H3C Fixed Port Campus Switches Configuration Examples-6W105

HomeSupportConfigure & DeployConfiguration ExamplesH3C Fixed Port Campus Switches Configuration Examples-6W105
Table of Contents
Related Documents

94-Configuration Example for Software Upgrade with Zero Packet Loss by Using GIR in VXLAN DRNI Network


Introduction

The following information provides an example for software upgrade with zero packet loss by using GIR in a VXLAN DRNI network.

Prerequisites

This document is not restricted to specific software or hardware versions. Procedures and information in the examples might be slightly different depending on the software or hardware version of the device.

The configuration examples were created and verified in a lab environment, and all the devices were started with the factory default configuration. When you are working on a live network, make sure you understand the potential impact of every command on your network.

The following information is provided based on the assumption that you have basic knowledge of VXLAN and GIR.

Example: Configuring software upgrade with zero packet loss by using GIR in a VXLAN DRNI network

Network configuration

As shown in Figure 1:

·     Device A and Device B act as distributed VXLAN IP gateways connected to Device E. Device A and Device B form a DR system to act as a virtual VXLAN IP gateway and use an Ethernet aggregate link as the IPL. Device E belongs to VXLAN 10.

·     Device C and Device D act as distributed VXLAN IP gateways connected to Device F. Device C and Device D form a DR system to act as a virtual VXLAN IP gateway and use an Ethernet aggregate link as the IPL. Device F belongs to VXLAN 20.

·     Configure Device B to enter maintenance mode and switch traffic to Device A. After Device B completes its upgrade, switch traffic back to Device B and then upgrade Device A.

·     Configure Device D to enter maintenance mode and switch traffic to Device C. After Device D completes its upgrade, switch traffic back to Device D and then upgrade Device C.

Figure 1 Network diagram

 

Table 1 Configuration data

Device

Interface

IP address

Device

Interface

IP address

Device A

Vlan-interface11

11.1.1.1/24

Device C

Vlan-interface13

13.1.1.1/24

 

GE 1/0/4

60.1.1.1/24

 

GE 1/0/4

60.2.1.1/24

 

Loop0

1.1.1.1/32

 

Loop0

2.2.2.2/32

Device B

Vlan-interface12

12.1.1.1/24

Device D

Vlan-interface14

14.1.1.1/24

 

GE 1/0/4

60.1.1.2/24

 

GE 1/0/4

60.2.1.2/24

 

Loop0

1.1.1.1/32

 

Loop0

2.2.2.2/32

Device G

Vlan-interface11

11.1.1.3/24

vpna

Vsi-interface1

10.1.1.1/24

 

Vlan-interface12

12.1.1.3/24

 

 

 

 

Vlan-interface13

13.1.1.3/24

vpnb

Vsi-interface2

20.1.1.1/24

 

Vlan-interface14

14.1.1.3/24

 

 

 

 

Loop0

3.3.3.3/24

 

 

 

 

Analysis

To meet this requirement, perform the following tasks:

·     Device A and Device B form one DR system, while Device C and Device D form another.

·     Configure Device A, Device B, Device C, and Device D as VTEPs and configure Device E as the core device.

·     First use GIR to isolate and upgrade the secondary device (Device B), and then use GIR to isolate and upgrade the primary device (Device A).

·     First use GIR to isolate and upgrade the secondary device (Device D), and then use GIR to isolate and upgrade the primary device (Device C).

Applicable hardware and software versions

The following matrix shows the hardware and software versions to which this configuration example is applicable:

 

Hardware

Software version

S6812 switch series

S6813 switch series

Release 6628Pxx

S6550XE-HI switch series

Not supported

S6525XE-HI switch series

Not supported

S5850 switch series

Not supported

S5570S-EI switch series

Not supported

S5560X-EI switch series

Release 6628Pxx

S5560X-HI switch series

Release 6628Pxx

S5500V2-EI switch series

Release 6628Pxx

MS4520V2-30F switch

Release 6628Pxx

MS4520V2-30C switch

MS4520V2-54C switch

Release 6628Pxx

MS4520V2-28S switch

MS4520V2-24TP switch

Release 63xx

S6520X-HI switch series

S6520X-EI switch series

Release 6628Pxx

S6520X-SI switch series

S6520-SI switch series

Release 6628Pxx

S5000-EI switch series

Release 6628Pxx

MS4600 switch series

Release 6628Pxx

ES5500 switch series

Release 6628Pxx

S5560S-EI switch series

S5560S-SI switch series

Not supported

S5500V3-24P-SI switch

S5500V3-48P-SI switch

Not supported

S5500V3-SI switch series (except S5500V3-24P-SI and S5500V3-48P-SI)

Not supported

S5170-EI switch series

Not supported

S5130S-HI switch series

S5130S-EI switch series

S5130S-SI switch series

S5130S-LI switch series

Not supported

S5120V2-SI switch series

S5120V2-LI switch series

Not supported

S5120V3-EI switch series

Not supported

S5120V3-36F-SI switch

S5120V3-28P-HPWR-SI switch

S5120V3-54P-PWR-SI switch

Not supported

S5120V3-SI switch series (except S5120V3-36F-SI, S5120V3-28P-HPWR-SI, and S5120V3-54P-PWR-SI)

Not supported

S5120V3-LI switch series

Not supported

S3600V3-EI switch series

Not supported

S3600V3-SI switch series

Not supported

S3100V3-EI switch series

S3100V3-SI switch series

Not supported

S5110V2 switch series

Not supported

S5110V2-SI switch series

Not supported

S5000V3-EI switch series

S5000V5-EI switch series

Not supported

S5000E-X switch series

S5000X-EI switch series

Not supported

E128C switch

E152C switch

E500C switch series

E500D switch series

Not supported

MS4320V2 switch series

MS4320V3 switch series

MS4300V2 switch series

MS4320 switch series

MS4200 switch series

Not supported

WS5850-WiNet switch series

Not supported

WS5820-WiNet switch series

WS5810-WiNet switch series

Not supported

WAS6000 switch series

Not supported

IE4300-12P-AC switch
IE4300-12P-PWR switch

IE4300-M switch series

IE4320 switch series

Not supported

IE4520 switch series

Not supported

S5135S-EI switch

Not supported

 

Restrictions and guidelines

When using GIR to upgrade or replace devices in a DRNI network, follow these restrictions and guidelines:

·     As a best practice, do not configure isolation separately for route and aggregation services to avoid issues like packet loss due to configuration omissions.

·     When specifying the next startup configuration file, include maintenance mode settings in the file.

Procedures

Configuring IPv4 VXLAN to support DRNI

1.     Configure IP addresses and unicast routing protocols:

# Configure the IP address and subnet mask for each interface. (Details not shown.)

# Configure routes on the IP transport network to advertise routes for subnets attached to the interfaces (including Loopback interfaces) on each node. Make sure the devices have connectivity to each other. (Details not shown.)

2.     Configure Device A:

# Enable L2VPN.

<DeviceA> system-view

[DeviceA] l2vpn enable

# Configure the frame match criteria for dynamic ACs on the IPL in one of the following methods. You must configure Device A and Device B in the same method.

¡     Method 1: Create the frame match criteria of dynamic ACs on the IPL based on VXLAN IDs.

[DeviceA] l2vpn drni peer-link ac-match-rule vxlan-mapping

¡     Method 2: Create an AC on the IPL based on the frame match criteria of the site-facing Ethernet service instance.

You do not need to configure other settings. This method is used by default.

# Configure the DR system parameters.

[DeviceA] drni system-mac 1-1-1

[DeviceA] drni system-number 1

[DeviceA] drni system-priority 10

[DeviceA] drni keepalive ip destination 60.1.1.2 source 60.1.1.1

[DeviceA] drni restore-delay 180

# Create Layer 2 aggregate interface Bridge-aggregation 2.

[DeviceA] interface bridge-aggregation 2

[DeviceA-Bridge-Aggregation2] quit

# Assign HundredGigE 1/0/2 and HundredGigE 1/0/3 to aggregation group 2.

[DeviceA] interface HundredGigE 1/0/2

[DeviceA-HundredGigE1/0/2] port link-aggregation group 2

[DeviceA-HundredGigE1/0/2] quit

[DeviceA] interface HundredGigE 1/0/3

[DeviceA-HundredGigE1/0/3] port link-aggregation group 2

[DeviceA-HundredGigE1/0/3] quit

# Configure interface Bridge-Aggregation 2 to operate in dynamic aggregation mode as the IPP.

[DeviceA] interface bridge-aggregation 2

[DeviceA-Bridge-Aggregation2] link-aggregation mode dynamic

[DeviceA-Bridge-Aggregation2] port drni intra-portal-port 1

[DeviceA-Bridge-Aggregation2] quit

# Create dynamic Layer 2 aggregate interface Bridge-Aggregation 3, and assign it to DR group 3.

[DeviceA] interface bridge-aggregation 3

[DeviceA-Bridge-Aggregation3] link-aggregation mode dynamic

[DeviceA-Bridge-Aggregation3] port drni group 3

[DeviceA-Bridge-Aggregation3] quit

# Assign GigabitEthernet 1/0/5 to aggregation group 3.

[DeviceA] interface gigabitethernet 1/0/5

[DeviceA-GigabitEthernet1/0/5] port link-aggregation group 3

[DeviceA-GigabitEthernet1/0/5] quit

# Create VLAN 2.

[DeviceA] vlan 2

[DeviceA-vlan2] quit

# Set the link type of Bridge-Aggregation 3 to trunk, and assign it to VLAN 2.

[DeviceA] interface bridge-aggregation 3

[DeviceA-Bridge-Aggregation3] port link-type trunk

[DeviceA-Bridge-Aggregation3] port trunk permit vlan 2

[DeviceA-Bridge-Aggregation3] quit

# Create VSI instance vpna and VXLAN 10.

[DeviceA] vsi vpna

[DeviceA-vsi-vpna] vxlan 10

[DeviceA-vsi-vpna-vxlan-10] quit

[DeviceA-vsi-vpna] quit

# Create VSI instance vpnb and VXLAN 20.

[DeviceA] vsi vpnb

[DeviceA-vsi-vpnb] vxlan 20

[DeviceA-vsi-vpnb-vxlan-20] quit

[DeviceA-vsi-vpnb] quit

# Configure an IP address for interface Loopback0, which is to be used as the source address for the tunnel.

[DeviceA] interface loopback 0

[DeviceA-Loopback0] ip address 1.1.1.1 255.255.255.255

[DeviceA-Loopback0] quit

# Establish a VXLAN tunnel from Device A to Device C and Device D.

[DeviceA] interface tunnel 1 mode vxlan

[DeviceA-Tunnel1] source 1.1.1.1

[DeviceA-Tunnel1] destination 2.2.2.2

[DeviceA-Tunnel1] quit

# Assign Tunnel 1 to VXLAN 10.

[DeviceA] vsi vpna

[DeviceA-vsi-vpna] vxlan 10

[DeviceA-vsi-vpna-vxlan-10] tunnel 1

[DeviceA-vsi-vpna-vxlan-10] quit

[DeviceA-vsi-vpna] quit

# Assign Tunnel 1 to VXLAN 20.

[DeviceA] vsi vpnb

[DeviceA-vsi-vpnb] vxlan 20

[DeviceA-vsi-vpnb-vxlan-20] tunnel 1

[DeviceA-vsi-vpnb-vxlan-20] quit

[DeviceA-vsi-vpnb] quit

# Create Ethernet service instance 1000 on Bridge-Aggregation 3, which is connected to Device E. Configure the Ethernet service instance to match frames with outer VLAN tag 2.

[DeviceA] interface bridge-aggregation 3

[DeviceA-Bridge-Aggregation3] service-instance 1000

[DeviceA-Bridge-Aggregation3-srv1000] encapsulation s-vid 2

# Map Ethernet service instance 1000 to VSI vpna.

[DeviceA-Bridge-Aggregation3-srv1000] xconnect vsi vpna

[DeviceA-Bridge-Aggregation3-srv1000] quit

[DeviceA-Bridge-Aggregation3] quit

# Create VSI-interface 1, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 10. Specify the VSI interface as a distributed gateway to provide services for the local site.

[DeviceA] interface vsi-interface 1

[DeviceA-Vsi-interface1] ip address 10.1.1.1 255.255.255.0

[DeviceA-Vsi-interface1] mac-address 1-1-1

[DeviceA-Vsi-interface1] distributed-gateway local

[DeviceA-Vsi-interface1] local-proxy-arp enable

[DeviceA-Vsi-interface1] quit

# Create VSI-interface 2, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 20. Specify the VSI interface as a distributed gateway to provide services for the local site.

[DeviceA] interface vsi-interface 2

[DeviceA-Vsi-interface2] ip address 20.1.1.1 255.255.255.0

[DeviceA-Vsi-interface2] mac-address 2-2-2

[DeviceA-Vsi-interface2] distributed-gateway local

[DeviceA-Vsi-interface2] local-proxy-arp enable

[DeviceA-Vsi-interface2] quit

# Enable dynamic ARP entry synchronization for distributed VXLAN IP gateways.

[DeviceA] arp distributed-gateway dynamic-entry synchronize

# Specify VSI-interface 1 as the gateway interface for the VSI of VXLAN 10.

[DeviceA] vsi vpna

[DeviceA-vsi-vpna] gateway vsi-interface 1

[DeviceA-vsi-vpna] quit

# Specify VSI-interface 2 as the gateway interface for the VSI of VXLAN 20.

[DeviceA] vsi vpnb

[DeviceA-vsi-vpnb] gateway vsi-interface 2

[DeviceA-vsi-vpnb] quit

# Exclude all VXLAN interfaces from the shutdown action by M-LAG MAD.

[DeviceA] drni mad exclude interface loopback 0

[DeviceA] drni mad exclude interface gigabitethernet 1/0/4

[DeviceA] drni mad exclude interface vsi-interface 1

[DeviceA] drni mad exclude interface vsi-interface 2

[DeviceA] drni mad exclude interface vlan-interface 11

3.     Configure Device B:

# Enable L2VPN.

<DeviceB> system-view

[DeviceB] l2vpn enable

# Configure the frame match criteria for dynamic ACs on the IPL in one of the following methods. You must configure Device A and Device B in the same method.

¡     Method 1: Create the frame match criteria of dynamic ACs on the IPL based on VXLAN IDs.

[DeviceB] l2vpn drni peer-link ac-match-rule vxlan-mapping

¡     Method 2: Create an AC on the IPL based on the frame match criteria of the site-facing Ethernet service instance.

You do not need to configure other settings. This method is used by default.

# Configure the DR system parameters.

[DeviceB] drni system-mac 1-1-1

[DeviceB] drni system-number 2

[DeviceB] drni system-priority 10

[DeviceB] drni keepalive ip destination 60.1.1.1 source 60.1.1.2

[DeviceB] drni restore-delay 180

# Create Layer 2 aggregate interface Bridge-aggregation 2.

[DeviceB] interface bridge-aggregation 2

[DeviceB-Bridge-Aggregation2] quit

# Assign HundredGigE 1/0/2 and HundredGigE 1/0/3 to aggregation group 2.

[DeviceB] interface HundredGigE 1/0/2

[DeviceB-HundredGigE1/0/2] port link-aggregation group 2

[DeviceB-HundredGigE1/0/2] quit

[DeviceB] interface HundredGigE 1/0/3

[DeviceB-HundredGigE1/0/3] port link-aggregation group 2

[DeviceB-HundredGigE1/0/3] quit

# Configure interface Bridge-Aggregation 2 to operate in dynamic aggregation mode as the IPP.

[DeviceB] interface bridge-aggregation 2

[DeviceB-Bridge-Aggregation2] link-aggregation mode dynamic

[DeviceB-Bridge-Aggregation2] port drni intra-portal-port 1

[DeviceB-Bridge-Aggregation2] quit

# Create dynamic Layer 2 aggregate interface Bridge-Aggregation 3, and assign it to DR group 3.

[DeviceB] interface bridge-aggregation 3

[DeviceB-Bridge-Aggregation3] link-aggregation mode dynamic

[DeviceB-Bridge-Aggregation3] port drni group 3

[DeviceB-Bridge-Aggregation3] quit

# Assign GigabitEthernet 1/0/5 to aggregation group 3.

[DeviceB] interface gigabitethernet 1/0/5

[DeviceB-GigabitEthernet1/0/5] port link-aggregation group 3

[DeviceB-GigabitEthernet1/0/5] quit

# Create VLAN 2.

[DeviceB] vlan 2

[DeviceB-vlan2] quit

# Set the link type of Bridge-Aggregation 3 to trunk, and assign it to VLAN 2.

[DeviceB] interface bridge-aggregation 3

[DeviceB-Bridge-Aggregation3] port link-type trunk

[DeviceB-Bridge-Aggregation3] port trunk permit vlan 2

[DeviceB-Bridge-Aggregation3] quit

# Create VSI instance vpna and VXLAN 10.

[DeviceB] vsi vpna

[DeviceB-vsi-vpna] vxlan 10

[DeviceB-vsi-vpna-vxlan-10] quit

[DeviceB-vsi-vpna] quit

# Create VSI instance vpnb and VXLAN 20.

[DeviceB] vsi vpnb

[DeviceB-vsi-vpnb] vxlan 20

[DeviceB-vsi-vpnb-vxlan-20] quit

[DeviceB-vsi-vpnb] quit

# Configure an IP address for interface Loopback0, which is to be used as the source address for the tunnel.

[DeviceB] interface loopback 0

[DeviceB-Loopback0] ip address 1.1.1.1 255.255.255.255

[DeviceB-Loopback0] quit

# Establish a VXLAN tunnel from Device B to Device C and Device D.

[DeviceB] interface tunnel 1 mode vxlan

[DeviceB-Tunnel1] source 1.1.1.1

[DeviceB-Tunnel1] destination 2.2.2.2

[DeviceB-Tunnel1] quit

# Assign Tunnel 1 to VXLAN 10.

[DeviceB] vsi vpna

[DeviceB-vsi-vpna] vxlan 10

[DeviceB-vsi-vpna-vxlan-10] tunnel 1

[DeviceB-vsi-vpna-vxlan-10] quit

[DeviceB-vsi-vpna] quit

# Assign Tunnel 1 to VXLAN 20.

[DeviceB] vsi vpnb

[DeviceB-vsi-vpnb] vxlan 20

[DeviceB-vsi-vpnb-vxlan-20] tunnel 1

[DeviceB-vsi-vpnb-vxlan-20] quit

[DeviceB-vsi-vpnb] quit

# Create Ethernet service instance 1000 on Bridge-Aggregation 3, which is connected to Device E. Configure the Ethernet service instance to match frames with outer VLAN tag 2.

[DeviceB] interface bridge-aggregation 3

[DeviceB-Bridge-Aggregation3] service-instance 1000

[DeviceB-Bridge-Aggregation3-srv1000] encapsulation s-vid 2

# Map Ethernet service instance 1000 to VSI vpna.

[DeviceB-Bridge-Aggregation3-srv1000] xconnect vsi vpna

[DeviceB-Bridge-Aggregation3-srv1000] quit

[DeviceB-Bridge-Aggregation3] quit

# Create VSI-interface 1, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 10. Specify the VSI interface as a distributed gateway to provide services for the local site.

[DeviceB] interface vsi-interface 1

[DeviceB-Vsi-interface1] ip address 10.1.1.1 255.255.255.0

[DeviceB-Vsi-interface1] mac-address 1-1-1

[DeviceB-Vsi-interface1] distributed-gateway local

[DeviceB-Vsi-interface1] local-proxy-arp enable

[DeviceB-Vsi-interface1] quit

# Create VSI-interface 2, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 20. Specify the VSI interface as a distributed gateway to provide services for the local site.

[DeviceB] interface vsi-interface 2

[DeviceB-Vsi-interface2] ip address 20.1.1.1 255.255.255.0

[DeviceB-Vsi-interface2] mac-address 2-2-2

[DeviceB-Vsi-interface2] distributed-gateway local

[DeviceB-Vsi-interface2] local-proxy-arp enable

[DeviceB-Vsi-interface2] quit

# Enable dynamic ARP entry synchronization for distributed VXLAN IP gateways.

[DeviceB] arp distributed-gateway dynamic-entry synchronize

# Specify VSI-interface 1 as the gateway interface for the VSI of VXLAN 10.

[DeviceB] vsi vpna

[DeviceB-vsi-vpna] gateway vsi-interface 1

[DeviceB-vsi-vpna] quit

# Specify VSI-interface 2 as the gateway interface for the VSI of VXLAN 20.

[DeviceB] vsi vpnb

[DeviceB-vsi-vpnb] gateway vsi-interface 2

[DeviceB-vsi-vpnb] quit

# Exclude all VXLAN interfaces from the shutdown action by M-LAG MAD.

[DeviceB] drni mad exclude interface loopback 0

[DeviceB] drni mad exclude interface gigabitethernet 1/0/4

[DeviceB] drni mad exclude interface vsi-interface 1

[DeviceB] drni mad exclude interface vsi-interface 2

[DeviceB] drni mad exclude interface vlan-interface 12

4.     Configure Device C:

# Enable L2VPN.

<DeviceC> system-view

[DeviceC] l2vpn enable

# Configure the frame match criteria for dynamic ACs on the IPL in one of the following methods. You must configure Device C and Device D in the same method.

¡     Method 1: Create the frame match criteria of dynamic ACs on the IPL based on VXLAN IDs.

[DeviceC] l2vpn drni peer-link ac-match-rule vxlan-mapping

¡     Method 2: Create an AC on the IPL based on the frame match criteria of the site-facing Ethernet service instance.

You do not need to configure other settings. This method is used by default.

# Configure the DR system parameters.

[DeviceC] drni system-mac 2-2-2

[DeviceC] drni system-number 1

[DeviceC] drni system-priority 10

[DeviceC] drni keepalive ip destination 60.2.1.2 source 60.2.1.1

[DeviceC] drni restore-delay 180

# Create Layer 2 aggregate interface Bridge-aggregation 4.

[DeviceC] interface bridge-aggregation 4

[DeviceC-Bridge-Aggregation4] quit

# Assign HundredGigE 1/0/2 and HundredGigE 1/0/3 to aggregation group 4.

[DeviceC] interface HundredGigE 1/0/2

[DeviceC-HundredGigE1/0/2] port link-aggregation group 4

[DeviceC-HundredGigE1/0/2] quit

[DeviceC] interface HundredGigE 1/0/3

[DeviceC-HundredGigE1/0/3] port link-aggregation group 4

[DeviceC-HundredGigE1/0/3] quit

# Configure interface Bridge-Aggregation 4 to operate in dynamic aggregation mode as the IPP.

[DeviceC] interface bridge-aggregation 4

[DeviceC-Bridge-Aggregation4] link-aggregation mode dynamic

[DeviceC-Bridge-Aggregation4] port drni intra-portal-port 1

[DeviceC-Bridge-Aggregation4] quit

# Create dynamic Layer 2 aggregate interface Bridge-Aggregation 5, and assign it to DR group 4.

[DeviceC] interface bridge-aggregation 5

[DeviceC-Bridge-Aggregation5] link-aggregation mode dynamic

[DeviceC-Bridge-Aggregation5] port drni group 4

[DeviceC-Bridge-Aggregation5] quit

# Assign GigabitEthernet 1/0/5 to aggregation group 5.

[DeviceC] interface gigabitethernet 1/0/5

[DeviceC-GigabitEthernet1/0/5] port link-aggregation group 5

[DeviceC-GigabitEthernet1/0/5] quit

# Create VLAN 3.

[DeviceC] vlan 3

[DeviceC-vlan3] quit

# Set the link type of Bridge-Aggregation 5 to trunk, and assign it to VLAN 3.

[DeviceC] interface bridge-aggregation 5

[DeviceC-Bridge-Aggregation5] port link-type trunk

[DeviceC-Bridge-Aggregation5] port trunk permit vlan 3

[DeviceC-Bridge-Aggregation5] quit

# Create VSI instance vpna and VXLAN 10.

[DeviceC] vsi vpna

[DeviceC-vsi-vpna] vxlan 10

[DeviceC-vsi-vpna-vxlan-10] quit

[DeviceC-vsi-vpna] quit

# Create VSI instance vpnb and VXLAN 20.

[DeviceC] vsi vpnb

[DeviceC-vsi-vpnb] vxlan 20

[DeviceC-vsi-vpnb-vxlan-20] quit

[DeviceC-vsi-vpnb] quit

# Configure an IP address for interface Loopback0, which is to be used as the source address for the tunnel.

[DeviceC] interface loopback 0

[DeviceC-Loopback0] ip address 2.2.2.2 255.255.255.255

[DeviceC-Loopback0] quit

# Establish a VXLAN tunnel from Device C to Device A and Device B.

[DeviceC] interface tunnel 1 mode vxlan

[DeviceC-Tunnel1] source 2.2.2.2

[DeviceC-Tunnel1] destination 1.1.1.1

[DeviceC-Tunnel1] quit

# Assign Tunnel 1 to VXLAN 10.

[DeviceC] vsi vpna

[DeviceC-vsi-vpna] vxlan 10

[DeviceC-vsi-vpna-vxlan-10] tunnel 1

[DeviceC-vsi-vpna-vxlan-10] quit

[DeviceC-vsi-vpna] quit

# Assign Tunnel 1 to VXLAN 20.

[DeviceC] vsi vpnb

[DeviceC-vsi-vpnb] vxlan 20

[DeviceC-vsi-vpnb-vxlan-20] tunnel 1

[DeviceC-vsi-vpnb-vxlan-20] quit

[DeviceC-vsi-vpnb] quit

# Create Ethernet service instance 2000 on Bridge-Aggregation 5, which is connected to Device F. Configure the Ethernet service instance to match frames with outer VLAN tag 3.

[DeviceC] interface bridge-aggregation 5

[DeviceC-Bridge-Aggregation5] service-instance 2000

[DeviceC-Bridge-Aggregation5-srv2000] encapsulation s-vid 3

# Map Ethernet service instance 2000 to VSI vpnb.

[DeviceC-Bridge-Aggregation5-srv2000] xconnect vsi vpnb

[DeviceC-Bridge-Aggregation5-srv2000] quit

[DeviceC-Bridge-Aggregation5] quit

# Create VSI-interface 1, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 10. Specify the VSI interface as a distributed gateway to provide services for the local site.

[DeviceC] interface vsi-interface 1

[DeviceC-Vsi-interface1] ip address 10.1.1.1 255.255.255.0

[DeviceC-Vsi-interface1] mac-address 1-1-1

[DeviceC-Vsi-interface1] distributed-gateway local

[DeviceC-Vsi-interface1] local-proxy-arp enable

[DeviceC-Vsi-interface1] quit

# Create VSI-interface 2, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 20. Specify the VSI interface as a distributed gateway to provide services for the local site.

[DeviceC] interface vsi-interface 2

[DeviceC-Vsi-interface2] ip address 20.1.1.1 255.255.255.0

[DeviceC-Vsi-interface2] mac-address 2-2-2

[DeviceC-Vsi-interface2] distributed-gateway local

[DeviceC-Vsi-interface2] local-proxy-arp enable

[DeviceC-Vsi-interface2] quit

# Enable dynamic ARP entry synchronization for distributed VXLAN IP gateways.

[DeviceC] arp distributed-gateway dynamic-entry synchronize

# Specify VSI-interface 1 as the gateway interface for the VSI of VXLAN 10.

[DeviceC] vsi vpna

[DeviceC-vsi-vpna] gateway vsi-interface 1

[DeviceC-vsi-vpna] quit

# Specify VSI-interface 2 as the gateway interface for the VSI of VXLAN 20.

[DeviceC] vsi vpnb

[DeviceC-vsi-vpnb] gateway vsi-interface 2

[DeviceC-vsi-vpnb] quit

# Exclude all VXLAN interfaces from the shutdown action by M-LAG MAD.

[DeviceC] drni mad exclude interface loopback 0

[DeviceC] drni mad exclude interface gigabitethernet 1/0/4

[DeviceC] drni mad exclude interface vsi-interface 1

[DeviceC] drni mad exclude interface vsi-interface 2

[DeviceC] drni mad exclude interface vlan-interface 13

5.     Configure Device D:

# Enable L2VPN.

<DeviceD> system-view

[DeviceD] l2vpn enable

# Configure the frame match criteria for dynamic ACs on the IPL in one of the following methods. You must configure Device C and Device D in the same method.

¡     Method 1: Create the frame match criteria of dynamic ACs on the IPL based on VXLAN IDs.

[DeviceD] l2vpn drni peer-link ac-match-rule vxlan-mapping

¡     Method 2: Create an AC on the IPL based on the frame match criteria of the site-facing Ethernet service instance.

You do not need to configure other settings. This method is used by default.

# Configure the DR system parameters.

[DeviceD] drni system-mac 2-2-2

[DeviceD] drni system-number 2

[DeviceD] drni system-priority 10

[DeviceD] drni keepalive ip destination 60.2.1.1 source 60.2.1.2

[DeviceD] drni restore-delay 180

# Create Layer 2 aggregate interface Bridge-aggregation 4.

[DeviceD] interface bridge-aggregation 4

[DeviceD-Bridge-Aggregation4] quit

# Assign HundredGigE 1/0/2 and HundredGigE 1/0/3 to aggregation group 4.

[DeviceD] interface HundredGigE 1/0/2

[DeviceD-HundredGigE1/0/2] port link-aggregation group 4

[DeviceD-HundredGigE1/0/2] quit

[DeviceD] interface HundredGigE 1/0/3

[DeviceD-HundredGigE1/0/3] port link-aggregation group 4

[DeviceD-HundredGigE1/0/3] quit

# Configure interface Bridge-Aggregation 4 to operate in dynamic aggregation mode as the IPP.

[DeviceD] interface bridge-aggregation 4

[DeviceD-Bridge-Aggregation4] link-aggregation mode dynamic

[DeviceD-Bridge-Aggregation4] port drni intra-portal-port 1

[DeviceD-Bridge-Aggregation4] quit

# Create Layer 2 dynamic aggregate interface Bridge-Aggregation 5, and assign it to DR group 4.

[DeviceD] interface bridge-aggregation 5

[DeviceD-Bridge-Aggregation5] link-aggregation mode dynamic

[DeviceD-Bridge-Aggregation5] port drni group 5

[DeviceD-Bridge-Aggregation5] quit

# Assign GigabitEthernet 1/0/5 to aggregation group 5.

[DeviceD] interface gigabitethernet 1/0/5

[DeviceD-GigabitEthernet1/0/5] port link-aggregation group 6

[DeviceD-GigabitEthernet1/0/5] quit

# Create VLAN 3.

[DeviceD] vlan 3

[DeviceD-vlan3] quit

# Set the link type of Bridge-Aggregation 5 to trunk, and assign it to VLAN 3.

[DeviceD] interface bridge-aggregation 5

[DeviceD-Bridge-Aggregation5] port link-type trunk

[DeviceD-Bridge-Aggregation5] port trunk permit vlan 3

[DeviceD-Bridge-Aggregation5] quit

# Create VSI instance vpna and VXLAN 10.

[DeviceD] vsi vpna

[DeviceD-vsi-vpna] vxlan 10

[DeviceD-vsi-vpna-vxlan-10] quit

[DeviceD-vsi-vpna] quit

# Create VSI instance vpnb and VXLAN 20.

[DeviceD] vsi vpnb

[DeviceD-vsi-vpnb] vxlan 20

[DeviceD-vsi-vpnb-vxlan-20] quit

[DeviceD-vsi-vpnb] quit

# Configure an IP address for interface Loopback0, which is to be used as the source address for the tunnel.

[DeviceD] interface loopback 0

[DeviceD-Loopback0] ip address 2.2.2.2 255.255.255.255

[DeviceD-Loopback0] quit

# Establish a VXLAN tunnel from Device D to Device A and Device B.

[DeviceD] interface tunnel 1 mode vxlan

[DeviceD-Tunnel1] source 2.2.2.2

[DeviceD-Tunnel1] destination 1.1.1.1

[DeviceD-Tunnel1] quit

# Assign Tunnel 1 to VXLAN 10.

[DeviceD] vsi vpna

[DeviceD-vsi-vpna] vxlan 10

[DeviceD-vsi-vpna-vxlan-10] tunnel 1

[DeviceD-vsi-vpna-vxlan-10] quit

[DeviceD-vsi-vpna] quit

# Assign Tunnel 1 to VXLAN 20.

[DeviceD] vsi vpnb

[DeviceD-vsi-vpnb] vxlan 20

[DeviceD-vsi-vpnb-vxlan-20] tunnel 1

[DeviceD-vsi-vpnb-vxlan-20] quit

[DeviceD-vsi-vpnb] quit

# Create Ethernet service instance 2000 on Bridge-Aggregation 5, which is connected to Device F. Configure the Ethernet service instance to match frames with outer VLAN tag 3.

[DeviceD] interface bridge-aggregation 5

[DeviceD-Bridge-Aggregation5] service-instance 2000

[DeviceD-Bridge-Aggregation5-srv2000] encapsulation s-vid 3

# Map Ethernet service instance 2000 to VSI vpnb.

[DeviceD-Bridge-Aggregation5-srv2000] xconnect vsi vpnb

[DeviceD-Bridge-Aggregation5-srv2000] quit

[DeviceD-Bridge-Aggregation5] quit

# Create VSI-interface 1, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 10. Specify the VSI interface as a distributed gateway to provide services for the local site.

[DeviceD] interface vsi-interface 1

[DeviceD-Vsi-interface1] ip address 10.1.1.1 255.255.255.0

[DeviceD-Vsi-interface1] mac-address 1-1-1

[DeviceD-Vsi-interface1] distributed-gateway local

[DeviceD-Vsi-interface1] local-proxy-arp enable

[DeviceD-Vsi-interface1] quit

# Create VSI-interface 2, and assign an IP address and MAC address to it. The IP address will be used as the gateway IP address for VMs in VXLAN 20. Specify the VSI interface as a distributed gateway to provide services for the local site.

[DeviceD] interface vsi-interface 2

[DeviceD-Vsi-interface2] ip address 20.1.1.1 255.255.255.0

[DeviceD-Vsi-interface2] mac-address 2-2-2

[DeviceD-Vsi-interface2] distributed-gateway local

[DeviceD-Vsi-interface2] local-proxy-arp enable

[DeviceD-Vsi-interface2] quit

# Enable dynamic ARP entry synchronization for distributed VXLAN IP gateways.

[DeviceD] arp distributed-gateway dynamic-entry synchronize

# Specify VSI-interface 1 as the gateway interface for the VSI of VXLAN 10.

[DeviceD] vsi vpna

[DeviceD-vsi-vpna] gateway vsi-interface 1

[DeviceD-vsi-vpna] quit

# Specify VSI-interface 2 as the gateway interface for the VSI of VXLAN 20.

[DeviceD] vsi vpnb

[DeviceD-vsi-vpnb] gateway vsi-interface 2

[DeviceD-vsi-vpnb] quit

# Exclude all VXLAN interfaces from the shutdown action by M-LAG MAD.

[DeviceD] drni mad exclude interface loopback 0

[DeviceD] drni mad exclude interface gigabitethernet 1/0/4

[DeviceD] drni mad exclude interface vsi-interface 1

[DeviceD] drni mad exclude interface vsi-interface 2

[DeviceD] drni mad exclude interface vlan-interface 14

6.     Configure Device E:

# Create Layer 2 aggregate interface Bridge-Aggregation 3 and configure the interface to operate in dynamic mode.

<DeviceE> system-view

[DeviceE] interface bridge-aggregation 3

[DeviceE-Bridge-Aggregation3] link-aggregation mode dynamic

[DeviceE-Bridge-Aggregation3] quit

# Assign GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 to aggregation group 3.

[DeviceE] interface range gigabitethernet 1/0/1 to gigabitethernet 1/0/2

[DeviceE-if-range] port link-aggregation group 3

[DeviceE-if-range] quit

# Create VLAN 2.

[DeviceE] vlan 2

[DeviceE-vlan2] quit

# Set the link type of Bridge-Aggregation 3 to trunk, and assign it to VLAN 2.

[DeviceE] interface bridge-aggregation 3

[DeviceE-Bridge-Aggregation3] port link-type trunk

[DeviceE-Bridge-Aggregation3] port trunk permit vlan 2

[DeviceE-Bridge-Aggregation3] quit

# Create VLAN-interface 2 and assign it an IP address.

[DeviceE] interface vlan-interface 2

[DeviceE-vlan-interface2] ip address 10.1.1.100 24

[DeviceE-vlan-interface2] quit

7.     Configure Device F:

# Create Layer 2 aggregate interface Bridge-Aggregation 5 and configure the interface to operate in dynamic mode.

<DeviceF> system-view

[DeviceF] interface bridge-aggregation 5

[DeviceF-Bridge-Aggregation5] link-aggregation mode dynamic

[DeviceF-Bridge-Aggregation5] quit

# Assign GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 to aggregation group 5.

[DeviceF] interface range gigabitethernet 1/0/1 to gigabitethernet 1/0/2

[DeviceF-if-range] port link-aggregation group 5

[DeviceF-if-range] quit

# Create VLAN 3.

[DeviceF] vlan 3

[DeviceF-vlan3] quit

# Set the link type of Bridge-Aggregation 5 to trunk, and assign it to VLAN 3.

[DeviceF] interface bridge-aggregation 5

[DeviceF-Bridge-Aggregation5] port link-type trunk

[DeviceF-Bridge-Aggregation5] port trunk permit vlan 3

[DeviceF-Bridge-Aggregation5] quit

# Create VLAN-interface 3 and assign it an IP address.

[DeviceF] interface vlan-interface 3

[DeviceF-vlan-interface3] ip address 20.1.1.100 24

[DeviceF-vlan-interface3] quit

Using GIR to upgrade or replace DR member devices

Upgrading the secondary device (Device B)

1.     Configure the maintenance mode and switch traffic to the primary device:

# Configure the secondary device (Device B) to enter maintenance mode. Related route and aggregation settings will be automatically isolated to switch traffic to the primary device (Device A).

<DeviceB> system-view

[DeviceB] gir system-mode maintenance

Collecting commands... Please wait.

Configuration to be applied:

   bgp 200

     isolate enable

   isis 1

     isolate enable

   ospf 1 router-id 11.11.11.11

     isolate enable

   sleep instance 1 interval 30

   link-aggregation lacp isolate

Do you want to continue? [Y/N]: y

Generated a snapshot: before_maintenance.

Applying: bgp 200

Applying: isolate enable

Applying: isis 1

Applying: isolate enable

Applying: ospf 1 router-id 11.11.11.11

Applying: isolate enable

Applying: sleep instance 1 interval 30

Applying: link-aggregation lacp isolate

Waiting 120 seconds to release the CLI.

Changed to maintenance mode successfully.

# Save the configuration. If you do not save the configuration, the device will be in normal mode after a successful upgrade and restart, which might result in traffic loss during switchback.

[DeviceB] save

The current configuration will be written to the device. Are you sure? [Y/N]:y

Please input the file name(*.cfg)[flash:/startup.cfg]

(To leave the existing filename unchanged, press the enter key):

Validating file. Please wait...

The startup.cfg file already exists.

Compared with the startup.cfg file, The current configuration adds 6 commands and deletes 0 commands.

If you want to see the configuration differences, please cancel this operation, and then use the display diff command to show the details.

If you continue the save operation, the file will be overwritten.

Are you sure you want to continue the save operation? [Y/N]:y

Saving the current configuration to the file. Please wait...

Configuration is saved to device successfully.

[DeviceB] quit

2.     Specify the upgrade file and reboot the device

# Specify the next startup image file.

<DeviceB> boot-loader file flash:/s9850_6850-f6633.ipe all main

# (Optional.) Specify the next startup configuration file.

<DeviceB> startup saved-configuration flash:/drni_new.cfg

# Identify whether the device will use the newly loaded image file and configuration file for the next startup.

<DeviceB> display boot-loader

Software images on slot 1:

Current software images:

  flash:/s9850_6850-cmw710-boot-f6632.bin

  flash:/s9850_6850-cmw710-system-f6632.bin

Main startup software images:

  flash:/s9850_6850-cmw710-boot-f6633.bin

  flash:/s9850_6850-cmw710-system-f6633.bin

Backup startup software images:

  None

<DeviceB> display startup

MainBoard:

 Current startup saved-configuration file: flash:/drni_old.cfg

 Next main startup saved-configuration file: flash:/drni_new.cfg

 Next backup startup saved-configuration file: NULL

# Reboot the device.

<DeviceB> reboot

Start to check configuration with next startup configuration file, please wait.........DONE!

Current configuration may be lost after the reboot, save current configuration? [Y/N]:y

Please input the file name(*.cfg)[flash:/drni_old.cfg]

(To leave the existing filename unchanged, press the enter key):startup.cfg

Validating file. Please wait...

Saved the current configuration to mainboard device successfully.

This command will reboot the device. Continue? [Y/N]:y

3.     Identify whether the DRNI upgrade method is successful in maintenance mode:

# Identify whether the image file has been upgraded to the target file and whether the configuration file is the target one.

<DeviceB> display boot-loader

Software images on slot 1:

Current software images:

  flash:/s9850_6850-cmw710-boot-f6633.bin

  flash:/s9850_6850-cmw710-system-f6633.bin

Main startup software images:

  flash:/s9850_6850-cmw710-boot-f6633.bin

  flash:/s9850_6850-cmw710-system-f6633.bin

Backup startup software images:

  None

<DeviceB> display startup

MainBoard:

 Current startup saved-configuration file: flash:/drni_new.cfg

 Next main startup saved-configuration file: flash: /drni_new.cfg

 Next backup startup saved-configuration file: NULL

# Identify whether the device is operating normally.

<DeviceB> display device

Slot Type                State    Subslot  Soft Ver                     Patch Ver

1    S6850-56HF          Master   0        S6850-56HF-6633              None     

# Identify whether the configuration is restored.

After startup, execute the display current-configuration command in any view to see the current configuration of the device. Execute the display diff current-configuration configfile flash:/XXX.cfg command in any view to compare the running configuration file with the one saved in the storage device and check for any lost or changed configurations.

# Display the DRNI state. The IPP state field should be UP when the device is operating normally.

<DeviceB> display drni summary

Flags: A -- Aggregate interface down, B -- No peer DR interface configured

       C -- Configuration consistency check failed

 

IPP: BAGG2

IPP state (cause): UP

Keepalive link state (cause): UP

 

                     DR interface information

DR interface  DR group  Local state (cause)  Peer state  Remaining down time(s)

BAGG3         3         DOWN (A)             UP          -

4.     Switch the traffic back to the secondary device:

# Switch the device back to normal mode and switch the traffic to the secondary device.

[DeviceB] undo gir system-mode maintenance

Collecting commands... Please wait.

Configuration to be applied:

   undo link-aggregation lacp isolate

   sleep instance 1 interval 30

   ospf 1 router-id 11.11.11.11

     undo isolate enable

   isis 1

     undo isolate enable

   bgp 200

     undo isolate enable

Do you want to continue? [Y/N]: y

Applying: undo link-aggregation lacp isolate

Applying: sleep instance 1 interval 30

Applying: ospf 1 router-id 11.11.11.11

Applying: undo isolate enable

Applying: isis 1

Applying: undo isolate enable

Applying: bgp 200

Applying: undo isolate enable

Waiting 120 seconds to generate a snapshot.

Generated a snapshot: after_maintenance.

Changed to normal mode successfully.

5.     After traffic switchback completes, identify whether the service is operating normally:

You can identify whether the service is operating normally in either of the following methods:

¡     Compare the collected entries (such as the routing table, FIB table, and MAC address table entries) with those before the upgrade to check for any losses. Compare the service traffic before and after the upgrade to ensure consistency.

¡     Together with maintenance staff, identify whether service is operating properly and servers are operating normally.

6.     Identify whether the device is in normal mode.

7.     Save the configuration. The secondary device upgrade is complete.

Upgrading the primary device (Device A)

Upgrade Device A following the steps in "Upgrading the secondary device (Device B)." (Details not shown.)

Upgrading the secondary device (Device D)

Upgrade Device D following the steps in "Upgrading the secondary device (Device B)." (Details not shown.)

Upgrading the primary device (Device C)

Upgrade Device C following the steps in "Upgrading the secondary device (Device B)." (Details not shown.)

Replacing a faulty M-LAG member device

If you need a shorter convergence time and the faulty device can be switched to maintenance mode for replacement, follow these steps to replace it:

1.     Execute the gir system-mode maintenance command on the faulty device to switch the device from normal mode to maintenance mode and save the configuration.

2.     Import the fault device's configuration file to the new device.

3.     Specify the image file and configuration file on the new device, and then reboot the device to apply the image file and configuration file.

4.     Power off the new device or shut down all physical interfaces.

5.     Shut down all physical interfaces on the faulty device or power off the faulty device. (When replacing multiple devices, power off the devices as a best practice.)

6.     Replace the faulty device.

7.     Connect the cables to the new device.

8.     Power on the new device or bring up all physical interfaces.

9.     Execute the undo gir system-mode maintenance command on the new device to switch from maintenance mode to normal mode and save the configuration.

Verifying the configuration

Verifying the configuration

1.     Take Device A as an example to verify the DR system configuration.

# Display information about tunnel interfaces on Device A. The output shows that the tunnel interface in VXLAN mode is up and the tunnel source IP is 1.1.1.1.

<DeviceA> display interface Tunnel 1

Tunnel1

Current state: UP

Line protocol state: UP

Description: Tunnel1 Interface

Bandwidth: 64 kbps

Maximum transmission unit: 1464

Internet protocol processing: Disabled

Output queue - Urgent queuing: Size/Length/Discards 0/100/0

Output queue - Protocol queuing: Size/Length/Discards 0/500/0

Output queue - FIFO queuing: Size/Length/Discards 0/75/0

Last clearing of counters: Never

Tunnel source 1.1.1.1, destination 2.2.2.2

Tunnel protocol/transport UDP_VXLAN/IP

Last 300 seconds input rate: 1 bytes/sec, 8 bits/sec, 0 packets/sec

Last 300 seconds output rate: 80 bytes/sec, 640 bits/sec, 0 packets/sec

Input: 26 packets, 1974 bytes, 0 drops

Output: 340 packets, 29514 bytes, 0 drops

# Display the VSI information on Device A. The output shows that an AC is automatically created on the IPL and associated with a VSI.

<DeviceA> display l2vpn vsi verbose

VSI Name: vpna

  VSI Index               : 0

  VSI State               : Up

  MTU                     : 1500

  Bandwidth               : -

  Broadcast Restrain      : -

  Multicast Restrain      : -

  Unknown Unicast Restrain: -

  MAC Learning            : Enabled

  MAC Table Limit         : -

  MAC Learning rate       : -

  Drop Unknown            : -

  Flooding                : Enabled

  Statistics              : Disabled

  Gateway Interface       : VSI-interface 1

  VXLAN ID                : 10

  Tunnels:

    Tunnel Name          Link ID    State    Type        Flood proxy

    Tunnel1              0x5000001  UP       Manual      Disabled

  ACs:

    AC                                 Link ID    State       Type

    BAGG3 srv1000                      0          Up          Manual

    BAGG2 srv2                         1          Up          Dynamic (M-LAG)

 

VSI Name: vpnb

  VSI Index               : 1

  VSI State               : Up

  MTU                     : 1500

  Bandwidth               : -

  Broadcast Restrain      : -

  Multicast Restrain      : -

  Unknown Unicast Restrain: -

  MAC Learning            : Enabled

  MAC Table Limit         : -

  MAC Learning rate       : -

  Drop Unknown            : -

  Flooding                : Enabled

  Statistics              : Disabled

  Gateway Interface       : VSI-interface 2

  VXLAN ID                : 20

  Tunnels:

    Tunnel Name          Link ID    State    Type        Flood proxy

    Tunnel1              0x5000001  UP       Manual      Disabled

2.     Verify that hosts can access each other.

VMs Device E and Device F can access each other. If the link between Device E and either Device A or Device B disconnects, Device E and Device F can still communicate through another device.

3.     Verify packet loss during an upgrade.

During the upgrade of Device A, monitor the packet loss in traffic between Device G and Device E. Empirical data shows no packet loss occurs between them.

Configuration files

·     Device A:

#

vlan 1

 

#

vlan 2

 

#

vlan 11

 

#

 l2vpn enable

 

#

vsi vpna

 gateway vsi-interface 1

 vxlan 10

  tunnel 1

 

#

vsi vpnb

 gateway vsi-interface 2

 vxlan 20

  tunnel 1

 

#

interface Bridge-Aggregation2

 port link-type trunk

 port trunk permit vlan all

 link-aggregation mode dynamic

 port m-lag peer-link 1

 

#

interface Bridge-Aggregation3

 port link-type trunk

 port trunk permit vlan 1 to 2

 link-aggregation mode dynamic

 port m-lag group 3

 

#

 service-instance 1000

  encapsulation s-vid 2

  xconnect vsi vpna

 

#

interface Bridge-Aggregation4

 

#

interface LoopBack0

 ip address 1.1.1.1 255.255.255.255

 

#

interface Vlan-interface2

 

#

interface Vlan-interface11

 ip address 11.1.1.1 255.255.255.0

 

#

interface GigabitEthernet1/0/4

 port link-mode route

 combo enable copper

 ip address 60.1.1.1 255.255.255.0

 

#

interface GigabitEthernet1/0/1

 port link-mode bridge

 port access vlan 11

 combo enable copper

 

#

interface GigabitEthernet1/0/5

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 to 2

 combo enable copper

 port link-aggregation group 3

 

#

interface HundredGigE1/0/2

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan all

 port link-aggregation group 2

 

#

interface HundredGigE1/0/3

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan all

 port link-aggregation group 2

 

#

interface Vsi-interface1

 ip address 10.1.1.1 255.255.255.0

 mac-address 0001-0001-0001

 local-proxy-arp enable

 distributed-gateway local

 

#

interface Vsi-interface2

 ip address 20.1.1.1 255.255.255.0

 mac-address 0002-0002-0002

 local-proxy-arp enable

 distributed-gateway local

 

#

interface Tunnel1 mode vxlan

 source 1.1.1.1

 destination 2.2.2.2

 

#

 m-lag restore-delay 180

 m-lag system-mac 0001-0001-0001

 m-lag system-number 1

 m-lag system-priority 10

 m-lag keepalive ip destination 60.1.1.2 source 60.1.1.1

 m-lag mad exclude interface GigabitEthernet0/0/2

 m-lag mad exclude interface LoopBack0

 m-lag mad exclude interface Vlan-interface11

 m-lag mad exclude interface Vsi-interface1

 m-lag mad exclude interface Vsi-interface2

 

#

 arp distributed-gateway dynamic-entry synchronize

·     Device B (Details not shown)

·     Device C (Details not shown)

·     Device D  (Details not shown)

·     Device E:

#

vlan 1

 

#

vlan 2

 

#

interface Bridge-Aggregation3

 port link-type trunk

 port trunk permit vlan 1 to 2

 link-aggregation mode dynamic

 

#

interface Vlan-interface2

 ip address 10.1.1.100 255.255.255.0

 

#

interface GigabitEthernet1/0/1

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 to 2

 combo enable copper

 port link-aggregation group 3

 

#

interface GigabitEthernet1/0/2

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 1 to 2

 combo enable copper

 port link-aggregation group 3

·     Device F (Details not shown)

 

 

不同款型规格的资料略有差异, 详细信息请向具体销售和400咨询。 H3C保留在没有任何通知或提示的情况下对资料内容进行修改的权利!
  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网