No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Configuration Guide - VPN 01

NE05E and NE08E V300R003C10SPC500

This is NE05E and NE08E V300R003C10SPC500 Configuration Guide - VPN
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring BFD for VPWS PW

Configuring BFD for VPWS PW

Configuring BFD for VPWS PW accelerates PW fault detection, resulting in fast switching of upper-layer applications.

Usage Scenario

When PEs on an MPLS L2VPN are connected over PWs, configuring BFD to detect PW connectivity accelerates PW fault detection.

A BFD session can be static or dynamic. Select one as needed.

Pre-configuration Tasks

Before configuring BFD for VPWS PW, complete the following tasks:

  • Configure network layer parameters for devices on the MPLS L2VPN to communicate.

  • Configure PWs.

  • If interworking with non-Huawei devices is required, run the mpls l2vpn vccv bfd-cv-negotiation command to change the BFD CV Type in Label Mapping packets to be the same as that on the remote peer.
  • Static BFD for VLL PW does not support a CV type of 0x10 or 0x20 in control word mode. If the CV type in the PW negotiation result is 0x10 or 0x20, the BFD session cannot go Up.

  • If dynamic BFD for VPWS is configured and the CV type is 0x10 or 0x20, the MTU of the interface through which a BFD packet passes cannot be less than the BFD packet's length. The payload length of a BFD packet is:
    • 24 bytes in non-authentication mode
    • 48 bytes in MD5 authentication mode
    • 52 bytes in SHA1 authentication mode

Procedure

  • Configure a static BFD session.
    1. Run system-view

      The system view is displayed.

    2. Run bfd

      BFD is enabled globally, and the BFD view is displayed.

    3. Run quit

      Return to the system view.

    4. Run bfd cfg-name bind pw interface interface-type1 interface-number1 [ remote-peer remote-peer-address pw-ttl { auto-calculate | ttl-number } ] [ select-board slot-id | track-interface [ { interface | controller } interface-type2 interface-number2 ] ] [ secondary ]

      • Create a BFD session for VPWS PW.

        Run bfd session-name bind pw interface interface-type1 interface-number1 [ remote-peer remote-peer-address pw-ttl { auto-calculate | ttl-number } ] [ secondary ]

        BFD configuration items are created.

      A BFD configuration item is created.

      • When the BFD session is used to monitor a service PW:
        • The interface specified by the interface interface-type1 interface-number1 parameter is the AC interface on which the PW resides.
        • The track-interface parameter can be configured. When the AC interface goes Down, the BFD session enters the Down state.
        • You cannot use the interface-type2 interface-number2 parameter to specify the type and number of an associated interface.
      • When the BFD session is used to monitor a management PW:
        • The interface specified by the interface interface-type1 interface-number1 parameter is the loopback interface.
        • You can use the track-interface interface-type2 interface-number2 parameter to specify the type and number of an associated interface. When the specified interface goes Down, the BFD session enters the Down state.
        • You can use the controller interface-type2 interface-number2 parameter to specify the type and number of an associated CPOS interface.

      If the PW to be detected is a secondary PW, you must specify secondary.

      The PW to be detected can be either an SS-PW or an MS-PW.

    5. Configure discriminators.

      • Run discriminator local discr-value

        A local BFD session discriminator is configured.

      • Run discriminator remote discr-value

        A remote BFD session discriminator is configured.

      NOTE:
      The local BFD session discriminator on one end must be the remote BFD session discriminator on the other end.

    6. Run commit

      The configuration is committed.

      If the PW to be detected is Down, the BFD session can be established but cannot go Up.

      NOTE:
      • You must configure or cancel BFD for PW on both ends of a PW. Otherwise, the PW status on both ends may be inconsistent.
      • If you want to modify the parameters of an existing BFD session, run corresponding commands, such as min-tx-interval, min-rx-interval, and detect-multiplier.

  • Configure a dynamic BFD session.
    1. Run system-view

      The system view is displayed.

    2. Run bfd

      BFD is enabled globally, and the BFD view is displayed.

    3. Run quit

      Return to the system view.

    4. Adjust BFD detection parameters.

      1. Run pw-template pw-template-name

        The PW template view is displayed.

      2. Run control-word

        The control word function is enabled.

      3. Run bfd-detect [ detect-multiplier multiplier | min-rx-interval rx-interval | min-tx-interval tx-interval ] *

        BFD detection parameters are configured.

        NOTE:
        BFD detection parameters are as follows:
        • detect-multiplier multiplier indicates the BFD detection multiplier.

        • min-rx-interval rx-interval indicates the Required Min Rx Interval (RMRI), which is the supported minimum interval at which the local device receives BFD control packets.

        • min-tx-interval tx-interval indicates the Desired Min Tx Interval (DMTI), which is the desired minimum interval at which the local device sends BFD control packets.

        The BFD detection parameters actually used may be different from the ones configured:
        • Actual local detection interval = Actual interval at which the local device receives BFD packets x Configured remote BFD detection multiplier

        • Actual interval at which the local device receives BFD packets = Max { Configured remote DMTI, Configured local RMRI }

        • Actual interval at which the local device transmits BFD packets = Max { Configured local DMTI, Configured remote RMRI }

      4. Run quit

        Return to the system view.

    5. Trigger the establishment of a dynamic BFD session.

      1. Run interface interface-type interface-number

        The AC interface view is displayed.

      2. Run mpls l2vpn pw bfd [ detect-multiplier multiplier | min-rx-interval rx-interval | min-tx-interval tx-interval ] * [ remote-vcid vc-id ] [ secondary ]

        Dynamic BFD for PW is enabled to trigger the establishment of a dynamic BFD session to detect the VPWS PW connectivity.

        If the PW to be detected is a secondary PW, you must specify secondary.

    6. Run commit

      The configuration is committed.

Checking the Configurations

After configuring BFD for VPWS PW, check the configurations.
  • Run the display bfd session command to check BFD session configurations.
  • Run the display mpls l2vc interface interface-type interface-number command to check dynamic BFD session configurations.

# Run the display bfd session pw interface interface-type interface-number [ secondary] [ verbose ] command. The command output shows information about the BFD session status, BFD session discriminators, BFD session type, and type of the PW bound to the BFD session.

<HUAWEI> display bfd session pw interface GigabitEthernet 0/1/1.1 verbose
(w): State in WTR 
(*): State is invalid
--------------------------------------------------------------------------------
  State : Up                    Name : 21
--------------------------------------------------------------------------------
  Local Discriminator    : 21               Remote Discriminator   : 21
  Session Detect Mode    : Asynchronous Mode Without Echo Function
  BFD Bind Type          : PW(Master) 
  Bind Session Type      : Static 
  Bind Peer IP Address   : -.-.-.- 
  NextHop Ip Address     : -.-.-.-  
  Bind Interface         : GigabitEthernet 0/1/1.1                                  
  PW TTL Mode            : -                PW TTL                 : -  
  Node                   : UPE 
  Encapsulation Type     : -                Vc Id                  : - 
  Track Interface        : -
  Local Vc Label         : 16               Remote Vc Label        : 54
  Swap Vc Label          : -                
  FSM Board Id           : 7                TOS-EXP                : 7
  Min Tx Interval (ms)   : 10               Min Rx Interval (ms)   : 10
  Actual Tx Interval (ms): 10               Actual Rx Interval (ms): 10 
  Local Detect Multi     : 3                Detect Interval (ms)   : 30 
  Echo Passive           : Disable          Acl Number             : -
  Destination Port       : 3784             TTL                    : 1 
  Proc Interface Status  : Disable          Process PST            : Enable     
  WTR Interval (ms)      : -                Config PST             : Disable    
  Active Multi           : 3   
  Last Local Diagnostic  : Neighbor Signaled Session Down(Receive AdminDown)
  Bind Application       : L2VPN
  Session TX TmrID       : -                Session Detect TmrID   : - 
  Session Init TmrID     : -                Session WTR TmrID      : - 
  Session Echo Tx TmrID  : -   
  Session Description    : - 
--------------------------------------------------------------------------------

# Run the display mpls l2vc interface interface-type interface-number command. The command output shows dynamic BFD session configurations.

<HUAWEI> display mpls l2vc interface GigabitEthernet 0/1/1
*client interface       : GigabitEthernet0/1/1.1 is up
 Administrator PW       : no
 session state          : up
 AC status              : up
 VC state               : up
 Label state            : 0
 Token state            : 0
 VC ID                  : 100
 VC type                : VLAN
 destination            : 192.3.3.3
 local group ID         : 0         remote group ID      : 0
 local VC label         : 18        remote VC label      : 18
 local AC OAM State     : up
 local PSN OAM State    : up
 local forwarding state : forwarding
 local status code      : 0x0 (forwarding)
 remote AC OAM State    : up
 remote PSN OAM state   : up
 remote forwarding state: forwarding
 remote status code     : 0x0 (forwarding)
 ignore standby state   : no
 Dynamic BFD for PW     : enable
 Detect Multipier       : 3
 Min Transit Interval   : 1000
 Max Receive Interval   : 1000
 Dynamic BFD Session    : not built
 BFD for PW             : available
   BFD sessionIndex     : --  BFD state : up
 VCCV State             : --
 manual fault           : not set
 active state           : active
 forwarding entry       : exist
 OAM Protocol           : --
 OAM Status             : --
 OAM Fault Type         : --
 PW APS ID              : --
 PW APS Status          : --
 TTL Value              : 1
 link state             : up
 local VC MTU           : 1500      remote VC MTU        : 1500
 local VCCV             : alert ttl lsp-ping bfd
 remote VCCV            : alert ttl lsp-ping bfd
 local control word     : disable   remote control word  : disable
 tunnel policy name     : --
 PW template name       : --
 primary or secondary   : primary
 load balance type      : flow
 Access-port            : false
 Switchover Flag        : false
 VC tunnel info         : 1 tunnels
    NO.0 TNL type       : ldp, TNL ID : 0x0000000001004c4b43
 create time            : 0 days, 1 hours, 2 minutes, 56 seconds
 up time                : 0 days, 1 hours, 1 minutes, 48 seconds
 last change time       : 0 days, 1 hours, 1 minutes, 48 seconds
 VC last up time        : 2012/12/05 02:50:41
 VC total up time       : 0 days, 1 hours, 1 minutes, 48 seconds
 CKey                   : 1
 NKey                   : 1493172332
 PW redundancy mode     : frr
 AdminPw interface      : --
 AdminPw link state     : --
 Forward state          : send inactive, receive inactive 
 Diffserv Mode          : uniform
 Service Class          : --
 Color                  : --
 DomainId               : --
 Domain Name            : --
Translation
Download
Updated: 2019-01-14

Document ID: EDOC1100058925

Views: 27765

Downloads: 53

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next