09-AD-Campus 6.2 IPv6 Service Configuration Guide

HomeSupportAD-NET(SDN)H3C AD-CampusConfigure & DeployConfiguration GuidesAD-Campus 6.2 Configuration Guide-5W10009-AD-Campus 6.2 IPv6 Service Configuration Guide
Download Book
  • Released At: 13-09-2023
  • Page Views:
  • Downloads:
Table of Contents
Related Documents

 

AD-Campus 6.2

IPv6 Service Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Document version: 5W100-20230221

 

Copyright © 2023 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

This document provides generic technical information, some of which might not be applicable to your products.

The information in this document is subject to change without notice.


Contents

Introduction· 1

IPv4 network· 2

Typical networking· 2

Network diagram·· 2

Configuration process· 2

IPv6 service configuration flowchart 3

Configure the IPv6 service· 3

Resource and IP address planning· 3

Configure the IPv6 service for managed devices· 4

Configure automated device deployment 7

Configure the DHCPv6 server 9

Configure the Microsoft DHCPv6 server 9

IPv6 network· 14

Typical networking· 14

Network diagram·· 14

Configuration process· 14

IPv6 service configuration flowchart 15

Configure the IPv6 service· 16

Resource and IP address planning· 16

Typical connection mode· 17

Install vDHCP on Unified Platform·· 17

Manually configure devices· 19

Automated device deployment 40

Configure automated deployment of pure IPv6 devices· 40

Configuration workflow· 40

Configure the Layer 3/2 architecture· 41

Configure the Layer 3 switch· 41

Configure the controller 42

Single-Leaf architecture· 53

Configure the Layer 3 switch· 53

Configure the controller 54

Automated device deployment 54

Single Spine device· 54

Stacking of Spine devices· 57

Single Leaf device· 60

Multiple Leaf devices· 64

IRF stacking of Leaf devices· 65

Single Access device· 69

IRF stacking of Access devices· 71

Cascading of Access devices· 73

Configure the security group· 75

Add a DHCPv6 server in the isolation domain· 75

Add a Layer 2 network domain· 76

Configure the security group· 78

Configure IPv6 authentication· 78

Configure authentication terminals· 83

User online· 84

O&M monitoring· 84

Appendix· 84

Spine device configurations· 84

Leaf device configurations· 89

Access device configurations· 94

 


Introduction

With the advancement of IPv6, campus network users have a high demand for IPv6 services. Therefore, H3C added the IPv6 service related functions, including IPv6 device management, automated IPv6 device deployment, and IPv6 authentication, to the AD-Campus solution.

At present, the controller manages IPv6 services in the following two modes:

·     Use IPv4 as the management network and IPv6 as the service network.

·     Use IPv6 as the management network and IPv6 as the service network.

For procedures to configure the IPv6 service in the two networking modes, see "IPv4 network" and "IPv6 network".


IPv4 network

Typical networking

Network diagram

Figure 1 Network diagram

 

Devices are still managed by the controller through IPv4 addresses. Compared with standard IPv4 networking, the networking adds Microsoft DHCPv6 server and Microsoft DHCP/vDHCP. Microsoft DHCPv6 supports only loose coupling, while vDHCP supports both tight coupling and high availability (HA).

Configuration process

Devices in the network are managed by the controller through IPv4 addresses. The IPv6 service can be manually configured or automatically deployed by the controller based on the following procedures:

IPv6 configuration for managed devices

1.     The controller manages devices through IPv4 addresses.

2.     Configure the IPv6 service on the devices manually.

3.     Configure the IPv6 service on the controller page.

4.     Configure the DHCPv6 server.

5.     Configure the IPv6 security group.

6.     A user comes online after authentication and obtains the IPv6 address.

Automated device deployment

1.     Configure the IPv6 service on the controller page.

2.     Start automated device deployment, during which the controller deploys the IPv6 configuration on the devices.

3.     Configure the DHCPv6 server.

4.     Configure the IPv6 security group.

5.     A user comes online after authentication and obtains the IPv6 address.

IPv6 service configuration flowchart

Figure 2 IPv6 service configuration flowchart

 

Configure the IPv6 service

Resource and IP address planning

Table 1 IP address planning

Item

Example

Description

VLAN 1 network segment (gateway)

120.1.0.0/24 (120.1.0.1)

VLAN 1 network for automated deployment

VLAN 4094 network segment (gateway)

130.1.0.0/24 (130.1.0.1)

VLAN 4094 network for communication between the controller and devices

VLAN 30 network segment (gateway)

100.1.0.0/24 (100.1.0.1)

Network segment used by Unified Platform for communication with PCs

VLAN 1010 network segment (gateway)

110.1.0.0/24 (110.1.0.1)

Network segment used by SeerEngine-Campus and vDHCP for communication between the controller and PCs (configured when SeerEngine-Campus uses an independent network adapter)

Network segment of the Underlay IP address

200.1.1.0/24

Network segment of the IP addresses of the loopback interfaces on Spine and Leaf devices

Unified Platform northbound service IP address

100.1.0.100

The address of logging in to Unified Platform

EIA

100.1.0.100

IP address of the EIA server

SeerEngine-Campus cluster IP address

110.1.0.100

IP address of the SeerEngine-Campus cluster

SeerEngine-Campus node IP address

Node 1: 110.1.0.101

Node 2: 110.1.0.102

Node 3: 110.1.0.103

IP addresses of the three nodes in the SeerEngine-Campus cluster

vDHCP cluster IP address

110.1.0.104

Cluster IP address of the vDHCP server (not used actually)

vDHCP node IP address

Node 1: 110.1.0.105

Node 2: 110.1.0.106

IP addresses of the two nodes in the vDHCP server

VLAN 4094 IPv6 network segment (gateway)

133::/64 (133::1)

VLAN 4094 IPv6 network for communication between the controller and devices

Microsoft DHCPv6 network segment (gateway)

130::/64 (130::AAAA)

Network segment of the Microsoft DHCP server for communication with Unified Platform

 

Configure the IPv6 service for managed devices

This scenario is also applicable to manual management on new devices.

Configure the Layer 3 switch

1.     Add the IPv6 gateway address in the IP address pool to VLAN-interface 4094 of the Layer 3 switch.                                                                                            

#                                                                                                                                   

interface Vlan-interface4094                                                                                                       

 ip address 130.1.0.1 255.255.255.0                                                                                               

 ipv6 address 133::1/64                                                                                                           

#                                                                                                                                   

2.     Configure the static route.

Configure the static routing or dynamic routing protocol for interconnection between the user and the server (DHCPv6 or EIA V7) after the user obtains the IPv6 address.

ipv6 route-static :: 0 133::2       // Configure a default route whose next hop is the IPv6 address of VSI-interface 4094 of the Spine device.

Configure Spine devices

1.     Configure the IPv6 address of VSI-interface 4094.

#                                                                                                                            

interface Vsi-interface4094                                                                                                         

 ip binding vpn-instance vpn-default                                                                                               

 ip address 130.1.0.2 255.255.255.0                                                                                               

 local-proxy-arp enable                                                                                                            

 ipv6 address 133:: 2/64                                                                                                            

 local-proxy-nd enable                                                                                                              

#

2.     Configure the VPN.

ip vpn-instance vpn-default                                                                                                         

 route-distinguisher 1:1                                                                                                                                                                                   

 vpn-target 1:1 import-extcommunity                                                                                                

 vpn-target 1:1 export-extcommunity  

#                                                                                                                                                                                                                     

 address-family ipv6                                                                                                                

  vpn-target 1:1 import-extcommunity                                                                                      

  vpn-target 1:1 export-extcommunity                                                                                                

 #  

3.     Configure the BGP.                                                                                                                         

bgp 100                                                                                                                                                                                                                                                          

 ip vpn-instance vpn-default    

#                                                                                                                                                                                                                  

  address-family ipv6 unicast                                                                                                      

   import-route direct                                                                                                             

   import-route static                                                                                                                                                                                                                        

 #         

4.     Configure the static route.

Configure a static route to the server with the next hop being the IPv6 address of VLAN 4094 of the Layer 3 switch.

ipv6 route-static vpn-instance vpn-default 130:: 64 133::1  

// The destination IP address resides in the IPv6 network segment of the server.

5.     Disable ND learning on VXLAN tunnels globally.

vxlan tunnel nd-learning disable  

6.     Enable the IPv6 function for VSI-interface 4092.                                                                                                                                 

interface Vsi-interface4092                                                                                                                                                                                                    

 ip binding vpn-instance vpn-default                                                                                               

 ip address unnumbered interface Vsi-interface4094                                                                                 

 ipv6 address auto link-local                                                                                                      

 l3-vni 4092                                                                                                                        

#

Configure Leaf devices

1.     Configure VSI-interface 4094.     

#                                                                                                               

 interface Vsi-interface4094                                                                                                        

 ip binding vpn-instance vpn-default                                                                                                

 ip address 130.1.0.3 255.255.255.0                                                                                              

 local-proxy-arp enable                                                                                                             

 arp proxy-send enable                                                                                                             

 ipv6 address 133:: 3/64                                                                                                            

 local-proxy-nd enable                                                                                                              

2.     Configure the VPN.

ip vpn-instance vpn-default                                                                                                         

 route-distinguisher 1:1                                                                                                                                                                                   

 vpn-target 1:1 import-extcommunity                                                                                                

 vpn-target 1:1 export-extcommunity  

#                                                                                                                                                                                                                      

 address-family ipv6                                                                                                                

  vpn-target 1:1 import-extcommunity                                                                                      

  vpn-target 1:1 export-extcommunity                                                                                                

 #

3.     Configure the BGP.                                                                                                                        

bgp 100                                                                                                                                                                                                                                                          

 ip vpn-instance vpn-default    

#                                                                                                                                                                                                                   

  address-family ipv6 unicast                                                                                                       

   import-route direct                                                                                                             

   import-route static                                                                                                                                                                                                                        

 #         

4.     Configure the static route.

Configure a static route to the server with the next hop being the IPv6 address of VLAN 4094 of the Layer 3 switch.

ipv6 route-static vpn-instance vpn-default 130::64 133::1   // The destination IP address is the IPv6 network segment of the server.

5.     Configure DHCP snooping globally.

ipv6 dhcp snooping enable vlan 2 to 4094

6.     Disable ND learning on VXLAN tunnels globally.

vxlan tunnel nd-learning disable  

7.      Enable the IPv6 function for VSI-interface 4092.                                                                                                                                 

interface Vsi-interface4092                                                                                                                                                                                              

 ip binding vpn-instance vpn-default                                                                                               

 ip address unnumbered interface Vsi-interface4094                                                                                 

 ipv6 address auto link-local                                                                                                      

 l3-vni 4092                                                                                                                       

#

8.     Configure DHCP snooping under the VSI VXLAN 4094 instance.

#

vsi vxlan4094

 gateway vsi-interface 4094

 vxlan 4094

 evpn encapsulation vxlan

  mac-advertising disable

  arp mac-learning disable

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

 dhcp snooping trust tunnel

 ipv6 dhcp snooping trust tunnel

#

Configure the Access device

1.     Configure VLAN-interface 4094.

#                                                                                                                                  

interface Vlan-interface4094                                                                                                        

 ip address 130.1.0.4 255.255.255.0                                                                                              

 ipv6 address 133:: 4/64                                                                                                            

#  

2.     Configure the static route.

When the connection between the spine and Unified Platform is a Layer 3 connection, you need to configure static routes to the server, with the next hop being the IPv6 address of the VLAN-interface 4094 on the L3 switch.

ipv6 route-static 130::64 133::1   // The destination IP address resides in the IPv6 network segment of the server.

Enable IPv6 on the controller page

Access Automation > Campus Network > Network Parameters > Parameter > Controller Global Settings page, and set IPv6 to Yes.

Figure 3 Enabling IPv6

 

Configure automated device deployment

For automated device deployment, you only need to add the following configuration on the basis of IPv4.

Configure the Layer 3 switch

1.     Add the IPv6 gateway address in the IP address pool to VLAN-interface 4094 on the Layer 3 switch.                                                                                              

#                                                                                                                                   

interface Vlan-interface4094                                                                                                       

 ip address 130.1.0.1 255.255.255.0                                                                                                

 ipv6 address 133:: 1/64                                                                                                           

#                                                                                                                                  

2.     Configure the static route.

Configure the static routing or dynamic routing protocol for interconnection between the user and the server after the user obtains the IPv6 address.

ipv6 route-static :: 0 133::2     // Configure a default route whose next hop is the IPv6 address of VSI-interface 4094 of the Spine device.

Configure the IPv6 service on the controller page

1.     Create an IPv6 address pool for VLAN 4094. Access Automation > Campus Network > Device Groups page, and click IP Address Pools.

2.     Click Add. Configure the IP address pool as shown in the following figure. Click OK to save the configuration.

¡     Name: Enter the name.

¡     Type: Select Campus VLAN4094 Network.

¡     Address Pool: Enter the address pool.

¡     Gateway Address: Enter the gateway address.

Figure 4 Adding an IP address pool

 

3.     Create an automation template. When you create an automation template, add the IPv6 address pool of VLAN 4094 in the address pool settings, and add the IPv6 address of the DHCP server to the IPv6 network segment.

a.     Access Automation > Campus Network > Fabrics page, and click Automatic Deployment. Select Legacy Automated Deployment and select the Automation Templates tab and click the  icon in the Actions column corresponding to the template name in the list. Select the IP Pool Settings tab to configure the IP address pool. Parameters are described as follows:

-     VLAN4094 IPv6 Pool: Select the previously created IP address pool.

-     IPv6 CIDR: Specify the IPv6 address segment of the server for communication with users. During automated device deployment, the controller deploys the static route of this network segment to the devices.

Figure 5 Setting the IP address pool

 

b.     After completing the configuration, click OK to save the settings and go back to the automation template page. Click the  icon in the Actions column of the corresponding template name to view the added IPv6 configurations, as shown in the figure below.

Figure 6 Previewing the template

 

Enable IPv6 on the controller page

Access Automation > Campus Network > Network Parameters > Parameter > Global Settings page, and set IPv6 to Yes.

Figure 7 Enabling IPv6

 

Configure the DHCPv6 server

Configure the Microsoft DHCPv6 server

Install Microsoft DHCP

For details, see the section about installing Microsoft DHCP services in AD-Campus 6.2 Tight Microsoft DHCP Management Configuration Guide.

Incorporate the DHCPv6 server to the controller

IMPORTANT

IMPORTANT:

Select Loose as the management mode and do not select High Available because this solution does not support it.

 

Access Automation > Campus Network > Network Parameters > DHCP page and click Add. Configure the Microsoft DHCP server with the configuration shown in the figure below.

·     Name: Enter the name.

·     Management Mode: Select Loose.

·     IPv6 Address: Enter the IPv6 address.

Figure 8 Adding the DHCP server

 

After completing the configuration, click OK. The newly added DHCP server is displayed in the DHCP list.

Figure 9 Viewing the DHCP server

 

Create an IPv6 scope for the security group

CAUTION

CAUTION:

·     No superscope needs to be created for IPv6.

·     At present, the DHCPv6 server only supports loose coupling and does not support the primary/backup mode. The scope of the security group can only be added manually on the DHCP server.

 

In a typical networking, users obtain IPv4 addresses from vDHCP, so it is not necessary to configure the IPv4 scope of the security group on the Microsoft DHCP server.

To create an IPv6 scope for the security group:

1.     In the DHCP window, select DHCP > win-g3mq08j081q > IPv6 and then click IPv6. Among which, win-g3mq08j081q is used as an example and can be adjusted according to the actual path. Select New Scope from the shortcut menu.

Figure 10 Creating a new scope

 

2.     Enter the name and description, and click Next.

Figure 11 Specifying the scope name

 

3.     Access the Scope Prefix page, enter the IPv6 prefix for the addresses that the scope distributes, and click Next.

Figure 12 Specifying the scope prefix

 

4.     Access the Add Exclusions page, enter the IPv6 address range (including the gateway address) that you want to exclude for the given scope, and click Add. The excluded address range is displayed in Excluded address range. Click Next.

Figure 13 Adding exclusions

 

5.     Access the Scope Lease page. The ranges for the preferred life time and the valid life time of IPv6 addresses are both from 1 minute to 999 days, 23 hours, and 59 minutes. The preferred life time should be less than or equal to the valid life time.

Figure 14 Configuring scope lease

 

6.     Keep the default settings for other parameters, and click Next until the scope is activated, as shown in the following figure.

Figure 15 Scope activated

 

IPv6 network

Typical networking

Network diagram

Figure 16 Network diagram

 

Compared with standard IPv4 networking, the DHCPv6 server is added, and a pure IPv6 address network configuration is used when an IPv6 device is managed (the IP addresses of VLAN-interface 1, VLAN-interface 4094, and loopback interface are all IPv6 addresses).

Configuration process

Devices in the network are managed by the controller through IPv6 addresses and the IPv6 service can be automatically deployed or manually configured based on the following procedures.

Manually configure devices

1.     Configure the IPv6 service on the devices manually.

2.     Manually incorporate the devices on the controller page.

3.     Configure the DHCPv6 server.

4.     Configure the IPv6 security group.

5.     A user comes online after authentication and obtains the IPv6 address.

Automated device deployment

1.     Configure automated device deployment on the controller page (including the configuration of DHCPv6 server).

2.     Configure the IPv6 security group.

3.     A user comes online after authentication and obtains the IPv6 address.

IPv6 service configuration flowchart

Figure 17 IPv6 service configuration flowchart

 

Configure the IPv6 service

Resource and IP address planning

Figure 18 IP address planning

 

 

Table 1 IP address planning

Item

Example

Description

Unified Platform northbound service IP address

190::195

Unified Platform northbound service IP address

EIA

190::204

IP address of the EIA server

SeerEngine-Campus cluster IP address

130::195

IP address of the SeerEngine-Campus cluster

SeerEngine-Campus node IP address

Node 1: 130::190

Node 2: 130::191

Node 3: 130::192

IP addresses of the three nodes in the SeerEngine-Campus cluster

vDHCP

Node 1: 130::6

Node 2: 130::7

IP addresses of the two nodes in the vDHCP server

VLAN 1 gateway

132::1

VLAN 1 gateway for automated deployment

VLAN 4094 gateway

133::1

VLAN 4094 gateway for communication between the controller and devices

VLAN 50 gateway

130::AAAA

VLAN 50 gateway for communication with the controller/Unified Platform

VLAN 150 gateway

190::AAAA

VLAN 150 gateway for communication between the controller/Unified Platform and PCs

 

Typical connection mode

When you deploy SeerEngine-Campus, select the Layer 3 access solution as the connection mode between the Spine device and the controller. This solution allows Unified Platform and SeerEngine-Campus to share a network adapter. You can choose whether to use the network adapter of Unified Platform as required.

Layer 3 access solution: Use one or two network adapters. If you use one network adapter for deployment, SeerEngine-Campus and Unified Platform share the same network adapter. If you use two, the SeerEngine-Campus and Unified Platform use one network adapter respectively.

Install vDHCP on Unified Platform

1.     Log in to Unified Platform. On the top navigation bar, click System. From the left navigation pane, select Deployment Management. Click Upload to upload the vDHCP package.

Figure 19 Uploading the vDHCP package

 

2.     Click Next after the package is uploaded.

Figure 20 Selecting the component

 

3.     On the Select Component page, select the component to be installed and click Next. On the Settings page, click Next directly. On the Configure Network page, create a network and subnet for Layer 3 networking with the same network segment as VLAN 50 to assign IP addresses to the controller and vDHCP.

Figure 21 Configuring the network

 

 

NOTE:

The VLAN field is left blank by default. To configure VLAN, you need to configure the port that connects the Layer 3 switch to the network adapter as a trunk port. The PVID of this port must differ from the VLAN configured here. (As a best practice, do not configure VLAN here.)

 

4.     After completing the configuration, click Next. On the Bind to Nodes page, click Next to bind the network and subnet to the corresponding component.

Figure 22 Binding the network

 

5.     On the Bind Network page, bind the network and subnet to the corresponding component, and use a subnet IP address pool to assign IP addresses to the component. After completing the configuration, click Next. When deploying the vDHCP sever, you need to manually enter the VRRP group number with a value range of 1 to 255. The VRRP group number must be unique in the same network. After confirming the parameter settings, click Deploy to start deployment.

Figure 23 Confirming parameters

 

6.     After the deployment is completed, click the  icon on the left of the component name to expand the component information, or click the Details icon  to view the detailed information about the component.

Figure 24 Viewing component details

 

Manually configure devices

The following describes the basic configuration procedures for manual configuration when the Spine devices, Leaf devices, and Access devices are not automatically deployed. After Underlay configuration is completed, SeerEngine-Campus can incorporate devices and deploy Overlay configurations.

Configure the Layer 3 switch

1.     Enable DHCP and STP globally.

# Enable DHCP.

 dhcp enable

#

# Enable STP.

stp global enable

#

2.     Configure VLAN-interface 1 and VLAN-interface 4094.

#

interface Vlan-interface1                                                     

 ipv6 address 132:: 1/64                                           

 ipv6 dhcp select relay      // DHCP relay related configurations are used for automated device deployment. If Spine/Leaf/Access devices are manually configured for management, the DHCP relay related configurations are not required.                                                       

 ipv6 dhcp relay server-address 130::106     // IP address of the vDHCP server node                   

 ipv6 dhcp relay server-address 130::107

#

vlan 4094

#

#                                                                              

interface Vlan-interface4094                                                   

 ipv6 address 133:: 1/64                                                                                                

#                                                                            

3.     Create VLAN-interface 50 and VLAN-interface 150.

#

vlan 50

vlan 150                                                                                                                               

#

#                                                                              

interface Vlan-interface 50                                                    

 ipv6 address 130::AAAA/64                                          

#

#                                                                               

interface Vlan-interface 150                                                    

 ipv6 address 190::AAAA/64                                          

#

4.     Configure the interface connecting to the Spine device.

#                                                                              

interface Ten-GigabitEthernet1/0/49                                            

description to_jieruSpine

port link-type trunk                                                           

 port trunk permit vlan 1 4094                                                 

#

5.     Add the interface connecting to Unified Platform to VLAN 150.

#                                                                              

interface GigabitEthernet1/0/37                                                 

 port access vlan 150

stp edged-port                                                            

#                                                                              

6.     Add the interface connecting to SeerEngine-Campus and vDHCP to VLAN 50.

#                                                                              

interface GigabitEthernet1/0/30                                               

 port access vlan 50

stp edged-port                                                          

#                                                                              

7.     Add the default route. Set its next hop to the IP address of the VSI-interface 4094 of the Spine device for interconnection between authenticated users and EIA.

#

ipv6 route-static :: 0 133::2

#

Configure the Spine device

1.     Configure the Spine role and sysname.

# For a device whose role is Spine by default, you do not need to configure the Spine role. Otherwise, configure its Spine role first and restart the device for the configuration to take effect.

vcf-fabric role spine

#

sysname spine

#

2.     Configure LLDP (to determine the topology).

#                                                                                                                                   

lldp global enable                                                                                                                

#            

3.     Configure STP.

#                                                                      

undo stp vlan 2 to 4094 enable                                                

stp mode pvst                                                                 

stp global enable

stp vlan 1 priority 0   // Set the STP priority value of the Spine device.

#

4.     Configure SNMP, NETCONF, Telnet, and SSH.                                                                         

# Configure SNMP. The following provides the default configuration, and the SNMP community strings can be adjusted based on the actual configuration.

snmp-agent                                                                                                                                                                                                  

 snmp-agent community write private                                                                                                

 snmp-agent community read public                                                                                                   

 snmp-agent sys-info version all    

snmp-agent packet max-size 4096                                                                                                                                       

#

# Configure NETCONF.                                                                                                                          

 netconf soap http enable

 netconf soap https enable

 netconf ssh server enable

 restful https enable

#

# Configure Telnet.

 telnet server enable

#                                                                              

# Configure SSH.

ssh server enable

#                                                                                                                 

5.     Configure the username and password of Telnet and SSH.

# Set the username to admin and password to H3C1234567.                                                                                                                                                         

local-user admin class manage                                                  

 local-user admin class manage


password simple H3C1234567 // Make sure the password meets the complexity requirements. The password must be 10 to 63 characters in length and contains at least two types of the following characters: digits, uppercase letters, lowercase letters, and special characters. Chinese characters are not supported and the password cannot contain the question mark (?), space, username, or username in reverse order.

 service-type telnet http https ssh                                            

 authorization-attribute user-role network-admin                               

 authorization-attribute user-role network-operator                            

#

#

line vty 0 63                                                                  

 authentication-mode scheme                                                

 user-role network-admin                                                       

 user-role network-operator                                                    

#

6.     Create VLAN 4094 and VLAN-interface 1.

# Create VLAN 4094.                                                                                                                             

vlan 4094

#                                                                                                                                                                                           

# (Optional) Create VLAN-interface 1.

interface Vlan-interface1                                                                                                          

ipv6 address 132:: 4/64

7.     Configure OSPF.

#

ospfv3 1

 router-id 66.0.0.2

 non-stop-routing

 area 0.0.0.0

#

8.     Configure the loopback interface.                                                                                                                                  

#

interface LoopBack0

 ospfv3 1 area 0.0.0.0

 ipv6 address 51::3/128    // Configure OSPF.

#

9.     Configure the downlink interface of the Spine device. If there are multiple downlink interfaces, create multiple VLAN interfaces.

# Create a VLAN.

vlan 3496

# Create a VLAN interface.                                                                                                                                                       

interface Vlan-interface3496

ospfv3 1 area 0.0.0.0

 ospfv3 network-type p2p

 ipv6 address auto link-local                                                         

#

# Execute the port trunk permit command on the downlink interface of the Spine device.

#                                                                              

interface GigabitEthernet1/0/35

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 3496   // It is not required to execute permit vlan 1 for Spine/Leaf/Access devices that are deployed manually.

#

 

CAUTION

CAUTION:

·     The default VLANs automatically delivered by the SeerEngine-Campus: VLAN 100: BFD detection of automated IRF setup. VLANs 101 to 2800: Access switches. VLANs 2801 to 3000: Static access ACs. VLANs 3001 to 3500: Interconnect links for Spine and Leaf devices for automated device deployment. VLANs 3501 to 4000: Security groups. VLANs 4092 to 4094: Reserved. VLANs 1 to 99 and VLANs 4001 to 4091: Not assigned automatically. VLANs 4051 to 4060: Authentication-free VLANs. As a best practice, use VLANs 2 to 99, VLANs 4001 to 4050, and VLANs 4061 to 4091 when configuring VLAN interfaces for routing for VLAN interfaces in route advertisement. At present, the VLAN range can be customized and planned according to specific scenarios.

·     The multiple links between Spine and Leaf devices are ECMP links. As VLAN 1 is enabled with STP, the link discarding status between spine and leaf nodes is normal.

 

10.     Enable L2VPN.

#                                                                                                                                  

l2vpn enable

#

11.     Configure vpn-target, the IP addresses of VSI VXLAN 4094 and VSI-interface IP address, and L3 VNI for connectivity of the control channel.

# Create vpn-default. Configure the RD and RT manually. Configure the RD and RT as 1:1 in the whole network.                                                                             

#

ip vpn-instance vpn-default

 route-distinguisher 1:1

 vpn-target 1:1 import-extcommunity

 vpn-target 1:1 export-extcommunity

#

 address-family ipv6

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

 #

 address-family evpn

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

#

# Configure the IP address of VSI-interface 4094.

interface Vsi-interface4094

ip binding vpn-instance vpn-default

 local-proxy-arp enable 

 arp proxy-send enable

 ipv6 address 133:: 3/64

 local-proxy-nd enable     // Enable the ARP request proxy sending function to solve the problem that the endpoint device cannot connect to the server if there is no server ARP entry on the device due to network connection timeout.

#

# Configure a VSI-interface and an L3 VNI for Layer 3 forwarding.

# The ip address unnumbered command is used to configure this interface to borrow the IP address of the specified interface. When a security group is created under vpn-default, the source IP of the packets is specified as the interface IP of VSI-interface 4094.

# Create VSI-interface 4092 to configure the L3 VNI of vpn-default.

interface Vsi-interface4092

 description SDN_VRF_VSI_Interface_4092

 ip binding vpn-instance vpn-default

 ip address unnumbered interface Vsi-interface4094

 ipv6 address auto link-local

 l3-vni 4092

#

# Configure the VSI VXLAN 4094 instance.                                                                              

vsi vxlan4094

 gateway vsi-interface 4094

 vxlan 4094

 evpn encapsulation vxlan

  mac-advertising disable

  arp mac-learning disable

  nd mac-learning disable

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

 ipv6 dhcp snooping trust tunnel

 loopback-detection action block

 loopback-detection enable vlan 4094                                        

#

12.     Configure BGP EVPN.

# Configure BGP. If there are multiple leaf nodes, you need to configure multiple peers.                                                                                                                              

# Configure the BGP AS number to be the same as the AS number set for the fabric in  SeerEngine-Campus.                                                                             

#                                                                              

bgp 100  

non-stop-routing                                                                     

 router-id 66.0.0.2           // The router ID of each device cannot be the same.                                                    

 peer 51::2 as-number 100  // Configure the BGP peer. The IP address is the IP address of the loopback interface on the Leaf device.                                               

 peer 51::2 connect-interface LoopBack0                             

 #                                                                             

 address-family l2vpn evpn                                                                                                   

  peer 51::2 enable                                                     

  peer 51::2 reflect-client // Configure a route reflector for forwarding routes between different Leaf devices.                                             

 #                                                                              

 ip vpn-instance vpn-default                                                   

  #                                                                            

  address-family ipv4 unicast                                                   

   import-route direct           // Import directly connected routes. The configuration is required if IPv4 conversational learning is enabled on the leaf device.                                               

   import-route static           // Import a static route.    

  #

  address-family ipv6 unicast

   import-route direct    // Import directly connected routes. If conversational learning for IPv6 is enabled on a Leaf device, it is necessary to import directly connected routes.

   import-route static    // Import a static route.                                     

#

13.     Configure the uplink interface (the one connecting to the Layer 3 switch) of the Spine device as the AC interface and bind it to VSI VXLAN 4094.

#                                                                         

interface Ten-GigabitEthernet1/0/52                                             

   port link-mode bridge                                                         

   port link-type trunk                                                          

   port trunk permit vlan 1 4094                                                                                                                 

   service-instance 4094         // Create service instance 4094.                                                 

    encapsulation s-vid 4094    // Match VLAN tag 4094.

    xconnect vsi vxlan4094      // Bind VSI VXLAN 4094.                                               

#

14.     Configure static routes.

# When the connection between the spine device and Unified Platform is a Layer 3 connection, you need to configure static routes to Unified Platform, the controller, EIA and other service related servers, with the next hop being the IP address of the VLAN-interface 4094 on the L3 switch.

ipv6 route-static vpn-instance vpn-default 130:: 64 133::1  // The destination IP is the network segment of the controller, vDHCP, and EIA.

ipv6 route-static vpn-instance vpn-default 190:: 64 133::1  // The destination IP is in the network segment of Unified Platform.

#

Disable MAC address learning and ARP learning on the VXLAN tunnels.

# Disable ARP learning on the VXLAN tunnels to prohibit ARP learning and MAC address learning for remote packets.                                                                             

vxlan tunnel arp-learning disable                                              

#

# Disable MAC address learning of the VXLAN tunnel.                                                                              

 vxlan tunnel mac-learning disable                                        

#                                                      

Configure NTP.

#

 clock timezone beijing add 08:00:00

#

# The IP address is the IP address of the NTP server.

 ntp-service enable

 ntp-service unicast-server 190::195 vpn-instance vpn-default

#

 

CAUTION

CAUTION:

If Unified Platform is configured with a built-in NTP server in the deployment, as a best practice, configure the NTP server IP as the cluster northbound service IP of Unified Platform. If it is an external NTP server, make sure the NTP server can intercommunicate with the controller and Unified Platform.

 

15.     Set the bridge MAC address in an unchanged state for an IRF fabric composed of the Spine device.

If the Spine device is an IRF fabric, use the following command to ensure that the bridge MAC address of the device remains unchanged during a master/subordinate switchover.

#

irf mac-address persistent always

#

Configure the Leaf device

IMPORTANT

IMPORTANT:

If an S5560X switch or S6520X switch is used as a leaf device, set the switch mode to the VXLAN mode and restart the device for the configuration to take effect.

 

Before incorporating a Leaf device to SeerEngine-Campus, manually perform the following operations:

# View the switch mode and make sure it is VXLAN mode.

dis switch-mode status                                                                                                   

  Switch-mode in use: VXLAN MODE.                                                                                                

     Switch-mode for next reboot: VXLAN MODE.

#

# View the switch-mode command.

[Leaf11]switch-mode ?                                                          

  0  NORMAL MODE(default)                                                      

  1  VXLAN MODE                                                                

  2  802.1BR MODE                                                              

  3  MPLS MODE                                                                  

  4  MPLS-IRF MODE                                                             

 #

# Set the mode to VXLAN mode, and then restart the device for the configuration to take effect.

switch-mode 1

#                                                                                                            

To configure a Leaf device:

1.     Configure the Leaf role and sysname.

# For a device whose role is Leaf by default, you do not need to configure the Leaf role. Otherwise, configure its Leaf role first and restart the device for the configuration to take effect.

#vcf-fabric role leaf

# Configure the sysname.

 sysname leaf1

#

2.     Configure LLDP (to determine the topology).

#                                                                                                                                   

lldp global enable                                                                                                                

#    

Configure STP.

#                                                                     

undo stp vlan 2 to 4094 enable                                                

stp mode pvst                                                                 

stp global enable

stp vlan 1 priority 4096   

#

Enable stp tc-restriction on the Leaf downlink interface.

int GigabitEthernet1/0/13

#

stp tc-restriction                                                                                                                                                                                              #

 

IMPORTANT

IMPORTANT:

Use the stp tc-restriction command to enable TC-BPDU transmission restriction on the downlink interface of the Leaf device. If it is directly connected to the endpoint, execute the stp edged-port command.

 

3.     Configure SNMP, NETCONF, Telnet, and SSH.                                                                          

# Configure SNMP. The following is the default configuration. The SNMP community is configured as required.

snmp-agent                                                                                                                                                                                                   

snmp-agent community write private                                                                                                

snmp-agent community read public                                                                                                  

snmp-agent sys-info version all   

snmp-agent packet max-size 4096                                                                                                

#

# Configure NETCONF.                                                                                                                           

#

 netconf soap http enable

 netconf soap https enable

 netconf ssh server enable

 restful https enable

#

# Configure Telnet.

 telnet server enable

#                                                                             

# Configure SSH.

ssh server enable

#                                                                                                

4.     Configure the username and password of Telnet and SSH.

# Set the username to admin and password to H3C1234567.                                                                                                                                                         

local-user admin class manage                                                  

 local-user admin class manage

 password simple H3C1234567 // Make sure the password meets the complexity requirements. The password must be 10 to 63 characters in length and contains at least two types of the following characters: digits, uppercase letters, lowercase letters, and special characters. Chinese characters are not supported and the password cannot contain the question mark (?), space, username, or username in reverse order.

 service-type telnet http https ssh                                            

 authorization-attribute user-role network-admin                                

 authorization-attribute user-role network-operator                            

#

#

line vty 0 63                                                                  

 authentication-mode scheme                                           

 user-role network-admin                                                       

 user-role network-operator                                                    

#

5.     Create VLAN 4094 and VLAN-interface 1.

# Create VLAN 4094.                                                                                                                              

vlan 4094

#                                                                                                                                                                                            

# Create VLAN-interface 1.

interface Vlan-interface1                                                                                                          

ipv6 address 132:: 5/64

#      

6.     Configure OSPF.

#

ospfv3 1

 router-id 66.0.0.3

 non-stop-routing

 area 0.0.0.0

#

7.     Configure the loopback interface.                                                                                                                                 

#                                                                               

interface LoopBack0                                                            

 ipv6 address 51::2/128    // Establish a BGP peer with the Spine device.                                      

 ospfv3 1 area 0.0.0.0                                                          

#

8.     Configure an L3 VLAN interface for interconnection with the Spine device.

# Create a VLAN.

vlan 3496                    // It must be the same as the VLAN on the Spine device. For details, see "Configuring the IPv6 service for managed devices."

# Create a VLAN interface.                                                                                                                                                       

interface Vlan-interface3496

 ospfv3 1 area 0.0.0.0

 ospfv3 network-type p2p

 ipv6 address auto link-local                                                          

#

# Configure port trunk permit vlan on the Leaf uplink interface.                                                                             

#                                                                              

interface GigabitEthernet5/0/19

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 3496                                                  

#

 

CAUTION

CAUTION:

·     The default VLANs automatically delivered by the SeerEngine-Campus: VLAN 100: BFD detection of automated IRF setup. VLANs 101 to 2800: Access switches. VLANs 2801 to 3000: Static access ACs. VLANs 3001 to 3500: Interconnect links for Spine and Leaf devices for automated device deployment. VLANs 3501 to 4000: Security groups. VLANs 4092 to 4094: Reserved. VLANs 1 to 99 and VLANs 4001 to 4091: Not assigned automatically. VLANs 4051 to 4060: Authentication-free VLANs. As a best practice, use VLANs 2 to 99, VLANs 4001 to 4050, and VLANs 4061 to 4091 when configuring VLAN interfaces for routing for VLAN interfaces in route advertisement. At present, the VLAN range can be customized and planned according to specific scenarios.

·     The multiple links between Spine and Leaf devices are ECMP links. As VLAN 1 is enabled with STP, the link discarding status between spine and leaf nodes is normal.

 

9.     Enable L2VPN.

# Enable l2vpn.                                                                                                                                   

l2vpn enable 

#

10.     Configure vpn-default, VSI VXLAN 4094 and VSI-interface IP, and L3 VNI, and configure the service instance (binding VXLAN 4094) on the downlink AC interface (the one connecting to the Access device), for connectivity of the control channel.

# Create vpn-default. Configure the RD and RT manually. Configure the RD and RT as 1:1 in the whole network.                                                                             

#

ip vpn-instance vpn-default

 route-distinguisher 1:1

 vpn-target 1:1 import-extcommunity

 vpn-target 1:1 export-extcommunity

 #

 address-family ipv6

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

 #

 address-family evpn

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

#

# Configure the IP address of VSI-interface 4094.

#                                                                              

interface Vsi-interface4094                                                    

ip binding vpn-instance vpn-default

 local-proxy-arp enable 

 arp proxy-send enable // This new command enables the controller to connect to the Access device when the ARP is absent on the Leaf devices. In this case, VSI-interface 4094 of the Leaf device must be configured.

 ipv6 address 133:: 6/64

 local-proxy-nd enable

#

# Configure a VSI-interface and an L3 VNI for Layer 3 forwarding.

# The ip address unnumbered command is used to configure this interface to borrow the IP address of the specified interface. When a security group is created under vpn-default, the source IP of the packets is specified as the interface IP of VSI-interface 4094.

#

interface Vsi-interface4092

 ip binding vpn-instance vpn-default

 ip address unnumbered interface Vsi-interface4094

 ipv6 address auto link-local

 l3-vni 4092#

# Configure the VSI VXLAN 4094 instance.

#

vsi vxlan4094

 gateway vsi-interface 4094

 vxlan 4094

 evpn encapsulation vxlan

  mac-advertising disable

  arp mac-learning disable

  nd mac-learning disable

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

 dhcp snooping trust tunnel

 ipv6 dhcp snooping trust tunnel

 loopback-detection action block

 loopback-detection enable vlan 4094

#

# Configure the downlink interface of the Leaf device connecting to the Access device as an AC interface.                                                                                                                                                                                                                                             

interface GigabitEthernet1/0/13

 port link-type trunk

 port trunk permit vlan 1 to 99 101 to 4094

 link-aggregation mode dynamic

 stp tc-restriction

 mac-based ac

 #

 service-instance 4094

  encapsulation s-vid 4094                                                 

#

11.     Configure BGP EVPN.

# Configure BGP 100 and specify a Spine device as a BGP peer.

#                                                                              

bgp 100   

non-stop-routing                                                                    

 router-id 66.0.0.3   // The router ID of each device cannot be the same. As a best practice, configure the ID as the IP address of the loopback interface.                                                       

 peer 51::3 as-number 100                                                

 peer 51::3 connect-interface LoopBack0                                 

 #                                                                              

 address-family l2vpn evpn                                                                                                        

  peer 51::3 enable                                                                                                    

 #                                                                             

 ip vpn-instance vpn-default                                                   

  #                                                                            

  address-family ipv6 unicast                                                 

#

12.     Configure static routes.

# When the connection between the spine device and Unified Platform is a Layer 3 connection, you need to configure static routes to Unified Platform, the controller, EIA and other service related servers, with the next hop being the IP address of the VLAN-interface 4094 on the L3 switch.

ipv6 route-static vpn-instance vpn-default 130:: 64 133::1 // The destination IP is the network segment of the controller.

ipv6 route-static vpn-instance vpn-default 190:: 64 133::1 // The destination IP is the network segment of Unified Platform.

#

Configure DHCP snooping.

#

 ipv6 dhcp snooping enable vlan 2 to 4094

#

13.     Configure the IP source guard as filter-free for VLAN 1 and VLAN 4094.

# The configuration is required when IP source guard is configured for the leaf downlink interface. The service is not affected when IP source guard is not configured.

ip verify source exclude vlan 1                                                

ip verify source exclude vlan 4094

#

14.     Disable MAC address learning and ARP learning on the VXLAN tunnels.

# Disable ARP address learning on the VXLAN tunnels.                                                                             

vxlan tunnel arp-learning disable                                              

#

# Disable MAC address learning on the VXLAN tunnels.                                                                             

vxlan tunnel mac-learning disable                                             

#

15.     Enable conversational learning. (This function is optional and disabled by default. You can enable it as required.)

If conversational learning is enabled on the Leaf device, the direct routes need to be imported under vpn-default on the spine device to import all private subnet routes of the endpoints to leaf and spine devices to ensure interoperability between the endpoints and the server and the external networks. 

# To save hardware resources, the remote ARP entries synchronized through EVPN are not delivered to hardware by default and only delivered in the case of a traffic request.

ip forwarding-conversational-learning       // Enable conversational learning.

# After the traffic is stopped, the default aging time for deleting table entries on hardware is 60 minutes. You can use the following command to set the aging time.

[leaf1]ip forwarding-conversational-learning aging ?                          

  INTEGER<60-1440>  Aging time in (minutes)

#

 

IMPORTANT

IMPORTANT:

·     It is recommended that S5560X-HI and S6520X-HI devices should be enabled with conversational learning.

·     It is not recommended to configure conversational learning when the leaf device works as a border device at the same time.

 

16.     Configure NTP.

#

 clock timezone beijing add 08:00:00

#

# The IP address is the IP address of the NTP server.

 ntp-service enable

 ntp-service unicast-server 190::195 vpn-instance vpn-default

#

 

IMPORTANT

IMPORTANT:

If Unified Platform is configured with a built-in NTP server in the deployment, as a best practice, configure the NTP server IP as the cluster northbound service IP of Unified Platform. If it is an external NTP server, make sure the NTP server can intercommunicate with the controller and Unified Platform.

 

17.     Verify the configuration.

After finishing the above configuration tasks, check whether those tasks are successfully configured. The following information can be viewed from both the Spine and Leaf devices:

[leaf1] display interface Vsi-interface brief                                             

Brief information on interfaces in route mode:

Link: ADM - administratively down; Stby - standby

Protocol: (s) - spoofing

Interface            Link Protocol Primary IP        Description             

Vsi4092              UP   UP       --                SDN_VRF_VSI_Interface_4092// VSI-interface 4092 is successfully created.

Vsi4094              UP   UP       --                                     

[leaf1]

 

[leaf1]dis l2vpn vsi                                                           

Total number of VSIs: 2, 1 up, 1 down, 0 admin down                            

VSI Name                        VSI Index       MTU    State                   

Auto_L3VNI4092_4092             0               1500   Down  // Automatically generated.                  

vxlan4094                       1               1500   Up                       

[leaf1]

 

[leaf1] display interface Tunnel brief                                                    

Brief information on interfaces in route mode:                                 

Link: ADM - administratively down; Stby - standby                               

Protocol: (s) - spoofing                                                       

Interface            Link Protocol Primary IP        Description               

Tun1                 UP   UP       --        // Tunnel in UP state.                                   

 [leaf1]

[leaf1] display interface Tunnel                                                          

Tunnel1

Current state: UP

Line protocol state: UP

Description: Tunnel1 Interface

Bandwidth: 64 kbps

Maximum transmission unit: 4038

Internet protocol processing: Disabled

Last clearing of counters: Never

Tunnel source 51::2, destination 51::3

Tunnel protocol/transport UDP_VXLAN/IPv6

Last 300 seconds input rate: 521 bytes/sec, 4168 bits/sec, 3 packets/sec

Last 300 seconds output rate: 1021 bytes/sec, 8168 bits/sec, 4 packets/sec

Input: 18304 packets, 2831888 bytes, 0 drops

Output: 21089 packets, 5695406 bytes, 0 drops                                      

[leaf1]                                                                         

 

[leaf1] ping ipv6  -vpn-instance vpn-default 130::AAAA // Gateway of the controller and DHCP server.

Ping6(56 data bytes) 133::6 --> 130::AAAA, press CTRL+C to break

56 bytes from 130::AAAA, icmp_seq=0 hlim=63 time=3.276 ms

56 bytes from 130::AAAA, icmp_seq=1 hlim=63 time=2.374 ms

56 bytes from 130::AAAA, icmp_seq=2 hlim=63 time=2.327 ms

56 bytes from 130::AAAA, icmp_seq=3 hlim=63 time=2.455 ms

56 bytes from 130::AAAA, icmp_seq=4 hlim=63 time=2.296 ms

 

--- Ping6 statistics for 130::AAAA in VPN instance vpn-default ---

5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss

round-trip min/avg/max/std-dev = 2.296/2.546/3.276/0.369 ms

[leaf~133::6]%Mar  5 07:23:21:372 2021 leaf~133::6 PING/6/PING_VPN_STATISTICS: Ping6 statistics for 130::AAAA in VPN instance vpn-default: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 2.296/2.546/3.276/0.369 ms.                  

[leaf1]

18.     Set the bridge MAC address in an unchanged state for an IRF fabric composed of the Leaf device.

If the Spine device is an IRF fabric, use the following command to ensure that the bridge MAC address of the device remains unchanged during a master/subordinate switchover.

#

irf mac-address persistent always

#

Configure the Access device

1.     Configure the Access role and sysname of the device.

# For a device whose role is Access by default, you do not need to configure the Access role. Otherwise, configure its Access role first and restart the device for the configuration to take effect.

#

vcf-fabric role access

#

 sysname access1

#

2.     Configure LLDP (to determine the topology).

#                                                                                                                                 

lldp global enable                                                                                                                

#

3.     Configure STP.

#                                                                     

stp global enable                                                              

#                                                                                                                                 

4.     Configure SNMP, NETCONF, Telnet, and SSH.

# Configure SNMP. The following is the default configuration. The SNMP community is configured as required.

#

snmp-agent                                                                                                                                                                                                   

snmp-agent community write private                                                                                                

snmp-agent community read public                                                                                                   

snmp-agent sys-info version all

snmp-agent packet max-size 4096                                                                                                  

#

# Configure NETCONF.                                                                                                                           

netconf soap http enable

 netconf soap https enable

 netconf ssh server enable

 restful https enable

#

# Configure Telnet.

 telnet server enable

#                                                                             

# Configure SSH.

ssh server enable

#                                                                                              

5.     Configure the username and password of Telnet and SSH.

# Set the username to admin and password to H3C1234567.                                                                                                                                                         

local-user admin class manage                                                  

 local-user admin class manage


password simple H3C1234567 //
Make sure the password meets the complexity requirements. The password must be 10 to 63 characters in length and contains at least two types of the following characters: digits, uppercase letters, lowercase letters, and special characters. Chinese characters are not supported and the password cannot contain the question mark (?), space, username, or username in reverse order.

 service-type telnet http https ssh                                            

 authorization-attribute user-role network-admin                               

 authorization-attribute user-role network-operator                            

#

#

line vty 0 63                                                                  

 authentication-mode scheme                                             

 user-role network-admin                                                       

 user-role network-operator                                                    

#

6.     Execute the permit vlan all command on the uplink interface that connects the Access device to the Leaf device.

# Execute the permit vlan all command on the uplink interface of the Access device.                                                                            

interface Ten-GigabitEthernet1/0/52                                            

   port link-mode bridge                                                         

   port link-type trunk                                                          

   port trunk permit vlan all                                                    

#           

7.     # Create a VLAN.

#                                                                                                                                      

vlan 4093 to 4094

8.     (Optional) Configure the L3 interface of VLAN 1.

#                                                                              

interface Vlan-interface1                                                       

 ipv6 address 132:: 2/64                                           

#                                     

9.     Configure the L3 interface of VLAN 4094, through which SeerEngine-Campus can manage Access devices.

#                                                                              

interface Vlan-interface4094                                                   

 ipv6 address 133:: 5/64                                           

#

10.     Configure the static IP address of VLAN 4094.

# When the connection between the spine device and Unified Platform is a Layer 3 connection, you need to configure static routes to Unified Platform, the controller, EIA and other service related servers, with the next hop being the IP address of the VLAN-interface 4094 on the L3 switch.

ipv6 route-static 130:: 64 133::1    // The destination IP address resides in the network segment of the controller.

ipv6 route-static 190:: 64 133::1     // The destination IP address resides in the network segment of Unified Platform.

11.     Configure the NTP server.

#

 clock timezone beijing add 08:00:00

#

# The IP address is the IP address of the NTP server.

ntp-service enable                                                            

 ntp-service unicast-server 190::195

#

 

IMPORTANT

IMPORTANT:

If Unified Platform is configured with a built-in NTP server in the deployment, as a best practice, configure the NTP server IP as the cluster northbound service IP of Unified Platform. If it is an external NTP server, make sure the NTP server can intercommunicate with the controller and Unified Platform.

 

12.     Configure the STP edge port.

After the Access device is incorporated by the SeerEngine-Campus controller, the controller automatically sets the ports used by the Access device to connect to users as STP edge ports and automatically assigns a VLAN ID to each port. If the controller fails to automatically deploy the edge port, you can configure it manually.

#                                                                               

interface GigabitEthernet1/0/22                                                

 port access vlan 115                                                          

 stp edged-port                                                                

#

13.     Set the bridge MAC address in an unchanged state for an IRF fabric composed of the Access device.

If the Access device is an IRF fabric, use the following command to ensure that the bridge MAC address of the device remains unchanged during a master/subordinate switchover.

#

irf mac-address persistent always

#

Manually incorporate a device

After manually deploying Underlay configurations of the device, perform the following tasks to configure the fabric and DHCP server:

1.     Configure a fabric.

a.     Access Automation > Campus Network > Fabrics page, and click Add.

b.     Configure a fabric on the Fabric Configuration page. Parameters are described as follows:

-     Name: Enter the name with no limitation.

-     AS Number: The value is an integer in the range of 1 to 4294967295. When a device is manually deployed and managed, make sure the AS number set in the fabric is the same as the BGP AS number manually configured on the device.

-     Isolation Domain: Select the isolation domain of the fabric (isolate_domain1 by default). The isolation domain policy mode can specify the policy mode as IP-based or group-based.

-     Networking Model: Select as required.

-     Multicast Network: Not supported for the IPv6 service and Off is selected here.

-     Lock Underlay: It is Off by default. You can select On if necessary.

-     Delayed Access Interface PVID Assignment: It is Off by default and the controller will automatically assign PVID when the device is activated. If you select On, the controller will not assign PVID when the device is activated, and you can manually configure the PVID after the device is activated.

-     Virtual Auto Online And Business Follow: It is On by default. It is used to control the authorization of the VXLAN network and the authorization of access policies between security groups.

-     QoS: Not supported for the IPv6 service and Off is selected here.

Figure 25 Configuring a fabric

 

a.     Click OK. The added fabric is displayed on the Fabrics page.

2.     Incorporate a device.

Access Automation > Campus Network > Device Group > Add Device page, and specify the parameters.

¡     In the Basic Info area:

-     Fabric: Select a fabric.

-     Device Role: There are three roles for option, namely, Spine, Leaf, and Access. Select the role according to the actual role of the device in the topology, and make sure the selected role is the same as that configured on the device.

-     Management IP: Enter the IP address of VXLAN-interface 4094/VLAN-interface 4094.

-     Underlay IP: Enter the IP address of the loopback interface of the device.

-     Device Series: Select the product series corresponding to the device model.

-     Other parameters: Retain the default settings.

Figure 26 Incorporating a device

 

¡     In the Add Control Protocol Template area:

-     Name: Enter the template name.

-     Read and White Community: According to the SNMP parameters set in the above device settings, enter private here.

-     Read-Only Community: According to the SNMP parameters set in the above device settings, enter public here.

-     Username: According to the username of local-user set in the above device settings, the username here is admin.

-     Password: Enter the password of the local-user set in the above device settings. The password must be 10 to 63 characters in length and contains at least two types of the following characters: digits, uppercase letters, lowercase letters, and special characters. Chinese characters are not supported and the password cannot contain the question mark (?), space, username, or username in reverse order.

Figure 27 Adding a control protocol template

 

3.     After the device is added, the initial Device State is Inactive because a period of time is needed for data synchronization. After the data is synchronized, click Refresh. If the device state becomes Active, the device is successfully connected.

Figure 28 Activating a device

 

4.     After devices are incorporated, you can use the display openflow instance 1 controller command to view detailed information about the devices connected to the SeerEngine-Campus controller for Spine and Leaf devices.

[Leaf1]display openflow instance 1 controller      

Instance 1 controller information:

 Reconnect interval: 60 (s)

 Echo interval     : 5  (s)

 

 Controller ID           : 1

 Controller IPv6 address : 130::191

 Controller port         : 6633

 Local IPv6 address      : 133::3

 Controller role         : Master

 Connect type            : TCP

 Connect state           : Established

 Packets sent            : 44

 Packets received        : 163

 SSL policy              : --

 Control SSL policy      : --

 VRF name                : vpn-default

 

 Controller ID           : 2

 Controller IPv6 address : 130::192

 Controller port         : 6633

 Local IPv6 address      : 133::3

 Controller role         : Slave

 Connect type            : TCP

 Connect state           : Established

 Packets sent            : 42

 Packets received        : 161

 SSL policy              : --

 Control SSL policy      : --

 VRF name                : vpn-default                                                                       

5.     Configure the DHCPv6 server.

a.     Access Automation > Campus Network > Network Parameters > DHCP page and click Add. Configure the vDHCP server on the pop-up page as shown in the following figure.

-     Name: Enter the name.

-     Management Mode: Select Tight because vDHCP only supports this mode.

-     High Available: It is necessary to select it for a cluster environment and unnecessary for a single-node environment.

-     First IPv6 Address and Second IPv6 Address: Enter the IPv6 addresses assigned during vDHCP deployment. It can be viewed on the vDHCP deployment page. Access System > Deployment Management, expand Public Service page, and click the  icon to view the details.

-     Vendor: Select H3C.

-     Select High Availability.

Figure 29 Adding the DHCP server

 

a.     After completing the configuration, click OK. The newly added DHCP server is displayed in the DHCP list.

Figure 30 Viewing the DHCP server

 

Automated device deployment

For details, see Configure automated deployment of pure IPv6 devices.

 

Configure automated deployment of pure IPv6 devices

There is no difference between the IPv6 service and IPv4 service in terms of the networking architecture, precautions for configuration, and supported device models. For details, see AD-Campus 6.2 Automated  Configuration Guide.

Configuration workflow

Figure 31 Underlay automated deployment flowchart

 

The preceding figure shows the Underlay automated deployment flowchart. First, perform initial configurations such as automation parameter configuration on the controller page. Then, restart the device with no configuration and obtain the corresponding automation template for the specific role and deploy it to the related device. After the primary RR MAC address is specified on the controller, BGP configuration is deployed automatically, and a VXLAN Tunnel is created between the Spine device and the Leaf device. When devices are incorporated by the controller automatically and added to the corresponding device group and interface group, the Underlay automated deployment is complete.

Configure the Layer 3/2 architecture

Configure the Layer 3 switch

1.     Configure VLAN 1 and VLAN 4094 for communication with devices.

#                                                                              

vlan 1                                                                        

#                                                                               

vlan 4094                                                                        

#                                                                              

interface Vlan-interface1                                                      

 ipv6 dhcp select relay

 ipv6 dhcp relay server-address 130::6     // IP address of the master vDHCP

 ipv6 dhcp relay server-address 130::7     // IP address of the backup vDHCP

 ipv6 address 132:: 1/64

 undo ipv6 nd ra halt #    

#                                                                              

interface Vlan-interface4094              // The device management IP address is assigned by the controller, and DHCP relay is not required here.

 ipv6 address 133:: 1/64

 undo ipv6 nd ra halt                                        

#  

2.     Configure VLAN 50 for SeerEngine-Campus and DHCP management.

#                                                                        

vlan 50                                                                  

#                                                                       

interface Vlan-interface50                                      

 ipv6 address 130::AAAA/64      

3.     Configure VLAN 150 for communication between the controller/Unified Platform and PCs.

#

interface Vlan-interface150

ipv6 address 190::AAAA/64

#

4.     Configure the interface connecting to the Spine device.

#

interface Ten-GigabitEthernet1/0/6

description to_spine

port link-type trunk

 port trunk permit vlan all

 ipv6 dhcp snooping trust

#

5.     Configure the interface of the external device (Layer 3 switch) connecting to the server.

#                                                                              

interface GigabitEthernet1/0/7  // Connect to the network adapters of SeerEngine-Campus and vDHCP.                                                

 port access vlan 50                                                                                                                           

#

interface GigabitEthernet1/0/37 // Connect to the network adapters of Unified Platform, SeerEngine-Campus, and vDHCP.

 description eth1-ipv6

 port access vlan 150

#      

Configure the controller

Configure basic settings

1.     Log in to SeerEngine-Campus. Access Automation > Campus Network > Network Parameters > Parameter > Global Settings page, and set IPv6 to Yes (default).

Figure 32 Enabling IPv6

 

2.     Access Guide > Campus Wizard > Device Online Planning > Configure Basic Info page, click the Select Fabric drop-down menu, and select Add Fabric. Specify the following parameters and click OK.

Figure 33 Configuring a fabric

 

¡     Name: a maximum string of 255 characters (case-sensitive).

¡     Network Type: VXLAN by default.

¡     AS Number: The value is an integer in the range of 1 to 4294967295. For multi-fabric networking, each fabric must have a unique AS number. During automated deployment, the SeerEngine-Campus controller delivers the BGP AS number to the device added to the fabric based on the AS number set in the fabric.

¡     Isolation Domain: Select the isolation domain of the fabric (isolate_domain1 by default). The isolation domain policy mode can specify the policy mode as IP-based or group-based.

¡     Multicast Network: Not supported for the IPv6 service and Off is selected here.

¡     Lock Underlay: It is Off by default. Disable it during automated device deployment, and enable it as required after automated device deployment is completed.

¡     QoS: Not supported for the IPv6 service and Off is selected here.

¡     Delayed Access Interface PVID Assignment: It is Off by default and the controller will automatically assign PVID when the device is activated. If you select On, the controller will not assign PVID when the device is activated, and you can manually configure the PVID after the device is activated.

¡     Virtual Auto Online And Business Follow: It is used to control the authorization of VXLAN network and is On by default.

Figure 34 Configuring the TFTP service

 

3.     The Use Optimized Automated Deployment parameter is set to No by default since the optimized automated deployment is not supported for the IPv6 service.

4.     Enter the bridge MAC address of the Spine device in the RR MAC field. You do not need to enter the RR MAC address if the fabric uses the Single-Leaf architecture. Click Next.

Figure 35 Configuring the RR MAC address

 

 

NOTE:

If the Spine device is an IRF fabric, enter the bridge MAC addresses of the main processing units of all member devices in the RR MAC field, separated by commas (,).

 

5.     To view the bridge MAC address of the Spine device, access the device CLI and use either of the following methods:

¡     Method 1: Execute the display device manuinfo command.

[leaf~133::4]dis device manuinfo slot 1

 Slot 1 CPU 0:

DEVICE_NAME          : S5560X-54C-EI

DEVICE_SERIAL_NUMBER : 210235A1XCM195A000QK

MAC_ADDRESS          : 4CE9-E498-16CB

MANUFACTURING_DATE   : 2019-05-20

VENDOR_NAME          : H3C

Fan 1:

DEVICE_SERIAL_NUMBER : NONE

Fan 2:

DEVICE_SERIAL_NUMBER : NONE

Power 1:

DEVICE_NAME          : LSPM2150A

DEVICE_SERIAL_NUMBER : 210231A1U0H195001022

MANUFACTURING_DATE   : 2019-05-07

VENDOR_NAME          : H3C                                                                                             

¡     Method 2: Execute the debug stack show memberinfo command in probe view.

[leaf~133::4-probe]debug stack show memberinfo  slot 1

 

=============================================================

           Member Information of STACK Module

=============================================================

MemID:1,  LocalSlotID:1,  Priority:1, Mode:90 

MaxMemNum:10,  MaxPortMemberPort:4,  StackCapability:5 

BridgeMac:4c:e9:e4:98:16:cb    CpuMac:f0:10:90:db:74:02    DeviceInfo:S5560X-EI 

Get the Wrong Packet Number :0.    

Configure address pools

1.     To configure an address pool, bind the DHCP server first. Click the drop-down arrow of DHCP Server, and select Add DHCP Server. On the pop-up page, specify the related parameters of H3C vDHCP.

Figure 36 Adding the DHCP server

 

Figure 37 DHCP

 

¡     Name: Enter the name.

¡     Management Mode: Select Tight because vDHCP only supports this mode.

¡     High Available: It is necessary to select it for a cluster environment and unnecessary for a single-node environment.

¡     First IPv6 Address and Second IPv6 Address: Enter the IPv6 addresses assigned during vDHCP deployment. It can be viewed on the vDHCP deployment page. Access System > Deployment Management, expand Public Service page, and click the  icon to view the details.

¡     Vendor: Select H3C.

¡     For vDHCP, dual-stack can be enabled, but it cannot be disabled once it is enabled. The user terminal can obtain the IPv4 address when the user comes online.

Figure 38 Adding the DHCP server

 

 

NOTE:

·     The IP address is the IP address assigned for public network deployment. To view the IP address of vDHCP, access System > Deployment Management > Public Service, and click Details.

·     The DHCP server for automated device deployment must be an H3C vDHCP server.

 

2.     Add the IPv6 address pool for VLAN 1. In the Address Pool field, enter the network segment of VLAN 1 (132::/64) set on the Layer 3 switch. In the Gateway Address field, enter the IP address of VLAN 1 set on the Layer 3 switch.

Figure 39 VLAN 1

 

3.     Add an address pool for VLAN 4094. In the Address Pool field, enter the network segment of VLAN 4094 (133::/64) set on the Layer 3 switch. In the Gateway Address field, enter the IP address of VLAN 4094 set on the Layer 3 switch.

Figure 40 Adding an address pool for VLAN 4096

 

4.     Controller and Other Server Subnets: During automated device deployment, the SeerEngine-Campus controller delivers the static routes of the configured IP address segment to the device. You need to add the management network segment of the controller, the IP address segment 130::/64 of the controller, and the network segment 190::/64 where the EIA is located. Multiple network segments can be added and separated by commas (.).

 

 

NOTE:

Multiple network segments need to be added if Unified Platform, the controller, and EIA reside in different network segments.

 

Figure 41 Configuring the IPv6 management network segment of the server

 

 

NOTE:

The configurations of VLAN 4094 IPv4 address pool and IPv4 network segment are not necessary for automated deployment of pure IPv6 Underlay without the IPv4 service. To use IPv4 addresses, you need to add an IPv4 DHCP server. This document does not describe the configuration related to the IPv4 service. For related information, see AD-Campus 6.2 Automated Deployment Guide.

 

Configure device role templates

Configuring a device role template is to configure an automation template.

·     Local Username and Local Password: If the username on the Configure Template page is the same as that configured for the NETCONF protocol in Control Protocol Template, the passwords of the two must be the same. The local username and password of the two templates can differ from each other. The username and password configured for the NETCONF protocol in Control Protocol Template are used for the controller to access devices. The local username and password here are used for the Spine device to access the Leaf device. You can click Edit Template to enter the page for editing the control protocol template.

·     NTP Server: If a built-in NTP server is configured when Unified Platform is deployed, as a best practice, configure the IP address of the NTP server as the cluster northbound service IP address of Unified Platform. You can enter the IP address of the NTP time server in the customer network to ensure network connectivity.

·     Support for Version Upgrade: No by default.

·     Master Spine MAC: Specify the bridge MAC address of the master Spine device to assign the Underlay IP address and Underlay VLAN. (If the Spine device is an IRF fabric, the Spine device corresponding to the bridge MAC specified in this template is the master device.)

·     Auto-Allocate Underlay IP: Yes (default).

¡     Yes: The Spine device automatically assigns IP addresses to the loopback interface 0 of the Spine and Leaf devices according to the address segment of the Underlay IP Range set in the template.

¡     No: You need to manually assign IP addresses to the loopback interface 0 of the Spine and Leaf devices. If you set this to No, set Enable Whitelist to Yes for the Leaf template and Spine template, and must specify the Underlay IP address in the device list.

·     Underlay IP Protocol Stack: Select IPv6.

·     Router ID Pool: It is used by BGP and OSPFv3 to assign the router ID, which is used to identify the serial number of a router.

·     Underlay IP Range: Specify the IP address range. It is used to assign IP addresses to loopback interface 0.

·     Underlay VLAN Range: Specify the available VLAN range to establish Underlay OSPF neighbors. As a best practice, use the default settings.

·     Uplink Interface: The full name of the uplink interface of the Spine device (that is, the interface directly connecting to the Layer 3 switch) needs to be specified. During automated device deployment, the controller allocates the AC configuration information of VLAN 4094 - VXLAN 4094 to this interface. The interface is used for service interaction between devices and the controller.

·     Enable Whitelist:

¡     When it is No:

-     If the serial number of the specified device is in the device list, the automated deployment of the device is carried out based on the information specified in the device list, and the device is incorporated by the controller with the specified device label.

-     If the serial number of the specified device is not in the device list, the automated deployment of the device is carried out by using the default role, and the default label is "role name + IP address of VLAN 4094".

¡     When it is Yes:

-     If the serial number of the specified device is in the device list, the automated deployment of the device is carried out based on the information specified in the device list, and the device is incorporated by the controller with the specified device label.

-     If the serial number of the specified device is not in the device list, the automated device deployment fails.

 

 

NOTE:

If the Spine device is an IRF fabric, the Master Spine MAC in the Spine Template is the bridge MAC address of the master device.

 

Figure 42 Configuring device role template

 

Figure 43 Spine template

 

Figure 44 Leaf template

 

Figure 45 Access template

 

Configure a device list for automated deployment

The device list is used for the settings of the device whitelist. The device serial number is the unique identifier of each device. By setting the correspondence of the device serial number and the device role in the device list, you can plan the role information of each device.

·     Used during automated device deployment when the whitelist is enabled.

¡     If the device serial number is in the device list, the device can obtain an automation template and perform automated deployment.

¡     If the device serial number is not in the device list, the device cannot obtain an automation template and cannot perform automated deployment.

·     Used during automated device deployment when the whitelist is not enabled. If the device serial number is in the device list, the device performs automated deployment firstly with the role set in the whitelist. If the device serial number is not in the device list, the device performs automated deployment with the default role.

·     Used when incorporating a device to the SeerEngine-Campus controller. The controller needs to match the whitelist when incorporating a device. If it does not match the whitelist, the device fails to be incorporated.

Figure 46 Device list

 

To add a device serial number to the device list, you can either click Add to manually add it or click Import to download the import template for batch import.

·     Network Type: VXLAN (default).

·     Device Serial Number: Enter the unique identifier of the device. You can obtain it by executing the following commands.

To confirm which series a device belongs to, contact Technical Support.

¡     Modular device: Fill in the serial number of the chassis and the serial number of each main processing unit. If there are multiple serial numbers, separate them with commas (,).

¡     Command for querying information about the chassis and main processing unit of the S10500X/S10500 series: display device manuinfo chassis *  slot  *

¡     Command for querying information about the main processing unit of the S7500E series: display device manuinfo chassis * slot *

¡     Fixed-port device (S6550XE/S6525XE/6520X/S5560X series): display license device-id slot 1

¡     Command for querying information about the main processing unit of the S7500X series: display device manuinfo chassis * slot *

¡     Fixed-port device (S51 series): display device manuinfo slot 1

·     Device Role: Spine, Leaf, or Access. During automated device deployment, the device role will be modified automatically according to the role information configured in the device list.

·     Device System Name: The sysname of the device, which will be modified automatically according to the configured device label.

·     Management IP: (Optional) Specify the IP address of the VSI/VLAN 4094 after the device is deployed automatically.

¡     If the management IP address is configured, after the device comes online automatically, the SeerEngine-Campus controller will assign an IP address to the device according to the IP addresses configured.

¡     If the management IP address is not configured, the SeerEngine-Campus controller will automatically assign an IP address to the device according to the IP address pool of VLAN 4094.

·     Underlay IP: You must fill in this field if you select No in the Auto-Allocate Underlay IP option in the automation template of Spine device. If you select Yes, you do not need to fill in this field.

·     Site Name: Select the site of the device as required. If you need to use the dashboard function, you must configure the site name.

Figure 47 Device list

 

Figure 48 Configuring a device list for automated deployment

 

Configure the policy configuration template

The policy configuration template does not affect automated device deployment and is related to user services. For detailed configurations, see AD-Campus 6.2 Basic Configuration Guide.

Single-Leaf architecture

Configure the Layer 3 switch

For details about how to configure the Layer 3 switch in the Single-Leaf architecture, see "Configure the Layer 3 switch." The following describes how to use Leaf devices to form an IRF fabric in the Single-Leaf architecture.

1.     Connect the Leaf devices to the Layer 3 switch via a cable, and interconnect all Leaf devices.

2.     Set the uplink interface in the single Leaf template as a trunk port.

3.     Manually configure interface aggregation on the Layer 3 switch.

#

interface Ten-GigabitEthernet0/0/48

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan all

 port link-aggregation group 102

#

interface Ten-GigabitEthernet0/0/47

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan all

 port link-aggregation group 102

#

interface Bridge-Aggregation102

 port link-type trunk

 port trunk permit vlan all

 link-aggregation mode dynamic

#

4.     The Leaf device acquires information about VLAN 1, and then an IRF fabric is successfully formed.

5.     Connect the Leaf devices to the Layer 3 switch via the other cable, and manually configure uplink interface aggregation on the Leaf devices.

Configure the controller

The following describes the difference in configuration between the single-leaf network and spine-aggr-leaf network.

1.     On the Configure Basic Info page, it is unnecessary to set RR MAC.

2.     On the Configure Template page:

¡     Unselect Spine Template, select only Leaf Template/Single Leaf Template and Access Template, and select Single Leaf Template on the Leaf Template/Single Leaf Template page.

¡     Configure the uplink interface as the interface connecting the Leaf device to the Layer 3 switch.

Figure 49 Configuring device role template

 

Automated device deployment

Single Spine device

Start up the Spine device with no configuration

If a Spine device starts up with no configuration, it can obtain the Spine configuration template after obtaining the IP address.

Automatic configuration attempt: 3.

Interface used: Vlan-interface1.

Enable DHCP client on Vlan-interface1.

Set DHCP client identifier: 542bdead45f8-VLAN0001

Vlan-interface1 failed to obtain IP address.

Set DHCP6 client identifier: 542bdead45f8-VLAN0001

Obtained configuration file name h3c.template and TFTP server IPv6 address 130::195.// IP address of the TFTP on the controller page  

Obtained an IPv6 address for Vlan-interface1: 132::8.

INFO: Get device tag file device_tag.csv success.

INFO: Read role spine from tag file.

Successfully downloaded file hefei_spine.template.// Name of the Spine template on the controller page

Executing the configuration file. Please wait...

Automatic configuration successfully completed.

Line aux0 is available.

Press ENTER to get started.

Complete automatic configuration of the Spine device

Wait for the automatic configuration of the Spine device. The device is automatically configured based on the downloaded hefei_spine.template. The IP address of VSI-interface 4094 is not included in the automatic configuration here. Use the following commands to view the automatic configuration:

[spine~133::3]dis vcf-fabric underlay autoconfigure

success command:

        #

          system

          clock timezone beijing add 08:00:00

        #

          system

          ip vpn-instance vpn-default

          route-distinguisher 1:1

          vpn-target 1:1 both

          address-family evpn

          vpn-target 1:1 import-extcommunity

          vpn-target 1:1 export-extcommunity

          address-family ipv6

          vpn-target 1:1 import-extcommunity

          vpn-target 1:1 export-extcommunity

        #

          system

          lldp global enable

        #

          system

          interface Vlan-interface1

          ip address dhcp-alloc

        #

          system

          ospfv3 1

          non-stop-routing

          area 0.0.0.0

        #

          system

          interface LoopBack0

        #

          system

          netconf soap https enable

          netconf ssh server enable

          restful https enable

        #

          system

          ssh server enable

        #

          system

          stp mode pvst

          stp vlan 1 enable

          undo stp vlan 2 to 4094 enable

          stp global enable

          stp vlan 1 priority 0

        #

……

Complete automatic configuration of the AC interface

After the automation template is obtained, the physical port that connects the Spine device to the server is automatically configured as the AC interface. After the AC interface configuration is completed, the IP address of VSI-interface 4094 can be obtained.

#

interface Ten-GigabitEthernet1/0/52

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan all

 #

 service-instance 4094

  encapsulation s-vid 4094

  xconnect vsi vxlan4094

#

View main configurations of the Spine device

During automatic configuration of devices, you can view related commands on the device to check whether the IP addresses are obtained. As shown below, the IP addresses of loopback interface 0, VLAN 1, and VSI 4094 have been obtained. There is a link between the Spine device and the downlink Leaf device, so VLAN 3500 is created. (The VLAN range is determined by the Underlay VLAN range in the automation template.)

[spine~133::3]dis ipv6 interface brief

*down: administratively down

(s): spoofing

Interface                                 Physical Protocol IPv6 Address

LoopBack0                                 up       up(s)    51::2

M-GigabitEthernet0/0/0                    down     down     Unassigned

Tunnel0                                   up       up       Unassigned

Tunnel1                                   up       up       Unassigned

Vlan-interface1                           up       up       132::8

Vlan-interface3496                        up       up       FE80::562B:DEFF:FEAD:460A

Vlan-interface3500                        up       up       FE80::562B:DEFF:FEAD:460E

Vsi-interface4092                         up       up       FE80::562B:DEFF:FEAD:461E

Vsi-interface4094                         up       up       133::3

View information on the controller page

On the controller page, you can see that the IP address of the Spine device has been switched to 133::3, which is the IP address of VSI 4094. It also has been managed by the system and added to the Spine device group.

Figure 50 Devices

 

Figure 51 General device groups

 

Complete automatic configuration deployment

According to automatic deployment order, when a single Spine device is deployed first, the BGP configuration is not delivered. The device will deliver the BGP configuration only when the Leaf device is automatically deployed, the Underlay OSPF of the Leaf device is established, and the IP address of the loopback interface 0 is obtained. The BGP configuration delivered here only includes the dynamic configuration related to BGP peer. The fixed configuration of BGP is delivered together with the automation template. You can use the dir command to view hefei_spine.template and the more hefei_spine.template command to view more detailed information. For more details, see "Spine device configurations".

Stacking of Spine devices

Automatic stacking of Spine devices

Prerequisites:

·     The two devices support stacking.

·     The two devices have an interconnection between 10 GE (or higher) ports.

·     The two devices act as the same role.

To use two automatically deployed devices to form an IRF fabric:

1.     Interconnect the master Spine device with the controller via a Layer 3 switch.

2.     Interconnect one Spine device with the other one.

3.     Deploy the device with a larger bridge MAC address first.

 

 

NOTE:

It is not necessary to connect the Spine devices added later to the Layer 3 switch. You only need to connect them via the stacking links of the Spine devices that have been deployed. If you want to connect the subsequent IRF fabric of Spine devices to the Layer 3 switch, you need to manually configure the interface aggregation on the Layer 3 switch, and specify the trunk port as the uplink interface in the Spine template.

 

Spine device 1:

%Feb 19 08:09:58:256 2021 spine~133::8 VCF/4/VCF_FAILED_ADD_IRFPORT: In phase 2.0.10, device with MAC address 542b-dead-45f8 add IRF port GigabitEthernet1/0/7 has failed three times.

%Feb 19 08:10:40:251 2021 spine~133::8 VCF/5/VCF_IRF_START: In phase 2.0.2, device with MAC address 542b-dead-45f8 started IRF configuration: Current member ID 1, new member ID 1, priority 2, ['Ten-GigabitEthernet1/0/49'] bound to IRF-port 1, [None] bound to IRF-port 2.

%Feb 19 08:10:14:711 2021 spine~133::8 VCF/5/VCF_IRF_FINISH: In phase 2.0.3, device with MAC address 542b-dead-45f8 finished IRF configuration with peer 4ce9-e498-16cb. The result is 0.       

Spine device 2:

<spine-132::4>%Feb 19 08:10:18:362 2021 spine-132::4 VCF/5/VCF_IRF_START: In phase 2.0.2, device with MAC address 4ce9-e498-16cb started IRF configuration: Current member ID 1, new member ID 5, priority 1, [None] bound to IRF-port 1, ['GigabitEthernet1/0/2', 'Ten-GigabitEthernet1/0/49'] bound to IRF-port 2.

%Feb 19 08:10:59:621 2021 spine-132::4 VCF/5/VCF_IRF_FOUND: In phase 2.0.1, device with MAC address 4ce9-e498-16cb found peer 542b-dead-45f8 with the same role spine. Availability of IRF configuration is 0.

%Feb 19 08:11:20:874 2021 spine-132::4 VCF/5/VCF_IRF_FINISH: In phase 2.0.3, device with MAC address 4ce9-e498-16cb finished IRF configuration with peer 542b-dead-45f8. The result is 0.

After the standby device restarts, the IRF fabric is set up successfully.

%Feb 19 08:11:25:241 2021 spine-132::4 VCF/5/VCF_REBOOT: Phase 2.0.4, Device 542b-dead-45f8 will reboot. Reason: IRF fabric setup success.

%Feb 19 08:11:27:488 2021 spine-132::4 SYSLOG/5/LOGFILE_USAGEHIGH: The usage of log-file flash:/logfile/logfile.log reaches 80%.

%Feb 19 08:11:28:371 2021 spine-132::4 DEV/5/SYSTEM_REBOOT: System is rebooting now.

%Feb 19 08:15:49:712 2021 spine~133::8 VCF/5/VCF_IRF_ALREADY: In phase 2.0.10, device with MAC address 542b-dead-45f8 has been irf successfully, standby Mac 4ce9-e498-16cb.

 

<spine~133::8>dis irf

MemberID    Role    Priority  CPU-Mac         Description

 *+1        Master  2         f010-90db-7402  ---

   5        Standby 1         f010-90db-7406  ---

--------------------------------------------------

 * indicates the device is the master.

 + indicates the device through which the user logs in.

 

 The bridge MAC of the IRF is: 542b-dead-45f8

 Auto upgrade                : yes

 Mac persistent              : always

 Domain ID                   : 0

After the IRF fabric is successfully set up, the system automatically starts BFD configuration.

%Feb 19 08:17:13:491 2021 spine~133::8 IFNET/3/PHY_UPDOWN: Physical state on the interface Vlan-interface100 changed to up.

%Feb 19 08:17:13:500 2021 spine~133::8 IFNET/5/LINK_UPDOWN: Line protocol state on the interface Vlan-interface100 changed to up.

%Feb 19 08:18:14:574 2021 spine~133::8 BFD/5/BFD_MAD_INTERFACE_CHANGE_STATE: BFD MAD function enabled on Vlan-interface100 changed to the normal state.  

When there is more than one stacking link on the device, one of the links is used as the BFD detection link, and the following configuration is delivered to the physical port.

#

interface GigabitEthernet1/0/7

 port link-mode bridge

 port access vlan 100

 undo stp enable

                                                                         

#

interface GigabitEthernet5/0/2

 port link-mode bridge

 port access vlan 100

 undo stp enable

#

Configure VLAN-interface 100, configure MAD IP addresses for all member devices in the IRF, and bind them with member numbers.

#

interface Vlan-interface100

 mad bfd enable

 mad ip address 192.168.100.1 255.255.255.0 member 1

 mad ip address 192.168.100.2 255.255.255.0 member 5

#

Enable BFD MAD globally on the devices.

[spine~133::8]mad bfd enable 

Multiple links between Spine and Leaf devices

If there are multiple links between Spine devices and Leaf devices, the multiple links are automatically configured with ECMP, regardless of the timing.

[spine~133::8]dis ll n l | include leaf

GE5/0/29        b0f9-63b3-20fe  GigabitEthernet5/0/20      leaf~133::C

GE5/0/37        b0f9-63b3-20fe  GigabitEthernet5/0/33      leaf~133::C

[spine~133::8]display vcf-fabric underlay autoconfigure 

Downlink interface:

        GigabitEthernet5/0/29

        GigabitEthernet5/0/37

IRF allocation:

        Self Bridge Mac: 542b-dead-45f8

        IRF Status: Yes

        Member List: [5, 1]

        BFD Mad-port pairs: GE1/0/7 , GE5/0/2

VLAN ID Allocation:

        VLAN range: 3001-3500

        VLAN exist and system reserved:

        [1]

        Interface                           VLAN ID

        GigabitEthernet5/0/37               3497   

        GigabitEthernet5/0/29               3498                

View the routing table where equal-cost routes have been generated.

[spine~133::8]dis ipv6 routing-table

 

Destinations : 10       Routes : 11

 

Destination: ::/0                                        Protocol  : Direct

NextHop    : FE80::562B:DEFF:FED6:BB83                   Preference: 80

Interface  : Vlan1                                       Cost      : 0

 

Destination: ::1/128                                     Protocol  : Direct

NextHop    : ::1                                         Preference: 0

Interface  : InLoop0                                     Cost      : 0

 

Destination: 51::1/128                                   Protocol  : Direct

NextHop    : ::1                                         Preference: 0

Interface  : InLoop0                                     Cost      : 0

 

Destination: 51::2/128                                   Protocol  : O_INTRA

NextHop    : FE80::B2F9:63FF:FEB3:2111                   Preference: 10

Interface  : Vlan3497                                    Cost      : 1

 

Destination: 51::2/128                                   Protocol  : O_INTRA

NextHop    : FE80::B2F9:63FF:FEB3:2112                   Preference: 10

Interface  : Vlan3498                                    Cost      : 1

Single Leaf device

Start up the Leaf device with no configuration

If a Leaf device starts up with no configuration, it can obtain the Leaf configuration template after obtaining the IP address.

Automatic configuration attempt: 1.

Interface used: Vlan-interface1.

Enable DHCP client on Vlan-interface1.

Set DHCP client identifier: 4ce9e49816cb-VLAN0001

Vlan-interface1 failed to obtain IP address.

Set DHCP6 client identifier: 4ce9e49816cb-VLAN0001

Obtained configuration file name hefei.template and TFTP server IPv6 address 130::195.// The TFTP address of the controller.

Obtained an IPv6 address for Vlan-interface1: 132::A.

INFO: Get device tag file device_tag.csv success.

INFO: Read role leaf from tag file.

Successfully downloaded file hefei_leaf.template.// Name of the Leaf template on the controller page.

Executing the configuration file. Please wait...

Automatic configuration successfully completed.

Line aux0 is available.

Press ENTER to get started.

Wait for automatic configuration of the Leaf device. The device delivers the automatic configuration commands based on the hefei_leaf.template. You can use the dir command to view hefei_leaf.template and the more hefei_leaf.template command to view more detailed information. For more details, see "Leaf device configurations".

Deliver configurations to the interface on the leaf device

Deliver the corresponding configuration to the uplink and downlink interfaces that are dynamically identified.

Uplink interface: Configure VLAN 3496. If there are multiple uplink interfaces, ECMP is configured.

#                                                                              

interface GigabitEthernet1/0/7

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 3496        

#

Downlink interface: After the Access device is deployed automatically, the downlink interface is configured as a trunk port and bound to service instance 4094.                                                                                                   

#

interface GigabitEthernet1/0/29

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 to 99 101 to 4094

 stp tc-restriction

 #

 service-instance 4094

  encapsulation s-vid 4094

  xconnect vsi vxlan4094

View main configurations of the Leaf device                                                                                           

During automated device deployment, you can view related commands to check whether the IP addresses are obtained. The Leaf device obtains the IP addresses of VLAN 1 and the loopback interface. VLAN is automatically assigned to the interconnect interface between the Leaf device and the Spine device, and its IP address uses the IP address of the loopback interface. (The VLAN range is determined by the Underlay VLAN range in the automation template.)

View the IP addresses on the device to see if they are successfully obtained.

[leaf~133::5]dis ipv6 interface brief

*down: administratively down

(s): spoofing

Interface                                 Physical Protocol IPv6 Address

LoopBack0                                 up       up(s)    51::3

M-GigabitEthernet0/0/0                    down     down     Unassigned

Tunnel0                                   up       up       Unassigned

Tunnel1                                   up       up       Unassigned

Vlan-interface1                           up       up       132::A

Vlan-interface3496                        up       up       FE80::4EE9:E4FF:FE98:16DD

Vsi-interface4092                         up       up       FE80::4EE9:E4FF:FE98:16F1

Vsi-interface4094                         up       up       133::5

Check the peer establishment status between the Leaf device and Spine device after the OSPFv3 configuration in the automation template is delivered.

#

interface Vlan-interface3496

 mtu 4094

 ospfv3 1 area 0.0.0.0

 ospfv3 network-type p2p

 ipv6 address auto link-local

#

[leaf~133::5]dis ospfv3 peer

 

               OSPFv3 Process 1 with Router ID 66.0.0.5

 

 Area: 0.0.0.0       

-------------------------------------------------------------------------

 Router ID       Pri State             Dead-Time InstID Interface

 66.0.0.1        1   Full/ -           00:00:36  0      Vlan3500                                                                                            

After discovering the Leaf device via the master RR device (the specified Spine device), the system will automatically assign the configuration of BGP 100 to the Spine device and Leaf device, and establish BGP peers. The corresponding BGP configuration on the Leaf device is as follows:

#

bgp 100

 non-stop-routing

 router-id 66.0.0.5

 peer 51::2 as-number 100

 peer 51::2 connect-interface LoopBack0

 #

 address-family l2vpn evpn

  peer 51::2 enable

 #

 ip vpn-instance vpn-default

  #

  address-family ipv4 unicast

  #

  address-family ipv6 unicast#

Establish EVPN peers between the Leaf device and Spine device.

[leaf~133::4]display  bgp peer l2vpn evpn

BGP local router ID: 66.0.0.5

 Local AS number: 100

 Total number of peers: 1                 Peers in established state: 1

  * - Dynamically created peer

  ^ - Peer created through link-local address

  Peer                    AS  MsgRcvd  MsgSent OutQ PrefRcv Up/Down  State

  51::2                  100       20       17    0      14 00:09:54 Established

VSI 4094 can obtain the IP address of the DHCP server only when the EVPN peers are successfully established and the VXLAN tunnels are UP. Finally, the IP addresses on the device are successfully obtained.

View information on the controller page

After the IP address of VSI 4094 is successfully obtained, you can see that the Leaf device, whose IP address has been switched to that of VSI 4094, has been managed by the controller. In addition, the device has been added to the Leaf device group and the Leaf device group will automatically deploy VLAN 101 to VLAN 3000 to the new device.

The IP address of the Leaf device switches from VLAN 1 to VSI 4094 to be managed by the system.

Figure 52 Device

 

The device is automatically added to the Leaf device group.

Figure 53 Leaf device group

 

Figure 54 Leaf downlink interface group

 

The Leaf interface is automatically added to the Leaf downlink interface group.

Figure 55 Leaf downlink interface group

 

VLAN 101 to VLAN 3000 and VLAN 3496 are allocated on the Leaf device.

 [leaf~133::4]dis vlan

 Total VLANs: 2903

 The VLANs include:

 1(default), 101-3000, 3496, 4094

Multiple Leaf devices

For automated deployment of multiple Leaf devices, pay attention to the deployment of BGP configurations. For users, the configuration deployment is an automated process. Therefore, the users only need to view the management state of the devices on the controller page. EVPN neighbors and VXLAN tunnels will be automatically established after the BGP configurations are deployed on the devices.

The following provides the EVPN neighbor status on the Spine devices after automated deployment of two Leaf devices:

[spine~133::3]display bgp peer l2vpn evpn

 BGP local router ID: 66.0.0.1

 Local AS number: 100

 Total number of peers: 2                 Peers in established state: 2

  * - Dynamically created peer

  ^ - Peer created through link-local address

  Peer                    AS  MsgRcvd  MsgSent OutQ PrefRcv Up/Down  State

  51::1                  100       47       55    0       3 00:39:03 Established

  51::3                  100       15       18    0       5 00:08:01 Established

VXLAN tunnel status viewed on the Spine device:

[spine~133::3]dis interface Tunnel

Tunnel0

Current state: UP

Line protocol state: UP

Description: Tunnel0 Interface

Bandwidth: 64 kbps

Maximum transmission unit: 4038

Internet protocol processing: Disabled

Last clearing of counters: Never

Tunnel source 51::2, destination 51::1

Tunnel protocol/transport UDP_VXLAN/IPv6

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 134 packets, 11750 bytes, 0 drops

Output: 11 packets, 1278 bytes, 0 drops

 

Tunnel1

Current state: UP

Line protocol state: UP

Description: Tunnel1 Interface

Bandwidth: 64 kbps

Maximum transmission unit: 4038

Internet protocol processing: Disabled

Last clearing of counters: Never

Tunnel source 51::2, destination 51::3

Tunnel protocol/transport UDP_VXLAN/IPv6

Last 300 seconds input rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Last 300 seconds output rate: 0 bytes/sec, 0 bits/sec, 0 packets/sec

Input: 0 packets, 0 bytes, 0 drops

Output: 0 packets, 0 bytes, 0 drops

IRF stacking of Leaf devices

Automatic IRF stacking of Leaf devices

Prerequisites:

·     The two devices support stacking.

·     The two devices have an interconnection between 10 GE (or higher) ports.

·     The two devices act as the same role.

To use two automatically deployed devices to form an IRF fabric:

1.     Interconnect the Leaf devices with the Spine devices.

2.     Interconnect one Leaf device with the other one.

3.     Clear the configurations of the two devices and restart them.

If Leaf device 1 detects a connection with a rate of 10 GE or higher to Leaf device 2, and the two devices have the same role, the two devices form an IRF fabric automatically.

Leaf device 1:

%Mar  5 09:57:12:753 2021 H3C VCF/5/VCF_IRF_FOUND: In phase 2.0.1, device with MAC address 4ce9-e498-1803 found peer b0f9-63b3-20fe with the same role leaf. Availability of IRF configuration is 0.

%Mar  5 09:57:40:810 2021 H3C VCF/5/VCF_IRF_START: In phase 2.0.2, device with MAC address 4ce9-e498-1803 started IRF configuration: Current member ID 1, new member ID 5, priority 1, [None] bound to IRF-port 1, ['GigabitEthernet1/0/43', 'Ten-GigabitEthernet1/0/49'] bound to IRF-port 2.priority 1, [None] bound to IRF-port 1, ['Ten-GigabitEthernet5/1/17'] bound to IRF-port 2.

%Mar  5 09:58:42:135 2021 leaf-132::9 VCF/5/VCF_IRF_FINISH: In phase 2.0.3, device with MAC address 4ce9-e498-1803 finished IRF configuration with peer b0f9-63b3-20fe. The result is 0.

Leaf device 2:

%Mar  5 09:56:14:280 2021 H3C VCF/5/VCF_IRF_FOUND: In phase 2.0.1, device with MAC address b0f9-63b3-20fe found peer 4ce9-e498-1803 with the same role leaf. Availability of IRF configuration is 0.

%Mar  5 09:56:54:556 2021 H3C VCF/5/VCF_IRF_START: In phase 2.0.2, device with MAC address b0f9-63b3-20fe started IRF configuration: Current member ID 1, new member ID 1, priority 2, ['GigabitEthernet1/0/13', 'Ten-GigabitEthernet1/0/49'] bound to IRF-port 1, [None] bound to IRF-port 2.

%Mar  5 09:57:55:845 2021 leaf-132::8 VCF/5/VCF_IRF_FINISH: In phase 2.0.3, device with MAC address b0f9-63b3-20fe finished IRF configuration with peer 4ce9-e498-1803. The result is 0.

After the standby device restarts, the IRF fabric is set up successfully.

%Mar  5 09:58:46:607 2021 leaf-132::9 VCF/5/VCF_REBOOT: Phase 2.0.4, Device b0f9-63b3-20fe will reboot. Reason: IRF fabric setup success.

%Mar  5 09:58:49:102 2021 leaf-132::9 SYSLOG/5/LOGFILE_USAGEHIGH: The usage of log-file flash:/logfile/logfile.log reaches 80%.

%Mar  5 09:58:50:428 2021 leaf-132::9 DEV/5/SYSTEM_REBOOT: System is rebooting now.

 

<leaf~133::C>dis irf

MemberID    Role    Priority  CPU-Mac         Description

  *1        Master  2         f010-90db-7402  ---

  +5        Standby 1         f010-90db-7406  ---

--------------------------------------------------

 * indicates the device is the master.

 + indicates the device through which the user logs in.

 

 The bridge MAC of the IRF is: b0f9-63b3-20fe

 Auto upgrade                : yes

 Mac persistent              : always

 Domain ID                   : 0                

After the IRF fabric is successfully set up, the system automatically starts BFD configuration:

%Mar  5 10:04:03:440 2021 leaf-132::8 LLDP/6/LLDP_CREATE_NEIGHBOR: -Slot=5; Nearest bridge agent neighbor created on port GigabitEthernet5/0/43 (IfIndex 295), neighbor's chassis ID is b0f9-63b3-20fe, port ID is GigabitEthernet1/0/13.

%Mar  5 10:04:03:497 2021 leaf-132::8 LLDP/6/LLDP_CREATE_NEIGHBOR: Nearest bridge agent neighbor created on port GigabitEthernet1/0/13 (IfIndex 13), neighbor's chassis ID is b0f9-63b3-20fe, port ID is GigabitEthernet5/0/43.

%Mar  5 10:04:16:401 2021 leaf-132::8 IFNET/3/PHY_UPDOWN: Physical state on the interface Vlan-interface100 changed to up.

%Mar  5 10:04:16:401 2021 leaf-132::8 IFNET/5/LINK_UPDOWN: Line protocol state on the interface Vlan-interface100 changed to up.

%Mar  5 10:05:17:211 2021 leaf-132::8 BFD/5/BFD_MAD_INTERFACE_CHANGE_STATE: BFD MAD function enabled on Vlan-interface100 changed to the normal state.

One of the stacking links on the device is used as the BFD detection link, and the following configuration is delivered to the physical port:

#

interface GigabitEthernet1/0/13

 port link-mode bridge

 port access vlan 100

 undo stp enable

 undo lldp enable

#                                                                             

interface GigabitEthernet5/0/43

 port link-mode bridge

 port access vlan 100

 undo stp enable

 undo lldp enable

#

Configure L3 VLAN-interface 100, configure MAD IP addresses for all member devices in the IRF, and bind them with member numbers.

#

interface Vlan-interface100

 mad bfd enable

 mad ip address 192.168.100.1 255.255.255.0 member 1

 mad ip address 192.168.100.2 255.255.255.0 member 5

#

Enable BFD MAD globally on the devices.

[leaf~133::C]mad bfd enable

Add links between Leaf and Spine devices

After using Spine and Leaf devices to form an IRF fabric, ECMP is automatically configured if new links are added between these devices. After links are added, the link information is as follows:

[leaf~133::C]dis ipv6 routing-table

Destinations : 10       Routes : 11

Destination: ::/0                                        Protocol  : Direct

NextHop    : FE80::562B:DEFF:FED6:BB83                   Preference: 80

Interface  : Vlan1                                       Cost      : 0

Destination: ::1/128                                     Protocol  : Direct

NextHop    : ::1                                         Preference: 0

Interface  : InLoop0                                     Cost      : 0

Destination: 51::1/128                                   Protocol  : O_INTRA

NextHop    : FE80::562B:DEFF:FEAD:460B                   Preference: 10

Interface  : Vlan3497                                    Cost      : 1

Destination: 51::1/128                                   Protocol  : O_INTRA

NextHop    : FE80::562B:DEFF:FEAD:460C                   Preference: 10

Interface  : Vlan3498                                    Cost      : 1

 [leaf~133::C]dis vlan

 Total VLANs: 2905

 The VLANs include:

 1(default), 100-3000, 3497-3498, 4094 

[leaf~133::C]dis vcf-fabric underlay autoconfigure

Uplink interface:

        GigabitEthernet5/0/20

        GigabitEthernet5/0/33

IRF allocation:

        Self Bridge Mac: b0f9-63b3-20fe

        IRF Status: Yes

        Member List: [5, 1]

        BFD Mad-port pairs: GE1/0/13 , GE5/0/43

VLAN ID Allocation:

        Interface                           VLAN ID

        GigabitEthernet5/0/33               3497   

        GigabitEthernet5/0/20               3498 

Add links between Leaf and Access devices

 

NOTE:

The number of auto-aggregated links is limited to two physical links.

 

If you add a link between Leaf and Access devices, multiple links are automatically aggregated.

%Mar  5 12:58:55:405 2021 access-132::9 LAGG/6/LAGG_ACTIVE: Member port GE1/0/13 of aggregation group BAGG1024 changed to the active state.

%Mar  5 12:59:02:833 2021 access-132::9 IFNET/3/PHY_UPDOWN: Physical state on the interface Bridge-Aggregation1024 changed to up.

%Mar  5 12:59:02:842 2021 access-132::9 IFNET/5/LINK_UPDOWN: Line protocol state on the interface Bridge-Aggregation1024 changed to up.

%Mar  5 12:58:59:630 2021 access-132::9 VCF/6/VCF_AGGR_CREATE: In phase 2.0.5, device with MAC address b0f9-63b3-20fe created aggregation group 1024. The member port list is GigabitEthernet1/0/13,GigabitEthernet1/0/21.

 

[leaf~133::5]dis ll n l | include access

GE5/0/35        b0f9-63b3-20fe  GigabitEthernet1/0/13      access~133::2

GE5/0/41        b0f9-63b3-20fe  GigabitEthernet1/0/21      access~133::2

The controller will automatically delete the configuration of the original member port and deploy the configuration of the downlink interface of the Leaf device on the aggregation port.

#

interface GigabitEthernet5/0/35

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 to 99 101 to 4094

 port link-aggregation group 1024

#

interface GigabitEthernet5/0/41

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 to 99 101 to 4094

 port link-aggregation group 1024

#

interface Bridge-Aggregation1024

 port link-type trunk

 port trunk permit vlan 1 to 99 101 to 4094

 link-aggregation mode dynamic

 stp tc-restriction

 #

 service-instance 4094

  encapsulation s-vid 4094

  xconnect vsi vxlan4094

#

Single Access device

 

NOTE:

·     Before the automated deployment of the Access device, the Leaf device connecting to its uplink interface must complete automated deployment and be activated first.

·     If the Access device is incorporated manually, the Leaf device connecting to its uplink interface must be incorporated and activated first.

·     If the automated device deployment fails, clear the configuration of the device and perform automated deployment again.

 

Start up the Access device with no configuration

If the Access device starts up with no configuration, it obtains the IP address of VLAN 1 via the Leaf device and then obtains the automated deployment template.

Automatic configuration attempt: 1.

Interface used: Vlan-interface1.

Enable DHCP client on Vlan-interface1.

Set DHCP client identifier: 4ce9e4981803-VLAN0001

Vlan-interface1 failed to obtain IP address.

Set DHCP6 client identifier: 4ce9e4981803-VLAN0001

Obtained configuration file name hefei.template and TFTP server IPv6 address 130::195.// The TFTP address of the controller.

Obtained an IPv6 address for Vlan-interface1: 132::3.

INFO: Get device tag file device_tag.csv success.

INFO: Read role access from tag file.

Successfully downloaded file hefei_access.template.//Device template.

Executing the configuration file. Please wait...

Automatic configuration successfully completed.

Line aux0 is available.

 

Press ENTER to get started.                                                                                     

Complete automatic configuration of the Access device

Wait for automatic configuration of the Access device, which executes the automatic configuration command based on the hangzhou_access.template. Each downlink interface of the Access device is allocated with a unique PVID during automated deployment. If the device is a switch that supports PoE, the PoE function is enabled for ports. You can use the dir command to view hefei_access.template and the more hefei_access.template command to view more detailed information. For more details, see "Access device configurations".

View main configuration of the Access device

Wait for the automated deployment of the Access device. The IP addresses of VLAN 1 and VLAN 4094 are successfully obtained.

[access~133::8]dis ipv6 interface brief

*down: administratively down

(s): spoofing

Interface                                 Physical Protocol IPv6 Address

M-GigabitEthernet0/0/0                    down     down     Unassigned

Vlan-interface1                           up       up       132::3

Vlan-interface4094                        up       up       133::8

The uplink interface of the Access device is set to Trunk all.

#

interface GigabitEthernet1/0/20

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan all

#

If the device supports PoE, the PoE function is enabled for all interfaces. If an AP device is detected, VLAN 4093 will be configured and the downlink interface of the Access device is configured with PVID 4093.

#

interface GigabitEthernet1/0/20

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan all

 poe enable

#

View information on the controller page

When you view the device information on the controller, you can see that the Access device, whose IP address has been switched from VLAN 1 to VLAN 4094, has been managed by the controller.

Figure 56 Device

 

The device is also automatically added to the Access device group.

Figure 57 Access device group

 

IRF stacking of Access devices

Automatic IRF stacking of Access devices

To use two automatically deployed devices to form an IRF fabric:

1.     Interconnect the Access devices with the Leaf device.

2.     Interconnect the two devices via one cable.

3.     Clear the configurations of the two devices and restart them.

After adding another Access device for automated deployment, the two devices automatically form an IRF fabric if Access device 1 detects a 10 GE connection with Access device 2 and the two devices have the same role.

[access~133::7]dis irf

MemberID    Role    Priority  CPU-Mac         Description

 *+1        Master  2         f010-90db-7402  ---

   5        Standby 1         f010-90db-7406  ---

--------------------------------------------------

 * indicates the device is the master.

 + indicates the device through which the user logs in.

 

 The bridge MAC of the IRF is: b0f9-63b3-20fe

 Auto upgrade                : yes

 Mac persistent              : always

 Domain ID                   : 0

 

 

NOTE:

At present, the IRF stacking of Access devices does not support automated configuration of BFD MAD. If necessary, you need to manually configure BFD MAD.

 

To manually configure BFD MAD:

4.     After an IRF is formed, ensure that the physical port of BFD is down, and configure BFD on the physical ports of the IRF fabric composed of Access devices.

#

vlan 100      // Dedicated for BFD MAD.                                                                                         

#                                                                                                                                  

interface Ten-GigabitEthernet 1/0/49                                                                                                    

 port link-type trunk                                                                                                               

 undo port trunk permit vlan 1                                                                                                     

 port trunk permit vlan 100                                                                                                          

 undo stp enable

 stp edged-port     //The controller will audit the difference if this command is not configured.                                                                                                                    

 undo lldp enable                                                                                                                  

#

#                                                                                                                                   

interface Ten-GigabitEthernet 5/0/49                                                                                                    

 port link-type trunk                                                                                                               

 undo port trunk permit vlan 1                                                                                                     

 port trunk permit vlan 100                                                                                                          

 undo stp enable

 stp edged-port     //The controller will audit the difference if this command is not configured.                                                                                                                

 undo lldp enable                                                                                                                  

#                                                                                                                    

#                                                                                                                                  

interface Vlan-interface100                                                                                                         

 mad bfd enable                                                                                                                    

 mad ip address 192.168.100.1 255.255.255.0 member 1                                                                               

 mad ip address 192.168.100.5 255.255.255.0 member 5                                                                                

#

5.     Interconnect the two ports that need to configure BFD and check the state of BFD MAD.

[5130s-hi-down]disp mad verbose                                                                                                    

Multi-active recovery state: No                                                                                                    

Excluded ports (user-configured):                                                                                                  

Excluded ports (system-configured):                                                                                                

  IRF physical interfaces:                                                                                                         

    Ten-GigabitEthernet1/0/49                                                                                                      

    Ten-GigabitEthernet5/0/49                                                                                                       

  BFD MAD interfaces:                                                                                                                                                                                                                 

    GigabitEthernet1/0/13                                                                                                          

    GigabitEthernet5/0/43                                                                                                                                                                                                      

    Vlan-interface100                                                                                                               

MAD ARP disabled.                                                                                                                   

MAD ND disabled.                                                                                                                   

MAD LACP disabled.                                                                                                                 

MAD BFD enabled interface: Vlan-interface99                                                                                         

  MAD status                 : Normal                                                                                              

  Member ID   MAD IP address       Neighbor   MAD status                                                                            

  1           192.168.100.1/24     5          Normal                                                                               

  5           192.168.100.5/24     1          Normal     

Automatic link aggregation between Leaf and Access devices

 

NOTE:

The number of auto-aggregated links is limited to two physical links.

 

[access~133::2]dis ll n l | include leaf

GE1/0/13        4ce9-e498-16cb  GigabitEthernet5/0/35      leaf~133::5

GE1/0/21        4ce9-e498-16cb  GigabitEthernet5/0/41      leaf~133::5

[access~133::2]dis vlan brief

Brief information about all VLANs:

Supported Minimum VLAN ID: 1

Supported Maximum VLAN ID: 4094

Default VLAN ID: 1

VLAN ID   Name                             Port

1         VLAN 0001                        BAGG1024(U)   GE1/0/13(U)  

                                           GE1/0/21(U)  

101       VLAN 0101                        BAGG1024(U)   GE1/0/1(D)  

                                           GE1/0/13(U)   GE1/0/21(U)  

102       VLAN 0102                        BAGG1024(U)   GE1/0/2(D)  

                                           GE1/0/13(U)   GE1/0/21(U)

[access~133::2]dis link-aggregation verbose

Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing

Port Status: S -- Selected, U -- Unselected, I -- Individual

Port: A -- Auto port, M -- Management port, R -- Reference port

Flags:  A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,

        D -- Synchronization, E -- Collecting, F -- Distributing,

        G -- Defaulted, H -- Expired

Aggregate Interface: Bridge-Aggregation1024

Creation Mode: Manual

Aggregation Mode: Dynamic

Loadsharing Type: Shar

Management VLANs: None

System ID: 0x8000, b0f9-63b3-20fe

Local:

  Port                Status   Priority Index    Oper-Key               Flag

  GE1/0/13            S        32768    1        1                      {ACDEF}

  GE1/0/21            S        32768    2        1                      {ACDEF}

Remote:

  Actor               Priority Index    Oper-Key SystemID               Flag  

  GE1/0/13(R)         32768    1        1        0x8000, 4ce9-e498-16cb {ACDEF}

  GE1/0/21            32768    2        1        0x8000, 4ce9-e498-16cb {ACDEF}

Cascading of Access devices

If the Access device needs to be cascaded, the GE port must be used for cascading. The Access device directly connected to the Leaf device is called the level-1 Access device, and the Level-1 Access device is cascaded with the level-2 Access device, and so on. The current version supports up to three levels of cascading. The automated deployment process of the level-2 Access device is similar to that of the level-1 Access device.

 

 

NOTE:

·     During automated deployment of the level-1 Access device, the downlink interface is automatically configured as a PVID started from 101 (101 to 3000). However, if a level-2 Access device is cascaded to the level-1 Access device, the PVID will be restored to 1 once the level-1 Access device detects that the downlink interface is UP and the device is an H3C switch, to ensure the automated deployment of the level-2 Access device. If the device is a non-H3C device, manually set PVID to 1.

·     The number of auto-aggregated links of the cascading Access device is limited to two physical links.

 

Start up the cascaded Access devices with no configuration

If the cascaded Access devices start up with no configuration, the automated deployment process is as follows:

Startup configuration file doesn't exist or is invalid.

Performing automatic configuration... Press CTRL_C or CTRL_D to break.

 

Automatic configuration attempt: 1.

Interface used: Vlan-interface1.

Enable DHCP client on Vlan-interface1.

Set DHCP client identifier: b0f963b320fe-VLAN0001

Vlan-interface1 failed to obtain IP address.

Set DHCP6 client identifier: b0f963b320fe-VLAN0001

Obtained configuration file name hefei.template and TFTP server IPv6 address 130::195.

Obtained an IPv6 address for Vlan-interface1: 132::7.

INFO: Get device tag file device_tag.csv success.

INFO: Read role access from tag file.

Successfully downloaded file hefei_access.template.

Executing the configuration file. Please wait...

Automatic configuration successfully completed.

Line aux0 is available.

 

 

Press ENTER to get started.

View and check the deployment information                                                                                                      

View the obtained IP addresses of VLAN-interface 1 and VLAN-interface 4094.

<access~133::9>dis ipv6 interface brief

*down: administratively down

(s): spoofing

Interface                                 Physical Protocol IPv6 Address

M-GigabitEthernet0/0/0                    down     down     Unassigned

Vlan-interface1                           up       up       132::7

Vlan-interface4094                        up       up       133::9

On the controller page, you can see that the added level-2 Access device has been managed.

Figure 58 Device

 

The level-2 Access device is also automatically imported to the Access device group.

Figure 59 Access device group

 

Configure the security group

Add a DHCPv6 server in the isolation domain

Access Automation > Campus Network > Isolation Domain > Isolation Domain page, and click Add to add an isolation domain, or click the Edit icon  in the actions column to edit the isolation domain. This document takes the editing of the isolation domain as an example.

Click the Edit icon  in the actions column corresponding to isolate_domain1 in the list. Click the drop-down arrow of DHCPv6 Server to select the DHCPv6 server to be configured, and then click OK to save the configuration.

Figure 60 Binding loose Microsoft DHCP

 

Figure 61 Configuring Microsoft DHCPv6

 

Figure 62 Binding vDHCP

 

Figure 63 DHCP

 

Add a Layer 2 network domain

1.     Access Automation > Campus Network > Private Network > Layer 2 Network Domain page, and click Add to add a Layer 2 network domain, or click the Edit icon  in the actions column to edit the Layer 2 network domain. This document takes the editing of a Layer 2 network domain as an example.

2.     For the Layer 2 network domain whose type is normal, configure the IPv6 subnet in the Subnets area at the bottom of the page. When IPv6 Address Allocation is set to SLAAC or Stateless DHCPv6, only global unicast addresses with a prefix length of 64 bits are supported.

Figure 64 Configuring subnets

 

For IPv6 address allocation, the following 4 modes can be selected:

¡     Manual: Manually configure static IPv6 addresses on user terminals.

¡     SLAAC: Short for Stateless Address Autoconfiguration. SLAAC enables an interface to automatically generate an IPv6 global unicast address by using the address prefix in the received RA message and interface ID.

¡     Stateful DHCPv6: The user obtains the IPv6 address via the DHCPv6 server and configures other network parameters based on DHCPv6 server messages. If both M (Managed Address Configuration) flag and O (Other Configuration) flag in the RA message received by the user are set to 1 bit, the DHCPv6 client will automatically enable the stateful DHCPv6 configuration function.

¡     Stateless DHCPv6: The DHCPv6 server assigns other network configuration parameters to clients that already have IPv6 addresses/prefixes, a process known as DHCPv6 stateless configuration. If the M (Managed Address Configuration) flag in the RA message is set to 0 bit, and O (Other Configuration) flag to 1 bit, the DHCPv6 client will automatically enable the stateless DHCPv6 configuration function to obtain other network configuration parameters except addresses/prefixes.

Figure 65 IPv6 address allocation

 

3.     Switch to the Advanced tab to enable DHCPv6 Snooping or IPv6 ND Snooping. DHCPv6 snooping ensures that the client obtains IPv6 addresses or IPv6 prefixes from valid servers, and can record the correspondence between IPv6 addresses or IPv6 prefixes of the DHCPv6 client and MAC addresses. IPv6 ND Snooping is a security monitoring technique to prevent ND attacks.

Figure 66 Advanced configuration

 

4.     After completing the configuration, click OK to save the settings.

Configure the security group

1.     Access Automation > Campus Network > Security Group > User Security Group page, and click Add to add a security group, or click the Edit icon  in the actions column. This document takes the editing of the security group as an example.

2.     Switch to the Layer 2 Network Domain Information tab, and click Add. Select Layer 2 Network Domain in the Optional Layer 2 Network Domain area, click the  icon to add the Layer 2 network domain to the Selected Layer 2 Network Domain area, click OK to save the configuration, and the result is shown in the figure below.

Figure 67 Adding a Layer 2 network domain

 

Figure 68 Layer 2 network domain information

 

3.     After completing the configuration, click OK to save the settings.

Configure IPv6 authentication

To use IPv6 authentication, you can add an H3C EIA V7 (IMC EIA) server on the controller.

1.     Access Automation > Network Parameters > AAA page to add an EIA V7 server. For details, see AD-Campus 6.2 Basic Configuration Guide.

Figure 69 Adding an EIA V7 server

 

2.     Create an AAA policy template.

¡     Access Automation > Device Groups > General Device Groups page, and click Policy Templates. Click Add, and select Device Policy Template from the drop-down list.

¡     Select AAA as template type, and click Add in the Radius Scheme Settings area. On the pop-up page, enter the IPv6 addresses in Primary Auth Server IP and Secondary Auth Server IP.

Figure 70 Adding a Radius scheme

 

3.     After completing the configuration, click OK to save the configuration, and the result is shown in the figure below.

Figure 71 Configuration result

 

4.     Click Add in the ISP Domain Settings area to access the Add ISP Domain page. Select Radius Scheme, set Is A Default Domain to Yes, click OK, and then you will return to the page for adding the device policy template. Click OK to save the template.

Figure 72 Adding an ISP domain

 

5.     Create a MAC/MAC Portal policy template.

¡     Access Automation > Campus Network > Device Groups > General Device Groups page, and click Policy Templates. Click Add, and select Device Policy Template from the drop-down list.

¡     Select MAC/MAC Portal Authentication as the template type, and click Add in the Authentication-Free IPs area. On the pop-up page, enter the IPv6 addresses of the primary and secondary servers.

Figure 73 Authentication exemption information

 

a.     After completing the configuration, click OK to save the template.

6.     Create an 802.1X policy template.

a.     Access Automation > Campus Network > Device Groups > General Device Groups page, and click Policy Templates. Click Add, and select Device Policy Template from the drop-down list.

b.     Select 802.1X as the template type and EAP as the authentication method.

Figure 74 Adding an 802.1X device policy template

 

a.     After completing the configuration, click OK to save the template.

7.     Add the new AAA policy template, 802.1X policy template, and MAC/MAC Portal policy template of IPv6 to its corresponding device group and interface group.

a.     Access Automation > Campus Network > Device Groups > General Device Groups page, and click the Edit icon  in the actions column corresponding to the name Leaf Device Group.

b.     Switch to the Policy tab, and click Add. In the Available Policy Templates area, select AAA as the template type. In the Available AAA Policy area, select the AAA policy template of IPv6 to be added, and click Add to add the template to the Selected Policies area. Repeat the above operations to complete the addition of 802.1X policy template and MAC/MAC Portal policy template. Click OK after the addition of the three policy templates, and then the newly added policies are displayed in the policy list.

Figure 75 Adding policy templates

 

Figure 76 Adding general policy groups

 

a.     After completing the configuration, click OK to save the settings.

8.     For users who have IPv6 MAC Portal authentication requirements, the creation of a single-stack IPv6 BYOD Layer 2 network domain and security group are required.

 

IMPORTANT

IMPORTANT:

BYOD Layer 2 network domain subnets can only be configured with either IPv4 or IPv6. When a user comes online via MAC Portal authentication, configure an IPv4 subnet in the BYOD Layer 2 network domain for IPv4 EIA authentication and an IPv6 subnet in the BYOD Layer 2 network domain for IPv6 EIA authentication.

 

Access Automation > Campus Network > Private Network > Layer 2 Network Domain page, and click Add. Click drop-down arrow of DHCPv6 Server to select the DHCPv6 server to be configured. Switch to the Subnets tab, click Add to configure subnets, and the result is as shown in the figure below.

Figure 77 Adding a Layer 2 network domain

 

9.     On the EIA V7 page, access User > Access Policy Management > Service Parameter Settings > System Settings > System Parameter Settings page to enable IPv6, and the other settings are the same as those for enabling IPv4.

Figure 78 Enabling IPv6 on the EIA V7 page

 

IMPORTANT

IMPORTANT:

The IPv6 address of EIA V7 needs to be configured during the installation of EIA. If you need to enable the IPv6 function of EIA after completing the configuration of EIA, you can modify the configuration file ( the server-addr file in the path C:\Program File\iMC\common\conf) by changing the IPv6 address segment in the file to 190::204 and restarting the IMC service (modifying the configuration file is not recommended).

 

Figure 79 Logging in to the IPv6 address

 

10.     After the AAA policy template is bound to the Leaf device group, the controller pushes the access device to EIA V7. On EIA system, access User > Access Service > Access Device Management > Access Device page to view the information about the access device.

Figure 80 Viewing the information about the access device

 

Configure authentication terminals

For a user terminal with a Windows system, when obtaining IPv6 addresses during stateless address autoconfiguration (including stateless DHCPv6 and SLAAC), the user terminal automatically generates two IPv6 addresses: public IPv6 address and temporary IPv6 address.

·     Public IPv6 address: Includes the address prefix in the received RA message and a fixed interface ID generated based on the MAC address.

·     Temporary IPv6 address: Includes the address prefix in the RA message and a random interface ID generated through MD5.

The IPv6 address with a random interface ID generated during stateless address autoconfiguration decreases network vulnerability. If there is a temporary IPv6 address, the user interacts with external networks via this address.

 

To enable or disable the temporary IPv6 address, execute the following commands in the Windows terminal command line interface:

netsh interface IPv6 set privacy state=enable

netsh interface IPv6 set privacy state=disable

 

CAUTION

CAUTION:

When the user comes online via IPv6 MAC Portal authentication, the user needs to open a web page on the user PC in a non-DNS environment and enter any IPv6 address, for example, 23:1::1, so that the user portal can automatically redirect to the default BYOD portal.

 

User online

The user online service of IPv6 is the same as that of IPv4, except that IPv6 subnets are used and the user obtains an IPv6 address. For details, see "User authentication and online" in AD-Campus 6.2 Basic Configuration Guide.

 

O&M monitoring

For details, see AD-Campus 6.2 O&M, Monitoring, and Deployment Guide.

Appendix

Spine device configurations

##

## Please note:The following variable names are used by the internal system,please do not use

## _underlayIntfUp _underlayIntfDown _all_leaf _master_spine

## _master_spine_mac _underlayIPRange

##

##NEW_VERSION

#USERDEF

##Template version

template_version = 5.0

##BACKUP_SERVER

##Local user: Username

_username = h3c

##Local user: Password

_password = campus1234

## User roles

_rbacUserRole = network-admin

##MAC address of the master spine device

_master_spine_mac = 542b-dead-45f8

##MAC address of the master spine device and address range of loopback interfaces

##Format: 1122-3344-5566:10.100.0.0/16, AABB-CCDD-EEFF:10.101.0.0/16

 

##MAC address and VLAN ID range of the spine device

##Format: 1122-3344-5566:2-100 ,AABB-CCDD-EEFF:101-200

_underlayVLANRange = 542b-dead-45f8:3001-3500

##IP address of the log host

_loghost_ip = 130::195

##is_ipv6_begin_var

##Device is automatically online by ipv6

_is_ipv6 = true

##is_ipv6_end_var

##Out of band

_OOB = False

##SSH enabled

_SSH = True

##Disable automatic IRF setup

_irf_disable = false

##Enabling whitelist filtering (False by default)

_white_list_check = true

##Disabling automatic allocation of an underlay IP (False by default)

_ip_disable = false

##Enabling automatic IRF mode switching

_irf_mode_auto_convert = True

##MAD BFD

_mad_vlan = 100

_mad_ip = 192.168.100.1, 192.168.100.2

##BGP AS number

bgp_as_campus = 100

 

[H3CS5560X]

driver = 5560X

_switch_mode = 1

 

[H3CS6520X]

driver = 6520X

_switch_mode = 1

 

[H3CS125??G-AF]

driver = 125GAF

_tcam_resource = arp

_vxlan_resource = l3gw

_routing_mode_resource = ipv6-128

 

 

##

#STATICCFG

#

 clock timezone beijing add 08:00:00

#

ip vpn-instance vpn-default

 route-distinguisher 1:1

 vpn-target 1:1 both

 ##address_family_evpn_begin

 address-family evpn

 vpn-target 1:1 import-extcommunity

 vpn-target 1:1 export-extcommunity

 ##address_family_evpn_end

 

 ##address_family_ipv6_begin

 address-family ipv6

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

 ##address_family_ipv6_end

#

 lldp global enable

#

interface Vlan-interface1

 ip address dhcp-alloc

#

ospfv3 1

 non-stop-routing

 area 0.0.0.0

#

##loopback0_begin_all

interface LoopBack0

##loopback0_end_all

#

interface $$_underlayIntfDown

 ipv6 address auto link-local

 ospfv3 1 area 0.0.0.0

 ospfv3 network-type p2p

 mtu 4094

#

 netconf soap https enable

 netconf ssh server enable

 restful https enable

#

 ssh server enable

#

info-center loghost $$_loghost_ip

#

 stp mode pvst

 stp vlan 1 enable

 undo stp vlan 2 to 4094 enable

 stp global enable

 stp vlan 1 priority 0

#

local-user $$_username

 password simple $$_password

 service-type http https ssh

 authorization-attribute user-role $$_rbacUserRole

#

line vty 0 63

 authentication-mode scheme

 user-role $$_rbacUserRole

#

bgp $$bgp_as_campus

 non-stop-routing

 address-family l2vpn evpn

 ip vpn-instance vpn-default

  ##address_family_ipv4_unicast_begin

  address-family ipv4 unicast

   import-route static

  ##address_family_ipv4_unicast_end

 

  ##address_family_ipv6_unicast_begin

  address-family ipv6 unicast

   import-route static

  ##address_family_ipv6_unicast_end

#

 l2vpn enable

#

 vlan 4094

#

interface Vsi-interface4094

 ip binding vpn-instance vpn-default

 local-proxy-arp enable

 

 ##local-proxy-nd_enable_begin

 local-proxy-nd enable

 ##local-proxy-nd_enable_end

 mtu 4094

#

interface Vsi-interface4092

 ip binding vpn-instance vpn-default

 ip address unnumbered interface Vsi-interface4094

 

 ##ipv6_address_auto_link_local_begin

 ipv6 address auto link-local

 ##ipv6_address_auto_link_local_end

 l3-vni 4092

 description SDN_VRF_VSI_Interface_4092

#

vsi vxlan4094

 gateway vsi-interface 4094

 vxlan 4094

 evpn encapsulation vxlan

  mac-advertising disable

  nd mac-learning disable

  arp mac-learning disable

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

 

 ##ipv6_dhcp_snooping_trust_tunnel_begin

 ipv6 dhcp snooping trust tunnel

 ##ipv6_dhcp_snooping_trust_tunnel_end

 loopback-detection action block  

 loopback-detection enable vlan 4094

 

#

 vxlan tunnel mac-learning disable

 vxlan tunnel arp-learning disable

 vxlan tunnel nd-learning disable

#

 vcf-fabric topology enable

#

 vxlan default-decapsulation source interface LoopBack 0

#

 

##ipv6_static_route_begin_all

ipv6 route-static vpn vpn-default 130:0:0:0:0:0:0:0 64 133:0:0:0:0:0:0:1

ipv6 route-static vpn vpn-default 190:0:0:0:0:0:0:0 64 133:0:0:0:0:0:0:1

ipv6 route-static 130:0:0:0:0:0:0:0 64 132:0:0:0:0:0:0:1

ipv6 route-static 190:0:0:0:0:0:0:0 64 132:0:0:0:0:0:0:1

#

##ipv6_static_route_end_all

#

 

snmp-agent

snmp-agent community read public

snmp-agent community write private

snmp-agent sys-info version all

snmp-agent packet max-size 4096

#

telnet server enable

#

netconf soap https enable

netconf soap http enable

local-user h3c

password simple campus1234

service-type telnet ssh http https

authorization-attribute user-role network-admin

#

Leaf device configurations

##

## Please note:The following variable names are used by the internal system,please do not use

## _underlayIntfUp _underlayIntfDown _all_leaf _master_spine _backup_spine

## _master_spine_mac

##

##NEW_VERSION

#USERDEF

##Template version

template_version = 5.0

##Local user: Username

_username = h3c

##Local user: Password

_password = campus1234

## User roles

_rbacUserRole = network-admin

##master_leaf_mac_begin_var

##MAC address of the master leaf device

_master_leaf_mac =${master_leaf_mac}

##master_leaf_mac_end_var

##IP address of the log host

_loghost_ip = 130::195

##is_ipv6_begin_var

##Device is automatically online by ipv6

_is_ipv6 = true

##is_ipv6_end_var

##Out of band

_OOB = False

##Supporting aggregation (True by default)

_lagg_enable = True

##Enforcing aggregation

_lagg_force = True

##Do not delete aggregation group

_lagg_fake_delete = True

##SSH enabled

_SSH = True

##Disable automatic IRF setup

_irf_disable = false

##Enabling whitelist filtering (False by default)

_white_list_check = true

##Enabling automatic IRF mode switching

 

## Enable OLT interface

_olt = true

 

## auto IRF mode convert

_irf_mode_auto_convert = True

##MAD BFD

_mad_vlan = 100

_mad_ip = 192.168.100.1, 192.168.100.2

##BGP AS number

bgp_as_campus = 100

##Disable lldp function when MAD BFD

_mad_undo_lldp=True

 

[H3CS5560X]

driver = 5560X

_switch_mode = 1

 

[H3CS6520X]

driver = 6520X

_switch_mode = 1

 

 

[H3CS125??G-AF]

driver = 125GAF

_tcam_resource = mix

_vxlan_resource = l3gw

_routing_mode_resource = ipv6-128

 

[UNISS5600X]

driver = 5560X

_switch_mode = 1

 

[UNISS6600X]

driver = 6520X

_switch_mode = 1

 

##

#STATICCFG

#

 clock timezone beijing add 08:00:00

#

ip vpn-instance vpn-default

 route-distinguisher 1:1

 vpn-target 1:1 both

 ##address_family_evpn_begin

 address-family evpn

 vpn-target 1:1 import-extcommunity

 vpn-target 1:1 export-extcommunity

 ##address_family_evpn_end

 

 ##address_family_ipv6_begin

 address-family ipv6

  vpn-target 1:1 import-extcommunity

  vpn-target 1:1 export-extcommunity

 ##address_family_ipv6_end

#

 lldp global enable

#

 dhcp snooping enable vlan 2 to 4094

#

interface Vlan-interface1

 ip address dhcp-alloc

#

ospfv3 1

 non-stop-routing

 area 0.0.0.0

#

##loopback0_begin_all

interface LoopBack0

##loopback0_end_all

#

 stp mode pvst

 stp vlan 1 enable

 undo stp vlan 2 to 4094 enable

 stp global enable

 stp vlan 1 priority 8192

#

 netconf soap https enable

 netconf ssh server enable

 restful https enable

#

 ssh server enable

#

info-center loghost $$_loghost_ip

#

local-user $$_username

 password simple $$_password

 service-type http https ssh

 authorization-attribute user-role $$_rbacUserRole

#

line vty 0 63

 authentication-mode scheme

 user-role $$_rbacUserRole

#

bgp $$bgp_as_campus

 non-stop-routing

 address-family l2vpn evpn

 ip vpn-instance vpn-default

  ##address_family_ipv4_unicast_begin

  address-family ipv4 unicast

  ##address_family_ipv4_unicast_end

 

  ##address_family_ipv6_unicast_begin

  address-family ipv6 unicast

  ##address_family_ipv6_unicast_end

#

interface $$_underlayIntfUp

 ipv6 address auto link-local

 ospfv3 1 area 0.0.0.0

 ospfv3 network-type p2p

 mtu 4094

#

interface $$_underlayIntfDown

 port link-type trunk

 port trunk permit vlan all

 undo port trunk permit vlan $$_mad_vlan

 stp tc-restriction

 service-instance 4094

  encapsulation s-vid 4094

  xconnect vsi vxlan4094

#

interface $$_underlayIntfGe

 poe enable

#

interface $$_underlayIntfONU 

 port link-type trunk

 port trunk permit vlan all

 undo port trunk permit vlan $$_mad_vlan

#

interface $$_underlayIntfRONU                             

 port link-type trunk                                                

 port trunk permit vlan all

 undo port trunk permit vlan $$_mad_vlan

#

 l2vpn enable

#

 vlan 4094

#

interface Vsi-interface4094

 ip binding vpn-instance vpn-default

 local-proxy-arp enable

 

 ##local-proxy-nd_enable_begin

 local-proxy-nd enable

 ##local-proxy-nd_enable_end

 arp proxy-send enable

 mtu 4094

#

interface Vsi-interface4092

 ip binding vpn-instance vpn-default

 ip address unnumbered interface Vsi-interface4094

 

 ##ipv6_address_auto_link_local_begin

 ipv6 address auto link-local

 ##ipv6_address_auto_link_local_end

 l3-vni 4092

 description SDN_VRF_VSI_Interface_4092

#

vsi vxlan4094

 gateway vsi-interface 4094

 vxlan 4094

 evpn encapsulation vxlan

  mac-advertising disable

  nd mac-learning disable

  arp mac-learning disable

  route-distinguisher auto

  vpn-target auto export-extcommunity

  vpn-target auto import-extcommunity

 

 ##ipv6_dhcp_snooping_trust_tunnel_begin

 ipv6 dhcp snooping trust tunnel

 ##ipv6_dhcp_snooping_trust_tunnel_end

 dhcp snooping trust tunnel

 loopback-detection action block

 loopback-detection enable vlan 4094

#

ip verify source exclude vlan 1

ip verify source exclude vlan 4094

#

vxlan tunnel mac-learning disable

vxlan tunnel arp-learning disable

vxlan tunnel nd-learning disable

#

 vcf-fabric topology enable

#

 vxlan default-decapsulation source interface LoopBack 0

#

 

##ipv6_static_route_begin_all

ipv6 route-static vpn vpn-default 130:0:0:0:0:0:0:0 64 133:0:0:0:0:0:0:1

ipv6 route-static vpn vpn-default 190:0:0:0:0:0:0:0 64 133:0:0:0:0:0:0:1

ipv6 route-static 130:0:0:0:0:0:0:0 64 132:0:0:0:0:0:0:1

ipv6 route-static 190:0:0:0:0:0:0:0 64 132:0:0:0:0:0:0:1

#

##ipv6_static_route_end_all

#

 

##ipv6_dhcp_snooping_enable_begin

 ipv6 dhcp snooping enable vlan 2 to 4094

#

##ipv6_dhcp_snooping_enable_end

 

snmp-agent

snmp-agent community read public

snmp-agent community write private

snmp-agent sys-info version all

snmp-agent packet max-size 4096

#

telnet server enable

#

netconf soap https enable

netconf soap http enable

local-user h3c

password simple campus1234

service-type telnet ssh http https

authorization-attribute user-role network-admin

#

Access device configurations

##

## Please note:The following variable names are used by the internal system,please do not use

## _underlayIntfUp _underlayIntfDown _all_leaf _master_spine _backup_spine

## _master_spine_mac

##

#USERDEF

##Template version

template_version = 5.0

## User roles

_rbacUserRole = network-admin

##IP address of the log host

_loghost_ip = 130::195

##is_ipv6_begin_var

##Device is automatically online by ipv6

_is_ipv6 = true

##is_ipv6_end_var

##Out of band

_OOB = False

##Supporting aggregation (True by default)

_lagg_enable = True

##Enforcing aggregation

_lagg_force = True

##Do not delete aggregation group

_lagg_fake_delete = True

##SSH enabled

_SSH = True

##Disable automatic IRF setup

_irf_disable = false

##Enabling whitelist matching (False by default)

_white_list_check = true

##Disable lldp function when MAD BFD

_mad_undo_lldp=True

#STATICCFG

#

 clock timezone beijing add 08:00:00

#

 lldp global enable

#

 stp global enable

#

 netconf soap https enable

 netconf ssh server enable

 restful https enable

#

interface Vlan-interface1

 ip address dhcp-alloc

#

 ssh server enable

#

info-center loghost $$_loghost_ip

#

line vty 0 63

 authentication-mode scheme

 user-role $$_rbacUserRole

#

interface $$_underlayIntfUp

 port link-type trunk

 port trunk permit vlan all

 port link-aggregation group auto 1

#

interface $$_underlayIntfDown

 port link-type trunk

 port trunk pvid vlan 4093

 port trunk permit vlan all

#

interface $$_underlayIntfGe

 poe enable

#

vlan 4093

#

vlan 4094

#

interface Vlan-interface4094

#

#

 vcf-fabric topology enable

#

#

 

##ipv6_static_route_begin_all

ipv6 route-static 130:0:0:0:0:0:0:0 64 133:0:0:0:0:0:0:1

ipv6 route-static 190:0:0:0:0:0:0:0 64 133:0:0:0:0:0:0:1

ipv6 route-static 130:0:0:0:0:0:0:0 64 132:0:0:0:0:0:0:1

ipv6 route-static 190:0:0:0:0:0:0:0 64 132:0:0:0:0:0:0:1

#

##ipv6_static_route_end_all

#

 

snmp-agent

snmp-agent community read public

snmp-agent community write private

snmp-agent sys-info version all

snmp-agent packet max-size 4096

#

telnet server enable

#

netconf soap https enable

netconf soap http enable

local-user h3c

password simple campus1234

service-type telnet ssh http https

authorization-attribute user-role network-admin

#

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网