10-Segment Routing

HomeSupportRoutersSR6600-M SeriesDiagnose & MaintainTroubleshootingH3C SR6608-M Router Troubleshooting Guide(V9)-R9141-6W10010-Segment Routing
04-Public Network IP over SRv6 Troubleshooting Guide

Troubleshooting segment routing

Public network IP over SRv6 issues

Public network IP over SRv6 BE traffic forwarding failure

Symptom

On a public network IP over SRv6 network shown in Figure 1, failure occurs when the PEs use the SRv6 BE mode to forward public network service traffic between CE 1 and CE 2.

The troubleshooting flow is the same for IPv4 and IPv6. The following information uses IPv4 for example to describe the troubleshooting procedure for public network IP over SRv6.

Figure 1 Network diagram

 

Table 1 shows the key network planning information for the public network IP over SRv6 network.

Table 1 SRv6 locators and major addresses in the address plan

Device

Interface or locator

Address

Device

Interface or locator

Address

PE 1

SRv6 Locator

100:1::/64

PE 2

SRv6 Locator

300:1::/64

 

Loopback0

1::1/128

 

Loopback0

3::3/128

CE 1

Loopback0

10.10.10.10/32

CE 2

Loopback0

20.20.20.20/32

P

SRv6 Locator

200:1::/64

 

 

 

 

Loopback0

2::2/128

 

 

 

 

Common causes

The following are the common causes of this type of issue:

·     The PEs cannot learn public network service routes because of the failure to establish BGP peer relationships.

·     Public network IP over SRv6 configuration is incomplete.

·     The routes for the SRv6 SIDs are unreachable.

Troubleshooting flow

Figure 2 shows the troubleshooting flowchart.

Figure 2 Flowchart for troubleshooting public network IP over SRv6 BE traffic forwarding failure

 

Solution

1.     Ping the public IP on the remote PE from the local PE to check the connectivity for public network services.

<Sysname> ping 20.20.20.20

Ping 20.20.20.20 (20.20.20.20): 56 data bytes, press CTRL+C to break

56 bytes from 20.20.20.20: icmp_seq=0 ttl=254 time=2.000 ms

56 bytes from 20.20.20.20: icmp_seq=1 ttl=254 time=1.000 ms

56 bytes from 20.20.20.20: icmp_seq=2 ttl=254 time=1.000 ms

56 bytes from 20.20.20.20: icmp_seq=3 ttl=254 time=1.000 ms

56 bytes from 20.20.20.20: icmp_seq=4 ttl=254 time=2.000 ms

 

--- Ping statistics for 20.20.20.20 ---

5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss

round-trip min/avg/max/std-dev = 1.000/1.400/2.000/0.490 ms

If the ping test fails, the public network service is unavailable. Proceed to the next step.

2.     Perform the subsequent checks on both the local and remote PEs. This document takes the local PE for example. Execute the display ip routing-table command on the local PE to check the public routing table for routes to the public IP addresses.

<Sysname> display ip routing-table

 

Destinations : 10       Routes : 10

 

Destination/Mask   Proto   Pre Cost        NextHop         Interface

10.10.10.10/32     BGP     255 0           16.0.0.2        GE2/0/1

16.0.0.0/30        Direct  0   0           16.0.0.1        GE2/0/1

16.0.0.1/32        Direct  0   0           127.0.0.1       GE2/0/1

16.0.0.3/32        Direct  0   0           16.0.0.1        GE2/0/1

20.20.20.20/32     BGP     255 0           300:1::         GE2/0/2

27.0.0.0/30        BGP     255 0           300:1::         GE2/0/2

127.0.0.0/8        Direct  0   0           127.0.0.1       InLoop0

127.0.0.1/32       Direct  0   0           127.0.0.1       InLoop0

127.255.255.255/32 Direct  0   0           127.0.0.1       InLoop0

255.255.255.255/32 Direct  0   0           127.0.0.1       InLoop0

If the device has routes to the public IP addresses, verify that the FIB contains entries for these addresses, with a U flag in the Flag field. The U flag indicates that the IP address is valid.

<Sysname> display fib

Route destination count: 12

Directly-connected host count: 1

 

Flag:

  U:Usable   G:Gateway   H:Host   B:Blackhole   D:Dynamic   S:Static

  R:Relay     F:FRR

 

Destination/Mask   Nexthop         Flag     OutInterface/Token       Label

20.20.20.20/32     FE80::6033:29FF UGHR     GE2/0/2                  Null

                   :FEAE:307

16.0.0.0/30        16.0.0.1        U        GE2/0/1                  Null

16.0.0.2/32        16.0.0.2        UH       GE2/0/1                  Null

27.0.0.0/30        FE80::6033:29FF UGR      GE2/0/2                  Null

                   :FEAE:307

127.0.0.0/8        127.0.0.1       U        InLoop0                  Null

10.10.10.10/32     16.0.0.2        UGHR     GE2/0/1                  Null

16.0.0.1/32        127.0.0.1       UH       GE2/0/1                  Null

127.255.255.255/32 127.0.0.1       UH       InLoop0                  Null

255.255.255.255/32 127.0.0.1       UH       InLoop0                  Null

127.0.0.1/32       127.0.0.1       UH       InLoop0                  Null

16.0.0.3/32        16.0.0.1        UBH      GE2/0/1                  Null

If an IP address does not exist or is invalid in the public routing table or FIB, proceed to check for BGP route learning issues between PEs and verify that a valid tunnel exists between them.

3.     Execute the display bgp peer ipv4 command on the local PE to verify that it has established a public IPv4 BGP peer relationship with the remote PE.

¡     If the PEs have established a BGP peer relationship successfully, the State field in the command output displays Established. Proceed to step 4.

¡     If the PEs have not established a BGP peer relationship, see the troubleshooting procedure for BGP peer establishment issues.

<Sysname> display bgp peer ipv4

 

 BGP local router ID: 1.1.1.1

 Local AS number: 100

 Total number of peers: 1                 Peers in established state: 1

 

 * - Dynamically created peer

 Peer                    AS  MsgRcvd  MsgSent OutQ  PrefRcv Up/Down  State

 

 3::3                   100       13       10    0        2 00:00:05 Established

4.     Execute the display bgp routing-table ipv4 command on the local PE to verify that it has learned the public IPv4 BGP routes from the remote PE. Pay special attention to the PrefixSID field for each route in the command output. In this field, the End.DT4 SID represents the SRv6 SID assigned by the remote PE to the public IP address. When forwarding traffic to that public address in SRv6 BE mode, the local PE uses that End.DT4 SID as the destination address in the IPv6 packets. Also, ensure that the route is both valid and the best. Only valid and optimal BGP routes can be learned into the public routing table.

<Sysname> display bgp routing-table ipv4 20.20.20.20

 

 BGP local router ID: 1.1.1.1

 Local AS number: 100

 

 Paths:   1 available, 1 best

 

 BGP routing table information of 20.20.20.20/32:

 From            : 3::3 (3.3.3.3)

 Rely nexthop    : FE80::6033:29FF:FEAE:307

 Original nexthop: ::FFFF:27.0.0.2

 Out interface   : GigabitEthernet2/0/2

 Route age       : 00h01m18s

 OutLabel        : NULL

 RxPathID        : 0x0

 TxPathID        : 0x0

 PrefixSID       : End.DT4 SID <300:1::1:7>

  SRv6 Service TLV (37 bytes):

   Type: SRV6 L3 Service TLV (5)

   Length: 34 bytes, Reserved: 0x0

   SRv6 Service Information Sub-TLV (33 bytes):

    Type: 1 Length: 30, Rsvdl: 0x0

    SID Flags: 0x0  Endpoint behavior: 0x13 Rsvd2: 0x0

    SRv6 SID Sub-Sub-TLV:

     Type: 1 Len: 6

     BL: 64 NL: 0 FL: 64 AL: 0 TL: 0 TO: 0

 AS-path         : 65420

 Origin          : incomplete

 Attribute value : MED 0, localpref 100, pref-val 0

 State           : valid, internal, best

 IP precedence   : N/A

 QoS local ID    : N/A

 Traffic index   : N/A

 Tunnel policy   : NULL

 Rely tunnel IDs : N/A

If the local PE has failed to learn a valid and optimal public IPv4 BGP route, or if the PrefixSID attribute is missing from public IPv4 BGP routes, proceed to check for incomplete public network IP over SRv6 configuration. An incomplete configuration might result in failure to allocate SRv6 SIDs or to establish an SRv6 tunnel.

5.     Verify that the configuration for public network IP over SRv6 on both PEs is complete. If the configuration is incomplete, add the missing configuration. If the configuration is complete, proceed to step 6.

Execute the display current-configuration command on both PEs to check for the following configuration items. If they are missing, see public network IP over SRv6 configuration in Segment Routing Configuration Guide to add the missing configuration items.

#

isis 1

 cost-style wide-compatible

 #

 address-family ipv6 unicast

  segment-routing ipv6 locator aaa        //Enable IS-IS to advertise the specified locator and the SRv6 SIDs in the locator.

#

#

 

bgp 100

 router-id 1.1.1.1

 peer 3::3 as-number 100

 peer 3::3 connect-interface LoopBack1

 #

 address-family ipv4 unicast

  segment-routing ipv6 best-effort //Steer route matching traffic to an SRv6 BE tunnel.

  segment-routing ipv6 locator abc //Apply the locator to the BGP process so the device can use the locator to allocate SRv6 SIDs for the private network routes in the specified VPN instance.

  peer 3::3 enable

  peer 3::3 prefix-sid       //Adertise public network routes with the PrefixSID attribute to the peer or peer group.

 #

segment-routing ipv6

 encapsulation source-address 11::11      //Specify the source address for the outer IPv6 header of SRv6 VPN packets.

 locator aaa ipv6-prefix 300:1:: 64 static 8  //Create a Locator segment.

#

If the SRv6 configuration is complete and correct, proceed to check for unreachable SRv6 SIDs on the forwarding path.

6.     Execute the display ipv6 routing-table ipv6-address command on all devices along the forwarding path to check for routes to the SRv6 SIDs on both PEs.

<Sysname> display ipv6 routing-table 300:1::1:7

 

Summary count : 1

 

Destination: 300:1::/64                                  Protocol  : IS_L1

NextHop    : FE80::6033:29FF:FEAE:307                    Preference: 15

Interface  : GE2/0/2                                     Cost      : 20

Execute the ping ipv6 command on all devices to verify the connectivity to the SRv6 SIDs.

<Sysname> ping ipv6 300:1::1:7

Ping6(56 data bytes) 2001::1 --> 300:1::1:7, press CTRL+C to break

56 bytes from 300:1::1:7, icmp_seq=0 hlim=63 time=1.000 ms

56 bytes from 300:1::1:7, icmp_seq=1 hlim=63 time=1.000 ms

56 bytes from 300:1::1:7, icmp_seq=2 hlim=63 time=1.000 ms

56 bytes from 300:1::1:7, icmp_seq=3 hlim=63 time=0.000 ms

56 bytes from 300:1::1:7, icmp_seq=4 hlim=63 time=1.000 ms

 

--- Ping6 statistics for 300:1::1:7 ---

5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss

round-trip min/avg/max/std-dev = 0.000/0.800/1.000/0.400 ms

If a route exists to the SRv6 SID at the remote end and the ping test succeeds, proceed to step 7. If no route exists to the SRv6 SID or the ping test fails, check for the failure of IGP on the PEs to advertise the network segment in the locator for the SID to other devices in the domain. In this situation, use Layer 3—IP Routing Troubleshooting Guide to resolve the IGP route advertisement issue.

7.     If the issue persists, collect the following information and contact Technical Support:

¡     Results of each step.

¡     The configuration file, log messages, and alarm messages.

Related alarm and log messages

Alarm messages

N/A

Log messages

N/A

Public network IP over SRv6 TE traffic forwarding failure

Symptom

On a public network IP over SRv6 network shown in Figure 3, failure occurs when the PEs use the SRv6 TE mode to forward public network service traffic between CE 1 and CE 2 based on SRv6 TE policies.

The troubleshooting flow is the same for IPv4 and IPv6. The following information uses IPv4 for example to describe the troubleshooting procedure for public IP over SRv6.

Figure 3 Network diagram

 

Table 2 shows the key network planning information for the public network IP over SRv6 network.

Table 2 SRv6 locators and major addresses in the address plan

Device

Interface or locator

Address

Device

Interface or locator

Address

PE 1

SRv6 Locator

100:1::/64

PE 2

SRv6 Locator

300:1::/64

 

Loopback0

1::1/128

 

Loopback0

3::3/128

CE 1

Loopback0

10.10.10.10/32

CE 2

Loopback0

20.20.20.20/32

P

SRv6 Locator

200:1::/64

 

 

 

 

Loopback0

2::2/128

 

 

 

 

Common causes

The following are the common causes of this type of issue:

·     The PEs cannot learn public network routes because of the failure to establish BGP peer relationships.

·     Recursive routing is not performed in SRv6 TE mode.

·     Traffic matching a public network route is steered to a invalid SRv6 TE policy.

·     The routes for the SRv6 SIDs are unreachable.

Troubleshooting flow

Figure 4 shows the troubleshooting flowchart.

Figure 4 Flowchart for troubleshooting public network IP over SRv6 TE traffic forwarding failure

 

Solution

1.     Ping the public IP on the remote PE from the local PE to check the connectivity for public network services.

<Sysname> ping 20.20.20.20

Ping 20.20.20.20 (20.20.20.20): 56 data bytes, press CTRL+C to break

56 bytes from 20.20.20.20: icmp_seq=0 ttl=254 time=2.000 ms

56 bytes from 20.20.20.20: icmp_seq=1 ttl=254 time=1.000 ms

56 bytes from 20.20.20.20: icmp_seq=2 ttl=254 time=1.000 ms

56 bytes from 20.20.20.20: icmp_seq=3 ttl=254 time=1.000 ms

56 bytes from 20.20.20.20: icmp_seq=4 ttl=254 time=2.000 ms

 

--- Ping statistics for 20.20.20.20 ---

5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss

round-trip min/avg/max/std-dev = 1.000/1.400/2.000/0.490 ms

If the ping test fails, the public network service is unavailable. Proceed to the next step.

2.     Perform the subsequent checks on both the local and remote PEs. This document takes the local PE for example. Execute the display ip routing-table command on the local PE to check the public routing table for routes to the public IP addresses. Verify that the outgoing interface in the route to the remote public IP address is the name of the expected SRv6 TE policy.   

<Sysname> display ip routing-table

 

Destinations : 10       Routes : 10

 

Destination/Mask   Proto   Pre Cost        NextHop         Interface

10.10.10.10/32     BGP     255 0           16.0.0.2        GE2/0/1

16.0.0.0/30        Direct  0   0           16.0.0.1        GE2/0/1

16.0.0.1/32        Direct  0   0           127.0.0.1       GE2/0/1

16.0.0.3/32        Direct  0   0           16.0.0.1        GE2/0/1

20.20.20.20/32     BGP     255 0           3::3            p1

27.0.0.0/30        BGP     255 0           3::3            p1

127.0.0.0/8        Direct  0   0           127.0.0.1       InLoop0

127.0.0.1/32       Direct  0   0           127.0.0.1       InLoop0

127.255.255.255/32 Direct  0   0           127.0.0.1       InLoop0

255.255.255.255/32 Direct  0   0           127.0.0.1       InLoop0

If the device has routes to the public IP addresses, verify that the FIB contains entries for these addresses, with a U flag in the Flag field. The U flag indicates that the IP address is valid. Verify that the outgoing interface in the route to the remote public IP address contains the token for the expected SRv6 TE policy.

<Sysname> display fib

Route destination count: 10

Directly-connected host count: 1

 

Flag:

  U:Usable   G:Gateway   H:Host   B:Blackhole   D:Dynamic   S:Static

  R:Relay     F:FRR

 

Destination/Mask   Nexthop         Flag     OutInterface/Token       Label

20.20.20.20/32     ::FFFF:27.0.0.2 UGHR     2150629377               Null

16.0.0.0/30        16.0.0.1        U        GE2/0/1                  Null

16.0.0.2/32        16.0.0.2        UH       GE2/0/1                  Null

27.0.0.0/30        3::3            UGR      2150629377               Null

127.0.0.0/8        127.0.0.1       U        InLoop0                  Null

10.10.10.10/32     16.0.0.2        UGHR     GE2/0/1                  Null

16.0.0.1/32        127.0.0.1       UH       GE2/0/1                  Null

127.255.255.255/32 127.0.0.1       UH       InLoop0                  Null

255.255.255.255/32 127.0.0.1       UH       InLoop0                  Null

127.0.0.1/32       127.0.0.1       UH       InLoop0                  Null

16.0.0.3/32        16.0.0.1        UBH      GE2/0/1                  Null

If the IP address does not exist or is invalid in the public routing table or FIB entry, proceed to check for BGP route learning issues between PEs and verify that a valid tunnel exists between them.

3.     Execute the display bgp peer ipv4 command on the local PE to verify that it has established a public IPv4 BGP peer relationship with the remote PE.

¡     If the PEs have established a BGP peer relationship successfully, the State field in the command output displays Established. Proceed to step 4.

¡     If the PEs have not established a BGP peer relationship, see the troubleshooting procedure for BGP peer establishment issues.

<Sysname> display bgp peer ipv4

 

 BGP local router ID: 1.1.1.1

 Local AS number: 100

 Total number of peers: 1                 Peers in established state: 1

 

 * - Dynamically created peer

 Peer                    AS  MsgRcvd  MsgSent OutQ  PrefRcv Up/Down  State

 

 3::3                   100       13       10    0        2 00:00:05 Established

4.     Execute the display bgp routing-table ipv4 command on the local PE to verify that it has learned the public IPv4 BGP routes from the remote PE.
Pay special attention to the PrefixSID field for each route in the command output. In this field, the End.DT4 SID represents the SRv6 SID assigned by the remote PE to the public IP address. When forwarding traffic to that public address in SRv6 TE mode, the local PE encapsulates that End.DT4 SID along with the SID list in the SRv6 TE policy in the SRH expansion header.
Verify that the route is both valid and the best. Only valid and optimal BGP routes can be learned into the public routing table.
Verify that the outgoing interface in this route is the SRv6 TE policy.

<Sysname> display bgp routing-table ipv4 20.20.20.20

 

 BGP local router ID: 1.1.1.1

 Local AS number: 100

 

 Paths:   1 available, 1 best

 

 BGP routing table information of 20.20.20.20/32:

 From            : 3::3 (3.3.3.3)

 Rely nexthop    : FE80::6033:29FF:FEAE:307

 Original nexthop: ::FFFF:27.0.0.2

 Out interface   : GigabitEthernet2/0/2

 Route age       : 00h21m42s

 OutLabel        : NULL

 RxPathID        : 0x0

 TxPathID        : 0x0

 PrefixSID       : End.DT4 SID <300:1::1:7>

  SRv6 Service TLV (37 bytes):

   Type: SRV6 L3 Service TLV (5)

   Length: 34 bytes, Reserved: 0x0

   SRv6 Service Information Sub-TLV (33 bytes):

    Type: 1 Length: 30, Rsvdl: 0x0

    SID Flags: 0x0  Endpoint behavior: 0x13 Rsvd2: 0x0

    SRv6 SID Sub-Sub-TLV:

     Type: 1 Len: 6

     BL: 64 NL: 0 FL: 64 AL: 0 TL: 0 TO: 0

 AS-path         : 65420

 Origin          : incomplete

 Attribute value : MED 0, localpref 100, pref-val 0

 State           : valid, internal, best

 IP precedence   : N/A

 QoS local ID    : N/A

 Traffic index   : N/A

 Tunnel policy   : NULL

 Rely tunnel IDs : 2150629377

If the local PE has failed to learn a valid and optimal public IPv4 BGP route, or if the PrefixSID attribute is missing from public IPv4 BGP routes, proceed to check for incomplete public network IP over SRv6 configuration. An incomplete configuration might result in failure to allocate SRv6 SIDs or to establish SRv6 TE policy-based paths.

5.     In BGP IPv4 unicast address family view, execute the display this command to verify that the current configuration includes the segment-routing ipv6 traffic-engineering or segment-routing ipv6 traffic-engineering best-effort command. If neither commands are present, add the configuration. If either command is present, proceed to step 6.

<Sysname> system-view

[Sysname] bgp 100

[Sysname-bgp-default] ip vpn-instance vpn1

[Sysname-bgp-default-vpn1] address-family ipv4 unicast

[Sysname-bgp-default-ipv4-vpn1] display this

 #

 address-family ipv4 unicast

  segment-routing ipv6 traffic-engineering

If the above recursive routing configuration is correct, see the SRv6 TE policy configuration in the segment routing configuration guide for the product to verify that the basic SRv6 configuration and the configuration for steering traffic to SRv6 TE policies are correct. If all settings are correct, proceed to the next step.

6.     On each PE, verify that the SRv6 TE policy in the route to the remote destination IP address is valid. Execute the display segment-routing ipv6 te policy command on each PE. Identify the SRv6 TE policy that has a forwarding index value that is the same as the rely tunnel IDs value in the route to the destination IP address displayed by executing the display bgp routing-table command. Examine the Status field for the SRv6 TE policy to verify that it is up. If the policy is up, proceed to the next step. If the policy is down, see the SRv6 TE policy down issue troubleshooting procedure to resolve the issue.

<Sysname> display segment-routing ipv6 te policy

 

Name/ID: p1/0

 Color: 10

 End-point: 3::3

 Name from BGP:

 Name from PCE:

 BSID:

  Mode: Dynamic             Type: Type_2              Request state: Succeeded

  Current BSID: 100:1::1:3  Explicit BSID: -          Dynamic BSID: 100:1::1:3

  BSID compress-mode: -

 Reference counts: 5

 Flags: A/BS/NC

 Status: Up

 AdminStatus: Up

 Up time: 2024-03-14 09:49:36

 Down time: 2024-03-14 09:49:05

 Hot backup: Disabled

 Statistics: Disabled

  Statistics by service class: Disabled

 Path verification: Not configured

 Drop-upon-invalid: Disabled

 BFD trigger path-down: Disabled

 SBFD: Disabled

 BFD Echo: Disabled

 BFD no-bypass: Disabled

 Forward no-bypass: Disabled

 Forwarding index: 2150629377

Execute the ping srv6-te policy command to verify that the SRv6 TE policy has a valid path to reach the destination IP address. If BFD or SBFD is not configured to monitor the connectivity of the SRv6 TE policy, the up state of the policy only indicates that the first hop of the policy is reachable. To verify that all SIDs in the forwarding path are unreachable, you must perform this step.

<Sysname> ping srv6-te policy policy-name p1

Ping SRv6-TE policy (56 data bytes) , press CTRL+C to break

  Segment list ID: 1

    Preference=10, Path Type=Main, Protocol origin=Local, Originator=0,0.0.0.0, Discriminator=10, End.OP=none

56 bytes from 300:1::1, icmp_seq=0 ttl=63 time=1.000 ms

56 bytes from 300:1::1, icmp_seq=1 ttl=63 time=1.000 ms

56 bytes from 300:1::1, icmp_seq=2 ttl=63 time=1.000 ms

56 bytes from 300:1::1, icmp_seq=3 ttl=63 time=1.000 ms

56 bytes from 300:1::1, icmp_seq=4 ttl=63 time=1.000 ms

 

--- Ping6 SRv6-TE Policy statistics ---

5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss

round-trip min/avg/max/std-dev = 1.000/1.000/1.000/0.000 ms

If the ping srv6-te policy command output shows that the SRv6 TE policy is not reachable, proceed to the next step.

7.     Execute the display segment-routing ipv6 te segment-list command to identify the SIDs in the SID list of the best candidate path in the SRv6 TE policy.

<Sysname> display segment-routing ipv6 te segment-list

 

Total Segment lists: 1

 

Name/ID: s1/1

 Origin: CLI

 Status: Up

 Nodes : 2

 Flags: None

 Local BSID: -

 Reverse BSID: -

 Reference counts: 0

 

  Index                 : 10                            SID: 200:1::1

  Status                : Up                     TopoStatus: Nonexistent

  Type                  : Type_2                      Flags: None

  Coc Type              : -            Common prefix length: 0

  Function length       : 255                   Args length: 0

  Endpoint Behavior     : -

 

  Index                 : 20                            SID: 300:1::1

  Status                : -                      TopoStatus: -

  Type                  : Type_2                      Flags: None

  Coc Type              : -            Common prefix length: 0

  Function length       : 255                   Args length: 0

  Endpoint Behavior     : -

Execute the display ipv6 routing-table ipv6-address command on each device in the forwarding path to verify that they have a valid route to each SRv6 SID, including the End.DT4 SID.

<Sysname> display ipv6 routing-table 300:1::1:7

 

Summary count : 1

 

Destination: 300:1::/64                                  Protocol  : IS_L1

NextHop    : FE80::6033:29FF:FEAE:307                    Preference: 15

Interface  : GE2/0/2                                     Cost      : 20

Execute the ping ipv6 command on each device in the forwarding path to verify the connectivity to the SRv6 SID.

<Sysname> ping ipv6 300:1::1:7

Ping6(56 data bytes) 2001::1 --> 300:1::1:7, press CTRL+C to break

56 bytes from 300:1::1:7, icmp_seq=0 hlim=63 time=1.000 ms

56 bytes from 300:1::1:7, icmp_seq=1 hlim=63 time=1.000 ms

56 bytes from 300:1::1:7, icmp_seq=2 hlim=63 time=1.000 ms

56 bytes from 300:1::1:7, icmp_seq=3 hlim=63 time=0.000 ms

56 bytes from 300:1::1:7, icmp_seq=4 hlim=63 time=1.000 ms

 

--- Ping6 statistics for 300:1::1:7 ---

5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss

round-trip min/avg/max/std-dev = 0.000/0.800/1.000/0.400 ms

If the route to a SID is unreachable, check the SID list configuration for the SRv6 TE policy on the source node for SID list orchestration errors. If the SID list is correct, check the IGP for failure to advertise the locators that contain the SIDs to other devices. For more information about troubleshooting IGP, see the IP routing troubleshooting procedures.

8.     If the issue persists, collect the following information and contact Technical Support:

¡     Results of each step.

¡     The configuration file, log messages, and alarm messages.

Related alarm and log messages

Alarm messages

N/A

Log messages

N/A

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网