- Table of Contents
-
- 12-Network Management and Monitoring Configuration Guide
- 00-Preface
- 01-System maintenance and debugging configuration
- 02-NQA configuration
- 03-iNQA configuration
- 04-NTP configuration
- 05-PTP configuration
- 06-SNMP configuration
- 07-RMON configuration
- 08-Ansible configuration
- 09-EPA configuration
- 10-CWMP configuration
- 11-EAA configuration
- 12-Process monitoring and maintenance configuration
- 13-Sampler configuration
- 14-Mirroring configuration
- 15-NetAnalysis configuration
- 16-sFlow configuration
- 17-Information center configuration
- 18-Packet capture configuration
- 19-VCF fabric configuration
- 20-NetStream configuration
- 21-IPv6 NetStream configuration
- 22-eMDI configuration
- 23-Performance management configuration
- 24-SQA configuration
- 25-TCP connection trace configuration
- 26-SmartMC configuration
- 27-NETCONF configuration
- 28-ISDF configuration
- 29-Quicknet configuration
- Related Documents
-
| Title | Size | Download |
|---|---|---|
| 28-ISDF configuration | 45.42 KB |
Configuring ISDF
About ISDF
When a network link fails, traditional routing convergence technologies based on the control plane (CP) dynamic routing protocols (for example, BGP and OSPF) can achieve convergence times in the hundreds of milliseconds. This cannot meet the stringent network performance requirements of services such as online transactions and autonomous driving. The ISDF technology can solve this problem.
Instant Silent-Fault Detection and Failover (ISDF) is a fully data plane (DP)-based fault detection and recovery technology. It represents a technological evolution from reliance on CP protocol interaction for convergence to real-time fault detection and rapid path switchover-based convergence in the DP. By using DP fault detection, remote fault advertisement, and fast-path switchover mechanisms, ISDF achieves millisecond-level network convergence, significantly improving network reliability and data transmission efficiency.
Procedure
1. Enter system view.
system-view
2. Enable unified flow analytics and enter UFA view.
netanalysis unified-flow
By default, UFA is disabled.
3. Set the measurement period for fault detection.
isdf-detect period period-time
The default setting is 3000 milliseconds.
4. Set the packet loss threshold for fault detection.
isdf-detect drop-threshold percent
The default setting is 30%.
5. Create a UFA instance and enter its view.
instance instance-id name instance-name
By default, no UFA instances exist.
6. Configure traffic matching rules for the UFA instance.
flow ipv4 [ source-ip src-ip-address [ src-mask-length ] | destination-ip dest-ip-address [ dest-mask-length ] | protocol { { sctp | tcp | udp } [ source-port src-port-number ] [ destination-port dest-port-number ] | protocol-number } ]*
flow ipv6 [ source-ip src-ipv6-address [ src-prefix-length ] | destination-ip dest-ip-address [ dest-prefix-length ] | protocol { { sctp | tcp | udp } [ source-port src-port-number ] [ destination-port dest-port-number ] | protocol-number } ]*
flow any-ip
By default, no traffic matching rule is configured for a UFA instance.
7. Enable the ISDF packet drop detection feature for the UFA instance.
activate isdf-detect drop
By default, ISDF packet drop detection is disabled.
8. Return to system view.
quit
9. Enable ISDF and enter ISDF view.
enable
By default, ISDF is disabled.
10. Enable ISDF reroute.
reroute enable
By default, ISDF reroute is disabled.
11. Bind a UFA instance to ISDF and enter UFA instance view.
bind unified-flow-instance instance-id
By default, no UFA instance is bound to ISDF.
12. Enable fault advertising for ISDF reroute.
reroute-advertise enable
By default, fault advertising for ISDF reroute is disabled.
