Juniper m10 High Availability Configuration Guide
Juniper m10 High Availability Configuration Guide
Release 8.5
This product includes memory allocation software developed by Mark Moraes, copyright © 1988, 1989, 1993, University of Toronto.
This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation and software
included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by the Regents of the University of California. Copyright © 1979, 1980, 1983, 1986, 1988,
1989, 1991, 1992, 1993, 1994. The Regents of the University of California. All rights reserved.
GateD software copyright © 1995, the Regents of the University. All rights reserved. Gate Daemon was originated and developed through release 3.0 by
Cornell University and its collaborators. Gated is based on Kirton’s EGP, UC Berkeley’s routing daemon (routed), and DCN’s HELLO routing protocol.
Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD software copyright © 1988, Regents of the
University of California. All rights reserved. Portions of the GateD software copyright © 1991, D. L. S. Associates.
This product includes software developed by Maker Communications, Inc., copyright © 1996, 1997, Maker Communications, Inc.
Juniper Networks, the Juniper Networks logo, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other
countries. JUNOS and JUNOSe are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service
marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or
otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed
to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347,
6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
Revision History
12 October 2007—Revision 1
The information in this document is current as of the date listed in the revision history.
Juniper Networks hardware and software products are Year 2000 compliant. The JUNOS software has no known time-related limitations through the year
2038. However, the NTP application is known to have some difficulty in the year 2036.
ii ■
End User License Agreement
READ THIS END USER LICENSE AGREEMENT (“AGREEMENT”) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE. BY DOWNLOADING,
INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS CONTAINED HEREIN, YOU (AS CUSTOMER
OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO BIND THE CUSTOMER) CONSENT TO BE BOUND BY THIS
AGREEMENT. IF YOU DO NOT OR CANNOT AGREE TO THE TERMS CONTAINED HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE SOFTWARE,
AND (B) YOU MAY CONTACT JUNIPER NETWORKS REGARDING LICENSE TERMS.
1. The Parties. The parties to this Agreement are Juniper Networks, Inc. and its subsidiaries (collectively “Juniper”), and the person or organization that
originally purchased from Juniper or an authorized Juniper reseller the applicable license(s) for use of the Software (“Customer”) (collectively, the “Parties”).
2. The Software. In this Agreement, “Software” means the program modules and features of the Juniper or Juniper-supplied software, and updates and
releases of such software, for which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller. “Embedded
Software” means Software which Juniper has embedded in the Juniper equipment.
3. License Grant. Subject to payment of the applicable fees and the limitations and restrictions set forth herein, Juniper grants to Customer a non-exclusive
and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the following use restrictions:
a. Customer shall use the Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by Customer from
Juniper or an authorized Juniper reseller.
b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units for which Customer
has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access Client software only, Customer shall use
such Software on a single computer containing a single physical random access memory space and containing any number of processors. Use of the
Steel-Belted Radius software on multiple computers requires multiple licenses, regardless of whether such computers are physically contained on a single
chassis.
c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may specify limits to
Customer’s use of the Software. Such limits may restrict use to a maximum number of seats, registered endpoints, concurrent users, sessions, calls,
connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of separate licenses to use particular features,
functionalities, services, applications, operations, or capabilities, or provide throughput, performance, configuration, bandwidth, interface, processing,
temporal, or geographical limits. In addition, such limits may restrict the use of the Software to managing certain kinds of networks or require the Software
to be used only in conjunction with other specific Software. Customer’s use of the Software shall be subject to all such limitations and purchase of all applicable
licenses.
d. For any trial copy of the Software, Customer’s right to use the Software expires 30 days after download, installation or use of the Software. Customer
may operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not extend or create an additional trial
period by re-installing the Software after the 30-day trial period.
e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer’s enterprise network.
Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the Steel-Belted Radius software to support any
commercial network access services.
The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase the applicable
license(s) for the Software from Juniper or an authorized Juniper reseller.
4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees not to and shall
not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized copies of the Software (except as
necessary for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the Software, in any form, to any third party; (d) remove
any proprietary notices, labels, or marks on or in any copy of the Software or any product in which the Software is embedded; (e) distribute any copy of
the Software to any third party, including as may be embedded in Juniper equipment sold in the secondhand market; (f) use any ‘locked’ or key-restricted
feature, function, service, application, operation, or capability without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even
if such feature, function, service, application, operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper
to any third party; (h) use the Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper
reseller; (i) use the Embedded Software on non-Juniper equipment; (j) use the Software (or make it available for use) on Juniper equipment that the Customer
did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking of the Software to any third
party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly provided herein.
5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper, Customer shall furnish
such records to Juniper and certify its compliance with this Agreement.
6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper. As such, Customer
shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence, which at a minimum includes
restricting access to the Software to Customer employees and contractors having a need to use the Software for Customer’s internal business purposes.
■ iii
7. Ownership. Juniper and Juniper's licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to the Software,
associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance of any right, title, or interest in
the Software or associated documentation, or a sale of the Software, associated documentation, or copies of the Software.
8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty statement that
accompanies the Software (the “Warranty Statement”). Nothing in this Agreement shall give rise to any obligation to support the Software. Support services
may be purchased separately. Any such support shall be governed by a separate, written support services agreement. TO THE MAXIMUM EXTENT PERMITTED
BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA, OR COSTS OR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES,
OR FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, THE SOFTWARE, OR ANY JUNIPER OR
JUNIPER-SUPPLIED SOFTWARE. IN NO EVENT SHALL JUNIPER BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF ANY
JUNIPER OR JUNIPER-SUPPLIED SOFTWARE. EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY LAW,
JUNIPER DISCLAIMS ANY AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDING
ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES JUNIPER
WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT ERROR OR INTERRUPTION,
OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper’s or its suppliers’ or licensors’ liability to Customer, whether
in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid by Customer for the Software that gave rise to the claim, or
if the Software is embedded in another Juniper product, the price paid by Customer for such other product. Customer acknowledges and agrees that Juniper
has set its prices and entered into this Agreement in reliance upon the disclaimers of warranty and the limitations of liability set forth herein, that the same
reflect an allocation of risk between the Parties (including the risk that a contract remedy may fail of its essential purpose and cause consequential loss),
and that the same form an essential basis of the bargain between the Parties.
9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination of the license
granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related documentation in Customer’s
possession or control.
10. Taxes. All license fees for the Software are exclusive of taxes, withholdings, duties, or levies (collectively “Taxes”). Customer shall be responsible for
paying Taxes arising from the purchase of the license, or importation or use of the Software.
11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any applicable foreign
agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such restrictions, laws or regulations, or
without all necessary approvals. Customer shall be liable for any such violations. The version of the Software supplied to Customer may contain encryption
or other capabilities restricting Customer’s ability to export the Software without an export license.
12. Commercial Computer Software. The Software is “commercial computer software” and is provided with restricted rights. Use, duplication, or disclosure
by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS 227.7201 through 227.7202-4, FAR 12.212,
FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.
13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer with the interface
information needed to achieve interoperability between the Software and another independently created program, on payment of applicable fee, if any.
Customer shall observe strict obligations of confidentiality with respect to such information and shall use such information in compliance with any applicable
terms and conditions upon which Juniper makes such information available.
14. Third Party Software. Any licensor of Juniper whose software is embedded in the Software and any supplier of Juniper whose products or technology
are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement, and such licensor or vendor
shall have the right to enforce this Agreement in its own name as if it were Juniper. In addition, certain third party software may be provided with the
Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent portions of the Software are distributed under and
subject to open source licenses obligating Juniper to make the source code for such portions publicly available (such as the GNU General Public License
(“GPL”) or the GNU Library General Public License (“LGPL”)), Juniper will make such source code portions (including Juniper modifications, as appropriate)
available upon request for a period of up to three years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194
N. Mathilda Ave., Sunnyvale, CA 94089, ATTN: General Counsel. You may obtain a copy of the GPL at http://www.gnu.org/licenses/gpl.html, and a copy of
the LGPL at http://www.gnu.org/licenses/lgpl.html.
15. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws principles. The provisions
of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes arising under this Agreement, the Parties
hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal courts within Santa Clara County, California. This Agreement
constitutes the entire and sole agreement between Juniper and the Customer with respect to the Software, and supersedes all prior and contemporaneous
agreements relating to the Software, whether oral or written (including any inconsistent terms contained in a purchase order), except that the terms of a
separate written agreement executed by an authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict
with terms contained herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in
writing by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not affect the validity of the
remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the Parties agree that the English
version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de même que tous les documents y compris tout
avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that this Agreement and all related documentation is and will be
in the English language)).
iv ■
Abbreviated Table of Contents
About This Guide xix
Part 1 Overview
Chapter 1 High Availability Overview 3
Part 8 Index
Index 185
Index of Commands and Statements 191
vi ■
Table of Contents
About This Guide xix
Objectives .....................................................................................................xix
Audience ......................................................................................................xix
Supported Routing Platforms .........................................................................xx
Using the Indexes .........................................................................................xxi
Using the Examples in This Manual ..............................................................xxi
Merging a Full Example ..........................................................................xxi
Merging a Snippet .................................................................................xxii
Documentation Conventions .......................................................................xxii
List of Technical Publications ......................................................................xxiv
Documentation Feedback ............................................................................xxx
Requesting Support .....................................................................................xxx
Part 1 Overview
cfeb ...............................................................................................................31
description ....................................................................................................32
failover ..........................................................................................................32
feb .................................................................................................................33
keepalive-time ...............................................................................................34
no-auto-failover .............................................................................................34
on-disk-failure ...............................................................................................35
on-loss-of-keepalives .....................................................................................35
redundancy ...................................................................................................36
redundancy-group .........................................................................................37
routing-engine ...............................................................................................37
sfm ................................................................................................................38
ssb ................................................................................................................38
graceful-switchover .......................................................................................55
Table of Contents ■ ix
JUNOS 8.5 High Availability Configuration Guide
nonstop-bridging ...........................................................................................65
x ■ Table of Contents
Table of Contents
disable .........................................................................................................133
graceful-restart ............................................................................................134
helper-disable ..............................................................................................135
maximum-helper-recovery-time ..................................................................135
maximum-helper-restart-time .....................................................................136
maximum-recovery-time .............................................................................136
notify-duration ............................................................................................137
no-strict-lsa-checking ...................................................................................137
recovery-time ..............................................................................................138
restart-duration ...........................................................................................139
restart-time .................................................................................................140
Table of Contents ■ xi
JUNOS 8.5 High Availability Configuration Guide
stale-routes-time ..........................................................................................141
traceoptions ................................................................................................142
accept-data ..................................................................................................163
advertise-interval .........................................................................................164
authentication-key .......................................................................................165
authentication-type .....................................................................................166
bandwidth-threshold ...................................................................................167
fast-interval .................................................................................................168
hold-time .....................................................................................................169
inet6-advertise-interval ................................................................................170
interface ......................................................................................................171
no-accept-data .............................................................................................171
no-preempt .................................................................................................171
preempt ......................................................................................................172
priority ........................................................................................................173
priority-cost .................................................................................................174
priority-hold-time ........................................................................................175
startup-silent-period ....................................................................................175
traceoptions ................................................................................................176
track ............................................................................................................178
virtual-address .............................................................................................179
virtual-inet6-address ....................................................................................179
virtual-link-local-address ..............................................................................180
vrrp-group ...................................................................................................181
vrrp-inet6-group ..........................................................................................182
Part 8 Index
Index ...........................................................................................................185
Index of Commands and Statements ..........................................................191
List of Figures ■ xv
JUNOS 8.5 High Availability Configuration Guide
This preface provides the following guidelines for using the JUNOS™ Software High
Availability Configuration Guide:
■ Objectives on page xix
■ Audience on page xix
■ Supported Routing Platforms on page xx
■ Using the Indexes on page xxi
■ Using the Examples in This Manual on page xxi
■ Documentation Conventions on page xxii
■ List of Technical Publications on page xxiv
■ Documentation Feedback on page xxx
■ Requesting Support on page xxx
Objectives
This guide is designed to provide an overview of high availability concepts and
techniques. By understanding the redundancy features of Juniper Networks routing
platforms and the JUNOS software, a network administrator can enhance the reliability
of a network and deliver highly available services to customers.
NOTE: This guide documents Release 8.5 of the JUNOS software. For additional
information about the JUNOS software—either corrections to or information that
might have been omitted from this guide—see the software release notes at
http://www.juniper.net/.
Audience
This guide is designed for network administrators who are configuring and monitoring
a Juniper Networks J-series, M-series, MX-series, or T-series routing platform.
Objectives ■ xix
JUNOS 8.5 High Availability Configuration Guide
To use this guide, you need a broad understanding of networks in general, the Internet
in particular, networking principles, and network configuration. You must also be
familiar with one or more of the following Internet routing protocols:
■ Border Gateway Protocol (BGP)
■ Distance Vector Multicast Routing Protocol (DVMRP)
■ Intermediate System-to-Intermediate System (IS-IS)
■ Internet Control Message Protocol (ICMP) router discovery
■ Internet Group Management Protocol (IGMP)
■ Multiprotocol Label Switching (MPLS)
■ Open Shortest Path First (OSPF)
■ Protocol-Independent Multicast (PIM)
■ Resource Reservation Protocol (RSVP)
■ Routing Information Protocol (RIP)
■ Simple Network Management Protocol (SNMP)
Personnel operating the equipment must be trained and competent; must not conduct
themselves in a careless, willfully negligent, or hostile manner; and must abide by
the instructions provided by the documentation.
If you want to use the examples in this manual, you can use the load merge or the
load merge relative command. These commands cause the software to merge the
incoming configuration into the current candidate configuration. If the example
configuration contains the top level of the hierarchy (or multiple hierarchies), the
example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the
example is a snippet. In this case, use the load merge relative command. These
procedures are described in the following sections.
For example, copy the following configuration to a file and name the file
ex-script.conf. Copy the ex-script.conf file to the /var/tmp directory on your routing
platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing
the load merge configuration mode command:
[edit]
user@host#load merge /var/tmp/ex-script.conf
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into
a text file, save the file with a name, and copy the file to a directory on your
routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host#edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing
the load merge relative configuration mode command:
For more information about the load command, see the JUNOS CLI User Guide.
Documentation Conventions
Table 1 on page xxiii defines notice icons used in this guide.
Table 2 on page xxiii defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen. No alarms currently active
Italic text like this ■ Introduces important new terms. ■ A policy term is a named structure
■ Identifies book names. that defines match conditions and
actions.
■ Identifies RFC and Internet draft
titles. ■ JUNOS System Basics Configuration
Guide
■ RFC 1997, BGP Communities
Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Plain text like this Represents names of configuration ■ To configure a stub area, include
statements, commands, files, and the stub statement at the [edit
directories; IP addresses; configuration protocols ospf area area-id]
hierarchy levels; or labels on routing hierarchy level.
platform components. ■ The console port is labeled
CONSOLE.
< > (angle brackets) Enclose optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Enclose a variable for which you can community name members [
substitute one or more values. community-ids ]
> (bold right angle bracket) Separates levels in a hierarchy of J-Web In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Table 5 on page xxix lists additional books on Juniper Networks solutions that you can
order through your bookstore. A complete list of such books is available at
http://www.juniper.net/books.
Book Description
Book Description
CLI User Guide Describes how to use the JUNOS command-line interface (CLI) to
configure, monitor, and manage Juniper Networks routing
platforms. This material was formerly covered in the JUNOS System
Basics Configuration Guide.
Multiplay Solutions Describes how you can deploy IPTV and voice over IP (VoIP)
services in your network.
Secure Configuration Guide for Common Criteria Provides an overview of secure Common Criteria and JUNOS-FIPS
and JUNOS-FIPS protocols for the JUNOS software and describes how to install and
configure secure Common Criteria and JUNOS-FIPS on a routing
platform.
Book Description
Software Installation and Upgrade Guide Describes the JUNOS software components and packaging and
explains how to initially configure, reinstall, and upgrade the JUNOS
system software. This material was formerly covered in the JUNOS
System Basics Configuration Guide.
System Basics Describes Juniper Networks routing platforms and explains how
to configure basic system parameters, supported protocols and
software processes, authentication, and a variety of utilities for
managing your router on the network.
JUNOS References
Hierarchy and RFC Reference Describes the JUNOS configuration mode commands. Provides a
hierarchy reference that displays each level of a configuration
hierarchy, and includes all possible configuration statements that
can be used at that level. This material was formerly covered in
the JUNOS System Basics Configuration Guide.
Interfaces Command Reference Describes the JUNOS software operational mode commands you
use to monitor and troubleshoot interfaces.
Routing Protocols and Policies Command Describes the JUNOS software operational mode commands you
Reference use to monitor and troubleshoot routing policies and protocols,
including firewall filters.
System Basics and Services Command Reference Describes the JUNOS software operational mode commands you
use to monitor and troubleshoot system basics, including
commands for real-time monitoring and route (or path) tracing,
system software management, and chassis management. Also
describes commands for monitoring and troubleshooting services
such as class of service (CoS), IP Security (IPSec), stateful firewalls,
flow collection, and flow monitoring.
System Log Messages Reference Describes how to access and interpret system log messages
generated by JUNOS software modules and provides a reference
page for each message.
JUNOS XML API Configuration Reference Provides reference pages for the configuration tag elements in the
JUNOS XML API.
Book Description
JUNOS XML API Operational Reference Provides reference pages for the operational tag elements in the
JUNOS XML API.
NETCONF API Guide Describes how to use the NETCONF API to monitor and configure
Juniper Networks routing platforms.
JUNOS Configuration and Diagnostic Automation Describes how to use the commit script and self-diagnosis features
Guide of the JUNOS software. This guide explains how to enforce custom
configuration rules defined in scripts, how to use commit script
macros to provide simplified aliases for frequently used
configuration statements, and how to configure diagnostic event
policies.
Hardware Documentation
Hardware Guide Describes how to install, maintain, and troubleshoot routing
platforms and components. Each platform has its own hardware
guide.
PIC Guide Describes the routing platform's Physical Interface Cards (PICs).
Each platform has its own PIC guide.
DPC Guide Describes the Dense Port Concentrators (DPCs) for all MX-series
routers.
JUNOScope Documentation
JUNOScope Software User Guide Describes the JUNOScope software graphical user interface (GUI),
how to install and administer the software, and how to use the
software to manage routing platform configuration files and monitor
routing platform operations.
Basic LAN and WAN Access Configuration Guide Explains how to configure the interfaces on J-series Services Routers
for basic IP routing with standard routing protocols, ISDN backup,
and digital subscriber line (DSL) connections.
Advanced WAN Access Configuration Guide Explains how to configure J-series Services Routers in virtual private
networks (VPNs) and multicast networks, configure data link
switching (DLSw) services, and apply routing techniques such as
policies, stateless and stateful firewall filters, IP Security (IPSec)
tunnels, and class-of-service (CoS) classification for safer, more
efficient routing.
Administration Guide Shows how to manage users and operations, monitor network
performance, upgrade software, and diagnose common problems
on J-series Services Routers.
Release Notes
Book Description
JUNOS Release Notes Summarize new features and known problems for a particular
software release, provide corrections and updates to published
JUNOS, JUNOScript, and NETCONF manuals, provide information
that might have been omitted from the manuals, and describe
upgrade and downgrade procedures.
Hardware Release Notes Describe the available documentation for the routing platform and
summarize known problems with the hardware and accompanying
software. Each platform has its own release notes.
JUNOScope Release Notes Contain corrections and updates to the published JUNOScope
manual, provide information that might have been omitted from
the manual, and describe upgrade and downgrade procedures.
J-series Services Router Release Notes Briefly describe Services Router features, identify known hardware
problems, and provide upgrade and downgrade instructions.
Book Description
Baseline Describes the most basic tasks for running a network using Juniper
Networks products. Tasks include upgrading and reinstalling JUNOS
software, gathering basic system management information,
verifying your network topology, and searching log messages.
MPLS Log Reference Describes MPLS status and error messages that appear in the output
of the show mpls lsp extensive command. The guide also describes
how and when to configure Constrained Shortest Path First (CSPF)
and RSVP trace options, and how to examine a CSPF or RSVP
failure in a sample network.
Book Description
Interdomain Multicast Provides background and in-depth analysis of multicast routing using Protocol Independent
Routing Multicast sparse mode (PIM SM) and Multicast Source Discovery Protocol (MSDP); details
any-source and source-specific multicast delivery models; explores multiprotocol BGP (MBGP)
and multicast IS-IS; explains Internet Gateway Management Protocol (IGMP) versions 1, 2, and
3; lists packet formats for IGMP, PIM, and MSDP; and provides a complete glossary of multicast
terms.
JUNOS Cookbook Provides detailed examples of common JUNOS software configuration tasks, such as basic
router configuration and file management, security and access control, logging, routing policy,
firewalls, routing protocols, MPLS, and VPNs.
MPLS-Enabled Applications Provides an overview of Multiprotocol Label Switching (MPLS) applications (such as Layer 3
virtual private networks [VPNs], Layer 2 VPNs, virtual private LAN service [VPLS], and
pseudowires), explains how to apply MPLS, examines the scaling requirements of equipment
at different points in the network, and covers the following topics: point-to-multipoint label
switched paths (LSPs), DiffServ-aware traffic engineering, class of service, interdomain traffic
engineering, path computation, route target filtering, multicast support for Layer 3 VPNs, and
management and troubleshooting of MPLS networks.
OSPF and IS-IS: Choosing an Explores the full range of characteristics and capabilities for the two major link-state routing
IGP for Large-Scale Networks protocols: Open Shortest Path First (OSPF) and IS-IS. Explains architecture, packet types, and
addressing; demonstrates how to improve scalability; shows how to design large-scale networks
for maximum security and reliability; details protocol extensions for MPLS-based traffic
engineering, IPv6, and multitopology routing; and covers troubleshooting for OSPF and IS-IS
networks.
Routing Policy and Protocols Provides a brief history of the Internet, explains IP addressing and routing (Routing Information
for Multivendor IP Networks Protocol [RIP], OSPF, IS-IS, and Border Gateway Protocol [BGP]), explores ISP peering and
routing policies, and displays configurations for both Juniper Networks and other vendors'
routers.
The Complete IS-IS Protocol Provides the insight and practical solutions necessary to understand the IS-IS protocol and how
it works by using a multivendor, real-world approach.
Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation. You can send your comments to
techpubs-comments@juniper.net, or fill out the documentation feedback form at
http://www.juniper.net/techpubs/docbug/docbugreport.html. If you are using e-mail, be sure
to include the following information with your comments:
■ Document name
■ Document part number
■ Page number
■ Software release version
Requesting Support
For technical support, open a support case with the Case Manager link at
http://www.juniper.net/support/ or call 1-888-314-JTAC (from the United States, Canada,
or Mexico) or 1-408-745-9500 (from elsewhere).
Overview ■ 1
JUNOS 8.5 High Availability Configuration Guide
2 ■ Overview
Chapter 1
High Availability Overview
For Juniper Networks routing platforms running JUNOS software, high availability
refers to the hardware and software components that provide redundancy and
reliability for packet-based communications. This guide covers the following high
availability features:
■ Routing Engine Redundancy on page 3
■ Graceful Routing Engine Switchover on page 3
■ Nonstop Bridging on page 4
■ Nonstop Routing on page 4
■ Graceful Restart on page 5
■ VRRP on page 5
■ Comparison of High Availability Features on page 6
■ Related Features on page 7
Nonstop Bridging
Nonstop bridging enables a routing platform with redundant Routing Engines to
switch from a primary Routing Engine to a backup Routing Engine without losing
Layer 2 Control Protocol (L2CP) information. Nonstop bridging uses the same
infrastructure as graceful Routing Engine switchover to preserve interface and kernel
information. However, nonstop bridging also saves L2CP information by running
the Layer 2 Control Protocol process (l2cpd) on the backup Routing Engine.
NOTE: To use nonstop bridging, you must first enable graceful Routing Engine
switchover.
Nonstop Routing
Nonstop routing (NSR) enables a routing platform with redundant Routing Engines
to switch from a primary Routing Engine to a backup Routing Engine without alerting
peer nodes that a change has occurred. Nonstop routing uses the same infrastructure
as graceful Routing Engine switchover to preserve interface and kernel information.
However, nonstop routing also preserves routing information and protocol sessions
by running the routing protocol process (rpd) on both Routing Engines. In addition,
nonstop routing preserves TCP connections maintained in the kernel.
NOTE: To use nonstop routing, you must also configure graceful Routing Engine
switchover.
Routing protocols use bidirectional forwarding detection (BFD) for fast liveliness
detection of their neighbors. With nonstop routing enabled, BFD session state is
saved on both the master Routing Engine and the backup Routing Engine. When a
Routing Engine switchover event occurs, the BFD session state does not need to be
4 ■ Nonstop Bridging
Chapter 1: High Availability Overview
restarted and peer routers continue to interface with the routing platform as if no
change had occurred.
Graceful Restart
Graceful restart provides extensions to routing protocols so that neighboring helper
routers restore routing information to a restarting router. These extensions signal
neighboring routers about the graceful restart and prevent the neighbors from reacting
to the router restart and from propagating the change in state to the network during
the graceful restart period. Neighbors provide the routing information that enables
the restarting router to stop and restart routing protocols without causing network
reconvergence.
VRRP
For Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet, and logical
interfaces, you can configure the Virtual Router Redundancy Protocol (VRRP) or VRRP
for IPv6. VRRP enables hosts on a LAN to make use of redundant routing platforms
on that LAN without requiring more than the static configuration of a single default
route on the hosts. The VRRP routing platforms share the IP address corresponding
to the default route configured on the hosts. At any time, one of the VRRP routing
platforms is the master (active) and the others are backups. If the master fails, one
of the backup routers becomes the new master router, providing a virtual default
routing platform and allowing traffic on the LAN to be routed without relying on a
single routing platform. Using VRRP, a backup router can take over a failed default
Graceful Restart ■ 5
JUNOS 8.5 High Availability Configuration Guide
router within few seconds. This is done with minimum VRRP traffic and without any
interaction with the hosts.
Routers running VRRP dynamically elect master and backup routers. You can also
force assignment of master and backup routers using priorities from 1 through 255,
with 255 being the highest priority. In VRRP operation, the default master router
sends advertisements to backup routers at regular intervals. The default interval is
1 second. If a backup router does not receive an advertisement for a set period, the
backup router with the next highest priority takes over as master and begins
forwarding packets.
NOTE: Because graceful restart helper mode (where a neighboring router assists in
a restart) is enabled by default (except for BGP), a router can both act as a helper
and be configured to support nonstop routing, although helper mode is not sustained
during a graceful Routing Engine switchover (GRES) event.
However, you cannot configure a router to undergo a graceful restart (by including
the graceful-restart statement at the [edit routing-options] hierarchy level) and configure
nonstop routing (by including the nonstop-routing option at the [edit routing-options]
hierarchy level) at the same time.
To obtain BGP helper mode support, you must first configure the router to undergo
a graceful restart. Therefore, when nonstop routing is enabled, BGP cannot provide
helper support.
Dual Routing Engines without graceful When the switchover to the new master Traffic is interrupted while the Packet
Routing Engine switchover Routing Engine is complete, routing Forwarding Engine is reinitialized. All
convergence takes place and traffic is kernel and forwarding processes are
resumed. restarted.
Graceful Routing Engine switchover Traffic is not interrupted during the Graceful restart or nonstop routing must
switchover. Interface and kernel be configured in order to quickly restore
information is preserved. or to preserve routing information,
respectively.
Nonstop bridging Traffic is not interrupted during the Nonstop bridging can be used in
switchover. Interface, kernel, and Layer conjunction with nonstop routing.
2 control protocol information is
preserved.
Nonstop routing Traffic is not interrupted during the Unsupported protocols must be
switchover. Interface, kernel, and routing refreshed using the normal recovery
protocol information is preserved. mechanisms inherent in each protocol.
Neighbors are not required to have any
special configuration.
Graceful restart Traffic is not interrupted during the Neighbors are required to support
switchover. Interface and kernel graceful restart. The routing protocol
information is preserved. Graceful restart process (rpd) restarts. A graceful restart
protocol extensions quickly collect and interval is required. For certain
restore routing information from the protocols, a significant change in the
neighboring routers. network can cause graceful restart to
stop.
Related Features
Related redundancy and reliability features include:
■ Redundant power supplies, host modules, host subsystems, and forwarding
boards. For more information, see the JUNOS System Basics Configuration Guide
and the JUNOS Hardware Network Operations Guide.
■ Additional link-layer redundancy, including Automatic Protection Switching (APS)
for SONET interfaces, Multiplex Section Protection (MSP) for SDH interfaces, and
DLSw redundancy for Ethernet interfaces, For more information, see the JUNOS
Network Interfaces Configuration Guide.
■ Bidirectional Forwarding Detection (BFD) works with other routing protocols to
detect failures rapidly. For more information, see the JUNOS Routing Protocols
Configuration Guide.
■ Redirection of Multiprotocol Label Switching (MPLS) label-switched path (LSP)
traffic—Mechanisms such as link protection, node-link protection, and fast reroute
recognize link and node failures, allowing MPLS LSPs to select a bypass LSP to
circumvent failed links or devices. For more information, see the JUNOS MPLS
Applications Configuration Guide.
Related Features ■ 7
JUNOS 8.5 High Availability Configuration Guide
8 ■ Related Features
Part 2
Routing Engine and Switching Control
Board Redundancy
■ Routing Engine and Switching Control Board Redundancy Overview on page 11
■ Routing Engine and Switching Control Board Redundancy Configuration
Guidelines on page 19
■ Summary of Routing Engine and Control Board Switching Redundancy
Statements on page 31
For routers that have redundant Routing Engines or redundant switching control
boards, including Switching and Forwarding Modules (SFMs). System and Switch
Boards (SSBs), Forwarding Engine Boards (FEBs), or Compact Forwarding Engine
Board (CFEBs), you can configure redundancy properties. This chapter includes the
following topics:
■ Routing Engine Redundancy on page 11
■ Switching Control Board Redundancy on page 14
NOTE: A failover from the master Routing Engine to the backup Routing Engine
occurs automatically when the master Routing Engine experiences a hardware failure
or when you have configured the software to support a change in mastership based
on specific conditions. You can also manually switch Routing Engine mastership by
issuing one of the request chassis routing-engine commands. In this chapter, the term
failover refers to an automatic event, whereas switchover refers to either an automatic
or a manual event.
If nonstop routing is configured, the backup Routing Engine receives routing messages,
but does not send them to the network. If nonstop routing is not configured, the
backup Routing Engine does not maintain routing tables.
When a switchover occurs, the backup takes control of the system as the new master
Routing Engine. If graceful Routing Engine switchover is configured, the Packet
Forwarding Engine is not reinitialized and traffic is not interrupted. If graceful Routing
Engine switchover is not configured, when the backup Routing Engine becomes
master, it resets the switch plane and downloads its own version of the microkernel
to the Packet Forwarding Engine components.
NOTE: With the introduction of JUNOS Release 8.4, both Routing Engines cannot be
configured to be master at the same time. This configuration causes the commit
check to fail.
For more information about Routing Engine redundancy, see the following sections:
■ Platform Support on page 12
■ Conditions That Trigger a Routing Engine Failover on page 13
■ Default Routing Engine Redundancy Behavior on page 13
■ Situations That Require You to Halt Routing Engines on page 14
Platform Support
The following platforms support redundant Routing Engines:
■ M10i router—Each High-Availability Chassis Manager (HCM) and Routing Engine
function as a unit. Keepalive messages are sent between Routing Engines over
the interconnected HCM switches.
■ M20 router—A single System and Switch Board (SSB) communicates with the
Routing Engines. Keepalive messages are sent between the master and backup
Routing Engine through the switch on the SSB. In this way, the master and the
backup Routing Engines exchange state information.
■ M40e and M160 routers—Each Miscellaneous Control Subsystem (MCS) and
Routing Engine function as a unit, or host module. Keepalive messages are sent
from one Routing Engine to the other over the fpx2 interface across the Peripheral
Component Interconnect (PCI) bridge. The keepalive message is received by the
other host module on the fpx1 interface. A keepalive response is sent back over
the fpx2 interface to the other Routing Engine.
■ M120 router, M320 router, T320 router, T640 router, and T1600 router—Each
Routing Engine and Control Board (CB) function as a unit, or host subsystem.
Keepalive messages are sent from the Routing Engine over the em0 interface.
The keepalive message is forwarded to the other host subsystem over the bcm0
interface on the Control Board. A keepalive response is sent back over the em0
interface to the other Routing Engine.
■ MX–series Ethernet Services routers—Each Routing Engine and Switch Control
Board (SCB) function as a unit, or host subsystem. Keepalive messages are sent
between Routing Engines over either the em0 interface or the em1 interface.
If any of these conditions is met, a message is logged and the backup Routing Engine
attempts to take mastership. An alarm is generated when the backup Routing Engine
becomes active. After the backup Routing Engine takes mastership, it continues to
function as master even after the originally configured master Routing Engine has
successfully resumed operation. You must manually restore it to its previous backup
status. (However, if at any time one of the Routing Engines is not present, the other
Routing Engine becomes master automatically, regardless of how redundancy is
configured.)
NOTE: A single Routing Engine in the chassis always becomes the master Routing
Engine even if it was previously the backup Routing Engine.
Perform the following steps to see how the default Routing Engine redundancy setting
works:
1. Ensure that re0 is the master Routing Engine.
2. Manually switch the state of Routing Engine mastership by issuing the request
chassis routing-engine master switch command from the master Routing Engine.
re0 is now the backup Routing Engine and re1 is the master Routing Engine.
NOTE: On the next reboot of the master Routing Engine, the JUNOS software returns
the router to the default state because you have not configured the Routing Engines
to maintain this state after a reboot.
The Routing Engine boots up and reads the configuration. Because you have not
specified in the configuration which Routing Engine is the master, re1 uses the
default configuration as the backup. Now both re0 and re1 are in a backup state.
The JUNOS software detects this conflict and, to prevent a no-master state, reverts
to the default configuration to direct re0 to become master.
If you halt the master Routing Engine and do not power it off or remove it, the backup
Routing Engine remains inactive unless you have configured it to become the master
when it detects a loss of keepalive signal from the master Routing Engine.
NOTE: To restart the router, you must log in to the console port (rather than the
Ethernet management port) of the Routing Engine. When you log in to the console
port of the master Routing Engine, the system automatically reboots. After you log
in to the console port of the backup Routing Engine, press Enter to reboot it.
NOTE: If you have upgraded the backup Routing Engine, first reboot it and then
reboot the master Routing Engine.
NOTE: A failover from a master switching control board to a backup switching control
board occurs automatically when the master experiences a hardware failure or when
you have configured the software to support a change in mastership based on specific
conditions. You can also manually switch mastership by issuing specific request
chassis commands. In this chapter, the term failover refers to an automatic event,
whereas switchover refers to either an automatic or a manual event.
The M10i router has two CFEBs, one that is configured to act as the master and the
other that serves as a backup in case the master fails. You can initiate a manual
switchover by issuing the request chassis cfeb master switch command. For more
information, see the JUNOS System Basics and Services Command Reference.
You can also map a connection between any FEB and any Flexible PIC Concentrator
(FPC) on the M120 router. You cannot specify a connection between an FPC and a
FEB configured as a backup. If an FPC in slot x is not specified to connect to a FEB,
the FPC in slot x is automatically assigned a connection to the FEB in slot x. If the
FEB in slot x is a backup FEB, you must explicitly configure the FPC either not to
connect to any FEB or to connect to a different FEB. Use the none statement at the
[edit chassis fpc-feb-connectivity fpc slot-number feb] hierarchy level to disconnect the
backup FEB from the FPC. For more information about the fpc-feb-connectivity
statement, see the JUNOS System Basics Configuration Guide.
You can also initiate a manual switchover by issuing the request chassis redundancy
feb slot slot-number switch-to-backup command, where slot-number is the number of
the active FEB. For more information, see the JUNOS System Basics and Services
Command Reference.
The following conditions result in automatic failover as long as the backup FEB in a
redundancy group is available:
■ The FEB is absent.
■ The FEB experienced a hard error while coming online.
■ A software failure on the FEB resulted in a crash.
■ Ethernet connectivity from a FEB to a Routing Engine failed.
■ A hard error on the FEB, such as a power failure, occurred.
■ The FEB was disabled when the offline button for the FEB was pressed.
■ The software watchdog timer on the FEB expired.
■ Errors occurred on the links between all the active fabric planes and the FEB.
This situation results in failover to the backup FEB if it has at least one valid
fabric link.
■ Errors occurred on the link between the FEB and all of the FPCs connected to
it.
A manual switchover from a primary FEB to a backup FEB results in less than 1
second of traffic loss. Automatic failover from the primary FEB to the backup FEB
results in less than 10 seconds of traffic loss if the backup FEB is ready before the
switchover. Automatic failover from a FEB that is not specified as a primary FEB
results in higher packet loss. The duration of packet loss depends on the number of
interfaces and on the size of the routing table, but can be minutes.
NOTE: For a switchover from a nonprimary FEB when no primary FEB is specified
for the redundancy group, the backup FEB does not reboot and the interfaces on the
FPCs connected to the previously active FEB remain online. The backup FEB can
take minutes to obtain the entire forwarding state from the Routing Engine following
a switchover. If you do not want the interfaces to remain online during the switchover
for a nonprimary FEB, configure a primary FEB for the redundancy group.
If switchover occurs from a primary FEB, the backup FEB does not reboot. If
switchover occurs from a nonprimary FEB and a primary FEB is specified for the
group, the backup FEB reboots.
After a switchover occurs, a backup FEB is no longer available for the redundancy
group. You can revert from the backup FEB to the previously active FEB by issuing
the operational mode command request chassis redundancy feb slot slot-number
revert-from-backup, where slot-number is the number of the previously active FEB. For
more information, see the JUNOS System Basics and Services Command Reference.
When you revert from the backup FEB, it becomes available again for a switchover.
If the redundancy group does not have a primary FEB, the backup FEB reboots after
you revert back to the previously active FEB. If the FEB to which you revert back is
not a primary FEB, the backup FEB is rebooted so that it can aligned with the state
of the primary FEB.
If you modify the configuration for an existing redundancy group so that a FEB
connects to a different FPC, the FEB is rebooted unless the FEB was already connected
to one or two Type 1 FPCs and the change only resulted in the FEB being connected
either to one additional or one fewer Type 1 FPC. For more information about how
to map a connection between an FPC and a FEB, see the JUNOS System Basics
Configuration Guide. If you change the primary FEB in a redundancy group, the backup
FEB is rebooted. The FEB is also rebooted if you change a backup FEB to a nonbackup
FEB or change an active FEB to a backup FEB.
To view the status of configured FEB redundancy groups, issue the show chassis
redundancy feb operational mode command. For more information, see the JUNOS
System Basics and Services Command Reference.
The M20 router holds up to two SSBs. One SSB is configured to act as the master
and the other is configured to serve as a backup in case the master fails. You can
initiate a manual switchover by issuing the request chassis ssb master switch
command. For more information, see the JUNOS System Basics and Services Command
Reference.
The M40e router holds up to two SFMs, one that is configured to act as the master
and the other configured to serve as a backup in case the master fails. Removing the
standby SFM has no effect on router function. If the active SFM fails or is removed
from the chassis, forwarding halts until the standby SFM boots and becomes active.
It takes approximately 1 minute for the new SFM to become active. Synchronizing
router configuration information can take additional time, depending on the
complexity of the configuration.
The M160 router holds up to four SFMs. All SFMs are active at the same time. A
failure or taking an SFM offline has no effect on router function. Forwarding continues
uninterrupted.
You can initiate a manual switchover by issuing the request chassis sfm master switch
command. For more information, see the JUNOS System Basics and Services Command
Reference.
NOTE: In systems with two Routing Engines, both Routing Engines cannot be
configured to be master at the same time. This configuration causes the commit
check to fail.
To modify the default configuration, include the routing-engine statement at the [edit
chassis redundancy] hierarchy level:
NOTE: To switch between the master and the backup Routing Engines, you must
modify the configuration and then activate it by issuing the commit synchronize
command.
To connect to the other Routing Engine using the management Ethernet port, issue
the following command:
For more information about the request routing-engine login command, see the JUNOS
System Basics and Services Command Reference.
To copy a configuration file from one Routing Engine to the other, issue the file copy
command:
In this case, source is the name of the configuration file. These files are stored in the
directory /config. The active configuration is /config/juniper.conf, and older
configurations are in /config/juniper.conf {1...9}. The destination is a file on the other
Routing Engine.
The following example copies a configuration file from Routing Engine 0 to Routing
Engine 1:
The following example copies a configuration file from Routing Engine 0 to Routing
Engine 1 on a TX Matrix platform:
To load the configuration file, enter the load replace command at the [edit] hierarchy
level:
CAUTION: Make sure you change any IP addresses specified in fxp0 on Routing
Engine 0 to addresses appropriate for Routing Engine 1.
You can use configuration groups to ensure that the correct IP addresses are used
for each Routing Engine and to maintain a single configuration file for both
Routing Engines.
The following example defines configuration groups re0 and re1 with separate IP
addresses. These well-known configuration group names take effect only on the
appropriate Routing Engine.
groups {
re0 {
system {
host-name my-re0;
}
interfaces {
fxp0 {
description "10/100 Management interface";
unit 0 {
family inet {
address 10.255.2.40/24;
}
}
}
}
}
re1 {
system {
host-name my-re1;
}
interfaces {
fxp0 {
description "10/100 Management interface";
unit 0 {
family inet {
address 10.255.2.41/24;
}
}
}
}
}
}
For information about the initial configuration of dual Routing Engines, see the JUNOS
Software Installation and Upgrade Guide.
In the re portion of the URL, specify the number of the other Routing Engine. In the
filename portion of the URL, specify the path to the package. Packages are typically
in the directory /var/sw/pkg.
Changing to the Backup Routing Engine If It Detects a Hard Disk Error on the Master
Routing Engine
After you configure a backup Routing Engine, you can direct it to take mastership
automatically if it detects a hard disk error from the master Routing Engine. To enable
this feature, include the on-disk-failure statement at the [edit chassis redundancy
failover] hierarchy level:
For information about configuring graceful Routing Engine switchover, see “Graceful
Routing Engine Switchover Configuration Guidelines” on page 53.
By default, failover occurs after 300 seconds (5 minutes). You can configure a shorter
or longer time interval. To change the keepalive time period, include the keepalive-time
statement at the [edit chassis redundancy] hierarchy level:
NOTE: When graceful Routing Engine switchover is configured, the keepalive signal
is automatically enabled and the failover time is set to 2 seconds. You cannot manually
reset the keepalive time.
The following example describes the sequence of events if you configure the backup
Routing Engine to detect a loss of keepalive signal in the master Routing Engine:
1. Manually configure a keepalive-time of 25 seconds.
2. After the Packet Forwarding Engine connection to the primary Routing Engine
is lost and the keepalive timer expires, packet forwarding is interrupted.
3. After 25 seconds of keepalive loss, a message is logged, and the backup Routing
Engine attempts to take mastership. An alarm is generated when the backup
Routing Engine becomes active, and the display is updated with the current
status of the Routing Engine.
4. After the backup Routing Engine takes mastership, it continues to function as
master.
If at any time one of the Routing Engines is not present, the remaining Routing
Engine becomes master automatically, regardless of how redundancy is configured.
If the same JUNOS software release is not running on all master and backup Routing
Engines in the routing matrix, the following consequences occur when the
on-loss-of-keepalives statement is included at the [edit chassis redundancy failover]
hierarchy level:
■ When the on-loss-of-keepalives statement is included at the [edit chassis
redundancy failover] hierarchy level and you or a host subsystem initiate a change
in mastership to the backup Routing Engine in the TX Matrix platform, the master
Routing Engines in the T640 routing nodes detect a software release mismatch
with the new master Routing Engine in the TX Matrix platform and switch
mastership to their backup Routing Engines.
■ When you manually change mastership to a backup Routing Engine in a T640
routing node using the request chassis routing-engine master command, the new
master Routing Engine in the T640 routing node detects a software release
mismatch with the master Routing Engine in the TX Matrix platform and
relinquishes mastership to the original master Routing Engine. (Routing Engine
mastership in the TX Matrix platform does not switch in this case.)
■ When a host subsystem initiates a change in mastership to a backup Routing
Engine in a T640 routing node because the master Routing Engine has failed,
the T640 routing node is logically disconnected from the TX Matrix platform. To
reconnect the T640 routing node, initiate a change in mastership to the backup
Routing Engine in the TX Matrix platform, or replace the failed Routing Engine
in the T640 routing node and switch mastership to it. The replacement Routing
Engine must be running the same software release as the master Routing Engine
in the TX Matrix platform.
If the same JUNOS software release is not running on all master and backup Routing
Engines in the routing matrix, the following consequences occur when the
on-loss-of-keepalives statement is not included at the [edit chassis redundancy failover]
hierarchy level:
■ If you initiate a change in mastership to the backup Routing Engine in the TX
Matrix platform, all T640 routing nodes are logically disconnected from the TX
Matrix platform. To reconnect the T640 routing nodes, switch mastership of all
master Routing Engines in the T640 routing nodes to their backup Routing
Engines.
■ If you initiate a change in mastership to a backup Routing Engine in a T640
routing node, the T640 routing node is logically disconnected from the TX Matrix
platform. To reconnect the T640 routing node, switch mastership of the new
master Routing Engine in the T640 routing node back to the original master
Routing Engine.
E_MAXTRY The maximum number of tries to acquire or release mastership was exceeded.
E_CMD_A . The command request chassis routing-engine master acquire was issued from the
backup Routing Engine.
E_CMD_F The command request chassis routing-engine master acquire force was issued from
the backup Routing Engine.
E_CMD_R The command request chassis routing-engine master release was issued from the
master Routing Engine.
E_CMD_S The command request chassis routing-engine master switch was issued from a Routing
Engine.
in the integrated ASIC. The link is also used to transfer from the CFEB to the Routing
Engine routing link-state updates and other packets destined for the router that have
been received through the router interfaces.
To configure a CFEB redundancy group, include the following statements at the [edit
chassis redundancy] hierarchy level:
slot-number can be 0 or 1.
To manually switch CFEB mastership, issue the request chassis cfeb master switch
command. To view CFEB status, issue the show chassis cfeb command.
redundancy-group group-name {
feb slot-number (backup | primary);
description description;
no-auto-failover;
}
group-name is the unique name for the redundancy group. The maximum length is
39 alphanumeric characters.
slot-number is the slot-number of each FEB you want to include in the redundancy
group. The range is 0 through 5. You must specify a unique backup FEB and make
sure that the FEB is not connected to an FPC. Specifying a primary FEB is optional.
If you disable automatic failover, you can perform only a manual switchover using
the operational command request chassis redundancy feb slot slot-number
switch-to-backup. To view FEB status, issue the show chassis feb command. For more
information, see the JUNOS System Basics and Services Command Reference.
When an active FEB in group0 fails, automatic failover to the backup FEB
does not occur. For group0, you can only perform a manual switchover.
Because you must explicitly configure an FPC not to connect to the backup FEB,
connectivity is set to none between fpc 0 and feb 0 and between fpc 5 and feb 5.
NOTE: For information about the fpc-feb-connectivity statement, see the JUNOS System
Basics Configuration Guide.
[edit]
chassis {
fpc-feb-connectivity {
fpc 0 feb none;
fpc 5 feb none;
}
redundancy feb {
redundancy-group group0 {
description “Interfaces to Customer X”;
feb 2 primary;
feb 1;
feb 0 backup;
no-auto-failover;
}
redundancy-group group1 {
feb 3;
feb 5 backup;
}
}
To manually switch mastership between SFMs, issue the request chassis sfm master
switch command. To view SFM status, issue the show chassis sfm command. For
more information, see the JUNOS System Basics and Services Command Reference
slot-number is 0 or 1.
To manually switch mastership between SSBs, issue the request chassis ssb master
switch command.
To display SSB status information, issue the show chassis ssb command. The
command output displays the number of times the mastership has changed, the SSB
slot number, and the current state of the SSB: master, backup, or empty. For more
information, see the JUNOS System Basics and Services Command Reference.
This chapter provides a reference for each of the Routing Engine and control board
switching redundancy configuration statements. The statements are organized
alphabetically.
cfeb
Default By default, the CFEB in slot 0 is the master and the CFEB in slot 1 is the backup.
Options slot-number—Specify which slot is the master and which is the backup.
Usage Guidelines See “Configuring CFEB Redundancy on the M10i Router” on page 26.
cfeb ■ 31
JUNOS 8.5 High Availability Configuration Guide
description
Usage Guidelines See “Configuring FEB Redundancy on the M120 Router” on page 28
failover
Syntax failover {
on-disk-failure;
on-loss-of-keepalives
}
Usage Guidelines See “Changing to the Backup Routing Engine If It Detects a Hard Disk Error on the
Master Routing Engine” on page 23.
32 ■ description
Chapter 4: Summary of Routing Engine and Control Board Switching Redundancy Statements
feb
Syntax feb {
redundancy-group group-name {
description description
feb slot-number (backup | primary)
no-auto-failover
}
}
Usage Guidelines See “Configuring FEB Redundancy on the M120 Router” on page 28.
feb ■ 33
JUNOS 8.5 High Availability Configuration Guide
keepalive-time
Default If the on-loss-of-keepalives statement at the [edit chassis redundancy] hierarchy level
is not included, failover will not occur.
Options seconds—Time, in seconds, before the backup router takes mastership when it detects
loss of the keepalive signal. The range of values is 2 through 10,000.
Usage Guidelines See “Changing to the Backup Routing Engine If It Detects Loss of Keepalive
Signal” on page 23.
no-auto-failover
Syntax no-auto-failover;
Usage Guidelines See “Configuring FEB Redundancy on the M120 Router” on page 28.
34 ■ keepalive-time
Chapter 4: Summary of Routing Engine and Control Board Switching Redundancy Statements
on-disk-failure
Syntax on-disk-failure;
Usage Guidelines See “Changing to the Backup Routing Engine If It Detects a Hard Disk Error on the
Master Routing Engine” on page 23.
on-loss-of-keepalives
Syntax on-loss-of-keepalives;
Default If the on-loss-of-keepalives statement at the [edit chassis redundancy] hierarchy level
is not included, failover will not occur.
Usage Guidelines See “Changing to the Backup Routing Engine If It Detects Loss of Keepalive
Signal” on page 23.
on-disk-failure ■ 35
JUNOS 8.5 High Availability Configuration Guide
redundancy
Syntax redundancy {
cfeb slot–number (always | preferred);
feb {
redundancy-group group-name {
description description
feb slot-number (backup | primary)
no-auto-failover
}
failover {
on-disk-failure
on-loss-of-keepalives
}
keepalive-time seconds;
routing-engine slot-number (backup | disabled | master);
sfm slot-number (always | preferred);
ssb slot-number (always | preferred);
}
Usage Guidelines See “Routing Engine and Switching Control Board Redundancy Configuration
Guidelines” on page 19.
36 ■ redundancy
Chapter 4: Summary of Routing Engine and Control Board Switching Redundancy Statements
redundancy-group
Options group-name is the unique name for the redundancy group. The maximum length is
39 alphanumeric characters.
Usage Guidelines See “Configuring FEB Redundancy on the M120 Router” on page 28.
routing-engine
Default By default, the Routing Engine in slot 0 is the master Routing Engine and the Routing
Engine in slot 1 is the backup Routing Engine.
Set the function of the Routing Engine for the specified slot:
■ master—Routing Engine in the specified slot is the master.
■ backup—Routing Engine in the specified slot is the backup.
■ disabled—Routing Engine in the specified slot is disabled.
redundancy-group ■ 37
JUNOS 8.5 High Availability Configuration Guide
sfm
Default By default, the SFM in slot 0 is the master and the SFM in slot 1 is the backup.
Options slot-number—Specify which slot is the master and which is the backup. On the M40e
router, slot-number can be 0 or 1. On the M160 router, slot-number can be 0
through 3.
Usage Guidelines See “Configuring SFM Redundancy on M40e and M160 Routers” on page 29.
ssb
Default By default, the SSB in slot 0 is the master and the SSB in slot 1 is the backup.
Options slot-number—Specify which slot is the master and which is the backup.
Usage Guidelines See “Configuring SSB Redundancy on the M20 Router” on page 30.
38 ■ sfm
Part 3
Graceful Routing Engine Switchover
■ Graceful Routing Engine Switchover Overview on page 41
■ Graceful Routing Engine Switchover Configuration Guidelines on page 53
■ Summary of Graceful Routing Engine Switchover Configuration
Statements on page 55
If the backup Routing Engine does not receive a keepalive from the master Routing
Engine after 2 seconds, it determines that the master Routing Engine has failed and
takes mastership. The Packet Forwarding Engine seamlessly disconnects from the
old master Routing Engine and reconnects to the new master Routing Engine. The
Packet Forwarding Engine does not reboot, and traffic is not interrupted. The new
master Routing Engine and the Packet Forwarding Engine then become synchronized.
If the new master Routing Engine detects that the Packet Forwarding Engine state
is not up to date, it resends state update messages.
The switchover preparation process for graceful Routing Engine switchover follows
these steps:
1. The master Routing Engine starts.
2. The routing platform processes (such as the chassis process [chassisd]) start.
3. The Packet Forwarding Engine starts and connects to the master Routing Engine.
4. All state information is updated in the system.
5. The backup Routing Engine starts.
6. The system determines whether graceful Routing Engine switchover has been
enabled.
7. The kernel synchronization process (ksyncd) synchronizes the backup Routing
Engine with the master Routing Engine.
8. All state information is updated in the system.
Graceful Routing Engine switchover supports most JUNOS software features in Release
5.7 and later. Particular JUNOS software features require specific versions of the
JUNOS software. See Table 8 on page 44.
Extended DHCP relay agent (See “Graceful Routing Engine Switchover 8.5
and Extended DHCP Relay Agent” on page 45 for more information.)
The following constraints apply to graceful Routing Engine switchover feature support:
■ When graceful Routing Engine switchover and Aggregated Ethernet interfaces
are configured in the same system, the aggregated Ethernet interfaces must not
be configured for fast polling LACP. When fast polling is configured, the LACP
polls time out at the remote end during the Routing Engine mastership switchover.
When LACP polling times out, the aggregated link and interface are disabled.
The Routing Engine mastership change is fast enough that standard and slow
LACP polling do not time out during the procedure.
■ Ethernet Operation, Administration, and Management (OAM) as defined by IEEE
802.1ag currently does not interoperate with graceful Routing Engine switchover.
When a switchover occurs, the OAM hello times out, triggering protocol
convergence. In this case, neither nonstop routing nor graceful restart provides
link-state change protection. However, OAM as defined by IEEE 802.3ah is
supported by graceful Routing Engine switchover. Both nonstop routing and
graceful restart provide link-state change protection.
■ VRRP changes mastership when a Routing Engine switchover occurs, even when
graceful Routing Engine switchover is configured.
To enable graceful Routing Engine switchover support for the extended DHCP relay
agent, include the graceful-switchover statement at the [edit chassis redundancy]
hierarchy level. You cannot disable graceful Routing Engine switchover support for
the extended DHCP relay agent when the router is configured for graceful Routing
Engine switchover.
The DHCP relay agent process that runs on any Routing Engine always maintains
the state of active DHCP client leases in persistent storage. When you enable graceful
Routing Engine switchover on a routing platform that contains dual Routing Engines,
the primary DHCP relay agent process that runs on the master Routing Engine
communicates with the secondary DHCP relay agent process that runs on the backup
Routing Engine to keep it updated with information about the DHCP clients that it
is adding or deleting.
Specifically, graceful Routing Engine switchover support for the DHCP relay agent
prevents the loss of state information for active DHCP clients. If mastership switches
to the backup Routing Engine on routing platforms that contain dual Routing Engines,
the secondary DHCP relay agent waits in a warm state and resumes control from
the failed primary DHCP relay agent. The new primary DHCP relay agent restores
state information about DHCP clients that were active before the switchover to the
new master Routing Engine.
The following DPCs are supported in JUNOS Release 8.3 and later:
■ DPC-R-40GE-SFP
■ DPC-R-4XGE-XFP
The following DPCs are supported in JUNOS Release 8.4 and later:
■ DPCE-R-40GE-SFP
■ DPCE-R-4XGE-XFP
■ DPCE-X-40GE-SFP
■ DPCE-X-4XGE-XFP
The following DPCs are supported in JUNOS Release 8.5 and later:
■ DPCE-R-Q-40GE-SFP
■ DPCE-R-Q-4XGE-XFP
■ DPCE-X-Q-40GE-SFP
■ DPCE-X-Q-4XGE-XFP
Use Table 9 on page 47 to determine which JUNOS software release provides initial
graceful Routing Engine switchover support for PICs installed in your router. A dash
(–) indicates that support is not available. Except where noted, the JUNOS software
release is R1.
NOTE: When an unsupported PIC is online, you cannot enable graceful Routing
Engine switchover. If graceful Routing Engine switchover is already enabled, an
unsupported PIC cannot come online.
The following constraints apply to graceful Routing Engine switchover PIC support:
■ You can include the graceful-switchover statement at the [edit chassis redundancy]
hierarchy level on a router with Adaptive Services and MultiServices PICs
configured on it and issue the commit command. The commit will succeed.
However, all services on these PICs are reset during a switchover.
■ Graceful Routing Engine switchover is not supported on any Monitoring Services
PICs or Multilink Services PICs. If you include the graceful-switchover statement
at the [edit chassis redundancy] hierarchy level on a router with either of these
PIC types configured on it and issue the commit command, the commit fails.
■ Graceful Routing Engine switchover is not supported on Multiservices 400 PICs
configured for monitoring services applications. If you include the
graceful-switchover statement, the commit fails.
TX
PIC Type M10i M20 M40e M120 M320 T320 T640 Matrix T1600
Adaptive 7.2 7.2 7.2 8.2 7.2 7.2 7.2 7.3 8.5
Services II PICs
Adaptive 7.6 7.6 7.6 8.2 7.6 7.6 7.6 n/a 8.5
Services II PICs
with Link
Services IQ
(LSQ) interfaces
ATM2 DS3 IQ 6.1 6.1 6.1 8.2 6.4 – 8.0 8.0 8.5
PICs
ATM2 E3 IQ 6.1 6.1 6.1 8.2 6.3 7.4 7.4 7.4 8.5
PICs
TX
PIC Type M10i M20 M40e M120 M320 T320 T640 Matrix T1600
ATM2 6.1 6.0 6.0 8.2 6.2 6.0 7.6 7.6 8.5
OC3/STM1 IQ
PICs
ATM2 6.1 6.0 6.0 8.2 6.2 6.0 8.0 8.0 8.5
OC12/STM4 IQ
PICs, 1-port
Channelized 6.1 6.1 6.1 8.2 6.2 6.3 8.0 8.0 8.5
DS3 IQ PICs
Channelized 7.1 7.1 7.1 8.2 7.1 7.1 7.6 7.6 8.5
OC3 IQ PICs
Channelized 6.1 6.1 6.1 8.2 6.2 6.1 6.3 7.0 8.5
OC12 IQ PICs
Channelized 6.1 6.1 6.1 8.2 6.2 6.1 7.5 7.5 8.5
STM1 IQ PICs
DS3 PICs 6.1 6.0 6.0 8.2 6.2 6.0 6.3 7.0 8.5
E3 IQ PICs 6.1 6.1 6.1 8.2 6.2 6.2 6.3 7.3 8.5
Fast Ethernet 6.1 6.0 6.0 8.2 6.2 6.0 6.3 7.0 8.5
PICs, 4-port
TX
PIC Type M10i M20 M40e M120 M320 T320 T640 Matrix T1600
Fast Ethernet 6.2 6.2 6.2 8.2 6.2 6.2 6.2 7.0 8.5
PICs
(aggregated)
Gigabit Ethernet 6.4 6.4 6.4 8.2 6.4 6.4 8.0 8.0 8.5
PICs with SFP,
1-port
Gigabit Ethernet 6.4 6.4 6.4 8.2 6.4 6.4 8.0 8.0 8.5
PICs with SFP,
1-port
Gigabit Ethernet 7.0 7.0 7.0 8.2 7.0 7.0 8.0 8.0 8.5
IQ PICs, 1-port
Gigabit Ethernet 7.6 – 7.6 8.2 7.6 7.6 7.6 7.6 8.5
IQ2 PICs, 4-port
TX
PIC Type M10i M20 M40e M120 M320 T320 T640 Matrix T1600
SONET/SDH 6.1 – – – – – – – –
OC3c/STM1
PICs, 2-port
Type 1
SONET/SDH 6.1 6.0 6.0 8.2 6.2 7.1 7.1 7.1 8.5
OC3c/STM1
PICs,4-port
Type 1
SONET/SDH 8.4 8.4 8.4 8.4 8.4 8.4 8.4 8.4 8.5
OC3/STM1
(Multi-Rate)
with SFP,
4–port Type 1
SONET/SDH 6.1 6.0 6.0 8.2 6.2 7.5 6.0 7.0 8.5
OC12c/STM4
SMIR PICs,
1-port Type 1
TX
PIC Type M10i M20 M40e M120 M320 T320 T640 Matrix T1600
SONET/SDH 8.4 8.4 8.4 8.4 8.4 8.4 8.4 8.4 8.5
OC12/STM4
(Multi-Rate)
with SFP, 1-port
Type 1
SONET/SDH 6.2 6.2 6.2 8.2 6.2 6.2 6.2 7.0 8.5
PICs
(aggregated)
TX
PIC Type M10i M20 M40e M120 M320 T320 T640 Matrix T1600
Tunnel Services 6.1 6.0 7.0 8.2 6.2 6.1 8.0 8.0 8.5
PICs, Type 1
When you enable graceful Routing Engine switchover, the command-line interface
(CLI) indicates which Routing Engine you are using. For example:
{master} [edit]
user@host#
When you configure graceful Routing Engine switchover, you can bring the backup
Routing Engine online after the master Routing Engine is already running. There is
no requirement to start the two Routing Engines simultaneously.
When a graceful Routing Engine switchover occurs, local statistics such as process
statistics and networking statistics are displayed as a cumulative value from the time
the process first came online. Because processes on the master Routing Engine can
start at different times from the processes on the backup Routing Engine, the statistics
on the two Routing Engines for the same process might differ. After a graceful Routing
Engine switchover, we recommend that you issue the clear interface statistics
(interface-name | all) command to reset the cumulative values for local statistics.
Forwarding statistics are not affected by graceful Routing Engine switchover.
For information about how to use the clear command to clear statistics and protocol
database information, see the JUNOS System Basics and Services Command Reference.
NOTE: The clear firewall command cannot be used to clear the Routing Engine filter
counters on a backup Routing Engine that is enabled for graceful Routing Engine
switchover.
This chapter provides a reference for the graceful Routing Engine switchover
configuration statement.
graceful-switchover
Syntax graceful-switchover;
Usage Guidelines See “Configuring Graceful Routing Engine Switchover” on page 53.
graceful-switchover ■ 55
JUNOS 8.5 High Availability Configuration Guide
56 ■ graceful-switchover
Part 4
Nonstop Bridging
■ Nonstop Bridging Overview on page 59
■ Nonstop Bridging Configuration Guidelines on page 63
■ Summary of Nonstop Bridging Statements on page 65
Nonstop Bridging ■ 57
JUNOS 8.5 High Availability Configuration Guide
58 ■ Nonstop Bridging
Chapter 8
Nonstop Bridging Overview
NOTE: To use nonstop bridging, you must first enable graceful Routing Engine
switchover on your routing platform. For more information about graceful Routing
Engine switchover, see “Graceful Routing Engine Switchover Overview” on page 41.
Figure 3 on page 60 shows the system architecture of nonstop bridging and the
process a routing platform follows to prepare for a switchover.
The switchover preparation process for nonstop bridging follows these steps:
1. The master Routing Engine starts.
2. The routing platform processes on the master Routing Engine (such as the chassis
process [chassisd] and the Layer 2 Control Protocol process [l2cpd]) start.
3. The Packet Forwarding Engine starts and connects to the master Routing Engine.
4. All state information is updated in the system.
5. The backup Routing Engine starts, including the chassis process (chassisd) and
the Layer 2 Control Protocol process (l2cpd).
6. The system determines whether graceful Routing Engine switchover and nonstop
bridging have been enabled.
7. The kernel synchronization process (ksyncd) synchronizes the backup Routing
Engine with the master Routing Engine.
8. For supported protocols, state information is updated directly between the l2cpds
on the master and backup Routing Engines.
Platform Support
Nonstop bridging is supported on MX-series Ethernet Services routers. Your system
must be running JUNOS Release 8.4 or later.
NOTE: All Routing Engines configured for nonstop bridging must be running the
same JUNOS software release.
Protocol Support
Nonstop bridging is supported for the following Layer 2 control protocols:
■ Spanning Tree Protocol (STP)
■ Rapid Spanning Tree Protocol (RSTP)
■ Multiple Spanning Tree Protocol (MSTP)
To disable nonstop routing, remove the nonstop-bridging statement from the [edit
protocols layer2–control] hierarchy level.
on the backup Routing Engine, the JUNOS system software displays a warning and
commits the candidate configuration.
When you configure nonstop bridging, you can bring the backup Routing Engine
online after the master Routing Engine is already running. There is no requirement
to start the two Routing Engines simultaneously.
nonstop-bridging
Syntax nonstop-bridging;
nonstop-bridging ■ 65
JUNOS 8.5 High Availability Configuration Guide
66 ■ nonstop-bridging
Part 5
Nonstop Routing
■ Nonstop Routing Overview on page 69
■ Nonstop Routing Configuration Guidelines on page 75
■ Summary of Nonstop Routing Configuration Statements on page 81
Nonstop Routing ■ 67
JUNOS 8.5 High Availability Configuration Guide
68 ■ Nonstop Routing
Chapter 11
Nonstop Routing Overview
NOTE: Because graceful restart helper mode (where a neighboring router assists in
a restart) is enabled by default (except for BGP), a router can both act as a helper
and be configured to support nonstop routing, although helper mode is not sustained
during a graceful Routing Engine switchover (GRES) event.
However, you cannot configure a router to undergo a graceful restart (by including
the graceful-restart statement at the [edit routing-options] hierarchy level) and configure
nonstop routing (by including the nonstop-routing option at the [edit routing-options]
hierarchy level) at the same time.
To obtain BGP helper mode support, you must first configure the router to undergo
a graceful restart. Therefore, when nonstop routing is enabled, BGP cannot provide
helper support.
NOTE: To use nonstop routing, you must first enable graceful Routing Engine
switchover on your routing platform. For more information about graceful Routing
Engine switchover, see “Graceful Routing Engine Switchover Overview” on page 41.
Figure 5 on page 70 shows the system architecture of nonstop routing and the process
a routing platform follows to prepare for a switchover.
The switchover preparation process for nonstop routing follows these steps:
1. The master Routing Engine starts.
2. The routing platform processes on the master Routing Engine (such as the chassis
process [chassisd] and the routing protocol process [rpd]) start.
3. The Packet Forwarding Engine starts and connects to the master Routing Engine.
4. All state information is updated in the system.
5. The backup Routing Engine starts, including the chassis process (chassisd) and
the routing protocol process (rpd).
6. The system determines whether graceful Routing Engine switchover and nonstop
routing have been enabled.
7. The kernel synchronization process (ksyncd) synchronizes the backup Routing
Engine with the master Routing Engine.
8. For supported protocols, state information is updated directly between the routing
protocol processes on the master and backup Routing Engines.
Platform Support
Nonstop routing is supported on the following routing platforms with dual Routing
Engines.
■ M10i router (JUNOS 8.4 or later)
■ M20 router (JUNOS 8.4 or later)
■ M40e router (JUNOS 8.4 or later)
■ M320 router (JUNOS 8.4 or later)
■ T320 router, T640 router, and TX Matrix platform (JUNOS 8.4 or later)
■ T1600 router (JUNOS 8.5 or later)
NOTE: All Routing Engines configured for nonstop routing must be running the same
JUNOS software release.
Protocol Support
Nonstop routing is supported for aggregate and static routes and for the following
protocols:
■ Border Gateway Protocol (BGP)
■ Intermediate System-to-Intermediate System (IS-IS)
■ Label Distribution Protocol (LDP)
■ Open Shortest Path First (OSPF)/OSPFv3
NOTE: If you configure a protocol that is not supported by nonstop routing, the
protocol operates as usual. When a switchover occurs, the state information for the
unsupported protocol is not preserved and must be refreshed using the normal
recovery mechanisms inherent in the protocol.
BFD Support
Routing protocols use bidirectional forwarding detection (BFD) for fast liveliness
detection of their neighbors. With nonstop routing enabled, BFD session state is
saved on both the master Routing Engine and the backup Routing Engine. When a
Routing Engine switchover event occurs, the BFD session state does not need to be
restarted and peer routers continue to interface with the routing platform as if no
change had occurred.
NOTE: BFD session states are saved only for clients using aggregate or static routes
or for BGP, IS-IS, or OSPF/OSPFv3. Nonstop routing must be enabled.
When a BFD session is distributed to the Packet Forwarding Engine, BFD packets
continue to be sent during a Routing Engine switchover. If non-distributed BFD
sessions are to be kept alive during a switchover, you must ensure that the session
failure detection time is greater than the Routing Engine switchover time. The
following BFD sessions are not distributed to the Packet Forwarding Engine: multi-hop
sessions, tunnel-encapsulated sessions, and sessions over aggregated Ethernet and
Integrated Routing and Bridging (IRB) interfaces.
NOTE: For BFD sessions to remain up during a Routing Engine switchover event
when nonstop routing is configured, the value for the minimum-interval configuration
statement (a BFD liveness detection parameter) must be at least 2500 msec for
Routing Engine-based sessions and at least 100 msec for distributed BFD sessions.
[edit routing-options]
nonstop-routing;
To disable nonstop routing, remove the nonstop-routing statement from the [edit
routing-options] hierarchy level.
To enable the routing platform to switch over to the backup Routing Engine when
the routing protocol process (rpd) fails rapidly three times in succession, include the
other-routing-engine statement at the [edit system processes routing failover] hierarchy
level.
For more information about the other-routing-engine statement, see the JUNOS System
Basics Configuration Guide.
[edit system]
commit synchronize;
If you try to commit the nonstop routing configuration without including the commit
synchronize statement, the commit fails.
If you issue the commit synchronize command at the [edit] hierarchy level on the
backup Routing Engine, the JUNOS system software displays a warning and commits
the candidate configuration.
When you configure nonstop routing, you can bring the backup Routing Engine
online after the master Routing Engine is already running. There is no requirement
to start the two Routing Engines simultaneously.
When you enable nonstop routing and issue routing-related operational mode
commands on the backup Routing Engine (such as show route, show bgp neighbor,
show ospf database, and so on), the output might not match the output of the same
commands issued on the master Routing Engine.
NOTE: The output from the show bgp summary command includes an OutQ field that
indicates the number of BGP packets that are queued to be transmitted to a particular
neighbor. The count is normally 0 because the queue is usually emptied quickly.
When nonstop routing is enabled, the value might be nonzero; this is normal.
To display BFD state replication status, issue the show bfd session command. The
replicated flag appears in the output for this command when a BFD session has been
replicated to the backup Routing Engine. For more information, see the JUNOS Routing
Protocols and Policies Command Reference.
To configure nonstop routing trace options for supported routing protocols, include
the nsr-synchronization statement at the [edit protocols protocol-name traceoptions flag]
hierarchy level and specify the detail, disable, receive, or send option.
[edit protocols]
bgp {
traceoptions {
flag nsr-synchronization [detail | disable | receive | send];
}
}
isis {
traceoptions {
flag nsr-synchronization [detail | disable | receive | send];
}
}
ldp {
traceoptions {
flag nsr-synchronization [detail | disable | receive | send];
}
}
(ospf | ospf3) {
traceoptions {
flag nsr-synchronization [detail | disable | receive | send];
}
}
To configure nonstop routing trace options for BFD sessions, include the
nsr-synchronization and nsr-packets statements at the [edit protocols bfd traceoptions
flag] hierarchy level.
[edit protocols]
bfd {
traceoptions {
flag nsr-synchronization;
flag nsr-packet;
}
}
After a graceful Routing Engine switchover, we recommend that you issue the clear
interface statistics (interface-name | all) command to reset the cumulative values for
local statistics on the new master Routing Engine.
[edit]
system commit {
synchronize;
}
chassis {
redundancy {
graceful-switchover; # This enables graceful Routing Engine switchover on the
routing platform.
}
}
interfaces {
so-0/0/0 {
unit 0 {
family inet {
address 10.0.1.1/30;
}
family iso;
}
}
so-0/0/1 {
unit 0 {
family inet {
address 10.1.1.1/30;
}
family iso;
}
}
so-0/0/2 {
unit 0 {
family inet {
address 10.2.1.1/30;
}
family iso;
}
}
so-0/0/3 {
unit 0 {
family inet {
address 10.3.1.1/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.2.1/32;
}
family iso {
address 49.0004.1921.6800.2001.00;
}
}
}
}
routing-options {
nonstop-routing; # This enables nonstop routing on the routing platform.
router-id 192.168.2.1;
autonomous-system 65432;
}
protocols {
bgp {
traceoptions {
flag nsr-synchronization detail; # This logs nonstop routing events for BGP.
}
local-address 192.168.2.1;
group external-group {
type external;
export BGP_export;
neighbor 192.168.1.1 {
family inet {
unicast;
}
peer-as 65103;
}
}
group internal-group {
type internal;
neighbor 192.168.10.1;
neighbor 192.168.11.1;
neighbor 192.168.12.1;
}
}
isis {
traceoptions {
flag nsr-synchronization detail; # This logs nonstop routing events for IS-IS.
}
interface all;
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
ospf {
traceoptions {
flag nsr-synchronization detail; # This logs nonstop routing events for OSPF.
}
area 0.0.0.0 {
interface all;
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
}
}
policy-options {
policy-statement BGP_export {
term direct {
from {
protocol direct;
}
then accept;
}
term final {
then reject;
}
}
}
This chapter provides a reference for each of the nonstop routing configuration
statements. The statements are organized alphabetically.
commit synchronize
NOTE: When you configure nonstop routing (NSR), you must include the commit
synchronize statement. Otherwise, the commit fails.
Usage Guidelines See “Synchronizing the Routing Engine Configuration” on page 76.
commit synchronize ■ 81
JUNOS 8.5 High Availability Configuration Guide
nonstop-routing
Syntax nonstop-routing;
82 ■ nonstop-routing
Chapter 13: Summary of Nonstop Routing Configuration Statements
traceoptions
Syntax traceoptions {
file name <replace> <size size> <files number > <no-stamp> <(world-readable |
no-world-readable)>;
flag flag <flag-modifier> <disable>;
}
To specify more than one tracing operation, include multiple flag statements.
Default If you do not include this statement, no global tracing operations are performed.
Options disable—(Optional) Disable the tracing operation. You can use this option to disable
a single operation when you have defined a broad group of tracing operations,
such as all.
file name—Name of the file to receive the output of the tracing operation. Enclose
the name within quotation marks. All files are placed in the directory /var/log.
We recommend that you place global routing protocol tracing output in the file
routing-log.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1,
and so on, until the maximum number of trace files is reached. Then the oldest
trace file is overwritten.
Range: 2 through 1000 files
Default: 2 files
If you specify a maximum number of files, you also must specify a maximum file
size with the size option.
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. The nonstop routing tracing options are:
■ nsr-packet—Detailed trace information for BFD nonstop routing only
■ nsr-synchronization—Tracing operations for nonstop routing
traceoptions ■ 83
JUNOS 8.5 High Availability Configuration Guide
flag-modifier—(Optional) Modifier for the tracing flag. Except for BFD sessions, you
can specify one or more of these modifiers:
■ detail—Detailed trace information
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes
(MB), or gigabytes (GB). When a trace file named trace-file reaches this size, it is
renamed trace-file.0. When the trace-file again reaches its maximum size,
trace-file.0 is renamed trace-file.1 and trace-file is renamed trace-file.0. This
renaming scheme continues until the maximum number of trace files is reached.
Then the oldest trace file is overwritten.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your system
Default: 128 KB
If you specify a maximum file size, you also must specify a maximum number of
trace files with the files option.
Usage Guidelines See “Tracing Nonstop Routing Synchronization Events” on page 77.
Required Privilege Level routing and trace—To view this statement in the configuration.
routing-control and trace-control—To add this statement to the configuration.
84 ■ traceoptions
Part 6
Graceful Restart
■ Graceful Restart Overview on page 87
■ Graceful Restart Configuration Guidelines on page 95
■ Summary of Graceful Restart Configuration Statements on page 133
Graceful Restart ■ 85
JUNOS 8.5 High Availability Configuration Guide
86 ■ Graceful Restart
Chapter 14
Graceful Restart Overview
Graceful restart enables a restarting router and its neighbors to continue forwarding
packets without disrupting network performance. Because neighboring routers assist
in the restart (these neighbors are called helper routers), the restarting router can
quickly resume full operation without recalculating algorithms.
Three main types of graceful restart are available on Juniper Networks routing
platforms:
■ Graceful restart for aggregate and static routes and for routing protocols—Provides
protection for aggregate and static routes and for Border Gateway Protocol (BGP),
End System-to-Intermediate System (ES-IS), Intermediate System-to-Intermediate
System (IS-IS), Open Shortest Path First (OSPF), Routing Information Protocol
(RIP), next-generation RIP (RIPng), and Protocol Independent Multicast (PIM)
sparse mode routing protocols.
■ Graceful restart for MPLS-related protocols—Provides protection for Label
Distribution Protocol (LDP), Resource Reservation Protocol (RSVP), circuit
cross-connect (CCC), and translational cross-connect (TCC).
NOTE: Graceful restart for BFD sessions is supported in the case where the router is
in helper mode. When the BFD session on the remote peer is running on its Packet
Forwarding Engine and it undergoes a graceful restart, the local peer can help the
remote peer with the graceful restart.
Graceful restart works similarly for routing protocols and MPLS protocols and
combines components of these protocol types to enable graceful restart in VPNs.
The main benefits of graceful restart are uninterrupted packet forwarding and
temporary suppression of all routing protocol updates. Graceful restart thus enables
a router to pass through intermediate convergence states that are hidden from the
rest of the network.
NOTE: Because graceful restart helper mode (where a neighboring router assists in
a restart) is enabled by default (except for BGP), a router can both act as a helper
and be configured to support nonstop routing, although helper mode is not sustained
during a graceful Routing Engine switchover (GRES) event.
However, you cannot configure a router to undergo a graceful restart (by including
the graceful-restart statement at the [edit routing-options] hierarchy level) and configure
nonstop routing (by including the nonstop-routing option at the [edit routing-options]
hierarchy level) at the same time.
To obtain BGP helper mode support, you must first configure the router to undergo
a graceful restart. Therefore, when nonstop routing is enabled, BGP cannot provide
helper support.
■ JUNOS Release 5.3 or later for aggregate route, BGP, IS-IS, OSPF, RIP, RIPng, or
static route graceful restart
■ JUNOS Release 5.5 or later for RSVP on egress provider edge (PE) routers
■ JUNOS Release 5.5 or later for LDP graceful restart
■ JUNOS Release 5.6 or later for the CCC, TCC, Layer 2 VPN, or Layer 3 VPN
implementations of graceful restart
■ JUNOS Release 6.1 or later for RSVP graceful restart on ingress PE routers
■ JUNOS Release 6.4 or later for PIM sparse mode graceful restart
■ JUNOS Release 7.4 or later for ES-IS graceful restart (J-series routing platform)
■ JUNOS Release 8.5 or later for BFD session (helper mode only) graceful restart
When you include the graceful-restart statement at the [edit routing-options] hierarchy
level, any static routes or aggregated routes that have been configured are protected.
Because there no helper router assists in the restart, these routes are retained in the
forwarding table while the router restarts (rather than being discarded or refreshed).
Routing Protocols
This section covers the following topics:
■ BGP on page 89
■ ES-IS on page 90
■ IS-IS on page 90
■ OSPF and OSPFv3 on page 90
■ PIM Sparse Mode on page 91
■ RIP and RIPng on page 91
BGP
When a router enabled for BGP graceful restart restarts, it retains BGP peer routes
in its forwarding table and marks them as stale. However, it continues to forward
traffic to other peers (or receiving peers) during the restart. To reestablish sessions,
the restarting router sets the “restart state” bit in the BGP OPEN message and sends
it to all participating peers. The receiving peers reply to the restarting router with
messages containing end-of-routing-table markers. When the restarting router receives
all replies from the receiving peers, the restarting router performs route selection,
the forwarding table is updated, and the routes previously marked as stale are
discarded. At this point, all BGP sessions are reestablished and the restarting peer
can receive and process BGP messages as usual.
While the restarting router does its processing, the receiving peers also temporarily
retain routing information. When a receiving peer detects a TCP transport reset, it
retains the routes received and marks the routes as stale. After the session is
reestablished with the restarting router, the stale routes are replaced with updated
route information.
ES-IS
When graceful restart for ES-IS is enabled, the routes to end systems or intermediate
systems are not removed from the forwarding table. The adjacencies are reestablished
after restart is complete.
IS-IS
Normally, IS-IS routers move neighbor adjacencies to the down state when changes
occur. However, a router enabled for IS-IS graceful restart sends out Hello messages
with the Restart Request (RR) bit set in a restart type length value (TLV) message.
This indicates to neighboring routers that a graceful restart is in progress and to leave
the IS-IS adjacency intact. The neighboring routers must interpret and implement
restart signaling themselves. Besides maintaining the adjacency, the neighbors send
complete sequence number PDUs (CSNPs) to the restarting router and flood their
entire database.
The restarting router never floods any of its own link-state PDUs (LSPs), including
pseudonode LSPs, to IS-IS neighbors while undergoing graceful restart. This enables
neighbors to reestablish their adjacencies without transitioning to the down state
and enables the restarting router to reinitiate a smooth database synchronization.
When the restarting router receives replies from all the helper routers, the restarting
router selects routes, updates the forwarding table, and discards the old routes. At
this point, full OSPF adjacencies are reestablished and the restarting router receives
and processes OSPF LSAs as usual. When the helper routers no longer receive grace
LSAs from the restarting router or the topology of the network changes, the helper
routers also resume normal operation.
90 ■ Routing Protocols
Chapter 14: Graceful Restart Overview
The restart phase completes when either the PIM state becomes stable or when the
restart interval timer expires. If the neighbors do not support graceful restart or
connect to each other using multipoint interfaces, the restarting router uses the restart
interval timer to define the restart period.
MPLS-Related Protocols
This section contains the following topics:
■ LDP on page 91
■ RSVP on page 92
■ CCC and TCC on page 92
LDP
LDP graceful restart enables a router whose LDP control plane is undergoing a restart
to continue to forward traffic while recovering its state from neighboring routers. It
also enables a router on which helper mode is enabled to assist a neighboring router
that is attempting to restart LDP.
During session initialization, a router advertises its ability to perform LDP graceful
restart or to take advantage of a neighbor performing LDP graceful restart by sending
the graceful restart TLV. This TLV contains two fields relevant to LDP graceful restart:
the reconnect time and the recovery time. The values of the reconnect and recovery
times indicate the graceful restart capabilities supported by the router.
The reconnect time is configured in the JUNOS software as 60 seconds and is not
user-configurable. The reconnect time is how long the helper router waits for the
restarting router to establish a connection. If the connection is not established within
the reconnect interval, graceful restart for the LDP session is terminated. The
maximum reconnect time is 120 seconds and is not user-configurable. The maximum
reconnect time is the maximum value that a helper router accepts from its restarting
neighbor.
MPLS-Related Protocols ■ 91
JUNOS 8.5 High Availability Configuration Guide
When a router discovers that a neighboring router is restarting, it waits until the end
of the recovery time before attempting to reconnect. The recovery time is the length
of time a router waits for LDP to restart gracefully. The recovery time period begins
when an initialization message is sent or received. This time period is also typically
the length of time that a neighboring router maintains its information about the
restarting router, so it can continue to forward traffic.
You can configure LDP graceful restart both in the master instance for the LDP
protocol and for a specific routing instance. You can disable graceful restart at the
global level for all protocols, at the protocol level for LDP only, and for a specific
routing instance only.
RSVP
RSVP graceful restart enables a router undergoing a restart to inform its adjacent
neighbors of its condition. The restarting router requests a grace period from the
neighbor or peer, which can then cooperate with the restarting router. The restarting
router can still forward MPLS traffic during the restart period; convergence in the
network is not disrupted. The restart is not visible to the rest of the network, and the
restarting router is not removed from the network topology. RSVP graceful restart
can be enabled on both transit routers and ingress routers. It is available for both
point-to-point LSPs and point-to-multipoint LSPs.
RSVP graceful restart must be enabled on the provider edge (PE) routers and provider
(P) routers to enable graceful restart for CCC and TCC. Also, because RSVP is used
as the signaling protocol for signaling label information, the neighboring router must
use helper mode to assist with the RSVP restart procedures.
Before VPN graceful restart can work properly, all of the components must restart
gracefully. In other words, the routers must preserve their forwarding states and
request neighbors to continue forwarding to the router in case of a restart. If all of
the conditions are satisfied, VPN graceful restart imposes the following rules on a
restarting router:
■ The router must wait to receive all BGP NLRI information from other PE routers
before advertising routes to the CE routers.
■ The router must wait for all protocols in all routing instances to converge (or
complete the restart process) before it sends CE router information to other PE
routers. In other words, the router must wait for all instance information (whether
derived from local configuration or advertisements received from a remote peer)
to be processed before it sends this information to other PE routers.
■ The router must preserve all forwarding state in the instance.mpls.0 tables until
the new labels and transit routes are allocated and announced to other PE routers
(and CE routers in a carrier-of-carriers scenario).
If any condition is not met, VPN graceful restart does not succeed in providing
uninterrupted forwarding between CE routers across the VPN infrastructure.
Logical Routers
Graceful restart for a logical router functions much as graceful restart does in the
main router. The only difference is the location of the graceful-restart statement:
■ For a logical router, include the graceful-restart statement at the [edit logical-routers
logical-router-name routing-options] hierarchy level.
■ For a routing instance inside a logical router, include the graceful-restart statement
at both the [edit logical-routers logical-router-name routing-options] and [edit
logical-routers logical-router-name routing-instances instance-name routing-options]
hierarchy levels.
Logical Routers ■ 93
JUNOS 8.5 High Availability Configuration Guide
94 ■ Logical Routers
Chapter 15
Graceful Restart Configuration Guidelines
To configure graceful restart for aggregate and static routes, include the graceful-restart
statement at the [edit routing-options] hierarchy level. To disable graceful restart,
include the disable statement at the [edit routing-options graceful-restart] hierarchy
level.
[edit]
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
To disable graceful restart globally, include the disable statement at the [edit
routing-options graceful-restart] hierarchy level.
When graceful restart is enabled for all routing protocols at the [edit routing-options
graceful-restart] hierarchy level, you can disable graceful restart on a per-protocol
basis.
NOTE: If you configure graceful restart after a BGP session has been established, the
BGP session restarts and the peers negotiate graceful restart capabilities.
[edit]
protocols {
bgp {
graceful-restart {
disable;
restart-time seconds;
stale-routes-time seconds;
}
}
}
To disable BGP graceful restart capability for all BGP sessions, include the disable
statement at the [edit protocols bgp graceful-restart] hierarchy level.
NOTE: To set BGP graceful restart properties or disable them for a group, include
the desired statements at the [edit protocols bgp group group-name graceful-restart]
hierarchy level.
To set BGP graceful restart properties or disable them for a specific neighbor in a
group, include the desired statements at the [edit protocols bgp group group-name
neighbor ip-address graceful-restart] hierarchy level.
[edit]
protocols {
esis {
graceful-restart {
disable;
restart-duration seconds;
}
}
}
To disable ES-IS graceful restart capability, include the disable statement at the [edit
protocols esis graceful-restart] hierarchy level.
[edit]
protocols {
isis {
graceful-restart {
disable;
helper-disable;
restart-duration seconds;
}
}
}
To disable IS-IS graceful restart helper capability, include the helper-disable statement
at the [edit protocols isis graceful-restart] hierarchy level. To disable IS-IS graceful
restart capability, include the disable statement at the [edit protocols isis
graceful-restart] hierarchy level.
NOTE: If you configure Bidirectional Forwarding Detection (BFD) and graceful restart
for IS-IS, graceful restart might not work as expected.
NOTE: You can also track graceful restart events with the traceoptions statement at
the [edit protocols isis] hierarchy level. For more information, see “Tracking Graceful
Restart Events” on page 100.
[edit]
protocols {
ospf {
graceful-restart {
disable;
helper-disable;
no-strict-lsa-checking
notify-duration seconds;
restart-duration seconds;
}
}
}
To disable OSPF/OSPFv3 graceful restart, include the disable statement at the [edit
protocols (ospf | ospf3) graceful-restart] hierarchy level. To disable the OSPF helper
capability, include the helper-disable statement at the [edit protocols (ospf | ospf3)
graceful-restart] hierarchy level.
NOTE: You can also track graceful restart events with the traceoptions statement at
the [edit protocols (ospf | ospf3)] hierarchy level. For more information, see “Tracking
Graceful Restart Events” on page 100.
NOTE: You cannot enable OSPFv3 graceful restart between a routing platform running
JUNOS Release 7.5 and earlier and a routing platform running JUNOS 7.6 or later.
As a workaround, make sure both routing platforms use the same JUNOS software
version.
NOTE: If you configure BFD and graceful restart for OSPF, graceful restart might not
work as expected.
[edit]
protocols {
(rip | ripng) {
graceful-restart {
disable;
restart-time seconds;
}
}
}
To disable RIP or RIPng graceful restart capability, include the disable statement at
the [edit protocols (rip | ripng) graceful-restart] hierarchy level.
PIM sparse mode-enabled routing platforms generate a unique 32-bit random number
called a generation identifier. Generation identifiers are included by default in PIM
hello messages, as specified in the IETF Internet draft Protocol Independent Multicast
- Sparse Mode (PIM-SM): Protocol Specification (Revised). When a routing platform
receives PIM hellos containing generation identifiers on a point-to-point interface,
the JUNOS software activates an algorithm that optimizes graceful restart.
Before PIM sparse mode graceful restart occurs, each routing platform creates a
generation identifier and sends it to its multicast neighbors. If a PIM sparse
mode-enabled routing platform restarts, it creates a new generation identifier and
sends it to its neighbors. When a neighbor receives the new identifier, it resends
multicast updates to the restarting router to allow it to exit graceful restart efficiently.
The restart phase completes when either the PIM state becomes stable or when the
restart interval timer expires.
To configure the duration of the PIM graceful restart period, include the restart-duration
statement at the [edit protocols pim graceful-restart] hierarchy level.
[edit]
protocols {
pim {
graceful-restart {
disable;
restart-duration seconds;
}
}
}
To disable PIM sparse mode graceful restart capability, include the disable statement
at the [edit protocols pim graceful-restart] hierarchy level.
NOTE: Multicast forwarding can be interrupted in two ways. First, if the underlying
routing protocol is unstable, multicast reverse-path-forwarding (RPF) checks can fail
and cause an interruption. Second, because the forwarding table is not updated
during the graceful restart period, new multicast streams are not forwarded until
graceful restart is complete.
[edit protocols]
isis {
traceoptions {
flag graceful-restart;
}
}
(ospf | ospf3) {
traceoptions {
flag graceful-restart;
}
}
[edit]
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
NOTE: Because graceful restart helper mode (where a neighboring router assists in
a restart) is enabled by default (except for BGP), a router can both act as a helper
and be configured to support nonstop routing, although helper mode is not sustained
during a graceful Routing Engine switchover (GRES) event.
However, you cannot configure a router to undergo a graceful restart (by including
the graceful-restart statement at the [edit routing-options] hierarchy level) and configure
nonstop routing (by including the nonstop-routing option at the [edit routing-options]
hierarchy level) at the same time.
To obtain BGP helper mode support, you must first configure the router to undergo
a graceful restart. Therefore, when nonstop routing is enabled, BGP cannot provide
helper support.
To disable graceful restart globally, include the disable statement at the [edit
routing-options graceful-restart] hierarchy level.
To configure how long the router retains the state of its RSVP neighbors while they
undergo a graceful restart, include the maximum-helper-recovery-time statement at the
[edit protocols rsvp graceful-restart] hierarchy level. This value is applied to all
neighboring routers, so it should be based on the time required by the slowest RSVP
neighbor to recover.
To configure the delay between when the router discovers that a neighboring router
has gone down and when it declares the neighbor down, include the
maximum-helper-restart-time statement at the [edit protocols rsvp graceful-restart]
hierarchy level. This value is applied to all neighboring routers, so it should be based
on the time required by the slowest RSVP neighbor to restart.
[edit]
protocols {
rsvp {
graceful-restart {
disable;
helper-disable;
maximum-helper-recovery-time;
maximum-helper-restart-time;
}
}
}
NOTE: Because graceful restart helper mode (where a neighboring router assists in
a restart) is enabled by default (except for BGP), a router can both act as a helper
and be configured to support nonstop routing, although helper mode is not sustained
during a graceful Routing Engine switchover (GRES) event.
However, you cannot configure a router to undergo a graceful restart (by including
the graceful-restart statement at the [edit routing-options] hierarchy level) and configure
nonstop routing (by including the nonstop-routing option at the [edit routing-options]
hierarchy level) at the same time.
To obtain BGP helper mode support, you must first configure the router to undergo
a graceful restart. Therefore, when nonstop routing is enabled, BGP cannot provide
helper support.
To disable RSVP, CCC, and TCC graceful restart, include the disable statement at the
[edit protocols rsvp graceful-restart] hierarchy level. To disable RSVP, CCC, and TCC
helper capability, include the helper-disable statement at the [edit protocols rsvp
graceful-restart] hierarchy level.
On the helper router, you can configure a statement that overrides the request from
the restarting router and sets the maximum amount of time the helper router will
maintain the old forwarding state. To configure this feature, include the
maximum-recovery-time statement at the [edit protocols ldp graceful-restart] hierarchy
level.
[edit]
protocols {
ldp {
graceful-restart {
disable;
helper-disable;
maximum-recovery-time seconds;
recovery-time seconds;
}
}
NOTE: The value for the recovery-time and maximum-recovery-time statements at the
[edit protocols ldp graceful-restart] hierarchy level should be approximately 80 seconds
longer than the value for the restart-duration statement at the [edit routing-options
graceful-restart] hierarchy level. Otherwise, a warning message appears when you
try to commit the configuration.
To disable LDP graceful restart capability, include the disable statement at the [edit
protocols ldp graceful-restart] hierarchy level. To disable LDP graceful restart helper
capability, include the helper-disable statement at the [edit protocols ldp graceful-restart]
hierarchy level.
[edit]
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
To disable graceful restart globally, include the disable statement at the [edit
routing-options graceful-restart] hierarchy level.
[edit]
routing-instances {
instance-name {
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
}
}
You can disable graceful restart for individual protocols with the disable statement
at the [edit routing-instances instance-name protocols protocol-name graceful-restart]
hierarchy level.
[edit]
logical-routers {
logical-router-name {
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
}
}
To disable graceful restart globally, include the disable statement at the [edit
logical-routers logical-router-name routing-options graceful-restart] hierarchy level.
[edit]
logical-routers {
logical-router-name {
routing-instances {
instance-name {
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
}
}
}
}
To disable graceful restart for individual protocols with the disable statement at the
[edit logical-routers logical-router-name routing-instances instance-name protocols
protocol-name graceful-restart] hierarchy level.
PE1-PE2-3 tlsp Up
PE2-PE1-3 rlsp Up
Router CE1 On Router CE1, configure the following protocols on the logical interfaces of t3-3/1/0:
OSPF on unit 101, RIP on unit 102, BGP on unit 103, and IS-IS on unit 512. Also
configure graceful restart, BGP, IS-IS, OSPF, and RIP on the main instance to be able
to connect to the routing instances on Router PE1.
[edit]
interfaces {
t3-3/1/0 {
encapsulation frame-relay;
unit 100 {
dlci 100;
family inet {
address 10.96.100.2/30;
}
}
unit 101 {
dlci 101;
family inet {
address 10.96.101.2/30;
}
}
unit 102 {
dlci 102;
family inet {
address 10.96.102.2/30;
}
}
unit 103 {
dlci 103;
family inet {
address 10.96.103.2/30;
}
}
unit 512 {
dlci 512;
family inet {
address 10.96.252.1/30;
}
}
}
lo0 {
unit 0 {
family inet {
address 10.245.14.172/32;
primary;
}
address 10.96.110.1/32;
address 10.96.111.1/32;
address 10.96.112.1/32;
address 10.96.113.1/32;
address 10.96.116.1/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.0102.4501.4172.00;
}
}
}
routing-options {
graceful-restart;
autonomous-system 65100;
}
protocols {
bgp {
group CE-PE-INET {
type external;
export BGP_INET_LB_DIRECT;
neighbor 10.96.103.1 {
local-address 10.96.103.2;
family inet {
unicast;
}
peer-as 65103;
}
}
}
isis {
export ISIS_L2VPN_LB_DIRECT;
interface t3-3/1/0.512;
}
ospf {
export OSPF_LB_DIRECT;
area 0.0.0.0 {
interface t3-3/1/0.101;
}
}
rip {
group RIP {
export RIP_LB_DIRECT;
neighbor t3-3/1/0.102;
}
}
}
policy-options {
policy-statement OSPF_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter 10.96.101.0/30 exact;
route-filter 10.96.111.1/32 exact;
}
then accept;
}
term final {
then reject;
}
}
policy-statement RIP_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter 10.96.102.0/30 exact;
route-filter 10.96.112.1/32 exact;
}
then accept;
}
term final {
then reject;
}
}
policy-statement BGP_INET_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter 10.96.103.0/30 exact;
route-filter 10.96.113.1/32 exact;
}
then accept;
}
term final {
then reject;
}
}
policy-statement ISIS_L2VPN_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter 10.96.116.1/32 exact;
}
then accept;
}
term final {
then reject;
}
}
}
Router PE1 On Router PE1, configure graceful restart in the master instance, along with BGP,
OSPF, MPLS, and LDP. Next, configure several protocol-specific instances of graceful
restart. By including instances for BGP, OSPF, Layer 2 VPNs, RIP, and static routes,
you can observe the wide range of options available when you implement graceful
restart. Configure the following protocols in individual instances on the logical
interfaces of t3-0/0/0: a static route on unit 100, OSPF on unit 101, RIP on unit 102,
BGP on unit 103, and Frame Relay on unit 512 for the Layer 2 VPN instance.
[edit]
interfaces {
t3-0/0/0 {
dce;
encapsulation frame-relay-ccc;
unit 100 {
dlci 100;
family inet {
address 10.96.100.1/30;
}
family mpls;
}
unit 101 {
dlci 101;
family inet {
address 10.96.101.1/30;
}
family mpls;
}
unit 102 {
dlci 102;
family inet {
address 10.96.102.1/30;
}
family mpls;
}
unit 103 {
dlci 103;
family inet {
address 10.96.103.1/30;
}
family mpls;
}
unit 512 {
encapsulation frame-relay-ccc;
dlci 512;
}
}
t1-0/1/0 {
unit 0 {
family inet {
address 10.96.0.2/30;
}
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address 10.245.14.176/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.0102.4501.4176.00;
}
}
}
}
routing-options {
graceful-restart;
router-id 10.245.14.176;
autonomous-system 69;
}
protocols {
mpls {
interface all;
}
bgp {
group PEPE {
type internal;
neighbor 10.245.14.182 {
local-address 10.245.14.176;
family inet-vpn {
unicast;
}
family l2vpn {
unicast;
}
}
}
}
ospf {
area 0.0.0.0 {
interface t1-0/1/0.0;
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
}
ldp {
interface all;
}
}
policy-options {
policy-statement STATIC-import {
from community STATIC;
then accept;
}
policy-statement STATIC-export {
then {
community add STATIC;
accept;
}
}
policy-statement OSPF-import {
from community OSPF;
then accept;
}
policy-statement OSPF-export {
then {
community add OSPF;
accept;
}
}
policy-statement RIP-import {
from community RIP;
then accept;
}
policy-statement RIP-export {
then {
community add RIP;
accept;
}
}
policy-statement BGP-INET-import {
from community BGP-INET;
then accept;
}
policy-statement BGP-INET-export {
then {
community add BGP-INET;
accept;
}
}
policy-statement L2VPN-import {
from community L2VPN;
then accept;
}
policy-statement L2VPN-export {
then {
community add L2VPN;
accept;
}
}
community BGP-INET members target:69:103;
community L2VPN members target:69:512;
community OSPF members target:69:101;
community RIP members target:69:102;
community STATIC members target:69:100;
}
routing-instances {
BGP-INET {
instance-type vrf;
interface t3-0/0/0.103;
route-distinguisher 10.245.14.176:103;
vrf-import BGP-INET-import;
vrf-export BGP-INET-export;
routing-options {
graceful-restart;
autonomous-system 65103;
}
protocols {
bgp {
group BGP-INET {
type external;
export BGP-INET-import;
neighbor 10.96.103.2 {
local-address 10.96.103.1;
family inet {
unicast;
}
peer-as 65100;
}
}
}
}
}
L2VPN {
instance-type l2vpn;
interface t3-0/0/0.512;
route-distinguisher 10.245.14.176:512;
vrf-import L2VPN-import;
vrf-export L2VPN-export;
protocols {# There is no graceful-restart statement for Layer 2 VPN instances.
l2vpn {
encapsulation-type frame-relay;
site CE1-ISIS {
site-identifier 512;
interface t3-0/0/0.512 {
remote-site-id 612;
}
}
}
}
}
OSPF {
instance-type vrf;
interface t3-0/0/0.101;
route-distinguisher 10.245.14.176:101;
vrf-import OSPF-import;
vrf-export OSPF-export;
routing-options {
graceful-restart;
}
protocols {
ospf {
export OSPF-import;
area 0.0.0.0 {
interface all;
}
}
}
}
RIP {
instance-type vrf;
interface t3-0/0/0.102;
route-distinguisher 10.245.14.176:102;
vrf-import RIP-import;
vrf-export RIP-export;
routing-options {
graceful-restart;
}
protocols {
rip {
group RIP {
export RIP-import;
neighbor t3-0/0/0.102;
}
}
}
}
STATIC {
instance-type vrf;
interface t3-0/0/0.100;
route-distinguisher 10.245.14.176:100;
vrf-import STATIC-import;
vrf-export STATIC-export;
routing-options {
graceful-restart;
static {
route 10.96.110.1/32 next-hop t3-0/0/0.100;
}
}
}
}
Router P0 On Router P0, configure graceful restart in the main instance, along with OSPF,
MPLS, and LDP. This allows the protocols on the PE routers to reach each other.
[edit]
interfaces {
t3-0/1/3 {
unit 0 {
family inet {
address 10.96.0.5/30;
}
family mpls;
}
}
t1-0/2/0 {
unit 0 {
family inet {
address 10.96.0.1/30;
}
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address 10.245.14.174/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.0102.4501.4174.00;
}
}
}
}
routing-options {
graceful-restart;
router-id 10.245.14.174;
autonomous-system 69;
}
protocols {
mpls {
interface all;
}
ospf {
area 0.0.0.0 {
interface t1-0/2/0.0;
interface t3-0/1/3.0;
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
}
ldp {
interface all;
}
}
Router PE2 On Router PE2, configure BGP, OSPF, MPLS, LDP, and graceful restart in the master
instance. Configure the following protocols in individual instances on the logical
interfaces of t1-0/1/3: a static route on unit 200, OSPF on unit 201, RIP on unit 202,
BGP on unit 203, and Frame Relay on unit 612 for the Layer 2 VPN instance. Also
configure protocol-specific graceful restart in all routing instances, except the Layer 2
VPN instance.
[edit]
interfaces {
t3-0/0/0 {
unit 0 {
family inet {
address 10.96.0.6/30;
}
family mpls;
}
}
t1-0/1/3 {
dce;
encapsulation frame-relay-ccc;
unit 200 {
dlci 200;
family inet {
address 10.96.200.1/30;
}
family mpls;
}
unit 201 {
dlci 201;
family inet {
address 10.96.201.1/30;
}
family mpls;
}
unit 202 {
dlci 202;
family inet {
address 10.96.202.1/30;
}
family mpls;
}
unit 203 {
dlci 203;
family inet {
address 10.96.203.1/30;
}
family mpls;
}
unit 612 {
encapsulation frame-relay-ccc;
dlci 612;
}
}
lo0 {
unit 0 {
family inet {
address 10.245.14.182/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.0102.4501.4182.00;
}
}
}
}
routing-options {
graceful-restart;
router-id 10.245.14.182;
autonomous-system 69;
}
protocols {
mpls {
interface all;
}
bgp {
group PEPE {
type internal;
neighbor 10.245.14.176 {
local-address 10.245.14.182;
family inet-vpn {
unicast;
}
family l2vpn {
unicast;
}
}
}
}
ospf {
area 0.0.0.0 {
interface t3-0/0/0.0;
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
}
ldp {
interface all;
}
policy-options {
policy-statement STATIC-import {
from community STATIC;
then accept;
}
policy-statement STATIC-export {
then {
community add STATIC;
accept;
}
}
policy-statement OSPF-import {
from community OSPF;
then accept;
}
policy-statement OSPF-export {
then {
community add OSPF;
accept;
}
}
policy-statement RIP-import {
from community RIP;
then accept;
}
policy-statement RIP-export {
then {
}
L2VPN {
instance-type l2vpn;
interface t1-0/1/3.612;
route-distinguisher 10.245.14.182:612;
vrf-import L2VPN-import;
vrf-export L2VPN-export;
protocols {# There is no graceful-restart statement for Layer 2 VPN instances.
l2vpn {
encapsulation-type frame-relay;
site CE2-ISIS {
site-identifier 612;
interface t1-0/1/3.612 {
remote-site-id 512;
}
}
}
}
}
OSPF {
instance-type vrf;
interface t1-0/1/3.201;
route-distinguisher 10.245.14.182:201;
vrf-import OSPF-import;
vrf-export OSPF-export;
routing-options {
graceful-restart;
}
protocols {
ospf {
export OSPF-import;
area 0.0.0.0 {
interface all;
}
}
}
}
RIP {
instance-type vrf;
interface t1-0/1/3.202;
route-distinguisher 10.245.14.182:202;
vrf-import RIP-import;
vrf-export RIP-export;
routing-options {
graceful-restart;
}
protocols {
rip {
group RIP {
export RIP-import;
neighbor t1-0/1/3.202;
}
}
}
}
STATIC {
instance-type vrf;
interface t1-0/1/3.200;
route-distinguisher 10.245.14.182:200;
vrf-import STATIC-import;
vrf-export STATIC-export;
routing-options {
graceful-restart;
static {
route 10.96.210.1/32 next-hop t1-0/1/3.200;
}
}
}
}
}
Router CE2 On Router CE2, complete the Layer 2 and Layer 3 VPN configuration by mirroring
the protocols already set on PE2 and CE1. Specifically, configure the following on
the logical interfaces of t1-0/0/3: OSPF on unit 201, RIP on unit 202, BGP on unit
203, and IS-IS on unit 612. Finally, configure graceful restart, BGP, IS-IS, OSPF, and
RIP on the main instance to be able to connect to the routing instances on PE2.
[edit]
interfaces {
t1-0/0/3 {
encapsulation frame-relay;
unit 200 {
dlci 200;
family inet {
address 10.96.200.2/30;
}
}
unit 201 {
dlci 201;
family inet {
address 10.96.201.2/30;
}
}
unit 202 {
dlci 202;
family inet {
address 10.96.202.2/30;
}
}
unit 203 {
dlci 203;
family inet {
address 10.96.203.2/30;
}
}
unit 512 {
dlci 512;
family inet {
address 10.96.252.2/30;
}
}
}
lo0 {
unit 0 {
family inet {
address 10.245.14.180/32 {
primary;
}
address 10.96.210.1/32;
address 10.96.111.1/32;
address 10.96.212.1/32;
address 10.96.213.1/32;
address 10.96.216.1/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.0102.4501.4180.00;
}
}
}
}
routing-options {
graceful-restart;
autonomous-system 65200;
}
protocols {
bgp {
group CE-PE-INET {
type external;
export BGP_INET_LB_DIRECT;
neighbor 10.96.203.1 {
local-address 10.96.203.2;
family inet {
unicast;
}
peer-as 65203;
}
}
}
isis {
export ISIS_L2VPN_LB_DIRECT;
interface t1-0/0/3.612;
}
ospf {
export OSPF_LB_DIRECT;
area 0.0.0.0 {
interface t1-0/0/3.201;
}
}
rip {
group RIP {
export RIP_LB_DIRECT;
neighbor t1-0/0/3.202;
}
}
}
policy-options {
policy-statement OSPF_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter 10.96.201.0/30 exact;
route-filter 10.96.211.1/32 exact;
}
then accept;
}
term final {
then reject;
}
}
policy-statement RIP_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter 10.96.202.0/30 exact;
route-filter 10.96.212.1/32 exact;
}
then accept;
}
term final {
then reject;
}
}
policy-statement BGP_INET_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter 10.96.203.0/30 exact;
route-filter 10.96.213.1/32 exact;
}
then accept;
}
term final {
then reject;
}
}
policy-statement ISIS_L2VPN_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter 10.96.216.1/32 exact;
}
then accept;
}
term final {
then reject;
}
}
}
Router PE1 Status The following example displays neighbor relationships on Router PE1 before a restart
Before a Restart happens:
Output Queue[8]: 0
Router PE1 Status Before you can verify that graceful restart is working, you must simulate a router
During a Restart restart. To cause the routing process to refresh and simulate a restart, use the restart
routing operational mode command:
Vrf-export: [ STATIC-export ]
Tables:
STATIC.inet.0 : 4 routes (4 active, 0 holddown, 0 hidden)
Restart Pending: VPN
__juniper_private1__:
Router ID: 0.0.0.0
Type: forwarding State: Active
10.245.14.176:512:512:611/96
*[L2VPN/7] 00:00:13
Discard
bgp.l2vpn.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Restart Pending: BGP VPN
This chapter provides a reference for each of the graceful restart configuration
statements. The statements are organized alphabetically.
disable
Syntax disable;
Hierarchy Level [edit logical-routers logical-router-name protocols (bgp | isis | ldp | ospf | ospf3 | pim | rip
| ripng | rsvp) graceful-restart],
[edit logical-routers logical-router-name routing-instances routing-instance-name protocols
(bgp | ldp | ospf | ospf3 | pim) graceful-restart],
[edit protocols (bgp | esis | isis | ospf | ospf3 | ldp | pim | rip | ripng | rsvp) graceful-restart],
[edit protocols bgp group group-name graceful-restart],
[edit protocols bgp group group-name neighbor ip-address graceful-restart],
[edit routing-instances routing-instance-name protocols (bgp | ldp | ospf | ospf3 | pim)
graceful-restart],
[edit routing-instances routing-instance-name routing-options graceful-restart],
[edit routing-options graceful-restart]
disable ■ 133
JUNOS 8.5 High Availability Configuration Guide
graceful-restart
Syntax graceful-restart {
disable;
helper-disable;
maximum-helper-recovery-time seconds;
maximum-helper-restart-time seconds;
notify-duration seconds;
recovery-time seconds;
restart-duration seconds;
stale-routes-time seconds;
}
Hierarchy Level [edit logical-routers logical-router-name protocols (bgp | isis | ldp | ospf | ospf3 | pim | rip
| ripng | rsvp)],
[edit logical-routers logical-router-name routing-instances routing-instance-name protocols
(bgp | ldp | ospf | ospf3 | pim)],
[edit logical-routers logical-router-name routing-instances routing-instance-name
routing-options],
[edit protocols (bgp | esis | isis | ospf | ospf3 | ldp | pim | rip | ripng | rsvp)],
[edit protocols bgp group group-name],
[edit protocols bgp group group-name neighbor ip-address],
[edit routing-instances routing-instance-name protocols (bgp | ldp | ospf | ospf3 | pim)],
[edit routing-options]
134 ■ graceful-restart
Chapter 16: Summary of Graceful Restart Configuration Statements
helper-disable
Syntax helper-disable;
Hierarchy Level [edit logical-routers logical-router-name protocols (isis | ldp | ospf | ospf3 | rsvp)
graceful-restart],
[edit logical-routers logical-router-name routing-instances routing-instance-name protocols
(ldp | ospf | ospf3)] graceful-restart],
[edit protocols (isis | ldp | ospf | ospf3 | rsvp) graceful-restart],
[edit routing-instances routing-instance-name protocols (ldp | ospf | ospf3) graceful-restart]
Default Helper mode is enabled by default for these supported protocols: Intermediate
System-to-Intermediate System, Label Distribution Protocol, OSPF/OSPFv3, and
RSVP.
maximum-helper-recovery-time
Options seconds—Amount of time, in seconds, the router retains the state of its Resource
Reservation Protocol (RSVP) neighbors while they undergo a graceful restart.
Range: 1 through 3600 seconds
Default: 180 seconds
Usage Guidelines See “Configuring Graceful Restart Options for RSVP, CCC, and TCC” on page 101.
helper-disable ■ 135
JUNOS 8.5 High Availability Configuration Guide
maximum-helper-restart-time
Options seconds—Number of seconds the router waits after it discovers that a neighboring
router has gone down before it declares the neighbor down.
Range: 1 through 1800 seconds
Default: 180 seconds
Usage Guidelines See “Configuring Graceful Restart Options for RSVP, CCC, and TCC” on page 101.
maximum-recovery-time
Options seconds—Time, in seconds, the router retains the state of its LDP neighbors while
they undergo a graceful restart.
Range: 140 through 1900 seconds
Default: 140 seconds
Usage Guidelines See “Configuring Graceful Restart Options for LDP” on page 102.
136 ■ maximum-helper-restart-time
Chapter 16: Summary of Graceful Restart Configuration Statements
notify-duration
Options seconds—Amount of time in seconds, the router notifies helper OSPF routers that it
has completed graceful restart.
Range: 1 through 3600 seconds
Default: 180 seconds
Usage Guidelines See “Configuring Graceful Restart Options for OSPF and OSPFv3” on page 98.
no-strict-lsa-checking
Syntax no-strict-lsa-checking;
Usage Guidelines See “Configuring Graceful Restart Options for OSPF and OSPFv3” on page 98
notify-duration ■ 137
JUNOS 8.5 High Availability Configuration Guide
recovery-time
Options seconds—Time, in seconds, the router waits for LDP to restart gracefully.
Range: 120 through 1800 seconds
Default: 140 seconds
Usage Guidelines See “Configuring Graceful Restart Options for LDP” on page 102.
138 ■ recovery-time
Chapter 16: Summary of Graceful Restart Configuration Statements
restart-duration
Hierarchy Level [edit logical-routers logical-router-name protocols (isis | ospf | ospf3 | pim) graceful-restart],
[edit logical-routers logical-router-name routing-instances routing-instance-name protocols
(ospf | ospf3 | pim) graceful-restart],
[edit protocols (esis | isis | ospf | ospf3 | pim) graceful-restart],
[edit routing-instances routing-instance-name protocols (ospf | ospf3 | pim)
graceful-restart],
[edit routing-options graceful-restart]
When set globally (at the [edit routing-options graceful-restart] hierarchy level), the
range of values is:
Range: 120 through 900
When set at any other hierarchy level for ES-IS, IS-IS, or PIM, the range of values is:
Range: 30 through 300
When set at any other hierarchy level for OSPF/OSPFv3, the range of values is:
Range: 1 through 3600
Usage Guidelines See “Graceful Restart Configuration Guidelines” on page 95.
restart-duration ■ 139
JUNOS 8.5 High Availability Configuration Guide
restart-time
140 ■ restart-time
Chapter 16: Summary of Graceful Restart Configuration Statements
stale-routes-time
Options seconds—Time, in seconds, the router waits to receive messages from restarting
neighbors before declaring them down.
Range: 1 through 600
Default: 300
Usage Guidelines See “Configuring Graceful Restart Options for BGP” on page 96.
stale-routes-time ■ 141
JUNOS 8.5 High Availability Configuration Guide
traceoptions
Syntax traceoptions {
file name <replace> <size size> <files number> <no-stamp> <(world-readable |
no-world-readable)>;
flag flag <flag-modifier> <disable>;
}
To specify more than one tracing operation, include multiple flag statements.
Default If you do not include this statement, no global tracing operations are performed.
Options disable—(Optional) Disable the tracing operation. You can use this option to disable
a single operation when you have defined a broad group of tracing operations,
such as all.
file name—Name of the file to receive the output of the tracing operation. Enclose
the name within quotation marks. All files are placed in the directory /var/log.
We recommend that you place global routing protocol tracing output in the file
routing-log.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1,
and so on, until the maximum number of trace files is reached. Then the oldest
trace file is overwritten.
Range: 2 through 1000 files
Default: 2 files
If you specify a maximum number of files, you also must specify a maximum file
size with the size option.
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. The nonstop routing tracing option is:
■ graceful-restart—Tracing operations for nonstop routing
142 ■ traceoptions
Chapter 16: Summary of Graceful Restart Configuration Statements
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes
(MB), or gigabytes (GB). When a trace file named trace-file reaches this size, it is
renamed trace-file.0. When the trace-file again reaches its maximum size,
trace-file.0 is renamed trace-file.1 and trace-file is renamed trace-file.0. This
renaming scheme continues until the maximum number of trace files is reached.
Then the oldest trace file is overwritten.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your system
Default: 128 KB
If you specify a maximum file size, you also must specify a maximum number of
trace files with the files option.
Required Privilege Level routing and trace—To view this statement in the configuration.
routing-control and trace-control—To add this statement to the configuration.
traceoptions ■ 143
JUNOS 8.5 High Availability Configuration Guide
144 ■ traceoptions
Part 7
Virtual Router Redundancy Protocol
■ VRRP Overview on page 147
■ VRRP Configuration Guidelines on page 149
■ Summary of VRRP Configuration Statements on page 163
For Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet, and logical
interfaces, you can configure the Virtual Router Redundancy Protocol (VRRP) or VRRP
for IPv6. VRRP enables hosts on a LAN to make use of redundant routing platforms
on that LAN without requiring more than the static configuration of a single default
route on the hosts. The VRRP routing platforms share the IP address corresponding
to the default route configured on the hosts. At any time, one of the VRRP routing
platforms is the master (active) and the others are backups. If the master fails, one
of the backup routers becomes the new master router, providing a virtual default
routing platform and enabling traffic on the LAN to be routed without relying on a
single routing platform. Using VRRP, a backup router can take over a failed default
router within few seconds. This is done with minimum VRRP traffic and without any
interaction with the hosts.
Routers running VRRP dynamically elect master and backup routers. You can also
force assignment of master and backup routers using priorities from 1 through 255,
with 255 being the highest priority. In VRRP operation, the default master router
sends advertisements to backup routers at regular intervals. The default interval is
1 second. If a backup router does not receive an advertisement for a set period, the
backup router with the next highest priority takes over as master and begins
forwarding packets.
VRRP for IPv6 provides a much faster switchover to an alternate default router than
IPv6 Neighbor Discovery (ND) procedures. Typical deployments use only one backup
router.
Figure 8 on page 148 illustrates a basic VRRP topology. In this example, Routers A,
B, and C are running VRRP and together they make up a virtual router. The IP address
of this virtual router is 10.10.0.1 (the same address as the physical interface of Router
A).
■ 147
JUNOS 8.5 High Availability Configuration Guide
Because the virtual router uses the IP address of the physical interface of Router A,
Router A is the master VRRP router, while routers B and C function as backup VRRP
routers. Clients 1 through 3 are configured with the default gateway IP address of
10.10.0.1. As the master router, Router A forwards packets sent to its IP address. If
the master virtual router fails, the router configured with the higher priority becomes
the master virtual router and provides uninterrupted service for the LAN hosts. When
Router A recovers, it becomes the master virtual router again.
VRRP is defined in RFC 3768, Virtual Router Redundancy Protocol. VRRP for IPv6 is
defined in Virtual Router Redundancy Protocol for IPv6, draft-ietf-vrrp-ipv6-spec-08.txt.
See also Definitions of Managed Objects for the VRRP over IPv4 and IPv6,
draft-ietf-vrrp-unified-mib-06.txt.
148 ■
Chapter 18
VRRP Configuration Guidelines
vrrp-group group-number {
(accept-data | no-accept-data);
advertise-interval seconds;
authentication-key key;
authentication-type authentication;
fast-interval milliseconds;
(preempt | no-preempt) {
hold-time seconds;
}
priority number;
track {
priority-hold-time ;
interface interface-name {
priority-cost priority;
bandwidth-threshold bits-per-second {
priority-cost ;
}
}
}
virtual-address [ addresses ];
}
To configure VRRP for IPv6, include the following statements at the [edit interfaces
interface-name unit logical-unit-number family inet6 address address] or [edit logical-router
logical-router-name interfaces interface-name unit logical-unit-number family inet6 address
address] hierarchy level:
vrrp-inet6-group group-number {
(accept-data | no-accept-data);
fast-interval milliseconds;
inet6-advertise-interval seconds;
(preempt | no-preempt) {
hold-time seconds;
}
priority number;
track {
priority-hold-time ;
interface interface-name {
priority-cost priority;
bandwidth-threshold bits-per-second {
priority-cost ;
}
}
}
virtual-inet6-address [ addresses ];
virtual-link-local-address
}
To trace VRRP operations, include the traceoptions statement at the [edit protocols
vrrp] hierarchy level:
size size;
(world-readable | no-world-readable);
}
flag flag;
To configure the startup period for VRRP operations, include the startup-silent-period
statement at the [edit protocols vrrp] hierarchy level:
vrrp-group group-number {
priority number;
virtual-address [ addresses ];
}
To configure basic VRRP for IPv6 support, configure VRRP group support on interfaces
by including the following statements at the [edit interfaces interface-name unit
logical-unit-number family inet6 address address] or [edit logical-router logical-router-name
interfaces interface-name unit logical-unit-number family inet6 address address] hierarchy
levels:
vrrp-inet6-group group-number {
priority number;
virtual-inet6-address [ addresses ];
virtual-link-local-address
}
■ If you have multiple VRRP groups on an interface, the interface can be the
master virtual router for only one of the groups.
■ If the virtual IP address you choose is not the same as the interface’s address,
you must ensure that this address does not appear anywhere else in the
routing platform’s configuration. Verify that you do not use this address for
other interfaces, for the IP address of a tunnel, or for the IP address of static
ARP entries.
■ For VRRP for IPv6, the EUI-64 option cannot be used. In addition, the
Duplicate Address Detection (DAD) process will not run for virtual IPv6
addresses.
■ Virtual link local address—(VRRP for IPv6 only) Identifies the link-local address
associated with the VRRP for IPv6 group. You must explicitly define the link-local
address when configuring VRRP for IPv6. This link-local address must be in the
same subnet as that of interface link-local address.
■ Priority for this routing platform to become the master virtual router—Value
used to elect the master virtual router in the VRRP group. It can be a number
from 1 through 255. The default value for backup routers is 100. A larger value
indicates a higher priority. The routing platform with the highest priority within
the group becomes the master router.
authentication-type number;
authentication can be simple or md5. The authentication type must be the same for
all routing platforms in the VRRP group.
authentication-key key;
The key (password) is an ASCII string. For simple authentication, it can be 1 through
8 characters long. For MD5 authentication, it can be 1 through 16 characters long.
If you include spaces, enclose all characters in quotation marks (“ ”). The key must
be the same for all routing platforms in the VRRP group.
operational. If the master router fails or becomes unreachable, the backup router
with the highest priority value becomes the new master router.
You can modify the advertisement interval in seconds or in milliseconds; the interval
must be the same for all routing platforms in the VRRP group.
For VRRP for IPv6, you must configure router advertisements for the interface on
which VRRP is configured to send IPv6 router advertisements for the VRRP group.
When an interface receives an IPv6 Router Solicitation message, it sends IPv6 Router
Advertisement to all VRRP groups configured on it. In the case of logical routers,
IPv6 router advertisements are not sent to VRRP groups.
advertise-interval;
To modify the time, in seconds, between the sending of VRRP for IPv6 advertisement
packets, include the inet6-advertise-interval statement at the [edit interfaces
interface-name unit logical-unit-number family inet6 address address] or [edit logical-router
logical-router-name interfaces interface-name unit logical-unit-number family inet6 address
address] hierarchy levels:
inet6-advertise-interval;
fast-interval milliseconds;
NOTE: In the VRRP PDU, the JUNOS software sets the advertisement interval to 0.
When you configure VRRP with other vendors’ routers, the fast-interval statement
works correctly only when the other routers also have an advertisement interval set
to 0 in the VRRP PDUs. Otherwise, the JUNOS software interprets other routers’
settings as advertisement timer errors.
154 ■ Configuring the Advertisement Interval for the VRRP Master Router
Chapter 18: VRRP Configuration Guidelines
preempt;
no-preempt;
To modify the preemption hold-time value, include the hold-time statement at the
[edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address (vrrp-group | vrrp-inet6-group) group-name] preempt or [edit logical-router
logical-router-name interfaces interface-name unit logical-unit-number family (Inet | inet6)
address address (vrrp-group | vrrp-inet6-group) group-name] preempt:
hold-time seconds;
accept-data;
To prohibit the interface from accepting packets destined for the virtual IP address,
include the no-accept-data statement:
no-accept-data;
■ VRRP clients must not use packets other than ARP replies to update their
ARP cache.
When interface tracking is enabled, you cannot configure a priority of 255, thereby
designating the master router. For each VRRP group, you can track up to 10 logical
interfaces.
To configure a logical interface to be tracked, include the track statement at the [edit
interfaces interface-name unit logical-unit-number family (inet | inet6) address address
(vrrp-group | vrrp-inet6-group)] or [edit logical-router logical-router-name interfaces
interface-name unit logical-unit-number family (Inet | inet6) address address (vrrp-group
| vrrp-inet6-group)] hierarchy levels:
track {
priority-hold-time ;
interface interface-name {
priority-cost priority;
bandwidth-threshold bits-per-second {
priority-cost ;
}
}
}
The priority hold time is the minimum length of time that must elapse between
dynamic priority changes. If the dynamic priority changes because of a tracking
event, the priority hold timer begins. If another tracking event or manual configuration
change occurs while the timer is running, the new dynamic priority update is
postponed until the timer expires.
The bandwidth threshold specifies a threshold for the tracked interface. When the
bandwidth of the tracked interface drops below the configured bandwidth threshold
value, the VRRP group uses the bandwidth threshold priority cost. You can track up
to five bandwidth threshold statements for each tracked interface.
The priority cost is the value to be subtracted from the configured VRRP priority
when the tracked logical interface goes down, forcing a new master router election.
The value can be from 1 through 254. The sum of the costs for all tracked logical
interfaces or routes must be less than or equal to the configured priority of the VRRP
group.
If you are tracking more than one interface, the router applies the sum of the priority
costs for the tracked interfaces (at most, only one priority cost for each tracked
interface) to the VRRP group priority. However, the interface priority cost and
bandwidth threshold priority cost values for each VRRP group are not cumulative.
The router uses only one priority cost to a tracked interface as indicated in
Table 10 on page 157:
Not down; media speed below one or more Priority-cost of the lowest applicable bandwidth
bandwidth thresholds threshold
You must configure an interface priority cost only if you have configured no bandwidth
thresholds. If you have not configured an interface priority cost value, and the
interface is down, the interface uses the bandwidth threshold priority cost value of
the lowest bandwidth threshold.
To trace VRRP operations, include the traceoptions statement at the [edit protocols
vrrp] hierarchy level.
By default, VRRP logs the error, data carrier detect (DCD) configuration, and routing
socket events in a file in the /var/log directory. By default, this file is named
/var/log/vrrpd. The default file size is 1 megabyte (MB), and three files are created
before the first one gets overwritten.
To change the configuration of the logging file, include the file statement at the [edit
protocols vrrp traceoptions] hierarchy level:
(world-readable | no-world-readable);
}
flag flag;
To configure the silent period interval that the Master Down Event timer ignores,
include the startup-silent-period statement at the [edit protocols vrrp] hierarchy level:
Passive ARP learning enables the ARP cache in the backup router to hold
approximately the same contents as the ARP cache in the master router, thus
preventing the problem of learning ARP entries in a burst. To enable passive ARP
learning, include the passive-learning statement at the [edit system arp] hierarchy
level:
We recommend setting passive learning on both the backup and master VRRP routers.
Doing so prevents the need to manually intervene when the master router becomes
the backup router. While a router is operating as the master router, the passive
learning configuration has no operational impact. The configuration takes effect only
when the router is operating as a backup router.
For information about configuring gratuitous ARP and the ARP aging timer, see the
JUNOS System Basics Configuration Guide.
On Router B [edit]
interfaces {
ge-4/2/0 {
unit 0 {
family inet {
address 192.168.1.24/24 {
vrrp-group 27 {
virtual-address 192.168.1.15;
priority 200;
authentication-type simple;
authentication-key booJUM;
}
}
}
}
}
}
Configuring VRRP and The VRRP group number is the decimal equivalent of the last byte of the virtual MAC
MAC Source Address address.
Filtering
[edit interfaces]
ge-5/2/0 {
gigether-options {
source-filtering;
source-address-filter {
00:00:5e:00:01:0a; # Virtual MAC address
}
}
unit 0 {
family inet {
address 192.168.1.10/24 {
vrrp-group 10 { # VRRP group number
virtual-address 192.168.1.10;
priority 255;
preempt;
}
}
}
}
[edit protocols]
router-advertisement {
interface ge-1/0/0.0 {
prefix fec0::/64;
max-advertisement-interval 4;
}
}
On Router B [edit interfaces]
ge-1/0/0 {
unit 0 {
family inet6 {
address fe80::5:0:0:8/64;
address fec0::5:0:0:8/64 {
vrrp-inet6-group 3 { # VRRP inet6 group number
virtual-inet6-address fec0::5:0:0:7;
virtual-link-local-address fe80::5:0:0:7;
priority 100;
preempt;
}
}
}
}
[edit protocols]
router-advertisement {
interface ge-1/0/0.0 {
prefix fec0::/64;
max-advertisement-interval 4;
}
}
This chapter provides a reference for each of the VRRP configuration statements.
The statements are organized alphabetically.
accept-data
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address (vrrp-group | vrrp-inet6-group) group-number],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address (vrrp-group | vrrp-inet6-group) group-number]
Default If the accept-data statement is not configured, the master router responds to Internet
Control Message Protocol (ICMP) message requests only.
Usage Guidelines See “Configuring an Interface to Accept Packets Destined for the Virtual IP
Address” on page 155.
accept-data ■ 163
JUNOS 8.5 High Availability Configuration Guide
advertise-interval
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-number],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-number]
All routers in the VRRP group must use the same advertisement interval.
164 ■ advertise-interval
Chapter 19: Summary of VRRP Configuration Statements
authentication-key
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-number],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-number]
All routers in the VRRP group must use the same authentication scheme and
password.
Usage Guidelines See “Configuring VRRP Authentication (IPv4 Only)” on page 153.
authentication-key ■ 165
JUNOS 8.5 High Availability Configuration Guide
authentication-type
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-number],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-number]
All routers in the VRRP group must use the same authentication scheme and
password.
■ md5—Use the MD5 algorithm to create an encoded checksum of the packet. The
encoded checksum is included in the transmitted packet. The receiving routing
platform uses the authentication key to verify the packet, discarding it if the
digest does not match. This algorithm provides a more secure authentication
scheme.
Default: none (No authentication is performed)
Usage Guidelines See “Configuring VRRP Authentication (IPv4 Only)” on page 153.
166 ■ authentication-type
Chapter 19: Summary of VRRP Configuration Statements
bandwidth-threshold
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address (vrrp-group | vrrp-inet6-group) group-number) track interface interface-name],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address (vrrp-group | vrrp-inet6-group) group-number)
group-number) track interface interface-name]
Options bits-per-second—Bandwidth threshold for the tracked interface. When the bandwidth
of the tracked interface drops below the specified value, the VRRP group uses
the bandwidth threshold priority cost value. You can include up to five bandwidth
threshold statements for each interface you track.
Range: 1 through 10000000000000 bits per second
bandwidth-threshold ■ 167
JUNOS 8.5 High Availability Configuration Guide
fast-interval
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address vrrp-group group-number],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address vrrp-group group-number]
All routers in the VRRP group must use the same advertisement interval.
168 ■ fast-interval
Chapter 19: Summary of VRRP Configuration Statements
hold-time
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address (vrrp | vrrp-inet6-group) group-number preempt],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address (vrrp | vrrp-inet6-group) group-number preempt]
hold-time ■ 169
JUNOS 8.5 High Availability Configuration Guide
inet6-advertise-interval
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-number],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family Inet6 address address vrrp-inet6-group group-number]
All routers in the VRRP group must use the same advertisement interval.
170 ■ inet6-advertise-interval
Chapter 19: Summary of VRRP Configuration Statements
interface
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address (vrrp-group | vrrp-inet6-group) track],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address (vrrp-group | vrrp-inet6-group) track]
no-accept-data
See accept-data
no-preempt
See preempt
interface ■ 171
JUNOS 8.5 High Availability Configuration Guide
preempt
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address vrrp-group | vrrp-inet6-group) group-number],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address vrrp-group | vrrp-inet6-group) group-number]
Default If you omit this statement, the backup router cannot preempt a master router.
Usage Guidelines See “Configuring a Backup Router to Preempt the Master Router” on page 155.
172 ■ preempt
Chapter 19: Summary of VRRP Configuration Statements
priority
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address vrrp-group | vrrp-inet6-group) group-number],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address vrrp-group | vrrp-inet6-group) group-number]
Options priority—Router’s priority for being elected to be the master router in the VRRP group.
A larger value indicates a higher priority for being elected.
Range: 1 through 255
Default: 100 (for backup routers)
Usage Guidelines See “Configuring Basic VRRP Support” on page 151.
priority ■ 173
JUNOS 8.5 High Availability Configuration Guide
priority-cost
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address (vrrp | vrrp-inet-group) group-number interface interface-name],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address (vrrp | vrrp-inet6-group) group-number interface
interface-name],
[edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address (vrrp | vrrp-inet6-group) group-number interface interface-name
bandwidth-threshold bits-per-second],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address (vrrp | vrrp-inet6-group) group-number interface
interface-name bandwidth-threshold bits-per-second]
Options priority-cost priority—The value subtracted from the configured VRRP priority when
the tracked interface is down, forcing a new master router election. The sum of
all the costs for all interfaces or routes that are tracked must be less than or equal
to the configured priority of the VRRP group.
Range: 1 through 254
Usage Guidelines See “Configuring a Logical Interface to Be Tracked” on page 156.
174 ■ priority-cost
Chapter 19: Summary of VRRP Configuration Statements
priority-hold-time
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address (vrrp | vrrp-inet6-group) group-number track],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address (vrrp | vrrp-inet6-group) group-number track]
Options seconds—The minimum length of time that must elapse between dynamic priority
changes.
Range: 1 through 3600 seconds
Usage Guidelines See “Configuring a Logical Interface to Be Tracked” on page 156.
startup-silent-period
priority-hold-time ■ 175
JUNOS 8.5 High Availability Configuration Guide
traceoptions
Syntax traceoptions {
file {
filename filename;
files number;
match regex;
size size;
(world-readable | no-world-readable);
}
flag flag;
}
To specify more than one tracing operation, include multiple flag statements.
By default, VRRP logs the error, dcd configuration, and routing socket events in a file
in the directory /var/log.
Default If you do not include this statement, no VRRP-specific tracing operations are
performed.
Options filename filename—Name of the file to receive the output of the tracing operation.
Enclose the name within quotation marks. All files are placed in the directory
/var/log. By default, VRRP tracing output is placed in the file vrrpd.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1,
and so on, until the maximum number of trace files is reached. When the
maximum number is reached, the oldest trace file is overwritten.
Range: 0 through 4,294,967,296 files
Default: 3 files
If you specify a maximum number of files, you also must specify a maximum file
size with the size option.
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. These are the VRRP-specific tracing options:
■ all—All VRRP tracing operations
■ database—Database changes
■ general—General events
■ interfaces—Interface changes
176 ■ traceoptions
Chapter 19: Summary of VRRP Configuration Statements
■ normal—Normal events
■ state—State transitions
■ timer—Timer events
match regex—(Optional) Refine the output to include only those lines that match the
given regular expression.
If you specify a maximum file size, you also must specify a maximum number of
trace files with the files option.
world-readable | no-world-readable—Specifies whether any reader can read the log file.
traceoptions ■ 177
JUNOS 8.5 High Availability Configuration Guide
track
Syntax track {
priority-hold-time seconds;
interface interface-name {
priority-cost priority;
bandwidth-threshold bits-per-second {
priority-cost priority;
}
}
}
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family (inet | inet6) address
address vrrp-group | vrrp-inet6-group) group-number],
[edit logical-router logical-router-name interfaces interface-name unit logical-unit-number
family (inet | inet6) address address vrrp-group | vrrp-inet6-group) group-number]
178 ■ track
Chapter 19: Summary of VRRP Configuration Statements
virtual-address
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-number],
[edit logical-routers logical-router-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-number]
Options addresses—Addresses of one or more virtual routers. Do not include a prefix length.
If the address is the same as the interface’s physical address, the interface
becomes the master virtual router for the group.
virtual-inet6-address
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-number],
[edit logical-routers logical-router-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-number]
Options addresses—Addresses of one or more virtual routers. Do not include a prefix length.
If the address is the same as the interface’s physical address, the interface
becomes the master virtual router for the group.
virtual-address ■ 179
JUNOS 8.5 High Availability Configuration Guide
virtual-link-local-address
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-number],
[edit logical-routers logical-router-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-number]
Options ipv6-address—Virtual link local IPv6 address for VRRP for an IPv6 group.
Range: 0 through 255
180 ■ virtual-link-local-address
Chapter 19: Summary of VRRP Configuration Statements
vrrp-group
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address],
[edit logical-routers logical-router-name interfaces interface-name unit logical-unit-number
family inet address address]
Options group-number—VRRP group identifier. If you enable MAC source address filtering on
the interface, you must include the virtual MAC address in the list of source MAC
addresses that you specify in the source-address-filter statement. MAC addresses
ranging from 00:00:5e:00:01:00 through 00:00:5e:00:01:ff are reserved for
VRRP, as defined in RFC 2338. The VRRP group number must be the decimal
equivalent of the last hexadecimal byte of the virtual MAC address.
Range: 0 through 255
vrrp-group ■ 181
JUNOS 8.5 High Availability Configuration Guide
vrrp-inet6-group
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address],
[edit logical-routers logical-router-name interfaces interface-name unit logical-unit-number
family inet address address]
Options group-number—VRRP group identifier. If you enable MAC source address filtering on
the interface, you must include the virtual MAC address in the list of source MAC
addresses that you specify in the source-address-filter statement. MAC addresses
ranging from 00:00:5e:00:01:00 through 00:00:5e:00:01:ff are reserved for
VRRP, as defined in RFC 2338. The VRRP group number must be the decimal
equivalent of the last hexadecimal byte of the virtual MAC address.
Range: 0 through 255
182 ■ vrrp-inet6-group
Part 8
Index
■ Index on page 185
■ Index of Commands and Statements on page 191
Index ■ 183
JUNOS 8.5 High Availability Configuration Guide
184 ■ Index
Index
CFEB redundancy
configuring............................................................26
Symbols overview...............................................................15
#, comments in configuration statements.................xxiv cfeb statement.............................................................31
( ), in syntax descriptions..........................................xxiii usage guidelines....................................................27
< >, in syntax descriptions......................................xxiii circuit cross-connect See CCC
[ ], in configuration statements..................................xxiv comments, in configuration statements....................xxiv
{ }, in configuration statements................................xxiv commit synchronize statement....................................81
| (pipe), in syntax descriptions..................................xxiii usage guidelines....................................................76
Compact Forwarding Engine Board See CFEB
redundancy
A configuration files, copying between Routing
accept-data statement................................................163 Engines....................................................................21
usage guidelines..................................................155 conventions
advertise-interval statement.......................................164 text and syntax..................................................xxiii
usage guidelines..................................................153 curly braces, in configuration statements..................xxiv
advertisement intervals, VRRP...................................153 customer support.......................................................xxx
aggregate routes contacting JTAC...................................................xxx
graceful restart......................................................87
nonstop routing....................................................72
authentication, VRRP.................................................153 D
authentication-key statement.....................................165 description statement..................................................32
usage guidelines..................................................153 usage guidelines....................................................28
authentication-type statement....................................166 disable statement.......................................................133
usage guidelines..................................................153 usage guidelines
aggregate routes............................................95
BGP...............................................................96
B ES-IS..............................................................97
backup routers, VRRP................................................147 global.....................................96, 101, 103, 104
bandwidth-threshold statement.................................167 IS-IS...............................................................97
usage guidelines..................................................156 OSPF ............................................................98
BFD, nonstop routing...................................................72 OSPFv3..........................................................98
BGP PIM................................................................99
graceful restart......................................................87 RIP................................................................99
nonstop routing....................................................72 RIPng.............................................................99
bidirectional forwarding detection See BFD routing instances.........................................103
Border Gateway Protocol See BGP routing instances inside a logical router.......105
braces, in configuration statements...........................xxiv RSVP...........................................................101
brackets static routes...................................................95
angle, in syntax descriptions..............................xxiii documentation set
square, in configuration statements...................xxiv comments on......................................................xxx
C E
CCC, graceful restart....................................................87 ES-IS
graceful restart......................................................87
Index ■ 185
JUNOS 8.5 High Availability Configuration Guide
F OSPFv3..........................................................98
failover statement .......................................................32 PIM................................................................99
fast-interval statement...............................................168 RIP................................................................99
usage guidelines..................................................154 RIPng.............................................................99
FEB redundancy routing instances.........................................103
configuration example..........................................28 routing instances inside a logical router.......105
configuring............................................................28 RSVP...........................................................101
overview...............................................................15 static routes...................................................95
feb statement...............................................................33 graceful-switchover statement......................................55
usage guidelines....................................................28 usage guidelines....................................................53
file copy command GRES See graceful Routing Engine switchover
usage guidelines....................................................21
font conventions.......................................................xxiii
Forwarding Engine Board See FEB redundancy H
helper-disable statement............................................135
usage guidelines
G IS-IS...............................................................97
graceful restart LDP.............................................................102
commands, operational mode............................106 OSPF ............................................................98
concepts...............................................................87 OSPFv3..........................................................98
configuration procedure RSVP...........................................................101
aggregate routes............................................95 high availability features
MPLS protocols............................................100 comparison of.........................................................6
routing protocols...........................................95 graceful restart......................................................87
static routes...................................................95 graceful Routing Engine switchover......................41
VPNs............................................................103 nonstop bridging...................................................59
example configuration........................................108 nonstop routing....................................................69
overview...............................................................87 overview.................................................................3
aggregate routes............................................89 VRRP..................................................................147
MPLS protocols..............................................91 hold-time statement...................................................169
routing protocols...........................................89
static routes...................................................89
VPNs..............................................................92 I
protocol support...................................................87 icons defined, notice..................................................xxii
system requirements............................................88 inet6-advertise-interval statement..............................170
trace options.......................................................100 usage guidelines..................................................154
verifying operation of.........................................106 interface statement....................................................171
graceful Routing Engine switchover usage guidelines..................................................156
concepts...............................................................41 Intermediate System-to-Intermediate System See IS-IS
DPC support.........................................................46 IS-IS
enabling................................................................53 graceful restart......................................................87
extended DHCP relay agent..................................45 nonstop routing....................................................72
feature support.....................................................44
PIC support...........................................................46
platform support...................................................44 K
system architecture...............................................42 keepalive-time statement.............................................34
system requirements............................................44 usage guidelines....................................................23
verifying status of.................................................54
graceful-restart statement..........................................134
usage guidelines L
aggregate routes............................................95 Label Distribution Protocol See LDP
BGP...............................................................96 LDP
global.....................................96, 101, 103, 104 graceful restart......................................................87
IS-IS...............................................................97 nonstop routing....................................................72
LDP.............................................................102
OSPF ............................................................98
186 ■ Index
Index
M O
manuals on-disk-failure statement..............................................35
comments on......................................................xxx usage guidelines....................................................23
master router, VRRP..................................................147 on-loss-of-keepalives statement....................................35
maximum-helper-recovery-time statement................135 usage guidelines....................................................23
usage guidelines..................................................101 Open Shortest Path First See OSPF
maximum-helper-restart-time statement....................136 OSPF
usage guidelines..................................................101 graceful restart......................................................87
maximum-recovery-time statement...........................136 nonstop routing....................................................72
usage guidelines..................................................102 OSPFv3
MPLS, graceful restart..................................................87 nonstop routing....................................................72
MSTP, nonstop bridging...............................................62
Multiple Spanning Tree Protocol See MSTP
P
parentheses, in syntax descriptions...........................xxiii
N passive ARP learning, VRRP.......................................158
next-generation RIP See RIPng PIM, graceful restart.....................................................87
no-accept-data statement...........................................171 preempt statement....................................................172
usage guidelines..................................................155 usage guidelines..................................................155
no-auto-failover statement...........................................34 preempting master router, VRRP...............................155
usage guidelines....................................................28 priority statement......................................................173
no-preempt statement...............................................171 usage guidelines..................................................151
usage guidelines..................................................155 priority-cost statement...............................................174
no-strict-lsa-checking statement.................................137 usage guidelines..................................................156
usage guidelines priority-hold-time statement......................................175
OSPF.............................................................98 usage guidelines..................................................156
OSPFv3..........................................................98 Protocol Independent Multicast See PIM
nonstop bridging
concepts...............................................................59
enabling................................................................63 R
platform support...................................................61 Rapid Spanning Tree Protocol See RSTP
protocol support...................................................62 recovery-time statement............................................138
system architecture...............................................60 usage guidelines..................................................102
system requirements............................................61 redundancy feb statement
verifying status of ................................................64 usage guidelines....................................................28
nonstop routing redundancy statement.................................................36
concepts...............................................................69 usage guidelines....................................................19
enabling................................................................75 redundancy-group statement.......................................37
example configuration..........................................78 usage guidelines....................................................28
platform support...................................................72 request chassis cfeb master switch command
protocol support...................................................72 usage guidelines....................................................27
system architecture...............................................70 request chassis redundancy feb command
system requirements............................................71 usage guidelines....................................................28
trace options.........................................................77 request chassis routing-engine master acquire
verifying status of ................................................76 command
nonstop-bridging statement.........................................65 usage guidelines....................................................25
usage guidelines....................................................63 request chassis routing-engine master release
nonstop-routing statement...........................................82 command
usage guidelines....................................................75 usage guidelines....................................................25
notice icons defined...................................................xxii request chassis routing-engine master switch command
notify-duration statement...........................................137 usage guidelines....................................................25
usage guidelines....................................................98 request chassis sfm master switch command
NSR See nonstop routing usage guidelines....................................................30
request chassis ssb master switch command
usage guidelines....................................................30
Index ■ 187
JUNOS 8.5 High Availability Configuration Guide
188 ■ Index
Index
V
Virtual Router Redundancy Protocol See VRRP
virtual-address statement...........................................179
usage guidelines..................................................151
virtual-inet6-address statement..................................179
usage guidelines..................................................151
virtual-link-local-address statement............................180
usage guidelines..................................................151
VPNs, graceful restart...................................................88
VRRP
advertisement interval........................................153
authentication.....................................................153
basic configuration..............................................151
example configuration........................................159
overview.............................................................147
passive ARP learning..........................................158
preempting master router...................................155
trace operations..................................................157
tracking logical interface status...........................156
vrrp-group statement.................................................181
usage guidelines..................................................151
vrrp-inet6-group statement........................................182
usage guidelines..................................................151
Index ■ 189
JUNOS 8.5 High Availability Configuration Guide
190 ■ Index
Index of Commands and Statements
Symbols K
keepalive-time statement.............................................34
A
accept-data statement................................................163 M
advertise-interval statement.......................................164 maximum-helper-recovery-time statement................135
authentication-key statement.....................................165 maximum-helper-restart-time statement....................136
authentication-type statement....................................166 maximum-recovery-time statement...........................136
B N
bandwidth-threshold statement.................................167 no-accept-data statement...........................................171
no-auto-failover statement ..........................................34
no-preempt statement...............................................171
C no-strict-lsa-checking statement.................................137
cfeb statement.............................................................31 nonstop-bridging statement.........................................65
commit synchronize statement....................................81 nonstop-routing statement...........................................82
notify-duration statement...........................................137
D
description statement..................................................32 O
disable statement.......................................................133 on-disk-failure statement .............................................35
on-loss-of-keepalives statement ...................................35
F
failover statement .......................................................32 P
fast-interval statement...............................................168 preempt statement....................................................172
feb statement...............................................................33 priority statement......................................................173
priority-cost statement...............................................174
priority-hold-time statement......................................175
G
graceful-restart statement..........................................134
graceful-switchover statement......................................55 R
recovery-time statement............................................138
redundancy statement.................................................36
H redundancy-group statement.......................................37
helper-disable statement............................................135 restart-duration statement..........................................139
hold-time statement...................................................169 restart-time statement................................................140
routing-engine statement.............................................37
I
inet6-advertise-interval statement..............................170 S
interface statement....................................................171 sfm statement..............................................................38
ssb statement...............................................................38
stale-routes-time statement........................................141
startup-silent-period statement...................................175
T
traceoptions statement
graceful restart....................................................142
nonstop routing....................................................83
VRRP..................................................................176
track statement..........................................................178
V
virtual-address statement...........................................179
virtual-inet6-address statement..................................179
virtual-link-local-address statement............................180
vrrp-group statement.................................................181
vrrp-inet6-group statement........................................182