
2 in domain 2, and ring 3 in domain 2. The subrings have the same major ring; therefore,
they can be added to a ring group. After the subrings are added to a ring group, only one
subring sends Edge-Hello packets, thus reducing the number of Edge-Hello packets.
l Link-Up-Delay timer
To avoid flapping on the ring caused by frequent changes of transmission paths, you can
set a Link-Up-Delay timer on the master node.
If master node receives its own Hello packet before the Failed timer expires, it transits to
the Complete state after a certain delay. This reduces link flapping on the ring.
The master node processes the Hello packets received from the secondary interface only
after the Link-Up-Delay timer expires.
Applicable Environment
RRPP is used for the networking of a single ring or multiple crossed rings. When configuring
RRPP, you need to configure roles for all nodes on the RRPP ring.
NOTE
Pre-configuration Tasks
Before configuring RRPP functions, complete the following tasks:
Data Preparation
To configure RRPP functions, you need the following data.
No. Data
4 Values of the Hello timer and Fail timer in the RRPP domain
Context
Do as follows on the S5300 that you want to add to an RRPP domain with multiple instances.
Procedure
Step 1 Run:
system-view
Step 2 Run:
stp region-configuration
The default algorithm is used to determine the mapping between instances and VLANs.
The vlan-mapping modulo command is used to map a VLAN to the instance with the ID being
(VLAN ID - 1)%modulo + 1. Assume that modulo is set to 16. The S5300 maps VLAN 1 to
instance 1, VLAN 2 to instance 2, VLAN 16 to instance 16, VLAN 17 to instance 1, and so
forth.
The control VLANs of the major ring and the subrings must be contained in the VLAN list.
A domain supports up to 49 instances, among which instance 0 is the default instance and does
not need to be created.
Step 4 Run:
active region-configuration
----End
Context
Do as follows on the S5300 on which interfaces need to be added to the RRPP ring.
Procedure
Step 1 Run:
system-view
IDs of the data VLANs whose packets are allowed to pass through the RRPP interface are
specified.
After you specify the control VLAN by running the control-vlan command in the RRPP domain
view and run the ring node-mode command, all the interfaces on the RRPP ring allow packets
of this VLAN to pass through. Therefore, you need only to specify the data VLANs in this step.
Step 5 Run:
stp disable
----End
Context
Do as follows on all S5300s in the RRPP domain.
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on all S5300s in the RRPP domain.
Procedure
Step 1 Run:
system-view
When configure the list of protected VLANs, pay attention to the following points:
l Protected VLANs must be configured before you configure an RRPP ring.
l You can delete or change existing protected VLANs before configuring an RRPP ring. The protected
VLANs cannot be changed after the RRPP ring is configured.
l In the same physical topology, the control VLAN of a domain cannot be configured as a protected
VLAN of another domain.
l The control VLAN must be included in the protected VLANs; otherwise, the RRPP ring cannot be
configured.
l The control VLAN can be mapped to other instances before the RRPP ring is created. After the RRPP
ring is created, the mapping cannot be changed unless you delete the RRPP domain.
l When the mapping between an instance and VLANs changes, the protected VLANs of the RRPP
domain also change.
l All the VLANs allowed by an RRPP interface should be configured as protected VLANs.
----End
Context
Do as follows on all S5300s in the RRPP domain.
Procedure
Step 1 Run:
system-view
NOTE
The control VLAN specified by vlan-id and the sub-control VLAN specified by vlan-id+1 must be new
VLANs that have not been created before and are not used in port trunking, VLAN mapping, or VLAN
stacking.
After configuring a control VLAN, you cannot directly modify its configuration. To modify the
configuration of the control VLAN, you need to delete the domain, and then configure a new control VLAN.
The sub control VLAN is also deleted when you delete the domain.
----End
Context
NOTE
By default, STP is enabled on all interfaces of the S5300. RRPP and STP cannot be enabled on the same
interface. Therefore, before creating an RRPP ring, you need to use the stp disable command to disable
STP on the interfaces to be added to the RRPP ring.
Procedure
Step 1 Run:
system-view
NOTE
When the major ring intersects with the subring, broadcast storms may be caused by RRPP packets on the
subring if you configure the subring before configuring the major ring. In this case, RRPP packets on the
major ring are discarded on transit nodes. As a result, the primary and secondary interfaces cannot receive
RRPP packets and thus cannot block related interfaces, causing incorrect RRPP status on the interfaces.
To prevent this problem, configure the major ring and then the subring.
Step 4 Run:
ring ring-id node-mode { edge | assistant-edge } common-port interface-type
interface-number edge-port interface-type interface-number
The edge node and assistant edge node of a subring are configured.
The common port of the edge node and assistant edge node must be on the major ring.
The system automatically sets the level of the ring where the edge node and assistant edge node
reside to 1.
----End
Context
NOTE
The RRPP ring can be activated only when both the RRPP ring and the RRPP protocol are enabled.
Procedure
Step 1 Run:
system-view
----End
Context
NOTE
The RRPP ring can be activated only when both the RRPP ring and the RRPP protocol are enabled.
Procedure
Step 1 Run:
system-view
----End
3.3.10 (Optional) Setting the Hello Timer and Fail Timer of an RRPP
Domain
Context
Do as follows on the master node in the RRPP domain.
Procedure
Step 1 Run:
system-view
The Hello timer and Fail timer of the RRPP domain are set.
The value of the Fail timer must be three times the value of the Hello timer or greater.
----End
Procedure
l Run the display stp region-configuration command to check the mapping between MSTIs
and VLANs.
l Run the display rrpp brief [ domain domain-id ] command to check brief information
about an RRPP domain.
l Run the display rrpp verbose domain domain-id [ ring ring-id ] command to check
detailed information about an RRPP domain.
l Run the display rrpp statistics domain domain-id [ ring ring-id ] command to check the
statistics of packets in an RRPP domain.
----End
Example
Run the display stp region-configurationcommand, and you can view the mapping between
MSTIs and VLANs. The following is an example:
<Quidway> display stp region-configuration
Oper configuration
Format selector :0
Region name :00e0cd568d00
Revision level :0
Run the display rrpp brief command, and you can view information such as the node mode,
RRPP status, control VLAN, protected VLAN, and values of timers. The following is an
example:
<Quidway> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 30 sub 31
Protected VLAN : Reference Instance 10
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
Run the display rrpp verbose command, and you can view detailed information such as the
control VLAN, protected VLAN, timers, node mode, and port status. The following is an
example:
<Quidway> display rrpp verbose domain 1 ring 1
Domain Index : 1
Control VLAN : major 400 sub 401
Protected VLAN : Reference Instance 30
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port : GigabitEthernet0/0/2 Port status: BLOCKED
Run the display rrpp statistics command, and you can view the statistics of sent and received
packets. The following is an example:
<Quidway> display rrpp statistics domain 1 ring 1
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Is Active : Yes
Primary port : GigabitEthernet0/0/1
Packet LINK COMMON COMPLETE EDGE MAJOR Packet
-------------------------------------------------------------------------------
Send 2934 0 1 1 0 0 2936
Rcv 0 1 0 0 0 0 1
Secondary port: GigabitEthernet0/0/2
Packet LINK COMMON COMPLETE EDGE MAJOR Packet
-------------------------------------------------------------------------------
Send 0 0 1 0 0 0 1
Rcv 2928 1 0 0 0 0 2929
Applicable Environment
RRPP multi-instance meets the requirements of a complicated network, as shown in Figure
3-4. The CE and UPE devices form two RRPP subrings. Each CE device is connected to two
UPE devices. The four UPE devices and a PE device form an RRPP ring. The PE device transmits
user data to the backbone network.
Backbone
network
PE-AGG
UPEC
UPED
domain 1 ring 1
IPTV VLAN101-200
domain 2 ring 1
HSI VLAN601-800 UPEB
UPEA
domain 1 ring2: domain 1 ring 3:
IPTV VLAN101-200 IPTV VLAN101-200
CEA
CEC
IPTV HSI
IPTV HSI
VLAN101-200 VLAN600-800 VLAN101-200 VLAN600-800
domain 1
domain 2
The IPTV and HSI services are deployed in two domains and they share the same RRPP ring.
By configuring multiple instances on the RRPP ring, you can implement load balancing for the
IPTV and HSI services. Traffic of IPTV services is transmitted through domain 1, and traffic of
HSI services is transmitted through Domain 2.
Pre-configuration Tasks
Before configuring RRPP multi-instance, complete the following tasks:
Data Preparation
To configure RRPP multi-instance, you need the following data.
No. Data
7 (Optional) Values of the Hello timer and Fail timer in the RRPP domains
Context
Do as follows on the S5300 that you want to add to an RRPP domain with multiple instances.
Procedure
Step 1 Run:
system-view
Step 2 Run:
stp region-configuration
The default algorithm is used to determine the mapping between instances and VLANs.
The vlan-mapping modulo command is used to map a VLAN to the instance with the ID being
(VLAN ID - 1)%modulo + 1. Assume that modulo is set to 16. The S5300 maps VLAN 1 to
The control VLANs of the major ring and the subrings must be contained in the VLAN list.
A domain supports up to 49 instances, among which instance 0 is the default instance and does
not need to be created.
Step 4 Run:
active region-configuration
----End
Context
Do as follows on the S5300 on which interfaces need to be added to the RRPP ring.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
An interface cannot be configured as an RRPP interface if the Smart Link, LDT, MUX VLAN
or MSTP is configured on the interface.
An RRPP interface needs to allow packets of control VLANs and data VLANs to pass through;
therefore, the RRPP interface must be configured as a trunk interface or hybrid interface.
Step 4 Run:
port trunk allow-pass vlan { { vlan-id1 [ to vlan-id2 ] } &<1-10> | all }
IDs of the data VLANs whose packets are allowed to pass through the RRPP interface are
specified.
After you specify the control VLAN by running the control-vlan command in the RRPP domain
view and run the ring node-mode command, all the interfaces on the RRPP ring allow packets
of this VLAN to pass through. Therefore, you need only to specify the data VLANs in this step.
Step 5 Run:
stp disable
By default, STP is enabled on all interfaces of the S5300. Before creating an RRPP ring, disable
STP on the interfaces that need to be added to the RRPP ring.
----End
Context
Do as follows on all S5300s in the RRPP domain.
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
When creating an RRPP domain, you need to specify the domain ID. If the domain exists, the
domain view is displayed.
----End
Context
Do as follows on all S5300s in the RRPP domain.
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
Step 3 Run:
protected-vlan reference-instance { { instance-id1 [ to instance-id2 ] } &<1-10> |
all }
All the VLANs whose packets need to pass through an RRPP interface, including the control
VLANs and data VLANs, must be configured as protected VLANs.
NOTE
When configure the list of protected VLANs, pay attention to the following points:
l Protected VLANs must be configured before you configure an RRPP ring.
l You can delete or change existing protected VLANs before configuring an RRPP ring. The protected
VLANs cannot be changed after the RRPP ring is configured.
l In the same physical topology, the control VLAN of a domain cannot be configured as a protected
VLAN of another domain.
l The control VLAN must be included in the protected VLANs; otherwise, the RRPP ring cannot be
configured.
l The control VLAN can be mapped to other instances before the RRPP ring is created. After the RRPP
ring is created, the mapping cannot be changed unless you delete the RRPP domain.
l When the mapping between an instance and VLANs changes, the protected VLANs of the RRPP
domain also change.
l All the VLANs allowed by an RRPP interface should be configured as protected VLANs.
----End
Context
Do as follows on all S5300s in the RRPP domain.
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
Step 3 Run:
control-vlan vlan-id
A VLAN that transmits RRPP protocol packets in an RRPP domain is called a control VLAN.
A control VLAN can contain only RRPP ports.
An RRPP domain is configured with two control VLANs: the primary control VLAN and the
sub control VLAN. You need to specify only the primary control VLAN. The VLAN whose ID
is one more than the ID of the primary control VLAN becomes the sub control VLAN.
NOTE
The control VLAN specified by vlan-id and the sub-control VLAN specified by vlan-id+1 must be new
VLANs that have not been created before and are not used in port trunking, VLAN mapping, or VLAN
stacking.
After configuring a control VLAN, you cannot directly modify its configuration. To modify the
configuration of the control VLAN, you need to delete the domain, and then configure a new control VLAN.
The sub control VLAN is also deleted when you delete the domain.
----End
Context
NOTE
By default, STP is enabled on all interfaces of the S5300. RRPP and STP cannot be enabled on the same
interface. Therefore, before creating an RRPP ring, you need to use the stp disable command to disable
STP on the interfaces to be added to the RRPP ring.
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
Step 3 Run:
ring ring-id node-mode { master | transit } primary-port interface-type interface-
number secondary-port interface-type interface-number level level-value
The level 0 indicates the major ring, and the level 1 indicates the subring.
A domain can contain only one major ring. Before creating a subring, you must create the major
ring.
The master node on a subring cannot function as an edge node or an assistant edge node.
NOTE
When the major ring intersects with the subring, broadcast storms may be caused by RRPP packets on the
subring if you configure the subring before configuring the major ring. In this case, RRPP packets on the
major ring are discarded on transit nodes. As a result, the primary and secondary interfaces cannot receive
RRPP packets and thus cannot block related interfaces, causing incorrect RRPP status on the interfaces.
To prevent this problem, configure the major ring and then the subring.
Step 4 Run:
ring ring-id node-mode { edge | assistant-edge } common-port interface-type
interface-number edge-port interface-type interface-number
The edge node and assistant edge node of a subring are configured.
The common port of the edge node and assistant edge node must be on the major ring.
The system automatically sets the level of the ring where the edge node and assistant edge node
reside to 1.
----End
Context
NOTE
The RRPP ring can be activated only when both the RRPP ring and the RRPP protocol are enabled.
Procedure
Step 1 Run:
system-view
----End
Context
NOTE
The RRPP ring can be activated only when both the RRPP ring and the RRPP protocol are enabled.
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on an edge node or assistant edge node (supported by RRPP defined by Huawei)
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on the master node.
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp linkup-delay-timer linkup-delay-timer-value
The delay timer for the RRPP ring to transit from the Failed state to the Complete state is set.
The value of linkup-delay-timer-value must be smaller than or equal to the value of the Fail timer
minus 2 times HELLO timer in any domain.
----End
3.4.12 (Optional) Setting the Hello Timer and Fail Timer of an RRPP
Domain
Context
Do as follows on the master node in the RRPP domain.
Procedure
Step 1 Run:
system-view
Step 2 Run:
rrpp domain domain-id
Step 3 Run:
timer hello-timer hello-value fail-timer fail-value
The Hello timer and Fail timer of the RRPP domain are set.
The value of the Fail timer must be three times the value of the Hello timer or greater.
----End
Procedure
l Run the display stp region-configuration command to check the mapping between MSTIs
and VLANs.
l Run the display rrpp brief [ domain domain-id ] command to check brief information
about an RRPP domain.
l Run the display rrpp verbose domain domain-id [ ring ring-id ] command to check
detailed information about an RRPP domain.
l Run the display rrpp statistics domain domain-id [ ring ring-id ] command to check the
statistics of packets in an RRPP domain.
----End
Example
Run the display stp region-configurationcommand, and you can view the mapping between
MSTIs and VLANs. The following is an example:
<Quidway> display stp region-configuration
Oper configuration
Format selector :0
Region name :00e0cd568d00
Revision level :0
Run the display rrpp brief command, and you can view information such as the node mode,
RRPP status, control VLAN, protected VLAN, and values of timers. The following is an
example:
<Quidway> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 30 sub 31
Protected VLAN : Reference Instance 10
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
-------------------------------------------------------------------------------
1 0 M GigabitEthernet0/0/2 GigabitEthernet0/0/3 No
Run the display rrpp verbose command, and you can view detailed information such as the
control VLAN, protected VLAN, timers, node mode, and port status. The following is an
example:
<Quidway> display rrpp verbose domain 1 ring 1
Domain Index : 1
Control VLAN : major 400 sub 401
Protected VLAN : Reference Instance 30
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Run the display rrpp statistics command, and you can view the statistics of sent and received
packets. The following is an example:
<Quidway> display rrpp statistics domain 1 ring 1
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Is Active : Yes
Primary port : GigabitEthernet0/0/1
Packet LINK COMMON COMPLETE EDGE MAJOR Packet
-------------------------------------------------------------------------------
Send 2934 0 1 1 0 0 2936
Rcv 0 1 0 0 0 0 1
Secondary port: GigabitEthernet0/0/2
Packet LINK COMMON COMPLETE EDGE MAJOR Packet
-------------------------------------------------------------------------------
Send 0 0 1 0 0 0 1
Rcv 2928 1 0 0 0 0 2929
Context
CAUTION
RRPP statistics cannot be restored after you clear them. So, confirm the action before you use
the command.
Procedure
Step 1 Run the reset rrpp statistics domain domain-id [ ring ring-id ] command in the user view to
clear the RRPP statistics.
----End
Context
CAUTION
Debugging affects the performance of the system. So, after debugging, run the undo debugging
rrpp all command to disable it immediately.
When an RRPP fault occurs, run the following debugging command in the user view to locate
the fault.
Procedure
Step 1 Run the debugging rrpp [ domain domain-id [ ring ring-id ] ] { error | event | packet | all }
command to enable debugging of the RRPP protocol.
----End
GE0/0/2
GE0/0/1 GE0/0/1
Ring 1
GE0/0/2 GE0/0/2
SwitchC
GE0/0/1
SwitchA
Primary Port
Secondary port
Configuration Roadmap
The configuration roadmap is as follows:
1. Map instance 1 to VLANs 100 to 300.
2. Locate Switch A, Switch B, and Switch C on ring 1 of RRPP domain 1.
3. Configure Switch A as the master node on ring 1, and configure Switch B and Switch C as
transit nodes on ring 1.
Data Preparation
To complete the configuration, you need the following data.
l Numbers of the RRPP interfaces
l Control VLAN ID of ring 1
Procedure
Step 1 Map instance 1 to VLANs 100 to 200.
<Quidway> system-view
[Quidway] sysname Switch A
[SwitchA] stp region-configuration
[SwitchA-mst-region] instance 1 vlan 20 21 100 to 300
[SwitchA-mst-region] active region-configuration
[SwitchA-mst-region] quit
The configurations of Switch B and Switch C are similar to the configuration of Switch A. The
detailed configurations are omitted here.
Step 2 Create an RRPP domain and the control VLAN.
# On the master node of ring 1, namely Switch A, create RRPP domain 1 and configure VLAN
20 as the main control VLAN.
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] control-vlan 20
[SwitchA-rrpp-domain-region1] quit
# On the transit node of ring 1, namely Switch B, create RRPP domain 1 and configure VLAN
20 as the main control VLAN.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] rrpp domain 1
[SwitchB-rrpp-domain-region1] control-vlan 20
[SwitchB-rrpp-domain-region1] quit
# On the master node of ring 1, namely SwitchC, create RRPP domain 1 and configure VLAN
20 as the main control VLAN.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] control-vlan 20
[SwitchC-rrpp-domain-region1] quit
Step 3 Configure the interfaces to be added to the RRPP ring as trunk interfaces, allow VLANs 100 to
300 on the interfaces, and disable STP on the interfaces.
# Configure Switch A.
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[SwitchA-GigabitEthernet0/0/1] stp disable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[SwitchA-GigabitEthernet0/0/2] stp disable
[SwitchA-GigabitEthernet0/0/2] quit
# Configure Switch B.
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[SwitchB-GigabitEthernet0/0/1] stp disable
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[SwitchB-GigabitEthernet0/0/2] stp disable
[SwitchB-GigabitEthernet0/0/2] quit
# Configure Switch C.
[SwitchC] interface gigabitethernet 0/0/1
[SwitchC-GigabitEthernet0/0/1] port link-type trunk
[SwitchC-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[SwitchC-GigabitEthernet0/0/1] stp disable
[SwitchC-GigabitEthernet0/0/1] quit
[SwitchC] interface gigabitethernet 0/0/2
[SwitchC-GigabitEthernet0/0/2] port link-type trunk
[SwitchC-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[SwitchC-GigabitEthernet0/0/2] stp disable
[SwitchC-GigabitEthernet0/0/2] quit
# Configure the protection VLAN on Switch B and configure Switch B as the transit node of
RRPP ring 1 and specify the primary interface and secondary interface.
[SwitchB] rrpp domain 1
[SwitchB-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchB-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[SwitchB-rrpp-domain-region1] ring 1 enable
[SwitchB-rrpp-domain-region1] quit
# Configure the protection VLAN on Switch C and configure Switch C as the transit node of
RRPP ring 1 and specify the primary interface and secondary interface.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchC-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[SwitchC-rrpp-domain-region1] ring 1 enable
[SwitchC-rrpp-domain-region1] quit
Domain Index : 1
Control VLAN : major 20 sub 21
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
---------------------------------------------------------------------------
1 0 M GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
You can find that RRPP is enabled on SwitchA. The main control VLAN of domain 1 is
VLAN 20 and the sub control VLAN is VLAN 21. SwitchA is the master node of ring 1.
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: BLOCKED
----End
Configuration Files
l Configuration file of Switch A
sysname SwitchA
#
vlan batch 20 to 21 100 to 300
#
rrpp enable
#
stp region-
configuration
instance 1 vlan 20 to 21 100 to
300
active region-
configuration
#
rrpp domain 1
control-vlan 20
protected-vlan reference-instance 1
ring 1 node-mode master primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
active region-
configuration
#
rrpp domain 1
control-vlan 20
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
return
#
Networking Requirements
As shown in Figure 3-6, Switch A, Switch B, Switch C, and Switch D support the RRPP
function. Switch A, Switch B, and Switch D are on ring 1 of domain , which is the major ring.
Switch A, Switch C, and Switch D are on ring 2 of domain 1, which is the subring. Switch A is
the edge node on ring 2 of domain 1, and Switch D is the assistant edge node on ring 2 of domain
1.
The main control VLAN ID is 10. The RRPP rings transmit data of VLAN 2 to VLAN 9.
Figure 3-6 Networking diagram of crossed RRPP rings with a single instance (Huawei version)
SwitchC
GE0/0/2 GE0/0/3
sub- ring
GE0/0/1
SwitchA
GE0/0/1 GE0/0/2
GE0/0/2
GE0/0/3 SwitchD
GE0/0/2
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure ring 1 (major ring) of domain 1 on Switch A, Switch B, and Switch C. Configure
VLAN 10 as the main control VLAN. Add the interfaces on the major ring and subring to
VLAN 2 to VLAN 9 so that the interfaces allow service packets of these VLANs to pass
through.
2. Configure ring 2 (subring) of domain 1on Switch A, Switch B, and Switch D.
3. Configure Switch B as the master node of the major ring and configure Switch A and Switch
D as transit nodes of the major ring.
4. Configure Switch C as the master node of the subring; configure Switch A as the edge node
of the subring; configure Switch D as the assistant edge node of the subring.
Data Preparation
To complete the configuration, you need the following data.
l Numbers of the interfaces to be added to the RRPP rings
l Control VLAN IDs and data VLAN IDs
Procedure
Step 1 Configure Switch B as the master node of the major ring.
# Create data VLANs 2 to 9 on Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan batch 2 to 9
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
[SwitchB] stp region-configuration
[SwitchB-mst-region] instance 1 vlan 2 to 11
[SwitchB-mst-region] active region-configuration
[SwitchB-mst-region] quit
# On SwitchB, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchB] rrpp enable
[SwitchB] rrpp domain 1
[SwitchB-rrpp-domain-region1] control-vlan 10
[SwitchB-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchB-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 2 to 9
[SwitchB-GigabitEthernet0/0/1] stp disable
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] port link-type trunk
[SwitchB-GigabitEthernet0/0/2] port trunk allow-pass vlan 2 to 9
[SwitchB-GigabitEthernet0/0/2] stp disable
[SwitchB-GigabitEthernet0/0/2] quit
# Configure the primary interface and secondary interface of the master node on the RRPP major
ring.
[SwitchB] rrpp domain 1
[SwitchB-rrpp-domain-region1] ring 1 node-mode master primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[SwitchB-rrpp-domain-region1] ring 1 enable
[SwitchB-rrpp-domain-region1] quit
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
[SwitchC] stp region-configuration
[SwitchC-mst-region] instance 1 vlan 2 to 11
[SwitchC-mst-region] active region-configuration
[SwitchC-mst-region] quit
# On Switch C, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchC] rrpp enable
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] control-vlan 10
[SwitchC-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchC-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchC] interface gigabitethernet 0/0/1
[SwitchC-GigabitEthernet0/0/1] port link-type trunk
[SwitchC-GigabitEthernet0/0/1] port trunk allow-pass vlan 2 to 9
[SwitchC-GigabitEthernet0/0/1] stp disable
[SwitchC-GigabitEthernet0/0/1] quit
[SwitchC] interface gigabitethernet 0/0/2
[SwitchC-GigabitEthernet0/0/2] port link-type trunk
[SwitchC-GigabitEthernet0/0/2] port trunk allow-pass vlan 2 to 9
[SwitchC-GigabitEthernet0/0/2] stp disable
[SwitchC-GigabitEthernet0/0/2] quit
# Configure the primary interface and secondary interface of the master node on the RRPP
subring.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] ring 2 node-mode master primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 1
[SwitchC-rrpp-domain-region1] ring 2 enable
[SwitchC-rrpp-domain-region1] quit
Step 3 Configure Switch A as the transit node of the major ring and the edge transit node of the subring.
# Create data VLANs 2 to 9 on Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan batch 2 to 9
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
[SwitchA] stp region-configuration
[SwitchA-mst-region] instance 1 vlan 2 to 11
[SwitchA-mst-region] active region-configuration
[SwitchA-mst-region] quit
# On SwitchA, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchA] rrpp enable
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] control-vlan 10
[SwitchA-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchA-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 2 to 9
[SwitchA-GigabitEthernet0/0/1] stp disable
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 2 to 9
[SwitchA-GigabitEthernet0/0/2] stp disable
[SwitchA-GigabitEthernet0/0/2] quit
[SwitchA] interface gigabitethernet 0/0/3
[SwitchA-GigabitEthernet0/0/3] port link-type trunk
[SwitchA-GigabitEthernet0/0/3] port trunk allow-pass vlan 2 to 9
[SwitchA-GigabitEthernet0/0/3] stp disable
[SwitchA-GigabitEthernet0/0/3] quit
# Configure the primary interface and secondary interface of the transit node on the RRPP major
ring.
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 0/0/2 secondary-port gigabitethernet 0/0/1 level 0
[SwitchA-rrpp-domain-region1] ring 1 enable
[SwitchA-rrpp-domain-region1] quit
# Configure the common interface and edge interface of the edge transit node on the subring.
[SwitchA] rrpp domain 1
[SwitchA-rrpp-domain-region1] ring 2 node-mode edge common-port gigabitethernet
0/0/2 edge-port gigabitethernet 0/0/3
[SwitchA-rrpp-domain-region1] ring 2 enable
[SwitchA-rrpp-domain-region1] quit
Step 4 Configure Switch D as the transit node of the major ring and the assistant edge node of the
subring.
# Create data VLANs 2 to 9 on Switch D.
[SwitchD] vlan batch 2 to 9
Configure instance 1, and map it to the VLANs allowed by the RRPP interfaces and protected
VLANs.
<Quidway> system-view
[Quidway] sysname SwitchD
[SwitchD] stp region-configuration
[SwitchD-mst-region] instance 1 vlan 2 to 11
[SwitchD-mst-region] active region-configuration
[SwitchD-mst-region] quit
# On Switch D, configure domain 1. Then configure VLAN 10 as the main control VLAN and
instance 1 as the protected instance of domain 1.
[SwitchD] rrpp enable
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] control-vlan 10
[SwitchD-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchD-rrpp-domain-region1] quit
# Disable STP on the interfaces to be added to the RRPP rings, configure the interfaces as trunk
interfaces, and configure the interfaces to allow service packets of VLAN 2 to VLAN 9 to pass
through.
[SwitchD] interface gigabitethernet 0/0/1
[SwitchD-GigabitEthernet0/0/1] port link-type trunk
[SwitchD-GigabitEthernet0/0/1] port trunk allow-pass vlan 2 to 9
[SwitchD-GigabitEthernet0/0/1] stp disable
[SwitchD-GigabitEthernet0/0/1] quit
[SwitchD] interface gigabitethernet 0/0/2
[SwitchD-GigabitEthernet0/0/2] port link-type trunk
[SwitchD-GigabitEthernet0/0/2] port trunk allow-pass vlan 2 to 9
[SwitchD-GigabitEthernet0/0/2] stp disable
[SwitchD-GigabitEthernet0/0/2] quit
[SwitchD] interface gigabitethernet 0/0/3
[SwitchD-GigabitEthernet0/0/3] port link-type trunk
[SwitchD-GigabitEthernet0/0/3] port trunk allow-pass vlan 2 to 9
[SwitchD-GigabitEthernet0/0/3] stp disable
[SwitchD-GigabitEthernet0/0/3] quit
# Configure the primary interface and secondary interface of the transit node on the RRPP major
ring.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] ring 1 node-mode transit primary-port
# Configure the common interface and edge interface of the assistant edge node on the RRPP
subring.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] ring 2 node-mode assistant-edge common-port
gigabitethernet 0/0/2 edge-port gigabitethernet 0/0/3
[SwitchD-rrpp-domain-region1] ring 2 enable
[SwitchD-rrpp-domain-region1] quit
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
------------------------------------------------------------------------------
1 0 M GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
You can find that RRPP is enabled on Switch B. The main control VLAN is VLAN 10, and
the sub control VLAN is VLAN 11.Switch B is the master node of the major ring, with
GigabitEthernet0/0/1 as the primary interface and GigabitEthernet0/0/2 as the secondary
interface.
l Run the display rrpp verbose domain command on Switch B. The following information
is displayed:
<SwitchB> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Completed
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: BLOCKED
You can find that the ring is in Complete state, and the secondary interface of the master
node is blocked.
l Run the display rrpp brief command on SwitchC. The following information is displayed:
<SwitchC> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
The output information indicates that RRPP is enabled on SwitchC. The main control VLAN
is VLAN 10, and the sub control VLAN is VLAN 11. Switch C is the master node on the
subring, withGigabitEthernet0/0/1 as the primary interface and GigabitEthernet0/0/2 as the
secondary interface.
l Run the display rrpp verbose domain command on Switch C. The following information
is displayed:
<SwitchC> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 2
Ring Level : 1
Node Mode : Master
Ring State : Completed
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: BLOCKED
You can find that the subring is in Complete state, and the secondary interface of the master
node on the subring is blocked.
l Run the display rrpp brief command on Switch A. The following information is displayed:
<SwitchA> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
-------------------------------------------------------------------------
1 0 T GigabitEthernet0/0/2 GigabitEthernet0/0/1 Yes
2 1 E GigabitEthernet0/0/2 GigabitEthernet0/0/3 Yes
You can find that RRPP is enabled on Switch A. The main control VLAN is VLAN 10, and
the sub control VLAN is VLAN 11. Switch A is the transit node of the major ring, with
GigabitEthernet0/0/2 as the primary interface and GigabitEthernet0/0/1 as the secondary
interface.
Switch A is also an edge of of the subring, with GigabitEthernet0/0/2 as the common interface
and GigabitEthernet0/0/3 as the edge interface.
l Run the display rrpp verbose domain command on Switch A. The following information
is displayed:
<SwitchA> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/2 Port status: UP
Secondary port: GigabitEthernet0/0/1 Port status: UP
RRPP Ring : 2
Ring Level : 1
Node Mode : Edge
Ring State : Linkup
Is Enabled : Disable Is Active : No
Common port :GigabitEthernet0/0/2 Port status: UP
Edge port : GigabitEthernet0/0/3 Port status: UP
l Run the display rrpp brief command on Switch D. The following information is displayed:
<SwitchD> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
-------------------------------------------------------------------------
1 0 T GigabitEthernet0/0/2 GigabitEthernet0/0/1 Yes
2 1 A GigabitEthernet0/0/2 GigabitEthernet0/0/3 Yes
You can find that RRPP is enabled on Switch D. The main control VLAN is VLAN 10, and
the sub control VLAN is VLAN 11. Switch D is the transit node of the major ring, with
GGigabitEthernet0/0/2 as the primary interface and GigabitEthernet0/0/1 as the secondary
interface. Switch D is also the assistant edge node of the major ring, with
GigabitEthernet0/0/2 as the common interface and GigabitEthernet0/0/3 as the edge
interface.
l Run the display rrpp verbose domain command on Switch D. The following information
is displayed:
<SwitchD> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/2 Port status: UP
Secondary port: GigabitEthernet0/0/1 Port status: UP
RRPP Ring : 2
Ring Level : 1
Node Mode : Assistant-edge
Ring State : Linkup
Is Enabled : Disable Is Active : No
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 2 to 11
rrpp enable
#
stp region-
configuration
instance 1 vlan 2 to
11
active region-
configuration
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/2 secondary-port
GigabitEthernet 0/0/1 level 0
ring 1 enable
ring 2 node-mode edge common-port GigabitEthernet 0/0/2 edge-port
GigabitEthernet 0/0/3
ring 2 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
return
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
return
l Configuration file of the Switch C
#
sysname SwitchC
#
vlan batch 2 to 11
#
rrpp enable
#
stp region-
configuration
instance 1 vlan 2 to
11
active region-
configuration
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
ring 2 node-mode master primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 1
ring 2 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
return
l Configuration file of Switch D
#
sysname SwitchD
vlan batch 2 to 11
#
rrpp enable
#
stp region-
configuration
instance 1 vlan 2 to
11
active region-
configuration
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/2 secondary-port
GigabitEthernet 0/0/1 level 0
ring 1 enable
ring 2 node-mode assistant-edge common-port GigabitEthernet 0/0/2 edge-port
GigabitEthernet 0/0/3
ring 2 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 2 to 11
stp disable
#
return
Domain 2 Domain 1
Configuration Roadmap
The configuration roadmap is as follows:
1. Create an instance and add the control VLANs added to the list of protected VLANs.
2. Configure ring 2 of domain 2 on SwitchA, SwitchB, and SwitchC.
3. Configure ring 1 of domain 1 on SwitchC, SwitchD, and SwitchE.
4. Configure SwitchA as the master node on ring 2, and configure SwitchB and SwitchC as
transit nodes on ring 2.
5. Configure SwitchE as the master node on ring 1, and configure SwitchC and SwitchD as
transit nodes on ring 1.
Data Preparation
To complete the configuration, you need the following data.
l Numbers of the RRPP interfaces
l Control VLAN IDs of ring 1 and ring 2
Procedure
Step 1 Create an instance and add the control VLANs added to the list of protected VLANs.
# Configure SwitchA.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] stp region-configuration
[SwitchA-mst-region] instance 2 vlan 20 to 21
[SwitchA-mst-region] active region-configuration
[SwitchA-mst-region] quit
# Configure SwitchB.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] stp region-configuration
[SwitchB-mst-region] instance 2 vlan 20 to 21
[SwitchB-mst-region] active region-configuration
[SwitchB-mst-region] quit
# Configure SwitchC.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] stp region-configuration
[SwitchC-mst-region] instance 1 vlan 10 to 11
[SwitchC-mst-region] instance 2 vlan 20 to 21
[SwitchC-mst-region] active region-configuration
[SwitchC-mst-region] quit
# Configure SwitchD.
<Quidway> system-view
[Quidway] sysname SwitchD
[SwitchD] stp region-configuration
[SwitchD-mst-region] instance 1 vlan 10 to 11
[SwitchD-mst-region] active region-configuration
[SwitchD-mst-region] quit
# Configure SwitchE.
<Quidway> system-view
[Quidway] sysname SwitchE
[SwitchE] stp region-configuration
[SwitchE-mst-region] instance 1 vlan 10 to 11
[SwitchE-mst-region] active region-configuration
[SwitchE-mst-region] quit
Step 2 Create RRPP domains and configure the control VLANs and protected VLANs of the domains.
# Configure domain 1 on SwitchE, which is the master node of ring 1. Configure VLAN 10 as
the main control VLAN of domain 1, and configure the list of protected VLANs mapping
instance 1.
# Configure domain 1 on SwitchC, which is the transit node of ring 1. Configure VLAN 10 as
the main control VLAN of domain 1, and configure the list of protected VLANs mapping
instance 1.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] control-vlan 10
[SwitchC-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchC-rrpp-domain-region1] quit
# Configure domain 1 on SwitchD, which is the transit node of ring 1. Configure VLAN 10 as
the main control VLAN of domain 1, and configure the list of protected VLANs of instance 1.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] control-vlan 10
[SwitchD-rrpp-domain-region1] protected-vlan reference-instance 1
[SwitchD-rrpp-domain-region1] quit
# Configure domain 2 on SwitchE, which is the master node of ring 2. Configure VLAN 20 as
the main control VLAN of domain 2, and configure the list of protected VLANs mapping
instance 1.
[SwitchA] rrpp domain 2
[SwitchA-rrpp-domain-region2] control-vlan 20
[SwitchA-rrpp-domain-region1] protected-vlan reference-instance 2
[SwitchA-rrpp-domain-region2] quit
# Configure domain 2 on SwitchB, which is the transit node of ring 2. Configure VLAN 20 as
the main control VLAN of domain 2, and configure the list of protected VLANs of instance 2.
[SwitchB] rrpp domain 2
[SwitchB-rrpp-domain-region2] control-vlan 20
[SwitchB-rrpp-domain-region1] protected-vlan reference-instance 2
[SwitchB-rrpp-domain-region2] quit
# Configure domain 2 on SwitchC, which is the transit node of ring 2. Configure VLAN 20 as
the main control VLAN of domain 2, and configure the list of protected VLANs of instance 2.
[SwitchC] rrpp domain 2
[SwitchC-rrpp-domain-region2] control-vlan 20
[SwitchC-rrpp-domain-region1] protected-vlan reference-instance 2
[SwitchC-rrpp-domain-region2] quit
You can set two timers for the tangent point because the two tangent rings reside in different domains.
# Set the Hold timer and Fail timer for SwitchE, the master node on ring 1.
[SwitchE] rrpp domain 1
[SwitchE-rrpp-domain-region1] timer hello-timer 2 fail-timer 7
# Set the Hold timer and Fail timer for SwitchD, the transit node on ring 1 .
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] timer hello-timer 2 fail-timer 7
# Set the Hold timer and Fail timer for SwitchC, the transit node on ring 1.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] timer hello-timer 2 fail-timer 7
# Set the Hold timer and Fail timer for SwitchA, the master node on ring 2.
# Set the Hold timer and Fail timer for SwitchB, the transit node on ring 2.
[SwitchB] rrpp domain 2
[SwitchB-rrpp-domain-region2] timer hello-timer 3 fail-timer 10
# Set the Hold timer and Fail timer for SwitchC, the transit node on ring 2.
[SwitchC] rrpp domain 2
[SwitchC-rrpp-domain-region2] timer hello-timer 3 fail-timer 10
# Configure SwitchA as the master node of ring 2 and specify the primary and secondary
interfaces.
[SwitchA] rrpp domain 2
[SwitchA-rrpp-domain-region2] ring 2 node-mode master primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[SwitchA-rrpp-domain-region2] ring 2 enable
[SwitchA-rrpp-domain-region2] quit
# Configure SwitchB as a transit node of ring 2 (major ring) and specify the primary and
secondary interfaces.
[SwitchB] rrpp domain 2
[SwitchB-rrpp-domain-region2] ring 2 node-mode transit primary-port
gigabitethernet 0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[SwitchB-rrpp-domain-region2] ring 2 enable
[SwitchB-rrpp-domain-region2] quit
# Configure SwitchC as a transit node of RRPP ring 2 and specify the primary and secondary
interfaces.
[SwitchC] rrpp domain 2
[SwitchC-rrpp-domain-region2] ring 2 node-mode transit primary-port
gigabitethernet 0/0/3 secondary-port gigabitethernet 0/0/4 level 0
[SwitchC-rrpp-domain-region2] ring 2 enable
[SwitchC-rrpp-domain-region2] quit
# Configure SwitchC as a transit node of ring 1 and specify the primary and secondary interfaces.
[SwitchC] rrpp domain 1
[SwitchC-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[SwitchC-rrpp-domain-region1] ring 1 enable
[SwitchC-rrpp-domain-region1] quit
# Configure SwitchD as a transit node of ring 1 and specify the primary and secondary interfaces.
[SwitchD] rrpp domain 1
[SwitchD-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[SwitchD-rrpp-domain-region1] ring 1 enable
[SwitchD-rrpp-domain-region1] quit
After the configurations are complete and network become stable, run the following commands
to verify the configuration. Take the tangent point SwitchC for example.
l Run the display rrpp brief command on SwitchC. The following information is displayed:
[SwitchC] display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 2 sec(default is 1 sec) Fail Timer : 7 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
---------------------------------------------------------------------------
1 0 T GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
Domain Index : 2
Control VLAN : major 20 sub 21
Protected VLAN : Reference Instance 2
Hello Timer : 3 sec(default is 1 sec) Fail Timer : 10 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
---------------------------------------------------------------------------
2 0 T GigabitEthernet0/0/3 GigabitEthernet0/0/4 Yes
You can find that RRPP is enabled on SwitchC. The main control VLAN of domain 1 is
VLAN 10 and the sub control VLAN is VLAN 11. SwitchC is the master node of ring 1,
with GigabitEthernet0/0/1 as the primary interface and GigabitEthernet0/0/2 as the secondary
interface.
The main control VLAN of domain 2 is VLAN 20, and the sub control VLAN is VLAN 21.
SwitchC is a transit node on ring 2, with GigabitEthernet0/0/3 as the primary interface and
GigabitEthernet0/0/4 as the secondary interface.
l Run the display rrpp verbose domain command on SwitchC to view the domain
information.
# View detailed information about domain 1.
[SwitchC] display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 1
Hello Timer : 2 sec(default is 1 sec) Fail Timer : 7 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
RRPP Ring : 2
Ring Level : 0
Node Mode : Transit
Ring State : Linkup
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/3 Port status: UP
Secondary port: GigabitEthernet0/0/4 Port status: UP
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 20 to 21
#
rrpp enable
#
stp region-
configuration
instance 2 vlan 20 to
21
active region-configuration
#
rrpp domain 2
control-vlan 20
protected-vlan reference-instance 2
timer hello-timer 3 fail-timer 10
ring 2 node-mode master primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 2 enable
#
interface GigabitEthernet0/0/1
port hybrid tagged vlan 20 to 21
stp disable
#
interface GigabitEthernet0/0/2
port hybrid tagged vlan 20 to 21
stp disable
#
rrpp domain 2
control-vlan 20
protected-vlan reference-instance 2
timer hello-timer 3 fail-timer 10
ring 2 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 2 enable
#
interface GigabitEthernet0/0/1
port hybrid tagged vlan 20 to 21
stp disable
#
interface GigabitEthernet0/0/2
port hybrid tagged vlan 20 to 21
stp disable
#
return
#
l Configuration file of the SwitchC
#
sysname SwitchC
#
vlan batch 10 to 11 20 to 21
#
rrpp enable
#
stp region-
configuration
instance 1 vlan 10 to 11
instance 2 vlan 20 to
21
active region-configuration
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
timer hello-timer 2 fail-timer 7
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
rrpp domain 2
control-vlan 20
protected-vlan reference-instance 2
timer hello-timer 3 fail-timer 10
ring 2 node-mode transit primary-port GigabitEthernet 0/0/3 secondary-
portGigabitEthernet 0/0/4 level 0
ring 2 enable
#
interface GigabitEthernet 0/0/1
port hybrid tagged vlan 10 to 11
stp disable
#
interface GigabitEthernet 0/0/2
pport hybrid tagged vlan 10 to 11
stp disable
#
interface GigabitEthernet 0/0/1
port hybrid tagged vlan 20 to 21
stp disable
#
interface GigabitEthernet 0/0/2
port hybrid tagged vlan 20 to 21
stp disable
#
return
l Configuration file of SwitchD
#
sysname SwitchD
#
vlan batch 10 to 11
#
rrpp enable
#
stp region-
configuration
instance 1 vlan 10 to
11
active region-configuration
#
rrpp domain 1
control-vlan 10
protected-vlan reference-instance 1
timer hello-timer 2 fail-timer 7
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port hybrid tagged vlan 10 to 11
stp disable
#
interface GigabitEthernet0/0/2
port hybrid tagged vlan 10 to 11
stp disable
#
return
Networking Requirements
As shown in Figure 3-8, UPE A, UPE B, UPE C, and PE-AGG form a multi-instance RRPP
ring.
Two rings are involved in the networking, ring 1 in domain 1 and ring 1 in domain 2.
VLANs 100 to 300 are configured on CE. Domain 1 and domain 2 share the traffic of packets
from VLANs 100 to 300. Packets from VLANs 100 to 200 are transmitted through domain 1,
and packets from VLANs 201 to 300 are transmitted through domain 2.
Table 3-1 shows the mapping between protected VLANs and instances in domain 1 and domain
2.
Table 3-2 shows the master node of each ring, and the primary port and secondary port on the
master node.
Table 3-2 Master nodes, and primary and secondary ports on the master nodes
Ring ID Master Node Primary Port Secondary Port
Figure 3-8 Networking diagram of single RRPP ring with multiple instances
UPE B
GE0/0/1 GE0/0/2
CE 1
VLAN 100-300
PE-AGG
GE0/0/2 GE0/0/1
Ring 1 Master 1 Backbone
UPEA network
Master 2
GE0/0/1 GE0/0/2
CE 2
VLAN 100-300
Domain 1 ring 1
GE0/0/2 GE0/0/1
Domain 2 ring 1
UPEC
Configuration Roadmap
The configuration roadmap is as follows:
1. Map instance 1 to VLANs 100 to 200. Map instance 2 to VLANs 201 to 300.
2. Add UPE A, UPE B, UPE C, and PE-AGG to ring 1 in domain 1.
3. Add UPE A, UPE B, UPE C, and PE-AGG to ring 1 in domain 2.
4. Configure protected VLANs in domain 1 and domain 2.
5. Configure control VLANs in domain 1 and domain 2.
6. Configure PE-AGG as the master node on ring 1 in domain 1 and configure UPE A, UPE
B, and UPE C as transit nodes.
7. Configure PE-AGG as the master node on ring 1 in domain 2 and configure UPE A, UPE
B, and UPE C as transit nodes.
Data Preparation
To complete the configuration, you need the following data:
l Instance IDs
l Range of the protected VLANs
l IDs of the control VLANs
l Numbers of the RRPP interfaces
Procedure
Step 1 Create instances.
l Configure UPE A.
# Create data VLANs 100 to 300 on UPE A.
<Quidway> system-view
[Quidway] sysname UPEA
[UPEA] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 VLAN 6 and data VLANs 100 to
200 in domain 1.
[UPEA] stp region-configuration
[UPEA-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEA-mst-region] instance 2 vlan 10 11 201 to 300
l # Configure UPE B.
# Create data VLANs 100 to 300 on UPE B.
<Quidway> system-view
[Quidway] sysname UPEB
[UPEB] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEB] stp region-configuration
[UPEB-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEB-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE C.
# Create data VLANs 100 to 300 on UPE C.
<Quidway> system-view
[Quidway] sysname UPEC
[UPEC] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEC] stp region-configuration
[UPEC-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEC-mst-region] instance 2 vlan 10 11 201 to 300
l Configure PE-AGG.
# Create data VLANs 100 to 300 on PE-AGG.
<Quidway> system-view
[Quidway] sysname PE-AGG
[PE-AGG] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[PE-AGG] stp region-configuration
[PE-AGG-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[PE-AGG-mst-region] instance 2 vlan 10 11 201 to 300
l # Configure UPE B.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE B. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEB] interface gigabitethernet 0/0/1
[UPEB-GigabitEthernet0/0/1] port link-type trunk
[UPEB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
l Configure UPE C.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE C. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEC] interface gigabitethernet 0/0/1
[UPEC-GigabitEthernet0/0/1] port link-type trunk
[UPEC-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet0/0/1] stp disable
[UPEC-GigabitEthernet0/0/1] quit
[UPEC] interface gigabitethernet 0/0/2
[UPEC-GigabitEthernet0/0/2] port link-type trunk
[UPEC-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet0/0/2] stp disable
[UPEC-GigabitEthernet0/0/2] quit
l Configure PE-AGG.
# Disable STP of the interfaces that need to be added to the RRPP ring on PE-AGG. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[PE-AGG] interface gigabitethernet 0/0/1
[PE-AGG-GigabitEthernet0/0/1] port link-type trunk
[PE-AGG-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[PE-AGG-GigabitEthernet0/0/1] stp disable
[PE-AGG-GigabitEthernet0/0/1] quit
[PE-AGG] interface gigabitethernet 0/0/2
[PE-AGG-GigabitEthernet0/0/2] port link-type trunk
[PE-AGG-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[PE-AGG-GigabitEthernet0/0/2] stp disable
[PE-AGG-GigabitEthernet0/0/2] quit
Step 3 Create RRPP domains and configure the protected VLANs and control VLANs.
l Configure UPE A.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEA-rrpp-domain-region1] control-vlan 5
[UPEA-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEA-rrpp-domain-region2] control-vlan 10
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEB-rrpp-domain-region1] control-vlan 5
[UPEB-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEB-rrpp-domain-region2] control-vlan 10
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEC-rrpp-domain-region1] control-vlan 5
[UPEC-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEC-rrpp-domain-region2] control-vlan 10
[UPEC-rrpp-domain-region2] quit
l Configure PE-AGG.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] protected-vlan reference-instance 1
[PE-AGG-rrpp-domain-region1] control-vlan 5
[PE-AGG-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[PE-AGG] rrpp domain 2
[PE-AGG-rrpp-domain-region2] protected-vlan reference-instance 2
[PE-AGG-rrpp-domain-region2] control-vlan 10
[PE-AGG-rrpp-domain-region2] quit
# Configure UPE A as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE A.
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[UPEA-rrpp-domain-region1] ring 1 enable
[UPEA-rrpp-domain-region1] quit
# Configure UPE A as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE A.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[UPEA-rrpp-domain-region2] ring 1 enable
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure UPE B as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE B.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[UPEB-rrpp-domain-region1] ring 1 enable
[UPEB-rrpp-domain-region1] quit
# Configure UPE B as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE B.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[UPEB-rrpp-domain-region2] ring 1 enable
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure UPE C as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[UPEC-rrpp-domain-region1] ring 1 enable
[UPEC-rrpp-domain-region1] quit
# Configure UPE C as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[UPEC-rrpp-domain-region2] ring 1 enable
[UPEC-rrpp-domain-region2] quit
l Configure PE-AGG.
# Configure PE-AGG as the master node of ring 1 in domain 1. Configure GE 0/0/1 as the
primary port and GE 0/0/2 as the secondary port.
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] ring 1 node-mode master primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[PE-AGG-rrpp-domain-region1] ring 1 enable
[PE-AGG-rrpp-domain-region1] quit
# Configure PE-AGG as the master node of ring 1 in domain 2. Configure GE 0/0/2 as the
primary port and GE 0/0/1 as the secondary port.
[PE-AGG] rrpp domain 2
[PE-AGG-rrpp-domain-region2] ring 1 node-mode master primary-port gigabitethernet
0/0/2 secondary-port gigabitethernet 0/0/1 level 0
[PE-AGG-rrpp-domain-region2] ring 1 enable
[PE-AGG-rrpp-domain-region2] quit
l # Configure UPE B.
# Enable the RRPP protocol.
[UPEB] rrpp enable
l Configure UPE C.
# Enable the RRPP protocol.
[UPEC] rrpp enable
l Configure PE-AGG.
# Enable the RRPP protocol.
[PE-AGG] rrpp enable
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 T GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 T GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
---------------------------------------------------------------------------
1 0 M GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
---------------------------------------------------------------------------
1 0 M GigabitEthernet0/0/2 GigabitEthernet0/0/1 Yes
The preceding information shows that the RRPP protocol is enabled on PE-AGG.
In domain 1, VLAN 5 is the control VLAN; VLANs mapping instance 1 are the protected
VLANs; PE-AGG is the master node on ring 1. The primary port is GigabitEthernet 0/0/1, and
the secondary port is GigabitEthernet 0/0/2.
In domain 2, VLAN 10 is the control VLAN; VLANs mapping instance 2 are the protected
VLANs; PE-AGG is the master node on ring 1. The primary port is GigabitEthernet 0/0/2, and
the secondary port is GigabitEthernet0/0/1.
l Run the display rrpp verbose domain command on UPE A. You can obtain the following
results:
# View detailed information about UPE A in domain 1.
[UPEA] display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: UP
The preceding information shows that VLAN 5 is the control VLAN in domain 1 and VLANs
mapping instance 1 are the protected VLANs. UPE A is a transit node in domain 1 and is in
LinkUp state.
# View detailed information about UPE A in domain 2.
[UPEA] display rrpp verbose domain 2
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: UP
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and VLANs
mapping instance 2 are the protected VLANs. UPE A is a transit node in domain 2 and is in
LinkUp state.
l Run the display rrpp verbose domain command on PE-AGG. You can obtain the following
results:
# View detailed information about PE-AGG in domain 1.
[PE-AGG] display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: BLOCKED
The preceding information shows that VLAN 5 is the control VLAN in domain 1 and VLANs
mapping instance 1 are the protected VLANs.
PE-AGG is the master node in domain 1 and is in Complete state.
The primary port is GigabitEthernet 0/0/1, and the secondary port is GigabitEthernet 0/0/2.
# View detailed information about PE-AGG in domain 2.
[PE-AGG] display rrpp verbose domain 2
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/2 Port status: UP
Secondary port: GigabitEthernet0/0/1 Port status: BLOCKED
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and VLANs
mapping instance 2 are the protected VLANs.
PE-AGG is the master node in domain 2 and is in Complete state.
The primary port is GigabitEthernet 0/0/2, and the secondary port is GigabitEthernet 0/0/1.
----End
Configuration Files
l Configuration file of UPE A
#
sysname UPEA
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
l Configuration file of UPE B
#
sysname UPEB
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
Table 3-4 shows the master node of each ring, and the primary port and secondary port on each
master node.
Table 3-4 Master nodes, and primary and secondary ports on the master nodes
Ring ID Master Primary Secondary Port Ring Type
Node Port
Table 3-5 shows the edge nodes, assistant edge nodes, public port, and edge port of the subrings.
Table 3-5 Edge nodes, assistant edge nodes, public port, and edge port of the subrings
Ring Edge Comm Edge Port Edge- Common Edge Port
ID Node on Port Assistant Port
Node
To reduce the Edge-Hello packets sent on the major ring and increase available bandwidth, you
can add the four subrings to a ring group.
To prevent topology flapping, you need to set the Link-Up timer on the master nodes.
Figure 3-9 Networking diagram of crossed RRPP rings with multiple instances
Backbone
network
GE0/0/1 GE0/0/2
PE-AGG
Master 1
GE0/0/2 Master 2 GE/1/0/0
UPE A UPED
Domain 1 ring 1
GE0/0/1
GE2/0/00
Domain 2 ring 1
Master 1 Master 1
Master 2 Master 2
GE0/0/2 Domain 1 ring 2 Domain 1 ring 3 GE0/0/1
CE 1 CE 2
VLAN 100-300 VLAN 100-300
Domain 1
Domain 2
Configuration Roadmap
The configuration roadmap is as follows:
1. Map instance 1 to VLANs 100 to 200. Map instance 2 to VLANs 201 to 300.
2. Add UPE A, UPE B, UPE C, UPE D, and PE-AGG to ring 1 in domain 1 and ring 1 in
domain 2.
3. Add CE1, UPE B, and UPE C to ring 2 in domain 1 and ring 2 in domain 2.
4. Add CE2, UPE B, and UPE C to ring 3 in domain 1 and ring 3 in domain 2.
5. Configure protected VLANs in domain 1 and domain 2.
Data Preparation
To complete the configuration, you need the following data:
l Instance IDs
l Range of the protected VLANs
l IDs of the control VLANs
l Numbers of the RRPP interfaces
l ID of the ring group
l Link-Up-Delay timer
Procedure
Step 1 Create instances.
l Configure CE1.
# Create data VLANs 100 to 300 on CE1.
<Quidway> system-view
[Quidway] sysname CE1
[CE1] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[CE1] stp region-configuration
[CE1-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[CE1-mst-region] instance 2 vlan 10 11 201 to 300
l Configure CE2.
# Create data VLANs 100 to 300 on CE2.
<Quidway> system-view
[Quidway] sysname CE2
[CE2] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[CE2] stp region-configuration
[CE2-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[CE2-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE A.
# Create data VLANs 100 to 300 on UPE A.
<Quidway> system-view
[Quidway] sysname UPEA
[UPEA] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[UPEA] stp region-configuration
[UPEA-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[UPEA-mst-region] instance 2 vlan 10 11 201 to 300
l # Configure UPE B.
# Create data VLANs 100 to 300 on UPE B.
<Quidway> system-view
[Quidway] sysname UPEB
[UPEB] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[UPEB] stp region-configuration
[UPEB-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[UPEB-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE C.
# Create data VLANs 100 to 300 on UPE C.
<Quidway> system-view
[Quidway] sysname UPEC
[UPEC] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[UPEC] stp region-configuration
[UPEC-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[UPEC-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE D.
# Create data VLANs 100 to 300 on UPE D.
<Quidway> system-view
[Quidway] sysname UPED
[UPED] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[UPED] stp region-configuration
[UPED-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[UPED-mst-region] instance 2 vlan 10 11 201 to 300
l Configure PE-AGG.
# Create data VLANs 100 to 300 on PE-AGG.
<Quidway> system-view
[Quidway] sysname PE-AGG
[PE-AGG] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs
100 to 200 in domain 1.
[PE-AGG] stp region-configuration
[PE-AGG-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs
201 to 300 in domain 2.
[PE-AGG-mst-region] instance 2 vlan 10 11 201 to 300
[CE1-GigabitEthernet0/0/1] quit
[CE1] interface gigabitethernet 0/0/2
[CE1-GigabitEthernet0/0/2] port link-type trunk
[CE1-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[CE1-GigabitEthernet0/0/2] stp disable
[CE1-GigabitEthernet0/0/2] quit
l Configure CE2.
# Disable STP on the interfaces that need to be added to the RRPP ring on CE2. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[CE2] interface gigabitethernet 0/0/1
[CE2-GigabitEthernet0/0/1] port link-type trunk
[CE2-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[CE2-GigabitEthernet0/0/1] stp disable
[CE2-GigabitEthernet0/0/1] quit
[CE2] interface gigabitethernet 0/0/2
[CE2-GigabitEthernet0/0/2] port link-type trunk
[CE2-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[CE2-GigabitEthernet0/0/2] stp disable
[CE2-GigabitEthernet0/0/2] quit
l Configure UPE A.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE A. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEA] interface gigabitethernet 0/0/1
[UPEA-GigabitEthernet0/0/1] port link-type trunk
[UPEA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEA-GigabitEthernet0/0/1] stp disable
[UPEA-GigabitEthernet0/0/1] quit
[UPEA] interface gigabitethernet 0/0/2
[UPEA-GigabitEthernet0/0/2] port link-type trunk
[UPEA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPEA-GigabitEthernet0/0/2] stp disable
[UPEA-GigabitEthernet0/0/2] quit
l # Configure UPE B.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE B. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEB] interface gigabitethernet 0/0/1
[UPEB-GigabitEthernet0/0/1] port link-type trunk
[UPEB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet0/0/1] stp disable
[UPEB-GigabitEthernet0/0/1] quit
[UPEB] interface gigabitethernet 0/0/2
[UPEB-GigabitEthernet0/0/2] port link-type trunk
[UPEB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet0/0/2] stp disable
[UPEB-GigabitEthernet0/0/2] quit
[UPEB] interface gigabitethernet 0/0/3
[UPEB-GigabitEthernet0/0/3] port link-type trunk
[UPEB-GigabitEthernet0/0/3] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet0/0/3] stp disable
[UPEB-GigabitEthernet0/0/3] quit
[UPEB] interface gigabitethernet 0/0/4
[UPEB-GigabitEthernet0/0/4] port link-type trunk
[UPEB-GigabitEthernet0/0/4] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet0/0/4] stp disable
[UPEB-GigabitEthernet0/0/4] quit
l Configure UPE C.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE C. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEC] interface gigabitethernet 0/0/1
[UPEC-GigabitEthernet0/0/1] port link-type trunk
[UPEC-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
Step 3 Create RRPP domains and configure the protected VLANs and control VLANs.
l Configure CE1.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[CE1] rrpp domain 1
[CE1-rrpp-domain-region1] protected-vlan reference-instance 1
[CE1-rrpp-domain-region1] control-vlan 5
[CE1-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[CE1] rrpp domain 2
[CE1-rrpp-domain-region2] protected-vlan reference-instance 2
[CE1-rrpp-domain-region2] control-vlan 10
[CE1-rrpp-domain-region2] quit
l Configure CE2.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[CE2] rrpp domain 2
[CE2-rrpp-domain-region2] protected-vlan reference-instance 2
[CE2-rrpp-domain-region2] control-vlan 10
[CE2-rrpp-domain-region2] quit
l Configure UPE A.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEA-rrpp-domain-region1] control-vlan 5
[UPEA-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEA-rrpp-domain-region2] control-vlan 10
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEB-rrpp-domain-region1] control-vlan 5
[UPEB-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEB-rrpp-domain-region2] control-vlan 10
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEC-rrpp-domain-region1] control-vlan 5
[UPEC-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEC-rrpp-domain-region2] control-vlan 10
[UPEC-rrpp-domain-region2] quit
l Configure UPE D.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPED] rrpp domain 1
[UPED-rrpp-domain-region1] protected-vlan reference-instance 1
[UPED-rrpp-domain-region1] control-vlan 5
[UPED-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPED] rrpp domain 2
[UPED-rrpp-domain-region2] protected-vlan reference-instance 2
[UPED-rrpp-domain-region2] control-vlan 10
[UPED-rrpp-domain-region2] quit
l Configure PE-AGG.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] protected-vlan reference-instance 1
[PE-AGG-rrpp-domain-region1] control-vlan 5
[PE-AGG-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[PE-AGG] rrpp domain 2
[PE-AGG-rrpp-domain-region2] protected-vlan reference-instance 2
[PE-AGG-rrpp-domain-region2] control-vlan 10
[PE-AGG-rrpp-domain-region2] quit
# Configure PE-AGG as the master node of ring 1 in domain 2. Configure GE0/0/2 as the
primary port and GE0/0/1 as the secondary port.
[PE-AGG] rrpp domain 2
[PE-AGG-rrpp-domain-region2] ring 1 node-mode master primary-port
gigabitethernet 0/0/2 secondary-port gigabitethernet 0/0/1 level 0
[PE-AGG-rrpp-domain-region2] ring 1 enable
[PE-AGG-rrpp-domain-region2] quit
l Configure UPE A.
# Configure UPE A as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE A.
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[UPEA-rrpp-domain-region1] ring 1 enable
[UPEA-rrpp-domain-region1] quit
# Configure UPE A as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE A.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] ring 1 node-mode transit primary-port
gigabitethernet 0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[UPEA-rrpp-domain-region2] ring 1 enable
[UPEA-rrpp-domain-region2] quit
l Configure UPE D.
# Configure UPE D as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE D.
[UPED] rrpp domain 1
[UPED-rrpp-domain-region1] ring 1 node-mode transit primary-port
# Configure CE2 as the master node of ring 3 in domain 2. Configure GE 0/0/2 as the primary
port and GE 0/0/1 as the secondary port.
[CE2] rrpp domain 2
[CE2-rrpp-domain-region2] ring 3 node-mode master primary-port gigabitethernet
0/0/2 secondary-port gigabitethernet 0/0/1 level 1
[CE2-rrpp-domain-region2] ring 3 enable
[CE2-rrpp-domain-region2] quit
l Configure UPE A.
# Enable the RRPP protocol.
[UPEA] rrpp enable
l Configure UPE D.
# Enable the RRPP protocol.
[UPED] rrpp enable
l # Configure UPE B.
# Enable the RRPP protocol.
[UPEB] rrpp enable
l Configure UPE C.
# Enable the RRPP protocol.
[UPEC] rrpp enable
l Configure CE1.
# Enable the RRPP protocol.
[CE1] rrpp enable
l Configure CE2.
# Enable the RRPP protocol.
[CE2] rrpp enable
l Configure CE2.
# Set the link-Up timer to 1 second.
[CE2] rrpp linkup-delay-timer 1
l Configure PE-AGG.
# Set the link-Up timer to 1 second.
[PE-AGG] rrpp linkup-delay-timer 1
After the preceding configurations are complete and the network topology becomes stable,
perform the following operations to verify the configuration. Here, UPE B and PE-AGG are
used as examples.
l Run the display rrpp brief command on UPE B. The following information is displayed.
[UPEB] display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
-------------------------------------------------------------------------------
--
1 0 T GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
2 1 E GigabitEthernet0/0/1 GigabitEthernet0/0/3 Yes
3 1 E GigabitEthernet0/0/1 GigabitEthernet0/0/4 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
-------------------------------------------------------------------------------
--
1 0 T GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
2 1 E GigabitEthernet0/0/1 GigabitEthernet0/0/3 Yes
3 1 E GigabitEthernet0/0/1 GigabitEthernet0/0/4 Yes
UPE B is a transit node on ring 1; GE 0/0/1 is the primary port; GE 0/0/2 is the secondary
port.
UPE B is an edge transit node on ring 2. GE 0/0/1 is the public port and GE 0/0/3 is the edge
port.
UPE B is an edge transit node on ring 3. GE 0/0/1 is the public port and GE 0/0/4 is the edge
port.
In domain 2:
VLAN 10 is the control VLAN and VLANs mapping instance 2 are the protected VLANs.
UPE B is a transit node on ring 1. GE 0/0/1 is the primary port, and GE 0/0/2 is the secondary
port.
UPE B is an edge transit node on ring 2. GE 0/0/1 is the public port and GE 0/0/3 is the edge
port.
UPE B is an edge transit node on ring 3. GE 0/0/1 is the public port and GE 0/0/4 is the edge
port.
l Run the display rrpp brief command on PE-AGG. The following information is displayed:
[PE-AGG] display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
-------------------------------------------------------------------------------
--
1 0 M GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port
Enabled
-------------------------------------------------------------------------------
--
1 0 M GigabitEthernet0/0/2 GigabitEthernet0/0/1 Yes
The preceding information shows that the RRPP protocol is enabled on PE-AGG, and the
link-Up timer is 2 seconds.
In domain 1, VLAN 5 is the control VLAN; VLANs mapping instance 1 are the protected
VLANs; PE-AGG is the master node on ring 1. GE 0/0/1 is the primary port, and GE 0/0/2
is the secondary port.
In domain 2, VLAN 10 is the control VLAN; VLANs mapping instance 2 are the protected
VLANs; PE-AGG is the master node on ring 1. GE 0/0/2 is the primary port, and GE 0/0/1
is the secondary port.
l Run the display rrpp verbose domain command on UPE B. You can obtain the following
results:
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: UP
RRPP Ring : 2
Ring Level : 1
Node Mode : Edge
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Common port : GigabitEthernet0/0/1 Port status: UP
Edge port : GigabitEthernet0/0/3 Port status: UP
RRPP Ring : 3
Ring Level : 1
Node Mode : Edge
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Common port : GigabitEthernet0/0/1 Port status: UP
Edge port : GigabitEthernet0/0/4 Port status: UP
The preceding information shows that VLAN 5 is the control VLAN in domain 1, and VLANs
mapping instance 1 are the protected VLANs.
UPE B is a transit node on ring 1 in domain 1 and is in LinkUp state.
UPE B is a transit node on ring 2 in domain 1 and is in LinkUp state. GE 0/0/1 is the public
port, and GE 0/0/3 is the edge port.
UPE B is a transit node on ring 3 in domain 1 and is in LinkUp state. GE 0/0/1 is the public
port, and GE 0/0/4 is the edge port.
# View detailed information about UPE B in domain 2.
<UPEB> display rrpp verbose domain 2
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: UP
RRPP Ring : 2
Ring Level : 1
Node Mode : Edge
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Common port : GigabitEthernet0/0/1 Port status: UP
Edge port : GigabitEthernet0/0/3 Port status: UP
RRPP Ring : 3
Ring Level : 1
Node Mode : Edge
Ring State : LinkUp
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and
VLANs mapping instance 2 are the protected VLANs.
UPE B is a transit node in domain 2 and is in LinkUp state.
UPE B is a transit node on ring 2 in domain 2 and is in LinkUp state. GE 0/0/1 is the public
port, and GE 0/0/3 is the edge port.
UPE B is a transit node on ring 3 in domain 2 and is in LinkUp state. GE 0/0/1 is the public
port, and GE 0/0/4 is the edge port.
l Run the display rrpp verbose domain command on PE-AGG. You can obtain the following
results:
# View detailed information about PE-AGG in domain 1.
[PE-AGG] display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: BLOCKED
The preceding information shows that VLAN 5 is the control VLAN in domain 1, and VLANs
mapping instance 1 are the protected VLANs.
PE-AGG is the master node in domain 1 and is in Complete state.
GE 0/0/1 is the primary port, and GE 0/0/2 is the secondary port.
# View detailed information about PE-AGG in domain 2.
[PE-AGG] display rrpp verbose domain 2
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN: Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/1 Port status: BLOCKED
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and
VLANs mapping instance 2 are the protected VLANs.
PE-AGG is the master node in domain 2 and is in Complete state.
GE 0/0/2 is the primary port, and GE 0/0/1 is the secondary port.
l Run the display rrpp ring-group command on UPE B to view the configuration of the ring
group.
# View the configuration of ring group 1.
[UPEB] display rrpp ring-group 1
Ring Group 1:
domain 1 ring 2 to 3
domain 2 ring 2 to 3
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
rrpp linkup-delay-timer 1
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 2 node-mode master primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 1
ring 2 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 2 node-mode master primary-port GigabitEthernet 0/0/2 secondary-port
GigabitEthernet 0/0/1 level 1
ring 2 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
return
control-vlan 10
protected-vlan reference-instance 2
ring 3 node-mode master primary-port GigabitEthernet 0/0/2 secondary-port
GigabitEthernet 0/0/1 level 1
ring 3 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
return
l Configuration file of UPE A
#
#
sysname UPEA
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
l Configuration file of UPE B
#
sysname UPEB
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
ring 2 node-mode edge common-port GigabitEthernet 0/0/1 edge-port
GigabitEthernet 0/0/3
ring 2 enable
ring 3 node-mode edge common-port GigabitEthernet 0/0/1 edge-port
GigabitEthernet 0/0/4
ring 3 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
ring 2 node-mode edge common-port GigabitEthernet 0/0/1 edge-port
GigabitEthernet 0/0/3
ring 2 enable
ring 3 node-mode edge common-port GigabitEthernet 0/0/1 edge-port
GigabitEthernet 0/0/4
ring 3 enable
#
rrpp ring group 1
domain 1 ring 2 to 3
domain 2 ring 2 to 3
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/4
port link-type trunk
port trunk allow-pass vlan 6 11 100 to 300
stp disable
#
return
l Configuration file of UPE C
#
sysname UPEC
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
Networking Requirements
As shown in Figure 3-10, UPE A, UPE B, UPE C, and UPE D form two multi-instance rings:
ring 1 in domain 1 and ring 1 in domain 2. UPE D, UPE E, UPE F, and UPE G form ring 1 in
domain 3. Packets of the data VLANs connected to CE are forwarded to the backbone network
through the two tangent rings.
VLANs 100 to 300 are configured on CE. Domain 1 and domain 2 share the traffic of packets
from VLANs 100 to 300. Packets from VLANs 100 to 200 are transmitted through domain 1,
and packets from VLANs 201 to 300 are transmitted through domain 2.
Table 3-6 shows the mapping between protected VLANs and instances in domain 1, domain 2,
and domain 3.
Table 3-7 shows the master node of each ring, and the primary port and secondary port on each
master node.
Table 3-7 Master nodes, and primary and secondary ports on the master nodes
Ring ID Master Node Primary Port Secondary Port
Figure 3-10 Networking diagram of tangent RRPP rings with multiple instances
UPEB UPEE
GE0/0/1 GE/0/0/2 GE0/0/1 GE0/0/2
Domain 1 ring 1
GE/0/0/2
GE0/0/1 GE0/0/3 GE0/0/1
Master 1 UPEF
UPEA UPED Master 3
Master 2
CE GE0/0/1 GE0/0/2 GE0/0/4
GE0/0/2
GE0/0/1
GE/0/0/2 GE0/0/1 GE/0/0/2
UPEC UPEG
domain 1
domain 2
domain 3
Configuration Roadmap
The configuration roadmap is as follows:
1. Map instance 1 to VLANs 100 to 200. Map instance 2 to VLANs 201 to 300.
2. Add UPE A, UPE B, UPE C, and UPE D to ring 1 in domain 1 and ring 1 in domain 2.
3. Add UPE D, UPE E, UPE F, and UPE G to ring 1 in domain 3.
4. Configure protected VLANs in domain 1 and domain 2.
5. Configure control VLANs in domain 1 and domain 2.
6. Configure the control VLAN in domain 3.
7. Configure UPE D as the master node and configure UPE A, UPE B, and UPE C as transit
nodes on ring 1 in domain 1 and ring 1 in domain 2.
8. Configure UPE F as the master node and configure UPE D, UPE E, and UPE G as transit
nodes on ring 1 in domain 3.
Data Preparation
To complete the configuration, you need the following data:
l Instance IDs
l Range of the protected VLANs
l IDs of the control VLANs
l Numbers of the RRPP interfaces
Procedure
Step 1 Create instances.
l Configure UPE A.
# Create data VLANs 100 to 300 on UPE A.
<Quidway> system-view
[Quidway] sysname UPEA
[UPEA] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEA] stp region-configuration
[UPEA-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEA-mst-region] instance 2 vlan 10 11 201 to 300
l # Configure UPE B.
# Create data VLANs 100 to 300 on UPE B.
<Quidway> system-view
[Quidway] sysname UPEB
[UPEB] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEB] stp region-configuration
[UPEB-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPEB-mst-region] instance 2 vlan 10 11 201 to 300
l Configure UPE C.
# Create data VLANs 100 to 300 on UPE C.
<Quidway> system-view
[Quidway] sysname UPEC
[UPEC] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPEC] stp region-configuration
[UPEC-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
l Configure UPE D.
# Create data VLANs 100 to 300 on UPE D.
<Quidway> system-view
[Quidway] sysname UPED
[UPED] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 5 and VLAN 6 and data VLANs 100
to 200 in domain 1.
[UPED] stp region-configuration
[UPED-mst-region] instance 1 vlan 5 6 100 to 200
# Create instance 2 and map it to control VLANs VLAN 10 and VLAN 11 and data VLANs 201
to 300 in domain 2.
[UPED-mst-region] instance 2 vlan 10 11 201 to 300
# Create instance 3 and map it to control VLANs VLAN 20 and VLAN 21 in domain 3.
[UPED-mst-region] instance 3 vlan 20 21
l Configure UPE E.
# Create data VLANs 100 to 300 on UPE E.
<Quidway> system-view
[Quidway] sysname UPEE
[UPEE] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 20 and VLAN 21 and data VLANs 100
to 300 in domain 3.
[UPEE] stp region-configuration
[UPEE-mst-region] instance 1 vlan 20 21 100 to 300
l Configure UPE F.
# Create data VLANs 100 to 300 on UPE F.
<Quidway> system-view
[Quidway] sysname UPEF
[UPEF] vlan batch 100 to 300
# Create instance 1 and map it to control VLANs VLAN 20 and VLAN 21 and data VLANs 100
to 300 in domain 3.
[UPEF] stp region-configuration
[UPEF-mst-region] instance 1 vlan 20 21 100 to 300
l Configure UPE G.
# Create instance 1 and map it to control VLANs VLAN 20 and VLAN 21 and data VLANs 100
to 300 in domain 3.
[UPEG] stp region-configuration
[UPEG-mst-region] instance 1 vlan 20 21 100 to 300
Run the display stp region-configuration command on the devices to view the mapping
between instances and VLANs. The displayed information on UPE A is as follows:
[UPEA] display stp region-configuration
Oper configuration
Format selector :0
Region name :00e0cd568d00
Revision level :0
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE A. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEA] interface gigabitethernet 0/0/1
[UPEA-GigabitEthernet0/0/1] port link-type trunk
[UPEA-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEA-GigabitEthernet0/0/1] stp disable
[UPEA-GigabitEthernet0/0/1] quit
[UPEA] interface gigabitethernet 0/0/2
[UPEA-GigabitEthernet0/0/2] port link-type trunk
[UPEA-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPEA-GigabitEthernet0/0/2] stp disable
[UPEA-GigabitEthernet0/0/2] quit
l # Configure UPE B.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE B. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEB] interface gigabitethernet 0/0/1
[UPEB-GigabitEthernet0/0/1] port link-type trunk
[UPEB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet0/0/1] stp disable
[UPEB-GigabitEthernet0/0/1] quit
[UPEB] interface gigabitethernet 0/0/2
[UPEB-GigabitEthernet0/0/2] port link-type trunk
[UPEB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
l Configure UPE C.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE C. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEC] interface gigabitethernet 0/0/1
[UPEC-GigabitEthernet0/0/1] port link-type trunk
[UPEC-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet0/0/1] stp disable
[UPEC-GigabitEthernet0/0/1] quit
[UPEC] interface gigabitethernet 0/0/2
[UPEC-GigabitEthernet0/0/2] port link-type trunk
[UPEC-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet0/0/2] stp disable
[UPEC-GigabitEthernet0/0/2] quit
l Configure UPE D.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE D. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPED] interface gigabitethernet 0/0/1
[UPED-GigabitEthernet0/0/1] port link-type trunk
[UPED-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPED-GigabitEthernet0/0/1] stp disable
[UPED-GigabitEthernet0/0/1] quit
[UPED] interface gigabitethernet 0/0/3
[UPED-GigabitEthernet0/0/3] port link-type trunk
[UPED-GigabitEthernet0/0/3] port trunk allow-pass vlan 100 to 300
[UPED-GigabitEthernet0/0/3] stp disable
[UPED-GigabitEthernet0/0/3] quit
[UPED] interface gigabitethernet 0/0/2
[UPED-GigabitEthernet0/0/2] port link-type trunk
[UPED-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPED-GigabitEthernet0/0/2] stp disable
[UPED-GigabitEthernet0/0/2] quit
[UPED] interface gigabitethernet 0/0/4
[UPED-GigabitEthernet0/0/4] port link-type trunk
[UPED-GigabitEthernet0/0/4] port trunk allow-pass vlan 100 to 300
[UPED-GigabitEthernet0/0/4] stp disable
[UPED-GigabitEthernet0/0/4] quit
l Configure UPE E.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE E. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEE] interface gigabitethernet 0/0/1
[UPEE-GigabitEthernet0/0/1] port link-type trunk
[UPEE-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEE-GigabitEthernet0/0/1] stp disable
[UPEE-GigabitEthernet0/0/1] quit
[UPEE] interface gigabitethernet 0/0/2
[UPEE-GigabitEthernet0/0/2] port link-type trunk
[UPEE-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPEE-GigabitEthernet0/0/2] stp disable
[UPEE-GigabitEthernet0/0/2] quit
l Configure UPE F.
# Disable STP on the interfaces that need to be added to the RRPP ring on UPE F. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEF] interface gigabitethernet 0/0/1
[UPEF-GigabitEthernet0/0/1] port link-type trunk
[UPEF-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEF-GigabitEthernet0/0/1] stp disable
[UPEF-GigabitEthernet0/0/1] quit
[UPEF] interface gigabitethernet 0/0/2
[UPEF-GigabitEthernet0/0/2] port link-type trunk
[UPEF-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPEF-GigabitEthernet0/0/2] stp disable
[UPEF-GigabitEthernet0/0/2] quit
l Configure UPE G.
# Disable the STP function on the interfaces to be added to the RRPP ring on UPE G. Configure
the RRPP interfaces to allow packets of VLANs 100 to 300 to pass through.
[UPEG] interface gigabitethernet 0/0/1
[UPEG-GigabitEthernet0/0/1] port link-type trunk
[UPEG-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEG-GigabitEthernet0/0/1] stp disable
[UPEG-GigabitEthernet0/0/1] quit
[UPEG] interface gigabitethernet 0/0/2
[UPEG-GigabitEthernet0/0/2] port link-type trunk
[UPEG-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPEG-GigabitEthernet0/0/2] stp disable
[UPEG-GigabitEthernet0/0/2] quit
Step 3 Create RRPP domains and configure the protected VLANs and control VLANs.
l Configure UPE A.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEA] rrpp domain 1
[UPEA-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEA-rrpp-domain-region1] control-vlan 5
[UPEA-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEA-rrpp-domain-region2] control-vlan 10
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEB-rrpp-domain-region1] control-vlan 5
[UPEB-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEB-rrpp-domain-region2] control-vlan 10
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEC-rrpp-domain-region1] control-vlan 5
[UPEC-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] protected-vlan reference-instance 2
[UPEC-rrpp-domain-region2] control-vlan 10
[UPEC-rrpp-domain-region2] quit
l Configure UPE D.
# Configure the VLANs mapping instance 1 as the protected VLANs in domain 1. Configure
VLAN 5 as the control VLAN.
[UPED] rrpp domain 1
[UPED-rrpp-domain-region1] protected-vlan reference-instance 1
[UPED-rrpp-domain-region1] control-vlan 5
[UPED-rrpp-domain-region1] quit
# Configure the VLANs mapping instance 2 as the protected VLANs in domain 2. Configure
VLAN 10 as the control VLAN.
[UPED] rrpp domain 2
[UPED-rrpp-domain-region2] protected-vlan reference-instance 2
[UPED-rrpp-domain-region2] control-vlan 10
[UPED-rrpp-domain-region2] quit
l Configure UPE E.
# Configure VLAN 20 as the control VLAN in domain 3.
[UPEE] rrpp domain 3
[UPEE-rrpp-domain-region3] protected-vlan reference-instance 1
[UPEE-rrpp-domain-region3] control-vlan 20
[UPEE-rrpp-domain-region3] quit
l Configure UPE F.
# Configure VLAN 20 as the control VLAN in domain 3.
[UPEF] rrpp domain 3
[UPEF-rrpp-domain-region3] protected-vlan reference-instance 1
[UPEF-rrpp-domain-region3] control-vlan 20
[UPEF-rrpp-domain-region3] quit
l Configure UPE G.
# Configure VLAN 20 as the control VLAN in domain 3.
[UPEG] rrpp domain 3
[UPEG-rrpp-domain-region3] protected-vlan reference-instance 1
[UPEG-rrpp-domain-region3] control-vlan 20
[UPEG-rrpp-domain-region3] quit
# Configure UPE A as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE A.
[UPEA] rrpp domain 2
[UPEA-rrpp-domain-region2] ring 1 node-mode transit primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[UPEA-rrpp-domain-region2] ring 1 enable
[UPEA-rrpp-domain-region2] quit
l # Configure UPE B.
# Configure UPE B as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE B.
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
0/0/1 secondary-port 0/0/2 level 0
[UPEB-rrpp-domain-region1] ring 1 enable
[UPEB-rrpp-domain-region1] quit
# Configure UPE B as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE B.
[UPEB] rrpp domain 2
[UPEB-rrpp-domain-region2] ring 1 node-mode transit primary-port 0/0/1 secondary-
port 0/0/2 level 0
[UPEB-rrpp-domain-region2] ring 1 enable
[UPEB-rrpp-domain-region2] quit
l Configure UPE C.
# Configure UPE C as a transit node of ring 1 in domain 1 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] ring 1 node-mode transit primary-port 0/0/1 secondary-
port 0/0/2 level 0
[UPEC-rrpp-domain-region1] ring 1 enable
[UPEC-rrpp-domain-region1] quit
# Configure UPE C as a transit node of ring 1 in domain 2 and specify primary and secondary
ports on UPE C.
[UPEC] rrpp domain 2
[UPEC-rrpp-domain-region2] ring 1 node-mode transit primary-port 0/0/1 secondary-
port 0/0/2 level 0
[UPEC-rrpp-domain-region2] ring 1 enable
[UPEC-rrpp-domain-region2] quit
l Configure UPE D.
# Configure UPE D as the master node of ring 1 in domain 1. Configure GE 0/0/1 as the primary
port and GE 0/0/2 as the secondary port.
[UPED] rrpp domain 1
[UPED-rrpp-domain-region1] ring 1 node-mode master primary-port 0/0/1 secondary-
port 0/0/2 level 0
[UPED-rrpp-domain-region1] ring 1 enable
[UPED-rrpp-domain-region1] quit
# Configure UPE D as the master node of ring 1 in domain 2. Configure GE 0/0/2 as the primary
port and GE 0/0/1 as the secondary port.
[UPED] rrpp domain 2
[UPED-rrpp-domain-region2] ring 1 node-mode master primary-port 0/0/2 secondary-
# Configure UPE D as a transit node of ring 1 in domain 3 and specify primary and secondary
ports on UPE D.
[UPED] rrpp domain 3
[UPED-rrpp-domain-region3] ring 1 node-mode transit primary-port 0/0/2 secondary-
port 0/0/4 level 0
[UPED-rrpp-domain-region3] ring 1 enable
[UPED-rrpp-domain-region3] quit
l Configure UPE E.
# Configure UPE E as a transit node of ring 1 in domain 3 and specify primary and secondary
ports on UPE E.
[UPEE] rrpp domain 3
[UPEE-rrpp-domain-region3] ring 1 node-mode transit primary-port 0/0/1 secondary-
port 0/0/2 level 0
[UPEE-rrpp-domain-region3] ring 1 enable
[UPEE-rrpp-domain-region3] quit
l Configure UPE F.
# Configure UPE F as the master node of ring 1 in domain 3. Configure GE 0/0/1 as the primary
port and GE 0/0/2 as the secondary port.
l Configure UPE G.
# Configure UPE G as a transit node of ring 1 in domain 3 and specify primary and secondary
ports on UPE G.
[UPEG] rrpp domain 3
[UPEG-rrpp-domain-region3] ring 1 node-mode transit primary-port 0/0/1 secondary-
port 0/0/2 level 0
[UPEG-rrpp-domain-region3] ring 1 enable
[UPEG-rrpp-domain-region3] quit
l # Configure UPE B.
# Enable the RRPP protocol.
<UPEB> system-view
[UPEB] rrpp enable
l Configure UPE C.
# Enable the RRPP protocol.
[UPEC] rrpp enable
l Configure UPE D.
# Enable the RRPP protocol.
[UPED] rrpp enable
l Configure UPE E.
# Enable the RRPP protocol.
[UPEE] rrpp enable
l Configure UPE F.
# Enable the RRPP protocol.
[UPEF] rrpp enable
l Configure UPE G.
# Enable the RRPP protocol.
[UPEG] rrpp enable
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 M GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 M GigabitEthernet0/0/2 GigabitEthernet0/0/1 Yes
Domain Index : 3
Control VLAN : major 20 sub 21
Protected VLAN : Reference Instance 1 to 3
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
----------------------------------------------------------------------------
1 0 T GigabitEthernet0/0/3 GigabitEthernet0/0/4 Yes
The preceding information shows that the RRPP protocol is enabled on UPE D.
In domain 1:
VLAN 1 is the control VLAN and VLANs mapping instance 1 are the protected VLANs.
UPE D is the master on ring 1; GE 0/0/1 is the primary port; GE 0/0/2 is the secondary port.
In domain 2:
VLAN 10 is the control VLAN and VLANs mapping instance 2 are the protected VLANs.
UPE D is the master node on ring 1. The primary port is GE 0/0/21, and the secondary port is
GE 0/0/1.
In domain 3:
VLAN 20 is the control VLAN and VLANs mapping instance 1 to 3 are the protected VLANs.
UPE D is a transit node on ring 1. The primary port is GE 0/0/3, and the secondary port is GE
0/0/4.
l Run the display rrpp verbose domain command on UPE D. You can obtain the following
results:
# View detailed information about UPE D in domain 1.
[UPED] display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active: Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port : GigabitEthernet0/0/2 Port status: BLOCKED
The preceding information shows that VLAN 1 is the control VLAN in domain 1 and VLANs
mapping instance 1 are the protected VLANs.
UPE D is the master node in domain 1 and is in Complete state.
The primary port is GE 0/0/1, and the secondary port is GE 0/0/2.
# View detailed information about UPE D in domain 2.
[UPED] display rrpp verbose domain 2
Domain Index : 2
Control VLAN : major 10 sub 11
Protected VLAN : Reference Instance 2
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active: Yes
Primary port : GigabitEthernet0/0/2 Port status: UP
Secondary port : GigabitEthernet0/0/1 Port status: BLOCKED
The preceding information shows that VLAN 10 is the control VLAN in domain 2, and VLANs
mapping instance 2 are the protected VLANs.
UPE D is the master node in domain 2 and is in Complete state.
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active: Yes
Primary port : GigabitEthernet0/0/3 Port status: UP
Secondary port : GigabitEthernet0/0/4 Port status: UP
The preceding information shows that VLAN 20 is the control VLAN in domain 3 and VLANs
mapping instance 1 to 3 are the protected VLANs.
UPE D is a transit node in domain 3 and is in LinkUp state.
The primary port is GE 0/0/3, and the secondary port is GE 0/0/4.
----End
Configuration Files
l Configuration file of UPE A
#
sysname UPEA
#
vlan batch 5 to 6 10 to 11 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
return
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
Return
l Configuration file of UPE D
#
sysname UPED
#
vlan batch 5 to 6 10 to 11 20 to 21 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 to 6 100 to 200
instance 2 vlan 10 to 11 201 to 300
instance 3 vlan 20 to 21
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode master primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
rrpp domain 2
control-vlan 10
protected-vlan reference-instance 2
ring 1 node-mode master primary-port GigabitEthernet 0/0/2 secondary-port
GigabitEthernet 0/0/1 level 0
ring 1 enable
rrpp domain 3
control-vlan 20
protected-vlan reference-instance 1 2 3
ring 1 node-mode transit primary-port GigabitEthernet 0/0/3 secondary-port
GigabitEthernet 0/0/4 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 5 to 6 10 to 11 100 to 300
stp disable
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
interface GigabitEthernet0/0/4
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
return
l Configuration file of UPE E
#
sysname UPEE
#
vlan batch 20 to 21 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 20 to 21 100 to 300
active region-configuration
#
rrpp domain 3
control-vlan 20
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
return
l Configuration file of UPE F
#
sysname UPEF
#
vlan batch 20 to 21 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 20 to 21 100 to 300
active region-configuration
#
rrpp domain 3
control-vlan 20
protected-vlan reference-instance 1
ring 1 node-mode master primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
return
l Configuration file of UPE G
#
sysname UPEG
#
vlan batch 20 to 21 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 20 to 21 100 to 300
active region-configuration
#
rrpp domain 3
control-vlan 20
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 20 to 21 100 to 300
stp disable
#
return
This chapter describes the principle, configuration procedure, and configuration example of
Ethernet operations administration and maintenance (OAM).
If association between an EFM OAM module and an interface is configured on a device, when
the EFM OAM module detects a fault, the EFM OAM module on the local device sends a fault
notification message to the OAM management module and triggers the physical status of the
interface bound to the EFM OAM module to go Down. When the physical status of the interface
becomes Down, the OAM management module sends a fault notification message to the EFM
OAM module. Then the EFM OAM module encapsulates the fault notification message to an
OAMPDU and sends it to the remote device.
4.12 Configuring Association Between EFM OAM Modules
The association between EFM OAM modules is applicable to the scenario where EFM OAM is
configured on both ends of a device. When an EFM OAM module on one side detects a link
fault, the EFM OAM module on the local device sends a fault notification message to the OAM
management module. The OAM management module finds the outbound interface and sends
the fault notification message to the EFM OAM module on the other side. The fault notification
message is encapsulated in an OAMPDU, and then transmitted to the remote device.
4.13 Associating Ethernet CFM with an Interface
This section describes how to associate Ethernet CFM with an interface.
4.14 Configuring Association Between an Ethernet CFM Module and an Interface
If association between an Ethernet CFM module and an interface is configured on a device, when
Ethernet CFM detects a fault, the Ethernet CFM module on the local device sends a fault
notification message to the OAM management module and triggers the physical status of the
interface bound to the Ethernet CFM module to go Down. When the physical status of the
interface becomes Down, the OAM management module sends a fault notification message to
the Ethernet CFM module. Then the Ethernet CFM module encapsulates the fault notification
message to an OAMPDU and sends it to the remote device.
4.15 Associating EFM OAM with Ethernet CFM
This section describes how to associate EFM OAM with Ethernet CFM.
4.16 Configuring Association Between Ethernet CFM and Ethernet CFM
This section describes how to configure association between Ethernet CFM and Ethernet CFM.
4.17 Configuring Association Between Ethernet CFM and SEP
This section describes how to configure association between Ethernet CFM and SEP.
4.18 Configuring the One-way Frame Delay Measurement in a VLAN
You can configure the one-way frame delay measurement in the VLAN bound to an MA and
estimate the quality of services based on the calculated one-way frame delay.
4.19 Configuring the Two-way Frame Delay Measurement in a VLAN
You can configure the two-way frame delay measurement in the VLAN bound to an MA and
estimate the quality of services based on the calculated two-way frame delay.
4.20 Maintaining Ethernet OAM
This section describes how to debug EFM OAM and monitor the operation of Ethernet OAM.
4.21 Configuration Examples
This section provides several configuration examples of Ethernet OAM.
Background
Ethernet has developed as the major local area network (LAN) technology because of its low
costs and easy implementation. Recently, along with the applications of Gigabit Ethernet and
10-Gigabit Ethernet, Ethernet has extended into the metropolitan area network (MAN) and wide
area network (WAN).
Compared with MANs and WANs, LANs do not require high reliability and stability. The
Ethernet cannot function as the Internet service provider (ISP) network due to lack of an OAM
mechanism. Therefore, Ethernet OAM is becoming a trend.
Functions of OAM
Ethernet OAM improves the network management and maintenance capabilities on the Ethernet
and guarantees stability.
The functions of Ethernet OAM are as follows:
l Fault management
– OAM detects the network connectivity by sending detection packets at scheduled
intervals or through manual triggering.
– OAM locates faults on the Ethernet by using means similar to ping and traceroute tools
on IP networks.
– OAM works with the protection switching protocol and triggers protection switching
when a connectivity fault is detected. Service interruption can be limited to 50 ms or
shorter, which meets requirements for carrier-class operation.
l Performance management
Performance management is used to measure the packet loss ratio, delay, and jitter during
transmission of packets. It also collects statistics on various types of packets. Performance
management is performed at the user access points. By using performance management
tools, an ISP can monitor the network running status and locate faults through the NMS.
The ISP can then check whether the forwarding capacity of the network complies with the
Service Level Agreement (SLA).
EFM OAM
802.3ah, also referred to as Ethernet in the First Mile (EFM), defines the specifications of the
Ethernet physical layer and OAM used for user access. EFM OAM detects the link in the last
mile. EFM OAM is a link-level OAM mechanism. The S5300 provides the following EFM OAM
functions:
l Peer discovery
When the EFM OAM function is enabled on an interface of the S5300 and the peer interface,
the two interfaces match their EFM OAM configurations by sending and responding to
OAM Protocol Data Units (OAMPDUs). If the EFM OAM configurations on both
interfaces match, the two interfaces start the EFM OAM handshake. During the handshake,
the two interfaces send OAMPDUs periodically to maintain the neighbor relationship.
l Link monitoring
When an interface detects an errored frame event or an errored frame error seconds event,
the interface sends an OAMPDU to notify the peer device of the event.
– An errored frame event occurs when the number of errored frames detected on an
interface reaches or exceeds the specified threshold within a certain period.
– An errored code event occurs when the number of errored codes reaches or exceeds the
specified threshold within a certain period.
– An errored frame seconds occurs when that the number of errored frame seconds
detected on an interface reaches or exceeds the specified threshold within a certain
period.
The detection duration is measured in seconds. If at least one errored frame is detected
within a second, this second is called an errored frame second.
l Fault notification
When an errored frame event or severe fault event occurs on the local device, the local node
sends fault notification messages to notify the peer device. At the same time, the local
device records the fault event in the log and reports the fault to the NMS. Fault events
include the following:
– System reboot
– Fault of a physical link
– Timeout of OAMPDUs
– Errors reported by the OAM module
When receiving the notification message, the peer records the event contained in the
message to the log and reports it to the NMS.
l Remote loopback
When a local interface sends non-OAMPDUs to the peer, the peer does not forward the
non-OAMPDUs according to their destination MAC addresses. Instead, the peer loops back
non-OAMPDUs to the local interface. This is called remote loopback. Remote loopback
can be used to locate the link fault and test the link quality.
Each interface enabled with EFM OAM works in a certain mode. EFM OAM has two operation
modes: active mode and passive mode. OAM discovery and remote loopback are initiated only
by the interface in active mode.
Ethernet CFM
802.1ag, referred to as Connectivity Fault Management (CFM), defines the OAM function used
to detect the connectivity of the Ethernet bearer network.
Table 4-1 Differences between IEEE 802.1ag Draft 7 and IEEE Standard 802.1ag-2007
Feature draft7 standard2007 Remarks
l Terms
– MD
A maintenance domain (MD) is a network or a part of the network where CFM is
performed. Devices in an MD are managed by a single ISP.
– Default MD
According to IEEE Standard 802.1ag-2007, each device can be configured with one
default MD. The default MD must be of a higher level than all MDs to which MEPs
configured on the local device belong. In addition, the default MD must be of the same
level as the high-level MD. The default MD transmits high-level CCMs and creates
MIPs to reply LTR packets.
– MA
A maintenance association (MA) is a part of an MD. An MD can be divided into one
or multiple MAs. On the S5300, an MA is associated with a VLAN. Ethernet CFM
checks connectivity in each MA.
– MEP
A maintenance association end point (MEP) is an edge node of an MA.
For a network device running Ethernet CFM, its MEP is called the local MEP. For the
other devices in the same MA, their MEPs are called the remote maintenance association
end points (RMEPs).
CAUTION
One Trunk interface can be configured with only one MEP.
– MIP
A maintenance association intermediate point (MIP) is an internal node of an MA.
MIPs reside on the interfaces on the S5300 and are automatically created by the
S5300.
l Connectivity check
Ethernet CFM divides a network into one MD or multiple MDs. Each MD is divided into
one MA or multiple MAs. The MEPs in an MA exchange Continuity Check messages
(CCMs) periodically to detect the connectivity between them.
l Fault acknowledgement
– 802.1ag MAC ping
Similar to ping, 802.1ag MAC ping sends test packets and waits for a reply to test
whether the destination device is reachable. 802.1ag MAC ping is initiated by a MEP
and destined for a RMEP or MIP in the same MA.
– Gmac ping
Gmac ping works similarly to 802.1ag MAC ping. A MEP, however, is not required to
initiate Gmac ping. The destination node may not be a RMEP or a MIP. Gmac ping can
be implemented without configuring the MD, MA, or MEP on the source device, the
intermediate device, and the destination device.
l Fault location
– 802.1ag MAC trace
Similar to traceroute (or tracert for short), 802.1ag MAC trace sends test packets and
waits for a reply to test the path between the local device and the destination device and
to locate faults. 802.1ag MAC trace is initiated by a MEP and destined for a RMEP or
MIP in the same MA.
– Gmac trace
Gmac trace works similarly to 802.1ag MAC trace. A MEP, however, is not required
to initiate Gmac trace. The destination node may not be a RMEP or a MIP. That is,
Gmac trace can be implemented without configuring the MD, MA, or MEP on the source
device, the intermediate device, and the destination device. All the intermediate devices
can respond with a Linktrace Reply (LTR).
Fault Association
You can configure the following types of association between an EFM OAM module and an
interface.
l After EFM OAM detects a fault, the OAM management module blocks the interface
intermittently. That is, the module shuts down the interface for seven seconds, and then it
unblocks the interface.
l When EFM OAM detects a fault, the interface bound to the EFM OAM module is shut
down or a Port-Down event is sent. When the interface is Down, a fault notification message
is sent to the EFM OAM module of the peer device through association.
l Association between an EFM OAM module and an interface
After association between an EFM OAM module and an interface is configured, when the
EFM OAM module detects a link fault, no packets except OAMPDUs can be forwarded
through the bound interface, and Layer 2 and Layer 3 services are blocked. Therefore, the
association between an EFM OAM module and an interface may greatly affect services.
When the current interface detects link fault recovery through EFM OAM, all packets can
be forwarded on the interface and Layer 2 and Layer 3 services are unblocked.
In addition, you can configure the association between EFM OAM and an interface only
after EFM OAM at both ends are in detect state.
l Association between EFM OAM modules
After a fault is detected, the OAM management module transmits a fault notification
message through association.
– An EFM OAM module on an interface transmits a fault message to an EFM OAM
module on the other interface.
– EFM OAM modules on the two interfaces report faults to each other.
l Association between an Ethernet CFM module and an interface
You can configure the following types of association between an Ethernet CFM module
and an interface.
– When a connectivity fault is detected on the link between the MEP and the RMEP in
an MA, the OAM management module blocks the interface intermittently. That is, the
module shuts down the interface for seven seconds, and then unblocks the interface.
– After Ethernet CFM detects a fault, the interface associated with the Ethernet CFM
module is shut down or a Down event is sent. When the interface becomes Down, the
Ethernet CFM status bound to the interface also becomes Down.
l Association between an Ethernet CFM module and an EFM OAM module
When the Ethernet CFM module detects a fault in an MA, the OAM management module
reports the fault to the peer device enabled with EFM OAM through the interface. When
the EFM OAM module detects a fault, the OAM management module reports the fault to
the MA through the interface. The fault report mode can be the following:
– An Ethernet CFM module sends a fault notification message to an EFM OAM module.
– An EFM OAM module a fault notification message to an Ethernet CFM module.
– An Ethernet CFM module and an EFM OAM module report faults to each other.
l Association between Ethernet CFM modules
When the Ethernet CFM module detects a fault in an MA, the OAM management module
reports the fault to the bound MA at the other side. The fault report mode can be the
following:
– An Ethernet CFM module at one side sends a fault notification message to an Ethernet
CFM module at the other side.
– Ethernet CFM modules at both sides report faults to each other.
Applicable Environment
You can perform the configuration task to detect the connectivity between two directly connected
devices, as shown in Figure 4-1.
Figure 4-1 Networking diagram for configuring basic functions of EFM OAM
EFM OAM
interface 1 interface 2
(Active mode) (Passive mode)
Pre-configuration Tasks
None.
Data Preparation
To configure basic functions of EFM OAM, you need the following data.
No. Data
Procedure
Step 1 Run:
system-view
----End
The working mode of EFM OAM on the interface can be set only after EFM OAM is enabled globally and
before EFM OAM is enabled on the interface. The working mode of EFM OAM on an interface cannot be
changed after EFM OAM is enabled on the interface.
Procedure
Step 1 Run:
system-view
At least one interface at either end of the link must be configured to work in active mode. The
interface in active mode initiates OAM discovery after EFM OAM is enabled on the interface.
Instead of initiating OAM discovery, the interface in passive mode waits for an OAMPDU sent
from the interface in active mode. Interfaces on both ends of the link can work in active mode
at the same time, but they cannot work in passive mode at the same time because link detection
cannot be performed.
NOTE
You must run the bpdu enable command on the interface configured with EFM OAM to enable the BPDU
tunnel function; otherwise, OAM PDUs are discarded. By default, the BPDU tunnel function is disabled
on an interface.
----End
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run:
system-view
----End
Procedure
l Run the display efm { all | interface interface-type interface-number } command to check
information about EFM OAM on an interface.
l Run the display efm session { all | interface interface-type interface-number } command
to check the status of the EFM OAM protocol on an interface.
----End
Example
Run the display efm command, and you can view all the EFM OAM configurations on the local
interface and part of the EFM OAM configurations on the remote interface.
<Quidway> display efm interface gigabitethernet 0/0/1
Item Value
----------------------------------------------------
Interface: GigabitEthernet0/0/1
EFM Enable Flag: enable
Mode: active
OAMPDU MaxSize: 128
ErrCodeNotification: enable
ErrCodePeriod: 5
ErrCodeThreshold: 5
ErrFrameNotification: enable
ErrFramePeriod: 5
ErrFrameThreshold: 5
ErrFrameSecondNotification: enable
ErrFrameSecondPeriod: 120
ErrFrameSecondThreshold: 5
Hold Up Time: 0
ThresholdEvtTriggerErrDown: disable
TriggerIfDown: disable
TriggerMacRenew: disable
Remote MAC: 0018-2000-0083
Remote EFM Enable Flag: enable
Remote Mode: passive
Remote MaxSize: 128
Remote State: --
Run the display efm session command. If the EFM OAM protocol on the interface is in the
Detect state, it indicates that the configuration is successful, and the two interfaces succeed in
negotiation and starts the handshake.
<Quidway> display efm session interface gigabitethernet 0/0/1
Interface EFM State Loopback Timeout
--------------------------------------------------------------------
GigabitEthernet0/0/1 detect --
Applicable Environment
The link monitoring function is used to detect faults on the link layer. Event notification
OAMPDUs are used in link monitoring. When a fault is detected on the local link, the EFM
OAM module notifies the remote OAM entity of the fault by sending an event notification
OAMPDU.
Pre-configuration Tasks
Before configuring EFM OAM link monitoring, complete the following task:
Data Preparation
To configure EFM OAM link monitoring, you need the following data.
No. Data
1 (Optional) Period and threshold for detecting errored frames of EFM OAM
2 (Optional) Period and threshold for detecting errored frames of EFM OAM
3 (Optional) Period and threshold for detecting errored frame seconds of EFM OAM
Context
When an interface is enabled to report the errored frame event, the S5300 generates an errored
frame event and notifies the peer of the event, if the number of errored frames reaches or exceeds
the threshold within a certain period.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
efm error-frame period period
Step 4 Run:
efm error-frame threshold threshold
Step 5 Run:
efm error-frame notification enable
----End
Context
When an interface is enabled to report the errored code event of EFM OAM, the S9300 generates
an errored code event and notifies the peer if the number of errored codes within a set period
reaches or exceeds the threshold.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
efm error-code period period
Step 4 Run:
efm error-code threshold threshold
Step 5 Run:
efm error-code notification enable
----End
Context
The detection duration is measured in seconds. If at least one errored frame is detected within a
second, this second is call an errored frame second. EFM OAM counts the number of seconds
in which errored frames are detected within M seconds.
When an interface is enabled to report the errored frame seconds event, the S5300 generates an
errored frame seconds event and notifies the peer, if the number of errored frame seconds reaches
or exceeds the threshold within a set period.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
----End
Context
When an interface on a link is enabled to detect errored frames, errored codes, or errored frame
seconds, the link is considered unavailable, if the number of errored frames, errored codes, or
errored frame seconds detected by the interface reaches or exceeds the threshold within a set
period. The errored frame event, errored code event, and errored frame seconds summary event
are called threshold crossing events. In this case, you can associate a threshold crossing event
with the interface so that the system sets the administrative state of the interface to Down. As a
result, the link actually goes Down and all services on the interface are interrupted.
Do as follows on the device at one end or devices at both ends of a link:
Procedure
Step 1 Run:
system-view
----End
Follow-up Procedure
After a threshold crossing event is associated with an interface, you can configure the interface
to go administratively Up by using either of the following methods:
l Run the error-down auto-recovery cause efm-threshold-event interval interval-value
command in the system view to configure the interface to go administratively Up after the
auto-recovery delay.
l Run the shutdown command and then the undo shutdown command in the interface view
to restore the administrative state of the interface to Up.
Prerequisite
The configuration of the link monitoring function of EFM OAM is complete.
Procedure
Step 1 Run the display efm { all | interface interface-type interface-number } command to check
information about EFM OAM on an interface.
----End
Example
Run the display efm command, and you can view information about link monitoring on an
interface.
<Quidway> display efm interface gigabitethernet0/0/1
Item Value
----------------------------------------------------
Interface: GigabitEthernet0/0/1
EFM Enable Flag: enable
Mode: active
OAMPDU MaxSize: 128
ErrCodeNotification: enable
ErrCodePeriod: 5
ErrCodeThreshold: 5
ErrFrameNotification: enable
ErrFramePeriod: 5
ErrFrameThreshold: 5
ErrFrameSecondNotification: enable
ErrFrameSecondPeriod: 120
ErrFrameSecondThreshold: 5
Hold Up Time: 0
ThresholdEvtTriggerErrDown: disable
TriggerIfDown: disable
TriggerMacRenew: disable
Remote MAC: 0018-2000-0083
Remote EFM Enable Flag: enable
Remote Mode: passive
Remote MaxSize: 128
Remote State: --
CAUTION
The forwarding of service data is affected after remote loopback is enabled. Therefore, enable
the EFM OAM remote loopback on the link that does not need to forward service data.
Perform this configuration task when you need to detect the packet loss ratio on a link.
As shown in Figure 4-2, enable EFM OAM on Switch A and Switch B and enable remote
loopback on GE 0/0/1 on Switch A. Send test packets from Switch A to Switch B. You can
obtain the packet loss ratio on the link by observing the received test packets on Switch A.
Figure 4-2 Networking diagram for testing the packet loss ratio on the link
Test packets
EFM OAM
SwitchA SwitchB
GE 0/0/1 GE0/0/1
(Active mode) (Passive mode)
Pre-configuration Tasks
Before testing the packet loss ratio on a link, complete the following task:
Data Preparation
To test the packet loss ratio on the link, you need the following data.
No. Data
2 Destination MAC address, VLAN tag, outgoing interface, size, number, and sending
rate of test packets
Context
Do as follows on the S5300 with an active interface on the link.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
efm loopback start [ timeout timeout ]
Before changing the value of timeout timeout, run the efm loopback stop command to disable
remote loopback on the interface.
By default, the timeout period for remote loopback is 20 minutes. After 20 minutes, remote
loopback is disabled automatically. You can set the timeout period to 0 for a link to retain the
remote loopback state.
Remote loopback can be implemented only when the EFM OAM sessions on the local interface
and the peer are in handshake state and the local interface works in active mode. You can use
the display efm session command to check whether the EFM OAM sessions on the local
interface and the peer are in handshake state.
----End
Procedure
Step 1 Run:
system-view
----End
Follow-up Procedure
The parameters in this command cannot be modified when test packets are being sent.
Press Ctrl+C to stop sending test packets.
Procedure
Step 1 Run:
display test-packet result
You can obtain the packet loss ratio on the link based on the preceding data.
<Quidway> display test-packet result
TestResult Value
--------------------------------------------------------
PacketsSend : 5
PacketsReceive : 0
PacketsLost : 5
BytesSend : 320
BytesReceive : 0
BytesLost : 320
StartTime : 08-03-2009 20:41:14 UTC+03:00
EndTime : 08-03-2009 20:41:21 UTC+03:00
----End
Context
Do as follows on the S5300 with an active interface on the link.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
efm loopback stop
Users may forget to disable EFM OAM remote loopback, which causes the link to fail to forward
service data for a long time. To avoid this, the S5300 automatically disables EFM OAM remote
loopback when remote loopback times out. By default, the timeout period of remote loopback
is 20 minutes. After 20 minutes, remote loopback stops. If you need to disable remote loopback
manually, perform the preceding configuration steps.
----End
Procedure
Step 1 Run the display efm session { all | interface interface-type interface-number } command to
check the status of the EFM OAM session on an interface.
----End
Example
Run the display efm session command on the device with an active interface on the link. If the
EFM OAM protocol on the active interface is in the Loopback (control) state, which indicates
that the active interface initiates remote loopback, it indicates that the configuration is successful.
<SwitchA> display efm session interface gigabitethernet 0/0/1
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet0/0/1 Loopback(control) 20
Run the display efm session command on the device with a passive interface on the link. If the
EFM OAM protocol on the passive interface is in the Loopback (be controlled) state, which
indicates that the passive interface responds to remote loopback, it indicates that the
configuration is successful.
<SwitchB> display efm session interface gigabitethernet 0/0/1
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet0/0/1 Loopback(be controlled) --
Run the display efm session command on either of the devices on the link. If the EFM OAM
protocol on the interface is in the Detect or Discovery state, it indicates that the configuration is
successful.
<SwitchA> display efm session interface gigabitethernet 0/0/1
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet0/0/1 detect --
Applicable Environment
You can perform this configuration task to implement the following functions on the Ethernet:
To implement automatic end-to-end connectivity detection on the Ethernet, you need to perform
the following:
l Classify MDs based on the ISPs that manage the devices. All the devices that are managed
by a single ISP and enabled with CFM are added to the same MD.
l Classify MAs based on service instances. Associate each MA with a VLAN. A VLAN
generally maps to a service instance. When MAs are classified, connectivity faults can be
detected on the network where a service instance is transmitted.
l Determine the interfaces at the edge of the MA, that is, determine the interfaces where
MEPs must be configured.
When implementing automatic connectivity detection on direct links, you need to perform the
following:
l Add the devices at both ends of the link to the same MA in an MD.
l Associate the MA with a VLAN.
l Configure MEPs on the interfaces at both ends of the direct link.
Pre-configuration Tasks
None.
Data Preparation
To configure basic functions of Ethernet CFM, you need the following data.
No. Data
3 ID of a MEP, name of the interface on which the MEP is configured, and type of the
MEP
4 (Optional) ID of an RMEP and bridge MAC address of the device on which the RMEP
is configured
Context
By default, IEEE 802.1ag Draft 7 is enabled on a device. To use IEEE Standard 802.1ag-2007,
do as follows on each S5300.
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm version { draft7 | standard }
CAUTION
After the IEEE 802.1ag version is changed, the original CFM configuration will be deleted.
Therefore, use this command with caution.
NOTE
All the devices on the entire network must use either IEEE 802.1ag Draft 7 or IEEE Standard 802.1ag-2007.
IEEE 802.1ag Draft 7 and IEEE Standard 802.1ag-2007 cannot be enabled together on a network.
----End
Context
Do as follows on the S5300 that requires Ethernet CFM.
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm enable
----End
4.6.4 Creating an MD
Context
Do as follows on the S5300 where Ethernet CFM needs to be configured.
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name [ format { no-md-name | dnsname-and-mdname | mac-address | md-
name } ] [ level level ]
After an MD is created, its parameters cannot be modified. To modify the parameters, delete the
MD and create a new one.
NOTE
The 802.1ag packets from a low-level MD are discarded in a high-level MD. The 802.1ag packets from a
high-level MD can be transmitted through a low-level MD.
----End
Context
Do as follows on each S5300 where Ethernet CFM needs to be configured.
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm default md [ level level ]
After the default MD is created, its parameters cannot be modified. To modify the parameters,
delete the default MD and create a new one.
NOTE
The default MD must be of a higher level than all MDs that MEPs configured on the local device belong
to. In addition, the default MD must be of the same level as the high-level MD. The default MD transmits
high-level CCMs and creates MIPs to send LTRs.
NOTE
IEEE 802.1ag has two versions, that is, IEEE 802.1ag Draft 7 and IEEE Standard 802.1ag-2007. The cfm
default md command can be used only on the device complying with IEEE Standard 802.1ag-2007. Before
using the cfm default md command, you must use the cfm version command to set the IEEE 802.1ag
version to IEEE Standard 802.1ag-2007.
----End
4.6.6 Creating an MA
Context
Do as follows on the S5300 that requires Ethernet CFM.
Procedure
Step 1 Run:
system-view
NOTE
Step 4 (Optional)Run:
map vlan vlan-id
----End
Follow-up Procedure
Perform the preceding steps as required:
l To create multiple MAs in an MD, repeat Step 3 and Step 4.
l To create MAs in multiple MDs, repeat Step 2 to Step 4.
Procedure
Step 1 Run:
system-view
----End
Follow-up Procedure
Perform the preceding steps as required:
l To create multiple MEPs in an MA, repeat Step 4.
l To create MEPs in multiple MAs, repeat Step 3 and Step 4.
l To create MEPs in multiple MDs, repeat Step 2 to Step 4.
Procedure
Step 1 Run:
system-view
----End
Follow-up Procedure
Perform the preceding steps as required:
l To create multiple RMEPs in an MA, repeat Step 4.
l To create RMEPs in multiple MAs, repeat Step 3 to Step 4.
l To create multiple RMEPs in multiple MDs, repeat Step 2 and Step 4.
Procedure
Step 1 Run:
system-view
l Run the following command to set the MIP creation rule in accordance with IEEE 802.1ag
Draft 7.
Run:
mip create-type { default | explicit | none } [ interface interface-type
interface-number ]
The MIP creation rule in accordance with IEEE 802.1ag Draft 7 is set.
l Run the following commands to set the MIP creation rule in accordance with IEEE Standard
802.1ag-2007.
1. Run:
cfm md md-name [ format { no-md-name | dnsname-and-mdname | mac-address |
md-name } ] [ level level ]
l default: A MIP can be created on an interface if neither a MEP of a higher level nor a MIP
of a lower level is configured on the interface.
l explicit: A MIP cannot be created on an interface if no MEP of a lower level exists. A MIP
can be created on an interface if neither a MEP of a higher level nor a MIP of a lower level
exists.
l none: A MIP cannot be created on the interface that the MD or default MD belongs to.
If the MIP creation rule is default or explicit, a device creates a MIP automatically according
to the rule.
The level of a MIPs depends on the MIP creation rule and the level of the MD where MIPs are
created.
----End
Procedure
Step 1 Run:
system-view
The interval at which the MEP sends or detects CCMs in the local MA is set.
By default, the MEP sends or detects CCMs every 1 second.
Do not change the interval for sending or detecting CCMs in an MA if:
l The sending of CCMs is enabled by using the mep ccm-send enable command in the MA.
l The receiving of CCMs is enabled by using the remote-mep ccm-receive enable command
in the MA.
To change the interval for sending or detecting CCMs in an MA, you must run the related undo
commands to disable the sending or receiving of CCMs.
Step 5 Run:
mep ccm-send [ mep-id mep-id ] enable
The local MEP is enabled to receive CCM packets from the RMEP in the same MA.
By default, the local MEP cannot receive CCMs from the RMEP.
When the local device is enabled to receive CCMs from an RMEP, and if a connectivity fault
is detected between the local device and the RMEP through continuity check, the local device
generates an alarm of RMEP connectivity.
If mep-id mep-id is not specified, the MEP is enabled to receive CCMs from all the RMEPs in
the same MA.
----End
Follow-up Procedure
Perform the preceding steps as required:
Context
Do as follows on the device where a VLAN needs to be created.
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm default md [ level level ]
Step 3 Run:
vlan { vlan-id1 [ to vlan-id2 ] }&<1-10>
A VLAN is created.
NOTE
IEEE 802.1ag has two versions, that is, IEEE 802.1ag Draft 7 and IEEE Standard 802.1ag-2007. The cfm
default md command can be used only on the device complying with IEEE Standard 802.1ag-2007. Before
using the cfm default md command, you must use the cfm version command to set the IEEE 802.1ag
version to IEEE Standard 802.1ag-2007.
----End
Prerequisite
The configurations of basic functions of Ethernet CFM are complete.
Procedure
l Run the display cfm md [ md-name ] command to check the configuration of an MD.
l Run the display cfm ma [ md md-name [ ma ma-name ] ] command to check detailed
information about an MA.
l Run the display cfm mep [ md md-name [ ma ma-name [ mep-id mep-id ] ] ] command
to check detailed information about a MEP.
l Run the display cfm remote-mep md md-name ma ma-name [ mep-id mep-id ] or display
cfm remote-mep [ md md-name [ ma ma-name ] ] [ cfm-state { up | down | disable } ]
command to check detailed information about an RMEP.
l Run the display mip create-type [ interface interface-type interface-number ] command
to check the MIP creation rule.
l Run the display cfm mip [ interface interface-type interface-number | level level ]
command to check information about a MIP.
----End
Example
# In IEEE 802.1ag Draft 7, If an MD is created successfully, you can view the MD and the level
of the MD after running the display cfm md command.
<Quidway> display cfm md
The total number of MDs is : 1
MD-Name Level
--------------------------------------------------
md1 0
In IEEE Standard 802.1ag-2007, if an MD is created successfully,you can view the MD and the
level of the MD after running the display cfm md command.
<Quidway> display cfm md md1
MD Name : md1
MD Name Format : md-name
Level : 0
MIP Create-type : none
SenderID TLV-type : defer
MA list :
MA Name : ma1
Interval : 1000
Vlan ID : 10
VSI Name : --
MA Name : ma
Interval : 1000
Vlan ID : --
VSI Name : --
In IEEE 802.1ag Draft 7, If an MA is created successfully, you can view information about the
MA after running the display cfm ma command.
<Quidway> display cfm ma
The total number of MAs is : 1
--------------------------------------------------
MD Name : md1
Level : 0
MA Name : ma1
Interval : 1000
Priority : 6
Vlan ID : --
VSI Name : --
MEP Number : 0
RMEP Number : 0
In IEEE 802.1ag Draft 7, If a MEP is created successfully, you can view information about the
MEP after running the display cfm mep command.
<Quidway> display cfm mep
The total number of MEPs is : 2
--------------------------------------------------
MD Name : md2
Level : 7
MA Name : ma3
MEP ID : 40
Vlan ID : 10
VSI Name : --
Interface Name : GigabitEthernet0/0/1
CCM Send : enabled
Direction : outward
# In IEEE Standard 802.1ag-2007, display information about the MEP with the ID being 10 in
ma1 of md1.
<Quidway> display cfm mep md md1 ma ma1 mep-id 10
MD Name : md1
MD Name Format : md-name
Level : 0
MA Name : ma1
MEP ID : 11
Vlan ID : 221
VSI Name : --
Interface Name : GigabitEthernet0/0/1
CCM Send : disabled
Direction : inward
MAC Address : 0018-2000-0083
Run the display cfm remote-mep command. If information about the RMEP is displayed, it
indicates that the configuration is successful.
<Quidway> display cfm remote-mep
The total number of RMEPs is : 2
The status of RMEPS : 2 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md2
Level : 7
MA Name : ma3
RMEP ID : 110
Vlan ID : 20
VSI Name : --
MAC : 0000-0121-0222
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
MD Name : md2
Level : 4
MA Name : ma3
RMEP ID : 30
Vlan ID : --
VSI Name : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
In IEEE 802.1ag Draft 7,run the display mip create-type command. If the MIP creation rule is
correct, it indicates that the configuration is successful.
<Quidway> display mip create-type interface gigabitethernet0/0/1
Interface Name MIP Create-Type MIP Create-Type On Interface
---------------------------------------------------------------------------
GigabitEthernet0/0/1 none --
Run the display cfm mip command. If information about the MIP is displayed, it indicates that
the configuration is successful.
<Quidway> display cfm mip
Interface Name Level
-----------------------------------
GigabitEthernet0/0/1 0
Applicable Environment
If Ethernet CFM is enabled, you can adjust related parameters. According to different application
environments, you can adjust the following parameters:
All interfaces of the specified VLAN generate MIPs according to the MIP creation rule in
the MD.
Pre-configuration Tasks
None.
Data Preparation
To adjust parameters of Ethernet CFM, you need the following data.
No. Data
Context
Do as follows on edge devices of an MA.
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
active time time
The activation time for receiving CCMs from the RMEP is set.
By default, the activation time for receiving CCMs from the RMEP is 0s.
If an RMEP is configured in an MA, the activation time cannot be set for the RMEP.
NOTE
IEEE 802.1ag has two versions, that is, IEEE 802.1ag Draft 7 and IEEE Standard 802.1ag-2007. The active
time time command can be used only on the device complying with IEEE Standard 802.1ag-2007. Before
using the active time time command, you must use the cfm version command to set the Ethernet CFM
version to IEEE Standard 802.1ag-2007.
----End
Context
Do as follows on the device where the anti-jitter time during alarm restoration needs to be set.
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
alarm finish time time
NOTE
IEEE 802.1ag has two versions, that is, IEEE 802.1ag Draft 7 and IEEE Standard 802.1ag-2007. The alarm
finish time time command can be used only on the device complying with IEEE Standard 802.1ag-2007.
Before using the alarm finish time time command, you must use the cfm version command to set the
Ethernet CFM version to IEEE Standard 802.1ag-2007.
----End
Context
Do as follows on the device where the anti-jitter time during alarm generation needs to be set.
Procedure
Step 1 Run:
system-view
NOTE
IEEE 802.1ag has two versions, that is, IEEE 802.1ag Draft 7 and IEEE Standard 802.1ag-2007. The alarm
occur time time command can be used only on the device complying with IEEE Standard 802.1ag-2007.
Before using the alarm occur time time command, you must use the cfm version command to set the
Ethernet CFM version to IEEE Standard 802.1ag-2007.
----End
Pre-configuration Tasks
Before performing 802.1ag MAC ping, complete the following task:
Data Preparation
To test connectivity of the Ethernet, you need the following data.
No. Data
3 (Optional) Number, size, timeout period, and outgoing interface of MAC ping packets
Context
Do as follows on the S5300 at one end of the link to be tested. Ensure that a MEP is created on
the S5300.
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
ping mac-8021ag { mac mac-address | remote-mep mep-id mep-id } [ pe-vid pe-vid ce-
vid ce-vid ] [ -c count | interface interface-type interface-number | -s
packetsize | -t timeout ] *
802.1ag MAC ping is performed to check connectivity of the link between the S5300 and the
specified RMEP or MIP.
When implementing 802.1ag MAC ping, pay attention to the following points:
An intermediate device on a link is only used to forward LBMs and LBR messages; therefore,
the intermediate device does not need to be configured with the MD, MA, or MEP.
----End
Context
Perform step 1 and step 2 on the S5300s at both ends of the link to be tested. Perform step 3 on
either of the S5300s.
Procedure
Step 1 Run:
system-view
Step 2 Run:
ping mac enable
Step 3 Run:
ping mac mac-address vlan vlan-id [ interface interface-type interface-number | -c
count | -s packetsize | -t timeout ] *
Gmac ping is performed to check connectivity of the link between the S5300 and the remote
device.
Gmac ping does not need to be initiated by a MEP, and the destination node may not be a MEP
or a MIP. That is, Gmac ping can be implemented without configuring the MD, MA, or MEP
on the source device, the intermediate device, or the destination device.
The two devices must be configured with IEEE 802.1ag of the same version. If the local device
is configured with IEEE 802.1ag Draft 7 and the peer device is configured with IEEE Standard
802.1ag-2007, when you use the ping mac command to check the connection between the local
device and the peer device, the local device cannot ping the peer device.
----End
Applicable Environment
By sending test packets on the local device and checking the received response packets, you can
check the reachability of the path from the local device to the destination device and locate the
faulty node on the path. You can use different methods according to the type of the link to be
tested:
l To locate faults on the link between MEPs or between a MEP and a MIP in the same MA
on a network where MDs, MAs, and MEPs are configured, use 802.1ag MAC trace.
l To locate faults on the link between two devices on a network where MDs, MAs, or MEPs
are not configured, use the Gmac trace.
Pre-configuration Tasks
Before performing 802.1ag MAC trace, complete the following task:
l Configuring Basic Ethernet CFM Functions
Data Preparation
To perform 802.1ag MAC trace, you need the following data.
No. Data
Context
Do as follows on the S5300 at one end of the link to be tested. Ensure that a MEP is created on
the S5300.
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
trace mac-8021ag { mac mac-address | remote-mep mep-id mep-id } [ pe-vid pe-vid ce-
vid ce-vid ] [ interface interface-type interface-number | -t timeout | ttl ttl ]
*
802.1ag MAC trace is performed to locate faults on the link between the S5300 and the specified
RMEP or MIP.
When performing 802.1ag MAC trace, pay attention to the following points:
----End
Context
Do as follows on all the S9300s on the tested link.
Procedure
l Configuring the S5300s on both ends of a link and intermediate S5300s
Do as follows on the S5300s on both ends of the link to be tested and intermediate
S5300s.
1. Run:
system-view
Gmac trace is performed to locate the faults on the link between the S5300 and the
remote device.
A MEP is not required to initiate Gmac trace, and the destination node may not be a
MEP or a MIP. That is, Gmac trace can be implemented without configuring the MD,
MA, or MEP on the source device, the intermediate device, and the destination device.
All the intermediate devices respond to the Gmac trace packets with LTR messages.
The two devices must be configured with IEEE 802.1ag of the same version. If the
local device is configured with IEEE 802.1ag Draft 7 and the peer device is configured
with IEEE Standard 802.1ag-2007, when you use the trace mac command to check
the connection between the local device and the peer device, the local device cannot
ping the peer device.
----End
Pre-configuration Tasks
Before associating EFM OAM with an interface, complete the following task:
l 4.3 Configuring Basic Functions of EFM OAM
Data Preparation
To associate EFM OAM with an interface, you need the following data.
No. Data
Procedure
l Run:
system-view
Context
Do as follows on the device at one end or devices at both ends of a link:
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run the display efm { all | interface interface-type interface-number } command to check
information about EFM OAM on an interface.
----End
Example
If EFM OAM is associated with an interface in the interface view, you can find that
TriggerIfDown is displayed as enable after running the display efm command.
<Quidway> display efm interface gigabitethernet0/0/1
Item Value
----------------------------------------------------
Interface: GigabitEthernet0/0/1
EFM Enable Flag: enable
Mode: active
OAMPDU MaxSize: 128
ErrCodeNotification: enable
ErrCodePeriod: 5
ErrCodeThreshold: 5
ErrFrameNotification: enable
ErrFramePeriod: 5
ErrFrameThreshold: 5
ErrFrameSecondNotification: enable
ErrFrameSecondPeriod: 120
ErrFrameSecondThreshold: 5
Hold Up Time: 0
ThresholdEvtTriggerErrDown: disable
TriggerIfDown: enable
TriggerMacRenew: disable
Remote MAC: 0018-2000-0083
Remote EFM Enable Flag: enable
Remote Mode: passive
Remote MaxSize: 128
Remote State: --
Applicable Environment
As shown in Figure 4-4, PE1 and PE2 are enabled with EFM OAM. When the link between
PE1 and PE2 is faulty, CEs need to detect faults to ensure the reliability of service transmission.
In this case, you can configure association between an EFM OAM module and an interface on
PE1 and PE2. Take PE2 as an example. When EFM OAM detects a link fault, the EFM OAM
module on PE2 sends a fault notification message to the OAM management module and triggers
the physical status of GE 1/0/2 bound to the EFM OAM module to go Down. Then CE2 detects
the link fault. The reliability of service transmission is thus ensured.
Figure 4-4 Networking diagram for configuring association between an EFM OAM module and
an interface
GE0/0/1 GE0/0/1
GE0/0/2 GE0/0/2
CE1 CE2
If an EFM OAM module and an interface are configured to report faults to each other on PE1
and PE2, when GE 0/0/2 connecting PE2 and CE2 becomes Down, the OAM management
module sends a fault notification message to the EFM OAM module bound to GE 0/0/2. The
fault notification message is encapsulated into an OAMPDU and sent to PE1. After receiving
the OAMPDU, the OAM management module on PE1 triggers the physical status of GE 0/0/2
to go Down. Then CE2 detects the fault. The reliability of service transmission is thus ensured.
Pre-configuration Tasks
Before configuring association between an EFM OAM module and an interface in the OAM
management view, complete the following tasks:
Data Preparation
To configure association between an EFM OAM module and an interface in the OAM
management view, you need the following data.
No. Data
1 Type and number of the interface associated with an EFM OAM module
Context
To configure association between an EFM OAM module and an interface, perform steps 3 and
4 or perform step 5.
Do as follows on the device where association between an EFM OAM module and an interface
needs to be configured.
Procedure
Step 1 Run:
system-view
Step 2 Run:
oam-mgr
Step 3 Run:
oam-bind ingress efm interface interface-type1 interface-number1 trigger if-down
egress interface interface-type2 interface-number2
When an EFM OAM module detects a fault, the physical status of the interface bound to the
EFM OAM module becomes Down.
interface interface-type1 interface-number1: specifies the interface enabled with EFM OAM.
Step 4 Run:
oam-bind ingress interface interface-type1 interface-number1 egress efm interface
interface-type2 interface-number2 trigger if-down
When an interface bound to an EFM OAM module becomes Down, the OAM management
module sends a fault notification message to the bound EFM OAM module. Then the fault
notification message is encapsulated into an OAMPDU and sent to the remote device.
interface interface-type2 interface-number2: specifies the interface enabled with EFM OAM.
Step 5 Run:
oam-bind efm interface interface-type1 interface-number1 trigger if-down interface
interface-type2 interface-number2
An EFM OAM module and an interface are configured to report faults to each other.
interface interface-type1 interface-number1: specifies the interface enabled with EFM OAM.
NOTE
If you perform step 5, two records of the oam-bind ingress efm interface interface-type1 interface-
number1 trigger if-down egress interface interface-type2 interface-number2 and oam-bind ingress
interface interface-type1 interface-number1 egress efm interface interface-type2 interface-number2
trigger if-down commands are displayed. In the records, the directions where fault notification messages
are transmitted are reverse.
----End
Prerequisite
The configurations of association between an EFM OAM module and an interface are complete.
Procedure
Step 1 Run the display this command in the OAM management view to check whether association
between an EFM OAM module and an interface is configured successfully.
----End
Example
Run the display this command, and you can view association between an EFM OAM module
and an interface.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress interface GigabitEthernet0/0/1 egress efm interface
GigabitEthernet0/0/2 trigger if-down
oam-bind ingress efm interface GigabitEthernet0/0/2 trigger if-down egress
interface GigabitEthernet0/0/1
#
return
Applicable Environment
EFM OAM is used to detect faults on a link between directly connected devices. As shown in
Figure 4-5, EFM OAM is configured between Switch1 and Switch2, and between Switch2 and
Switch3. When the link between Switch2 and Switch3 is faulty, Switch1 needs to detect faults
to ensure the reliability of service transmission. In this case, you can configure association
between EFM OAM modules. When EFM OAM between Switch2 and Switch3 detects faults
on the link, the EFM OAM modules on Switch2 send a fault notification message to the OAM
management module. The OAM management module finds the outbound interface GE 0/0/3
and sends the fault notification message to the EFM OAM module on the other side. The EFM
OAM module encapsulates the fault notification message in an OAMPDU and sends it to
Switch1. In this manner, the reliability of service transmission is improved.
Figure 4-5 Networking diagram for configuring association between EFM OAM modules
EFM OAM EFM OAM
Pre-configuration Tasks
Before configuring association between EFM OAM modules, complete the following task:
l 4.3 Configuring Basic Functions of EFM OAM
Data Preparation
To configure association between EFM OAM modules, you need the following data.
No. Data
Context
In the procedure for configuring association between EFM OAM modules, steps 3 and 4 are
optional, and can be selected as required.
Do as follows on the device where association between EFM OAM modules needs to be
configured.
Procedure
Step 1 Run:
system-view
An EFM OAM module is configured to report faults to another EFM OAM module.
Step 4 Run:
oam-bind efm interface interface-type interface-number efm interface interface-
type interface-number
NOTE
If you perform step 4, two records of the oam-bind ingress efm interface interface-type interface-
number egress efm interface interface-type interface-number command are displayed. In the records, the
directions where fault notification messages are transmitted are reverse.
----End
Prerequisite
The configurations of association between EFM OAM modules are complete.
Procedure
l Run the display this command in the OAM management view to check whether association
between EFM OAM modules is configured.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet0/0/1 egress efm interface
GigabitEthernet0/0/2
oam-bind ingress efm interface GigabitEthernet0/0/2 egress efm interface
GigabitEthernet0/0/1
#
return
----End
Applicable Environment
After association between an Ethernet CFM module and an interface is configured, if a MEP
detects a connectivity fault between the MEP and a specified RMEP in the same MA, the OAM
management module blocks and then unblocks the interface where the MEP is located so that
other modules can detect the fault.
Figure 4-6 Application scenario of association between an Ethernet CFM module and an
interface (1)
Ethernet CFM
GE0/0/1 GE0/0/1
SwitchA SwitchB
The interface associated with Ethernet CFM
Figure 4-7 Application scenario of association between an Ethernet CFM module and an
interface (2)
Ethernet CFM
Figure 4-6 and Figure 4-7 show the application of CFM on a direct link and a multi-hop link
respectively. Ethernet CFM is configured between SwitchA and SwitchB, and the Ethernet CFM
module is associated with GE 0/0/1 of SwitchA. When the CFM OAM module on SwitchA
detects a connectivity fault between SwitchA and SwitchB, the OAM management module
blocks and then unblocks GE 0/0/1 so that the other interfaces on SwitchA can detect the fault.
Figure 4-8 Application scenario of association between an Ethernet CFM module and an
interface (3)
Ethernet CFM
GE0/0/1 Link1 GE0/0/1
GE0/0/2 Link2 GE0/0/2
SwitchA SwitchB
Link3
GE0/0/3 GE0/0/3
Active link
Inactive link MEPs in MA1
MEPs in MA2
Aggregation group in MEPs in MA3
static LACP mode
A link aggregation group (LAG) in static LACP mode is configured on SwitchA and SwitchB.
Ethernet CFM is enabled on SwitchA and SwitchB; SwitchA and SwitchB belong to the same
MD; MEPs are configured on all the member interfaces of the LAG; MEPs on the interfaces of
the same link belong to the same MA; MEPs on interfaces on different links belong to different
MAs. MEPs at both ends of a link sends CCMs to check connectivity of the link. The association
between an Ethernet CFM module and an interface is configured.
When a connectivity fault occurs on Link1, the OAM modules on SwitchA and SwitchB block
and unblock their GE 0/0/1 interfaces respectively. In this manner, the LACP module detects
the connectivity fault on Link1 and switches the service data from Link1 to the inactive Link3.
This implements protection switching within 50 ms to achieve carrier-class reliability.
Figure 4-9 Application scenario of association between an Ethernet CFM module and an
interface (4)
SwitchC
GE0/0/1 GE0/0/2
M Ethe
rn et C F rn et C
GE0/0/1 Ethe FM GE0/0/1
Eth-Trunk1 Eth-Trunk1
SwitchA SwitchB
GE0/0/2 Ethe FM GE0/0/2
rnet C
CFM rnet
Ethe
GE0/0/1 GE0/0/2
SwitchD
Aggregation group in 1:1 Active link MEPs in MA1
active/standby mode Inactive link MEPs in MA2
MEPs in MA3
MEPs in MA4
An LAG in 1:1 backup mode is configured on SwitchA and SwitchB. Ethernet CFM is
configured between SwitchA and SwitchC, SwitchA and SwitchD, SwitchB and SwitchC, and
SwitchB and SwitchD. The Ethernet CFM modules are associated with GE 0/0/1 and GE
0/0/2 respectively on SwitchA and SwitchB.
When a connectivity fault occurs on the link between SwitchA and SwitchC, the Ethernet CFM
module detects the fault and reports the fault to the OAM management module. The OAM
management module blocks and then unlocks GE 0/0/1. Then the LAG detects the fault and
switches data to the inactive link. The process of handling faults on other links is similar to that
on the link between SwitchA and SwitchC. This implements protection switching within 50 ms
to achieve carrier-class reliability.
Pre-configuration Tasks
Before configuring association between an Ethernet CFM module and an interface, complete
the following tasks:
l Configuring an LAG
l 4.6 Configuring Basic Functions of Ethernet CFM
Data Preparation
To configure association between an Ethernet CFM module and an interface, you need the
following data.
No. Data
Procedure
l Configuring association between an Ethernet CFM module and an interface in the interface
view
1. Run:
system-view
An interface can be configured with only one RMEP. To change the association of an
interface with an MA and an RMEP, you need to delete the current association and
configure an association again.
If multiple member interfaces exist in an LAG, repeat step 2 and step 3 to associate
an Ethernet CFM module with all the member interfaces.
4. Run:
cfm md md-name ma ma-name trigger clear-arp vlan vlan-id
When the CFM module detects a fault, it notifies the OAM management module of
the fault. The OAM management module searches the CFM fault relationship table
according to the interface and VLAN ID, and then clears the ARM entry that
corresponds to the VLANIF interface.
----End
Prerequisite
The configuration of association between Ethernet CFM and an interface is complete.
Procedure
Step 1 Run the display cfm remote-mep md md-name ma ma-name mep-id mep-id command to check
detailed information about an RMEP.
----End
Example
Run the display cfm remote-mep command. If the Trigger If-down field for the RMEP is
displayed as enable, it indicates that the configuration is successful.
<Quidway> display cfm remote-mep
The total number of RMEPs is 2
The status of RMEPS : 2 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md1
Level : 4
MA Name : ma1
RMEP ID : 50
Vlan ID : 10
VSI Name : --
MAC : 0000-0121-0222
CCM Receive : enabled
Trigger-If-Down : enabled
CFM Status : up
MD Name : md2
Level : 7
MA Name : ma1
RMEP ID : 30
Vlan ID : --
VSI Name : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : enabled
CFM Status : up
Applicable Environment
As shown in Figure 4-10, PE1 and PE2 are enabled with Ethernet CFM. When the link between
PE1 and PE2 is faulty, CEs need to detect faults to ensure the reliability of service transmission.
In this case, you can configure association between an Ethernet CFM module and an interface
on PE1 and PE2. Take PE2 as an example. When Ethernet CFM detects a link fault, the Ethernet
CFM module on PE2 sends a fault notification message to the OAM management module and
triggers the physical status of GE 0/0/2 bound to the Ethernet CFM module to go Down. Then
CE2 detects the link fault. The reliability of service transmission is thus ensured.
Figure 4-10 Networking for configuring association between an Ethernet CFM module and an
interface
GE0/0/1 GE0/0/1
GE0/0/2 GE0/0/2
CE1 CE2
If an Ethernet CFM module and an interface are configured to report faults to each other on PE1
and PE2, when GE 0/0/2 connecting PE2 and CE2 becomes Down, the OAM management
module sends a fault notification message to the Ethernet CFM module bound to GE 0/0/2. The
fault notification message is encapsulated into a CFM protocol packet and sent to PE1. After
receiving the CFM protocol packet, the OAM management module on PE1 triggers the physical
status of GE 0/0/2 to go Down. Then CE2 detects the fault. The reliability of service transmission
is thus ensured.
Pre-configuration Tasks
Before configuring association between an Ethernet CFM module and an interface in the OAM
management view, complete the following task:
Data Preparation
To configure association between an Ethernet CFM module and an interface in the OAM
management view, you need the following data.
No. Data
1 Type and number of the interface associated with an Ethernet CFM module
No. Data
Context
To configure association between an Ethernet CFM module and an interface, perform steps 3
and 4 or perform step 5.
Do as follows on the device where association between an Ethernet CFM module and an interface
needs to be configured.
Procedure
Step 1 Run:
system-view
Step 2 Run:
oam-mgr
Step 3 Run:
oam-bind ingress cfm md md-name ma ma-name trigger if-down egress interface
interface-type interface-number
When an Ethernet CFM module detects a fault, the physical status of the interface bound to the
Ethernet CFM module is triggered to go Down.
Step 4 Run:
oam-bind ingress interface interface-type interface-number egress cfm md md-name
ma ma-name trigger if-down
When an interface bound to an Ethernet CFM module becomes Down, the OAM management
module sends a fault notification message to the bound Ethernet CFM module. Then the fault
notification message is encapsulated into a CFM protocol packet and sent to the remote device.
Step 5 Run:
oam-bind cfm md md-name ma ma-name trigger if-down interface interface-type
interface-number
An Ethernet CFM module and an interface are configured to report faults to each other.
NOTE
If you perform step 5, two records of the oam-bind ingress cfm md md-name ma ma-name trigger if-
down egress interface interface-type interface-number and oam-bind ingress interface interface-type
interface-number egress cfm md md-name ma ma-name trigger if-down commands are displayed. In the
records, the directions where fault notification messages are transmitted are reverse.
----End
Prerequisite
The configurations of association between an Ethernet CFM module and an interface are
complete.
Procedure
Step 1 Run the display this command in the OAM management view to check whether association
between an Ethernet CFM module and an interface is configured successfully.
----End
Example
Run the display this command, and you can view association between an Ethernet CFM module
and an interface.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress interface GigabitEthernet0/0/1 egress cfm md md1 ma ma1 trigger
if-down
oam-bind ingress cfm md md1 ma ma1 trigger if-down egress interface
GigabitEthernet0/0/1
#
return
PE devices. As shown in Figure 4-11, EFM OAM runs between CE1 and PE1, and between
CE2 and PE2; Ethernet CFM runs between CE1 and CE2. After Ethernet OAM is associated
with Ethernet CFM, the Ethernet CFM module can detect faults on the link between CE1 and
PE2 and notify CE2.
GE0/0/1 GE0/0/1
GE0/0/2 GE0/0/2
EFM OAM EFM OAM
CE1 CE2
Pre-configuration Tasks
Before associating EFM OAM and Ethernet CFM, complete the following tasks:
Data Preparation
To associate EFM OAM and Ethernet CFM, you need the following data.
No. Data
1 Interface to be associated
Context
Do as follows on the CE devices.
Procedure
Step 1 Run:
system-view
Step 2 Run:
oam-mgr
The EFM OAM and Ethernet CFM modules are configured to send fault messages to each
other.
l Run:
oam-bind ingress efm interface interface-type interface-number egress cfm md md-
name ma ma-name
The EFM OAM module is configured to send fault messages to the Ethernet CFM module.
l Run:
oam-bind ingress cfm md md-name ma ma-name egress efm interface interface-type
interface-number
The Ethernet CFM module is configured to send fault messages the EFM OAM module.
NOTE
If you run oam-bind cfm md md-name ma ma-name efm interface interface-type interface-number
command, two records of the oam-bind ingress efm interface interface-type interface-number egress
cfm md md-name ma ma-name and oam-bind ingress cfm md md-name ma ma-name egress efm
interface interface-type interface-number commands are displayed. In the records, the directions where
fault notification messages are transmitted are reverse.
----End
Prerequisite
The Configuration of association between EFM OAM and Ethernet CFM are complete.
Procedure
Step 1 In the OAM management view, run the display this command to check association between
EFM OAM and Ethernet CFM.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet0/0/1 egress cfm md md1 ma ma1
oam-bind ingress cfm md md1 ma ma1 egress efm interface GigabitEthernet0/0/1
#
----End
Applicable Environment
IEEE 802.1ag is designed for a group of services or certain network devices to detect faults on
the network. IEEE 802.1ag is used between CE devices, PE devices, or CE and PE devices. As
shown in Figure 4-12, Ethernet CFM runs between CE1 and PE1, and between CE2 and PE2;
Ethernet CFM runs between CE1 and CE2. After Ethernet CFM is associated with Ethernet
CFM, the Ethernet CFM module can detect faults on the link between CE1 and PE1 and notify
CE2.
Figure 4-12 Networking diagram for configuring association between Ethernet CFM and
Ethernet CFM
GE0/0/1 GE0/0/1
GE0/0/2 GE0/0/2
Ethernet CFM Ethernet CFM
CE1 CE2
Pre-configuration Tasks
Before configuring association between Ethernet CFM and Ethernet CFM, complete the
following task:
Data Preparation
To configure association between Ethernet CFM and Ethernet CFM, you need the following
data.
No. Data
Context
Do as follows on the devices where association between Ethernet CFM and Ethernet CFM needs
to be configured.
Procedure
Step 1 Run:
system-view
Step 2 Run:
oam-mgr
Unidirectional fault tranmission is enabled betwen Ethernet CFM modules at the two ends of
the link.
Bidirectional fault transmission is enabled betwen Ethernet CFM modules at the two ends of the
link.
NOTE
After bidirectional transmission of fault messages is configured, the system displays two configuration
records of unidirectional fault message transmission, whose directions are mutually reverse.
----End
Prerequisite
The configurations of association between Ethernet CFM and Ethernet CFM are complete.
Procedure
Step 1 In the OAM management view, run the display this command to check association between
Ethernet CFM and Ethernet CFM.
[Quidway-oam-mgr] display this
#
oam-mgr
oam-bind ingress cfm md md1 ma ma1 egress cfm md md1 ma ma2
oam-bind ingress cfm md md1 ma ma2 egress cfm md md1 ma ma1
#
----End
Applicable Environment
Association between Ethernet CFM and SEP is configured on edge devices of the SEP segment.
When Ethernet CFM detects a fault on the upper-layer network, the edge device encapsulates a
fault message into a CFM protocol packet and sends it to the OAM management module. In
addition, the edge device triggers the physical status of the interface on the edge device bound
to Ethernet CFM to go Down.
When the interface on the edge device bound to Ethernet CFM becomes Down, the peer device
(on the SEP segment) of the edge device needs to send FLUSH-FDB packets to report the
topology change to other nodes on the SEP segment. After the nodes on the SEP segment receive
FLUSH-FDB packets, the blocking interface on the SEP segment needs to enter the forwarding
state and send FLUSH-FDB packets to trigger the updating of MAC address tables and ARP
tables of nodes on the SEP segment. In this manner, the lower-level network can detect faults
on the upper-level network and the reliability of service transmission is improveded.
Pre-configuration Tasks
Before configuring association between Ethernet CFM and SEP, complete the following tasks:
Data Preparation
To configure association between Ethernet CFM and SEP, you need the following data.
No. Data
1 Number of the interface where association between Ethernet CFM and SEP is
configured
3 SEP segment
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run the display this command in the OAM management view to check association between
Ethernet CFM and SEP.
[Quidway-oam-mgr] display this
#
oam-mgr
----End
Applicable Environment
You can configure the one-way frame delay measurement to collect statistics about the delay in
bidirectional service traffic transmission.
the one-way frame delay measurement is commonly performed on point-to-point MEPs. After
a MEP receives a Delay Measurement (DM) message from the remote MEP, it calculates the
time delay experienced across the network by comparing the timestamp in the DM frame and
the local time. During the one-way frame delay measurement, ensure that clocks on MEPs are
synchronous.
NOTE
Before enabling the one-way delay measurement in the VLAN on the local device, you must configure the
DM frame reception function on the remote device.
Pre-configuration Tasks
Before configuring the one-way delay measurement in the VLAN, complete the following tasks:
l Configuring VLAN
l 4.6 Configuring Basic Functions of Ethernet CFM
Data Preparation
To configure the one-way delay measurement in the VLAN, you need the following data:
No. Data
2 ID of the MEP, name of the interface on which the MEP resides, and type of the MEP
Context
Do as follows on the devices configured with MEPs:
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on the devices configured with MEPs:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
delay-measure one-way threshold threshold-value
----End
Context
Do as follows on a remote MEP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
delay-measure one-way receive
----End
Context
To implement the one-way frame delay measurement, you need to specify the remote MEP ID
or the destination MAC address, the interval for sending DM frames, and the number of DM
frames sent each time.
To implement one-way frame delay measurement, you need to specify the RMEP ID or the
destination MAC address, the interval for sending DM frames, and the measurement period.
l If the local MEP has not learnt the MAC address of the RMEP, you must specify the
destination MAC address for one-way frame delay measurement.
l If the local MEP has learnt the MAC address of the RMEP, you can specify the RMEP ID
for one-way frame delay measurement.
One-way frame delay measurement is implemented between the transmitting and receiving
MEPs by exchanging DM frames. After one-way frame delay measurement is configured, a
MEP periodically sends DM frames with the TxTimeStampf (the timestamp at the transmission
time of the DM frame). After receiving a DM frame, the RMEP parses the value of the
TxTimeStampf and compares this value with the RxTimef (the time at the reception of the DM
frame) and then calculates the one-way frame delay as:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
delay-measure one-way { mac mac-address | remote-mep mep-id mep-id } interval
interval-value count count-value
----End
Prerequisite
All the configurations of the one-way frame delay measurement in a VLAN are complete.
Procedure
l Run the display y1731 statistic-type oneway-delay md md-name ma ma-name command
to check the performance statistics collected through Y.1731.
----End
Example
After the configurations, run the display y1731 statistic-type command on the devices where
MEPs reside, and you can view the value of the average delay.
<Quidway> display y1731 statistic-type oneway-delay md md1 ma ma1
1DM received Delay 30555 usec Delay variation: 0 usec
1DM received Delay 30569 usec Delay variation: 14 usec
1DM received Delay 30583 usec Delay variation: 14 usec
1DM received Delay 30586 usec Delay variation: 3sec
1DM received Delay 30617 usec Delay variation: 31sec
1DM received Delay 30557 usec Delay variation: 60sec
1DM received Delay 30636 usec Delay variation: 79sec
1DM received Delay 30633 usec Delay variation: 3sec
1DM received Delay 30661 usec Delay variation: 28sec
1DM received Delay 30678 usec Delay variation: 17sec
--- Delay measurement statistics ---
Packets transmitted:10, valid packets received: 10
Average delay: 30607, Average delay variation: 27 usec
Best case delay 30555 usec, worst case delay: 30678 usec
You can set an alarm threshold for the two-way frame delay measurement in each MA. When
the two-way delay exceeds the alarm threshold, an alarm is generated.
4.19.4 Configuring DMM Frame Reception on a Remote MEP
The two-way frame delay measurement can work normally only when DM frame reception is
configured on a remote MEP.
4.19.5 Enabling the Two-way Frame Delay Measurement in a VLAN
The two-way frame delay measurement in a VLAN can work normally only after you enable
the two-way frame delay measurement in the VLAN.
4.19.6 Checking the Configuration
After the two-way frame delay measurement is configured in a VLAN, you can view the statistics
about the delay in bidirectional service traffic transmission in the VLAN.
Applicable Environment
You can configure the two-way frame delay measurement to collect statistics about the delay in
bidirectional service traffic transmission.
The two-way frame delay measurement is commonly performed on end-to-end MEPs. After a
remote MEP receives a DM frame from a local MEP, the remote MEP adds the RxTimeStampf
value (timestamp at the time of receiving the DM frame) to the DM frame, generates a DMR
frame with the TxTimeStampb value, and sends the message to the local MEP. Every field in
the DM frame is copied to the DMR frame except that the source and destination MAC addresses
are swapped and the message type is changed from DM to DMR. Upon receiving the DMR
frame, the local MEP calculates the two-way frame delay based on the timestamps.
NOTE
Before enabling the two-way delay measurement in the VLAN on the local device, you must configure the
DM frame reception function on the remote device.
Pre-configuration Tasks
Before configuring the two-way delay measurement in the VLAN, complete the following tasks:
l Configuring VLAN
l 4.6 Configuring Basic Functions of Ethernet CFM
Data Preparation
To configure the two-way delay measurement in the VLAN, you need the following data:
No. Data
2 ID of the MEP, name of the interface on which the MEP resides, and type of the MEP
No. Data
Context
Do as follows on the devices configured with MEPs on two ends of the link:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
map vlan vlan-id
----End
Context
Do as follows on the devices configured with MEPs on two ends of the link:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
delay-measure two-way threshold threshold-value
----End
Context
Do as follows on a remote MEP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
delay-measure two-way receive
----End
Context
To implement the two-way frame delay measurement, you need to specify the remote MEP ID
or the destination MAC address, the interval for sending DM frames, and the number of DM
frames sent each time.
l If the local MEP has not learnt the MAC address of the remote MEP, you must specify the
destination MAC address for the two-way frame delay measurement.
l If the local MEP has learnt the MAC address of the remote MEP, you can specify the remote
MEP ID for the two-way frame delay measurement.
The two-way frame delay measurement is performed on end-to-end MEPs. A MEP receives a
DM frame and returns a DMR frame to carry out the two-way frame delay measurement. After
the two-way frame delay measurement is configured, a MEP periodically sends DM frames with
the TxTimeStampf value (timestamp at the time of sending the DM frame). After receiving the
DM frame, the remote MEP adds the RxTimeStampf value (timestamp at the time of receiving
the DM frame) to the DM frame, generates a DMR frame with the TxTimeStampb value
(timestamp at the time of sending the DMR frame), and sends the message to the requesting
MEP. Every field in the DM frame is copied to the DMR frame except that the source and
destination MAC addresses are swapped and the message type is changed from DM to DMR.
Upon receiving the DMR frame, the requesting MEP calculates the two-way frame delay based
on the following formula:
Do as follows on the devices configured with MEPs on two ends of the link:
Procedure
Step 1 Run:
system-view
Step 2 Run:
cfm md md-name
Step 3 Run:
ma ma-name
Step 4 Run:
delay-measure two-way { mac mac-address | remote-mep mep-id mep-id } interval
interval-value count count-value
----End
Prerequisite
All the configurations of the two-way frame delay measurement in a VLAN are complete.
Procedure
l Run the display y1731 statistic-type twoway-delay md md-name ma ma-name command
to check the performance statistics collected through Y.1731.
----End
Example
After the configurations, run the display y1731 statistic-type command on the devices where
MEPs reside, and you can view the value of the average delay.
<Quidway> display y1731 statistic-type twoway-delay md md2 ma ma2
DMR received Delay 0018-82d1-b6bf Delay 2692 usec Variation: 0 usec
DMR received Delay 0018-82d1-b6bf Delay 2056 usec Variation: 636 usec
DMR received Delay 0018-82d1-b6bf Delay 2464 usec Variation: 408 usec
DMR received Delay 0018-82d1-b6bf Delay 2363 usec Variation: 101 usec
DMR received Delay 0018-82d1-b6bf Delay 2312 usec Variation: 51 usec
DMR received Delay 0018-82d1-b6bf Delay 2452 usec Variation: 140 usec
DMR received Delay 0018-82d1-b6bf Delay 2666 usec Variation: 214 usec
DMR received Delay 0018-82d1-b6bf Delay 2471 usec Variation: 195 usec
DMR received Delay 0018-82d1-b6bf Delay 2454 usec Variation: 17 usec
DMR received Delay 0018-82d1-b6bf Delay 2494 usec Variation: 40 usec
--- Delay measurement statistics ---
Packets transmitted:10, valid packets received: 10
Average delay: 2442, Average delay variation: 200 usec
Best case delay 2056 usec, worst case delay: 2692 usec
CAUTION
Debugging affects the performance of the system. So, after debugging, run the undo debugging
all command to disable it immediately.
When an EFM OAM fault occurs, run the following debugging command in the user view to
view the debugging information and locate the fault.
For the procedure for enabling debugging, see Debugging and Diagnosis in the Configuration
Guide - Device Management.
Procedure
l Run the debugging efm interface interface-type interface-number { all | error | event |
message | packet { all | receive | send } | process } command in the user view to enable
the debugging of the EFM OAM management module on the specified interface.
l Run the debugging eoam-1ag { all | event | error | msg | packet-type ccm-packet md
md-name [ ma ma-name [ remote-mep mep-id mep-id ]] [ -c connt ] } command in the
user view to enable the MD debugging.
----End
4.21.13 Example for Configuring the One-way Frame Delay Measurement in a VLAN
When you need to estimate service qualities, you can configure the one-way frame delay
measurement on point-to-point MEPs to obtain the performance of the network.
4.21.14 Example for Configuring the Two-way Frame Delay Measurement in a VLAN
When you need to estimate service qualities, you can configure the two-way frame delay
measurement on point-to-point MEPs to obtain the performance of the network.
SwitchA SwitchB
User ISP
network network
GE0/0/1 GE0/0/1
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable EFM OAM globally on Switch A and Switch B.
2. Configure EFM OAM on n GE 0/0/1 of Switch A to work in passive mode.
3. Enable EFM OAM on n GE 0/0/1 on Switch B. Enable EFM OAM on n GE 0/0/1 on Switch
A.
4. Configure n GE 0/0/1 of Switch B to detect the errored frames, errored codes, and errored
frame seconds.
Data Preparation
To complete the configuration, you need the following data:
l Period for detecting errored frames on n GE 0/0/1 of Switch B (5 seconds) and threshold
of number of errored frames (5)
l Period for detecting errored codes on n GE 0/0/1 of Switch B (5 seconds) and threshold of
number of errored codes (5)
l Period for detecting errored frame seconds on n GE 0/0/1 of Switch B (120 seconds) and
threshold of number of errored frame seconds (5)
Procedure
Step 1 Enable EFM OAM globally.
Step 4 Configure n GE 0/0/1 of Switch B to detect the errored frames, errored codes, and errored frame
seconds.
# If EFM OAM is configured correctly on Switch A and Switch B, n GE 0/0/1 and n GE 0/0/1
start the handshake after negotiation. Run the display efm session command on Switch A or
Switch B, and you can find that the EFM OAM protocol is in detect state.
[SwitchB] display efm session interface gigabitethernet 0/0/1
Interface EFM State Loopback Timeout
--------------------------------------------------------------------
GigabitEthernet0/0/1 detect --
# Run the display efm command on Switch B. If the function of detecting errored frames, errored
codes, and errored frame seconds on GE 2/0/1 is configured corrected, the following information
is displayed:
[SwitchB] display efm interface gigabitethernet 0/0/1
Item Value
-------------------------------------
Interface: GigabitEthernet0/0/1
EFM Enable Flag: enable
Mode: active
OAMPDU MaxSize: 128
ErrCodeNotification: enable
ErrCodePeriod: 5
ErrCodeThreshold: 5
ErrFrameNotification: enable
ErrFramePeriod: 5
ErrFrameThreshold: 5
ErrFrameSecondNotification: enable
ErrFrameSecondPeriod: 120
ErrFrameSecondThreshold: 5
Hold Up Time: 0
ThresholdEvtTriggerErrDown: disable
TriggerIfDown: disable
TriggerMacRenew: disable
Remote MAC: 0010-0010-0010
Remote EFM Enable Flag: enable
Remote Mode: passive
Remote MaxSize: 128
Remote State: --
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
efm enable
#
interface GigabitEthernet0/0/1
efm mode passive
efm enable
#
return
Networking Requirements
As shown in Figure 4-14, a user network is connected to an ISP network through Switch A and
Switch B. Switch A functions as the CE device, and Switch B functions as the UPE device. The
link between Switch A and Switch B is newly established. The ISP needs to test the packet loss
ratio on the link on Switch B before using the link.
Figure 4-14 Networking diagram for testing the packet loss ratio on the link
SwitchA SwitchB
User ISP
network network
GE0/0/1 GE0/0/1
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable EFM OAM on Switch A and Switch B. Configure EFM OAM on GE 0/0/1 of Switch
A to work in passive mode.
2. Enable EFM OAM remote loopback on Switch B.
3. Send test packets from Switch B to Switch A.
4. Check the returned test packets on Switch B.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure basic functions of EFM OAM.
# Enable EFM OAM globally on Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] efm enable
Run the display efm session command on Switch A. If the EFM OAM protocol on GE 0/0/1 is
in Loopback (be controlled) state, that is, GE 0/0/1 responds to remote loopback, it indicates
that the configuration is successful. The displayed information is as follows:
[SwitchA] display efm session interface gigabitethernet 0/0/1
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet0/0/1 Loopback(be controlled) --
You can obtain the packet loss ratio on the link based on the preceding data.
Step 5 Disable EFM OAM remote loopback.
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] efm loopback stop
[SwitchB-GigabitEthernet0/0/1] quit
NOTE
By default, the timeout interval for remote loopback is 20 minutes. After 20 minutes, remote loopback
stops. To disable remote loopback, you can perform the preceding step.
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
efm enable
#
interface GigabitEthernet0/0/1
efm mode passive
efm enable
#
return
interface GigabitEthernet0/0/1
efm enable
#
return
Networking Requirements
As shown in Figure 4-15, the Ethernet is managed by two ISPs. Switch A, Switch B, and Switch
D are managed by ISP 1; Switch C, Switch E, Switch F, Switch G, Switch H, and Switch I are
managed by ISP 2. Connectivity of links needs to be tested on the network.
Figure 4-15 Networking diagram for configuring basic functions of Ethernet CFM
VLAN2
GE0/0/1
SwitchA SwitchE
SwitchI GE0/0/3
GE0/0/3 GE0/0/1
SwitchB
VLAN2 GE0/0/2 MD2 SwitchF
GE0/0/1 GE0/0/1
GE0/0/3 GE0/0/2
SwitchD
GE0/0/3 SwitchC
MD1 SwitchG
SwitchH
MD1 MD2
MEP in MA1 MEP in MA3
MEP in MA2
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l Level of MD 1: 6
l Level of MD 2: 4
Procedure
Step 1 Create VLANs and add interfaces to the VLANs. The configuration procedure is not mentioned
here.
Step 2 Create MD 1.
# Create MD 1 on Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] cfm enable
[SwitchA] cfm md md1 level 6
# Create MD 1 on Switchs B to I.
The configurations of these Switchs are similar to the configuration of Switch A, and are not
mentioned here.
Step 3 Create MA 1 in MD 1 on all the Switchs except Switch G.
# Create MA 1 in MD 1 on Switch A.
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] map vlan 2
[SwitchA-md-md1-ma-ma1] quit
# Create MA 1 in MD 1 on Switches B to I.
The configurations of these Switches are similar to the configuration of Switch A, and are not
mentioned here.
Step 4 Create MA 2 in MD 1 on all the Switches except Switch E and Switch I.
# Create MA 2 in MD 1 on Switch A.
[SwitchA-md-md1] ma ma2
[SwitchA-md-md1-ma-ma2] map vlan 3
[SwitchA-md-md1-ma-ma2] quit
[SwitchA-md-md1] quit
# Create MA 2 in MD 1 on Switchs B to H.
The configurations of these Switchs are similar to the configuration of Switch A, and are not
mentioned here.
Step 5 Create MD 2 and create MA 3 in MD 2 on Switch A, Switch B, Switch C, and Switch D.
# Create MD 2 and create MA 3 in MD 2 on Switch A.
[SwitchA] cfm md md2 level 4
[SwitchA-md-md2] ma ma3
[SwitchA-md-md2-ma-ma3] map vlan 4
[SwitchA-md-md2-ma-ma3] quit
[SwitchA-md-md2] quit
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 2 to 4
#
cfm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 4
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 4
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 2 to 4
#
cfm md md1 level 6
ma ma1
map vlan 2
ma ma2
map vlan 3
#
cfm md md2 level 4
ma ma3
map vlan 4
mep mep-id 1 interface gigabitethernet0/0/3 inward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
remote-mep mep-id 3
remote-mep ccm-receive mep-id 3 enable
#
return
l Configuration file of Switch B
#
sysname SwitchB
#
vlan batch 2 to 4
#
cfm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 4
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 2 to 4
#
cfm md md1 level 6
ma ma1
map vlan 2
ma ma2
map vlan 3
#
cfm md md2 level 4
ma ma3
map vlan 4
#
return
l Configuration file of Switch C
#
sysname SwitchC
#
vlan batch 2 to 4
#
cfm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 2
#
cfm md md1 level 6
ma ma1
map vlan 2
mep mep-id 3 interface gigabitethernet0/0/1 inward
mep ccm-send mep-id 3 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
#
return
Networking Requirements
As shown in Figure 4-16, Switch B and Switch C are managed by ISP 1, and Switch A, Switch
D, Switch E, and Switch F are managed by ISP 2. The CFM function can be enabled after the
default MD is configured on the device in a low-level MD.
Figure 4-16 Networking diagram for configuring the default MD for Ethernet CFM
VLAN3
/1
VLAN2 /0/1 /0
/0
GE0 /2
0
GE
GE0/0/3 SwitchF
GE0/0/1
SwitchA SwitchD GE0/0/3
GE0/0/2
GE0/0/1
VLAN3 VLAN2
MEP of MA1
MEP of MA2
MIP
Configuration Roadmap
The configuration roadmap is as follows:
Create and configure MA 2 in MD 1 on all the devices except for Switch F. Associate MA
2 with VLAN 3.
6. Create and configure MEPs and RMEPs on MA 1 in MD 1 of Switch A and Switch F.
Create and configure MEPs and RMEPs on MA 2 in MD 1 of Switch A and Switch E.
7. Enable the function of sending and receiving CCMs.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Switch IEEE 802.1ag Draft 7 to IEEE Standard 802.1ag-2007.
NOTE
By default, IEEE 802.1ag Draft 7 is enabled on a device.
# Switch IEEE 802.1ag Draft 7 to IEEE Standard 802.1ag-2007 on Switch B, Switch C, Switch
D, Switch E, and Switch F.
The configurations on Switch B, Switch C, Switch D, Switch E, and Switch F are similar to the
configuration on Switch A, and are not mentioned here.
NOTE
All the devices on the entire network must be enabled with either IEEE 802.1ag Draft 7 or IEEE Standard
802.1ag-2007. IEEE 802.1ag Draft 7 and IEEE Standard 802.1ag-2007 cannot be enabled at the same time
on a network.
Step 2 Create VLANs and add interfaces to the VLANs. The configuration procedure is not mentioned
here.
Step 3 Create MD 1.
# Create MD 1 on Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] cfm enable
[SwitchA] cfm md md1 level 6
[SwitchA-md-md1] quit
The configurations on Switch D, Switch E, and Switch F are similar to the configuration on
Switch A, and are not mentioned here.
Step 4 Create MD 2.
# Create MD 2 on Switch B.
[SwitchB] cfm enable
[SwitchB] cfm md md2 level 4
[SwitchB-md-md2] quit
# Create MD 2 on Switch C.
The configuration on Switch C is similar to the configuration on Switch B, and is not mentioned
here.
Step 5 Create the default MD and associate the default MD with VLAN 2 and VLAN 3 on Switch B
and Switch C.
# Create the default MD and associate the default MD to VLAN 2 and VLAN 3 on SwitchB.
[SwitchB] cfm default md level 6
[SwitchB-default-md] vlan 2 to 3
[SwitchB-default-md] quit
# Create the default MD and associate the default MD to VLAN 2 and VLAN 3 on Switch C.
The configuration on Switch C is similar to the configuration on Switch B, and is not mentioned
here.
Step 6 Set the MIP creation rule in the default MD on Switch B and Switch C.
The configuration on Switch C is similar to the configuration on Switch B, and is not mentioned
here.
Step 7 Create and configure MA 1 in MD 1 on all the devices except for Switch B and Switch C.
# Create MA 1 in MD 1 on Switch A.
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] map vlan 2
[SwitchA-md-md1-ma-ma1] quit
The configurations on Switch D and Switch F are similar to the configuration on Switch A, and
are not mentioned here.
Step 8 Create and configure MA 2 in MD 1 on all the devices except for Switch B and Switch C.
# Create MA 2 in MD 1 on Switch A.
[SwitchA-md-md1] ma ma2
[SwitchA-md-md1-ma-ma2] map vlan 3
[SwitchA-md-md1-ma-ma2] quit
[SwitchA-md-md1] quit
The configurations on Switch D and Switch E are similar to the configuration on Switch A, and
are not mentioned here.
Step 9 Configure MEPs and RMEPs in MA 1 of MD 1 on Switch A and Switch F.
# Configure a MEP in MA 1 of MD 1 on Switch A.
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 0/0/1 inward
# Enable the function of receiving CCMs from all the RMEPs on Switch A.
[SwitchA-md-md1-ma-ma2] remote-mep ccm-receive enable
# Enable the function of sending CCMs in all MEPs and the function of receiving CCMs from
all the RMEPs on Switch E and Switch F.
The configurations on Switch E and Switch F are similar to the configuration on SwitchA, and
are not mentioned here.
Step 12 Verify the configuration.
After the preceding configurations are complete and the network becomes stable, run the
following commands to verify the configuration. Take Switch A and Switch B for example.
l Run the display cfm default md command on Switch B, and you can view the following
information:
[SwitchB] display cfm default md
Level MIP-Create-type SenderID TLV-type VLAN-list
-------------------------------------------------------------------------------
--------
6 default Defer 2 to 3
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 2 to 3
#
cfm version standard
cfm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 3
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 2 to 3
#
cfm md md1 level 6
ma ma1
map vlan 2
mep mep-id 2 interface gigabitethernet 0/0/1 inward
mep ccm-send mep-id 2 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
ma ma2
map vlan 3
mep mep-id 1 interface gigabitethernet 0/0/2 inward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
#
return
l Configuration file of Switch B
#
sysname SwitchB
#
vlan batch 2 to 3
#
cfm version standard
cfm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 3
#
interface GigabitEthernet0/0/3
port link-type trunk
port trunk allow-pass vlan 2 to 3
#
cfm md md2 level 4
#
cfm default md level 6
mip create-type defaul
vlan 2 to 3
#
return
l Configuration file of Switch C
#
sysname SwitchC
#
vlan batch 2 to 3
#
cfm version standard
cfm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 3
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 2 to 3
#
cfm md md2 level 4
#
cfm default md level 6
mip create-type defaul
vlan 2 to 3
#
return
l Configuration file of Switch D
#
sysname SwitchD
#
vlan batch 2 to 3
#
Networking Requirements
As shown in Figure 4-17, EFM OAM is configured between Switch B and Switch C. When GE
0/0/2 on Switch B becomes Down, the EFM OAM module reports the fault to GE 0/0/1 on
Switch C through the association mechanism. Then GE 0/0/1 is triggered to go Down.
Figure 4-17 Networking diagram for configuring association between an EFM OAM module
and an interface
SwitchA SwitchB SwitchC
GE0/0/1 GE0/0/2
GE0/0/1 GE0/0/2
EFM OAM
Interface associated with
EFM OAM
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure EFM OAM between Switch B and Switch C.
2. On Switch B, configure association between an EFM OAM module and GE 0/0/1.
Procedure
Step 1 Configure EFM OAM between Switch B and Switch C.
# Configure Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] efm enable
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] efm mode passive
# Configure Switch C.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] efm enable
[SwitchC] interface gigabitethernet 0/0/2
[SwitchC-GigabitEthernet0/0/2] efm enable
Run the display efm session interface command on Switch B to check the EFM OAM status,
and you can find that EFM OAM is in detect state.
[SwitchB] display efm session interface gigabitethernet 0/0/2
Interface EFM State Loopback Timeout
--------------------------------------------------------------------
GigabitEthernet0/0/2 detect
# Enable GE 0/0/1 on Switch B and the EFM OAM module between Switch B and Switch C to
report faults to each other.
[SwitchB] oam-mgr
[SwitchB-oam-mgr] oam-bind efm interface gigabitethernet 0/0/ trigger if-down
interface gigabitethernet 0/0/1
After GE 0/0/2 on Switch B is shut down, the EFM OAM module reports the fault to GE
0/0/1. Then GE 0/0/1 is triggered to go Down.
[SwitchB] display interface gigabitethernet 0/0/1
GigabitEthernet0/0/1 current state : TRIGGER DOWN
(3AH)
Line protocol current state : DOWN
Description:HUAWEI, Quidway Series, GigabitEthernet0/0/1 Interface
Switch Port,PVID : 1,The Maximum Frame Length is 1600
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0018-8211-1111
Port Mode: COMBO AUTO
Current Work Mode: COPPER
Speed : 1000, Loopback: NONE
Duplex: FULL, Negotiation: ENABLE
Mdi : AUTO
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Input peak rate 0 bits/sec,Record time: -
Output peak rate 0 bits/sec,Record time: -
Input: 0 packets, 0 bytes
Unicast : 0,Multicast : 0
Broadcast : 0,Jumbo : 0
CRC : 0,Giants : 0
Jabbers : 0,Throttles : 0
Runts : 0,DropEvents : 0
Alignments : 0,Symbols : 0
Ignoreds : 0,Frames : 0
Discard : 0,Total Error : 0
Output: 0 packets, 0 bytes
Unicast : 0,Multicast : 0
Broadcast : 0,Jumbo : 0
Collisions : 0,Deferreds : 0
Late Collisions: 0,ExcessiveCollisions: 0
Buffers Purged : 0
Discard : 0,Total Error : 0
Input bandwidth utilization threshold : 100.00%
Output bandwidth utilization threshold: 100.00%
----End
Configuration Files
l Configuration file of Switch B
#
sysname SwitchB
#
efm enable
#
interface GigabitEthernet0/0/1
efm enable
#
interface GigabitEthernet0/0/2
efm mode passive
efm enable
#
oam-mgr
oam-bind ingress interface GigabitEthernet0/0/2 egress efm interface
GigabitEthernet0/0/1 trigger if-
down
oam-bind ingress efm interface GigabitEthernet0/0/1 trigger if-down egress
interface GigabitEthernet0/0/2
#
return
Networking Requirements
As shown in Figure 4-18, to implement the end-to-end link fault detection, EFM OAM is
configured between Switch A and Switch B and between Switch B and Switch C. When a fault
occurs on the link between Switch A and Switch B, EFM OAM between Switch A and Switch
B detects the fault and sends fault messages to Switch C through the association mechanism.
Then, alarms are generated on Switch C.
Figure 4-18 Networking diagram for configuring association between EFM OAM modules
SwitchA SwitchB SwitchC
GE0/0/1 GE0/0/2
GE0/0/1 GE0/0/2
EFM OAM EFM OAM
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable EFM OAM globally on Switch A, Switch B, and Switch C.
2. Configure EFM OAM on GE 0/0/1 of Switch B and GE 0/0/2S of Switch C to work in
passive mode.
3. Enable EFM OAM on interfaces of the S5300s.
4. Configure association between EFM OAM modules on Switch B.
Procedure
Step 1 Enable EFM OAM globally.
# Configure Switch A.
<SwitchA> system-view
[SwitchA] efm enable
# Configure SwitchB.
<SwitchB> system-view
[SwitchB] efm enable
# Configure Switch C.
<SwitchC> system-view
[SwitchC] efm enable
# Configure SwitchC.
[SwitchC] interface gigabitethernet 0/0/2
[SwitchC-GigabitEthernet0/0/2] efm mode passive
[SwitchC-GigabitEthernet0/0/2] quit
# Configure Switch B.
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] efm enable
[SwitchB-GigabitEthernet0/0/1] quit
[SwitchB] interface gigabitethernet 0/0/2
[SwitchB-GigabitEthernet0/0/2] efm enable
[SwitchB-GigabitEthernet0/0/2] quit
# Configure Switch C.
[SwitchC] interface gigabitethernet 0/0/2
[SwitchC-GigabitEthernet0/0/2] efm enable
[SwitchC-GigabitEthernet0/0/2] quit
Run the display efm session all command to check the EFM OAM status, and you can find that
EFM OAM is in detect state. Take the display on Switch B as an example.
[SwitchB] display efm session all
Interface EFM State Loopback Timeout
----------------------------------------------------------------------
GigabitEthernet0/0/1 detect --
GigabitEthernet0/0/2 detect --
In the OAM management view, run the display this command to check association. You can
find that there are two unidirectional association configuration records, whose directions are
mutually reverse.
[SwitchB-oam-mgr] display this
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet0/0/1 egress efm interface
GigabitEthernet0/0/2
oam-bind ingress efm interface GigabitEthernet0/0/2 egress efm interface
GigabitEthernet0/0/1
#
# Fault messages between SwitchA and SwitchB are transmitted to SwitchC through the
association mechanism. Then alarms are generated on SwitchC.
<SwitchC>
Mar 9 2010 14:52:33 SwitchC %%01EFM/2/NONTHRESHOLD(l): OID 1.3.6.1.4.1.2011.5
.25.136.1.6.5 Non-threshold-crossing event occurred.
(InterfaceName=GigabitEthernet0/0/1, EventLogIndex=0, EventLogTimestamp=148983996,
EventLogOui=[01.80.c2 (h
ex)], EventLogType=258, EventLogLocation=2, EventLogRunningTotal=0 3)
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
efm enable
#
interface GigabitEthernet0/0/1
efm enable
#
return
#
efm enable
#
interface GigabitEthernet0/0/1
efm mode passive
efm enable
#
interface GigabitEthernet0/0/2
efm enable
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet0/0/1 egress efm interface
GigabitEthernet0/0/2
oam-bind ingress efm interface GigabitEthernet0/0/2 egress efm interface
GigabitEthernet0/0/1
#
return
Networking Requirements
As shown in Figure 4-19, CFM is used on a direct link and a multi-hop link. Ethernet CFM is
configured between SwitchA and SwitchB, and Ethernet CFM is associated with GE0/0/1 of
SwitchA. When the CFM OAM module on SwitchA detects the connectivity fault on the link
between SwitchA and SwitchB, it shuts down GE0/0/1. In this case, the peer device of
SwitchA detects the fault.
Figure 4-19 Networking diagram for associating an Ethernet CFM module with an interface
CFM OAM
Configuration Roadmap
The configuration roadmap is as follows:
Procedure
Step 1 Create VLANs and add interfaces to the VLANs.
# Configure SwitchA.
[SwitchA] vlan 10
[SwitchA-vlan10] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 10
[SwitchA-GigabitEthernet0/0/2] quit
# Configure SwitchB.
[SwitchB] vlan 10
[SwitchB-vlan10] quit
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 10
[SwitchB-GigabitEthernet0/0/1] quit
Level : 0
MA Name : ma1
MEP ID : 1
Vlan ID : 10
VSI Name : --
Interface Name : GigabitEthernet0/0/1
CCM Send : enabled
Direction : outward
MAC Address : 0018-82d1-b6df
[SwitchB] display cfm remote-mep md md1
The total number of RMEPs is : 1
The status of RMEPS : 1 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md1
Level : 0
MA Name : ma1
RMEP ID : 2
Vlan ID : 10
VSI Name : --
MAC : 0012-1313-1211
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
After the interface of SwitchA is shut down, the OAM management module reports the fault to
GE 0/0/1. Then GE 0/0/1 is triggered to go Down.
[SwitchA] display interface gigabitethernet 0/0/1
Unicast : 0,Multicast : 0
Broadcast : 0,Jumbo : 0
Collisions : 0,Deferreds : 0
Late Collisions: 0,ExcessiveCollisions: 0
Buffers Purged : 0
Discard : 0,Total Error : 0
Input bandwidth utilization threshold : 100.00%
Output bandwidth utilization threshold: 100.00%
Input bandwidth utilization : 0.00%
Output bandwidth utilization : 0.00%
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 10
#
cfm enable
#
interface GigabitEthernet0/0/1
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 10
#
cfm md md1
ma ma1
map vlan 10
ccm-interval 10000
mep mep-id 2 interface GigabitEthernet0/0/2 outward
mep ccm-send mep-id 2 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
#
oam-mgr
oam-bind ingress interface GigabitEthernet0/0/1 egress cfm md md1 ma ma1
trigger if-down
oam-bind ingress cfm md md1 ma ma1 trigger if-down egress interface
GigabitEthernet0/0/1
#
return
#
sysname SwitchB
#
vlan batch 10
#
cfm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 10
#
cfm md md1
ma ma1
map vlan 10
ccm-interval 10000
mep mep-id 1 interface GigabitEthernet0/0/1 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
#
return
Figure 4-20 Networking diagram for configuring association between an EFM OAM module
and an Ethernet CFM module
Configuration Roadmap
The configuration roadmap is as follows:
1. Create VLANs and add interfaces to the VLANs.
2. Configure EFM OAM between Switch A and Switch B.
3. Configure Ethernet CFM between the Switch B and Switch C.
4. Configure EFM OAM between Switch C and Switch D.
5. Configure association between an EFM OAM module and an Ethernet CFM module on
Switch B and Switch C.
Procedure
Step 1 Create VLAN 10 and add interfaces to VLAN 10.
Step 2 Enable EFM OAM globally onSwitch A and Switch B.
# Configure Switch A.
[SwitchA] efm enable
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] efm mode passive
[SwitchA-GigabitEthernet0/0/1] efm enable
[SwitchA-GigabitEthernet0/0/1] quit
# Configure Switch B.
[SwitchB] efm enable
[SwitchB] interface gigabitethernet 0/0/1
# Configure Switch C.
[SwitchC] cfm enable
[SwitchC] cfm md md1
[SwitchC-md-md1] ma ma1
[SwitchC-md-md1-ma-ma1] map vlan 10
[SwitchC-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 0/0/2 outward
[SwitchC-md-md1-ma-ma1] remote-mep mep-id 1
[SwitchC-md-md1-ma-ma1] mep ccm-send enable
[SwitchC-md-md1-ma-ma1] remote-mep ccm-receive enable
[SwitchC-md-md1-ma-ma1] return
# Configure Switch D.
[SwitchD] efm enable
[SwitchD] interface gigabitethernet 0/0/1
[SwitchD-GigabitEthernet0/0/1] efm mode passive
[SwitchD-GigabitEthernet0/0/1] efm enable
[SwitchD-GigabitEthernet0/0/1] quit
Step 5 Configure association between an EFM OAM module and an Ethernet CFM module.
# Associate EFM OAM between Switch A and Switch B with Ethernet CFM between Switch
B and Switch C in both directions. That is, enable the EFM OAM and Ethernet CFM modules
to send trap messages to each other.
[SwitchB] oam-mgr
[SwitchB-oam-mgr] oam-bind cfm md md1 ma ma1 efm interface gigabitethernet 0/0/1
# Associate EFM OAM between Switch C and Switch D with Ethernet CFM between Switch
B and Switch C in both directions. That is, enable the EFM OAM and Ethernet CFM modules
to send trap messages to each other.
[SwitchC] oam-mgr
[SwitchC-oam-mgr] oam-bind cfm md md1 ma ma1 efm interface gigabitethernet 0/0/1
After the preceding configuration is complete, when EFM OAM between Switch A and Switch
B detects a fault, Ethernet CFM reports the fault to EFM OAM running between Switch C and
Switch D.
<SwitchD>
Nov 23 2007 18:31:27-05:00 Switch D %%01EFM/2/NONTHRESHOLD(l)[0]:OID 1.3.6.1.4.
1.2011.5.25.136.1.6.5 Non-threshold-crossing event occurred.
(InterfaceName=GigabitEthernet0/0/1, EventLogIndex=0, EventLogTimestamp=7357971,
EventLogOui=[01.80
.c2 (hex)], EventLogType=258, EventLogLocation=1, EventLogRunningTotal=0 1)
Nov 23 2007 18:31:27-05:00 SwitchD %%01OAMMGR/4/CFM_TO_EFM(l)[1]:802.1AG notif
ied malfunction to 802.3AH. (Ma=ma1, Md=md1, InterfaceName=GigabitEthernet0/0/1,
FaultState=1)
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10
#
efm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 10
efm mode passive
efm enable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 10
#
return
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
#
oam-mgr
oam-bind ingress efm interface GigabitEthernet0/0/1 egress cfm md md1 ma ma1
oam-bind ingress cfm md md1 ma ma1 egress efm interface GigabitEthernet0/0/1
#
return
Networking Requirements
As shown in Figure 4-21, Ethernet CFM is configured between Switch A and Switch B, and
between Switch B and Switch C. When a fault occurs on the link between Switch A and Switch
B, Ethernet CFM is triggered to send fault messages to Switch C. Then, alarms are generated
on Switch C.
Figure 4-21 Networking diagram for configuring association between Ethernet CFM and
Ethernet CFM
SwitchA SwitchB SwitchC
GE0/0/1 GE0/0/2
GE0/0/1 GE0/0/2
CFM CFM
MEP in MA1
MEP in MA2
Configuration Roadmap
The configuration roadmap is as follows:
Procedure
Step 1 Create VLANs and add interfaces to the VLANs.
# Configure Switch A.
[SwitchA] cfm enable
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] map vlan 10
[SwitchA-md-md1-ma-ma1] mep mep-id 1 interface gigabitethernet 0/0/1 outward
[SwitchA-md-md1-ma-ma1] remote-mep mep-id 2
[SwitchA-md-md1-ma-ma1] mep ccm-send enable
[SwitchA-md-md1-ma-ma1] remote-mep ccm-receive enable
[SwitchA-md-md1-ma-ma1] quit
[SwitchA-md-md1] quit
# Configure Switch B.
# Configure Switch B.
[SwitchB] cfm enable
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma2
[SwitchB-md-md1-ma-ma2] map vlan 20
[SwitchB-md-md1-ma-ma2] mep mep-id 1 interface gigabitethernet 0/0/2 outward
[SwitchB-md-md1-ma-ma1] remote-mep mep-id 2
[SwitchB-md-md1-ma-ma1] mep ccm-send enable
[SwitchB-md-md1-ma-ma1] remote-mep ccm-receive enable
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
# Configure Switch C.
[SwitchC] cfm enable
[SwitchC] cfm md md1
[SwitchC-md-md1] ma ma2
[SwitchC-md-md1-ma-ma2] map vlan 20
[SwitchC-md-md1-ma-ma2] mep mep-id 2 interface gigabitethernet 0/0/2 outward
[SwitchB-md-md1-ma-ma1] remote-mep mep-id 1
[SwitchC-md-md1-ma-ma1] mep ccm-send enable
[SwitchC-md-md1-ma-ma1] remote-mep ccm-receive enable
[SwitchC-md-md1-ma-ma1] quit
[SwitchC-md-md1] quit
Run the display cfm remote-mep command on Switch B to check the CFM status, and you can
find that the CFM status is Up.
[SwitchB] display cfm remote-mep
The total number of RMEPs is : 2
The status of RMEPS : 2 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md1
Level : 0
MA Name : ma1
RMEP ID : 1
Vlan ID : 10
VSI Name : --
MAC : 0012-1313-1211
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
MD Name : md1
Level : 0
MA Name : ma2
RMEP ID : 2
Vlan ID : 20
VSI Name : --
MAC : 0012-1313-1211
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
# Associate Ethernet CFM between Switch A and Switch B with Ethernet CFM between Switch
B and Switch C in both directions. That is, enable Ethernet CFM modules to send trap messages
to each other.
[SwitchB] oam-mgr
[SwitchB-oam-mgr] oam-bind cfm md md1 ma ma1 cfm md md1 ma ma2
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10
#
cfm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 10
#
cfm md md1
ma ma1
map vlan 10
mep mep-id 1 interface GigabitEthernet0/0/1 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
#
return
Figure 4-22 Networking diagram for associating Ethernet CFM with Smart Link
SwitchB
802.1ag
GE0/0/1
GE0/0/1
SwitchA
DSLAM
GE0/0/3 SmartLink
GE0/0/2
GE0/0/2
802.1ag
Enterprise user
SwitchC
Configuration Roadmap
The configuration roadmap is as follows:
1. On Switch A, configure Smart Link multi-instance and add the uplink interfaces to the
Smart Link group.
2. Enable revertive switchover on SwitchA and enable Switch A to send Flush packets.
3. Enable Switch B and Switch C to receive Flush packets.
4. Enable functions of the Smart Link group on Switch A.
5. Configure Ethernet CFM between Switch A and Switch C and between Switch A and
Switch B.
6. Associate Ethernet CFM with interfaces on Switch A.
Procedure
Step 1 Create VLANs and add interfaces to the VLANs.
#Configure Switch A
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan batch 10 20
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 20
[SwitchA-GigabitEthernet0/0/1] quit
[SwitchA] interface gigabitethernet 0/0/2
[SwitchA-GigabitEthernet0/0/2] port link-type trunk
[SwitchA-GigabitEthernet0/0/2] port trunk allow-pass vlan 10 20
[SwitchA-GigabitEthernet0/0/2] quit
#Configure Switch B
<Quidway> system-view
[Quidway] sysname SwitchB
#Configure Switch C
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] vlan batch 10 20
[SwitchC] interface gigabitethernet 0/0/2
[SwitchC-GigabitEthernet0/0/2] port link-type trunk
[SwitchC-GigabitEthernet0/0/2] port trunk allow-pass vlan 10 20
[SwitchC-GigabitEthernet0/0/2] quit
Step 3 Add the interfaces where STP is disabled to the Smart Link group and specify active and standby
interfaces.
# Configure Switch A.
[SwitchA] smart-link group 1
[SwitchA-smlk-group1] flush send control-vlan 10 password simple 123
# Configure Switch B.
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] smart-link flush receive control-vlan 10 password
simple 123
[SwitchB-GigabitEthernet0/0/1] quit
# Configure Switch C.
[SwitchC] interface gigabitethernet 0/0/2
[SwitchC-GigabitEthernet0/0/2] smart-link flush receive control-vlan 10 password
simple 123
[SwitchC-GigabitEthernet0/0/2] quit
Run the display smart-link group command to check information about the Smart Link group
on Switch A.
# Configure Switch B.
[SwitchB] cfm enable
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] map vlan 20
[SwitchB-md-md1-ma-ma1] mep mep-id 3 interface gigabitethernet 0/0/1 outward
[SwitchB-md-md1-ma-ma1] remote-mep mep-id 1
[SwitchB-md-md1-ma-ma1] mep ccm-send enable
[SwitchB-md-md1-ma-ma1] remote-mep ccm-recive enable
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
# Configure Switch C.
[SwitchC] cfm enable
[SwitchC] cfm md md1
[SwitchC-md-md1] ma ma2
[SwitchC-md-md1-ma-ma2] map vlan 20
[SwitchC-md-md1-ma-ma2] mep mep-id 4 interface gigabitethernet 0/0/2 outward
[SwitchC-md-md1-ma-ma2] remote-mep mep-id 2
[SwitchC-md-md1-ma-ma2] mep ccm-send enable
[SwitchC-md-md1-ma-ma2] remote-mep ccm-recive enable
[SwitchC-md-md1-ma-ma2] quit
[SwitchC-md-md1] quit
Run the display cfm remote-mep command to check the CFM status. Take the display on Switch
A as an example.
[SwitchA] display cfm remote-mep
The total number of RMEPs is : 2
The status of RMEPS : 2 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md1
Level : 0
MA Name : ma1
RMEP ID : 3
Vlan ID : 20
VSI Name : --
MAC : 0018-82d1-b6df
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
MD Name : md1
Level : 0
MA Name : ma2
RMEP ID : 4
Vlan ID : 20
VSI Name : --
MAC : 0018-82d1-b6df
CCM Receive : enabled
Trigger-if-notify : disabled
CFM Status : up
# Configure Switch A.
[SwitchA] oam-mgr
[SwitchA-oam-mgr] oam-bind cfm md md1 ma ma1 trigger if-down interface
gigabitethernet 0/0/1
[SwitchA-oam-mgr] oam-bind cfm md md1 ma ma2 trigger if-down interface
gigabitethernet 0/0/2
# Check the status of GE 0/0/1 that is associated with CFM ma1, and you can find that GE
GE 0/0/1 is in state.
[SwitchA] display interface GigabitEthernet 1/0/0
GigabitEthernet0/0/1 current state : TRIGGER DOWN
(1AG)
Line protocol current state : DOWN
Description:HUAWEI, Quidway Series, GigabitEthernet0/0/1 Interface
Switch Port,PVID : 1,The Maximum Frame Length is 1600
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0018-8211-1111
Port Mode: COMBO AUTO
Current Work Mode: COPPER
Speed : 1000, Loopback: NONE
Duplex: FULL, Negotiation: DISABLE
Mdi : AUTO
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Input peak rate 0 bits/sec,Record time: -
Output peak rate 0 bits/sec,Record time: -
Input: 0 packets, 0 bytes
Unicast : 0,Multicast : 0
Broadcast : 0,Jumbo : 0
CRC : 0,Giants : 0
Jabbers : 0,Throttles : 0
Runts : 0,DropEvents : 0
Alignments : 0,Symbols : 0
Ignoreds : 0,Frames : 0
Discard : 0,Total Error : 0
# Check the status of the Smart Link group on Switch A, and you can find that GE 0/0/1 is in
Inactive state and GE 0/0/2 is in Active state.
[SwitchA] display smart-link group 1
Smart link group 1 information:
Smart link group was enabled
There is no Load-Balance
There is no protected-vlan reference-instance
Device ID: 00e0-fc00-0100 Control-vlan ID: 10
Member Role State Flush Count Last-Flush-
Time
---------------------------------------------------------------------
GigabitEthernet0/0/1 Master Inactive 2 2007/08/21
16:37:20 UTC+00:00
GigabitEthernet0/0/2 Slave Active 3 2007/08/21
14:45:56 UTC+00:00
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10 20
#
cfm enable
#
stp region-configuration
instance 1 vlan 10
active region-configuration
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 10 20
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 10 20
stp disable
#
#
cfm md md1
ma ma1
map vlan 20
mep mep-id 1 interface GigabitEthernet0/0/1 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 3
remote-mep ccm-receive mep-id 3 enable
ma ma2
map vlan 20
mep mep-id 2 interface GigabitEthernet0/0/2 outward
mep ccm-send mep-id 2 enable
remote-mep mep-id 4
Figure 4-23 Networking diagram for associating Ethernet CFM and RRPP multi-instance
UPEB
GE0/0/1 GE0/0/2
CE1 PE-AGG
VLAN 100-300 GE0/0/2 GE0/0/1
Ring 1 Backbone
UPEA Master 1 network
GE0/0/1 GE0/0/2
Domain 1 ring 1
GE0/0/2 GE0/0/1
UPEC
For details on the protected VLAN in domain 1, and the instance that the protected VLAN
belongs to, see Table 4-2.
For details on the master node and primary and secondary interfaces on the master node of the
ring, see Table 4-3.
Table 4-3 Master node, and primary and secondary interfaces on the master node
Ring ID Master Node Primary Interface Secondary
Interface
Configuration Roadmap
The configuration roadmap is as follows:
1. Map instance 1 to VLANs 100 to 300.
2. Add UPEA, UPEB, UPEC, and PE-AGG to ring 1 in domain 1.
3. Configure protected VLAN and control VLAN for domain 1.
4. Configure PE-AGG as the master node and configure UPEA, UPEB, and UPE C as transit
nodes on ring 1 in domain 1.
5. Configure Ethernet CFM on PE-AGG and UPEA to detect faults on the two links between
PE-AGG and UPEA.
6. Configure association between Ethernet CFM and primary and secondary interfaces on the
RRPP ring on PE-AGG.
Data Preparation
To complete the configuration, you need the following data:
l IDs of instances
l Range of the protected VLANs
l IDs of the control VLANs
l Numbers of the RRPP interfaces
Procedure
Step 1 Create instances.
l Configure UPEA.
# Create data VLANs 100 to 300 on UPEA.
[UPEA] vlan batch 100 to 300
# Create instance 1, and map control VLANs 5 and 6 and data VLANs 100 to 200 in domain 1
to instance 1.
<UPEA> system-view
[UPEA] stp region-configuration
[UPEA-mst-region] instance 1 vlan 5 6 100 to 300
l Configure UPEB.
# Create data VLANs 100 to 300 on UPEB.
[UPEB] vlan batch 100 to 300
# Create instance 1, and map control VLANs 5 and 6 and data VLANs 100 to 300 in domain 1
to instance 1.
<UPEB> system-view
[UPEB] stp region-configuration
[UPEB-mst-region] instance 1 vlan 5 6 100 to 300
l Configure UPEC.
# Create data VLANs 100 to 300 on UPEC.
[UPEC] vlan batch 100 to 300
# Create instance 1, and map control VLANs 5 and 6 and data VLANs 100 to 300 in domain 1
to instance 1.
<UPEC> system-view
[UPEC] stp region-configuration
[UPEC-mst-region] instance 1 vlan 5 6 100 to 300
l Configure PE-AGG.
# Create data VLANs 100 to 300 on PE-AGG.
[PE-AGG] vlan batch 100 to 300
# Create instance 1, and map control VLANs 5 and 6 and data VLANs 100 to 200 in domain 1
to instance 1.
<PE-AGG> system-view
[PE-AGG] stp region-configuration
[PE-AGG-mst-region] instance 1 vlan 5 6 100 to 300
l Configure UPEB.
# On UPEB, disable STP on the interfaces to be added to the RRPP ring. Configure the RRPP
interfaces to allow packets of VLANs 100 to 300 to pass through.
<UPEB> system-view
[UPEB] interface gigabitethernet 0/0/1
[UPEB-GigabitEthernet0/0/1] port link-type trunk
[UPEB-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet0/0/1] stp disable
[UPEB-GigabitEthernet0/0/1] quit
[UPEB] interface gigabitethernet 0/0/2
[UPEB-GigabitEthernet0/0/2] port link-type trunk
[UPEB-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPEB-GigabitEthernet0/0/2] stp disable
[UPEB-GigabitEthernet0/0/2] quit
l Configure UPEC.
# On UPEC, disable STP on the interfaces to be added to the RRPP ring. Configure the RRPP
interfaces to allow packets of VLANs 100 to 300 to pass through.
<UPEC> system-view
[UPEC] interface gigabitethernet 0/0/1
[UPEC-GigabitEthernet0/0/1] port link-type trunk
[UPEC-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet0/0/1] stp disable
[UPEC-GigabitEthernet0/0/1] quit
[UPEC] interface gigabitethernet 0/0/2
[UPEC-GigabitEthernet0/0/2]port link-type trunk
[UPEC-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[UPEC-GigabitEthernet0/0/2] stp disable
[UPEC-GigabitEthernet0/0/2] quit
l Configure PE-AGG.
# On PE-AGG, disable STP on the interfaces to be added to the RRPP ring. Configure the RRPP
interfaces to allow packets of VLANs 100 to 300 to pass through.
<PE-AGG> system-view
[PE-AGG] interface gigabitethernet 0/0/1
[PE-AGG-GigabitEthernet0/0/1]port link-type trunk
[PE-AGG-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 300
[PE-AGG-GigabitEthernet0/0/1] stp disable
[PE-AGG-GigabitEthernet0/0/1] quit
[PE-AGG] interface gigabitethernet 0/0/2
[PE-AGG-GigabitEthernet0/0/2] port link-type trunk
[PE-AGG-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 to 300
[PE-AGG-GigabitEthernet0/0/2] stp disable
[PE-AGG-GigabitEthernet0/0/2] quit
Step 3 Create RRPP domains and configure protected VLANs and control VLANs.
l Configure UPEA.
# Configure the VLANs mapping instance 1 as protected VLANs in domain 1, and configure
VLAN 5 as the control VLAN.
<UPEA> system-view
[UPEA] rrpp domain 1
l Configure UPEB.
# Configure the VLANs mapping instance 1 as protected VLANs in domain 1, and configure
VLAN 5 as the control VLAN.
<UPEB> system-view
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEB-rrpp-domain-region1] control-vlan 5
[UPEB-rrpp-domain-region1] quit
l Configure UPEC.
# Configure the VLANs mapping instance 1 as protected VLANs in domain 1, and configure
VLAN 5 as the control VLAN.
<UPEC> system-view
[UPEC] rrpp domain 1
[UPEC-rrpp-domain-region1] protected-vlan reference-instance 1
[UPEC-rrpp-domain-region1] control-vlan 5
[UPEC-rrpp-domain-region1] quit
l Configure PE-AGG.
# Configure the VLANs mapping instance 1 as protected VLANs in domain 1, and configure
VLAN 5 as the control VLAN.
<PE-AGG> system-view
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] protected-vlan reference-instance 1
[PE-AGG-rrpp-domain-region1] control-vlan 5
[PE-AGG-rrpp-domain-region1] quit
l Configure UPEB.
# Configure UPEB as a transit node of ring 1 in domain 1 and specify primary and secondary
interfaces.
<UPEB> system-view
[UPEB] rrpp domain 1
[UPEB-rrpp-domain-region1] ring 1 node-mode transit primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[UPEB-rrpp-domain-region1] ring 1 enable
[UPEB-rrpp-domain-region1] quit
l Configure UPEC.
# Configure UPEC as a transit node of ring 1 in domain 1 and specify primary and secondary
interfaces.
<UPEC> system-view
[UPEC] rrpp domain 1
l Configure PE-AGG.
# Configure PE-AGG as the master node of ring 1 in domain 1, GE 0/0/1 as the primary interface,
and GE 0/0/2 as the secondary interface.
<PE-AGG> system-view
[PE-AGG] rrpp domain 1
[PE-AGG-rrpp-domain-region1] ring 1 node-mode master primary-port gigabitethernet
0/0/1 secondary-port gigabitethernet 0/0/2 level 0
[PE-AGG-rrpp-domain-region1] ring 1 enable
[PE-AGG-rrpp-domain-region1] quit
l Configure UPEB.
# Enable RRPP.
<UPEB> system-view
[UPEB] rrpp enable
l Configure UPEC.
# Enable RRPP.
<UPEC> system-view
[UPEC] rrpp enable
l Configure PE-AGG.
# Enable RRPP.
<PE-AGG> system-view
[PE-AGG] rrpp enable
After the preceding configurations are complete and the network topology becomes stable,
perform the following operations to verify the configuration. Take the display on UPEA and
PE-AGG as examples.
l On UPEA, run the display rrpp brief or display rrpp verbose domain command. The result
is as follows:
# Check the brief information of RRPP on UPEA.
<UPEA> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
RRPP is enabled on UPEA, VLAN 5 is the control VLAN and VLANs mapping instance 1 are
the protected VLANs in domain 1, and UPE A is a transit node on ring 1; GE 0/0/1 is the primary
interface, and GE 0/0/2 is the secondary interface.
RRPP Ring : 1
Ring Level : 0
Node Mode : Transit
Ring State : LinkUp
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: UP
The preceding information shows that VLAN 5 is the control VLAN in domain 1, and VLANs
mapping instance 1 are the protected VLANs; UPEA is a transit node in domain 1 and is in
LinkUp state; RRPP is enabled on UPEA.
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN : Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Ring Ring Node Primary/Common Secondary/Edge Is
ID Level Mode Port Port Enabled
---------------------------------------------------------------------------
1 0 M GigabitEthernet0/0/1 GigabitEthernet0/0/2 Yes
The preceding information shows that RRPP is enabled on PE-AGG. In domain 1, VLAN 5 is
the major control VLAN, VLANs mapping instance 1 are the protected VLANs, and PE-AGG
is the master node on ring 1; GE 0/0/1 is the primary interface, and GE 0/0/2 is the secondary
interface.
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: BLOCKED
The preceding information shows that VLAN 5 is the control VLAN in domain 1, and VLANs
mapping instance 1 are the protected VLANs. PE-AGG is the master node in domain 1 and is
in Complete state. GE 0/0/1 is the primary interface, and GE 0/0/2 is the secondary interface.
Step 6 Configure Ethernet CFM.
# Configure UPEA.
[UPEA] cfm md md1
[UPEA-md-md1] ma ma1
[UPEA-md-md1-ma-ma1] map vlan 100
[UPEA-md-md1-ma-ma1] mep mep-id 1 interface gigabitethernet 0/0/2 outward
[UPEA-md-md1-ma-ma1] remote-mep mep-id 2
[UPEA-md-md1-ma-ma1] remote-mep ccm-receive mep-id 2 enable
[UPEA-md-md1-ma-ma1] mep ccm-send enable
[UPEA-md-md1-ma-ma1] quit
[UPEA-md-md1] ma ma2
[UPEA-md-md1-ma-ma2] map vlan 100
[UPEA-md-md1-ma-ma2] mep mep-id 3 interface gigabitethernet 0/0/1 outward
[UPEA-md-md1-ma-ma2] remote-mep mep-id 4
[UPEA-md-md1-ma-ma2] remote-mep ccm-receive mep-id 4 enable
[UPEA-md-md1-ma-ma2] mep ccm-send enable
[UPEA-md-md1-ma-ma2] quit
# Configure PE-AGG.
[PE-AGG] cfm md md1
[PE-AGG-md-md1] ma ma1
[PE-AGG-md-md1-ma-ma1] map vlan 100
[PE-AGG-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 0/0/1 outward
[PE-AGG-md-md1-ma-ma1] remote-mep mep-id 1
[PE-AGG-md-md1-ma-ma1] remote-mep ccm-receive mep-id 1 enable
[PE-AGG-md-md1-ma-ma1] mep ccm-send enable
[PE-AGG-md-md1-ma-ma1] quit
[PE-AGG-md-md1] ma ma2
[PE-AGG-md-md1-ma-ma2] map vlan 100
[PE-AGG-md-md1-ma-ma2] mep mep-id 4 interface gigabitethernet 0/0/2 outward
[PE-AGG-md-md1-ma-ma2] remote-mep mep-id 3
[PE-AGG-md-md1-ma-ma2] remote-mep ccm-receive mep-id 3 enable
[PE-AGG-md-md1-ma-ma2] mep ccm-send enable
[PE-AGG-md-md1-ma-ma2] quit
On UPEA or PE-AGG, run the display cfm remote-mep command to check the status of
Ethernet CFM. You can find that Ethernet CFM is in Up state. Take the display on PE-AGG as
an example.
[PE-AGG] diplay cfm remote-mep
The total number of RMEPs is : 2
The status of RMEPS : 2 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md1
Level : 0
MA Name : ma1
RMEP ID : 1
Vlan ID : 100
VSI Name : --
MAC : 0018-82d1-b6df
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
MD Name : md1
Level : 0
MA Name : ma2
RMEP ID : 3
Vlan ID : 100
VSI Name : --
MAC : 0018-82d1-b6df
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
MD Name : md1
Level : 0
MA Name : ma2
RMEP ID : 3
Vlan ID : 100
VSI Name : --
MAC : 0018-82d1-b6df
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
Run the display this interface command on PE-AGG to check the status of GE 0/0/1, and you
can find that GE 0/0/1 is in TRIGGER DOWN (1AG) state.
[PE-AGG] display this interface gigabitethernet0/0/1
GigabitEthernet0/0/1 current state : TRIGGER DOWN
(1AG)
Line protocol current state : DOWN
Description:HUAWEI, Quidway Series, GigabitEthernet0/0/1 Interface
Switch Port,PVID : 1,The Maximum Frame Length is 1600
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0018-8211-1111
Port Mode: COMBO AUTO
Current Work Mode: COPPER
Speed : 1000, Loopback: NONE
Duplex: FULL, Negotiation: DISABLE
Mdi : AUTO
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Run the display rrpp verbose domain 1 command on PE-AGG to check the status of the RRPP
ring and interface, and following information is displayed:
<PE-AGG> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Failed
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: DOWN
Secondary port: GigabitEthernet0/0/2 Port status: UP
The status of the RRPP ring becomes Failed and the secondary interface changes from
BLOCKED to UP.
Re-enable GE 0/0/1 of UPEB, and you can find that the CFM status on PE-AGG becomes UP.
Run the display rrpp verbose domain 1 command on PE-AGG to check the status of the RRPP
ring and interface, and you can find that the RRPP ring becomes Complete as follows:
<PE-AGG> display rrpp verbose domain 1
Domain Index : 1
Control VLAN : major 5 sub 6
Protected VLAN: Reference Instance 1
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port: GigabitEthernet0/0/2 Port status: BLOCKED
----End
Configuration Files
l Configuration file of UPEA
#
sysname UPEA
#
vlan batch 5 to 6 100 to 300
#
rrpp enable
#
cfm enable
#
stp region-configuration
instance 1 vlan 5 6 100 to 300
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
GigabitEthernet 0/0/2 level 0
ring 1 enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 5 to 6 100 to 300
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 5 to 6 100 to 300
stp disable
#
cfm md md1
ma ma1
map vlan 100
mep mep-id 1 interface GigabitEthernet0/0/2 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
ma ma2
map vlan 100
mep mep-id 3 interface GigabitEthernet0/0/1 outward
mep ccm-send mep-id 3 enable
remote-mep mep-id 4
remote-mep ccm-receive mep-id 4 enable
#
oam-mgr
oam-bind ingress interface GigabitEthernet0/0/2 egress cfm md md1 ma ma1 trigger
if-down
oam-bind ingress interface GigabitEthernet0/0/1 egress cfm md md1 ma ma2 trigger
if-down
oam-bind ingress cfm md md1 ma ma1 trigger if-down egress interface
GigabitEthernet0/0/2
oam-bind ingress cfm md md1 ma ma2 trigger if-down egress interface
GigabitEthernet0/0/1
#
return
l Configuration file of UPEB
#
sysname UPEB
#
vlan batch 5 to 6 100 to 300
#
rrpp enable
#
stp region-configuration
instance 1 vlan 5 6 100 to 200
active region-configuration
#
rrpp domain 1
control-vlan 5
protected-vlan reference-instance 1
ring 1 node-mode transit primary-port GigabitEthernet 0/0/1 secondary-port
stp disable
#
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vlan 5 to 6 100 to 300
stp disable
#
cfm md md1
ma ma1
map vlan 100
mep mep-id 2 interface GigabitEthernet0/0/1 outward
mep ccm-send mep-id 2 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
ma ma2
map vlan 100
mep mep-id 4 interface GigabitEthernet0/0/2 0 outward
mep ccm-send mep-id 4 enable
remote-mep mep-id 3
remote-mep ccm-receive mep-id 3 enable
#
oam-mgr
oam-bind ingress interface GigabitEthernet0/0/1 egress cfm md md1 ma ma1 trigger
if-down
oam-bind ingress interface GigabitEthernet0/0/2 egress cfm md md1 ma ma2 trigger
if-down
oam-bind ingress cfm md md1 ma ma1 trigger if-down egress interface
GigabitEthernet0/0/1
oam-bind ingress cfm md md1 ma ma2 trigger if-down egress interface
GigabitEthernet0/0/2
#
return
Networking Requirements
As shown in Figure 4-24, Layer 2 switching devices LSW1 to LSW5 form a ring network, which
is connected to the core network. In this networking mode:
l SEP runs at the access layer.
– The topology change notification function needs to be configured at the access layer.
In this way, devices at the aggregation layer can update their MAC address tables and
ARP tables when a fault occurs at the access layer.
– SEP needs to be associated with Ethernet CFM on the devices between the access layer
and aggregation layer. In this way, devices at the access layer can update their MAC
address tables and ARP tables when a fault occurs at the aggregation layer.
l NPE1 and NPE2 form a VRRP group to improve network reliability.
l A BFD session is set up between NPE1 and NPE2 to detect the link status and implement
VRRP fast switchover.
IP/MPLS Core
NPE1 NPE2
Core
Master Backup
GE1/0/1.1 GE1/0/1.1
10.1.1.1/24 BFD 10.1.1.2/24
Virtual IP Address:
10.1.1.10
GE1/0/2 GE1/0/2
Aggregation
GE1/0/1 GE1/0/1
CFM
GE0/0/2 GE0/0/2
LSW1 LSW5
GE0/0/1 GE0/0/1
SEP
Segment1
GE0/0/1 GE0/0/1
LSW2 LSW4
LSW3
GE0/0/2 GE0/0/2
Access
GE0/0/1 GE0/0/2
GE0/0/3
Configuration Roadmap
The configuration roadmap is as follows:
(1) Configure SEP segment 1 on LSW1 to LSW5 and configure VLAN 10 as the control
VLAN of SEP segment 1.
(2) Add all devices on the ring to SEP segment 1, and configure the roles of GE0/0/1 on
LSW1 and GE0/0/1 on LSW5 in SEP segment 1.
(3) On the device where the primary edge port is located, specify the port in the middle
of the SEP segment as the port to block.
(4) Configure the manual preemption mode on the device where the primary edge port is
located.
2. Configure basic CFM functions.
(1) Configure Ethernet CFM between PE-AGG1 and LSW1.
(2) Associate Ethernet CFM with GE0/0/1 on LSW1.
3. Configure VLANs on PE-AGG1 and PE-AGG2 to transmit VRRP packets and BFD
packets.
4. Set up a single-hop BFD session between NPE1 and NPE2 to detect the interfaces
configured with the VRRP group. The BFD session notifies VRRP of the interface status
so that VRRP fast switchover can be implemented.
5. Configure VRRP.
(1) Create VEEP group 1 on GE 1/0/1 of PE1 and set a higher priority for NPE1 so that
NPE1 functions as the master device in VRRP group 1.
(2) Create VRRP group 1 on GE 1/0/1 of PE2 and retain the default priority of NPE2.
(3) Bind VRRP group 1 to the BFD session.
6. Configure the Layer 2 forwarding function on CE1 and LSW1 to LSW5.
Data Preparation
To complete the configuration, you need the following data:
l SEP segment ID
l Control VLAN of the SEP segment
l Port roles in the SEP segment
l Preemption mode
l Method of selecting the port to block
l Interface where Ethernet CFM is enabled
l Interface associated with Ethernet CFM
l Local discriminators and remote discriminators of the BFD session
Minimum interval for sending BFD packets, minimum interval for receiving packets, and
local detection multiplier (default values used)
l ID and virtual IP address of the VRRP group
l Priority of NPE1 in the VRRP group
Procedure
Step 1 Configure basic SEP functions.
1. Configure SEP segment 1 on LSW1 to LSW5 and configure VLAN 10 as the control VLAN
of SEP segment 1.
# Configure LSW1.
<Quidway> system-view
[Quidway] sysname LSW1
[LSW1] sep segment 1
[LSW1-sep-segment1] control-vlan 10
[LSW1-sep-segment1] protected-instance all
[LSW1-sep-segment1] quit
# Configure LSW2.
<Quidway> system-view
[Quidway] sysname LSW2
[LSW2] sep segment 1
[LSW2-sep-segment1] control-vlan 10
[LSW2-sep-segment1] protected-instance all
[LSW2-sep-segment1] quit
# Configure LSW3.
<Quidway> system-view
[Quidway] sysname LSW3
[LSW3] sep segment 1
[LSW3-sep-segment1] control-vlan 10
[LSW3-sep-segment1] protected-instance all
[LSW3-sep-segment1] quit
# Configure LSW4.
<Quidway> system-view
[Quidway] sysname LSW4
[LSW4] sep segment 1
[LSW4-sep-segment1] control-vlan 10
[LSW4-sep-segment1] protected-instance all
[LSW4-sep-segment1] quit
# Configure LSW5.
<Quidway> system-view
[Quidway] sysname LSW5
[LSW5] sep segment 1
[LSW5-sep-segment1] control-vlan 10
[LSW5-sep-segment1] protected-instance all
[LSW5-sep-segment1] quit
NOTE
l The control VLAN must be a VLAN that has not been created or used, but the configuration file
automatically displays the command for creating the VLAN.
l Each SEP segment must be configured with a control VLAN. After an interface is added to the
SEP segment configured with a control VLAN, the interface is added to the control VLAN
automatically. The configuration file displays port hybrid tagged vlan under this interface.
2. Add all devices on the ring to SEP segment 1 and configure port roles on the devices.
NOTE
By default, STP is enabled on a Layer 2 interface. Before adding an interface to the SEP segment,
disable STP on the interface.
# Configure LSW1.
[LSW1] interface gigabitethernet 0/0/1
[LSW1-GigabitEthernet0/0/1] stp disable
[LSW1-GigabitEthernet0/0/1] sep segment 1 edge primary
[LSW1-GigabitEthernet0/0/1] quit
# Configure LSW2.
[LSW2] interface gigabitethernet 0/0/1
[LSW2-GigabitEthernet0/0/1] stp disable
[LSW2-GigabitEthernet0/0/1] sep segment 1
[LSW2-GigabitEthernet0/0/1] quit
[LSW2] interface gigabitethernet 0/0/2
[LSW2-GigabitEthernet0/0/2] stp disable
[LSW2-GigabitEthernet0/0/2] sep segment 1
[LSW2-GigabitEthernet0/0/2] quit
# Configure LSW3.
# Configure LSW4.
[LSW4] interface gigabitethernet 0/0/1
[LSW4-GigabitEthernet0/0/1] stp disable
[LSW4-GigabitEthernet0/0/1] sep segment 1
[LSW4-GigabitEthernet0/0/1] quit
[LSW4] interface gigabitethernet 0/0/2
[LSW4-GigabitEthernet0/0/2] stp disable
[LSW4-GigabitEthernet0/0/2] sep segment 1
[LSW4-GigabitEthernet0/0/2] quit
# Configure LSW5.
[LSW5] interface gigabitethernet 0/0/1
[LSW5-GigabitEthernet0/0/1] stp disable
[LSW5-GigabitEthernet0/0/1] sep segment 1 edge secondary
[LSW5-GigabitEthernet0/0/1] quit
NOTE
l You must set the preemption delay when delayed preemption is adopted because there is no
default delay time.
l After all the faulty ports recover, the edge ports no longer receive fault notification packets. If
the primary edge port does not receive any fault notification packet, it starts the delay timer.
When the delay timer expires, nodes in the SEP segment start blocked port preemption.
To implement delayed preemption in this example, you need to simulate a port fault and then
rectify the fault. For example:
Run the shutdown command on GE0/0/2 of LSW2 to simulate a port fault, and then run the
undo shutdown command on GE0/0/2 to rectify the fault.
After completing the preceding configurations, do as follows to verify the configuration. LSW1
is taken as an example.
l Run the display sep topology command on LSW1 to view detailed topology information of
the SEP segment.
The topology information shows that GE0/0/2 of LSW3 is in Discarding state, and the other
ports are in Forwarding state.
<LSW1> display sep topology
SEP segment 1
----------------------------------------------------------------
System Name Port Name Port Role Port Status
----------------------------------------------------------------
LSW1 GE0/0/1 primary forwarding
LSW2 GE0/0/1 common forwarding
LSW2 GE0/0/2 common forwarding
LSW3 GE0/0/1 common forwarding
LSW3 GE0/0/2 common discarding
LSW4 GE0/0/1 common forwarding
LSW4 GE0/0/2 common forwarding
LSW5 GE0/0/1 secondary forwarding
# Configure PE-AGG1.
<Quidway> system-view
[Quidway] PE-AGG1
[PE-AGG1] interface gigabitethernet 1/0/1
[PE-AGG1-GigabitEthernet1/0/1] portswitch
[PE-AGG1-GigabitEthernet1/0/1] undo shutdown
[PE-AGG1-GigabitEthernet1/0/1] quit
[PE-AGG1] cfm enable
[PE-AGG1] cfm md md1
[PE-AGG1-md-md1] ma ma1
[PE-AGG1-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 1/0/1 outward
[PE-AGG1-md-md1-ma-ma1] remote-mep mep-id 1
[PE-AGG1-md-md1-ma-ma1] mep ccm-send enable
[PE-AGG1-md-md1-ma-ma1] remote-mep ccm-receive enable
[PE-AGG1-md-md1-ma-ma1] quit
[PE-AGG1-md-md1] quit
NOTE
The interface where the Maintenance Association End Point (MEP) is configured must be a Layer 2
interface. Only one MEP can be configured on an interface.
After the configuration, run the display cfm remote-mep command on LSW1, and you
can find that Ethernet CFM is in Up state.
[LSW1] display cfm remote-mep
The total number of RMEPs is : 1
The status of RMEPS : 1 up, 0 down, 0 disable
--------------------------------------------------
MD Name : md1
Level : 0
MA Name : ma1
RMEP ID : 2
Vlan ID : --
VSI Name : --
MAC : --
CCM Receive : enabled
Trigger-If-Down : disabled
CFM Status : up
Run the shutdown command on GE 1/0/1 of PE-AGG1 to simulate a link fault. The fault
message is transmitted to the SEP segment through the interface configured with Ethernet
CFM and the OAM management module. Run the display sep interface command on
LSW3, and you can find that GE0/0/2 switches from the Disabling state to the Forwarding
state.
<LSW3> display sep interface gigabitethernet 0/0/2
SEP segment 1
----------------------------------------------------------------
Interface Port Role Neighbor Status Port Status
----------------------------------------------------------------
GE0/0/2 common up forwarding
Step 3 Configure VLAN 100 to transmit VRRP packets and configure VLAN 200 to transmit BFD
packets.
# Configure PE-AGG1.
[PE-AGG1] vlan batch 100 200
[PE-AGG1] interface gigabitethernet 1/0/2
[PE-AGG1-GigabitEthernet1/0/2] portswitch
[PE-AGG1-GigabitEthernet1/0/2] undo shutdown
[PE-AGG1-GigabitEthernet1/0/2] port default vlan 200
[PE-AGG1-GigabitEthernet1/0/2] port trunk allow-pass vlan 100
[PE-AGG1-GigabitEthernet1/0/2] quit
[PE-AGG1] interface gigabitethernet 1/0/3
[PE-AGG1-GigabitEthernet1/0/3] port trunk allow-pass vlan 100 200
[PE-AGG1-GigabitEthernet1/0/3] quit
# Configure PE-AGG2.
[PE-AGG2] vlan batch 100 200
[PE-AGG2] interface gigabitethernet 1/0/2
[PE-AGG2-GigabitEthernet1/0/2] portswitch
[PE-AGG2-GigabitEthernet1/0/2] undo shutdown
[PE-AGG2-GigabitEthernet1/0/2] port default vlan 200
[PE-AGG2-GigabitEthernet1/0/2] port trunk allow-pass vlan 100
[PE-AGG2-GigabitEthernet1/0/2] quit
[PE-AGG2] interface gigabitethernet 1/0/3
[PE-AGG2-GigabitEthernet1/0/3] port trunk allow-pass vlan 100 200
[PE-AGG2-GigabitEthernet1/0/3] quit
# Enable the BFD function on NPE2 and configure the BFD session between NPE1 and
NPE2.
[NPE2] bfd
[NPE2-bfd] quit
[NPE2] bfd NPE1 bind peer-ip default-ip interface gigabitethernet 1/0/1
[NPE2-bfd-session-npe2] discriminator local 2
[NPE2-bfd-session-npe2] discriminator remote 1
[NPE2-bfd-session-npe2] commit
[NPE2-bfd-session-npe2] quit
After the configuration, run the display bfd session all command on NPE1 and NPE2, and
you can find that the BFD session is set up and its status is Up.
Take the display on NPE1 as an example.
<NPE1> display bfd session all
------------------------------------------------------------------------------
--
Local Remote PeerIpAddr State Type InterfaceName
------------------------------------------------------------------------------
--
1 2 224.0.0.184 Up S_IP_IF GigabitEthernet1/0/1
------------------------------------------------------------------------------
--
Total UP/DOWN Session Number : 1/0
# Configure NPE2.
[NPE2] bfd
[NPE2-bfd] quit
[NPE2] bfd NPE1
[NPE2-bfd-session-npe1] process-interface-status sub-if
[NPE2-bfd-session-npe1] commit
[NPE2-bfd-session-npe1] quit
After the configuration, run the display bfd session all verbose command on NPE1 and
NPE2, and you can find that the value of the Proc interface status field is Enable (Sub-
If).
Take the display on NPE1 as an example.
<NPE1> display bfd session all verbose
------------------------------------------------------------------------------
--
Session MIndex : 257 (One Hop) State : Up Name : npe2
------------------------------------------------------------------------------
--
Local Discriminator : 1 Remote Discriminator : 2
Session Detect Mode : Asynchronous Mode Without Echo Function
l # Configure an IP address for the sub-interface on NPE2. Create VRRP group 1 on the sub-
interface and retain the default priority of NPE2 so that NPE2 functions as the backup device
in VRRP group 1.
[NPE2] interface gigabitethernet 1/0/1.1
[NPE2-GigabitEthernet1/0/1.1] vrrp vrid 1 virtual-ip 10.1.1.10
After the configuration, run the display vrrp command on NPE1, and you can find that NPE1 is
the master device. Run the display vrrp command on NPE2, and you can find that NPE2 is the
backup device.
<NPE1> display vrrp
GigabitEthernet1/0/1.1 | Virtual Router 1
State : Master
Virtual IP : 10.1.1.10
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 10
TimerRun : 1
TimerConfig : 1
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Step 6 Configure the Layer 2 forwarding function on CE1, PE-AGG1, PE-AGG2, and LSW1 to LSW5.
For details about the configuration, see the configuration files.
Step 7 Verify the configuration.
l Run the shutdown command on GE0/0/1 of LSW3 to simulate a port fault, and then run the
display sep interface command on LSW3 to check whether GE0/0/2 of LSW3 switches from
the Discarding state to the Forwarding state.
<LSW3> display sep interface gigabitethernet 0/0/2
SEP segment 1
----------------------------------------------------------------
Interface Port Role Neighbor Status Port Status
----------------------------------------------------------------
GE0/0/2 common up forwarding
l Run the shutdown command on GE1/0/1.1 of NPE1 to simulate a port fault, and then run
the display vrrp command on NPE2 to check whether NPE2 becomes the master device.
<NPE2> display vrrp
GigabitEthernet1/0/1.1 | Virtual Router 1
State : Master
Virtual IP : 10.1.1.10
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 100
Preempt : YES Delay Time : 0
TimerRun : 1
TimerConfig : 1
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
Track BFD : 2 type: peer
BFD-session state : UP
----End
Configuration Files
l Configuration file of LSW1
#
sysname LSW1
#
vlan batch 10 100
#
cfm enable
#
sep segment 1
control-vlan 10
block port optimal
preempt delay 30
protected-instance 0 to 48
#
interface GigabitEthernet0/0/1
port hybrid tagged vlan 10 100
stp disable
sep segment 1 edge primary
#
interface GigabitEthernet0/0/2
port hybrid tagged vlan 100
#
cfm md md1
ma ma1
mep mep-id 1 interface GigabitEthernet0/0/2 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
#
oam-mgr
oam-bind ingress cfm md md1 ma ma1 egress sep segment 1 interface
gigabitethernet 0/0/1
#
return
l Configuration file of LSW2
#
sysname LSW2
#
vlan batch 10 100
#
sep segment 1
control-vlan 10
protected-instance 0 to 48
#
interface GigabitEthernet0/0/1
port hybrid tagged vlan 10 100
stp disable
sep segment 1
#
interface GigabitEthernet0/0/2
port hybrid tagged vlan 10 100
stp disable
sep segment 1
#
return
l Configuration file of LSW3
#
sysname LSW3
#
vlan batch 10 100
#
sep segment 1
control-vlan 10
protected-instance 0 to 48
#
interface GigabitEthernet0/0/1
port hybrid tagged vlan 10 100
stp disable
sep segment 1
#
interface GigabitEthernet0/0/2
port hybrid tagged vlan 10 100
stp disable
sep segment 1
process-interface-status sub-if
commit
#
return
l Configuration file of NPE2
#
sysname NPE2
#
bfd
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 11.1.1.2 255.255.255.0
#
interface GigabitEthernet1/0/1.1
vlan-type dot1q 100
ip address 10.1.1.2 255.255.255.0
vrrp vrid 1 virtual-ip 10.1.1.10
vrrp vrid 1 track bfd-session 2 peer
#
bfd npe1 bind peer-ip default-ip interface GigabitEthernet1/0/1
discriminator local 2
discriminator remote 1
process-interface-status sub-if
commit
#
return
l Configuration file of PE-AGG1
#
sysname PE-AGG1
#
vlan batch 100 200
#
cfm enable
#
interface GigabitEthernet1/0/1
portswitch
undo shutdown
port trunk allow-pass vlan 100
#
interface GigabitEthernet1/0/2
portswitch
undo shutdown
port default vlan 200
port trunk allow-pass vlan 100
#
interface GigabitEthernet1/0/3
portswitch
undo shutdown
port trunk allow-pass vlan 100 200
#
cfm md md1
ma ma1
mep mep-id 2 interface GigabitEthernet1/0/1 outward
mep ccm-send mep-id 2 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
#
return
l Configuration file of PE-AGG2
#
sysname PE-AGG2
#
vlan batch 100 200
#
interface GigabitEthernet1/0/1
portswitch
undo shutdown
port trunk allow-pass vlan 100
#
interface GigabitEthernet1/0/2
portswitch
undo shutdown
port default vlan 200
port trunk allow-pass vlan 100
#
interface GigabitEthernet1/0/3
portswitch
undo shutdown
port trunk allow-pass vlan 100 200
#
return
Networking Requirements
As shown in Figure 4-25, the one-way frame delay measurement is deployed on Switch A. The
interval for sending DM frames is set to 10 seconds and the number of DM frames sent each
time is also set to 10.
Figure 4-25 Networking diagram of configuring the one-way frame delay measurement in a
VLAN
SwitchC SwitchD
GE0/0/2 GE0/0/2
GE0/0/1 GE0/0/1
GE0/0/1 GE0/0/1
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure VLANs on Switch A, Switch B, Switch C, and Switch D.
2. Configure MDs and MAs on Switch A and Switch B.
3. Configure outward-facing MEPs on Switch A and Switch B.
4. Set the alarm thresholds of the one-way frame delay measurement on Switch A.
5. Enable the one-way frame delay measurement for the VLANs on Switch A
Data Preparation
To complete the configuration, you need the following data:
l VLAN ID
l Alarm threshold of the one-way frame delay measurement
l Names of the MD and MA
Procedure
Step 1 Configure VLANs.
# Configure Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan 2
[SwitchA-vlan2] quit
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 2
[SwitchA-GigabitEthernet0/0/1] quit
# Configure Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan 2
[SwitchB-vlan2] quit
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 2
[SwitchB-GigabitEthernet0/0/1] quit
# Configure Switch C.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] vlan 2
[SwitchC-vlan2] quit
[SwitchC] interface gigabitethernet 0/0/1
[SwitchC-GigabitEthernet0/0/1] port link-type trunk
[SwitchC-GigabitEthernet0/0/1] port trunk allow-pass vlan 2
[SwitchC-GigabitEthernet0/0/1] quit
[SwitchC] interface gigabitethernet 0/0/2
[SwitchC-GigabitEthernet0/0/2] port link-type trunk
[SwitchC-GigabitEthernet0/0/2] port trunk allow-pass vlan 2
[SwitchC-GigabitEthernet0/0/2] quit
# Configure Switch D.
<Quidway> system-view
[Quidway] sysname SwitchD
[SwitchD] vlan 2
[SwitchD-vlan2] quit
[SwitchD] interface gigabitethernet 0/0/2
[SwitchD-GigabitEthernet0/0/2] port link-type trunk
[SwitchD-GigabitEthernet0/0/20] port trunk allow-pass vlan 2
[SwitchD-GigabitEthernet0/0/2] quit
[SwitchD] interface gigabitethernet 0/0/1
[SwitchD-GigabitEthernet0/0/1] port link-type trunk
[SwitchD-GigabitEthernet0/0/1] port trunk allow-pass vlan 2
[SwitchD-GigabitEthernet0/0/1] quit
# Configure Switch B.
[SwitchB] cfm version standard
[SwitchB] cfm enable
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] map vlan 2
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
# Configure Switch B.
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 0/0/1 outward
[SwitchB-md-md1-ma-ma1] remote-mep mep-id 1
[SwitchB-md-md1-ma-ma1] mep ccm-send mep-id 2 enable
[SwitchA-md-md1-ma-ma1] remote-mep ccm-receive mep-id 1 enable
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
Step 4 Set the alarm threshold for the two-way frame delay measurement to 1000 on Switch A.
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] delay-measure two-way threshold 1000
[SwitchA-md-md1-ma-ma1] quit
[SwitchA-md-md1] quit
# Configure Switch B.
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] delay-measure one-way receive
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 2
#
cfm version standard
cfm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2
#
cfm md md1
ma ma1
map vlan 2
mep mep-id 1 interface GigabitEthernet0/0/1 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
delay-measure one-way threshold 1000
delay-measure one-way receive
#
return
vlan batch 2
#
cfm version standard
cfm enable
#
interface GigabitEthernet0/0/1 outward
port link-type trunk
port trunk allow-pass vlan 2
#
cfm md md1
ma ma1
map vlan 2
mep mep-id 2 interface GigabitEthernet0/0/1 outward
mep ccm-send mep-id 2 enable
remote-mep mep-id 1
remote-mep ccm-receive mep-id 1 enable
delay-measure one-way receive
#
return
Networking Requirements
As shown in Figure 4-26, the two-way frame delay measurement is deployed both on Switch
A and Switch B. The interval for sending DM frames is set to 10 seconds and the number of DM
frames sent each time is also set to 10.
Figure 4-26 Networking diagram of configuring the two-way frame delay measurement in a
VLAN
SwitchC SwitchD
GE0/0/2 GE0/0/2
GE0/0/1 GE0/0/1
GE0/0/1 GE0/0/1
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure VLANs on Switch A, Switch B, Switch C, and Switch D.
2. Configure MDs and MAs on Switch A and Switch B.
3. Configure outward-facing MEPs on Switch A and Switch B.
4. Set the alarm thresholds of the two-way frame delay measurement on Switch A and Switch
B.
5. Enable the two-way frame delay measurement for the VLANs on Switch A and Switch B.
Data Preparation
To complete the configuration, you need the following data:
l VLAN ID
l Alarm threshold of the two-way frame delay measurement
l Names of the MD and MA
Procedure
Step 1 Configure VLANs.
# Configure Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan 2
[SwitchA-vlan2] quit
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port link-type trunk
[SwitchA-GigabitEthernet0/0/1] port trunk allow-pass vlan 2
[SwitchA-GigabitEthernet0/0/1] quit
# Configure Switch B.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan 2
[SwitchB-vlan2] quit
[SwitchB-GigabitEthernet0/0/1] port link-type trunk
[SwitchB-GigabitEthernet0/0/1] port trunk allow-pass vlan 2
[SwitchB-GigabitEthernet0/0/1] quit
# Configure Switch C.
<Quidway> system-view
[Quidway] sysname SwitchC
[SwitchC] vlan 2
[SwitchC-vlan2] quit
[SwitchC] interface gigabitethernet 0/0/1
[SwitchC-GigabitEthernet0/0/1] port link-type trunk
[SwitchC-GigabitEthernet0/0/1] port trunk allow-pass vlan 2
[SwitchC-GigabitEthernet0/0/1] quit
[SwitchC] interface gigabitethernet 0/0/2
[SwitchC-GigabitEthernet0/0/2] port link-type trunk
[SwitchC-GigabitEthernet0/0/2] port trunk allow-pass vlan 2
[SwitchC-GigabitEthernet0/0/2] quit
# Configure Switch D.
<Quidway> system-view
[Quidway] sysname SwitchD
[SwitchD] vlan 2
[SwitchD-vlan2] quit
[SwitchD] interface gigabitethernet 0/0/2
[SwitchD-GigabitEthernet0/0/2] port link-type trunk
[SwitchD-GigabitEthernet0/0/20] port trunk allow-pass vlan 2
[SwitchD-GigabitEthernet0/0/2] quit
[SwitchD] interface gigabitethernet 0/0/1
[SwitchD-GigabitEthernet0/0/1] port link-type trunk
[SwitchD-GigabitEthernet0/0/1] port trunk allow-pass vlan 2
[SwitchD-GigabitEthernet0/0/1] quit
# Configure Switch B.
[SwitchB] cfm version standard
[SwitchB] cfm enable
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] map vlan 2
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
[SwitchA-md-md1-ma-ma1] quit
[SwitchA-md-md1] quit
# Configure Switch B.
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] mep mep-id 2 interface gigabitethernet 0/0/1 outward
[SwitchB-md-md1-ma-ma1] remote-mep mep-id 1
[SwitchB-md-md1-ma-ma1] mep ccm-send mep-id 2 enable
[SwitchA-md-md1-ma-ma1] remote-mep ccm-receive mep-id 1 enable
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
Step 4 Set the alarm threshold for the two-way frame delay measurement to 1000.
# Configure Switch A.
[SwitchA] cfm md md1
[SwitchA-md-md1] ma ma1
[SwitchA-md-md1-ma-ma1] delay-measure two-way threshold 1000
[SwitchA-md-md1-ma-ma1] quit
[SwitchA-md-md1] quit
# Configure Switch B.
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] delay-measure two-way threshold 1000
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
# Configure Switch B.
[SwitchB] cfm md md1
[SwitchB-md-md1] ma ma1
[SwitchB-md-md1-ma-ma1] delay-measure two-way receive
[SwitchB-md-md1-ma-ma1] delay-measure two-way mac 0018-82d1-b6be interval 10000
count 10
[SwitchB-md-md1-ma-ma1] quit
[SwitchB-md-md1] quit
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 2
#
cfm version standard
cfm enable
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2
#
cfm md md1
ma ma1
map vlan 2
mep mep-id 1 interface GigabitEthernet0/0/1 outward
mep ccm-send mep-id 1 enable
remote-mep mep-id 2
remote-mep ccm-receive mep-id 2 enable
delay-measure two-way threshold 1000
delay-measure two-way receive
#
return
5 BFD Configuration
NOTE
BFD is a unified detection mechanism of the entire network to detect communication faults
between forwarding devices. BFD detects the connectivity of data protocols, such as the IP
protocol, between two devices on a path.
l Low-load and short-duration detection of faults on the path between adjacent forwarding
devices
l Real-time and unified detection and different detection intervals and overheads for all
media or protocol layers
The S5300s send BFD control packets based on the negotiated period. If an S5300 does not
receive the packet of the peer within the detection time, the S5300 sets the BFD session in Down
state. The upper-layer application can take actions according to the status of the BFD session.
When the two ends of a BFD session create discriminators in different modes:
l If the discriminators on the local end are specified manually, the discriminators on the
remote end must also be specified manually.
l If you configure a static BFD session with automatically negotiated discriminators on the
local end, you can configure a static BFD session with automatically negotiated
discriminators or configure a dynamic BFD session on the peer end.
l If a static BFD session with automatically negotiated discriminators and a dynamic BFD
session are configured at the local end, the following principles are applicable:
– If the dynamic BFD session and static BFD session with automatically negotiated
discriminators share the same configurations (the source address, destination address,
outbound interface, and VPN index), the two BFD sessions coexist.
– If the dynamic BFD session named DYN_local discriminator is configured earlier than
the static BFD session with automatically negotiated discriminators, the name of the
dynamic BFD session is changed to the name of the static BFD session.
– The two BFD sessions use the smaller values of BFD parameters.
Single-Hop BFD
Single-hop BFD detects connectivity of the forwarding link between two directly connected
devices.
Between the two systems detected by the single-hop BFD session, only one BFD session can be
set up on a specified interface enabled with a specified data protocol. Therefore, each BFD
session is bound to an interface. On the S5300, BFD sessions are bound to Layer 2 interfaces.
Multi-Hop BFD
Multi-hop BFD detects IP connectivity of paths between two non-directly-connected devices.
These paths may span multiple hops or overlap. Multi-hop BFD is often used to detect reachable
routes between two devices.
The S5300 provides multi-hop BFD for static routes. Generally, static routes do not have the
detection mechanism. When a network fails, the administrator needs to check the static routes
manually. You can use multi-hop BFD to check the status of static routes. The RM module
determines whether a static route is available according to the status of the BFD session.
For details on how to configure BFD for static routes, see Configuring BFD for IPv4 Static Routes on a
Public Network in the Quidway S5300 Series Ethernet Switches Configuration Guide - IP Routing.
When a BFD session detects a fault, the BFD session becomes Down. BFD triggers route
convergence through the RM module.
When the neighbor is unreachable, the routing protocol requests BFD to delete the session
through the RM module.
Pre-configuration Tasks
Before configuring single-hop BFD, complete the following tasks:
l Connecting the interfaces
l Setting physical parameters of the interfaces
l Ensuring that the status of the physical layer of the interfaces is Up
Data Preparation
To configure single-hop BFD, you need the following data.
No. Data
2 Default multicast address, type and number of the local interface, and IP address of
the remote peer (if the Layer 3 link needs to be detected)
Context
Do as follows on S5300s at both ends of the link to be detected.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
By default, BFD is disabled globally. Before configuring the BFD functions, you must enable
BFD globally; otherwise, the configuration fails.
----End
Context
Do as follows on S5300s at both ends of the link to be detected.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
Step 3 Run:
default-ip-address ip-address
To implement single-hop BFD on a Layer 2 forwarding link, BFD needs to use a multicast IP
address. By default, BFD uses the multicast IP address 224.0.0.184.
NOTE
l If this multicast IP address is used by other protocols on the network, you must change the multicast
IP address. The S5300s at both ends of the BFD session must use the same multicast IP address.
l If multiple BFD sessions exist on a path, for example, Layer 3 interfaces are connected through Layer
2 switching devices that support BFD, you must configure different default multicast IP addresses for
the devices where different BFD sessions are established. In this manner, BFD packets can be correctly
forwarded.
----End
Procedure
Step 1 Run:
system-view
NOTE
For the BFD sessions that use the default multicast IP address, the local and remote discriminators must
be different.
Step 4 Run:
commit
NOTE
After setting necessary parameters, for example, local and remote discriminators, during the creation of a
single-hop BFD session, you must run the commit command to make the configuration take effect.
----End
Context
Do as follows on S5300s at both ends of the link to be detected.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd configuration-name
Step 3 Run:
description description
----End
Procedure
l Run the display bfd configuration { all | static [ for-ip | name cfg-name ] |
discriminator local-discr-value | dynamic | peer-ip peer-ip [ vpn-instance vpn-name ] |
static-auto } [ verbose ] command to check the configuration of BFD.
l Run the display bfd interface [ interface-type interface-number ] command to check
information about the interface where BFD is enabled.
l Run the display bfd session { { all |static } [ for-ip ] | discriminator discr-value |
dynamic | peer-ip peer-ip [ vpn-instance vpn-name ] | static-auto } [ verbose ] command
to check information about a BFD session.
l Run the display bfd statistics session { { all | static } [ for-ip ] | discriminator discr-
value | dynamic | peer-ip peer-ip [ vpn-instance vpn-name ] | static-auto } command to
check the statistics on a BFD session.
----End
Example
Run the display bfd configuration command, and you can view the configuration of a BFD
session.
<Quidway> display bfd configuration static name bfd2 verbose
--------------------------------------------------------------------------------
BFD Session Configuration Name : bfd2
--------------------------------------------------------------------------------
Local Discriminator : 20 Remote Discriminator : 10
BFD Bind Type : Interface(Vlanif110)
Bind Session Type : Static
Bind Peer IP Address : 11.1.1.1
Bind Interface : Vlanif110
TOS-EXP : 7 Local Detect Multi : 3
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Proc Interface Status : Disable WTR Interval (ms) : -
Bind Application : No Application Bind
Session Description : -
--------------------------------------------------------------------------------
Run the display bfd interface command, and you can view information about the BFD session
on a specified interface.
<Quidway> display bfd interface GigabitEthernet0/0/1
--------------------------------------------------------------------------------
Interface Name MIndex Sess-Count BFD-State
--------------------------------------------------------------------------------
GigabitEthernet0/0/1 256 1 up
--------------------------------------------------------------------------------
Run the display bfd session command, and you can view information about a BFD session.
<Quidway> display bfd session all
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
20 10 224.0.0.184 UP S_IP_IF GigabitEthernet0/0/1
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
Run the display bfd statistics session command, and you can view the statistics on a BFD
session.
<Quidway> display bfd statistics session static for-ip
--------------------------------------------------------------------------------
Session MIndex : 4097 (One Hop) State : Init Name : 9to6
--------------------------------------------------------------------------------
Session Type : Static
Bind Type : IP
Local/Remote Discriminator : 20/10
Received Packets : 97
Send Packets : 314
Received Bad Packets : 169
Send Bad Packets : 0
Down Count : 32
ShortBreak Count : 0
Send Lsp Ping Count : 0
Dynamic Session Delete Count : 0
Create Time : 2007/10/14 16:48:13
Last Down Time : 2007/10/14 17:09:11
Applicable Environment
The BFD passive Echo function is applicable only to the one-hop BFD session.
If a device supports the Echo function in the network, the BFD passive Echo function needs to
be configured to be compatible with other devices.
As shown in Figure 5-1, the passive Echo function needs to be enabled on Switch A.
Pre-configuration Tasks
Before configuring the BFD passive Echo function, complete the following tasks:
The BFD Echo packet is looped back through ICMP redirect at the remote end. In the IP packet that
encapsulates the BFD Echo packet, the destination address and the source address are the IP address of the
outgoing interface of the local end. Therefore, in the ACL rule, both the source addresses of the remote
end and the local end must be permitted.
Data Preparation
To configure the BFD passive Echo function, you need the following data.
No. Data
Context
Do as follows on the device that is to be enabled with the passive Echo function:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
Step 3 Run:
echo-passive { all | acl basic-acl-number }
l all: enables the passive Echo function of all the BFD sessions.
l acl: enables the passive Echo function of the BFD session that matches the ACL. In the ACL,
the source addresses of both the remote end and the local end must be permitted.
NOTE
If an ACL rule is created or changed after a BFD session goes Up through negotiations, this ACL rule can
take effect only after the BFD session goes Down and then Up or the parameters of the BFD session are
changed.
----End
Prerequisite
The configurations of the BFD passive echo function are complete.
Procedure
Step 1 Run the display bfd session{ { all |static } [ for-ip ] | discriminator discr-value | dynamic |
peer-ip peer-ip [ vpn-instance vpn-name ] | static-auto } [ verbose ] command to check
information about the BFD session.
----End
Example
# Display information about all the BFD sessions.
<Quidway> display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 258 (One Hop) State : Up Name : bfd2
--------------------------------------------------------------------------------
Local Discriminator : 20 Remote Discriminator : 10
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Interface(Vlanif110)
Bind Session Type : Static
Bind Peer IP Address : 11.1.1.1
NextHop Ip Address : 11.1.1.1
Bind Interface : Vlanif110
FSM Board Id : 0 TOS-EXP : 7
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Actual Tx Interval (ms): 1000 Actual Rx Interval (ms): 1000
Local Detect Multi : 3 Detect Interval (ms) : 3000
Echo Passive : Enable Acl Number : -
Destination Port : 3784 TTL : 255
Proc Interface Status : Disable
WTR Interval (ms) : -
Active Multi : 3
Last Local Diagnostic : No Diagnostic
Bind Application : No Application Bind
Session TX TmrID : 4491 Session Detect TmrID : 4492
Session Init TmrID : - Session WTR TmrID : -
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0
Session Description : -
--------------------------------------------------------------------------------
The command output shows that the Echo Passive field indicates Enable, which means that the
passive echo function is enabled for the BFD session. If the Echo Passive field indicates
Disable, this means that the passive echo function is disabled for the BFD session. The passive
echo function can be enabled for a BFD session only when the passive echo function is globally
enabled, the ACL rule (if configured) is matched, and the echo function is enabled on the peer.
Applicable Environment
To quickly detect and monitor the connectivity of IP routes between S5300s, configure multi-
hop BFD.
Pre-configuration Tasks
Before configuring multi-hop BFD, complete the following tasks:
l Connecting the interfaces and setting the physical parameters for the interfaces to ensure
that the status of the physical layer of the interfaces is Up
l Setting the link layer protocol parameters (and IP addresses) of interfaces to ensure that the
link layer of interfaces is Up
l Configuring the routing protocol to ensure that the IP routes between nodes are reachable
Data Preparation
To configure multi-hop BFD, you need the following data.
No. Data
Context
Do as follows on S5300s at both ends of the link to be detected.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
----End
Procedure
Step 1 Run:
system-view
Step 4 Run:
commit
NOTE
After setting necessary parameters, for example, local and remote discriminators, during the creation of a
single-hop BFD session, you must run the commit command to make the configuration take effect.
----End
Context
Do as follows on S5300s at both ends of the link to be detected.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd configuration-name
Step 3 Run:
description description
----End
Procedure
l Run the display bfd configuration { all | static [ for-ip | name cfg-name ] |
discriminator local-discr-value | dynamic | peer-ip peer-ip [ vpn-instance vpn-name ] |
static-auto } [ verbose ] command to check the configuration of BFD.
l Run the display bfd session { { all |static } [ for-ip ] | discriminator discr-value |
dynamic | peer-ip peer-ip [ vpn-instance vpn-name ] | static-auto } [ verbose ] command
to check information about a BFD session.
l Run the display bfd statistics session { { all | static } [ for-ip ] | discriminator discr-
value | dynamic | peer-ip peer-ip [ vpn-instance vpn-name ] | static-auto } command to
check the statistics on a BFD session.
----End
Example
Run the display bfd configuration command, and you can view the configuration of a BFD
session.
<Quidway> display bfd configuration static name bfd1 verbose
--------------------------------------------------------------------------------
BFD Session Configuration Name : bfd1
--------------------------------------------------------------------------------
Local Discriminator : 20 Remote Discriminator : 10
BFD Bind Type : Interface(Vlanif110)
Bind Session Type : Static
Bind Peer IP Address : 11.1.1.1
Bind Interface : Vlanif110
TOS-EXP : 7 Local Detect Multi : 3
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Proc Interface Status : Disable WTR Interval (ms) : -
Bind Application : No Application Bind
Session Description : -
--------------------------------------------------------------------------------
Run the display bfd session command, and you can view information about a BFD session.
<Quidway> display bfd session discriminator 20 verbose
--------------------------------------------------------------------------------
Session MIndex : 258 (One Hop) State : Up Name : bfd2
--------------------------------------------------------------------------------
Local Discriminator : 20 Remote Discriminator : 10
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Interface(Vlanif110)
Bind Session Type : Static
Bind Peer IP Address : 11.1.1.1
NextHop Ip Address : 11.1.1.1
Bind Interface : Vlanif110
FSM Board Id : 0 TOS-EXP : 7
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Actual Tx Interval (ms): 1000 Actual Rx Interval (ms): 1000
Local Detect Multi : 3 Detect Interval (ms) : 3000
Echo Passive : Disable Acl Number : -
Destination Port : 3784 TTL : 255
Proc Interface Status : Disable
WTR Interval (ms) : -
Active Multi : 3
Last Local Diagnostic : No Diagnostic
Bind Application : No Application Bind
Session TX TmrID : 4491 Session Detect TmrID : 4492
Session Init TmrID : - Session WTR TmrID : -
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0
Session Description : -
--------------------------------------------------------------------------------
Run the display bfd statistics session command, and you can view statistics a BFD session.
<Quidway> display bfd statistics session all
--------------------------------------------------------------------------------
Session MIndex : 4096 (One Hop) State : Up Name : bfd1
--------------------------------------------------------------------------------
Session Type : Static
Bind Type : IP
Local/Remote Discriminator : 22/11
Received Packets : 178
Send Packets : 177
Received Bad Packets : 0
Send Bad Packets : 0
Down Count : 0
ShortBreak Count : 0
Send Lsp Ping Count : 0
Dynamic Session Delete Count : 0
Pre-configuration Tasks
To configure a static BFD session with automatically negotiated discriminators, you need the
following data. To configure a static BFD session with automatically negotiated discriminators,
you need the following data.
l Connecting interfaces
l Assigning IP addresses to Layer 3 interfaces
Data preparation
To configure a static BFD session with automatically negotiated discriminators, you need the
following data.
No. Data
2 IP addresses of the local and remote ends of the link detected by BFD, and name and
number of the local interface
Context
Do as follows on the Switch on which the static BFD session with automatically negotiated
discriminators is used to detect the link.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
Global BFD is enabled on the local node and the BFD view is displayed.
----End
Context
Do as follows on the Switch where the static BFD session with automatically negotiated
discriminators is used to detect the link.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd cfg-name bind peer-ip ip-address [ vpn-instance vpn-name ] [ interface
interface-type interface-number] source-ip ip-address auto
A BFD session with different parameters is created according to the detected link type.
Step 3 Run:
commit
----End
Context
The configurations of creating a static BFD session with automatically negotiated discriminators
are complete.
Procedure
Step 1 Run the display bfd session { all | static | dynamic | discriminator discr-value | peer-ip peer-
ip [ vpn-instance vpn-name ] } [ verbose ] command to check information about a BFD session.
----End
Example
# Display detailed information about all the BFD sessions.
<Quidway> display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 256 (Multi Hop) State : Up Name : bfd1
--------------------------------------------------------------------------------
Local Discriminator : 2 Remote Discriminator : 1
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Peer IP Address
Bind Session Type : Static
Bind Peer IP Address : 11.1.1.1
Bind Interface : -
FSM Board Id : 0 TOS-EXP : 7
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Actual Tx Interval (ms): 1000 Actual Rx Interval (ms): 1000
Local Detect Multi : 3 Detect Interval (ms) : 3000
Echo Passive : Disable Acl Number : -
Destination Port : 3784 TTL : 254
Proc Interface Status : Disable
WTR Interval (ms) : -
Active Multi : 3
Last Local Diagnostic : Neighbor Signaled Session Down(Receive AdminDown)
Bind Application : No Application Bind
Session TX TmrID : 4410 Session Detect TmrID : 4411
Session Init TmrID : - Session WTR TmrID : -
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0
Session Description : -
--------------------------------------------------------------------------------
You can view that a BFD session with the type as Static_Auto is established. The local
discriminator and the remote discriminator of this BFD session are 8100 and 8101 respectively,
which are obtained through automatic negotiation.
Applicable Environment
When you set up a BFD session, you can adjust the expected interval for sending BFD packets,
the minimum interval for receiving BFD packets, and local detection multiplier, according to
the network and performance requirements.
You can set the WTR time of the BFD session to avoid frequent switchover of upper layer
applications caused by the BFD session flapping.
Pre-configuration Tasks
Before adjusting the BFD detection parameters, complete the following task:
Data Preparation
To adjust the BFD detection parameters, you need the following data.
No. Data
2 Expected interval for sending BFD packets and the minimum interval for receiving
BFD packets
Context
To reduce the usage of system resource, when detecting that the BFD session becomes Down,
the system sets the intervals for sending and receiving BFD packets at the local end to a random
value between 1000 and 3000 milliseconds. When the BFD session recovers, the intervals set
by the user are used.
Procedure
Step 1 Run:
system-view
NOTE
Step 4 Run:
min-rx-interval interval
NOTE
Step 5 Run:
detect-multiplier multiplier
----End
Procedure
Step 1 Run:
system-view
NOTE
The BFD session is unidirectional. If the WTR time is set, you need to set the same WTR time at both ends.
Otherwise, when the session status changes at one end, applications at both ends obtain different BFD
session status.
Step 4 Run:
commit
----End
Procedure
Step 1 Run:
system-view
tos-exp tos
----End
Procedure
Step 1 Run thedisplay bfd configuration { all | static [ for-ip | name cfg-name ] | discriminator local-
discr-value | dynamic | peer-ip peer-ip [ vpn-instance vpn-name ] | static-auto } [ verbose ]
commands to check the configuration of BFD.
Step 2 Run the display bfd session { { all | static } [ for-ip ] | discriminator discr-value | dynamic |
peer-ip peer-ip [ vpn-instance vpn-name ] | static-auto } [ verbose ] command to check
information about a BFD session.
----End
Example
# Run the display bfd configuration command, and you can view the configuration of BFD.
<Quidway> display bfd configuration static for-ip verbose
--------------------------------------------------------------------------------
BFD Session Configuration Name : bfd2
--------------------------------------------------------------------------------
Local Discriminator : 20 Remote Discriminator : 10
BFD Bind Type : Interface(Vlanif110)
Bind Session Type : Static
Bind Peer IP Address : 11.1.1.1
Bind Interface : Vlanif110
TOS-EXP : 7 Local Detect Multi : 3
Min Tx Interval (ms) : 1000 Min Rx Interval (ms) : 1000
Proc Interface Status : Disable WTR Interval (ms) : -
Bind Application : No Application Bind
Session Description : -
--------------------------------------------------------------------------------
Run the display bfd session command, and you can view information about a BFD session.
<Quidway> display bfd session all for-ip verbose
--------------------------------------------------------------------------------
Session MIndex : 258 (One Hop) State : Up Name : bfd2
--------------------------------------------------------------------------------
Local Discriminator : 20 Remote Discriminator : 10
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Interface(Vlanif110)
Bind Session Type : Static
Bind Peer IP Address : 11.1.1.1
NextHop Ip Address : 11.1.1.1
Pre-configuration Tasks
Before setting the interval for sending trap messages, complete the following task:
l Enabling global BFD
Data Preparation
To set the interval for sending trap messages, you need the following data.
No. Data
Procedure
Step 1 Run:
system-view
----End
Procedure
l Run the display current-configuration configuration bfd command to check the BFD
alarm function.
----End
Example
Run the display current-configuration configuration bfd command, and you can view that
the interval for sending trap messages is 300s.
<Quidway> display current-configuration configuration bfd
#
bfd
snmp-agent bfd trap-interval 300
#
return
Context
To clear the statistics of BFD, run the following command in the user view.
Procedure
Step 1 Run the reset bfd statistics { all | discriminator discr-value } command to clear the statistics
of BFD.
----End
Context
CAUTION
Debugging affects the performance of the system. So, after debugging, run the undo debugging
all command to disable it immediately.
When a BFD fault occurs, run the following debugging command in the user view to locate the
fault.
Procedure
Step 1 Run the debugging bfd { all | defect-detect |error | event | fsm | ha | message-list | packet |
process | product-interface |session-management | timer } command to enable debugging of
the BFD module.
----End
Networking Requirements
Interfaces of the S5300 are Layer 2 interfaces. If you need to detect the connectivity of the Layer
2 forwarding link between two directly connected S5300s, configure single-hop BFD, and bind
the BFD session to a multicast IP address and local interface.
As shown in Figure 5-2, a BFD session is created to detect the connectivity of the Layer 2 link
between Switch A and Switch B.
Figure 5-2 Networking diagram of single-hop BFD (for Layer 2 forwarding link)
GE0/0/1 GE0/0/1
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a BFD session on Switch A to detect the direct link from Switch A to Switch B.
2. Configure a BFD session on Switch B to detect the direct link from Switch B to Switch A.
Data Preparation
To complete the configuration, you need the following data:
Use the default values of the minimum sending interval, the minimum receiving interval, and
the local detection multiplier of BFD control packets.
Procedure
Step 1 Configure single-hop BFD on Switch A.
[SwitchA-bfd-session-atob] commit
[SwitchA-bfd-session-atob] quit
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
bfd
#
Networking Requirements
The S5300s are connected through the VLANIF interface at Layer 3. To detect the connectivity
of the link between two directly connected S5300s, you can configure single-hop BFD to bind
the BFD session to the VLANIF interface and its IP address.
As shown in Figure 5-3, a BFD session is created to detect the connectivity of the link between
SwitchA and SwitchB.
Figure 5-3 Networking diagram for configuring single-hop BFD on a VLANIF interface
VLANIF 13 VLANIF 13
10.1.1.5/24 10.1.1.6/24
GE0/0/1 GE0/0/1
SwitchA SwitchB
Configuration Roadmap
The configuration roadmap is as follows:
1. Create VLAN 13 on SwitchA and SwitchB.
2. Configure GE 0/0/1 interfaces on SwitchA and SwitchB as hybrid interfaces.
3. Create VLANIF 13 on SwitchA and SwitchB and set their IP addreses.
4. Create a BFD session on SwitchA to detect the link between SwitchA and SwitchB.
5. Create a BFD session on SwitchB to detect the link between SwitchB and SwitchA.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 On SwitchA and SwitchB, create VLAN 13, configure GE 0/0/1 interfaces as hybrid interfaces,
and add GE 0/0/1 interfaces to VLAN 13.
# Configure SwitchA.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan 13
[SwitchA-vlan13] quit
[SwitchA] interface gigabitethernet 0/0/1
[SwitchA-GigabitEthernet0/0/1] port hybrid pvid vlan 13
[SwitchA-GigabitEthernet0/0/1] port hybrid untagged vlan 13
[SwitchA-GigabitEthernet0/0/1] quit
# Configure SwitchB.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] vlan 13
[SwitchB-vlan13] quit
[SwitchB] interface gigabitethernet 0/0/1
[SwitchB-GigabitEthernet0/0/1] port hybrid pvid vlan 13
[SwitchB-GigabitEthernet0/0/1] port hybrid untagged vlan 13
[SwitchB-GigabitEthernet0/0/1] quit
Step 2 Set IP addresses of VLANIF 13 interfaces so that SwitchA can communicate with SwitchB at
Layer 3.
# Configure SwitchA.
[SwitchA] interface vlanif13
[SwitchA-Vlanif13] ip address 10.1.1.5 24
[SwitchA-Vlanif13] quit
# Configure SwitchB.
[SwitchB] interface vlanif13
[SwitchB-Vlanif13] ip address 10.1.1.6 24
[SwitchB-Vlanif13] quit
After the configuration, run the display interface vlanif command on SwitchA or SwitchB. You
can view that the status of VLANIF 13 is Up.
[SwitchA] display interface vlanif 13
Vlanif13 current state : UP
Line protocol current state : UP
Last line protocol up time : 2008-12-16 05:40:48
Description:HUAWEI, Quidway Series, Vlanif13 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is 11.1.1.2/24
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0018-82d1-b6df
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Input: 0 packets, 0 bytes
Output: 0 packets, 0 bytes
[SwitchA] bfd
[SwitchA-bfd] quit
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 13
#
bfd
#
interface Vlanif13
ip address 10.1.1.5 255.255.255.0
#
interface GigabitEthernet0/0/1
port hybrid pvid vlan 13
port hybrid untagged vlan 13
#
bfd atob bind peer-ip 10.1.1.6 interface Vlanif13
discriminator local 1
discriminator remote 2
commit
#
return
VLAN 10 VLAN 20
SwitchA
SwitchB SwitchC
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a BFD session on Switch A to detect the multi-hop path from Switch A to Switch
C.
2. Configure a BFD session on Switch C to detect the multi-hop path from Switch C to Switch
A.
Data Preparation
To complete the configuration, you need the following data:
Use the default values of the minimum sending interval, the minimum receiving interval, and
the local detection multiplier of a BFD control packet.
Procedure
Step 1 Add interfaces to VLANs, create VLANIF interfaces, and assign an IP address to each VLANIF
interface.
The configurations of Switch B and Switch C are the same as the configuration of Switch A,
and are not mentioned here.
Step 2 Configure a reachable static route between Switch A and Switch C.
[SwitchA] ip route-static 10.2.0.0 16 10.1.1.2
The configuration of Switch C is the same as the configuration of Switch A, and is not mentioned
here.
Step 3 Configure multi-hop BFD on Switch A and Switch C.
# Create a BFD session with Switch C on Switch A.
[SwitchA] bfd
[SwitchA-bfd] quit
[SwitchA] bfd atoc bind peer-ip 10.2.1.2
[SwitchA-bfd-session-atoc] discriminator local 10
[SwitchA-bfd-session-atoc] discriminator remote 20
[SwitchA-bfd-session-atoc] commit
[SwitchA-bfd-session-atoc] quit
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 10
#
bfd
#
interface Vlanif10
ip address 10.1.1.1 255.255.0.0
#
interface GigabitEthernet0/0/1
port hybrid pvid vlan 10
port hybrid untagged vlan 10
#
bfd atoc bind peer-ip 10.2.1.2
discriminator local 10
discriminator remote 20
commit
#
ip route-static 10.2.0.0 255.255.0.0 10.1.1.2
#
return
discriminator local 20
discriminator remote 10
commit
#
ip route-static 10.1.0.0 255.255.0.0 10.2.1.1
#
return
6 VRRP Configuration
This chapter describes the principle, basic functions, and advanced functions of the Virtual
Router Redundancy Protocol (VRRP).
This section describes how to monitor running of VRRP and debug VRRP.
6.11 Configuration Examples
This section provides several configuration examples of VRRP.
NOTE
Generally, all hosts on an internal network are configured with the same default route to the
egress gateway, that is, Switch A in Figure 6-1. Thus, hosts can communicate with external
networks. If the egress gateway fails, communication between hosts and external networks is
interrupted.
Gateway:10.0.0.1
IP Address:10.0.0.2/24
10.0.0.1/24
Gateway:10.0.0.1
IP Address:10.0.0.3/24 Network
Gateway:10.0.0.1 SwitchA
IP Address:10.0.0.4/24
Ethernet
Configuring more than one egress gateway is usually adopted to enhance the system reliability.
The problem of route selection, however, arises.
VRRP is a fault tolerance protocol defined by RFC 2338. It solves the route selection problem
among many gateways by separating physical devices and logical devices.
On a LAN enabled with multicast or broadcast, for example, Ethernet, VRRP offers logical
gateways to ensure high availability links. This prevents service interruption caused by faults of
the gateway, without changing the configuration of routing protocols.
VRRP Security
For network environments of different security levels, you can set different authentication modes
and passwords in the packet headers.
On a secure network, the default setting can be adopted. That is, the S5300 does not authenticate
the sent or received VRRP packets, and considers that all the received packets are valid. In this
case, you do not need to set the password.
On a network where security is not guaranteed, VRRP provides the simple text authentication.
You can set a password of 1 to 8 characters.
You can configure the sending mode of VRRP advertisement packets for a super VLAN on
VLANIF interfaces as required.
6.3.5 Checking the Configuration
Pre-configuration Tasks
Before configuring a VRRP group, complete the following tasks:
l Setting physical parameters of each interface
l Setting the link-layer parameters of each interface
l Setting the network-layer parameters of each interface to ensure connectivity of the network
Data Preparation
To configure a VRRP backup group, you need the following data.
No. Data
Context
Do as follows on the S5300s in a VRRP group.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface vlanif interface-number
Step 3 Run:
vrrp vrid virtual-router-id virtual-ip virtual-address
A VRRP group is created and a virtual IP address is assigned to the VRRP group.
NOTE
When you assign the first IP address to a VRRP group, the system creates the VRRP group.
When you assign additional virtual IP addresses to the VRRP group, the system adds the virtual
IP addresses to the virtual address list of the VRRP group.
For users with the same VRRP reliability requirements on the network, you can assign multiple
virtual IP addresses to the same VRRP group. These virtual IP addresses serve different user
groups. This facilitates user management and prevents default gateways of users from changing
with the VRRP configuration. Each VRRP group can be assigned 16 virtual IP addresses.
To implement load balancing among VRRP groups, you need to repeat the preceding steps to
create multiple VRRP groups. At least two VRRP groups need to be configured on an interface.
VRRP groups are identified by virtual router IDs. Virtual IP addresses of the VRRP groups
cannot be the same.
NOTE
You can configure up to 64 VRRP groups on each interface of the S5300. To configure 64 VRRP groups
on an interface, you need to set the CPCAR of VRRP packets to 256 kbit/s.
CAUTION
l When configuring VRRP and static ARP simultaneously on the S5300, do not use the IP
addresses in the static ARP entries as the virtual IP addresses of VRRP groups. Otherwise,
incorrect host routes are generated, which affects forwarding between devices.
l Do not create VRRP groups on the VLANIF interfaces corresponding to super VLANs
because the configuration degrades the system performance.
----End
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on a VRRP switch that is configured with a super-VLAN:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface vlanif vlan-id
Step 3 Run:
vrrp advertise send-mode { sub-vlan-id | all }
By default, the super-VLAN does not send advertisement messages to its sub-VLANs.
----End
Prerequisite
The configuration of the VRRP backup group is complete.
Procedure
Step 1 Run the display vrrp [ vlanif interface-type interface-number [ virtual-router-id ] ] command
to check the status of a VRRP backup group.
----End
Example
Run the display vrrp interface vlanif command, and you can view the status of the VRRP group
created on a VLANIF interface.
<Quidway> display vrrp
Vlanif211 | Virtual Router 1
State : Initialize
Virtual IP : 10.1.1.1
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 0
Preempt : YES Delay Time : 0
TimerRun : 1
TimerConfig : 1
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
l When a tracked interface becomes Down, the priority of the switch is reduced by a certain
value in the VRRP group. Therefore, the priority of the switch is lower than those of other
switches in the VRRP group.
l The switch with the highest priority becomes the master.
Pre-configuration Tasks
Before configuring VRRP to track the interface status, complete the following tasks:
Data Preparation
To configure VRRP to track the interface status, you need the following data.
No. Data
1 VRRP group ID
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface vlanif interface-number
Step 3 Run:
vrrp vrid virtual-router-id track interface interface-type interface-number
[ increased value-increased | reduced value-reduced ]
l By default, when the tracked interface becomes Down, the priority of the switch decreases
by 10.
l increased value-increased: specifies the increment of the priority when the tracked interface
becomes Down. The value ranges from 1 to 255. The maximum value of the priority is 254.
This parameter is valid only when the backup group is in Backup state.
l reduced value-reduced: specifies the decrement of the priority when the tracked interface
becomes Down. The value ranges from 1 to 255. The minimum value of the priority is 1.
l If VRRP tracks BFD sessions and interfaces at the same time, the number of tracked BFD
sessions or interfaces cannot exceed 8. If increased value-increased is specified for all the
tracked BFD sessions and interfaces, the original priority of the backup switch plus the
increments can exceed the priority of the master only if all the monitored BFD sessions and
interfaces are Down. If the sum of the original priority of the backup switch and the
increments exceeds the priority of the master switch when some of interfaces or BFD sessions
become Down, the increments of all BFD sessions and interfaces become invalid when
another interface or BFD session becomes down.
NOTE
You can configure up to eight tracked interfaces on a VRRP group. If an S5300 is the IP address owner,
interfaces of the S5300 cannot be tracked.
----End
Prerequisite
All the configurations required for enabling VRRP to track the interface status are complete.
Procedure
l Run the display vrrp [ interface vlanif interface-number [ virtual-router-id ] ] [ brief ]
command to check information about a specified VRRP group.
----End
Example
Run the display vrrp command, and you can view the status of a VRRP group. In the command
output, the Track IF field indicates the type and number of the tracked interface; the IF State
field indicates the status of the tracked interface (Up or Down).
<Quidway> display vrrp
Vlanif100 | Virtual Router 1
State : Initialize
Virtual IP : 11.1.3.10
PriorityRun : 90
PriorityConfig : 100
MasterPriority : 0
Preempt : YES Delay Time : 100
TimerRun : 1
TimerConfig : 1
Auth Type : SIMPLE TEXT Auth key : 123456
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Track IF : GigabitEthernet0/0/2 priority reduced : 10
IF State : DOWN
Config track link-bfd down-number : 2
Track BFD : 10 Priority reduced : 10
BFD-session state : UP
Applicable Environment
VRRP can monitor the BFD session status. When the BFD session status changes, the VRRP
module is notified so that fast switchover is implemented.
A VRRP group can track the status of multiple normal BFD sessions or interfaces.
When a VRRP group tracks several normal BFD sessions, status changes of one BFD session
do not affect the status of the other BFD sessions.
When the status of a traced normal BFD session changes, the priority of the switch is changed
to trigger the switchover. When the status of the tracked BFD session recovers, the priority of
the switch is restored.
Pre-configuration Tasks
Before configuring VRRP to track the BFD session status, complete the following tasks:
Data Preparation
To configure VRRP to track the BFD session status, you need the following data.
No. Data
1 VRRP group ID
Procedure
Step 1 Run:
system-view
The view of the interface that the VRRP backup group belongs to is displayed.
Step 3 Run:
vrrp vrid virtual-router-id track bfd-session { bfd-session-id | session-name bfd-
name } [ increased value-increased | reduced value-reduced ]
BFD sessions or interfaces go Down, the additional increasing of the priority is of no significance
when other BFD sessions or interfaces go Down.
----End
Procedure
Step 1 Run the display vrrp [ interface interface-type interface-number [ virtual-router-id ] ]
command to view information about a specified VRRP group.
----End
Example
Run the display vrrp command, and you can find that the tracked BFD session is in Up state.
For example:
<Quidway> display vrrp
Vlanif211 | Virtual Router 10
State : Master
Virtual IP : 11.1.1.10
PriorityRun : 90
PriorityConfig : 100
MasterPriority : 90
Preempt : YES Delay Time : 0
TimerRun : 1
TimerConfig : 1
Auth Type : NONE
Virtual Mac : 0000-5e00-010a
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
Track BFD : 1 Priority reduced : 10
BFD-session state : UP
packets. That is, it considers all the received VRRP packets to be valid. In this case, you do not
need to set the authentication key.
VRRP provides simple text authentication and MD5 authentication for networks that are
vulnerable to attacks. In simple text authentication mode, the authentication key can be set to a
string of 1 to 8 characters. In MD5 authentication mode, the authentication key can be set to a
string of 1 to 8 characters in plain text or a string of 24 characters in encrypted text.
Pre-configuration Tasks
Before configuring VRRP authentication, complete the following tasks:
Data Preparation
To configure VRRP authentication, you need the following data.
No. Data
1 VRRP group ID
Context
Do as follows on the S5300 where authentication of VRRP packets is required.
Procedure
Step 1 Run:
system-view
A VRRP group is created and a virtual IP address is assigned to the VRRP group.
Step 4 Run:
vrrp vrid virtual-router-id authentication-mode { simple key | md5 md5-key }
----End
Procedure
Step 1 Run the display vrrp [ interface interface-type interface-number [ virtual-router-id ] ] [ brief ]
command to check information about a specified VRRP group.
----End
Example
Run the display vrrp command, and you can view the authentication mode used for VRRP
packets.
<Quidway> display vrrp
Vlanif120 | Virtual Router 1
State : Master
Virtual IP : 10.1.1.111
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 20
TimerRun : 1
TimerConfig : 1
Auth Type : MD5 Auth key : >6M*PO438G/Q=^Q`MAF4<1!!
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
The output information shows that the authentication algorithm is MD5, the authentication key
is >6M*PO438G/Q=^Q`MAF4<1!!.
Applicable Environment
You can optimize the performance of a VRRP group by:
l Increasing the interval for sending VRRP Advertisement packets to reduce the network
resources used for packet processing
l Setting the same interval for sending VRRP Advertisement packets on all the members in
the VRRP group to prevent the problem of multiple masters in a VRRP group
l Setting the preemption mode and preemption delay on the switches in the VRRP group to
speed up or slow down the switchover between the master and backup switches
l Enabling the ping to the virtual IP address to check connectivity of the network
l Disabling the switches from checking the TTL in VRRP packets to ensure compatibility
between devices of different vendors
l Configuring the network management functions of VRRP so that VRRP can send trap
packets to notify the NMS of faults occurring during communication
l Disabling the switches from checking the hop limit of VRRP packets to ensure
compatibility between devices of different vendors
Pre-configuration Tasks
Before optimizing the VRRP performance, complete the following tasks:
Data Preparation
To optimize the VRRP performance, you need the following data.
No. Data
Context
The master switch sends VRRP Advertisement packets at intervals to backup switches to notify
the backup switches that it works normally. If the backup switches do not receive any VRRP
packet within the interval, the backup switch with the highest priority becomes the master.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface vlanif interface-number
Step 3 Run:
vrrp vrid virtual-router-id timer advertise adver-interval
By default, the interval for sending VRRP Advertisement packets is 1 second. When multiple
backup groups are configured, a short interval causes frequent switchover of switches. In this
case, you need to increase the interval for sending VRRP Advertisement packets.
NOTE
l If the advertise-interval parameters set for two VRRP devices are the same, the two devices can work
in master and slave mode.
l If the advertise-interval parameters set for two VRRP devices are different, both the two devices are
in master state.
----End
Procedure
Step 1 Run:
system-view
NOTE
It is recommended that you set the preemption delay of the backup switches in a VRRP group to 0 and set
a certain preemption delay for the master switch. Thus, when the network environment changes, the
switches wait for some time for the uplink and downlink to recover. This prevents the problem of two
masters or wrong master switch address learned by user devices because of frequent preemption.
----End
Context
As defined in RFC 3768, the system checks the TTL value of received VRRP packets. If this
value is not 255, the VRRP packets are discarded.
On a network consisting of devices of different vendors, valid VRRP packets may be discarded
when TTL checking is enabled. In this case, you can configure the system not to check the TTL
value of VRRP packets.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface vlanif interface-number
Step 3 Run:
vrrp un-check ttl
The S5300 is configured not to check the TTL value of VRRP packets.
By default, the S5300 checks the TTL value of VRRP packets. To enable the S5300 to check
the TTL value of VRRP packets, run the undo vrrp un-check ttl command.
----End
Context
The S5300 can ping virtual IP addresses to:
Procedure
Step 1 Run:
system-view
Step 2 Run:
vrrp virtual-ip ping enable
By default, the ping to virtual IP addresses is enabled. That is, the master switch in a backup
group can respond to the ping packets the virtual IP address of the backup group.
Ping to virtual IP addresses may cause ICMP attacks. To prevent ICMP attacks, run the undo
vrrp virtual-ip ping enable command to disable the ping to virtual IP addresses.
----End
Context
Do as follows on the S5300 that sends gratuitous ARP packets.
Procedure
Step 1 Run:
system-view
Step 2 Run:
vrrp gratuitous-arp timeout time
The interval at which the master switch sends gratuitous ARP packets is set.
The gratuitous ARP packets sent by the master switch contain the virtual MAC address. By
default, the master switch sends gratuitous ARP packets every 300 seconds (5 minutes).
To restore the default interval for sending gratuitous ARP packets, run the undo vrrp
gratuitous-arp timeout command in the system view.
If the S5300 does not need to send gratuitous ARP packets, run the vrrp gratuitous-arp timeout
disable command in the system view.
----End
Prerequisite
The configuration for optimizing the VRRP performance is complete.
Procedure
Step 1 Run the display vrrp [ interface interface-type interface-number [ virtual-router-id ] ] [
brief ] command to check the status of a VRRP backup group.
----End
Example
Run the display vrrp command, and you can view the optimized VRRP performance. For
example, you can see that TimerRun and TimerConfig is 20, indicating that the interval for
sending VRRP Advertisement packets is set to 20 seconds (the default value is 1).
<Quidway> display vrrp
Vlanif40 | Virtual Router 1
State : Master
Virtual IP : 100.1.1.111
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 0
TimerRun : 20
TimerConfig : 20
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
Application Environment
Figure 6-2 mVRRP determines the dual-homing of the master and slave switchs
NPE1
mVRRP
UPE
NPE2
As shown in Figure 6-2, when the convergence layer of the Metro Ethernet (ME) dual NPEs
are deployed for high reliability. The master and standby switchs are determined by mVRRP
between NPEs.
The mVRRP backup group is actually the ordinary VRRP backup group. The difference is that
the mVRRP backup group can be bound to other backup groups of different services. The status
of the backup group of related services depends on the binding relationship.
The mVRRP backup group can be bound to several backup group members. The mVRRP backup
group cannot be bound to other management backup groups.
According to different applications, the binding relationship of the mVRRP backup group is as
follows:
l The VRRP backup group is bound to the mVRRP backup group: UPEs are dual-homed to
NPEs. VRRP is run between NPEs. The master NPE and backup NPE are determined by
the configured priority of VRRP. Multiple VRRP backup groups run between NPEs with
different services.
If each VRRP backup group needs to maintain its own state machine, a huge number of
VRRP packets exist among NPEs. To simplify the process and decrease occupancy of
bandwidth, you can set one VRRP backup group as the mVRRP backup group. Other
backup group members are bound to the mVRRP backup group. The master and slave
switchs are determined directly by the binding relationship.
l The service interfaces are bound to the mVRRP backup group. If the UPEs are dual-homed
to NPEs through two physical links. You can bind the member interfaces to the mVRRP
backup group to determine the master member interfaces and the slave interfaces.
Pre-configuration Tasks
Before configuring mVRRP, complete the following tasks:
l Configuring physical parameters of an interface
Data Preparation
To configure mVRRP, you need the following data.
No. Data
2 Virtual IP address of the mVRRP and virtual IP addresses of VRRP backup group
members
5 PW peer IP address
Context
Do as follows on each switch of an mVRRP backup group:
Procedure
l Run:
system-view
Context
Do as follows on each switch on which the member VRRP backup groups need to be bound to
an mVRRP backup group.
Procedure
l Run:
system-view
The status of the member VRRP backup group is determined by the mVRRP backup group.
Therefore, the member VRRP backup group needs not a priority.
l Run:
vrrp vrid virtual-router-id1 track admin-vrrp interface interface-type
interface-number [ .subinterface-number ] vrid virtual-router-id2 unflowdown
The member VRRP backup group is bound to the mVRRP backup group.
After the member VRRP backup group is bound to the mVRRP backup group, the state
machine of the member VRRP backup group becomes dependent. That is, the member
VRRP backup group deletes the protocol timer, and no longer sends or receives packets,
and implements its state machine by directly copying the status of the mVRRP backup
group. The backup member can be bound to only one mVRRP.
----End
Prerequisite
The configurations of the mVRRP backup groups function are complete.
Procedure
l Run the display vrrp binding admin-vrrp [ interface interface-type interface-number ]
[ vrid virtual-router-id ] command to check all binding information about the mVRRP
backup group.
l Run the display vrrp binding admin-vrrp [ interface interface-type1 interface-
number1 ] [ vrid virtual-router-id1] member-vrrp [ interface interface-type2 interface-
number2 ] [ vrid virtual-router-id2] command to check the binding between the mVRRP
backup group and the member VRRP backup groups.
l Run the display vrrp admin-vrrp command to check the status of all mVRRP backup
groups in the current configuration.
----End
Example
After the configuration, you can run the display vrrp binding admin-vrrp command to view
all binding information about the member VRRP backup group, interface member, and PW
member.
<Quidway> display vrrp binding admin-vrrp
Interface: Vlanif10, admin-vrrp vrid: 6, state: Master
Member-vrrp number: 1
Interface: Vlanif11, vrid: 8, state: Master
Member-interface number: 1
Interface: Vlanif12, state: Up
Applicable Environment
Currently, VRRPv2 is adopted. VRRP for IPv4 supports only VRRPv2 packets, whereas VRRP
for IPv6 supports both VRRPv2 and VRRPv3 packets. You can undertake this configuration
task to upgrade the VRRP version as required.
Pre-configuration Tasks
Before configuring VRRP version upgrade, complete the following tasks:
Data Preparation
To configure VRRP version upgrade, you need the following data.
No. Data
Context
Do as follows on each switch in a VRRP backup group.
Procedure
l Global configuration:
1. Run:
system-view
The mode in which Advertisement packets are sent by a VRRP backup group on an
interface enabled with VRRPv3 is set.
NOTE
If the vrrp version-3 send-packet-mode command is run globally, and the vrrp vrid
version-3 send-packet-mode command is run on an interface, the configuration on the
interface takes effect.
----End
Prerequisite
The configurations of VRRP version upgrade are complete.
Procedure
l Run the display vrrp protocol-information command to view VRRP version information.
----End
Example
After the configuration, run the display vrrp protocol-information command, and you can
view that the VRRP protocol version is v3 and the mode for sending Advertisement packets is
send v3 only.
VRRP protocol information is shown as below:
VRRP protocol version : v3
Send advertisement packet mode : send v3 only
Context
CAUTION
Debugging affects the performance of the system. So, after debugging, run the undo debugging
all command to disable it immediately.
When a VRRP fault occurs, run the following debugging commands in the user view to locate
the fault.
Procedure
l Run the debugging vrrp packet [ interface vlanif interface-number vrid virtual-router-
id ] command to enable debugging of VRRP packets.
l Run the debugging vrrp state [ interface vlanif interface-number vrid virtual-router-
id ] command to enable debugging of VRRP status.
l Run the debugging vrrp timer [ interface vlanif interface-number vrid virtual-router-
id ] command to enable debugging of the VRRP timer.
----End
Backup group 1
Virtual IP Address:
10.1.1.111 SwitchA
Master
GE0/0/1
GE0/0/2
GE0/0/2
SwitchC
HostA GE0/0/1
10.1.1.100/24
GE0/0/3
HostB
GE0/0/1 20.1.1.100/24
GE0/0/2
Ethernet
SwitchB
Backup
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure VLANIF interfaces and assign IP addresses to the VLANIF interface.
2. Configure the OSPF protocol between Switch A, Switch B, and Switch C to implement
interworking between them.
3. Create VRRP group 1 on VLANIF 100 of Switch A. Set the highest priority for Switch A
in the VRRP group to ensure that Switch A functions as the master. Configure the
preemption mode on Switch A.
4. Create VRRP group 1 on VLANIF 100 of Switch B and use the default priority.
Data Preparation
To complete the configuration, you need the following data:
l ID and virtual IP address of the VRRP group
l Priorities of Switch A and Switch B in the VRRP group
l Preemption mode
Procedure
Step 1 Configure VLANIF interfaces and assign IP addresses to the VLANIF interface.
# Create VLANs and add physical interfaces to VLANs.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan batch 100 200
[SwitchA] interface gigabitethernet0/0/1
[SwitchA-GigabitEthernet0/0/1] port hybrid pvid vlan 100
[SwitchA-GigabitEthernet0/0/1] port hybrid untagged vlan 100
[SwitchA-GigabitEthernet0/0/1] quit
The configurations of Switch B and Switch C are similar to the configuration of Switch A, and
are not mentioned here.
# Configure an IP address for the VLANIF interface on SwitchA.
Step 2 Configure the OSPF protocol between Switch A, Switch B, and Switch C.
# Configure Switch A.
[SwitchA] ospf 1
[SwitchA-ospf-1] area 0
[SwitchA-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[SwitchA-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255
[SwitchA-ospf-1-area-0.0.0.0] quit
[SwitchA-ospf-1] quit
# Configure Switch B.
[SwitchB] ospf 1
[SwitchB-ospf-1] area 0
[SwitchB-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[SwitchB-ospf-1-area-0.0.0.0] network 192.168.2.0 0.0.0.255
[SwitchB-ospf-1-area-0.0.0.0] quit
[SwitchB-ospf-1] quit
# Configure Switch C.
[SwitchC] ospf 1
[SwitchC-ospf-1] area 0
[SwitchC-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255
[SwitchC-ospf-1-area-0.0.0.0] network 192.168.2.0 0.0.0.255
[SwitchC-ospf-1-area-0.0.0.0] network 20.1.1.0 0.0.0.255
[SwitchC-ospf-1-area-0.0.0.0] quit
[SwitchC-ospf-1] quit
# Configure the default gateway address of Host A to 10.1.1.111 and the default gateway address
of Host B to 20.1.1.1.
Step 3 Configure a VRRP group.
# On Switch A, assign an IP address to the VLANIF interface. Create VRRP group 1 and set
the priority of SwitchA in the VRRP group to 120 so that Switch A functions as the master.
[SwitchA] interface Vlanif 100
[SwitchA-Vlanif100] vrrp vrid 1 virtual-ip 10.1.1.111
[SwitchA-Vlanif100] vrrp vrid 1 priority 120
# On Switch B, assign an IP address to the VLANIF interface. Create VRRP group 1 and retain
the default priority of SwitchB in the VRRP group so that SwitchB functions as the backup.
[SwitchB] interface Vlanif 100
[SwitchB-Vlanif100] vrrp vrid 1 virtual-ip 10.1.1.111
[SwitchB-Vlanif100] quit
Run the display ip routing-table command on Switch A and Switch B. You can find a direct
route to the virtual IP address in the routing table of Switch A. In the routing table of Switch B,
this direct route is an OSPF route. The displayed information on Switch A and Switch B is as
follows:
<SwitchA> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 9 Routes : 10
Destination/Mask Proto Pre Cost Flags NextHop Interface
10.1.1.0/24 Direct 0 0 D 10.1.1.1 Vlanif100
10.1.1.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
20.1.1.0/24 OSPF 10 2 D 192.168.1.2 Vlanif200
127.0.0.0/8 Direct 0 0 D 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
192.168.1.0/24 Direct 0 0 D 192.168.1.1 Vlanif200
192.168.1.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
192.168.1.2/32 Direct 0 0 D 192.168.1.2 Vlanif200
192.168.2.0/24 OSPF 10 2 D 10.1.1.2 Vlanif100
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 100 200
#
interface Vlanif100
ip address 10.1.1.1 255.255.255.0
vrrp vrid 1 virtual-ip 10.1.1.111
vrrp vrid 1 priority 120
vrrp vrid 1 preempt-mode timer delay 20
#
interface Vlanif200
ip address 192.168.1.1 255.255.255.0
#
interface GigabitEthernet0/0/1
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
interface GigabitEthernet0/0/2
port hybrid pvid vlan 200
port hybrid untagged vlan 200
#
ospf 1
area 0.0.0.0
network 192.168.1.0 0.0.0.255
network 10.1.1.0 0.0.0.255
#
return
l Configuration file of Switch B
#
sysname SwitchB
#
vlan batch 100 400
#
interface Vlanif100
ip address 10.1.1.2 255.255.255.0
vrrp vrid 1 virtual-ip 10.1.1.111
#
interface Vlanif400
ip address 192.168.2.1 255.255.255.0
#
interface GigabitEthernet0/0/1
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
interface GigabitEthernet0/0/2
port hybrid pvid vlan 400
port hybrid untagged vlan 400
#
ospf 1
area 0.0.0.0
network 192.168.2.0 0.0.0.255
network 10.1.1.0 0.0.0.255
#
return
l Configuration file of Switch C
#
sysname SwitchC
#
vlan batch 200 300 400
#
interface Vlanif200
ip address 192.168.1.2 255.255.255.0
#
interface Vlanif300
ip address 20.1.1.1 255.255.255.0
#
interface Vlanif400
ip address 192.168.2.2 255.255.255.0
#
interface GigabitEthernet0/0/1
port hybrid pvid vlan 300
port hybrid untagged vlan 300
#
interface GigabitEthernet0/0/2
port hybrid pvid vlan 200
port hybrid untagged vlan 200
#
interface GigabitEthernet0/0/3
port hybrid pvid vlan 400
port hybrid untagged vlan 400
#
ospf 1
area 0.0.0.0
network 192.168.1.0 0.0.0.255
network 192.168.2.0 0.0.0.255
Backup group 2
Virtual IP Address: SwitchA
10.1.1.112 group 1:Master
group 2:Backup
GE0/0/2
GE0/0/1
HostA
GE0/0/2
10.1.1.100/24
SwitchC GE0/0/1
GE0/0/3 HostB
20.1.1.100/24
HostC GE0/0/2
10.1.1.101/24 GE0/0/1
SwitchB
Ethernet group 2:Master
Backup group 1 group 1:Backup
Virtual IP Address:
10.1.1.111
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure VLANIF interfaces and assign IP addresses to the VLANIF interface.
2. Configure the OSPF protocol between SwitchA, SwitchB, and SwitchC to implement
interworking between them.
3. Create VRRP group 1 on VLANIF 100 of SwitchA. Set the highest priority for SwitchA
in the VRRP group to ensure that SwitchA functions as the master. Configure the
preemption mode on SwitchA.
4. Create VRRP group 1 on VLANIF 100 of SwitchB and use the default priority.
Data Preparation
To complete the configuration, you need the following data:
l ID and virtual IP address of the VRRP group
l Priorities of SwitchA and SwitchB in the VRRP group
l Preemption mode
Procedure
Step 1 Configure VLANIF interfaces and assign IP addresses to the VLANIF interface.
# Create VLANs and add physical interfaces to VLANs.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] vlan batch 100 200
[SwitchA] interface gigabitethernet1/0/0
[SwitchA-GigabitEthernet1/0/0] port hybrid pvid vlan 100
[SwitchA-GigabitEthernet1/0/0] port hybrid untagged vlan 100
[SwitchA-GigabitEthernet1/0/0] quit
The configurations of SwitchB and SwitchC are similar to the configuration of SwitchA, and
are not mentioned here.
# Configure an IP address for the VLANIF interface on SwitchA.
[SwitchA] interface vlanif 100
[SwitchA-Vlanif100] ip address 10.1.1.1 24
[SwitchA-Vlanif100] quit
[SwitchA] interface vlanif 200
[SwitchA-Vlanif200] ip address 192.168.1.1 24
[SwitchA-Vlanif200] quit
Step 2 Configure the OSPF protocol between SwitchA, SwitchB, and SwitchC.
# Configure SwitchA.
[SwitchA] ospf 1
[SwitchA-ospf-1] area 0
[SwitchA-ospf-1-area-0.0.0.0] network 10.1.1.0 24
[SwitchA-ospf-1-area-0.0.0.0] network 192.168.1.0 24
[SwitchA-ospf-1-area-0.0.0.0] quit
[SwitchA-ospf-1] quit
# Configure SwitchB.
[SwitchB] ospf 1
[SwitchB-ospf-1] area 0
[SwitchB-ospf-1-area-0.0.0.0] network 10.1.1.0 24
[SwitchB-ospf-1-area-0.0.0.0] network 192.168.2.0 24
[SwitchB-ospf-1-area-0.0.0.0] quit
[SwitchB-ospf-1] quit
# Configure SwitchC.
[SwitchC] ospf 1
[SwitchC-ospf-1] area 0
[SwitchC-ospf-1-area-0.0.0.0] network 192.168.1.0 24
[SwitchC-ospf-1-area-0.0.0.0] network 192.168.2.0 24
[SwitchC-ospf-1-area-0.0.0.0] network 20.1.1.0 24
[SwitchC-ospf-1-area-0.0.0.0] quit
[SwitchC-ospf-1] quit
# Configure the default gateway address of Host A to 10.1.1.111 and the default gateway address
of Host B to 20.1.1.1.
Step 3 Configure a VRRP group.
# On SwitchA, assign an IP address to the VLANIF interface. Create VRRP group 1 and set the
priority of SwitchA in the VRRP group to 120 so that SwitchA functions as the master.
[SwitchA] interface Vlanif 100
[SwitchA-Vlanif100] vrrp vrid 1 virtual-ip 10.1.1.111
[SwitchA-Vlanif100] vrrp vrid 1 priority 120
[SwitchA-Vlanif100] vrrp vrid 1 preempt-mode timer delay 20
[SwitchA-Vlanif100] quit
# On SwitchB, assign an IP address to the VLANIF interface. Create VRRP group 1 and retain
the default priority of SwitchB in the VRRP group so that SwitchB functions as the backup.
[SwitchB] interface Vlanif 100
[SwitchB-Vlanif100] vrrp vrid 1 virtual-ip 10.1.1.111
[SwitchB-Vlanif100] quit
Run the display ip routing-table command on SwitchA and SwitchB. You can find a direct
route to the virtual IP address in the routing table of SwitchA. In the routing table of SwitchB,
this direct route is an OSPF route. The displayed information on SwitchA and SwitchB is as
follows:
<SwitchA> display ip routing-table
Route Flags: R - relied, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 9 Routes : 10
Destination/Mask Proto Pre Cost Flags NextHop Interface
10.1.1.0/24 Direct 0 0 D 10.1.1.1 Vlanif100
10.1.1.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
20.1.1.0/24 OSPF 10 2 D 192.168.1.2 Vlanif200
127.0.0.0/8 Direct 0 0 D 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
192.168.1.0/24 Direct 0 0 D 192.168.1.1 Vlanif200
192.168.1.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
192.168.1.2/32 Direct 0 0 D 192.168.1.2 Vlanif200
192.168.2.0/24 OSPF 10 2 D 10.1.1.2 Vlanif100
<SwitchB> display ip routing-table
Route Flags: R - relied, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 9 Routes : 10
Destination/Mask Proto Pre Cost Flags NextHop Interface
10.1.1.0/24 Direct 0 0 D 10.1.1.2 Vlanif100
10.1.1.2/32 Direct 0 0 D 127.0.0.1 InLoopBack0
20.1.1.0/24 OSPF 10 2 D 192.168.2.2 Vlanif200
127.0.0.0/8 Direct 0 0 D 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
192.168.1.0/24 OSPF 10 2 D 10.1.1.1 Vlanif100
192.168.2.0/24 Direct 0 0 D 192.168.2.1 Vlanif200
192.168.2.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
192.168.2.2/32 Direct 0 0 D 192.168.2.2 Vlanif200
Run the shutdown command on VLANIF 100 of SwitchA to simulate a link fault.
Run the display vrrp command on SwitchB to view information about the VRRP status. You
can find that SwitchB is the master switch.
<SwitchB> display vrrp
Vlanif100 | Virtual Router 1
state : Master
Virtual IP : 10.1.1.111
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 100
Preempt : YES Delay Time : 0
TimerRun : 1
TimerConfig : 1
Auth Type : NONE
Virtual Mac : 0000-5e00-0101
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 100 200
#
interface Vlanif100
ip address 10.1.1.1 255.255.255.0
vrrp vrid 1 virtual-ip 10.1.1.111
vrrp vrid 1 priority 120
vrrp vrid 2 virtual-ip 10.1.1.112
#
interface Vlanif200
ip address 192.168.1.1 255.255.255.0
#
interface GigabitEthernet0/0/1
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
interface GigabitEthernet0/0/2
port hybrid pvid vlan 200
port hybrid untagged vlan 200
#
ospf 1
area 0.0.0.0
network 192.168.1.0 0.0.0.255
network 10.1.1.0 0.0.0.255
#
return
interface Vlanif100
ip address 10.1.1.2 255.255.255.0
vrrp vrid 1 virtual-ip 10.1.1.111
vrrp vrid 2 virtual-ip 10.1.1.112
vrrp vrid 2 priority 120
#
interface Vlanif200
ip address 192.168.2.1 255.255.255.0
#
interface GigabitEthernet0/0/1
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
interface GigabitEthernet0/0/2
port hybrid pvid vlan 400
port hybrid untagged vlan 400
#
ospf 1
area 0.0.0.0
network 192.168.2.0 0.0.0.255
network 10.1.1.0 0.0.0.255
#
return
l The UMG connects to Switch A and Switch B through Switch C and Switch D.
l Switch A and SwitchSwitch B run VRRP. Switch A functions as the master, and Switch
B functions as the backup.
When Switch A fails, or when the GE link between Switch A and Switch B fails, the active/
standby switchover should be completed within 1 second. That is, fast switchover is required
on the bearer network.
Backbone
Network
GE0/0/2 GE0/0/1
SwitchA SwitchB
GE0/0/1 GE0/0/1
Backup group 10
Virtual IP address: 10.1.1.3/24
SwitchC SwitchD
VLAN
UMG
Configuration Roadmap
The configuration roadmap is as follows:
3. Enable VRRP to track the BFD session on Switch B. When the BFD session becomes
Down, the priority of Switch B increases by 40 and then the switchover is triggered.
NOTE
Data Preparation
To complete the configuration, you need the following data:
l Local and remote discriminators of the BFD session
l ID and virtual IP address of the VRRP group
l Priorities of the S5300s in the VRRP group
Procedure
Step 1 Configure interworking between the Switch s.
Assign IP addresses to all interfaces. # Configure OSPF between SwitchA, SwitchB, and
SwitchC.
For details, see Figure 6-5.
Step 2 Create a BFD session.
# Create a BFD session on Switch A.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] bfd
[SwitchA-bfd] quit
[SwitchA] bfd atob bind peer-ip 10.1.1.2 interface Vlanif 100
[SwitchA-bfd-session-atob] discriminator local 1
[SwitchA-bfd-session-atob] discriminator remote 2
[SwitchA-bfd-session-atob] min-rx-interval 50
[SwitchA-bfd-session-atob] min-tx-interval 50
[SwitchA-bfd-session-atob] commit
[SwitchA-bfd-session-atob] quit
Run the display bfd session command on Switch A and Switch B, and you can see that the BFD
session is Up. Take Switch A for example. The display is as follows:
[SwitchA] display bfd session all
--------------------------------------------------------------------------------
Local Remote Peer IP Address Interface Name State Type
--------------------------------------------------------------------------------
1 2 10.1.1.2 Vlanif100 Up Static
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
# Create VRRP group 10 on Switch B and set the priority of Switch B in VRRP group 10 to 140
so that Switch B functions as the backup in VRRP group 10.
[SwitchB] interface Vlanif 100
[SwitchB-Vlanif100] vrrp vrid 10 virtual-ip 10.1.1.3
[SwitchB-Vlanif100] vrrp vrid 10 priority 140
# Configure VRRP to track the status of the BFD session on the backup device. If the BFD
session becomes Down, the priority of Switch B increases by 40.
[SwitchB-Vlanif100] vrrp vrid 10 track bfd-session 2 increased 40
[SwitchB-Vlanif100] quit
Run the display vrrp command on Switch A or Switch B, and you can see that Switch A is the
master and Switch B is the backup. You can also view the tracked BFD session and its status on
Switch B.
[SwitchA] display vrrp
Vlanif100 | Virtual Router 10
state : Master
Virtual IP : 10.1.1.3
PriorityRun : 160
PriorityConfig : 160
MasterPriority : 160
Preempt : YES Delay Time : 0
TimerRun : 1
TimerConfig : 1
Auth Type : NONE
Virtual Mac : 0000-5e00-010a
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
[SwitchB] display vrrp
Vlanif100 | Virtual Router 10
state : Backup
Virtual IP : 10.1.1.3
PriorityRun : 140
PriorityConfig : 140
MasterPriority : 160
Preempt : YES Delay Time : 0
TimerRun : 1
TimerConfig : 1
Auth Type : NONE
Virtual Mac : 0000-5e00-010a
Check TTL : YES
Config type : normal-vrrp
Track BFD : 2 Priority increased : 40
BFD-Session State : UP
Config track link-bfd down-number : 0
Run the display vrrp command on Switch A, and you can see that the status of Switch A changes
to Initialize.
[SwitchA] display vrrp
Vlanif100 | Virtual Router 10
state : Initialize
Virtual IP : 10.1.1.3
PriorityRun : 160
PriorityConfig : 160
MasterPriority : 0
Preempt : YES Delay Time : 0
TimerRun : 1
TimerConfig : 1
Auth Type : NONE
Virtual Mac : 0000-5e00-010a
Check TTL : YES
Config type : normal-vrrp
Config track link-bfd down-number : 0
Run the display vrrp command on Switch B, and you can see that Switch B becomes the master,
and the status of the BFD session changes to Down.
[SwitchB] display vrrp
Vlanif100 | Virtual Router 10
state : Master
Virtual IP : 10.1.1.3
PriorityRun : 180
PriorityConfig : 140
MasterPriority : 180
Preempt : YES Delay Time : 0
TimerRun : 1
TimerConfig : 1
Auth Type : NONE
Virtual Mac : 0000-5e00-010a
Check TTL : YES
Config type : normal-vrrp
Track BFD : 2 Priority increased : 40
BFD-Session State : DOWN
Config track link-bfd down-number : 0
----End
Configuration Files
l Configuration file of Switch A
#
sysname SwitchA
#
vlan batch 100 200
#
bfd
#
#
interface Vlanif100
ip address 10.1.1.1 255.255.255.0
vrrp vrid 10 virtual-ip 10.1.1.3
vrrp vrid 10 priority 160
#
interface Vlanif200
ip address 192.168.0.1 255.255.255.0
#
interface GigabitEthernet0/0/1
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
interface GigabitEthernet0/0/2
port hybrid pvid vlan 200
port hybrid untagged vlan 200
#
bfd atob bind peer-ip 10.1.1.2 interface Vlanif 100
discriminator local 1
discriminator remote 2
min-tx-interval 50
min-rx-interval 50
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 192.168.0.0 0.0.0.255
#
return
7 VRRP6 Configuration
This section describes the basic concepts and configuration procedures of VRRP6, and provides
examples for configuring VRRP6.
NOTE
The Virtual Router Redundancy Protocol for IPv6 (VRRP6) is a fault tolerance protocol that
extends the VRRP protocol. It groups several routers into a virtual router and uses a certain
mechanism to switch traffic to another router when the next hop device of a host is faulty. This
ensures continuous and reliable communication.
The following table lists the functions supported by VRRP6 and VRRP for IPv4.
Applicable Environment
A VRRP6 backup group supports the backup of virtual addresses.
After the corresponding IPv6 prefixes are added to related interfaces, VRRP6 takes effect if the
interfaces are UP and IPv6 is globally enabled.
Pre-configuration Tasks
Before configuring a VRRP6 backup group, complete the following tasks:
Data Preparation
To configure a VRRP6 virtual group, you need the following data.
No. Data
Context
Do as follows on S5300s in a VRRP6 backup group.
Procedure
Step 1 Run:
system-view
NOTE
When you assign the first IPv6 address to a VRRP6 backup group, the system creates this backup
group. Then, when you assign another virtual IPv6 address to the backup group, the system adds
this address into the virtual IPv6 address list of the backup group.
In the network where users require the same VRRP6 reliability, a backup group can be configured
with multiple virtual IPv6 addresses. This is convenient for managing users and prevents the
address of the default gateway from varying with the VRRP6 configuration.
----End
Procedure
Step 1 Run:
system-view
Step 3 Run:
vrrp6 vrid virtual-router-id priority priority-value
By default, the priority is 100. A greater priority value indicates a higher priority in the VRRP6
group.
The priority 0 is reserved for special use. The priority 255 is reserved for the IPv6 address owner
and cannot be changed. You can set the priority to a value ranging from 1 to 254 by using this
command.
----End
Procedure
l Run the display vrrp6 [ interface interface-type interface-number [ vrid virtual-router-
id ] ] [ brief ]command check the status of VRRP6.
----End
Example
After the configuration succeeds, you can run the display vrrp6 command to view the status of
a VRRP6 virtual router.
<Quidway> display vrrp6
Vlanif240 | Virtual Router 10
State : Initialize
Virtual IP : FE80::10
PriorityRun : 90
PriorityConfig : 100
MasterPriority : 0
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-020a
Uncheck hop limit : NO
Accept Mode : OFF
Config type : normal-vrrp
Track IF : Vlanif100 priority reduced : 10
IF State : UP
Config track link-bfd down-number : 0
Track BFD : 10 Priority reduced : 10
BFD-session state : DOWN
Applicable Environment
VRRP6 can track the status of interfaces. That is, VRRP6 provides backup routes when a fault
occurs on an interface in a backup group or other interfaces on the S5300.
l When a tracked interface is Down, the priority of the S5300 in the backup group reduces
by a certain value between 1 and 254 automatically to be lower than those of other
S5300es in the group.
l The S5300 with the highest priority becomes the master and completes the switchover.
Pre-configuration Tasks
Before configuring VRRP6 to track the status of an interface, complete the following tasks:
Data Preparation
To configure VRRP6 to track the status of an interface, you need the following data.
No. Data
1 ID of a backup group
2 Interface to be tracked
Context
Do as follows on the S5300 where the interface to be tracked resides.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface vlanif interface-number
Step 3 Run:
vrrp6 vrid virtual-router-id track interface interface-type interface-number
[ reduced value-decreased | increased value-increased ]
----End
Example
After the configuration succeeds, you can run the display vrrp6 command to view the status of
a VRRP6 backup group.
display vrrp6 interface vlanif 100 vrid 254
Vlanif100 | Virtual Router 254
State : Initialize
Virtual IP : FE80::10
PriorityRun : 90
PriorityConfig : 100
MasterPriority : 0
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-020a
Uncheck hop limit : NO
Accept Mode : OFF
Config type : normal-vrrp
Track IF : Vlanif100 priority reduced : 10
IF State : UP
Config track link-bfd down-number : 0
Track BFD : 10 Priority reduced : 10
BFD-session state : DOWN
Pre-configuration Tasks
Before configuring VRRP6 to track the BFD session status, complete the following tasks:
l Setting physical parameters of interfaces
l Configuring link attributes of interfaces
l Configuring network layer attributes of interfaces to ensure network connectivity
l Configuring a VRRP6 group
l Creating BFD sessions
Data Preparation
To configure VRRP6 to track the BFD session status, you need the following data.
No. Data
To configure VRR6 to track a peer BFD session, you must configure the peer BFD session on both ends
of the session. Otherwise, network flapping may occur.
Procedure
Step 1 Run:
system-view
The VRRP6 group is configured to track the status of a common BFD session.
increased value-increased: specifies the increment of the priority when the tracked BFD session
becomes Down. The value ranges from 1 to 255. The priority can increase to 254. This parameter
is valid only when the VRRP6 group is in Backup state.
reduced value-reduced: specifies the decrement of the priority when the tracked BFD session
becomes Down. The value ranges from 1 to 255. The priority can decrease to 1. By default,
when the tracked BFD session becomes Down, the priority of the VRRP6 group decreases by
10.
When setting the increment or decrement of the priority, especially when using the default value,
note that the priority of the backup device in a VRRP6 group must be higher than that of the
master device after the priority is changed. Then, fast switchover can be implemented.
When a VRRP6 group monitors both BFD sessions and interfaces, the total number of BFD
sessions and interfaces cannot exceed 8. If increased value-increased is specified for all BFD
sessions and interfaces, the increased priority of the backup device can exceed the priority of
the master device only when all the tracked BFD sessions or interfaces go Down. If the increased
priority of the backup device exceeds the priority of the master device when some of interfaces
or BFD sessions become Down, the increments of other BFD sessions or interfaces are invalid.
NOTE
An S5300 can track up to eight BFD sessions.
----End
Procedure
Step 1 Run the display vrrp6 [ interface interface-type interface-number [ vrid virtual-router-id ] ]
[ brief ] command to check information about a specified VRRP6 group.
----End
Example
Run the display vrrp6 command, and you can find that the tracked BFD session is in Up state.
For example:
<Quidway> display vrrp6
Vlanif240 | Virtual Router 10
State : Initialize
Virtual IP : FE80::10
PriorityRun : 90
PriorityConfig : 100
MasterPriority : 0
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-020a
Uncheck hop limit : NO
Accept Mode : OFF
Config type : normal-vrrp
Track IF : Vlanif10 priority reduced : 10
IF State : UP
Config track link-bfd down-number : 0
Track BFD : 10 Priority reduced : 10
BFD-session state : DOWN
Applicable Environment
You can configure the related parameters of VRRP6 packets to optimize the functions of the
backup group.
l Prolonging the interval for sending VRRP6 advertisement messages by the member of the
backup group can reduce the network load caused by protocol packets.
l Setting the same interval for sending VRRP6 advertisement messages by the members of
the backup group can avoid the coexistence of multiple masters in the backup group.
l Barring the test of the hoplimit value in VRRP6 packets can improve the compatibility
between Huawei devices and non-Huawei devices.
l Configuring the preemption mode and preemption delay on the S5300 in the backup group
can quicken or slower the speed of the switchover between devices.
Pre-configuration Tasks
Before adjusting and optimizing VRRP6, complete the following tasks:
l Configuring physical parameters of interfaces
l Configuring a VRRP6 backup group
Data Preparation
To adjust and optimize VRRP6, you need the following data.
No. Data
2 Preemption delay
Procedure
Step 1 Run:
system-view
The interval for sending VRRP6 advertisement messages ranges from 100 to 4095, in
centiseconds. By default, the value is 100.
----End
Context
Configuring the interval of preemption can effectively avoid frequent status change.
Do as follows on the S5300 in the VRRP backup group where the preemption delay needs to be
adjusted.
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on the S5300.
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run:
system-view
----End
Example
# Display the global VRRP6 configuration.
<Quidway> display vrrp6
Vlanif240 | Virtual Router 10
State : Initialize
Virtual IP : FE80::10
PriorityRun : 90
PriorityConfig : 100
MasterPriority : 0
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-020a
Uncheck hop limit : NO
Accept Mode : OFF
Config type : normal-vrrp
Track IF : Vlanif100 priority reduced : 10
IF State : UP
Config track link-bfd down-number : 0
Track BFD : 10 Priority reduced : 10
BFD-session state : DOWN
Application Environment
Figure 7-1 mVRRP6 determines the dual-homing of the master and slave routers
NPE1
mVRRP
UPE
NPE2
As shown in Figure 7-1, when the convergence layer of the Metro Ethernet (ME) dual NPEs
are deployed for high reliability. The master and standby routers are determined by mVRRP6
between NPEs.
The mVRRP6 backup group is actually the ordinary VRRP6 backup group. The difference is
that the mVRRP6 backup group can be bound to other backup groups of different services. The
status of the backup group of related services depends on the binding relationship.
The mVRRP6 backup group can be bound to several backup group members. The mVRRP6
backup group cannot be bound to other management backup groups.
According to different applications, the binding relationship of the mVRRP6 backup group is
as follows:
l The VRRP6 backup group is bound to the mVRRP6 backup group: UPEs are dual-homed
to NPEs. VRRP6 is run between NPEs. The master NPE and backup NPE are determined
by the configured priority of VRRP6. Multiple VRRP6 backup groups run between NPEs
with different services.
If each VRRP6 backup group needs to maintain its own state machine, a huge number of
VRRP6 packets exist among NPEs. To simplify the process and decrease occupancy of
bandwidth, you can set one VRRP6 backup group as the mVRRP6 backup group. Other
backup group members are bound to the mVRRP6 backup group. The master and slave
routers are determined directly by the binding relationship.
l The service interfaces are bound to the mVRRP6 backup group. If the UPEs are dual-homed
to NPEs through two physical links. You can bind the member interfaces to the mVRRP6
backup group to determine the master member interfaces and the slave interfaces.
Pre-configuration Tasks
Before configuring mVRRP6, complete the following tasks:
l Configuring physical parameters of an interface
Data Preparation
To configure mVRRP6, you need the following data.
No. Data
2 Virtual IP address of the mVRRP6 and virtual IP addresses of VRRP6 backup group
members
5 PW peer IP address
Context
Do as follows on each switch of an mVRRP6 backup group:
Procedure
l Run:
system-view
Context
Do as follows on each switch on which the member VRRP6 backup groups need to be bound to
an mVRRP6 backup group.
Procedure
l Run:
system-view
The member VRRP6 backup group is bound to the mVRRP6 backup group.
After the member VRRP6 backup group is bound to the mVRRP6 backup group, the state
machine of the member VRRP6 backup group becomes dependent. That is, the member
VRRP6 backup group deletes the protocol timer, and no longer sends or receives packets,
and implements its state machine by directly copying the status of the mVRRP6 backup
group. The backup member can be bound to only one mVRRP6.
----End
Prerequisite
The configurations of the mVRRP6 backup groups function are complete.
Procedure
l Run the display vrrp6 binding admin-vrrp6 [ interface interface-type1 interface-
number1 ] [vrid virtual-router-id1 ] member-vrrp [ interface interface-type2 interface-
number2 ] [ vrid virtual-router-id2 ] command to check the binding between the mVRRP6
backup group and member VRRP6 backup groups.
----End
Context
WARNING
VRRP6 statistics cannot be restored after you clear them. So, confirm the action before you use
the command.
To clear the VRRP6 statistics, run the following reset command in the user view.
Procedure
l Run the reset vrrp6 [ interface interface-type interface-number ] [ vrid virtual-router-
id ] statistics command to reset the statistics about a specified VRRP6 group.
----End
Virtual IP Address:
2000::1
GE0/0/1
SwitchA
Vlanif100
Master
2000::2
HostA
GE0/0/2
Vlanif100 SwitchB
HostB 2000::3
Network
Backup
Ethernet
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IPv6 addresses for interfaces.
2. Configure virtual IPv6 addresses.
Data Preparation
To complete the configuration, you need the following data:
l VRRP6 group ID
l Priorities of the Switches in the VRRP6 group
l IPv6 addresses to be configured for interfaces
l Virtual IPv6 addresses to be configured for interfaces in the VRRP6 group
Procedure
Step 1 Enable IPv6 forwarding.
# Configure SwitchA.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] ipv6
# Configure SwitchB.
<Quidway> system-view
[Quidway] sysname SwitchB
[SwitchB] ipv6
# Configure SwitchB.
[SwitchB] vlan 100
[SwitchB-vlan100] quit
[SwitchB] interface gigabitethernet0/0/1
[SwitchB-GigabitEthernet0/0/1] port hybrid pvid vlan 100
[SwitchB-GigabitEthernet0/0/10] port hybrid untagged vlan 100
[SwitchB-GigabitEthernet0/0/1] quit
[[SwitchB] interface vlanif 100
[SwitchB-Vlanif100] ipv6 enable
[SwitchB-Vlanif100] ipv6 address 2000::3 link-local
# Configure SwitchB.
[SwitchB-Vlanif100] vrrp6 vrid 24 virtual-ip fe80::1 link-local
[SwitchB-Vlanif100] vrrp6 vrid 24 virtual-ip 2000::1
[SwitchB-Vlanif100] vrrp6 vrid 24 accept-mode enable
Step 4 Set the priority of SwitchB to a value lower than the priority of SwitchA.
[SwitchB-Vlanif100] vrrp6 vrid 24 priority 25
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 100
#
ipv6
#
interface Vlanif100
ipv6 enable
ipv6 address 2000::2/64
vrrp6 vrid 24 virtual-ip FE80::1 link-local
vrrp6 vrid 24 virtual-ip 2000::1
vrrp6 vrid 24 accept-mode enable
#
interaface GigabitEthernet0/0/1
port hybrid pvid vlan 100
port hybrid untagged vlan 100
#
return
GE0/0/2
GE0/0/1
GE0/0/1
HostA
2000::3/64 GE0/0/3
SwitchC
HostC
GE0/0/2 2003::1/64
Configuration Roadmap
The configuration roadmap is as follows:
1. Create VRRP group 1 and VRRP group 2 on VLANIF 100 of SwitchA. Ensure that
SwitchA is the master device in VRRP group 1 and the backup device in VRRP group 2.
2. Create VRRP group 1 and VRRP group 2 on VLANIF 100 of SwitchB. Ensure that
SwitchB is the backup device in VRRP group 1 and the master device in VRRP group 1.
Data Preparation
To complete the configuration, you need the following data.
l IPv6 addresses of the interfaces
l IDs and virtual IPv6 addresses of the VRRP groups
l Priorities of the switchs in each VRRP group
Procedure
Step 1 Configure IP addresses for the interfaces. The configuration procedure is not mentioned here.
Step 2 Configure OSPFv3 on SwitchA, SwitchB, and SwitchC so that they can communicate with each
other. The configuration procedure is not mentioned here.
Step 3 Configure the hosts.
Set the default gateway address of Host A to 2000::10, which is the virtual IPv6 address of VRRP
group 1. Set the default gateway address of Host B to 2000::60, which is the virtual IPv6 address
of VRRP group 2. Set the default gateway address of Host C to 2003::2.
Step 4 Configure VRRP6 groups.
# Create VRRP group 1 and VRRP group 2 on VLANIF 100 of SwitchA. Set the priority of
SwitchA in VRRP group 1 to 120 so that SwitchA becomes the master device in VRRP group
1. Use the default priority of SwitchA in VRRP group 2 so that SwitchA becomes the backup
device in VRRP group 2.
<Quidway> system-view
[Quidway] sysname SwitchA
[SwitchA] interface vlanif100
[SwitchA-Vlanif100] vrrp6 vrid 1 virtual-ip FE80::1 link-local
[SwitchA-Vlanif100] vrrp6 vrid 1 virtua-ip 2000::100
[SwitchA-Vlanif100] vrrp6 vrid 1 priority 120
[SwitchA-Vlanif100] vrrp6 vrid 2 virtual-ip FE80::2 link-local
[SwitchA-Vlanif100] vrrp6 vrid 2 virtua-ip 2000::60
[SwitchA-Vlanif100] quit
# Create VRRP group 1 and VRRP group 2 on VLANIF 100 of SwitchB. Use the priority of
SwitchB in VRRP group 1 to 120 so that SwitchB becomes the backup device in VRRP group
1. Set the priority of SwitchB in VRRP group 2 to 120 so that SwitchB becomes the master
device in VRRP group 2.
[SwitchB] interface vlanif 100
[SwitchB-Vlanif100] vrrp6 vrid 1 virtual-ip FE80::1 link-local
[SwitchB-Vlanif100] vrrp6 vrid 1 virtua-ip 2000::100
[SwitchB-Vlanif100] vrrp6 vrid 2 virtual-ip FE80::2 link-local
[SwitchB-Vlanif100] vrrp6 vrid 2 virtua-ip 2000::60
[SwitchB-Vlanif100] vrrp6 vrid 2 priority 120
[SwitchB-Vlanif100] quit
2000::100
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-0201
Uncheck hop limit : NO
Accept Mode : ON
Config type : normal-vrrp
Config track link-bfd down-number : 0
Vlanif100 | Virtual Router 2
State : Backup
Virtual IP : FE80::2
2000::60
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 120
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-0102
Uncheck hop limit : YES
Accept Mode : ON
Config type : normal-vrrp
Config track link-bfd down-number : 0
Run the display vrrp6 command on SwitchB, and you can find that VRRP group 1 and VRRP
group 2 are created on SwitchB. SwitchB is the backup device in VRRP group 1 and the master
device in VRRP group 2.
<Switch>A display vrrp6
Vlanif100 | Virtual Router 1
State : Backup
Virtual IP : FE80::1
2000::100
PriorityRun : 100
PriorityConfig : 100
MasterPriority : 120
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-0201
Uncheck hop limit : YES
Accept Mode : ON
Config type : normal-vrrp
Config track link-bfd down-number : 0
Vlanif100 | Virtual Router 2
State : Master
Virtual IP : FE80::2
2000::60
PriorityRun : 120
PriorityConfig : 120
MasterPriority : 120
Preempt : YES Delay Time : 0
TimerRun : 100
TimerConfig : 100
Virtual Mac : 0000-5e00-0102
Uncheck hop limit : YES
Accept Mode : ON
Config type : normal-vrrp
Config track link-bfd down-number : 0
----End
Configuration Files
l Configuration file of SwitchA
#
sysname SwitchA
#
vlan batch 100 200
#
ipv6
#
ospfv3 1
router-id 1.1.1.1
#
interface Vlanif100
ipv6 enable
ipv6 address 2000::1/64
vrrp6 vrid 1 virtual-ip FE80::1 link-local
vrrp6 vrid 1 virtual-ip 2000::100
vrrp6 vrid 1 priority 120
vrrp6 vrid 2 virtual-ip FE80::2 link-local
vrrp6 vrid 2 virtual-ip 2000::60
ospfv3 1 area 0.0.0.0
#
interface Vlanif200
ipv6 enable
ipv6 address 2002::1/64
ospfv3 1 area 0.0.0.0
#
interface GigabitEthernet0/0/1
port hybrid pvid vlan 100
port hybrid pvid untagged 100
#
interface GigabitEthernet0/0/2
port hybrid pvid vlan 200
port hybrid pvid untagged 200
#
return