Академический Документы
Профессиональный Документы
Культура Документы
Carrier-Class Router
Configuration Guide (Reliability)
Version: 1.00.60
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://ensupport.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright © 2013 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
II
Figures............................................................................................................. I
Glossary ........................................................................................................ III
III
Intended Audience
This manual is intended for:
l Network planning engineers
l Commissioning engineers
l On-duty personnel
Chapter Summary
1, Reliability Overview Describes the meaning and requirements of the reliability, and the
relationship of various functions related to the reliability.
10, Master/Slave Main Control Describes the principle, configuration commands, maintenance
Handover commands, and configuration examples of the master/slave
main-control handover.
Conventions
This manual uses the following typographical conventions:
Typeface Meaning
Italics Variables in commands. It may also refer to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.
Constant Text that you type, program codes, filenames, directory names, and function names.
width
[] Optional parameters.
{} Mandatory parameters.
II
Network reliability technology includes network fault detection technology and protection
switching technology.
1-1
l End-to-end protection: APS 1:1 linear protection, APS 1+1 linear protection and hot
standby.
l Local protection: FRR, including IP FRR, LDP FRR, TE FRR, and PW FRR.
1-2
1. The SAMGR abstracts a detection example to a track object. It associates the track
object with the detection example by configuring a trackname for the track object.
The trackname is called directly in the service where the detection result needs to be
monitored.
2. When detecting that the link state changes, the detection technology advertises the
state change to the SAMGR directly.
2-1
3. The SAMGR informs the application service associated with the track object. The
application service performs state switching in accordance with the state change to
protect the link.
At the same time, the SAMGR also can manage the binding relation between racks and
send the local state to the remote end. In this way, fault transmission and recovery is
accomplished.
When a fault of the pee-type BFD occurs on the router, the SAMGR advertises the state
to the service, and then the service performs switching in accordance with its policy on the
basis of the EOAM state and the BFD state.
2-2
2-3
2 ZXR10(config-samgr)#track <name> efm interface Configures a track object with detection type
<interface-name> "efm".
5 ZXR10(config-samgr)#track <name> sqa instance Configures a track object with detection type
<1-150> "sqa". The range of the SQA example is : 1-150.
7 ZXR10(config-samgr)#track <name> link-bfd { ipv4 Configures a track object with detection type
<local-ipv4-address>< remote-ipv4-address >| ipv6 < "link-bfd".
local-ipv6-address >< remote-ipv6-address >} interface
<interface-name>[vrf <vrf-name>]
8 ZXR10(config-samgr)#track <name> peer-bfd { ipv4 Configures a track object with detection type
<local-ipv4-address><remote-ipv4-address>| ipv6 < "peer-bfd".
local-ipv6-address><remote-ipv6-address>}[vrf <vrf-name>]
2-4
11 ZXR10(config-samgr)#track <name> pw-bfd vcid Configures a track object with detection type
<1-4294967295> peerid <peer-id>{aal1 | aal2 | atm-aal5 "pw-bfd".
| atm-cell | atm-vcc | atm-vpc | cem | ceop | cesopsn-basic
| cesopsn-cas | hdlc | e1 | e3 | ehter | ether-vlan |
fr-dlci-martini | fr-dlci | fr-port | ip | ppp | t1 | t3}[interval
<10-990> min_rx <10-990> multiplier <3-50>]
13 ZXR10(config-samgr)#track <name> vrrp interface Configures a track object with detection type
<interface-name> vrid <1-255> "vrrp".
14 ZXR10(config-samgr)#track <name> l2-bfd session Configures a track object with detection type
<session-name> “l2-bfd”. <session-name> indicates the l2-bfd
name (Length: 1-32 characters)
2-5
Parameter Description
track<name> Name of the passive track object, that is, the name of the track object
that receives state transmission.
{track | track-group}<name> Name of an active track object or track group, that is, the name of
the track object or track group that starts state transmission.
Command Function
ZXR10#show samgr brief Displays the brief information related to a track object.
ZXR10#show samgr track [<trackname>[verbose]] Displays the detailed information of a track object, for
example, the state change information.
ZXR10#show samgr track-group [<trackname>[verbose]] Displays the detailed information of a track group, for
example, the state change information.
The following is sample output from the show samgr brief command:
ZXR10#show samgr brief
The total of track at this Router is 7
======================================================
Track-name Detect-type App-num State
vrrp2 vrrp 0 up
oam1 mpls-oam 1 up
ping1 ping-detect 0 L-down
vrrp1 vrrp 0 up
efm1 efm 1 T-down
ping2 ping-detect 0 up
vrrp2 vrrp 0 up
The following is sample output from the show samgr track command:
ZXR10#show samgr track
Track name is xx
2-6
2-7
Active track Whether to act as a passive track to receive state information from the active track.
Passive track Whether to act as an active track to send the state information to the passive track.
old state The original state of the track object before the state is changed.
new state The current state of the track object after the state is changed.
The following is sample output from the show samgr track-group command:
ZXR10#show samgr track-group
Track-group name: aaa
Set inactive number: all
App number: 0
Track-group state: up
Track-group member: 0
-------------------------------
Track-group name: group1
Set inactive number: 1
App number: 0
Track-group state: local down
Track-group member: 3
Track name: ping3 State: up
Track name: ping2 State: up
Track name: ping1 State: local down
2-8
Track name is 1
State change record:
old state new state change time
1 up local down 2010-07-19 03:14:43
2 local down up 2010-07-19 03:14:50
3 up local down 2010-07-19 03:14:56
4 local down up 2010-07-19 03:15:01
Track name Name of track objects that are bound to the track group.
old state The original state of the track group before the state is changed.
new state The current state of the track group after the state is changed.
2-9
Configuration Flow
1. Configure the EFM connection for the directly-connected interfaces between S1 and
R2.
2. Configure an EFM track object for the directly-connected interface of R2 in SAMGR
configuration mode.
3. Configure the same VRRP group number and virtual address for R2 and R3. To set
R2 as a master router, bind the VRRP of R2 to the EFM track object.
4. When the EFM function is disabled on S1, the VRRP group on R2 is changed to the
Init status, and the VRRP group on R3 is changed to the Master status. When the
EFM function is enabled, the VRRP group on R2 is changed to the Master status, and
the VRRP group of R3 is changed to the Backup status.
Configuration Command
Run the following commands on S1:
S1(config)#set ethernet-oam enable
S1(config)#interface gei_4/1
S1(config-gei_4/1)#set ethernet-oam enable
R2(config)#efm
R2(config-efm)#set ethernet-oam function enable
R2(config-efm)#interface gei-0/2/0/1
R2(config-efm-if)#set ethernet-oam function enable
R2(config-efm-if)#exit
R2(config-efm)#exit
R2(config)#samgr
R2(config-samgr)#track efm efm interface gei-0/2/0/1
R2(config-samgr)#exit
R2(config)#vrrp
R2(config-vrrp)#interface gei-0/2/0/1
R2(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R2(config-vrrp-if)#vrrp 1 out-interface gei-0/3/0/2
R2(config-vrrp-if)#vrrp 1 track object efm link-type
R2(config-vrrp-if)#exit
2-10
R3(config)#interface gei-0/5/0/1
R3(config-if)#ip address 10.0.0.2 255.255.0.0
R3(config-if)#exit
R3(config)#interface gei-0/6/0/2
R3(config-if)#ip address 192.168.0.2 255.255.0.0
R3(config-if)#exit
R3(config)#vrrp
R3(config-vrrp)#interface gei-0/5/0/1
R3(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R3(config-vrrp-if)#vrrp 1 out-interface gei-0/6/0/2
R3(config-vrrp-if)#end
Configuration Verification
Check the VRRP configuration results on R2 and R3. The results show that R2 is a master
router and R3 is a backup router. The output of the show samgr command on R2 shows
that the EFM track object is in up state.
R2#show vrrp ipv4 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
gei-0/2/0/1 1 255 1000 A P Master 10.0.0.1 10.0.0.1
When the EFM function on S1 is disabled , the status of the VRRP group on R2 is changed
from Master to Init, and that of R3 is changed to Master. The output of the show samgr
command on R2 shows that the EFM track object is in local down status.
2-11
============================================================================
Track-name Detect-type App-num State
efm efm 1 L-down
When the EFM function on S1 is enabled, the status of the VRRP group on R2 is changed
to Master, and that of R3 is changed to Backup. The EFM track object on R2 is in up
status.
S1(config)#set ethernet-oam enable
S1(config-efm)#set ethernet-oam function enable
S1(config-efm)#exit
2-12
Configuration Flow
1. Configure the CFM continuous detection for the directly-connected interfaces between
S1 and R2.
2. Configure a CFM track object for the directly-connected interface of R2 in SAMGR
configuration mode.
3. Configure the same VRRP group number and virtual address for R2 and R3. To set
R2 as a master router, bind VRRP of R2 to the track object with the detection type
"CFM".
4. When the CFM function on S1 is disabled, the status of the VRRP group onR2 is
changed to the Init status, and that of R3 is changed to the Master status. When the
CFM function on S1 is enabled, the status of the VRRP group on R2 is changed to
Master, and that of R3 is changed to Backup.
Configuration Command
Run the following commands on S1:
S1(config)#cfm enable
S1(config)#cfm ccm-format 1
S1(config)#cfm create md session 1 name md2 level 7
S1(config-md)#ma create session 1 name a4
S1(config-md-ma)#create mep session 1 8 direction down
S1(config-md-ma)#create rmep session 1 16 remote-mac 00d0.d011.3377
S1(config-md-ma)#assign mep 8 to interface gei_4/1
S1(config-md-ma)#mep 8 state enable
S1(config-md-ma)#mep 8 ccm-send enable
S1(config-md-ma)#mep 16 state enable
2-13
R2(config)#cfm
R2(config-cfm)#set cfm enable
R2(config-cfm)#create md index 2 name-format 2 name md2 level 7
R2(config-cfm)#md index 2
R2(config-cfm-md)#create ma index 4 name-format 2 name a4
R2(config-cfm-md)#ma index 4
R2(config-cfm-ma)#create mep mepid 16 direction down interface gei-0/2/0/1
R2(config-cfm-ma)#create rmep mepid 8 remote-mac 00a1.1122.0011 lmep 16
R2(config-cfm-ma)#set mep 16 state enable
R2(config-cfm-ma)#set mep 16 ccm-send enable
R2(config-cfm-ma)#set mep 8 state enable
R2(config-cfm-ma)#exit
R2(config-cfm-md)#exit
R2(config-cfm)#exit
R2(config)#samgr
R2(config-samgr)#track cfm cfm md 2 ma 4 local-mep 16 remote-mep 8
R2(config-samgr)#exit
R2(config)#vrrp
R2(config-vrrp)#interface gei-0/2/0/1
R2(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R2(config-vrrp-if)#vrrp 1 out-interface gei-0/3/0/2
R2(config-vrrp-if)#vrrp 1 track object cfm link-type
R2(config-vrrp-if)#exit
R3(config)#vrrp
R3(config-vrrp)#interface gei-0/5/0/1
R3(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R3(config-vrrp-if)#vrrp 1 out-interface gei-0/6/0/2
R3(config-vrrp-if)#end
Configuration Verification
Check the VRRP configuration results on R2 and R3. The results show that R2 is a Master
router and R3 is a Backup router. The output of the show samgr command shows that the
CFM track object is in up status.
2-14
When the CFM function on S1 is disabled, the status of the VRRP group on R2 is changed
from Master to Init, and that of R3 is changed to Master. The CFM track object of R2 is in
local down status.
S1(config)#cfm disable
S1(config-cfm)#set cfm disable
S1(config-cfm)#exit
When the CFM function on S1 is enabled, the status of the VRRP group on R2 is changed
to Master, and that of R3 is changed to Backup. The CFM track object of R2 is in up status.
S1(config)#cfm enable
S1(config-cfm)#set cfm enable
S1(config-cfm)#exit
2-15
2-16
3-1
The Virtual Router Redundancy Protocol (VRRP) is a fault-tolerant protocol. The VRRP
can implement routing among multiple egress network gateways by isolating physical
devices from logical devices. After that, the problem is solved.
In LANs with multicasting or broadcasting ability (such as Ethernet), the VRRP provides
a logical network gateway to ensure that transmission links are used fully. This not only
avoids service interruption due to faults on a network gateway device, but also avoids
modification of routing protocol configuration.
The virtual router has its own IP address 10.100.10.1 (this IP address can be the same
with an interface address on a router). Route A and router B also have their own IP
addresses (IP address of router A is 10.100.10.2 and IP address of router B is 10.100.10.3).
Hosts in the LAN only knows the IP address 10.100.10.1 of the virtual router. Hosts do
not know the IP addresses of router A and Router B. Router A and router B set the IP
address 10.100.10.1 of the virtual router as their default routes. Therefore, hosts in the
LAN communicate with other networks through this virtual router. The virtual router needs
to perform the following operations:
1. The virtual router selects a master router in accordance with the priority. The router
with the highest priority becomes the master router and its state is Master. If the
priorities are the same, the master IP addresses on interfaces are compared. The
router with the greater master IP address on an interface becomes the master router.
The master router provides routing service.
2. The other router operates as a backup router. It detects the state of the master router
at any time.
3-2
l When the master router works properly, it sends a VRRP multicasting message
at a certain interval to inform the backup router in the group that the master router
works properly.
l If the backup router in the group does not receive messages from the master
router for a long time, the backup router changes its state to Master.
l When there are several backup routers in the group, there might be several master
routers at this time. In this situation, each master router compares the priorities
in the VRRP messages with its local priority. If its local priority is smaller than the
priorities in the VRRP messages, the master router changes its state to Backup.
Otherwise, the master keeps its state.
In this way, the router with the highest priority becomes the new master router. The
VRRP backup function is completed.
3-3
In accordance with the above analysis, the hosts in the network do not have any extra
operations, and the communications with external network will not be affected due to the
faults on a router.
3-4
In Figure 3-4, the VRRP Group 1 monitors the interface marked with a red point on router A.
When the interface works properly, router A acts as the master router. When the interface
is down, the priority of router A is decreased. As a result, the priority of router A is lower
than that of router B. In this way, master/backup changeover is completed.
3-5
In this way, the data flows are shared and backed up.
For the state transfer of EOAM for VRRP, see Figure 3-7. EOAM monitors the link
state between the router and the switch. When receiving the link fault notified by
EOAM in the master or backup state, the VRRP transfers to the initialize state directly.
When all VRRP interfaces are in up state and VRRP is in initialize state, the VRRP
receives link recovery notified by EOAM, and the backup group is the IP Owner, the
state will transfer to the master state, otherwise, the state will transfer to the backup
state.
3-6
l Application two
The VRRP protocol is used between router A and router B, and these two routers are
used for master/backup selection, see Figure 3-8. The EOAM (including EFM and
CFM) is used to detect the link state between the switches and the routers. BFD is
used to detect the link state between routers. In this application, the EOAM can be
replaced by the link BFD.
For the state transfer of EOAM (or link BFD) + peer BFD for VRRP, see Figure 3-9.
When receiving the link fault notified by EOAM in the master or backup state, VRRP
transfers to the initialize state directly. When all VRRP interfaces are up, the VRRP is
in initialize state, the VRRP receives link recovery notified by EOAM, and the group
is the IP Owner, the state will transfer to the master state, otherwise, the state will
transfer to the backup state. If the VRRP is in backup state, and the VRRP receives
the link fault notified by peer BFD, the VRRP will transfer to the master state.
3-7
l Application three
The VRRP protocol is used between router A and router B, see Figure 3-10. These
two routers are used for master/backup selection. The EOAM (including EFM and
CFM) is used to detect the link states between router A and router C, and between
router B and router C. The state of EOAM for VRRP transfers in accordance with
the VRRP protocol negotiation. When receiving the link fault notified by EOAM, the
VRRP decreases the priority based on configuration and triggers master/slave router
changeover.
3-8
3-9
Parameter Description
Parameter Description
priority-decrement Decreases the priority for a specified tracing link. By default, the priority
is decreased by 10.
Parameter Description
3-10
Parameter Description
link-type Link-type.
peer-type Peer-type.
Parameter Description
owner The current group is the administration group that receives packets and
manages link states.
Command Function
ZXR10#show vrrp ipv4 brief Displays the brief information of all IPv4 VRRP
groups on a router.
ZXR10#show vrrp ipv4 brief interface <interface-name> Displays the brief information of all IPv4 VRRP
groups on a specific interface.
ZXR10#show vrrp interface <interface-name>[vrid <1-255>] Displays the detailed information of all VRRP
groups or a specified group on a specified
interface.
The following is sample output from the show vrrp ipv4 brief command:
3-11
Master addr Interface address of the master router in a virtual router group.
The following is sample output from the show vrrp ipv4 brief interface command:
ZXR10#show vrrp ipv4 brief interface fei-0/1/0/1
The total of vrrp group on this Interface is 2.
======================================================================
Interface vrID Pri Time A P L State Master addr VRouter addr
fei-0/1/0/1 100 200 10000 P Master 35.35.35.1 1.1.1.1
fei-0/1/0/1 120 255 157 A P L Master 35.35.35.1 35.35.35.1
The following is sample output from the show vrrp interface command:
ZXR10(config)#show vrrp interface smartgroup4
smartgroup4 - vrID 5
Vrrp configure info:
IP version 4, VRRP version 3
Virtual IP address is 0.0.0.0
Virtual MAC address is 0000.5e00.0105
Advertise time is 1.000 sec
Configured priority is 100
Preemption enable, delay 0 secs
No authentication data
Check ttl enable
Vrrp accept mode enable
Out-interface send-mode is all
Tracked interface items: 0
Interface State Policy Reduce-Priority
Tracked detect items: 0
Admin-group is None
Vrrp run info:
State is Init
0 state changes, last state change 00:00:00
Current priority is 100
Master router is unknown
3-12
Decrement-Priority The decreased priority after the tracked interface is shut down.
Track type The track type, including detection group and detection object.
Detect type The link detection type, which is configured in SAMGR configuration.
Master router is local This router is the master router is the virtual router group.
3-13
Configuration Flow
1. Enter the interfaces on which VRRP will be configured and configure an IP address
for it.
2. Enter VRRP configuration mode from global configuration mode and then enter the
interface on which the VRRP is to be configured.
3. Configure the same VRRP group ID and virtual address for the R1 and the R2. To
make the R1 the master router or specify a higher priority for the R1, configure related
commands on the R1 first. If the priorities (the default priority is 100) of two routers
are the same, the router becomes the master router in the group, on which VRRP is
enabled and messages are advertised first.
Configuration Command
Run the following commands on the R1:
R1(config)#interface fei-0/1/0/1
R1(config-if)#ip address 10.0.0.1 255.255.0.0
R1(config)#vrrp
R1(config-vrrp)#interface fei-0/1/0/1
R1(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
Configuration Verification
View the VRRP information and configuration result on the R1, which is displayed as
follows:
R1#show vrrp ipv4 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
fei-0/1/0/1 1 255 1000 A P Master 10.0.0.1 10.0.0.1
/*A: whether the router is the address owner.
P: whether preemption is configured.
L: whether to learn the interval to advertise VRRP messages on the master.*/
3-14
3-15
Configuration Flow
1. Enter the interfaces on which VRRP will be configured and configure an IP address
for it.
2. Enter VRRP configuration mode from global configuration mode and then enter the
interface on which the VRRP is to be configured.
3. Configure VRRP Group 1 and corresponding virtual address on R1, and configure
VRRP Group 2 and corresponding virtual address on R2. Specify a higher priority for
VRRP Group 1 on R1 and VRRP Group 2 on R2. After that, R1 is the master router
in Group 1 and the backup router in Group 2, and R2 is the master router in Group 2
and the backup router in Group 1. The R1 and R2 provide backups for each other.
Configuration Command
Run the following commands on the R1:
R1(config)#interface fei-0/1/0/1
R1(config-if)#ip address 10.0.0.1 255.255.0.0
R1(config)#vrrp
R1(config-vrrp)#interface fei-0/1/0/1
R1(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R1(config-vrrp-if)#vrrp 2 ipv4 10.0.0.2
R2(config)#interface fei-0/1/0/1
R2(config-if)#ip address 10.0.0.2 255.255.0.0
R2(config)#vrrp
R2(config-vrrp)#interface fei-0/1/0/1
R2(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R2(config-vrrp-if)#vrrp 2 ipv4 10.0.0.2
3-16
Configuration Verification
Check the VRRP information and configuration result on R1, as shown below.
R1#show vrrp ipv4 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
fei-0/1/0/1 1 255 1000 A P Master 10.0.0.1 10.0.0.1
fei-0/1/0/1 2 100 1000 P Backup 10.0.0.2 10.0.0.2
/*A: whether the router is the address owner.
P: whether preemption is configured.
L: whether to learn the interval for sending VRRP messages from the master.*/
3-17
Configuration Flow
1. Enter the interfaces on which VRRP will be configured and configure an IP address
for it.
2. Enter VRRP configuration mode from global configuration mode and then enter the
interface on which the VRRP is to be configured.
3. Configure the same VRRP group ID and virtual address for R1 and R2. To make R1 as
the master router, specify a higher priority for R1, or set it to be the IP address owner
(The interface address of R1 is set as the virtual address and R1 has the highest
priority 255).
4. In VRRP interface configuration mode of R1 and R2, configure egress interfaces for
packets in the VRRP group to ensure that packets can be sent and received through
these two egresses.
Configuration Command
Run the following commands on R1:
R1(config)#interface fei-0/1/0/1
R1(config-if)#ip address 10.0.0.1 255.255.0.0
R1(config)#vrrp
R1(config-vrrp)#interface fei-0/1/0/1
R1(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R1(config-vrrp-if)#vrrp 1 out-interface fei-0/1/0/2
3-18
R2(config)#interface fei-0/1/0/1
R2(config-if)#ip address 10.0.0.2 255.255.0.0
R2(config)#vrrp
R2(config-vrrp)#interface fei-0/1/0/1
R2(config-vrrp-if)#vrrp 1 ipv4 10.0.0.1
R2(config-vrrp-if)#vrrp 1 out-interface fei-0/1/0/2
Configuration Verification
Check the VRRP information and configuration results on R1, which are displayed as
follows:
3-19
Configuration Flow
1. Enter the interface on which VRRP will be configured and configure an IP address for
it.
2. Enter VRRP configuration mode from global configuration mode, and then enter the
interface on which the VRRP is to be configured.
3. Configure the same VRRP group ID and virtual IP addre for Router A and Router B. To
set Router A as the master router, specify a higher priority for Router A, or set it to be
the IP address owner (The interface address of Router A is set as the virtual address
and Router A has the highest priority 255).
4. Enter SAMGR configuration mode of Router A and Router B to configure a
detection object respectively. Configure the Ethernet Operation, Administration and
Maintenance (EOAM) object for Router A and Router B, and then configure the
Bidirectional Forwarding Detection (BFD) object.
5. Enter VRRP interface configuration mode of Router A and Router B, enable VRRP
track function to track the objects configured in Step 4 respectively.
Configuration Command
Run the following commands on Router A:
3-20
RA(config)#interface fei-0/1/0/1
RA(config-if)#ip address 10.0.0.1 255.255.0.0
RA(config-if)#exit
RA(config)#vrrp
RA(config-vrrp)#interface fei-0/1/0/1
RA(config-vrrp-if)#vrrp 1 ipv4 10.0.0.3
RA(config-vrrp-if)#vrrp 1 track object zte1 link-type
RA(config-vrrp-if)#vrrp 1 track object zte2 peer-type
The tracked object named zte1 and zte2 should be configured in the SAMGR module in
advance. For the detailed configuration, refer to the “SAMGR Configuration” chapter.
Run the following commands on Router B:
RB(config)#interface fei-0/1/0/1
RB(config-if)#ip address 10.0.0.2 255.255.0.0
RB(config-if)#exit
RB(config)#vrrp
RB(config-vrrp)#interface fei-0/1/0/1
RB(config-vrrp-if)#vrrp 1 ipv4 10.0.0.3
RB(config-vrrp-if)#vrrp 1 track object zte1 link-type
RB(config-vrrp-if)#vrrp 1 track object zte2 peer-type
The tracked object named zte1 and zte2 should be configured in the SAMGR module in
advance. For the detailed configuration, refer to the “SAMGR Configuration” chapter.
Configuration Verification
Check the VRRP track information and configuration results on Router A, which is
displayed as follows:
RA#show vrrp ipv4 brief
Interface vrID Pri Time A P L State Master addr VRouter addr
fei-0/1/0/1 1 100 1000 A P Master 10.0.0.1 10.0.0.3
/*A: whether the router is the address owner.
P: whether preemption is configured.
L: whether to learn the interval to advertise VRRP messages on the master.*/
3-21
No authentication data
Check ttl enable
Vrrp accept mode enable
Out-interface send-mode is all
Tracked interface items: 0
Interface State Policy Reduce-Priority
Tracked detect items: 1
Track name: zte2 Track type: object Detect type: peer-bfd
Policy type: peer
Track state: unknown
Track name: zte1 Track type: object Detect type: cfm
Policy type: link
Track state: unknown
Admin-group is None
Vrrp run info:
State is Master
155 state changes, last state change 01:12:08
Current priority is 255
Master router is local
Master router address is 10.0.0.3
Master router priority is 100
Master Advertisement interval is 1.000 sec
Master Down interval is 3.609 sec, no learn
3-22
If the destination is unreachable because the Ethernet interface of the peer gateway 1
corresponding to the main link is not configured with an IP address, the backup mode
that depends on the protocol status of the detection interface cannot implement the
active/standby switchover function.
4-1
In the same way, if the destination of (non-direct) the main link is faulty, for example, the
external dedicated line of gateway 1 is faulty, the traditional backup mechanism also cannot
implement the active/standby switchover function.
The detection results ( the destination ICMP is reachable or unreachable) will be fed back
to the related modules, such as static route backup module, dialing backup module, and
the VRRP module, to trigger the active/standby switchover operation. After that, the above
faults are solved.
Note:
l You can check the Ping Detect result by running the show samgr brief command.
l To use the Ping Detect function, the ICMP service of the firewall corresponding to the
objects to be detected should be enabled.
4-2
2 ZXR10(config-detect)#option {And | Or} Configures the logical relationship "and" or "or" for
objects to be detected.
And: It indicates that this group is connected when
all items in the group are connected.
Or: It indicates that this group is connected when
any item in the group is connected.
Command Function
ZXR10#show running-config ping-detect Displays the configuration of the Ping Detect function.
The default value is not displayed.
ZXR10#show running-config ping-detect all Displays the configuration of the Ping Detect function.
The default value is displayed.
ZXR10#show samgr track Displays the information of the Samgr Track Ping Detect
function.
The following is sample output from the show samgr track command:
4-3
Track parameter
Group: 1
App-sub count : 0
Dyn-creat count: 0
Active track : none
Passive track : none
Track state : up
State change : 3 state changes, last state change 2010-01-01 01:11:05
4-4
Configuration Flow
1. Configure a detection group.
2. Configure detection items for the detection group on R1.
3. Set parameters for the detection group as required.
4. Enable the Ping Detect function in Samgr configuration mode, and check the result by
running the show command.
5. Set the logical relationship among objects to be detected to And, add a detection item
that cannot be pinged successfully, and then check the detection result. Set the logical
relationship among objects to be detected to Or, and then check the detection result.
Configuration Command
Run the following commands to configure R1:
ZXR10(config)#detect-group 1
ZXR10(config-detect)#detect-list 1 100.0.0.20
ZXR10(config-detect)#detect-list 2 101.0.0.20
ZXR10(config-detect)#detect-list 3 102.0.0.20
ZXR10(config-detect)#exit
ZXR10(config)#samgr
ZXR10(config-samgr)#track test ping-detect group 1
ZXR10(config-samgr)#exit
Configuration Verification
Check the Ping Detect configuration results on R1:
ZXR10(config)#show samgr brief
The total of track at this Router is 1.
======================================================================
Track-name Detect-type App-num State
test ping-detect 0 up
Set the logical relationship among objects to be detected to And, and then add a detection
item that cannot be pinged successfully.
ZXR10(config-detect)#option And
/*Set the logical relationship for the detect object to "And"*/
ZXR10(config-detect)#detect-list 4 1.2.3.4
ZXR10(config-detect)#exit
ZXR10(config)#show samgr brief
The total of track at this Router is 1.
======================================================================
Track-name Detect-type App-num State
test ping-detect 0 L-down
Set the logical relationship among objects to be detected to Or, and then check the detect
result:
ZXR10(config-detect)#option Or
4-5
Configuration Flow
1. Set the IP addresses for R1, R2 and R4, enable the OSPF protocol, and create OSPF
neighbor relations between routers.
2. Configure the ping detect group on R2, configure the tracing object(s) of samgr, and
bind the tracing object(s) on the interface gei-0/7/1/8.
Configuration Commands
Run the following commands on R1:
4-6
R1(config)#interface gei-0/0/0/8
R1(config-if)#no shutdown
R1(config-if)#ip address 71.88.1.2 255.255.255.0
R1(config-if)#exit
R1(config)#router ospf 19
R1(config-ospfv2)#router-id 22.22.22.22
R1(config-ospfv2)#network 71.88.1.0 0.0.0.255 area 0
R1(config-ospfv2)#exit
R2(config)#vlan
R2(config-vlan)#interface gei-0/2/1/7.1
R2(config-subvlan-if)#encapsulation-dot1q 1
R2(config-subvlan-if)#exit
R2(config)#router ospf 19
R2(config-ospfv2)#router-id 22.11.11.22
R2(config-ospfv2)#network 71.88.1.0 0.0.0.255 area 0
R2(config-ospfv2)#network 41.52.17.0 0.0.0.255 area 0
R2(config-ospfv2)#exit
R2(config)#detect-group 10
R2(config-detect)#option or
R2(config-detect)#retry-times 3
R2(config-detect)#loop-time 12
R2(config-detect)#time-out 3
R2(config-detect)#detect-list 9 41.52.17.3 41.52.17.2
R2(config-detect)#detect-list 3 19.19.19.1
R2(config-detect)#detect-list 6 200.11.12.101
R2(config-detect)#detect-list 7 30.0.12.3
R2(config-detect)#detect-list 8 100.10.11.201
R2(config-detect)#detect-list 4 1.1.50.1
R2(config-detect)#exit
4-7
R2(config)#samgr
R2(config-samgr)#track abc ping-detect group 10
R2(config-samgr)#exit
R2(config)#interface gei-0/7/1/8
R2(config-if)#track abc
R2(config-if)#exit
R4(config)#vlan
R4(config-vlan)#interface gei-0/0/0/8.1
R4(config-subvlan-if)#encapsulation-dot1q 1
R4(config-subvlan-if)#exit
R4(config)#router ospf 19
R4(config-ospfv2)#router-id 33.33.33.33
R4(config-ospfv2)#network 41.52.17.0 0.0.0.255 area 0
R4(config-ospfv2)#exit
Configuration Verification
Query the status of the tracing object(s) on R2, and you can find that the status of the
tracing object is up. Run the show samgr brief command to check whether there is a
new IP address for a direct routing of the interface gei-0/7/1/8 added in the protocol table,
which is displayed as follows:
R2(config)#show samgr brief
The total of track at this Router is 1.
Track-name Detect-type App-num State
abc ping-detect 1 up
4-8
After disabling the gei-0/2/1/7.1 interfaces using the shutdown command, check whether
the tracing state is down on R2. The direct routes of the gei-0/7/1/8 interfaces will be
removed.
R2#show samgr brief
The total of track at this Router is 1.
Track-name Detect-type App-num State
abc ping-detect 1 L-down
4-9
4-10
On the ZXR10 M6000, EFM monitors the operation state statistics of point-to-point links
directly connected in physical. The EFM monitors the link operation information as much
as possible, such as error rate of frame transmission, comparison of sending rate and
receiving rate on the link, and loss statistics. At the same time, the EFM also detects and
advertises the emergency failure and events of the system, such as system unrecoverable
fault. This ensures the transmission quality on Layer 2 links to some extent, and monitors
the operation state in real time. This is helpful for network administrators to maintain the
network, and reduces the maintenance cost.
EFM Features
The EFM features are as follows:
1. The EFM detects whether the EFM function on the peer device is enabled through its
protocol packets. It interacts with packets to know whether the negotiation procedure
is completed in accordance with the related configurations on two devices.
2. After the negotiation, the EFM collects statistics of link operation information (such as
error frames or symbols) in accordance with the link monitoring in a cycle.
5-1
3. When the number of error frames or symbols exceeds the threshold, the EFM triggers
related event notification to inform the local device and the remote device. In this way,
the network administrators know the operation information of the link.
The EFM can also enable remote loopback function to detect the packet loss caused by
the difference between the local receiving rate and the remote receiving rate or the link
fault.
EFM packets are low-speed protocol packets. The packets cannot be forwarded by
devices. Therefore, the EFM can only be applied on the directly connected device, see
Figure 5-1.
The packets cannot be forwarded across devices. The application environment is simple.
The EFM has accuracy requirements for detection. Two devices send keepalive packets
periodically to each other to keep successful protocol negotiation. Other functions of EFM
can be enabled after the successful negotiation.
When detecting an event, the EFM notifies the peer device through specific packets.
4 ZXR10(config-efm)#set ethernet-oam remote-timeout <value> Configures the time-out time for the
EFM overall loopback control.
Range: 1-10, unit: second, default:
3.
5-2
Parameter Description
<win-value> Window value of error frame. Range: 1-60 seconds, default: 1 second.
5-3
Parameter Description
<win-value> Window value of error symbol. Range: 1-65535 millions, default: 1 million.
Parameter Description
<th-value> Threshold of error frame cycle. Range: 1-65535 millions, default: 1 million.
<win-value> Window value of error frame cycle. Range: 1-65535 millions, default: 1
million.
Parameter Description
<th-value> Threshold of error frames per second. Range: 1-900 frames per second,
default: 1 frame per second.
<win-value> Window value of error frames per second. Range: 1-900 seconds, default:
1 second.
Command Function
ZXR10#debug ethernet-oam {interface < interface-name>| packet interface Sends or receives EFM packets. Run
<interface-name>{dual | in | out} type {all | information| lpbk-ctrl | notify | the no command to disable all enabled
org-spec | reqst-varb | respst-varb} mode {all-time | number <num-value>}} functions.
Parameter Description
5-4
Parameter Description
<num-value> Specifies the number of packets of which the information will be displayed.
Range: 10-500, default: 200.
Parameter Description
discovery The parameter after the interface name used to display the related state
information of the EFM negotiation.
link-monitor The parameter after the interface name used to display the related
information of the EFM link monitoring.
statistics The parameter after the interface name used to display the related
information of the EFM packet statistics, including sent and received packet
statistics of the loopback.
Status:
Parse :forward
Multiplexer :forward
Stable :no
Discovery :undone
Loopback :off
PDU Revision :0
Unidirection :nonsupport
5-5
Remote DTE
-----------
Config:
Mode :passive
Link Monitor :nonsupport
Unidirection :nonsupport
Remote Loopback :nonsupport
Mib Retrieval :nonsupport
PDU max size :1518
Status:
Parse :forward
Multiplexer :forward
Stable :no
Mac Address :0000.0000.0000
PDU Revision :0
5-6
Configuration Flow
1. Configure the EFM function for the interface of R1 connecting to R2 directly, enable
the EFM and link-monitor switch for a specified interface, and then enable the EFM
function globally.
2. Configure the EFM function for the interface of R2 connecting to R1 directly, enable
the EFM and link-monitor switch for a specified interface, and then enable the EFM
function globally.
3. Run the show ethernet-oam discovery command on R1 and R2 to check the EFM con-
nection establishment.
4. Run the show ethernet-oam link-monitor command on R1 and R2 to check the count
of link errors between R1 and R2.
Configuration Command
Run the following commands on R1:
R1#configure terminal
R1(config)#efm
R1(config-efm)#interface gei-0/0/1/1
R1(config-efm-if)#set ethernet-oam function enable
R1(config-efm-if)#set ethernet-oam link-monitor function enable
R1(config-efm-if)#exit
R1(config-efm)#set ethernet-oam oui R1
R1(config-efm)#set ethernet-oam function enable
R1(config-efm)#exit
Configuration Verification
1. Run the show ethernet-oam discovery command on R1 to check the link EFM
negotiation, which is displayed as follows:
R1(config-efm)#show ethernet-oam gei-0/0/1/1 discovery
PortId 32: Ethernet Oam enable
Local DTE
----------
Config:
Mode :active
5-7
Remote DTE
-----------
Config:
Mode :active
Link Monitor :support
Unidirection :nonsupport
Remote Loopback :support
Mib Retrieval :nonsupport
PDU max size :1518
5-8
Status:
Parse :forward
Multiplexer :forward
Stable :yes
Discovery :done
Loopback :off
PDU Revision :0
Unidirection :nonsupport
Remote DTE
-----------
Config:
Mode :active
Link Monitor :support
Unidirection :nonsupport
Remote Loopback :support
Mib Retrieval :nonsupport
PDU max size :1518
Status:
Parse :forward
Multiplexer :forward
5-9
Stable :yes
5-10
Configuration Flow
1. Configure the EFM function for the interface of R1 connecting to R2 directly, and enable
the EFM function globally.
2. Configure the EFM function for the interface of R2 connecting to R1 directly, and en-
able the EFM function globally.
3. After the EFM connection is established on R1 and R2, enable remote loopback for
R1.
4. Run the show ethernet-oam discovery command on R1 and R2 to check the EFM
connection establishment.
Configuration Command
Run the following commands on R1:
R1#configure terminal
R1(config)#efm
R1(config-efm)#interface gei-0/0/1/1
R1(config-efm-if)#set ethernet-oam function enable
R1(config-efm-if)#set ethernet-oam link-monitor function enable
R1(config-efm-if)#exit
R1(config-efm)#set ethernet-oam oui R1
R1(config-efm)#set ethernet-oam function enable
R1(config-efm)#exit
After the EFM connection is established, enable remote loopback for R1:
R1#configure terminal
R1(config)#efm
R1(config-efm)#interface gei-0/0/1/1
R1(config-efm-if)#set ethernet-oam rmt-loopback start
5-11
R1(config-efm-if)#exit
R1(config-efm)#exit
Configuration Verification
On the link where the EFM connection is established, R1 sends packets to R2 except OAM
Protocol Data Units (OAMPDUs). When R2 receives these packets, it will loop them back
to R1 directly.
5-12
l Fault detection: An MEP sends and receives Continuity Check Messages (CCMs)
periodically to detect the connectivity of the network. It can discover connectivity
failures and non-consensual connectivity (situations of wrong connections).
l Fault confirmation and isolation: This function belongs to the management behavior.
Network administrators confirm the faults through Loopback Messages (LBMs) or
Loopback Replies (LBRs), and then isolate the faults.
6-1
l Path discovery: An MEP uses Linktrace Messages (LTMs) or Linktrace Replies (LTRs)
to discover paths and trace the path from an MEP to another MEP or the path between
Maintenance domain Intermediate Points (MIPs).
CFM Features
The CFM can check, isolate, and report connectivity faults in VLANs effectively.
To manage and maintain the network, network administrators make a plan for the network
services and levels, and divide the entire network into several MDs. For the sketch map
of an MD, see Figure 6-1.
A series of ports are defined for the edge devices and the internal device, see Figure 6-1.
l The gray points on the edge devices are the services ports connecting to devices
outside the domain. These points are defined as MEPs.
l The black points on the devices (including the internal device) are ports connecting to
devices inside the domain. These points are defined as MIPs.
The management function is implemented through the MEPs and MIPs.
A network can be divided into user domain, provider domain, and operator domain. Each
domain is specified to a level. There are levels from 0 to 7. The level of a domain decides
the inclusion relation of domains. A domain of a higher level may include domains of lower
levels. However, a domain of a lower level cannot include a domain of a higher level. The
domains of the same level cannot include each other. Therefore, the domain of the largest
range has the highest level. The inclusion relation of domains can be tangent (internally
tangent or externally tangent) and inclusive, but it cannot be intersecting.
6-2
6-3
12 ZXR10(config-cfm-ma)#set mep <mepid> ccm-send {enable|disable} Enables or disables tthe CCM packet
sending function in an MEP. It is only
effective in the local MEP.
13 ZXR10(config-cfm-ma)#set mep <mepid> alarm-lowest-pri Configures the lowest fault class that
<priority> can trigger alarms in an MEP.
Range: 1-5, default: 2.
15 ZXR10#cfm linktrace md <md-index> ma <ma-index> local-mep < Sends LTMs. By default, the time-out
mepid><mac-address>[timeout <second>][ttl <value>] is 10, and the TTL is 64.
Parameter Description
<mepid > MEP ID. Range: 1-8191. The ID of the local MA including the MEP should
be different.
<lmepid> Local MEP ID. Range: 1-8191. It identifies the local MEP that has been
created in the MA, and establishes the relationship between the remote
MEP and the local MEP.
Parameter Description
<mepid > MEP ID. Range: 1-8191. It sets a local MEP or a remote MEP.
Parameter Description
<mepid> Local MEP ID. Range: 1-8191. It is a unique identification for a local MEP
in an MA.
6-4
Parameter Description
size <length> Length of Data TLV field in an LBM. Range: 1-400, default: 0.
timeout <second> Interval of LBM time-out. Range: 1-10 seconds, default: 5 seconds.
Parameter Description
<mepid> Local MEP ID. Range: 1-8191. It is a unique identification for a local MEP
in an MA.
timeout <second> Interval of LTR time-out. Range: 5-10 seconds, default: 10 seconds.
ttl <value> The maximum hops that LTMs can be forwarded. Range: 1-128, default:
64.
Command Function
ZXR10#show cfm mp {<mpid>|all} md <md-index> ma <ma-index> Displays the detailed configuration and state
information of a specific MP.
The following is sample output from the show cfm md all command:
ZXR10#show cfm md all
MD index 1
name format/name: 2(Base string)/vcxzbbdz
level: 1
contain MA numbers: 30
MD index 2
6-5
contain MA numbers The number of MAs that have been created in the current MD.
The following is sample output from the show cfm ma all md 8 command:
ZXR10#show cfm ma all md 8
MA index 2
name-format/name: 2(Char string)/a2
belong to MD: 8
time interval: 3.3ms
vid list: no vids
contain MEP numbers: 4
contain MEP numbers The number of MEPs (including local MEP and RMEP) that have been
created in an MA.
6-6
Configuration Flow
1. Create MDs and MAs with the same name and the same ID on R1 and R2, and enable
CFM globally.
2. Create local MEPs with the same level for the directly-connected interfaces of R1 and
R2, use the peer MAC and MEP ID to create RMEPs for R1 and R2, enable local MEP
and CCM to send packets, and enable RMEP.
3. Run the show cfm mp command on R1 and R2 to check the MEP identification bit and
the CFM connection establishment between R1 and R2.
Configuration Command
Run the following commands on R1:
R1(config)#cfm
R1(config-cfm)#set cfm enable
R1(config-cfm)#create md index 1 name-format 2 name MD1 level 4
R1(config-cfm)#md index 1
R1(config-cfm-md)#create ma index 1 name-format 2 name MA1
R1(config-cfm-md)#ma index 1
R1(config-cfm-ma)#create mep mepid 1 direction down interface gei-0/2/0/6
R1(config-cfm-ma)#set ccminterval 1 /*fast detection*/
R1(config-cfm-ma)#set mep 1 state enable
R1(config-cfm-ma)#set mep 1 ccm-send enable
R1(config-cfm-ma)#create rmep mepid 2 remote-mac 00ee.efab.ede3 lmep 1
R1(config-cfm-ma)#set mep 2 state enable
6-7
Configuration Verification
1. Run the show cfm mp all md 1 ma 1 command on R1 to check the link information,
which is displayed as follows:
R1#show cfm mp all md 1 ma 1
MP type: local mep
Direction : down
MEPID : 1
Level : 4
Primary Vlan : 0
Admin state : enable
CCM send state : enable
CCM interval : 3.3ms
LowestAlarmPriority : 2
AIS disable, LCK disable, AIS/LCK period 1s.
LM disable
DM disable
PresentRDI : 0 /*Local RDI is 0.*/
MAdefect indication : 0
Assign port : gei-0/2/0/6
TotalSendCCMs : 49097
TotalRcvdCCMs : 10461
RightRcvdCCMs : 10461
DiscardCCMs : 0
DefErrorCCMs : 0
DefXconCCMs : 0
TotalSendLBMs : 0
TotalRcvdLBMs : 0
TotalSendLBRs : 0
TotalRcvdLBRs : 0
6-8
R1#
2. Run the show cfm mp all md 1 ma 1 command on R2 to check the link information,
which is displayed as follows:
R2#show cfm mp all md 1 ma 1
MP type: local mep
Direction : down
MEPID : 2
Level : 4
Primary Vlan : 0
Admin state : enable
CCM send state : enable
CCM interval : 3.3ms
LowestAlarmPriority : 2
AIS disable, LCK disable, AIS/LCK period 1s.
LM disable
DM disable
PresentRDI : 0 /*Local RDI is 0.*/
MAdefect indication : 0
Assign port : gei-0/2/0/3
TotalSendCCMs : 81644
TotalRcvdCCMs : 76092
RightRcvdCCMs : 76092
DiscardCCMs : 0
DefErrorCCMs : 0
DefXconCCMs : 0
TotalSendLBMs : 0
TotalRcvdLBMs : 0
TotalSendLBRs : 0
TotalRcvdLBRs : 0
6-9
R2#
Configuration Flow
1. Create MDs and MAs with the same name and the same ID for CE1, PE1, PE2 and
CE2.
2. Set the interfaces on CE1 and CE2 as a CFM connectivity detection group, and enable
alarm on CE1 and CE2. For the configuration, refer to the configuration example of
CFM Fast Connectivity Detection.
3. Configure MIPs on the interfaces of PE1 and PE2 on the public network side and the
AC side, and enable the CFM function globally.
4. Configure CE1 to execute CFM linktrace and CFM loopback towards MIPs and MEPs
on PE1, PE2, and CE2, and check the link connectivity.
Configuration Command
Run the following commands on CE1:
CE1(config)#cfm
CE1(config-cfm)#set cfm enable
6-10
6-11
PE2#configure terminal
PE2(config)#cfm
PE2(config-cfm)#set cfm enable
PE2(config-cfm)#create md index 1 name-format 2 name MD1 level 4
PE2(config-cfm)#md index 1
PE2(config-cfm-md)#create ma index 1 name-format 2 name MA1
PE2(config-cfm-md)#ma index 1
PE2(config-cfm-ma)#create mip session-id 1 interface gei-0/1/1/2
PE2(config-cfm-ma)#create mip session-id 2 interface gei-0/2/0/1
PE2(config-cfm-ma)#end
Configuration Verification
The CE1 executes CFM linktrace (trace) and CFM loopback (ping) towards PE1, PE2 and
CE2. If the link is normal, the responses of the operations (trace and ping) are correct.
If the link becomes faulty from normal state, CFM alarms will generate on both CE1 and
CE2. The operations (trace and ping) executed by CE2 towards CE1 are shown below.
CE2#cfm loopback md 1 ma 1 local-mep 1 type unicast
0016.1514.1312
Sending 3 loopback messages to 0016.1514.1312,timeout is 5 seconds.
6-12
The BFD provides a solution to the above problem. The BFD protocol can detect failures
on any types of paths between adjacent systems, including direct-connected physical link,
virtual circuit, tunnel, MPLS LSP, multi-hop routing channel, and indirect-connected tunnel.
Because of its simplicity and unitary, BFD can focus on fast detection of forwarding failures.
It helps networks to implement transmission of voice, video, and other services with good
Quality of Service (QoS), thus helps service providers to provide real-time services (such
as Voice over Internet Protocol (VoIP)) on the basis of IP network.
BFD Features
The BFD is a simple Hello protocol. It is similar to the Hello mechanisms of routing
protocols. The BFD is simpler and universal. The two systems that establish a BFD
session send packets to each other periodically. If one system does not receive any
packet from the peer in a specific period, it considers that there is a failure on the
communication path. The BFD session will be down, and the BFD will inform the upper
layer protocol to select another path. To reduce the loads of devices, some special
application modes are designed in the BFD. In these modes, devices can reduce the
number of BFD packets sent to the peers; or it is unnecessary for the devices to send
BFD packets periodically. The devices can send the packets only when it is necessary.
The BFD protocol aims at fast failure detection (including failures on interfaces, data
links, and even forwarding engines) on a bidirectional tunnel between forwarding engines.
Another aim is to provide a single detection mechanism that can be applied to any type of
medium and any protocol layer. BFD detects failures in the forwarding engines between a
device and the next hop. It is likely to work in some parts of a system forwarding engine.
7-1
The forwarding engine and the control engine are isolated. This not only binds the
protocol to the forwarding plane, but also isolates the protocol from the routing protocol
engine (control plane). Therefore, BFD can take effect in non-interrupt forwarding and
run in the control engine.
The BFD provides failure detection between systems, including directly connected physical
links, virtual links, tunnels, MPLS LSPs, and multi-hop routing paths.
Parameter Description
<src-ip-address> Establishes the source address for the session (It must be the local
address).
<dst-ip-address> Establishes the destination address for the session (It is not limited
to the directed address).
<interface-name> Specifies the egress interface for the session. (If the egress interface
is not specified, the packet may be sent locally instead of to the
egress interface.)
7-2
Parameter Description
<interval> The interval to send detection packes. Range: 10–990, unit: ms.
<min-rx-interval> The interval to receive detection packets. Range: 10–990, unit: ms.
Command Function
Parameter Description
globle The next-hop of a specific public network for the private network.
This parameter and thebfd enable parameter are mutually exclusive.
During the static route configuration, you need to confirm the unique link to the destination
end, and run the bfd enable command to enable the BFD detection function for this link.
7-3
2 ZXR10(config-ospfv2)#bfd [area <area-id >] Enables the BFD function for all interfaces,
or enables the BFD function for all
interfaces in a specified area.
It is allowed to enable the BFD function for all interfaces in OSPF route configuration mode,
or enable the BFD function for all interfaces bounded to a specified area, or enter OSPF
interface configuration mode to enable the BFD function for current interfaces.
Enable the BFD function on an interface that runs the IS-IS protocol. When the interface
establishes the IS-IS neighbor relationship with a remote interface, the BFD session based
on IS-IS is established on the directly-connected link between this pair of interfaces.
1 ZXR10(config)#router bgp <as-number> Configures the BGP module for the router.
7-4
1 ZXR10(config)#mpls ldp instance <1-65535>[vrf <vrf-name>] Enables LDP to establish an LSP along
with the ordinary hop-by-hop routes and
enters LDP configuration mode.
It is only necessary to configure LDP BFD unidirectionally. After the remote address of the
LSP is specified, the BFD session in the reverse direction will be established automatically.
Parameter descriptions in Step 2 are as follows:
Parameter Description
<IP address> The source LSP address that is used for establish the BFD. In
general, it is the address of the local LDP.
Command Function
Command Function
ZXR10(config-mpls-te-if)#tunnel mpls traffic-eng bfdinterval Enables tunnel lsp BFD in tunnel interface mode
<interval> min_rx <min-rx> multiplier <multiplier> of MPLS-TE.
7-5
Parameter Description
<interval> The minimum interval to send specified BFD control packets. Range:
10 to 990 milliseconds.
Command Function
Parameter Description
Command Function
ZXR10#debug bfd packet Displays the brief information of packets sent and received
during the BFD session establishment.
ZXR10#debug bfd event Displays the state information change of the BFD session
during BFD session establishment.
ZXR10#debug bfd byte Displays the information of the packets (packets in the
UDP data area) sent and received during the BFD session
establishment.
ZXR10#show bfd neighbors ip detail Displays the detailed information of the IP-type BFD
session.
ZXR10#show bfd neighbors ip brief Displays the brief information of IP-type BFD session.
ZXR10#show bfd neighbors ldp brief Displays the brief information of LDP-type BFD session.
ZXR10#show bfd neighbors ldp detail Displays the detailed information of LDP-type BFD session.
ZXR10#show bfd neighbors rsvp brief Displays the brief information of RSVP-type BFD session.
7-6
Command Function
ZXR10#show bfd neighbors rsvp detail Displays the detailed information of RSVP-type BFD
session.
Configuration Planning
1. Run the IS-IS protocol between R1 and R2.
2. Enable the BFD function for interfaces of R1 and R2
Configuration Command
Run the following commands on R1:
R1(config)#interface xgei-0/5/0/3
R1(config-if)#ip address 172.20.130.213 255.255.255.252
R1(config-if)#exit
R1(config)#router isis
R1(config-isis)#area 49.0172
R1(config-isis)#system-id 0020.0096.0001
R1(config-isis)#interface xgei-0/5/0/3
R1(config-isis-if)#ip router isis
R1(config-isis-if)#bfd-enable
R1(config-isis-if)#end
R2(config)#interface xgei-0/0/0/3
R2(config-if)#ip address 172.20.130.214 255.255.255.252
R2(config-if)#exit
R2(config)#router isis
7-7
R2(config-isis)#area 49.0172
R2(config-isis)#system-id 0020.0096.0002
R2(config-isis)#interface xgei-0/0/0/3
R2(config-isis-if)#ip router isis
R2(config-isis-if)#bfd-enable
R2(config-isis-if)#end
Configuration Verification
After the configuration, an IS-IS BFD session should be established successfully. Run the
following command to check the configuration results.
Run the show bfd neighbors [ip brief|ip detail] command to check whether the IS-IS BFD
configuration takes effect.
Check the IS-IS BFD configuration on R1, which is displayed as follows:
Interface: xgei-0/5/0/3
Instance Name:
Minpktlen: 0 Maxpktlen: 0
Vpnid:0 Vrf name:
===========================================================================
7-8
Configuration Flow
1. Run the OSPF protocol between R1 and R2.
2. Enable the BFD function for interfaces of R1 and R2
Configuration Command
Run the following commands on R1:
R1(config)#interface xgei-0/5/0/3
R1(config-if)#ip address 172.20.130.213 255.255.255.252
R1(config-if)#exit
R1(config)#router ospf 1
R1(config-ospfv2)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
R1(config-ospfv2)#bfd area 0
R1(config-ospfv2)#end
Configuration Verification
After the configuration, an OSPF BFD session should be established successfully. Run
the following command to check the configuration result.
Run the show bfd neighbors [ip brief|ip detail] command to check whether the OSPF BFD
configuration takes effect.
Check the OSPF BFD configuration on R1, which is displayed as follows:
R1(config)#show bfd neighbors ip brief
7-9
Interface: xgei-0/5/0/3
Instance Name:
Minpktlen: 0 Maxpktlen: 0
Vpnid:0 Vrf name:
============================================================================
Configuration Flow
1. Run the BGP protocol between R1 and R2.
7-10
Configuration Command
Run the following commands on R1:
R1(config)#interface xgei-0/5/0/3
R1(config-if)#ip address 172.20.130.213 255.255.255.0
R1(config-if)#exit
R1(config)#router bgp 18004
R1(config-bgp)#neighbor 172.20.130.214 remote-as 18004
R1(config-bgp)#neighbor 172.20.130.214 fall-over bfd
R1(config-bgp)#exit
Configuration Verification
After the configuration, a BGP BFD session should be established successfully. Run the
following command to check the configuration result.
Run the show bfd neighbors [ip brief|ip detail] command to check whether the BGP BFD
configuration takes effect.
Check the configuration result on R1, which is displayed as follows:
R1#show bfd neighbors ip brief
LocalAddr PeerAddr LD RD Hold State Interface
172.20.130.213 172.20.130.214 4097 4097 150 UP xgei-0/5/0/3
R1#show bfd neighbors ip detail
--------------------------------------------------------------------------
LocalAddr: 172.20.130.213
PeerAddr : 172.20.130.214
Local Discr: 4097 Remote Discr: 4097 State: UP
Interface: xgei-0/5/0/3
Instance Name:
7-11
Minpktlen: 0 Maxpktlen: 0
Vpnid:0 Vrf Name:
==========================================================================
Configuration Flow
1. Configure routing protocols.
2. Enable the BFD function for protocol interfaces or a specific destination route.
Configuration Command
Run the following commands on R1:
R1(config)#interface gei-0/2/1/1
R1(config-if)#ip address 100.1.1.1 255.255.255.0
R1(config-if)#exit
R1(config)#interface loopback1
R1(config-if)#ip address 1.1.1.211 255.255.255.255
R1(config-if)#exit
R1(config)#router ospf 1
R1(config-ospfv2)#network 100.1.1.0 0.0.0.255 area 0
7-12
Configuration Verification
After the configuration, a BGP BFD session should be established successfully. Run the
following command to check the configuration result.
Run the show bfd neighbors [ip brief | ip detail | ldp-brief | ldp-detail | rsvp-brief | rsvp-detail]
command to check whether the BGP BFD configuration takes effect.
Check the single-hop configuration result on R1, which is displayed as follows:
R1#show bfd neighbors ip brief
7-13
Interface: ---
Instance Name:
Minpktlen: 0 Maxpktlen: 0
Vpnid:0 Vrf Name:
============================================================================
Configuration Flow
1. Run the static route protocol between R1 and R2.
7-14
Configuration Command
Run the following commands on R1:
R1(config)#interface xgei-0/5/0/3
R1(config-if)#ip address 172.20.130.213 255.255.255.252
R1(config-if)#exit
R1(config)#interface loopback1
R1(config-if)#ip address 172.20.96.1 255.255.255.255
R1(config-if)#exit
R1(config)#ip route 172.20.108.1 255.255.255.255 172.20.130.214 bfd enable
Configuration Verification
After the configuration, a static route BFD session should be established successfully. Run
the following command to check the configuration result.
Run the show bfd neighbors [ip brief|ip detail] command to check whether the static route
BFD configuration takes effect.
Check the static route BFD configuration on R1, which is displayed as follows:
R1(config)#show bfd neighbors ip brief
LocalAddr PeerAddr LD RD Hold State Interface
172.20.130.213 172.20.130.214 5 32 150 UP ---
Interface: ---
Instance Name:
Local Diag: 0 Demand mode: 0 Poll bit: 0
MinTxInt: 50 MinRxInt: 50 Multiplier: 3
Received MinRxInt: 50 Received Multiplier: 3 Holdown : 150
Rx Count: 209 Rx Interval (ms) min/max/avg: 39 /40 /40
7-15
Minpktlen: 0 Maxpktlen: 0
Vpnid:0 Vrf name:
============================================================================
Configuration Flow
1. Configure the LDP between R1 and R2.
2. Set the IP addresses on the loopback interfaces as the LSR Router-IDs.
3. Enable MPLS hop-by-hop forwarding on the links between R1 and R2.
4. Set R1 as the active party and configure an LDP BFD session on R1.
Configuration Command
Run the following commands on R1:
R1(config)#interface xgei-0/5/0/3
R1(config-if)#ip address 172.20.130.213 255.255.255.252
R1(config-if)#exit
R1(config)#interface loopback1
R1(config-if)#ip address 172.20.96.1 255.255.255.255
R1(config-if)#exit
R1(config)#router ospf 1
R1(config-ospfv2)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
7-16
Configuration Verification
After the configuration, an LDP BFD session should be established successfully. Run the
following command to check the configuration result.
Run the show bfd neighbors [ldp brief|ldp detail] command to check whether the LDP BFD
configuration takes effect.
Check the LDP BFD configuration on R1, which is displayed as follows:
R1(config)#show bfd neighbors ldp brief
PeerAddr PrefixLen LD RD Hold State Interface
172.20.108.1 32 6 34 150 UP ---
7-17
Configuration Flow
1. Configure the static single-hop BFD on R1.
2. Configure the static route BFD on R2.
Configuration Command
Run the following commands on R1:
R1(config)#interface xgei-0/5/0/3
R1(config-if)#ip address 172.20.130.213 255.255.255.252
R1(config-if)#exit
R1(config)#interface loopback1
R1(config-if)#ip address 172.20.96.1 255.255.255.255
R1(config-if)#exit
R1(config)#bfd
R1(config-bfd)#session test link-bfd ipv4 172.20.130.213 172.20.130.214
interface xgei-0/5/0/3
R1(config-bfd-session-test)#active
7-18
Configuration Verification
After the configuration, a static single-hop BFD session on R1 and a static route BFD
session on R2 should be established successfully. Run the following command to check
the configuration results.
Run the show bfd neighbors [ip brief|ip-detail] command to check whether the static
single-hop BFD configuration and static route BFD take effect.
Check the single-hop BFD configuration on R1, which is displayed as follows:
R1#show bfd neighbors ip brief
LocalAddr PeerAddr LD RD Hold State Interface
172.20.130.213 172.20.130.214 1 58 150 UP xgei-0/5/0/3
Interface: xgei-0/5/0/3
Instance Name:test
---------------------------------------------------------------------------
Local Diag: 0 Demand mode: 0 Poll bit: 0
MinTxInt: 50 MinRxInt: 50 Multiplier: 3
Received MinRxInt: 50 Received Multiplier: 3 Holdown : 150
Rx Count: 5448 Rx Interval (ms) min/max/avg: 47 /48 /48
Tx Count: 5685 Tx Interval (ms) min/max/avg: 46 /46 /46
Registered protocols: INSTANCE
Uptime: 0 DAY,0 HOUR,4 MINUTE
Last packet: Version: 1 Diagnostic: 0
Demand bit: 0 Poll bit: 0 Final bit: 1
Multiplier: 3 Length: 24
My Discr: 1 Your Discr: 58
Min tx interval: 50 Min rx interval: 50 Min Echo interval: 0
Minpktlen: 0 Maxpktlen: 0
Vpnid:0 Vrf name:
=============================================================================
7-19
Check the static route BFD configuration on R2, which is displayed as follows:
R2#show bfd neighbors ip brief
LocalAddr PeerAddr LD RD Hold State interface
172.20.130.214 172.20.130.213 58 1 150 UP xgei-0/0/0/3
Interface: xgei-0/0/0/3
Instance Name:
7-20
Configuration Flow
1. Configure the static multi-hop BFD on R1.
2. Configure the BGP multi-hop BFD on R3.
Configuration Command
Run the following commands on R1:
R1(config)#interface xgei-0/5/0/1
R1(config-if)#ip address 172.20.130.18 255.255.255.252
R1(config-if)#exit
R1(config)#interface loopback1
R1(config-if)#ip address 172.20.96.1 255.255.255.255
R1(config-if)#exit
R1(config)#router ospf 1
R1(config-ospfv2)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
R1(config-ospfv2)#network 172.20.96.1 0.0.0.0 area 0.0.0.0
R1(config-ospfv2)#exit
R1(config)#router bgp 18004
R1(config-bgp)#neighbor 172.20.108.2 remote-as 18004
R1(config-bgp)#neighbor 172.20.108.2 update-source loopback1
R1(config-bgp)#exit
R1(config)#bfd
R1(config-bfd)#session test peer-bfd ipv4 172.20.96.1 172.20.108.2
R1(config-bfd-session-test)#commit
R1(config-bfd-session-test)#end
7-21
R3(config)#interface loopback1
R3(config-if)#ip address 172.20.108.2 255.255.255.255
R3(config-if)#exit
R3(config)#router ospf 1
R3(config-ospfv2)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
R3(config-ospfv2)#network 172.20.108.2 0.0.0.0 area 0.0.0.0
R3(config-ospfv2)#exit
R3(config)#router bgp 18004
R3(config-bgp)#neighbor 172.20.96.1 remote-as 18004
R3(config-bgp)#neighbor 172.20.96.1 update-source loopback1
R3(config-bgp)#neighbor 172.20.96.1 fall-over bfd
R3(config-bgp)#exit
Configuration Verification
After the configuration, a static multi-hop BFD session on R1 and a BGP multi-hop BFD
session on R3 should be established successfully. Run the following command to check
the configuration results.
Run the show bfd neighbors [ip-brief|ip-detail] command to check whether the static
single-hop BFD configuration and BGP multi-hop BFD configuration take effect.
Check the static single-hop BFD configuration on R1, which is displayed as follows:
R1(config)#show bfd neighbors ip brief
LocalAddr PeerAddr LD RD Hold State Interface
172.20.96.1 172.20.108.2 6 1 150 UP ---
Interface: ---
Instance Name:test
7-22
Check the BGP multi-hop BFD configuration on R3, which is displayed as follows:
R3(config)#show bfd neighbors ip brief
LocalAddr PeerAddr LD RD Hold State Interface
172.20.108.2 172.20.96.1 1 6 150 UP ---
Interface: ---
Instance Name:
7-23
Configuration Flow
1. Establish an IS-IS TE tunnel between R1 and R2.
2. Enable the BFD function for the RSVP-TE interfaces on R1 and R2.
Configuration Command
Run the following commands on R1:
R1(config)#interface xgei-0/5/0/3
R1(config-if)#ip address 172.20.130.213 255.255.255.252
R1(config-if)#exit
R1(config)#router isis
R1(config-isis)#area 49.0172
R1(config-isis)#system-id 0020.0096.0001
R1(config-isis)#metric-style wide
R1(config-isis)#mpls traffic-eng router-id loopback1
R1(config-isis)#mpls traffic-eng level-2
R1(config-isis)#interface xgei-0/5/0/3
R1(config-isis-if)#ip router isis
R1(config-isis-if)#end
R1(config)#interface te_tunnel1
R1(config-if)#ip unnumbered loopback1
R1(config-if)#ex
R1(config)#mpls traffic-eng
R1(config-mpls-te)#tunnel te_tunnel 1
R1(config-mpls-te-if)#tunnel destination ipv4 172.20.108.1
R1(config-mpls-te-if)#tunnel mpls traffic-eng path-option 1 dynamic
R1(config-mpls-te-if)#tunnel mpls traffic-eng fast-reroute facility
R1(config-mpls-te-if)#exit
R1(config-mpls-te)#interface xgei-0/5/0/3
R1(config-mpls-te-if)#bfd
7-24
Configuration Verification
After the configuration, a session of RSVP interface on R1 should be established
successfully. Run the following commands to check the configuration result.
Run the show bfd neighbors [ip-brief|ip-detail] command to check whether the BFD
configuration of the RSVP interface takes effect.
Check the BFD configuration for RSVP interface on R1, which is displayed as follows:
Interface: xgei-0/5/0/3
Instance Name:
Minpktlen: 0 Maxpktlen: 0
7-25
Configuration Flow
1. Enable the OSPF-TE function among R1, R2 and R3.
2. Configure a hot standby tunnel on R1 (R1-R3-R2) and configure BFD on the tunnel.
Configuration Command
Run the following commands on R1:
R1(config)#interface fei-0/5/0/4
R1(config-if)#ip address 54.1.1.1 255.255.255.0
R1(config-if)#exit
R1(config)#interface fei-0/5/0/7
R1(config-if)#ip address 57.1.1.1 255.255.255.0
R1(config-if)#exit
R1(config)#interface loopback10
R1(config-if)#ip address 10.10.10.1 255.255.255.255
R1(config-if)#exit
R1(config)#router ospf 100
R1(config-ospfv2)#network 54.1.1.0 0.0.0.255 area 0
R1(config-ospfv2)#network 57.1.1.0 0.0.0.255 area 0
R1(config-ospfv2)#network 10.10.10.1 0.0.0.0 area 0
R1(config-ospfv2)#mpls traffic-eng area 0
7-26
R1(config)#mpls traffic-eng
R1(config-mpls-te)#interface fei-0/5/0/4
R1(config-mpls-te-if)#exit
R1(config-mpls-te)#interface fei-0/5/0/7
R1(config-mpls-te-if)#exit
R1(config-mpls-te)#tunnel te_tunnel 1
R1(config-mpls-te-if)#tunnel destination ipv4 10.10.10.2
R1(config-mpls-te-if)#tunnel mpls traffic-eng path-option 1
explicit-path identifier 1
R1(config-mpls-te-if)#tunnel mpls traffic-eng hot
R1(config-mpls-te-if)#tunnel mpls traffic-eng bfd interval 30 min-rx 30
multiplier 5
R1(config-mpls-te-if)#exit
R1(config-mpls-te)#explicit-path identifier 1 next-address 54.1.1.3 strict
R1(config-mpls-te)#explicit-path identifier 1 next-address 115.1.1.2 strict
7-27
R3(config)#interface fei-0/1/1/4
R3(config-if)#ip address 54.1.1.3 255.255.255.0
R3(config)#interface fei-0/1/1/5
R3(config-if)#ip address 115.1.1.3 255.255.255.0
R3(config-if)#exit
R3(config)#interface loopback10
R3(config-if)#ip address 10.10.10.3 255.255.255.255
R3(config-if)#exit
R3(config)#router ospf 100
R3(config-ospfv2)#network 115.1.1.0 0.0.0.255 area 0
R3(config-ospfv2)#network 54.1.1.0 0.0.0.255 area 0
R3(config-ospfv2)#network 10.10.10.3 0.0.0.0 area 0
R3(config-ospfv2)#mpls traffic-eng area 0
R3(config-ospfv2)#mpls traffic-eng router-id loopback10
R3(config-ospfv2)#exit
R3(config)#mpls traffic-eng
R3(config-mpls-te)#interface fei-0/1/1/4
R3(config-mpls-te-if)#exit
R3(config-mpls-te)#interface fei-0/1/1/5
R3(config-mpls-te-if)#exit
Configuration Verification
After the configuration, the tunnel1 on R1 is in Up status and a hot standby tunnel is
generated. The relation of the hotstandby is ready. The RSVP LSP BFD session on R1
should be established successfully. If the link between R3 and R2 is invalid, LSP BFD
becomes Down and then becomes Up, and the traffic is switched over to the hot standby
tunnel.
Run the show bfd neighbors [rsvp-brief|rsvp-detail] command to check whether the RSVP
interface BFD configuration takes effect.
Check the tunnel on R1, which is displayed as follows:
R1(config)#show mpls traffic-eng tunnels brief
Signalling Summary:
LSP Tunnels Process: running
RSVP Process: running
Forwarding: enabled
TUNNEL NAME DESTINATION UP IF DOWN IF STATE/PROT
tunnel_1 10.10.10.2 - fei-0/5/0/4 up/up
tunnel_1(hot) 10.10.10.2 - fei-0/5/0/7 up/up
Check the BFD configuration of the RSVP interface on R1, which is displayed as follows:
7-28
/*When the R3-R2 link is invalid, the tunnel hotstandby relation is active.
RSVP LSP BFD is Down.*/
R1(config-mpls-te)#show mpls traffic-eng hot-standby
Primary Lsp Pri_out intf/label Hot-standby Lsp Hot_out intf/label Status
(100,12) fei-0/5/0/4:147456 (100,13) fei-0/5/0/7:0 active
7-29
7-30
8-1
3. The time that is used to take the corresponding responses to the invalid node and
link. The response includes triggering and flooding the new link state, and updating
packets. Normally it is several milliseconds to tens of milliseconds.
4. The time that is used to notice other nodes in network that the local router link is invalid.
Normally it is tens of milliseconds to a hundred seconds normally on each node.
5. The time that is used to recalculate the triggering route. For Interior Gateway Protocol
(IGP) protocols that use Dijkstra algorithm, the time is tens of milliseconds.
6. The time that is used to interact with line interface cards to calculate the new routing
information and form the new forwarding table. The time varies in accordance with the
number of routing entries. Normally it is several hundred milliseconds.
7. The time that is used to load the new forwarding route entries into hardware. Normally
it is tens of milliseconds.
The traffic loss may occur in the above mentioned steps. The traffic loss can be divided
into two stages, including:
1. Stage 1: The router fails to discover the invalid link immediately, and it still forwards
the traffic to the invalid link.
2. Stage 2: The route discovers the invalid link, but the network is in convergence
process. The local forwarding table is different with that of other routers, which
causes “micro-loop” in forwarding plane.
To shorten the traffic interruption duration, a mechanism must be provided to implement
the following functions:
1. Discover the invalid link quickly.
2. When the link is invalid, provide a recovery path quickly.
3. Prevent forwarding “micro-loop” during the further recovery process.
Work Flow
The working procedure of IP FRR is as follows:
1. Detect faults quickly: The common technologies include BFD, and physical signal test.
2. Modify the forwarding plane: Hand over the traffic to the recalculated backup path.
3. Perform route re-convergence.
4. After finishing the re-convergence, hand over the route to the optimal path.
Obviously, the backup path is to fill the FRR gap, which hands over the traffic to the backup
next hop, to guarantee that the service will not be interrupted.
There are some conditions to form the OSPF FRR or IS-IS FRR relationship. To form
the FRR relationship of default LFAs test mode, the algorithm should meet the condition
Distance_opt (Ni, D) < Distance_opt (Ni, S) + Distance (S, D). That is, the distance from
the next hop on the backup link to the destination should be shorter than the sum of the
distance from the next hop on the backup link to the source node and the distance from
the source node on the primary link to the destination node.
8-2
To form the FRR relationship of down-stream-path mode, the algorithm should meet the
condition Distance_opt (Ni, D) < Distance (S, D). That is, the distance from the next hop
on the backup link to the destination should be shorter than that from the source node on
the primary link to the destination node.
The establishment of BGP FRR relationship is relatively simpler. It only needs two different
next hops to the same destination.
As shown above, there are three links from CE1 to CE2 (not considering PE3), including
PE1>PE2>CE2, PE1>PE4>CE2, and PE1>PE4>PE2>CE2.
When the link between PE1 and PE2 is faulty, TE /LDP FRR will be triggered to switch
the link (external switchover). However, for VPN FRR, the nexthop is PE2, and the link
between PE1 and PE2 is reachable (Before the TE /LDP FRR switchover, the link is from
PE1 to PE2. After the TE /LDP FRR switchover, the link is from PE1 to PE4 an then to
PE2). The relationship of VPN FRR is not changed, so the switchover is not required.
(VPN FRR and TE /LDP FRR share the same egress, so the internal VPN FRR supports
only BFD perceptive switchover instead of the port switchover in nested mode.
When PE2 is faulty, the VPN FRR switchover happens (internal switchover) when the
link PE1>PE4>PE2 is unreachable, and the link PE1>PE4 is reachable. In this case, the
multiple link protection, and multiple switchover are implemented.
8-3
The FRR switchover is the same as “VPN FRR + TE/LDP FRR application scene”.
IP FRR+TE FRR
The IP FRR is formed among PE1, PE2, and PE3, and TE FRR is formed between PE1
and PE2. IP FRR protects the node fault, and TE/LDP FRR protects the link fault. For the
network structure, see Figure 8-2.
8-4
2. Modify the forwarding plane and hand over the traffic to the prepared backup path.
3. Converge the route again.
4. After the route convergence, the traffic will be handed over to the optimization path.
The backup path is to fill the route convergence gap. It ensures the continuity of the service
by switching the traffic to the backup path quickly.
The static route cannot calculate the route and converge the route again, so the user needs
to specify routes to form the relationship between the active route and the backup route.
That is to say, configure two static routes with the same destination address, different
egress interfaces and different priorities.
Work Flow
The L2 VPN FRR is also called PW FRR. The PW FRR is a link and node protection
handover technology for L2 VPN services encapsulated on the basis of Pseudo Wire
Emulation Edge-to-Edge (PWE3). Its basic principle is to protect a PW with another PW
that is established in advance, that is, PW redundancy. The PW established in advance is
called the standby PW, and the protected PW is called the active PW. The L2 VPN FRR
protects the active path by using the standby PW to evade the faulty link or node. The
PW FRR is used on H-VPLS UPEs. In full-mesh PW network, PW FRR is not required.
UPE1 connects to NPE2 and NPE3. The relationship between PW12 and PW13 is
redundant hot backup. The active and standby attributes are specified statically during
8-5
the network plan. Only one PW can forward services at any moment. For the network
structure, see Figure 8-3.
When the active PW has a fault, with the link failure detection technology such as BFD,
PW FRR handover will be triggered. For example, traffic if forwarded from CE1 to CE2.
When the active PW (PW12) or NPE2 has a fault, PW FRR handover is triggered. Traffic
on UPE1 is handed over to the standby PW (PW13) quickly. When the active PW recovers,
PW FRR handover is triggered again and traffic is handed over back to the active PW.
At present, the route learnt from the VPR refers to the route learnt from different remote
PEs. In this case, the FRR relationship is formed.
PE1 learnt different private routes within the same network segment from PE2 and PE3,
see Figure 8-4. It forms the FRR of L3VPN on PE1. When the traffic is sent from CE1 to
CE2, a private route with active/standby relationship is generated on PE1 and the FRR of
L3VPN is generated. In this case, the traffic is switched quickly.
8-6
With the route fast switching technology in the private VPN network, the forwarding items of
the active PE and the standby PE set in a remote PE, and the PE fault fast detection, VPN
FRR switches the traffic to a standby path before the VPN route convergence is completed
MPLS TE FRR is a set of link and node protection handover mechanism in MPLS TE.
When an LSP link or a node has a fault, the faulty node is protected with this function.
In this way, traffic can go through the tunnel through the protecting link or node without
interruption. At the same time, the head node can initiate the re-establishment of the active
path without affecting data transmission.
8-7
TE FRR Modes
The MPLS TE FRR is implemented on the basis of RSVP TE. It complies with the Request
For Comments (RFC) 4090.
There are two modes to implement MPLS TE FRR.
l Detour mode: It is one-to-one backup. In this mode, the device provides protection
for each protected LSP and establishes a protecting path for each protected LSP. The
protecting path is called Detour LSP.
l Bypass mode: It is facility backup. In this mode, a protecting path protects several
LSPs. The protecting path is called Bypass LSP.
Detour mode implements the protection for each LSP. This costs relatively more. In
practical applications, the Bypass mode is widely used. The Bypass mode is described in
details.
Figure 8-5 shows the Bypass mode . The blue arrows indicate the active LSP, and the red
arrows indicate the Bypass LSP. When the link between RTB and RTC or the node RTC
is invalid, the data on the active LSP will be handed over to the Bypass LSP. The packet
sent by RTB uses the label distributed by RTF in the top layer of the header. At the same
time, the out-label of RTC is input into the label stack to be used as the next layer label.
On path RTB - RTF - RTD, the LSP uses two layers of labels. When RTD receives a
packet, the label that is distributed for RTF by RTD pops up, and then the label that is
distributed for RTF by RTD forwards the packet.
Related Terms
l Active LSP: For the Detour LSP or the Bypass LSP, it acts as the protected LSP.
l Point of Local Repair (PLR): It is the head node of the Detour LSP or the Bypass LSP.
It must be on the active LSP, and it should not be the tail node.
l Merge Point (MP): It is the tail node of the Detour LSP or the Bypass LSP. It must be
on the active LSP, and it should not be the head node.
8-8
l Link protection: The PLR and the MP are connected through a direct connection. The
active LSP passes through this link. When this link is invalid, the data can be handed
over to the Detour LSP or the Bypass LSP.
l Node protection: The PLR and the MP are connected through a router. The active
LSP passes this router. When this router is invalid, the data can be handed over to
the Detour LSP or the Bypass LSP.
The FRR in Bypass mode described here is implemented in accordance with RFC 4090
(called protocol hereinafter) by extending the SESSION_ATTRIBUTE object and the
RECORD_ROUTE object.
8-9
l In the RECORD_ROUTE object of an RESV message, the flag bits added include
whether the LSP has been protected, whether the data has been handed over,
whether it is protected by a bandwidth, and whether it is protected by a node.
The establishment of an active LSP is triggered by configuring a tunnel on the head
node (RT1) manually. Before the active LSP is established, if the FRR attribute of the
LSP has been specified through commands, RSVP will add the flag bits (whether the
LSP needs local protection, whether to record labels and whether to use SE style) to the
SESSION_ATTRIBUTE object of the PATH message. If bandwidth has been specified
for the LSP, the flag bit for bandwidth protection will also be added to the object. When
downstream nodes receive this PATH message, they know that it is an LSP requring FRR
by identifying the local protection flag.
For an LSP requring FRR (identified in accordance with the flags in the previous PATH
message), when the nodes send RESV messages to the upstream, they will record the
egress, LSR ID, and the label of an RESV message in RECORD_ROUTE object. The
information is cumulatively transmitted to each upstream node.
When each node receives the RESV message for the first time, it selects a suitable
Bypass LSP for the LSP in accordance with the information in the RECORD_ROUTE
object. The procedure to select a suitable Bypass LSP for the active LSP is called binding.
The algorithm of the binding is described in details later.
After the binding FRR calculation for the active LSP, the RECORD_ROUTE object in the
RESV message sent to the upstream will point out whether the LSP has been protected. If
it is protected, the protected egress address (eth1 on RT2) and the egress address (eth3
on RT2) of the RESV message will be recorded. If it is not protected, the corresponding
flags in the RECORD_ROUTE object will be cleared, and only the egress address (eth3
on RT2) of the RESV message will be recorded. Binding calculation is not supported on
egresses. The flags in the RECORD_ROUTE object of an RESV message sent to the
upstream on the egresses are cleared.
The establishment of an active LSP with FRR protection is basically consistent with that
of a common LSP. The binding calculation is added to the establishment of an active LSP,
and some flags and sub-objects are added to the PATH message and RESV message.
8-10
LSP automatically to protect the active LSP. This mode is called automatic Bypass.
An automatic Bypass can protect multiple active LSPs as long as it meets the
requirements of these active LSPs.
A Bypass LSP can protect multiple physical interfaces, but it cannot protect the egress of
its own.
The FRR can protect a link or a node. When Bypass LSP protection is needed, it is
necessary to plan the link or node to be protected and specify the protection mode (link
protection or node protection). In general, node protection can protect the protected node
and the link between this node and the PLR. It seems that node protection is better.
The bandwidth of a Bypass LSP is used to protect the active LSP. All resources on
the tunnel are only used after handover. During configuration, it is necessary to make
sure that the bandwidth configured is not less than the sum bandwidth of all LSPs to
be protected. Otherwise, when FRR is valid, Bypass cannot provide the protection that
meets the requirements of user services completely.
In general, Bypass LSP is in idle state, and it does not carry over data services. If the
Bypass LSP is intended to protect the active LSP and forward data at the same time, it is
required to configure enough bandwidth.
Binding Calculation
“Binding” means to specify a Bypass LSP for a physical interface to be protected. This
is called the binding between a Bypass LSP and a physical interface. A Bypass LSP can
be bound to multiple physical interfaces, and a physical interface can also be bound to
multiple Bypass LSPs.
“Binding” also means to select a suitable Bypass LSP for an active LSP to be protected.
This is called the binding between an active LSP and a Bypass LSP. The binding calculation
is the procedure to bind an active LSP to a Bypass LSP. The binding results are the data
required for data handover, such as the interface of the Bypass tunnel, the egress and
Next Hop Label Forwarding Entry (NHLFE) of the Bypass LSP, and labels allocated to the
MP. If the binding calculation is successful, the RESV will inform the upstream nodes that
the active LSP has been protected.
The binding calculation result is saved. When local invalidation occurs, the result can be
used immediately. This is the reason why MPLS TE FRR can make fast responses to
invalidations.
8-11
Invalidation Detection
Invalidation detection aims at discovering the invalidation of the link (between RT2 and
RT3) or the node (RT3) as soon as possible, thus to trigger handover to reduce packet
loss.
Invalidation detection does not determine whether it is an invalidation of a link or a node.
It is considered as an interface invalidation (eth1 of RT2) at last.
Interface invalidation triggers all LSPs that use this interface as egress to execute FRR
handover as soon as possible. If an LSP has been protected by a link in accordance with
the binding calculation result, the data will be handed over to the protecting link. When it
is a node invalidation in fact, the protection will not succeed, and this LSP will be deleted.
If the LSP has been protected by a node in accordance with the binding calculation result,
the data will be handed over to the protecting node. When it is a link invalidation in fact,
the Bypass LSP will be overleaped even if the next hop node is available.
A part of link invalidations and node invalidations can be detected by link layer protocols.
The speed of the link layer protocols to discover an invalidation is related to the interface
type. Other invalidations are discovered through the Hello mechanism of RESV. The speed
of the Hello mechanism to discover an invalidation is relatively slower.
It is possible to enable Hello mechanism on each physical interface that needs protection.
When Hello mechanism is also enabled on the peer interface, Hello messages and
responses will be sent periodically between two routers. When a link or a node is invalid,
the Hello message or response will be lost. If the message or response is lost for continual
three times, it is considered that an invalidation occurs.
Handover Procedure
Handover means to enable the Bypass LSP. The data and RSVP messages on the active
LSP will not be forwarded along the previous path.
Handover can be triggered when the interface (eth1 of RT2) is closed by a command or
when invalidation detection discovers an interface (eth1 of RT2) invalidation. The data and
signaling of the protected LSP on the invalid interface will be handed over to the Bypass
LSP. The upstream nodes are informed that the handover occurs.
After the handover, the PATH message sent to the MP by the PLR is changed in
accordance with the following points:
8-12
1. The egress interface (eth2 on RT2) address of the PLR on the Bypass LSP is filled in
the PHOP field.
2. The ingress LSR ID in SENDERTEMPLATE is changed to the egress interface (eth2
on RT2) address of the PLR on the Bypass LSP.
3. The PLR address recorded in RECORD_ROUTE object is changed to the egress
interface (eth2 on RT2) address of the PLR on the Bypass LSP.
4. All nodes previous to the MP are deleted in an Explicit Route Object (ERO). The
address first belonging to the MP is changed to the MP LSR ID.
The MP receives the PATH message through the Bypass LSP. As the SESSION is not
changed, but the ingress LSR ID (it is RT1 LSR ID previously) in SENDERTEMPLATE is
changed to the egress interface (eth2 on RT2) address of the PLR on the Bypass LSP, MP
will know that this is a PATH message after the FRR handover and the local node is the
MP.
The PATH message sent to downstream by the MP does not change with the handover.
The RESV message sent to upstream by the MP is changed in accordance with the
following points:
1. The Filter Spec source address in the message is changed to the PHOP address
(address of eth2 on RT2) in the PATH message.
2. The NHOP in the message is changed to the ingress interface (eth2 on RT4) address
of the MP on the Bypass LSP.
3. The RECORD_ROUTE object in the RESV message records the ingress interface
(eth2 on RT4) address of the MP on Bypass LSP.
4. The destination in the IP header of the message is the egress interface (eth2 on RT2)
address of the PLR on the Bypass LSP.
5. The Time To Live (TTL) value in the RESV message is set to 255, and the TTL value
in the header of the protocol message is set to 1.
After the handover, the RESV message sent to upstream by the PLR also has some
changes. The egress interface (eth2 on RT2) address of the PLR on the Bypass LSP
is added to the RECORD_ROUTE object.
After the handover, the forwarding paths for PTEAR message, RERR message, RTEAR
message, and PERR message of the active LSP also change.
After the handover of node protection, the protected node (RT3) may send the PTEAR
message to downstream due to the expiry of the PATH message. The MP (RT4) will ignore
this message. In addition, the MP will send the RTEAR message on the previous LSP
ingress interface (eth3 on RT4) during the handover. This is to make the protected node
(RT3) release corresponding resource as soon as possible.
MBB
For FRR, a function of Make Before Break (MBB) is to make the LSP (tunnel1 on RT1)
protected by the Bypass LSP recover to normal state. When handover occurs on the active
LSP, the head node starts the MBB procedure to calculate a new available path. When
8-13
the new path is established, a new suitable standby LSP will be selected to form the new
binding relationship.
Data Forwarding
Before the handover of the active LSP, the data forwarding on the active LSP is the same
with that on a common LSP. After the data of the active LSP is handed over to the Bypass
tunnel, the data is forwarded to the MP through the Bypass LSP.
8-14
OSPF/IS-IS GR
This policy is:
1. Other routers on the network keep their link states during the IS-IS/OSPF restart
period.
2. The restarted router keeps its forwarding information before the restart in a short
period, that is, the FIB can keep steady on the restarted router in a short period, thus
not affecting the forwarding of the data flow.
3. After the router is restarted, the router finishes the LSP/Link State Advertisement (LSA)
synchronization with its neighbor routers quickly.
4. The router calculates Shortest Path First (SPF) after the LSP/LSA database
synchronization.
With this policy, the restarted router still can forward data during the restart period, and
the neighbor routers still can operate properly during the restart period. The restart will not
cause any route oscillation.
9-1
BGP GR
At present, the routing protocols only run on the Management Process Units (MPUs)
of a router. The routing protocols do not run on a standby board. After active/standby
changeover, the routing protocols run on the standby board.
To support the GR capability, the route protocol needs to accomplish the following tasks.
l Prevent the neighbor relationship between the neighbor routers and the restarted
router from being oscillated during the restart period.
l After the restart, the restarted router synchronizes the routing information with its
neighbor routers as soon as possible, and then updates the local routing information.
9-2
is not 1 (The Forwarding state value 0 indicates that the restarted router does
not support nonstop forwarding of the corresponding address family routes), or if
the OPEN message does not contain the corresponding AFI/SAFI address family
support information, R2 goes to Step 8.
6. Otherwise, R2 sends route updates to the restarted router. After that, it sends the
End-Of-RIB flags.
7. If the Wait-For-EOR Timer times out before the End-Of-RIB flags are sent, R2
goes to Step 8.
8. The kept routes of the restarted router is cleared. The data is forwarded in
accordance with the normal BGP forwarding flow.
9-3
two LSRs save the control information of the LDP protocol, so they can be considered
as the auxiliary node.
l LSR restart or LDP signaling restart. During this restart, LSR can transfer data. For
example, restart nodes and auxiliary nodes exist during the version update or the
active/standby changeover. The restart node has no control information of the LDP
protocol layer, so the corresponding handling methods are different.
The working process of the LDP Graceful Restart mechanism is as follows:
l Restart node
1. When the control plane of the LSR is restarted, you must ensure that it can transfer
data during the recovery process. If not, you need to set the Recovery Time in
the Initialization message sent to the peer end to 0s.
2. If the LSR can transfer data, you need to start the timer (the corresponding value
can be set), and then set all the transferred items to stale. When the timer times
out, delete all transferred items marked with stale. The notified Recovery time
when you re-establish the session is the remaining time of the timer when the
Initialization message is sent.
3. During the restart, the LSR still can transfer data with the old transferring items. At
the same time, it can establish a session again and send the mapping information
through the processes stipulated in the LDP protocol. When the LSR receives
a mapping message, it will find the corresponding items in the transferring table,
and then clear the stale mark. In this case, the restart process is completed.
l Auxiliary node
1. After the LSR finds that the session with the the neighbor is down, it will confirm
that the the neighbor node can transfer data in accordance with the FT Reconnect
Timeout in the Initialization message when a session is established. If the the
neighbor node can transfer data, it will set all transferring labels learnt from the
session to stale, and then save these labels for the later data transferring.
2. When the session is down, the LSR restarts the reconnect timer. The set time is
the minimum value between the FT Reconnect Timeout notified by the peer end
and the Neighbor Liveness time configured locally. In this case, the LSR waits
for both parties to establish the session again. If the session is not established
successfully after the timer times out, the forwarding items marked with stale will
be deleted.
3. If the session is established successfully before the timer times out, the LSR will
cancel the timer, and determine the recovery time notified by the peer end. If the
the neighbor router cannot transfer data, it will delete all the items marked with
stale. If the the neighbor router can transfer data, this LSR will restart the timer.
The set time is the minimum time between the Recovery Time notified by the peer
end and the Maximum Recovery time configured locally.
4. After receiving the mapping message from the peer end, the LSR will recover or
update the items marked with stale, and then clear the stale mark. At the same
time, this router will send the mapping information on the assumption that the
session is in up status. If the timer times out, the LSR will delete all the transferring
items marked with stale.
9-4
The following uses an example to describe the working process of LDP Graceful Restart.
R1 and R2 is configured with the LDP Graceful Restart function, and the session and the
corresponding LSP that supports the LDP Graceful Restart function are established, see
Figure 9-1.
9-5
9-6
10-1
Therefore, it is necessary to use a mate board scan thread to scan the state of the mate
board in real time. When the master/slave state or in-place state changes, the scan
thread will inform the corresponding main-control process to trigger the master/slave
handover flow quickly.
When the thread scans that the master board operates improperly and the slave board
operates properly, it will trigger the handover. The procedure of handover is implemented
by the corresponding process module of the main-control.
Command Function
10-2
handover, run the following commands to check whether the master and the slave
main-control boards are online, and whether the synchronization of the master and the
slave database is completed.
Commands Function
10-3
executed. If the handover is executed compulsively, the entire device will be reset.*/
/*Example 2:*/
ZXR10#show processor
================================================================================
================================================================================
Character: Cpu current character in system
MSC : Master-SC in Cluster System
SSC : Slave-SC in Cluster System
N/A : None-SC in Cluster System
CPU(5s) : Cpu utility measured in 5 seconds
CPU(1m) : Cpu utility measured in 1 minute
CPU(5m) : Cpu utility measured in 5 minutes
Peak : Cpu peak utility measured in 1 minute
PhyMem : Physical memory (megabyte)
FreeMem : Free memory (megabyte)
Mem : Memory usage ratio
================================================================================
================================================================================
Character CPU(5s) CPU(1m) CPU(5m) Peak PhyMem FreeMem Mem
================================================================================
PFU-0/2/0 N/A 8% 8% 10% 11% 2048 956 53.320%
--------------------------------------------------------------------------------
PFU-0/3/0 N/A 9% 9% 10% 11% 2048 963 52.979%
--------------------------------------------------------------------------------
SFU-0/17/0 N/A 20% 20% 20% 21% 256 87 66.016%
--------------------------------------------------------------------------------
MPU-0/20/0 MSC 18% 17% 22% 20% 4098 2120 48.267%
--------------------------------------------------------------------------------
ESU-0/20/0 N/A 35% 35% 35% 38% 256 103 59.766%
--------------------------------------------------------------------------------
MPU-0/21/0 SSC 11% 12% 12% 15% 4098 2432 40.654%
--------------------------------------------------------------------------------
ESU-0/21/0 N/A 15% 35% 35% 38% 256 53 79.766%
--------------------------------------------------------------------------------
/*The character of MPU-0/12/0 is displayed as an MSC. This means that it is the
master main-control board at present. The character of MPU-0/21/0
is displayed as an SSC. This means that it is the slave main-control board at
present.*/
10-4
/*Example 2:*/
ZXR10#show synchronization
=====================================================================
LE Location Status Syn-state
=====================================================================
T_MPLS MPU-0/20/0 Slave not finish
---------------------------------------------------------------------
T_SC MPU-0/20/0 Slave not finish
---------------------------------------------------------------------
T_MPLS MPU-0/21/0 Master not finish
---------------------------------------------------------------------
T_SC MPU-0/21/0 Master not finish
/*The slave main-control board of the device is online, but the synchronization
is not completed.*/
/*Example 3:*/
ZXR10#show synchronization
=====================================================================
LE Location Status Syn-state
=====================================================================
T_MPLS MPU-0/20/0 Slave finish
---------------------------------------------------------------------
T_SC MPU-0/20/0 Slave finish
---------------------------------------------------------------------
T_MPLS MPU-0/21/0 Master finish
---------------------------------------------------------------------
T_SC MPU-0/21/0 Master finish
---------------------------------------------------------------------
/*The synchronization is completed. The handover can be executed.*/
10-5
Configuration Flow
1. When the device operates properly, the ACT indicator for the master main-control
board is on, and the ACT indicator for the slave main-control board is off. The RUN
indicator for the master and slave main-control boards flashes at the frequency of 1
Hz, and the ALM indicators for the master and slave main-control boards are off.
2. Use one of the following operations to implement master/slave handover:
a. Configure the master/slave main-control handover command.
b. Press the reset button on the master main-control board.
c. Plug out the master main-control board and then plug it in.
d. Press the EXCH button on the master main-control board.
3. After the master/slave handover, the RUN indicator for the new master main-control
board is on. Besides the alarm indicating the master/slave handover, there is no other
alarm.
To configure master/slave main-control handover, run the following commands:
ZXR10#redundancy switch sc grace
Proceed with redundancy switch sc? [yes/no]:yes
Configuration Verification
Check the configuration result, which is displayed as follows:
/*Before the handover*/
R2#show processor
================================================================================
================================================================================
Character: Cpu current character in system
MSC : Master-SC in Cluster System
SSC : Slave-SC in Cluster System
N/A : None-SC in Cluster System
CPU(5s) : Cpu utility measured in 5 seconds
10-6
10-7
================================================================================
Character CPU(5s) CPU(1m) CPU(5m) Peak PhyMem FreeMem Mem
================================================================================
PFU-0/2/0 N/A 8% 11% 9% 94% 2048 956 53.320%
--------------------------------------------------------------------------------
PFU-0/3/0 N/A 9% 11% 9% 93% 2048 963 52.979%
--------------------------------------------------------------------------------
SFU-0/17/0 N/A 22% 21% 20% 61% 256 87 66.016%
--------------------------------------------------------------------------------
MPU-0/20/0 SSC 40% 67% 67% 100% 4098 2436 40.556%
--------------------------------------------------------------------------------
ESU-0/20/0 N/A 35% 36% 36% 96% 256 103 59.766%
--------------------------------------------------------------------------------
MPU-0/21/0 MSC 100% 100% 36% 100% 4098 2130 48.023%
--------------------------------------------------------------------------------
ESU-0/21/0 N/A 10% 35% 35% 38% 256 103 59.766%
--------------------------------------------------------------------------------
/*When the character of MPU-0/20/0 is displayed as an SSC, it means that it is the
master slave control board at present. When the character of MPU-0/21/0 is displayed
as an MSC, it means that it is the master main-control board at present. After the
handover, the main board in Slot 21 becomes master, and the main-control board in
Slot 0 becomes slave.*/
10-8
With increasing traffic in the network, the requirement on the performance, such as
bandwidth and delay, becomes increasing higher. At present, the optimization route
forwarding is used. All traffic is forwarded through a single link. In this case, the above
requirement cannot be met. So, it is required to establish multiple LSPs in accordance
with different routes and balance the traffic in accordance with a certain rule. The traffic is
allocated to different links for forwarding to implement the load sharing function of MPLS.
The MPLS VPN load sharing includes three parts:
l LDP
l VRF
l MP-BGP
Through the configuration for these three parts, several routes from the external layer and
internal layer of the MPLS VPN and the CE side share the load in the private network and
the public network.
11-1
11-2
II
EFM
- Ethernet in the First Mile
ERO
- Explicit Route Object
FIB
- Forwarding Information Base
FRR
- Fast Reroute
GR
- Graceful Restart
IEEE
- Institute of Electrical and Electronics Engineers
IGP
- Interior Gateway Protocol
IP
- Internet Protocol
IPTV
- Internet Protocol Television
III
IS-IS
- Intermediate System-to-Intermediate System
ITU
- International Telecommunications Union
LAN
- Local Area Network
LBM
- Loopback Message
LDP
- Label Distribution Protocol
LSA
- Link State Advertisement
LSP
- Label Switched Path
LSR
- Label Switch Router
LTM
- Link Trace Message
LTR
- Link Trace Reply
MA
- Maintenance Association
MAC
- Medium Access Control
MAN
- Metropolitan Area Network
MIP
- Maintenance domain Intermediate Point
MP
- Merge Point
MPLS
- Multiprotocol Label Switching
MPU
- Management Process Unit
NGN
- Next Generation Network
OAM
- Operation, Administration and Maintenance
IV
OSPF
- Open Shortest Path First
OUI
- Organizationally Unique Identifier
PLR
- Point of Local Repair
PTN
- Packet Transport Network
PWE3
- Pseudo Wire Emulation Edge-to-Edge
QoS
- Quality of Service
RFC
- Request For Comments
RMEP
- Remote Maintenance association End Point
RSVP
- Resource ReSerVation Protocol
SPF
- Shortest Path First
TCP
- Transmission Control Protocol
TTL
- Time To Live
UDP
- User Datagram Protocol
VLAN
- Virtual Local Area Network
VPN
- Virtual Private Network
VRRP
- Virtual Router Redundancy Protocol
VoIP
- Voice over Internet Protocol
WAN
- Wide Area Network