No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


NE20E-S V800R010C10SPC500 Feature Description - VPN 01

This is NE20E-S V800R010C10SPC500 Feature Description - VPN
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Proactive Loop Detection

Proactive Loop Detection

Triggering Condition

  • Interface going Up

    If an Ethernet interface, Ethernet trunk interface, or a specified Ethernet trunk member interface physically goes Up, the proactive loop detection function is triggered to detect whether the Ethernet interface, all members of the Ethernet trunk interface, or the specified Ethernet trunk member has a loop. If they have a loop, this function sets them to Down. Note that if an Ethernet interface goes Down, its associated sub-interfaces also go Down.

  • Interface bound to a VSI

    If an Ethernet interface, Ethernet sub-interface, Ethernet trunk interface, or Ethernet trunk sub-interface is bound to a VSI, proactive loop detection is triggered on the Ethernet interface, Ethernet sub-interface, or trunk member interfaces. If they have a loop, this function sets them to Down. An Ethernet trunk sub-interface can be a dot1q sub-interface, dot1q VLAN tag termination sub-interface, or QinQ VLAN tag termination sub-interface.

Detection Principles

When a device's Ethernet or Eth-Trunk interface goes Up or an interface is bound to a VSI, the interface proactively sends a loop detection packet. If the device receives the loop detection packet sent through a VPLS domain within the configured period, a loop occurs on the network. In this case, the device blocks the interface sending the loop detection packet and reports an alarm.

Figure 14-1 Proactive loop detection upon interface Up

On the network shown in Figure 14-1, AC1 sends a loop detection packet. If AC2 receives this packet within a loop detection period, a loop occurs on the network.


Proactive loop detection applies only to VPLS scenarios, not VLAN scenarios.

It is recommended that you disable this function on properly running devices. If you have to use this function to detect whether links operate properly during site deployment, be sure to disable this function after this stage.

Loop Detection Period

An interface can send a loop detection packet for a maximum of five times: the sending interval is 3s for the first three times and 10s for the latter two times. The maximum loop detection period is therefore 29s.

Figure 14-2 Loop detection packet sending

In Figure 14-2, t1 = t2 = t3 = 3s, and t4 = t5 = 10s. AC2 processes only the most recently sent loop detection packet. For example, if AC1 sends a loop detection packet at the a second, AC2 determines whether the packet was sent at the a second by AC1 upon receiving the packet.

  • If so, a loop occurs. The device then sets the link layer protocol of AC1 to Down and reports an alarm to the NMS.
  • If not, the device simply waits for the packet to be sent.
Updated: 2019-01-03

Document ID: EDOC1100055135

Views: 10042

Downloads: 17

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next