Professional Documents
Culture Documents
Version: 3.01.01
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://ensupport.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright 2013 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided as is, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
II
Figures............................................................................................................. I
Glossary ........................................................................................................ III
III
Intended Audience
This manual is intended for:
l Network planning engineer
l Debugging engineer
l Attendant
Chapter Summary
1, VRRP Configuration Describes the VRRP principle, and the configuration commands,
maintenance commands, configuration examples of the ZXR10 8900E.
2, Active/Standby Main Describes the principle of active/standby main control changeover, and
Control Changeover the configuration commands, maintenance commands, configuration
examples of the ZXR10 8900E.
3, EFM Configuration Describes the EFM principle, and the configuration commands,
maintenance commands, configuration examples of the ZXR10 8900E.
4, CFM Configuration Describes the CFM principle, and the configuration commands,
maintenance commands, configuration examples of the ZXR10 8900E.
5, SAMGR Configuration Describes the SAMGR principle, and the configuration commands,
maintenance commands, configuration examples of the ZXR10 8900E.
6, BFD Configuration Describes the BFD principle, and the configuration commands,
maintenance commands, configuration examples of the ZXR10 8900E.
7, FRR Configuration Describes the FRR principle, and the configuration commands,
maintenance commands, configuration examples of the ZXR10 8900E.
8, Route Load Sharing Describes the principle of route load sharing, and the configuration
Configuration commands, maintenance commands, configuration examples, and fault
troubleshooting of the ZXR10 8900E.
9, Multicast Load Sharing Describes the principle of multicast load sharing, and the configuration
Configuration commands, maintenance commands, configuration examples of the
ZXR10 8900E.
10, SQA Configuration Describes the SQA principle, and the configuration commands,
maintenance commands, configuration examples of the ZXR10 8900E.
11, UDLD Configuration Describes the UDLD principle, and the configuration commands,
maintenance commands, configuration examples of the ZXR10 8900E.
Conventions
This manual uses the following typographical conventions:
Typeface Meaning
Italics Variables in commands. It may also refer to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.
Constant Text that you type, program codes, filenames, directory names, and function names.
width
[] Optional parameters.
{} Mandatory parameters.
II
1-1
VRRP Principle
l Working Principle
VRRP forms a virtual switch with the Switch A and Switch B in a LAN, see Figure 1-2.
The virtual switch has its own IP address 10.100.10.1 (this IP address can be the same
with an interface address on a switch). Physical route A and switch B also have their
own IP addresses (IP address of switch A is 10.100.10.2 and IP address of switch B is
10.100.10.3). Hosts in the LAN only knows the IP address 10.100.10.1 of the virtual
switch. Hosts do not know the IP addresses of switch A and switch B. Switch A and
switch B set the IP address 10.100.10.1 of the virtual switch as their default routes.
Therefore, hosts in the LAN communicates with other networks through this virtual
switch. The virtual switch need to do the following operations:
1. The virtual switch selects a master switch in accordance with the priority. The
switch with the highest priority becomes the master switch and its state is Master.
If the priorities are the same, the master IP addresses on interfaces are compared.
The switch with the greater master IP address on an interface becomes the master
switch. The master switch provides routing service.
2. The other switch operates as a backup switch. It detects the state of the master
switch at any time.
1-2
1. It receives VRRP multicasting messages from the master switch to know the
state of the master switch.
2. It does reply to the ARP requests for the virtual IP address.
3. It drops IP messages of which the destination MAC address is the virtual
MAC address.
1-3
In accordance with the above analysis, the hosts in the network do not have any extra
operations, and the communications with external network will not be affected due to
the faults on a switch.
The switch with the highest priority becomes the master switch and the
changeover is finished.
1-4
In Figure 1-4, VRRP Group 1 monitors the interface marked with a red point on
router A. When the interface works properly, router A acts as the master router.
When the interface is down, the priority of router A is decreased. As a result,
the priority of router A is lower than that of router B. In this way, master/backup
changeover is finished.
2. VRRP load sharing
Load sharing means that several switches bear services at the same time to avoid
occurrence of idle switches. Therefore, it is necessary to create two or more
backup groups to implement load sharing, see Figure 1-5.
1-5
The default gateway of a part of hosts in the LAN is 10.0.0.1, and the
default gateway of the other part of hosts in the LAN is 10.0.0.100.
b. Working mechanism
Router A and router B have the following agreements during VRRP
negotiation through priority configuration of the backup groups on router A
and router B:
Router A operates as the master router in Group 1 and operates as a
backup router in Group 2.
Router B operates as the master router in Group 2 and operates as a
backup router in Group 1.
A part of hosts uses the backup group 1 as the gateway and the traffic is
sent through router A. The other part of hosts uses the backup group 2
as the gateway and the traffic is sent through router B.
In this way, the data flows are shared and backed up.
3. VRRP heartbeat configuration
VRRP protocol messages can be transmitted through heartbeat, so the messages
are not necessarily transmitted by the interface configured with a VRRP group.
If heartbeat is configured in a VRRP group, designate the out-interface sending
messages as the heartbeat interface. If heartbeat is not configured in a VRRP
group, the out-interface is the interface configured VRRP.
4. VRRP track configuration
There are three applications of VRRP link detection.
Application one
As shown in Figure 1-6, the VRRP protocol is used between router A
and router B. These two routers are used for master/backup selection.
EOAM (including Ethernet in the First Mile (EFM) and Connectivity Fault
Management (CFM)) is used to detect the link state between the switch and
the router.
For the state transfer of EOAM for VRRP, see Figure 1-7. EOAM monitors
the link state between the router and the switch. When receiving the link
1-6
fault notified by EOAM in the master or backup state, VRRP transfers to the
initialize state directly. When all VRRP interfaces are in up state and VRRP
is in initialize state, VRRP receives link recovery notified by EOAM, and the
backup group is the IP Owner, the state will transfer to the master state,
otherwise, the state will transfer to the backup state.
Application two
The VRRP protocol is used between Router A and Router B, and these two
routers are used for master/backup selection, see Figure 1-8. The EOAM
(including EFM and CFM) is used to detect the link state between the switches
and the routers. BFD is used to detect the link state between routers. In this
application, the EOAM can be replaced by the link BFD.
For the state transfer of EOAM (or link BFD) + peer BFD for VRRP, see
Figure 1-9. When receiving the link fault notified by EOAM in the master or
backup state, VRRP transfers to the initialize state directly. When all VRRP
interfaces are up, VRRP is in initialize state, VRRP receives link recovery
notified by EOAM, and the group is the IP Owner, the state will transfer to the
master state, otherwise, the state will transfer to the backup state. If VRRP
is in backup state, and VRRP receives the link fault notified by peer BFD,
the VRRP will transfer to the master state.
1-7
Application three
The VRRP protocol is used between Router A and Router B, see Figure
1-10. These two routers are used for master/backup selection. The EOAM
(including EFM and CFM) is used to detect the link states between Router
A and Router C, and between Router B and Router C. The state of EOAM
for VRRP transfers in accordance with the VRRP protocol negotiation. When
receiving the link fault notified by EOAM, VRRP decreases the priority based
on configuration and triggers master/slave router changeover.
1-8
1-9
1-10
Parameter Description
Parameter Description
Parameter Description
Parameter Description
1-11
Parameter Description
link-type Link-type
peer-type Peer-type
Parameter Description
Parameter Description
Parameter Description
Parameter Description
vrid <1-255> The virtual switch ID number of the administration group owner, in
the range of 1-255
1-12
Command Function
ZXR10#show vrrp {ipv4|ipv6} brief interface <interface-name> This views the brief information of
all IPv4 or IPv6 VRRP groups on a
specific interface.
ZXR10#show vrrp interface <interface-name>[vrid <1-255>] This views the detailed information
of all VRRP groups or a specified
group on a specified interface.
An example of the show vrrp ipv4 brief command output is shown below.
ZXR10#show vrrp ipv4 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
vlan30 255 254 999 P Master 192.168.1.10 15.15.15.1
supervlan1 100 200 10000 P Master 35.35.35.1 1.1.1.1
supervlan2 120 255 157 A P L Master 35.35.35.1 35.35.35.1
An example of the show vrrp ipv6 brief command output is shown below.
ZXR10#show vrrp ipv6 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
supervlan5 5 100 1000 P Init 0:0:0:0:0:0:0:0 FE80:0:0:0:0:0:0:1
supervlan4 4 100 1000 P Init 0:0:0:0:0:0:0:0 FE80:0:0:0:0:1:2:3
supervlan2 2 100 1000 P Init 0:0:0:0:0:0:0:0 FE80:0:0:0:0:1:2:3
Output descriptions:
P Preemption mode
L Learning mode
An example of the show vrrp ipv4 brief interface command output is shown below.
An example of the show vrrp ipv6 brief interface command output is shown below.
1-13
Output descriptions:
1-14
supervlan4 - vrID 8
Vrrp configure info:
IP version 4, VRRP version 3
Virtual IP address is 8.9.7.1
Virtual MAC address is 0000.5e00.0108
Advertise time is 1.000 sec
Configured priority is 100
Preemption enable, delay 0 secs
Authentication data is None
Check ttl enable
Vrrp accept mode enable
Out-interface(heartbeat line) is supervlan5
Tracked interface items: 1
Interface State Decrement-Priority
supervlan2 DOWN 25
Tracked detect items: 1
Track name: zte1 Track type: object Detect type: vrrp
Policy type: link
Track state: local-down
Admin-group is None
Vrrp run info:
State is Init
0 state changes, last state change 00:00:00
Current priority is 75
Master router is unknown
Master router address is 0.0.0.0
Master router priority is 0
Master Advertisement interval is 0.000 sec
Master Down interval is 3.707 sec, no learn
Output descriptions:
Decrement-Priority The priority decrement after the track interface is shut down
An example of the show vrrp interface vrid command output is shown below.
1-15
1-16
l Configuration Thought
1. Enter the interfaces on which VRRP should be enabled and configure IP ad-
dresses.
2. Enter VRRP configuration mode from global configuration mode and then enter
the interfaces to configure VRRP.
3. Configure the same VRRP group ID and virtual addresses for R1 and R2. To
make R1 as the master switch, configure related commands on R1 first. When
the priorities (the default priority is 100) are the same, the switch on which VRRP
is enabled first and messages are advertised first will become the master switch
in the group.
l Configuration Commands
Configuration of R1:
R1(config)#interface vlan30
R1(config-if)#ip address 10.0.0.1 255.255.0.0
R1(config)#vrrp
R1(config-vrrp)#interface vlan30
R1(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
Configuration of R2:
R2(config)#interface vlan30
R2(config-if)#ip address 10.0.0.2 255.255.0.0
R2(config)#vrrp
R2(config-vrrp)#interface vlan30
R2(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
l Configuration Verification
View the VRRP information and configuration result on R1, as shown below.
1-17
As shown in Figure 1-12, two VRRP groups are configured. PC1 and PC2 use the
virtual switch in Group 1 as the default network gateway, and the address is 10.0.0.1.
PC3 and PC4 use the virtual switch in Group 2 as the default network gateway, and
the address is 10.0.0.2. R1 and R2 are backups for each other. When both switches
are invalid, the communications between the hosts and external network will be
interrupted.
1-18
l Configuration Thought
1. Enter the interfaces on which VRRP should be enabled and configure IP ad-
dresses.
2. Enter VRRP configuration mode from global configuration mode and then enter
the interfaces to configure VRRP.
3. Configure VRRP Group 1 and corresponding virtual address on R1. Configure
VRRP Group 2 and corresponding virtual address on R2. Therefore, R1 becomes
the master switch in Group 1, and R2 becomes the master switch in Group 2.
Add R1 to Group 2, and add R2 to Group 1, so R1 and R2 become the backup
switches.
l Configuration Commands
Configuration of R1,
R1(config)#interface vlan30
R1(config-if)#ip address 10.0.0.1 255.255.0.0
R1(config)#vrrp
R1(config-vrrp)#interface vlan30
R1(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R1(config-vrrp-if)#vrrp 2 ipv4 10.0.0.2
R1(config-vrrp-if)end
Configuration of R2,
R2(config)#interface vlan30
R2(config-if)#ip address 10.0.0.2 255.255.0.0
R2(config)#vrrp
R2(config-vrrp)#interface vlan30
R2(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R2(config-vrrp-if)#vrrp 2 ipv4 10.0.0.2
R2(config-vrrp-if)#end
l Configuration Verification
View the VRRP information and configuration result on R1, as shown below.
R1#show vrrp ipv4 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
1-19
1-20
l Configuration Thought
1. Enter the interfaces on which VRRP should be enabled and configure IP ad-
dresses.
2. Enter VRRP configuration mode from global configuration mode and then enter
the interfaces to configure VRRP.
3. Configure the same VRRP group ID and virtual addresses for R1 and R2. To
make R1 as the master router, configure related commands on R1 first. When
the priorities (the default priority is 100) are the same, the switch on which VRRP
is enabled first and messages are advertised first will become the master switch
in the group.
4. In VRRP interface configuration mode, configure the same out-interface of the
heartbeat link in the VRRP group on R1 and R2.
l Configuration Commands
Configuration of R1,
R1(config)#interface vlan30
R1(config-if)#ip address 10.0.0.1 255.255.0.0
R1(config)#vrrp
R1(config-vrrp)#interface vlan30
R1(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R1(config-vrrp-if)#vrrp 1 out-interface vlan40
R1(config-vrrp-if)#end
Configuration of R2,
R2(config)#interface vlan30
R2(config-if)#ip address 10.0.0.2 255.255.0.0
R2(config)#vrrp
R2(config-vrrp)#interface vlan30
R2(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R2(config-vrrp-if)#vrrp 1 out-interface vlan40
R2(config-vrrp-if)#end
l Configuration Verification
1-21
View the VRRP information and configuration result on R1, as shown below.
R1#show vrrp ipv4 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
vlan30 1 255 1000 A P Master 10.0.0.1 10.0.0.1
/*A: whether the router is the address owner.
P: whether preemption is configured.
L: whether to learn the interval to advertise VRRP messages on the
master.*/
1-22
l Configuration Thought
1. Enter the interfaces on which VRRP will be configured and configure IP addresses
on the interfaces.
2. Enter VRRP configuration mode from global configuration mode, and then enter
the interface on which VRRP will be configured.
3. Configure the same VRRP group ID and virtual IP address for switch A and switch
B. To set switch A as the active switch, execute the above steps on switch A first.
When priorities (by default, the priority is 100) are the same, the switch on which
VRRP is configured first and advertise packets first will work as the active switch
in the VRRP group.
4. Enter VRRP configuration mode on switch A and switch B to configure tracks with
the same object name. And then enter VRRP interface configuration mode to
enable track of VRRP.
l Configuration Commands
The configuration of switch A:
RA(config)#interface vlan30
RA(config-if)#ip address 10.0.0.1 255.255.0.0
RA(config)#vrrp
RA(config-vrrp)#interface vlan30
RA(config-vrrp-if)#vrrp 1 ipv4 10.0.0.3
RA(config-vrrp-if)#vrrp 1 track object zte peer-type
The object named zte of the track should be configured in the SAMGR module in
advance. For the detailed configuration, please refer to the SAMGR Configuration
chapter.
The configuration of switch B:
RB(config)#interface vlan30
RB(config-if)#ip address 10.0.0.2 255.255.0.0
RB(config)#vrrp
RB(config-vrrp)#interface vlan30
RB(config-vrrp-if)#vrrp 1 ipv4 10.0.0.3
RB(config-vrrp-if)#vrrp 1 track object zte peer-type
1-23
The object named zte of the track should be configured in the SAMGR module. For
the detailed configuration, please refer to the SAMGR Configuration chapter.
l Configuration Verification
View the VRRP track information on switch A, as shown below.
RA#show vrrp ipv4 brief
Interface vrID Pri Time A P L State Master addr Vswitch addr
vlan30 1 100 1000 A P Master 10.0.0.1 10.0.0.3
/*A: whether the router is the address owner.
P: whether preemption is configured.
L: whether to learn the interval to advertise VRRP messages on the
master.*/
1-24
l Configuration Thought
1. Enter the interfaces on which VRRP should be enabled. Enable IPv6 and
configure IPv6 addresses.
2. Enter VRRP configuration mode from global configuration mode and then enter
the interfaces to configure VRRP.
3. Configure the same VRRP group ID and virtual addresses for R1 and R2. To
make R1 as the master router, configure related commands on R1 first. When
the priorities (the default priority is 100) are the same, the router on which VRRP
is enabled first and messages are advertised first will become the master switch
in the group.
l Configuration Commands
Configuration of R1:
R1(config)#interface vlan30
R1(config-if)#ipv6 enable
R1(config-if)#ipv6 address link-local fe80::1:1
R1(config)#vrrp
R1(config-vrrp)#interface vlan30
R1(config-vrrp-if)#vrrp 1 ipv6 fe80::1:1
Configuration of R2:
1-25
R2(config)#interface vlan30
R2(config-if)#ipv6 enable
R2(config-if)#ipv6 address link-local fe80::1:2
R2(config)#vrrp
R2(config-vrrp)#interface vlan30
R2(config-vrrp-if)#vrrp 1 ipv6 fe80::1:1
l Configuration Verification
View the VRRP information and configuration result on R1, as shown below.
R1(config-if)#show vrrp ipv6 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
vlan30 1 255 1000 A P Master FE80:0:0:0:0:0: FE80:0:0:0:0:0:1
1:1 :1
/*A: whether the switch is the address owner.
P: whether preemption is configured.
L: whether to learn the interval to advertise VRRP messages on the
master.*/
1-26
l Configuration Thought
1. Enter the interfaces on which VRRP should be enabled. Enable IPv6 and
configure IPv6 addresses.
2. Enter VRRP configuration mode from global configuration mode and then enter
the interfaces to configure VRRP.
3. Configure VRRP Group 1 and corresponding virtual address on R1. Configure
VRRP Group 2 and corresponding virtual address on R2. Therefore, R1 becomes
the master switch in Group 1, and R2 becomes the master switch in Group 2 (note
that use the link-local address as the virtual address that uses FE80:: as prefix).
Add R1 to Group 2, and add R2 to Group 1, so R1 and R2 become the backup
switches.
l Configuration Commands
Configuration of R1:
R1(config)#interface vlan30
R1(config-if)#ipv6 enable
R1(config-if)#ipv6 address link-local fe80::1:1
R1(config)#vrrp
1-27
R1(config-vrrp)#interface vlan30
R1(config-vrrp-if)#vrrp 1 ipv6 fe80::1:1
R1(config-vrrp-if)#vrrp 2 ipv6 fe80::1:2
Configuration of R2:
R2(config)#interface vlan30
R2(config-if)#ipv6 enable
R2(config-if)#ipv6 address link-local fe80::1:2
R2(config)#vrrp
R2(config-vrrp)#interface vlan30
R2(config-vrrp-if)#vrrp 1 ipv6 fe80::1:1
R2(config-vrrp-if)#vrrp 2 ipv6 fe80::1:2
l Configuration Verification
View the VRRP information and configuration result on R1, as shown below.
R1#show vrrp ipv6 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
vlan30 1 255 1000 A P Master FE80:0:0:0:0:0: FE80:0:0:0:0:0:1
1:1 :1
vlan30 2 100 1000 P Backup FE80:0:0:0:0:0: FE80:0:0:0:0:0:1
1:2 :2
/*A: whether the switch is the address owner.
P: whether preemption is configured.
L: whether to learn the interval to advertise VRRP messages on the
master.*/
R1#show vrrp interface vlan30
vlan30 - vrID 1
Vrrp configure info: /*VRRP configuration information*/
IP version 6, VRRP version 3
Virtual IP address is FE80:0:0:0:0:0:1:1
Virtual MAC address is 0000.5e00.0201
Advertise time is 1.000 sec
Configured priority is 100
Preemption enable, delay 0 secs
Authentication data is None
Check ttl enable
Vrrp accept mode enable
Out-interface(heartbeat line) is None
Tracked interface items: 0
Interface State Decrement-Priority
Tracked detect items: 0
Admin-group is None
Vrrp run info:
/*Running information of VRRP on current interface*/
State is Master /*VRRP running state*/
1-28
l Configuration Thought
1. Enter the interfaces on which VRRP should be enabled. Enable IPv6 and
configure IPv6 addresses.
2. Enter VRRP configuration mode from global configuration mode and then enter
the interfaces to configure VRRP.
3. Configure the same VRRP group ID and virtual addresses for R1 and R2. To
make R1 as the master switch, configure related commands on R1 first. When
the priorities (the default priority is 100) are the same, the switch on which VRRP
is enabled first and messages are advertised first will become the master router
in the group.
4. In VRRP interface configuration mode, configure the same out-interface of the
heartbeat link in the VRRP group on R1 and R2, and enable IPv6 on the heartbeat
link interface.
l Configuration Commands
Configuration of R1:
R1(config)#interface vlan30
1-29
R1(config-if)#ipv6 enable
R1(config-if)#ipv6 address link-local fe80::1:1
R1(config)#interface vlan40
R1(config-if)#ipv6 enable
R1(config)#vrrp
R1(config-vrrp)#interface vlan30
R1(config-vrrp-if)#vrrp 1 ipv6 fe80::1:1
R1(config-vrrp-if)#vrrp 1 out-interface vlan40
Configuration of R2:
R2(config)#interface vlan30
R2(config-if)#ipv6 enable
R2(config-if)#ipv6 address link-local fe80::1:2
R2(config)#interface vlan40
R2(config-if)#ipv6 enable
R2(config)#vrrp
R2(config-vrrp)#interface vlan30
R2(config-vrrp-if)#vrrp 1 ipv6 fe80::1:1
R2(config-vrrp-if)#vrrp 1 out-interface vlan40
l Configuration Verification
View the VRRP information and configuration result on R1, as shown below.
R1#show vrrp ipv6 b
Interface vrID Pri Time A P L State Master addr VRouter addr
vlan30 1 255 1000 A P Master FE80:0:0:0:0:0: FE80:0:0:0:0:0:1
1:1 :1
/*A: whether the switch is the address owner.
P: whether preemption is configured.
L: whether to learn the interval to advertise VRRP messages on the
master.*/
1-30
l Configuration Thought
1. Enter the interfaces on which VRRP will be configured. Enable IPv6 and configure
IPv6 addresses on the interfaces.
2. Enter VRRP configuration mode from global configuration mode, and then enter
the interfaces on which VRRP will be configured.
3. Configure the same VRRP group ID and virtual IP address for switch A and switch
B. To set switch A as the active router, execute the above steps on switch A first.
When priorities (by default, the priority is 100) are the same, the router on which
VRRP is configured first and advertise packets first will work as the active router
in the VRRP group.
1-31
4. Enter VRRP configuration mode on switch A and switch B to configure tracks with
the same object name. And then enter VRRP interface configuration mode to
enable track of VRRP.
l Configuration Commands
The configuration of switch A:
RA(config)#interface vlan30
RA(config-if)#ipv6 enable
RA(config-if)#ipv6 address link-local fe80::1:1
RA(config)#vrrp
RA(config-vrrp)#interface vlan30
RA(config-vrrp-if)#vrrp 1 ipv6 fe80::1:1
RA(config-vrrp-if)#vrrp 1 track object zte peer-type
Note:
The object named zte of the track should be configured in the SAMGR module in
advance. For the detailed configuration, please refer to the SAMGR Configuration.
Note:
The object named zte of the track should be configured in the SAMGR module. For
the detailed configuration, please refer to the SAMGR Configuration.
l Configuration Verification
View the VRRP track information on switch A, as shown below.
1-32
1-33
1-34
2-1
thread will inform the corresponding main control process to trigger the master/slave
handover flow quickly.
When the thread scans that the master board operates improperly and the slave board
operates properly, it will trigger the handover. The procedure of handover is implemented
by the corresponding process module of the main control.
Command Function
2-2
Configuration Commands
1. When the device work properly, the ACT indicator for the active main control board is
on, and the ACT indicator for the standby main control board is off. The RUN indicator
for the active main control board flashes at the frequency of 1 Hz. The ALM indicators
for the active and standby main control boards are off.
2. Use one of the following operations to implement active/standby changeover:
l Configure the active/standby main control changeover command.
l Press the reset button on the active main control board.
l Plug out the active main control board and then plug it in.
l Press the EXCH button on the active main control board.
3. After the active/standby changeover, the RUN indicator for the new active main control
board is on. Besides the alarm indicating the active/standby changeover, there is no
other alarm.
The command used to configure active/standby main control changeover is shown below.
R2#redundancy
?
check Show checking result of redundancy condition
force-switchover Switchover between master and slave
<cr>
C12_6.99#redundancy
Are you sure to switch system?[yes/no]:yes
</cr>
Configuration Verification
View the configuration result, as shown below.
R2#show processor
=====================================================================
=====================================================================
M : Master cpu
S : Slave cpu
Character: Cpu current character in system
MSC : Master-SC in Cluster System
SSC : Slave-SC in Cluster System
N/A : None-SC in Cluster System
CPU(5s) : Cpu utility measured in 5 seconds
CPU(1m) : Cpu utility measured in 1 minute
CPU(5m) : Cpu utility measured in 5 minutes
Peak : Cpu peak utility measured in 1 minute
PhyMem : Physical memory (megabyte)
FreeMem : Free memory (megabyte)
Mem : Memory usage ratio
=====================================================================
=====================================================================
2-3
2-4
3-1
The EFM can also enable remote loopback function to detect the packet loss caused by
the difference between the local receiving rate and the remote receiving rate or the link
fault.
EFM packets are low-speed protocol packets. The packets cannot be forwarded by
devices. Therefore, th EFM can only be applied on the direct connected device, see
Figure 3-1.
The packets cannot be forwarded across devices. The application environment is simple.
The EFM has accuracy requirements for detection. Two devices send keepalive packets
periodically to each other to keep successful protocol negotiation. Other functions of EFM
can be enabled after the successful negotiation.
When detecting an event, the EFM notifies the peer device through specific packets.
3-2
Parameter Description
Parameter Description
Parameter Description
<value> Timeout time for the loopback control, range: 1-10, default: 3 s.
Parameter Description
3-3
Parameter Description
Parameter Description
Parameter Description
Parameter Description
For a description of the parameters in Step 10, refer to the following table:
Parameter Description
<win-value> Window value of error frame cycles, range: 1-65535, unit: million
frames, default: 1.
For a description of the parameters in Step 11, refer to the following table:
Parameter Description
For a description of the parameters in Step 12, refer to the following table:
Parameter Description
3-4
Parameter Description
<fast-value> Time-out time of a link when the EFM supports the EFM supports
the quick detection, range: 3-200, unit: 100 ms, default: 50.
<fast-period> Interval of sending packets when the EFM supports the quick
detection, range: 1-10, unit: 100ms, default: 10.
For a description of the parameter in Step 13, refer to the following table:
Parameter Description
Parameter Description
Command Function
For a description of the parameters in the show command, refer to the following table:
Parameter Description
3-5
Status:
Parser :forward
Multiplexer :forward
Stable :no
Discovery :undone
Loopback :off
PDU max size :1518
PDU Revision :0
Unidirection :nonsupport
Remote DTE
-----------
Remote DTE does not exist.
For a description of the parameters in the execution result, refer to the following table:
PDU max size Maximum number of OAMPDU bytes supported by the DTE.
3-6
l Configuration Flow
1. Configure the EFM function for the interface directly connecting to R2 on R1. To
be specific, enable the EFM switch and the link-monitor switch for the specified
interface, and enable the EFM function globally.
2. Configure the EFM function for the interface directly connecting to R1 on R2. To
be specific, enable the EFM switch and the link-monitor switch for the specified
interface, and enable the EFM function globally.
3. Run the show ethernet-oam discovery command on R1 and R2 to check the EFM
connection establishment between R1 and R2.
4. Run the show ethernet-oam link-monitor command on R1 and R2 to check the
number of link errors between R1 and R2.
l Configuration Commands
Run the following commands on R1:
R1#configure terminal
R1(config)#efm
R1(config-efm)#interface gei-0/0/1/1
R1(config-efm-if-gei-0/0/1/1)#set ethernet-oam function enable
R1(config-efm-if-gei-0/0/1/1)#set ethernet-oam link-monitor function enable
R1(config-efm-if-gei-0/0/1/1)#exit
R1(config-efm)#set ethernet-oam oui R1
R1(config-efm)#set ethernet-oam function enable
R1(config-efm)#exit
3-7
Remote DTE
-----------
Config:
Mode :active
Link Monitor :support
Unidirection :nonsupport
Remote Loopback :support
Mib Retrieval :nonsupport
PDU max size :1518
Remote OUI(hex) :5a-54-45 /*Remote OUI.*/
3-8
Status:
3-9
Parser :forward
Multiplexer :forward
Stable :yes
Discovery :done
Loopback :off
PDU max size :1518
PDU Revision :2
Unidirection :nonsupport
Remote DTE
-----------
Config:
Mode :active
Link Monitor :support
Unidirection :nonsupport
Remote Loopback :support
Mib Retrieval :nonsupport
PDU max size :1518
Remote OUI(hex) :5a-54-45
Status:
Parser :forward
Multiplexer :forward
Stable :yes
Mac Address :1210.1210.1211
PDU Revision :1
4. Run the show ethernet-oam link-monitor command on R2 to check the number of
link errors. The execution result is displayed as follows:
R2(config)#show ethernet-oam gei-0/0/1/1 link-monitor
Link Monitoring of Port: 66
Link Monitoring enable
Error Symbol Period Event:
Symbol Window : 1(million symbols)
Error Symbol Threshold : 1
Error Symbols : 0
Local Total Error Symbols : 0
Remote Total Error Symbols : 0
Local Total Error Events : 0
Remote Total Error Events : 0
Error Frame Event:
Frame Window : 1(s)
Error Frame Threshold : 1
Error Frames : 0
Local Total Error Frames : 0
Remote Total Error Frames : 0
3-10
l Configuration Flow
1. Configure EFM for the interface of R1 connecting to R2 directly and enable EFM
globally.
2. Configure EFM for the interface of R2 connecting to R1 directly and enable EFM
globally.
3. After the EFM connection is established on R1 and R2, enable remote loopback
on R1.
4. Run the show ethernet-oam discovery command on R1 and R2 to check the EFM
connection establishment.
l Configuration Commands
Run the following commands on R1:
R1#configure terminal
R1(config-efm)#interface gei-0/0/1/1
3-11
3-12
R1(config)#efm
R1(config-efm)#interface gei-0/0/1/1
R1(config-efm-if-gei-0/0/1/1)#set ethernet-oam link-monitor frame threshold 2 window 30
R1(config-efm-if-gei-0/0/1/1)#exit
R1(config-efm)#
l Configuration Verification
Run the show ethernet-oam link-monitor command on R1 to check the number of error
frames on the link. The execution result is displayed as follows:
R1(config)#show ethernet-oam gei-0/0/1/1 link-monitor
Link Monitoring of Port: 32
Link Monitoring enable
Error Symbol Period Event:
Symbol Window : 1(million symbols)
Error Symbol Threshold : 1
Error Symbols : 1
Local Total Error Symbols : 0
Remote Total Error Symbols : 0
Local Total Error Events : 0
Remote Total Error Events : 0
Error Frame Event:
Frame Window : 30(s)
Error Frame Threshold : 2
Error Frames : 1
Local Total Error Frames : 0
Remote Total Error Frames : 0
Local Total Error Events : 0
Remote Total Error Events : 0
Error Frame Period Event:
Period Window : 1(ten thousand frames)
Error Frame Threshold : 1
Error Frames : 1
Local Total Error Frames : 0
Remote Total Error Frames : 0
Local Total Error Events : 0
Remote Total Error Events : 0
Error Frame Seconds Event:
Error Seconds Window : 1(s)
Error Seconds Threshold : 1(s)
Error Frame Seconds : 1(s)
Local Total Error Frame Seconds : 0(s)
Remote Total Error Frame Seconds : 0(s)
Local Total Error Frame Seconds Events : 0
Remote Total Error Frame Seconds Events : 0
3-13
3-14
l Fault detection: An MEP sends and receives Continuity Check Messages (CCMs)
periodically to detect the connectivity of the network. It can discover connectivity
failures and non-consensual connectivity (situations of wrong connections).
l Fault confirmation and isolation: This function belongs to the management behavior.
Network administrators confirm the faults through Loopback Messages (LBMs) or
Loopback Replies (LBRs), and then isolate the faults.
4-1
l Path discovery: An MEP uses Linktrace Messages (LTMs) or Linktrace Replies (LTRs)
to discover paths and trace the path from an MEP to another MEP or the path between
Maintenance domain Intermediate Points (MIPs).
CFM Principle
CFM can check, isolate, and report connectivity faults in VLANs effectively.
To manage and maintain the network, network administrators make a plan for the network
services and levels, and divide the entire network into several MDs. For the sketch map
of an MD, see Figure 4-1.
A series of ports are defined for the edge devices and the internal device, see Figure 4-1.
l The gray points on the edge devices are the services ports connecting to devices
outside the domain. These points are defined as MEPs.
l The black points on the devices (including the internal device) are ports connecting to
devices inside the domain. These points are defined as MIPs.
The management function is implemented through the MEPs and MIPs.
A network can be divided into user domain, provider domain, and operator domain. Each
domain is specified to a level. There are levels from 0 to 7. The level of a domain decides
the inclusion relation of domains. A domain of a higher level may include domains of lower
levels. However, a domain of a lower level cannot include a domain of a higher level. The
domains of the same level cannot include each other. Therefore, the domain of the largest
range has the highest level. The inclusion relation of domains can be tangent (internally
tangent or externally tangent) and inclusive, but it cannot be intersecting.
4-2
The main target of CMF is the networks of service operators. CFM is also effective for
Customer VLANs (C-VLANs). IEEE 802.1ag standard defines the following mechanism:
1. Several nesting MDs configured through a bridge network or a network of a bridge
network. The domains may be managed by different management organizations.
2. An MA identified by an individual MD in a specific bridge and a group of VLANs.
3. The protocol, flow, and formats of CFM protocol packets that are used to detect and
isolate connectivity faults.
4. Configuration ability to configure and manage Maintenance Points (MPs) in an MA. An
MP is used to generate and receive CFM packets.
5. MPs ordered to execute isolation and result inspection for confirmed faults.
4-3
Parameter Description
Parameter Description
Parameter Description
4-4
Parameter Description
<ma-name> Integer. The MA name should be the bound vlan during the MA
configuration.
<vlan-id> Primary VID bound to the MA, default: 0, identifying that the MA
does not include any VLAN.
When a switch creates an MA, the vlan-id must be included.
Parameter Description
Parameter Description
Parameter Description
4-5
Parameter Description
<mepid > MEP ID, range: 1-8191. The MEP ID in the MA should be unique,
including the local MEP and the remote MEP.
For a description of the parameters in Step 10, refer to the following table:
Parameter Description
For a description of the parameters in Step 11, refer to the following table:
Parameter Description
<mepid > MEP ID, range: 1-8191, used for local MEP and remote MEP.
For a description of the parameters in Step 12, refer to the following table:
Parameter Description
<enable> Enables the CCM packet sending function of the local MEP.
<disable> Disables the CCM packet sending function of the local MEP.
For a description of the parameters in Step 13, refer to the following table:
Parameter Description
For a description of the parameter in Step 14, refer to the following table:
Parameter Description
For a description of the parameters in Step 15, refer to the following table:
Parameter Description
md MD.
4-6
Parameter Description
ma MA.
<tlv-length> Length of the Data TLV field carried by the LBM, optional, range:
1400. If this parameter is not configured, it means that the LBM
does not carry the Data TLV field.
<timeout> Time of waiting for an LBR after an LBM is sent, range: 110,
default: 5 s.
For a description of the parameters in Step 16, refer to the following table:
Parameter Description
md MD.
ma MA.
<timeout> Times of each hop waiting for an LTR after an LTM is sent, range:
510, default: 5 s.
4-7
Command Function
Parameter Description
The following is sample output from the show cfm status command (checking the CFM
global state):
ZXR10#show cfm status
CFM enabled
CFM version:0
For a description of the parameters in the execution result, refer to the following table:
The following is sample output from the show cfm md all command:
ZXR10#show cfm md all
MD index 8
name format/name: 2(Base string)/md8
level: 7
contain MA numbers:1
4-8
For a description of the parameters in the execution result, refer to the following table:
The following is sample output from the show cfm ma all md 1 command:
ZXR10#show cfm ma all md 1
MA index 1
name-format/name: 1(Primary VID)/4094
belong to MD: 1
CCM interval: 10s
Vlan list: 4094(pvid)
Contained MEP numbers: 24
MA index 2
name-format/name: 1(Primary VID)/0
belong to MD: 1
CCM interval: 10s
Vlan list: no vids
Contained MEP numbers: 0
For a description of the parameters in the execution result, refer to the following table:
Contained MEP numbers Number of MEPs (including local MEP and RMEP) created in
an MA.
4-9
l Configuration Flow
1. Create MDs and MAs on R1 and R2. The MDs have the same ID and name, and
the MAs have the same ID and name. Enable the CFM function globally.
2. Create local MEPs for the directly connected interfaces of R1 and R2. The MEPs
are of the same level. Use the peer MAC and MEP ID to create RMEPs on R1
and R2. Enable the local MEP, CCM sending and RMEP.
3. Run the show cfm mp command on R1 and R2 to check the MEP identification bit
to check the CFM connection establishment of R1 and R2.
l Configuration Commands
Run the following commands on R1:
R1#configure terminal
R1(config)#cfm
R1(config-cfm)#set cfm enable
R1(config-cfm)#create md index 1 name-format 2 name md1 level 1
R1(config-cfm)#md index 1
R1(config-cfm-md)#create ma index 1 name-format 2 name ma1 vid 100
R1(config-cfm-md)#ma index 1
R1(config-cfm-ma)#create mep mepid 1 direction down interface gei-0/1/0/1
R1(config-cfm-ma)#set ccminterval 1 /*fast detection*/
R1(config-cfm-ma)#set mep 1 state enable
R1(config-cfm-ma)#set mep 1 ccm-send enable
R1(config-cfm-ma)#create rmep mepid 2 remote-mac 00ee.ff10.2000
R1(config-cfm-ma)#set mep 2 state enable
R1(config-cfm-ma)#end
4-10
R2(config-cfm-ma)#end
l Configuration Verification
1. Run the show cfm mp all md 1 ma 1 command on R1 to check the link information.
The execution result is displayed as follows:
RP1(config)#show cfm mp all md 1 ma 1
MP type : Local MEP
Direction : down
MEPID : 1
MEPIndex : 1
Level : 1
Primary VID : 100
Assign port : gei-0/1/0/1
Priority : 7
LowestAlarmPriority : 1
Client level : 7
Admin state : enable
CCM state/interval : enable/3.3ms
AIS state/interval : disable/1s
LCK state/interval : disable/1s
DM state : disable
LM state : disable
-------------------------------------------------------------------
PresentRDI : 0 MADefectIndication : 0
SomeRDIDefect : 0 SomeRMEPCCMDefect : 0
ErrorCCMDefect : 0 UnexpectedLevelDefect : 0
UnexpectedPeriodDefect : 0 UnexpectedMACDefect : 0
UnexpectedMEPIDDefect : 0 XconCCMDefect : 0
AISRcvdFlag : 0 LCKRcvdFlag : 0
--------------------------------------------------------------------
TotalSendCCMs : 0 TotalRcvdCCMs : 0
RightRcvdCCMs : 0 DefErrorCCMs : 0
DiscardCCMs : 0 DefXconCCMs : 0
TotalSendLBMs : 0 TotalRcvdLBRs : 0
TotalRcvdLBMs : 0 TotalSendLBRs : 0
---------------------------------------------------------------------
4-11
------------------------------------------------------------------------
1DMFrameTimeDelay : 0s, 0ns
1DMFrameTimeDelayChg : 0s, 0ns
DMMFrameTimeDelay : 0s, 0ns
DMMFrameTimeDelayChg : 0s, 0ns
LMMCount : 0 DLMCount : 0
LMMFrameSendRemote : 0 DLMFrameSendRemote : 0
LMMFrameSendLocal : 0 DLMFrameSendLocal : 0
LMMFrameLossRemote : 0 DLMFrameLossRemote : 0
LMMFrameLossLocal : 0 DLMFrameLossLocal : 0
LMMAveFrameLossRemote : 0 DLMAveFrameLossRemote : 0
LMMAveFrameLossLocal : 0 DLMAveFrameLossLocal : 0
LMMHighFrameLossRemote : 0 DLMHighFrameLossRemote : 0
LMMHighFrameLossLocal : 0 DLMHighFrameLossLocal : 0
LMMTotalFrameLossRemote : 0 DLMTotalFrameLossRemote : 0
LMMTotalFrameLossLocal : 0 DLMTotalFrameLossLocal : 0
LMMFrameLossRatioRemote : 0.000000 DLMFrameLossRatioRemote : 0.000000
LMMFrameLossRatioLocal : 0.000000 DLMFrameLossRatioLocal : 0.000000
------------------------------------------------------------------------
2. Run the show cfm mp all md 1 ma 1 command on R2 to check the link information.
The execution result is displayed as follows:
RP2(config)#show cfm mp all md 1 ma 1
MP type : Local MEP
Direction : down
MEPID : 2
MEPIndex : 1
Level : 1
Primary VID : 100
Assign port : gei-0/1/0/1
Priority : 7
LowestAlarmPriority : 1
Client level : 7
Admin state : enable
CCM state/interval : enable/3.3ms
AIS state/interval : disable/1s
LCK state/interval : disable/1s
DM state : disable
LM state : disable
------------------------------------------------------------------
PresentRDI : 0 MADefectIndication : 0
SomeRDIDefect : 0 SomeRMEPCCMDefect : 0
ErrorCCMDefect : 0 UnexpectedLevelDefect : 0
UnexpectedPeriodDefect : 0 UnexpectedMACDefect : 0
UnexpectedMEPIDDefect : 0 XconCCMDefect : 0
AISRcvdFlag : 0 LCKRcvdFlag : 0
4-12
-------------------------------------------------------------------
TotalSendCCMs : 0 TotalRcvdCCMs : 0
RightRcvdCCMs : 0 DefErrorCCMs : 0
DiscardCCMs : 0 DefXconCCMs : 0
TotalSendLBMs : 0 TotalRcvdLBRs : 0
TotalRcvdLBMs : 0 TotalSendLBRs : 0
-------------------------------------------------------------------
In an L2 VPN network, the MEP of the CFM is configured for PE1 and PE2, and the
link between PE1 and PE2 is connected, see Figure 4-3.
4-13
l Configuration Flow
1. Create MDs and MAs on PE1 and PE2. The MDs have the same ID and name,
and the MAs have the same ID and name.
2. Configure the UP MEP for the interfaces on the AC side of PE1 and PE2
separately, and the MIP for the interfaces on the public network side of PE1 and
PE2.
3. PE1 performs the cfm linktrace and cfm loopback operations on MIP and MEP of
PE2 to check the link connection.
l Configuration Commands
Run the following commands on PE1:
PE1#configure terminal
PE1(config)#cfm
PE1(config-cfm)#set cfm enable
PE1(config-cfm)#create md index 1 name-format 2 name MD1 level 4
PE1(config-cfm)#md index 1
PE1(config-cfm-md)#create ma index 1 name-format 2 name MA1
PE1(config-cfm-md)#ma index 1
PE1(config-cfm-ma)#create mep mepid 1 direction up interface gei-0/3/0/1
PE1(config-cfm-ma)#set mep 1 stat en
PE1(config-cfm-ma)#set mep 1 ccm en
PE1(config-cfm-ma)#create rmep mepid 2 remote 00ee.efab.ede3
PE1(config-cfm-ma)#set mep 2 stat en
PE1(config-cfm-ma)#create mip session-id 1 interface gei-0/2/0/1
PE1(config-cfm-ma)#end
4-14
4-15
4-16
l Device reliability
l Link reliability
l Network reliability
On the bearer network, the requirement for network device availability is 99.999%, that is,
the time for maintenance of a stop-running device due to faults caused by various reasons
during continuous running in a whole year is only about 5 minutes. High reliability is a
basic requirement of a carrier class device, and it is a basic requirement of operators to
construct networks. The basic network works as the bearer body of various services, so
its reliability is becoming a focus.
On a switch or a Packet Transport Network (PTN) device, reliability technology includes
device hardware redundancy and network reliability technology. Here introduces network
reliability technology.
Network reliability technology includes network fault detection technology and protection
switching technology.
On different network layers, network fault detection technology has the following detection
mechanisms.
5-1
SAMGR Principle
l SAMGR Working Principle
In practical applications, switches support several detection technologies. The
protection switching applications also need to monitor the real-time detection state
to meet the reliability requirements in different network structures. Therefore,
the SAMGR is introduced to implement the linkage between various detection
technologies and services.
The SAMGR isolates detection technologies from services, and reduces the coupling
between modules. The working principles are as follows:
At the same time, the SAMGR also can manage the binding relation between racks
and send the local state to the remote end. In this way, fault transmission and recovery
is accomplished.
5-2
When EOAM detects a fault, it reports the fault to the SAMGR. The SAMGR
informs the service to switch the state directly in accordance with the relation
between the track object and the service.
When a fault of the pee-type BFD occurs on the switch, the SAMGR advertises
the state to the service, and then the service performs switching in accordance
with its policy on the basis of the EOAM state and the BFD state.
2. A CE connects to two PEs symmetrically to perform linkage of states between
detections, see Figure 5-2.
5-3
5-4
5-5
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
5-6
Parameter Description
Parameter Description
{aal1|aal2|atm-aal5|atm-cell PW type
|atm-vcc|atm-vpc|cem|ceop|
cesopsn-basic | cesopsn-cas |
hdlc | e1 |e3| ether | ether-vlan |
fr-dlci-martini | fr-dlci | fr-port |
ip | ppp | t1 |t3}
Parameter Description
<ifname> The name of the interface on which the VRRP group is configured
Parameter Description
5-7
Parameter Description
Parameter Description
<trackname> The name of the track object added to the track group
Parameter Description
<1-10> Track group policy that describes the number of down tracks that
will results in the track group down
Parameter Description
track<name> The name of the passive track object, that is, the name of the
track object that receives state transmission
{track | track-group}<name> The name of the active track object or track group, that is,
the name of the track object or track group that starts state
transmission
5-8
Command Function
Output descriptions:
5-9
Output descriptions:
5-10
Active track Whether to work as an active track to send state to the passive
track
Passive track Whether to work as a passive track to receive the state sent by
the active track
old state The original state of the track object before the state is changed.
new state The current state of the track object after the state is changed.
5-11
Output descriptions:
Track name Name of track objects that are bound to the track group
old state The original state of the track group before the state is changed.
new state The current state of the track group after the state is changed.
l Configuration Thought
1. Configure an EFM connection on the direct-connected interfaces of the link
between R1 and R2.
2. Configure a track object of which the detection type is EFM on the
direct-connected interface of R2 in SAMGR configuration mode.
3. Configure the same VRRP group number and virtual address on R2 and R3. To
make R2 work as a master switch, bind VRRP on R2 to the track object of EFM.
5-12
4. Disable EFM on R1, the VRRP on R2 becomes Init state, and the VRRP on R3
becomes Backup state. Enable EFM on R1, the VRRP on R2 becomes Master
state, and the VRRP on R3 becomes Backup state.
l Configuration Commands
The configuration of R1:
R1(config)#efm
R1(config-efm)#set ethernet-oam function enable
R1(config-efm)#interface gei-0/1/0/1
R1(config-efm-if)#set ethernet-oam function enable
R1(config-efm-if)#exit
5-13
R3(config)#switchvlan-configuration
R3(config -swvlan)#interface gei-0/5/0/1
R3(config-swvlan-intf)#sw trunk vlan 20
R3(config-swvlan-intf)#exit
R3(config-swvlan)#exit
R3(config)#interface vlan20
R3(config-if)#ip address 10.0.0.2 255.255.0.0
R3(config-if)#exit
R3(config)#switchvlan-configuration
R3(config -swvlan)#interface gei-0/6/0/2
R3(config-swvlan-intf)#sw trunk vlan 10
R3(config-swvlan-intf)#exit
R3(config-swvlan)#exit
R3(config)#interface vlan10
R3(config-if)#ip address 192.168.0.2 255.255.0.0
R3(config-if)#exit
R3(config)#vrrp
R3 (config-vrrp)#interface vlan20
R3(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R3(config-vrrp-if)#vrrp 1 out-interface vlan10
R3(config-vrrp-if)#end
l Configuration Verification
Check the VRRP configuration results on R2 and R3. The results show that R2 is a
master router and R3 is a bBackup router. The output of the show samgr command
on R2 shows that the EFM track object is in up state.
R2#show vrrp ipv4 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
vlan20 1 100 1000 P Master 10.0.0.1 10.0.0.1
R2#show samgr brief
The total of track at this Router is 1.
============================================================================
Track-name Detect-type App-num State
efm efm 1 up
When EFM is disabled on R1, the VRRP becomes Init from Master on R2, and the
VRRP becomes Master on R3. The output of the show samgr command on R2 shows
that the EFM track object is in loacl down state.
R1(config)#efm
R1(config-efm)#set ethernet-oam function disable
5-14
When EFM is enabled on R1 again, the VRRP on R2 becomes Master, and the VRRP
on R3 becomes Backup. The EFM track object is in up state on R2.
R1(config)#efm
R1(config-efm)#set ethernet-oam function enable
5-15
l Configuration Thought
1. Configure CFM on the direct-connected interfaces of the link between R1 and R2.
2. Configure a track object of which the detection type is CFM on the
direct-connected interface of R2 in SAMGR configuration mode.
3. Configure the same VRRP group number and virtual address on R2 and R3. To
make R2 work as a master router, bind VRRP on R2 to the track object of CFM.
4. Disable CFM on R1, the VRRP on R2 becomes Init state, and the VRRP on R3
becomes Backup state. Enable CFM on R1, the VRRP on R2 becomes Master
state, and the VRRP on R3 becomes Backup state.
l Configuration Commands
The configuration of R1:
R1(config)#cfm
R1(config-cfm)#set cfm enable
R1(config-cfm)#create md index 2 name-format 2 name md2 level 7
R1(config-cfm)#md index 2
R1(config-cfm-md)#create ma index 4 name-format 2 name a4 vid 0
R1(config-cfm-md)#ma index 4
R1(config-cfm-ma)#create mep mepid 8 direction down interface gei-0/1/0/1
R1(config-cfm-ma)#create rmep mepid 16 remote-mac 00d0.d011.3377 lmep 8
R1(config-cfm-ma)#set mep 8 state enable
R1(config-cfm-ma)#set mep 8 ccm-send enable
R1(config-cfm-ma)#set mep 16 state enable
5-16
5-17
When CFM is disabled on R1, the VRRP becomes Init from Master on R2, and the
VRRP becomes Master on R3. The output of the show samgr command on R2 shows
that the CFM track object is in loacl down state.
R1(config)#cfm
R1(config-cfm)#set cfm disable
5-18
When CFM is enabled on R1 again, the VRRP on R2 becomes Master, and the VRRP
on R3 becomes Backup. The CFM track object is in up state on R2.
R1(config)#cfm
R1(config-cfm)#set cfm enable
5-19
5-20
BFD provides a solution to the above problem. BFD protocol can detect failures on any
types of paths between adjacent systems, including direct-connected physical link, virtual
circuit, tunnel, MPLS LSP, multi-hop routing channel, and indirect-connected tunnel.
Because of its simpleness and unitary, BFD can focus on fast detection of forwarding
failures. It helps networks to implement transmission of voice, video, and other services
with good Quality of Service (QoS), thus helps service providers to provide real-time
services (such as Voice over Internet Protocol (VoIP) on the base of IP network.
BFD Principle
BFD is a simple Hello protocol. It is similar to the Hello mechanisms of routing protocols.
BFD is simpler and universal. The two systems that establish a BFD session send packets
to each other periodically. If one system does not receive any packet from the peer in a
specific period, it considers that there is a failure on the communication path. The BFD
session will be down, and BFD will inform the upper layer protocol to select another path.
To reduce the loads of devices, some special application modes are designed in BFD. In
these modes, devices can reduce the number of BFD packets sent to the peers; or it is
unnecessary for the devices to send BFD packets periodically. The devices can send the
packets only when it is necessary.
BFD protocol aims at fast failure detection (including failures on interfaces, data links, and
even forwarding engines) on a bidirectional tunnel between forwarding engines. Another
aim is to provide a single detection mechanism that can be applied to any type of medium
and any protocol layer. BFD detects failures in the forwarding engines between a device
and the next hop. It is likely to work in some parts of a system forwarding engine. The
6-1
forwarding engine and the control engine are isolated. This not only binds the protocol to
the forwarding plane, but also isolates the protocol from the routing protocol engine (control
plane). Therefore, BFD can take effect in non-interrupt forwarding and run in the control
engine.
BFD provides failure detection between systems, including direct connected physical links,
virtual links, tunnels, MPLS LSPs, and multi-hop routing paths.
Parameter Description
<src-ip-address> Source IP address used for establishing the BFD session. The
source IP address must be a local IP address.
6-2
Parameter Description
Command Function
Parameter Description
During the static route configuration, you need to confirm the unique link to the destination
and enable BFD for this link by running the bfd enable command.
6-3
You can enable BFD for the interface that uses the IS-IS protocol. When the IS-IS neighbor
relationship is established between this interface and the peer interface, a BFD session
based on the IS-SI protocol is generated on the link that connects these two interfaces
directly.
If the BGP neighbor is directly connected, configure a single-hop BFD detection mode; If
the BFP neighbor is not directly connected, configure a multihop BFD detection mode.
6-4
2 ZXR10(config-ldp)#bfd <FEC address><mask Configures the BFD function for the LSP
length> interval <interval> min-rx < min-rx> generated by the LDP protocol, and
multiplier <multiplier>[ source <ip-address>] creates a BFD session for the LSP.
The LDP BFD session only needs to be configured locally. During the configuration, a
reverse LDP BFD session is established automatically after you specify the address of the
remote LSP.
For a description of the parameters in Step 2, refer to the following table:
Parameter Description
<FEC address> Specifies the LSP address that is used to establish a BFD session.
In general, it is a remote IP address.
<mask length> Specifies the length of the sub-net mask of the remote IP address,
range: 0-32.
Command Function
Command Function
6-5
Parameter Description
Command Function
Parameter Description
<ld> Configures the local identifier for the BFD session, range: 1-2048.
<rd> Configures the remote identifier for the BFD session, range:
1-2048.
Command Function
Command Function
6-6
Command Function
Command Function
ZXR10#debug bfd byte Displays the information about sent and received
link establishment packets when a BFD session
is established (packets in the UDP data area).
ZXR10#show bfd neighbors ip detail Displays the detailed information about a BFD
session whose type is IP.
ZXR10#show bfd neighbors ip brief Displays the brief information about a BFD
session whose type is IP.
ZXR10#show bfd neighbors ldp brief Displays the brief information about a BFD
session whose type is LDP.
ZXR10#show bfd neighbors ldp detail Displays the detailed information about a BFD
session whose type is LDP.
ZXR10#show bfd neighbors rsvp {lsp | passive } brief Displays the brief information about a BFD
session whose type is LDP.
ZXR10#show bfd neighbors rsvp {lsp | passive } Displays the detailed information about a BFD
detail session whose type is RSVP.
ZXR10#show bfd neighbors pw brief Displays the brief information about a BFD
session whose type is PW.
6-7
Command Function
ZXR10#show bfd neighbors pw detail Displays the detailed information about a BFD
session whose type is PW.
ZXR10#show bfd neighbors local-disc Displays the detailed information about a BFD
session in accordance with the local disc.
l Configuration Flow
1. Establish the IS-IS neighbor relationship between R1 and R2.
2. Enable BFD for interfaces of R1 and R2.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 172.20.130.213 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#router isis
R1(config-isis-0)#area 49.0172
R1(config-isis-0)#system-id 0020.0096.0001
R1(config-isis-0)#interface vlan1
R1(config-isis-0-if-vlan1)#ip router isis
R1(config-isis-0-if-vlan1)#bfd-enable
R1(config-isis-0-if-vlan1)#end
6-8
R2(config)#router isis
R2(config-isis-0)#area 49.0172
R2(config-isis-0)#system-id 0020.0096.0002
R2(config-isis-0)#interface vlan2
R2(config-isis-0-if-vlan2)#ip router isis
R2(config-isis-0-if-vlan2)#bfd-enable
R2(config-isis-0-if-vlan2)#end
l Configuration Verification
Run the show bfd neighbors [ip brief | ip detail] command to check whether the
ISIS-BFD session is established successfully on R1. The execution result is
displayed as follows:
R1(config)#show bfd neighbors ip brief
LocalAddr PeerAddr LD RD Hold State interface
172.20.130.213 172.20.130.214 1 3 150 UP vlan1
Registered Protocols:ISIS
Uptime:0 day(s),0 hour(s),0 minute(s)
Control Plane Rcv Phy Interface Name: vlan1
==========================================================================
The OSPF neighbor relationship is established between R1 and R2, and BFD is
enabled for interfaces of R1 and R2, see Figure 6-2.
6-9
l Configuration Flow
1. Establish the OSPF neighbor relationship between R1 and R2.
2. Enable the BFD function for interfaces of R1 and R2.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 172.20.130.213 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#router ospf 1
R1(config-ospf-1)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
R1(config-ospf-1)#bfd area 0
R1(config-ospf-1)#end
6-10
BFD Type:SingleHop
Instance Name:
------------------------------------------------------------------------
Version:1 Dest UDP Port:3784 Final Bit:1
Local Diag:0 Demand Mode:0 Poll Bit:1
MinTxInt:50 MinRxInt:50 Multiplier:3
Received MinTxInt:50 Received MinRxInt:50 Received Multiplier:3
Length:24 Min Echo Interval:0
Min BFD Length:24 Max BFD Length:24
Registered Protocols:OSPF
Uptime:0 day(s),0 hour(s),0 minute(s)
Control Plane Rcv Phy Interface Name: vlan1
==========================================================================
l Configuration Flow
1. Configure the IP address for the interfaces of R1 and R2.
2. Configure the RIP protocol
3. Enable the configuration related to the RIP protocol for the interfaces.
4. Test the configuration result to confirm that the neighbor relationship is established
between two devices and the notify route can be learnt from each other.
5. Enable the BFD function in RIP mode.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 192.168.1.1 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#interface vlan2
R1(config-if-vlan2)#ip address 10.1.0.1 255.255.255.0
R1(config-if-vlan2)#exit
R1(config)#router rip
R1(config-rip)#network 192.168.1.0 0.0.0.255
R1(config-rip)#network 10.1.0.0 0.0.0.255
R1(config-rip)#bfd
R1(config-rip)#exit
6-11
6-12
Registered Protocols:RIP
Uptime:0 day(s),0 hour(s),3 minute(s)
Control Plane Rcv Phy Interface Name: vlan1
==========================================================================
Run the show running-config rip command to check whether the RIP configuration is
correct on R2. The execution result is displayed as follows:
R2(config)#show running-config rip
!<rip>
router rip
bfd
network 192.168.1.0 0.0.0.255
network 10.2.0.0 0.0.0.255
$
!</rip>
6-13
Registered Protocols:RIP
Uptime:0 day(s),0 hour(s),5 minute(s)
Control Plane Rcv Phy Interface Name: vlan1
==========================================================================
6-14
l Configuration Flow
1. Establish the BGP neighbor relationship between R1 and R2.
2. Enable the BFD function for interfaces of R1 and R2.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 172.20.130.213 255.255.255.0
R1(config-if-vlan1)#exit
6-15
Registered Protocols:BGP
Uptime:0 day(s),0 hour(s),0 minute(s)
Control Plane Rcv Phy Interface Name: vlan1
==========================================================================
l Configuration Flow
1. Configure the protocol for each route.
2. Enable the BFD function in protocol interface mode or for the specific destination
route.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 100.1.1.1 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 1.1.1.211 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#router ospf 1
R1(config-ospf-1)#network 100.1.1.0 0.0.0.255 area 0
R1(config-ospf-1)#network 1.1.1.211 0.0.0.0 area 0
R1(config-ospf-1)#exit
6-16
R2(config)#router ospf 1
R2(config-ospf-1)#network 100.1.1.0 0.0.0.255 area 0
R2(config-ospf-1)#network 200.1.1.0 0.0.0.255 area 0
R3(config)#router ospf 1
R3(config-ospf-1)#network 200.1.1.0 0.0.0.255 area 0
R3(config-ospf-1)#network 1.1.1.213 0.0.0.0 area 0
R3(config-ospf-1)#exit
Run the show bfd neighbors [ip brief | ip detail ] command to check whether the BFD
session is established successfully on R1. The execution result is displayed as
follows:
R1#show bfd neighbors ip brief
6-17
LocalAddr:1.1.1.211
PeerAddr :1.1.1.213
Local Discr: 56 Remote Discr:57 State:UP
Holdown(ms):150 Interface:---
Vpnid:0 VRF Name:---
BFD Type:MultiHop
Instance Name:1
----------------------------------------------------------------------------
Version:1 Dest UDP Port:4784 Final Bit:1
Local Diag:0 Demand Mode:0 Poll Bit:1
MinTxInt:50 MinRxInt:50 Multiplier:3
Received MinTxInt:50 Received MinRxInt:50 Received Multiplier:3
Length:24 Min Echo Interval:0
Min BFD Length:24 Max BFD Length:24
l Configuration Flow
1. Run the static route protocol between R1 and R2.
2. Configure the BFD function for the static route of R1 and R2.
l Configuration Commands
Run the following commands on R1:
6-18
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 172.20.130.213 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 172.20.96.1 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#ip route 172.20.108.1 255.255.255.255 172.20.130.214 bfd enable
Holdown(ms):150 Interface:---
Vpnid:0 VRF Name:---
BFD Type:SingleHop
Instance Name:
----------------------------------------------------------------------------
Version:1 Dest UDP Port:4784 Final Bit:1
Local Diag:0 Demand Mode:0 Poll Bit:1
MinTxInt:50 MinRxInt:50 Multiplier:3
Received MinTxInt:50 Received MinRxInt:50 Received Multiplier:3
Length:24 Min Echo Interval:0
Min BFD Length:24 Max BFD Length:24
6-19
l Configuration Flow
1. Configure the IP address for the corresponding interfaces.
2. Enter multicast configuration mode.
3. Enter PIM configuration mode.
4. Set the loopback5 interface of R2 to CRP and BSR.
5. Enter PIM-SM interface configuration mode.
6. Enable the BFD function in PIM-SM interface configuration mode.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 199.1.1.1 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#interface vlan2
R1(config-if-vlan2)#ip address 33.1.1.1 255.255.255.0
R1(config-if-vlan2)#exit
R1(config)#ip multicast-routing
R1(config-mcast)#router pim
R1(config-mcast-pim)#interface vlan1
R1(config-mcast-pim-if-vlan1)#pimsm
R1(config-mcast-pim-if-vlan1)#bfd-enable
R1(config-mcast-pim-if-vlan1)#exit
R1(config-mcast-pim)#interface vlan2
R1(config-mcast-pim-if-vlan2)#pimsm
R1(config-mcast-pim-if-vlan2)#dr-priority 20
R1(config-mcast-pim-if-vlan2)#exit
6-20
R2(config)#ip multicast-routing
R2(config-mcast)#router pim
R2(config-mcast-pim)#interface vlan1
R2(config-mcast-pim-if-vlan1)#pimsm
R2(config-mcast-pim-if-vlan1)#bfd-enable
R2(config-mcast-pim-if-vlan1)#exit
R2(config-mcast-pim)#interface vlan2
R2(config-mcast-pim-if-vlan2)#pimsm
R2(config-mcast-pim-if-vlan2)#dr-priority 20
R2(config-mcast-pim-if-vlan2)#exit
l Configuration Verification
Run the show ip pim interface command to check the interface status on R1. The
execution result is displayed as follows:
R1(config)#show ip pim interface
Address Interface State Nbr Hello DR DR PIM Mode
Count Period Priority Silent
33.1.1.1 vlan2 Up 0 30 20 33.1.1.1 Disabled S
199.1.1.1 vlan1 Up 1 30 1 199.1.1.2 Disabled D
Run the show ip pim neighbor command to check the neighbor status on R1. The
execution result is displayed as follows:
R1(config)#show ip pim neighbor
Neighbor Address Interface DR Priority Uptime Expires Ver
199.1.1.2 vlan1 1 00:07:48 00:01:23 V2
Run the show bfd neighbor ip brief command to check the BFD status on R1. The
execution result is displayed as follows:
R1(config)#show bfd neighbor ip brief
LocalAddr PeerAddr LD RD Hold State Interface
199.1.1.1 199.1.1.2 2053 2054 150 UP vlan1
6-21
Registered Protocols:PIM
Uptime:0 day(s),0 hour(s),6 minute(s)
Control Plane Rcv Phy Interface Name: vlan1
==========================================================================
Run the show ip pim neighbor command to check the neighbor status on R2. The
execution result is displayed as follows:
R2(config)#show ip pim neighbor
Neighbor Address Interface DR Priority Uptime Expires Ver
199.1.1.1 vlan1 1 00:07:48 00:01:23 V2
Run the show bfd neighbor ip brief command to check the BFD status on R2. The
execution result is displayed as follows:
R2(config)#show bfd neighbor ip brief
LocalAddr PeerAddr LD RD Hold State Interface
199.1.1.2 199.1.1.1 2055 2054 150 UP vlan1
Registered Protocols:PIM
6-22
l Configuration Flow
1. Enable the LDP function for R1 and R2.
2. Set the IP address of the loopback interface as the ID of the LSR.
3. Enable the MPLS hop-by-hop forwarding function for the link between R1 and R2.
4. The LDP BFD configuration is performed on one end. Set R1 as the active party,
and configure the LDP BFD session for R1.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 172.20.130.213 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 172.20.96.1 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#router ospf 1
R1(config-ospf-1)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
R1(config-ospf-1)#network 172.20.96.1 0.0.0.0 area 0.0.0.0
R1(config-ospf-1)#end
6-23
R2(config)#router ospf 1
R2(config-ospf-1)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
R2(config-ospf-1)#network 172.20.108.1 0.0.0.0 area 0.0.0.0
R2(config-ospf-1)#end
Run the show bfd neighbors [ldp brief | ldp detail] command on R1 to check whether
the LDP BFD session is established successfully. The execution result is displayed
as follows:
R1(config)#show bfd neighbors ldp brief
PeerAddr PrefixLen LD RD Hold State
172.20.108.1 32 6 34 150 UP
6-24
l Configuration Flow
1. Configure the IGP function for R1 and R2 in loopback interface mode.
2. Enable the MPLS function for the interfaces that connect R1 and R2 directly.
3. Set the IP address of the Loopback interface to the ID of the LSR.
4. Enable PEER BFD.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 1.1.1.34 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 100.100.100.1 255.255.255.0
R1(config-if-vlan10/7)#exit
R1(config)#router isis 1
R1(config-isis-1)#area 00.0001
R1(config-isis-1)#system-id 0001.0002.0034
R1(config-isis-1)#interface vlan1
R1(config-isis-1-if-vlan1)#ip router isis
R1(config-isis-1-if-vlan1)#exit
R1(config-isis-1)#interface loopback1
R1(config-isis-1-if-loopback1)#ip router isis
R1(config-isis-1-if-loopback1)#exit
R1(config-isis-1)#exit
6-25
R1(config)#bfd
R1(config-bfd)#session 1 peer-bfd ipv4 1.1.1.34 1.1.1.35
R1(config-bfd)#exit
R2(config)#router isis
R2(config-isis-1)#area 00.0002
R2(config-isis-1)#system-id 0002.0002.0035
R2(config-isis-1)#interface vlan1
R2(config-isis-1-if-vlan1)#ip router isis
R2(config-isis-1-if-vlan1)#exit
R2(config-isis-1)#interface loopback1
R2(config-isis-1-if-loopbck1)#ip router isis
R2(config-isis-1-if-loopbck1)#exit
R2(config-isis-1)#exit
R2(config)#bfd
R2(config-bfd)#session 1 peer-bfd ipv4 1.1.1.35 1.1.1.34
R2(config-bfd)#exit
Note:
In the above configuration, the purpose of running the IS-IS dynamic route protocol is
to notify the Route-id, that is the route of the Loopback interface, of each LSR.
When the address of the loopback interface is set as the route-id of the LDP instance,
it is good for the steady operation of the LDP ID because the address status of the
loopback interface cannot change (except that you disable this interface manually).
6-26
l Configuration Verification
Run the following commands to check the establishment of the LDP neighbor on R2:
R2(config)#show mpls ldp neighbor detail instance 1
Peer LDP Ident: 1.1.1.34:0; Local LDP Ident 1.1.1.35:0
TCP connection: 1.1.1.34.646 - 1.1.1.35.1069
state: Oper; Msgs sent/rcvd: 47/48; Downstream
Up Time: 00:00:30
LDP discovery sources:
vlan1; Src IP addr: 100.100.100.1
holdtime: 15000 ms, hello interval: 5000 ms
Addresses bound to peer LDP Ident:
2.2.2.34 3.3.3.34 1.1.1.34 10.1.1.2
40.1.1.1 192.12.1.1 192.11.1.1 100.1.1.1
184.1.1.34 16.1.1.1 16.1.1.2 192.2.1.1
100.100.100.1
Session holdtime: 180000 ms; KA interval: 60000 ms
LDP Peer BFD not register.
LDP dynamic capability enable:
LDP send capability:
LDP dynamic capability
LDP Typed Wildcard FEC Cap
LDP Unrecognized Noti Cap
LDP received capability:
LDP dynamic capability negotiate success
LDP Typed Wildcard FEC Cap negotiate success
LDP Unrecognized Noti Cap negotiate success
If the session is in Oper (state: Oper) status, it means that the parameter negotiation
is correct and the neighbor relationship with R1 (1.1.1.34) is established successfully.
Run the following commands to check the PEER BFD neighbor on R1. The execution
result is displayed as follows:
R1(config-ldp-1)#show bfd neighbors ip brief
LocalAddr PeerAddr LD RD Hold State Interface
1.1.1.34 1.1.1.35 2087 2085 150 UP --
Holdown(ms):150 Interface:---
Vpnid:0 VRF Name:---
BFD Type:MultiHop
Instance Name:1
6-27
----------------------------------------------------------------------------
Version:1 Dest UDP Port:4784 Final Bit:1
Local Diag:0 Demand Mode:0 Poll Bit:0
MinTxInt:50 MinRxInt:50 Multiplier:3
Received MinTxInt:50 Received MinRxInt:50 Received Multiplier:3
Length:24 Min Echo Interval:0
Min BFD Length:24 Max BFD Length:24
At present, the static single-hop BFD and static multihop BFD are not related to
the route. The difference is that the static single-hop BFD must be configured with
outgoing interfaces and the static multihop BFD is configured with no outgoing
interface. The static single-hop BFD configured for R1 has no relationship with the
route, but the BFD function is configured for the static route of R2, see Figure 6-10.
l Configuration Flow
1. Configure the static single-hop BFD for R1.
2. Configure the static single-hop BFD for R2.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#no shutdown
R1(config-if-vlan1)#ip address 172.20.130.213 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 172.20.96.1 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#bfd
R1(config-bfd)#session test link-bfd ipv4 172.20.130.213 172.20.130.214
interface vlan1
R1(config-bfd-link-test)#!
6-28
Registered Protocols:INSTANCE
Uptime:0 day(s),0 hour(s),0 minute(s)
Control Plane Rcv Phy Interface Name: vlan1
==========================================================================
Run the show bfd neighbors ip brief command to check whether the single-hop BFD
function is configured for the static route of R2. The execution result is displayed as
follows:
R2#show bfd neighbors ip brief
6-29
Registered Protocols:STATIC
Uptime:0 day(s),0 hour(s),0 minute(s)
Control Plane Rcv Phy Interface Name: vlan2
==========================================================================
l Configuration Flow
1. Configure the static multihop BFD for R1.
2. Configure the multihop BFD for the BGP route of R3.
6-30
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan 1)#no shutdown
R1(config-if-vlan 1)#ip address 172.20.130.18 255.255.255.0
R1(config-if-vlan 1)#exit
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 172.20.96.1 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#router ospf 1
R1(config-ospf-1)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
R1(config-ospf-1)#network 172.20.96.1 0.0.0.0 area 0.0.0.0
R1(config-ospf-1)#exit
R1(config)#bfd
R1(config-bfd)#session test peer-bfd ipv4 172.20.96.1 172.20.108.2
R1(config-bfd-session-test)#end
R2(config)#router ospf 1
R2(config-ospf-1)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
R2(config-ospf-1)#network 172.20.140.0 0.0.0.255 area 0.0.0.0
R2(config-ospf-1)#network 172.20.96.2 0.0.0.0 area 0.0.0.0
R2(config-ospf-1)#exit
6-31
R3(config-if-vlan2)#no shutdown
R3(config-if-vlan2)#ip address 172.20.140.222 255.255.255.0
R3(config-if-vlan2)#exit
R3(config)#interface loopback1
R3(config-if-loopback1)#ip address 172.20.108.2 255.255.255.255
R3(config-if-loopback1)#exit
R3(config)#router ospf 1
R3(config-ospf-1)#network 172.20.140.0 0.0.0.255 area 0.0.0.0
R3(config-ospf-1)#network 172.20.108.2 0.0.0.0 area 0.0.0.0
R3(config-ospf-1)#exit
Holdown(ms):150 Interface:---
Vpnid:0 VRF Name:
BFD Type:MultiHop
Instance Name:test
----------------------------------------------------------------------------
Version:1 Dest UDP Port:3784 Final Bit:1
Local Diag:0 Demand Mode:0 Poll Bit:1
MinTxInt:50 MinRxInt:50 Multiplier:3
Received MinTxInt:50 Received MinRxInt:50 Received Multiplier:3
Length:24 Min Echo Interval:0
Min BFD Length:24 Max BFD Length:24
6-32
Registered Protocols:INSTANCE
Uptime:0 day(s),0 hour(s),0 minute(s)
Control Plane Rcv Phy Interface Name:
==========================================================================
Run the show bfd neighbors ip brief command to check whether the multihop BFD
function is configured for the BGP route of R3. The execution result is displayed as
follows:
R3(config)#show bfd neighbors ip brief
LocalAddr PeerAddr LD RD Hold State Interface
172.20.108.2 172.20.96.1 1 6 150 UP -----
Holdown(ms):150 Interface:---
Vpnid:0 VRF Name:---
BFD Type:MultiHop
Instance Name: test
----------------------------------------------------------------------------
Version:1 Dest UDP Port:4784 Final Bit:1
Local Diag:0 Demand Mode:0 Poll Bit:1
MinTxInt:50 MinRxInt:50 Multiplier:3
Received MinTxInt:50 Received MinRxInt:50 Received Multiplier:3
Length:24 Min Echo Interval:0
Min BFD Length:24 Max BFD Length:24
The ISIS-TE tunnel is established between R1 and R2, and the BFD function is
enabled for the RSVP-TE interfaces of R1 and R2, see Figure 6-12.
6-33
Figure 6-12 Configuring the BFD Function for the RSVP Interface
l Configuration Flow
1. Establish the ISIS-TE tunnel between R1 and R2.
2. Enable the BFD function for interfaces of R1 and R2 in TE mode.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 172.20.130.213 255.255.255.252
R1(config-if-vlan1)#exit
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 172.20.96.1 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#router isis
R1(config-isis-0)#area 49.0172
R1(config-isis-0)#system-id 0020.0096.0001
R1(config-isis-0)#metric-style wide
R1(config-isis-0)#mpls traffic-eng level-2
R1(config-isis-0)#interface vlan1
R1(config-isis-0-if-vlan1)#ip router isis
R1(config-isis-0-if-vlan1)#end
R1(config)#interface te_tunnel1
R1(config-if-te_tunnel1)#ip unnumbered loopback1
R1(config-if-te_tunnel1)#exit
R1(config)#mpls traffic-eng
R1(config-mpls-te)#interface loopback1
R1(config-mpls-te-if-loopback1)#exit
R1(config-mpls-te)#router-id 172.20.96.1
R1(config-mpls-te)#tunnel te_tunnel 1
R1(config-mpls-te-tunnel-te_tunnel1)#tunnel destination ipv4 172.20.108.1
R1(config-mpls-te-tunnel-te_tunnel1)#tunnel mpls traffic-eng
path-option 1 dynamic
R1(config-mpls-te-tunnel-te_tunnel1)#exit
R1(config-mpls-te)#interface vlan1
R1(config-mpls-te-if-vlan1)#bfd
6-34
R2(config)#interface vlan2
R2(config-if-vlan2)#ip address 172.20.130.214 255.255.255.252
R2(config-if-vlan2)#exit
R2(config)#interface loopback1
R2(config-if-loopback1)#ip address 172.20.108.1 255.255.255.255
R2(config-if-loopback1)#exit
R2(config)#router isis
R2(config-isis-0)#area 49.0172
R2(config-isis-0)#system-id 0020.0096.0002
R2(config-isis-0)#metric-style wide
R2(config-isis-0)#mpls traffic-eng level-2
R2(config-isis-0)#interface vlan2
R2(config-isis-0-if-vlan2)#ip router isis
R2(config-isis-0-if-vlan2)#end
R2(config)#mpls traffic-eng
R2(config-mpls-te)#interface loopback1
R2(config-mpls-te-if-loopback1)#exit
R2(config-mpls-te)#router-id 172.20.108.1
R2(config-mpls-te)#interface vlan2
R2(config-mpls-te-if-vlan2)#bfd
l Configuration Verification
Run the show bfd neighbors [ip brief | ip detail] command to check whether the BFD
function is configured for the RSVP interface of R1. The execution result is displayed
as follows:
6-35
Registered Protocols:RSVP
Uptime:0 day(s),0 hour(s),0 minute(s)
Control Plane Rcv Phy Interface Name: vlan1
==========================================================================
l Configuration Flow
1. Enable the OSPF-TE function among R1, R2, and R3.
2. Configure the hotstandby tunnel (R1-R3-R2) on R1, and then enable the BFD
function for this tunnel.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan3
R1(config-if-vlan3)#ip address 54.1.1.1 255.255.255.0
R1(config-if-vlan3)#exit
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 57.1.1.1 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#interface loopback10
6-36
R1(config)#interface te_tunnel1
R1(config-if-te_tunnel1)#ip unnumbered loopback10
R1(config-if-te_tunnel1)#exit
R1(config)#mpls traffic-eng
R1(config-mpls-te)#interface loopback10
R1(config-mpls-te-if-loopback10)#exit
R1(config-mpls-te)#router-id 10.10.10.1
R1(config-mpls-te)#interface vlan3
R1(config-mpls-te-if-vlan3)#exit
R1(config-mpls-te)#interface vlan1
R1(config-mpls-te-if-vlan1)#exit
R1(config-mpls-te)#tunnel te_tunnel1
R1(config-mpls-te-tunnel-te_tunnel1)#tunnel destination ipv4 10.10.10.2
R1(config-mpls-te-tunnel-te_tunnel1)#tunnel mpls traffic-eng path-option 1
explicit-path identifier 1
R1(config-mpls-te-tunnel-te_tunnel1)#tunnel mpls traffic-eng record-route
R1(config-mpls-te-tunnel-te_tunnel1)#tunnel mpls traffic-eng hot-standby
protect 1 dynamic
R1(config-mpls-te-tunnel-te_tunnel1)#tunnel mpls traffic-eng bfd interval 30
min-rx 30 multiplier 5
R1(config-mpls-te-tunnel-te_tunnel1)#exit
R1(config-mpls-te)#explicit-path identifier 1
R1(config-mpls-te-expl-path-id-1)#next-address strict 54.1.1.3
R1(config-mpls-te-expl-path-id-1)#next-address strict 115.1.1.2
6-37
R2(config)#mpls traffic-eng
R2(config-mpls-te)#interface loopback10
R2(config-mpls-te-if-loopback10)#exit
R2(config-mpls-te)#router-id 10.10.10.2
R2(config-mpls-te)#interface vlan1
R2(config-mpls-te-if-vlan1)#exit
R2(config-mpls-te)#interface vlan2
R2(config-mpls-te-if-vlan2)#exit
R3(config)#mpls traffic-eng
R3(config-mpls-te)#interface loopback10
R3(config-mpls-te-if-loopback10)#exit
R3(config-mpls-te)#router-id 10.10.10.3
R3(config-mpls-te)#interface vlan2
R3(config-mpls-te-if-vlan2)#exit
R3(config-mpls-te)#interface vlan3
R3(config-mpls-te-if-vlan2)#exit
6-38
l Configuration Verification
After the above configuration, the tunnel1 of R1 is in up status, and a hotstandby
tunnel is generated. The hotstandby relationship is ready, and the RSVP LSP BFD
session on R1 should be established successfully. When the link between R2 and
R3 becomes invalid, the status of the LSP BFD session becomes down and then up
again, and the traffic is switched to the hotstandby tunnel.
Run the show bfd neighbors [rsvp lsp brief | rsvp lsp detail] command to check whether
the BFD function is configured for the RSVP interface.
The tunnel1 of R1 is in up status.
R1(config)#show mpls traffic-eng tunnels brief
Signalling Summary:
LSP Tunnels Process: running
RSVP Process: running
Forwarding: enabled
TUNNEL NAME DESTINATION UP IF DOWN IF STATE/PROT
tunnel_1 10.10.10.2 - vlan3 up/up
tunnel_1(hot) 10.10.10.2 - vlan1 up/up
InLabel: -
OutLabel: vlan1, 3
RSVP Signalling Info :
Src 10.10.10.1, Dst 10.10.10.2, Tun_Id 1, Tun_Instance 10
RSVP Path Info:
Explicit Route: 57.1.1.1 57.1.1.2 10.10.10.2
Exclude Route: 10.10.10.3 115.1.1.2
Record Route: NULL
Tspec: ave rate= 0 kbits, burst= 1000 bytes, peak rate= 0 kbits
RSVP Resv Info:
6-39
Run the show bfd neighbors rsvp lsp brief command to check whether the BFD function
is configured for the RSVP interface of R1. The execution result is displayed as
follows:
R1#show bfd neighbors rsvp lsp brief
TunnelId LspId LD RD Hold State
te_tunnel1 16 33053 2662 150 UP
/*When the link between R3 and R2 becomes invalid, the hotstandby relationship of the tunnel is i
R1#show mpls traffic-eng fast-reroute
Tunnel head end item information
Protected Tunnel LspID In-label Out intf/label FRR intf/label Status
Tunnel1 9 Tun hd vlan2:14745 Tu1:3 active
6
LSP midpoint frr information:
LSP identifier In-label Out intf/label FRR intf/label Status
R1#show mpls traffic-eng tunnels hot-standby
Name: tunnel_1 (Tunnel1) Destination: 10.10.10.2
Status:
Admin: up Oper: up Path: valid Signalling: connected
Fast Reroute Protection: None
Hot-standby Protection: Backup lsp in use
6-40
l Configuration Flow
1. Configure the track object for R1 and R2 in SAMGR mode.
2. Relate this object on R1 and R2 in VRRP configuration mode.
l Configuration Commands
Run the following commands on R1:
R1(config)#samgr
R1(config-samgr)#track 1 bfd session bfd
R1(config-samgr)#exit
R1(config)#vrrp
R1(config-vrrp)#interface vlan1
R1(config-vrrp-if-vlan1)#vrrp 1 track object 1 link-type
R1(config-vrrp-if-vlan1)#exit
R1(config-vrrp)#exit
6-41
vlan1 - vrID 1
Vrrp configure info:
IP version 4, VRRP version 3
Virtual IP address is 0.0.0.0
Virtual MAC address is 0000.5e00.0101
Advertise time is 1.000 (s)
Configured priority is 100
Preemption enable, delay 0 (s)
Reload delay 0 (s)
No authentication data
Check ttl enable
Vrrp accept mode enable
Out-interface send-mode is all
Tracked interface items: 0
Interface State Policy Reduce-Priority
Tracked detect items: 1
Track name: 1 Track type: object Detect type: bfd
Policy type: link
Track state: unknown
Admin-group is None
Vrrp run info:
State is Init
0 state changes, last state change 00:00:00
Current priority is 100
Master router is unknown
Master router address is 0.0.0.0
Master router priority is 0
Master Advertisement interval is 0.000 (s)
Master Down interval is 3.609 (s), no learn
Run the show vrrp interface command to check whether the link BFD is configured on
R2. The execution result is displayed as follows:
R2 (config)#show vrrp interface vlan2
vlan2 - vrID 1
Vrrp configure info:
IP version 4, VRRP version 3
Virtual IP address is 0.0.0.0
Virtual MAC address is 0000.5e00.0101
Advertise time is 1.000 (s)
Configured priority is 100
Preemption enable, delay 0 (s)
Reload delay 0 (s)
No authentication data
6-42
l Configuration Flow
1. Configure the VPWS instance for R1 and R2.
2. Enable the BFD function for R1 and R2 in VPWS configuration mode.
l Configuration Commands
Run the following commands on R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 201.2.3.2 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 100.1.1.2 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#router ospf 1
6-43
R1(config)#pw pw1
R1(config)#vpws vpws-bfd
R1(config-vpws-vpws-bfd)#access-point vlan2
R1(config-vpws-vpws-bfd-ac-vlan2)#access-params ethernet
R1(config-vpws-vpws-bfd-ac-vlan2-eth)#exit
R1(config-vpws-vpws-bfd-ac-vlan2)#exit
R1(config-vpws-vpws-bfd)#pseudo-wire pw1
R1(config-vpws-vpws-bfd-pw-pw1)#neighbour 100.1.1.3 vcid 1
R1(config-vpws-vpws-bfd-pw-pw1-neighbour-100.1.1.3)#vccv bfd capability
basicencapsulation ip
R1(config-vpws-vpws-bfd-pw-pw1-neighbour-100.1.1.3)#exit
R1(config-vpws-vpws-bfd-pw-pw1)#exit
R1(config-vpws-vpws-bfd)#exit
R1(config)#bfd
R1(config-bfd)#session pw-bfd pw-bfd pw-name pw1
R1(config-bfd-pw-pw-bfd)#exit
R1(config-bfd)#exit
R2(config)#router ospf 1
R2(config-ospf-1)#network 201.2.3.0 0.0.0.255 area 0
R2(config-ospf-1)#network 100.1.1.3 0.0.0.0 area 0
R2(config-ospf-1)#exit
6-44
R2(config-ldp-1)#exit
R2(config)#pw pw1
R2(config)#vpws vpws-bfd
R2(config-vpws-vpws-bfd)#access-point vlan4
R2(config-vpws-vpws-bfd-ac-vlan4)#access-params ethernet
R2(config-vpws-vpws-bfd-ac-vlan4-eth)#exit
R2(config-vpws-vpws-bfd-ac-vlan4)#exit
R2(config-vpws-vpws-bfd)#pseudo-wire pw1
R2(config-vpws-vpws-bfd-pw-pw1)#neighbour 100.1.1.2 vcid 1
R2(config-vpws-vpws-bfd-pw-pw1-neighbour-100.1.1.2)#vccv bfd capability basic
encapsulation ip
R2(config-vpws-vpws-bfd-pw-pw1-neighbour-100.1.1.2)#exit
R2(config-vpws-vpws-bfd-pw-pw1)#exit
R2(config-vpws-vpws-bfd)#exit
R2(config)#bfd
R2(config-bfd)#session pw-bfd pw-bfd pw-name pw1
R2(config-bfd-pw-pw-bfd)#exit
R2(config-bfd)#exit
l Configuration Verification
Run the show l2vpn forwardinfo vpnname command to check whether the VPWS
instance is configured and the show bfd neighbors pw brief command to check whether
the VPWS BFD function is configured on R1. The execution result is displayed as
follows:
R1(config)#show l2vpn forwardinfo vpnname vpws-bfd
Headers: PWType - Pseudowire type and Pseudowire connection mode
Llabel - Local label, Rlabel - Remote label
VPNowner - owner type and instance name
Codes : H - HUB mode, S - SPOKE mode, L - VPLS, W - VPWS, M - MSPW
$pw - auto_pw
PWName PeerIP FEC PWType State Llabel Rlabel VPNowner
pw1 100.1.1.3 128 Ethernet UP 81922 81921 W:vpws-bfd
Run the show l2vpn forwardinfo vpnname command to check whether the VPWS
instance is configured and the show bfd neighbors pw brief command to check whether
the VPWS BFD function is configured on R2. The execution result is displayed as
follows:
R2(config)#show l2vpn forwardinfo vpnname vpws-bfd
Headers: PWType - Pseudowire type and Pseudowire connection mode
Llabel - Local label, Rlabel - Remote label
6-45
6-46
7-1
4. The time that is used to notice other nodes in network that the local switch link is invalid.
Usually it is tens of milliseconds to a hundred seconds normally on each node.
5. The time that is used to recalculate the triggering route. For Interior Gateway Protocol
(IGP) protocols that use Dijkstra algorithm, the time is tens of milliseconds.
6. The time that is used to interact with line interface cards to calculate the new routing
information and form the new forwarding table. The time varies in accordance with the
number of routing entries. Usually it is several hundred milliseconds.
7. The time that is used to load the new forwarding route entries into hardware. Usually
it is tens of milliseconds.
The traffic loss may occur in the above mentioned steps. The traffic loss can be divided
into two stages, including:
1. Stage 1: The switch fails to discover the invalid link immediately, and it still forwards
the traffic to the invalid link.
2. Stage 2: The route discovers the invalid link, but the network is in convergence
process. The local forwarding table is different with that of other switches, which
causes micro-loop in forwarding plane.
To shorten the traffic interruption duration, a mechanism must be provided to implement
the following functions:
1. Discover the invalid link quickly.
2. When the link is invalid, provide a recovery path quickly.
3. Prevent forwarding micro-loop during the further recovery process.
IP FRR Principle
The working procedure of IP FRR is as follows:
1. Detect faults quickly: The common technologies include BFD, and physical signal test.
2. Modify the forwarding plane: Hand over the traffic to the recalculated backup path.
3. Perform route re-convergence.
4. After finishing the re-convergence, hand over the route to the optimal path.
Obviously, the backup path is to fill the FRR gap up, which hands over the traffic to the
backup next hop, to guarantee that the service will not be interrupted.
There are some conditions to form the OSPF FRR or IS-IS FRR relationship. To form
the FRR relationship of default LFAs test mode, the algorithm should meet the condition
Distance_opt (Ni, D) < Distance_opt (Ni, S) + Distance (S, D). That is, the distance from
the next hop on the backup link to the destination should be shorter than the sum of the
distance from the next hop on the backup link to the source node and the distance from
the source node on the primary link to the destination node.
To form the FRR relationship of down-stream-path mode, the algorithm should meet the
condition Distance_opt (Ni, D) < Distance (S, D). That is, the distance from the next hop
on the backup link to the destination should be shorter than that from the source node on
the primary link to the destination node.
7-2
The establishment of BGP FRR relationship is relatively simpler. It only needs two different
next hops to the same destination.
7-3
Command Function
ZXR10#show ip ospf border-lsfas [ process < process-id>] Displays the routes on the backup
switch for the OSPF primary
switch.
ZXR10#show ip forwarding backup route {<network>} Displays the backup routing table.
The following is sample output from the show isis fast-reroute-topology command:
ZXR10(config)#show isis fast-reroute-topology level-1
IS-IS ipfrr paths to Level-1 routers
System id Interface Ipfrr interface Ipfrr type metric
AAAA.AAAA.AAAA vlan1 valn2 Link/ECMP 10
AAAA.AAAA.AAAA vlan3 vlan4 Link/ECMP 10
AAAA.AAAA.AAAA vlan5 vlan6 Link/ECMP 10
For a description of the parameters in the execution result, refer to the following table:
The following is sample output from the show ip ospf border-lsfas command:
ZXR10#show ip ospf border-lfas
Protect Type: link-protect 0x80000001, ecmp-protect 0x80000004
node-protect 0x80000002, stat-protect 0x80000008
7-4
For a description of the parameters in the execution result, refer to the following table:
Area Area.
The following is sample output from the show ip forwarding backup route command:
ZXR10#show ip forwarding backup route
IPv4 Routing Table:
Headers: Dest: Destination, Gw: Gateway, Pri: Priority, M/S: Master/Slave,
Sta: Status;
Codes : BROADC: Broadcast, USER-I: User-ipaddr, USER-S: user-special,
MULTIC: Multicast, USER-N: User-network, DHCP-D: DHCP-DFT,
ASBR-V: ASBR-VPN, STAT-V: Static-VRF, DHCP-S: DHCP-static,
GW-FWD: PS-BUSI, NAT64: Stateless-NAT64, LDP-A: LDP-area,
GW-UE: PS-USER, P-VRF: Per-VRF-label, TE: RSVP-TE;
Status codes: *valid, >best, M: Master, S: Slave, I: Inuse, U: Unuse;
Dest Gw Interface Owner Pri Metric M/S Sta
*> 17.17.17.17/32 25.1.1.1 vlan25 ISIS_LEVEL1 115 20 M I
* 17.17.17.17/32 24.1.1.1 vlan24 ISIS_LEVEL1 115 40 S U
*> 20.20.20.20/32 14.1.1.1 vlan14 ISIS_LEVEL1 110 2 M I
* 20.20.20.20/32 24.1.1.1 vlan24 ISIS_LEVEL1 110 6 S U
For a description of the parameters in the execution result, refer to the following table:
7-5
2. The typical network structure of link protection is shown in Figure 7-2. IS-IS neighbor
topology is established on the two links. One of the link has high priority and the other
link has lower priority.
7-6
Configuration Thought
1. Configure routing protocols.
2. On the nodes forming FRR relationship, there are more than two next hops reachable
to the same route.
3. Enable FRR function in related routing protocol on corresponding devices.
Configuration Commands
The detailed configuration is described below.
1. Configuration of FRR node protection
Take BGP in Figure 7-1 as an example. First, establish EBGP neighbor relationship
between the routers through real interfaces. Enable FRR function on R1. Set the
routes advertised by R3 that go through the path R1R2R3 as the optimal routes.
Configuration of R1:
R1(config)#router bgp 1
R1(config-bgp)#neighbor 172.16.1.2 remote-as 2
R1(config-bgp)#neighbor 172.16.20.2 remote-as 3
R1(config-bgp)#bgp frr
R1(config-bgp)#exit
R1(config)#route-map lt
R1(config-route-map)#set local-preference 200
R1(config-router)#exit
R1(config)#router bgp 1
R1(config-bgp)#neighbor 172.16.1.2 route-map lt in
R1(config-bgp)#exit
Configuration of R2:
R2(config)#router bgp 2
R2(config-bgp)#neighbor 172.16.1.1 remote-as 1
R2(config-bgp)#neighbor 183.16.20.2 remote-as 3
R2(config-bgp)#exit
Configuration of R3:
R3(config)#router bgp 3
R3(config-bgp)#neighbor 172.16.20.1 remote-as 1
R3(config-bgp)#neighbor 183.16.20.1 remote-as 2
R3(config-bgp)#exit
2. Configuration of FRR link protection
Take IS-IS protocol in Figure 7-2 as an example.
Configuration of R1:
R1(config)#router isis
R1(config-isis)#area 01
R1(config-isis-1)#system-id 00D0.D0C7.5460
7-7
R1(config-isis-1)#fast-reroute enable
R1(config-isis-1)#interface vlan24
R1(config-isis-1-if-vlan24)#ip router isis
R1(config-isis-1-if-vlan24)#exit
R1(config-isis-1)#interface vlan47
R1(config-isis-1-if-vlan47)#ip router isis
R1(config-isis-1-if-vlan47)#metric 20
R1(config-isis-1-if-vlan47)#exit
Configuration of R2:
R2(config)#router isis
R2(config-isis)#area 01
R2(config-isis-1)#system-id 00D0.D0C7.6788
R2(config-isis-1)#interface vlan24
R2(config-isis-1-if-vlan24)#ip router isis
R2(config-isis-1-if-vlan24)#exit
R2(config-isis-1)#interface vlan47
R2(config-isis-1-if-vlan47)#ip router isis
R2(config-isis-1-if-vlan47)#end
Configuration Verification
Use the show ip forwarding backup route command to check whether the FRR
configuration takes effect.
7-8
7-9
Parameter descriptions:
Parameter Description
7-10
Parameter Description
7-11
Configuration Thought
1. Configure IGP routes on UPE1, NPE2, NPE3 and NPE4 to make them ping through
each other. The router-ids are listed below.
Device Route-id
UPE1 1.1.1.1
NPE2 2.2.2.2
NPE3 3.3.3.3
NPE4 4.4.4.4
2. Establish Label Distribution Protocol (LDP) neighbor relationship between the four
devices (UPE1, NPE2, NPE3 and NPE4).
3. Create a VPLS instance named zte among NPE2, NPE3 and NPE4. The VCID is 100,
Meanwhile, CE2 connects to NPE4 as an Access Circuit (AC).
4. Associate the VPLS FRR function. Enter VPLS instance configuration mode on
UPE1 to configure the information related to the VPLS instance test, and configure
the addresses of the active PW and the standby PW. The link between UPE1 and
NPE2 is the active PW. The link between UPE1 and NPE3 is the standby PW. CE1
connects to UPE1 as an AC.
Configuration Commands
The VPLS FRR configuration on UPE1:
UPE1(config)#mpls l2vpn enable
UPE1(config)#sdu sdu1
UPE1(config)#pw-redundancy-manager pw_redundancy1
UPE1(config)#vpls test
UPE1(config-vpls)#mac-withdraw
UPE1(config-vpls)#spoke-sdu sdu1
7-12
Configuration Verification
Check the result of the configuration on UPE1. The PW information is shown below.
UPE1(config-vpls)#show running-config l2vpn
!
<L2VPN>
mpls l2vpn enable
vpls test
mac-withdraw
spoke-sdu sdu1
redundancy-manager pw_redundancy1
$
neighbour 2.2.2.2 100
$
neighbour 3.3.3.3 100 backup
$
$
!
! </L2VPN>
UPE1(config-vpls)#show l2vpn forwardinfo vpnname test
Headers: PWType - Pseudowire type and Pseudowire connection mode
Llabel - Local label, Rlabel - Remote label
VPNowner - owner type and instance name
Codes: H - HUB mode, S - SPOKE mode, L - VPLS, W - VPWS, M - MSPW
PeerIP VCID PWType State Llabel Rlabel VPNowner
7-13
VPN FRR is one the most widely used technologies used to solve fast changeover faults
. Its basic thought is to establish an end-to-end channel between PE devices and provide
a backup channel established in advance for the protected primary channel. When the
devices detect that the primary channel is not available due to a node fault or a link fault,
traffic is changed over to the backup channel. This realizes the fast changeover of services,
which ensures that VPN traffic will not lose.
7-14
In an IP/MPLS VPN multi service bearer network, when it is necessary to implement fast
public routes and LSP convergence after faults occur on the links between PE devices and
P devices, on the links between P devices or on P devices, it is recommended to deploy
VPN FRR.
The working procedure of VPN FRR is similar with that of IP FRR, as described below.
1. Detect faults quickly. The common technologies include BFD, physical signal test and
so on.
2. Modify the forwarding plane. Hand over the traffic to the recalculated backup path.
3. Perform route re-convergence.
4. After finishing the re-convergence, hand over the route to the optimal path.
2. Configure BGP
LDP FRR is on the base of IGP FRR. After LDP is enabled on the base of IGP FRR,
LDP FRR is configured.
7-15
Command Function
Output descriptions:
BGP neighbor is 129.213.1.2, The IP address is the peer address of the TCP connection
remote AS 65001, external link between BGP neighbors. The peer is in AS 65001. It is an EBGP
connection.
BGP version 4, remote router ID It means that BGP-4 is used. The peer BGP router ID is
129.213.1.2 129.213.1.2.
BGP state = Established, up for It means that the neighbor state is Established. The session has
00:04:21 been established for 4 minutes and 21 seconds.
hold time is 90 seconds, It means that the holding time is 90 seconds, and the Keepalive
keepalive interval is 30 seconds interval is 30 seconds.
7-16
Output descriptions:
via interface fei_1/1 The type, number and IP address of the neighbor interface
In Full State The time that the device has been in full state
7-17
Configuration Thought
1. Configure IGP routes between PE1 and PE2 to make that PE1 and PE2 can ping
through each other.
2. Configure MP-BGP neighbor relationship.
7-18
Configuration Commands
Suppose that CE1 connects to the network through OSPF; CE2 connects to the network
through IS-IS; the intermediate routing protocol is IGP. The configuration is shown below.
Configuration of CE1:
CE1(config)#interface vlan1
CE1(config-if)#ip address 40.0.0.2 255.255.255.0
CE1(config-if)#exit
CE1(config)#interface loopback1
CE1(config-if)#ip address 12.1.2.1 255.255.255.255
CE1(config-if)#exit
CE1(config)#router ospf 1
CE1(config-ospfv2)#network 40.0.0.0 0.0.0.255 area 16
CE1(config-ospfv2)#network 12.1.2.1 0.0.0.0 area 16
Configuration of CE2:
CE2(config)#interface vlan1
CE2(config-if)#ip address 60.0.0.2 255.255.255.0
CE2(config-if)#exit
CE2(config)#interface loopback1
CE2(config-if)#ip address 12.1.2.5 255.255.255.255
CE2(config-if)#exit
CE2(config)#router isis
CE2(config-isis)#area 10
CE2(config-isis)#system-id 0000.0000.0001
CE2(config-isis)#interface loopback1
CE2(config-isis-if)#ip router isis
CE2(config-isis)#exit
CE2(config-isis)#interface vlan1
CE2(config-isis-if)#ip router isis
CE2(config-isis)#exit
Configuration of PE1:
PE1(config)#ip vrf zte1
PE1(config-vrf)#rd 100:1
PE1(config-vrf)#route-target import 100:1
PE1(config-vrf)#route-target export 100:1
PE1(config-vrf)#address-family ipv4
PE1(config-vrf-af)#exit-address-family
PE1(config-vrf)#exit
PE1(config)#interface loopback1
7-19
7-20
Configuration of PE2:
PE2(config)#ip vrf zte1
PE2(config-vrf)#rd 100:1
PE2(config-vrf)#route-target import 100:1
PE2(config-vrf)#route-target export 100:1
PE2(config-vrf)#address-family ipv4
PE2(config-vrf-af)#exit-address-family
PE2(config-vrf)#exit
PE2(config)#interface loopback1
PE2(config-if)#ip address 1.1.1.3 255.255.255.255
PE2(config-if)#exit
PE2(config)#interface vlan1
PE2(config-if)#ip vrf forwarding zte1
PE2(config-if)#ip address 60.0.0.1 255.255.255.0
PE2(config-if)#exit
PE2(config)#interface vlan2
PE2(config-if)#ip address 15.0.0.2 255.255.255.0
PE2(config-if)#exit
PE2(config)#interface vlan3
PE2(config-if)#ip address 14.0.0.2 255.255.255.0
PE2(config-if)#exit
PE2(config)#mpls ldp instance1
PE2(config-ldp)#interface vlan2
PE2(config-ldp-if)#exit
PE2(config-ldp)#interface vlan3
PE2(config-ldp-if)#exit
PE2(config-ldp)#exit
PE2(config)#router bgp 100
PE2(config-bgp)#neighbor 1.1.1.2 remote-as 100
PE2(config-bgp)#neighbor 1.1.1.2 update-source loopback1
PE2(config-bgp)#address-family ipv4 vrf zte1
PE2(config-bgp-af)#redistribute isis-1-2 0
PE2(config-bgp)#address-family vpnv4
PE2(config-bgp-af)#neighbor 1.1.1.2 activate
PE2(config-bgp-af)#exit-address-family
PE2(config)#router isis vrf zte1
PE2(config-isis)#area 10
PE2(config-isis)#system-id 0000.0000.0002
PE2(config-isis)#interface vlan1
PE2(config-isis-if)#ip router isis
PE2(config-isis-if)#exit
PE2(config-isis)#exit
PE2(config)#router isis 1
PE2(config-isis)#area 10
7-21
PE2(config-isis)#system-id 0000.dd00.0002
PE2(config-isis)#interface vlan2
PE2(config-isis-if)#ip router isis
PE2(config-isis-if)#exit
PE2(config-isis)#interface vlan3
PE2(config-isis-if)#ip router isis
PE2(config-isis-if)#exit
PE2(config-isis)#interface loopback1
PE2(config-isis-if)#ip router isis
PE2(config-isis-if)#exit
Configuration of P1:
P1(config)#interface loopback1
P1(config-if)#ip address 1.1.1.4 255.255.255.255
P1(config-if)#exit
P1(config)#interface vlan2
P1(config-if)#ip address 10.0.0.1 255.255.255.0
P1(config-if)#exit
P1(config)#interface vlan3
P1(config-if)#ip address 14.0.0.1 255.255.255.0
P1(config-if)#exit
P1(config)#router isis
P1(config-isis)#area 10
P1(config-isis)#system-id 0000.dd00.1000
P1(config-isis)#interface vlan2
P1(config-isis-if)#ip router isis
P1(config-isis-if)#exit
P1(config-isis)#interface vlan3
P1(config-isis-if)#ip router isis
P1(config-isis-if)#exit
P1(config-isis)#interface loopback1
P1(config-isis-if)#ip router isis
P1(config-isis-if)#exit
P1(config-isis)#exit
P1(config)#mpls ldp instance1
P1(config-ldp)#interface vlan2
P1(config-ldp-if)#exit
P1(config-ldp)#interface vlan3
P1(config-ldp-if)#exit
Configuration of P2:
P2(config)#interface loopback1
P2(config-if)#ip address 1.1.1.5 255.255.255.255
P2(config-if)#exit
P2(config)#interface vlan3
7-22
Configuration Verification
Use the show ip forwarding backup route command to check whether the configuration
makes FRR function take effect.
The result of IS-IS FRR on PE1 is shown below.
View the information of the IBGP connection between PE1 and PE2, as shown below.
7-23
PE1#
View the LDP neighbor relationship in the public network, as shown below.
PE1#show mpls ldp neighbor
Peer LDP Ident: 1.1.1.4:0; Local LDP Ident 1.1.1.2:0
TCP connection: 10.0.0.2.1025 - 10.0.0.1.646
state: Oper; Msgs sent/rcvd: 177/180; Downstream
Up Time: 02:53:09
LDP discovery sources:
vlan2; Src IP addr: 10.0.0.1
Addresses bound to peer LDP Ident:
10.0.0.2 11.0.0.2
Peer LDP Ident: 1.1.1.5:0; Local LDP Ident 1.1.1.2:0
TCP connection: 11.0.0.2.1025 - 11.0.0.1.646
state: Oper; Msgs sent/rcvd: 177/180; Downstream
Up Time: 02:53:09
LDP discovery sources:
vlan3; Src IP addr: 11.0.0.1
Addresses bound to peer LDP Ident:
10.0.0.2 11.0.0.2
To ensure the reliability of MPLS network, MPLS FR plays an important role. MPLS FRR
provides fast handover protection ability for LSPs with the help of MPLS TE. MPLS FRR
establishes a local standby path in advance to prevent the LSP from being affected by
failures of links or nodes. When a fault occurs, the device that detects the fault will hand
over the service quickly to the standby path from the faulty link. This reduces data loss.
Fast response and timely handover are the characteristics of MPLS FRR. They can ensure
the smooth transition of service data without interruption. Meanwhile, the head node of
LSP tries to find a new path to reestablish the LSP and hand over the data back to the new
7-24
path. Before the new LSP is established, service data is forwarded through the protecting
path.
TE FRR Principle
l Basic Principle
MPLS TE FRR is a set of link and node protection handover mechanism in MPLS TE.
when an LSP link or a node has a fault, the faulty node is protected. In this way, traffic
can go through the tunnel through the protecting link or node without interruption.
Meanwhile, the head node can initiate the reestablishment of the active path without
affecting data transmission.
The basic principle of MPLS FRR is to protect one or more LSPs with another LSP
that is established in advance. The LSP established in advance is called the FRR
LSP, and the protected LSP is called the active LSP. The final goal of MPLS TE FRR
is to protect the active path by using the FRR tunnel to evade the faulty link or node.
MPLS TE FRR is realized on the base of Resource ReSerVation Protocol (RSVP) TE.
It complies with the Request For Comments (RFC) 4090.
There are two modes to realize MPLS TE FRR.
Detour mode: It is one-to-one backup. In this mode, the device provides
protection for each protected LSP and establishes a protecting path for each
protected LSP. The protecting path is called Detour LSP.
7-25
On the path RTB - RTF - RTD, the LSP uses two layers of labels. When RTD receives
a packet, it pops out the label that is distributed for RTF by RTD, and then it uses the
label that is distributed for RTF by RTD to forward the packet.
Some main concepts are described as follows.
Active LSP: It is relative to the Detour LSP or the Bypass LSP. It is the protected
LSP.
Point of Local Repair (PLR): It is the head node of the Detour LSP or the Bypass
LSP. It must be on the active LSP, and it should not be the tail node.
Merge Point (MP): It is the tail node of the Detour LSP or the Bypass LSP. It must
be on the active LSP, and it should not be the head node.
Link protection: The PLR and the MP are connected through a direct connection.
The active LSP passes through this link. When this link is invalid, the data can
be handed over to the Detour LSP or the Bypass LSP.
Node protection: The PLR and the MP are connected through a router. The active
LSP passes this router. When this router is invalid, the data can be handed over
to the Detour LSP or the Bypass LSP.
l Key Technology
FRR in Bypass mode is shown in Figure 7-8.
7-26
FRR in Bypass mode described here is realized according to RFC 4090 (called
protocol hereinafter) by extending the SESSION_ATTRIBUTE object and the
RECORD_ROUTE object.
l Establishment of the Active LSP
The establishment of an active LSP is the same with that of a common LSP. RSVP
sends the PATH message from the head node (RT1) to the downstream hop by hop
(passing by RT1 - RT2 - RT3 - RT4 - RT5). And then RSVP sends the RESV message
from the tail node (RT5) to the upstream hop by hop. When the devices handle the
RESV message, they distribute labels and reserve resources to establish the LSP.
The protocol draft extends some flag bits in SESSION_ATTRIBUT object and object
RECORD_ROUTE for FRR. The differences between the establishment of a protected
LSP and a common LSP lie in the handling of these flag bits.
In the SESSION_ATTRIBUT object of a PATH message, the flag bits added include
whether the LSP needs local protection, whether to record labels, whether to use
Share-Explicit (SE) style, and whether to protect bandwidth.
In the RECORD_ROUTE object of an RESV message, the flag bits added include
whether the LSP has been protected, whether the data has been handed over,
whether it is the bandwidth that has been protected, and whether it is protected by
a node.
The establishment of an active LSP is triggered by configuring a tunnel on the head
node (RT1) manually. Before the establishment, if the FRR attribute of the LSP has
been specified through commands, RSVP will add the flag bits (whether the LSP
needs local protection, whether to record labels and whether to use SE style) to the
SESSION_ATTRIBUTE object of the PATH message. If bandwidth has been specified
for the LSP, the flag bit for bandwidth protection will also be added to the object.
When the downstream nodes receive this PATH message, they know that it is an LSP
needing FRR by identifying the local protection flag.
7-27
For an LSP needing FRR (identified according to the flags in the previous PATH
message), when the nodes send RESV messages to the upstream, they will record
the egress, LSR ID and label of an RESV message in RECORD_ROUTE object. The
information is cumulatively transmitted to the upstream nodes.
When the node receive the RESV message for the first time, they select a suitable
Bypass LSP for the LSP according to the information in the RECORD_ROUTE object.
The procedure to select a suitable Bypass LSP for the active LSP is called binding.
The algorithm of the binding is introduced in details later.
After the binding FRR calculation for the active LSP, the RECORD_ROUTE object in
the RESV message sent to the upstream will point out whether the LSP has been
protected. If it is protected, the protected egress address (eth1 on RT2) and the
egress address (eth3 on RT2) of the RESV message will be recorded. If it is not
protected, the corresponding flags in the RECORD_ROUTE object will be cleared,
and only the egress address (eth3 on RT2) of the RESV message will be recorded.
Binding calculation is not supported on egresses. The flags in the RECORD_ROUTE
object of an RESV message sent to the upstream on the egresses are cleared.
The establishment of an active LSP with FRR protection is basically consistent with
that of a common LSP. The binding calculation is added to the establishment of an
active LSP, and some flags and sub-objects are added to the PATH message and
RESV message.
l Bypass LSP Establishment
There are two modes to establish a Bypass LSP, manual mode and automatic mode.
In manual Bypass LSP establishment, when a tunnel without FRR attribute is
specified to protect a physical interface, the LSP it corresponds to becomes the
Bypass LSP. The manual establishment of a Bypass LSP (tunnel12 on RT2) is
triggered by configuration on the PLR (RT2). The configuration has no difference
from that of a common LSP basically, except that FRR attribute cannot be configured
for a Bypass LSP. That is, a Bypass LSP cannot be an active LSP at the same time,
and LSPs cannot be nested-protected.
Automatic Bypass LSP is a simplification of the manual mode. When the active LSP
needs FRR protection, the PLR can select a Bypass LSP or establish a Bypass
LSP automatically to protect the active LSP. This mode is called automatic Bypass.
An automatic Bypass can protect multiple active LSPs as long as it meets the
requirements of the active LSPs.
A Bypass LSP can protect multiple physical interfaces, but it cannot protect the egress
of its own.
FRR can protect a link or a node. When Bypass LSP protection is needed, it is
necessary to plan the link or node to be protected and specify the protection mode (link
protection or node protection). Generally, node protection can protect the protected
node and the link between this node and the PLR. It seems that node protection is
better.
7-28
Generally, the bandwidth of a Bypass LSP is used to protect the active LSP. All
resources on the tunnel are only used after handover. During configuration, it is
necessary to make sure that the bandwidth configured is not less than the sum of
all LSPs to be protected. Otherwise, when FRR is valid, Bypass cannot provide the
protection that meets the requirements of user services completely.
Generally, Bypass LSP is in idle state, and it does not carry over data services. If the
Bypass LSP is intended to protect the active LSP and forward data at the same time,
it is required to configure enough bandwidth.
l Binding Calculation
Binding can mean to specify a Bypass LSP to protect a physical interface. This is
called the binding between a Bypass LSP and a physical interface. A Bypass LSP
can be bound to multiple physical interfaces. A physical interface can also be bound
to multiple Bypass LSPs.
Binding can also mean to select a suitable Bypass LSP to protect an active LSP.
This is called the binding between an active LSP and a Bypass LSP. The binding
calculation is the procedure to bind an active LSP to a Bypass LSP. If the binding
calculation succeeds, the RESV message will inform the upstream nodes that the
active LSP has been protected.
The label distributed by the MP for the previous hop (This label corresponds to
the label of the MP LSR ID in RECORD_ROUTE object of the active LSP.)
Bypass LSP interface and the NHLFE information of the Bypass LSP
The binding calculation result is saved. When local invalidation occurs, the result can
be used immediately. This is the reason why MPLS TE FRR can make fast responses
to invalidations.
l Invalidation Detection
Invalidation detection aims at discovering the invalidation of the link (between RT2
and RT3) or the node (RT3) as soon as possible, thus to trigger handover to reduce
packet loss.
Invalidation detection does not judge whether it is an invalidation of a link or a node.
It is considered as an interface invalidation (eth1 of RT2) at last.
Interface invalidation triggers all LSPs that use this interface as egress to execute
FRR handover as soon as possible. If an LSP has been protected by a link according
to the binding calculation result, the data will be handed over to the protecting link.
When it is a node invalidation in fact, the protection will not succeed, and this LSP
will be deleted. If the LSP has been protected by a node according to the binding
calculation result, the data will be handed over to the protecting node. When it is a
7-29
link invalidation in fact, the Bypass LSP will be overleaped even if the next hop node
is available.
A part of link invalidations and node invalidations can be detected by link layer
protocols. The speed of the link layer protocols to discover an invalidation is related
to the interface type. Other invalidations are discovered through the Hello mechanism
of RESV. The speed of the Hello mechanism to discover an invalidation is relatively
slower.
It is possible to enable Hello mechanism on each physical interface that needs
protection. When Hello mechanism is also enabled on the peer interface, Hello
messages and responses will be sent periodically between two routers. When a link
or a node is invalid, the Hello message or response will be lost. If the message or
response is lost for continual three times, it is considered that an invalidation occurs.
l Handover Procedure
Handover means to enable the Bypass LSP. The data and RSVP messages on the
active LSP will not be forwarded along the previous path.
Handover can be triggered when the interface (eth1 of RT2) is closed by a command
or when invalidation detection discovers an interface (eth1 of RT2) invalidation. The
data and signaling of the protected LSP on the invalid interface will be handed over
to the Bypass LSP. The upstream nodes are informed that the handover occurs.
l LSP Maintenance After Handover
After the handover, the previous LSP is unavailable. To prevent the LSP from being
deleted when it expires, RSVP needs to keep message flush between PLR (RT2) and
MP (RT4).
The PATH message is sent to the MP through the Bypass LSP (Tunnel12 on RT2)
after modification. When the MP receives the PATH message, it confirms that itself
is the MP node. The RESV message is sent to the PLR node through multi-hop IP
forwarding (passing by RT4 - RT7 - RT2) after the modification.
After the handover, the PATH message sent to the MP by the PLR is changed
according to the following points:
1. The egress interface (eth2 on RT2) address of the PLR on the Bypass LSP is
filled in the PHOP field.
2. The ingress LSR ID in SENDERTEMPLATE is changed to the egress interface
(eth2 on RT2) address of the PLR on the Bypass LSP.
3. The PLR address recorded in RECORD_ROUTE object is changed to the egress
interface (eth2 on RT2) address of the PLR on the Bypass LSP.
4. All nodes previous to the MP are deleted in an Explicit Route Object (ERO). The
address first belonging to the MP is changed to the MP LSR ID.
The MP receives the PATH message through the Bypass LSP. As the SESSION is not
changed, but the ingress LSR ID (it is RT1 LSR ID previously) in SENDERTEMPLATE
is changed to the egress interface (eth2 on RT2) address of the PLR on the Bypass
7-30
LSP, MP will know that this is a PATH message after the FRR handover and the local
node is the MP.
The PATH message sent to downstream by the MP does not change with the
handover.
The RESV message sent to upstream by the MP is changed according to the following
points:
1. The Filter Spec source address in the message is changed to the PHOP address
(address of eth2 on RT2) in the PATH message.
2. The NHOP in the message is changed to the ingress interface (eth2 on RT4)
address of the MP on the Bypass LSP.
3. The RECORD_ROUTE object in the RESV message records the ingress interface
(eth2 on RT4) address of the MP on Bypass LSP.
4. The destination in the IP header of the message is the egress interface (eth2 on
RT2) address of the PLR on the Bypass LSP.
5. The Time To Live (TTL) value in the RESV message is set to 255. The TTL value
in the header of the protocol message is set to 1.
After the handover, the RESV message sent to upstream by the PLR also has some
changes. The egress interface (eth2 on RT2) address of the PLR on the Bypass LSP
is added to the RECORD_ROUTE object.
After the handover, the forwarding paths of PTEAR message, RERR message,
RTEAR message and PERR message of the active LSP also change.
After the handover of node protection, the protected node (RT3) may send the PTEAR
message to downstream due to the expiration of the PATH message. The MP (RT4)
will ignore this message. In addition, the MP will send the RTEAR message on the
previous LSP ingress interface (eth3 on RT4) during the handover. This is to make
the protected node (RT3) release corresponding resource as soon as possible.
l MBB
For FRR, a function of Make Before Break (MBB) is to make the LSP (tunnel1 on RT1)
protected by the Bypass LSP recover to normal state. When handover occurs on the
active LSP, the head node starts the MBB procedure to calculate a new available path.
When the new path is established, a new suitable standby LSP will be selected to form
the new binding relationship.
l Forwarding
Before the handover, the data forwarding on the active LSP is the same with that on a
common LSP. After the handover, the data is forwarded to the MP through the Bypass
LSP.
7-31
Command Function
An example of the show mpls traffic-eng fast-reroute command output is shown below.
ZXR10#show mpls traffic-eng fast-reroute
head end item information
Protected Tunnel In-label Out intf/label FRR intf/label Status
Tunnel1 Tun hd vlan1:2197 Tu2:3 ready
midpoint frr information:identifier
In-label Out intf/label FRR intf/label Status
Output descriptions:
In-label The value of the label advertised to other node by the local node.
Tun hd means that this node is the head node of the tunnel and
no label is advertised.
Out intf/label Out intf: the egress interface of the protected tunnel
Label: It is the value of the label advertised by the next hop on an
intermediate node
7-32
Configuration Thought
1. Establish OSPF neighbor relationship through the direct-connected interfaces on P1,
P2 and P3. Enable OSPF TE.
2. Establish two strict paths. The active path passes by P1, P2 and P3. The standby
path passes by P1 and P3.
3. Enable TE on the interfaces in use on P1, P2 and P3. Configure the standby LSP on
gei-0/2/1/1 of P1.
4. Create the active path and the standby path. Enable FRR on the active path. The
destination is the TE router-id of P3. The path is in strict mode.
Configuration Commands
The configuration of P1:
P1(config)#interface vlan1
P1(config-if)#ip address 74.1.1.2 255.255.255.0
P1(config-if)#exit
P1(config)#interface vlan3
P1(config-if)#ip address 60.1.1.1 255.255.255.0
P1(config-if)#exit
P1(config)#interface loopback1
P1(config-if)#ip address 1.1.1.1 255.255.255.255
P1(config-if)#exit
7-33
P1(config)#interface te_tunnel1
P1(config-if)#ip unnumbered loopback1
P1(config-if)#exit
P1(config)#interface te_tunnel2
P1(config-if)#ip unnumbered loopback1
P1(config-if)#exit
P1(config)#router ospf 1
P1(config-ospfv2)#router-id 2.1.1.1
P1(config-ospfv2)#network 74.1.1.0 0.0.0.255 area 0
P1(config-ospfv2)#network 60.1.1.0 0.0.0.255 area 0
P1(config-ospfv2)#mpls traffic-eng router-id loopback1
P1(config-ospfv2)#mpls traffic-eng area 0
P1(config-ospfv2)#exit
P1(config)#mpls traffic-eng
P1(config-mpls-te)#explicit-path name zte
P1(config-mpls-te-expl-path-name)#next-address strict 74.1.1.1
P1(config-mpls-te-expl-path-name)#exit
P1(config-mpls-te)#explicit-path name zte
P1(config-mpls-te-expl-path-name)#next-address strict 120.1.1.2
P1(config-mpls-te-expl-path-name)#exit
P1(config-mpls-te)#explicit-path name zte
P1(config-mpls-te-expl-path-name)#next-address strict 60.1.1.2
P1(config-mpls-te-expl-path-name)#exit
P1(config-mpls-te)#interface vlan1
P1(config-mpls-te-if)#backup-path te_tunnel 2
P1(config-mpls-te-if)#exit
P1(config-mpls-te)#interface vlan3
P1(config-mpls-te-if)#exit
P1(config-mpls-te)#tunnel te_tunnel 1
P1(config-mpls-te-if)#tunnel destination ipv4 3.1.1.1
P1(config-mpls-te-if)#tunnel mpls traffic-eng path-option 1
explicit-path_name primary
P1(config-mpls-te-if)#tunnel mpls traffic-eng record-route
P1(config-mpls-te-if)#tunnel mpls traffic-eng fast-reroute facility
P1(config-mpls-te-if)#exit
P1(config-mpls-te)#tunnel te_tunnel 2
P1(config-mpls-te-if)#tunnel destination ipv4 3.1.1.1
P1(config-mpls-te-if)#tunnel mpls traffic-eng path-option 1 explicit-path
name back
P1(config-mpls-te-if)#exit
7-34
P2(config)#interface vlan2
P2(config-if)#ip address 120.1.1.1 255.255.255.0
P2(config-if)#exit
P2(config)#interface loopback2
P2(config-if)#ip address 2.1.1.1 255.255.255.255
P2(config-if)#exit
P2(config)#router ospf 1
P2(config-ospfv2)#router-id 2.1.1.1
P2(config-ospfv2)#network 74.1.1.0 0.0.0.255 area 0
P2(config-ospfv2)#network 120.1.1.0 0.0.0.0 area 0
P2(config-ospfv2)#mpls traffic-eng router-id loopback2
P2(config-ospfv2)#mpls traffic-eng area 0
P2(config-ospfv2)#exit
P2(config)#mpls traffic-eng
P2(config-mpls-te)#interface vlan1
P2(config-mpls-te-if)#exit
P2(config-mpls-te)#interface vlan2
P2(config-mpls-te-if)#exit
P2(config-mpls-te)#exit
7-35
Note:
Enable FRR on the active LSP. Configure the standby LSP on the ingress interface of the
active LSP. Enable TE on the interfaces of other nodes.
Configuration Verification
When the tunnel is up, check the FRR information on P1, as shown below.
P1#show mpls traffic-eng tunnels brief
Signalling Summary:
LSP Tunnels Process: running
RSVP Process: running
Forwarding: enabled
TUNNEL NAME DESTINATION UP IF DOWN IF STATE/PROT
tunnel_2 3.1.1.1 - vlan3 up/up
tunnel_1 3.1.1.1 - vlan1 up/up
When the active LSP has a fault, the traffic will be handed over to the standby LSP. FRR
is in active state. Check the FRR state on P1. When the fault on the active LSP recovers,
the FRR relationship recovers to ready state.
P1#show mpls traffic-eng fast-reroute
Tunnel head end item information
Protected Tunnel In-label Out intf/label FRR intf/label Status
Tunnel1 Tun hd vlan1:2197 Tu2:3 active
LSP midpoint frr information:
LSP identifier In-label Out intf/label FRR intf/label Status
7-36
l Improving bandwidth
Route load sharing function makes it possible for routers to share traffic on several
paths, thus to make full use of the bandwidth resources. Through routing protocols
or static configuration, multiple route entities to the same destination are allowed to
exist in the forwarding table.
The forwarding mechanism of load sharing supports two methods, per-packet and
per-destination. The advantages and disadvantages of the two methods are listed below.
Per-destination per-packet
Advantages In this mode, the packets to the same This mode has a high path use rate, as
destination go through the same it uses the round-robin method to select
path. That is, when there are several the paths for the packets. This makes
paths available, packets to different the loads shared on the paths evenly.
destinations can go through different
paths.
8-1
Per-destination per-packet
Disadvantages When there are few destinations, In this mode, the packets to the same
the traffic may gather on few paths. destination may go through different
Therefore, the loads are not balanced. paths. Therefore, there is a sequencing
When there are more destinations, load problem at the receiving end. This
sharing in this mode is more effective. mode is not suitable for traffic that has
requirement of sequence, such as VoIP.
8-2
1 ZXR10(config)#router ospf < process-id>[ vrf < vrf-name>] Enters OSPF route
configuration mode.
8-3
8-4
ZXR10#show ip forwarding route {[vrf <vrf-name>]<network>[<net This shows the forwarding routing
work-mask>]|<protocol>} table.
ZXR10#show ip protocol routing {[vrf <vrf-name>]<network>[<netw This shows the protocol routing
ork-mask>]|<protocol>} table.
Output descriptions:
Pri and RoutePrf Management distance of the information source, that is, the priority
8-5
router ospf 1
maximum-paths 2
......
Output descriptions:
l Configuration Thought
1. Configure an interface and set the load sharing of per-packet mode (By default,
it is per-destination).
2. Enable and configure OSPF
3. Configure OSPF load sharing on R1
l Configuration Commands
The configuration of R1:
R1(config)#interface vlan1
R1(config-if-vlan1)#ip address 101.2.1.100 255.255.255.0
R1(config-if-vlan1)#exit
R1(config)#interface vlan2
R1(config-if-vlan2)#ip address 102.2.1.100 255.255.255.0
R1(config-if-vlan2)#exit
R1(config)#router ospf 1
R1(config-ospfv2)#network 101.2.1.0 0.0.0.255 area 0
R1(config-ospfv2)#network 102.2.1.0 0.0.0.255 area 0
R1(config-ospfv2)#maximum-paths 2
8-6
l Configuration Thought
1. Configure an interface and set the load sharing of per-packet mode (By default,
it is per-destination).
2. Enable and configure BGP4+
3. Configure BGP4+ load sharing on R1
l Configuration Commands
8-7
R2(config)#interface vlan1
R2(config-if-vlan1)#ipv6 enable
R2(config-if-vlan1)#ipv6 address 2000::2/64
R2(config-if-vlan1)#exit
R2(config)#interface vlan2
R2(config-if-vlan2)#ipv6 enable
R2(config-if-vlan2)#ipv6 address 2001::2/64
R2(config-if-vlan2)#exit
R2(config)#router bgp 100
R2(config-bgp)#neighbor 2000::1 remote-as 100
R2(config-bgp)#neighbor 2001::1 remote-as 100
R2(config-bgp)#address-family ipv6
R2(config-bgp-af)#maximum-paths ibgp 16
R2(config-bgp-af)#neighbor 2000::1 activate
R2(config-bgp-af)#neighbor 2001::1 activate
R2(config-bgp-af)#end
l Configuration Verification
Advertise EBGP routes on R2. Use the show command to check the configuration
result, as shown below.
R1#show ipv6 forwarding route bgp
IPv6 Routing Table:
Dest Owner Metric
Interface Gw
2000:0:0:1::/64 bgp 0
vlan1 fe80:12::1
8-8
vlan2 fe80:16::1
8-9
8-10
To solve the problem described above, L3 multicast load sharing solution is introduced.
9-1
Command Function
Command Function
Parameter descriptions:
Parameter Description
9-2
Output descriptions:
Assume that the two routes are equal-cost for R2, that is, the two routes are ECMP between
R2 and the source. Multicast load sharing can be configured on R2 to make the multicast
traffic of different groups be shared on the two paths.
Configuration Thought
1. Configure PIM-SM, BSR and RP on the switches to make the user can receive the
multicast traffic sent by the source properly.
2. Configure multicast load sharing on the downstream switch.
Configuration Commands
9-3
Configure multicast protocol on R and R2 to create a multicast tree. Here take PIM-SM as
an example.
The configuration of R1 (enable PIM-SM on the interfaces, and configure BSR and RP on
loopback63 interface):
R1(config)#ip multicast-routing
R1(config-mcast)#router pimsm
R1(config-pimsm)#interface vlan1
R1(config-pimsm-if)#pimsm
R1(config-pimsm-if)#exit
R1(config-pimsm)#interface vlan2
R1(config-pimsm-if)#pimsm
R1(config-pimsm-if)#exit
R1(config-pimsm)#interface vlan3
R1(config-pimsm-if)#pimsm
R1(config-pimsm-if)#exit
R1(config-pimsm)#bsr-candidate loopback63
R1(config-pimsm)#rp-candidate loopback63
Configuration Verification
When the user starts to receive the multicast traffic sent from the source, check the routing
tables on R1 and R2. Pay attention to the ingress and egress of the routes.
The multicast routing table on R1 is shown below:
R1#show ip mroute
9-4
9-5
9-6
For example, on a mobile IP bearer network, when the quality of phone calls declines
seriously, it is necessary to check whether there is serious voice packet loss, delay and
oscillation at the wireless network side and IP bearer network side at the same time. At
the IP bearer network side, it is necessary to check whether there is any serious network
fault for the transmission of IP packets between CEs. Meanwhile, it is also necessary to
use the parameters (such as UDP packet oscillation and delay ) of SLA to judge whether
the fault is on the bearer network side.
SQA can also be used to detect the network qualities of operators periodically to reflect the
network qualities in real time, so that operators can master the overall network qualities.
SQA is not used very frequently, so it should not be too difficult. Meanwhile, SQA has strict
security limit requirement for the packets forwarded by SLA for handling.
10-1
Parameter Description
Parameter Description
10-2
Parameter Description
<destination-address> For the ICMP, UDP, and TCP detection, it refers to the destination
IP address. For the FTP detection, it refers to the IP address of
the FTP server.
root <local-path>/<file-name> The destination path and name of the destination FTP file. Range:
1-151.
10-3
Parameter Description
Parameter Description
enable <percent> Enables the trap alarm. The range of the alarm threshold is 1-100.
Parameter Description
Command Function
ZXR10(config)#show sqa-test <number> Displays the sqa test configuration information in other
configuration modes except user configuration mode.
Range: 1-150.
10-4
sqa-test 40
type-icmp 192.168.1.100 repeat 10 source 1.1.1.1
!
sqa-test 10
type-udp 192.168.1.98 10000 repeat 10
send-trap enable 80
!
sqa-test 35
type-tcp 192.168.1.98 10000 repeat 10
!
sqa-test 39
!
! </SQA>
Output descriptions:
type-icmp 192.168.1.1 repeat 10 The test type is ICMP. The number of retry attempts for the test to
the destination address 192.168.1.1 is 10.
Output descriptions:
10-5
l Configuration Thought
1. Create an SQA test instance.
2. Configure the destination address for the ICMP test, and set the ICMP test
attribute.
3. Set the beginning time for the SQA test.
4. Check the test result.
l Configuration Commands
The configuration of R1:
R1(config)#sqa-test 1
R1(config-sqa)#type-icmp 10.1.0.2
R1(config-sqa)#sqa-begin now
The sqa test is starting now, please wait a moment for test result......
R1(config-sqa)#
l Configuration Verification
The configuration and test result are shown below.
R1(config)#show sqa-test 1
test type: ICMP
10-6
l Configuration Thought
1. Create an SQA test instance.
2. Configure the FTP test attribute, including the address of the FTP server, user
name, password, source file name, destination path, and the name of the
destination file.
3. Set the beginning time for the SQA test.
4. Check the test result.
l Configuration Commands
The configuration of R3:
R3(config)#ftp-server en
R3(config)#ftp-server top-directory /sysdisk0/
R3(config)#ip ftp username who
R3(config)#ip ftp password who
10-7
l Configuration Thought
1. Create an SQA test instance.
2. Configure the destination address and the port for the TCP test, and set the TCP
test attribute.
3. Set the beginning time for the SQA test.
4. Check the test result.
l Configuration Commands
The configuration of R3:
R3(config)#sqa-tcp-server 10.1.0.2 10000
10-8
R1(config-sqa)#sqa-begin now
The sqa test is starting now, please wait a moment for test result......
R1(config-sqa)#
l Configuration Verification
The configuration and test result are shown below.
R1(config)#show sqa-test 3
test type: TCP
destination IP:10.1.0.2
desitnation port:10000
inteinterval time:1000
repeat:1
send trap:disable
R1(config)#show sqa-result tcp
tcp test[3] result is finished
SendPackets:1..ResponsePackets:1
Completion:success....Destination ip IP Aaddress:10.1.0.2
Min/Max/Avg/Sum RTT:5/5/5/5ms
Last Probe Time:2010-07-29 09:45:49
l Configuration Thought
1. Create an SQA test instance.
2. Configure the destination address and the port number for the UDP test, and set
the UDP test attribute.
3. Set the beginning time for the SQA test.
4. Check the test result.
l Configuration Commands
The configuration of R3:
R3(config)#sqa-udp-server 10.1.0.2 10000
10-9
R1(config-sqa)#sqa-begin now
The sqa test is starting now, please wait a moment for test result......
R1(config-sqa)#
l Configuration Verification
The configuration and test result are shown below.
R1(config)#show sqa-test 4
test type: UDP
destination IP:10.1.0.2
desitnation port:10000
interval time:100
repeat:1
send trap:disable
R1(config)#show sqa-result udp
ZXR10(config)#show sqa-result udp
udp test[2] result
SendPackets:10 ResponsePackets:10
Completion:success Destination IP Address:192.0.0.111
Min/Max/Avg/Sum RTT:61/63/62/622ms
Min/Max/Avg/Sum Positive Jitter:0/0/0/0ms
Min/Max/Avg/Sum Negative Jitter:1/1/1/2ms
Min/Max/Avg/Sum Jitter:1/1/1/2ms
Packet loss rate:0%
Last Probe Time:2011-09-01 23:52:35
l Configuration Thought
1. Create an SQA test instance.
2. Configure the name for the domain to be analysed for the DNS test and the IP
address for the DNS server, and set the times for domain analysis.
3. Set the beginning time for the SQA test.
4. Check the test result.
l Configuration Commands
10-10
10-11
10-12
11-1
normally, it indicates that Ethernet link of this interface is reachable bidirectionally. If the
Echo packet fails to be received or the link is reachable unidirectionally according to the
received packet, the UDLD takes measures according to the configured working mode.
The UDLD supports two working modes: normal mode and aggressive mode. In the
normal mode, the UDLD makes an interface down after the interface receives the Echo
packet and confirms that the link is reachable unidirectionally. The UDLD does not perform
any operation when the interface cannot receive the Echo packet or fails to confirm that the
link is reachable unidirectionally. In the aggressive mode, the UDLD makes an interface
down if the interface cannot confirm that the link is reachable bidirectionally. The common
point of the two modes is that the system generates an alarm if the interface fails to confirm
that the link works normally.
When the interface is down or cannot be used due to other reasons, the device will send
a flush packet to notify the adjacent L2 device to delete the information of this device.
11-2
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
11-3
Parameter Description
Parameter Description
Command Function
ZXR10#show udld <interface-name> This shows the UDLD neighbor information of an interface.
Interface gei-0/1/0/1
Administrative configuration: Enable
Port mode: Normal
Current state: Bidirection
Recovery configuration: Disable
Auto-recovery time: 30s
Message interval: 15s
Entry 1
--------------------
Device ID: ZTE0000.0100.9902
Device name: ZTE
Port ID: gei-0/1/0/1
Expiration time: 31s
Message interval: 15s
Timeout interval: 5s
11-4
l Configuration Thought
1. Enter the UDLD config mode.
2. Enter the config mode of an interface.
3. Enable the UDLD function.
l Configuration Commands
Method 1: In the UDLD config mode, enter the config mode of an interface to enable
the UDLD function.
ZXR10(config)#udld
ZXR10(config-udld)#interface gei-0/1/0/1
ZXR10(config-udld-if)#udld enable
Method 2: In the UDLD config mode, enable the UDLD function of an interface.
ZXR10(config-udld)#udld enable interface gei-0/1/0/1
l Configuration Verification
Use the show udld neighbor command to view the configuration result.
ZXR10(config-udld)#show udld gei-0/1/0/1
Interface gei-0/1/0/1
Administrative configuration: Enable
Port mode: Normal
Current state: Bidirection
Recovery configuration: Disable
Auto-recovery time: 30s
Message interval: 15s
Entry 1
--------------------
Device ID: ZTE0000.0100.9902
Device name: ZTE
Port ID: gei-0/1/0/1
Expiration time: 44s
11-5
11-6
Figure 6-4 Configuring a Single-hop BFD for the BGP Route .................................. 6-14
Figure 6-5 Configuring a Multihop-BFD for the BGP Route ..................................... 6-16
Figure 6-6 Configuring a Static Route BFD ............................................................. 6-18
Figure 6-7 Configuring PIM BFD ............................................................................. 6-20
Figure 6-8 Configuring the LDP BFD....................................................................... 6-23
Figure 6-9 Configuring the PEER BFD.................................................................... 6-25
Figure 6-10 Configuring the Static Single-Hop BFD ................................................ 6-28
Figure 6-11 Configuring the Static MultiHop BFD .................................................... 6-30
Figure 6-12 Configuring the BFD Function for the RSVP Interface .......................... 6-34
Figure 6-13 Configuring the RSVP LSP BFD .......................................................... 6-36
Figure 6-14 Configuring the Link BFD Relating to the VRRP................................... 6-41
Figure 6-15 Configuring the VPWS BFD ................................................................. 6-43
Figure 7-1 Network Structure of FRR Node Protection .............................................. 7-6
Figure 7-2 Network Structure of FRR Link Protection ................................................ 7-6
Figure 7-3 L2VPN FRR Principle ............................................................................ 7-10
Figure 7-4 VPLS FRR Configuration Example......................................................... 7-12
Figure 7-5 VPN/BGP Neighbors.............................................................................. 7-14
Figure 7-6 L3 VPN FRR Configuration Example ..................................................... 7-18
Figure 7-7 FRR Though Bypass Mode.................................................................... 7-26
Figure 7-8 FRR in Bypass Mode ............................................................................. 7-27
Figure 7-9 TE-FRR Configuration Example............................................................. 7-33
Figure 8-1 OSPFv2 Route Load Sharing Configuration Example .............................. 8-6
Figure 8-2 BGP4+ Route Load Sharing Configuration Example ................................ 8-7
Figure 9-1 Multicast Load Sharing Principle .............................................................. 9-1
Figure 9-2 Multicast Load Sharing Configuration Example ........................................ 9-3
Figure 10-1 ICMP-Type SQA Configuration Example .............................................. 10-6
Figure 10-2 FTP-Type SQA Configuration Example ................................................ 10-7
Figure 10-3 TCP-Type SQA Configuration Example................................................ 10-8
Figure 10-4 UDP-Type SQA Configuration Example ............................................... 10-9
Figure 10-5 DNS-Type SQA Configuration Example ............................................. 10-10
Figure 11-1 Configuring UDLD Neighbor................................................................. 11-5
II
ECMP
- Equal-Cost Multi-Path routing
EFM
- Ethernet in the First Mile
ERO
- Explicit Route Object
FIB
- Forwarding Information Base
FRR
- Fast Reroute
IBGP
- Interior Border Gateway Protocol
IEEE
- Institute of Electrical and Electronics Engineers
IGP
- Interior Gateway Protocol
IPTV
- Internet Protocol Television
III
ITU
- International Telecommunications Union
LAN
- Local Area Network
LBM
- Loopback Message
LDP
- Label Distribution Protocol
LSP
- Label Switched Path
LTM
- Link Trace Message
LTR
- Link Trace Reply
MAC
- Media Access Control
MAN
- Metropolitan Area Network
MIP
- Maintenance domain Intermediate Point
MP
- Merge Point
NGN
- Next Generation Network
OAM
- Operation, Administration and Maintenance
PDU
- Protocol Data Unit
PLR
- Point of Local Repair
PTN
- Packet Transport Network
PWE3
- Pseudo Wire Emulation Edge-to-Edge
QoS
- Quality of Service
RFC
- Request For Comments
IV
RIPng
- Routing Information Protocol next generation
RSVP
- Resource Reservation Protocol
SLA
- Service Level Agreement
TTL
- Time To Live
VLAN
- Virtual Local Area Network
VoIP
- Voice over Internet Protocol
VPWS
- Virtual Private Wire Service
VRRP
- Virtual Router Redundancy Protocol
WAN
- Wide Area Network