- Table of Contents
-
- H3C Fixed Port Campus Switches Configuration Examples-6W105
- 00-Applicable hardware and software versions
- 01-Login Management Configuration Examples
- 02-RBAC Configuration Examples
- 03-Software Upgrade Examples
- 04-ISSU Configuration Examples
- 05-Software Patching Examples
- 06-Ethernet Link Aggregation Configuration Examples
- 07-Port Isolation Configuration Examples
- 08-Spanning Tree Configuration Examples
- 09-VLAN Configuration Examples
- 10-VLAN Tagging Configuration Examples
- 11-DHCP Snooping Configuration Examples
- 12-Cross-Subnet Dynamic IP Address Allocation Configuration Examples
- 13-IPv6 over IPv4 Tunneling with OSPFv3 Configuration Examples
- 14-IPv6 over IPv4 GRE Tunnel Configuration Examples
- 15-GRE with OSPF Configuration Examples
- 16-OSPF Configuration Examples
- 17-IS-IS Configuration Examples
- 18-BGP Configuration Examples
- 19-Policy-Based Routing Configuration Examples
- 20-OSPFv3 Configuration Examples
- 21-IPv6 IS-IS Configuration Examples
- 22-Routing Policy Configuration Examples
- 23-IGMP Snooping Configuration Examples
- 24-IGMP Configuration Examples
- 25-MLD Snooping Configuration Examples
- 26-IPv6 Multicast VLAN Configuration Examples
- 27-ACL Configuration Examples
- 28-Traffic Policing Configuration Examples
- 29-GTS and Rate Limiting Configuration Examples
- 30-Traffic Filtering Configuration Examples
- 31-AAA Configuration Examples
- 32-Port Security Configuration Examples
- 33-Portal Configuration Examples
- 34-SSH Configuration Examples
- 35-IP Source Guard Configuration Examples
- 36-Ethernet OAM Configuration Examples
- 37-CFD Configuration Examples
- 38-DLDP Configuration Examples
- 39-VRRP Configuration Examples
- 40-BFD Configuration Examples
- 41-NTP Configuration Examples
- 42-SNMP Configuration Examples
- 43-NQA Configuration Examples
- 44-Mirroring Configuration Examples
- 45-sFlow Configuration Examples
- 46-OpenFlow Configuration Examples
- 47-MAC Address Table Configuration Examples
- 48-Static Multicast MAC Address Entry Configuration Examples
- 49-IP Unnumbered Configuration Examples
- 50-MVRP Configuration Examples
- 51-MCE Configuration Examples
- 52-Attack Protection Configuration Examples
- 53-Smart Link Configuration Examples
- 54-RRPP Configuration Examples
- 55-BGP Route Selection Configuration Examples
- 56-IS-IS Route Summarization Configuration Examples
- 57-VXLAN Configuration Examples
- 58-DRNI Configuration Examples
- 59-IRF 3.1 Configuration Examples
- 60-PTP Configuration Examples
- 61-S-MLAG Configuration Examples
- 62-Puppet Configuration Examples
- 63-802.1X Configuration Examples
- 64-MAC Authentication Configuration Examples
- 65-ISATAP Tunnel and 6to4 Tunnel Configuration Examples
- 66-BIDIR-PIM Configuration Examples
- 67-Congestion Avoidance and Queue Scheduling Configuration Examples
- 68-Basic MPLS Configuration Examples
- 69-MPLS L3VPN Configuration Examples
- 70-MPLS OAM Configuration Examples
- 71-EVPN-DCI over an MPLS L3VPN Network Configuration Examples
- 72-DRNI and EVPN Configuration Examples
- 73-Multicast VPN Configuration Examples
- 74-MPLS TE Configuration Examples
- 75-Control Plane-Based QoS Policy Configuration Examples
- 76-Priority Mapping and Queue Scheduling Configuration Examples
- 77-ARP Attack Protection Configuration Examples
- 78-IRF Software Upgrade Configuration Examples
- 79-IRF Member Replacement Configuration Examples
- 80-Layer 3 Multicast on Multicast Source-Side DR System Configuration Examples
- 81-EVPN Multicast Configuration Examples
- 82-Priority Marking and Queue Scheduling Configuration Examples
- 83-EAA Configuration Examples
- 84-GRE Tunnel Access to MPLS L3VPN Configuration Examples
- 85-MC-NAT Configuration Examples
- 86-M-LAG Configuration Examples (Applicable to M-LAG Versions)
- 87-MOD Configuration Examples
- 88-MPLS L2VPN Configuration Examples
- 89-VPLS Configuration Examples
- 90-SR-MPLS Configuration Examples
- 91-VCF Fabric Configuration Examples
- 92-NetStream Configuration Examples
- 93-Configuration Example for Software Upgrade with Zero Packet Loss by Using GIR in VXLAN M-LAG Network
- 94-Configuration Example for Software Upgrade with Zero Packet Loss by Using GIR in VXLAN DRNI Network
- Related Documents
-
93-Configuration Example for Software Upgrade with Zero Packet Loss by Using GIR in VXLAN M-LAG Network
Example: Configuring software upgrade with zero packet loss by using GIR in a VXLAN M-LAG network
Applicable hardware and software versions
Using GIR to upgrade or replace M-LAG member devices
Introduction
The following information provides an example for software upgrade with zero packet loss by using GIR in a VXLAN M-LAG network.
Prerequisites
This document is not restricted to specific software or hardware versions. Procedures and information in the examples might be slightly different depending on the software or hardware version of the device.
The configuration examples were created and verified in a lab environment, and all the devices were started with the factory default configuration. When you are working on a live network, make sure you understand the potential impact of every command on your network.
The following information is provided based on the assumption that you have basic knowledge of VXLAN and GIR.
Example: Configuring software upgrade with zero packet loss by using GIR in a VXLAN M-LAG network
Network configuration
As shown in Figure 1:
· Device A and Device B act as distributed VXLAN IP gateways connected to Device E. Device A and Device B form an M-LAG system to act as a virtual VXLAN IP gateway and use a directly connected link as the peer link. Device E belongs to VXLAN 10.
· Device C and Device D act as distributed VXLAN IP gateways connected to Device F. Device C and Device D form an M-LAG system to act as a virtual VXLAN IP gateway and use a directly connected link as the peer link. Device F belongs to VXLAN 20.
· Configure Device B to enter maintenance mode and switch traffic to Device A. After Device B completes its upgrade, switch traffic back to Device B and then upgrade Device A.
· Configure Device D to enter maintenance mode and switch traffic to Device C. After Device D completes its upgrade, switch traffic back to Device D and then upgrade Device C.
Table 1 Data plan
Device |
Interface |
IP address |
Device |
Interface |
IP address |
Device A |
Vlan-interface11 |
11.1.1.1/24 |
Device C |
Vlan-interface13 |
13.1.1.1/24 |
|
GE1/0/4 |
60.1.1.1/24 |
|
GE1/0/4 |
60.2.1.1/24 |
|
Loop0 |
1.1.1.1/32 |
|
Loop0 |
2.2.2.2/32 |
Device B |
Vlan-interface12 |
12.1.1.1/24 |
Device D |
Vlan-interface14 |
14.1.1.1/24 |
|
GE1/0/4 |
60.1.1.2/24 |
|
GE1/0/4 |
60.2.1.2/24 |
|
Loop0 |
1.1.1.1/32 |
|
Loop0 |
2.2.2.2/32 |
Device G |
Vlan-interface11 |
11.1.1.3/24 |
vpna |
Vsi-interface1 |
10.1.1.1/24 |
|
Vlan-interface12 |
12.1.1.3/24 |
|
|
|
|
Vlan-interface13 |
13.1.1.3/24 |
vpnb |
Vsi-interface2 |
20.1.1.1/24 |
|
Vlan-interface14 |
14.1.1.3/24 |
|
|
|
|
Loop0 |
3.3.3.3/24 |
|
|
|
Analysis
· Device A and Device B form one M-LAG system. Device C and Device D form another M-LAG system.
· Configure Device A, Device B, Device C, and Device D as VTEPs and configure Device E as the core device.
· First use GIR to isolate and upgrade the secondary device (Device B), and then use GIR to isolate and upgrade the primary device (Device A).
· First use GIR to isolate and upgrade the secondary device (Device D), and then use GIR to isolate and upgrade the primary device (Device C).
Applicable hardware and software versions
Table 2 Applicable hardware and software versions
Product |
Software version |
S6812 switch series S6813 switch series |
Release 6628Pxx |
S6550XE-HI switch series |
Release 8106Pxx |
S6525XE-HI switch series |
Release 8106Pxx |
S5850 switch series |
Not supported |
S5570S-EI switch series |
Not supported |
S5560X-EI switch series |
Release 6628Pxx |
S5560X-HI switch series |
Release 6628Pxx |
S5500V2-EI switch series |
Release 6628Pxx |
MS4520V2-30F switch |
Release 6628Pxx |
MS4520V2-30C switch MS4520V2-54C switch |
Release 6628Pxx |
MS4520V2-28S switch MS4520V2-24TP switch |
Not supported |
S6520X-HI switch series S6520X-EI switch series |
Release 6628Pxx |
S6520X-SI switch series S6520-SI switch series |
Release 6628Pxx |
S5000-EI switch series |
Release 6628Pxx |
MS4600 switch series |
Release 6628Pxx |
ES5500 switch series |
Release 6628Pxx |
S5560S-EI switch series S5560S-SI switch series |
Not supported |
S5500V3-24P-SI switch S5500V3-48P-SI switch |
Not supported |
S5500V3-SI switch series (excluding the S5500V3-24P-SI and S5500V3-48P-SI switches) |
Not supported |
S5170-EI switch series |
Not supported |
S5130S-HI switch series S5130S-EI switch series S5130S-SI switch series S5130S-LI switch series |
Not supported |
S5120V2-SI switch series S5120V2-LI switch series |
Not supported |
S5120V3-EI switch series |
Not supported |
S5120V3-36F-SI switch S5120V3-28P-HPWR-SI switch S5120V3-54P-PWR-SI switch |
Not supported |
S5120V3-SI switch series (excluding the S5120V3-36F-SI, S5120V3-28P-HPWR-SI, and S5120V3-54P-PWR-SI switches) |
Not supported |
S5120V3-LI switch series |
Not supported |
S3600V3-EI switch series |
Not supported |
S3600V3-SI switch series |
Not supported |
S3100V3-EI switch series S3100V3-SI switch series |
Not supported |
S5110V2 switch series |
Not supported |
S5110V2-SI switch series |
Not supported |
S5000V3-EI switch series S5000V5-EI switch series |
Not supported |
S5000E-X switch series S5000X-EI switch series |
Not supported |
E128C switch E152C switch E500C switch series E500D switch series |
Not supported |
MS4320V2 switch series MS4320V3 switch series MS4300V2 switch series MS4320 switch series MS4200 switch series |
Not supported |
WS5850-WiNet switch series |
Not supported |
WS5820-WiNet switch series WS5810-WiNet switch series |
Not supported |
WAS6000 switch series |
Not supported |
IE4300-12P-AC & IE4300-12P-PWR switch IE4300-M switch series IE4320 switch series |
Not supported |
IE4520 switch series |
Not supported |
S5135S-EI switch |
Not supported |
Restrictions and guidelines
When using GIR to upgrade or replace devices in an M-LAG network, follow these restrictions and guidelines:
· As a best practice, do not configure isolation separately for route and aggregation services to avoid issues like packet loss due to configuration omissions.
· When specifying the next startup configuration file, include maintenance mode settings in the file.
Procedures
Configuring IPv4 VXLAN M-LAG
1. Configure IP addresses and unicast routing protocols:
# Configure the IP address and subnet mask for each interface. (Details not shown.)
# Configure routes on the IP transport network to advertise routes for subnets attached to the interfaces (including Loopback interfaces) on each node. Make sure the devices have connectivity to each other. (Details not shown.)
2. Configure Device A:
# Enable Layer 2 VPN (L2VPN).
<DeviceA> system-view
[DeviceA] l2vpn enable
# Configure the frame match criteria for dynamic ACs on the peer link, with in one of the following methods. You must configure Device A and Device B in the same method.
¡ Method 1: Create the frame match criteria of dynamic ACs on the peer link based on VXLAN IDs.
[DeviceA] l2vpn m-lag peer-link ac-match-rule vxlan-mapping
¡ Method 2: Create an AC on the peer link based on the frame match criteria of the site-facing Ethernet service instance.
You do not need to configure other settings. This method is used by default.
# Set the M-LAG system number.
[DeviceA] m-lag system-mac 1-1-1
[DeviceA] m-lag system-number 1
[DeviceA] m-lag system-priority 10
[DeviceA] m-lag keepalive ip destination 60.1.1.2 source 60.1.1.1
[DeviceA] m-lag restore-delay 180
# Create Layer 2 aggregate interface Bridge-aggregation 2.
[DeviceA] interface bridge-aggregation 2
[DeviceA-Bridge-Aggregation2] quit
# Assign HundredGigE1/0/2 and HundredGigE1/0/3 to aggregation group 2.
[DeviceA] interface HundredGigE 1/0/2
[DeviceA-HundredGigE1/0/2] port link-aggregation group 2
[DeviceA-HundredGigE1/0/2] quit
[DeviceA] interface HundredGigE 1/0/3
[DeviceA-HundredGigE1/0/3] port link-aggregation group 2
[DeviceA-HundredGigE1/0/3] quit
# Configure interface Bridge-Aggregation 2 to operate in dynamic aggregation mode as a peer-link interface.
[DeviceA] interface bridge-aggregation 2
[DeviceA-Bridge-Aggregation2] link-aggregation mode dynamic
[DeviceA-Bridge-Aggregation2] port m-lag peer-link 1
[DeviceA-Bridge-Aggregation2] quit
# Create dynamic Layer 2 dynamic aggregate interface Bridge-Aggregation 3, and configure it as M-LAG interface 3.
[DeviceA] interface bridge-aggregation 3
[DeviceA-Bridge-Aggregation3] link-aggregation mode dynamic
[DeviceA-Bridge-Aggregation3] port m-lag group 3
[DeviceA-Bridge-Aggregation3] quit
# Assign GigabitEthernet1/0/5 to aggregation group 3.
[DeviceA] interface gigabitethernet 1/0/5
[DeviceA-GigabitEthernet1/0/5] port link-aggregation group 3
[DeviceA-GigabitEthernet1/0/5] quit
# Create VLAN 2.
[DeviceA] vlan 2
[DeviceA-vlan2] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 3 as a trunk port and assign it to VLAN 2.
[DeviceA] interface bridge-aggregation 3
[DeviceA-Bridge-Aggregation3] port link-type trunk
[DeviceA-Bridge-Aggregation3] port trunk permit vlan 2
[DeviceA-Bridge-Aggregation3] quit
# Create VSI instance vpna and VXLAN 10.
[DeviceA] vsi vpna
[DeviceA-vsi-vpna] vxlan 10
[DeviceA-vsi-vpna-vxlan-10] quit
[DeviceA-vsi-vpna] quit
# Create VSI instance vpnb and VXLAN 20.
[DeviceA] vsi vpnb
[DeviceA-vsi-vpnb] vxlan 20
[DeviceA-vsi-vpnb-vxlan-20] quit
[DeviceA-vsi-vpnb] quit
# Configure an IP address for interface Loopback0, which is to be used as the source address for the tunnel.
[DeviceA] interface loopback 0
[DeviceA-Loopback0] ip address 1.1.1.1 255.255.255.255
[DeviceA-Loopback0] quit
# Establish a VXLAN tunnel from Device A to Device C and Device D.
[DeviceA] interface tunnel 1 mode vxlan
[DeviceA-Tunnel1] source 1.1.1.1
[DeviceA-Tunnel1] destination 2.2.2.2
[DeviceA-Tunnel1] quit
# Associate interface Tunnel1 with VXLAN 10.
[DeviceA] vsi vpna
[DeviceA-vsi-vpna] vxlan 10
[DeviceA-vsi-vpna-vxlan-10] tunnel 1
[DeviceA-vsi-vpna-vxlan-10] quit
[DeviceA-vsi-vpna] quit
# Associate interface Tunnel1 with VXLAN 20.
[DeviceA] vsi vpnb
[DeviceA-vsi-vpnb] vxlan 20
[DeviceA-vsi-vpnb-vxlan-20] tunnel 1
[DeviceA-vsi-vpnb-vxlan-20] quit
[DeviceA-vsi-vpnb] quit
# Create Ethernet service instance 1000 on Bridge-Aggregation 3, which is connected to Device E. Configure the Ethernet service instance to match frames with outer VLAN tag 2.
[DeviceA] interface bridge-aggregation 3
[DeviceA-Bridge-Aggregation3] service-instance 1000
[DeviceA-Bridge-Aggregation3-srv1000] encapsulation s-vid 2
# Map Ethernet service instance 1000 to VSI vpna.
[DeviceA-Bridge-Aggregation3-srv1000] xconnect vsi vpna
[DeviceA-Bridge-Aggregation3-srv1000] quit
[DeviceA-Bridge-Aggregation3] quit
# Create VSI-interface 1, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 10. Specify the VSI interface as a distributed gateway to provide services for the local site.
[DeviceA] interface vsi-interface 1
[DeviceA-Vsi-interface1] ip address 10.1.1.1 255.255.255.0
[DeviceA-Vsi-interface1] mac-address 1-1-1
[DeviceA-Vsi-interface1] distributed-gateway local
[DeviceA-Vsi-interface1] local-proxy-arp enable
[DeviceA-Vsi-interface1] quit
# Create VSI-interface 2, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 20. Specify the VSI interface as a distributed gateway to provide services for the local site.
[DeviceA] interface vsi-interface 2
[DeviceA-Vsi-interface2] ip address 20.1.1.1 255.255.255.0
[DeviceA-Vsi-interface2] mac-address 2-2-2
[DeviceA-Vsi-interface2] distributed-gateway local
[DeviceA-Vsi-interface2] local-proxy-arp enable
[DeviceA-Vsi-interface2] quit
# Enable dynamic ARP entry synchronization for distributed VXLAN IP gateways.
[DeviceA] arp distributed-gateway dynamic-entry synchronize
# Specify VSI-interface 1 as the gateway interface for the VSI of VXLAN 10.
[DeviceA] vsi vpna
[DeviceA-vsi-vpna] gateway vsi-interface 1
[DeviceA-vsi-vpna] quit
# Specify VSI-interface 2 as the gateway interface for the VSI of VXLAN 20.
[DeviceA] vsi vpnb
[DeviceA-vsi-vpnb] gateway vsi-interface 2
[DeviceA-vsi-vpnb] quit
# Exclude all VXLAN interfaces from the shutdown action by M-LAG MAD.
[DeviceA] m-lag mad exclude interface loopback 0
[DeviceA] m-lag mad exclude interface gigabitethernet 1/0/4
[DeviceA] m-lag mad exclude interface vsi-interface 1
[DeviceA] m-lag mad exclude interface vsi-interface 2
[DeviceA] m-lag mad exclude interface vlan-interface 11
3. Configure Device B:
# Enable Layer 2 VPN (L2VPN).
<DeviceB> system-view
[DeviceB] l2vpn enable
# Configure the frame match criteria for dynamic ACs on the peer link, with in one of the following methods. You must configure Device A and Device B in the same method.
¡ Method 1: Create the frame match criteria of dynamic ACs on the peer link based on VXLAN IDs.
[DeviceB] l2vpn m-lag peer-link ac-match-rule vxlan-mapping
¡ Method 2: Create an AC on the peer link based on the frame match criteria of the site-facing Ethernet service instance.
You do not need to configure other settings. This method is used by default.
# Set the M-LAG system number.
[DeviceB] m-lag system-mac 1-1-1
[DeviceB] m-lag system-number 2
[DeviceB] m-lag system-priority 10
[DeviceB] m-lag keepalive ip destination 60.1.1.1 source 60.1.1.2
[DeviceB] m-lag restore-delay 180
# Create Layer 2 aggregate interface Bridge-aggregation 2.
[DeviceB] interface bridge-aggregation 2
[DeviceB-Bridge-Aggregation2] quit
# Assign HundredGigE1/0/2 and HundredGigE1/0/3 to aggregation group 2.
[DeviceB] interface HundredGigE 1/0/2
[DeviceB-HundredGigE1/0/2] port link-aggregation group 2
[DeviceB-HundredGigE1/0/2] quit
[DeviceB] interface HundredGigE 1/0/3
[DeviceB-HundredGigE1/0/3] port link-aggregation group 2
[DeviceB-HundredGigE1/0/3] quit
# Configure interface Bridge-Aggregation 2 to operate in dynamic aggregation mode as a peer-link interface.
[DeviceB] interface bridge-aggregation 2
[DeviceB-Bridge-Aggregation2] link-aggregation mode dynamic
[DeviceB-Bridge-Aggregation2] port m-lag peer-link 1
[DeviceB-Bridge-Aggregation2] quit
# Create dynamic Layer 2 dynamic aggregate interface Bridge-Aggregation 3, and configure it as M-LAG interface 3.
[DeviceB] interface bridge-aggregation 3
[DeviceB-Bridge-Aggregation3] link-aggregation mode dynamic
[DeviceB-Bridge-Aggregation3] port m-lag group 3
[DeviceB-Bridge-Aggregation3] quit
# Assign GigabitEthernet1/0/5 to aggregation group 3.
[DeviceB] interface gigabitethernet 1/0/5
[DeviceB-GigabitEthernet1/0/5] port link-aggregation group 3
[DeviceB-GigabitEthernet1/0/5] quit
# Create VLAN 2.
[DeviceB] vlan 2
[DeviceB-vlan2] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 3 as a trunk port and assign it to VLAN 2.
[DeviceB] interface bridge-aggregation 3
[DeviceB-Bridge-Aggregation3] port link-type trunk
[DeviceB-Bridge-Aggregation3] port trunk permit vlan 2
[DeviceB-Bridge-Aggregation3] quit
# Create VSI instance vpna and VXLAN 10.
[DeviceB] vsi vpna
[DeviceB-vsi-vpna] vxlan 10
[DeviceB-vsi-vpna-vxlan-10] quit
[DeviceB-vsi-vpna] quit
# Create VSI instance vpnb and VXLAN 20.
[DeviceB] vsi vpnb
[DeviceB-vsi-vpnb] vxlan 20
[DeviceB-vsi-vpnb-vxlan-20] quit
[DeviceB-vsi-vpnb] quit
# Configure an IP address for interface Loopback0, which is to be used as the source address for the tunnel.
[DeviceB] interface loopback 0
[DeviceB-Loopback0] ip address 1.1.1.1 255.255.255.255
[DeviceB-Loopback0] quit
# Establish a VXLAN tunnel from Device B to Device C and Device D.
[DeviceB] interface tunnel 1 mode vxlan
[DeviceB-Tunnel1] source 1.1.1.1
[DeviceB-Tunnel1] destination 2.2.2.2
[DeviceB-Tunnel1] quit
# Associate interface Tunnel1 with VXLAN 10.
[DeviceB] vsi vpna
[DeviceB-vsi-vpna] vxlan 10
[DeviceB-vsi-vpna-vxlan-10] tunnel 1
[DeviceB-vsi-vpna-vxlan-10] quit
[DeviceB-vsi-vpna] quit
# Associate interface Tunnel1 with VXLAN 20.
[DeviceB] vsi vpnb
[DeviceB-vsi-vpnb] vxlan 20
[DeviceB-vsi-vpnb-vxlan-20] tunnel 1
[DeviceB-vsi-vpnb-vxlan-20] quit
[DeviceB-vsi-vpnb] quit
# Create Ethernet service instance 1000 on Bridge-Aggregation 3, which is connected to Device E. Configure the Ethernet service instance to match frames with outer VLAN tag 2.
[DeviceB] interface bridge-aggregation 3
[DeviceB-Bridge-Aggregation3] service-instance 1000
[DeviceB-Bridge-Aggregation3-srv1000] encapsulation s-vid 2
# Map Ethernet service instance 1000 to VSI vpna.
[DeviceB-Bridge-Aggregation3-srv1000] xconnect vsi vpna
[DeviceB-Bridge-Aggregation3-srv1000] quit
[DeviceB-Bridge-Aggregation3] quit
# Create VSI-interface 1, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 10. Specify the VSI interface as a distributed gateway to provide services for the local site.
[DeviceB] interface vsi-interface 1
[DeviceB-Vsi-interface1] ip address 10.1.1.1 255.255.255.0
[DeviceB-Vsi-interface1] mac-address 1-1-1
[DeviceB-Vsi-interface1] distributed-gateway local
[DeviceB-Vsi-interface1] local-proxy-arp enable
[DeviceB-Vsi-interface1] quit
# Create VSI-interface 2, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 20. Specify the VSI interface as a distributed gateway to provide services for the local site.
[DeviceB] interface vsi-interface 2
[DeviceB-Vsi-interface2] ip address 20.1.1.1 255.255.255.0
[DeviceB-Vsi-interface2] mac-address 2-2-2
[DeviceB-Vsi-interface2] distributed-gateway local
[DeviceB-Vsi-interface2] local-proxy-arp enable
[DeviceB-Vsi-interface2] quit
# Enable dynamic ARP entry synchronization for distributed VXLAN IP gateways.
[DeviceB] arp distributed-gateway dynamic-entry synchronize
# Specify VSI-interface 1 as the gateway interface for the VSI of VXLAN 10.
[DeviceB] vsi vpna
[DeviceB-vsi-vpna] gateway vsi-interface 1
[DeviceB-vsi-vpna] quit
# Specify VSI-interface 2 as the gateway interface for the VSI of VXLAN 20.
[DeviceB] vsi vpnb
[DeviceB-vsi-vpnb] gateway vsi-interface 2
[DeviceB-vsi-vpnb] quit
# Exclude all VXLAN interfaces from the shutdown action by M-LAG MAD.
[DeviceB] m-lag mad exclude interface loopback 0
[DeviceB] m-lag mad exclude interface gigabitethernet 1/0/4
[DeviceB] m-lag mad exclude interface vsi-interface 1
[DeviceB] m-lag mad exclude interface vsi-interface 2
[DeviceB] m-lag mad exclude interface vlan-interface 12
4. Configure Device C:
# Enable Layer 2 VPN (L2VPN).
<DeviceC> system-view
[DeviceC] l2vpn enable
# Configure the frame match criteria for dynamic ACs on the peer link, with in one of the following methods. You must configure Device C and Device D in the same method.
¡ Method 1: Create the frame match criteria of dynamic ACs on the peer link based on VXLAN IDs.
[DeviceC] l2vpn m-lag peer-link ac-match-rule vxlan-mapping
¡ Method 2: Create an AC on the peer link based on the frame match criteria of the site-facing Ethernet service instance.
You do not need to configure other settings. This method is used by default.
# Set the M-LAG system number.
[DeviceC] m-lag system-mac 2-2-2
[DeviceC] m-lag system-number 1
[DeviceC] m-lag system-priority 10
[DeviceC] m-lag keepalive ip destination 60.2.1.2 source 60.2.1.1
[DeviceC] m-lag restore-delay 180
# Create Layer 2 aggregate interface Bridge-aggregation 4.
[DeviceC] interface bridge-aggregation 4
[DeviceC-Bridge-Aggregation4] quit
# Assign HundredGigE1/0/2 and HundredGigE1/0/3 to aggregation group 4.
[DeviceC] interface HundredGigE 1/0/2
[DeviceC-HundredGigE1/0/2] port link-aggregation group 4
[DeviceC-HundredGigE1/0/2] quit
[DeviceC] interface HundredGigE 1/0/3
[DeviceC-HundredGigE1/0/3] port link-aggregation group 4
[DeviceC-HundredGigE1/0/3] quit
# Configure interface Bridge-Aggregation 4 to operate in dynamic aggregation mode as a peer-link interface.
[DeviceC] interface bridge-aggregation 4
[DeviceC-Bridge-Aggregation4] link-aggregation mode dynamic
[DeviceC-Bridge-Aggregation4] port m-lag peer-link 1
[DeviceC-Bridge-Aggregation4] quit
# Create dynamic Layer 2 dynamic aggregate interface Bridge-Aggregation 5, and configure it as M-LAG interface 4.
[DeviceC] interface bridge-aggregation 5
[DeviceC-Bridge-Aggregation5] link-aggregation mode dynamic
[DeviceC-Bridge-Aggregation5] port m-lag group 4
[DeviceC-Bridge-Aggregation5] quit
# Assign GigabitEthernet1/0/5 to aggregation group 5.
[DeviceC] interface gigabitethernet 1/0/5
[DeviceC-GigabitEthernet1/0/5] port link-aggregation group 5
[DeviceC-GigabitEthernet1/0/5] quit
# Create VLAN 3.
[DeviceC] vlan 3
[DeviceC-vlan3] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 5 as a trunk port and assign it to VLAN 3.
[DeviceC] interface bridge-aggregation 5
[DeviceC-Bridge-Aggregation5] port link-type trunk
[DeviceC-Bridge-Aggregation5] port trunk permit vlan 3
[DeviceC-Bridge-Aggregation5] quit
# Create VSI instance vpna and VXLAN 10.
[DeviceC] vsi vpna
[DeviceC-vsi-vpna] vxlan 10
[DeviceC-vsi-vpna-vxlan-10] quit
[DeviceC-vsi-vpna] quit
# Create VSI instance vpnb and VXLAN 20.
[DeviceC] vsi vpnb
[DeviceC-vsi-vpnb] vxlan 20
[DeviceC-vsi-vpnb-vxlan-20] quit
[DeviceC-vsi-vpnb] quit
# Configure an IP address for interface Loopback0, which is to be used as the source address for the tunnel.
[DeviceC] interface loopback 0
[DeviceC-Loopback0] ip address 2.2.2.2 255.255.255.255
[DeviceC-Loopback0] quit
# Establish a VXLAN tunnel from Device C to Device A and Device B.
[DeviceC] interface tunnel 1 mode vxlan
[DeviceC-Tunnel1] source 2.2.2.2
[DeviceC-Tunnel1] destination 1.1.1.1
[DeviceC-Tunnel1] quit
# Associate interface Tunnel1 with VXLAN 10.
[DeviceC] vsi vpna
[DeviceC-vsi-vpna] vxlan 10
[DeviceC-vsi-vpna-vxlan-10] tunnel 1
[DeviceC-vsi-vpna-vxlan-10] quit
[DeviceC-vsi-vpna] quit
# Associate interface Tunnel1 with VXLAN 20.
[DeviceC] vsi vpnb
[DeviceC-vsi-vpnb] vxlan 20
[DeviceC-vsi-vpnb-vxlan-20] tunnel 1
[DeviceC-vsi-vpnb-vxlan-20] quit
[DeviceC-vsi-vpnb] quit
# Create Ethernet service instance 2000 on Bridge-Aggregation 5, which is connected to Device F. Configure the Ethernet service instance to match frames with outer VLAN tag 3.
[DeviceC] interface bridge-aggregation 5
[DeviceC-Bridge-Aggregation5] service-instance 2000
[DeviceC-Bridge-Aggregation5-srv2000] encapsulation s-vid 3
# Map Ethernet service instance 2000 to VSI vpnb.
[DeviceC-Bridge-Aggregation5-srv2000] xconnect vsi vpnb
[DeviceC-Bridge-Aggregation5-srv2000] quit
[DeviceC-Bridge-Aggregation5] quit
# Create VSI-interface 1, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 10. Specify the VSI interface as a distributed gateway to provide services for the local site.
[DeviceC] interface vsi-interface 1
[DeviceC-Vsi-interface1] ip address 10.1.1.1 255.255.255.0
[DeviceC-Vsi-interface1] mac-address 1-1-1
[DeviceC-Vsi-interface1] distributed-gateway local
[DeviceC-Vsi-interface1] local-proxy-arp enable
[DeviceC-Vsi-interface1] quit
# Create VSI-interface 2, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 20. Specify the VSI interface as a distributed gateway to provide services for the local site.
[DeviceC] interface vsi-interface 2
[DeviceC-Vsi-interface2] ip address 20.1.1.1 255.255.255.0
[DeviceC-Vsi-interface2] mac-address 2-2-2
[DeviceC-Vsi-interface2] distributed-gateway local
[DeviceC-Vsi-interface2] local-proxy-arp enable
[DeviceC-Vsi-interface2] quit
# Enable dynamic ARP entry synchronization for distributed VXLAN IP gateways.
[DeviceC] arp distributed-gateway dynamic-entry synchronize
# Specify VSI-interface 1 as the gateway interface for the VSI of VXLAN 10.
[DeviceC] vsi vpna
[DeviceC-vsi-vpna] gateway vsi-interface 1
[DeviceC-vsi-vpna] quit
# Specify VSI-interface 2 as the gateway interface for the VSI of VXLAN 20.
[DeviceC] vsi vpnb
[DeviceC-vsi-vpnb] gateway vsi-interface 2
[DeviceC-vsi-vpnb] quit
# Exclude all VXLAN interfaces from the shutdown action by M-LAG MAD.
[DeviceC] m-lag mad exclude interface loopback 0
[DeviceC] m-lag mad exclude interface gigabitethernet 1/0/4
[DeviceC] m-lag mad exclude interface vsi-interface 1
[DeviceC] m-lag mad exclude interface vsi-interface 2
[DeviceC] m-lag mad exclude interface vlan-interface 13
5. Configure Device D:
# Enable Layer 2 VPN (L2VPN).
<DeviceD> system-view
[DeviceD] l2vpn enable
# Configure the frame match criteria for dynamic ACs on the peer link, with in one of the following methods. You must configure Device C and Device D in the same method.
¡ Method 1: Create the frame match criteria of dynamic ACs on the peer link based on VXLAN IDs.
[DeviceD] l2vpn m-lag peer-link ac-match-rule vxlan-mapping
¡ Method 2: Create an AC on the peer link based on the frame match criteria of the site-facing Ethernet service instance.
You do not need to configure other settings. This method is used by default.
# Set the M-LAG system number.
[DeviceD] m-lag system-mac 2-2-2
[DeviceD] m-lag system-number 2
[DeviceD] m-lag system-priority 10
[DeviceD] m-lag keepalive ip destination 60.2.1.1 source 60.2.1.2
[DeviceD] m-lag restore-delay 180
# Create Layer 2 aggregate interface Bridge-aggregation 4.
[DeviceD] interface bridge-aggregation 4
[DeviceD-Bridge-Aggregation4] quit
# Assign HundredGigE1/0/2 and HundredGigE1/0/3 to aggregation group 4.
[DeviceD] interface HundredGigE 1/0/2
[DeviceD-HundredGigE1/0/2] port link-aggregation group 4
[DeviceD-HundredGigE1/0/2] quit
[DeviceD] interface HundredGigE 1/0/3
[DeviceD-HundredGigE1/0/3] port link-aggregation group 4
[DeviceD-HundredGigE1/0/3] quit
# Configure interface Bridge-Aggregation 4 to operate in dynamic aggregation mode as a peer-link interface.
[DeviceD] interface bridge-aggregation 4
[DeviceD-Bridge-Aggregation4] link-aggregation mode dynamic
[DeviceD-Bridge-Aggregation4] port m-lag peer-link 1
[DeviceD-Bridge-Aggregation4] quit
# Create dynamic Layer 2 dynamic aggregate interface Bridge-Aggregation 5, and configure it as M-LAG interface 4.
[DeviceD] interface bridge-aggregation 5
[DeviceD-Bridge-Aggregation5] link-aggregation mode dynamic
[DeviceD-Bridge-Aggregation5] port m-lag group 5
[DeviceD-Bridge-Aggregation5] quit
# Assign GigabitEthernet1/0/5 to aggregation group 5.
[DeviceD] interface gigabitethernet 1/0/5
[DeviceD-GigabitEthernet1/0/5] port link-aggregation group 6
[DeviceD-GigabitEthernet1/0/5] quit
# Create VLAN 3.
[DeviceD] vlan 3
[DeviceD-vlan3] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 5 as a trunk port and assign it to VLAN 3.
[DeviceD] interface bridge-aggregation 5
[DeviceD-Bridge-Aggregation5] port link-type trunk
[DeviceD-Bridge-Aggregation5] port trunk permit vlan 3
[DeviceD-Bridge-Aggregation5] quit
# Create VSI instance vpna and VXLAN 10.
[DeviceD] vsi vpna
[DeviceD-vsi-vpna] vxlan 10
[DeviceD-vsi-vpna-vxlan-10] quit
[DeviceD-vsi-vpna] quit
# Create VSI instance vpnb and VXLAN 20.
[DeviceD] vsi vpnb
[DeviceD-vsi-vpnb] vxlan 20
[DeviceD-vsi-vpnb-vxlan-20] quit
[DeviceD-vsi-vpnb] quit
# Configure an IP address for interface Loopback0, which is to be used as the source address for the tunnel.
[DeviceD] interface loopback 0
[DeviceD-Loopback0] ip address 2.2.2.2 255.255.255.255
[DeviceD-Loopback0] quit
# Establish a VXLAN tunnel from Device D to Device A and Device B.
[DeviceD] interface tunnel 1 mode vxlan
[DeviceD-Tunnel1] source 2.2.2.2
[DeviceD-Tunnel1] destination 1.1.1.1
[DeviceD-Tunnel1] quit
# Associate interface Tunnel1 with VXLAN 10.
[DeviceD] vsi vpna
[DeviceD-vsi-vpna] vxlan 10
[DeviceD-vsi-vpna-vxlan-10] tunnel 1
[DeviceD-vsi-vpna-vxlan-10] quit
[DeviceD-vsi-vpna] quit
# Associate interface Tunnel1 with VXLAN 20.
[DeviceD] vsi vpnb
[DeviceD-vsi-vpnb] vxlan 20
[DeviceD-vsi-vpnb-vxlan-20] tunnel 1
[DeviceD-vsi-vpnb-vxlan-20] quit
[DeviceD-vsi-vpnb] quit
# Create Ethernet service instance 2000 on Bridge-Aggregation 5, which is connected to Device F. Configure the Ethernet service instance to match frames with outer VLAN tag 3.
[DeviceD] interface bridge-aggregation 5
[DeviceD-Bridge-Aggregation5] service-instance 2000
[DeviceD-Bridge-Aggregation5-srv2000] encapsulation s-vid 3
# Map Ethernet service instance 2000 to VSI vpnb.
[DeviceD-Bridge-Aggregation5-srv2000] xconnect vsi vpnb
[DeviceD-Bridge-Aggregation5-srv2000] quit
[DeviceD-Bridge-Aggregation5] quit
# Create VSI-interface 1, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 10. Specify the VSI interface as a distributed gateway to provide services for the local site.
[DeviceD] interface vsi-interface 1
[DeviceD-Vsi-interface1] ip address 10.1.1.1 255.255.255.0
[DeviceD-Vsi-interface1] mac-address 1-1-1
[DeviceD-Vsi-interface1] distributed-gateway local
[DeviceD-Vsi-interface1] local-proxy-arp enable
[DeviceD-Vsi-interface1] quit
# Create VSI-interface 2, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 20. Specify the VSI interface as a distributed gateway to provide services for the local site.
[DeviceD] interface vsi-interface 2
[DeviceD-Vsi-interface2] ip address 20.1.1.1 255.255.255.0
[DeviceD-Vsi-interface2] mac-address 2-2-2
[DeviceD-Vsi-interface2] distributed-gateway local
[DeviceD-Vsi-interface2] local-proxy-arp enable
[DeviceD-Vsi-interface2] quit
# Enable dynamic ARP entry synchronization for distributed VXLAN IP gateways.
[DeviceD] arp distributed-gateway dynamic-entry synchronize
# Specify VSI-interface 1 as the gateway interface for the VSI of VXLAN 10.
[DeviceD] vsi vpna
[DeviceD-vsi-vpna] gateway vsi-interface 1
[DeviceD-vsi-vpna] quit
# Specify VSI-interface 2 as the gateway interface for the VSI of VXLAN 20.
[DeviceD] vsi vpnb
[DeviceD-vsi-vpnb] gateway vsi-interface 2
[DeviceD-vsi-vpnb] quit
# Exclude all VXLAN interfaces from the shutdown action by M-LAG MAD.
[DeviceD] m-lag mad exclude interface loopback 0
[DeviceD] m-lag mad exclude interface gigabitethernet 1/0/4
[DeviceD] m-lag mad exclude interface vsi-interface 1
[DeviceD] m-lag mad exclude interface vsi-interface 2
[DeviceD] m-lag mad exclude interface vlan-interface 14
6. Configure Device E:
# Create Layer 2 aggregate interface Bridge-Aggregation 3 and configure the interface to operate in dynamic mode.
<DeviceE> system-view
[DeviceE] interface bridge-aggregation 3
[DeviceE-Bridge-Aggregation3] link-aggregation mode dynamic
[DeviceE-Bridge-Aggregation3] quit
# Assign GigabitEthernet1/0/1 and GigabitEthernet1/0/2 to aggregation group 3.
[DeviceE] interface range gigabitethernet 1/0/1 to gigabitethernet 1/0/2
[DeviceE-if-range] port link-aggregation group 3
[DeviceE-if-range] quit
# Create VLAN 2.
[DeviceE] vlan 2
[DeviceE-vlan2] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 3 as a trunk port and assign it to VLAN 2.
[DeviceE] interface bridge-aggregation 3
[DeviceE-Bridge-Aggregation3] port link-type trunk
[DeviceE-Bridge-Aggregation3] port trunk permit vlan 2
[DeviceE-Bridge-Aggregation3] quit
# Create VLAN-interface 2 and assign it an IP address.
[DeviceE] interface vlan-interface 2
[DeviceE-vlan-interface2] ip address 10.1.1.100 24
[DeviceE-vlan-interface2] quit
7. Configure Device F:
# Create Layer 2 aggregate interface Bridge-Aggregation 5 and configure the interface to operate in dynamic mode.
<DeviceF> system-view
[DeviceF] interface bridge-aggregation 5
[DeviceF-Bridge-Aggregation5] link-aggregation mode dynamic
[DeviceF-Bridge-Aggregation5] quit
# Assign GigabitEthernet1/0/1 and GigabitEthernet1/0/2 to aggregation group 5.
[DeviceF] interface range gigabitethernet 1/0/1 to gigabitethernet 1/0/2
[DeviceF-if-range] port link-aggregation group 5
[DeviceF-if-range] quit
# Create VLAN 3.
[DeviceF] vlan 3
[DeviceF-vlan3] quit
# Configure Layer 2 aggregate interface Bridge-Aggregation 5 as a trunk port and assign it to VLAN 3.
[DeviceF] interface bridge-aggregation 5
[DeviceF-Bridge-Aggregation5] port link-type trunk
[DeviceF-Bridge-Aggregation5] port trunk permit vlan 3
[DeviceF-Bridge-Aggregation5] quit
# Create VLAN-interface 3 and assign it an IP address.
[DeviceF] interface vlan-interface 3
[DeviceF-vlan-interface3] ip address 20.1.1.100 24
[DeviceF-vlan-interface3] quit
Using GIR to upgrade or replace M-LAG member devices
Upgrading the secondary device (Device B)
1. Configure the maintenance mode and switch traffic to the primary device:
# Configure the secondary device (Device B) to enter maintenance mode. Related route and aggregation settings will be automatically isolated to switch traffic to the primary device (Device A).
<DeviceB> system-view
[DeviceB] gir system-mode maintenance
Collecting commands... Please wait.
Configuration to be applied:
bgp 200
isolate enable
isis 1
isolate enable
ospf 1 router-id 11.11.11.11
isolate enable
sleep instance 1 interval 30
link-aggregation lacp isolate
Do you want to continue? [Y/N]: y
Generated a snapshot: before_maintenance.
Applying: bgp 200
Applying: isolate enable
Applying: isis 1
Applying: isolate enable
Applying: ospf 1 router-id 11.11.11.11
Applying: isolate enable
Applying: sleep instance 1 interval 30
Applying: link-aggregation lacp isolate
Waiting 120 seconds to release the CLI.
Changed to maintenance mode successfully.
# Save the configuration. If you do not save the configuration, the device will be in normal mode after a successful upgrade and restart, which might result in traffic loss during switchback.
[DeviceB] save
The current configuration will be written to the device. Are you sure? [Y/N]:y
Please input the file name(*.cfg)[flash:/startup.cfg]
(To leave the existing filename unchanged, press the enter key):
Validating file. Please wait...
The startup.cfg file already exists.
Compared with the startup.cfg file, The current configuration adds 6 commands and deletes 0 commands.
If you want to see the configuration differences, please cancel this operation, and then use the display diff command to show the details.
If you continue the save operation, the file will be overwritten.
Are you sure you want to continue the save operation? [Y/N]:y
Saving the current configuration to the file. Please wait...
Configuration is saved to device successfully.
[DeviceB] quit
2. Specify the upgrade file and reboot the device:
# Specify the next startup configuration file.
<DeviceB> boot-loader file flash:/s9850_6850-f6633.ipe all main
# (Optional.) Specify the next startup configuration file.
<DeviceB> startup saved-configuration flash:/m-lag_new.cfg
# Identify whether the device will use the newly loaded image file and configuration file for the next startup.
<DeviceB> display boot-loader
Software images on slot 1:
Current software images:
flash:/s9850_6850-cmw710-boot-f6632.bin
flash:/s9850_6850-cmw710-system-f6632.bin
Main startup software images:
flash:/s9850_6850-cmw710-boot-f6633.bin
flash:/s9850_6850-cmw710-system-f6633.bin
Backup startup software images:
None
<DeviceB> display startup
MainBoard:
Current startup saved-configuration file: flash:/m-lag_old.cfg
Next main startup saved-configuration file: flash:/m-lag_new.cfg
Next backup startup saved-configuration file: NULL
# Reboot the device.
<DeviceB> reboot
Start to check configuration with next startup configuration file, please wait.........DONE!
Current configuration may be lost after the reboot, save current configuration? [Y/N]:y
Please input the file name(*.cfg)[flash:/m-lag_old.cfg]
(To leave the existing filename unchanged, press the enter key):startup.cfg
Validating file. Please wait...
Saved the current configuration to mainboard device successfully.
This command will reboot the device. Continue? [Y/N]:y
3. Identify whether the M-LAG upgrade method is successful in maintenance mode:
# Identify whether the image file has been upgraded to the target file and whether the configuration file is the target one.
<DeviceB> display boot-loader
Software images on slot 1:
Current software images:
flash:/s9850_6850-cmw710-boot-f6633.bin
flash:/s9850_6850-cmw710-system-f6633.bin
Main startup software images:
flash:/s9850_6850-cmw710-boot-f6633.bin
flash:/s9850_6850-cmw710-system-f6633.bin
Backup startup software images:
None
<DeviceB> display startup
MainBoard:
Current startup saved-configuration file: flash:/m-lag_new.cfg
Next main startup saved-configuration file: flash: /m-lag_new.cfg
Next backup startup saved-configuration file: NULL
# Identify whether the device is operating correctly.
<DeviceB> display device
Slot Type State Subslot Soft Ver Patch Ver
1 S6850-56HF Master 0 S6850-56HF-6633 None
# Identify whether the configuration is restored.
After startup, execute the display current-configuration command in any view to see the current configuration of the device. Execute the display diff current-configuration configfile flash:/XXX.cfg command in any view to compare the running configuration file with the one saved in the storage device and check for any lost or changed configurations.
# Display the M-LAG state. The value for the Peer-link interface state (cause) field is UP when the device is operating correctly.
<DeviceB> display m-lag summary
Flags: A -- Aggregate interface down, B -- No peer M-LAG interface configured
C -- Configuration consistency check failed
Peer-link interface: BAGG2
Peer-link interface state (cause): UP
Keepalive link state (cause): UP
M-LAG interface information
M-LAG IF M-LAG group Local state (cause) Peer state Remaining down time(s)
BAGG3 3 DOWN (A) UP -
4. Switch the traffic back to the secondary device:
# Switch the device back to normal mode and switch the traffic to the secondary device.
[DeviceB] undo gir system-mode maintenance
Collecting commands... Please wait.
Configuration to be applied:
undo link-aggregation lacp isolate
sleep instance 1 interval 30
ospf 1 router-id 11.11.11.11
undo isolate enable
isis 1
undo isolate enable
bgp 200
undo isolate enable
Do you want to continue? [Y/N]: y
Applying: undo link-aggregation lacp isolate
Applying: sleep instance 1 interval 30
Applying: ospf 1 router-id 11.11.11.11
Applying: undo isolate enable
Applying: isis 1
Applying: undo isolate enable
Applying: bgp 200
Applying: undo isolate enable
Waiting 120 seconds to generate a snapshot.
Generated a snapshot: after_maintenance.
Changed to normal mode successfully.
5. After traffic switchback completes, identify whether the service is operating correctly:
You can identify whether the service is operating correctly in either of the following methods:
¡ Compare the collected entries (such as the routing table, FIB table, and MAC address table entries) with those before the upgrade to check for any losses. Compare the service traffic before and after the upgrade to ensure consistency.
¡ Together with maintenance staff, identify whether service is operating properly and servers are operating correctly.
6. Identify whether the device is in normal mode.
7. Save the configuration. The secondary device upgrade is complete.
Upgrading the primary device (Device A)
Upgrade Device A following the steps in "Upgrading the secondary device (Device B)." (Details not shown.)
Upgrading the secondary device (Device D)
Upgrade Device D following the steps in “Upgrading the secondary device (Device B)." (Details not shown.)
Upgrading the primary device (Device C)
Upgrade Device C following the steps in "Upgrading the secondary device (Device B)." (Details not shown.)
Replacing a faulty M-LAG member device
If you need a shorter convergence time and the faulty device can be switched to maintenance mode for replacement, follow these steps to replace it:
1. Execute the gir system-mode maintenance command on the faulty device to switch the device from normal mode to maintenance mode and save the configuration.
2. Import the faulty device's configuration file to the new device.
3. Specify the image file and configuration file on the new device, and then reboot the device to apply the image file and configuration file.
4. Power off the new device or shut down all physical interfaces.
5. Shut down all physical interfaces on the faulty device or power off the faulty device. (When replacing multiple devices, power off the devices as a best practice.)
6. Replace the faulty device.
7. Connect the cables to the new device.
8. Power on the new device or bring up all physical interfaces.
9. Execute the undo gir system-mode maintenance command on the new device to switch from maintenance mode to normal mode and save the configuration.
Verifying the configuration
Verifying the configuration
1. Take Device A as an example to verify the M-LAG system configuration.
# Display information about tunnel interfaces on Device A. The output shows that the tunnel interface in VXLAN mode is up and the tunnel source IP is 1.1.1.1.
<DeviceA> display interface Tunnel 1
Tunnel1
Current state: UP
Line protocol state: UP
Description: Tunnel1 Interface
Bandwidth: 64 kbps
Maximum transmission unit: 1464
Internet protocol processing: Disabled
Output queue - Urgent queuing: Size/Length/Discards 0/100/0
Output queue - Protocol queuing: Size/Length/Discards 0/500/0
Output queue - FIFO queuing: Size/Length/Discards 0/75/0
Last clearing of counters: Never
Tunnel source 1.1.1.1, destination 2.2.2.2
Tunnel protocol/transport UDP_VXLAN/IP
Last 300 seconds input rate: 1 bytes/sec, 8 bits/sec, 0 packets/sec
Last 300 seconds output rate: 80 bytes/sec, 640 bits/sec, 0 packets/sec
Input: 26 packets, 1974 bytes, 0 drops
Output: 340 packets, 29514 bytes, 0 drops
# Display the VSI information on Device A. The output shows that an AC is automatically created on the peer link and associated with a VSI.
<DeviceA> display l2vpn vsi verbose
VSI Name: vpna
VSI Index : 0
VSI State : Up
MTU : 1500
Bandwidth : -
Broadcast Restrain : -
Multicast Restrain : -
Unknown Unicast Restrain: -
MAC Learning : Enabled
MAC Table Limit : -
MAC Learning rate : -
Drop Unknown : -
Flooding : Enabled
Statistics : Disabled
Gateway Interface : VSI-interface 1
VXLAN ID : 10
Tunnels:
Tunnel Name Link ID State Type Flood proxy
Tunnel1 0x5000001 UP Manual Disabled
ACs:
AC Link ID State Type
BAGG3 srv1000 0 Up Manual
BAGG2 srv2 1 Up Dynamic (M-LAG)
VSI Name: vpnb
VSI Index : 1
VSI State : Up
MTU : 1500
Bandwidth : -
Broadcast Restrain : -
Multicast Restrain : -
Unknown Unicast Restrain: -
MAC Learning : Enabled
MAC Table Limit : -
MAC Learning rate : -
Drop Unknown : -
Flooding : Enabled
Statistics : Disabled
Gateway Interface : VSI-interface 2
VXLAN ID : 20
Tunnels:
Tunnel Name Link ID State Type Flood proxy
Tunnel1 0x5000001 UP Manual Disabled
2. Verify that hosts can access each other
VMs Device E and Device F can access each other. If Device E disconnects from Device A or Device B, Device E and Device F can still communicate through another device.
3. Verify packet loss during an upgrade
During the upgrade of Device A, monitor the packet loss in traffic between Device G and Device E. Empirical data shows no packet loss occurs between them.
Configuration files
· Device A:
#
vlan 1
#
vlan 2
#
vlan 11
#
l2vpn enable
#
vsi vpna
gateway vsi-interface 1
vxlan 10
tunnel 1
#
vsi vpnb
gateway vsi-interface 2
vxlan 20
tunnel 1
#
interface Bridge-Aggregation2
port link-type trunk
port trunk permit vlan all
link-aggregation mode dynamic
port m-lag peer-link 1
#
interface Bridge-Aggregation3
port link-type trunk
port trunk permit vlan 1 to 2
link-aggregation mode dynamic
port m-lag group 3
#
service-instance 1000
encapsulation s-vid 2
xconnect vsi vpna
#
interface Bridge-Aggregation4
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
#
interface Vlan-interface2
#
interface Vlan-interface11
ip address 11.1.1.1 255.255.255.0
#
interface GigabitEthernet1/0/4
port link-mode route
combo enable copper
ip address 60.1.1.1 255.255.255.0
#
interface GigabitEthernet1/0/1
port link-mode bridge
port access vlan 11
combo enable copper
#
interface GigabitEthernet1/0/5
port link-mode bridge
port link-type trunk
port trunk permit vlan 1 to 2
combo enable copper
port link-aggregation group 3
#
interface HundredGigE1/0/2
port link-mode bridge
port link-type trunk
port trunk permit vlan all
port link-aggregation group 2
#
interface HundredGigE1/0/3
port link-mode bridge
port link-type trunk
port trunk permit vlan all
port link-aggregation group 2
#
interface Vsi-interface1
ip address 10.1.1.1 255.255.255.0
mac-address 0001-0001-0001
local-proxy-arp enable
distributed-gateway local
#
interface Vsi-interface2
ip address 20.1.1.1 255.255.255.0
mac-address 0002-0002-0002
local-proxy-arp enable
distributed-gateway local
#
interface Tunnel1 mode vxlan
source 1.1.1.1
destination 2.2.2.2
#
m-lag restore-delay 180
m-lag system-mac 0001-0001-0001
m-lag system-number 1
m-lag system-priority 10
m-lag keepalive ip destination 60.1.1.2 source 60.1.1.1
m-lag mad exclude interface GigabitEthernet0/0/2
m-lag mad exclude interface LoopBack0
m-lag mad exclude interface Vlan-interface11
m-lag mad exclude interface Vsi-interface1
m-lag mad exclude interface Vsi-interface2
#
arp distributed-gateway dynamic-entry synchronize
· Device B (Details not shown)
· Device C (Details not shown)
· Device D (Details not shown)
· Device E:
#
vlan 1
#
vlan 2
#
interface Bridge-Aggregation3
port link-type trunk
port trunk permit vlan 1 to 2
link-aggregation mode dynamic
#
interface Vlan-interface2
ip address 10.1.1.100 255.255.255.0
#
interface GigabitEthernet1/0/1
port link-mode bridge
port link-type trunk
port trunk permit vlan 1 to 2
combo enable copper
port link-aggregation group 3
#
interface GigabitEthernet1/0/2
port link-mode bridge
port link-type trunk
port trunk permit vlan 1 to 2
combo enable copper
port link-aggregation group 3
· Device F (Details not shown)