No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - VPN 01

NE05E and NE08E V300R003C10SPC500

This is NE05E and NE08E V300R003C10SPC500 Configuration Guide - VPN
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring Private Network IPv6 FRR

Configuring Private Network IPv6 FRR

This section describes how to configure private network IPv6 FRR in the networking where multiple CEs at an IPv6 VPN site access the same PE. This feature can quickly switch traffic to a link connected to another CE if the primary route from a PE to a CE becomes unreachable.

Usage Scenario

This feature applies to IP services that are sensitive to the packet loss and delay on a VPN. After private network IPv6 FRR is configured, if the route from a PE to a CE is unreachable, traffic from the PE can be quickly switched to a link connected to another CE. This feature ensures non-stop forwarding of IP services.

The NE supports two private network IPv6 FRR modes:

  • IPv6 FRR: applies to the networking where different PE-CE pairs use different routing protocols.

  • Private network BGP auto FRR: applies to the networking where BGP runs between the PEs and CE.

Pre-configuration Tasks

Before configuring private network IPv6 FRR, complete the following tasks:

  • Configure a BGP/MPLS IPv6 VPN.

  • Ensure that the PE learns IPv6 VPN routes with the same prefix from different CEs attached to it.

Procedure

  • Configure IPv6 FRR.
    1. Run system-view

      The system view is displayed.

    2. Run ip vpn-instance vpn-instance-name

      The VPN instance view is displayed.

    3. Run ipv6-family

      The VPN instance IPv6 address family view is displayed.

    4. Run ipv6 frr

      IPv6 FRR is enabled.

    5. Run commit

      The configuration is committed.

  • Configure private network BGP auto FRR.
    1. Run system-view

      The system view is displayed.

    2. Run bgp as-number

      The BGP view is displayed.

    3. Run ipv6-family vpn-instance vpn-instance-name

      The BGP-VPN instance IPv6 address family view is displayed.

    4. Run auto-frr

      BGP auto FRR is enabled.

    5. (Optional) Run route-select delay delay-value

      A delay for selecting a route to the intermediate device on the primary path is configured. After the primary path recovers, an appropriate delay ensures that traffic switches back to the primary path after the intermediate device completes refreshing forwarding entries.

      The delay-value value is an integer ranging from 0 to 3600, in seconds. The default delay-value value is 0, indicating that the device on which FRR is configured selects a route to the intermediate device on the primary path without a delay.

    6. Run commit

      The configuration is committed.

  • (Optional) Enable IP FRR poison reverse.
    1. Run interface interface-type interface-number

      The interface or sub-interface view is displayed.

      The Eth-Trunk interface, Eth-Trunk sub-interface, GE interface, or GE sub-interface view can be displayed.

    2. Run poison-reverse enable

      IP FRR poison reverse is enabled.

      On an IP ring network configured with IP FRR, the poison-reverse enable command is used to prevent instantaneous traffic storms caused by the route convergence.

      In the load balancing scenario, poison reverse does not take effect.

Example

Run the display ipv6 routing-table vpn-instance vpn-instance-name [ ipv6-address ] verbose command to check the backup outbound interface and backup next hop of the IPv6 route in the routing table.

Run the display ipv6 routing-table vpn-instance vpn-instance-name verbose command on the PE. The command output shows that the IPv6 route has a backup outbound interface and a backup next hop.

<HUAWEI> display ipv6 routing-table vpn-instance vpna 2004::1 verbose
Routing Table : vpna
Summary Count : 1

 Destination  : 2004::1                         PrefixLength : 128
 NextHop      : 2000::2                         Preference   : 255
 Neighbour    : 2000::2                         ProcessID    : 0
 Label        : NULL                            Protocol     : BGP
 State        : Active Adv                      Cost         : 100
 Entry ID     : 27                              EntryFlags   : 0x80004100
 Reference Cnt: 2                               Tag          : 0
 IndirectID   : 0x6                             Age          : 3sec 
 RelayNextHop : ::                              TunnelID     : 0x0
 Interface    : GigabitEthernet0/1/0            Flags        : D
 BkNextHop    : 2001::2                         BkInterface  : GigabitEthernet0/2/0
 BkLabel      : NULL                            BkTunnelID   : 0x0
 BkPETunnelID : 0x0                             BkIndirectID : 0x5
Translation
Download
Updated: 2019-01-14

Document ID: EDOC1100058925

Views: 27487

Downloads: 53

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next