Escolar Documentos
Profissional Documentos
Cultura Documentos
ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://ensupport.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright 2012 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited.
Revision History
Revision No.
Revision Date
Revision Reason
R1.2
2012-08-29
R1.1
2012-04-12
R1.0
2012-03-08
SJ-20110927150233-015|2012-08-29 (R1.2)
Content
About This Manual ......................................................................................... I
Chapter 1 PTP Clock .................................................................................. 1-1
1.1 PTP Clock Overview........................................................................................... 1-1
1.2 Application of PTP Clock .................................................................................... 1-4
1.3 PTP Clock Configuration Flow............................................................................. 1-6
1.4 PTP Clock Configuration Procedure .................................................................... 1-7
1.4.1 Configuring the GPS Clock ...................................................................... 1-7
1.4.2 Configuring the PTP Time Node ............................................................... 1-8
1.4.3 Configuring the PTP Time Domain .......................................................... 1-10
1.4.4 Configuring the PTP Time Port .................................................................1-11
1.5 PTP Clock Configuration Example..................................................................... 1-13
II
SJ-20110927150233-015|2012-08-29 (R1.2)
Figures............................................................................................................. I
Tables .............................................................................................................V
Glossary .................................................................................................... XVII
VI
SJ-20110927150233-015|2012-08-29 (R1.2)
Intended Audience
This manual is intended for:
l
l
Summary
1, PTP Clock
2, DCN
3, QoS
4, IGMP Snooping
5, LAG
6, MC-LAG
I
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter
Summary
7, ML-PPP
8, MPLS OAM
9, MPLS-TP OAM
10, EFM
11, CFM
15, PW Dual-homing
Protection
Protection
18, MS-PW
II
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter
Summary
22, IP FRR
23, Route
24, MPLS
Conventions
This manual uses the following typographical conventions:
Typeface
Meaning
Danger: indicates an imminently hazardous situation. Failure to comply can result in
death or serious injury, equipment damage, or site breakdown.
Warning: indicates a potentially hazardous situation. Failure to comply can result in
serious injury, equipment damage, or interruption of major services.
III
SJ-20110927150233-015|2012-08-29 (R1.2)
IV
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 1
PTP Clock
Table of Contents
PTP Clock Overview ..................................................................................................1-1
Application of PTP Clock ............................................................................................1-4
PTP Clock Configuration Flow....................................................................................1-6
PTP Clock Configuration Procedure ...........................................................................1-7
PTP Clock Configuration Example............................................................................1-13
Event messages are timing messages. When the messages are sent and received,
accurate time stamps are generated.
An Event message set contains Sync, Delay_Req, Pdelay_Req, and Pdelay_Resp.
General messages are not timing messages. When the messages are sent and
received, no accurate time stamps are required.
A General message set contains Announce, Delay_Resp, Management, Signaling,
Follow_Up, and Pdelay_Resp_Follow_Up.
1-1
SJ-20110927150233-015|2012-08-29 (R1.2)
Note:
Time stamps are used to transfer time information.
Function
Delay_Resp
Pdelay_Req, Pdelay_Resp,
Pdelay_Resp_Follow_Up
Announce
Management
Signaling
1-2
SJ-20110927150233-015|2012-08-29 (R1.2)
l
l
l
Note:
Grandmaster Clock (GMC): It is the clock of the highest level.
Master: It is the port that provides the clock source for the downstream devices.
Slave: It is the port that receives clock information from the upstream port.
BMC Algorithm
By comparing the data of two clocks, the BMC algorithm determines the clock with better
quality to obtain the optimal clock source. The BMC algorithm consists of the following two
parts:
l
Data set comparison algorithm: The NE first selects a better clock as its clock source.
For one NE, if two or more channels of clock signals from one GMC are available,
select the clock with the minimum number of nodes on its route to the NE as the clock
source.
Status determination algorithm: It determines the next status of the port based on the
result of the data set comparison algorithm.
1-3
SJ-20110927150233-015|2012-08-29 (R1.2)
l
l
l
l
Time t1: The master clock sends a synchronization packet. The time stamp t1 is sent
with the synchronization packet.
Time t2: The slave clock receives the synchronization packet and obtains the time
stamp t1.
Time t3: The slave clock sends the delay request packet to the master clock.
Time t4: After receiving the delay request packet, the master clock sends the delay
response packet to the slave clock. The time stamp t4 is sent with the packet.
Based on the time stamp, the slave clock calculates the path delay and time deviation from
the master clock, and corrects the time of the slave clock.
1-4
SJ-20110927150233-015|2012-08-29 (R1.2)
The Building Integrated Timing Supply (BITS) sends time signals to NE A and the RNC.
NEA, which acts as the BC device, sends PTP packets to the downstream devices. PTP
signals are transmitted in the form of PTP packets. The downstream devices, which act
as TC or TC + OC devices, transparently transmit the PTP packets. NE E and NE F, which
act as OC devices, restore the PTP clock signals to clock signals and transmit the clock
signals to Node B.
If ZXCTN devices need to traverse an intermediate network (third-party network), the
intermediate network may not support clock and time synchronization. In this case, the
1588 frequency retrieval function must be used for synchronization. For the application
scenario, see Figure 1-4.
The intermediate networks fall into the following types:
l
l
l
1-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Figure 1-4 Application Scenario of the PTP Clock in Traversing a Third-Party Network
A third-party network exists between the ZXCTN devices that act as the BC devices.
Because the third-party network does not support clock and time synchronization, ZXCTN
devices use the 1588 frequency retrieval function to restore the clock signals that traverse
the third-party network to precise PTP clock signals, completing the frequency and time
synchronization of the clock signals.
1-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select Clock Time
Configuration > Clock Source Configuration. The Clock Source Configuration
dialog box is displayed.
3. On the GPS Configuration tab, configure the GPS clock. For a description of the
parameters, refer to Table 1-2.
1-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Port
If Enable
Protocol Type
Speed (bps)
Direction
4. Click Apply.
End of Steps
Prerequisite
The time synchronization source is available in the network
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select Clock Time
Configuration > Clock Source Configuration. The Clock Source Configuration
dialog box is displayed.
3. On the Time Node Configuration tab, configure the time node. For a description of
the parameters, refer to Table 1-3.
1-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Ordinary: The ordinary clock only provides one PTP physical port
to connect to the network. It is used as the time source or clock
terminal of the entire network.
E2E: The E2E transparent clock forwards all the PTP messages.
For event messages, it computes the time that the messages
reside on the node.
P2P: The P2P transparent clock measures the delay of each port
and the corresponding peer port. The peer port must support the
P2P mode. The difference between P2P and E2E only lies in the
method of revising PTP time.
Ordinary+E2E
Ordinary+P2P
clock-accuracy
1-9
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Priority 1
Priority 2
Slave Only
Two Steps
Time Source
atomic-clock
gps
ptp
terrestrial-radio
ntp
hand-set
internal-oscillator
other
4. Click Apply.
End of Steps
1-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Prerequisite
Time nodes are configured on the device.
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select Clock Time
Configuration > Clock Source Configuration. The Clock Source Configuration
dialog box is displayed.
3. On the Time Domain Configuration tab, configure the time domain. For a description
of the parameters, refer to Table 1-4.
Table 1-4 Parameter Descriptions for PTP Time Domain Configuration
Parameter
Description
Domain Delay
Mechanism
s)
Announce Timeout
Multiples
4. Click Apply.
End of Steps
Prerequisite
The time domain is configured on the device.
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
1-11
SJ-20110927150233-015|2012-08-29 (R1.2)
2. From the NE Operation navigation tree in the left pane, select Clock Time
Configuration > Clock Source Configuration. The Clock Source Configuration
dialog box is displayed.
3. On the Time Source Vlan Port Configuration tab, click Add. The Time Source Vlan
Port Configuration dialog box is displayed.
4. Configure the PTP time port. For a description of the parameters, refer to Table 1-5.
Table 1-5 Parameter Descriptions for PTP Time Port Configuration
Parameter
Description
Start
Port
Force Status
IfMulDomain
AvgSyncSend ( 2^n s)
1-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
dDelayReg (2^n s)
ProLayer
1588OverETH.
1588OverUDP.
By default, the EMS considers that the device supports L2 switching.
transparent enable
Transfer Mode
5. Click Apply.
End of Steps
Configuration Requirement
Figure 1-6 shows the network topology of the PTP clock. Node Bs and the Radio Network
Controller (RNC) require time and frequency synchronization, and implement service
interaction through the ZXCTN devices.
On the RNC side, the Global Positioning System (GPS) sends high-precision clock signals
to the RNC and to NE 1 that is interconnected with the RNC through the GPS time port.
The high-precision clock signals are then sent to Node Bs.
1-13
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Plan
Based on the configuration requirement, the service plan of the PTP clock is as follows:
l
l
l
NE 1 obtains time signals from the GPS through the GPS antenna port on the main
control board. NE 1, working as a Boundary Clock (BC), converts the time signals into
PTP clock signals and distributes the signals.
NE 2, NE 3, and NE 4, working as Transparent Clocks (TCs), send PTP clock signals
transparently.
NE 5 and NE 6, working as Ordinary Clocks (OCs), receive PTP clock signals, restore
them to time signals, and send the time signals to Node Bs through the GPS antenna
port.
Perform the following operations on the Network element Management System (NMS) in
accordance with the service plan:
l
l
l
For the IP address plan of the NEs in the network, refer to Table 1-6.
1-14
SJ-20110927150233-015|2012-08-29 (R1.2)
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
NE 1
192.61.20.1
R1EXG
10.10.51.2
510
10.10.12.1
120
R8FEF
10.10.11.1
110
R1EXG
10.10.12.2
120
10.10.24.1
240
10.10.24.2
240
10.10.45.1
450
10.10.41.1
410
10.10.51.1
510
10.10.61.1
610
10.10.45.2
450
R1EXG
10.10.61.2
610
R8FEF
10.10.81.1
810
R1EXG
10.10.41.2
410
R8FEF
10.10.71.1
710
NE 2
192.61.20.2
NE 3
192.61.20.3
NE 4
192.61.20.4
NE 5
192.61.20.5
NE 6
192.61.20.6
R1EXG
R1EXG
Configuration Procedure
Note:
VLAN interface has been configured before the following procedures.
On the GPS Configuration tab, configure the GPS clock of NE 1. For the detailed
settings, refer to Table 1-7.
Table 1-7 GPS Clock Configuration of NE 1
Parameter
Value
Port
R8FEF[0-1-2]-Eth_U:1
1-15
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
If Enable
Protocol Type
UBX
Speed (bps)
4800
Direction
direction in
Other parameters
d. Click Apply.
2. Configure the PTP clock of NE 1.
a. On the Topology Management screen, right-click NE 1, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select Clock
Time Configuration > Clock Source Configuration. The Clock Source
Configuration dialog box is displayed.
c.
On the Time Node Configuration tab, configure the time node of NE 1. For the
detailed settings, refer to Table 1-8.
Table 1-8 PTP Time Node Configuration of NE 1
Parameter
Value
Boundary
BMC Arithmetic
Priority 1
128
Priority 2
128
Two Steps
Time Source
gps
Other parameters
d. Click Apply.
e. On the Time Domain Configuration tab, configure the time domain of NE 1. For
the detailed settings, refer to Table 1-9.
Table 1-9 PTP Time Domain Configuration of NE 1
Parameter
Value
Domain Delay
E2E
Mechanism
Announce Interval (2^n s)
1-16
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
Announce Timeout
Multiples
Other parameters
f.
On the Time Source Vlan Port Configuration tab, click Add. The Time Source
Vlan Port Configuration dialog box is displayed.
g. Configure the PTP time port of NE 1. For a description of the parameters, refer to
Table 1-10.
Table 1-10 PTP Time Port Configuration of NE 1
Parameter
Value
Start
Port
R1EXG[0-1-3]-Eth:1
R1EXG[0-1-4]-Eth:1
IfMulDomain
Delay Detect
E2E
ProLayer
1588OverETH
Transfer Mode
multicast
transparent enable
enable
Other parameters
3. Repeat step 2 to configure the PTP clocks of NE 2 to NE 6. For the detailed settings,
refer to Table 1-11, Table 1-12, and Table 1-13.
Table 1-11 PTP Clock Configuration of NE 2
Parameter
Time Node
Configuration tab
Value
Time Node Type
E2E
Local Time
BMC Arithmetic
Arithmetic
Priority 1
128
Priority 2
128
Two Steps
Time Source
ptp
1-17
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Time Source
Vlan Port
Value
Start
Port
R1EXG[0-1-3]-Eth:1
Configura-
R1EXG[0-1-4]-Eth:1
tion tab
IfMulDomain
Delay Detect
E2E
ProLayer
1588OverETH
transparent enable
enable
Transfer Mode
multicast
Other parameters
Value
Time Node Type
E2E
BMC Arithmetic
Priority 1
128
Priority 2
128
Two Steps
Time Source
ptp
Start
Port
R1EXG[0-1-2]-Eth:1
tion tab
Time Source
Vlan Port
Configura-
R1EXG[0-1-3]-Eth:1
tion tab
R1EXG[0-1-4]-Eth:1
IfMulDomain
Delay Detect
E2E
ProLayer
1588OverETH
transparent enable
enable
Transfer Mode
multicast
Other parameters
1-18
SJ-20110927150233-015|2012-08-29 (R1.2)
Value
Time Node Type
Ordinary
BMC Arithmetic
Priority 1
128
Priority 2
128
Two Steps
Slave Only
Time Source
ptp
Time Do-
Domain Delay
E2E
main Con-
Mechanism
Configuration tab
figuration
Announce Timeout
tab
Multiples
Time Source
Vlan Port
Start
Port
R1EXG[0-1-2]-Eth_U:1
IfMulDomain
Delay Detect
E2E
ProLayer
1588OverETH
transparent enable
enable
Transfer Mode
multicast
Configuration tab
Other parameters
On the GPS Configuration tab, configure the GPS clock of NE 5. For the detailed
settings, refer to Table 1-14.
Table 1-14 GPS Clock Configuration of NE 5/NE 6
Parameter
Value
Port
R8FEF[0-1-3]-Eth_U:1
If Enable
1-19
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
Protocol Type
UBX
Speed (bps)
4800
Direction
direction out
Other parameters
d. Click Apply.
e. Repeat step a through step d to configure the GPS clock of NE 6.
1-20
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 2
DCN
Table of Contents
DCN Overview ...........................................................................................................2-1
DCN Application.........................................................................................................2-3
DCN Configuration Flow.............................................................................................2-4
Configuring the DCN .................................................................................................2-5
DCN Configuration Example.......................................................................................2-7
2-1
SJ-20110927150233-015|2012-08-29 (R1.2)
The in-band DCN network architecture features flexible network architecture. In this mode,
no extra device or network is required for the DCN network, reducing the operating costs.
2-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 2 DCN
Compared with the in-band DCN network architecture, the out-of-band DCN network
architecture provides more reliable management channels. When service channels fail,
network management information is still available, realizing real-time monitoring.
If Ethernet ports are used to bear network management information, the devices use
special Virtual Local Area Network (VLAN) IDs to distinguish network management
information and service information.
If E1 ports are used, the devices use special Multi-Protocol Label Switching (MPLS)
tags to distinguish network management information and service information.
2-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Compared with the in-band DCN network architecture mode, the out-of-band network
architecture mode is more reliable. In the out-of-band network architecture mode, data
management is ensured, but the operating costs are increased.
2-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 2 DCN
l
l
Note:
Gateway NEs refer to the devices that are directly connected to the NMS server or
DCN network through the Qx port.
Non-gateway NEs refer to the devices that are not connected directly to the NMS
server or DCN network. These devices are managed by the NMS through the board
and port bandwidth resources.
Prerequisite
l
l
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. Manage a gateway NE on the EMS server.
a. On the Topology Management screen, right-click a blank area, and select Create
Object > Create BN-xTN NE from the shortcut menu. The Create BN-xTN NE
dialog box is displayed.
b. In the navigation tree in the left pane, select a device model for the NE.
c. Set IP Address.
d. Set other parameters in accordance with the application scenario.
e. Click Apply.
f. Connect the Qx port of the NE to the EMS server.
g. Set the IP address of the EMS server. The IP address must be in the same network
segment as that of the Qx port.
2. Enable the local DCN function.
a. On the Topology Management screen, right-click the gateway NE, and select NE
Manager from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select System
Configuration > DCN Configuration > DCN Local Global Configuration. The
DCN Local Global Configuration dialog box is displayed.
c. On the DCN Local Global Configuration tab, select True from the DCN Global
Enable list.
d. Click
Chapter 2 DCN
Description
IP Address
Subnet Mask
OSPF Enable
Spread Attribute
OSPF Instance
OSPF Area ID
ISIS Enable
2-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Requirement
There is no private DCN between managed devices NE 1 and NE 4. It is required to use
a service channel to send network management information, implementing the network
management.
Figure 2-6 shows the network topology of the DCN, where the in-band DCN network
architecture mode is used, and NE 1 is the access NE.
Figure 2-6 Network Topology of DCN
Configuration Plan
Based on the configuration requirement, the DCN plan is as follows:
l
Gateway NE 1 is managed through the NMS server. The IP address of the NMS server
and the IP address of the Qx port of NE 1 must be in the same network segment.
In this example, the IP address of the NMS server is 10.10.10.9, and the IP address
of the Qx port of NE 1 is 10.10.10.18.
l
l
On the gateway NE 1, enable the global local DCN, and configure the DCN
management IP address and DCN Qx port IP address.
On non-gateway NE 2 to NE 4, configure DCN management IP addresses of the
neighbor NEs.
Configuration Procedure
Note:
You have logged in to NE 1 through the serial port.
Chapter 2 DCN
a. On the Topology Management screen, right-click a blank area, and select Create
Object > Create BN-xTN NE from the shortcut menu. The Create BN-xTN NE
dialog box is displayed.
b. In the navigation tree in the left pane, select CTN Device > ZXCTN 6200.
c.
Value
NE Name
NE 1
IP Address
192.61.20.1
Note:
Set other parameters in accordance with the application scenario.
d. Click Apply.
e. Connect the Qx port of NE 1 to the EMS server.
f.
Set the IP address of the EMS server. The IP address must be in the same network
segment as that of the Qx port.
In this example, set the IP address of EMS server to 10.10.10.9, and set the subnet
mask to 255.255.255.0.
On the DCN Local Global Configuration tab, select True from the DCN Global
Enable list.
d. Click
2-9
SJ-20110927150233-015|2012-08-29 (R1.2)
c.
Value
IP Address
192.61.20.1
Subnet Mask
255.255.255.0
d. Click
On the Qx Interface Attribute tab, configure the IP address of the DCN Qx port
of NE 1. For the detailed settings, refer to Table 2-4.
Table 2-4 IP Address Configuration of the DCN Qx Port of NE 1
Parameter
Value
IP Address
10.10.10.18
Subnet Mask
255.255.255.0
OSPF Enable
True
Other parameters
d. Click
Value
Device Type
ZXCTN 6300
ZXCTN 6200
ZXCTN 6300
NE Name
NE 2
NE 3
NE 4
IP Address
192.61.20.2
192.61.20.3
192.61.20.4
2-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 2 DCN
Note:
Set other parameters in accordance with the application scenario.
c.
Click Apply.
On the Management IP Attribute tab, set the management IP address and subnet
mask of NE 2. For the detailed settings, refer to Table 2-6.
Table 2-6 Management IP Configuration
Parameter
NE2
NE3
NE4
IP Address
192.61.20.2
192.61.20.3
192.61.20.4
Subnet
255.255.255.0
255.255.255.0
255.255.255.0
Mask
d. Click
On the Management IP Attribute tab, set the management IP address and subnet
mask of NE 3. For the detailed settings, refer to Table 2-6.
d. Click
c.
On the Management IP Attribute tab, set the management IP address and subnet
mask of NE 4. For the detailed settings, refer to Table 2-6.
d. Click
2-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3
QoS
Table of Contents
QoS Overview ............................................................................................................3-1
QoS Application .........................................................................................................3-4
QoS Configuration Flow .............................................................................................3-5
QoS Configuration Procedure.....................................................................................3-5
QoS Configuration Example .....................................................................................3-20
QoS Metrics
l
l
l
l
l
3-1
SJ-20110927150233-015|2012-08-29 (R1.2)
DS domain consists of a group of DS nodes that support the same service policy and
implement the same Per-Hop Behavior (PHB).
DS nodes are categorized into two types: boundary DS nodes and internal DS nodes.
Boundary DS nodes classify the traffic that needs to enter the DS domain and mark
the service traffic of different types with different PHB service levels. Internal DS nodes
perform traffic control based on the PHB service levels.
The ZXCTN device, as a node in the DS domain, performs traffic classification on the
access packets, implements Commit Access Rate (CAR) control, and uses the specified
packet discard policy and different queue scheduling policies to solve congestion problems
and implement end-to-end QoS control.
l
Traffic classification
Two modes are supported, simple traffic classification and complex traffic
classification.
Simple traffic classification: In this mode, the priorities carried in the access
packets are directly mapped onto the specified PHB service levels. When the
packets traverse the nodes in the DS domain, the packets enjoy the same PHB
service. This mode is normally applied to the internal nodes of the DS domain.
Simple classification of Ethernet packets, IP packets, and Multi-Protocol Label
Switching (MPLS) packets is supported. Mapping between VLAN Priority, IP
Differentiated Services Code Point (DSCP), MPLS EXP, and the PHB service
priorities is supported.
CAR control
Committed Access Rate (CAR) control is applied on the access side, performing
dual-rate three-color management on the access traffic.
When the traffic rate is lower than the Committed Information Rate (CIR), the
packets are colored in green, and the packets can normally pass the node.
3-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
When the traffic rate is between the CIR and the Peak Information Rate (PIR), the
packets are colored in yellow, but the packets can still normally pass the node.
When the traffic rate exceeds the PIR, the packets are colored in red, and the
packets are discarded immediately.
Two coloring modes are supported: Color-Blind and Color-Aware. Different from
Color-Blind, the current color of the packets must be considered before coloring the
packets in Color-Aware mode.
l
Tail drop: When a queue is full, the packets that arrive late are directly discarded.
Random Early Detection (RED): After a queue reaches a certain length, packets
are discarded at random. This prevents global synchronization that may be
caused by slow start mechanism of TCP.
Weighted Random Early Detection (WRED): During packet discard, the length of
the queue and the priorities (colors) of the packets are considered. Users can
configure the system to discard the packets with higher discard priorities (such
as red and yellow packets) earlier. In addition, the probability that the packets
are discarded is higher.
The tail drop and WRED policies are supported. Users can configure the start point
and discard probability for WRED.
l
SP: In this mode, the queue priorities are strictly followed to schedule the packets
in the queues. Only when a queue with a higher priority is empty can the packets
in a queue with a lower priority be sent. This scheduling mode ensures that the
packets in the queue with a higher priority are forwarded with a low delay, but the
packets in the queue with a lower priority may fail to be handled.
DWRR: In this mode, fair scheduling is performed on each queue based on the
weights assigned to the queues. Normally, a queue with a higher priority is
assigned a larger weight and occupies a larger bandwidth. A queue with a lower
priority is assigned a smaller weight and occupies a smaller bandwidth. This
scheduling mode not only ensures that the packets in the queue with a higher
priority are forwarded with a low delay, but also ensures that the packets in the
queue with a lower priority are handled effectively.
3-3
SJ-20110927150233-015|2012-08-29 (R1.2)
WRR: WRR is similar to DWRR. The difference is that the weight in WRR is the
number of packets while the weight in DWRR is the number of bytes.
QoS Policies
QoS policies include port QoS policy, User Network Interface (UNI) Ingress policy,
UNI Egress policy, PW policy, VLAN Tag in VLAN Tag (Q-in-Q) policy, Weighted Fair
Queuing (WFQ) scheduling policy, Weighted Random Early Detection (WRED) policy,
and Committed Access Rate (CAR) policy.
The QoS policies are implemented through the following two steps:
1. Set up the mapping between service priorities and Per-Hop Behavior (PHB) forwarding
types.
2. Implement end-to-end quality control through the following QoS policies:
l Set up the port QoS policy: In the ingress direction, the available policy is to filter
ingress traffic based on the Access Control List (ACL) rule. Only the traffic that
matches the rule can be received or discarded by the port. In the egress direction,
the available policy is to control the traffic that is of different PHB forwarding types.
l Set up the UNI Ingress policy: It is the traffic control policy for the services in the
ingress direction.
l Set up the UNI Egress policy: It is the traffic control policy for the services in the
egress direction.
l Set up the PW policy: It is the traffic control policy for the PWs in the ingress
direction.
l Set up the Q-in-Q policy: It is the traffic control policy for the Q-in-Q services, and
the policy is applied in the ingress direction.
l Set up the WFQ scheduling policy: It is the traffic control policy for the services in
the ingress direction.
l Set up the WRED policy: If network congestion occurs or the network performance
is deteriorated, use the WRED discard policy to ensure the QoS of the services
with higher priorities.
3-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
Set up the CAR policy: It is applied on the device access side, performing
dual-rate three-color management on the access traffic.
3-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Context
The configuration of customer service category and access rate involves the following
operations:
l
l
l
l
l
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select QOS Configuration >
ACL Configuration. The ACL Configuration dialog box is displayed.
3. Create an ACL rule.
a. On the ACL CoS tab, select Add ACL from the Add list. The Add ACL dialog
box is displayed.
b. Configure the ACL rule. For a description of the parameters, refer to Table 3-1.
Table 3-1 Parameter Descriptions for ACL Rule Configuration
Parameter
Description
ACL ID
ACL Type
Set the type of the ACL rule. The available types include:
l
Rule ID
3-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
Parameter
Description
Control Mode
Time Range
Classification Mode
IP protocol No.
Set the type of the IP protocol. The available types include ANY,
IGMP, GRE, OSPF, PIM, VRRP, and Other Values.
This parameter can be configured only if ACL Type is set to Hybrid
or Extended, and IP is selected for Classification Mode.
Source Address
If the ANY check box is not selected, the source IP address of the
message needs to be set.
If the ANY check box is selected, the EMS assigns the source IP
address of the message automatically.
This parameter can be set only if ACL Type is set to Hybrid,
Standard, or Extended.
Source Wildcard
Source Port
If the Enable check box is selected, the rule of the source port can
be set.
This parameter can be configured only if ACL Type is set to Hybrid
or Extended, and TCP or UDP is selected for Classification Mode.
l
Destination Address
Destination Wildcard
3-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Destination Port
If the Enable check box is selected, the rule of the destination port
can be set.
This parameter can be set only if ACL Type is set to Hybrid or
Extended, and TCP or UDP is selected for Classification Mode.
l
Precedence
Set the IPv4 priority, ranging from 0 to 7. The larger the value, the
higher the priority.
This parameter can be set only if ACL Type is set to Hybrid or
Extended, and Precedence is selected in Classification Mode.
IPv4 ToS
Set the IPv4 ToS priority, ranging from 0 to 15. The larger the value,
the higher the priority.
This parameter can be set only if ACL Type is set to Hybrid or
Extended, and IPv4 ToS is selected in Classification Mode.
IPv4 DSCP
Set the IPv4 DSCP priority, ranging from 0 to 63. The larger the
value, the higher the priority.
This parameter can be set only if ACL Type is set to Hybrid or
Extended, and IPv4 DSCP is selected in Classification Mode.
TCP Established
If the Yes check box is selected, the TCP is used to create links.
This parameter can be set only if ACL Type is set to Extended, and
TCP is selected in Classification Mode.
If the ANY check box is not selected, the source MAC address of
the message needs to be set.
If the ANY check box is selected, the EMS assigns the source MAC
address of the message automatically.
This parameter can be set only if ACL Type is set to Hybrid.
Source MAC
Wildcard
This parameter can be set only if the source MAC address is set
manually.
3-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
Parameter
Description
Destination MAC
If the ANY check box is not selected, the destination MAC address
Address
Destination MAC
Wildcard
Ethernet Protocol
Set the type of the Ethernet protocol. The available types include:
Type
Inner 802.1P
Exterior 802.1P
Inner VLAN
Exterior VLAN
VPI
VCI
Note:
One ACL can contain multiple rules. The procedure for adding a rule is as follows:
Select an ACL to be configured, select Add Rule from the Add list. The Add ACL
rule dialog box is displayed. Set the parameters of the rule.
3-9
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
ACL ID
Rule group ID
Rule ID list
Description
Port
ACL In In_direction
Description
ACL ID
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
Parameter
Description
CIR (kbps)
CBS (kBytes)
PIR (kbps)
PBS (kBytes)
Mode
Note:
Controlling the access rate based on ACL refers to supervising traffic and
discarding the messages whose rates exceed the preset threshold.
Description
ACL ID
Type
ACL Group ID
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Service Level
Color
Context
The priority mapping table of the ZXCTN device is called DS domain. The DS domain is
a set, which contains the following two mapping relationships:
l Message priority (802.1p/DSCP/EXP) -> Internal priority + color
l Internal priority + color ->Message priority
The ZXCTN device supports up to 10 DS domains, including:
l
l
l
Creating a DS domain
Applying a DS domain
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select QOS Configuration >
DS Domain Configuration. The DS Domain Configuration dialog box is displayed.
3. Create a DS domain.
3-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
a. On the Create DS (Differ Service) Domain tab, click Add to create a DS domain.
b. Configure the new DS domain. For a description of the parameters, refer to Table
3-6.
Table 3-6 Parameter Descriptions for DS Domain Configuration
Parameter
Create
DS (Differ
Service)
Description
DS Domain Name
802.1P Effective
Mapping Direction
Domain
tab
DSCP Effective
Mapping Direction
EXP Effective
Mapping Direction
3-13
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
802.1P tab
Description
In
Priority
Direction
Out
Direction
Ser-
vice
Color
EXP tab
In
Priority
Direction
Out
Direction
Ser-
vice
Color
Description
3-14
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
Parameter
Description
Apply Object
DS Domain Name
Trust Priority
Context
The port traffic control refers to the Committed Access Rate (CAR), which is used on the
access side to implement the double-rate three-color management for the ingress traffic.
l
l
l
If the traffic rate is lower than the CIR, the messages are colored green, and can pass
through the port successfully.
If the traffic rate is between the CIR and the PIR, the messages with the rate exceeding
the CIR are colored yellow, and can pass through the port successfully.
If the traffic rate exceeds the PIR, the messages with the rate exceeding the PIR are
colored red and are discarded directly.
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select QOS Configuration >
Port Traffic Limit Configuration. The Port Traffic Limit Configuration dialog box
is displayed.
3. Click Add to create a port traffic control entry.
4. Configure the new port traffic control entry. For a description of the parameters, refer
to Table 3-8.
Table 3-8 Parameter Descriptions for Port Traffic Control Configuration
Parameter
Description
Port Name
3-15
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
CIR (kbps)
CBS (kBytes)
PIR (kbps)
PBS (kBytes)
Context
The complex stream category is applied at the Pseudo Wire (PW) layer. Before the service
configured with a complex stream category is encapsulated to a PW, the system loads the
service to the specified PW and sends it in accordance with the settings of the complex
stream category.
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select QOS Configuration >
Complex Flow Class. The Complex Flow Class dialog box is displayed.
3. Click Add. The Create complex flow class template dialog box is displayed.
4. Set the complex stream category parameters. For a description of the parameters,
refer to Table 3-9.
3-16
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
Description
Flow Name
Type
SVLAN
from 1 to 4094.
Set the SVLAN priority, ranging from 0 to 7.
The larger the value, the higher the priority.
SVLAN Priority
CEVLAN
5. Click OK to return to the Create complex flow class template dialog box.
6. Click Apply. A confirmation message box is displayed.
7. Click OK.
End of Steps
Context
The common discard algorithms include tail discard and Weighted Random Early Detection
(WRED).
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select QOS Configuration >
Discard Strategy. The Discard Strategy dialog box is displayed.
3. Click Add to create a discard policy.
3-17
SJ-20110927150233-015|2012-08-29 (R1.2)
4. Configure the new discard policy. For a description of the parameters, refer to Table
3-10.
Table 3-10 Parameter Descriptions for Discard Policy Configuration
Parameter
Description
Strategy Name
Yellow
Minimum Threshold
Maximum Threshold
Green
Probability (WRED)|
Threshold (TrailDrop)
Minimum Threshold
Maximum Threshold
Probability (WRED)|
Threshold (TrailDrop)
Note:
The maximum discard threshold for yellow messages must be equal to the minimum
discard threshold for green messages.
Context
Each Ethernet port of the ZXCTN device supports eight output queues. The service levels
of these queues from low to high are CS7, CS6, EF, AF4, AF3, AF2, AF1, and BE.
3-18
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select QOS Configuration >
Flow Queue. The Flow Queue dialog box is displayed.
3. Create a stream queue.
a. On the Create Flow Queue tab, click Add to create a stream queue.
b. Configure the new stream queue. For a description of the parameters, refer to
Table 3-11.
Table 3-11 Parameter Descriptions for Stream Queue Configuration
Parameter
Description
Name
Service Class
Scheduling Algorithm
DWRR Cost
Strategy Name
Description
Apply Object
Configuration Requirement
Figure 3-3 shows the network topology of the QoS, where the ZXCTN devices admit
Ethernet services through Fast Ethernet (FE) ports. Since the user is important, the QoS
must be ensured for the services.
Figure 3-3 Network Topology of QoS
Configuration Plan
Based on the user level, the QoS plan is as follows:
l
l
l
On 3#R8FEF: Eth_U1 of NE 1, configure the Access Control List (ACL) rule, set
customer services in the Assured Forwarding 4 (AF4) queue, mark the services in
green, and restrict the rate CIR=PIR=20480 kbps, CBS=PBS=100 kBytes.
On NE 2, configure a DS domain applying for 10#R1EXG: Eth_U1.
On 3#R8FEF: Eth_U1 of NE 3, use SP queue scheduling and WRED discard policy.
For the IP address plan of the NEs in the network, refer to Table 3-13.
3-20
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
NE 1
192.61.20.1
R1EXG
10.10.12.1
120
R8FEF
10.10.11.1
110
R1EXG
10
10.10.12.2
120
10.10.24.1
240
R1EXG
10.10.24.2
240
R8FEF
10.10.41.1
410
NE 2
192.61.20.2
NE 3
192.61.20.3
Configuration Procedure
Note:
VLAN interface has been configured before the following procedures.
On the ACL CoS tab, select Add ACL from the Add list. The Add ACL dialog
box is displayed.
d. Configure the ACL rule of NE 1. For the detailed settings, refer to Table 3-14.
Table 3-14 ACL Rule Configuration of NE 1
Parameter
Value
ACL ID
300
Rule ID
Other parameters
g. Click OK.
h. On the ACL CoS group tab, click Add to create a new ACL rule group.
i.
Configure the ACL rule group of NE 1. For the detailed settings, refer to Table
3-15.
3-21
SJ-20110927150233-015|2012-08-29 (R1.2)
Value
ACL ID
300
Rule group ID
Rule ID list
j.
k.
Click OK.
l.
On the Port ACL Configuration tab, configure a port ACL of NE 1. For the
detailed settings, refer to Table 3-16.
Table 3-16 Port ACL Configuration of NE 1
Parameter
Value
Port
R8FEF[0-1-3]-Eth_U:1
ACL In In_direction
300
Value
ACL ID
300
ACL Rule
CIR (kbps)
20480
CBS (kBytes)
100
PIR (kbps)
20480
PBS (kBytes)
100
Mode
Color-bindness
Click OK.
s.
On the ACL Priority Mark tab, click Add to create a priority marking.
3-22
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 3 QoS
t.
Configure the new priority marking of NE 1. For the detailed settings, refer to Table
3-18.
Table 3-18 Priority Marking Configuration of NE 1
Parameter
Value
ACL ID
300
Type
ACL Rule
ACL Group ID
Service Level
AF4
Color
Green
Click OK.
On the Create DS (Differ Service) Domain tab, click Add to create a DS domain.
d. Configure the new DS domain of NE 2. For the detailed settings, refer to Table
3-19.
Table 3-19 DS Domain Configuration of NE 2
Parameter
Value
DS Domain Name
DS-1
In Direction
Null Direction
Null Direction
Other parameters
Click OK.
g. On the Apply DS (Differ Service) Domain tab, click Add to create a DS domain
application.
h. Configure the new DS domain application of NE 2. For the detailed settings, refer
to Table 3-20.
3-23
SJ-20110927150233-015|2012-08-29 (R1.2)
Value
Ethernet Port
Apply Object
R1EXG[0-1-10]-Eth_U:1
DS Domain Name
DS-1
Trust Priority
802.1p
i.
j.
Click OK.
d. Configure the new discard policy of NE 3. For the detailed settings, refer to Table
3-21.
Table 3-21 Discard Policy Configuration of NE 3
Parameter
Value
Strategy Name
WRED-1
Discard Arithmetic
WRED
Yellow
Minimum Threshold
50
Maximum Threshold
75
70
Minimum Threshold
75
Maximum Threshold
100
30
Click OK.
Chapter 3 QoS
b. On the Create Flow Queue tab, click Add to create a stream queue.
c.
Configure the new stream queue of NE 3. For the detailed settings, refer to Table
3-22.
Table 3-22 Stream Queue Configuration of NE 3
Parameter
Value
Name
Queue-1
CS7/CS6/EF/B-
Scheduling
E/AF1/AF2/AF3
Algorithm
/AF4
SP
Discard Strategy
WRED
Type
Strategy Name
Other parameters
WRED-1
Use default settings.
On the Apply Flow Queue tab, click Add to create a stream queue application.
g. Configure the stream queue application of NE 3. For the detailed settings, refer
to Table 3-23.
Table 3-23 Stream Queue Application Configuration of NE 3
Parameter
Value
Ethernet Port
Apply Object
R8FEF[0-1-3]-Eth_U:1
Queue-1
Click OK.
3-25
SJ-20110927150233-015|2012-08-29 (R1.2)
3-26
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 4
IGMP Snooping
Table of Contents
IGMP Snooping Overview ..........................................................................................4-1
IGMP Snooping Application .......................................................................................4-2
Configuration Flow of IGMP Snooping .......................................................................4-3
Configuring the IGMP Snooping ................................................................................4-3
IGMP Snooping Configuration Example ....................................................................4-7
l
l
When the IGMP host report message sent by the host is snooped, the layer-2
equipment adds the host to the corresponding multicast list, and forwards the report
message to the corresponding router interface.
When the leave message sent by the host is snooped, the layer-2 equipment forwards
the leave message to the corresponding router interface.
When the IGMP query message sent by the router is snooped, the layer-2 equipment
forwards the IGMP query message to the host, and enables the query timer. After the
query timer expires, the layer-2 equipment deletes the host from the corresponding
multicast list.
Figure 4-1 shows the schematic diagram of IGMP snooping, where Sever is a multicast
source, Router A is a multicast router, and Host A and Host C are receivers. By operating
the IGMP snooping function on the ZXCTN 6200/6300/6220, a multicast group is created,
in which only Host A and Host C are group members. As a result, Host A and Host C can
receive multicast data of the multicast source, but Host B cannot. In this way, broadcast
messages in the network are reduced, which achieves the goal of bandwidth saving and
higher multicast safety.
4-1
SJ-20110927150233-015|2012-08-29 (R1.2)
4-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog box is
displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Multicast Management > IGMP Snooping Setting. The IGMP
Snooping Setting dialog box is displayed.
3. Perform the IGMP snooping global configuration
a. On the IGMP Snooping NE Global Configuration tab, perform the IGMP
snooping global configuration. For a description of the parameters, refer to Table
4-1.
Table 4-1 Parameter Descriptions for IGMP Snooping Global Configuration
Parameter
Description
Enable
Multicast Limit
V1/V2/V3
For the parameters not listed in the following table, use the default settings.
Description
Object ID
Enable
Leave Mode
Mode
4-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
(s)
group.
Range: 1-25, default: 1
Group
MultiCast Count
Query IP
Proxy IP
For the parameters not listed in the following table, use the default settings.
c. (Optional) On the Learning Close Port List of MultiCast Route tab, click Add to
add multicast route interfaces whose learning functions are to be disabled.
d. (Optional) On the MultiCast Route Port List tab, click Add to add multicast route
interfaces.
e. (Optional) On the Static Group Setting tab, click Add to add static multicast
groups. For a description of the parameters, refer to Table 4-3.
Table 4-3 Parameter Descriptions for Static Multicast Group Configuration
Parameter
Description
Group Address
User
Pre-Join
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Interface Name
For the parameters not listed in the following table, use the default settings.
Configuration Requirement
Figure 4-4 shows the network topology of IGMP snooping. There are three users in VLAN
200 of the ZXCTN device, which are connected to a multicast server through the ZXCTN
device. Two of the users need to download data from the multicast server.
Figure 4-4 Network Topology of IGMP Snooping
Configuration Plan
Based on the configuration requirement, the service plan is as follows:
4-7
SJ-20110927150233-015|2012-08-29 (R1.2)
l
l
Enable the global IGMP snooping function for the ZXCTN 6300 device.
Enable the IGMP snooping function in VLAN 200.
For the IP address plan of the NEs in the network, refer to Table 4-4.
Table 4-4 Network Plan of IGMP Snooping
NE
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
6300
192.61.20.1
R1EXG
10.10.20.1
200
10.10.20.2
200
10.10.20.3
200
10.10.20.4
200
Configuration Procedure
Note:
VLAN interface has been configured before the following procedures.
On the IGMP Snooping Global Config tab, configure the global properties of the
IGMP snooping function. For the detailed settings, refer to Table 4-5.
Table 4-5 Global IGMP Snooping Configuration
Parameter
Value
V1/V2/V3
Accept
Other parameters
d. Click Apply.
2. Configure the IGMP snooping function for VLAN 200.
a. On the Snooping Config tab, configure the IGMP snooping function. For the
detailed settings, refer to Table 4-6.
4-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Value
Object ID
VLAN:200
Enable
Leave Mode
Quick
Mode
Transparent
Other parameters
b. Click Apply.
4-9
SJ-20110927150233-015|2012-08-29 (R1.2)
4-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 5
LAG
Table of Contents
LAG Overview ............................................................................................................5-1
LAG Application .........................................................................................................5-3
LAG Configuration Flow .............................................................................................5-4
Configuring the LAG...................................................................................................5-5
LAG Configuration Example .......................................................................................5-9
5-1
SJ-20110927150233-015|2012-08-29 (R1.2)
In link aggregation, the Link Aggregation Control Protocol (LACP) is used to implement the
port trunk functions. LACP is a dynamic link aggregation protocol that is based on IEEE
802.3ad. In LACP, Link Aggregation Control Protocol Data Units (LACPDUs) are used to
interchange messages between two ends.
Controls addition of ports to an aggregation group and deletion of ports from the
aggregation group.
Increases the link bandwidth and implements bidirectional protection of links.
Improves fault tolerance.
Static aggregation: Static aggregation is based on the LACP protocol which is based
on IEEE 802.3ad. The two ends that take part in the aggregation interact with
each other through the LACP protocol and determine whether port aggregation is
successful.
Manual aggregation: The administrator assigns certain ports to an aggregation group.
On the ports, the LACP protocol need not be enabled. By default, regardless of the
peer port status, aggregation can be implemented only if the two ends are connected
successfully.
Load sharing mode: Traffic exists on all the member links of the aggregation group.
These member ports share the traffic load. If the members in the aggregation group
are changed, or certain links become invalid, traffic is re-allocated automatically. The
load sharing mode brings broader bandwidth for the links.
5-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 5 LAG
Active/Standby mode: In the aggregation group, traffic exists on only one member
link, and the other links are in the standby state. This mode provides a "hot backup"
mechanism. If the active link in the aggregation group becomes invalid, the system
selects a standby link to replace the invalid link and act as the active link.
The ZXCTN device also supports the LAG function in load sharing mode. For the
application instruction, see Figure 5-4. PE2 and the BSC/RNC are interconnected
through multiple GE ports that form a LAG group. The GE ports share loads. The device
automatically allocates the traffic loads on the logical port to multiple GE ports in the LAG
group.
If one GE port becomes faulty, the traffic on the faulty ports is automatically shared by
the other GE ports. This makes the links more reliable, ensuring normal operations of
the services. After the fault is cleared, the traffic is re-allocated again. This ensures load
sharing on the ports, reducing the loads on each port.
5-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Figure 5-4 LAG Application (on UNI Side in Load Sharing Mode)
5-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 5 LAG
Prerequisite
Before configuring the LAG, verify that:
l The Ethernet ports forming the LAG are GE.
l You are familiar with the basic operations for NE configuration.
l VLAN ports are configured on the EMS.
Steps
1. Set the rates of the Ethernet ports in the link aggregation to the same value.
a. On the Topology Management screen, right-click an NE to be configured, and
select NE Manager from the shortcut menu. The NE Manager dialog box is
displayed.
5-5
SJ-20110927150233-015|2012-08-29 (R1.2)
b. From the NE Operation navigation tree in the left pane, select Interface
Configuration > Ethernet Port Basic Property Configuration. The Ethernet
Port Basic Property Configuration dialog box is displayed.
c. Set Rate Selection of the Ethernet ports in the link aggregation to the same value.
Note:
Rate Selection of the Ethernet ports in the link aggregation must be the same.
The mode can be automatic or full duplex with the same rate.
Note:
The ports in a link aggregation group can belong to one board or different boards.
Description
User Label
Set the name of the link aggregation group. The name consists of 0 to 40
characters.
5-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 5 LAG
Parameter
Description
VLAN Mode
Access: The Ethernet frame passing through the port does not carry
a VLAN tag. The port adds a VLAN tag for the frame, namely Port
VLAN ID (PVID). When the Ethernet frame is sent from the port, its
PVID is removed, and the frame is reverted to the original frame
without a VLAN tag.
Trunk: If an Ethernet frame passing through the port does not carry a
VLAN tag, the port adds a VLAN tag for the frame, namely PVID. If the
Ethernet frame carries a VLAN tag, the frame is sent transparently. If
the VLAN tag of the Ethernet frame sent from the port is different from
the PVID of the port, the frame is sent transparently. Otherwise, the
VLAN tag of the frame is removed.
Aggregation Mode
Protection Mode
active State
LACP Priority
Set the LACP priority of the link aggregation group, ranging from 1 to
65535.
Through the LACP negotiation, the local and the peer link aggregation
groups obtain system priorities from each other. The protocol result
computed at the end with higher LACP priority is used as the common
result for both ends.
The larger the value, the higher the priority. If the LACP priorities at two
ends are the same, the protocol result computed at the end with smaller
port MAC address is used as the common result for both ends.
Negotiation Mode
5-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
the configuration of the peer port. If the peer port also works in passive
negotiation mode, the local port sends LACPDU messages.
Timeout Mode
Set the maximum waiting time for the peer end to send LACP messages.
Timeout Mode can be set to Long timeout or Short timeout. This
parameter can be configured only if Aggregation Mode is set to Static.
l
Set the port LACP priority to identify the priority of each member port in
becoming a selected port. The value ranges from 0 to 65535. The larger
the value, the higher the priority.
This parameter can be configured only if Aggregation Mode is set to
Static.
6. Set other properties of the link aggregation group in accordance with its protection
mode. For the detailed procedures, refer to the following table.
If ...
Then ...
i.
In the Aggregation Port Configuration dialog box, set the active/standby properties
of each port in the Slave/Master column.
ii.
i.
mode
In the Aggregation Port Configuration dialog box, set the load balancing mode in the
LACP-PLBalance column.
ii.
Note:
If Protection Mode is set to SlaveMaster Mode, the number of member ports in the
link aggregation must not exceed 2, and there should be only one active port and one
standby port in the link aggregation.
Chapter 5 LAG
8. Click OK.
End of Steps
Configuration Requirement
Figure 5-7 shows the network topology of the LAG. By connecting to the ZXCTN
6200/6300/6220 devices, the RNC implements service interaction with the remote Node
B. The ZXCTN devices connect to the RNC on the user side through ports GE 1, 2, and
3 that form a LAG.
Figure 5-7 Network Topology of LAG
Configuration Plan
Based on the configuration requirement, three GE ports of the ZXCTN devices are
configured as a dynamic link aggregation group working in loading balancing mode.
If one of the GE ports becomes faulty, the traffic on the faulty port is automatically shared
by the other GE ports, making the links more reliable. After the fault is cleared, the traffic
is re-allocated to multiple GE ports, reducing the traffic loads on each port.
For the IP address plan of the NEs in the network, refer to Table 5-2.
Table 5-2 Network Plan of LAG
NE
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
NE 1
192.61.20.1
R1EXG
10.10.51.2
510
10.10.12.1
120
10.10.11.1
110
R8FEF
5-9
SJ-20110927150233-015|2012-08-29 (R1.2)
NE
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
NE 2
192.61.20.2
R1EXG
10.10.12.2
120
10.10.24.1
240
10.10.21.1
210
10.10.21.3
210
10.10.21.5
210
10.10.24.2
240
10.10.51.1
510
NE 3
192.61.20.3
R1EXG
Configuration Procedure
Note:
Before configuring the LAG, verify that:
l You are familiar with the basic operations for NE configuration.
l VLAN ports are configured on the EMS.
1. Set the rates of the Ethernet ports in the link aggregation to the same value.
a. On the Topology Management screen, right-click NE 2, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select Interface
Configuration > Ethernet Port Basic Property Configuration. The Ethernet
Port Basic Property Configuration dialog box is displayed.
c.
d. Configure the port properties of NE 2. For the detailed settings, refer to Table 5-3.
Table 5-3 Basic Property Configuration of Ethernet Port (Load Balancing Mode)
Parameter
Value
Port No
Eth_U: 1
Eth_U: 2
Eth_U: 3
Rate Selection
10GE Full-duplex
VLAN Mode
Trunk
Click OK.
Chapter 5 LAG
a. From the NE Operation navigation tree in the left pane, select Interface
Configuration > Aggregation Port Configuration. The Aggregation Port
Configuration dialog box is displayed.
b. Click Add. The Create dialog box is displayed.
c.
d. Click Apply.
e. Click Close to return to the Aggregation Port Configuration dialog box.
3. Select Eth_U: 1, Eth_U: 2, and Eth_U: 3 of the R1EXG[012] board from
Aggregation Port List To Be Selected and add them to link aggregation group 1.
4. Click Advance. The Advance dialog box is displayed.
5. Configure the advanced properties of the link aggregation group. For the detailed
settings, refer to Table 5-4.
Table 5-4 Advanced Configuration of Link Aggregation Group 1 (Load Balancing
Mode)
Parameter
Value
User Label
LAG_1
VLAN Mode
Trunk
Aggregation Mode
handwork
Protection Mode
Load-balancing mode
LACP Priority
65535
It is the highest priority, indicating that the protocol result computed at
local end is used as the common result for both ends.
Other parameters
Value
Return Mode
Return
30
MAC Address
B0-D0-D0-61-03-01
Other parameters
5-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 6
MC-LAG
Table of Contents
Overview of MC-LAG .................................................................................................6-1
MC-LAG Application...................................................................................................6-2
MC-LAG Configuration Flow.......................................................................................6-3
Configuring the MC-LAG ...........................................................................................6-4
MC-LAG Configuration Example.................................................................................6-7
6-1
SJ-20110927150233-015|2012-08-29 (R1.2)
If a link failure occurs on the CE side, the selection of the active and standby links is realized
through CFM, EFM, and ZTE Fast Interface Detect (ZFID). In static mode, the standby link
is specified during configuration.
In dynamic mode, the active and standby links are determined through LACP packet
interaction between the CE and two PEs based on the rack addresses and priorities of
the two PEs.
UNI-Side Application
When the ZXCTN equipment is connected to the service-side equipment, including the
Base Station Controller (BSC), Radio Network Controller (RNC), and Ethernet exchanger,
the MC-LAG function can be used on the UNI side to protect the interfaces.
As shown in Figure 6-2, PE2 is connected to the BSC/RNC through the GE1 interface.
PE3 is connected to the BSC/RNC through the GE2 interface. The two Gigabit Ethernet
(GE) interfaces form the cross-rack LAG group.
Figure 6-2 MC-LAG Application (UNI Side)
The two GE interfaces can form active/standby or load sharing relationship as required.
l
l
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 6 MC-LAG
NNI-Side Application
When the ZXCTN equipment is connected to each other, the MC-LAG function can be
used on the NNI side to protect the interface. As shown in Figure 6-3, PE1, PE2, and
PE3 are connected to each other through the two GE interfaces forming the cross-rack
LAG group. The two GE interfaces can form active/standby or load sharing relationship
as required.
Figure 6-3 MC-LAG Application (NNI Side)
6-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Prerequisite
Before configuring MC-LAGs, you should verify that the rates of the Ethernet physical ports
that form a link aggregation group are GE.
Before configuring MC-LAGs, you should know basic operations of the NE configuration,
and implement the VLAN port configuration on the NMS.
Steps
1. Configure the rates of the physical ports participating in a link aggregation to be
consistent.
a. On the Topology Management screen, right-click an NE to be configured, and
select NE Manager from the shortcut menu. The NE Manager dialog box is
displayed.
6-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 6 MC-LAG
b. From the NE Operation navigation tree in the left pane, select Interface
Configuration > Ethernet Port Basic Property Configuration. The Ethernet
Port Basic Property Configuration dialog box is displayed.
c. Select a board to which the physical ports participating in a link aggregation belong
from the Select Board list.
d. Configure the basic properties of ports. For a description of the parameters, refer
to Table 6-1.
Table 6-1 Parameter Descriptions for Basic Configuration of Port
Parameter
Description
Port No
Rate Selection
VLAN Mode
Description
User Label
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
VLAN Mode
Aggregation Mode
Protection Mode
Lacp Priority
Description
Bundling Port
Slave/Master
Note:
This configuration is needed only if the protection mode of the link aggregation group
is set to SlaveMaster Mode.
Then ...
Mode
mode
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 6 MC-LAG
Description
Return Mode
Description
Return Mode
MAC Address
Configuration Requirement
Figure 6-5 shows the network topology of the MC-LAG working in the load-balancing
mode, where the RNC and the remote Node B implement service interaction through
the network comprised of the ZXCTN devices. To ensure the link reliability between the
ZXCTN devices, the MC-LAG is configured.
Figure 6-5 Network Topology of MC-LAG (Load-Balancing Mode)
Configuration Plan
Based on the configuration requirement, the service plan is as follows:
l
l
For the IP address plan of the NEs in the network, refer to Table 6-6.
Table 6-6 Network Plan of MC-LAG (Load-Balancing Mode)
NE
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
NE 1
192.61.20.1
R1EXG
10.10.51.2
510
10.10.12.1
120
R8EGE
10.10.11.1
110
R1EXG
10
10.10.12.2
120
11
10.10.24.1
240
12
10.10.21.1
210
10
10.10.24.2
240
11
10.10.41.1
410
12
10.10.51.1
510
NE 2
NE 3
192.61.20.2
192.61.20.3
R1EXG
6-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 6 MC-LAG
Configuration Procedure
Note:
Before the MC-LAG configuration, the VLAN ports must be configured.
1. Set the rates of the physical ports participating in a link aggregation to the same value.
a. On the Topology Management screen, right-click NE 1, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select Interface
Configuration > Ethernet Port Basic Property Configuration. The Ethernet
Port Basic Property Configuration dialog box is displayed.
c.
Select a board of NE 1 from the Select Board list, and configure the corresponding
ports of NE 1. For the detailed settings, refer to NE 1 column in Table 6-7.
Table 6-7 Basic Configuration of Port (Load-Balancing Mode)
Param-
NE 1
NE 2
NE 3
eter
Board
R1EXG[014]
R1EXG[013]
R1EXG[0110]
R1EXG[0112]
Port No
ETH:1
ETH:1
ETH:1
ETH:1
Rate Se-
10GE Full-duplex
10GE Full-duplex
10GE Full-duplex
10GE Full-duplex
Trunk
Trunk
Trunk
Trunk
lection
VLAN
Mode
SJ-20110927150233-015|2012-08-29 (R1.2)
3. In the Aggregation Port List To Be Selected area, add user Ethernet ports that
participate in the link aggregation to the link aggregation group one by one.
4. Click Advance. The Advance dialog box is displayed.
5. Configure the advanced properties of the link aggregation group of NE 1. For the
detailed settings, refer to NE 1 column in Table 6-8.
Table 6-8 Advanced Configuration of Link Aggregation Group (Load-Balancing
Mode)
Parameter
NE 1
NE 2
NE 3
User Label
Smartgroup1
Smartgroup1
Smartgroup2
VLAN Mode
Trunk
Trunk
Trunk
Aggregation
Handwork
Handwork
Handwork
Load-balancing mode
Load-balancing mode
Load-balancing mode
Lacp Priority
Other
Mode
Protection
Mode
Parameters
NE 1
NE 2
NE 3
Return Mode
Enabled
Enabled
Enabled
30
30
30
MAC Address
B0-D0-D0-61-03-01
00-D0-D0-61-03-01
00-1E-13-9B-0D-D9
Other Parameters
settings.
settings.
settings.
Chapter 6 MC-LAG
Configuration Requirement
Figure 6-6 shows the network topology of the MC-LAG working in the active/standby
mode, where the RNC and the remote Node B implement service interaction through
the network comprised of the ZXCTN devices. To ensure the link reliability between the
ZXCTN devices, the MC-LAG is configured.
Figure 6-6 Network Topology of MC-LAG (Active/Standby Mode)
Configuration Plan
Based on the configuration requirement, the service plan is as follows:
l
l
For the IP address plan of the NEs in the network, refer to Table 6-10.
Table 6-10 Network Plan of MC-LAG (Active/Standby Mode)
NE
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
NE 1
192.61.20.1
R1EXG
10.10.51.2
510
10.10.12.1
120
R8EGE
10.10.11.1
110
R1EXG
10
10.10.12.2
120
11
10.10.24.1
240
12
10.10.21.1
210
10
10.10.24.2
240
11
10.10.41.1
410
12
10.10.51.1
510
NE 2
NE 3
192.61.20.2
192.61.20.3
R1EXG
6-11
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Procedure
Note:
Before the MC-LAG configuration, the VLAN ports must be configured.
Select a board of NE 1 from the Select Board list, and configure the corresponding
ports of NE 1. For the detailed settings, refer to Table 6-11.
Table 6-11 Basic Configuration of Port (Active/Standby Mode)
Parameter
Value
Board
R1EXG[014]
R1EXG[013]
Port No
ETH:1
ETH:1
Rate
10GE Full-duplex
10GE Full-duplex
Trunk
Trunk
Selection
VLAN Mode
d. Click Apply.
e. Click Close to return to the Aggregation Port Configuration dialog box.
3. In the Aggregation Port List To Be Selected area, add user Ethernet ports that
participate in the link aggregation to the link aggregation group one by one.
4. Click Advance. The Advance dialog box is displayed.
6-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 6 MC-LAG
5. Configure the advanced properties of the link aggregation group of NE 1. For the
detailed settings, refer to Table 6-12.
Table 6-12 Advanced Configuration of Link Aggregation Group (Active/Standby
Mode)
Parameter
Value
User Label
MC-LAG_1
VLAN Mode
Trunk
Aggregation Mode
Trunk
Protection Mode
Handwork
Lacp Priority
65535
Other Parameters
Value
Bundling Port
R1EXG[014]ETH:1
R1EXG[013]ETH:1
Slave/Master
Master
Slave
8. In the LACP Attributes area, configure the LACP attributes of the link aggregation
group. For the detailed settings, refer to Table 6-14.
Table 6-14 LACP Property Configuration (Active/Standby Mode)
Parameter
Value
Return Mode
Enabled
30
Enabled
Other Parameters
6-13
SJ-20110927150233-015|2012-08-29 (R1.2)
6-14
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 7
ML-PPP
Table of Contents
ML-PPP Overview ......................................................................................................7-1
ML-PPP Application ...................................................................................................7-1
ML-PPP Configuration Flow .......................................................................................7-2
Configuring the ML-PPP ............................................................................................7-3
ML-PPP Configuration Example .................................................................................7-7
ML-PPP supports multiple service types, such as Time Division Multiplexing (TDM),
Asynchronous Transfer Mode (ATM), and Ethernet services.
These services are Pseudo Wire (PW) encapsulated, and then transmitted through
tunnels. On the multi-link ports that the tunnels pass through, perform ML-PPP
encapsulation on the services, and then transmit the service to the TDM interface.
7-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 7 ML-PPP
Steps
1. Configure the framing mode of E1 port.
a. On the Topology Management screen, right-click an NE to be configured, and
select NE Manager from the shortcut menu. The NE Manager dialog box is
displayed.
b. From the NE Operation navigation tree in the left pane, select Interface
Configuration > PDH Frame Configuration. The PDH Frame Configuration
dialog box is displayed.
c. Select an E1 board supporting the ML-PPP function from the Select Board list.
d. Configure the framing parameters of the PDH interfaces forming the ML-PPP
group. For a description of the parameters, refer to Table 7-1.
Table 7-1 Parameter Descriptions for the PDH Interface Framing Configuration
Parameter
Description
Is Frame
Set whether the framing mode is used on the interface. The available
modes include Frame and No Frame.
Frame Mode
Multiframe mode
The framing properties of the PDH interfaces in one ML-PPP group must be the same.
e. Click Apply.
2. Configure an ML-PPP port.
Note:
To bind an E1 link to the ML-PPP group, create a virtual port of the ML-PPP group
first, and add the framing E1 port to the ML-PPP group.
b. From the NE Operation navigation tree in the left pane, select Interface
Configuration > MLPPP Interface Configuration. The MLPPP Interface
Configuration dialog box is displayed.
c. On the MLPPP Interface tab, click Add. The Create MLPPP Interface dialog box
is displayed.
d. Set a Port No.
e. Click OK.
3. Add members in the ML-PPP.
a. On the MLPPP Interface tab, select a ML-PPP port.
b. In the Resource List box, select E1 ports in the ML-PPP group, and click
to add the E1 ports in the member lists of the MLPPP port.
c. Click Apply.
4. Configure the ML-PPP port.
a. Configure the ML-PPP port. For a description of the parameters, refer to Table
7-2.
Table 7-2 Parameter Descriptions for ML-PPP Port Configuration
Parameter
Description
Port No
Enable Fragment
Length (bytes)
Minimum Number of
Set the minimum number of active links for normal operation of the
Active Link
7-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 7 ML-PPP
Parameter
Description
Delay Threshold
Set the allowed delay for receiving data packets. When the delay
(ms)
Enable EPD
After the Early Packet Discard (EPD) detection is enabled, the links
belonging to the ML-PPP can negotiate with only one ML-PPP at
the same time.
b. Click Apply.
5. Query the state of the ML-PPP port.
a. On the MLPPP Interface State tab, select ML-PPP ports to be queried in the
navigation tree in the left pane.
b. Click Query. The state information of the ML-PPP ports are displayed on the right
pane.
Note:
The ML-PPP ports are activated (up state) only if the number of active member
links is larger than the minimum number of active links.
Description
Create Mode
Network Type
Protection Type
Terminal Type
Scenario
A1 End
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Z1 End
User Label
Route Compute
Parameter
Description
Create Mode
User Label
Tunnel Binding
Policy
A1 End
Z1 End
Forward Tunnel
Reverse Tunnel
of A-NE
the PW. For example, if E1 services are carried on the PW, select E1.
of Z-NE
the PW. For example, if E1 services are carried on the PW, select E1.
The forward label and the backward label can be created automatically.
c. Click Apply.
8. Create an end-to-end service in accordance with the service type. For the detailed
settings, refer to Table 7-5.
Table 7-5 End-To-End Service Configuration Procedure
Purpose
Action
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 7 ML-PPP
Purpose
Action
Description
Service Rate
Application Scene
User Label
A1 End
Z1 End
Pseudo Wire
Configuration
c. Click Apply.
End of Steps
Configuration Requirement
Figure 7-3 shows the network topology of the ML-PPP, where the BSC and the BTS
implement E1 service interaction through the ZXCTN devices. Both the BSC and the
BSC use E1 ports to connect with the ZXCTN devices.
7-7
SJ-20110927150233-015|2012-08-29 (R1.2)
The ML-PPP is used between two ZXCTN devices to bear E1 services between the BTS
and the BSC. The ML-PPP port comprises of three E1 ports.
Note:
The number of E1 ports that are bound to the ML-PPP port is determined by the required
bandwidth of the services that can be actually borne. For example, if the ML-PPP link
needs to bear three channels of E1 services, at least three E1 ports need to be bound to
the ML-PPP port.
Configuration Plan
Based on the configuration requirement, the service plan is as follows:
l
l
l
l
For the IP address plan of the NEs in the network, refer to Table 7-7.
Table 7-7 Network Plan of ML-PPP
NE
NE IP Address
Loopback
Board
Slot
Port
Address
NE 1
192.168.1.1
1.1.1.1
R16E1
F
Port IP
MAC
Address
Address
001E-
10.8.8.182
1-3
192.61.1.3
139B0D-D9 120
7-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 7 ML-PPP
NE
NE IP Address
Loopback
Board
Slot
Port
Address
NE 2
192.168.1.2
2.2.2.2
R16E1
F
Port IP
MAC
Address
Address
B0D0D06
10.8.8.183
1-3
192.61.1.4
10301
Configuration Procedure
1. Configure the framing mode of E1 port.
a. On the Topology Management screen, right-click NE 1, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select Interface
Configuration > PDH Frame Configuration. The PDH Frame Configuration
dialog box is displayed.
c.
d. Configure the framing parameters of E1 port. For the detailed settings, refer to the
NE 1 column in Table 7-8.
Table 7-8 PDH Interface Framing Configuration
Parameter
NE1
NE2
Port
PDH 2M:1
PDH 2M:1
PDH 2M:2
PDH 2M:2
PDH 2M:3
PDH 2M:3
Rate Level
2M
2M
Is Frame
Frame
Frame
Frame Mode
PCM30
PCM30
Multiframe
No Frame
No Frame
mode
The framing properties of the PDH interfaces in one ML-PPP group must be the same.
e. Click Apply.
f.
On the MLPPP Interface tab, click Add. The Create MLPPP Interface dialog box
is displayed.
7-9
SJ-20110927150233-015|2012-08-29 (R1.2)
d. Set a Port No. For the detailed settings, refer to the NE 1 column in Table 7-9.
e. Click OK.
3. Add members to the ML-PPP.
a. On the MLPPP Interface tab, select a created ML-PPP port.
b. In the Resource List box, select E1 ports in the ML-PPP group, and click
to add the E1 ports to the member lists of the MLPPP port.
c.
Click Apply.
NE1
NE2
Port No
McML-PPP
Enable Fragment
Encapsulation
Long Sequence
Long Sequence
Fragmentation Length
512
512
10
10
Other parameters
(bytes)
Minimum Number of Active
Link
b. Click Apply.
5. Query the state of the ML-PPP port.
a. On the MLPPP Interface State tab, select MLPPP ports to be queried in the
navigation tree in the left pane.
b. Click Query. The state information of the MLPPP ports are displayed on the right
pane.
Note:
The ML-PPP ports are activated (up state) only if the number of active member
links is larger than the minimum number of active links.
Chapter 7 ML-PPP
c.
Parameter
Value
Create Mode
Static
Network Type
Linear
Protection Type
NoProtection
Terminal Type
Terminal
Scenario
NoProtection+NoEndsTerminal
A1 End
NE1-MLPPP:1
Z1 End
NE2-MLPPP:1
User Label
Tunnel_NE1_NE2
Route Compute
Other parameters
d. Click No.
8. Create an end-to-end ML-PPP PW.
a. On the Topology Management screen, select the source and destination NEs
for PW creation. Select Service > New > New PW. The New PW dialog box is
displayed.
b. Configure an end-to-end ML-PPP PW. For the detailed settings, refer to Table
7-11.
Table 7-11 End-To-End ML-PPP PW Configuration
Parameter
Value
Create Mode
Static
User Label
E1-PW-NE1-NE2
A1 End
NE1
Z1 End
NE2
Forward Tunnel
Tunnel_NE1_NE2
7-11
SJ-20110927150233-015|2012-08-29 (R1.2)
c.
Parameter
Value
Reverse Tunnel
Tunnel_NE1_NE2
E1
E1
Other Parameters
The forward label and the backward label can be created automatically.
Click Apply.
c.
Parameter
Value
Service Rate
E1/VC12
User Label
TDM-E1
A1 End
NE1-R16E1F-(TDM+IMA)[0-1-3]-PDH 2M:1
Z1 End
NE1-R16E1F-(TDM+IMA)[0-1-3]-PDH 2M:1
E1-PW-NE1-NE2
Other Parameters
Click Apply.
7-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 8
MPLS OAM
Table of Contents
Ping ...........................................................................................................................8-1
Trace..........................................................................................................................8-9
8.1 Ping
8.1.1 Ping Overview
The MPLS Ping is a kind of technology based on MPLS OAM, which is used for defect
detection of the MPLS network.
IP Ping
Check whether the IPv4 route between the two equipment is reachable.
PW Ping
Check whether the PW between the two equipment is through.
LDP Ping
Check whether the LDP tunnel between the two equipment is through.
VRF Ping
Check whether the connection between the PE and CE is normal. It is applied to the
L3VPN.
Steps
1. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog box is
displayed.
2. From the NE Operation navigation tree in the left pane, select OAM Configuration >
IP MPLS OAM Configuration > Ping Detection Configuration. The Ping Detection
Configuration dialog box is displayed.
3. (Optional) Create a Ping template.
Note:
The NMS automatically creates a Ping template. You can configure multiple Ping
templates as required.
a. Click the
displayed.
b. Click the
icon.
c. Configure the Ping template. For a description of the parameters, refer to Table
8-1.
Table 8-1 Parameter Descriptions for Ping Template Configuration
Parameter
Description
Parameter Template
Name
Sent Packet Counts
Timeout (s)
For the parameters not listed in the following table, use the default settings.
SJ-20110927150233-015|2012-08-29 (R1.2)
b. Configure the Ping detection parameters in accordance with the detection task.
To ...
Do ...
Create an IP Ping
detection task
Create an MPLS-TE
Create a PW Ping
detection task
detection task
detection task
Description
Task Name
Ping Type
Source
Destination
Start Time
End Time
For the parameters not listed in the following table, use the default settings.
Description
Task Name
Ping Type
Source
Destination
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Start Time
End Time
For the parameters not listed in the following table, use the default settings.
Description
Task Name
Ping Type
Source
Destination
Start Time
End Time
For the parameters not listed in the following table, use the default settings.
Description
Task Name
Ping Type
Source
Destination
Start Time
End Time
For the parameters not listed in the following table, use the default settings.
Description
Task Name
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Ping Type
Source
Destination
Start Time
End Time
For the parameters not listed in the following table, use the default settings.
c. Click OK.
End of Steps
Configuration Requirement
Figure 8-1 shows the network topology of the Ping detection function. On NE 1 and
NE 2, the Ping detection functions is configured to detect whether the IPv4 routes, TE
dynamic tunnels, PWs, and LDP tunnels of two NEs are connected, and whether the
ZXCTN devices are connected to the CEs.
Figure 8-1 Network Topology of Ping Detection
Configuration Plan
For the IP address plan of the NEs in the network, refer to Table 8-7.
8-5
SJ-20110927150233-015|2012-08-29 (R1.2)
NE IP Address
Loopback
Board
Slot
Port
Port
NE 1
NE 2
192.61.20.1
192.61.20.2
1.1.1.1
R1EXG
1.1.1.2
R1EXG
Port IP
Port
Address
VLAN
192.61.1.1
100
192.61.2.2
200
11
192.61.1.2
100
12
192.61.3.2
300
CE 1
172.168.1.2
192.61.2.1
200
CE 2
192.168.1.2
192.61.3.1
300
Configuration Procedure
Note:
Before the configuration, verify that the following operations are implemented between NE
1 and NE 2:
l
l
l
The Multi-Protocol internal Border Gateway Protocol (MP-IBGP) runs on the public network
side of NEs, while the External Border Gateway Protocol (EBGP) runs on the private
network side of NEs.
Note:
The NMS automatically creates a Ping template. You can configure multiple Ping
templates as required.
a. Click the
displayed.
icon.
8-6
SJ-20110927150233-015|2012-08-29 (R1.2)
b. Click the
c.
Configure the Ping template. For the detailed settings, refer to NE 1 column in
Table 8-8.
Table 8-8 Ping Template Configuration
Parameter
NE 1
NE 2
TEMPLET1
TEMPLET1
36
36
10
10
Other parameters
b. Configure the Ping detection parameters in accordance with the detection task.
To ...
Do ...
NE 1
NE 2
Task Name
PING 1
PING 1
8-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
NE 1
NE 2
Ping Type
IP-ICMP-PING
IP-ICMP-PING
Source
1.1.1.1
1.1.1.2
Destination
TTL: 255
TTL: 255
10
10
Start Time
2011-05-10 15:42:56
2011-05-10 15:42:56
End Time
2011-06-10 15:42:56
2011-06-10 15:42:56
NE 1
NE 2
Task Name
PING 3
PING 3
Ping Type
MPLS-TE-LSP-PING
MPLS-TE-LSP-PING
Source
1.1.1.1
1.1.1.2
Destination
Tunnel ID: 1
Tunnel ID: 1
10
10
Start Time
2011-05-10 15:42:56
2011-05-10 15:42:56
End Time
2011-06-10 15:42:56
2011-06-10 15:42:56
NE 1
NE 2
Task Name
PING 4
PING 4
Ping Type
MPLS-PW-PING
MPLS-PW-PING
Source
1.1.1.1
1.1.1.2
Destination
VCID: 1
VCID: 1
TTL: 2
TTL: 2
10
10
Start Time
2011-05-10 15:42:56
2011-05-10 15:42:56
End Time
2011-06-10 15:42:56
2011-06-10 15:42:56
NE 1
NE 2
Task Name
PING 5
PING 5
8-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
NE 1
NE 2
Ping Type
MPLS-LDP-PING
MPLS-LDP-PING
Source
1.1.1.1
1.1.1.2
Destination
Destination network
Destination network
segment: 1.1.1.2
segment: 1.1.1.1
Destination mask:
Destination mask:
255.255.255.255
255.255.255.255
10
10
Start Time
2011-05-10 15:42:56
2011-05-10 15:42:56
End Time
2011-06-10 15:42:56
2011-06-10 15:42:56
c.
Parameter
NE 1
NE 2
Task Name
PING 2
PING 2
Ping Type
IP-VRF-PING
IP-VRF-PING
Source
1.1.1.1
1.1.1.2
Destination
VRF ID: 1
VRF ID: 1
TTL: 255
TTL: 255
10
10
Start Time
2011-05-10 15:42:56
2011-05-10 15:42:56
End Time
2011-06-10 15:42:56
2011-06-10 15:42:56
Click OK.
5. Repeat step 1 through step 4 to configure the Ping detection function on NE 2. For
the detailed settings, refer to columns NE 2 in the previous tables.
8.2 Trace
8.2.1 Trace Overview
The MPLS Trace detection is a kind of technology based on MPLS OAM. It is used for
defect detection of the MPLS network.
IP Trace
Trace the forwarding path of IP messages.
PW Trace
Trace the PW path. It is applied in multi-segment PW.
MPLS-TE Trace
Trace the TE tunnel path.
LDP Trace
Trace the LDP tunnel path.
Steps
1. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog box is
displayed.
2. From the NE Operation navigation tree in the left pane, select OAM Configuration
> IP MPLS OAM Configuration > Trace Detection Configuration. The Trace
Detection Configuration dialog box is displayed.
3. Create a Trace detection task.
a. Click the
b. Configure the Trace detection parameters in accordance with the detection task.
To ...
Do ...
task
8-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Trace Name
Trace Type
DestIP
Timeout (s)
Hops
For the parameters not listed in the following table, use the default settings.
Description
Trace Name
Trace Type
Tunnel Interface
Timeout (s)
Hops
For the parameters not listed in the following table, use the default settings.
Description
Trace Name
Trace Type
Pseudowire Peer IP
VCID
Timeout (s)
8-11
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Hops
For the parameters not listed in the following table, use the default settings.
Description
Trace Name
Trace Type
Timeout (s)
Hops
For the parameters not listed in the following table, use the default settings.
c. Click OK.
End of Steps
Configuration Requirement
Figure 8-2 shows the network topology of the Trace detection function. On NE 1 and NE 2,
the Trace detection functions is configured to trace the IP message forwarding path, PW
path, TE tunnel path, and LDP tunnel path.
8-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Plan
For the IP address plan of the NEs in the network, refer to Table 8-18.
Table 8-18 Network Plan of Trace Detection
NE
NE IP Address
Loopback
Board
Slot
Port
Port
NE 1
NE 2
192.61.20.1
192.61.20.2
1.1.1.1
1.1.1.2
R1EXG
R1EXG
Port IP
Port
Address
VLAN
192.61.1.1
100
192.61.2.2
200
11
192.61.1.2
100
12
192.61.3.2
300
CE 1
172.168.1.2
192.61.2.1
200
CE 2
192.168.1.2
192.61.3.1
300
Configuration Procedure
Note:
Before the configuration, verify that the following operations are implemented between NE
1 and NE 2:
l
l
l
l
b. Configure the Trace detection parameters in accordance with the detection task.
To ...
Do ...
NE 1
NE 2
Trace Name
IP TRACE 1
IP TRACE 1
Trace Type
IP-TRACE
IP-TRACE
DestIP
1.1.1.2
1.1.1.1
Hops
255
255
NE 1
NE 2
Trace Name
TE TRACE 1
TE TRACE 1
Trace Type
RSVP-TE-TRACE
RSVP-TE-TRACE
Tunnel Interface
Hops
255
255
NE 1
NE 2
Trace Name
PW TRACE 1
PW TRACE 1
8-14
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
NE 1
NE 2
Trace Type
PW-TRACE
PW-TRACE
Pseudowire Peer IP
1.1.1.2
1.1.1.1
VCID
Hops
NE 1
NE 2
Trace Name
LDP TRACE 1
PING 5
Trace Type
LDP-LSP-TRACE
MPLS-LDP-PING
1.1.1.2
1.1.1.1
255.255.255.255
255.255.255.255
Hops
255
255
Mask
c.
Click OK.
4. Repeat step 1 through step 3 to configure the Trace detection function on NE 2. For
the detailed settings, refer to columns NE 2 in the previous tables.
8-15
SJ-20110927150233-015|2012-08-29 (R1.2)
8-16
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 9
MPLS-TP OAM
Table of Contents
MPLS-TP OAM Overview...........................................................................................9-1
MPLS-TP OAM Application ........................................................................................9-4
MPLS-TP OAM Configuration Flow ............................................................................9-5
Configuring the MPLS-TP OAM .................................................................................9-6
MPLS-TP OAM Configuration Example ...................................................................9-10
OAM Layering
Figure 9-1 shows OAM layering in MPLS-TP.
Figure 9-1 OAM Layering in MPLS-TP
The MPLS-TP divides the OAM into four layers: access layer, client layer, PW layer, and
segment layer. Among them, PW OAM, tunnel OAM, and segment OAM are within the
network.
9-1
SJ-20110927150233-015|2012-08-29 (R1.2)
l
l
l
l
l
MEG End Point (MEP): It is the endpoint of the MEG, generating and terminating OAM
groups.
MEG Intermediate Point (MIP): It does not generate OAM groups but responds to
certain OAM groups. It transparently transmits MPLS-TP frames that pass through it.
Description
Continuity
The MEPs on the two ends periodically send CV packets to check whether
Connectivity Check
may be generated:
(CC)
Unexpected MEP
Unexpected Period
Alarm Indication
Signal (AIS)
service layer path failures, and restrain generation of alarms at the client layer.
Remote Defect
It is a type of maintenance signals. When the local end detects signal failures,
Indication (RDI)
9-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Function
Description
Test
Locked (LCK)
Test
Description
Frame Loss
Measurement (LM)
9-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Function
Description
Delay Measurement
(DM)
the frame delay and frame delay jitter. During the diagnosis interval, the
source MEP and the destination MEP periodically transmit DM frames. Two
implementation modes are available:
l
Single-ended DM: The source MEP sends the request DM frames, and
then the single-ended frame delay or the single-ended frame delay jitter
is measured at the destination MEP.
Description
(APS)
Management Communication
Channel (MCC)
(SCC)
9-4
SJ-20110927150233-015|2012-08-29 (R1.2)
9-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Prerequisite
l
l
Tunnels are created between the NEs on which the OAM functions need to be
configured.
MIPs must exist in the network when the MIP OAM function needs to be configured.
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select OAM Configuration
> MPLS-TP OAM Configuration. The MPLS-TP OAM Configuration dialog box is
displayed.
3. Perform the OMA global configuration.
a. On the Global Configuration tab, select the Global Configuration check box.
b. Click Set. A confirmation message box is displayed.
c. Click OK.
4. Configure the ME Group (MEG).
a. On the MEG tab, click New. The New dialog box is displayed.
b. Configure the parameters MEG of the NE. For a description of the parameters,
refer to Table 9-4.
Table 9-4 Parameter Descriptions for MEG Configuration
Parameter
Description
MEG ID
MEG Index
Type
Set the unique MEG index of the NE, ranging from 1 to 65535.
MEG Type
Related
Object
User Label
Local
MEP
Set the ID for identifying the local MEG. The ID ranges from
1 to 8191.
9-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Peer
Description
MEP ID
MEP
Set the ID for identifying the peer MEG. The ID ranges from
1 to 8191.
In the same MEG, the local and the peer MEP IDs of the local
NE must be contrary to those of the peer NE.
CV
Enable
Packet
State
and Forbid.
Send Circle
CV PHB
Set the state of the link detection function. The available states
Connectivity Check
9-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Proactive LM
AIS
Enable
Set the state of the AIS detection function. The available states
State
FDI PHB
CSF
Enable
Insert or
State
Get
Note:
If an MIP exists in the network, create the MIP on the EMS.
c. On the MIP tab, click New. The New dialog box is displayed.
d. Set the MIP parameters of the NE. For a description of the parameters, refer to
Table 9-5.
Table 9-5 Parameter Descriptions for MIP Configuration
Parameter
Description
MIP ID
MIP Type
Related Object
Port
MEG ID
Description
LM PHB
9-9
SJ-20110927150233-015|2012-08-29 (R1.2)
Note:
The forwarding priority of LM packets should be the same as that of service
packets, so that the packet loss ratio of the traffic flow can be counted.
Description
Test way
DM PHB
Configuration Requirement
Figure 9-4 shows the network topology of the MPLS-TP OAM. By connecting to the network
through the ZXCTN 6200 device, Node B implements service interaction with the remote
RNC. The RNC, Node B, and ZXCTN devices are connected to each other through GE
ports.
NE 2, NE 3, NE 4, and NE 5 are ZXCTN 6300 devices, and NE 1 is the ZXCTN 6200
device.
Figure 9-4 Network Topology of MPLS-TP OAM
Configuration Plan
Based on the configuration requirement, an OAM tunnel between NE 1 and NE 4
(NE1NE2NE3NE4) is configured to implement real-time monitoring of service
tunnels between NEs. NE 2 and NE 3 are the intermediate points of maintenance entities,
hence MIP OAM needs to be configured on NE 2 and NE 3.
For the IP address plan of the NEs in the network, refer to Table 9-8.
Table 9-8 Network Plan of MPLS-TP OAM
NE
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
NE 1
192.61.20.1
R1EXG
10.10.12.1
120
10.10.11.1
110
10.10.24.1
240
10.10.12.2
120
10.10.51.2
510
10.10.28.1
280
10.10.24.2
240
NE 2
NE 3
192.61.20.2
192.61.20.3
R1EXG
R1EXG
9-11
SJ-20110927150233-015|2012-08-29 (R1.2)
NE
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
NE 4
192.61.20.4
R1EXG
10.10.45.1
450
10.10.28.2
280
10.10.41.1
410
10.10.45.2
450
10.10.51.1
510
NE 5
192.61.20.5
R1EXG
Configuration Procedure
Note:
The tunnel from NE 1 to NE 4 are configured. The intermediate nodes are NE 2 and NE
3. The tunnel ID is 4095.
Click OK.
NE1
NE4
MEG ID
MEG Index
User Label
NE1NE4
NE4NE1
MEG Type
Tunnel MEG
Tunnel MEG
Related
NE1R1EXG[013]-
NE4R1EXG[014]-
Object
Eth_U:1Tunnel:4095
Eth_U:1Tunnel:4095
14
41
Type
Local MEP ID
9-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
NE1
NE4
Peer MEP ID
41
14
Speed Mode
Low Speed
Low Speed
Permit
Permit
Send Circle
1s
1s
CV PHB
af11
af11
Permit
Permit
Permit
Permit
Permit
Permit
af11
af11
CVPacket
Enable
State
Continuity and
Connectivity Check
Proactive LM
AIS
Enable
State
FDI PHB
Other parameters
c.
d. Click OK.
5. Repeat step 1 through step 4 to configure the MEG of NE 4.
6. Create MIPs of NE 2 and NE 3.
a. On the Topology Management screen, right-click NE 2, select NE Manager from
the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select OAM
Configuration > MPLS-TP OAM Configuration.
The MPLS-TP OAM
Configuration dialog box is displayed.
c.
On the MIP tab, click New. The New dialog box is displayed.
d. Set the MIP parameters of NE 2. For the detailed settings, refer to the NE 1 column
in Table 9-10.
Table 9-10 MIP Configuration of NE 2/NE 3
Parameter
NE2
NE3
MIP ID
MIP Type
TUNNEL MIP
TUNNEL MIP
Related Object
Tunnel:4095
Tunnel:4095
Port
MEG ID
NE2R1EXG[013]-Eth_U:1
NE3R1EXG[013]-Eth_U:1
NE2R1EXG[014]-Eth_U:1
NE3R1EXG[014]-Eth_U:1
9-13
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
NE2
NE3
Other
parameters
Click OK.
On the LM tab, select 1 from the Please select MEG ID you want to query list.
d. Set the LM test of NE 1. For the detailed settings, refer to the NE 1 column in
Table 9-11.
Table 9-11 LM Test Configuration of NE 1/NE 4
Parameter
NE1
NE4
LM PHB
af11
af11
Other parameters
Note:
The forwarding priority of LM packets should be the same as that of service
packets, so that the packet loss ratio of the traffic flow can be counted.
In this example, set CV PHB, FDI PHB, and LM PHB to af11.
9-14
SJ-20110927150233-015|2012-08-29 (R1.2)
c.
Parameter
NE1
NE4
Test way
Two-way
Two-way
DM PHB
af11
af11
Other parameters
9-15
SJ-20110927150233-015|2012-08-29 (R1.2)
9-16
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 10
EFM
Table of Contents
EFM Overview..........................................................................................................10-1
EFM Application .......................................................................................................10-3
EFM Configuration Flow ...........................................................................................10-3
Configuring the EFM ...............................................................................................10-4
EFM Configuration Example ....................................................................................10-6
Active: Link discovery and remote loopback functions are automatically initiated.
Passive: Link discovery and remote loopback functions cannot be actively started.
This mode gives responses to the frames sent by the peer port that is in the active
mode.
10-1
SJ-20110927150233-015|2012-08-29 (R1.2)
Caution!
In actual configuration, one end must be in the active mode. If two ends are both in the
passive mode, OAM capability discovery fails.
Link Monitoring
With the link monitoring function, event notification messages can be sent to the peer end
to inform the peer end of the detected faults.
The local device and peer device periodically send detection packets to detect the link
connectivity. The common fault notification events include:
l
Errored symbol periodical event: Counts the number of errored symbols in the
specified packet window, and determines whether to generate event notification
according to the threshold of the errored symbol frame number that has been
predefined.
Errored frame event: Counts the number of errored frames in the specified period of
time, and determines whether to generate event notification according to the errored
frame number threshold that has been predefined.
Errored frame periodical event: Counts the number of errored frames in the specified
packet window, and determines whether to generate event notification according to
the errored frame number threshold that has been predefined.
Errored frame second event: Counts the number of errored frames in the specified
period of time, and determines whether to generate event notification according to the
errored frame time threshold that has been predefined.
Remote Loopback
Remote loopback is set on the peer device by the network administrator for a certain
purpose. In the loopback state, the remote device does not forward data packets normally;
instead, it returns all non-OAM packets to the transmitting end.
This function interrupts services. It is used in fault location and link performance tests such
as the link performance test for packet loss.
Chapter 10 EFM
10-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Prerequisite
The VLAN ports are configured.
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select OAM Configuration >
EFM Configuration. The EFM Configuration dialog box is displayed.
3. Configure the EFM globally.
a. On the EFM Global Configuration tab, configure the global parameters of the
NE. For a description of the parameters, refer to Table 10-1.
Table 10-1 Parameter Descriptions for Global EFM Configuration
Parameter
Description
Enable OAM
(s)
from 1 s to 10 s.
b. Click Set.
4. Configure EFM ports.
a. On the EFM Portethernet Configuration tab, select an Ethernet port for the EFM
to be configured from the Port List area.
b. Click Configuration. The Port OAM Configuration dialog box is displayed.
c. Configure the Ethernet port of the NE. For a description of the parameters, refer
to Table 10-2.
Table 10-2 Parameter Descriptions for EFM Port Configuration
Parameter
Description
Port
Enable OAM
Set the state of the OAM function of the Ethernet port to Enable or
Close.
Interval (100ms)
Timeout (100ms)
Set the timeout time of the loopback function, ranging from 5 to 200.
10-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 10 EFM
Parameter
Description
Time Out
or No.
Working Mode
Set the working mode of the Ethernet port. The available modes
include Active and Passive.
Symbol Threshold
Symbol Window
(million)
is set to Start.
Frame Threshold
Frame Period
Threshold
is set to Start.
(ten thousand)
is set to Start.
Frame Statistics
Threshold
is set to Start.
Frame Statistics
Window (s)
is set to Start.
10-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Caution!
Enable the remote loopback after the remote discovery is implemented.
Note:
To implement the remote loopback on the NE, it is required to enable the remote
loopback function.
Chapter 10 EFM
Configuration Requirement
Figure 10-3 shows the network topology of the EFM. The Ethernet services between the
company headquarters and its division are carried between NE 1 and NE 3. NE 1 provides
access for users through the ZXCTN 6200 device, and NE 2 and NE 3 provide the network
transmission through the ZXCTN 6300 devices.
Figure 10-3 Network Topology of CFM
Configuration Plan
Based on the configuration requirement, it is required to configure the port OAM
parameters on NE 1, NE 2, and NE 3, and perform the remote loopback on NE 2 to detect
the link status between NEs.
For the IP address plan of the NEs in the network, refer to Table 10-3.
Table 10-3 Network Plan of EFM
NE
NE IP Address
Board
Slot
Port
Port IP
Port VLAN
Address
NE 1
NE 2
NE 3
192.61.20.1
192.61.20.2
192.61.20.3
R1EXG
10.10.12.1
120
R8EGF
10.10.11.1
110
R1EXG
10.10.24.1
240
10.10.12.2
120
10.10.51.2
510
10.10.28.1
280
10.10.24.2
240
10.10.41.1
410
R1EXG
R8EGF
10-7
SJ-20110927150233-015|2012-08-29 (R1.2)
NE
NE IP Address
Board
Slot
Port
Port IP
Port VLAN
Address
NE 4
192.61.20.4
NE 5
192.61.20.5
R1EXG
R1EXG
10.10.45.1
450
10.10.28.2
280
10.10.45.2
450
10.10.51.1
510
Configuration Procedure
Note:
VLAN interface has been configured before the following procedures.
NE1
NE2
NE3
Enable OAM
Enable
Enable
Enable
Remote Loopback
settings.
settings.
settings.
Timeout (s)
Other parameters
b. Click Set.
4. Configure EFM ports.
a. On the EFM Portethernet Configuration tab, select a Port from the Port List
area. For the detailed settings, refer to the NE1 column in Table 10-5.
b. Click Configuration. The Port OAM Configuration dialog box is displayed.
c.
Set the Ethernet port of NE 1. For the detailed settings, refer to the NE1 column
in Table 10-5.
10-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 10 EFM
NE1
NE2
NE3
Port
NE1R1EXG[013]-
NE2R1EXG[013]-
NE3R1EXG[014]-
Eth_:1
Eth_:1
Eth_:1
NE2R1EXG[014]Eth_:1
Enable OAM
Enable
Enable
Enable
Interval
10
10
10
Working Mode
Active
Active
Active
Link Monitor
Start
Start
Start
Other
parameters
settings.
settings.
settings.
(100ms)
Timeout
(100ms)
Status
Caution!
Enable the remote loopback after the remote discovery is completed.
Note:
On the Discovery State Info tab, if Discovery in the Local DTE State navigation
tree is Finish, the remote discovery process is completed.
c.
10-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 11
CFM
Table of Contents
CFM Overview .........................................................................................................11-1
CFM Application.......................................................................................................11-3
CFM Configuration Flow...........................................................................................11-4
Configuring the CFM ................................................................................................11-4
CFM Configuration Example .................................................................................. 11-10
Description
Maintenance Domain
(MD)
can be managed.
Maintenance Association
(MA)
MD Level
Each MD has an MD level. The MD levels are key parameters that are
used for CFM nesting.
MD level and VID of VLAN tag are used together to identify an MD that
is associated with a CFM frame, and identify the MA to which the CFM
frame belongs. MD level ranges from 0 to 7, with 7 as the highest level.
Maintenance association
CFM PDUs.
11-1
SJ-20110927150233-015|2012-08-29 (R1.2)
Concept
Description
Maintenance domain
CFM Packets
The functions of CFM are implemented through five CFM packets.
l
l
l
l
Continuity Check Message (CCM): A CCM is a multicast CFM Protocol Data Unit
(PDU). An MEP sends CCMs periodically to check the continuity of MEPs passing
through the MA that they belong to. The MP that receives the CCMs does not respond
to the packet.
Link Trace Message (LTM): An LTM is a CFM PDU that is sent by an MEP to trace the
path from an MIP to the destination MAC address. The path tracing continues until
the LTM reaches its destination MEP or the LTM cannot be forwarded. In the path,
each MP generates a Link Trace Reply (LTR).
Link Trace Reply (LTR): An LTR is a unicast packet that an MP sends back to the
source MEP after the MP receives an LTM from the MEP.
LoopBack Message (LBM): An LBM is a unicast CFM PDU that is sent by an MEP to
the specified MP. After an LBM is sent, a LoopBack Reply (LBR) is expected.
LoopBack Reply (LBR): An LBR is a unicast packet that an MP sends back to the
source MEP after the MP receives an LBM from the MEP.
CFM Functions
The CFM standard defines three functions: connectivity check, link trace, and loopback.
l
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 11 CFM
forwarded following the path to the destination address until the packet reaches the
destination.
The MP that starts the link trace collects the response packets of the MIPs, and then
calculates the path to the destination address. If an MIP or link is faulty, the link trace
function helps to locate the specific location of the fault. This provides an effective
way of fault location in the Ethernet.
l
Loopback (LB)
Loopback is used to check the connectivity between MPs. The loopback function is an
OAM function that is performed based on the requirement. With the loopback function,
an MEP sends a unicast request, with the destination address being a specified MP
(MEP or MIP), and the MEP expects a response packet from the destination MP. If
the MP receives a response packet, it indicates that the service connectivity is normal;
otherwise, the service connectivity fails.
11-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Prerequisite
l
l
11-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 11 CFM
Steps
1. On the Topology Management screen, right-click an NE to be configured, and select
NE Manager from the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select OAM Configuration >
CFM Configuration. The CFM Configuration dialog box is displayed.
3. Perform the CFM global configuration.
a. On the CFM Global Configuration tab, enable or disable the CFM function by
clicking the Unlock or Close option button.
Note:
If the global CFM function is disabled, the CFM command will not be issued to the
device.
b. Determine whether the CCM carries an MD name by clicking the Take MDs Name
or Not Take MDs Name option button.
c. Click Apply. A confirmation message box is displayed.
d. Click OK.
4. Configure the MD.
a. On the MD tab, click Create. The Add MD dialog box is displayed.
b. Configure the MD. For a description of the parameters, refer to Table 11-2.
Table 11-2 Parameter Descriptions for MD Configuration
Parameter
Description
Index
Name
Level
11-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Config area
Description
Index
Name
MD
Protection-
Mode
Primary VLAN
CCM Pkg
CCM
SendInterval
Description
ID
Local index
MD
MA
MEP Mode
Associated
Port
area
11-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 11 CFM
Parameter
Attribute area
Description
Enable State
CCM
Operation
AisMonitorEn-
able
ClientLevel
Error Monitor
Level
Description
ID
Index
MD Name
MA Name
MAC Address
Description
Index
Name
MA Name
MD Name
Associated
Associated
Port area
Port
11-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 11 CFM
Description
ID
Local Index
MD
MA
Remote
Resource
MEP/MIP area
Value
Attribute area
TTL
Timeout
Description
ID
Local Index
MD
MA
11-9
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Remote
Description
Resource
MEP/MIP area
Attribute area
The number of
Send Packet
Timeout
DATA TLV
DATA TLV
Length
(unit: byte).
Configuration Requirement
Figure 11-3 shows the network topology of the CFM. The Ethernet services between the
company headquarters and its division are carried between NE 1 and NE 3. NE 1 provides
access for users through the ZXCTN 6200 device, and NE 2 and NE 3 provide the network
transmission through the ZXCTN 6300 devices.
11-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 11 CFM
Configuration Plan
Based on the configuration requirement, NE 1 and NE 3 should be configured with the
port OAM CFM. NE 2, as the intermediate point of the maintenance entities in the network,
should be configured with the MIP parameters.
For the IP address plan of the NEs in the network, refer to Table 11-9.
Table 11-9 Network Plan of CFM
NE
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
NE 1
192.61.20.1
R1EXG
10.10.12.1
120
R8EGF
10.10.11.1
110
R1EXG
10.10.24.1
240
10.10.12.2
120
10.10.51.2
510
10.10.28.1
280
10.10.24.2
240
R8EGF
10.10.41.2
110
R1EXG
10.10.45.1
450
10.10.28.2
280
10.10.45.2
450
10.10.51.1
510
NE 2
NE 3
NE 4
NE 5
192.61.20.2
192.61.20.3
192.61.20.4
192.61.20.5
R1EXG
R1EXG
11-11
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Procedure
Note:
VLAN interface has been configured before the following procedures.
Note:
If the global CFM function is disabled, the CFM command will not be issued to the
device.
b. Click the Take MDs Name option button in the CCM Type area.
c.
d. Click OK.
4. Configure the MD of NE 1.
a. On the MD tab, click Create. The Add MD dialog box is displayed.
b. Configure the MD of NE 1. For the detailed settings, refer to the NE 1 column in
Table 11-10.
Table 11-10 MD Configuration
Parameter
MD area
c.
NE1
NE3
Index
Name
MD1
MD1
Level
d. Click OK.
5. Configure the MA of NE 1.
a. On the MA tab, click Create. The Add MA dialog box is displayed.
11-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 11 CFM
Config
area
NE1
NE3
Index
Name
MA1
MA1
MD
MD1
MD1
ProtectionMode
Vlan Protect
Vlan Protect
Primary VLAN
110
110
CCM Pkg
Slow
Slow
CCM
1s
1s
SendInterval
c.
d. Click OK.
6. Configure the MEP of NE 1.
a. On the MEP tab, click Create. The Add MEP dialog box is displayed.
b. Configure the MEP of NE 1. For the detailed settings, refer to the NE 1 column in
Table 11-12.
Table 11-12 MEP Configuration
Parameter
MEP area
Associ-
NE1
NE3
ID
10
20
Local index
MD
MD1
MD1
MA
MA1
MA1
MEP Mode
Down
Down
Port
NE1R8EGF[012]-Eth_U:
NE3R8EGF[012]-Eth_U:
ated area
11-13
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Attribute
area
NE1
NE3
Enable State
Enable
Enable
CCM Operation
Enable
Enable
CCM/LTM
LockEnable
Enable
Enable
two-LM enable
Enable
Enable
AisMonitorEn-
Enable
Enable
ClientLevel
, 1
, 1
Error Monitor
Level
able
Level
c.
d. Click OK.
7. Configure the RMEP of NE 1.
a. On the RMEP tab, click Create. The Add RMEP dialog box is displayed.
b. Configure the RMEP of NE 1. For the detailed settings, refer to the NE 1 column
in Table 11-13.
Table 11-13 RMEP Configuration
Parameter
NE1
NE3
RM-
ID
20
10
Index
MD
MD1
MD1
MA1
MA1
00-A0-00-10-DD-02
00-A0-00-10-DD-01
EP
area
Name
MA
Name
MAC
Address
c.
d. Click OK.
8. Click Close to return to the Topology Management screen.
9. Repeat step 1 through step 8 to configure the CFM function of NE 3.
10. Configure the MIP.
11-14
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 11 CFM
On the MIP tab, click Create. The Add MIP dialog box is displayed.
d. Configure the MIP of NE 2. For the detailed settings, refer to Table 11-14.
Table 11-14 MIP Configuration of NE 2
Parameter
MIP area
Value
Index
Name
MIP1
MA Name
MA1
MD Name
MD1
Associated
Associated
NE2R1EXG[013]-Eth_U:1
Port area
Port
NE2R1EXG[014]-Eth_U:1
Click OK.
On the MEP tab, select an MEP, click Link Monitor. The Link Monitor dialog box
is displayed.
d. On the LTM tab, configure the LTM link monitoring of NE 1. For the detailed
settings, refer to the NE 1 column in Table 11-15.
Table 11-15 LTM Link Monitoring Configuration
Parameter
NE1
NE3
Remote
Re-
Remote
Remote RMEP
Remote
Remote
MEP/MIP
source
RMEP ID
MAC Address
RMEP ID
RMEP MAC
area
Address
Value
20
00-A0-00-10DD-02
10
00-A0-00-10DD-01
11-15
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Attribute
area
NE1
NE3
TTL
64
64
Timeout
Other parameters
NE1
NE3
Remote
Re-
Remote RMEP
Remote RMEP
Remote
Remote
MEP/MIP
source
ID
MAC Address
RMEP ID
RMEP MAC
area
Address
Value
20
00-A0-00-10-
10
DD-02
Attribute
The
area
number
00-A0-00-10DD-01
Timeout
DATA
Yes
Yes
of Send
Packet
TLV
DATA
TLV
Length
Other parameters
13. Repeat step 11 and step 12 to configure the LTM and LBM link monitoring functions
of NE 3.
11-16
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 12
TPS Protection
Table of Contents
TPS Protection Overview .........................................................................................12-1
TPS Protection Application .......................................................................................12-2
TPS Protection Configuration Flow...........................................................................12-2
Configuring the TPS Protection ...............................................................................12-3
TPS Protection Configuration Example ....................................................................12-5
12-1
SJ-20110927150233-015|2012-08-29 (R1.2)
As shown in Figure 12-2, when the working processing board is invalid, the main control
unit detects the fault and makes a decision by data computing. It uses the TPS control bus
to enable the switch on the target interface for protection switching. After the switching is
successful, the services accessed by the working processing board are switched to the
protection processing board, which implements service protection.
12-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Prerequisite
The VLAN interface and L3 interface of the device have been configured.
Context
For the TPS protection configuration menu on the EMS, refer to Table 12-1.
Table 12-1 TPS Protection Configuration Menu on the EMS
Step
Description
Menu Location
Steps
1. Create an end-to-end tunnel.
a. Select Service > New > New Tunnel. The New Tunnel dialog box is displayed.
b. Refer to the following table to configure the properties of the tunnel.
12-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
A1 End
Z1 End
When selecting endpoints A1 and Z1, comply with the network topology planning.
For the parameters not listed in the following table, use the default settings.
c. Click Apply.
2. Create an end-to-end PW.
a. Select Service > New > New PW. The New PW dialog box is displayed.
b. Refer to the following table to set the PW parameters.
Table 12-3 Parameter Descriptions of PW Creation in End-to-End Mode
Parameter
Description
A1 End
Z1 End
Forward Tunnel
Reverse Tunnel
A NE Pseudo Wire
Type
Z NE Pseudo Wire
Type
When selecting endpoints A1 and Z1, comply with the network topology planning.
The forward and reverse labels can be automatically generated by the system.
For the parameters not listed in the above table, use the default settings.
c. Click Apply.
3. Create the end-to-end E1 service.
a. Select Service > New > New TDM Service. The New TDM Service dialog box
is displayed.
b. Set the related parameters.
l
l
Note:
Set Service Rate to E1/VC12.
When selecting endpoints A1 and Z1, comply with the network topology
planning.
c. Click Apply.
12-4
SJ-20110927150233-015|2012-08-29 (R1.2)
f. Click Work Board (Sort by Priority) in Protect Relation and select the candidate
board on the right.
g. Click
Configuration Requirement
Figure 12-4 shows the network topology of the TPS protection, where E1 services are sent
between NE 1 and NE 2.
Figure 12-4 Network Topology of TPS Protection
12-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Note:
UNI:5#R16E1B-(TDM+IMA)-PDH 2M:1 means that the R16E1B-(TDM+IMA) board is
installed in slot 5. The R16E1B-(TDM+IMA) board is used on the UNI side to access user
E1 services through the 2M port of the RE1PI board.
Configuration Plan
Based on the configuration requirement, the TPS protection is configured on the ZXCTN
6300 devices, ensuring that services are sent normally if an E1 board is faulty.
Figure 12-5 shows the board configurations of NE 1 and NE 2.
Figure 12-5 Board Configuration of NE 1 and NE 2
l
l
l
Note:
The R16E1B board in slot 3 protects the working R16E1B boards in slot 5 and 7.
The RE1PI board in slot 1 works as the public E1 cable outlet of the boards in slot 3,
5, and 7.
The virtual sub-board type of the RE1PI board is set to E1 Subcard (Supporting
TDM_IMA).
For the IP address plan of the NEs in the network, refer to Table 12-4.
12-6
SJ-20110927150233-015|2012-08-29 (R1.2)
NE IP Address
Board
Slot
Port
Port IP
Port VLAN
Address
NE 1
192.61.1.1
R1EXG
192.168.1.1
100
NE 2
192.61.1.2
R1EXG
192.168.1.2
100
Only key parameters are listed in the above table. Use the default settings and user-defined values
for other parameters.
Configuration Procedure
Note:
Before configuring the TPS protection, verify that:
l
l
c.
Parameter
Value
User Label
Tunnel-NE1_NE2
A1 End
NE1-R1EXG[0-1-9]-ETH:1
Z1 End
NE2-R1EXG[0-1-9]-ETH:1
Other parameters
Click Apply.
Value
User Label
WX1_NE1_NE2
A1 End
NE1
Z1 End
NE2
Forward Tunnel
Tunnel-NE1_NE2 (bidirectional)
12-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
Reverse Tunnel
Tunnel-NE1_NE2 (bidirectional)
A NE Pseudo Wire
E1
Type
Z NE Pseudo Wire
E1
Type
Other parameters
Note:
The forward and reverse labels can be automatically generated by the system.
c.
Click Apply.
Value
Service Rate
E1/VC12
A1 End
NE1-RE1PI-SUB-TDM+IMA[0-1-1-1]-PDH 2M interface:1
Z1 End
NE2-RE1PI-SUB-TDM+IMA[0-1-1-1]-PDH 2M interface:1
Pseudo Wire
WX1_NE1_NE2
Configuration
Other parameters
c.
Click Apply.
Click Work Board (Sort By Priority) in Protection Relation and select the
candidate board on the right.
g. Click
to add the working board (R16E1B-(TDM+IMA)[0-1-5]) to Work Board
(Sort By Priority).
h. Click OK. The Confirm dialog box is displayed.
i.
Click Yes.
j.
Click OK.
12-9
SJ-20110927150233-015|2012-08-29 (R1.2)
12-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 13
MSP Protection
Table of Contents
Linear MSP Overview...............................................................................................13-1
Linear MSP Application ............................................................................................13-4
Linear MSP Protection Configuration Flow ...............................................................13-5
Linear MSP Protection Configuration Procedure.......................................................13-5
MSP Configuration Example ....................................................................................13-6
Note:
In reverse mode, if the working path recovers after the switching is performed, the service
will be automatically switched back to the working path after the WTR time. In non-reverse
mode, the service will not be automatically switched back to the working path.
13-1
SJ-20110927150233-015|2012-08-29 (R1.2)
end to the protection path and receives the service from the protection path. In this way,
the service transmission is not interrupted, which implements service protection.
Figure 13-1 Schematic Diagram of Unidirectional 1+1 Protection
13-2
SJ-20110927150233-015|2012-08-29 (R1.2)
13-3
SJ-20110927150233-015|2012-08-29 (R1.2)
13-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. In the Topology view, right-click the required NE and select NE Manager from the
shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation bar, select Protection Management > MSP
Protection. The MSP Protection dialog box is displayed.
3. Click Create. The Attribute page of the Create Protection Relation Group dialog
box is displayed.
4. Set the protection type, ID, name, and remarks of the protection group.
5. Click Next. The Parameter page is displayed.
13-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Requirement
Figure 13-6 shows the network topology of the MSP. The RNC, accessing through NE 2,
implements the service interaction with the remote Node B. The RNC is connected with
NE 2 devices through channelized STM-1 ports.
Figure 13-6 Network Topology of MSP
Configuration Plan
Based on the configuration requirement, NE 2 uses the STM-1 ports of two R4CSP boards
to interconnect with the RNC on the user side, to ensure the service security between NE
2 and the RNC.
Two R4CSP boards are installed in slot 6 and 7. The STM-1 ports of these two R4CSP
boards are configured to a bidirectional 1+1 linear MSP group (reverse mode), to improve
the reliability of the service transmission.
For the IP address plan of the NEs in the network, refer to Table 13-1.
13-6
SJ-20110927150233-015|2012-08-29 (R1.2)
NE IP Address
Board
Slot
Port
Port IP
Port VLAN
Address
NE 1
NE 2
NE 3
192.61.1.1
192.61.1.2
192.61.1.3
R1EXG
R1EXG
R1EXG
192.168.1.1
100
10
192.168.2.1
200
192.168.1.2
100
10
192.168.3.1
300
192.168.2.2
200
10
192.168.3.2
300
Only key parameters are listed in the above table. Use the default settings and user-defined values
for other parameters.
Configuration Procedure
1. On the Topology Management screen, right-click NE 2, and select NE Manager from
the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select Protection
Management > MSP Protection. The MSP Protection dialog box is displayed.
3. Click Create. The Attribute page of the Create Protection Relation Group dialog
box is displayed.
4. Set the protection type to Bidirectional 1+1 MS Protection.
Use the default settings for other parameters.
5. Click Next. The Parameter page is displayed.
6. Set the return mode to Revertive.
Use the default setting for the WTR time.
7. Click Next. The Relation page is displayed. Set STM-1 port 1 on the R4CPS board in
slot 6 as the working port and that on the R4CPS board in slot 7 as the protection port.
8. Click Finish.
13-7
SJ-20110927150233-015|2012-08-29 (R1.2)
13-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 14
Linear Protection
Table of Contents
Linear Protection Overview ......................................................................................14-1
Linear Protection Application ....................................................................................14-3
Configuration Flow of Linear Protection ...................................................................14-3
Configuring the Linear Protection ............................................................................14-4
Linear Protection Configuration Example .................................................................14-8
14-1
SJ-20110927150233-015|2012-08-29 (R1.2)
14-2
SJ-20110927150233-015|2012-08-29 (R1.2)
14-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Context
For the detailed descriptions of tunnel modes, refer to Table 14-1.
Table 14-1 Descriptions for Tunnel Modes
Tunnel Mode
Description
Pipe
When subscriber services are sent into an operator tunnel which is in pipe
mode, the services are scheduled based on the Quality of Service (QoS) of the
operator. When subscriber services are sent out of the tunnel, the services are
scheduled based on their own QoS.
14-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Tunnel Mode
Description
Short Pipe
When subscriber services are sent into an operator tunnel which is in short pipe
mode, the services are scheduled based on the QoS of the operator from the
head node to the last second node of the tunnel. From the last second node of
the tunnel, the subscriber services are scheduled based on their own QoS.
Uniform
When subscriber services are sent into an operator tunnel which is in uniform
mode, the services are scheduled base on their own QoS.
Steps
1. Create a working tunnel and a protection tunnel.
a. On the Topology Management screen, select Service > New > New Tunnel.
The New Tunnel dialog box is displayed.
b. Configure a tunnel. For a description of the parameters, refer to Table 14-2.
Table 14-2 Parameter Descriptions for Tunnel Configuration
Parameter
Description
Create Mode
Network Type
Protection Type
Terminal Type
Work A-End
Select an NE, and set it to be the source port of the working tunnel.
Protect A-End
Select an NE, and set it to be the source port of the protection tunnel.
Work Z-End
Select an NE, and set it to be the sink port of the working tunnel.
Protect Z-End
Select an NE, and set it to be the sink port of the protection tunnel.
User Label
Tunnel Mode
2. On the OAM tab, configure the OAM. For a description of the parameters, refer to
Table 14-3.
Table 14-3 Parameter Descriptions for OAM Configuration
Parameter
Description
Work MEG ID
Set the unique MEG ID in the network. The ID consists of less than
13 characters.
Set an ID for identifying the local MEP. The ID ranges from 1 to 8191.
Set an ID for identifying the peer MEP. The ID ranges from 1 to 8191.
Speed Mode
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
CV
Description
Enable state
Package
Send Period
CV PHB
Connection Check
PreActive LM
AIS
Enable state
FDI PHB
Set the forwarding priority of FDI packets to af11, af12, af21, af22,
af31, af32, af41, af42, be, ef, cs6, or cs7. cs7 is the highest priority.
3. On the TNP Protection tab, configure linear protection. For a description of the
parameters, refer to Table 14-4.
Table 14-4 Parameter Descriptions for TNP Configuration
Parameter
Description
User Label
Protection Type
Open Type
14-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Return Type
APS Protocol
Action
i.
ii.
i.
ii.
7. On the Static Route tab, use one of the following methods to compute routes. The
EMS computes routes and assigns labels for tunnels.
l Select the Auto Compute check box.
l Click Compute.
8. Click Apply.
End of Steps
Configuration Requirement
Figure 14-5 shows the network topology of the linear protection. NE 1, NE 2, NE 3, and NE
4 are all ZXCTN 6300 devices, which form a 10 GE ring network. The Ethernet services
between the company headquarters and its division are borne between NE 1 and NE 3.
The 1+1 linear protection is configured for the Ethernet services.
Figure 14-5 Network Topology of Linear Protection
Configuration Plan
Based on the configuration requirement, the service plan of the linear protection is as
follows:
14-8
SJ-20110927150233-015|2012-08-29 (R1.2)
l
l
l
The bidirectional path NE 1NE 2NE 3 (or NE 3NE 2NE 1) is the working
tunnel.
The bidirectional path NE 1NE 4NE 3 (or NE 3NE 4NE 1) is the protection
tunnel.
The 1+1 path protection mode needs to be configured.
For the IP address plan of the NEs in the network, refer to Table 14-6.
Table 14-6 Network Plan of Linear Protection
NE
NE IP
Board
Slot
Port
Address
NE 1
192.61.20.1
NE 2
192.61.20.2
NE 3
192.61.20.4
NE 4
192.61.20.5
Port IP
Port VLAN
Address
R1EXG
10.10.12.1
120
10.10.51.2
510
R8FEF
10.10.11.1
110
R1EXG
10.10.12.2
120
10.10.24.1
240
10.10.24.2
240
10.10.45.1
450
R1EXG
R8FEF
10.10.41.1
410
R1EXG
10.10.45.2
450
10.10.51.1
510
Configuration Procedure
Note:
Before configuring the 1+1 linear protection, verify that:
l
l
Value
Create Mode
Static
Network Type
Linear
14-9
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
Protection Type
Linear Protection
Terminal Type
Terminal
Work A-End
NE1-R1EXG[0-1-3]-Eth_U:1
Protect A-End
NE1-R1EXG[0-1-3]-Eth_U:2
Work Z-End
NE3-R1EXG[0-1-3]-Eth_U:2
Protect Z-End
NE3-R1EXG[0-1-3]-Eth_U:1
User Label
Tunnel-linear
Tunnel Mode
Pipe
Other parameters
2. On the OAM tab, configure the OAM. For the detailed settings, refer to Table 14-8.
Table 14-8 OAM Configuration
Parameter
Value
MEG ID
100
200
Speed Mode
Fast
CV
Package
Enable state
Send Period
3.33ms
CV PHB
af11
Connection Check
PreActive LM
AIS
Enable state
FDI PHB
af11
Other parameters
3. On the TNP Protection tab, configure 1+1 linear protection. For the detailed settings,
refer to Table 14-9.
Table 14-9 TNP Configuration
Parameter
Value
User Label
Protection Type
Open Type
Close
14-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
Return Type
Revertive
APS Protocol
Paused
Other parameters
4. On the Constraint tab, configure route constraints. For the detailed settings, refer to
Table 14-10.
Table 14-10 Route Constraint Configuration
NE
Constraint Type
NE2
Working pass
14-11
SJ-20110927150233-015|2012-08-29 (R1.2)
14-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 15
PW Dual-homing Protection
Table of Contents
PW Dual-Homing Protection Overview .....................................................................15-1
PW Dual-Homing Protection Application...................................................................15-2
Configuration Flow of PW Dual-Homing Protection ..................................................15-3
Configuring the PW Dual-Homing Protection ...........................................................15-4
PW Dual-Homing Protection Configuration Example ...............................................15-9
For the schematic diagram of PW dual-homing protection, see Figure 15-1, where the PW
from P1 to P2 is the active PW, and the PW from P1 to P3 is the standby PW. The PW
dual-homing protection is used together with the tunnel protection, so the tunnel protection
is configured between P1 and P2. In this way, the tunnel protection is first triggered. If
the tunnel protection is invalid, the PW dual-homing protection is triggered. Normally, the
services of the Base Transceiver Station (BTS) and the Radio Network Controller (RNC)
are sent over the active PW. If P2 is invalid or a fault occurs in the link between P2 and the
RNC, P1 will receive a CSF alarm. After that, the system triggers the protection switching
to switch the services from the active PW to the standby PW.
15-1
SJ-20110927150233-015|2012-08-29 (R1.2)
15-2
SJ-20110927150233-015|2012-08-29 (R1.2)
15-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. Create an active tunnel.
a. On the Service View screen, select Service > New > New Tunnel. The New
Tunnel dialog box is displayed.
b. Configure a tunnel. For a description of the parameters, refer to Table 15-1.
15-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Create Mode
Network Type
Protection Type
Terminal Type
A1 End
Z1 End
User Label
Description
l
A1 End
Z1 End
User Label
c. On the Tunnel Binding tab, select a tunnel bound with the PW. For a description
of the parameters, refer to Table 15-3.
15-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Forward Tunnel
d. Click Apply.
3. Repeat step 1 to create a standby tunnel.
4. Repeat step 2 to create a standby PW.
5. Configure services carried on the active PW.
a. On the Service View screen, select Service > New > New Ethernet Service.
The New Ethernet Service dialog box is displayed.
b. Configure active Ethernet services. For a description of the parameters, refer to
Table 15-4.
Table 15-4 Parameter Descriptions for Active Ethernet Service Configuration
Parameter
Description
Service Type
A-End
Work Z-End
c. On the User Ports Configuration tab, select a configured port, and click Modify.
The User Ports Configuration dialog box is displayed.
d. Select the MEG Mapping check box, and set NNI Protocol to TMPLS OAM.
e. Click OK to return to the User Ports Configuration tab.
f. Repeat step c to step e to configure another port.
g. On the Network Ports Configuration tab, select Use Exist Server Link from the
Add list. The Use Exist Server Link dialog box is displayed.
h. Select an active PW.
i. Click OK to return to the Network Ports Configuration tab.
j. Click Apply.
6. Configure services on the sink node of the standby PW.
a. On the Topology Management screen, right-click an NE on the sink node, and
select NE Manager from the shortcut menu. The NE Manager dialog box is
displayed.
15-6
SJ-20110927150233-015|2012-08-29 (R1.2)
b. From the NE Operation navigation tree in the left pane, select Service
Configuration > Ethernet Service Management. The Ethernet Service
Management dialog box is displayed.
c. Select New EPL Service from the Add list. The Create MRDFr dialog box is
displayed.
d. Select Add Ethernet Cip from the Add list. The Create Service point dialog box
is displayed.
e. Configure the service point. For a description of the parameters, refer to Table
15-4.
Table 15-5 Parameter Descriptions for Service Point Configuration
Parameter
Description
Port
NNI Protocol
Description
TNP Name
Rate
Protection Type
Work Service
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Protection Service
Advanced
Reversion
Properties
Mode
tab
APS Protocol
Description
Work MEG ID
Send Period
CV PHB
Connection Check
PreActive LM
AIS
CSF Insert/Abstract
CSF PHB
Configuration Requirement
Figure 15-4 shows the network topology of the PW dual-homing protection. By connecting
to the ZXCTN devices, the RNC communicates with Node B in real time.
To ensure the normal communication between the RNC and NE 1, the dual-homing
protection is configured. If a fault occurs on NE 2 or on the link between NE 1 and NE
2, services are switched to the standby route, to ensure the normal service transmission
between the RNC and NE 1.
Figure 15-4 Network Topology of PW Dual-Homing Protection
Configuration Plan
Based on the configuration requirement, the service plan of the PW dual-homing protection
is as follows:
l
l
l
For the IP address plan of the NEs in the network, refer to Table 15-8.
15-9
SJ-20110927150233-015|2012-08-29 (R1.2)
NE IP
Board
Slot
Port
Port IP
Address
NE 1
192.61.20.1
NE 2
192.61.20.2
NE 3
192.61.20.5
Port VLAN
Address
R1EXG
10.10.12.1
120
10.10.51.2
510
R8FEF
10.10.11.1
110
R1EXG
10.10.12.2
120
10.10.28.1
280
10.10.51.1
510
10.10.58.1
580
R1EXG
Configuration Procedure
Note:
VLAN interface has been configured before the following procedures.
c.
Parameter
Value
Create Mode
Static
Network Type
Linear
Protection Type
NoProtection
Scenario
NoTunnelProtection
Service Direction
Bidirectional
A1 End
NE 1-R1EXG[0-1-3]-Eth_U:1
Z1 End
NE 2-R1EXG[0-1-3]-Eth_U:1
User Label
Tunnel-W
Other parameters
d. Click Apply.
15-10
SJ-20110927150233-015|2012-08-29 (R1.2)
c.
Parameter
Value
Create Mode
Static
A1 End
NE 1
Z1 End
NE 2
User Label
PW-W
Other parameters
On the Tunnel Binding tab, configure a tunnel bound with the PW. For the detailed
settings, refer to Table 15-11.
Table 15-11 Tunnel Binding Configuration
Parameter
Value
Forward Tunnel
Tunnel-W(Bidirection)
Other parameters
d. Click Apply.
3. Create a standby tunnel. For the detailed settings, refer to Table 15-12.
Table 15-12 Standby Tunnel Configuration
Parameter
Value
Create Mode
Static
Network Type
Linear
Protection Type
NoProtection
Scenario
NoTunnelProtection
Service Direction
Bidirectional
A1 End
NE 1-R1EXG[0-1-3]-Eth_U:2
15-11
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
Z1 End
NE 3-R1EXG[0-1-3]-Eth_U:2
User Label
Tunnel-P
Other parameters
4. Create a standby PW. For the detailed settings, refer to Table 15-13 and Table 15-14.
Table 15-13 Standby PW Configuration
Parameter
Value
Create Mode
Static
A1 End
NE 1
Z1 End
NE 3
User Label
PW-P
Other parameters
Value
Forward Tunnel
Tunnel-P(Bidirection)
Other parameters
Value
Service Type
EPL
A-End
NE 1-R8FEF[0-1-4]-Eth_U:1
Work Z-End
NE 2-R1EXG[0-1-3]-Eth_U:3
15-12
SJ-20110927150233-015|2012-08-29 (R1.2)
c.
Parameter
Value
Other parameters
On the User Ports Configuration tab, select a configured port, and click Modify.
The User Ports Configuration dialog box is displayed.
d. Select the MEG Mapping check box, and set NNI Protocol to TMPLS OAM.
e. Click OK to return to the User Ports Configuration tab.
f.
g. On the Network Ports Configuration tab, select Use Exist Server Link from the
Add list. The Use Exist Server Link dialog box is displayed.
h. Select an active PW.
i.
j.
Click Apply.
Select New EPL Service from the Add list. The Create MRDFr dialog box is
displayed.
d. Select Add Ethernet Cip from the Add list. The Create Service point dialog box
is displayed.
e. Configure the service point. For the detailed settings, refer to Table 15-16.
Table 15-16 Service Point Configuration
f.
Parameter
Value
Port
NE 3-R1EXG[0-1-3]-Eth_U:3
NNI Protocol
MPLS-TP OAM
Other parameters
g. Select Add Vip from the Add list. The Create Service point dialog box is
displayed.
h. Select a standby PW from the PW Termination Point ID list.
i.
SJ-20110927150233-015|2012-08-29 (R1.2)
j.
Click OK.
Value
TNP Name
PW protection
Rate
PW Rate
Protection Type
PW 1:1 1Send2Recv
Open Type
Open
Work Service
PW-W
Protection Service
PW-P
Advanced
Reversion Mode
Revertive
APS Protocol
Properties
tab
Other parameters
Value
Work MEG ID
12
21
CV Package
Send Period
100ms
CV PHB
af42
Connection Check
CSF Insert/Abstract
CSF PHB
af42
Other parameters
15-14
SJ-20110927150233-015|2012-08-29 (R1.2)
f.
Parameter
Value
Work MEG ID
15
51
CV Package
Send Period
100ms
CV PHB
af42
Connection Check
CSF Insert/Abstract
CSF PHB
af42
Other parameters
Click Apply.
15-15
SJ-20110927150233-015|2012-08-29 (R1.2)
15-16
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 16
When the node on the network detects a network fault, the fault adjacent node sends
the switchover request to its adjacent nodes through the APS protocol. When a node
detects the failure or receives the switchover request, it switches the service transmitted
to the faulty node to another direction (far away from the faulty node). Figure 16-2 shows
16-1
SJ-20110927150233-015|2012-08-29 (R1.2)
the MPLS-TP ring network in protection switching status. After the network fault or APS
protocol request disappears, the service returns to the previous path.
Figure 16-2 Wrapping Ring Network Protection Switchover
16-2
SJ-20110927150233-015|2012-08-29 (R1.2)
16-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. Create a section.
a. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog
box is displayed.
b. From the NE Operation navigation tree in the left pane, select Service
Configuration > Section Configuration. The Section Configuration dialog
box is displayed.
c. Click New. The Create Section dialog box is displayed.
16-4
SJ-20110927150233-015|2012-08-29 (R1.2)
d. Configure the section properties of the NE. For a description of the parameters,
refer to Table 16-1.
Table 16-1 Parameter Descriptions for Section Configuration
Parameter
Description
Section ID
Port
Next Hop IP
For the parameters not listed in the following table, use the default settings.
Caution!
Two NEs belonging to the same section are in the same MEG. These two NEs must
have the same section ID, otherwise the protection switching will be abnormal.
Description
MEG ID
MEG Index
16-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Type
Description
MEG Type
Related
Object
User Label
Local MEP
MEP ID
Peer MEP
MEP ID
Speed Mode
CV Packet
Enable
state
Send Circle
CV PHB
For the parameters not listed in the following table, use the default settings.
d. Configure the node protection group of the NE. For a description of the parameters,
refer to Table 16-3.
Table 16-3 Parameter Descriptions for Node Protection Group Configuration
Parameter
Description
Group ID
Type
Name
For the parameters not listed in the following table, use the default settings.
Description
Return mode
Switch mode
For the parameters not listed in the following table, use the default settings.
f. Click Next. The Relation area is displayed. Configure the protection relation of
the NE. For a description of the parameters, refer to Table 16-5.
Table 16-5 Parameter Descriptions for Protection Relation Configuration
Parameter
Description
East
West
For the parameters not listed in the following table, use the default settings.
g. Click Next. The APS Configuration area is displayed. Configure the APS of the
NE. For a description of the parameters, refer to Table 16-6.
16-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
For the parameters not listed in the following table, use the default settings.
Description
Network Type
Protection Type
Terminal Type
Service Direction
A-End
Z-End
For the parameters not listed in the following table, use the default settings.
c. On the Static Route tab, click the Computer button to create a static route.
d. Click Apply.
5. Configure a ring network protection tunnel.
a. In the Topology Management window, select Service > New > New Static
Tunnel. The New Static Tunnel dialog box is displayed.
16-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Network Type
Protection Type
Terminal Type
Scenario
Service Direction
Ring Node 1
Ring Node 2
For the parameters not listed in the following table, use the default settings.
c. On the Static Route tab, click the Computer button to create a static route.
d. Click Apply.
6. Configure the TNP.
a. In the Topology Management window, select Service > TNP Management. The
TNP Management dialog box is displayed.
b. Right-click a blank area, select Add from the shortcut menu. The New TNP dialog
box is displayed.
c. Configure the TNP. For a description of the parameters, refer to Table 16-9.
Table 16-9 Parameter Descriptions for TNP Configuration
Parameter
Description
TNP Name
Rate
16-9
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Protection Type
Work Service
Protection Service
For the parameters not listed in the following table, use the default settings.
d. Click Apply.
End of Steps
Configuration Requirement
Figure 16-5 shows the network topology of the Wrapping ring protection. Division 1 and
division 2 of a company communicate with each other through a network comprised of
the ZXCTN 6200/6300/6220. The services between division 1 and division 2 have high
reliability requirement.
Figure 16-5 Network Topology of Wrapping Ring Protection
16-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Plan
Based on the configuration requirement, the service plan of the Wrapping ring protection
is as follows:
l
l
NE 1 to NE 4 form an MPLS-TP ring network. If a fault occurs on a node, the services are
switched from the working tunnel to the ring protection tunnel.
For the IP address plan of the NEs in the network, refer to Table 16-10.
Table 16-10 Network Plan of Wrapping Ring Protection
NE
NE IP Address
Board
Slot
Port
Port IP Address
Port VLAN
NE 1
192.61.20.1
R1EXG
192.61.1.1
100
192.61.4.2
400
R8EGE
192.61.6.2
600
R1EXG
11
192.61.1.2
100
12
192.61.2.1
200
192.61.2.3
200
192.61.3.1
300
R8EGE
192.61.5.2
500
R1EXG
11
192.61.3.2
300
12
192.61.4.1
400
NE 2
192.61.20.2
NE 3
192.61.20.4
NE 4
192.61.20.5
R1EXG
Configuration Procedure
Note:
Before the Wrapping ring protection configuration, the VLAN ports must be configured.
1. Create sections.
a. On the Topology Management screen, right-click NE 1, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select Service
Configuration > Section Configuration. The Section Configuration dialog
box is displayed.
c.
NE 1
NE 2
NE 3
NE 4
eter
Section
12
41
23
12
34
23
41
34
R1E-
R1E-
R1E-
R1E-
R1E-
R1E-
R1E-
R1E-
ID
Port
XG[0-
XG[0-
XG[0-
XG[0-
XG[0-
XG[0-
XG[0-
XG[0-
1-3]-
1-4]-
1-12]-
1-11]-
1-4]-
1-3]-
1-12]-
1-11]-
ETH:1
ETH:1
ETH:1
ETH:1
ETH:1
ETH:1
ETH:1
ETH:1
Next
192.61.
192.61.
192.61.
192.61.
192.61.
192.61.
192.61.
192.61.
Hop IP
1.2
4.1
2.3
1.1
3.2
2.1
4.2
3.1
Other
Parameters
Caution!
Two NEs belonging to the same section are in the same MEG. These two NEs must
have the same section ID, otherwise the protection switching will be abnormal.
Click OK.
On the MEG tab, click New. The New dialog box is displayed.
d. Configure the section OAM of NE 1. For the detailed settings, refer to NE 1 column
in Table 16-12.
16-12
SJ-20110927150233-015|2012-08-29 (R1.2)
NE 1
NE 2
NE 3
NE 4
MEG
MEG ID
12
41
23
12
34
23
41
34
MEG
User
NE1-
NE1-
NE2-
NE2-
NE3-
NE3-
NE4-
NE4-
Label
NE2
NE4
NE3
NE1
NE4
NE2
NE1
NE3
MEG
Sec-
Sec-
Sec-
Sec-
Sec-
Sec-
Sec-
Sec-
Type
tion
tion
tion
tion
tion
tion
tion
tion
MEG
MEG
MEG
MEG
MEG
MEG
MEG
MEG
Related
Sec-
Sec-
Sec-
Sec-
Sec-
Sec-
Sec-
Sec-
Object
tion:
tion:
tion:
tion:
tion:
tion:
tion:
tion:
12
41
23
12
34
23
41
34
MEP ID
12
14
23
21
34
32
41
43
MEP ID
21
41
32
12
43
23
14
34
High
High
High
High
High
High
High
High
Speed
Speed
Speed
Speed
Speed
Speed
Speed
Speed
Permit
Permit
Permit
Permit
Permit
Permit
Permit
Permit
Send
3.33
3.33
3.33
3.33
3.33
3.33
3.33
3.33
Circle
ms
ms
ms
ms
ms
ms
ms
ms
CV
ef
ef
ef
ef
ef
ef
ef
ef
Index
Type
Local
MEP
Peer
MEP
Speed Mode
CV
Enable
Pac-
state
ket
PHB
Other
Parameters
Click OK.
16-13
SJ-20110927150233-015|2012-08-29 (R1.2)
b. From the NE Operation navigation tree in the left pane, select Protection
Management > Section Protection. The Section Protection dialog box is
displayed.
c.
Click New. The New Protection Relation Group dialog box is displayed.
NE 1
NE 2
NE 3
NE 4
Group ID
User Label
Ring_PG_1
Ring_PG_1
Ring_PG_1
Ring_PG_1
Type
CTN Section
CTN Section
CTN Section
CTN Section
Ring
Ring
Ring
Ring
NE 1
NE 2
NE 3
NE 4
Remark
NE 1
NE 2
NE 3
NE 4
Return
Revertive
Revertive
Revertive
Revertive
Wrapping
Wrapping
Wrapping
Wrapping
mode
WTR time
(min)
Delay time
(ms)
Switch
mode
Other
parameters
f.
Click Next. The Relation tab is displayed. Configure the protection relation of NE
1. For the detailed settings, refer to NE 1 column in Table 16-15.
Table 16-15 Protection Relation Configuration
Parameter
NE 1
NE 2
NE 3
NE 4
East
NE1-R1EXG[0-
NE2-R1EXG[0-
NE3-R1EXG[0-
NE4-R1EXG[0-
1-3]-ETH:1-
1-12]-ETH:1-
1-4]-ETH:1-
1-12]-ETH:1-
Section: 12
Section: 23
Section: 34
Section: 41
16-14
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
NE 1
NE 2
NE 3
NE 4
West
NE1-R1EXG[0-
NE2-R1EXG[0-
NE3-R1EXG[0-
NE4-R1EXG[0-
1-4]-ETH:1-
1-11]-ETH:1-
1-3]-ETH:1-
1-11]-ETH:1-
Section: 41
Section: 12
Section: 23
Section: 34
g. Click Next. The APS Configuration tab is displayed. Configure the APS of NE
1. For the detailed settings, refer to NE 1 column in Table 16-16.
Table 16-16 APS Configuration
Parameter
NE 1
NE 2
NE 3
NE 4
Start
Start
Start
Start
Click OK.
j.
c.
Parameter
Value
Network Type
Linear
Protection Type
NoProtection
Terminal Type
End
Scenario
NoTunnelProtection
Service Direction
Bidirectional
A-End
NE 1
Z-End
NE 2
User Label
NE 1-NE 2
Other parameters
On the Static Route tab, click the Computer button to create a static route.
16-15
SJ-20110927150233-015|2012-08-29 (R1.2)
d. Click Apply.
5. Configure a ring network protection tunnel.
a. On the Configure Service screen, select Service > New > New Static Tunnel.
The New Static Tunnel dialog box is displayed.
b. Configure a ring network protection tunnel. For the detailed settings, refer to Table
16-18.
Table 16-18 Ring Network Protection Tunnel Configuration
c.
Parameter
Value
Network Type
Ring
Protection Type
NoProtection
Terminal Type
End
Scenario
Ring Tunnel
Service Direction
Bidirectional
Ring Node 1
NE 1
Ring Node 2
NE 2
User Label
Other parameters
On the Static Route tab, click the Computer button to create a static route.
d. Click Apply.
6. Configure the TNP.
a. On the Configure Service screen, select Service > TNP Management. The TNP
Management dialog box is displayed.
b. Right-click a blank area, select Add from the shortcut menu. The New TNP dialog
box is displayed.
c.
Configure the TNP. For the detailed settings, refer to Table 16-19.
Table 16-19 TNP Configuration
Parameter
Value
TNP Name
Rate
Tunnel Rate
Protection Type
Wrapping Ring
Work Service
Tunnel-NE 1-NE 2
Protection Service
d. Click Apply.
16-16
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 17
MPLS TE HSB
Table of Contents
MPLS TE HSB Overview..........................................................................................17-1
MPLS TE HSB Application ......................................................................................17-1
Configuration Flow of MPLS TE HSB ......................................................................17-2
Configuring the MPLS TE HSB ................................................................................17-3
MPLS TE HSB Configuration Example .................................................................. 17-11
17-1
SJ-20110927150233-015|2012-08-29 (R1.2)
17-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. Configure the RSVP-TE.
a. On the Topology Management screen, right-click an NE to be configured, and
select NE Manager from the shortcut menu. The NE Manager dialog box is
displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > MPLS Management > RSVP-TE Configuration. The RSVP-TE
Configuration dialog box is displayed.
c. On the RSVP-TE Global Configuration tab, click
Configuration dialog box is displayed.
Description
Enable RSVP-TE
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Enable GR
GR Internal (ms)
PHP Mode
PHP Force
17-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Enable Retransmit
Refresh Reduction
e. Click OK.
f. On the RSVP-TE Interface Configuration tab, click
Configuration dialog box is displayed.
Description
Port Name
parameter Configure
Max Bandwidth
(kbps)
TE Metric
17-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Authcation
Description
Enable TE
Authentication
function.
Each interface supports an
authentication key.
The configuration at both ends of a
link must be consistent.
Authentication Key
Authentication Type
h. Click OK.
i. Repeat step a through step h to configure RSVP-TEs of other NEs.
2. Configure the TE functions of routing protocols. For the detailed settings procedures,
refer to Table 17-3.
Table 17-3 TE Function Configuration Procedures
If ...
Then ...
i.
ii.
17-6
SJ-20110927150233-015|2012-08-29 (R1.2)
v.
Click OK.
box is displayed.
vii. Select the Enable TE check box.
viii. Click OK.
ix. Repeat step i through step viii to configure TE functions of other NEs.
The IS-IS protocol is used between
i.
ii.
Click OK.
17-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Create
Mode
Network
Type
Protection
Type
Terminal
Type
Scenario
A1 End
Z1 End
Service
Direction
Dynamic
Enable Path
Properties
Record
function.
Create
Priority
Keep
Priority
Enable FRR
Preserved
Bandwidth
(kbps)
Max Hops
Enable
enabled.
Max Hops
Max Metric
Enable
17-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Max Metric
Prefer Min
Hop
Auto
Bandwidth
Adjustment
c. On the Dynamic Route tab, select a forward route, and click Modify. The Path
Configuration dialog box is displayed.
d. Set Work Route Strategy to Create New Explicit Route.
e. In the Work Route area, click Choose. The Route Constraint dialog box is
displayed.
f. Click Add, and select Manage Object in Scope from the drop-down list. The
Constraint Object Config dialog box is displayed.
g. Configure constraint objects. For a description of the parameters, refer to Table
17-5.
Table 17-5 Parameter Descriptions for Constraint Object Configuration
Parameter
Description
Resource Type
Resource Name
Constraint Type
Constraint Degree
k. In the Protect Route area, click Choose. The Route Constraint dialog box is
displayed.
l. Click Add, and select Manage Object in Scope from the drop-down list. The
Constraint Object Config dialog box is displayed.
m. Configure constraint objects. For a description of the parameters, refer to Table
17-5.
n. Click OK to return to the Route Constraint dialog box.
o. Click OK to return to the Path Configuration dialog box.
p. Click OK to return to the Dynamic Route tab.
q. Click Apply.
4. Configure the BFD function of the tunnel.
a. On the Topology Management screen, right-click the head-end node of the
bypass tunnel, and select NE Manager from the shortcut menu. The NE Manager
dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
c. On the Protocol BFD Management tab, click
Management dialog box is displayed.
d. Configure the protocol BFD function. For a description of the parameters, refer to
Table 17-6.
Table 17-6 Parameter Descriptions for Protocol BFD Configuration
Parameter
Description
Protocol Type
Tunnel ID
17-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Multiplier
e. Click OK.
End of Steps
Configuration Requirement
Figure 17-4 shows the network topology of the MPLS TE HSB, where division 1 and
division 2 of a company communicate with each other through the network comprised of
the ZXCTN 6200/6300/6220. The services between division 1 and division 2 have high
reliability requirement.
Figure 17-4 Network Topology of MPLS TE HSB
Configuration Plan
Based on the configuration requirement, the service plan of the MPLS TE HSB is as
follows:
17-11
SJ-20110927150233-015|2012-08-29 (R1.2)
l
l
If a fault occurs on the active path, services are switched to the standby path.
For the IP address plan of the NEs in the network, refer to Table 17-7.
Table 17-7 Network Plan of MPLS TE HSB
NE
NE IP Address
Board
Slot
Port
Port IP
Port VLAN
Address
NE 1
NE 2
NE 3
NE 4
192.61.20.1
192.61.20.2
192.61.20.4
192.61.20.5
R1EXG
10.10.12.1
120
10.10.51.2
510
R8FEF
10.10.11.1
110
R1EXG
10.10.12.2
120
10.10.24.1
240
10.10.24.2
240
10.10.45.1
450
R1EXG
R8FEF
10.10.41.1
410
R1EXG
10.10.45.2
450
10.10.51.1
510
Configuration Procedure
1. Configure the RSVP-TE.
a. On the Topology Management screen, right-click NE 1, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > MPLS Management > RSVP-TE Configuration. The RSVP-TE
Configuration dialog box is displayed.
c.
d. Configure global properties of the RSVP-TE. For the detailed settings, refer to
Table 17-8.
Table 17-8 Global RSVP-TE Configuration
Parameter
Value
Enable RSVP-TE
Enable
Enable GR
Enable
Other parameters
e. Click OK.
17-12
SJ-20110927150233-015|2012-08-29 (R1.2)
f.
g. Set Port Name to VLAN:120-(L3), and use the default settings for other
parameters.
h. Click OK.
i.
j.
Port Name
NE 2
VLAN:120-(L3)
VLAN:240-(L3)
NE 3
VLAN:240-(L3)
VLAN:450-(L3)
NE 4
VLAN:450-(L3)
VLAN:510-(L3)
On the OSPF Process tab, select an OSPF process to be configured, and click
. The Process Modify dialog box is displayed.
On the OSPF Area tab, select an OSPF area to be configured, and click
Area Modify dialog box is displayed.
. The
i.
Value
Create Mode
Dynamic
Network Type
Linear
Protection Type
NoProtection
Terminal Type
Terminal
Scenario
NoTunnelProtection
A1 End
NE 1192.61.20.1
Z1 End
NE 3192.61.20.4
Service Direction
Unidirectional
User Label
Tunnel-TE HSB
Dynamic
Enable Path
Properties
Record
Other parameters
c.
On the Dynamic Route tab, select a forward route, and click Modify. The Path
Configuration dialog box is displayed.
Click Add, and select Manage Object in Scope from the drop-down list. The
Constraint Object Config dialog box is displayed.
g. Configure constraint objects. For the detailed settings, refer to Table 17-11.
Table 17-11 Constraint Object Configuration 1
Parameter
Value
Resource Type
Port
Resource Name
NE 2-VLAN:240-(L3)-10.10.24.1(P)
Constraint Type
Pass
Constraint Degree
Restricted
17-14
SJ-20110927150233-015|2012-08-29 (R1.2)
j.
Select the Protect check box, and set Protect Route Strategy to Create NEe
Explicit Route.
k.
In the Protect Route area, click Choose. The Route Constraint dialog box is
displayed.
l.
Click Add, and select Manage Object in Scope from the drop-down list. The
Constraint Object Config dialog box is displayed.
m. Configure constraint objects. For the detailed settings, refer to Table 17-12.
Table 17-12 Constraint Object Configuration 2
Parameter
Value
Resource Type
Port
Resource Name
NE 4-VLAN:450-(L3)-10.10.45.2(P)
Constraint Type
Pass
Constraint Degree
Restricted
d. Configure the BFD function of the protocol. For the detailed settings, refer to Table
17-13.
The tunnel ID of the tunnel created in step 3 is 5.
Table 17-13 Protocol BFD Configuration
Parameter
Value
Protocol Type
Tunnel
Tunnel ID
3
17-15
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
Multiplier
e. Click OK.
17-16
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 18
MS-PW
Table of Contents
MS-PW Overview .....................................................................................................18-1
MS-PW Application ..................................................................................................18-1
MS-PW Configuration Flow ......................................................................................18-2
Configuring the MS-PW ...........................................................................................18-2
MS-PW Configuration Example ...............................................................................18-4
The source PE and sink PE of the services are not in the same Autonomous System
(AS), and the signaling connection or tunnel cannot be set up between two PEs.
The signaling mechanism of the source PE and that of the sink PE of the services are
different. For example, the PE at one end operates the Label Distribution Protocol
(LDP) while the PE at the other end operates the Resource ReServation Protocol
(RSVP).
If the access devices can operate Multi-Protocol Label Switching (MPLS) but they do
not have the capability of setting up a large number of LDP sessions, use the devices
with low performance as U-PEs and use the devices with high performance as S-PEs.
18-1
SJ-20110927150233-015|2012-08-29 (R1.2)
The S-PEs act as the switching nodes of LDP sessions, similar to signaling reflectors,
realizing tunnel convergence of PWs.
Prerequisite
The tunnels carrying PWs are created.
Steps
1. Configure single-segment PWs.
a. In the Topology Management window, select Service > New > New PW. The
New PW dialog box is displayed.
b. Configure a single-segment PW. For a description of the parameters, refer to Table
18-1.
Table 18-1 Parameter Descriptions for Single-Segment PW Configuration
Parameter
Description
Create Mode
18-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 18 MS-PW
Parameter
Description
A1 End
Z1 End
MEG Configuration
Signalling Type
Tunnel Binding
Forward
tab
Tunnel
Reverse
Tunnel
Control
Word
Support
selected.
Sequence
Support
For the parameters not listed in the following table, use the default settings.
Note:
During the configuration of the tunnel binding, the NMS creates a forward label
and a reverse label automatically.
c. Click Apply.
d. Refer step a through step c to configure other single-segment PWs.
2. Configure an MS-PW.
a. In the Topology Management window, select Service > New > Create MSPW.
The New MSPW dialog box is displayed.
b. In the topology map in the right pane, right-click a link through which the
single-segment PWs pass, and select Choose pw from the shortcut menu. The
Choose pw dialog box is displayed.
c. Select a single-segment PW, and click OK.
18-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Requirements
Figure 18-3 shows the network topology of the MS-PW. The configuration requirements
are as follows:
l NE 1 and NE 3 need to communicate with each other, between which only one direct
link is available.
l The tunnel bandwidth between NE 1 and NE 3 are used up.
l The tunnels from an intermediate device to NE 1 and NE 3 have available bandwidth.
l No new tunnel can be created on the intermediate device.
Based on the service requirements, an MS-PW can be used to implement the
communication between NE 1 and NE 3.
Figure 18-3 Network Topology of MS-PW
Configuration Plan
Based on the configuration requirements, the service plan of the MS-PW is as follows:
l
l
l
For the IP address plan of the NEs in the network, refer to Table 18-2.
Table 18-2 Network Plan of MS-PW
NE
NE IP
Board
Slot
Port
Address
NE 1
192.61.20.1
Port IP
Port VLAN
Address
R1EXG
10.10.12.1
120
18-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 18 MS-PW
NE
NE IP
Board
Slot
Port
Port IP
Address
NE 2
192.61.20.2
NE 3
Port VLAN
Address
R1EXG
192.61.20.4
R1EXG
10.10.12.2
120
10.10.24.1
240
10.10.24.2
240
Configuration Procedure
Note:
The tunnels carrying PWs are created. The tunnel from NE 1 to NE 2 is Tunnel-12, and
the tunnel from NE 2 to NE 3 is Tunnel-24.
Value
Create Mode
Static
User Label
MS-PW-1
A1 End
NE 1
Z1 End
NE 2
Tunnel
Forward Tunnel
Tunnel-12 (Bidirection)
Binding tab
Other parameters
c.
Value
Create Mode
Static
User Label
MS-PW-2
18-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
A1 End
NE 2
Z1 End
NE 3
Forward
Tunnel-24 (Bidirection)
Tunnel
Other parameters
2. Configure an MS-PW.
a. On the Service View screen, select Service > New > Create MSPW. The New
MSPW dialog box is displayed.
b. In the topology map on the right pane, right-click the link from NE 1 to NE 2,
and select Choose pw from the shortcut menu. The Choose pw dialog box is
displayed.
c.
d. In the topology map on the right pane, right-click the link from NE 2 to NE 3,
and select Choose pw from the shortcut menu. The Choose pw dialog box is
displayed.
e. Select MS-PW-2, and click OK.
f.
Click Verify.
g. Click Apply.
18-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 19
L3 VPN FRR
Table of Contents
L3 VPN FRR Overview.............................................................................................19-1
L3 VPN FRR Application ..........................................................................................19-1
Configuration Flow of L3 VPN FRR .........................................................................19-2
Configuring the L3 VPN FRR ...................................................................................19-3
L3 VPN FRR Configuration Example .......................................................................19-9
19-1
SJ-20110927150233-015|2012-08-29 (R1.2)
If a fault occurs in PE2, the VPN FRR is used to switch services to PE 1 -> PE 3 ->
CE 2, see Figure 19-1.
Figure 19-1 L3 VPN FRR Application (Node Fault)
If a fault occurs in the link between CE 2 and PE 2, the IP FRR is used to switch
services to PE 1 -> PE 2 -> PE 3 -> CE 2, see Figure 19-2.
Figure 19-2 L3 VPN FRR Application (Link Fault)
19-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuring the VPN FRR and BFD functions on the public network side
Configuring the IP FRR and BFD functions on the private network side
Prerequisite
L3 VPN services are created.
Steps
1. Configure the BFD function between PEs.
For the BFD configuration procedures based on different service types, refer to Table
19-1.
19-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Then ...
i.
L3 VPN service.
ii.
iii. On the BGP Address Family tab, select the Router Mode entry.
iv. On the Neighbor Configuration tab, select a neighbor of the
local PE, and click
is displayed.
v.
i.
VPN service.
ii.
From the NE Operation navigation tree in the left pane, select OAM Configuration > BFD Management > Static BFD
Management. The Static BFD Management dialog box is displayed.
iii. Click
played.
iv. Configure a static BFD session.
l
Set Min Pkg Send Internal (ms), Min Pkg Recv Internal
(ms) and Times to 3, so that services will be switched in
50 ms if a fault is detected.
19-4
SJ-20110927150233-015|2012-08-29 (R1.2)
If ...
Then ...
Note:
Local Discriminator of the local PE should be consistent with
Remote Discriminator of the peer PE, and Remote Discriminator of the local PE should be consistent with Local Discriminator of the peer PE.
v.
vi. From the NE Operation navigation tree in the left pane, select
OAM Configuration > Detection Configuration Management
> Track Session Configuration. The Track Session Configuration dialog box is displayed.
vii. On the Track Session Configuration tab, click
to create a
Click
xi. Repeat step i through step x to configure the BFD function of the
peer PE.
Then ...
i.
VPN service.
ii.
From the NE Operation navigation tree in the left pane, select Protocol Configuration > Route Management > BGP
Protocol Configuration. The BGP Protocol Configuration dialog box is displayed.
19-5
SJ-20110927150233-015|2012-08-29 (R1.2)
If ...
Then ...
iii. On the BGP Address Family tab, select the IPV4 VRF
Mode entry, and click
v.
Click OK.
i.
service.
iii. Click
l
v.
Click OK.
vi. Click
19-6
SJ-20110927150233-015|2012-08-29 (R1.2)
If ...
Then ...
viii. Click OK. The FRR relation is established between the active route and the standby route.
3. Configure the IP FRR function between the peer PE and the peer CE.
a. On the Topology Management screen, right-click a peer PE NE on the sink node,
and select NE Manager from the shortcut menu. The NE Manager dialog box is
displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > Static Route Configuration. The Static
Route Configuration dialog box is displayed.
c. Click
d. Configure an active route. For a description of the parameters, refer to Table 19-3
.
Table 19-3 Parameter Descriptions for Active Route Configuration
Parameter
Description
Route Mode
VRF ID
Destination IP
Destination Mask
Next Hop IP
Description
Route Mode
19-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
VRF ID
Destination IP
Destination Mask
Next Hop IP
Priority
Configure the route priority. The smaller the value, the higher
the priority. The Priority value of the standby route should be
larger than that of the active route.
Is backup
g. Repeat step a through step e to configure a normal static route pointing to the CE
side on the next-hop NE of the standby route.
4. Configure the BFD function between the peer PE and the peer CE.
a. On the Topology Management screen, right-click a peer PE NE on the sink node,
and select NE Manager from the shortcut menu. The NE Manager dialog box is
displayed.
b. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
c. On the Protocol BFD Management tab, click
Management dialog box is displayed.
d. Configure the BFD function. For a description of the parameters, refer to Table
19-5.
Table 19-5 Parameter Descriptions for BDF Configuration
Parameter
Description
Protocol Type
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
VRF Name
e. Click OK.
End of Steps
Configuration Requirement
Figure 19-4 shows the network topology of the L3 VPN FRR. Division 1 and division 2 of
a company communicate with each other through the network comprised of the ZXCTN
6200/6300/6220. Based on the service requirements, the L3 VPN FRR is used to protect
services between division 1 and division 2.
Figure 19-4 Network Topology of L3 VPN FRR
Configuration Plan
Based on the configuration requirement, the service plan of the L3 VPN FRR is as follows:
l
If a fault occurs on the active path, services are switched to the standby path.
For the IP address plan of the NEs in the network, refer to Table 19-6.
Table 19-6 Network Plan of L3 VPN FRR
NE
NE IP
Board
Slot
Port
Address
NE 1
NE 2
NE 3
192.61.20.1
192.61.20.2
192.61.20.4
Port IP
Port VLAN
Address
R1EXG
10.10.12.1
120
10.10.14.1
140
R8FEF
10.10.11.1
110
R1EXG
10.10.12.2
120
10.10.24.1
240
R8FEF
10.10.27.1
270
R1EXG
10.10.24.2
240
10.10.14.2
140
R8FEF
10.10.47.1
470
CE 1
192.168.10.5
10.10.11.2
110
CE 2
192.168.10.6
10.10.27.2
270
10.10.47.2
470
Configuration Procedure
Note:
Before configuring the L3 VPN FRR, verify that:
l
l
Non-static L3 VPN services sent between NE 1 and NE 2 are created. The VRF ID of
NE 1 is 21, and the VRF ID of NE 2 is 20.
The neighbor relationships between NE 1 and NE 2, and between NE 1 and NE 3 are
established.
19-10
SJ-20110927150233-015|2012-08-29 (R1.2)
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > BGP Protocol Configuration. The
BGP Protocol Configuration dialog box is displayed.
c.
On the BGP Address Family tab, select the Router Mode entry.
. The
e. On the Advanced Configuration tab, configure the BDF function in the BDF
parameters configuration area. For the detailed settings, refer to Table 19-7.
Table 19-7 BDF Configuration
f.
Parameter
Value
Click OK.
Note:
The BFD configuration of NE 3 should be consistent with that of NE 2.
On the BGP Address Family tab, select the IPV4 VRF Mode entry, and click
The Modify BGP Address Family dialog box is displayed.
19-11
SJ-20110927150233-015|2012-08-29 (R1.2)
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > Static Route Configuration. The Static
Route Configuration dialog box is displayed.
c.
Click
d. Configure an active route. For the detailed settings, refer to Table 19-8.
Table 19-8 Active Route Configuration
Parameter
Value
Route Mode
VRF
VRF ID
20
Destination IP
10.10.20.0
Destination Mask
255.255.255.0
Next Hop IP
10.10.27.2
No
Priority
Other parameters
Note:
The network segment on the private side which connects with CE 2 is
10.10.20.0/24.
e. Click OK.
f.
Repeat step c through step e to configure a standby route. For the configuration
of the standby route, refer to Table 19-9.
Table 19-9 Standby Route Configuration
Parameter
Value
Route Mode
VRF
VRF ID
20
Destination IP
10.10.20.0
Destination Mask
255.255.255.0
Next Hop IP
10.10.24.2
No
Priority
10
Is Backup
19-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
Other parameters
Value
Route Mode
Usual
Destination IP
10.10.20.0
Destination Mask
255.255.255.0
Next Hop IP
10.10.47.2
No
Priority
10
Other parameters
4. Configure the BFD function between the peer PE and the peer CE.
a. On the Topology Management screen, right-click NE 2, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
c.
d. Configure the BFD function. For the detailed settings, refer to Table 19-11.
Table 19-11 BFD Parameter Configuration
Parameter
Value
Protocol Type
Static Route
10.10.27.1
10.10.27.2
VRF Name
20
e. Click OK.
19-13
SJ-20110927150233-015|2012-08-29 (R1.2)
19-14
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 20
MPLS TE FRR
Table of Contents
MPLS TE FRR Overview .........................................................................................20-1
MPLS TE FRR Application ......................................................................................20-1
Configuration Flow of MPLS TE FRR ......................................................................20-2
Configuring the MPLS TE FRR ................................................................................20-3
MPLS TE FRR Configuration Example ..................................................................20-13
FRR Label Switched Path (LSP): the LSP which is created in advance.
Active LSP: the LSP to be protected.
Point of Local Repair (PLR): the head-end node of the FRR LSP.
Merge Point (MP): the tail-end node of the FRR LSP.
MPLS TE FRR uses an LSP which is created in advance to protect one or multiple LSPs.
If a fault occurs in the active LSP or in the node of the active LSP, services are switched
to the FRR LSP. In that case, the service transmission will not be interrupted.
20-1
SJ-20110927150233-015|2012-08-29 (R1.2)
The link protection is used to protect the directly connected link between NEs.
Figure 20-2 shows the application of link protection mode, where the link PE1 -> PE2
is the active LSP, and the link PE1 -> PE3 -> PE2 is the FRR LSP. If a fault occurs in
the link between PE1 and PE2, services are switched to the FRR LSP.
Figure 20-2 MPLS TE FRR Application (Link Protection)
20-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Prerequisite
Bidirectional tunnels are configured between the devices to implement the interworking
through routing protocols.
20-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. Configure the RSVP-TE.
a. On the Topology Management screen, right-click an NE to be configured, and
select NE Manager from the shortcut menu. The NE Manager dialog box is
displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > MPLS Management > RSVP-TE Configuration. The RSVP-TE
Configuration dialog box is displayed.
c. On the RSVP-TE Global Configuration tab, click
Configuration dialog box is displayed.
Description
Enable RSVP-TE
Enable GR
GR Internal (ms)
20-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
PHP Mode
PHP Force
Enable Retransmit
Refresh Reduction
e. Click OK.
20-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Port Name
parameter Configure
Authcation
TE Metric
Enable TE
Authentication
function.
Each interface supports an
authentication key.
The configuration at both ends of a
link must be consistent.
Authentication Key
Authentication Type
h. Click OK.
i. Repeat step a through step h to configure RSVP-TEs of other NEs.
2. Configure the TE functions of routing protocols. For the detailed settings procedures,
refer to Table 20-3.
Table 20-3 TE Function Configuration Procedures
If ...
Then ...
20-6
SJ-20110927150233-015|2012-08-29 (R1.2)
i.
ii.
Click OK.
box is displayed.
vii. Select the Enable TE check box.
viii. Click OK.
ix. Repeat step i through step viii to configure TE functions of other NEs.
The IS-IS protocol is used between
i.
ii.
20-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Click OK.
Description
Create
Mode
l
l
Network
Type
Protection
Type
Terminal
Type
Scenario
A1 End
Z1 End
Service
Direction
20-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Dynamic
Enable Path
Properties
Record
function.
Create
Priority
Keep
Priority
Enable FRR
Preserved
Bandwidth
(kbps)
Max Hops
Enable
enabled.
Max Hops
Max Metric
Enable
Max Metric
Prefer Min
Hop
Auto
Bandwidth
Adjustment
c. On the Dynamic Route tab, select a forward route, and click Modify. The Path
Configuration dialog box is displayed.
d. Set Work Route Strategy to Create New Explicit Route.
e. In the Work Route area, click Choose. The Route Constraint dialog box is
displayed.
f. Click Add, and select Manage Object in Scope from the drop-down list. The
Constraint Object Config dialog box is displayed.
g. Configure constraint objects. For a description of the parameters, refer to Table
20-5.
20-9
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Resource Type
Resource Name
Constraint Type
Constraint Degree
l
l
Note:
The configuration procedures of a bypass tunnel is the same as those of an active
tunnel.
During the configuration procedures of the bypass tunnel, the FRR function cannot
be enabled.
20-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Tunnel Binding
Automatic routing
UnNumbered Port
From IP
Description
Interface Identifier
20-11
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
d. Click Apply.
7. Configure the BFD function of the interface.
a. On the Topology Management screen, right-click the head-end node of the
bypass tunnel, and select NE Manager from the shortcut menu. The NE Manager
dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
c. On the Interface BFD Management tab, click
Management dialog box is displayed.
d. Configure the BFD function of the interface. For a description of the parameters,
refer to Table 20-8.
Table 20-8 Parameter Descriptions for Interface BFD Configuration
Parameter
Description
Interface Name
OSPF Enable
ISIS Enable
RSVP Enable
Multiplier
SJ-20110927150233-015|2012-08-29 (R1.2)
e. Click OK.
f. Repeat step a through step e to configure the BFD function of the next-hop NE on
the protected link.
End of Steps
Configuration Requirement
Figure 20-4 shows the network topology of the MPLS TE FRR. Division 1 and division 2 of
company A communicate with each other through the network comprised of the ZXCTN
6200/6300/6220. The services between division 1 and division 2 have high reliability
requirement.
Figure 20-4 Network Topology of MPLS TE FRR
Configuration Plan
Based on the configuration requirement, the service plan of the MPLS TE FRR is as
follows:
l
l
20-13
SJ-20110927150233-015|2012-08-29 (R1.2)
NE IP
Board
Slot
Port
Port IP
Address
NE 2
NE 3
NE 4
NE 5
NE 1
192.61.20.1
192.61.20.2
192.61.20.4
192.61.20.5
192.61.20.6
Port VLAN
Address
R1EXG
R1EXG
R1EXG
10.10.12.1
120
10.10.51.2
510
10.10.61.2
610
10.10.12.2
120
10.10.24.1
240
10.10.24.2
240
10.10.45.1
450
R8FEF
10.10.41.1
410
R1EXG
10.10.45.2
450
10.10.51.1
510
R1EXG
10.10.61.1
610
R8FEF
10.10.60.1
600
Configuration Procedure
1. Configure the RSVP-TE.
a. On the Topology Management screen, right-click NE 1, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > MPLS Management > RSVP-TE Configuration. The RSVP-TE
Configuration dialog box is displayed.
c.
d. Configure global properties of the RSVP-TE. For the detailed settings, refer to
Table 20-10.
Table 20-10 Global RSVP-TE Configuration
Parameter
Value
Enable RSVP-TE
Enable
Enable GR
Enable
Other parameters
e. Click OK.
f.
20-14
SJ-20110927150233-015|2012-08-29 (R1.2)
g. Set Port Name to VLAN:610-(L3), and use the default settings for other
parameters.
h. Click OK.
i.
Port Name
NE 2
VLAN:120-(L3)
VLAN:510-(L3)
VLAN:610-(L3)
NE 3
VLAN:120-(L3)
VLAN:240-(L3)
NE 4
VLAN:240-(L3)
VLAN:450-(L3)
NE 5
VLAN:450-(L3)
VLAN:510-(L3)
On the OSPF Process tab, select an OSPF process to be configured, and click
. The Process Modify dialog box is displayed.
On the OSPF Area tab, select an OSPF area to be configured, and click
Area Modify dialog box is displayed.
. The
i.
Dynamic
Properties
Value
Create Mode
Dynamic
Network Type
Linear
Protection Type
NoProtection
Scenario
NoTunnelProtection
Service Direction
Unidirectional
A1 End
NE 1-192.61.20.6
Z1 End
NE 4-192.61.20.4
User Label
Tunnel-TE FRR
Enable FRR
Other parameters
c.
On the Dynamic Route tab, select a forward route, and click Modify. The Path
Configuration dialog box is displayed.
Click Add, and select Manage Object in Scope from the drop-down list. The
Constraint Object Config dialog box is displayed.
g. Configure constraint objects. For the detailed settings, refer to Table 20-13.
The active tunnel must pass through NE 2-VLAN:120 and NE 3-VLAN:240.
Table 20-13 Constraint Object Configuration
Parameter
Value
Resource Type
Port
Resource Name
NE 2-VLAN:120-(L3)-10.10.12.1(P)
NE 3-VLAN:240-(L3)-10.10.24.1(P)
20-16
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
Constraint Type
Pass
Constraint Degree
Restricted
j.
k.
Click Apply.
Click Add, and configure the MPLS TE FRR protection. For the detailed settings,
refer to Table 20-14.
Table 20-14 MPLS TE FRR Protection Configuration
Parameter
Value
Interface Identifier
VLAN:120-(L3)
d. Click Apply.
5. Configure the BFD function of the interface.
a. On the Topology Management screen, right-click NE 2, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
c.
d. Configure the BFD function of the interface. For the detailed settings, refer to
Table 20-15.
Table 20-15 Interface BFD Configuration
Parameter
Value
Interface Name
VLAN:120-(L3)
RSVP Enable
Enable
20-17
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Value
Multiplier
e. Click OK.
f.
Note:
The Interface BFD configuration of NE 3 is the same as that of NE 2.
20-18
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 21
LDP FRR
Table of Contents
LDP FRR Overview .................................................................................................21-1
LDP FRR Application ...............................................................................................21-1
LDP FRR Configuration Flow ...................................................................................21-2
Configuring the LDP FRR ........................................................................................21-3
LDP FRR Configuration Example ............................................................................21-5
that point to device C and device B. Normally, device A labels services with label CA and
then forwards the services to device C. If the link between device A and device C becomes
faulty, device A labels the services with label BA and forwards the services to device B.
The device B then forwards the services to device C.
Figure 21-1 LDP FRR Application
21-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. Configure the LDP.
a. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog
box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > MPLS Management > LDP Configuration.
The LDP
Configuration dialog box is displayed.
c. On the LDP Interface Configuration tab, click
d. Set Interface Name to the name of the layer-3 interface which needs to enable
the LDP.
e. Refer to step c through step d to enable the LDPs of other layer-3 interfaces.
f. On the LDP NE Configuration Management tab, configure the global properties
of the LDP. For a description of the parameters, refer to Table 21-1.
Table 21-1 Parameter Descriptions for Global LDP Configuration
Parameter
Description
LDP State
Router ID
For the parameters not listed in the following table, use the default settings.
g. Click
21-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Then ...
i.
protocol is in use
In
the
Topology
Management
window,
i.
Click OK.
In
the
Topology
Management
window,
. The IS-IS
21-4
SJ-20110927150233-015|2012-08-29 (R1.2)
a. In the Topology Management window, right-click the first node on the active route,
and select NE Management from the shortcut menu. The NE Management dialog
box is displayed.
b. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
c. On the Interface BFD Management tab, click
Management dialog box is displayed.
d. Configure the BFD function. For a description of the parameters, refer to Table
21-3.
Table 21-3 Parameter Descriptions for BFD Configuration
Parameter
Description
Interface Name
OSPF Enable
ISIS Enable
RSVP Enable
Multiplier
For the parameters not listed in the following table, use the default settings.
e. Click OK.
f. Refer to step a through step e to configure the BFD function of the next-hop NE
on the active route.
End of Steps
Configuration Requirement
Figure 21-3 shows the network topology of the LDP FRR. In the access network comprised
of the ZXCTN 6200/6300/6220 devices, the LDP protocol is enabled for the devices. The
devices send services through the Label Switched Path (LSP) that is set up based on the
LDP protocol. The services are important customer services, so the transmission reliability
of the services must be ensured.
Figure 21-3 Network Topology of LDP FRR
Configuration Plan
Based on the configuration requirements, the service plan of the LDP FRR is as follows:
l
l
For the IP address plan of the NEs in the network, refer to Table 21-4.
Table 21-4 Network Plan of LDP FRR
NE
NE IP
Board
Slot
Port
Address
NE 1
NE 2
NE 3
NE 4
192.61.20.1
192.61.20.2
192.61.20.4
192.61.20.5
Port IP
Port VLAN
Address
R1EXG
R1EXG
R1EXG
R1EXG
10.10.12.1
120
10.10.51.2
510
10.10.12.2
120
10.10.24.1
240
10.10.45.1
450
10.10.24.2
240
10.10.45.2
450
10.10.51.1
510
21-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Procedure
Note:
VLAN interface has been configured before the following procedures.
Value
Interface Name
VLAN:120-(L3)
VLAN:510-(L3)
Other parameters
Value
LDP State
Enable
Router ID
lbPort:1
Enable
Other parameters
e. Click
f.
21-7
SJ-20110927150233-015|2012-08-29 (R1.2)
NE 2
NE 3
NE 4
Interface Name
VLAN:120-(L3)
VLAN:240-(L3)
VLAN:450-(L3)
VLAN:240-(L3)
VLAN:450-(L3)
VLAN:510-(L3)
Other parameters
On the OSPF Process tab, select an OSPF process to be configured, and click
. The Process Modify dialog box is displayed.
d. Select the All Interface BFD Enable check box and the Route Back Mode check
box.
e. Click OK.
3. Configure the BFD function.
a. On the Topology Management screen, right-click NE 1, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
c.
d. Configure the BFD function. For the detailed settings, refer to Table 21-8.
Table 21-8 BFD Configuration 1
Parameter
Value
Interface Name
VLAN:120-(L3)
OSPF Enable
Enable
Multiplier
e. Click OK.
f.
Repeat step a through step e to configure the BFD function of NE 2. For the
detailed settings, refer to Table 21-9.
21-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Value
Interface Name
VLAN:120-(L3)
OSPF Enable
Enable
Multiplier
21-9
SJ-20110927150233-015|2012-08-29 (R1.2)
21-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 22
IP FRR
Table of Contents
IP FRR Overview .....................................................................................................22-1
IP FRR Application ...................................................................................................22-1
IP FRR Configuration Flow .......................................................................................22-2
Configuring the IP FRR ............................................................................................22-3
IP FRR Configuration Example.................................................................................22-6
22-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 22 IP FRR
Steps
1. Configure an active static route.
a. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog
box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > Static Route Configuration. The Static
Route Configuration dialog box is displayed.
c. Click
d. Configure an active static route. For a description of the parameters, refer to Table
22-1.
Table 22-1 Parameter Descriptions for Active Static Route Configuration
Parameter
Description
Route Mode
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Destination IP
Destination Mask
Next Hop IP
Priority
Route Flag
Is Backup
For the parameters not listed in the following table, use the default settings.
g. Click OK.
2. Configure the standby static route.
a. In the Static Route Configuration dialog box, click
dialog box is displayed.
Caution!
During the configuration of a standby static route, the priority of the standby static
route should be larger than that of the active static route, and the route flag should
be different from that of the active static route.
e. Click OK.
3. Configure the BFD of the static route.
a. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog
box is displayed.
b. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
22-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 22 IP FRR
Description
The layer-3 interface through which the protected link
passes
(ms)
Multiplier
For the parameters not listed in the following table, use the default settings.
e. Click OK.
f. On the Protocol BFD Management tab, click
Management dialog box is displayed.
Description
Protocol Type
Peer Address
For the parameters not listed in the following table, use the default settings.
h. Click OK.
End of Steps
22-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Requirement
Figure 22-4 shows the network topology of the static route IP FRR. NE 1 communicates
with CE 1 in the remote network. Two static routes are configured on NE 1 and they work
in the active/standby mode.
Figure 22-4 Network Topology of Static Route IP FRR Configuration
Configuration Plan
Based on the configuration requirement, the service plan of the static route IP FRR is as
follows:
l
l
If a fault occurs on the active static route, services are switched to the standby static route.
For the IP address plan of the NEs in the network, refer to Table 22-4.
Table 22-4 Network Plan of Static Route IP FRR
NE
NE IP
Board
Slot
Port
Port IP Address
Port VLAN
R1EXG
10.1.1.1
100
20.1.1.1
200
Address
NE 1
192.61.20.1
22-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 22 IP FRR
NE
NE IP
Board
Slot
Port
Port IP Address
Port VLAN
Address
NE 2
192.61.20.2
R1EXG
11
10.1.1.2
100
NE 2
192.61.20.3
R1EXG
11
20.1.1.2
200
Configuration Procedure
1. Configure an active static route.
a. On the Topology Management screen, right-click NE 1, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > Static Route Configuration. The Static
Route Configuration dialog box is displayed.
c.
Click
d. Configure parameters for the active static route of NE 1. For the detailed settings,
refer to Table 22-5.
Table 22-5 Parameter Descriptions for Active Static Route Configuration
Parameter
Value
Route Mode
Usual
Destination IP
192.168.1.0
Destination Mask
255.255.255.0
Next Hop IP
Next Hop IP
10.1.1.2
Priority
Route Flag
Is Backup
Other parameters
Click
g. Click OK.
2. Configure a standby static route.
a. In the Static Route Configuration dialog box, click
dialog box is displayed.
b. Configure parameters for the standby static route of NE 1. For the detailed
settings, refer to Table 22-6.
22-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Value
Route Mode
Usual
Destination IP
192.168.1.0
Destination Mask
255.255.255.0
Next Hop IP
Next Hop IP
20.1.1.2
Priority
10
Route Flag
Is Backup
Other parameters
Caution!
When the standby static route is configured, the priority of the standby static route
should be larger than that of the active static route, and the route flag should be
different from that of the active static route.
c.
d. Click
e. Click OK.
3. Configure the BFD of the static route.
a. On the Topology Management screen, right-click the NE, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
c.
d. Configure interface BFD parameters. For the detailed settings, refer to Table 22-7.
Table 22-7 Parameter Descriptions for Interface BFD Configuration
Parameter
Value
Interface Name
VLAN:100-(L3)
3
22-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 22 IP FRR
Parameter
Value
Multiplier
Other parameters
e. Click OK.
f.
g. Click
h. Configure protocol BFD parameters. For the detailed settings, refer to Table 22-8.
Table 22-8 Parameter Descriptions for Protocol BFD Configuration
i.
Parameter
Value
Protocol Type
Static Route
10.1.1.1
10.1.1.2
Other parameters
Static Route
Click OK.
Configuration Requirement
Figure 22-5 shows the network topology of the IS-IS route IP FRR. NE 1 communicates
with CE 1 in the remote network. IS-IS route IP FRR is configured on NE 1 to protect the
link.
22-9
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Plan
The configuration plan is as follows:
l
l
If a fault occurs on the working route, services are switched to the protection route.
For the IP address plan of the NEs in the network, refer to Table 22-9.
Table 22-9 Network Plan of IS-IS Route IP FRR
NE
NE IP
Board
Slot
Port
Address
NE1
192.61.20.
192.61.20.
Port VLAN
Address
R1EXG
Loopback
Address
192.168.1.1
100
192.168.2.1
200
R1EXG
11
192.168.1.2
100
1.1.1.2
R1EXG
11
192.168.2.2
200
1.1.1.3
1
NE2
Port IP
1.1.1.1
2
NE3
192.61.20.
3
Configuration Procedure
1. On the Topology Management screen, right-click NE 1, and select NE Manager from
the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > IS-IS Protocol Configuration. The IS-IS
Protocol Configuration window is displayed.
3. Create the IS-IS instance.
22-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 22 IP FRR
NE 1
NE 2
NE 3
Start IS-IS
System ID
0010.0100.1001
0020.0200.2002
0030.0300.3003
Area Address
01
01
01
Other parameters
settings
settings
settings
d. Click OK.
4. Configure the IS-IS interface.
a. Select the created IS-IS instance entry, and then click the IS-IS Interface tab.
b. Click
c.
NE 1
NE 2
NE 3
Interface Name
VLAN:100-(L3)
VLAN:100-(L3)
VLAN:200-(L3)
Level
level-12
level-12
level-12
Other
settings
settings
VLAN:200-(L3)
parameters
e. Click OK.
f.
Repeat step b through step e to add another port of NE 1 to the IS-IS instance.
SJ-20110927150233-015|2012-08-29 (R1.2)
c.
NE 1
NE 2
NE 3
Route protocol
connect
connect
connect
Level
level-1-2
level-1-2
level-1-2
Metric (063)
Other parameters
settings
settings
settings
d. Click OK.
6. (Optional) Configure IS-IS GR.
Note:
After the Graceful Restart function is enabled on NE 1 and NE 2, one ZXCTN device
operates as the GR and the other ZXCTN device operates as the helper so that data
packets can be normally forwarded when NE 1 and NE 2 are restarted.
a. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > IS-IS Protocol Configuration. The
IS-IS Protocol Configuration dialog box is displayed.
b. Click the IS-IS Instance tab.
c.
NE 1
NE 2
NE 3
Enable
t2 timer interval
60
60
60
manual
manual
manual
10
10
10
(565535s)
t3 timer configuration
mode
interval (165535s)
e. Click OK.
22-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 22 IP FRR
. The IS-IS
g. Click OK.
h. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management window is displayed.
i.
j.
Click
k.
Configure interface IS-IS BFD of NE1. For the detailed settings, refer to Table
22-14.
Table 22-14 Parameter Descriptions for Interface IS-IS BFD Configuration (NE 1)
l.
Parameter
NE 1
Interface Name
VLAN:100-(L3)
VLAN:200-(L3)
IS-IS Enable
Enable
Enable
Multiplier
Other parameters
Click OK.
22-13
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Requirement
Figure 22-6 shows the network topology of the OSPF route IP FRR. NE 1 communicates
with CE 1 in the remote network. Neighbor relationships are established between NE 1
and NE 2 , NE 1 and NE 3. OSPF route IP FRR is configured on NE 1 to protect the link.
Figure 22-6 Network Topology of OSPF Route IP FRR Configuration
Configuration Plan
Based on the configuration requirement, the service plan of the OSPF route IP FRR is as
follows:
l
l
If a fault occurs on the working route, services are switched to the protection route.
For the IP address plan of the NEs in the network, refer to Table 22-15.
Table 22-15 Network Plan of OSPF Route IP FRR
NE
NE IP Address
Board
Slot
Port
Port IP
Port VLAN
Address
NE1
192.61.20.1
R1EXG
Loopback
Address
10.1.1.1
100
10.1.2.1
200
1.1.1.1
NE2
192.61.20.2
R1EXG
11
10.1.1.2
100
1.1.1.2
NE2
192.61.20.3
R1EXG
11
20.1.2.2
200
1.1.1.3
Configuration Procedure
1. On the Topology Management screen, right-click NE 1, and select NE Manager from
the shortcut menu. The NE Manager dialog box is displayed.
22-14
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 22 IP FRR
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > OSPF Configuration.
The OSPF
Configuration dialog box is displayed.
3. Create the OSPF process.
a. Click the OSPF Process tab.
b. Click
c.
Configure parameters for the OSPF process. For the detailed settings, refer to NE
1 column in Table 22-16.
Table 22-16 Parameter Descriptions for OSPF Process Configuration
Parameter
NE 1
NE 2
NE 3
Process ID
Router ID
1.1.1.1
1.1.1.1
1.1.1.2
1.1.1.3
TE Router ID
VLAN:100-(L3)
VLAN:200-(L3)
VLAN:100-(L3)
VLAN:200-(L3)
Opaque
settings
settings
Capability
Other
parameters
d. Click OK.
4. Configure the OSPF area.
a. Click the OSPF Area tab.
b. Click
c.
Configure parameters for the area. For the detailed settings, refer to NE 1 column
in Table 22-17.
Table 22-17 Parameter Descriptions for OSPF Area Configuration
Parameter
NE 1
NE 2
NE 3
Process ID
Area Type
Backbone
Backbone
Backbone
Backbone
Area ID
0.0.0.0
0.0.0.1
0.0.0.0
0.0.0.1
Other
Default
Default
Default
Default
parameters
configurations
configurations
configurations
configurations
d. Click OK.
5. Configure OSPF ports.
a. In OSPF Area, click the Network tab.
b. Select the created OSPF entry. For the detailed settings, refer to NE 1 column in
Table 22-18. Click
SJ-20110927150233-015|2012-08-29 (R1.2)
c.
NE 1
NE 2
NE 3
Area ID
0.0.0.0
0.0.0.1
0.0.0.0
0.0.0.1
IP
10.1.1.0
10.1.2.0
10.1.1.0
10.1.2.0
Wild Mask
0.0.0.255
0.0.0.255
0.0.0.255
0.0.0.255
d. Click OK.
6. Configure OSPF route distribution.
a. On the OSPF Process tab, click the External Route Import Strategy tab.
b. Select the created process entry. For the detailed settings, refer to NE 1 column
inTable 22-19. Click
is displayed.
c.
Configure external route import strategy parameters. For the detailed settings,
refer to Table 22-19.
Table 22-19 Parameter Descriptions for External Route Import Strategy
Attributes
Parameter
NE 1
NE 2
NE 3
Process ID
Protocol Type
Connected
Connected
Connected
Connected
Redistributed
Redistributed
Type 2 External
Type 2 External
Type 2 External
Type 2 External
Route
Route
Route
Route
LSA Tag
Redistributed
LSA Cost
d. Click OK.
7. Repeat step 1 through to step 6 to complete OSPF protocol configurations.
8. Configure the OSPF FRR.
a. On the Topology Management screen, right-click NE 1, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > OSPF Configuration. The OSPF
Configuration window is displayed.
c.
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 22 IP FRR
d. Select the OSPF process entry to be modified. For the detailed settings, refer to
Table 22-20. Click
e. Configure BFD parameters of the OSPF process. For the detailed settings, refer
to Table 22-20.
Table 22-20 Parameter Descriptions for BFD Configurations of the OSPF
Process (NE 1)
f.
Parameter
NE 1
Process ID
, default
, default
g. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management window is displayed.
h. Click the Interface BFD Management tab.
. The BFD Interface Management dialog box is displayed.
i.
Click
j.
Configure BFD parameters of the interface. For the detailed settings, refer to Table
22-21.
Table 22-21 Parameter Descriptions for BFD Configurations of the Interface
(NE 1)
Parameter
NE 1
Interface Name
VLAN:100-(L3)
VLAN:200-(L3)
OSPF Enable
Enable
Enable
Multiplier
k.
Click OK.
l.
Repeat step i through step k to configure the BFD of the other interface.
22-17
SJ-20110927150233-015|2012-08-29 (R1.2)
22-18
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23
Route
Table of Contents
Static Route .............................................................................................................23-1
OSPF .......................................................................................................................23-7
IS-IS.......................................................................................................................23-29
BGP .......................................................................................................................23-38
BGP Route Reflector..............................................................................................23-53
23-1
SJ-20110927150233-015|2012-08-29 (R1.2)
As shown in Figure 23-2, the static route is configured between the PE and CE to make the
route reachable. The route between the PE and the loacl CE is the direct-connect static
route, and the route between the PE and remote CE is the non-direct-connect static route.
The static route between the PE and CE is applied in the L3VPN scenario.
Figure 23-2 Static Route Application (Between the PE and CE)
23-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Steps
1. Configure a direct-connect static route.
a. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog
box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > Static Route Configuration. The Static
Route Configuration dialog box is displayed.
c. Click
Description
Whether to set the static route to a public/private network
route.
l
VRF ID
Destination IP
Destination Mask
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Next Hop IP
For the parameters not listed in the following table, use the default settings.
g. Click OK.
2. Configure a non-direct-connect static route.
a. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog
box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > Static Route Configuration. The Static
Route Configuration dialog box is displayed.
c. Click
Description
Route Mode
VRF ID
Destination IP
Destination Mask
Next Hop IP
For the parameters not listed in the following table, use the default settings.
23-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
g. Click OK.
End of Steps
Configuration Requirement
Figure 23-4 shows the network topology of the static route, where division 1 of company
A communicates with division 2 through the network comprised of the ZXCTN devices.
Division 1 is directly connected to CE 1, and division 2 is directly connected to CE 2. The
static route should be configured on NE 1 and NE 2 to implement the interconnection
between the local network and remote network.
Figure 23-4 Network Topology of Static Route Configuration
Configuration Plan
Based on the configuration requirement, the service plan of the static route is as follows:
l
l
Configure two static routes on NE1: the direct-connect static route to CE1 and
non-direct-connect static route to CE2.
Configure two static routes on NE2: the direct-connect static route to CE2 and
non-direct-connect static route to CE1.
For the plan about IP address of each NE in the network according to the service plan and
requirements, refer to Table 23-3.
23-5
SJ-20110927150233-015|2012-08-29 (R1.2)
NE IP Address
Loopback
Board
Slot
Port
Address
NE1
NE2
192.61.20.1
192.61.20.2
1.1.1.1
R1EXG
1.1.1.2
R1EXG
Port IP
Interface
Address
VLAN
192.61.1.1
100
192.62.2.2
200
11
192.61.1.2
100
12
192.63.3.2
300
CE1
172.16.1.2
192.62.2.1
200
CE2
192.168.1.2
192.63.3.1
300
Configuration Procedure
1. Configure direct-connect static routes.
a. On the Topology Management screen, right-click the NE, and select NE Manager
from the shortcut menu. The NE Manager dialog box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > Static Route Configuration. The Static
Route Configuration dialog box is displayed.
c.
Click
d. Configure parameters for the direct-connect static route of NE 1. For the detailed
settings, refer to NE 1 column in Table 23-4.
Table 23-4 Parameter Descriptions for the Direct-Connect Static Route
Configuration
Parameter
NE 1
NE 2
Route Mode
VRF
VRF
VRF ID
Destination IP
172.16.1.0
192.168.1.0
Destination Mask
255.255.255.0
255.255.255.0
Next Hop IP
192.62.2.1
192.63.3.1
No
No
Other parameters
Click
g. Click OK.
h. Repeat step a through step g to configure parameters for the direct-connect static
route of NE 2.
23-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Click
NE 1
NE 2
Route Mode
VRF
VRF
VRF ID
Destination IP
192.168.1.0
172.16.1.0
Destination Mask
255.255.255.0
255.255.255.0
Next Hop IP
1.1.1.2
1.1.1.1
Yes
Yes
Other parameters
Click
g. Click OK.
h. Repeat step a to step g to configure parameters for the non-direct-connect static
route of NE 2.
23.2 OSPF
23.2.1 OSPF Overview
Open Shortest Path First (OSPF) is an internal gateway protocol based on link state
developed by Internet Engineering Task Force (IETF). OSPFv1 is defined in RFC1131.
OSPFv2 is defined in RFC2328. At present, OSPFv2 is used to for the IPv4 protocol. The
ZXCTN 6200/6300/6220 supports OSPFv2.
l
l
Router LSA (Type1): The Router LSA is generated by every OSPF router. It describes
the router link status and cost. A Router LSA is transmitted in the whole area at where
it locates.
Network LSA (Type2): The Network LSA is generated by the Designated Router (DR).
It describes the link statuses of all routers in this network segment. A Network LSA is
transmitted in the whole area at where it locates.
Network Summary LSA (Type3): The Network Summary LSA is generated by the Area
Border Router (ABR). It describes the routes in a network segment and advertises
them to other areas.
ASBR Summary LSA (Type4): The ASBR Summary LSA is generated by ABR. It
describes the routes to Autonomous System Boundary Router (ASBR) and advertises
them to related areas.
AS External LSA (Type5): The AS External LSA is generated by ASBR. It describes
Autonomous System (AS) external routes and advertises them to the areas except
Stub area and Not-So-Stubby Area (NSSA).
NSSA External LSA (Type7): The NSSA External LSA is generated by the ASBR in
the NSSA. It describes the AS external routes and advertises them only in the NSSA.
Opaque LSA: It is formed by standard LSA header and special application information.
It can be directly used by the OSPF or indirectly used by other application information
distributed to the OSPF area.
According to the flooding area, Opaque LSA can be classified into Type9, Type10,
and Type11. Opaque LSA of Type9 is flooded only in the local link. Opaque LSA of
Type10 is flooded only in the local area. Opaque LSA of Type11 is flooded in the AS.
Intra Area
Inter Area
Type1 External
Type2 External
When the external route of Type1 calculates the cost, the area internal cost should be
considered. When the external route of Type2 calculates the cost, the area internal cost
does not require to be considered.
OSPF Area
When the network scale is big, to reduce the route entry, the OSPF divides the AS into
different areas, as shown in Figure 23-5. The area is to divide routers into different groups
logically. Each group is identified by Area ID.
23-8
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Areas include backbone areas and non-backbone areas. The backbone area is
consecutive. To reduce the route entry of the non-backbone area, the non-backbone area
is classified into the following types:
l
l
l
l
OSPF Authentication
The ZXCTN equipment supports three types of authentication modes, including no
authentication, simple password authentication (that is, plain text authentication), and
message digest authentication (that is, MD5 encryption authentication).
As shown in Figure 23-7, the OSPF is run between the PE and CE to exchange L3VPN
VRF routes.
Figure 23-7 Private Network OSPF Route Application
23-10
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Configuring
Configuring
Configuring
Configuring
Steps
1. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog box is
displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > OSPF Configuration.
The OSPF
Configuration dialog box is displayed.
3. Configure an OSPF process.
a. On the OSPF Process tab, click
Description
Process ID
Router ID
TE Router ID
Opaque Capability
For the parameters not listed in the following table, use the default settings.
c. Click OK.
4. Configure an OSPF area.
a. On the OSPF Area tab, click
b. Configure an OSPF area. For a description of the parameters, refer to Table 23-7.
Table 23-7 Parameter Descriptions for OSPF Area Configuration
Parameter
Description
Process ID
Area Type
Area ID
For the parameters not listed in the following table, use the default settings.
c. Click OK.
5. Configure an interface on which the OSPF operates.
a. On the OSPF Area tab, click the Network tab.
b. Select a created OSPF area, and click
displayed.
Description
IP
23-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Parameter
Description
Wild Mask
For the parameters not listed in the following table, use the default settings.
d. Click OK.
6. Configure the OSPF route redistribution.
a. On the OSPF Process tab, click the External Route Import Strategy tab.
b. Select a created OSPF process, and click
Strategy Create dialog box is displayed.
Description
Protocol Type
For the parameters not listed in the following table, use the default settings.
d. Click OK.
7. (Optional) Configure the OSPF GR.
Note:
If the Graceful Restart (GR) function is enabled on the ZXCTN 6200/6300/6220
devices, one ZXCTN 6200/6300/6220 device operates as the GR and the other
ZXCTN 6200/6300/6220 device operates as the helper so that data messages can
be normally forwarded when the ZXCTN 6200/6300/6220 device is restarted.
b. Configure the OSPF GR. For a description of the parameters, refer to Table 23-10.
23-13
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
NSF
For the parameters not listed in the following table, use the default settings.
c. Click OK.
8. (Optional) Configure an OSPF Stub area.
a. On the OSPF Area tab, click
b. Configure a Stub area. For a description of the parameters, refer to Table 23-11.
Table 23-11 Parameter Descriptions for Stub Area Configuration
Parameter
Description
Area Type
Area ID
Cost
For the parameters not listed in the following table, use the default settings.
c. Click OK.
9. (Optional) Configure an OSPF NSSA area.
a. On the OSPF Area tab, click
b. Configure an NSSA area. For a description of the parameters, refer to Table 23-12.
Table 23-12 Parameter Descriptions for NSSA Area Configuration
Parameter
Description
Area Type
Area ID
For the parameters not listed in the following table, use the default settings.
c. Click OK.
10. (Optional) Configure the OSPF authentication.
a. On the OSPF Area tab, select the OSPF area entry to be modified, and click
The Area Modify dialog box is displayed.
23-14
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Then ...
selected
Simple.
selected
Message Digest .
c. Click OK.
d. On the Interface Configuration tab.
e. Click
. The OSPF Attributes of Layer 3 Interface Create dialog box is
displayed.
f. Configure the OSPF authentication of layer3 interface in accordance with the
authentication mode.
If ...
Then ...
i.
selected
ii.
i.
selected
ii.
23-15
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
Description
Key ID
Key
For the parameters not listed in the following table, use the default settings.
Note:
The authentication mode of the area should be the same as that of the interface in
the area, and all interfaces in the area should use the same authentication mode.
g. Click OK.
11. (Optional) Configure the OSPF FRR.
a. On the OSPF Process tab, select the OSPF process entry to be modified, and
click
b.
c. Configure the BFD of the OSPF process. For a description of the parameters,
refer to Table 23-14.
Table 23-14 Parameter Descriptions for BFD Configuration of the OSPF Process
Parameter
Description
For the parameters not listed in the following table, use the default settings.
d. Click OK.
e. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
f. On the Interface BFD Management tab, click
Management dialog box is displayed.
g. Configure the BFD function of the interface. For a description of the parameters,
refer to Table 23-15.
23-16
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Description
Interface Name
OSPF Enable
Multiplier
For the parameters not listed in the following table, use the default settings.
h. Click OK.
12. (Optional) Configure the ECMP of the OSPF.
Note:
If there are several paths with the same cost to one destination, equivalence route
load sharing can be implemented to improve the link utilization ratio.
This configuration is used to set the maximum number of equivalence routes of
the OSPF protocol. The default of Maximum ECMP is 1, that is, the ECMP is not
supported. Up to eight equivalence routes can be supported.
The ECMP can be only used on the UNI side.
a. On the OSPF Process tab, select the OSPF process entry to be modified, and
click
b. In the Maximum ECMP text box, enter the maximum number of ECMP paths,
ranging from 1 to 8.
c. Click OK.
End of Steps
23-17
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Requirement
Figure 23-9 shows the network topology of the OSPF single area, where NE 1 is directly
connected to NE 2. A public network OSPF process is configured on the NNI sides of NE
1 and NE 2.
Figure 23-9 Network Topology of the OSPF Single Area Configuration
Configuration Plan
For the IP address plan of the NEs in the network, refer to Table 23-16.
Table 23-16 Network Plan of the OSPF Single Area
NE
NE IP Address
Board
Slot
Port
Port IP
Port VLAN
Address
Loopback
Address
NE1
192.61.20.1
R1EXG
192.168.1.1
100
1.1.1.1
NE2
192.61.20.2
R1EXG
11
192.168.1.2
100
1.1.1.2
Configuration Procedure
1. On the Topology Management screen, right-click NE 1, and select NE Manager from
the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > OSPF Configuration.
The OSPF
Configuration dialog box is displayed.
3. Create the OSPF process.
a. Click the OSPF Process tab.
b. Click
c.
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
NE 1
NE 2
Process ID
Router ID
1.1.1.1
1.1.1.2
TE Router ID
VLAN:100-(L3)
VLAN:100-(L3)
Opaque Capability
Other parameters
d. Click OK.
4. Configure the OSPF area.
a. Click the OSPF Area tab.
b. Click
c.
Configure parameters for the area. For the detailed settings, refer to NE 1 column
in Table 23-18.
Table 23-18 Parameter Descriptions for OSPF Area Configuration
Parameter
NE 1
NE 2
Process ID
Area Type
Backbone
Backbone
Area ID
0.0.0.0
0.0.0.0
Other parameters
d. Click OK.
5. Configure OSPF interfaces.
a. In OSPF Area, click the Network tab.
b. Select the created OSPF entry, and then click
box is displayed.
c.
NE 1
NE 2
IP
192.168.1.0
192.168.1.0
Wild Mask
0.0.0.255
0.0.0.255
a. On the OSPF Process tab, click the External Route Import Strategy tab.
b. Click
c.
Configure external route import strategy parameters. For the detailed settings,
refer to NE 1 column in Table 23-20.
Table 23-20 Parameter Descriptions for External Route Import Strategy
Parameter
NE 1
NE 2
Protocol Type
Connected
Connected
d. Click OK.
7. (Optional) Configure the OSPF GR.
Note:
When the Graceful Restart function is enabled on the ZXCTN devices, one ZXCTN
device operates as the GR and the other ZXCTN device operates as the helper so
that data packets can be normally forwarded when the ZXCTN device is restarted.
. The Process
c.
Parameter
NE 1
NE 2
NSF
120
120
Click OK.
Chapter 23 Route
Configuration Requirement
Figure 23-10 shows the network topology of the OSPF NSSA area, where the OSPF
protocol is run among NE 1, NE 2, and NE 3.
Figure 23-10 Network Topology of the NSSA Area Configuration
Configuration Plan
The configuration plan is as follows:
l
l
Configure Area0 to the backbone area, and Area1 to the NSSA area.
Enable simple key authentication on the interfaces of NE 1 and NE 2, and message
digest authentication on the interfaces of NE2 and NE3.
For the IP address plan of the NEs in the network, refer to Table 23-22.
Table 23-22 Network Plan of the NSSA Area
NE
NE IP Address
Board
Slot
Po-
Port IP Address
Port VLAN
rt
Loopback
Address
NE1
192.61.20.1
R1EXG
192.168.1.1
100
1.1.1.1
NE2
192.61.20.2
R1EXG
11
192.168.1.2
100
1.1.1.2
12
192.168.2.1
200
192.168.2.2
200
NE3
192.61.20.3
R1EXG
1.1.1.3
Configuration Procedure
1. On the Topology Management screen, right-click NE 1, and select NE Manager from
the shortcut menu. The NE Manager dialog box is displayed.
23-21
SJ-20110927150233-015|2012-08-29 (R1.2)
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > OSPF Configuration.
The OSPF
Configuration dialog box is displayed.
3. Create the OSPF process.
a. Click the OSPF Process tab.
b. Click
c.
NE 1
NE 2
NE 3
Process ID
Router ID
1.1.1.1
1.1.1.2
1.1.1.2
1.1.1.3
TE Router ID
VLAN:100-(L3)
VLAN:100-(L3)
VLAN:200-(L3)
VLAN:200-(L3)
Opaque
Other
parameters
settings
Capability
Use the default
settings
d. Click OK.
4. Configure the OSPF area.
a. Click the OSPF Area tab.
b. Click
c.
Configure parameters for the area. For the detailed settings, refer to NE 1 column
in Table 23-24.
Table 23-24 Parameter Descriptions for OSPF Area Configuration
Parameter
NE 1
NE 2
NE 3
Process ID
Area Type
Backbone
Backbone
NSSA
NSSA
Area ID
0.0.0.0
0.0.0.0
0.0.0.1
0.0.0.1
Authentication
Simple
Simple
Message Digest
Message Digest
Other
parameters
settings
Mode
Use the default
settings
d. Click OK.
5. Configure OSPF interfaces.
a. In OSPF Area, click the Network tab.
23-22
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
b. Select the created OSPF entry. For the detailed settings, refer to Table 23-25.
Click
c.
NE 1
NE 2
NE 3
Area ID
0.0.0.0
0.0.0.0
0.0.0.1
0.0.0.1
IP
192.168.1.0
192.168.1.0
192.168.2.0
192.168.2.0
Wild Mask
0.0.0.255
0.0.0.255
0.0.0.255
0.0.0.255
d. Click OK.
6. Configure the OSPF route redistribution.
a. In OSPF Process, click the External Route Import Strategy tab.
b. Select the created OSPF entry. For the detailed settings, refer to NE 1 column in
Table 23-26. Click
is displayed.
c.
Configure external route import strategy parameters. For the detailed settings,
refer to NE 1 column in Table 23-26.
Table 23-26 Descriptions for External Route Import Strategy Configuration
Parameter
NE 1
NE 2
NE 3
Process ID
Protocol Type
Connected
Connected
Connected
Connected
Redistributed
Redistributed
Type 2 External
Type 2 External
Type 2 External
Type 2 External
Route
Route
Route
Route
LSA Tag
Redistributed
LSA Cost
d. Click OK.
7. (Optional) Configure the OSPF GR.
23-23
SJ-20110927150233-015|2012-08-29 (R1.2)
Note:
When the Graceful Restart function is enabled on the ZXCTN devices, one ZXCTN
device operates as the GR and the other ZXCTN device operates as the helper so
that data packets can be normally forwarded when the ZXCTN device is restarted.
a. Select the OSPF process entry. For the detailed settings, refer to Table 23-27.
Click
NE 1
NE 2
NE 3
Process ID
NSF
NSF Max
120
120
120
120
Startup Time
(s)
c.
Click OK.
Configure the OSPF authentication parameter of the layer 3 interface. For the
detailed settings, refer to NE 1 column in Table 23-28.
Table 23-28 Parameter Descriptions for Layer 3 Interface OSPF Authentication
Configuration
Parameter
NE 1
NE 2
NE 3
Area ID
0.0.0.0
0.0.0.0
0.0.0.1
0.0.0.1
Interface Name
VLAN:100-(L3)
VLAN:100-(L3)
VLAN:200-(L3)
VLAN:200-(L3)
Authentication
Simple
Simple
Message Digest
Message Digest
Simple Key
, 111
, 111
Message Digest
Key ID: 1
Key ID: 1
Key: 123
Key: 123
Mode
23-24
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
d. Click OK.
9. Repeat step 1 through step 8 to complete OSPF protocol configuration of NE 2 and
NE 3.
Configuration Requirement
Figure 23-11 shows the network topology of the OSPF stub area, where the OSPF protocol
is run among NE 1, NE 2, and NE 3.
Figure 23-11 Network Topology of the Stub Area Configuration
Configuration Plan
Based on the configuration requirement, the service plan of the OSPF stub area is as
follows:
l
l
Configure Area0 to the backbone area, and Area1 to the Stub area.
Enable simple key authentication on the interfaces of NE 1 and NE 2, and message
digest authentication on the interfaces of NE2 and NE3.
For the IP address plan of the NEs in the network, refer to Table 23-29.
23-25
SJ-20110927150233-015|2012-08-29 (R1.2)
NE IP
Board
Slot
Port
Address
Port IP
Port VLAN
Loopback
Address
Address
NE1
192.61.20.1
R1EXG
192.168.1.1
100
1.1.1.1
NE2
192.61.20.2
R1EXG
11
192.168.1.2
100
1.1.1.2
12
192.168.2.1
200
192.168.2.2
200
NE3
192.61.20.3
R1EXG
1.1.1.3
Configuration Procedure
1. On the Topology Management screen, right-click NE 1, and select NE Manager from
the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > OSPF Configuration.
The OSPF
Configuration dialog box is displayed.
3. Create the OSPF process.
a. Click the OSPF Process tab.
b. Click
c.
NE 1
NE 2
NE 3
Process ID
Router ID
1.1.1.1
1.1.1.2
1.1.1.2
1.1.1.3
TE Router ID
VLAN:100-
VLAN:100-
VLAN:200-
VLAN:200-
(L3)
(L3)
(L3)
(L3)
Opaque Capability
Other parameters
settings
d. Click OK.
4. Configure the OSPF area.
a. Click the OSPF Area tab.
b. Click
c.
Configure parameters for the area. For the detailed settings, refer to NE 1 column
in Table 23-31.
23-26
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
NE 1
NE 2
NE 3
Process ID
Area Type
Backbone
Backbone
Stub
Stub
Area ID
0.0.0.0
0.0.0.0
0.0.0.1
0.0.0.1
Authentication Mode
Simple
Simple
Message
Message
Digest
Digest
Cost
Other parameters
settings
d. Click OK.
5. Configure OSPF interfaces.
a. In OSPF Area, click the Network tab.
b. Select the created OSPF entry. For the detailed settings, refer to Table 23-32.
Click
c.
NE 1
NE 2
NE 3
Area ID
0.0.0.0
0.0.0.0
0.0.0.1
0.0.0.1
IP
192.168.1.0
192.168.1.0
192.168.2.0
192.168.2.0
Wild Mask
0.0.0.255
0.0.0.255
0.0.0.255
0.0.0.255
d. Click OK.
6. Configure the OSPF route redistribution.
a. In OSPF Process, click the External Route Import Strategy tab.
b. Select the created OSPF entry. For the detailed settings, refer to NE 1 column in
Table 23-33. Click
is displayed.
c.
Configure external route import strategy parameters. For the detailed settings,
refer to NE 1 column in Table 23-33.
Table 23-33 Parameter Descriptions for External Route Import Strategy
Configuration
Parameter
NE 1
NE 2
Process ID
NE 3
2
23-27
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
NE 1
NE 2
NE 3
Protocol Type
Connected
Connected
Connected
Connected
Redistributed LSA
Redistributed LSA
Type 2
Type 2
Type 2
Type 2
Cost Type
External Route
External Route
External Route
External Route
Cost
d. Click OK.
7. (Optional) Configure the OSPF GR.
Note:
When the Graceful Restart function is enabled on the ZXCTN devices, one ZXCTN
device operates as the GR and the other ZXCTN device operates as the helper so
that data packets can be normally forwarded when the ZXCTN device is restarted.
a. Select the OSPF process entry. For the detailed settings, refer to Table 23-34.
Click
NE 1
NE 2
NE 3
Process ID
NSF
120
120
120
120
Time (s)
c.
Click OK.
Configure the OSPF authentication parameter of the layer 3 interface. For the
detailed settings, refer to NE 1 column in Table 23-35.
23-28
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
NE 1
NE 2
Area ID
0.0.0.0
0.0.0.0
0.0.0.1
0.0.0.1
Interface Name
VLAN:100-
VLAN:100-
VLAN:200-
VLAN:200-
(L3)
(L3)
(L3)
(L3)
Simple
Simple
Message
Message
Digest
Digest
Authentication Mode
NE 3
Simple Key
, 111
, 111
Message Digest
Key ID: 1
Key ID: 1
Key: 123
Key: 123
d. Click OK.
9. Repeat step 1 through step 8 to complete OSPF protocol configuration of NE 2 and
NE 3.
23.3 IS-IS
23.3.1 Overview of IS-IS
The working mechanism of IS-IS is similar to that of OSPF. In IS-IS, the network is divided
into areas and the equipment inside the areas can only manage the route information inside
the area to save the equipment cost. This feature enables IS-IS to satisfy the requirements
of large and middle networks.
Since the foundation of the IS-IS protocol is ConnectionLess Network Sevice (CLNS),
the ISO-defined Protocol Data Unit (PDU) is adopted by IS-IS in communication between
equipment. The types of PDUs applied in IS-IS include:
l
l
l
Call PDU
Link status PDU (LSP)
Sequence Num PDU (SNP)
Among them, the call PDU is similar to the HELLO packet in the OSPF protocol. It
establishes the neighbor relation between equipment, discovers new neighbors and
detects the quit of any neighbor.
The IS-IS enabled equipment exchanges route information through the LSPs, establishes
and maintains the link status database.
23-29
SJ-20110927150233-015|2012-08-29 (R1.2)
As shown in Figure 23-12, the IS-IS is run between the PE and P (that is, internal network
of the carrier) to exchange public network routes.
Figure 23-12 Public Network IS-IS Route Application
As shown in Figure 23-13, , the IS-IS is run between the PE and CE to exchange L3VPN
VRF routes.
Figure 23-13 Private Network IS-IS Route Application
23-30
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Steps
1. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog box is
displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > IS-IS Protocol Configuration. The IS-IS
Protocol Configuration dialog box is displayed.
3. Create an IS-IS process.
a. On the IS-IS Instance tab, click
displayed.
23-31
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Start IS-IS
System ID
Area address
For the parameters not listed in the following table, use the default settings.
c. Click OK.
4. Configure IS-IS interfaces.
a. On the IS-IS Instance tab, select a created IS-IS instance entry.
b. On the IS-IS Interface tab, click
displayed.
Parameter
Description
Interface name
Level
For the parameters not listed in the following table, use the default settings.
d. Click OK.
e. Refer to step b through step d to add other interfaces to the IS-IS instance.
5. Configure the route redistribution.
a. On the IS-IS Route redistribute tab, click
Creation dialog box is displayed.
23-32
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Description
Route protocol
Level
The level that the external routes are imported into the IS-IS
Metric(063)
The cost that the external routes are imported into the IS-IS
For the parameters not listed in the following table, use the default settings.
c. Click OK.
6. (Optional) Configure the IS-IS FRR.
a. On the IS-IS Instance tab, select the IS-IS instance entry to be modified, and click
. The IS-IS Instance Modification dialog box is displayed.
b. On the Basic Configuration tab, select the Fast reroute check box.
c. Click OK.
d. From the NE Operation navigation tree in the left pane, select OAM
Configuration > BFD Management > BFD Management.
The BFD
Management dialog box is displayed.
e. On the Interface BFD Management tab, Click
Management dialog box is displayed.
Table 23-39 Parameter Descriptions for IS-IS BFD Configurations of the Port
Parameter
Description
Interface Name
IS-IS Enable
Package Send
Interval (ms)
Package Receive
Interval (ms)
Multiplier
For the parameters not listed in the following table, use the default settings.
g. Click OK.
7. (Optional) Configure the IS-IS GR.
23-33
SJ-20110927150233-015|2012-08-29 (R1.2)
Note:
If the Graceful Restart (GR) function is enabled on the ZXCTN 6200/6300/6220
devices, one ZXCTN 6200/6300/6220 device operates as the GR and the other
ZXCTN 6200/6300/6220 device operates as the helper so that data messages can
be normally forwarded when the ZXCTN 6200/6300/6220 device is restarted.
a. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > IS-IS Protocol Configuration. The
IS-IS Protocol Configuration dialog box is displayed.
b. On the IS-IS Instance tab, select the IS-IS instance entry to be modified, and click
. The IS-IS Instance Modification dialog box is displayed.
c. In the GR area, configure the IS-IS GR. For a description of the parameters, refer
to Table 23-40.
Table 23-40 Parameter Descriptions for IS-IS GR Configuration
Parameter
Description
Enable
t2 timer interval
(565535s)
t3 timer configuration
mode
interval (165535s)
For the parameters not listed in the following table, use the default settings.
d. Click OK.
8. (Optional) Configure the ECMP of the IS-IS.
Note:
If there are several paths with the same cost to one destination, equivalence route
load sharing can be implemented to improve the link utilization ratio.
This configuration is used to set the maximum number of equivalence routes of
the OSPF protocol. The default of Maximum ECMP is 1, that is, the ECMP is not
supported. Up to eight equivalence routes can be supported.
The ECMP can be only used on the UNI side.
23-34
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
a. On the IS-IS Process tab, select the IS-IS instance entry to be modified, and click
. The IS-IS Instance Modification dialog box is displayed.
b. On the Advance Configuration tab, enter the maximum number of ECMP paths
in the ECMP max path (1-8) text box.
c. Click OK.
End of Steps
Configuration Requirement
Figure 23-15 shows the network topology of the IS-IS, where NE 1 is directly connected
to NE 2. A public network IS-IS process is configured on the NNI sides of NE 1 and NE 2.
Figure 23-15 Network Topology of IS-IS Configuration
Configuration Plan
Based on the configuration requirement, the service plan of the IS-IS is as follows:
l
l
l
For the IP address plan of the NEs in the network, refer to Table 23-41.
Table 23-41 Network Plan of IS-IS
NE
NE IP Address
Board
Slot
Port
Port IP
Port VLAN
Address
Loopback
Address
NE1
192.61.20.1
R1EXG
192.168.1.1
100
1.1.1.1
NE2
192.61.20.2
R1EXG
11
192.168.1.2
100
1.1.1.2
Configuration Procedure
1. On the Topology Management screen, right-click NE 1, and select NE Manager from
the shortcut menu. The NE Manager dialog box is displayed.
23-35
SJ-20110927150233-015|2012-08-29 (R1.2)
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > IS-IS Protocol Configuration. The IS-IS
Protocol Configuration dialog box is displayed.
3. Create the IS-IS process.
a. Click the IS-IS Instance tab, and click
box is displayed.
Configure IS-IS instance parameters of NE1. For the detailed settings, refer to NE
1 column in Table 23-42.
Table 23-42 Parameter Descriptions for the IS-IS Instance Configuration
Parameter
NE 1
NE 2
Start IS-IS
System ID
0010.0100.1001
0020.0200.2002
Area address
01
01
Other parameters
d. Click OK.
4. Configure the IS-IS interface.
a. Select the created IS-IS instance entry, and click the IS-IS Interface tab.
b. Click
c.
d. Configure IS-IS interface parameters of NE1. For the detailed settings, refer to
NE 1 column in Table 23-43.
Table 23-43 Parameter Descriptions for IS-IS Interface Configuration
Parameter
NE 1
NE 2
Interface Name
VLAN:100-(L3)
Level
level-1-2
level-1-2
Other
Loopback1
VLAN:100-(L3)
Loopback1
parameters
e. Click OK.
f.
Repeat step b through step e to add the other interface of NE 1 in the IS-IS
instance.
Chapter 23 Route
b. Click
c.
Configure route redistribution parameters of NE1. For the detailed settings, refer
to NE 1 column in Table 23-44.
Table 23-44 Parameter Descriptions for Route Redistribution Configuration
Parameter
NE 1
NE 2
Route protocol
connect
connect
Level
level-1-2
level-1-2
Metric(063)
Other parameters
d. Click OK.
6. (Optional) Configure the IS-IS GR.
Note:
When the Graceful Restart function is enabled on the ZXCTN devices, one ZXCTN
device operates as the GR and the other ZXCTN device operates as the helper so
that data packets can be normally forwarded when the ZXCTN device is restarted.
a. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > IS-IS Protocol Configuration. The
IS-IS Protocol Configuration dialog box is displayed.
b. Click the IS-IS Instance tab.
c.
NE 1
NE 2
Enable
60
60
manual
manual
interval (165535s)
10
10
e. Click OK.
7. Repeat step 1 through step 6 to configure IS-IS protocol parameters of NE 2.
23-37
SJ-20110927150233-015|2012-08-29 (R1.2)
23.4 BGP
23.4.1 BGP Overview
Border Gateway Protocol (BGP) is an inter-domain route protocol used to exchange
network accessibility information among the Autonomous Systems (ASs) running the
BGP protocol.
This information includes a list of ASs a route passing through and can form a diagram
expressing the AS connection status. This makes the AS-based route selection strategy
possible and solves problem of route loop.
BGP Neighbor
The equipment which established BGP session connection is called the peer or neighbor.
The peer has two connection modes: Interior Border Gateway Protocol (IBGP) and
External Border Gateway Protocol (EBGP).
l
l
If the two devices exchanging BGP packets are in the same AS, their connection mode
is IBGP.
If the two devices exchanging BGP packets are in different ASs, their connection mode
is EBGP.
Figure 23-16 shows the schematic diagram of IBGP and EBGP. The PE1 and PE2 are
EBGP neighbors, and the PE2 and PE3 are IBGP neighbors.
Figure 23-16 Diagram of IBGP and EBGP
23-38
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
BGP Attributes
For the BGP update messages on the destination network transmitted to the peer end by
the equipment, the BGP metric information is the attribute.
BGP attributes can be used to describe the specific route in details, so that the route can
be selected and filtered.
The attributes are divided into four types:
l
AS-path
Next-hop
Origin
Well-known discretionary attributes: This kind of attributes may not appear in route
description.
Local preference
Atomic aggregate
Optional transitive attributes: This kind of attributes are not required to support all
implementation of BGP. If supports, the current equipment transfers the packet to the
BGP neighbor; if not, it keeps transferring the packet to other equipment running BGP.
Aggregator
Community
Optional non-transitive attributes: The equipment not supporting the attribute shall be
deleted.
BGP attributes can be extended to 256 kinds yet not all attributes are necessarily applied.
Use the BGP attributes selectively as required.
Routes Advertise
BGP routes to be advertised shall be saved in the IGP routing table first. The injection of
IGP route information to the BGP is an update source of BGP routes and directly affects
the stability of the Internet routes.
There are two modes of pouring routes: dynamic pouring and static pouring. Dynamic
injection can be classified as fully dynamic injection and selective dynamic injection.
l
l
SJ-20110927150233-015|2012-08-29 (R1.2)
Route Confederation
Similar to the route reflector, the route confederation is to reduce the number of IBGP
neighbor connections established within the same AS.
Route confederation is to divide an AS into multiple sub-ASs. IBGP devices inside the AS
are affiliated to sub-ASs. IBGP is established inside the sub-AS and EBGP is established
between sub-ASs. For the external AS, sub-ASs are invisible.
Route Dampening
The BGP provides a route dampening mechanism to reduce network unstability caused
by route flap. During route flap, route update and withdraw messages are spread in
the network ceaselessly, which occupies large bandwidth and equipment processing
resources. This situation is adverse to the network and shall be avoided.
The principle of BGP route dampening is: A penalty 1000 is given each time the route flaps.
When the penalty value reaches a suppress-limit, dampening is advertised to the route.
After each half-life-time, the penalty value decreases geometrically. When the penalty
value reduces to the reuse-limit, route dampening is cancelled.
The following values are used in BGP route dampening:
l
l
l
l
Peer Group
The BGP peer group is used to achieve cluster management over BGP peers.
To add the peer to the unified peer group and configure its attributes uniformly can reduce
the work of peer configuration, simplify the configuration process, achieve classified
management on peers and improve the reliability and convenience of maintenance.
23-40
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Configuring
Configuring
Configuring
Configuring
Configuring
SJ-20110927150233-015|2012-08-29 (R1.2)
l
l
Steps
1. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog box is
displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > BGP Protocol Configuration. The BGP
Protocol Configuration dialog box is displayed.
3. Create a BGP instance.
a. On the BGP Instance area, click
displayed.
Description
AS ID
For the parameters not listed in the following table, use the default settings.
Note:
Each device can create only one BGP AS ID.
The devices belonging to the IBGP neighbor relation must have the same AS ID.
The devices belonging to the EBGP neighbor relation have different AS IDs.
c. Click OK.
4. Configure a BGP IPv4 neighbor.
a. On the BGP Address Family tab, select the route mode whose BGP neighbor is
to be added.
b. On the Neighbor Configuration tab, click
box is displayed.
c. Configure a BGP IPv4 neighbor. For a description of the parameters, refer to Table
23-47.
23-42
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Description
Neighbor type
Neighbor AS ID
session
For the parameters not listed in the following table, use the default settings.
d. Click OK.
5. Create a BGP VPNv4 address family.
a. On the BGP Instance tab, select the BGP instance whose address family is to be
configured.
b. On the BGP Address Family tab, click
dialog box is displayed.
Parameter
Description
Address Family
For the parameters not listed in the following table, use the default settings.
d. Click OK.
6. Configure a BGP VPNv4 neighbor.
Caution!
To configure the BGP VPNv4 neighbor, the BGP IPv4 neighbor must be configured
first.
23-43
SJ-20110927150233-015|2012-08-29 (R1.2)
a. On the BGP Address Family tab, select the VPNv4 mode whose BGP VPNv4
neighbor is to be added.
b. On the Neighbor Configuration tab, click
box is displayed.
Description
Neighbor type
For the parameters not listed in the following table, use the default settings.
d. Click OK.
7. Create a BGP VRF address family.
a. On the BGP Instance tab, select the BGP instance whose address family is to be
configured.
b. On the BGP Address Family tab, click
dialog box is displayed.
c. Configure a BGP VRF address family. For a description of the parameters, refer
to Table 23-50.
Table 23-50 Parameter Descriptions for the BGP VRF Address Family
Parameter
Description
Address Family
VRF ID
For the parameters not listed in the following table, use the default settings.
d. Click OK.
8. Configure the BGP VRF route redistribution.
a. On the BGP Address Family tab, select the IPv4 VRF mode whose route
redistribution is to be configured.
b. On the Route Import tab, click
displayed.
Chapter 23 Route
Table 23-51 Parameter Descriptions for the BGP VRF Route Redistribution
Configuration
Parameter
Description
Route redistribute
Protocol type
For the parameters not listed in the following table, use the default settings.
d. Click OK.
9. Configure a BGP VRF neighbor.
a. On the BGP Address Family tab, select the IPv4 VRF mode whose VRF neighbor
is to be configured.
b. On the Neighbor Configuration tab, click
box is displayed.
c. Configure a BGP VRF neighbor. For a description of the parameters, refer to Table
23-52.
Table 23-52 Parameter Descriptions for the BGP VRF Neighbor Configuration
Parameter
Description
Address Family
Neighbor AS ID
For the parameters not listed in the following table, use the default settings.
d. Click OK.
10. (Optional) Configure the BGP FRR.
a. On the BGP Address Family tab, select the IPv4 VRF mode whose BGP FRR
function is to be configured, and click
dialog box is displayed.
b. Configure the BGP FRR of the VRF. For a description of the parameters, refer to
Table 23-53.
Table 23-53 Parameter Descriptions for the BGP FRR of the VRF
Parameter
Description
Address Family
For the parameters not listed in the following table, use the default settings.
c. Click OK.
d. On the BGP Address Family tab, select the route mode whose BFD function is
to be configured.
23-45
SJ-20110927150233-015|2012-08-29 (R1.2)
f. On the Advanced Configuration tab, configure the BFD function of the neighbor.
For a description of the parameters, refer to Table 23-54.
Table 23-54 Parameter Descriptions for BFD Configuration of the BGP Neighbor
Parameter
Description
packet (ms)
packet (ms)
For the parameters not listed in the following table, use the default settings.
g. Click OK.
11. (Optional) Configure the BGP GR.
Note:
If the Graceful Restart (GR) function is enabled on the ZXCTN 6200/6300/6220
devices, one ZXCTN 6200/6300/6220 device operates as the GR and the other
ZXCTN 6200/6300/6220 device operates as the helper so that data messages can
be normally forwarded when the ZXCTN 6200/6300/6220 device is restarted.
a. On the BGP Instance tab, select the BGP instance to be modified, and click
The Modify BGP Instance dialog box is displayed.
b. Configure the BGP GR. For a description of the parameters, refer to Table 23-55.
Table 23-55 Parameter Descriptions for BGP GR Configuration
Parameter
Description
23-46
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Parameter
Description
For the parameters not listed in the following table, use the default settings.
c. Click OK.
End of Steps
Configuration Requirement
Figure 23-19 shows the network topology of the BGP, where division 1 of company A
communicates with division 2 through the network comprised of the ZXCTN devices.
Division 1 is directly connected to CE1, and division 2 is directly connected to CE2.
Figure 23-19 Network Topology of BGP Configuration
Configuration Plan
Based on the configuration requirement, the service plan of the BGP is as follows:
l
l
l
The AS IDs of NE 1 and NE 2 are AS100. The AS ID of CE1 is AS200, and the AS
ID of CE2 is AS300.
MP-IBGP is run between NE 1 and NE 2 to switch VPNv4 routes.
EBGP is run between NE 1 and CE 1, NE 2 and CE 2 to switch VRF routes.
For the IP address plan of the NEs in the network, refer to Table 23-56.
23-47
SJ-20110927150233-015|2012-08-29 (R1.2)
NE IP Address
Loopback
Board
Slot
Port
Port IP Address
Address
NE1
192.61.20.1
NE2
192.61.20.2
Port
VLAN
1.1.1.1
R1EXG
1.1.1.2
R1EXG
192.61.1.1
100
192.62.2.2
200
11
192.61.1.2
100
12
192.63.3.2
300
CE1
172.16.1.2
192.62.2.1
200
CE2
192.168.1.2
192.63.3.1
300
Configuration Procedure
Note:
Before the following configuration, the AS IDs of CE1 and CE2 have been created. The
AS ID of CE1 is AS200, and that of CE2 is AS300.
NE 1
NE 2
AS ID
100.0
100.0
Other parameters
Note:
Each device can create only one BGP AS ID.
c.
Click OK.
23-48
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Configure BGP IPv4 neighbor parameters of NE 1. For the detailed settings, refer
to NE 1 column in Table 23-58.
Table 23-58 Parameter Descriptions for the BGP IPv4 Neighbor Configuration
Parameter
NE 1
NE 2
Neighbor type
Neighbor
Neighbor
1.1.1.2
192.62.2.1
1.1.1.1
192.62.3.1
Neighbor AS ID
100.0
200.0
100.0
300.0
Activate
neighbor/peer group
Set TCP link port
Loopback
VLAN:200-
Loopback
VLAN:300-
1-(L3)
(L3)
1-(L3)
(L3)
Other parameters
d. Click OK.
e. Repeat step b through step d to configure attributes of the other neighbor of NE 1.
5. Create the BGP VPNv4 address family.
a. In BGP Instance, select the BGP instance that the address family requires to be
configured.
b. In BGP Address Family, click
displayed.
c.
Configure BGP address family parameters of NE 1. For the detailed settings, refer
to NE 1 column in Table 23-59.
Table 23-59 Parameter Descriptions for the BGP Address Family Configuration
Parameter
NE 1
NE 2
Address Family
VPNv4 Mode
VPNv4 Mode
23-49
SJ-20110927150233-015|2012-08-29 (R1.2)
Caution!
To configure the BGP VPNv4 neighbor, the BGP IPv4 neighbor must be configured
first.
a. In BGP Address Family, select the VPNv4 mode that BGP VPNv4 neighbor
requires to be added.
b. Click the Neighbor Configuration tab, and then click
Neighbor dialog box is displayed.
c.
NE 1
NE 2
Neighbor type
Neighbor
Neighbor
1.1.1.2
1.1.1.1
Other parameters
d. Click OK.
7. Create the BGP VRF address family.
a. In BGP Instance, select the BGP instance that the address family requires to be
configured.
b. In BGP Address Family, click
displayed.
c.
Configure BGP VRF address family parameters of NE 1. For the detailed settings,
refer to NE 1 column in Table 23-61.
Table 23-61 Parameter Descriptions for the BGP VRF Address Family
Parameter
NE 1
NE 2
Address Family
VRF ID
100
100
Other parameters
d. Click OK.
8. Configure the BGP VRF route redistribution.
a. In BGP Address Family, select the IPv4 VRF mode that the route redistribution
requires to be configured.
23-50
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
NE 1
NE 2
Route redistribute
Protocol type
Connected
Connected
Other parameters
d. Click OK.
9. Configure the BGP VRF neighbor.
a. In BGP Address Family, select the IPv4 VRF mode that the VRF neighbor
requires to be configured.
b. Click the Neighbor Configuration tab, and then click
Neighbor dialog box is displayed.
c.
Configure BGP VRF neighbor parameters of NE 1. For the detailed settings, refer
to NE 1 column in Table 23-63.
Table 23-63 Parameter Descriptions for the BGP VRF Neighbor Configuration
Parameter
NE 1
NE 2
Address Family
Neighbor AS ID
200.0
300.0
Other parameters
d. Click OK.
10. (Optional) Configure the BGP FRR.
a. In BGP Address Family, select the IPv4 VRF mode that the BGP FRR function
requires to be configured.
b. Click
c.
Configure BGP FRR parameters of the VRF of NE 1. For the detailed settings,
refer to NE 1 column in Table 23-64.
Table 23-64 Parameter Descriptions for the BGP FRR of the VRF
Parameter
NE 1
NE 2
Address Family
23-51
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
NE 1
NE 2
Other parameters
NE 1
NE 2
packet (ms)
Minimum interval of receiving
packet (ms)
Check timeout multiplier
i.
Click OK.
Note:
When the Graceful Restart function is enabled on the ZXCTN devices, one ZXCTN
device operates as the GR and the other ZXCTN device operates as the helper so
that data packets can be normally forwarded when the ZXCTN device is restarted.
NE 1
NE 2
23-52
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Parameter
NE 1
NE 2
360
360
120
120
d. Click OK.
12. Repeat step 1 through step 11 to configure BGP parameters of NE 2.
For the AS of huge network, to reduce the complexity, select one from IBGP devices as
the RR. All other IBGP devices function as its client and are only counterparts to the RR.
Multiple RRs are counterparts of each other.
The clients are IBGP neighbors fully-connected with the route reflector. They form a group.
Other IBGP neighbors of the route reflector not belonging to the group are non-client. All
clients can reflect routes through the RR and the number of neighbors drops to n-1.
When receiving a route, the RR reflects it according to different peer types.
l
l
l
If the update message comes from the EBGP neighbor, the RR reflects it to all
non-clients and clients.
If the update message comes from the non-client, the RR only reflects it to the client.
If the update message comes from the RRC, the RR reflects it to all clients and
non-clients except the originator of the route.
If there are multiple RRs inside the AS, they can be classified as a cluster. An AS can have
multiple clusters and one cluster shall contain no less than one RR.
and Client. Route information is transmit between the RR and Client. It is not necessary
to create the BGP connection between the Clients.
Figure 23-20 BGP Router Reflector Application
Chapter 23 Route
l
l
l
Steps
1. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog box is
displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > BGP Protocol Configuration. The BGP
Protocol Configuration dialog box is displayed.
3. Create a BGP instance.
a. On the BGP Instance tab, click
displayed.
Description
AS ID
For the parameters not listed in the following table, use the default settings.
c. Click OK.
4. Refer to step 1 through step 3 to configure BGP instances of other NEs forming the
cluster.
5. Configure the BGP IPv4 neighbor of the reflector.
a. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog
box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > BGP Protocol Configuration. The
BGP Protocol Configuration dialog box is displayed.
c. On the BGP Address Family tab, select the route mode that the BGP neighbor
requires to be added.
d. On the Neighbor Configuration tab, click
box is displayed.
23-55
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
Neighbor type
Neighbor AS ID
neighbor/peer group
For the parameters not listed in the following table, use the default settings.
f. Refer to step d through step e to configure other IPv4 neighbor attributes of the
reflector NE.
g. Click OK.
6. Configure the BGP VPNv4 neighbor of the client.
a. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog
box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > Route Management > BGP Protocol Configuration. The
BGP Protocol Configuration dialog box is displayed.
c. On the BGP Address Family tab, select the VPNv4 mode that the BGP neighbor
requires to be added.
d. On the Neighbor Configuration tab, click
box is displayed.
Table 23-69 Parameter Descriptions for the BGP VPNv4 Neighbor Configuration
of the Client End
Parameter
Description
Neighbor type
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
Parameter
Description
Neighbor AS ID
session
For the parameters not listed in the following table, use the default settings.
f. Click OK.
End of Steps
Configuration Requirement
Figure 23-22 shows the network topology of the BGP route reflector, where CE1
communicates with CE2 through the network comprised of the ZXCTN devices. The
IBGP is run between NE 1, NE 2, and NE 3, and there is no full connection. To break
the rule that the IBGP must be full connection, configure the route reflector to make NE3
forward the route received by the IBGP neighbor to another IBGP neighbor.
Figure 23-22 Network Topology of BGP Route Reflector Configuration
23-57
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Plan
Based on the configuration requirement, the service plan of the BGP route reflector is as
follows:
l
l
For the IP address plan of the NEs in the network, refer to Table 23-70.
Table 23-70 Network Plan of the BGP Route Reflector
NE
NE1
NE2
NE3
NE IP
Loopback
Address
Address
192.61.20.1
8.1.1.1
192.61.20.2
192.61.20.3
8.1.1.2
8.1.1.3
Board
Slot
Port
Port IP
Port VLAN
Address
R1EXG
192.168.1.1
100
R1EXG
192.168.3.1
300
R1EXG
192.168.2.1
200
R1EXG
192.168.4.1
400
R1EXG
11
192.168.1.2
100
R1EXG
12
192.168.2.2
200
CE1
172.16.1.2
192.168.3.2
300
CE2
192.16.1.2
192.168.4.2
400
Configuration Procedure
Note:
Before the following configuration, the AS IDs of CE1 and CE2 have been created. The
AS ID of CE1 is AS200, and that of CE2 is AS300.
NE 1
NE 2
NE 3
AS ID
100.0
100.0
100.0
23-58
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 23 Route
c.
Parameter
NE 1
NE 2
NE 3
Other parameters
settings
settings
settings
Click OK.
In BGP Address Family, select the route mode that the BGP neighbor requires
to be added.
e. Configure BGP IPv4 neighbor parameters of NE 3. For the detailed settings, refer
to Table 23-72.
Table 23-72 Parameter Descriptions for BGP IPv4 Neighbor Configuration of
the Reflector (NE3)
Parameter
Value
Neighbor type
Neighbor
Neighbor
8.1.1.1
8.1.1.2
Neighbor AS ID
100.0
100.0
neighbor/peer group
Other parameters
f.
Click OK.
In BGP Address Family, select the VPNv4 mode that BGP VPNv4 neighbor
requires to be added.
23-59
SJ-20110927150233-015|2012-08-29 (R1.2)
NE 1
NE 2
Neighbor type
Neighbor
Neighbor
8.1.1.3
192.168.3.2
8.1.1.3
192.168.4.2
Neighbor AS ID
100.0
200.0
100.0
300.0
Activate neighbor/peer
group
f.
Loopback
VLAN:200-
Loopback
VLAN:300-
BGP session
1-(L3)
(L3)
1-(L3)
(L3)
Other parameters
Click OK.
23-60
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 24
MPLS
Table of Contents
LDP..........................................................................................................................24-1
RSVP-TE .................................................................................................................24-6
24.1 LDP
24.1.1 LDP Overview
Multi Protocol Label Switching (MPLS) applies the simplified Asynchronous Transfer Mode
(ATM) to complete the layer 2 and layer 3 conversion.
Label Distribution Protocol (LDP) is based on the MPLS. It distributes a label for every IP
data packet and encapsulates the label and IP data packet into the MPLS data packet.
The MPLS data packet determines the forwarding route and sequence according to the
label value.
24-1
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog box is
displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > MPLS Management > LDP Configuration.
The LDP
Configuration dialog box is displayed.
3. Perform the LDP global configuration.
a. On the LDP NE Configuration Management tab, perform the LDP global
configuration. For a description of the parameters, refer to Table 24-1.
Table 24-1 Parameter Descriptions for LDP Global Configuration
Parameter
Description
LDP State
24-2
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 24 MPLS
Parameter
Description
Router ID
For the parameters not listed in the following table, use the default settings.
b. Click
to distribute the configurations.
displayed.
c. Click OK.
4. Configure an LDP interface.
a. On the LDP Interface Configuration tab, click
configuration entry.
Description
Interface Name
LDP State
For the parameters not listed in the following table, use the default settings.
c. Click
d. Click OK.
5. (Optional) Configure LDP non-direct-connect neighbors.
a. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog
box is displayed.
b. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > MPLS Management > LDP Configuration.
The LDP
Configuration dialog box is displayed.
c. On the LDP Target Session Configuration tab, click
non-direct-connect neighbor entry.
to add a
24-3
SJ-20110927150233-015|2012-08-29 (R1.2)
Description
End of Steps
Configuration Requirement
Figure 24-3 shows the network topology of the LDP, where NE 1, NE 2, and NE 3
communicate with each other through the LDP. The remote session is performed between
NE 1 and NE 3 through the LDP.
Figure 24-3 Network Topology of LDP Configuration
Configuration Plan
Based on the configuration requirement, the service plan of the LDP is as follows:
l
l
For the IP address plan of the NEs in the network, refer to Table 24-4.
24-4
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 24 MPLS
NE IP
Loopback
Address
Port
NE1
192.61.20.1
1.1.1.1
R1EXG
192.168.1.1
100
NE2
192.61.20.2
1.1.1.2
R1EXG
11
192.168.1.2
100
12
192.168.2.1
200
192.168.2.2
200
NE3
192.61.20.3
1.1.1.3
Board
Slot
Port
Port IP
Port VLAN
Address
R1EXG
Configuration Procedure
1. On the Topology Management screen, right-click NE 1, and select NE Manager from
the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > MPLS Management > LDP Configuration.
The LDP
Configuration dialog box is displayed.
3. Configure LDP global parameters.
a. In LDP NE Configuration Management, configure LDP global parameters. For
the detailed settings, refer to NE 1 column in Table 24-5.
Table 24-5 Parameter Descriptions for LDP Global Configuration
Parameter
NE 1
NE 2
NE 3
LDP State
Enable
Enable
Enable
Enable
Router ID
VLAN:100-(L3)
VLAN:200-(L3)
VLAN:200-(L3)
VLAN:200-(L3)
Graceful Restart
Disable
Disable
Disable
Disable
State
Other
Default configurations
parameters
b. Click
c.
NE 1
NE 2
Interface Name
VLAN:100-(L3)
VLAN:100-(L3)
NE 3
VLAN:200-(L3)
VLAN:200-(L3)
24-5
SJ-20110927150233-015|2012-08-29 (R1.2)
Parameter
NE 1
NE 2
LDP State
Enable
Enable
Other
Default configurations
NE 3
Enable
Enable
parameters
d. Click
d. Click
e. Configure the IP address of the LDP non-direct-connect neighbor. For the detailed
settings, refer to NE 1 column in Table 24-7.
Table 24-7 Descriptions for the IP Address of the LDP Non-direct-connect
Neighbor Configuration
f.
Parameter
NE 1
NE 3
1.1.1.3
1.1.1.1
24.2 RSVP-TE
24.2.1 RSVP-TE Overview
Resource ReSerVation Protocol - Traffic Engineering (RSVP-TE) is a kind of resource
reserved protocol designed for network services. The user can request from the network
through the RSVP to meet the requirements for buffer and bandwidth.
The immediate nodes in the network applies the RSVP to reserve resource for data
transmission path and maintain the data transmission path to implement the service
quality.
24-6
SJ-20110927150233-015|2012-08-29 (R1.2)
Chapter 24 MPLS
24-7
SJ-20110927150233-015|2012-08-29 (R1.2)
Steps
1. In the Topology Management window, right-click the NE to be configured, and
select NE Management from the shortcut menu. The NE Management dialog box is
displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > MPLS Management > RSVP-TE Configuration. The RSVP-TE
Configuration dialog box is displayed
3. Perform the RSVP global configuration.
a. On the RSVP Global Configuration tab, perform the RSVP global configuration.
For a description of the parameters, refer to Table 24-8.
Table 24-8 Parameter Descriptions for RSVP Global Configuration
Parameter
Description
MPLS-TE
For the parameters not listed in the following table, use the default settings.
b. Click
to distribute the configurations.
displayed.
c. Click OK.
4. Configure an RSVP interface.
a. On the RSVP-TE Interface Configuration tab, click
Interface dialog box is displayed.
Description
The name of the interface on which the RSVP-TE
protocol is operating
For the parameters not listed in the following table, use the default settings.
Chapter 24 MPLS
Parameter
Description
Enable GR
For the parameters not listed in the following table, use the default settings.
c. Click OK.
6. (Optional) Configure the RSVP-TE authentication.
a. On the RSVP-TE Interface Configuration tab, select the RSVP-TE interface
whose authentication is to be configured, and click
Interface dialog box is displayed.
Parameter
Description
Enable TE Authentication
Authentication Key
Authentication Type
For the parameters not listed in the following table, use the default settings.
c. Click OK.
End of Steps
Configuration Requirement
Figure 24-6 shows the network topology of the RSVP-TE, where NE 1 communicates with
NE 2 through the RSVP-TE protocol.
24-9
SJ-20110927150233-015|2012-08-29 (R1.2)
Configuration Plan
For the IP address plan of the NEs in the network, refer to Table 24-12.
Table 24-12 Network Plan of RSVP-TE
NE
NE IP
Loopback
Board
Slot
Port
Port IP Address
Port VLAN
Address
Port
NE1
192.61.20.1
1.1.1.1
R1EXG
192.168.1.1
100
NE2
192.61.20.2
1.1.1.2
R1EXG
192.168.1.2
100
Configuration Procedure
1. On the Topology Management screen, right-click NE 1, and select NE Manager from
the shortcut menu. The NE Manager dialog box is displayed.
2. From the NE Operation navigation tree in the left pane, select Protocol
Configuration > MPLS Management > RSVP-TE Configuration. The RSVP-TE
Configuration dialog box is displayed
3. Configure the RSVP global attributes.
a. In RSVP Global Configuration, configure the RSVP global attributes. For the
detailed settings, refer to NE 1 column in Table 24-13.
Table 24-13 Parameter Descriptions for RSVP Global Configuration
Parameter
NE 1
NE 2
MPLS-TE
Enable
Enable
Other parameters
b. Click
c.
Chapter 24 MPLS
c.
Parameter
NE 1
NE 2
Port Name
VLAN:100-(L3)
VLAN:100-(L3)
Other parameters
c.
Parameter
NE 1
NE 2
Enable GR
Enable
Enable
Other parameters
Click OK.
NE 1
NE 2
Enable TE Authentication
Enable
Enable
Authentication Key
RSVP-AUTH
RSVP-AUTH
Authentication Type
MD5
MD5
Other parameters
d. Click OK.
24-11
SJ-20110927150233-015|2012-08-29 (R1.2)
24-12
SJ-20110927150233-015|2012-08-29 (R1.2)
Figures
Figure 1-1 Working Process of the IEEE 1588 V2 Clock ........................................... 1-3
Figure 1-2 Working Process of Master Slave Synchronization................................... 1-4
Figure 1-3 Application Scenario of the PTP Clock ..................................................... 1-5
Figure 1-4 Application Scenario of the PTP Clock in Traversing a Third-Party
Network .................................................................................................. 1-6
Figure 1-5 PTP Clock Configuration Flow ................................................................. 1-7
Figure 1-6 Network Topology of PTP Clock............................................................. 1-14
Figure 2-1 Implementation of In-Band DCN .............................................................. 2-2
Figure 2-2 Implementation of Out-of-Band DCN........................................................ 2-2
Figure 2-3 Application Scenario of the In-Band DCN Network Architecture ............... 2-3
Figure 2-4 Application Scenario of the Out-of-Band DCN Network
Architecture ............................................................................................ 2-4
Figure 2-5 DCN Configuration Flow .......................................................................... 2-5
Figure 2-6
I
SJ-20110927150233-015|2012-08-29 (R1.2)
II
SJ-20110927150233-015|2012-08-29 (R1.2)
Figures
III
SJ-20110927150233-015|2012-08-29 (R1.2)
IV
SJ-20110927150233-015|2012-08-29 (R1.2)
Tables
Table 1-1 Functions of the Protocol Messages .......................................................... 1-2
Table 1-2 Parameter Descriptions for GPS Clock Configuration ............................... 1-8
Table 1-3 Parameter Descriptions for PTP Time Node Configuration ....................... 1-9
Table 1-4 Parameter Descriptions for PTP Time Domain Configuration................... 1-11
Table 1-5 Parameter Descriptions for PTP Time Port Configuration ........................ 1-12
Table 1-6 Network Plan of PTP Clock .................................................................... 1-15
Table 1-7 GPS Clock Configuration of NE 1 ............................................................ 1-15
Table 1-8 PTP Time Node Configuration of NE 1 .................................................... 1-16
Table 1-9 PTP Time Domain Configuration of NE 1................................................. 1-16
Table 1-10 PTP Time Port Configuration of NE 1 ................................................... 1-17
Table 1-11 PTP Clock Configuration of NE 2 ........................................................... 1-17
Table 1-12 PTP Clock Configuration of NE 3/NE 4 .................................................. 1-18
Table 1-13 PTP Clock Configuration of NE 5/NE 6 .................................................. 1-19
Table 1-14 GPS Clock Configuration of NE 5/NE 6 ................................................ 1-19
Table 2-1 Parameter Descriptions for IP Address Configuration of the DCN Qx
Port.......................................................................................................... 2-7
Table 2-2 NE 1 Configuration .................................................................................... 2-9
Table 2-3 Management IP Address Configuration of the DCN of NE 1 ................... 2-10
Table 2-4 IP Address Configuration of the DCN Qx Port of NE 1 ............................. 2-10
Table 2-5 NE 2 Configuration .................................................................................. 2-10
Table 2-6 Management IP Configuration ................................................................. 2-11
Table 3-1 Parameter Descriptions for ACL Rule Configuration ................................. 3-6
Table 3-2 Parameter Descriptions for ACL Rule Group Configuration ..................... 3-10
Table 3-3 Parameter Descriptions for Port ACL Configuration ................................ 3-10
Table 3-4 Parameter Descriptions for Access Rate Control Configuration .............. 3-10
Table 3-5 Parameter Descriptions for Priority Marking Configuration ...................... 3-11
Table 3-6 Parameter Descriptions for DS Domain Configuration ............................ 3-13
Table 3-7 Parameter Descriptions for DS Domain Application ................................ 3-14
Table 3-8 Parameter Descriptions for Port Traffic Control Configuration ................. 3-15
Table 3-9 Parameter Descriptions for Complex Stream Category Configuration
.............................................................................................................. 3-17
Table 3-10 Parameter Descriptions for Discard Policy Configuration ...................... 3-18
V
SJ-20110927150233-015|2012-08-29 (R1.2)
Table 3-11 Parameter Descriptions for Stream Queue Configuration ...................... 3-19
Table 3-12 Parameter Descriptions for Stream Queue Application Configuration
.............................................................................................................. 3-20
Table 3-13 Network Plan of QoS ............................................................................ 3-21
Table 3-14 ACL Rule Configuration of NE 1 ............................................................ 3-21
Table 3-15 ACL Rule Group Configuration of NE 1 ................................................. 3-22
Table 3-16 Port ACL Configuration of NE 1 ............................................................. 3-22
Table 3-17 Access Rate Control Configuration of NE 1 ........................................... 3-22
Table 3-18 Priority Marking Configuration of NE 1 ................................................... 3-23
Table 3-19 DS Domain Configuration of NE 2 ........................................................ 3-23
Table 3-20 DS Domain Application of NE 2 ............................................................. 3-24
Table 3-21 Discard Policy Configuration of NE 3 ..................................................... 3-24
Table 3-22 Stream Queue Configuration of NE 3 .................................................... 3-25
Table 3-23 Stream Queue Application Configuration of NE 3 .................................. 3-25
Table 4-1 Parameter Descriptions for IGMP Snooping Global Configuration ............ 4-4
Table 4-2 Parameter Descriptions for Basic IGMP Snooping Configuration .............. 4-5
Table 4-3 Parameter Descriptions for Static Multicast Group Configuration .............. 4-6
Table 4-4 Network Plan of IGMP Snooping ............................................................... 4-8
Table 4-5 Global IGMP Snooping Configuration ....................................................... 4-8
Table 4-6 IGMP Snooping Configuration .................................................................. 4-9
Table 5-1 Parameter Descriptions for Advanced Configuration of Link Aggregation
Group ...................................................................................................... 5-6
Table 5-2 Network Plan of LAG ................................................................................ 5-9
Table 5-3 Basic Property Configuration of Ethernet Port (Load Balancing Mode)
.............................................................................................................. 5-10
Table 5-4 Advanced Configuration of Link Aggregation Group 1 (Load Balancing
Mode) ................................................................................................... 5-11
Table 5-5 LACP Configuration (Load Balancing Mode) ........................................... 5-11
Table 6-1 Parameter Descriptions for Basic Configuration of Port ............................ 6-5
Table 6-2 Parameter Descriptions for Advanced Configuration of Link Aggregation
Group ...................................................................................................... 6-5
Table 6-3 Parameter Descriptions for Port Master/Slave Property Configuration
................................................................................................................ 6-6
Table 6-4 Parameter Descriptions for LACP Property Configuration (Master/Slave
Mode) ..................................................................................................... 6-7
Table 6-5 Parameter Descriptions for LACP Property Configuration
(Load-Balancing Mode) ............................................................................ 6-7
VI
SJ-20110927150233-015|2012-08-29 (R1.2)
Tables
Tables
Table 11-8 Parameter Descriptions for LBM Link Monitoring Configuration.............. 11-9
Table 11-9 Network Plan of CFM............................................................................11-11
Table 11-10 MD Configuration............................................................................... 11-12
Table 11-11 MA Configuration ............................................................................... 11-13
Table 11-12 MEP Configuration............................................................................. 11-13
Table 11-13 RMEP Configuration .......................................................................... 11-14
Table 11-14 MIP Configuration of NE 2 ................................................................ 11-15
Table 11-15 LTM Link Monitoring Configuration..................................................... 11-15
Table 11-16 LBM Link Monitoring Configuration .................................................... 11-16
Table 12-1 TPS Protection Configuration Menu on the EMS ................................... 12-3
Table 12-2 Parameter Descriptions of Tunnel Creation in End-to-End Mode ........... 12-4
Table 12-3 Parameter Descriptions of PW Creation in End-to-End Mode ................ 12-4
Table 12-4 Network Plan of TPS Protection ........................................................... 12-7
Table 12-5 Parameter Description of Tunnel Creation in End-to-End Mode ............. 12-7
Table 12-6 Parameter Description of PW Creation in End-to-End Mode .................. 12-7
Table 12-7 Parameter Description of E1 Service Creation in End-to-End
Mode ..................................................................................................... 12-8
Table 13-1 Network Plan of MSP ............................................................................ 13-7
Table 14-1 Descriptions for Tunnel Modes ............................................................. 14-4
Table 14-2 Parameter Descriptions for Tunnel Configuration .................................. 14-5
Table 14-3 Parameter Descriptions for OAM Configuration .................................... 14-5
Table 14-4 Parameter Descriptions for TNP Configuration ..................................... 14-6
Table 14-5 Route Constraint Configuration ............................................................. 14-7
Table 14-6 Network Plan of Linear Protection ......................................................... 14-9
Table 14-7 Tunnel Configuration ............................................................................. 14-9
Table 14-8 OAM Configuration ............................................................................. 14-10
Table 14-9 TNP Configuration ............................................................................... 14-10
Table 14-10 Route Constraint Configuration ......................................................... 14-11
Table 15-1 Parameter Descriptions for Tunnel Configuration................................... 15-5
Table 15-2 Parameter Descriptions for PW Configuration ....................................... 15-5
Table 15-3 Parameter Descriptions for Tunnel Binding Configuration ..................... 15-6
Table 15-4 Parameter Descriptions for Active Ethernet Service Configuration
.............................................................................................................. 15-6
Table 15-5 Parameter Descriptions for Service Point Configuration ........................ 15-7
Table 15-6 Parameter Descriptions for TNP Configuration ..................................... 15-7
Table 15-7 Parameter Descriptions for Working Service OAM Configuration ........... 15-8
IX
SJ-20110927150233-015|2012-08-29 (R1.2)
Tables
XI
SJ-20110927150233-015|2012-08-29 (R1.2)
Tables
Table 23-7 Parameter Descriptions for OSPF Area Configuration ......................... 23-12
Table 23-8 Parameter Descriptions for Network Configuration .............................. 23-12
Table 23-9 Parameter Descriptions for External Route Import Strategy
Configuration ....................................................................................... 23-13
Table 23-10 Parameter Descriptions for OSPF GR Configuration.......................... 23-14
Table 23-11 Parameter Descriptions for Stub Area Configuration .......................... 23-14
Table 23-12 Parameter Descriptions for NSSA Area Configuration ....................... 23-14
Table 23-13 Parameter Descriptions for Message Digest Authentication
Configuration ....................................................................................... 23-16
Table 23-14 Parameter Descriptions for BFD Configuration of the OSPF
Process................................................................................................ 23-16
Table 23-15 Parameter Descriptions for BFD Configurations of the Port ............... 23-17
Table 23-16 Network Plan of the OSPF Single Area ............................................. 23-18
Table 23-17 Parameter Descriptions for the OSPF Process Configuration ............ 23-19
Table 23-18 Parameter Descriptions for OSPF Area Configuration ...................... 23-19
Table 23-19 Parameter Descriptions for Network Configuration ............................ 23-19
Table 23-20
Table 23-26 Descriptions for External Route Import Strategy Configuration ........... 23-23
Table 23-27 Parameter Descriptions for GR Attribute Configuration ...................... 23-24
Table 23-28 Parameter Descriptions for Layer 3 Interface OSPF Authentication
Configuration ....................................................................................... 23-24
Table 23-29 Network Plan of the Stub Area .......................................................... 23-26
Table 23-30
Table 23-31 Parameter Descriptions for OSPF Area Configuration ....................... 23-27
Table 23-32 Parameter Descriptions for Network Configuration ............................ 23-27
Table 23-33 Parameter Descriptions for External Route Import Strategy
Configuration ....................................................................................... 23-27
Table 23-34 Parameter Descriptions for GR Attribute Configuration ...................... 23-28
Table 23-35 Parameter Descriptions for Layer 3 Interface OSPF Authentication
Configuration ....................................................................................... 23-29
Table 23-36 Parameter Descriptions for IS-IS Instance Configuration ................... 23-32
Table 23-37 Parameter Descriptions for IS-IS Interface Configuration ................... 23-32
Table 23-38 Parameter Descriptions for Route Redistribution Configuration ........... 23-33
Table 23-39 Parameter Descriptions for IS-IS BFD Configurations of the Port
............................................................................................................ 23-33
Table 23-40 Parameter Descriptions for IS-IS GR Configuration ........................... 23-34
Table 23-41 Network Plan of IS-IS ....................................................................... 23-35
Table 23-42 Parameter Descriptions for the IS-IS Instance Configuration.............. 23-36
Table 23-43 Parameter Descriptions for IS-IS Interface Configuration ................... 23-36
Table 23-44 Parameter Descriptions for Route Redistribution Configuration ........... 23-37
Table 23-45 Parameter Descriptions for GR Configuration .................................... 23-37
Table 23-46 Parameter Descriptions for BGP Instance Configuration.................... 23-42
Table 23-47
Table 23-48 Parameter Descriptions for BGP Address Family Configuration ........... 23-43
Table 23-49 Parameter Descriptions for BGP VPNv4 Neighbor
Configuration ....................................................................................... 23-44
Table 23-50 Parameter Descriptions for the BGP VRF Address Family................. 23-44
Table 23-51 Parameter Descriptions for the BGP VRF Route Redistribution
Configuration ....................................................................................... 23-45
Table 23-52 Parameter Descriptions for the BGP VRF Neighbor
Configuration ....................................................................................... 23-45
Table 23-53
Parameter Descriptions for the BGP FRR of the VRF ....................... 23-45
Table 23-54
SJ-20110927150233-015|2012-08-29 (R1.2)
Tables
Table 24-8
Table 24-9 Parameter Descriptions for RSVP Port Configuration ............................ 24-8
Table 24-10 Parameter Descriptions for GR Configuration ...................................... 24-9
Table 24-11 Parameter Descriptions for RSVP-TE Authentication
Configuration ......................................................................................... 24-9
Table 24-12 Network Plan of RSVP-TE ................................................................ 24-10
Table 24-13 Parameter Descriptions for RSVP Global Configuration..................... 24-10
Table 24-14 Parameter Descriptions for RSVP Interface Configuration ................. 24-11
Table 24-15 Parameter Descriptions for GR Configuration .................................... 24-11
Table 24-16 Parameter Descriptions for RSVP-TE Authentication
Configuration ....................................................................................... 24-11
XVI
SJ-20110927150233-015|2012-08-29 (R1.2)
Glossary
ABR
- Area Border Router
ACL
- Access Control List
AF
- Assured Forwarding
AIS
- Alarm Indication Signal
APS
- Automatic Protection Switching
AS
- Autonomous System
ASBR
- Autonomous System Boundary Router
ATM
- Asynchronous Transfer Mode
BC
- Boundary Clock
BE
- Best Effort
BGP
- Border Gateway Protocol
BMC
- Best Master Clock
BSC
- Base Station Controller
BTS
- Base Transceiver Station
CAR
- Committed Access Rate
CBS
- Committed Burst Size
CC
- Continuity Check
XVII
SJ-20110927150233-015|2012-08-29 (R1.2)
CC
- Connectivity Check
CCM
- Continuity Check Message
CE
- Customer Edge
CES
- Circuit Emulation Service
CFM
- Connectivity Fault Management
CIDR
- Classless Inter-Domain Routing
CIR
- Committed Information Rate
CLNS
- ConnectionLess Network Sevice
CS
- Circuit Service
CV
- Connectivity Verification
DCN
- Data Communications Network
DM
- Delay Measurement
DR
- Designated Router
DS
- Differentiated Service
DSCP
- Differentiated Services Code Point
DTE
- Data Terminal Equipment
DWRR
- Deficit Weighted Round Robin
EBGP
- External Border Gateway Protocol
EF
- Expedited Forwarding
XVIII
SJ-20110927150233-015|2012-08-29 (R1.2)
Glossary
EFM
- Ethernet in the First Mile
EPD
- Early Packet Discard
EVPL
- Ethernet Virtual Private Line
EVPLAN
- Ethernet Virtual Private LAN
EVPTREE
- Ethernet Virtual Private Tree
EXP
- Experimental Overhead
EXP
- Experimental
FE
- Fast Ethernet
FRR
- Fast Reroute
GE
- Gigabit Ethernet
GMC
- Grandmaster Clock
GPS
- Global Positioning System
GR
- Graceful Restart
H-QoS
- Hierarchical-QoS
HSB
- Hot Standby
IBGP
- Interior Border Gateway Protocol
ICMP
- Internet Control Message Protocol
IEEE
- Institute of Electrical and Electronics Engineers
IETF
- Internet Engineering Task Force
XIX
SJ-20110927150233-015|2012-08-29 (R1.2)
IGMP
- Internet Group Management Protocol
IGP
- Interior Gateway Protocol
IS-IS
- Intermediate System-to-Intermediate System
LACP
- Link Aggregation Control Protocol
LACPDU
- Link Aggregation Control Protocol Data Unit
LAG
- Link Aggregation Group
LB
- Loopback
LBM
- Loopback Message
LCK
- Locked
LCP
- Link Control Protocol
LDP
- Label Distribution Protocol
LM
- Loss Measurement
LOC
- Loss Of Connectivity
LOF
- Loss Of Frame
LOS
- Loss Of Signal
LSA
- Link State Advertisement
LSP
- Label Switched Path
LSP
- Link State Packet
LT
- Link Trace
XX
SJ-20110927150233-015|2012-08-29 (R1.2)
Glossary
LTE
LTM
- Link Trace Message
LTR
- Link Trace Reply
MA
- Maintenance Association
MAC
- Medium Access Control
MC-LAG
- Multi-Chassis Link Aggregation Group
MCC
- Management Communication Channel
MD
- Maintenance Domain
ME
- Mobile Equipment
MEG
- Maintenance Entity Group
MEP
- MEG End Point
MEP
- Maintenance association End Point
MEP
- Maintenance End Point
MIB
- Management Information Base
MIP
- MEG Intermediate Point
MIP
- Maintenance domain Intermediate Point
ML-PPP
- Multilink-Point to Point Protocol
MP
- Maintenance Point
MP
- Merge Point
XXI
SJ-20110927150233-015|2012-08-29 (R1.2)
MP-IBGP
- Multi-Protocol internal Border Gateway Protocol
MPLS
- Multiprotocol Label Switching
MPLS-TE
- Multi-Protocol Label Switching-TE
MPLS-TP
- Multi-Protocol Label Switching Transport Profile
MS
- Multiplex Section
MS-AIS
- Multiplex Section - Alarm Indication Signal
MS-EXC
- Multiplex Section - Excessive Bit Error Ratio
MSP
- Multiplex Section Protection
MSTP
- Multi-Service Transport Platform
NMS
- Network element Management System
NNI
- Network Node Interface
NSSA
- Not-So-Stubby Area
OAM
- Operation, Administration and Maintenance
OC
- Ordinary Clock
OSI
- Open System Interconnection
OSPF
- Open Shortest Path First
PBB
- Provider Backbone Bridge
PBS
- Peak Burst Size
PBT
- Provider Backbone Transport
XXII
SJ-20110927150233-015|2012-08-29 (R1.2)
Glossary
PDU
- Packet Data Unit
PDU
- Protocol Data Unit
PE
- Provider Edge
PHB
- Per Hop Behavior
PIR
- Peak Information Rate
PLR
- Point of Local Repair
PPP
- Point-to-Point Protocol
PTP
- Precision Time Protocol
PVID
- Port VLAN ID
PW
- Pseudo Wire
PWE3
- Pseudo Wire Emulation Edge-to-Edge
Q-in-Q
- VLAN Tag in VLAN Tag
Q-in-Q
- 802.1q Tunnel Tags
QoS
- Quality of Service
RDI
- Remote Defect Indication
RED
- Random Early Detection
RNC
- Radio Network Controller
RR
- Router Reflector
RRC
- Radio Resource Controller
XXIII
SJ-20110927150233-015|2012-08-29 (R1.2)
RSVP
- Resource ReSerVation Protocol
RSVP-TE
- Resource ReSerVation Protocol - Traffic Engineering
SCC
- Signaling Communication Channel
SD
- Signal Degrade
SDH
- Synchronous Digital Hierarchy
SNP
- Sequence Num PDU
SP
- Strict Priority
TC
- Transparent Clock
TCP
- Transfer Control Protocol
TDM
- Time Division Multiplexing
TE
- Traffic Engineering
TLV
- Type/Length/Value
TNP
- Trail Network Protection
TPS
- Tributary Protection Switching
TTL
- Time To Live
ToS
- Type of Service
UDP
- User Datagram Protocol
UNI
- User Network Interface
VCI
- Virtual Circuit Identifier
XXIV
SJ-20110927150233-015|2012-08-29 (R1.2)
Glossary
VLAN
- Virtual Local Area Network
VPI
- Virtual Path Identifier
VPN
- Virtual Private Network
VRF
- Virtual Route Forwarding
WFQ
- Weighted Fair Queuing
WRED
- Weighted Random Early Detection
WRR
- Weighted Round Robin
ZFID
- ZTE Fast Interface Detect
XXV
SJ-20110927150233-015|2012-08-29 (R1.2)