09-High Availability Command Reference

HomeSupportReference GuidesCommand ReferencesH3C SecPath Firewall Series Command References(V7)-6W40209-High Availability Command Reference
01-High availability group commands
Title Size Download
01-High availability group commands 132.71 KB

High availability group commands

adjust-cost enable

Use adjust-cost enable to enable the HA group to adjust the link cost for the specified routing protocol on the secondary device.

Use undo adjust-cost enable to disable the HA group from adjusting the link cost for the specified routing protocol on the secondary device.

Syntax

adjust-cost { bgp | isis | ospf | ospfv3 } enable { absolute [ absolute-cost ] | increment [ increment-cost ] }

undo adjust-cost { bgp | isis | ospf | ospfv3 } enable

Default

The HA group does not adjust the link cost for the specified routing protocol on the secondary device.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

bgp: Specifies the BGP protocol.

isis: Specifies the IS-IS protocol.

ospf: Specifies the OSPF protocol.

ospfv3: Specifies the OSPFv3 protocol.

absolute [ absolute-cost ]: Specifies an absolute cost in the range of 1 to 65535. The default value is 65500. If you specify this option, the secondary device will advertise an absolute link cost for the specified routing protocol.

increment [ increment-cost ]: Specifies an increment cost in the range of 1 to 65535. The default value is 100. If you specify this option, the secondary device will advertise the original link cost plus this increment cost for the specified routing protocol.

Usage guidelines

In an HA group, the routing protocols on the primary and secondary devices advertise link cost according to their respective operation mechanisms. This command allows you to enable the routing protocols to advertise link cost modified as configured. The primary device still uses the original link cost advertisement method.

To ensure switchover of both uplink and downlink traffic to the new primary device, configure this command with the same parameters on both the primary and secondary devices.

In dual-active mode, both devices advertise link cost according to the operation mechanisms of the running routing protocols. When one device is faulty and becomes the secondary device, it will advertise link cost modified as configured.

To enable the feature for multiple routing protocols, execute this command multiple times by specifying the protocols.

If you execute the command multiple times for a specific routing protocol, the most recent configuration takes effect.

Examples

# Enable the HA group to adjust OSPF link cost on the secondary device by specifying an absolute value of 6000.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] adjust-cost ospf enable absolute 6000

backup-mode

Use backup-mode to configure the HA mode.

Use undo backup-mode to restore the default.

Syntax

backup-mode dual-active

undo backup-mode

Default

The HA mode is active/standby.

Views

HA group view

Predefined user roles

network-admin

context-admin

Usage guidelines

The HA group supports active/standby mode and dual-active mode. In active/standby mode, only the primary device processes services. In dual-active mode, both devices process services.

Changing the dual-active mode to active/standby mode might affect services. Make sure you understand the potential impact before performing the operation.

Examples

# Configure the dual-active mode.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] backup-mode dual-active

configuration auto-sync enable

Use configuration auto-sync enable to enable automatic configuration synchronization.

Use undo configuration auto-sync enable to disable automatic configuration synchronization.

Syntax

configuration auto-sync enable

undo configuration auto-sync enable

Default

Automatic configuration synchronization is disabled.

Views

HA group view

Predefined user roles

network-admin

context-admin

Usage guidelines

The automatic configuration synchronization feature synchronizes existing configuration on the primary device in bulk to the secondary device. Consequent synchronization for added, deleted, or modified configuration will be performed in real time.

If the amount of configuration to be synchronized is large, bulk synchronization might take one to two hours.

Examples

# Enable automatic configuration synchronization.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] configuration auto-sync enable

configuration manual-sync

Use configuration manual-sync to manually synchronize the configuration of the primary device to the secondary device.

Syntax

configuration manual-sync

Views

HA group view

Predefined user roles

network-admin

context-admin

Usage guidelines

This command does not take effect when bulk configuration backup is in progress. To view the backup progress, execute the display remote-backup-group status command.

Examples

# Manually synchronize the configuration of the primary device to the secondary device.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] configuration manual-sync

Related commands

display remote-backup-group status

configuration manual-sync-check

Use configuration manual-syn-check to perform a one-off configuration consistency check.

Syntax

configuration manual-sync-check

Views

HA group view

Predefined user roles

network-admin

context-admin

Usage guidelines

This command allows you to perform a one-off configuration consistency check as needed. If the system detects configuration inconsistency, it generates a log for you to manually synchronize configuration. To view the check result, execute the display remote-backup-group sync-check command.

Examples

# Perform a one-off configuration consistency check.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] configuration manual-sync-check

Related commands

configuration manual-sync

display remote-backup-group sync-check

configuration sync-check

Use configuration sync-check to enable configuration consistency check.

Use undo configuration sync-check to restore the default.

Syntax

configuration sync-check [ interval interval ]

undo configuration sync-check

Default

Configuration consistency check is disabled.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

interval interval: Specifies the configuration consistency check interval, in the range of 1 to 168 hours. The default value is 24.

Usage guidelines

The HA group verifies configuration consistency between the primary and secondary devices to avoid service interruption upon primary/secondary member switchover. If a device detects configuration inconsistency, it generates a log for you to manually synchronize configuration.

Examples

# Enable configuration consistency check and set the check interval to 120 hours.

RBM_P<Sysname>system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] configuration sync-check interval 120

Related commands

configuration manual-sync

data-channel

Use data-channel to configure an HA data channel.

Use undo data-channel to restore the default.

Syntax

data-channel interface interface-type interface-number

undo data-channel

Default

No HA data channel is configured.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

interface interface-type interface-number: Specifies an interface by its type and number to set up a data channel between the primary and secondary devices.

Usage guidelines

The primary and secondary devices use the interface specified in the command to set up an HA data channel. The data channel transmits only backup packets and the packets that require transparent transmission.

The data channel is a Layer 2 channel that can transverse only Layer 2 switches.

Examples

# Set up an HA data channel using interface GigabitEthernet 1/0/1.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] data-channel interface gigabitethernet 1/0/1

delay-time

Use delay-time to enable traffic switchover upon failure recovery.

Use undo delay-time to disable traffic switchover upon failure recovery.

Syntax

delay-time delay-time

undo delay-time

Default

Traffic switchover upon failure recovery is disabled.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

delay-time: Specifies the switchover delay time in the range of 1 to 1440 minutes.

Usage guidelines

After a primary/secondary member switchover in an HA group, if the original primary device recovers, traffic will not be switched back by default. Perform this task to enable traffic switchover to the original primary device upon failure recovery. You can set a delay timer to ensure smooth service switchover.

In dual-active mode, you must configure this command to ensure that both devices can operate after the failure is recovered.

Examples

# Enable traffic switchover upon failure recovery and set the switchover delay time to two minutes.

RBM_P<Sysname>system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] delay-time 2

device-role

Use device-role to configure the HA role.

Use undo device-role to restore the default.

Syntax

device-role { primary | secondary }

undo device-role

Default

The HA role is not configured.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

primary: Assigns the primary role to the device.

secondary: Assigns the secondary role to the device.

Usage guidelines

The HA group backs up important configuration from the primary device to the secondary device to prevent service interruption when a primary/secondary member switchover occurs. The configuration on the secondary device is overwritten. The unidirectional backup mechanism avoids configuration conflicts, especially in dual-active mode, and ensures configuration consistency on the primary and secondary devices.

Each HA group member device adds a prefix to the view prompt to identify its HA role.

·     The primary device adds the RBM_P prefix, RBM_P<Sysname> for example.

·     The secondary device adds the RBM_S prefix, RBM_S<Sysname> for example.

After you assign HA roles to the HA group member devices, both devices add the RBM_P prefix to their view prompts. The devices display view prompt prefixes according to their HA roles after they set up the HA control channel.

The HA group must contain one primary device and one secondary device.

As a best practice, configure service features on the primary device.

Examples

# Assign the primary role to the device.

<Sysname> system-view

[Sysname] remote-backup group

[Sysname-remote-backup-group] device-role primary

RBM_P[Sysname-remote-backup-group]

display remote-backup-group status

Use display remote-backup-group status to display HA group status information.

Syntax

display remote-backup-group status

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Examples

# Display HA group status information.

RBM_P<Sysname> display remote-backup-group status

Remote backup group information:

  Backup mode: Dual-active

  Device management role: Primary

  Device status: Active

  Data channel interface: GigabitEthernet1/0/1

  Local IPv4: 1.1.1.1

  Remote IPv4: 1.1.1.2    Destination port: 1028

  Control channel status: Connected

  Keepalive interval: 1s

  Keepalive count: 5

  Configuration consistency check interval: 30 hour

  Configuration consistency check result: Consistent

  Configuration backup status: Batch backup (Do not operate

the device at will, such as board insertion and removal.)

  Session backup status: Hot backup enabled

  Delay-time: 1 min

Table 1 Command output

Field

Description

Backup mode

HA mode:

·     Dual-active.

·     Active/standby.

Device management role

HA role of the device:

·     Primary.

·     Secondary.

Device status

Whether the device is in the VRRP active group or VRRP standby group.

·     Active.

·     Standby.

Data channel interface

Interface used to set up the data channel.

Local IPv4

Local IP address used by control channel packets. This field is not displayed if the parameter is not configured.

Remote IPv4

Peer IP address used by control channel packets. This field is not displayed if the parameter is not configured.

Local IPv6

Local IPv6 address used by control channel packets. This field is not displayed if the parameter is not configured.

Remote IPv6

Peer IPv6 address used by control channel packets. This field is not displayed if the parameter is not configured.

Destination port

Peer port number used by control channel packets.

Control channel status

Control channel status:

·     Connected.

·     Disconnected.

Keepalive interval

Interval for sending HA keepalive packets.

Keepalive count

Maximum number of HA keepalive attempts.

Configuration consistency check interval

Configuration consistency check interval in hours. This field is displayed only when configuration consistency check is enabled.

Configuration consistency check result

Result of the configuration consistency check:

·     Consistent.

·     Inconsistent.

·     Checking.

·     Not Performed.

Configuration backup status

Status of configuration backup:

·     Batch backup in progress (Do not operate the device at will, such as board insertion and removal.).

·     Auto sync enabled.

·     Auto sync disabled.

Session backup status

Status of session entry backup:

·     Batch backup in progress.

·     Hot backup enabled.

·     Hot backup disabled.

Delay-time

Delay time for traffic switchover back to the original primary device in minutes. If the value is 0, this switchover feature is disabled for the HA backup group.

display remote-backup-group sync-check

Use display remote-backup-group sync-check to display the configuration consistency check result for the HA group.

Syntax

display remote-backup-group sync-check

Views

Any view

Predefined user roles

network-admin

network-operator

context-admin

context-operator

Usage guidelines

Use this command when the primary and secondary devices have inconsistent configuration. You can view the inconsistent configuration only after the configuration consistency check is finished.

The command displays detailed inconsistency information for only the service features supported by the HA group. For a feature not supported by the HA group, the command displays only the interface where configuration inconsistency exists.

Examples

# Display the configuration consistency check result for the HA group. (The configuration consistency check has not been performed.)

RBM_P<Sysname> display remote-backup-group sync-check

No configuration consistency checks have been performed.

# Display the configuration consistency check result for the HA group. (No inconsistent configuration exists.)

RBM_P<Sysname> display remote-backup-group sync-check

No inconsistent configuration exists.

# Display the configuration consistency check result for the HA group. (Inconsistent configuration exists.)

RBM_P<Sysname> display remote-backup-group sync-check

Inconsistent configuration exists.

Configuration on secondary device:

#

security-policy ip

 rule 0 name abc

  source-zone trust

  destination-zone untrust

#

 

Configuration on primary device:

#

security-policy ip

 rule 0 name abc

  source-zone dmz

  destination-zone trust

#

Related commands

configuration sync-check

configuration manual-syn-check

hot-backup enable

Use hot-backup enable to enable service entry hot backup.

Use undo hot-backup enable to disable service entry hot backup.

Syntax

hot-backup enable

undo hot-backup enable

Default

Service entry hot backup is enabled.

Views

HA group view

Predefined user roles

network-admin

context-admin

Usage guidelines

This command enables the primary device in the HA group to back up service entries to the secondary device in real time. This prevents service interruption when a primary/secondary member switchover occurs.

Examples

# Enable service entry hot backup.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] hot-backup enable

hot-backup protocol enable

Use hot-backup protocol enable to enable hot backup for the session entries of application layer protocols.

Use undo hot-backup protocol enable to disable hot backup for the session entries of application layer protocols.

Syntax

hot-backup protocol { dns | http } * enable

undo hot-backup protocol { dns | http } * enable

Default

The HA group performs hot backup for the session entries of application layer protocols.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

dns: Specifies DNS.

http: Specifies HTTP.

Usage guidelines

For this command to take effect, first execute the hot-backup enable command.

The hot-backup protocol enable command takes effect only on DNS and HTTP. The device automatically backs up the session entries of other application layer protocols after you enable service entry hot backup.

To ensure correct forwarding, enable hot backup for the session entries of application layer protocols if asymmetric-path traffic traverses the HA group. This feature allows the member devices in the HA group to correctly process asymmetric-path traffic.

If the HA group operates in active/standby mode or only symmetric-path traffic exists, disable hot backup for the session entries of application layer protocols to save session entry resources. A member device removes a DNS or HTTP connection if packet exchange is inactive. When a switchover interrupts a connection, the DNS or HTTP client re-initiates the connection immediately, which has little impact on user services.

Examples

# Disable hot backup for the session entries of application layer protocols.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] undo hot-backup protocol dns enable

Related commands

hot-backup enable

keepalive count

Use keepalive count to set the maximum number of HA keepalive attempts.

Use undo keepalive count to restore the default.

Syntax

keepalive count counts

undo keepalive count

Default

The maximum number of HA keepalive attempts is 10.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

times: Sets the maximum number of HA keepalive attempts, in the range of 1 to 255.

Usage guidelines

If you set the maximum number of HA keepalive attempts to a value too small, network latency will cause incorrect switchovers. If this issue occurs, increase the value of this parameter.

The device periodically sends HA keepalive packets to the HA peer over the HA control channel. If the device has not received any responses from the peer when the maximum number of HA keepalive attempts is reached, the HA control channel is disconnected.

Examples

# Set the maximum number of HA keepalive attempts to 6.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] keepalive count 6

Related commands

keepalive interval

keepalive interval

Use keepalive interval to set the interval for sending HA keepalive packets.

Use undo keepalive interval to restore the default.

Syntax

keepalive interval interval

undo keepalive interval

Default

The device sends HA keepalive packets at an interval of 1 second.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

interval: Sets the interval for sending HA keepalive packets in seconds, in the range of 1 to 60.

Usage guidelines

The device periodically sends HA keepalive packets to the HA peer over the HA control channel. If the device has not received any responses from the peer when the maximum number of HA keepalive attempts is reached, the HA control channel is disconnected.

Examples

# Set the interval for sending HA keepalive packets to 2 seconds.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] keepalive interval 2

Related commands

keepalive count

local-ip

Use local-ip to configure the local IPv4 address for setting up the HA control channel.

Use undo local-ip to restore the default.

Syntax

local-ip ipv4-address

undo local-ip

Default

The local IPv4 address is not configured for setting up the HA control channel.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

ipv4-address: Specifies the local IPv4 address for setting up the HA control channel.

Usage guidelines

The HA group compares the specified local and peer IP address to determine the device role for setting up the control channel. The device with higher IP address acts as the server to listen for TCP connection requests, and the other device acts as the client to initiate the TCP connection.

You can configure a local IPv4 address or a local IPv6 address, but not both.

Examples

# Configure the local IPv4 address as 1.1.1.2 for setting up the HA control channel.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] local-ip 1.1.1.2

Related commands

local-ipv6

remote-ip

local-ipv6

Use local-ipv6 to configure the local IPv6 address for setting up the HA control channel.

Use undo local-ipv6 to restore the default.

Syntax

local-ipv6 ipv6-address

undo local-ipv6

Default

The local IPv6 address is not configured for setting up the HA control channel.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

ipv6-address: Specifies the local IPv6 address for setting up the HA control channel.

Usage guidelines

The HA group compares the specified local and peer IPv6 address to determine the device role for setting up the control channel. The device with higher IPv6 address acts as the server to listen for TCP connection requests, and the other device acts as the client to initiate the TCP connection.

You can configure a local IPv4 address or a local IPv6 address, but not both.

Examples

# Configure the local IPv6 address as 2019::1 for setting up the HA control channel.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] local-ipv6 2019::1

Related commands

local-ip

remote-ipv6

remote-backup group

Use remote-backup group command to enter HA group view.

Use undo remote-backup group to remove all settings of the HA group.

Syntax

remote-backup group

undo remote-backup group

Views

System view

Predefined user roles

network-admin

context-admin

Usage guidelines

The HA group provides backup for important configuration and service entries between devices. It collaborates with VRRP to implement hot backup that enables smooth master/backup switchover upon link failures for service continuity.

Examples

# Enter HA group view.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group]

remote-ip

Use remote-ip to configure the peer IPv4 address for setting up the HA control channel.

Use undo remote-ip to restore the default.

Syntax

remote-ip ipv4-address [ port port-number ]

undo remote-ip ipv4-address

Default

The peer IPv4 address is not configured for setting up the HA control channel.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

ipv4-address: Specifies the peer IPv4 address for setting up the HA control channel.

port port-number: Specifies a port by its number used for establishing TCP connection. The value range for the port-number argument is 1024 to 65535, and the default value is 60064.

Usage guidelines

The HA control channel transmits data by using packets, including HA group status packets, configuration consistency check packets, and configuration synchronization packets. Each member device compares the specified local and peer IP address to determine the device role for setting up the control channel. The device with higher IP address acts as the server to listen for TCP connection requests, and the other device acts as the client to initiate the TCP connection.

If the port number is configured on the server, the port provides services for the client. If the port number is configured on the client, the port serves as the destination port to establish TCP connection to the server. The source port is randomly generated on the client.

You can specify only one peer IP address with the same port number on the primary and secondary devices.

You can configure a remote IPv4 address or a remote IPv6 address, but not both.

Examples

# Configure the peer IPv4 address and port number as 1.1.1.1 and 4456 for setting up the HA control channel.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] remote-ip 1.1.1.1 port 4456

Related commands

local-ip

remote-ipv6

remote-ipv6

Use remote-ipv6 to configure the peer IPv6 address for setting up the HA control channel.

Use undo remote-ipv6 to restore the default.

Syntax

remote-ipv6 ipv6-address [ port port-number ]

undo remote-ipv6 ipv6-address

Default

The peer IPv6 address is not configured for setting up the HA control channel.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

ipv6-address: Specifies the peer IPv6 address for setting up the HA control channel.

port port-number: Specifies a port by its number used for establishing TCP connection. The value range for the port-number argument is 1024 to 65535, and the default value is 60064. Make sure the port number is not in use.

Usage guidelines

The HA control channel transmits data by using packets, including HA group status packets, configuration consistency check packets, and configuration synchronization packets. Each member device compares the specified local and peer IPv6 address to determine the device role for setting up the control channel. The device with higher IPv6 address acts as the server to listen for TCP connection requests, and the other device acts as the client to initiate the TCP connection.

If the port number is configured on the server, the port provides services for the client. If the port number is configured on the client, the port serves as the destination port to establish TCP connection to the server. The source port is randomly generated on the client.

You can specify only one peer IPv6 address with the same port number on the primary and secondary devices.

You can configure a remote IPv4 address or a remote IPv6 address, but not both.

Examples

# Configure the peer IPv6 address and port number as 2018::1 and 4456 for setting up the HA control channel.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] remote-ipv6 2018::1 port 4456

Related commands

local-ipv6

remote-ip

switchover request

Use switchover request to perform a primary/secondary member switchover.

Syntax

switchover request

Views

HA group view

Predefined user roles

network-admin

context-admin

Usage guidelines

If you want to replace components or upgrade software on the current primary device, you can execute this command to switch services to the secondary device.

This command applies only when the HA group operates in active/standby mode.

In an HA group and VRRP associated network, executing this command might cause temporary virtual IP address conflict in the VRRP group, which is considered a normal condition.

Examples

# Perform a primary/secondary member switchover.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] switchover request

track

Use track to associate the HA group with Track.

Use undo track to remove the association.

Syntax

track track-entry-number

undo track track-entry-number

Default

The HA group is not associated with Track.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

track-entry-number: Specifies a track entry by its ID in the range of 1 to 1024.

Usage guidelines

Use this command to associate the HA group with Track to monitor links. If one of the monitored track entries becomes Negative, the HA group performs a primary/secondary member switchover and switches traffic to the new primary device to ensure service continuity. For more information about Track, see Network Management and Monitoring Configuration Guide.

To associate the HA group with multiple track entries, execute this command multiple times.

Examples

# Associate the HA group with track entries 1 and 2.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] track 1

RBM_P[Sysname-remote-backup-group] track 2

Related commands

track (Network Management and Monitoring Command Reference)

track interface

Use track interface to enable the HA group to monitor an interface.

Use undo track interface to remove the configuration.

Syntax

track interface interface-type interface-number

undo track interface [ interface-type interface-number ]

Default

The HA group does not monitor any interfaces.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

interface-type interface-number: Specifies an interface by its type and number. You can specify a Layer 2 Ethernet interface in the current software version. If you do not specify this argument, the undo form of the command removes the monitoring for all interfaces.

Usage guidelines

Use this command to enable the HA group to monitor the interfaces connecting the uplink and downlink devices. The monitored interfaces can forward packets only when they are all up. If any of the monitored interfaces goes down, none of them will be able to forward packets.

To enable the HA group to monitor multiple interfaces, execute this command multiple times.

The track vlan, track interface, and track commands are mutually exclusive.

The HA group does not support monitoring member ports of aggregate interfaces.

Examples

# Enable the HA group to monitor interfaces GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] track interface gigabitethernet 1/0/1

RBM_P[Sysname-remote-backup-group] track interface gigabitethernet 1/0/2

Related commands

track

track interface

track vlan

track vlan

Use track vlan to enable the HA group to monitor a VLAN.

Use undo track vlan to remove the configuration.

Syntax

track vlan vlan-id

undo track vlan [ vlan-id ]

Default

The HA group does not monitor any VLANs.

Views

HA group view

Predefined user roles

network-admin

context-admin

Parameters

vlan-id: Specifies a VLAN by its ID in the range of 1 to 4094. If you do not specify this argument, the undo form of the command removes the monitoring for all VLANs.

Usage guidelines

Use this command to enable the HA group to monitor the VLANs of the uplink and downlink devices. The monitored VLANs are active and the member ports can forward packets only when the member ports are all up. If any of the member ports goes down, none of them will be able to forward packets, and all the monitored VLANs will become inactive.

In active/standby mode, the state of monitored VLANs is active on the primary device and inactive on the secondary device.

In dual-active mode, the state of monitored VLANs is active on both the primary and secondary devices.

Do not enable the HA group to monitor VLAN 1 (to which all access ports belong by default). This restriction prevents an unused interface in down state from interrupting operation of other interfaces in VLAN 1.

To enable the HA group to monitor multiple VLANs, execute this command multiple times.

The track vlan, track interface, and track commands are mutually exclusive.

Examples

# Enable the HA group to monitor VLAN 10.

RBM_P<Sysname> system-view

RBM_P[Sysname] remote-backup group

RBM_P[Sysname-remote-backup-group] track vlan 10

Related commands

track

track interface

track vlan

vrrp ipv6 vrid

Use vrrp ipv6 vrid to create an IPv6 VRRP group and assign a virtual IPv6 address to it, or to assign a virtual IPv6 address to an existing IPv6 VRRP group.

Use undo vrrp ipv6 vrid to remove all configurations of an IPv6 VRRP group, or to remove a virtual IPv6 address from an IPv6 VRRP group.

Syntax

vrrp ipv6 vrid virtual-router-id virtual-ip virtual-address link-local { active | standby }

undo vrrp ipv6 vrid virtual-router-id [ virtual-ip [ virtual-address [ link-local ] ] ]

Default

No IPv6 VRRP groups exist.

Views

Interface view

Predefined user roles

network-admin

context-admin

Parameters

virtual-router-id: Specifies an IPv6 VRRP group by its virtual router ID in the range of 1 to 255.

virtual-ip virtual-address: Specifies a virtual IPv6 address. If you do not specify this option, the undo vrrp ipv6 vrid command removes all virtual IPv6 addresses from the specified IPv6 VRRP group.

link-local: Specifies a link-local address as the virtual IPv6 address.

active: Associates the IPv6 VRRP group with the HA group by adding the device to the IPv6 VRRP active group. The initial role of the device is master.

standby: Associates the IPv6 VRRP group with the HA group by adding the device to the IPv6 VRRP standby group. The initial role of the device is backup.

Usage guidelines

You can execute this command multiple times to assign multiple virtual IPv6 addresses to an IPv6 VRRP group. An IPv6 VRRP group can have a maximum of 16 virtual IPv6 addresses.

The first virtual IPv6 address that you assign to an IPv6 VRRP group must be a link-local address, and it must be removed last.

An IPv6 VRRP group can have only one link-local address as its virtual IPv6 address. For an IPv6 VRRP group to work correctly, you must also assign it a global unicast address as a virtual IPv6 address.

The virtual IPv6 address of an IPv6 VRRP group and the downlink interface IPv6 address of the VRRP group members must be on the same subnet. Otherwise, the hosts on the subnet might fail to access external networks.

You cannot associate an IPv6 VRRP group operating in load balancing mode with the HA group.

You can assign multiple virtual IPv6 addresses to an IPv6 VRRP group associated with the HA group. Make sure the interfaces in the IPv6 VRRP group do not own the virtual IPv6 addresses.

You cannot associate an IPv6 VRRP group with both the HA group and Track.

To modify the settings for the command, first execute the undo form of the command, and then execute the vrrp ipv6 vrid command again.

Examples

# Create IPv6 VRRP group 1, assign virtual IPv6 address fe80::10 to the VRRP group, and assign the device to the VRRP active group. Then assign virtual IPv6 address 1::10 to the VRRP group.

RBM_P<Sysname> system-view

RBM_P[Sysname] interface gigabitethernet 1/0/1

RBM_P[Sysname-GigabitEthernet1/0/1] vrrp ipv6 vrid 1 virtual-ip fe80::10 link-local active

RBM_P[Sysname-GigabitEthernet1/0/1] vrrp ipv6 vrid 1 virtual-ip 1::10

vrrp vrid

Use vrrp vrid to create an IPv4 VRRP group and assign a virtual IP address to it, or to assign a virtual IP address to an existing IPv4 VRRP group.

Use undo vrrp vrid to remove all configurations of an IPv4 VRRP group, or to remove a virtual IP address from an IPv4 VRRP group.

Syntax

vrrp vrid virtual-router-id virtual-ip virtual-address { active | standby }

undo vrrp vrid virtual-router-id [ virtual-ip [ virtual-address ] ]

Default

No IPv4 VRRP groups exist.

Views

Interface view

Predefined user roles

network-admin

context-admin

Parameters

virtual-router-id: Specifies an IPv4 VRRP group by its virtual router ID in the range of 1 to 255.

virtual-ip virtual-address: Specifies a virtual IP address. You cannot specify the virtual IP address as any of the following IP addresses:

·     All-zero address (0.0.0.0).

·     Broadcast address (255.255.255.255).

·     Loopback address.

·     IP address of other than Class A, Class B, and Class C.

·     Invalid IP address (for example, 0.0.0.1).

If you do not specify the virtual-address argument, the undo vrrp vrid command removes all virtual IP addresses from the specified IPv4 VRRP group.

active: Associates the VRRP group with the HA group by adding the device to the VRRP active group. The initial role of the device is master.

 

standby: Associates the VRRP group with the HA group by adding the device to the VRRP standby group. The initial role of the device is backup.

 

Usage guidelines

You can execute this command multiple times to assign multiple virtual IP addresses to an IPv4 VRRP group. An IPv4 VRRP group can have a maximum of 16 virtual IP addresses.

The virtual IP address of an IPv4 VRRP group and the downlink interface IP addresses of the VRRP group members must be on the same subnet. Otherwise, the hosts on the subnet might fail to access external networks.

You cannot associate a VRRP group operating in load balancing mode with the HA group.

For VRRP to operate correctly, make sure a virtual IP address of an IPv4 VRRP group is not the IP address of any interface in the VRRP group.

You can assign multiple virtual IPv4 addresses to an IPv4 VRRP group associated with the HA group. Make sure the interfaces in the IPv4 VRRP group do not own the virtual IPv4 addresses.

You cannot associate a VRRP group with both the HA group and Track.

To modify the settings for the command, first execute the undo form of the command, and then execute the vrrp vrid command again.

Examples

# Create IPv4 VRRP group 1, assign virtual IP address 10.10.10.10 to the VRRP group, and assign the device to the VRRP active group.

RBM_P<Sysname> system-view

RBM_P[Sysname] interface gigabitethernet 1/0/1

RBM_P[Sysname-GigabitEthernet1/0/1] vrrp vrid 1 virtual-ip 10.10.10.10 active

Related commands

display vrrp

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网