HP 3600 v2 series Configuration Manual

HP 3600 v2 series Configuration Manual

Hide thumbs Also See for 3600 v2 series:
Table of Contents
HP 3600 v2 Switch Series
Layer 3 - IP Routing

Configuration Guide

Part number: 5998-2352
Software version: Release 2101
Document version: 6W101-20130930
Table of Contents
loading

Summary of Contents for HP 3600 v2 series

  • Page 1: Configuration Guide

    HP 3600 v2 Switch Series Layer 3 - IP Routing Configuration Guide Part number: 5998-2352 Software version: Release 2101 Document version: 6W101-20130930...
  • Page 2 The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
  • Page 3: Table Of Contents

    Contents IP routing basics ··························································································································································· 1   IP routing overview ··························································································································································· 1   Routing table ····························································································································································· 1   Dynamic routing protocols ······································································································································ 2   Routing preference ··················································································································································· 3   Load sharing ····························································································································································· 3   Route backup ···························································································································································· 4   Route recursion ························································································································································· 4  ...
  • Page 4 Tuning and optimizing RIP networks ···························································································································· 31   Configuring RIP timers ··········································································································································· 31   Configuring split horizon and poison reverse ···································································································· 31   Configuring the maximum number of load balanced routes ············································································ 32   Enabling zero field check on incoming RIPv1 messages ·················································································· 32  ...
  • Page 5 Configuring OSPF inbound route filtering ·········································································································· 81   Configuring ABR Type-3 LSA filtering ················································································································· 82   Configuring an OSPF cost for an interface ········································································································ 82   Configuring the maximum number of OSPF routes ··························································································· 83   Configuring the maximum number of load-balanced routes ············································································ 83  ...
  • Page 6 Basic concepts ····················································································································································· 130   IS-IS area ······························································································································································ 132   IS-IS network type ················································································································································ 134   IS-IS PDU format ··················································································································································· 135   Supported IS-IS features ······································································································································ 141   Protocols and standards ····································································································································· 143   IS-IS configuration task list ··········································································································································· 143  ...
  • Page 7 IS-IS authentication configuration example······································································································· 183   Configuring BFD for IS-IS ···································································································································· 185   BGP configuration ··················································································································································· 189   BGP overview ······························································································································································· 189   Formats of BGP messages ·································································································································· 189   BGP path attributes ············································································································································· 192   BGP route selection ············································································································································· 196  ...
  • Page 8 Configuring BGP community ······························································································································ 226   Configuring a BGP route reflector ····················································································································· 227   Configuring a BGP confederation ····················································································································· 227   Configuring BGP GR ··················································································································································· 228   Enabling trap ································································································································································ 229   Enabling logging of peer state changes ···················································································································· 229  ...
  • Page 9 Configuring the maximum number of equal cost routes for load balancing ················································ 270   Applying IPsec policies for RIPng ······························································································································· 271   Displaying and maintaining RIPng ····························································································································· 272   RIPng configuration examples····································································································································· 272   Configuring RIPng basic functions ····················································································································· 272  ...
  • Page 10 Configuring OSPFv3 IPsec policies ··················································································································· 310   Troubleshooting OSPFv3 configuration ····················································································································· 313   No OSPFv3 neighbor relationship established ································································································ 313   Incorrect routing information ······························································································································ 314   IPv6 IS-IS configuration ··········································································································································· 315   Introduction to IPv6 IS-IS ·············································································································································· 315   Configuring IPv6 IS-IS basic functions ························································································································...
  • Page 11 Configuring a large-scale IPv6 BGP network ············································································································ 342   Configuration prerequisites ································································································································ 343   Configuring IPv6 BGP peer group ····················································································································· 343   Configuring IPv6 BGP community ····················································································································· 344   Configuring an IPv6 BGP route reflector··········································································································· 345   Configuring BFD for IPv6 BGP ···································································································································· 345  ...
  • Page 12 Using BGP to advertise VPN routes to the PE ··································································································· 415   Using tunnels to advertise VPN routes ·············································································································· 418   Support and other resources ·································································································································· 425   Contacting HP ······························································································································································ 425   Subscription service ············································································································································ 425   Related information ······················································································································································ 425  ...
  • Page 13: Ip Routing Basics

    IP routing basics NOTE: router The term in this document refers to both routers and Layer 3 switches. • The types of interfaces that appear in any figures other than the network diagrams for configuration • examples are for illustration only. Some of them might be unavailable on your switch. interface •...
  • Page 14: Dynamic Routing Protocols

    NOTE: Layer 3—IP Services Configuration Guide For more information about the FIB table, see Routing table information Display the brief information of a routing table by using the display ip routing-table command. For example: display ip routing-table Routing Tables: Public Destinations : 7 Routes : 7 Destination/Mask...
  • Page 15: Routing Preference

    Criterion Categories • Distance-vector protocols—RIP and BGP. BGP is also considered a path-vector protocol. Routing algorithm • Link-state protocols—OSPF and IS-IS • Unicast routing protocols—RIP, OSPF, BGP, and IS-IS Destination address type • Multicast routing protocols—PIM-SM and PIM-DM • IPv4 routing protocols—RIP, OSPF, BGP, and IS-IS IP version •...
  • Page 16: Route Backup

    NOTE: At present, routing protocols supporting load sharing include static routing/IPv6 static routing, RIP/RIPng, OSPF/OSPFv3, BGP/IPv6 BGP, and IS-IS/IPv6 IS-IS. Route backup Route backup can help improve network reliability. With route backup, you can configure multiple routes to the same destination, expecting the one with the highest preference to be the main route and all the rest backup routes.
  • Page 17 To do… Use the command… Remarks display ip routing-table [ vpn-instance Display routing information vpn-instance-name ] ip-prefix Available in any view permitted by an IPv4 prefix list ip-prefix-name [ verbose ] [ | { begin | exclude | include } regular-expression ] display ip routing-table [ vpn-instance vpn-instance-name ] protocol protocol [ inactive | verbose ] [ | { begin | exclude...
  • Page 18: Static Routing Configuration

    Static routing configuration NOTE: The term router in this document refers to both routers and Layer 3 switches. Introduction Static route Static routes are manually configured. If a network’s topology is simple, you only need to configure static routes for the network to work properly. The proper configuration and usage of static routes can improve network performance and ensure bandwidth for important network applications.
  • Page 19: Configuring A Static Route

    If the output interface is a Null 0 interface, no next hop address is required. • • If you specify a broadcast interface (such as an Ethernet interface or VLAN interface) as the output interface, you must specify the corresponding next hop for the output interface. Other attributes You can configure different priorities for different static routes so that route management policies can be more flexible.
  • Page 20: Configuring Bfd For Static Routes

    NOTE: When you configure a static route, the static route does not take effect if you specify the next hop address • first and then configure it as the IP address of a local interface, such as Ethernet interface and VLAN interface.
  • Page 21: Bfd Echo Packet Mode

    To do… Use the command… Remarks ip route-static dest-address { mask | mask-length } next-hop-address bfd control-packet bfd-source ip-address [ preference preference-value ] [ tag tag-value ] [ description Required Configure a static route description-text ] and enable BFD control Use either ip route-static vpn-instance s-vpn-instance-name&<1-6>...
  • Page 22: Displaying And Maintaining Static Routes

    Figure 1 Network diagram As shown in Figure 1, upon a link failure, FRR designates a backup next hop by using a routing policy for routes matching the specified criteria. Packets are directed to the backup next hop to avoid traffic interruption.
  • Page 23: Static Route Configuration Examples

    Static route configuration examples Basic static route configuration example Network requirements The IP addresses and masks of the switches and hosts are shown in Figure 2. Static routes are required for interconnection between any two hosts. Figure 2 Network diagram Configuration procedure Configure IP addresses for interfaces.
  • Page 24 Destination/Mask Proto Cost NextHop Interface 0.0.0.0/0 Static 60 1.1.4.2 Vlan500 1.1.2.0/24 Direct 0 1.1.2.3 Vlan300 1.1.2.3/32 Direct 0 127.0.0.1 InLoop0 1.1.4.0/30 Direct 0 1.1.4.1 Vlan500 1.1.4.1/32 Direct 0 127.0.0.1 InLoop0 127.0.0.0/8 Direct 0 127.0.0.1 InLoop0 127.0.0.1/32 Direct 0 127.0.0.1 InLoop0 # Display the IP routing table of Switch B.
  • Page 25: Static Route Frr Configuration Example

    <1 ms <1 ms <1 ms 1.1.4.1 1 ms <1 ms <1 ms 1.1.2.2 Trace complete. Static route FRR configuration example Network requirements Switch S, Switch A, and Switch D are interconnected through static routes, as illustrated in Figure Configure static route FRR so that when the link between Switch S and Switch D fails, traffic can be switched to Link B immediately.
  • Page 26 [SwitchS-route-policy] apply fast-reroute backup-interface vlan-interface backup-nexthop 12.12.12.2 [SwitchS-route-policy] quit [SwitchS] ip route-static fast-reroute route-policy frr # Configure Switch D. [SwitchD] bfd echo-source-ip 4.4.4.4 [SwitchD] ip ip-prefix abc index 10 permit 1.1.1.1 32 [SwitchD] route-policy frr permit node 10 [SwitchD-route-policy] if-match ip-prefix abc [SwitchD-route-policy] apply fast-reroute...
  • Page 27: Bfd For Static Routes Configuration Example (Direct Session)

    BFD for static routes configuration example (direct session) Network requirements As shown in Figure 4, configure static routes to subnet 120.1.1.0/24 on Switch A, static routes to subnet 121.1.1.0/24 on Switch B, and static routes to subnets 120.1.1.0/24 and 121.1.1.0/24 on Switch C. Enable BFD so that when the link between Switch A and Switch B through the Layer 2 switch fails, BFD can detect the failure immediately and Switch A and Switch B can communicate through Switch C.
  • Page 28 [SwitchB] ip route-static 121.1.1.0 24 vlan-interface 10 12.1.1.1 bfd control-packet [SwitchB] ip route-static 121.1.1.0 24 vlan-interface 13 13.1.1.2 preference 65 [SwitchB] quit # Configure static routes on Switch C. system-view [SwitchC] ip route-static 120.1.1.0 24 vlan-interface 13 13.1.1.1 [SwitchC] ip route-static 121.1.1.0 24 vlan-interface 11 10.1.1.102 Verify the configuration.
  • Page 29: Bfd For Static Routes Configuration Example (Indirect Session)

    Public Routing Table : Static Summary Count : 2 Static Routing table Status : < Active> Summary Count : 1 Destination/Mask Proto Cost NextHop Interface 120.1.1.0/24 Static 65 10.1.1.100 Vlan11 Static Routing table Status : < Inactive> Summary Count : 1 Destination/Mask Proto Cost...
  • Page 30 [SwitchA] interface loopback 1 [SwitchA-LoopBack1] bfd min-transmit-interval 500 [SwitchA-LoopBack1] bfd min-receive-interval 500 [SwitchA-LoopBack1] bfd detect-multiplier 9 [SwitchA-LoopBack1] quit [SwitchA] ip route-static 120.1.1.0 24 2.2.2.9 bfd control-packet bfd-source 1.1.1.9 [SwitchA] ip route-static 120.1.1.0 24 vlan-interface 11 10.1.1.100 preference 65 [SwitchA] quit # Configure static routes on Switch B and enable BFD control packet mode for the static route through Switch D.
  • Page 31 Destination/Mask Proto Cost NextHop Interface 120.1.1.0/24 Static 60 2.2.2.9 Vlan10 Static Routing table Status : Summary Count : 1 Destination/Mask Proto Cost NextHop Interface 120.1.1.0/24 Static 65 10.1.1.100 Vlan11 # Enable BFD debugging on Switch A. When the link between Switch A and Switch D fails, Switch A can detect the failure.
  • Page 32: Rip Configuration

    RIP configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. RIP overview RIP is a simple Interior Gateway Protocol (IGP), mainly used in small-sized networks, such as academic networks and simple LANs. It is not applicable to complex networks. RIP is widely used in practical networking because it is easy to implement, configure, and maintain.
  • Page 33: Operation Of Rip

    Suppress timer—Defines how long a RIP route stays in suppressed state. When the metric of a route • is 16, the route enters the suppressed state. In suppressed state, only routes coming from the same neighbor and whose metric is less than 16 will be received by the router to replace unreachable routes.
  • Page 34: Rip Message Format

    Supports plain text authentication and MD5 authentication to enhance security. • NOTE: RIPv2 has two types of message transmission: broadcast and multicast. Multicast is the default type using 224.0.0.9 as the multicast address. The interface working in the RIPv2 broadcast mode can also receive RIPv1 messages.
  • Page 35: Supported Rip Features

    Differences from RIPv1: • Version–Version of RIP. For RIPv2 the value is 0x02. Route tag • IP address—Destination IP address. It can be a natural network address, subnet address, or host • address. • Subnet mask—Mask of the destination address. Unlike RIPv1, RIPv2 can carry subnet information. Next hop—If set to 0.0.0.0, it indicates that the originator of the route is the best next hop.
  • Page 36: Protocols And Standards

    Protocols and standards RFC 1058, Routing Information Protocol • RFC 1723, RIP Version 2 - Carrying Additional Information • RFC 1721, RIP Version 2 Protocol Analysis • • RFC 1722, RIP Version 2 Protocol Applicability Statement RFC 1724, RIP Version 2 MIB Extension •...
  • Page 37: Configuring Rip Basic Functions

    Configuring RIP basic functions Configuration prerequisites Before configuring RIP basic functions, complete the following tasks: Configure the link layer protocol • • Configure an IP address on each interface, and ensure all adjacent routers are reachable to each other Configuration procedure Enabling RIP and a RIP interface Follow these steps to enable RIP: To do…...
  • Page 38 To do… Use the command… Remarks Optional Enable the interface to receive RIP rip input messages Enabled by default Optional Enable the interface to send RIP rip output messages Enabled by default Configuring a RIP version You can configure a RIP version in RIP view or interface view under the following conditions. If neither global nor interface RIP version is configured, the interface sends RIPv1 broadcasts and •...
  • Page 39: Configuring Rip Route Control

    To do… Use the command… Remarks Optional By default, if an interface has no RIP version specified, the global version takes effect. If no global RIP Specify a RIP version for the rip version { 1 | 2 [ broadcast | version is specified, the interface interface multicast ] }...
  • Page 40: Disabling Host Route Reception

    Enabling RIPv2 route automatic summarization You can disable RIPv2 route automatic summarization if you want to advertise all subnet routes. Follow these steps to enable RIPv2 route automatic summarization: To do… Use the command… Remarks Enter system view system-view –– rip [ process-id ] [ vpn-instance Enter RIP view ––...
  • Page 41: Advertising A Default Route

    To do… Use the command… Remarks Required Disable RIP from receiving host undo host-route routes Enabled by default NOTE: RIPv2 can be disabled from receiving host routes, but RIPv1 cannot. Advertising a default route Under the following conditions, you can configure RIP to advertise a default route with a specified metric to RIP neighbors: In RIP view, you can configure all the interfaces of the RIP process to advertise a default route;...
  • Page 42: Configuring A Priority For Rip

    To do… Use the command… Remarks Enter system view system-view –– rip [ process-id ] [ vpn-instance Enter RIP view –– vpn-instance-name ] filter-policy { acl-number | gateway ip-prefix-name | ip-prefix Required Configure the filtering of incoming ip-prefix-name [ gateway routes Not configured by default ip-prefix-name ] } import...
  • Page 43: Tuning And Optimizing Rip Networks

    To do… Use the command… Remarks Optional Configure a default metric for default cost value The default metric of a redistributed redistributed routes route is 0. import-route protocol [ process-id Required Redistribute routes from another | all-processes | allow-ibgp ] [ cost No redistribution is configured by protocol cost | route-policy...
  • Page 44: Configuring The Maximum Number Of Load Balanced Routes

    Enabling split horizon The split horizon function disables an interface from sending routes received from the interface to prevent routing loops between adjacent routers. Follow these steps to enable split horizon: To do… Use the command… Remarks Enter system view system-view —...
  • Page 45: Enabling Source Ip Address Check On Incoming Rip Updates

    To do… Use the command… Remarks Enter system view system-view –– rip [ process-id ] [ vpn-instance Enter RIP view –– vpn-instance-name ] Optional Enable zero field check on checkzero received RIPv1 messages Enabled by default Enabling source IP address check on incoming RIP updates You can enable source IP address check on incoming RIP updates.
  • Page 46: Specifying A Rip Neighbor

    NOTE: This feature does not apply to RIPv1 because RIPv1 does not support authentication. Although you can specify an authentication mode for RIPv1 in interface view, the configuration does not take effect. Specifying a RIP neighbor Usually, RIP sends messages to broadcast or multicast addresses. On non-broadcast or multicast links, you must manually specify RIP neighbors.
  • Page 47: Configuring Rip Frr

    To do… Use the command… Remarks Enable a RIP process and enter RIP rip [ process-id ] [ vpn-instance –– view vpn-instance-name ] Optional Configure the maximum number of By default, an interface sends up to RIP packets that can be sent at the output-delay time count count three RIP packets every 20 specified interval...
  • Page 48: Configuring Bfd For Rip

    To do… Use the command… Remarks rip [ process-id ] [ vpn-instance Enter RIP view — vpn-instance-name ] Enable RIP FRR and reference a Required fast-reroute route-policy routing policy to designate a route-policy-name Disabled by default. backup next hop Configuring BFD for RIP NOTE: High Availability Configuration Guide For more information about BFD, see...
  • Page 49: Displaying And Maintaining Rip

    To do… Use the command… Remarks Required Specify a RIP neighbor peer ip-address By default, RIP does not unicast updates to any peer. interface interface-type Enter interface view — interface-number Required Enable BFD on the RIP interface rip bfd enable Disabled by default NOTE: Unidirectional detection in BFD echo packet mode only works for RIP neighbors that are directly...
  • Page 50 Figure 10 Network diagram Configuration procedure Configure an IP address for each interface. (Details not shown) Configure basic RIP functions. # Configure Switch A. [SwitchA] rip [SwitchA-rip-1] network 192.168.1.0 [SwitchA-rip-1] network 172.16.0.0 [SwitchA-rip-1] network 172.17.0.0 # Configure Switch B. [SwitchB] rip [SwitchB-rip-1] network 192.168.1.0 [SwitchB-rip-1] network 10.0.0.0 # Display the RIP routing table of Switch A.
  • Page 51: Configuring Rip Route Redistribution

    10.0.0.0/8 192.168.1.2 10.2.1.0/24 192.168.1.2 10.1.1.0/24 192.168.1.2 The output shows that RIPv2 uses classless subnet mask. NOTE: RIPv1 routing information has a long aging time, so it will exist until it ages out after RIPv2 is configured. Configuring RIP route redistribution Network requirements In the following figure, two RIP processes are running on Switch B, which communicates with Switch A through RIP 100 and with Switch C through RIP 200.
  • Page 52 [SwitchB] rip 200 [SwitchB-rip-200] network 12.0.0.0 [SwitchB-rip-200] version 2 [SwitchB-rip-200] undo summary [SwitchB-rip-200] quit # Enable RIP 200 and specify RIP version 2 on Switch C. system-view [SwitchC] rip 200 [SwitchC-rip-200] network 12.0.0.0 [SwitchC-rip-200] network 16.0.0.0 [SwitchC-rip-200] version 2 [SwitchC-rip-200] undo summary # Display the routing table of Switch C.
  • Page 53: Configuring An Additional Metric For A Rip Interface

    [SwitchB-acl-basic-2000] rule deny source 10.2.1.1 0.0.0.255 [SwitchB-acl-basic-2000] rule permit [SwitchB-acl-basic-2000] quit [SwitchB] rip 200 [SwitchB-rip-200] filter-policy 2000 export rip 100 # Display the routing table of Switch C. [SwitchC] display ip routing-table Routing Tables: Public Destinations : 7 Routes : 7 Destination/Mask Proto Cost...
  • Page 54 [SwitchA-rip-1] quit # Configure Switch B. system-view [SwitchB] rip 1 [SwitchB-rip-1] network 1.0.0.0 [SwitchB-rip-1] version 2 [SwitchB-rip-1] undo summary # Configure Switch C. system-view [SwitchB] rip 1 [SwitchC-rip-1] network 1.0.0.0 [SwitchC-rip-1] version 2 [SwitchC-rip-1] undo summary # Configure Switch D. ...
  • Page 55: Configuring Rip To Advertise A Summary Route

    1.1.4.0/24, cost 2, nexthop 1.1.1.2 1.1.5.0/24, cost 2, nexthop 1.1.1.2 The output shows that only one RIP route reaches network 1.1.5.0/24, with the next hop as Switch B (1.1.1.2) and a cost of 2. Configuring RIP to advertise a summary route Network requirements In the following figure, Switch A and Switch B run OSPF, Switch D runs RIP, and Switch C runs OSPF and RIP.
  • Page 56 system-view [SwitchC] ospf [SwitchC-ospf-1] area 0 [SwitchC-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255 [SwitchC-ospf-1-area-0.0.0.0] network 10.2.1.0 0.0.0.255 [SwitchC-ospf-1-area-0.0.0.0] quit Configure RIP basic functions. # Configure Switch C. system-view [SwitchC] rip 1 [SwitchC-rip-1] network 11.3.1.0 [SwitchC-rip-1] version 2 [SwitchC-rip-1] undo summary # Configure Switch D. ...
  • Page 57: Rip Frr Configuration Example

    Destinations : 7 Routes : 7 Destination/Mask Proto Cost NextHop Interface 10.0.0.0/8 11.3.1.1 Vlan300 11.3.1.0/24 Direct 0 11.3.1.2 Vlan300 11.3.1.2/32 Direct 0 127.0.0.1 InLoop0 11.4.1.0/24 Direct 0 11.4.1.2 Vlan400 11.4.1.2/32 Direct 0 127.0.0.1 InLoop0 127.0.0.0/8 Direct 0 127.0.0.1 InLoop0 127.0.0.1/32 Direct 0 127.0.0.1 InLoop0...
  • Page 58 [SwitchS-rip-1] quit # Configure Switch D. system-view [SwitchD] bfd echo-source-ip 4.4.4.4 [SwitchD] ip ip-prefix abc index 10 permit 1.1.1.1 32 [SwitchD] route-policy frr permit node 10 [SwitchD-route-policy] if-match ip-prefix abc [SwitchD-route-policy] apply fast-reroute backup-interface vlan-interface backup-nexthop 24.24.24.2 [SwitchD-route-policy] quit [SwitchD] rip 1 [SwitchD-rip-1] fast-reroute route-policy frr [SwitchD-rip-1] quit...
  • Page 59: Configuring Bfd For Rip (Single-Hop Detection In Bfd Echo Packet Mode)

    Configuring BFD for RIP (single-hop detection in BFD echo packet mode) Network requirements In the following figure, Switch A and Switch C are interconnected through a Layer 2 switch. VLAN-interface 100 of the two switches runs RIP process 1, BFD is enabled on VLAN-interface 100 of Switch A.
  • Page 60 # Configure Switch B. [SwitchB] rip 1 [SwitchB-rip-1] network 192.168.2.0 [SwitchB-rip-1] network 192.168.3.0 [SwitchB-rip-1] quit # Configure Switch C. [SwitchC] rip 1 [SwitchC-rip-1] network 192.168.1.0 [SwitchC-rip-1] network 192.168.3.0 [SwitchC-rip-1] import-route static [SwitchC-rip-1] quit Configure BFD parameters. # Configure Switch A. [SwitchA] bfd session init-mode active [SwitchA] bfd echo-source-ip 11.11.11.11 [SwitchA] interface vlan-interface 100...
  • Page 61 Protocol: RIP Process ID: 2 Preference: 100 Cost: 2 IpPrecedence: QosLcId: NextHop: 192.168.2.2 Interface: vlan-interface 200 BkNextHop: 0.0.0.0 BkInterface: RelyNextHop: 0.0.0.0 Neighbor : 192.168.2.2 Tunnel ID: 0x0 Label: NULL BKTunnel ID: 0x0 BKLabel: NULL State: Inactive Adv Age: 00h12m50s Tag: 0 # Enable RIP event debugging on Switch A.
  • Page 62: Configuring Bfd For Rip (Bidirectional Detection In Bfd Control Packet Mode)

    Configuring BFD for RIP (bidirectional detection in BFD control packet mode) Network requirements In the following figure, Switch A is connected to Switch C through Switch B. VLAN-interface 100 on Switch A, VLAN-interface 200 on Switch C, and VLAN-interface 200 and VLAN-interface 100 on Switch B run RIP process 1.
  • Page 63: Configure Static Routes

    [SwitchA-rip-1] quit [SwitchA] interface vlan-interface 100 [SwitchA-Vlan-interface100] rip bfd enable [SwitchA-Vlan-interface100] quit [SwitchA] rip 2 [SwitchA-rip-2] network 192.168.3.0 [SwitchA-rip-2] quit # Configure Switch C. [SwitchC] rip 1 [SwitchC-rip-1] network 192.168.2.0 [SwitchC-rip-1] network 192.168.4.0 [SwitchC-rip-1] peer 192.168.1.1 [SwitchC-rip-1] undo validate-source-address [SwitchC-rip-1] import-route static [SwitchC-rip-1] quit [SwitchC] interface vlan-interface 200 [SwitchC-Vlan-interface200] rip bfd enable...
  • Page 64 CAUTION: If you specify null 0 interface as the output interface for a static route, do not specify the IP address of a directly connected network as the destination IP address. Verify the configuration. # Display the BFD session information of Switch A. ...
  • Page 65: Troubleshooting Rip

    # Display the BFD information of Switch A. Switch A has deleted the neighbor relationship with Switch C and no output information is displayed. display bfd session # Display the RIP routes of RIP process 1 on Switch A. The RIP route learned from Switch C is no longer existent.
  • Page 66 When all links function, route oscillation occurs on the RIP network. After displaying the routing table, you may find some routes intermittently appear and disappear in the routing table. Analysis: In the RIP network, make sure that all the same timers within the entire network are identical and have logical relationships between them.
  • Page 67: Ospf Configuration

    OSPF configuration Open Shortest Path First (OSPF) is a link state interior gateway protocol developed by the OSPF working group of the Internet Engineering Task Force (IETF). Now, OSPF version 2 (RFC 2328) is used. NOTE: Unless otherwise noted, OSPF refers to OSPFv2 throughout this document. •...
  • Page 68 Each router uses the SPF algorithm to compute a shortest path tree showing the routes to the nodes • in the AS. The router itself is the root of the tree. Router ID An OSPF process running on a router must have its own router ID. This ID is a 32-bit unsigned integer that uniquely identifies the router in the AS.
  • Page 69: Area Based Ospf Network Partition

    Adjacency: Two OSPF neighbors establish an adjacency relationship to synchronize their LSDBs. Therefore, any two neighbors without exchanging route information do not establish an adjacency. Area based OSPF network partition Network partition In a large OSPF routing domain, the LSDB becomes very huge and SPF computation consumes many storage and CPU resources.
  • Page 70 A virtual link is established between two ABRs through a non-backbone area and is configured on both ABRs to take effect. The non-backbone area is called a transit area. In the following figure, Area 2 has no direct physical link to the backbone area 0. You can configure a virtual link between the two ABRs to connect Area 2 to the backbone area.
  • Page 71 A totally stub area cannot have an ASBR because AS external routes cannot be distributed into the • stub area. • Virtual links cannot transit totally stub areas. NSSA area Similar to a stub area, an NSSA area does not import AS external LSAs (Type-5 LSAs), but can import Type-7 LSAs generated by the NSSA ASBR.
  • Page 72: Router Types

    Router types Classification of routers The following are OSPF router types and their positions in the AS: Internal router All interfaces on an internal router belong to one OSPF area. Area Border Router (ABR) An ABR belongs to more than two areas, one of which must be the backbone area. It connects the backbone area to a non-backbone area.
  • Page 73: Classification Of Ospf Networks

    The intra-area and inter-area routes describe the network topology of the AS. The external routes describe routes to external ASs. OSPF classifies external routes as Type- 1 or Type-2. A Type- 1 external route has high credibility. The cost from a router to the destination of the Type- 1 external route = the cost from the router to the corresponding ASBR + the cost from the ASBR to the destination of the external route.
  • Page 74: Dr And Bdr

    DR and BDR Introduction On a broadcast or NBMA network, any two routers need to establish an adjacency to exchange routing information with each other. If n routers are present on the network, n(n- 1 )/2 adjacencies are required. In addition, any topology change on the network results in traffic for route synchronization, which consumes many system and bandwidth resources.
  • Page 75: Ospf Packet Formats

    OSPF packet formats OSPF packets are directly encapsulated into IP packets. OSPF uses the IP protocol number 89. The format of an OSPF LSU packet is shown in Figure Figure 24 OSPF packet format OSPF packet header OSPF packets are classified into five types that have the same packet header. Figure 25 OSPF packet header Major fields of the OSPF packet header are as follows: Version: OSPF version number, which is 2 for OSPFv2.
  • Page 76 Figure 26 Hello packet format Major fields of the hello packet are as follows: Network mask: Network mask associated with the router’s sending interface. If two routers have • different network masks, they cannot become neighbors. HelloInterval: Interval for sending hello packets. If two routers have different intervals, they cannot •...
  • Page 77 Figure 27 DD packet format Version Packet length Router ID Area ID Checksum AuType Authentication Authentication Interface MTU Options 0 0 0 0 0 I DD sequence number LSA header LSA header Major fields of the DD packets are as follows: •...
  • Page 78 Figure 28 LSR packet format Major fields of the LSR packets are as follows: • LS type: Type of the LSA to be requested. Type 1 for example indicates the Router LSA. Link state ID: Determined by LSA type. • •...
  • Page 79 Figure 30 LSAck packet format LSA header format All LSAs have the same header. Figure 31 LSA header format Major fields of the LSA header are as follows: LS age: Time, in seconds, elapsed since the LSA was originated. An LSA ages in the LSDB (added •...
  • Page 80 Figure 32 Router LSA format Major fields of the Router LSA are as follows: Link state ID: ID of the router that originated the LSA. • V (Virtual Link): Set to 1 if the router that originated the LSA is a virtual link endpoint. •...
  • Page 81 Figure 33 Network LSA format Major fields of the Network LSA are as follows: Link state ID: The interface address of the DR. • • Network mask: The mask of the network (a broadcast or NBMA network). Attached router: The IDs of the routers, which are adjacent to the DR, including the DR itself. •...
  • Page 82 An AS external LSA is originated by an ASBR, and describes routing information to a destination outside the AS. Figure 35 AS external LSA format Major fields of the AS external LSA are as follows: • Link state ID: The IP address of another AS to be advertised. When describing a default route, the Link state ID is always set to default destination (0.0.0.0) and the network mask is set to 0.0.0.0 Network mask: The IP address mask for the advertised destination •...
  • Page 83: Supported Features

    Figure 36 NSSA external LSA format Supported features Multi-process This feature allows multiple OSPF processes to run on a router both simultaneously and independently. Routing information interactions between different processes simulate interactions between different routing protocols. Multiple OSPF processes can use the same RID. An interface of a router can only belong to a single OSPF process.
  • Page 84: Protocols And Standards

    NOTE: High Availability Configuration Guide For more information about BFD, see Bidirectional forwarding detection (BFD) provides a single mechanism to quickly detect and monitor the connectivity of links between OSPF neighbors, reducing network convergence time. Protocols and standards RFC 1765, OSPF Database Overflow •...
  • Page 85: Enabling Ospf

    Task Remarks Configuring the maximum number of OSPF routes Optional Configuring the maximum number of load-balanced routes Optional Configuring OSPF preference Optional Configuring OSPF route redistribution Optional Configuring OSPF packet timers Optional Specifying LSA transmission delay Optional Specifying SPF calculation interval Optional Specifying the LSA arrival interval Optional...
  • Page 86: Configuration Procedure

    You can specify a router ID when creating the OSPF process. Any two routers in an AS must have different router IDs. In practice, the ID of a router is the IP address of one of its interfaces. If you specify no router ID when creating the OSPF process, the global router ID is used. HP •...
  • Page 87: Configuring Ospf Areas

    • and for ease of management and memorization. • HP recommends configuring a description for each area to help identify purposes of areas and for ease of management and memorization. Configuring OSPF areas After splitting an OSPF AS into multiple areas, configure some areas as stub areas or NSSA areas as needed.
  • Page 88: Configuring An Nssa Area

    NOTE: You must use the stub command on routers attached to a stub area. • Using the default-cost command only takes effect on the ABR of a stub area. • The backbone area cannot be a totally stub area. • A (totally) stub area cannot have an ASBR because AS external routes cannot be distributed into the stub •...
  • Page 89: Configuring Ospf Network Types

    To do… Use the command… Remarks ospf [ process-id | router-id Enter OSPF view router-id | vpn-instance — vpn-instance-name ] * Enter area view area area-id — Required vlink-peer router-id [ hello seconds | retransmit seconds | trans-delay You must configure this command on seconds | dead seconds | simple both ends of a virtual link.
  • Page 90: Configuring The Ospf Network Type For An Interface As Broadcast

    Configuring the OSPF network type for an interface as broadcast Follow these steps to configure the OSPF network type for an interface as broadcast: To do… Use the command… Remarks Enter system view system-view — interface interface-type Enter interface view —...
  • Page 91: Configuring The Ospf Network Type For An Interface As P2Mp

    NOTE: The router priority configured with the ospf dr-priority command and the one configured with the peer command have the following differences. The former is for actual DR election. • • The latter is to indicate whether a neighbor has the election right or not. If you configure the router priority for a neighbor as 0, the local router will assume the neighbor has no election right, and send no hello packets to this neighbor.
  • Page 92: Configuring Ospf Route Control

    To do… Use the command… Remarks Required Configure the OSPF network type By default, the network type of an ospf network-type p2p for the interface as P2P interface depends on the link layer protocol. Configuring OSPF route control This section describes how to control the advertisement and reception of OSPF routing information, as well as route redistribution from other protocols.
  • Page 93: Configuring Ospf Inbound Route Filtering

    Configuring route summarization when redistributing routes into OSPF on an ASBR Without route summarization, an ASBR advertises each redistributed route in a separate ASE LSA. After a summary route is configured, the ASBR advertises only the summary route in an ASE LSA instead of more specific routes, which reduces the number of LSAs in the LSDB.
  • Page 94: Configuring Abr Type-3 Lsa Filtering

    Configuring ABR Type-3 LSA filtering You can configure an ABR to filter Type-3 LSAs advertised to an area. Follow these steps to configure Type-3 LSA filtering on an ABR: To do… Use the command… Remarks Enter system view system-view — ospf [ process-id | router-id router-id | Enter OSPF view —...
  • Page 95: Configuring The Maximum Number Of Ospf Routes

    Configuring the maximum number of OSPF routes Follow these steps to configure the maximum number of routes: To do… Use the command… Remarks Enter system view system-view — ospf [ process-id | router-id router-id | Enter OSPF view — vpn-instance vpn-instance-name ] * Optional Configure the maximum number of maximum-routes { external | inter | intra }...
  • Page 96: Configuring Ospf Route Redistribution

    Configuring OSPF route redistribution Configure route redistribution into OSPF On a router running OSPF and other routing protocols, you can configure OSPF to redistribute routes from other protocols such as RIP, IS-IS, BGP, static, and direct routes, and advertise them in Type-5 LSAs or Type-7 LSAs.
  • Page 97: Advertising A Host Route

    Configure the default parameters for redistributed routes You can configure default parameters, such as the cost, upper limit, tag and type for redistributed routes. Tags indicate information related to protocols. For example, when redistributing BGP routes, OSPF uses tags to identify AS IDs. Follow these steps to configure the default parameters for redistributed routes: To do…...
  • Page 98: Configuration Prerequisites

    Configuration prerequisites Before configuring OSPF network optimization, complete the following tasks: Configure IP addresses for interfaces • Configure OSPF basic functions • Configuring OSPF packet timers You can configure the following timers on OSPF interfaces as needed. Hello timer—Interval for sending hello packets. It must be identical on OSPF neighbors. The longer •...
  • Page 99: Specifying Lsa Transmission Delay

    Specifying LSA transmission delay Each LSA in the LSDB has an age that is incremented by 1 every second, but the age does not change during transmission. It is necessary to add a transmission delay into the age time especially for low-speed links.
  • Page 100: Specifying The Lsa Generation Interval

    To do… Use the command… Remarks Optional Configure the LSA arrival interval lsa-arrival-interval interval 1000 milliseconds by default NOTE: The interval set with the lsa-arrival-interval command must be smaller than or equal to the interval set with the lsa-generation-interval command. Specifying the LSA generation interval You can adjust the LSA generation interval to protect network resources and routers from being over consumed by frequent network changes.
  • Page 101: Configuring Stub Routers

    NOTE: Different OSPF processes can disable the same interface from receiving and sending OSPF packets. The • silent-interface command disables only the interfaces associated with the current process rather than interfaces associated with other processes. After an OSPF interface is set to silent, other interfaces on the router can advertise direct routes of the •...
  • Page 102: Adding The Interface Mtu Into Dd Packets

    To do… Use the command… Remarks Required Configure the authentication mode authentication-mode { md5 | simple } Not configured by default. Return to OSPF view quit — Return to system view quit — Enter interface view interface interface-type interface-number — Configure the authentication mode ospf authentication-mode simple [ cipher | (simple authentication) for the...
  • Page 103: Logging Neighbor State Changes

    RFC 1583 Enabled by default NOTE: To avoid routing loops, HP recommends configuring all the routers to be either compatible or incompatible with RFC 1583. Logging neighbor state changes Follow these steps to enable the logging of neighbor state changes: To do…...
  • Page 104: Enabling Message Logging

    To do… Use the command… Remarks snmp-agent trap enable ospf [ process-id ] [ ifauthfail | ifcfgerror | ifrxbadpkt | ifstatechange | iftxretransmit | Optional Enable OSPF trap lsdbapproachoverflow | lsdboverflow | generation maxagelsa | nbrstatechange | originatelsa Enabled by default | vifcfgerror | virifauthfail | virifrxbadpkt | virifstatechange | viriftxretransmit | virnbrstatechange ] *...
  • Page 105: Configuring The Lsu Transmit Rate

    To do… Use the command… Remarks Configure OSPF to give Required priority to receiving and ospf packet-process prioritized-treatment Not configured by default. processing hello packets Configuring the LSU transmit rate Sending large numbers of LSU packets affects router performance and consumes too much network bandwidth.
  • Page 106 Figure 37 Network diagram for OSPF FRR Figure 37, after you enable FRR on Router B, OSPF automatically calculates or designates a backup next hop when a link failure is detected. Packets are directed to the backup next hop. At the same time, OSPF calculates the shortest path based on the new network topology, and forwards packets over the path after routing convergence.
  • Page 107: Configuring Ospf Graceful Restart

    To do… Use the command… Remarks ospf [ process-id | router-id Enter OSPF view router-id | vpn-instance — vpn-instance-name ] * Enable OSPF FRR to designate a Required fast-reroute route-policy backup next hop by using a routing route-policy-name Not configured by default. policy Configuring OSPF Graceful Restart OSPF GR involves the following:...
  • Page 108: Configuring The Ospf Gr Helper

    To do… Use the command… Remarks Required Enable the link-local signaling enable link-local-signaling capability Disabled by default Required Enable the out-of-band enable re-synchronization capability out-of-band-resynchronization Disabled by default Required Enable non-IETF standard Graceful graceful-restart [ nonstandard ] Restart capability for OSPF Disabled by default Optional Configure Graceful Restart interval...
  • Page 109: Triggering Ospf Graceful Restart

    To do… Use the command… Remarks Optional Configure the neighbors for which graceful-restart help { acl-number The router can serve as a GR the router can serve as a GR | prefix prefix-list } Helper for any OSPF neighbor by Helper default.
  • Page 110: Displaying And Maintaining Ospf

    To do… Use the command… Description Enter system view system-view — Required Configure the source address of echo packets bfd echo-source-ip ip-address Not configured by default interface interface-type Enter interface view — interface-number Required Enable BFD echo packet single-hop detection ospf bfd enable echo Not enabled by on the interface...
  • Page 111: Ospf Configuration Examples

    To do… Use the command… Remarks Display OSPF ABR and ASBR display ospf [ process-id ] abr-asbr [ | { begin | information exclude | include } regular-expression ] display ospf [ process-id ] interface [ all | Display OSPF interface information interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] display ospf [ process-id ] error [ | { begin |...
  • Page 112 Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure OSPF basic functions. # Configure Switch A. system-view [SwitchA] ospf [SwitchA-ospf-1] area 0 [SwitchA-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255 [SwitchA-ospf-1-area-0.0.0.0] quit [SwitchA-ospf-1] area 1 [SwitchA-ospf-1-area-0.0.0.1] network 10.2.1.0 0.0.0.255 [SwitchA-ospf-1-area-0.0.0.1] quit [SwitchA-ospf-1] quit # Configure Switch B.
  • Page 113 Area 0.0.0.0 interface 10.1.1.1(Vlan-interface100)'s neighbors Router ID: 10.3.1.1 Address: 10.1.1.2 GR State: Normal State: Full Mode: Nbr is Master Priority: 1 DR: 10.1.1.1 BDR: 10.1.1.2 MTU: 0 Dead timer due in 37 Neighbor is up for 06:03:59 Authentication Sequence: [ 0 ] Neighbor state change count: 5 Neighbors Area 0.0.0.1 interface 10.2.1.1(Vlan-interface200)'s neighbors...
  • Page 114 Sum-Net 10.3.1.0 10.3.1.1 80000014 Sum-Net 10.4.1.0 10.2.1.1 8000000F Area: 0.0.0.1 Type LinkState ID AdvRouter Sequence Metric Router 10.2.1.1 10.2.1.1 80000012 Router 10.4.1.1 10.4.1.1 1663 80000012 Network 10.2.1.1 10.2.1.1 80000010 Sum-Net 10.5.1.0 10.2.1.1 80000003 Sum-Net 10.3.1.0 10.2.1.1 1069 8000000F Sum-Net 10.1.1.0 10.2.1.1 1069 8000000F...
  • Page 115: Configuring Ospf Route Redistribution

    Configuring OSPF route redistribution Network requirements As shown in Figure 39, all the switches run OSPF, and the AS is divided into three areas. Switch A and Switch B act as ABRs to forward routes between areas. Switch C is configured as an ASBR to redistribute external routes (static routes).
  • Page 116: Configuring Ospf To Advertise A Summary Route

    Routing for Network Destination Cost Type NextHop AdvRouter Area 10.2.1.0/24 Inter 10.3.1.1 10.3.1.1 0.0.0.2 10.3.1.0/24 Transit 10.3.1.2 10.3.1.1 0.0.0.2 10.4.1.0/24 Inter 10.3.1.1 10.3.1.1 0.0.0.2 10.5.1.0/24 Stub 10.5.1.1 10.5.1.1 0.0.0.2 10.1.1.0/24 Inter 10.3.1.1 10.3.1.1 0.0.0.2 Routing for ASEs Destination Cost Type NextHop AdvRouter 3.1.2.0/24...
  • Page 117 Configure OSPF basic functions. # Configure Switch A. system-view [SwitchA] ospf [SwitchA-ospf-1] area 0 [SwitchA-ospf-1-area-0.0.0.0] network 11.2.1.0 0.0.0.255 [SwitchA-ospf-1-area-0.0.0.0] quit [SwitchA-ospf-1] quit # Configure Switch B. system-view [SwitchB] ospf [SwitchB-ospf-1] area 0 [SwitchB-ospf-1-area-0.0.0.0] network 11.2.1.0 0.0.0.255 [SwitchB-ospf-1-area-0.0.0.0] quit [SwitchB-ospf-1] quit # Configure Switch C.
  • Page 118 [SwitchC] bgp 100 [SwitchC-bgp] peer 11.1.1.1 as 200 [SwitchC-bgp] import-route ospf [SwitchC-bgp] import-route direct [SwitchC-bgp] quit Configure Switch B and Switch C to redistribute BGP routes into OSPF. # Configure OSPF to redistribute routes from BGP on Switch B. [SwitchB] ospf [SwitchB-ospf-1] import-route bgp # Configure OSPF to redistribute routes from BGP on Switch C.
  • Page 119: Configuring An Ospf Stub Area

    Configuring an OSPF stub area Network requirements Figure 41 shows an AS is split into three areas, where all switches run OSPF. Switch A and Switch B act as ABRs to forward routing information between areas. Switch D acts as the ASBR to redistribute routes (static routes).
  • Page 120 Routing Tables Routing for Network Destination Cost Type NextHop AdvRouter Area 10.2.1.0/24 Transit 10.2.1.2 10.2.1.1 0.0.0.1 10.3.1.0/24 Inter 10.2.1.1 10.2.1.1 0.0.0.1 10.4.1.0/24 Stub 10.4.1.1 10.4.1.1 0.0.0.1 10.5.1.0/24 Inter 10.2.1.1 10.2.1.1 0.0.0.1 10.1.1.0/24 Inter 10.2.1.1 10.2.1.1 0.0.0.1 Routing for ASEs Destination Cost Type NextHop...
  • Page 121: Configuring An Ospf Nssa Area

    10.4.1.0/24 Stub 10.4.1.1 10.4.1.1 0.0.0.1 10.5.1.0/24 Inter 10.2.1.1 10.2.1.1 0.0.0.1 10.1.1.0/24 Inter 10.2.1.1 10.2.1.1 0.0.0.1 Total Nets: 6 Intra Area: 2 Inter Area: 4 ASE: 0 NSSA: 0 NOTE: When Switch C resides in the stub area, a default route takes the place of the external route. # Filter Type-3 LSAs out the stub area [SwitchA] ospf [SwitchA-ospf-1] area 1...
  • Page 122 Figure 42 Network diagram Configuration procedure Configure IP addresses for interfaces. Configure OSPF basic functions. (See “Configuring OSPF basic functions”) Configure Area 1 as an NSSA area. # Configure Switch A. system-view [SwitchA] ospf [SwitchA-ospf-1] area 1 [SwitchA-ospf-1-area-0.0.0.1] nssa default-route-advertise no-summary [SwitchA-ospf-1-area-0.0.0.1] quit [SwitchA-ospf-1] quit # Configure Switch C.
  • Page 123: Configuring Ospf Dr Election

    Destination Cost Type NextHop AdvRouter Area 0.0.0.0/0 65536 Inter 10.2.1.1 10.2.1.1 0.0.0.1 10.2.1.0/24 65535 Transit 10.2.1.2 10.4.1.1 0.0.0.1 10.4.1.0/24 Stub 10.4.1.1 10.4.1.1 0.0.0.1 Total Nets: 3 Intra Area: 2 Inter Area: 1 ASE: 0 NSSA: 0 Configure Switch C to redistribute static routes. [SwitchC] ip route-static 3.1.3.1 24 10.4.1.2 [SwitchC] ospf [SwitchC-ospf-1] import-route static...
  • Page 124 Figure 43 Network diagram Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure OSPF basic functions. # Configure Switch A. system-view [SwitchA] router id 1.1.1.1 [SwitchA] ospf [SwitchA-ospf-1] area 0 [SwitchA-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255 [SwitchA-ospf-1-area-0.0.0.0] quit [SwitchA-ospf-1] quit # Configure Switch B.
  • Page 125 [SwitchD-ospf-1] return # Display OSPF neighbor information on Switch A. [SwitchA] display ospf peer verbose OSPF Process 1 with Router ID 1.1.1.1 Neighbors Area 0.0.0.0 interface 192.168.1.1(Vlan-interface1)'s neighbors Router ID: 2.2.2.2 Address: 192.168.1.2 GR State: Normal State: 2-Way Mode: None Priority: 1 DR: 192.168.1.4 BDR: 192.168.1.3...
  • Page 126 Neighbors Area 0.0.0.0 interface 192.168.1.4(Vlan-interface1)'s neighbors Router ID: 1.1.1.1 Address: 192.168.1.1 GR State: Normal State: Full Mode:Nbr is Slave Priority: 100 DR: 192.168.1.4 BDR: 192.168.1.3 MTU: 0 Dead timer due in 31 Neighbor is up for 00:11:17 Authentication Sequence: [ 0 ] Router ID: 2.2.2.2 Address: 192.168.1.2 GR State: Normal...
  • Page 127: Configuring Ospf Virtual Links

    DR: 192.168.1.1 BDR: 192.168.1.3 MTU: 0 Dead timer due in 35 Neighbor is up for 00:01:44 Authentication Sequence: [ 0 ] Router ID: 3.3.3.3 Address: 192.168.1.3 GR State: Normal State: Full Mode: Nbr is Slave Priority: 2 DR: 192.168.1.1 BDR: 192.168.1.3 MTU: 0 Dead timer due in 39 Neighbor is up for 00:01:41...
  • Page 128 Figure 44 Network diagram Area 0 Swtich B Vlan-int300 10.1.1.2/24 Swtich A Area 1 Vlan-int300 10.1.1.1/24 Vlan-int200 10.2.1.1/24 Vlan-int100 Vlan-int200 10.3.1.1/24 10.2.1.2/24 Vlan-int100 10.3.1.2/24 Switch D Switch C Area 2 Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure OSPF basic functions.
  • Page 129: Configuring Ospf Graceful Restart

    # Display the OSPF routing table of Switch B. [SwitchB] display ospf routing OSPF Process 1 with Router ID 2.2.2.2 Routing Tables Routing for Network Destination Cost Type NextHop AdvRouter Area 10.2.1.0/24 Transit 10.2.1.1 3.3.3.3 0.0.0.1 10.1.1.0/24 Transit 10.1.1.2 2.2.2.2 0.0.0.0 Total Nets: 2 Intra Area: 2...
  • Page 130 Switch A acts as the non-IETF standard GR Restarter, whereas Switch B and Switch C are the GR Helpers and re-synchronize their LSDB with Switch A through OOB communication of GR. Figure 45 Network diagram Router ID: 1.1.1.1 GR restarter Switch A Vlan-int100 192.1.1.1/24...
  • Page 131 [SwitchA-ospf-100] return # Configure Switch B as the GR Helper: enable the link-local signaling capability and the out-of-band re-synchronization capability for OSPF process 100. [SwitchB-ospf-100] enable link-local-signaling [SwitchB-ospf-100] enable out-of-band-resynchronization # Configure Switch C as the GR Helper: enable the link-local signaling capability and the out-of-band re-synchronization capability for OSPF process 100.
  • Page 132: Configuring Route Filtering

    Configuring route filtering Network requirements As shown in Figure All the switches in the network run OSPF. The AS is divided into three areas. • • Switch A and Switch B work as ABRs. Configure Switch C as an ASBR to redistribute external routes (static routes), and configure a filter policy on Switch C to filter out redistributed route 3.1.3.0/24.
  • Page 133 3.1.1.0/24 O_ASE 10.2.1.2 Vlan200 3.1.2.0/24 O_ASE 10.2.1.2 Vlan200 3.1.3.0/24 O_ASE 10.2.1.2 Vlan200 10.1.1.0/24 Direct 0 10.1.1.1 Vlan200 10.1.1.1/32 Direct 0 127.0.0.1 InLoop0 10.2.1.0/24 Direct 0 10.2.1.1 Vlan200 10.2.1.1/32 Direct 0 127.0.0.1 InLoop0 10.3.1.0/24 OSPF 10.1.1.2 Vlan100 10.4.1.0/24 OSPF 10.2.1.2 Vlan200 10.5.1.0/24 OSPF 10.1.1.2...
  • Page 134: Configuring Ospf Frr

    # Use the ACL to filter route 10.5.1.0/24. [SwitchA] ospf 1 [SwitchA-ospf-1] filter-policy 2000 import [SwitchA-ospf-1] quit # Display the OSPF routing table of Switch A. [SwitchA] display ip routing-table Routing Tables: Public Destinations : 10 Routes : 10 Destination/Mask Proto Cost NextHop...
  • Page 135 Configure OSPF FRR. You can enable OSPF FRR to either automatically calculate a backup next hop, or to designate a backup next hop by using a routing policy. Method I: Enable OSPF FRR to automatically calculate the backup next hop. # Configure Switch S.
  • Page 136: Configuring Bfd For Ospf

    Destination: 4.4.4.4/32 Protocol: OSPF Process ID: 1 Preference: 10 Cost: 1 IpPrecedence: QosLcId: NextHop: 13.13.13.2 Interface: Vlan-interface200 BkNextHop: 12.12.12.2 BkInterface: Vlan-interface100 RelyNextHop: 0.0.0.0 Neighbor : 0.0.0.0 Tunnel ID: 0x0 Label: NULL BKTunnel ID: 0x0 BKLabel: NULL State: Active Adv Age: 00h01m27s Tag: 0 # Display route 1.1.1.1/32 on Switch D.
  • Page 137 Figure 48 Network diagram Device Interface IP address Device Interface IP address Switch A Vlan-int10 10.1.0.102/24 Switch B Vlan-int10 10.1.0.100/24 Vlan-int11 11.1.1.1/24 Vlan-int13 13.1.1.1/24 Switch C Vlan-int11 11.1.1.2/24 Vlan-int13 13.1.1.2/24 Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure OSPF basic functions.
  • Page 138 system-view [SwitchC] ospf [SwitchC-ospf-1] area 0 [SwitchC-ospf-1-area-0.0.0.0] network 11.1.1.0 0.0.0.255 [SwitchC-ospf-1-area-0.0.0.0] network 13.1.1.0 0.0.0.255 [SwitchC-ospf-1-area-0.0.0.0] quit [SwitchC-ospf-1] quit Configure BFD. # Enable BFD on Switch A and configure BFD parameters. [SwitchA] bfd session init-mode active [SwitchA] interface vlan-interface 10 [SwitchA-Vlan-interface10] ospf bfd enable [SwitchA-Vlan-interface10] bfd min-transmit-interval 500 [SwitchA-Vlan-interface10] bfd min-receive-interval 500...
  • Page 139 BKTunnel ID: 0x0 BKLabel: NULL State: Active Adv Age: 00h58m10s Tag: 0 Destination: 120.1.1.0/24 Protocol: OSPF Process ID: 1 Preference: 10 Cost: 4 IpPrecedence: QosLcId: NextHop: 10.1.1.100 Interface: Vlan-interface11 BkNextHop: 0.0.0.0 BkInterface: RelyNextHop: 0.0.0.0 Neighbor : 0.0.0.0 Tunnel ID: 0x0 Label: NULL BKTunnel ID: 0x0 BKLabel: NULL...
  • Page 140: Troubleshooting Ospf Configuration

    *0.50673840 SwitchA BFD/8/SCM:No bfd session exists, stop receiving any bfd packets # Display the BFD information of Switch A. The BFD session between Switch A and Switch B is deleted and no information is output. display bfd session # Display routes to 120.1.1.0/24 on Switch A, and you can see that Switch A communicates with Switch B through Switch C.
  • Page 141: Incorrect Routing Information

    Display OSPF interface information using the display ospf interface command. Ping the neighbor router’s IP address to check connectivity. Check OSPF timers. The dead interval on an interface must be at least four times the hello interval. On an NBMA network, using the peer ip-address command to specify the neighbor manually is required.
  • Page 142: Is-Is Configuration

    IS-IS configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. • The 3600 v2 SI Switch Series does not support IS-IS. • IS-IS overview Intermediate System-to-Intermediate System (IS-IS) is a dynamic routing protocol designed by the International Organization for Standardization (ISO) to operate on the connectionless network protocol (CLNP).
  • Page 143 IS-IS address format NSAP As shown in Figure 49, an NSAP address consists of the Initial Domain Part (IDP) and the Domain Specific Part (DSP). The IDP is equal to the network ID of an IP address, and the DSP is equal to the subnet and host ID.
  • Page 144: Is-Is Area

    A network entity title (NET) indicates the network layer information of an IS, and does not include transport layer information. It is a special NSAP address with the SEL being 0. The length of the NET is equal to the NSAP, and is in the range of 8 bytes to 20 bytes. A NET comprises the following parts: Area ID—Its length is in the range of 1 to 13 bytes.
  • Page 145 Figure 50 IS-IS topology 1 Figure 51 is another IS-IS topology. The Level- 1 -2 routers connect to the Level- 1 and Level-2 routers, and form the IS-IS backbone together with the Level-2 routers. No area is defined as the backbone in this topology.
  • Page 146: Is-Is Network Type

    The routing information of a Level- 1 area is sent to the Level-2 area through the Level- 1 -2 router; therefore, the Level-2 router knows the routing information of the entire IS-IS routing domain. But the Level- 1 -2 router does not share the information of other Level- 1 areas and the Level-2 area with the Level- 1 area by default.
  • Page 147: Is-Is Pdu Format

    NOTE: On IS-IS broadcast networks, all routers are adjacent with each other. However, the DIS is responsible for the synchronization of their LSDBs. IS-IS PDU format PDU header format IS-IS packets are encapsulated into link layer frames. The Protocol Data Unit (PDU) consists of two parts, the headers and the variable length fields.
  • Page 148 Type PDU Type Acronym Point-to-Point IS-IS hello PDU P2P IIH Level-1 Link State PDU L1 LSP Level-2 Link State PDU L2 LSP Level-1 Complete Sequence Numbers PDU L1 CSNP Level-2 Complete Sequence Numbers PDU L2 CSNP Level-1 Partial Sequence Numbers PDU L1 PSNP Level-2 Partial Sequence Numbers PDU L2 PSNP...
  • Page 149 Priority: DIS priority. • • LAN ID: Includes the system ID and a one-byte pseudonode ID. Figure 56 shows the hello packet format on the point-to-point networks. Figure 56 P2P IIH format Instead of the priority and LAN ID fields in the LAN IIH, the P2P IIH has a Local Circuit ID field. LSP packet format The Link State PDU (LSP) carries link state information.
  • Page 150 Figure 57 L1/L2 LSP format Major fields of the L1/L2 LSP are as follows: PDU length: Total length of the PDU in bytes • Remaining lifetime: LSP remaining lifetime in seconds • LSP ID: Consists of the system ID, the pseudonode ID (one byte) and the LSP fragment number (one •...
  • Page 151 Figure 58 LSDB overload • IS type: Type of the router generating the LSP. SNP format A sequence number PDU (SNP) acknowledges the latest received LSPs. It is similar to an Acknowledge packet, but more efficient. SNP involves Complete SNP (CSNP) and Partial SNP (PSNP), which are further divided into Level- 1 CSNP, Level-2 CSNP, Level- 1 PSNP and Level-2 PSNP.
  • Page 152 Figure 60 L1/L2 PSNP format No. of Octets Intradomain routing protocol discriminator Length indicator Version/Protocol ID extension ID length PDU type Version Reserved Maximum area address PDU length Source ID ID length+1 Variable length fields The variable fields of PDU comprise multiple Code-Length-Value (CLV) triplets. Figure 61 CLV format Table 3 shows that different PDUs contain different CLVs.
  • Page 153: Supported Is-Is Features

    CLV Code Name PDU Type IP Interface Address IIH, LSP Supported IS-IS features Multiple instances and processes IS-IS supports multiple instances and processes. Multiple processes allow an IS-IS process to work in concert with a group of interfaces. A router can run multiple IS-IS processes, and each process corresponds to a unique group of interfaces.
  • Page 154 The LSP fragment extension feature allows an IS-IS router to generate more LSP fragments. Up to 50 additional virtual systems can be configured on the router, and each virtual system is capable of generating 256 LSP fragments to enable the IS-IS router to generate up to 13056 LSP fragments. Terms Originating system •...
  • Page 155: Protocols And Standards

    Dynamic host name mapping mechanism The dynamic host name mapping mechanism provides the mappings between the host names and the system IDs for the IS-IS routers. The dynamic host name information is announced in the dynamic host name CLV of an LSP. This mechanism also provides the mapping between a host name and the DIS of a broadcast network, which is announced in the dynamic host name TLV of a pseudonode LSP.
  • Page 156: Configuring Is-Is Basic Functions

    Task Remarks Configuring IS-IS link cost Optional Specifying a priority for IS-IS Required Configuring the maximum number of equal cost routes Optional Configuring IS-IS Configuring IS-IS route summarization Optional routing information Advertising a default route Optional control Configuring IS-IS route redistribution Optional Configuring IS-IS route filtering Optional...
  • Page 157: Enabling Is-Is

    Disabled by default Configuring the IS level and circuit level If only one area is available, HP recommends you to perform the following operations: Configure the IS level of all routers as Level- 1 or Level-2 rather than different levels because the •...
  • Page 158: Configuring The Network Type Of An Interface As P2P

    Configuring the network type of an interface as P2P Interfaces with different network types operate differently. For example, broadcast interfaces on a network must elect the DIS and flood CSNP packets to synchronize the LSDBs, but P2P interfaces on a network do not need to elect the DIS, and have a different LSDB synchronization mechanism.
  • Page 159 equals 40; if the interface bandwidth does not exceed 622 Mbps, the interface cost equals 30; if the interface bandwidth does not exceed 2500 Mbps, the interface cost equals 20; if the interface bandwidth exceeds 2500 Mbps, the interface cost equals 10. If none of the above costs are used, a default cost of 10 applies.
  • Page 160: Specifying A Priority For Is-Is

    To do… Use the command… Remarks Configure a bandwidth Optional reference value for automatic bandwidth-reference value 100 Mbps by default IS-IS cost calculation Specifying a priority for IS-IS A router can run multiple routing protocols. When routes to the same destination are found by multiple routing protocols, the route learned by the protocol with the highest priority can be adopted.
  • Page 161: Advertising A Default Route

    Follow these steps to configure route summarization: To do… Use the command... Remarks Enter system view system-view — isis [ process-id ] [ vpn-instance Enter IS-IS view — vpn-instance-name ] Required summary ip-address { mask | mask-length } Configure IS-IS route [ avoid-feedback | generate_null0_route | tag No route summarization is summarization...
  • Page 162: Configuring Is-Is Route Filtering

    To do… Use the command… Remarks Required import-route protocol [ process-id | No route is redistributed by all-processes | allow-ibgp ] [ cost cost | Redistribute routes from default. cost-type { external | internal } | [ level-1 | another routing protocol If no level is specified, routes are level-1-2 | level-2 ] | route-policy redistributed into the Level-2...
  • Page 163: Configuring Is-Is Route Leaking

    To do… Use the command… Remarks isis [ process-id ] [ vpn-instance Enter IS-IS view — vpn-instance-name ] filter-policy { acl-number | ip-prefix Required Configure the filtering of routes ip-prefix-name | route-policy redistributed from another routing Not configured by route-policy-name } export [ protocol protocol or IS-IS process default [ process-id ] ]...
  • Page 164: Specifying The Is-Is Hello Multiplier

    To do… Use the command… Remarks Optional Specify the interval for sending isis timer hello seconds [ level-1 | hello packets level-2 ] 10 seconds by default Specify the interval for sending Optional isis timer csnp seconds [ level-1 | CSNP packets on the DIS of a level-2 ] 10 seconds by default...
  • Page 165: Disabling An Interface From Sending Or Receiving Is-Is Packets

    Disabling an interface from sending or receiving IS-IS packets After being disabled from sending or receiving hello packets, an interface cannot form a neighbor relationship, but can advertise directly connected networks in LSPs through other interfaces. This can save bandwidth and CPU resources, and ensures other routers know networks directly connected to the interface.
  • Page 166 Specify the LSP refresh interval and generation interval Each router needs to refresh LSPs generated by itself at a configurable interval and send them to other routers to prevent valid routes from being aged out. A smaller refresh interval speeds up network convergence but consumes more bandwidth.
  • Page 167 If the IS-IS routers have different interface MTUs, HP recommends configuring the maximum size of generated LSP packets to be smaller than the smallest interface MTU in this area. If they are not, the routers must dynamically adjust the LSP packet size to fit the smallest interface MTU, which takes time and affects other services.
  • Page 168: Configuring Spf Parameters

    Configuring SPF parameters When the LSDB changes on a router, a route calculation starts. Frequent route calculations consume a lot of system resources. You can set an appropriate interval for SPF calculations to improve efficiency. Follow these steps to configure the SPF parameters: To do…...
  • Page 169: Configuring System Id To Host Name Mappings

    To do… Use the command… Remarks set-overload [ on-startup [ [ start-from-nbr system-id Required Set the overload bit [ timeout1 [ nbr-timeout ] ] ] | timeout2 ] [ allow { external Not set by default | interlevel } * ] Configuring system ID to host name mappings In IS-IS, a system ID identifies a router or host uniquely.
  • Page 170: Enabling The Logging Of Neighbor State Changes

    To do… Use the command... Remarks interface interface-type Enter interface view — interface-number Optional Not configured by default. This command takes effect only on a Configure a DIS name isis dis-name symbolic-name router with dynamic system ID to host name mapping configured. This command is not supported on P2P interfaces.
  • Page 171: Configuring Area Authentication

    To do… Use the command… Remarks Enter system view system-view — Enter interface view interface interface-type interface-number — Required Specify the authentication mode isis authentication-mode { md5 | simple } Not authentication is and password password [ level-1 | level-2 ] [ ip | osi ] configured by default.
  • Page 172: Configuring Is-Is Gr

    Configuring IS-IS GR NOTE: The IS-IS GR and IS-IS NSR features are mutually exclusive. Restarting IS-IS on a router causes network disconnections and route reconvergence. With the Graceful Restart (GR) feature, the restarting router—known as the GR Restarter—can notify the event to its GR capable neighbors.
  • Page 173: Configuring Is-Is Frr

    NSR is introduced to solve the problem. It backs up IS-IS link state information from the master device to the slave device. After a master/slave switchover, NSR can complete link state recovery and route re-generation without requiring the cooperation of other devices. Follow these steps to configure IS-IS NSR: To do…...
  • Page 174: Enabling Is-Is Snmp Trap

    Enable IS-IS • Configure IS-IS FRR to automatically calculate a backup next hop Follow these steps to configure IS-IS FRR: To do… Use the command… Remarks Enter system view system-view — Required Configure the source address of bfd echo-source-ip ip-address echo packets Not configured by default.
  • Page 175: Configuring Bfd For Is-Is

    To do… Use the command… Remarks Enter system view system-view — isis [ process-id ] [ vpn-instance Enter IS-IS view — vpn-instance-name ] Required Bind the IS-IS process with MIBs isis mib-binding process-id By default, MIBs are bound with IS-IS process 1. Configuring BFD for IS-IS Follow these steps to enable BFD on an IS-IS interface: To do…...
  • Page 176: Is-Is Configuration Examples

    To do… Use the command… Remarks display isis name-table [ process-id | vpn-instance Display the host-name-to-system-ID Available in any vpn-instance-name ] [ | { begin | exclude | mapping table view include } regular-expression ] display isis peer [ statistics | verbose ] [ process-id Available in any Display IS-IS neighbor information | vpn-instance vpn-instance-name ] [ | { begin |...
  • Page 177 Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure IS-IS. # Configure Switch A. system-view [SwitchA] isis 1 [SwitchA-isis-1] is-level level-1 [SwitchA-isis-1] network-entity 10.0000.0000.0001.00 [SwitchA-isis-1] quit [SwitchA] interface vlan-interface 100 [SwitchA-Vlan-interface100] isis enable 1 [SwitchA-Vlan-interface100] quit # Configure Switch B. ...
  • Page 178 [SwitchD-Vlan-interface300] quit Verify the configuration. # Display the IS-IS LSDB of each switch to check the LSP integrity. [SwitchA] display isis lsdb Database information for ISIS(1) -------------------------------- Level-1 Link State Database LSPID Seq Num Checksum Holdtime Length ATT/P/OL -------------------------------------------------------------------------- 0000.0000.0001.00-00* 0x00000004 0xdf5e 1096 0/0/0...
  • Page 179 0000.0000.0003.01-00* 0x00000002 0xabdb 0/0/0 *-Self LSP, +-Self LSP(Extended), ATT-Attached, P-Partition, OL-Overload Level-2 Link State Database LSPID Seq Num Checksum Holdtime Length ATT/P/OL -------------------------------------------------------------------------- 0000.0000.0003.00-00* 0x00000012 0xc93c 0/0/0 0000.0000.0004.00-00 0x00000026 0x331 1173 0/0/0 0000.0000.0004.01-00 0x00000001 0xee95 0/0/0 *-Self LSP, +-Self LSP(Extended), ATT-Attached, P-Partition, OL-Overload [SwitchD] display isis lsdb Database information for ISIS(1) --------------------------------...
  • Page 180 Route information for ISIS(1) ----------------------------- ISIS(1) IPv4 Level-1 Forwarding Table ------------------------------------- IPV4 Destination IntCost ExtCost ExitInterface NextHop Flags -------------------------------------------------------------------------- 192.168.0.0/24 NULL Vlan300 Direct D/L/- 10.1.1.0/24 NULL Vlan100 Direct D/L/- 10.1.2.0/24 NULL Vlan200 Direct D/L/- Flags: D-Direct, R-Added to RM, L-Advertised in LSPs, U-Up/Down Bit Set ISIS(1) IPv4 Level-2 Forwarding Table ------------------------------------- IPV4 Destination...
  • Page 181: Dis Election Configuration

    DIS election configuration Network requirements As shown in Figure 64, Switch A, B, C, and D reside in IS-IS area 10 on a broadcast network (Ethernet). Switch A and Switch B are Level- 1 -2 switches, Switch C is a Level- 1 switch, and Switch D is a Level-2 switch. Change the DIS priority of Switch A to make it elected as the Level- 1 -2 DIS router.
  • Page 182 [SwitchC] interface vlan-interface 100 [SwitchC-Vlan-interface100] isis enable 1 [SwitchC-Vlan-interface100] quit # Configure Switch D. system-view [SwitchD] isis 1 [SwitchD-isis-1] network-entity 10.0000.0000.0004.00 [SwitchD-isis-1] is-level level-2 [SwitchD-isis-1] quit [SwitchD] interface vlan-interface 100 [SwitchD-Vlan-interface100] isis enable 1 [SwitchD-Vlan-interface100] quit # Display information about IS-IS neighbors of Switch A. [SwitchA] display isis peer Peer information for ISIS(1) ----------------------------...
  • Page 183 IPV4.State IPV6.State Type Down 1497 L1/L2 Yes/No # Display information about IS-IS interfaces of Switch D. [SwitchD] display isis interface Interface information for ISIS(1) --------------------------------- Interface: Vlan-interface100 IPV4.State IPV6.State Type Down 1497 L1/L2 No/Yes NOTE: By using the default DIS priority, Switch C is the Level-1 DIS, and Switch D is the Level-2 DIS. The pseudonodes of Level-1 and Level-2 are 0000.0000.0003.01 and 0000.0000.0004.01, respectively.
  • Page 184 IPV4.State IPV6.State Type Down 1497 L1/L2 Yes/Yes NOTE: After the DIS priority configuration, Switch A becomes the Level-1-2 DIS, and the pseudonode is 0000.0000.0001.01. # Display information about IS-IS neighbors and interfaces of Switch C. [SwitchC] display isis peer Peer information for ISIS(1) ---------------------------- System Id: 0000.0000.0002 Interface: Vlan-interface100...
  • Page 185: Configuring Is-Is Route Redistribution

    Configuring IS-IS route redistribution Network requirements As shown in Figure 65, Switch A, Switch B, Switch C, and Switch D reside in the same AS. They use IS-IS to interconnect. Switch A and Switch B are Level- 1 routers, Switch D is a Level-2 router, and Switch C is a Level- 1 -2 router.
  • Page 186 [SwitchC-isis-1] network-entity 10.0000.0000.0003.00 [SwitchC-isis-1] quit [SwitchC] interface vlan-interface 200 [SwitchC-Vlan-interface200] isis enable 1 [SwitchC-Vlan-interface200] quit [SwitchC] interface vlan-interface 100 [SwitchC-Vlan-interface100] isis enable 1 [SwitchC-Vlan-interface100] quit [SwitchC] interface vlan-interface 300 [SwitchC-Vlan-interface300] isis enable 1 [SwitchC-Vlan-interface300] quit # Configure Switch D. system-view [SwitchD] isis 1 [SwitchD-isis-1] is-level level-2 [SwitchD-isis-1] network-entity 20.0000.0000.0004.00...
  • Page 187 10.1.1.0/24 NULL VLAN100 Direct D/L/- 10.1.2.0/24 NULL VLAN200 Direct D/L/- 192.168.0.0/24 NULL VLAN300 Direct D/L/- Flags: D-Direct, R-Added to RM, L-Advertised in LSPs, U-Up/Down Bit Set ISIS(1) IPv4 Level-2 Forwarding Table ------------------------------------- IPV4 Destination IntCost ExtCost ExitInterface NextHop Flags -------------------------------------------------------------------------- 10.1.1.0/24 NULL VLAN100...
  • Page 188: Is-Is Graceful Restart Configuration Example

    [SwitchD] isis 1 [SwitchD–isis-1] import-route rip level-2 # Display IS-IS routing information on Switch C. [SwitchC] display isis route Route information for ISIS(1) ----------------------------- ISIS(1) IPv4 Level-1 Forwarding Table ------------------------------------- IPV4 Destination IntCost ExtCost ExitInterface NextHop Flags -------------------------------------------------------------------------- 10.1.1.0/24 NULL VLAN100 Direct D/L/-...
  • Page 189 Figure 66 Network diagram for IS-IS GR configuration GR restarter Switch A Vlan-int100 10.0.0.1/24 Vlan-int100 Vlan-int100 10.0.0.2/24 10.0.0.3/24 Switch B Switch C GR helper GR helper Configuration procedure Configure IP addresses of the interfaces on each switch and configure IS-IS. Follow Figure 66 to configure the IP address and subnet mask of each interface.
  • Page 190: Is-Is Nsr Configuration Example

    T2 Timer Status: Remaining Time: 59 IS-IS(1) Level-2 Restart Status Restart Interval: 150 SA Bit Supported Total Number of Interfaces = 1 Restart Status: RESTARTING Number of LSPs Awaited: 3 T3 Timer Status: Remaining Time: 140 T2 Timer Status: Remaining Time: 59 IS-IS NSR configuration example Network requirements Switch S, Switch A, and Switch B belong to the same IS-IS routing domain as illustrated in...
  • Page 191 if routes from Switch A to the loopback interface on Switch B and from Switch B to the loopback interface on Switch A exist. # When a master/slave switchover occurs on Switch S, display IS-IS neighbors and routes on Switch A. ...
  • Page 192: Is-Is Frr Configuration Example

    Interface: vlan200 Circuit Id: 0000.0000.0001.01 State: Up HoldTime: 25s Type: L1(L1L2) PRI: 64 System Id: 0000.0000.0001 Interface: vlan200 Circuit Id: 0000.0000.0001.01 State: Up HoldTime: 27s Type: L2(L1L2) PRI: 64 display isis route Route information for ISIS(1) ----------------------------- ISIS(1) IPv4 Level-1 Forwarding Table ------------------------------------- IPV4 Destination IntCost...
  • Page 193 Figure 68 Network diagram for IS-IS FRR configuration Switch A Link B Link A Loop 0 Loop 0 1.1.1.1/32 4.4.4.4/32 Vlan-int200 Vlan-int200 13.13.13.1/24 13.13.13.2/24 Switch S Switch D Configuration procedure Configure IP addresses for the interfaces on each switch and configure IS-IS. Follow Figure 68 to configure the IP address and subnet mask of each interface on the switches.
  • Page 194 # Configure Switch D. system-view [SwitchD] bfd echo-source-ip 4.4.4.4 [SwitchD] ip ip-prefix abc index 10 permit 1.1.1.1 32 [SwitchD] route-policy frr permit node 10 [SwitchD-route-policy] if-match ip-prefix abc [SwitchD-route-policy] apply fast-reroute backup-interface vlan-interface backup-nexthop 24.24.24.2 [SwitchD-route-policy] quit [SwitchD] isis 1 [SwitchD-isis-1] fast-reroute route-policy frr [SwitchD-isis-1] quit Verify the configuration.
  • Page 195: Is-Is Authentication Configuration Example

    IS-IS authentication configuration example Network requirements As shown in Figure 69, Switch A, Switch B, Switch C and Switch D reside in the same IS-IS routing domain. Switch A, Switch B, and Switch C belong to Area 10, and Switch D belongs to Area 20. Configure relationship authentication between neighbors.
  • Page 196 [SwitchC] isis 1 [SwitchC-isis-1] network-entity 10.0000.0000.0003.00 [SwitchC-isis-1] quit [SwitchC] interface vlan-interface 200 [SwitchC-Vlan-interface200] isis enable 1 [SwitchC-Vlan-interface200] quit [SwitchC] interface vlan-interface 300 [SwitchC-Vlan-interface300] isis enable 1 [SwitchC-Vlan-interface300] quit [SwitchC] interface vlan-interface 300 [SwitchC-Vlan-interface300] isis enable 1 [SwitchC-Vlan-interface300] quit # Configure Switch D. ...
  • Page 197: Configuring Bfd For Is-Is

    [SwitchA] isis 1 [SwitchA-isis-1] area-authentication-mode md5 10Sec [SwitchA-isis-1] quit [SwitchB] isis 1 [SwitchB-isis-1] area-authentication-mode md5 10Sec [SwitchB-isis-1] quit [SwitchC] isis 1 [SwitchC-isis-1] area-authentication-mode md5 10Sec [SwitchC-isis-1] quit Configure routing domain authentication. Specify the MD5 authentication mode and password 1020Sec on Switch C and Switch D. [SwitchC] isis 1 [SwitchC-isis-1] domain-authentication-mode md5 1020Sec [SwitchC-isis-1] quit...
  • Page 198 # Configure Switch A. system-view [SwitchA] isis [SwitchA-isis-1] network-entity 10.0000.0000.0001.00 [SwitchA-isis-1] quit [SwitchA] interface vlan-interface 10 [SwitchA-Vlan-interface10] isis enable [SwitchA-Vlan-interface10] quit [SwitchA] interface vlan-interface 11 [SwitchA-Vlan-interface11] isis enable [SwitchA-Vlan-interface11] quit # Configure Switch B. system-view [SwitchB] isis [SwitchB-isis-1] network-entity 10.0000.0000.0002.00 [SwitchB-isis-1] quit [SwitchB] interface vlan-interface 10 [SwitchB-Vlan-interface10] isis enable...
  • Page 199 [SwitchB-Vlan-interface10] bfd detect-multiplier 8 [SwitchB-Vlan-interface10] return Verify the configuration. The following configurations are made on Switch A. Configurations for Switch B are similar. (Details not shown) # Display the BFD information of Switch A. display bfd session Total Session Num: 1 Init Mode: Active Session Working Under Ctrl Mode: LD/RD...
  • Page 200 #Aug 14:54:05:363 2008 SwitchA ISIS/4/ADJ_CHANGE:TrapID(1.3.6.1.2.1.138.0.17), ISIS Level-2 Adjencency IN Circuit-983041 State Change. #Aug 14:54:05:364 2008 SwitchA ISIS/4/ADJ_CHANGE:TrapID(1.3.6.1.2.1.138.0.17), ISIS Level-1 Adjencency IN Circuit-983041 State Change. %Aug 8 14:54:05:365 2008 SwitchA IFNET/4/LINK UPDOWN: Vlan-interface10 link status is DOWN %Aug 8 14:54:05:366 2008 SwitchA IFNET/4/UPDOWN: Line protocol on the interface Vlan-interface10 is DOWN %Aug 14:54:05:367...
  • Page 201: Bgp Configuration

    BGP configuration The Border Gateway Protocol (BGP) is a dynamic inter-AS Exterior Gateway Protocol. NOTE: router The term refers to both routers and Layer 3 switches, and BGP refers to BGP-4 in this document. • The 3600 v2 SI Switch Series does not support BGP. •...
  • Page 202 Keepalive • • Route-refresh They have the same header. Figure 71 BGP message header • Marker—The 16-byte field is used to delimit BGP messages. The Marker must be all ones. Length—The two-byte unsigned integer indicates the total length of the message. •...
  • Page 203 Optional parameters—Used for multiprotocol extensions and other functions. • Update The update messages are used to exchange routing information between peers. It can advertise feasible routes or remove multiple unfeasible routes. Figure 73 BGP update message format Each update message can advertise a group of feasible routes with identical attributes, and the routes are contained in the network layer reachability information (NLRI) field.
  • Page 204: Bgp Path Attributes

    Keepalive Keepalive messages are sent between peers to maintain connectivity. Its format contains only the message header. Route-refresh A route-refresh message is sent to a peer to request the specified address family routing information. Figure 75 BGP route-refresh message format AFI—Address family identifier •...
  • Page 205 Name Category CLUSTER_LIST Optional non-transitive Usage of BGP path attributes ORIGIN ORIGIN is a well-known mandatory attribute that defines the origin of routing information (how a route became a BGP route). This attribute has the following types: • IGP—Has the highest priority. Routes added to the BGP routing table using the network command have the IGP attribute.
  • Page 206 Use the AS_PATH attribute for route selection and filtering. BGP gives priority to the route with the shortest AS_PATH length, if other factors are the same. As shown in Figure 76, the BGP router in AS50 gives priority to the route passing AS40 for sending data to the destination 8.0.0.0. In some applications, you can apply a routing policy to control BGP route selection by modifying the AS_PATH length.
  • Page 207 Figure 78 MED attribute MED = 0 Router B 2.1.1.1 D = 9.0.0.0 IBGP Next_hop = 2.1.1.1 9.0.0.0 MED = 0 EBGP Router D Router A IBGP EBGP D = 9.0.0.0 IBGP Next_hop = 3.1.1.1 MED = 100 3.1.1.1 AS 10 Router C AS 20 MED = 100...
  • Page 208: Bgp Route Selection

    based on the COMMUNITY attribute values. This simplifies routing policy usage and facilitates management and maintenance. Well-known community attributes are as follows: • Internet: By default, all routes belong to the Internet community. Routes with this attribute can be advertised to all BGP peers. No_Export: After received, routes with this attribute cannot be advertised out the local AS or out the •...
  • Page 209 IGP routing protocols such as RIP and OSPF compute metrics of routes, and then implement load • balancing over routes with the same metric and to the same destination. The route selection criterion is metric. • BGP has no route computation algorithm, so it cannot implement load balancing according to metrics of routes.
  • Page 210: Ibgp And Igp Synchronization

    A BGP speaker advertises routes learned through iBGP to eBGP peers. If BGP and IGP • synchronization is disabled, those routes are advertised to eBGP peers directly. If the feature is enabled, only after IGP advertises those routes, can BGP advertise the routes to eBGP peers. •...
  • Page 211 When a route flap occurs, the routing protocol sends an update to its neighbor, and then the neighbor must recalculate routes and modify the routing table. Frequent route flaps consume large bandwidth and CPU resources, which could affect network operation. In most cases, BGP is used in complex networks, where route changes are more frequent.
  • Page 212 Besides using well-known community attributes, you can define extended community attributes by using a community list to define a routing policy. Route reflector iBGP peers must be fully meshed to maintain connectivity. If n routers exist in an AS, the number of iBGP connections is n (n- 1 )/2, and large amounts of network and CPU resources are consumed.
  • Page 213: Bgp Gr

    NOTE: After route reflection is disabled between clients, routes can still be reflected between a client and a non-client. Confederation Confederation is another method to manage growing iBGP connections in ASs. This method splits an AS into multiple sub-ASs. In each sub-AS, iBGP peers are fully meshed, and, as shown in Figure intra-confederation eBGP connections are established between sub-ASs.
  • Page 214: Mp-Bgp

    session. If neither party has the GR capability, the session established between them will not be GR capable. When a Master/Slave switchover occurs on the GR Restarter, sessions on it will go down. Then, GR-capable peers will mark all routes associated with the GR Restarter as stale. However, during the configured GR Time, they still use these routes for packet forwarding.
  • Page 215: Bgp Configuration Task List

    RFC 2439, BGP Route Flap Damping • • RFC 1997, BGP Communities Attribute RFC 2796, BGP Route Reflection • RFC 3065, Autonomous System Confederations for BGP • • RFC 4271, A Border Gateway Protocol 4 (BGP-4) RFC 5291, Outbound Route Filtering Capability for BGP-4 •...
  • Page 216: Configuring Bgp Basic Functions

    Task Remarks Configuring the BGP keepalive interval and Optional holdtime Configuring the interval for sending the same Optional update Configuring BGP soft-reset Optional Enabling the BGP ORF capability Optional Tuning and optimizing BGP networks Enabling 4-byte AS number suppression Optional Enabling quick eBGP session reestablishment Optional Enabling MD5 authentication for TCP connections...
  • Page 217: Specifying The Source Interface For Tcp Connections

    If a BGP router has multiple links to a peer, and the source interface fails, BGP must reestablish TCP connections, causing network oscillation. To enhance stability of BGP connections, HP recommends using a loopback interface as the source interface.
  • Page 218: Allowing Establishment Of Ebgp Connection To An Indirectly Connected Peer Or Peer Group

    To do… Use the command… Remarks Enter BGP view bgp as-number — Required By default, BGP uses the outbound Specify the source interface for peer { group-name | ip-address } interface of the best route to the BGP establishing TCP connections to a connect-interface interface-type peer or peer group as the source peer or peer group...
  • Page 219: Injecting A Local Network

    Injecting a local network In BGP view, you can inject a local network to allow BGP to advertise to BGP peers. The origin attribute of routes advertised in this way is IGP. You can also reference a routing policy to flexibly control route advertisement.
  • Page 220: Controlling Route Distribution And Reception

    To do… Use the command… Remarks Required import-route protocol [ { process-id Not redistributed by default Enable route redistribution from a | all-processes } [ allow-direct | The allow-direct keyword is routing protocol into BGP med med-value | route-policy available only when the specified route-policy-name ] * ] routing protocol is OSPF.
  • Page 221: Advertising A Default Route To A Peer Or Peer Group

    To do… Use the command… Remarks aggregate ip-address { mask | mask-length } Required [ as-set | attribute-policy route-policy-name | Configure manual route detail-suppressed | origin-policy Not configured by summarization route-policy-name | suppress-policy default. route-policy-name ]* Advertising a default route to a peer or peer group After this task is configured, the BGP router sends a default route with the next hop being itself to the specified peer or peer group.
  • Page 222: Enabling Bgp And Igp Route Synchronization

    To do… Use the command… Remarks filter-policy { acl-number | Required ip-prefix ip-prefix-name } export Configure at least one command. Configure the filtering of [ direct | isis process-id | ospf redistributed routes Not configured by default. process-id | rip process-id | | static ] You can configure a filtering policy as needed.
  • Page 223: Limiting Prefixes Received From A Peer Or Peer Group

    in addition to the reachability check of the next hop, the BGP router must find an active IGP route with the same destination network segment before it can advertise the iBGP route (use the display ip routing-table protocol command to check the IGP route state). Follow these steps to enable BGP and IGP synchronization: To do…...
  • Page 224: Configuring A Shortcut Route

    To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Required dampening [ half-life-reachable Configure BGP route dampening half-life-unreachable reuse suppress ceiling | Not configured by route-policy route-policy-name ] * default. Configuring a shortcut route An eBGP route received has a priority of 255, which is lower than a local route.
  • Page 225: Configuring Preferences For Bgp Routes

    Configuring preferences for BGP routes A router can run multiple routing protocols with each having a preference. If they find the same route, the route found by the routing protocol with the highest preference is selected. This task allows you to configure preferences for external, internal, and local BGP routes, and reference a routing policy to set preferences for matching routes as needed.
  • Page 226 To do… Use the command… Remarks Optional Configure the default MED value default med med-value 0 by default Enable the comparison of MED of routes from different ASs Follow these steps to enable the comparison of MED of routes from different ASs: To do…...
  • Page 227: Configuring The Next Hop Attribute

    problem. The following output is the BGP routing table on Router D after the comparison of MED of routes from each AS is enabled. Network 10.0.0.0 learned from Router B is the optimal route. Network NextHop LocPrf PrefVal Path/Ogn *>i 10.0.0.0 2.2.2.2 300e...
  • Page 228: Configuring The As-Path Attribute

    Figure 87 Next hop attribute configuration 1 If a BGP router has two peers on a common broadcast network, it does not set itself as the next hop for routes sent to an eBGP peer by default. As shown in Figure 88, Router A and Router B establish an eBGP neighbor relationship, and Router B and Router C establish an iBGP neighbor relationship.
  • Page 229 To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Optional Permit local AS number to appear in routes peer { group-name | ip-address } from a peer or peer group and specify the By default, the local AS allow-as-loop [ number ] appearance times...
  • Page 230 Figure 89 AS number substitution configuration AS 100 PE 1 PE 2 MPLS backbone EBGP_Update:10.1.1.1/32 EBGP_Update:10.1.1.1/32 VPNv4_Update:10.1.0.0/16 AS_PATH:100,100 AS_PATH:800 RD:10.1.1.1/32 AS_PATH:800 CE 1 CE 2 AS 800 AS 800 As shown in the above figure, CE 1 and CE 2 use the same AS number of 800. If AS number substitution for CE 2 is configured on PE 2, and PE 2 receives a BGP update sent from CE 1, PE 2 replaces AS number 800 as its own AS number 100.
  • Page 231: Tuning And Optimizing Bgp Networks

    To do… Use the command… Remarks Required Configure BGP to ignore the first AS number By default, BGP checks the ignore-first-as of eBGP route updates first AS number of eBGP route updates. Tuning and optimizing BGP networks Configuration prerequisites BGP connections must be created. Configuring the BGP keepalive interval and holdtime After establishing a BGP connection, two routers send keepalive messages periodically to each other to keep the connection.
  • Page 232: Configuring The Interval For Sending The Same Update

    NOTE: The maximum keepalive interval must be one third of the holdtime and no less than one second. The • holdtime is no less than three seconds unless it is set to 0. The intervals set with the peer timer command are preferred to those set with the timer command. •...
  • Page 233: Enabling The Bgp Orf Capability

    To do… Use the command… Remarks peer { group-name | ip-address } Optional Enable BGP route refresh for a peer or peer capability-advertise group Enabled by default route-refresh Configure manual soft-reset If a BGP peer does not support route-refresh, you must save updates from the peer on the local router by using the peer keep-all-routes command, and use the refresh bgp command to refresh the BGP routing table.
  • Page 234: Enabling 4-Byte As Number Suppression

    To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Required Enable BGP route refresh for a peer { group-name | ip-address } peer or peer group capability-advertise route-refresh Enabled by default. Optional By default, standard BGP ORF Enable the non-standard ORF peer { group-name | ip-address }...
  • Page 235: Enabling Quick Ebgp Session Reestablishment

    NOTE: If the peer device supports 4-byte AS numbers, do not enable the 4-byte AS number suppression function; otherwise, the BGP peer relationship cannot be established. Enabling quick eBGP session reestablishment If the router receives no keepalive messages from a BGP peer within the holdtime, it disconnects from the peer.
  • Page 236: Forbiding Session Establishment With A Peer Or Peer Group

    To do… Use the command… Remarks Optional Configure the maximum number of BGP balance number Load balancing is not routes for load balancing enabled by default. Forbiding session establishment with a peer or peer group Follow these steps to forbid session establishment with a peer or peer group: To do…...
  • Page 237 To do… Use the command… Remarks Enter BGP view bgp as-number — Create an iBGP peer group group group-name [ internal ] Required Add a peer into the iBGP peer peer ip-address group Required group group-name Configure an eBGP peer group If peers in an eBGP group belong to the same external AS, the eBGP peer group is a pure eBGP peer group;...
  • Page 238: Configuring Bgp Community

    To do… Use the command… Remarks Required The AS number can be either specified or not specified in the peer ip-address group command. If specified, the AS Add the peer into the group group-name [ as-number number must be the same as that as-number ] specified for the peer with the peer ip-address as-number as-number...
  • Page 239: Configuring A Bgp Route Reflector

    To do… Use the command… Remarks or peer group default. Advertise the extended peer { group-name | ip-address } community attribute to a advertise-ext-community peer or peer group Required Apply a routing policy to routes advertised to a peer { group-name | ip-address } Not configured by peer or peer group route-policy route-policy-name export...
  • Page 240: Configuring Bgp Gr

    Configure a BGP confederation After you split an AS into multiple sub ASs, you can configure a router in a sub AS as follows: Enable BGP and specify the AS number of the router. Specify the confederation ID. From an outsider’s perspective, the sub ASs of the confederation is a single AS, which is identified by the confederation ID.
  • Page 241: Enabling Trap

    To do… Use the command… Remarks Enable BGP and enter its view bgp as-number — Required Enable GR Capability for BGP graceful-restart Disabled by default Configure the maximum time allowed Optional graceful-restart timer restart for the peer to reestablish a BGP timer 150 seconds by default session...
  • Page 242: Configuring Bfd For Bgp

    Configuring BFD for BGP BGP maintains neighbor relationships based on the keepalive timer and holdtime timer, which are set in seconds. BGP defines that the holdtime interval must be at least three times the keepalive interval. This slows down link failure detection; once a failure occurs on a high-speed link, a large quantity of packets will be dropped.
  • Page 243: Resetting Bgp Connections

    To do… Use the command… Remarks display bgp routing-table as-path-acl Display routing information as-path-acl-number [ | { begin | exclude | include } matching the AS path ACL regular-expression ] Display BGP CIDR routing display bgp routing-table cidr [ | { begin | exclude | information include } regular-expression ] display bgp routing-table community...
  • Page 244: Clearing Bgp Information

    To do… Use the command… Remarks Reset the BGP connections to a peer group reset bgp group group-name Reset all iBGP connections reset bgp internal Reset all IPv4 unicast BGP connections reset bgp ipv4 all Clearing BGP information To do… Use the command…...
  • Page 245 system-view [SwitchB] bgp 65009 [SwitchB-bgp] router-id 2.2.2.2 [SwitchB-bgp] peer 3.3.3.3 as-number 65009 [SwitchB-bgp] peer 3.3.3.3 connect-interface loopback 0 [SwitchB-bgp] quit [SwitchB] ospf 1 [SwitchB-ospf-1] area 0 [SwitchB-ospf-1-area-0.0.0.0] network 2.2.2.2 0.0.0.0 [SwitchB-ospf-1-area-0.0.0.0] network 9.1.1.1 0.0.0.255 [SwitchB-ospf-1-area-0.0.0.0] quit [SwitchB-ospf-1] quit # Configure Switch C. ...
  • Page 246 [SwitchA-bgp] quit # Configure Switch B. [SwitchB] bgp 65009 [SwitchB-bgp] peer 3.1.1.2 as-number 65008 [SwitchB-bgp] quit # Display BGP peer information on Switch B. [SwitchB] display bgp peer BGP local router ID : 2.2.2.2 Local AS number : 65009 Total number of peers : 2 Peers in established state : 2 Peer MsgRcvd...
  • Page 247 Total Number of Routes: 1 BGP Local router ID is 3.3.3.3 Status codes: * - valid, ^ - VPNv4 best, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf...
  • Page 248: Bgp And Igp Synchronization Configuration

    Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf PrefVal Path/Ogn i 2.2.2.2/32 2.2.2.2 *>i 3.1.1.0/24 2.2.2.2 *>i 8.1.1.0/24 3.1.1.2 65008i * i 9.1.1.0/24 2.2.2.2 The output shows that the route 8.1.1.0 becomes valid with the next hop as Switch A. Verification.
  • Page 249 system-view [SwitchB] ospf 1 [SwitchB-ospf-1] area 0 [SwitchB-ospf-1-area-0.0.0.0] network 2.2.2.2 0.0.0.0 [SwitchB-ospf-1-area-0.0.0.0] network 9.1.1.0 0.0.0.255 [SwitchB-ospf-1-area-0.0.0.0] quit [SwitchB-ospf-1] quit # Configure Switch C. system-view [SwitchC] ospf 1 [SwitchC-ospf-1] import-route direct [SwitchC-ospf-1] area 0 [SwitchC-ospf-1-area-0.0.0.0] network 9.1.1.0 0.0.0.255 [SwitchC-ospf-1-area-0.0.0.0] quit [SwitchC-ospf-1] quit Configure the eBGP connection.
  • Page 250 Status codes: * - valid, ^ - VPNv4 best, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf PrefVal Path/Ogn *>...
  • Page 251: Bgp Load Balancing Configuration

    --- 8.1.1.1 ping statistics --- 5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 2/2/2 ms BGP load balancing configuration Network requirements As shown in Figure 92, all the switches run BGP. Switch A resides in AS 65008, Switch B and Switch C in AS 65009.
  • Page 252 [SwitchA-bgp] router-id 1.1.1.1 [SwitchA-bgp] peer 3.1.1.1 as-number 65009 [SwitchA-bgp] peer 3.1.2.1 as-number 65009 [SwitchA-bgp] network 8.1.1.1 24 [SwitchA-bgp] quit # Configure Switch B. system-view [SwitchB] bgp 65009 [SwitchB-bgp] router-id 2.2.2.2 [SwitchB-bgp] peer 3.1.1.2 as-number 65008 [SwitchB-bgp] peer 3.3.3.3 as-number 65009 [SwitchB-bgp] peer 3.3.3.3 connect-interface loopback 0 [SwitchB-bgp] network 9.1.1.0 255.255.255.0 [SwitchB-bgp] quit...
  • Page 253: Bgp Community Configuration

    Since Switch A has two routes to reach AS 65009, configuring load balancing over the two BGP routes on Switch A can improve link utilization. # Configure Switch A. [SwitchA] bgp 65008 [SwitchA-bgp] balance 2 [SwitchA-bgp] quit Verify the configuration. # Display the BGP routing table on Switch A.
  • Page 254 Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure eBGP. # Configure Switch A. system-view [SwitchA] bgp 10 [SwitchA-bgp] router-id 1.1.1.1 [SwitchA-bgp] peer 200.1.2.2 as-number 20 [SwitchA-bgp] network 9.1.1.0 255.255.255.0 [SwitchA-bgp] quit # Configure Switch B. system-view [SwitchB] bgp 20 [SwitchB-bgp] router-id 2.2.2.2 [SwitchB-bgp] peer 200.1.2.1 as-number 10...
  • Page 255: Bgp Route Reflector Configuration

    BGP Local router ID is 3.3.3.3 Status codes: * - valid, ^ - VPNv4 best, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf...
  • Page 256 Figure 94 Network diagram Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure BGP connections. # Configure Switch A. system-view [SwitchA] bgp 100 [SwitchA-bgp] router-id 1.1.1.1 [SwitchA-bgp] peer 192.1.1.2 as-number 200 # Inject network 1.0.0.0/8 to the BGP routing table. [SwitchA-bgp] network 1.0.0.0 [SwitchA-bgp] quit # Configure Switch B.
  • Page 257: Bgp Confederation Configuration

    # Configure Switch C. [SwitchC] bgp 200 [SwitchC-bgp] peer 193.1.1.2 reflect-client [SwitchC-bgp] peer 194.1.1.2 reflect-client [SwitchC-bgp] quit Verify the configuration. # Display the BGP routing table on Switch B. [SwitchB] display bgp routing-table Total Number of Routes: 1 BGP Local router ID is 200.1.2.2 Status codes: * - valid, ^ - VPNv4 best, >...
  • Page 258 Figure 95 Network diagram Switch C Switch B Switch F Vlan-int600 Vlan-int300 Vlan-int200 AS 65002 AS 65003 Vlan-int100 Switch D AS 100 Vlan-int100 Vlan-int400 Vlan-int400 Switch A Vlan-int200 Vlan-int500 AS 65001 Vlan-int200 Vlan-int500 Switch E AS 200 Device Interface IP address Device Interface IP address...
  • Page 259 system-view [SwitchC] bgp 65003 [SwitchC-bgp] router-id 3.3.3.3 [SwitchC-bgp] confederation id 200 [SwitchC-bgp] confederation peer-as 65001 65002 [SwitchC-bgp] peer 10.1.2.1 as-number 65001 [SwitchC-bgp] quit Configure iBGP connections in AS65001. # Configure Switch A. [SwitchA] bgp 65001 [SwitchA-bgp] peer 10.1.3.2 as-number 65001 [SwitchA-bgp] peer 10.1.3.2 next-hop-local [SwitchA-bgp] peer 10.1.4.2 as-number 65001 [SwitchA-bgp] peer 10.1.4.2 next-hop-local...
  • Page 260 Total Number of Routes: 1 BGP Local router ID is 2.2.2.2 Status codes: * - valid, ^ - VPNv4 best, > - best, d - damped, h - history, i - internal, s - suppressed, S - Stale Origin : i - IGP, e - EGP, ? - incomplete Network NextHop LocPrf...
  • Page 261: Bgp Path Selection Configuration

    Origin : igp Attribute value : MED 0, localpref 100, pref-val 0, pre 255 State : valid, internal, best, Not advertised to any peers yet The output information shows the following: • Switch F can send route information to Switch B and Switch C through the confederation by establishing only an eBGP connection with Switch A.
  • Page 262 [SwitchB-ospf-1-area-0.0.0.0] quit [SwitchB-ospf-1] quit # Configure Switch C. system-view [SwitchC] ospf [SwitchC-ospf] area 0 [SwitchC-ospf-1-area-0.0.0.0] network 193.1.1.0 0.0.0.255 [SwitchC-ospf-1-area-0.0.0.0] network 195.1.1.0 0.0.0.255 [SwitchC-ospf-1-area-0.0.0.0] quit [SwitchC-ospf-1] quit # Configure Switch D. system-view [SwitchD] ospf [SwitchD-ospf] area 0 [SwitchD-ospf-1-area-0.0.0.0] network 194.1.1.0 0.0.0.255 [SwitchD-ospf-1-area-0.0.0.0] network 195.1.1.0 0.0.0.255 [SwitchD-ospf-1-area-0.0.0.0] quit [SwitchD-ospf-1] quit...
  • Page 263 Method I: Configure a higher MED value for the route 1.0.0.0/8 advertised from Switch A to peer • 192.1.1.2. # Define an ACL numbered 2000 to permit route 1.0.0.0/8. [SwitchA] acl number 2000 [SwitchA-acl-basic-2000] rule permit source 1.0.0.0 0.255.255.255 [SwitchA-acl-basic-2000] quit # Define two routing policies, apply_med_50, which sets the MED for route 1.0.0.0/8 to 50, and apply_med_100, which sets the MED for route 1.0.0.0/8 to 100.
  • Page 264: Bgp Gr Configuration

    [SwitchC-route-policy] apply local-preference 200 [SwitchC-route-policy] quit # Apply routing policy localpref to routes from peer 193.1.1.1. [SwitchC] bgp 200 [SwitchC-bgp] peer 193.1.1.1 route-policy localpref import [SwitchC-bgp] quit # Display the routing table on Switch D. [SwitchD] display bgp routing-table Total Number of Routes: 2 BGP Local router ID is 194.1.1.1 Status codes: * - valid, ^ - VPNv4 best, >...
  • Page 265: Configuring Bfd For Bgp

    # Inject network 8.0.0.0/8 to the BGP routing table. [SwitchA-bgp] network 8.0.0.0 # Enable GR capability for BGP. [SwitchA-bgp] graceful-restart Configure Switch B. # Configure IP addresses for interfaces. (Details not shown) # Configure the eBGP connection. system-view [SwitchB] bgp 65009 [SwitchB-bgp] router-id 2.2.2.2 [SwitchB-bgp] peer 200.1.1.2 as-number 65008 # Configure the iBGP connection.
  • Page 266 Figure 98 Network diagram Device Interface IP address Device Interface IP address Switch A Vlan-int100 3.0.1.1/24 Switch C Vlan-int101 3.0.2.2/24 Vlan-int200 2.0.1.1/24 Vlan-int201 2.0.2.2/24 Switch B Vlan-int100 3.0.1.2/24 Switch D Vlan-int200 2.0.1.2/24 Vlan-int101 3.0.2.1/24 Vlan-int201 2.0.2.1/24 Configuration procedure Configure IP addresses for interfaces. (Details not shown) Configure OSPF to make sure that Switch A and Switch C are reachable to each other.
  • Page 267 [SwitchA-route-policy] quit [SwitchA] route-policy apply_med_100 permit node 10 [SwitchA-route-policy] if-match acl 2000 [SwitchA-route-policy] apply cost 100 [SwitchA-route-policy] quit Apply routing policy apply_med_50 to routes outgoing to peer 3.0.2.2, and apply routing policy • apply_med_100 to routes outgoing to peer 2.0.2.2. [SwitchA] bgp 100 [SwitchA-bgp] peer 3.0.2.2 route-policy apply_med_50 export [SwitchA-bgp] peer 2.0.2.2 route-policy apply_med_100 export...
  • Page 268 The following operations are made on Switch C. Operations on Switch A are similar. (Details not shown) # Display detailed BFD session information. display bfd session verbose Total Session Num: 1 Init Mode: Active IP Session Working Under Ctrl Mode: Local Discr: 17 Remote Discr: 13 Source IP: 3.0.2.2...
  • Page 269 Destination: 1.1.1.0/24 Protocol: BGP Process ID: 0 Preference: 0 Cost: 100 NextHop: 2.0.1.1 Interface: Vlan-interface201 BkNextHop: 0.0.0.0 BkInterface: RelyNextHop: 2.0.2.1 Neighbor : 2.0.1.1 Tunnel ID: 0x0 Label: NULL State: Invalid Adv Age: 00h08m54s Tag: 0 The output shows that Switch C has two routes to reach network 1.1.1.0/24: Switch C<—>Switch B<—>Switch A, which is the active route;...
  • Page 270: Troubleshooting Bgp

    Troubleshooting BGP BGP peer relationship not established Symptom Display BGP peer information by using the display bgp peer command. The state of the connection to a peer cannot become established. Analysis To become BGP peers, any two routers must establish a TCP session using port 179 and exchange Open messages successfully.
  • Page 271: Ipv6 Static Routing Configuration

    IPv6 static routing configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. Introduction to IPv6 static routing Static routes are manually configured. They work well in simple networks. Proper configuration and use can improve network performance and ensure enough bandwidth for important applications. However, static routes also have limitations.
  • Page 272: Displaying And Maintaining Ipv6 Static Routes

    To do… Use the commands… Remarks Required ipv6 route-static ipv6-address prefix-length { interface-type interface-number The default Configure an IPv6 static route [ next-hop-address ] | next-hop-address } preference of IPv6 [ preference preference-value ] static routes is 60. NOTE: If you specify a broadcast interface, such as an Ethernet interface or a VLAN interface, as the output interface for a static route, you must specify the next hop address.
  • Page 273 Figure 99 Network diagram Configuration procedure Configure the IPv6 addresses for all VLAN interfaces. (Details not shown) Configure IPv6 static routes. # Configure a default IPv6 static route on Switch A. system-view [SwitchA] ipv6 [SwitchA] ipv6 route-static :: 0 4::2 # Configure two IPv6 static routes on Switch B.
  • Page 274 Interface : InLoop0 Cost Destination : 1::/64 Protocol : Direct NextHop : 1::1 Preference Interface : Vlan-interface100 Cost Destination : 1::1/128 Protocol : Direct NextHop : ::1 Preference Interface : InLoop0 Cost Destination : FE80::/10 Protocol : Direct NextHop : :: Preference Interface : NULL0...
  • Page 275: Ripng Configuration

    RIPng configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. Introduction to RIPng RIP next generation (RIPng) is an extension of RIP-2 for IPv4. Most RIP concepts are applicable in RIPng. RIPng for IPv6 has the following basic differences from RIP: UDP port number—RIPng uses UDP port 521 for sending and receiving routing information •...
  • Page 276: Ripng Packet Format

    RIPng packet format Basic format A RIPng packet consists of a header and multiple route table entries (RTEs). The maximum number of RTEs in a packet depends on the IPv6 MTU of the sending interface. Figure 100 RIPng basic packet format Packet header description: Command: Type of message.
  • Page 277: Ripng Packet Processing Procedure

    RIPng packet processing procedure Request packet When a RIPng router first starts or needs to update entries in its routing table, usually a multicast request packet is sent to ask for needed routes from neighbors. The receiving RIPng router processes RTEs in the request. If only one RTE exists with the IPv6 prefix and prefix length both being 0, and with a metric value of 16, the RIPng router will respond with the entire routing table information in response messages.
  • Page 278: Configuring Ripng Basic Functions

    Configuring RIPng basic functions This section presents the information to configure the basic RIPng features. You must enable RIPng first before configuring other tasks, but it is not necessary for RIPng-related interface configurations, such as assigning an IPv6 address. Configuration prerequisites Before configuring RIPng basic functions, complete the following tasks: •...
  • Page 279: Configuring An Additional Routing Metric

    Define an IPv6 address prefix list before using it for route filtering. See the chapter “Routing policy • configuration” for related information. Configuring an additional routing metric An additional routing metric can be added to the metric of an inbound or outbound RIP route. The outbound additional metric is added to the metric of a sent route.
  • Page 280: Configuring A Ripng Route Filtering Policy

    Configuring a RIPng route filtering policy Reference a configured IPv6 ACL or prefix list to filter received or advertised routing information. You can also filter outbound routes redistributed from a routing specific routing protocol. Follow these steps to configure a RIPng route filtering policy: To do…...
  • Page 281: Tuning And Optimizing The Ripng Network

    Tuning and optimizing the RIPng network This section describes how to tune and optimize the performance of the RIPng network, as well as applications under special network environments. Before tuning and optimizing the RIPng network, complete the following tasks: Configure a network layer address for each interface •...
  • Page 282: Configuring Zero Field Check On Ripng Packets

    NOTE: HP recommends enabling split horizon to prevent routing loops. Configuring the poison reverse function The poison reverse function enables a route learned from an interface to be advertised through the interface. However, the metric of the route is set to 16 (unreachable).
  • Page 283: Applying Ipsec Policies For Ripng

    Applying IPsec policies for RIPng To protect routing information and defend attacks, RIPng supports using an IPsec policy to authenticate protocol packets. Outbound RIPng packets carry the Security Parameter Index (SPI) defined in the relevant IPsec policy. A device uses the SPI carried in a received packet to match against the configured IPsec policy. If they match, the device accepts the packet;...
  • Page 284: Displaying And Maintaining Ripng

    Displaying and maintaining RIPng To do… Use the command… Remarks display ripng [ process-id ] [ | Display configuration information { begin | exclude | include } Available in any view of a RIPng process regular-expression ] display ripng process-id database Display routes in the RIPng [ | { begin | exclude | include } Available in any view...
  • Page 285 [SwitchA] interface vlan-interface 400 [SwitchA-Vlan-interface400] ripng 1 enable [SwitchA-Vlan-interface400] quit # Configure Switch B. system-view [SwitchB] ripng 1 [SwitchB-ripng-1] quit [SwitchB] interface vlan-interface 200 [SwitchB-Vlan-interface200] ripng 1 enable [SwitchB-Vlan-interface200] quit [SwitchB] interface vlan-interface 100 [SwitchB-Vlan-interface100] ripng 1 enable [SwitchB-Vlan-interface100] quit # Configure Switch C.
  • Page 286 ---------------------------------------------------------------- Peer FE80::200:2FF:FE64:8904 on Vlan-interface100 Dest 1::/64, via FE80::200:2FF:FE64:8904, cost 1, tag 0, A, 31 Sec Dest 4::/64, via FE80::200:2FF:FE64:8904, cost 2, tag 0, A, 31 Sec Dest 5::/64, via FE80::200:2FF:FE64:8904, cost 2, tag 0, A, 31 Sec Dest 3::/64, via FE80::200:2FF:FE64:8904, cost 1, tag 0, A, 31 Sec Configure Switch B to filter incoming and outgoing routes.
  • Page 287: Configuring Ripng Route Redistribution

    Configuring RIPng route redistribution Network requirements Two RIPng processes are running on Switch B, which communicates with Switch A through RIPng 100 and with Switch C through RIPng 200. Configure route redistribution on Switch B, letting the two RIPng processes redistribute routes from each other.
  • Page 288 [SwitchC-Vlan-interface300] quit [SwitchC] interface vlan-interface 400 [SwitchC-Vlan-interface400] ripng 200 enable [SwitchC-Vlan-interface400] quit # Display the routing table of Switch A. [SwitchA] display ipv6 routing-table Routing Table : Destinations : 6 Routes : 6 Destination: ::1/128 Protocol : Direct NextHop : ::1 Preference: 0 Interface : InLoop0...
  • Page 289: Configuring Ripng Ipsec Policies

    NextHop : ::1 Preference: 0 Interface : InLoop0 Cost Destination: 1::/64 Protocol : Direct NextHop : 1::1 Preference: 0 Interface : Vlan100 Cost Destination: 1::1/128 Protocol : Direct NextHop : ::1 Preference: 0 Interface : InLoop0 Cost Destination: 2::/64 Protocol : Direct NextHop : 2::1...
  • Page 290 [SwitchA-Vlan-interface100] quit # Configure Switch B. system-view [SwitchB] ripng 1 [SwitchB-ripng-1] quit [SwitchB] interface vlan-interface 200 [SwitchB-Vlan-interface200] ripng 1 enable [SwitchB-Vlan-interface200] quit [SwitchB] interface vlan-interface 100 [SwitchB-Vlan-interface100] ripng 1 enable [SwitchB-Vlan-interface100] quit # Configure Switch C. system-view [SwitchC] ripng 1 [SwitchC-ripng-1] quit [SwitchC] interface vlan-interface 200 [SwitchC-Vlan-interface200] ripng 1 enable...
  • Page 291 [SwitchB-ipsec-proposal-tran1] quit [SwitchB] ipsec policy policy001 10 manual [SwitchB-ipsec-policy-manual-policy001-10] proposal tran1 [SwitchB-ipsec-policy-manual-policy001-10] sa spi outbound esp 12345 [SwitchB-ipsec-policy-manual-policy001-10] sa spi inbound esp 12345 [SwitchB-ipsec-policy-manual-policy001-10] sa string-key outbound esp abcdefg [SwitchB-ipsec-policy-manual-policy001-10] sa string-key inbound esp abcdefg [SwitchB-ipsec-policy-manual-policy001-10] quit # On Switch C, create an IPsec proposal named tran1, and set the encapsulation mode to transport mode, the security protocol to ESP, the encryption algorithm to DES, and authentication algorithm to SHA1;...
  • Page 292: Ospfv3 Configuration

    OSPFv3 configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. • The 3600 v2 SI Switch Series does not support OSPFv3. • Introduction to OSPFv3 OSPFv3 overview Open Shortest Path First version 3 (OSPFv3) supports IPv6 and complies with RFC 2740 (OSPF for IPv6). OSPFv3 and OSPFv2 have the following similarities: 32-bits router ID and area ID •...
  • Page 293: Ospfv3 Lsa Types

    Packet length—Packet length in bytes, including header. • • Instance ID—Instance ID for a link. 0—Reserved. It must be 0. • OSPFv3 LSA types OSPFv3 sends routing information in LSAs, which, as defined in RFC 2740, have the following types: Router-LSA—Originated by all routers.
  • Page 294: Ospfv3 Features Supported

    After sending an LSA to its adjacency, a router waits for an acknowledgment from the adjacency. If no response is received after the retransmission interval elapses, the router will send the LSA again. The retransmission interval must be longer than the round-trip time of the LSA. LSA delay time Each LSA has an age in the local LSDB (incremented by one per second), but an LSA does not age on transmission.
  • Page 295: Enabling Ospfv3

    Task Remarks Configuring an OSPFv3 cost for an interface Optional Configuring the maximum number of OSPFv3 Optional load-balanced routes Configuring a priority for OSPFv3 Optional Configuring OSPFv3 route redistribution Optional Configuring OSPFv3 timers Optional Configuring a DR priority for an interface Optional Tuning and optimizing OSPFv3 Ignoring MTU check for DD packets...
  • Page 296: Configuring Ospfv3 Area Parameters

    To do… Use the command… Remarks Specify a router ID router-id router-id Required interface interface-type Enter interface view — interface-number Required Enable an OSPFv3 process on the ospfv3 process-id area area-id interface [ instance instance-id ] Not enabled by default Configuring OSPFv3 area parameters The stub area and virtual link features of OSPFv3 are the same as OSPFv2.
  • Page 297: Configuring An Ospfv3 Virtual Link

    NOTE: You cannot remove an OSPFv3 area directly. The area can be removed only when you remove all • configurations in area view and all interfaces attached to the area become down. All the routers attached to a stub area must be configured with the stub command. The keyword •...
  • Page 298: Configuration Prerequisites

    Configuration prerequisites Before configuring OSPFv3 network types, complete the following tasks: Configure IPv6 functions • Configure OSPFv3 basic functions • Configuring the OSPFv3 network type for an interface Follow these steps to configure the OSPFv3 network type for an interface: To do…...
  • Page 299: Configuring Ospfv3 Route Summarization

    Configuring OSPFv3 route summarization If contiguous network segments exist in an area, use the abr-summary command to summarize them into one network segment on the ABR. The ABR will advertise only the summary route. Any LSA in the specified network segment will not be advertised, reducing the LSDB size in other areas. Follow these steps to configure route summarization: To do…...
  • Page 300: Configuring The Maximum Number Of Ospfv3 Load-Balanced Routes

    To do… Use the command… Remarks Enter system view system-view — interface interface-type Enter interface view — interface-number Optional The default cost depends on the interface type: Configure an OSPFv3 cost ospfv3 cost value [ instance 1 for a VLAN interface; 0 for a loopback for the interface instance-id ] interface;...
  • Page 301: Configuring Ospfv3 Route Redistribution

    Configuring OSPFv3 route redistribution Follow these steps to configure OSPFv3 route redistribution: To do… Use the command… Remarks Enter system view system-view — Enter OSPFv3 view ospfv3 [ process-id ] — Optional Specify a default cost for default cost value redistributed routes Defaults to 1 Required...
  • Page 302: Configuration Prerequisites

    Configuration prerequisites Before tuning and optimizing OSPFv3 networks, complete the following tasks: Enable IPv6 packet forwarding • Configure OSPFv3 basic functions • Configuring OSPFv3 timers Follow these steps to configure OSPFv3 timers: To do… Use the command… Remarks Enter system view system-view —...
  • Page 303: Configuring A Dr Priority For An Interface

    Configuring a DR priority for an interface Follow these steps to configure a DR priority for an interface: To do… Use the command… Remarks Enter system view system-view — Enter interface view interface interface-type interface-number — Optional Configure a DR priority ospfv3 dr-priority priority [ instance instance-id ] Defaults to 1 NOTE:...
  • Page 304: Enable The Logging Of Neighbor State Changes

    Enable the logging of neighbor state changes Follow these steps to enable the logging of neighbor state changes: To do… Use the command… Remarks Enter system view system-view — Enter OSPFv3 view ospfv3 [ process-id ] — Required Enable the logging of neighbor log-peer-change state changes Enabled by default...
  • Page 305: Configuring Gr Helper

    Configuring GR Helper You can configure the GR Helper capability on a GR Helper. Follow these steps to configure GR Helper To do… Use the command… Remarks Enter system view system-view — Enter OSPFv3 view ospfv3 [ process-id ] — Optional Enable the GR Helper graceful-restart helper enable...
  • Page 306: Applying Ipsec Policies For Ospfv3

    Applying IPsec policies for OSPFv3 To protect routing information and defend attacks, OSPFv3 can authenticate protocol packets by using an IPsec policy. Outbound OSPFv3 packets carry the Security Parameter Index (SPI) defined in the relevant IPsec policy. A device uses the SPI carried in a received packet to match against the configured IPsec policy. If they match, the device accepts the packet;...
  • Page 307: Displaying And Maintaining Ospfv3

    To do… Use the command… Remarks Enter system view — system-view Enter OSPFv3 view ospfv3 [ process-id ] — Enter OSPF area view area area-id — vlink-peer router-id [ hello seconds | Required Apply an IPsec policy on a retransmit seconds | trans-delay seconds virtual link | dead seconds | instance instance-id | Not configured by default...
  • Page 308: Ospfv3 Configuration Examples

    To do… Use the command… Remarks display ospfv3 [ process-id ] request-list [ { external | inter-prefix | inter-router | intra-prefix | link | network Display OSPFv3 link state request | router | grace } [ link-state-id ] [ originate-router list information ip-address ] | statistics ] [ | { begin | exclude | include } regular-expression ]...
  • Page 309 [SwitchA-ospfv3-1] router-id 1.1.1.1 [SwitchA-ospfv3-1] quit [SwitchA] interface vlan-interface 300 [SwitchA-Vlan-interface300] ospfv3 1 area 1 [SwitchA-Vlan-interface300] quit [SwitchA] interface vlan-interface 200 [SwitchA-Vlan-interface200] ospfv3 1 area 1 [SwitchA-Vlan-interface200] quit # Configure Switch B. system-view [SwitchB] ipv6 [SwitchB] ospfv3 [SwitchB-ospf-1] router-id 2.2.2.2 [SwitchB-ospf-1] quit [SwitchB] interface vlan-interface 100 [SwitchB-Vlan-interface100] ospfv3 1 area 0...
  • Page 310 3.3.3.3 Full/DR 00:00:39 Vlan100 OSPFv3 Area ID 0.0.0.1 (Process 1) ---------------------------------------------------------------------- Neighbor ID State Dead Time Interface Instance ID 1.1.1.1 Full/Backup 00:00:38 Vlan200 # Display OSPFv3 neighbor information on Switch C. [SwitchC] display ospfv3 peer OSPFv3 Area ID 0.0.0.0 (Process 1) ---------------------------------------------------------------------- Neighbor ID State...
  • Page 311 [SwitchC-ospfv3-1] area 2 [SwitchC-ospfv3-1-area-0.0.0.2] stub [SwitchC-ospfv3-1-area-0.0.0.2] default-cost 10 # Display OSPFv3 routing table information on Switch D. A default route is added, and its cost is the cost of a direct route plus the configured cost. [SwitchD] display ospfv3 routing E1 - Type 1 external route, IA - Inter area route, - Intra area route...
  • Page 312: Configuring Ospfv3 Dr Election

    NextHop : directly-connected Interface: Vlan400 Configuring OSPFv3 DR election Network requirements As shown in Figure 108: • The priority of Switch A is 100, the highest priority on the network, so it will be the DR. The priority of Switch C is 2, the second highest priority on the network, so it will be the BDR. •...
  • Page 313 # Configure Switch C. system-view [SwitchC] ipv6 [SwitchC] ospfv3 [SwitchC-ospfv3-1] router-id 3.3.3.3 [SwitchC-ospfv3-1] quit [SwitchC] interface vlan-interface 100 [SwitchC-Vlan-interface100] ospfv3 1 area 0 [SwitchC-Vlan-interface100] quit # Configure Switch D. system-view [SwitchD] ipv6 [SwitchD] ospfv3 [SwitchD-ospfv3-1] router-id 4.4.4.4 [SwitchD-ospfv3-1] quit [SwitchD] interface vlan-interface 200 [SwitchD-Vlan-interface200] ospfv3 1 area 0 [SwitchD-Vlan-interface200] quit...
  • Page 314: Configuring Ospfv3 Route Redistribution

    [SwitchC-Vlan-interface100] ospfv3 dr-priority 2 [SwitchC-Vlan-interface100] quit # Display neighbor information on Switch A. DR priorities have been updated, but the DR and BDR are not changed. [SwitchA] display ospfv3 peer OSPFv3 Area ID 0.0.0.0 (Process 1) ---------------------------------------------------------------------- Neighbor ID State Dead Time Interface Instance ID...
  • Page 315 Configure OSPFv3 process 2 to redistribute direct routes and the routes from OSPFv3 process 1 on Switch B and set the default metric for redistributed routes to 3. Then, Switch C can learn the routes destined for 1::0/64 and 2::0/64, and Switch A cannot learn the routes destined for 3::0/64 or 4::0/64.
  • Page 316 system-view [SwitchC] ipv6 [SwitchC] ospfv3 2 [SwitchC-ospfv3-2] router-id 4.4.4.4 [SwitchC-ospfv3-2] quit [SwitchC] interface vlan-interface 300 [SwitchC-Vlan-interface300] ospfv3 2 area 2 [SwitchC-Vlan-interface300] quit [SwitchC] interface vlan-interface 400 [SwitchC-Vlan-interface400] ospfv3 2 area 2 [SwitchC-Vlan-interface400] quit # Display the routing table of Switch C. [SwitchC] display ipv6 routing-table Routing Table : Destinations : 6...
  • Page 317: Configuring Ospfv3 Gr

    # Display the routing table of Switch C. [SwitchC] display ipv6 routing-table Routing Table : Destinations : 8 Routes : 8 Destination: ::1/128 Protocol : Direct NextHop : ::1 Preference: 0 Interface : InLoop0 Cost Destination: 1::/64 Protocol : OSPFv3 NextHop : FE80::200:CFF:FE01:1C03 Preference: 150...
  • Page 318 Figure 110 Network diagram Configuration procedure Configure IPv6 addresses for interfaces. (Details not shown) Configure OSPFv3 basic functions. # On Switch A, enable OSPFv3 process 1, enable GR, and set the router ID to 1.1.1.1. system-view [SwitchA] ipv6 [SwitchA] ospfv3 1 [SwitchA-ospfv3-1] router-id 1.1.1.1 [SwitchA-ospfv3-1] graceful-restart enable [SwitchA-ospfv3-1] quit...
  • Page 319: Configuring Bfd For Ospfv3

    After all switches function properly, perform a master/slave switchover on Switch A to trigger an OSPFv3 GR operation. Configuring BFD for OSPFv3 Network requirements Figure 1 1 1, configure OSPFv3 on Switch A, Switch B and Switch C and configure BFD over the link Switch A<—>L2 Switch<—>Switch B.
  • Page 320 [SwitchB] ospfv3 [SwitchB-ospf-1] router-id 2.2.2.2 [SwitchB-ospf-1] quit [SwitchB] interface vlan-interface 10 [SwitchB-Vlan-interface10] ospfv3 1 area 0 [SwitchB-Vlan-interface10] quit [SwitchB] interface vlan-interface 13 [SwitchB-Vlan-interface13] ospfv3 1 area 0 [SwitchB-Vlan-interface13] quit # Configure Switch C. Enable OSPFv3 and configure the router ID as 3.3.3.3. ...
  • Page 321 Local Discr: 1441 Remote Discr: 1450 Source IP: FE80::20F:FF:FE00:1202 (link-local address of VLAN-interface 10 on Switch A) Destination IP: FE80::20F:FF:FE00:1200 (link-local address of VLAN-interface 10 on Switch B) Session State: Up Interface: Vlan10 Hold Time: # Display routes to 2001:4::0/64 on Switch A, and you can see that Switch A communicates with Switch B through the Layer 2 switch.
  • Page 322: Configuring Ospfv3 Ipsec Policies

    # Display the BFD information of Switch A. You can see that Switch A has removed its neighbor relationship with Switch B and therefore no information is output. display bfd session # Display routes to 2001:4::0/64 on Switch A, and you can see that Switch A communicates with Switch B through Switch C.
  • Page 323 [SwitchA-ospfv3-1] quit [SwitchA] interface vlan-interface 200 [SwitchA-Vlan-interface200] ospfv3 1 area 1 [SwitchA-Vlan-interface200] quit # Configure Switch B: enable OSPFv3 and configure the router ID as 2.2.2.2. system-view [SwitchB] ipv6 [SwitchB] ospfv3 1 [SwitchB-ospfv3-1] router-id 2.2.2.2 [SwitchB-ospfv3-1] quit [SwitchB] interface vlan-interface 100 [SwitchB-Vlan-interface100] ospfv3 1 area 0 [SwitchB-Vlan-interface100] quit [SwitchB] interface vlan-interface 200...
  • Page 324 tran1, set the SPIs of the inbound and outbound SAs to 12345, and the keys for the inbound and outbound SAs using ESP to abcdefg; create an IPsec proposal named tran2, and set the encapsulation mode to transport mode, the security protocol to ESP, the encryption algorithm to DES, and authentication algorithm to SHA1;...
  • Page 325: Troubleshooting Ospfv3 Configuration

    [SwitchC-ipsec-policy-manual-policy002-10] quit Apply the IPsec policies in areas. # Configure Switch A. [SwitchA] ospfv3 1 [SwitchA-ospfv3-1] area 1 [SwitchA-ospfv3-1-area-0.0.0.1] enable ipsec-policy policy001 [SwitchA-ospfv3-1-area-0.0.0.1] quit [SwitchA-ospfv3-1] quit # Configure Switch B. [SwitchB] ospfv3 1 [SwitchB-ospfv3-1] area 0 [SwitchB-ospfv3-1-area-0.0.0.0] enable ipsec-policy policy002 [SwitchB-ospfv3-1-area-0.0.0.0] quit [SwitchB-ospfv3-1] area 1 [SwitchB-ospfv3-1-area-0.0.0.1] enable ipsec-policy policy001...
  • Page 326: Incorrect Routing Information

    Incorrect routing information Symptom OSPFv3 cannot find routes to other areas. Analysis The backbone area must maintain connectivity to all other areas. If a router connects to more than one area, at least one area must be connected to the backbone. The backbone cannot be configured as a stub area.
  • Page 327: Ipv6 Is-Is Configuration

    IPv6 IS-IS configuration NOTE: IPv6 IS-IS supports all IPv4 IS-IS features, but advertises IPv6 routing information. This document • describes only IPv6 IS-IS exclusive configuration tasks. For other configuration tasks, see the chapter “IS-IS configuration.” router The term in this document refers to both routers and Layer 3 switches. •...
  • Page 328: Configuring Ipv6 Is-Is Routing Information Control

    To do… Use command to… Remarks Enter system view –– system-view Required Enable an IS-IS process and enter isis [ process-id ] IS-IS view Not enabled by default Required Configure the network entity title network-entity net for the IS-IS process Not configured by default Required Enable IPv6 for the IS-IS process...
  • Page 329: Configuring Bfd For Ipv6 Is-Is

    To do… Use command to… Remarks Optional Configure the maximum number of redistributed Level 1/Level 2 ipv6 import-route limit number The default varies with IPv6 routes devices. ipv6 filter-policy { acl6-number | ipv6-prefix Optional Configure the filtering of ipv6-prefix-name | route-policy Not configured by outgoing redistributed routes route-policy-name } export [ protocol...
  • Page 330: Displaying And Maintaining Ipv6 Is-Is

    NOTE: High Availability Configuration Guide For more information about BFD, see Displaying and maintaining IPv6 IS-IS To do… Use the command… Remarks display isis brief [ | { begin | exclude | Display brief IPv6 IS-IS information Available in any view include } regular-expression ] display isis debug-switches process-id [ | Display the status of the debug...
  • Page 331: Ipv6 Is-Is Configuration Examples

    IPv6 IS-IS configuration examples IPv6 IS-IS basic configuration example Network requirements As shown in Figure 1 13, Switch A, Switch B, Switch C, and Switch D reside in the same autonomous system, and all are enabled with IPv6. Switch A and Switch B are Level- 1 switches, Switch D is a Level-2 switch, and Switch C is a Level- 1 -2 switch. Switch A, Switch B, and Switch C are in area 10, and Switch D is in area 20.
  • Page 332 [SwitchB] interface vlan-interface 200 [SwitchB-Vlan-interface200] isis ipv6 enable 1 [SwitchB-Vlan-interface200] quit # Configure Switch C. system-view [SwitchC] ipv6 [SwitchC] isis 1 [SwitchC-isis-1] network-entity 10.0000.0000.0003.00 [SwitchC-isis-1] ipv6 enable [SwitchC-isis-1] quit [SwitchC] interface vlan-interface 100 [SwitchC-Vlan-interface100] isis ipv6 enable 1 [SwitchC-Vlan-interface100] quit [SwitchC] interface vlan-interface 200 [SwitchC-Vlan-interface200] isis ipv6 enable 1 [SwitchC-Vlan-interface200] quit...
  • Page 333 Flag : D/L/- Cost : 10 Next Hop : Direct Interface: Vlan100 Destination: 2001:2:: PrefixLen: 64 Flag : R/-/- Cost : 20 Next Hop : FE80::200:FF:FE0F:4 Interface: Vlan100 Destination: 2001:3:: PrefixLen: 64 Flag : R/-/- Cost : 20 Next Hop : FE80::200:FF:FE0F:4 Interface: Vlan100 Flags: D-Direct, R-Added to RM, L-Advertised in LSPs, U-Up/Down Bit Set...
  • Page 334 Destination: 2001:2:: PrefixLen: 64 Flag : D/L/- Cost : 10 Next Hop : Direct Interface: Vlan200 Destination: 2001:3:: PrefixLen: 64 Flag : D/L/- Cost : 10 Next Hop : Direct Interface: Vlan300 Flags: D-Direct, R-Added to RM, L-Advertised in LSPs, U-Up/Down Bit Set ISIS(1) IPv6 Level-2 Forwarding Table ------------------------------------- Destination: 2001:1::...
  • Page 335: Configuring Bfd For Ipv6 Is-Is

    Flag : D/L/- Cost : 10 Next Hop : Direct Interface: Vlan300 Destination: 2001:4::1 PrefixLen: 128 Flag : D/L/- Cost Next Hop : Direct Interface: Loop1 Flags: D-Direct, R-Added to RM, L-Advertised in LSPs, U-Up/Down Bit Set Configuring BFD for IPv6 IS-IS Network requirements As shown in Figure 1...
  • Page 336 [SwitchA-Vlan-interface10] isis ipv6 enable 1 [SwitchA-Vlan-interface10] quit [SwitchA] interface vlan-interface 11 [SwitchA-Vlan-interface11] isis ipv6 enable 1 [SwitchA-Vlan-interface11] quit # Configure Switch B. system-view [SwitchB] ipv6 [SwitchB] isis 1 [SwitchB-isis-1] is-level level-1 [SwitchB-isis-1] network-entity 10.0000.0000.0002.00 [SwitchB-isis-1] ipv6 enable [SwitchB-isis-1] quit [SwitchB] interface vlan-interface 10 [SwitchB-Vlan-interface10] isis ipv6 enable 1 [SwitchB-Vlan-interface10] quit...
  • Page 337 [SwitchB-Vlan-interface10] bfd detect-multiplier 6 Verify configuration. The following operations are made on Switch A. Operations for Switch B are similar and are not shown here. # Display the BFD information of Switch A. display bfd session Total Session Num: 1 Init Mode: Active IPv6 Session Working Under Ctrl Mode: Local Discr: 1441...
  • Page 338 # When the link between Switch B and the Layer-2 switch fails, BFD can quickly detect the failure. #Aug 8 14:54:05:362 2009 SwitchA IFNET/4/INTERFACE UPDOWN: Trap 1.3.6.1.6.3.1.1.5.3: Interface 983041 is Down, ifAdminStatus is 1, ifOperStatus is 2 #Aug 8 14:54:05:363 2009 SwitchA ISIS/4/ADJ_CHANGE:TrapID(1.3.6.1.2.1.138.0.17< isisAdjacencyChange>), ISIS Level-2 Adjencency IN Circuit-983041 State Change.
  • Page 339: Ipv6 Bgp Configuration

    IPv6 BGP configuration NOTE: router The term in this document refers to both routers and Layer 3 switches. • This chapter describes only configuration for IPv6 BGP. For BGP related information, see the chapter • “BGP configuration.” • The 3600 v2 SI Switch Series does not support IPv6 BGP. IPv6 BGP overview BGP-4 was designed to carry only IPv4 routing information, so other network layer protocols such as IPv6 are not supported.
  • Page 340: Ipv6 Bgp Configuration Task List

    IPv6 BGP configuration task list Complete the following tasks to configure IPv6 BGP: Task Remarks Specifying an IPv6 BGP peer Required Injecting a local IPv6 route Optional Configuring a preferred value for routes from a Optional peer or peer group Specifying the source interface for establishing TCP Optional connections...
  • Page 341: Configuring Ipv6 Bgp Basic Functions

    Task Remarks Configuring an IPv6 BGP route reflector Optional Configuring BFD for IPv6 BGP Optional Configuring IPv6 BGP basic functions Configuration prerequisites Before configuring IPv6 BGP basic functions, complete the following tasks: Specify IP addresses for interfaces • Enable IPv6 •...
  • Page 342: Configuring A Preferred Value For Routes From A Peer Or Peer Group

    TCP connections, causing network oscillation. To enhance stability of IPv6 BGP connections, HP recommends using a loopback interface as the source interface. Follow these steps to specify the source interface for establishing TCP connections to a BGP peer or peer group: To do…...
  • Page 343: Allowing The Establishment Of An Indirect Ebgp Connection

    NOTE: To establish a BGP connection, specify on the local router the source interface for establishing the TCP connection to the peer on the peering BGP router. Otherwise, the local BGP router may fail to establish TCP connection to the peer when using the outbound interface of the best route as the source interface. Allowing the establishment of an indirect eBGP connection Follow these steps to allow the establishment of eBGP connection to an indirectly connected peer or peer group:...
  • Page 344: Logging Ipv6 Peer Or Peer Group State Changes

    To do… Use the command… Remarks Enter IPv6 address family view ipv6-family — Optional Disable session establishment to an IPv6 peer { ipv6-group-name | peer or peer group ipv6-address } ignore Not disabled by default Logging IPv6 peer or peer group state changes Follow these steps to configure to log on the session and event information of an IPv6 peer or peer group: To do…...
  • Page 345: Configuring Ipv6 Bgp Route Summarization

    NOTE: If the default-route imported command is not configured, using the import-route command cannot redistribute any IGP default route. Configuring IPv6 BGP route summarization To reduce the routing table size on medium and large BGP networks, configure route summarization on BGP routers.
  • Page 346: Configuring Inbound Route Filtering

    To do… Use the command… Remarks filter-policy { acl6-number | ipv6-prefix Required Configure the filtering of outgoing ipv6-prefix-name } export [ protocol routes Not configured by default. process-id ] Apply a routing policy to routes Required peer { ipv6-group-name | ipv6-address } advertised to an IPv6 peer or peer route-policy route-policy-name export Not applied by default.
  • Page 347: Configuring Ipv6 Bgp And Igp Route Synchronization

    To do… Use the command… Remarks Specify the upper limit of prefixes peer { ipv6-group-name | Optional allowed to receive from an IPv6 ipv6-address } route-limit limit Unlimited by default. peer or peer group [ percentage ] NOTE: Only routes passing the configured filtering can be added into the local IPv6 BGP routing table. •...
  • Page 348: Configuration Prerequisites

    NEXT_HOP attribute • • AS_PATH attribute Configuration prerequisites Before configuring IPv6 BGP route attributes, complete the following tasks: • Enabled IPv6 function Configured IPv6 BGP basic functions • Configuring IPv6 BGP preference and default LOCAL_PREF and NEXT_HOP attributes Follow these steps to perform this configuration: To do…...
  • Page 349: Configuring The As_Path Attribute

    To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Enter IPv6 address family view ipv6-family — Optional Configure a default MED value default med med-value Defaults to 0 Optional Enable the comparison of MED for compare-different-as-med routes from different eBGP peers Not enabled by default.
  • Page 350: Configuration Prerequisites

    After establishing an IPv6 BGP connection, two routers send keepalive messages periodically to each other to maintain the connection. If a router receives no keepalive message from the peer after the holdtime elapses, it tears down the connection. When establishing an IPv6 BGP connection, the two parties compare their holdtimes, taking the shorter one as the common holdtime.
  • Page 351: Configuring Ipv6 Bgp Soft Reset

    NOTE: Timers configured using the timer command have lower priority than timers configured using the peer • timer command. The holdtime interval must be at least three times the keepalive interval. • Configuring IPv6 BGP soft reset Enable route refresh Follow these steps to enable route refresh: To do…...
  • Page 352: Enabling 4-Byte As Number Suppression

    After you enable the BGP ORF capability, the local BGP router negotiates the ORF capability with the BGP peer through Open messages. The local BGP router determines whether to carry ORF information in messages. If yes, it will further determine whether to carry non-standard ORF information in the packets. After completing the negotiation process and establishing the neighboring relationship, the BGP router and its BGP peer can exchange ORF information through specific route-refresh messages.
  • Page 353: Configuring The Maximum Number Of Load-Balanced Routes

    To do… Use the command… Remarks Enter system view system-view — Enter BGP view bgp as-number — Enter IPv6 address family ipv6-family — view Required Enable 4-byte AS number peer { group-name | ip-address } suppression capability-advertise suppress-4-byte-as Disabled by default. NOTE: If the peer device supports 4-byte AS numbers, do not enable the 4-byte AS number suppression function;...
  • Page 354: Applying An Ipsec Policy To An Ipv6 Bgp Peer Or Peer Group

    Applying an IPsec policy to an IPv6 BGP peer or peer group To protect routing information and defend attacks, IPv6 BGP can authenticate protocol packets by using an IPsec policy. Outbound IPv6 BGP packets carry the Security Parameter Index (SPI) defined in the IPsec policy. A device uses the SPI carried in a received packet to match against the configured IPsec policy.
  • Page 355: Configuration Prerequisites

    Configuration prerequisites Make peer nodes accessible to each other at the network layer • Enable BGP and configure a router ID. • Configuring IPv6 BGP peer group Configuring an iBGP peer group Follow these steps to configure an iBGP group: To do…...
  • Page 356: Configuring Ipv6 Bgp Community

    To do… Use the command… Remarks Required Specify the AS number of an IPv6 peer ipv6-address as-number peer as-number Not specified by default. Required Add the IPv6 peer into the peer peer ipv6-address group group ipv6-group-name Not added by default NOTE: When creating a mixed eBGP peer group, you must create a peer and specify its AS number that is different from AS numbers of other peers;...
  • Page 357: Configuring An Ipv6 Bgp Route Reflector

    Because the route reflector forwards routing information between clients, you must make clients of a • route reflector fully meshed. If clients are fully meshed, HP recommends disabling route reflection between clients to reduce routing costs. If a cluster has multiple route reflectors, you must specify the same cluster ID for these route reflectors to •...
  • Page 358: Displaying And Maintaining Ipv6 Bgp

    NOTE: Before configuring BFD for IPv6 BGP, you need to enable BGP. • After a link failure occurs, BFD may detect the failure before the system performs GR and as a result, GR • will fail. Therefore, if GR capability is enabled for IPv6 BGP, use BFD with caution. High Availability Configuration Guide For more information about BFD, see •...
  • Page 359: Resetting Ipv6 Bgp Connections

    To do… Use the command… Remarks display bgp ipv6 routing-table flap-info [ regular-expression as-regular-expression | Display IPv6 BGP routing flap [ as-path-acl as-path-acl-number | ipv6-address statistics prefix-length [ longer-match ] ] [ | { begin | exclude | include } regular-expression ] ] display bgp ipv6 routing-table peer { ipv4-address | Display BGP routing information ipv6-address } { advertised-routes | received-routes }...
  • Page 360 Figure 115 Network diagram Configuration procedure Configure IPv6 addresses for interfaces. (Details not shown) Configure iBGP connections. # Configure Switch B. system-view [SwitchB] ipv6 [SwitchB] bgp 65009 [SwitchB-bgp] router-id 2.2.2.2 [SwitchB-bgp] ipv6-family [SwitchB-bgp-af-ipv6] peer 9:1::2 as-number 65009 [SwitchB-bgp-af-ipv6] peer 9:3::2 as-number 65009 [SwitchB-bgp-af-ipv6] quit [SwitchB-bgp] quit # Configure Switch C.
  • Page 361: Ipv6 Bgp Route Reflector Configuration Example

    # Configure Switch A. system-view [SwitchA] ipv6 [SwitchA] bgp 65008 [SwitchA-bgp] router-id 1.1.1.1 [SwitchA-bgp] ipv6-family [SwitchA-bgp-af-ipv6] peer 10::1 as-number 65009 [SwitchA-bgp-af-ipv6] quit [SwitchA-bgp] quit # Configure Switch B. [SwitchB] bgp 65009 [SwitchB-bgp] ipv6-family [SwitchB-bgp-af-ipv6] peer 10::2 as-number 65008 # Display IPv6 peer information on Switch B. [SwitchB] display bgp ipv6 peer BGP local router ID : 2.2.2.2 Local AS number : 65009...
  • Page 362 Figure 116 Network diagram Configuration procedure Configure IPv6 addresses for VLAN interfaces. (Details not shown) Configure IPv6 BGP basic functions. # Configure Switch A. system-view [SwitchA] ipv6 [SwitchA] bgp 100 [SwitchA-bgp] router-id 1.1.1.1 [SwitchA-bgp] ipv6-family [SwitchA-bgp-af-ipv6] peer 100::2 as-number 200 [SwitchA-bgp-af-ipv6] network 1:: 64 #Configure Switch B.
  • Page 363: Ipv6 Bgp Ipsec Policy Configuration Example

    [SwitchD-bgp-af-ipv6] peer 102::1 as-number 200 Configure route reflector. # Configure Switch C as a route reflector, and configure Switch B and Switch D as its clients. [SwitchC-bgp-af-ipv6] peer 101::2 reflect-client [SwitchC-bgp-af-ipv6] peer 102::2 reflect-client Use the display bgp ipv6 routing-table command on Switch B and Switch D; both of them learned the network 1::/64.
  • Page 364 [SwitchB-bgp] quit Configure the eBGP connection. # Configure Switch C. system-view [SwitchC] ipv6 [SwitchC] bgp 65009 [SwitchC-bgp] router-id 3.3.3.3 [SwitchC-bgp] ipv6-family [SwitchC-bgp-af-ipv6] group ebgp external [SwitchC-bgp-af-ipv6] peer 3::1 as-number 65008 [SwitchC-bgp-af-ipv6] peer 3::1 group ebgp [SwitchC-bgp-af-ipv6] quit [SwitchC-bgp] quit # Configure Switch B.
  • Page 365 IPsec proposal tran2, set the SPIs of the inbound and outbound SAs to 54321, and the keys for the inbound and outbound SAs using ESP to gfedcba. [SwitchB] ipsec proposal tran1 [SwitchB-ipsec-proposal-tran1] encapsulation-mode transport [SwitchB-ipsec-proposal-tran1] transform esp [SwitchB-ipsec-proposal-tran1] esp encryption-algorithm des [SwitchB-ipsec-proposal-tran1] esp authentication-algorithm sha1 [SwitchB-ipsec-proposal-tran1] quit [SwitchB] ipsec policy policy001 10 manual...
  • Page 366 [SwitchA] bgp 65008 [SwitchA-bgp] ipv6-family [SwitchA-bgp-af-ipv6] peer 1::2 ipsec-policy policy001 [SwitchA-bgp-af-ipv6] quit [SwitchA-bgp] quit # Configure Switch B. [SwitchB] bgp 65008 [SwitchB-bgp] ipv6-family [SwitchB-bgp-af-ipv6] peer 1::1 ipsec-policy policy001 [SwitchB-bgp-af-ipv6] quit [SwitchB-bgp] quit Apply IPsec policies to eBGP peers. # Configure Switch C. [SwitchC] bgp 65009 [SwitchC-bgp] ipv6-family [SwitchC-bgp-af-ipv6] peer ebgp ipsec-policy policy002...
  • Page 367: Configuring Bfd For Ipv6 Bgp

    Route refresh capability has been enabled ORF advertise capability based on prefix (type 64): Local: both Negotiated: send Peer Preferred Value: 0 IPsec policy name: policy001, SPI :12345 Routing policy configured: No routing policy is configured BGP Peer is 3::2, remote AS 65009, Type: EBGP link BGP version 4, remote router ID 3.3.3.3...
  • Page 368 and notify it to IPv6 BGP. Then the link Switch A<—>Switch D<—>Switch C takes effect immediately. Figure 118 Network diagram Device Interface IP address Device Interface IP address Switch A Vlan-int100 3000::1/64 Switch C Vlan-int101 3001::3/64 Vlan-int200 2000::1/64 Vlan-int201 2001::3/64 Switch B Vlan-int100 3000::2/64...
  • Page 369 [SwitchA] route-policy apply_med_50 permit node 10 [SwitchA-route-policy] if-match ipv6 address acl 2000 [SwitchA-route-policy] apply cost 50 [SwitchA-route-policy] quit [SwitchA] route-policy apply_med_100 permit node 10 [SwitchA-route-policy] if-match ipv6 address acl 2000 [SwitchA-route-policy] apply cost 100 [SwitchA-route-policy] quit Apply routing policy apply_med_50 to routes outgoing to peer 3001::3, and apply routing policy •...
  • Page 370 Configure the minimum interval for receiving BFD control packets as 500 milliseconds. • [SwitchC-Vlan-interface101] bfd min-receive-interval 500 Configure the detect multiplier as 7. • [SwitchC-Vlan-interface101] bfd detect-multiplier 7 [SwitchC-Vlan-interface101] return Verify the configuration. The following operations are made on Switch C. Operations on Switch A and Switch B are similar and are not shown.
  • Page 371 Neighbor : 3000::1 ProcessID Interface : Vlan-interface101 Protocol : BGP4+ State : Active Adv Cost : 50 Tunnel ID : 0x0 Label : NULL : 4538sec Destination : 1200:: PrefixLength : 64 NextHop : 2000::1 Preference : 255 RelayNextHop : 2001::2 : 0H Neighbor : 2000::1...
  • Page 372: Troubleshooting Ipv6 Bgp Configuration

    The output shows that Switch C has one route to reach network 1200::0/64, that is, Switch C<—>Switch D<—>Switch A. Troubleshooting IPv6 BGP configuration IPv6 BGP peer relationship not established Symptom Display BGP peer information by using the display bgp ipv6 peer command. The state of the connection to the peer cannot become established.
  • Page 373: Routing Policy Configuration

    Routing policy configuration Routing policies are used to receive, advertise, and redistribute only specific routes and modify the attributes of some routes. NOTE: Routing policy in this chapter involves both IPv4 routing policy and IPv6 routing policy. • The 3600 v2 SI Switch Series does not support OSPF, BGP, IS-IS, OSPFv3, IPv6 BGP, or IPv6 IS-IS. •...
  • Page 374 An IP prefix list is configured to match the destination address of routing information. You can use the gateway option to allow only routing information from certain routers to be received. For gateway option information, see the chapters “RIP configuration” and “OSPF configuration.” An IP prefix list, identified by name, can comprise multiple items.
  • Page 375: Routing Policy Configuration Task List

    Routing policy configuration task list Complete the following tasks to configure a routing policy: Task Defining an IP-prefix list Defining an AS path list Defining filters Defining a community list Defining an extended community list Creating a routing policy Defining if-match clauses Configuring a routing policy Defining apply clauses Defining a continue clause...
  • Page 376: Defining An As Path List

    [Sysname] ip ip-prefix abc index 10 deny 10.1.0.0 16 [Sysname] ip ip-prefix abc index 20 deny 10.2.0.0 16 [Sysname] ip ip-prefix abc index 30 deny 10.3.0.0 16 [Sysname] ip ip-prefix abc index 40 permit 0.0.0.0 0 less-equal 32 Define an IPv6 prefix list Identified by name, each IPv6 prefix list can comprise multiple items.
  • Page 377: Defining An Extended Community List

    Follow these steps to define a community list: To do… Use the command… Remarks Enter system view system-view — ip community-list { basic-comm-list-num | basic Define a basic comm-list-name } { deny | permit } Required to define community list [ community-number-list ] [ internet | no-advertise either Define a...
  • Page 378: Defining If-Match Clauses

    To do… Use the command… Remarks Enter system view system-view — Create a routing policy, specify a route-policy route-policy-name { deny | permit } node for it, and enter routing policy Required node node-number view NOTE: If a routing policy node has the permit keyword specified, routing information matching all the if-match •...
  • Page 379: Defining Apply Clauses

    To do… Use the command… Remarks if-match community Optional Match BGP routing information whose { { basic-community-list-number | community attribute is specified in the Not configured by comm-list-name } [ whole-match ] | community lists default. adv-community-list-number }&<1-16> Optional Match routes having the specified cost if-match cost value Not configured by default.
  • Page 380 To do… Use the command… Remarks Required route-policy route-policy-name Enter routing policy view { deny | permit } node node-number Not created by default. Optional Set the AS-PATH attribute for BGP apply as-path as-number&<1-10> routing information [ replace ] Not set by default. Delete the community attribute of Optional apply comm-list { comm-list-number...
  • Page 381: Defining A Continue Clause

    NOTE: The difference between IPv4 and IPv6 apply clauses is the command for setting the next hop for routing • information. The apply ip-address next-hop and apply ipv6 next-hop commands do not apply to redistributed IPv4 • and IPv6 routes, respectively. Defining a continue clause Follow these steps to define a continue clause for a routing policy: To do…...
  • Page 382: Routing Policy Configuration Examples

    To do… Use the command… Remarks display route-policy [ route-policy-name ] [ | { begin Display routing policy information | exclude | include } regular-expression ] Clear IPv4 prefix list statistics reset ip ip-prefix [ ip-prefix-name ] Available in user view Clear IPv6 prefix list statistics reset ip ipv6-prefix [ ipv6-prefix-name ]...
  • Page 383 [SwitchC-Vlan-interface201] quit [SwitchC] interface vlan-interface 202 [SwitchC-Vlan-interface202] isis enable [SwitchC-Vlan-interface202] quit [SwitchC] interface vlan-interface 203 [SwitchC-Vlan-interface203] isis enable [SwitchC-Vlan-interface203] quit # Configure Switch B. system-view [SwitchB] isis [SwitchB-isis-1] is-level level-2 [SwitchB-isis-1] network-entity 10.0000.0000.0002.00 [SwitchB-isis-1] quit [SwitchB] interface vlan-interface 200 [SwitchB-Vlan-interface200] isis enable [SwitchB-Vlan-interface200] quit Configure OSPF and route redistribution.
  • Page 384 Total Nets: 5 Intra Area: 1 Inter Area: 0 ASE: 4 NSSA: 0 Configure filtering lists. # Configure ACL 2002 to permit route 172.17.2.0/24. [SwitchB] acl number 2002 [SwitchB-acl-basic-2002] rule permit source 172.17.2.0 0.0.0.255 [SwitchB-acl-basic-2002] quit # Configure IP prefix list prefix-a to permit route 172.17.1.0/24. [SwitchB] ip ip-prefix prefix-a index 10 permit 172.17.1.0 24 Configure a routing policy.
  • Page 385: Applying A Routing Policy To Ipv6 Route Redistribution

    Applying a routing policy to IPv6 route redistribution Network requirements As shown in Figure 120: Enable RIPng on Switch A and Switch B. • • On Switch A, configure three static routes, and apply a routing policy to static route redistribution to permit routes 20::0/32 and 40::0/32, and deny route 30::0/32.
  • Page 386: Applying A Routing Policy To Filter Received Bgp Routes

    [SwitchA-ripng-1] import-route static route-policy static2ripng Configure Switch B. # Configure the IPv6 address for VLAN-interface 100. [SwitchB] ipv6 [SwitchB] interface vlan-interface 100 [SwitchB-Vlan-interface100] ipv6 address 10::2 32 # Enable RIPng on VLAN-interface 100. [SwitchB-Vlan-interface100] ripng 1 enable [SwitchB-Vlan-interface100] quit # Enable RIPng. [SwitchB] ripng # Display RIPng routing table information.
  • Page 387 Configuration procedure Configure IP addresses for the interfaces. (Details not shown) Configure BGP. # Configure Switch A. system-view [SwitchA] bgp 100 [SwitchA-bgp] router-id 1.1.1.1 [SwitchA-bgp] peer 1.1.1.2 as-number 300 # Configure Switch B. system-view [SwitchB] bgp 200 [SwitchB-bgp] router-id 2.2.2.2 [SwitchB-bgp] peer 1.1.2.2 as-number 300 # Configure Switch C.
  • Page 388 *> 4.4.4.0/24 1.1.3.1 300 100i *> 5.5.5.0/24 1.1.3.1 300 100i *> 6.6.6.0/24 1.1.3.1 300 100i *> 7.7.7.0/24 1.1.3.1 300 200i *> 8.8.8.0/24 1.1.3.1 300 200i *> 9.9.9.0/24 1.1.3.1 300 200i The output shows that Switch D has learned routes 4.4.4.0/24, 5.5.5.0/24, and 6.6.6.0/24 from AS 100 and 7.7.7.0/24, 8.8.8.0/24, and 9.9.9.0/24 from AS 200.
  • Page 389: Troubleshooting Routing Policy Configuration

    Troubleshooting routing policy configuration IPv4 routing information filtering failure Symptom The routing protocol is running properly, but filtering routing information failed. Analysis At least one item of the IP prefix list must be configured as permit mode, and at least one node in the routing policy must be configured as permit mode.
  • Page 390: Policy-Based Routing Configuration

    Policy-based routing configuration Introduction to PBR Policy-based routing (PBR) is a routing mechanism based on user-defined policies. Different from the traditional destination-based routing mechanism, PBR enables you to use a policy (based on the source address or other criteria) to route packets. In general, PBR takes precedence over destination-based routing.
  • Page 391: Concepts

    Concepts Policy A policy is used to route IP packets. A policy can consist of one or multiple nodes. Node A node is identified by a node number. The node with the smallest node number has the highest priority. A policy node consists of if-match and apply clauses. An if-match clause specifies a match criterion on a node, and an apply clause specifies an action to be taken on packets.
  • Page 392: Configuring Pbr (Using A Pbr Policy)

    NOTE: ACL and QoS Configuration Guide For more information about QoS policies, see Configuring PBR (using a PBR policy) Defining a policy Follow these steps to define a policy: To do… Use the command… Remarks Enter system view system-view –– policy-based-route policy-name Create a policy or policy node and [ deny | permit ] node...
  • Page 393: Configuring Local Pbr

    NOTE: If a policy has a node with no if-match clause configured, all packets can pass the policy node. • However, an action is taken according to the match mode, and the packets will not go to the next policy node for a match.
  • Page 394: Pbr And Track

    PBR and track Associated with a Track object, PBR can sense topology changes faster. You can associate PBR with a track entry when configuring the outgoing interface, default outgoing interface, next hop, and default next hop to dynamically determine link reachability. The PBR configuration takes effect when the status of the associated Track object is Positive or Invalid.
  • Page 395: Displaying And Maintaining Pbr Configuration

    Applied globally—affects the traffic sent or received on all ports • • Applied to an interface—affects the traffic sent or received on the interface Applied to a VLAN—affects the traffic sent or received on all ports in the VLAN • NOTE: A QoS policy used for PBR applies only to traffic received on all ports, on an interface, or on all ports in a VLAN.
  • Page 396: Pbr Configuration (Using A Qos Policy)

    To do… Use the command… Remarks display ip policy-based-route setup Display the specified PBR routing { interface interface-type interface-number | Available in any view information local | policy-name } [ | { begin | exclude | include } regular-expression ] display ip policy-based-route statistics { interface interface-type interface-number | Display PBR statistics...
  • Page 397: Pbr Configuration Examples

    PBR configuration examples Configuring local PBR based on packet type Network requirements As shown in Figure 122, configure PBR on Switch A, so that all TCP packets are forwarded to next hop 1.1.2.2 and other packets are forwarded according to the routing table. Switch A is directly connected to Switch B and Switch C.
  • Page 398: Configuring Interface Pbr Based On Packet Type

    Configure Switch C. # Configure the IP address of VLAN-interface 20. system-view [SwitchC] interface vlan-interface 20 [SwitchC-Vlan-interface20] ip address 1.1.3.2 255.255.255.0 [SwitchC-Vlan-interface20] quit Verify the configuration. # Telnet to Switch B (1.1.2.2/24) from Switch A. The operation succeeds. # Telnet to Switch C (1.1.3.2/24) from Switch A. The operation fails. ...
  • Page 399 Figure 123 Network diagram Configuration procedure NOTE: In this example, static routes are configured to ensure the reachability among devices. Configure Switch A. # Define ACL 3101 to match TCP packets. system-view [SwitchA] acl number 3101 [SwitchA-acl-adv-3101] rule permit tcp [SwitchA-acl-adv-3101] quit # Configure Node 5 of policy aaa to forward TCP packets to next hop 1.1.2.2.
  • Page 400: Ipv4 Pbr Configuration Example (Using A Qos Policy)

    [SwitchA-Vlan-interface20] ip address 1.1.3.1 255.255.255.0 Configure Switch B. # Configure a static route to subnet 10.1 10.0.0/24. system-view [SwitchB] ip route-static 10.110.0.0 24 1.1.2.1 # Configure the IP address of VLAN-interface 10. [SwitchB] interface vlan-interface 10 [SwitchB-Vlan-interface10] ip address 1.1.2.2 255.255.255.0 [SwitchB-Vlan-interface10] quit Configure Switch C.
  • Page 401: Ipv6 Pbr Configuration Example (Using A Qos Policy)

    Configuration procedure # Configure ACL 2000. system-view [SwitchA] acl number 2000 [SwitchA-acl-basic-2000] rule 0 permit source any [SwitchA-acl-basic-2000] quit # Define a match criterion for class a to match ACL 2000. [SwitchA] traffic classifier a [SwitchA-classifier-a] if-match acl 2000 [SwitchA-classifier-a] quit # Configure the action of redirecting traffic to the next hop 202.1.1.2 for behavior a.
  • Page 402 system-view [SwitchA] acl ipv6 number 2000 [SwitchA-acl6-basic-2000] rule 0 permit source any [SwitchA-acl6-basic-2000] quit # Define a match criterion for class a to match IPv6 ACL 2000. [SwitchA] traffic classifier a [SwitchA-classifier-a] if-match acl ipv6 2000 [SwitchA-classifier-a] quit # Configure the action of redirecting traffic to the next hop 202::2 for behavior a. [SwitchA] traffic behavior a [SwitchA-behavior-a] redirect next-hop 202::2 [SwitchA-behavior-a] quit...
  • Page 403: Mce Configuration

    MCE configuration NOTE: The term router in this document refers to both routers and Layer 3 switches. • This chapter covers MCE configuration. For information about routing protocols, see Layer 3—IP • Services Configuration Guide. • The term Layer 3 interface in this chapter refers to route-mode (or Layer 3) Ethernet ports. You can set an Ethernet port to operate in route mode by using the port link-mode route command (see Layer 2—LAN Switching Configuration Guide).
  • Page 404: Mpls L3Vpn Concepts

    Figure 126 Network diagram for MPLS L3VPN model VPN 1 VPN 2 Site 1 Site 3 Site 2 VPN 2 Site 4 VPN 1 CEs and PEs mark the boundary between the service providers and the customers. After a CE establishes adjacency with a directly connected PE, it advertises its VPN routes to the PE and learns remote VPN routes from the PE.
  • Page 405 Address space overlapping Each VPN independently manages the addresses it uses. The assembly of such addresses for a VPN is called an address space. The address spaces of VPNs may overlap. For example, if both VPN 1 and VPN 2 use the addresses on network segment 10.1 10.10.0/24, address space overlapping occurs.
  • Page 406: Multi-Vpn-Instance Ce

    An RD can be in one of the following formats distinguished by the Type field: • When the value of the Type field is 0, the Administrator subfield occupies two bytes, the Assigned number subfield occupies four bytes, and the RD format is 16-bit AS number:32-bit user-defined number.
  • Page 407: How Mce Works

    How MCE works Figure 128 shows how an MCE maintains the routing entries of multiple VPNs and how an MCE exchanges VPN routes with PEs. Figure 128 Network diagram for the MCE function VPN 1 VPN 2 Site 1 Site 1 VLAN-int2 VLAN-int7 VLAN-int8...
  • Page 408: Configuring Routing On An Mce

    By establishing multiple tunnels between two MCE devices and binding the tunnel interfaces with VPN instances, you can make the routing information and data of the VPN instances delivered to the peer devices through the bound tunnel interfaces. According to the tunnel interfaces receiving the routes, an MCE device determines the VPN instances that the routes belong to and advertises the routes to the corresponding sites.
  • Page 409 BGP within the VPN, the routes may be learned by other MCE devices, generating route loops. To prevent route loops, configure route tags for different VPN instances on each MCE. HP recommends that you assign the same route tag to the same VPN on all MCEs.
  • Page 410: Route Exchange Between An Mce And A Pe

    Route exchange between an MCE and a PE Routing information entries are bound to specific VPN instances on an MCE device, and packets of each VPN instance are forwarded between MCE and PE according to interface. As a result, VPN routing information can be transmitted by performing relatively simple configurations between MCE and PE, such as importing the VPN routing entries on MCE devices to the routing table of the routing protocol running between MCE and PEs.
  • Page 411 NOTE: For easy management, set the same RD for the same VPN instance on the MCE and PE. Associating a VPN instance with an interface NOTE: In an MPLS L3VPN application, you must associate VPN instances with the interfaces connecting the •...
  • Page 412: Configuring Routing On An Mce

    To do… Use the command… Remarks vpn-target vpn-target&<1-8> Associate the current VPN instance [ both | export-extcommunity | Required with one or more VPN targets import-extcommunity ] Optional Configure the maximum number of routing-table limit number routes for the VPN instance { warn-threshold | simply-alert } Not configured by default Optional...
  • Page 413: Configuring Routing Between Mce And Vpn Site

    Configuring routing between MCE and VPN site Configuring static routing between MCE and VPN site An MCE can reach a VPN site through a static route. Static routing on a traditional CE is globally effective and thus does not support address overlapping among VPNs. An MCE supports binding a static route with a VPN instance, so that the static routes of different VPN instances can be isolated from each other.
  • Page 414 To do… Use the command… Remarks Optional Configure the default cost value for default cost value the redistributed routes 0 by default NOTE: Layer 3—IP Routing Configuration Guide For more information about RIP, see Configuring OSPF between MCE and VPN site An OSPF process belongs to the public network or a single VPN instance.
  • Page 415 NOTE: An OSPF process that is bound with a VPN instance does not use the public network router ID • configured in system view. Therefore, you must configure a router ID when starting the OSPF process. All OSPF processes for the same VPN must be configured with the same OSPF domain ID to ensure correct route advertisement.
  • Page 416 Configuring eBGP between MCE and VPN site To use eBGP for exchanging routing information between an MCE and VPN sites, you must configure a BGP peer for each VPN instance on the MCE, and redistribute the IGP routes of each VPN instance on the VPN sites.
  • Page 417: Configuring Routing Between Mce And Pe

    After you configure a BGP VPN instance, the BGP route exchange for the VPN instance is the same with the normal BGP VPN route exchange. For more information about BGP, see Layer 3—IP Routing Configuration Guide. Configure a VPN site Follow these steps to configure a VPN site: To do…...
  • Page 418 To do… Use the command… Remarks Create a RIP process for a rip [ process-id ] vpn-instance VPN instance and enter RIP Required vpn-instance-name view Required Enable RIP on the interface attached to the specified network network-address By default, RIP is disabled on network an interface.
  • Page 419 To do… Use the command… Remarks Create an OSPF area Required and enter OSPF area area area-id By default, no OSPF area is created. view Enable OSPF on the Required interface attached to network ip-address wildcard-mask By default, an interface neither belongs to the specified network any area nor runs OSPF.
  • Page 420: Displaying And Maintaining Mce

    To do… Use the command… Remarks Enter system view — system-view Enter BGP view bgp as-number — Enter BGP-VPN instance view ipv4-family vpn-instance vpn-instance-name Required Configure the PE as the eBGP peer { group-name | ip-address } Required peer [ as-number as-number ] Required import-route protocol [ process-id | Redistribute the VPN routes of...
  • Page 421: Displaying And Maintaining Mce

    Displaying and maintaining MCE To do… Use the command… Remarks display ip routing-table vpn-instance Display information about the vpn-instance-name [ verbose ] [ verbose ] Available in any view routing table associated with a [ | { begin | exclude | include } VPN instance regular-expression ] Display information about a...
  • Page 422: Mce Configuration Examples

    To do… Use the command… Remarks display bgp vpnv4 vpn-instance vpn-instance-name routing-table [ [ network-address [ { mask | mask-length } [ longer-prefixes ] ] | as-path-acl as-path-acl-number | cidr | community [ aa:nn ]&<1-13> [ no-advertise | no-export | no-export-subconfed ] * [ whole-match ] | community-list { basic-community-list-number Display the BGP VPNv4 routing...
  • Page 423 Figure 131 Network diagram Configuration procedure Assume that the system name of the MCE device is MCE, the system names of the edge devices of VPN 1 and VPN 2 are VR1 and VR2 respectively, and the system name of PE 1 is PE1. Configure the VPN instances on the MCE and PE 1.
  • Page 424 [MCE-Vlan-interface10] ip address 10.214.10.3 24 # Configure VLAN 20, add port Ethernet 1/0/2 to VLAN 20, bind VLAN-interface 20 with VPN instance vpn2, and specify an IP address for VLAN-interface 20. [MCE-Vlan-interface10] quit [MCE] vlan 20 [MCE-vlan20] port ethernet 1/0/2 [MCE-vlan20] quit [MCE] interface vlan-interface 20 [MCE-Vlan-interface20] ip binding vpn-instance vpn2...
  • Page 425 # Run RIP in VPN 2. Create RIP process 20 and bind it with VPN instance vpn2 on the MCE, so that the MCE can learn the routes of VPN 2 and add them to the routing table of the VPN instance vpn2. [MCE] rip 20 vpn-instance vpn2 # Advertise subnet 10.214.20.0.
  • Page 426 [MCE-Vlan-interface30] ip address 30.1.1.1 24 [MCE-Vlan-interface30] quit # On the MCE, create VLAN 40 and VLAN-interface 40, bind the VLAN interface with VPN instance vpn2, and configure an IP address for the VLAN interface. [MCE] vlan 40 [MCE-vlan40] quit [MCE] interface vlan-interface 40 [MCE-Vlan-interface40] ip binding vpn-instance vpn2 [MCE-Vlan-interface40] ip address 40.1.1.1 24 [MCE-Vlan-interface40] quit...
  • Page 427: Using Bgp To Advertise Vpn Routes To The Pe

    [PE1-ospf-10] quit # On PE 1, display the routing table of VPN1. [PE1] display ip routing-table vpn-instance vpn1 Routing Tables: vpn1 Destinations : 5 Routes : 5 Destination/Mask Proto Cost NextHop Interface 30.1.1.0/24 Direct 0 30.1.1.2 Vlan30 30.1.1.2/32 Direct 0 127.0.0.1 InLoop0 127.0.0.0/8...
  • Page 428 Figure 132 Network diagram Configuration procedure Configure VPN instances. # Create VPN instances on the MCE and PE 1, and bind the VPN instances with VLAN interfaces. For the configuration procedure, see “Using OSPF to advertise VPN routes to the PE.”...
  • Page 429 127.0.0.1/32 Direct 0 127.0.0.1 InLoop0 192.168.0.0/24 OSPF 10.214.10.2 Vlan10 The output shows that the MCE has learned the private route of VPN 1 through OSPF process 10. # On MCE, bind OSPF process 20 with VPN instance vpn2 to learn the routes of VPN 2. The configuration procedure is similar to that for OSPF process 10.
  • Page 430: Using Tunnels To Advertise Vpn Routes

    192.168.0.0/24 30.1.1.1 Vlan30 # Perform similar configuration on the MCE and PE 1 for VPN 2. Redistribute the OSPF routes of VPN instance vpn2 into the eBGP routing table. (Details not shown) The following output shows that PE 1 has learned the private route of VPN 2 through BGP: [PE1] display ip routing-table vpn-instance vpn2 Routing Tables: vpn2 Destinations : 5...
  • Page 431 For VPN 1, advertise interface addresses on the two MCEs in area 0, making the entire VPN a single OSPF domain. For VPN 2, advertise interface addresses for RIP and OSPF calculations, and in addition, redistribute OSPF routes to RIP and RIP routes to OSPF on MCE 1. Figure 134 Network topology of VPN 1 with the MCEs Figure 135 Network topology of VPN 2 with the MCEs Configuration procedure...
  • Page 432 # Specify the source address of the tunnel. [MCE1-Tunnel0] source vlan-interface 100 # Specify the destination address of the tunnel. [MCE1-Tunnel0] destination 172.16.1.1 [MCE1-Tunnel0] quit # Create loopback group 1 and specify the service type as tunnel. [MCE1] service-loopback group 1 type tunnel # Add any unused port (Ethernet 1/0/3 in this example) to loopback group 1.
  • Page 433 [MCE2-Vlan-interface101] quit # Create the interface Tunnel0. [MCE2] interface tunnel 0 # Configure an IP address for the Tunnel0 interface. [MCE2-Tunnel0] ip address 10.1.1.2 255.255.255.0 # Specify the tunnel protocol as GRE. [MCE2-Tunnel0] tunnel-protocol gre # Specify the source address of the tunnel. [MCE2-Tunnel0] source vlan-interface 100 # Specify the destination address of the tunnel.
  • Page 434 [MCE1-vpn-instance-vpn1] quit # Create VPN instance vpn2 for VPN 2, and configure an RD for it. [MCE1] ip vpn-instance vpn2 [MCE1-vpn-instance-vpn2] route-distinguisher 1:3 [MCE1-vpn-instance-vpn2] vpn-target 1:3 [MCE1-vpn-instance-vpn2] quit # Bind VLAN-interface 10 and Tunnel 0 with VPN instance vpn1, and configure IP addresses for the VLAN interface and tunnel interface.
  • Page 435 # Bind VLAN-interface 20 and Tunnel 0 with VPN instance vpn1, and configure IP addresses for the VLAN interface and tunnel interface. [MCE2] vlan 20 [MCE2-vlan20] port ethernet 1/0/20 [MCE2-vlan20] quit [MCE2] interface vlan-interface 20 [MCE2-Vlan-interface20] ip binding vpn-instance vpn1 [MCE2-Vlan-interface20] ip address 10.214.30.1 24 [MCE2-Vlan-interface20] quit [MCE2] interface tunnel 0...
  • Page 436 # On MCE 1, configure OSPF process 2 for VPN instance vpn2, and configure OSPF to support MCE. Be sure to configure the same OSPF area as that configured at site 2 of VPN 2, area 0 in this example. [MCE1] ospf 2 vpn-instance vpn2 router-id 192.168.2.1 [MCE1-ospf-2] vpn-instance-capability simple [MCE1-ospf-2] area 0...
  • Page 437: Support And Other Resources

    Related information Documents To find related documents, browse to the Manuals page of the HP Business Support Center website: http://www.hp.com/support/manuals For related documentation, navigate to the Networking section, and select a networking category. •...
  • Page 438: Conventions

    Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. Square brackets enclose syntax choices (keywords or arguments) that are optional. Braces enclose a set of required syntax choices separated by vertical bars, from which { x | y | ...
  • Page 439 Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features. Represents an access controller, a unified wired-WLAN module, or the switching engine on a unified wired-WLAN switch.
  • Page 440: Index

    Index A B C D E I M O P R S T Configuring OSPF Graceful Restart,95 Configuring OSPF network types,77 Applying IPsec policies for OSPFv3,294 Configuring OSPF route control,80 Applying IPsec policies for RIPng,271 Configuring OSPFv3 area parameters,284 Configuring OSPFv3 GR,292 Configuring OSPFv3 network types,285...
  • Page 441 Enabling IS-IS SNMP trap,162 OSPFv3 configuration examples,296 Enabling logging of peer state changes,229 OSPFv3 configuration task list,282 Enabling OSPF,73 Enabling OSPFv3,283 PBR configuration examples,385 Enabling trap,229 Enhancing IS-IS network security,158 RIP configuration examples,37 RIP configuration task list,24 Introduction,6 overview,20 Introduction to IPv6 IS-IS,315 RIPng configuration examples,272...

Table of Contents