11-Track Configuration
Chapters Download (115.54 KB)
Collaboration Between the Track Module and the Detection Modules
Collaboration Between the Track Module and the Application Modules
Configuring Collaboration Between the Track Module and the Detection Modules
Configuring Collaboration Between the Track Module and the Interface Management Module
Configuring Collaboration Between the Track Module and the Application Modules
Configuring Track-VRRP Collaboration
Configuring Track-Static Routing Collaboration
Displaying and Maintaining Track Objects
Static Routing, Track and the Interface Management Module Collaboration Configuration Example
When configuring Track, go to these sections for information you are interested in:
l Track Configuration Task List
l Configuring Collaboration Between the Track Module and the Detection Modules
l Configuring Collaboration Between the Track Module and the Application Modules
l Displaying and Maintaining Track Objects
l Track Configuration Examples
Figure 1-1 Collaboration through the Track module
The Track module is used to implement collaboration between different modules.
The collaboration here involves three parts: the application modules, the Track module, and the detection modules. These modules collaborate with one another through collaboration objects. That is, the detection modules trigger the application modules to perform certain operations through the Track module. More specifically, the detection modules probe the link status, network performance and so on, and inform the application modules of the detection result through the Track module. After the application modules are aware of the changes of network status, they deal with the changes accordingly to avoid communication interruption and network performance degradation.
The Track module works between the application modules and the detection modules and is mainly used to obscure the difference of various detection modules to provide a unified interface for application modules.
You can establish the collaboration between the Track module and the detection modules through configuration. A detection module probes the interface status and link status, and informs the Track module of the probe result. The Track module then changes the status of the Track object accordingly:
l If the probe succeeds, the status of the corresponding Track object is Positive;
l If the probe fails, the status of the corresponding Track object is Negative.
At present, the detection modules is the interface management module.
The interface management module is used to monitor the physical status or Layer 3 protocol status of an interface. When the physical status or Layer 3 protocol status of an interface is up, the status of a Track object is Positive; when the physical status or Layer 3 protocol status of an interface is down, the status of a Track object is Negative.
You can establish the collaboration between the Track module and the application modules through configuration. If the status of the Track object changes, the Track module tells the application modules to deal with the change accordingly.
At present, the application modules that can collaborate with the Track module include:
l VRRP
l Static routing
To implement the collaboration function, you need to establish collaboration between the Track module and the detection modules, and between the Track module and the application modules.
Complete these tasks to configure Track module:
Through the following configuration, you can establish the collaboration between the Track module and the interface management module, which informs the Track module of the changes of the physical status and Layer 3 protocol status of an interface.
Follow these steps to configure collaboration between the Track module and the interface management module:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Create a Track object and associate it with the interface management module to monitor the physical status of an interface |
track track-entry-number interface interface-type interface-number |
Required Use either approach |
Create a Track object and associate it with the interface management module to monitor the Layer 3 protocol status of an interface |
track track-entry-number interface interface-type interface-number protocol ipv4 |
When VRRP works in the standard protocol mode or load balancing mode, through the Track-VRRP collaboration, you can:
l Change the priority of a router according to the status of the uplink. If there is a fault on the uplink, hosts in the LAN cannot access the external network through the master. In this case, the status of the monitored Track object changes to Negative, and the priority of the master thus decreases by a specified value, allowing a higher priority router in the VRRP group to become the master to maintain proper communication between the hosts in the LAN and the external network.
l Monitor the master on a backup. If there is a fault on the master, the backup working in the switchover mode will switch to the master immediately to maintain normal communication.
When VRRP works in the load balancing mode, through the collaboration between the Track module and VRRP, you can change the priority of a virtual forwarder according to the status of the uplink. When the uplink of the active virtual forwarder (AVF) fails, the status of the Track object changes to Negative and the weight of the VF decreases by a specified value so that the VF with a higher priority becomes the AVF and forwards packets.
To configure collaboration between VRRP and BFD through the Track module, you need to configure the source address of BFD echo packets. For the configuration methods, refer to BFD Configuration in the IP Routing Volume.
Follow these steps to configure Track-VRRP collaboration:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Enter interface view |
interface interface-type interface-number |
— |
Create a VRRP group and configure its virtual IP address |
vrrp vrid virtual-router-id virtual-ip virtual-address |
Required No VRRP group is created by default. |
Specify a Track object to be monitored by VRRP |
vrrp vrid virtual-router-id track track-entry-number [ reduced priority-reduced | switchover ] |
Required No Track object is specified for VRRP by default |
Specify a Track object to be monitored by a virtual forwarder |
vrrp vrid virtual-router-id weight track track-entry-number [ reduced weight-reduced ] |
Required No Track object is specified for a virtual forwarder by default. |
l Do not perform Track object monitoring on the IP address owner.
l When the status of the monitored Track object turns from Negative to Positive, the corresponding router restores its priority automatically.
l The monitored Track object can be nonexistent, so that you can first specify the Track object to be monitored using the vrrp vrid track command, and then create the Track object using the track command.
l Refer to VRRP Configuration in the System Volume for details of VRRP.
You can check the validity of a static route in real time by establishing collaboration between Track and static routing.
If you specify the next hop but not the egress interface when configuring a static route, you can associate the static route with a Track object and thus check the validity of the static route according to the status of the Track object.
l If the status of the Track object is Positive, then the next hop of the static route is reachable, and the configured static route is valid.
l If the status of the Track object is Negative, then the next hop of the static route is unreachable, and the configured static route is invalid.
Follow these steps to configure the Track-Static Routing collaboration:
To do… |
Use the command… |
Remarks |
Enter system view |
system-view |
— |
Configure the Track-Static Routing collaboration, so as to check the reachability of the next hop of the static route |
ip route-static dest-address { mask | mask-length } next-hop-address track track-entry-number [ preference preference-value ] [ description description-text ] |
Required Not configured by default. |
l For the configuration of Track-Static Routing collaboration, the specified static route can be an existent or nonexistent one. For an existent static route, the static route and the specified Track object are associated directly; for a nonexistent static route, the system creates the static route and then associates it with the specified Track object.
l The Track object to be associated with the static route can be a nonexistent one. After you use the track command to create the Track object, the association takes effect.
l If a static route needs route recursion, the associated Track object must monitor the next hop of the recursive route instead of that of the static route; otherwise, a valid route may be considered invalid.
l For details of static route configuration, refer to Static Routing Configuration in the IP Routing Volume.
To do… |
Use the command… |
Remarks |
Display information about the specified Track object or all Track objects |
display track { track-entry-number | all } |
Available in any view |
l As shown in Figure 1-2, Host A needs to access Host B on the Internet. The default gateway of Host A is 10.1.1.10/24.
l Switch A and Switch B belong to VRRP group 1, whose virtual IP address is 10.1.1.10.
When Switch A works normally, packets from Host A to Host B are forwarded through Switch A. When VRRP finds that there is a fault on the uplink of Switch A through the Interface Management Module, packets from Host A to Host B are forwarded through Switch B.
1) Configure the IP address of each interface as shown in Figure 1-2.
2) Configure the Track and Interface Management on Switch A.
# Create a Track object and associate it with the interface management module to monitor the Layer 3 protocol status of an interface
<SwitchA> system-view
[SwitchA] track 1 interface vlan-interface 3 protocol ipv4
3) Configure a Track object on Switch A.
# Configure Track object 1, and associate it with Reaction entry 1 of the NQA test group (with the administrator admin, and the operation tag test).
[SwitchA] track 1 nqa entry admin test reaction 1
4) Configure VRRP on Switch A.
# Create VRRP group 1, and configure the virtual IP address 10.1.1.10 for the group.
[SwitchA] interface vlan-interface 2
[SwitchA-Vlan-interface2] vrrp vrid 1 virtual-ip 10.1.1.10
# Set the priority of Switch A in VRRP group 1 to 110.
[SwitchA-Vlan-interface2] vrrp vrid 1 priority 110
# Set the authentication mode of VRRP group 1 to simple, and the authentication key to hello.
[SwitchA-Vlan-interface2] vrrp vrid 1 authentication-mode simple hello
# Configure the master to send VRRP packets at an interval of five seconds.
[SwitchA-Vlan-interface2] vrrp vrid 1 timer advertise 5
# Configure Switch A to work in preemptive mode, and set the preemption delay to five seconds.
[SwitchA-Vlan-interface2] vrrp vrid 1 preempt-mode timer delay 5
# Configure to monitor Track object 1 and specify the priority decrement to 30.
[SwitchA-Vlan-interface2] vrrp vrid 1 track 1 reduced 30
Configure VRRP on Switch B.
<SwitchB> system-view
[SwitchB] interface vlan-interface 2
# Create VRRP group 1, and configure the virtual IP address 10.1.1.10 for the group.
[SwitchB-Vlan-interface2] vrrp vrid 1 virtual-ip 10.1.1.10
# Set the authentication mode of VRRP group 1 to simple, and the authentication key to hello.
[SwitchB-Vlan-interface2] vrrp vrid 1 authentication-mode simple hello
# Configure the master to send VRRP packets at an interval of five seconds.
[SwitchB-Vlan-interface2] vrrp vrid 1 timer advertise 5
# Configure Switch B to work in preemptive mode, and set the preemption delay to five seconds.
[SwitchB-Vlan-interface2] vrrp vrid 1 preempt-mode timer delay 5
5) Verify the configuration
After configuration, ping Host B on Host A, and you can see that Host B is reachable. Use the display vrrp command to view the configuration result.
# Display detailed information about VRRP group 1 on Switch A.
[SwitchA-Vlan-interface2] display vrrp verbose
IPv4 Standby Information:
Run Mode : Standard
Run Method : Virtual MAC
Total number of virtual routers : 1
Interface Vlan-interface2
VRID : 1 Adver Timer : 5
Admin Status : Up State : Master
Config Pri : 110 Running Pri : 110
Preempt Mode : Yes Delay Time : 5
Auth Type : Simple Key : hello
Virtual IP : 10.1.1.10
Virtual MAC : 0000-5e00-0101
Master IP : 10.1.1.1
VRRP Track Information:
Track Object : 1 State : Positive Pri Reduced : 30
# Display detailed information about VRRP group 1 on Switch B.
[SwitchB-Vlan-interface2] display vrrp verbose
IPv4 Standby Information:
Run Mode : Standard
Run Method : Virtual MAC
Total number of virtual routers : 1
Interface Vlan-interface2
VRID : 1 Adver Timer : 5
Admin Status : Up State : Backup
Config Pri : 100 Running Pri : 100
Preempt Mode : Yes Delay Time : 5
Auth Type : Simple Key : hello
Virtual IP : 10.1.1.10
Master IP : 10.1.1.1
The above output information indicates that in VRRP group 1, Switch A is the master and Switch B is a backup. Packets from Host A to Host B are forwarded through Switch A.
When there is a fault on the link between Switch A and Switch C, you can still successfully ping Host B on Host A. Use the display vrrp command to view information about VRRP group 1.
# Display detailed information about VRRP group 1 on Switch A when there is a fault on the link between Switch A and Switch C.
IPv4 Standby Information:
Run Mode : Standard
Run Method : Virtual MAC
Total number of virtual routers : 1
Interface Vlan-interface2
VRID : 1 Adver Timer : 5
Admin Status : Up State : Backup
Config Pri : 110 Running Pri : 80
Preempt Mode : Yes Delay Time : 5
Auth Type : Simple Key : hello
Virtual IP : 10.1.1.10
Master IP : 10.1.1.2
VRRP Track Information:
Track Object : 1 State : Negative Pri Reduced : 30
# Display detailed information about VRRP group 1 on Switch B when there is a fault on the link between Switch A and Switch C.
[SwitchB-Vlan-interface2] display vrrp verbose
IPv4 Standby Information:
Run Mode : Standard
Run Method : Virtual MAC
Total number of virtual routers : 1
Interface Vlan-interface2
VRID : 1 Adver Timer : 5
Admin Status : Up State : Master
Config Pri : 100 Running Pri : 100
Preempt Mode : Yes Delay Time : 5
Auth Type : Simple Key : hello
Virtual IP : 10.1.1.10
Virtual MAC : 0000-5e00-0101
Master IP : 10.1.1.2
The output information indicates that when there is a fault on the link between Switch A and Switch C, the priority of Switch A decreases to 80. Switch A becomes the backup, and Switch B becomes the master. Packets from Host A to Host B are forwarded through Switch B.
l As shown in Figure 1-3, the next hop of the static route from Switch A to Switch C is Switch B.
l Configure Static Routing, Track and the Interface Management Module collaboration on Switch A to implement real-time monitoring of the validity of the static route to Switch C.
1) Configure the IP address of each interface as shown in Figure 1-3.
2) Configure a static route on Switch A and associate it with the Track object.
# Configure the address of the next hop of the static route to Switch C as 10.2.1.1, and configure the static route to associate with Track object 1.
<SwitchA> system-view
[SwitchA] ip route-static 10.1.1.2 24 10.2.1.1 track 1
3) Configure the Track and Interface Management on Switch A.
# Create a Track object and associate it with the interface management module to monitor the Layer 3 protocol status of an interface
[SwitchA] track 1 interface vlan-interface 3 protocol ipv4
4) Verify the configuration
# Display information of the Track object on Switch A.
[SwitchA] display track all
Track ID: 1
Status: Positive
Reference object:
Track interface :
Interface status : Inserted
Interface : Vlan-interface1
Protocol : IPv4
# Display the routing table of Switch A.
[SwitchA] display ip routing-table
Routing Tables: Public
Destinations : 5 Routes : 5
Destination/Mask Proto Pre Cost NextHop Interface
10.1.1.0/24 Static 60 0 10.2.1.1 Vlan3
10.2.1.0/24 Direct 0 0 10.2.1.2 Vlan3
10.2.1.2/32 Direct 0 0 127.0.0.1 InLoop0
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoop0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoop0
The output information above indicates the NQA test result, that is, the next hop 10.2.1.1 is reachable (the status of the Track object is Positive), and the configured static route is valid.
# Remove the IP address of interface VLAN-interface 3 on Switch B.
<SwitchB> system-view
[SwitchB] interface vlan-interface 3
[SwitchB-Vlan-interface3] undo ip address
# Display information of the Track object on Switch A.
[SwitchA] display track all
Track ID: 1
Status: Negative
Reference object:
Track interface :
Interface status : Inserted
Interface : Vlan-interface1
Protocol : IPv4
# Display the routing table of Switch A.
[SwitchA] display ip routing-table
Routing Tables: Public
Destinations : 4 Routes : 4
Destination/Mask Proto Pre Cost NextHop Interface
10.2.1.0/24 Direct 0 0 10.2.1.2 Vlan3
10.2.1.2/32 Direct 0 0 127.0.0.1 InLoop0
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoop0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoop0
The output information above indicates the Interface Management test result, that is, the next hop 10.2.1.1 is unreachable (the status of the Track object is Negative), and the configured static route is invalid.