Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 198 
    Configuring BFD basic functions 
    The BFD basic functions configuration is the basis for configuring BFD for other protocols.  
    Configuration prerequisites 
    Before configuring BFD basic functions, complete the following tasks: 
    •  Configure the network layer addresses of the interf aces so that adjacent nodes are reachable to 
    each other at the network layer 
    •   Configure the routing protocols that support BFD 
    Configuration procedure 
    To configure BFD basic functions:  
    Step Command Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Specify the mode for 
    establishing a BFD session.  bfd session init-mode
     { active | 
    passive }  Optional. 
    active 
    by default. 
    3.  Configure the destination port 
    number for multi-hop BFD 
    control packets.  bfd multi-hop destination-port 
    port-number
      Optional. 
    4784 by default.  
    4.
      Configure the source IP 
    address of echo packets.  bfd echo-source-ip 
    ip-address Optional. 
    The source IP address should not 
    be on the same network segment 
    as any local interface’s IP address. 
    Otherwise, a large number of 
    ICMP redirect packets may be sent 
    from the peer, resulting in link 
    congestion.  
    5.
      Enter interface view.  interface
     interface-type 
    interface-number   N/A 
    6.
      Configure the minimum 
    interval for receiving BFD 
    echo packets.  bfd min-echo-receive-interval 
    value
      Optional. 
    For relevant information, see the 
    description of the 
    Required Min 
    Echo RX Interval  field in BFD 
    pac
    
    ket format.  
    400 milliseconds by default. 
    7.   Configure the minimum 
    interval for transmitting BFD 
    control packets.  bfd min-transmit-interval
     value   Optional. 
    For relevant information, see the 
    description of the 
    Desired Min TX 
    Interval  field in  BFD packet 
    format .  
    400 
    
    milliseconds by default.  
    						
    							 199 
    Step Command Remarks 
    8.  Configure the minimum 
    interval for receiving BFD 
    control packets.  bfd min-receive-interval 
    value  Optional. 
    For relevant information, see the 
    description of the 
    Required Min RX 
    Interval  field in  BFD packet 
    format .  
    400 
    
    milliseconds by default. 
    9.   Configure the detection time 
    multiplier.  bfd detect-multiplier
     value   Optional. 
    For relevant information, see the 
    description of the 
    Detect Mult field 
    in  BFD packet format .  
    5
    
     by default. 
    10.  Configure the authentication 
    mode on the interface.  bfd authentication-mode 
    { md5 
    key-id  [ cipher ] key |  sha1 key-id 
    [ cipher ] key |  simple key-id  
    [ cipher ] password  } Optional. 
    By default, the interface operates 
    in the non-authentication mode.  
     
    In 
    Figure 52  for example, if you configure the Desired Min TX Interval as 100 milliseconds, Required Min 
    RX Interval as 300 milliseconds, and Detect Mult as  5 on Router A, and configure the Desired Min TX 
    Interval as 150 milliseconds, Required Min RX Interval as 400 milliseconds, and Detect Mult as 10 on 
    Router B, 
    •   The actual transmitting interval on Router A is 400 milliseconds, which is the greater value between 
    the minimum interval for transmitting BFD contro l packets on Router A (100 milliseconds) and the 
    minimum interval for receiving BFD control packets on Router B (400 milliseconds).  
    •   The actual transmitting interval on Router B is  300 milliseconds, which is the greater value between 
    the minimum interval for transmitting BFD control  packets on Router B (150 milliseconds) and the 
    minimum interval for receiving BFD control packets on Router A (300 milliseconds).  
    •   The actual detection time on Router A is 3000 milliseconds, which is 10 × 300 milliseconds (Detect 
    Mult on Router B × actual transmitting interval on Router B).  
    •   The actual detection time on Router B is 2000 mi lliseconds, which is 5 × 400 milliseconds (Detect 
    Mult on Router A × actual transmitting interval on Router A).  
    Displaying and maintaining BFD 
     
    Task Command Remarks 
    Display information about 
    BFD-enabled interfaces.  display bfd interface 
    [ verbose  ] [ | { begin | 
    exclude  | include  } regular-expression ]   Available in any view 
    Display information about 
    enabled BFD debugging.  display bfd debugging-switches
     [ | { begin | 
    exclude  | include  } regular-expression ]   Available in any view 
    Display BFD session information.  display bfd session 
    [ slot slot-number  [ all | 
    verbose  ] | verbose  ] [ | { begin  | exclude  | 
    include  } regular-expression ]   Available in any view 
    Clear BFD session statistics. 
    reset bfd session statistics [ slot slot-number  ] Available in user view 
      
    						
    							 200 
    Configuring track 
    Only the HP 5500 EI Switch Series supports BFD, VRRP, and PBR configurations.  
    Track overview 
    Introduction to collaboration 
    The track module works between application and detection modules, as shown in Figure 55 . It shields the 
    differences between various detection modules from application modules. 
    Collaboration is enabled after you associate the  track module with a detection module and an 
    application module. The detection module probes specific objects such as interface status, link status, 
    network reachability, and network performance, and informs the track module of detection results. The 
    track module sends the detection results to the associ ated application module. When notified of changes 
    of the tracked object, the application modules can react to avoid communication interruption and 
    network performance degradation. 
    Figure 55  Collaboration through the track module 
     
     
    Collaboration fundamentals 
    The track module collaborates with detection modules and application modules: 
    •  Collaboration between the track module and a detection module 
    •   Collaboration between the track module and an application module 
    Collaboration between the track module and a detection module 
    The detection module sends the detection result of the associated tracked object to the track module. 
    Depending on the result, the track module changes the status of the track entry: 
    •  If the tracked object functions normally, for example,  the target interface is up or the target network 
    is reachable, the state of the track entry is Positive.  
    •   If the tracked object functions abnormally, for example, the target interface is down or the target 
    network is unreachable, the state of the track entry is Negative. 
    •   If the detection result is not valid, for example, the NQA test group that is associated with the track 
    entry does not exist, the state of the track entry is Invalid. 
      
    						
    							 201 
    The following detection modules can be associated with the track module: 
    •   NQA 
    •   BFD (available only on the HP 5500 EI) 
    •   Interface management module 
    Collaboration between the track module and an application module 
    After being associated with an application module, wh en the status of the track entry changes, the track 
    module notifies the application module, which then takes proper actions.  
    The following application modules can be associated with the track module: 
    •   Virtual Router Redundancy Protocol (VRRP) (available only on the HP 5500 EI) 
    •   Static routing 
    •   Policy-based routing (available only on the HP 5500 EI) 
    In some cases, the status of a track entry changes whil e a route is still recovering. This leads to problems 
    if the track module immediately notifies the applicat ion modules of the status change and the application 
    modules begin using the route before it is ready.  
    For example, the master in a VRRP group monitors  the uplink interface through the track module. When 
    the uplink interface fails, the track module notifies th e master to reduce its priority so that a backup with 
    a higher priority can preempt as the master to forward packets. When failed uplink interface recovers, 
    if the track module immediately notifi es the original master to restore its priority, the master immediately 
    will forward packets to that interface; however, this  result in packet forwarding failure because the uplink 
    route has not yet been recovered.  
    To solve this problem, configure a delay before the track module notifies the application modules of the 
    track entry status changes.  
    Collaboration application example 
    The following is an example of collaboration  between NQA, track, and static routing. 
    Configure a static route with next hop 192.168.0.88 on the device. If the next hop is reachable, the static 
    route is valid. If the next hop becomes unreachable,  the static route should become invalid. For this 
    purpose, configure collaboration between the  NQA, track, and static routing modules: 
    1. Create an NQA test group to monitor th e reachability of IP address 192.168.0.88. 
    2. Create a track entry and associate it with the NQA test group. When the next hop 192.168.0.88 
    is reachable, the track entry is in Positive state. When the next hop becomes unreachable, the track 
    entry is in Negative state.  
    3. Associate the track entry with the static route. When  the track entry turns to the Positive state, the 
    static route is valid. When the associated track entry turns to the Negative state, the static route is 
    invalid. 
    Track configuration task list 
    To implement the collaboration function, establis h associations between the track module and the 
    detection modules, and between the trac k module and the application modules. 
    Complete these tasks to configure the track module: 
      
    						
    							 202 
    Task Remarks 
    Associating the track module 
    with a detection module Associating track with NQA  
    Required 
    Use any of the 
    approac
    
    hes. 
    Associating track with BFD (available only on 
    the HP 5500 EI) 
    Associating track with interface management 
    Associating the track module 
    with an application module Associating track with VRRP (available only on 
    the HP
    
     5500 EI)  Required 
    Use any of the 
    approaches. 
    Associating track with static routing 
    Associating track with PBR (available only on 
    the HP 5500 EI) 
     
    Associating the track module with a detection 
    module 
    Associating track with NQA 
    NQA supports multiple test types to analyze network performance, services, service quality. For example, 
    an NQA test group can periodically detect whethe r a destination is reachable, or whether the TCP 
    connection to a TCP server can be set up.  
    An NQA test group functions as follows when it is associated with a track entry: 
    •   If the consecutive failures reach the specified threshold, the NQA module tells the track module that 
    the tracked object malfunctions. Then the track module sets the track entry to the Negative state.  
    •   If the specified threshold is not reached, the NQA module tells the track module that the tracked 
    object functions normally. The track module then sets the track entry to the Positive state.  
    For more information about NQA, see  Network Management and Monitoring Configuration Guide . 
    To associate track with NQA: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Create a track entry, 
    associate it with an NQA 
    reaction entry, and specify the 
    delay time for the track 
    module to notify the 
    associated application 
    module when the track entry 
    status changes.  track 
    track-entry-number  nqa entry 
    admin-name  operation-tag  reaction 
    item-number  [ delay { negative 
    negative-time  |  positive 
    positive-time  } * ]   No track entry is created by 
    default. 
     
     
    NOTE:  
    If the specified NQA test group or th e reaction entry in the track entry does not exist, the status of the trac
    k
    entry is Invalid.   
    						
    							 203 
    Associating track with BFD (available only on the HP 5500 EI) 
    BFD supports the control packet mode and echo mode. Only echo-mode BFD can be associated with a 
    track entry.  
    The BFD functions as follows when it is associated with a track entry: 
    •  If the BFD detects that the link fails, it informs the track entry of the link failure. The track module then 
    sets the track entry to the Negative state.  
    •   If the BFD detects that the link is normal, the track module sets the track entry to the Positive state.  
    For more information about BFD, see  Configuring BFD (available only on the HP 5500 EI) .  
    Configuration prerequisites 
    Before you associate track with BFD, configure the source address of the BFD echo packets.  
    Configuration procedure 
    To associate track with BFD:  
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Create a track entry, 
    associate it with the BFD 
    session, and specify the delay 
    time for the track module to 
    notify the associated 
    application module when the 
    track entry status changes.  track 
    track-entry-number  bfd echo interface 
    interface-type interface-number  remote ip 
    remote-ip  local ip local-ip [ delay  { negative  
    negative-time  |  positive  positive-time  } * ]   No track entry is created 
    by default. 
     
     
    NOTE:  
    When associating track with BFD, do not configure  the virtual IP address of a VRRP group as the local or
    remote address of a BFD session. 
     
    Associating track with interface management 
    The interface management module monitors the physical  status or network-layer protocol status of the 
    interface. The interface management module functions as f o l l o w s  w h e n  i t  i s  a s s o c i a t e d  w i t h  a  t r a c k  e n t r y :  
    •   When the physical or network-layer protocol stat us of the interface changes to up, the interface 
    management module informs the track module of  the change and the track module sets the track 
    entry to Positive.  
    •   When the physical or network-layer protocol status  of the interface changes to down, the interface 
    management module informs the track module of  the change and the track module sets the track 
    entry to Negative. 
    To associate track with interface management: 
     
    Step Command Remarks 
    1.   Enter system view.  system-view  N/A  
    						
    							 204 
    Step Command Remarks 
    2.  Associate track with 
    interface 
    management.  Create a track entry, associ
    ate it with the interface 
    management module to monitor the physical status of 
    an interface, and specify th e delay time for the track 
    module to notify the asso ciated application module 
    when the track entry status changes: 
    track  track-entry-number  interface interface-type 
    interface-number [ delay  { negative negative-time  | 
    positive  positive-time  } * ]  
    Create a track entry, associ ate it with the interface 
    management module to monitor the Layer 3 protocol 
    status of an interface, and  specify the delay time for 
    the track module to notify the associated application 
    module when the track entry status changes: 
    track  track-entry-number  interface interface-type 
    interface-number  protocol { ipv4  | ipv6  } [ delay  
    {  negative  negative-time  |  positive  positive-time  } * ]  Use either approach. 
    No track entry is 
    created by default. 
     
    Associating the track module with an application 
    module 
    Associating track with VRRP (available only on the HP 5500 EI) 
    VRRP is an error-tolerant protocol. It adds a group of
     routers that can act as network gateways to a VRRP 
    group, which forms a virtual router. Routers in the VRRP group elect the master acting as the gateway 
    according to their priorities. A router with a higher pr io ri t y  i s  m o re  l i ke ly  t o  b e c o m e  t h e  m a s te r.  Th e  o t h e r  
    routers function as the backups. When the master fails, the backups in the VRRP group elect a new 
    gateway to undertake the responsibility of the failed master. This ensures that the hosts in the network 
    segment can uninterruptedly communicate with external networks. 
    When VRRP is operating in standard protocol mode  or load balancing mode, associate the track module 
    with the VRRP group to implement the following actions: 
    •   Change the priority of a router according to the status of the uplink. If a fault occurs on the uplink 
    of the router, the VRRP group cannot be aware of the uplink failure. If the router is the master, hosts 
    in the LAN cannot access the external network. This problem can be solved by establishing a 
    track-VRRP group association. Use the detection modu les to monitor the status of the uplink of the 
    router and establish collaborations between the detection modules, track module and VRRP. When 
    the uplink fails, the detection modules notify the track module to change the status of the monitored 
    track entry to Negative, and the priority of the master then decreases by a specific value, allowing 
    a higher priority router in the VRRP group  to become the master, and maintaining proper 
    communication between the hosts in the LAN and the external network. 
    •   Monitor the master on a backup. If a fault occurs on the master, the backup operating in switchover 
    mode will switch to the master immediately to maintain normal communication. 
    When VRRP is operating in load balancing mode,  associate the track module with the VRRP Virtual 
    Forwarder (VF) to implement the following functions: 
    •   Chang e  the  priori t y of  the  active  VF  (AVF)  ac c ordi ng  to  its  upl i nk  state. When the  upli nk  of  the  AVF 
    fails, the track entry changes to Negative state and the weight of the AVF decreases by a specific 
    value so that the VF with a higher priority becomes the new AVF to forward packets.  
    						
    							 205 
    •  M o n i t o r  t h e  AV F  s t a t u s  f ro m  t h e  l i s t e n i n g  V F  ( LV F ) ,  w h i c h  re f e r s  t o  t h e  V F  i n  l i s t e n i n g  s t a t e.  W h e n  t h e  
    AVF fails, the LVF that is operating in switchover mode becomes the new AVF to ensure continuous 
    forwarding. 
    VRRP tracking is not valid on an IP address owner. An IP address owner refers to a router when the IP 
    address of the virtual router is the IP address of  an interface on the router in the VRRP group. 
    For more information about VRRP, see  Configuring VRRP (available only on the HP 5500 EI) .  
    T
    
    o associate track with VRRP group: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Enter interface view.  interface 
    interface-type  
    interface-number   N/A 
    3.
      Create a VRRP group and 
    configure its virtual IP 
    address.  vrrp vrid
     virtual-router-id  virtual-ip  
    virtual-address   No VRRP group is created by 
    default. 
    4.
      Associate a track entry with a 
    VRRP group.  vrrp 
    [ ipv6  ] vrid  virtual-router-id  
    track  track-entry-number  [ reduced 
    priority-reduced  | switchover  ]  No track entry is specified for a 
    VRRP group by default. 
    This command is supported when 
    VRRP is operating in both standard 
    protocol mode and load balancing 
    mode. 
     
    To associate track with VRRP VF:  
    Step Command Remarks 
    1.
      Enter system view. 
    system-view  N/A 
    2.  Enter interface view.  interface 
    interface-type 
    interface-number   N/A 
    3.
      Create a VRRP group and 
    configure its virtual IP 
    address.  vrrp vrid
     virtual-router-id  virtual-ip 
    virtual-address   No VRRP group is created by 
    default. 
    4.
      Associate track with VRRP VF.  Associate a track entry with the 
    VRRP VF: 
    vrrp 
    [ ipv6  ] vrid  virtual-router-id 
    weight  track track-entry-number 
    [ reduced  weight-reduced  ] 
    Configure the LVF to monitor the 
    AVF status through the track entry:
     
    vrrp  [ ipv6  ] vrid  virtual-router-id  
    track  track-entry-number  
    forwarder-switchover  member-ip  
    ip-address   Use at least one command. 
    By default, no track entry is 
    specified for a VF. 
    This command is configurable 
    when VRRP is operating in 
    standard mode or load balancing 
    mode. However, this function takes 
    effect only when VRRP is operating 
    in load balancing mode.  
     
     
    NOTE: 
    •  When the status of the track entry changes from Negative to Positive or Invalid, the associated router o
    r
    VF restores its priority automatically. 
    •   You can associate a nonexistent track entry with a VRRP group or VF. The association takes effect only
    after you use the  track command to create the track entry.   
    						
    							 206 
     
    Associating track with static routing 
    A static route is a manually configured route. With a static route configured, packets to the specified 
    destination are forwarded through the path specified by the administrator. 
    The disadvantage of using static routes is that they cannot adapt to network topology changes. Faults or 
    topological changes in the network can make th e routes unreachable, causing network breaks. 
    To prevent this problem, configure another route to  back up the static route. When the static route is 
    reachable, packets are forwarded through the static ro ute. When the static route is unreachable, packets 
    are forwarded through the backup route, avoiding network breaks and enhancing network reliability. 
    To check the accessibility of a static route in real time, establish association between the track and the 
    static route.  
    If you specify the next hop but not the egress interfac e when configuring a static route, you can establish 
    collaborations among the static route, the track mo dule, and detection modules. This enables you to 
    check the accessibility of the static route by the status of the track entry.  
    •   The Positive state of the track entry shows that the  next hop of the static route is reachable and that 
    the configured static route is valid. 
    •   The Negative state of the track entry shows that the next hop of the static route is not reachable and 
    that the configured static route is invalid. 
    •   The Invalid state of the track entry shows that the accessibility of the next hop of the static route is 
    unknown and that the static route is valid. 
    If the track module detects the next hop accessibility  of the static route in a private network through NQA, 
    the VPN instance name of the next hop of the static ro ute must be consistent with that configured for the 
    NQA test group. Otherwise, the accessibility detection cannot function properly. 
    If a static route needs route recursion, the associated track entry must monitor the next hop of the recursive 
    route instead of that of the static route; otherwise, a valid route may be considered invalid. 
    For more information about static route configuration, see  Layer 3—IP Routing Configuration Guide. 
    To associate track with static routing: 
     
    Step Command Remarks 
    1.   Enter system view. 
    system-view  N/A 
    2.  Associate the static route 
    with a track entry to 
    check the accessibility of 
    the next hop.  Approach 1: 
    ip route-static
     dest-address  { mask  | mask-length  } 
    {  next-hop-address  | vpn-instance 
    d-vpn-instance-name next-hop-address  } track 
    track-entry-number  [ preference preference-value  ] 
    [  tag  tag-value  ] [ description description-text  ] 
    Approach 2: 
    ip route-static  vpn-instance 
    s-vpn-instance-name & dest-address  { mask | 
    mask-length  } { next-hop-address track 
    track-entry-number  [  public  ] | vpn-instance 
    d-vpn-instance-name
     next-hop-address  track 
    track-entry-number  } [ preference  preference-value ] 
    [  tag  tag-value  ] [ description  description-text ]  Use either approach. 
    Not configured by 
    default. 
    Only the HP 5500 EI 
    Switch Series supports 
    the 
    vpn-instance  
    keyword. 
      
    						
    							 207 
     NOTE:  
    You can associate a nonexistent track entry with a static  route. The association takes effect only after you
    use the  track command to create the track entry. 
     
    Associating track with PBR (available only on the HP 5500 EI) 
    Policy-based routing (PBR) is a routing mechanism ba sed on user-defined policies. Different from the 
    traditional destination-based routing mechanism, PBR enables you to use a policy (based on the source 
    address and other criteria) to route packets. 
    PBR cannot detect the availability of any action ta ken on packets. When an action is not available, 
    packets processed by the action may be discarded. For example, configure PBR to forward packets that 
    match certain criteria through a specific next hop. When the specified next hop fails, PBR cannot sense 
    the failure, and continues to forward matching packets to the next hop.  
    This problem can be solved by associating track with PBR, which improves the flexibility of PBR 
    application, and enables PBR to sense topology changes.  
    After you associate a track entry with an apply clause, the detection module associated with the track 
    entry sends the detection result of th e availability of the object (an interface or an IP address) specified 
    in the apply clause. 
    •   The Positive state of the track entry shows that the object is available, and the apply clause is valid.   
    •   The Negative state of the track entry shows that the  object is not available, and the apply clause is 
    invalid. 
    •   The Invalid state of the track entry shows that the apply clause is valid. 
    The following objects can be as sociated with a track entry: 
    •   Next hop  
    •   Default next hop 
    For more information about PBR, see Layer 3—IP Routing Configuration Guide . 
    Configuration prerequisites 
    Before you associate track with PBR, create a policy or a policy node and configure the match criteria as 
    well. 
    Configuration procedure 
    To associate track with PBR:  
    Step Command  Remarks 
    1.  Enter system view. 
    system-view  N/A 
    2.  Create a policy or policy 
    node and enter PBR policy 
    node view.   policy-based-route
     policy-name  [ deny | 
    permit  ] node  node-number   Required
     
    3.  Define an ACL match 
    criterion.   if-match acl
     acl-number   Optional 
    By default, no packets are 
    filtered.
      
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide