High Availability
High Availability
Modified: 2017-09-06
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
®
Junos OS High Availability Feature Guide
Copyright © 2017 Juniper Networks, Inc. All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
[Link] By downloading, installing or using such software, you agree to the terms and conditions of that
EULA.
Part 1 Overview
Chapter 1 High Availability Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Understanding High Availability Features on Juniper Networks Routers . . . . . . . . . 3
Routing Engine Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Graceful Routing Engine Switchover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Nonstop Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Nonstop Active Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Graceful Restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Nonstop Active Routing Versus Graceful Restart . . . . . . . . . . . . . . . . . . . . . . . 6
Effects of a Routing Engine Switchover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Unified ISSU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Interchassis Redundancy for MX Series Routers Using Virtual Chassis . . . . . . 8
High Availability-Related Features in Junos OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
asymmetric-hold-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
authentication-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
authentication-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
bandwidth-threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
delegate-processing (VRRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
fast-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
global-advertisements-threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
hold-time (VRRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
inherit-advertisement-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
inet6-advertise-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
preempt (VRRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
priority (Protocols VRRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
priority-cost (VRRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
priority-hold-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
route (Interfaces) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
skew-timer-disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
startup-silent-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
traceoptions (Protocols VRRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
track (VRRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
version-3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
virtual-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
virtual-inet6-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
virtual-link-local-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
vrrp-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
vrrp-inet6-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
vrrp-inherit-from . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Chapter 33 Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
show chassis dedicated-ukern-cpu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
show chassis realtime-ukern-thread . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
clear vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
request chassis ssb master switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
request system software in-service-upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
request system software in-service-upgrade (MX Series 3D Universal Edge
Routers and EX9200 Switches) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
request system software validate in-service-upgrade . . . . . . . . . . . . . . . . . . . . . 487
show chassis ssb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
show nonstop-routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
show pfe ssb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
show system switchover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
show task replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
show vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
show vrrp track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
Table 12: Locating the Information You Need to Work With ISSU . . . . . . . . . . . . 285
Chapter 23 Unified ISSU System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Table 13: Unified ISSU Support for Dual Routing Engine Platforms . . . . . . . . . . . 303
Table 14: Unified ISSU PIC Support: SONET/SDH . . . . . . . . . . . . . . . . . . . . . . . . 307
Table 15: Unified ISSU PIC Support: Fast Ethernet and Gigabit Ethernet . . . . . . 309
Table 16: Unified ISSU PIC Support: Channelized . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Table 17: Unified ISSU PIC Support: Tunnel Services . . . . . . . . . . . . . . . . . . . . . . . 312
Table 18: Unified ISSU PIC Support: ATM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Table 19: Unified ISSU Support: Enhanced IQ2 Ethernet Services Engine (ESE)
PIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
Table 20: Unified ISSU Support: MX Series Router MPCs . . . . . . . . . . . . . . . . . . . 316
Table 21: Unified ISSU Support: MX Series Router MICs . . . . . . . . . . . . . . . . . . . . 317
Chapter 24 Performing a Unified ISSU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Table 22: Routing Engine Status Before Upgrading . . . . . . . . . . . . . . . . . . . . . . . 328
Table 23: Routing Engine Status After Upgrading and Rebooting Both Routing
Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Table 24: Routing Engine Status After Upgrading, Rebooting, and Switching
Mastership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Table 25: Routing Engine Status Before Upgrading and Manually Rebooting the
Backup Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Table 26: Routing Engine Status After Upgrading and Before Manually Rebooting
the Backup Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Table 27: Routing Engine Status After Upgrading, Manually Rebooting, and
Before Switching Mastership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Table 28: Routing Engine Status After Upgrading, Manually Rebooting, and
Switching Mastership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Table 29: Routing Engine Status Before Upgrading and Rebooting One Routing
Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Table 30: Routing Engine Status After Upgrading One Routing Engine and Before
Upgrading the Other Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Table 31: Routing Engine Status After Upgrading, Manually Rebooting, and
Switching Mastership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at [Link]
Supported Platforms
For the features described in this document, the following platforms are supported:
• SRX Series
• M Series
• T Series
• MX Series
• TX Matrix
• PTX Series
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
1. From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file [Link].
Copy the [Link] file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file [Link];
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address [Link]/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/[Link]
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
[Link]. Copy the [Link] file to the /var/tmp directory
on your routing platform.
commit {
file [Link]; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
load merge relative configuration mode command:
For more information about the load command, see CLI Explorer.
Documentation Conventions
Caution Indicates a situation that might result in loss of data or hardware damage.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xx defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
• Junos OS CLI User Guide
• Identifies RFC and Internet draft titles.
• RFC 1997, BGP Communities Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include the
statements, commands, files, and stub statement at the [edit protocols
directories; configuration hierarchy levels; ospf area area-id] hierarchy level.
or labels on routing platform • The console port is labeled CONSOLE.
components.
< > (angle brackets) Encloses optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Encloses a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
Bold text like this Represents graphical user interface (GUI) • In the Logical Interfaces box, select
items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of menu In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Documentation Feedback
• Online feedback rating system—On any page of the Juniper Networks TechLibrary site
at [Link] simply click the stars to rate the content,
and use the pop-up form to provide us with information about your experience.
Alternately, you can use the online feedback form at
[Link]
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or Partner Support Service
support contract, or are covered under warranty, and need post-sales technical support,
you can access our tools and resources online or open a case with JTAC.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
• Find solutions and answer questions using our Knowledge Base: [Link]
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: [Link]
Overview
• High Availability Overview on page 3
For Juniper Networks routing platforms running the Junos operating system (Junos OS),
high availability refers to the hardware and software components that provide redundancy
and reliability for packet-based communications. This topic provides brief overviews of
the following high availability features:
plane. Neighboring routers detect that the router has experienced a restart and react to
the event in a manner prescribed by individual routing protocol specifications.
NOTE: In T Series routers, TX Matrix routers, and TX Matrix Plus routers, the
control plane is preserved in case of GRES with NSR, and 75% of line rate
worth of traffic per Packet Forwarding Engine remains uninterrupted during
GRES.
Nonstop Bridging
Nonstop bridging enables an MX Series 3D Universal Edge Router with redundant Routing
Engines to switch from a primary Routing Engine to a backup Routing Engine without
losing Layer 2 Control Protocol (L2CP) information. Nonstop bridging uses the same
infrastructure as graceful Routing Engine switchover to preserve interface and kernel
information. However, nonstop bridging also saves L2CP information by running the Layer
2 Control Protocol process (l2cpd) on the backup Routing Engine.
NOTE: To use nonstop bridging, you must first enable graceful Routing Engine
switchover.
NOTE: To use nonstop active routing, you must also configure graceful
Routing Engine switchover.
For a list of protocols and features supported by nonstop active routing, see “Nonstop
Active Routing Protocol and Feature Support” on page 159.
For more information about nonstop active routing, see “Nonstop Active Routing
Concepts” on page 151.
Graceful Restart
With routing protocols, any service interruption requires an affected router to recalculate
adjacencies with neighboring routers, restore routing table entries, and update other
protocol-specific information. An unprotected restart of a router can result in forwarding
delays, route flapping, wait times stemming from protocol reconvergence, and even
dropped packets. To alleviate this situation, graceful restart provides extensions to routing
protocols. These protocol extensions define two roles for a router—restarting and helper.
The extensions signal neighboring routers about a router undergoing a restart and prevent
the neighbors from propagating the change in state to the network during a graceful
restart wait interval. The main benefits of graceful restart are uninterrupted packet
forwarding and temporary suppression of all routing protocol updates. Graceful restart
enables a router to pass through intermediate convergence states that are hidden from
the rest of the network.
When a router is running graceful restart and the router stops sending and replying to
protocol liveness messages (hellos), the adjacencies assume a graceful restart and begin
running a timer to monitor the restarting router. During this interval, helper routers do not
process an adjacency change for the router that they assume is restarting, but continue
active routing with the rest of the network. The helper routers assume that the router
can continue stateful forwarding based on the last preserved routing state during the
restart.
If the router was actually restarting and is back up before the graceful timer period expires
in all of the helper routers, the helper routers provide the router with the routing table,
topology table, or label table (depending on the protocol), exit the graceful period, and
return to normal network routing.
If the router does not complete its negotiation with helper routers before the graceful
timer period expires in all of the helper routers, the helper routers process the router's
change in state and send routing updates, so that convergence occurs across the network.
If a helper router detects a link failure from the router, the topology change causes the
helper router to exit the graceful wait period and to send routing updates, so that network
convergence occurs.
To enable a router to undergo a graceful restart, you must include the graceful-restart
statement at the global [edit routing-options] or [edit routing-instances instance-name
routing-options] hierarchy level. You can, optionally, modify the global settings at the
individual protocol level. When a routing session is started, a router that is configured
with graceful restart must negotiate with its neighbors to support it when it undergoes
a graceful restart. A neighboring router will accept the negotiation and support helper
mode without requiring graceful restart to be configured on the neighboring router.
• BGP
• ES-IS
• IS-IS
• OSPF/OSPFv3
• RIP/RIPng
In contrast, nonstop active routing does not involve a router restart. Both the master and
backup Routing Engines are running the routing protocol process (rpd) and exchanging
updates with neighbors. When one Routing Engine fails, the router simply switches to
the active Routing Engine to exchange routing information with neighbors. Because of
these feature differences, nonstop routing and graceful restart are mutually exclusive.
Nonstop active routing cannot be enabled when the router is configured as a graceful
restarting router. If you include the graceful-restart statement at any hierarchy level and
the nonstop-routing statement at the [edit routing-options] hierarchy level and try to
commit the configuration, the commit request fails. For more information, see “Nonstop
Active Routing Concepts” on page 151.
VRRP
The Virtual Router Redundancy Protocol (VRRP) enables hosts on a LAN to make use
of redundant routing platforms (master and backup pairs) on the LAN, requiring only the
static configuration of a single default route on the hosts.
The VRRP routing platform pairs share the IP address corresponding to the default route
configured on the hosts. At any time, one of the VRRP routing platforms is the master
(active) and the others are backups. If the master fails, one of the backup routers or
switches becomes the new master router.
VRRP has advantages in ease of administration and network throughput and reliability:
Devices running VRRP dynamically elect master and backup routers. You can also force
assignment of master and backup routers using priorities from 1 through 255, with 255
being the highest priority.
In VRRP operation, the default master router sends advertisements to backup routers
at regular intervals (default 1 second). If a backup router does not receive an advertisement
for a set period, the backup router with the next highest priority takes over as master and
begins forwarding packets.
As of Junos OS Release 13.2, VRRP nonstop active routing (NSR) is enabled only when
you configure the nonstop-routing statement at the [edit routing-options] or [edit logical
system logical-system-name routing-options] hierarchy level.
Unified ISSU
A unified in-service software upgrade (unified ISSU) enables you to upgrade between
two different Junos OS Releases with no disruption on the control plane and with minimal
disruption of traffic. Unified ISSU is only supported by dual Routing Engine platforms. In
addition, graceful Routing Engine switchover (GRES) and nonstop active routing (NSR)
must be enabled.
With a unified ISSU, you can eliminate network downtime, reduce operating costs, and
deliver higher services levels. For more information, see “Getting Started with Unified
In-Service Software Upgrade” on page 285.
An MX Series Virtual Chassis is managed by the Virtual Chassis Control Protocol (VCCP),
which is a dedicated control protocol based on IS-IS. VCCP runs on the Virtual Chassis
port interfaces and is responsible for building the Virtual Chassis topology, electing the
Virtual Chassis master router, and establishing the interchassis routing table to route
traffic within the Virtual Chassis.
Starting with Junos OS Release 11.2, Virtual Chassis configurations are supported on
MX240, MX480, and MX960 3D Universal Edge Routers with Trio MPC/MIC interfaces
and dual Routing Engines. In addition, graceful Routing Engine switchover (GRES) and
nonstop active routing (NSR) must be enabled on both member routers in the Virtual
Chassis.
• Redundant power supplies, host modules, host subsystems, and forwarding boards.
For more information, see the Junos OS Administration Library and the Junos OS
Hardware Network Operations Guide.
redundancy for Ethernet interfaces. For more information, see the Junos OS Network
Interfaces Library for Routing Devices.
• Bidirectional Forwarding Detection (BFD) works with other routing protocols to detect
failures rapidly. For more information, see the Junos OS Routing Protocols Library.
The M10i router has two CFEBs, one that is configured to act as the master and the other
that serves as a backup in case the master fails. You can initiate a manual switchover by
issuing the request chassis cfeb master switch command. For more information, see the
Junos OS Administration Library.
You can configure one FEB as a backup for one or more FEBs by configuring a FEB
redundancy group. When a FEB fails, the backup FEB can quickly take over packet
forwarding. A redundancy group must contain exactly one backup FEB and can optionally
contain one primary FEB and multiple other FEBs. A FEB can belong to only one group.
A group can provide backup on a one-to-one basis (primary-to-backup), a many-to-one
basis (two or more other-FEBs-to-backup), or a combination of both (one
primary-to-backup and one or more other-FEBs-to-backup).
When you configure a primary FEB in a redundancy group, the backup FEB mirrors the
exact forwarding state of the primary FEB. If switchover occurs from a primary FEB, the
backup FEB does not reboot. A manual switchover from the primary FEB to the backup
FEB results in less than 1 second of traffic loss. Failover from the primary FEB to the
backup FEB results in less than 10 seconds of traffic loss.
If a failover occurs from the other FEB and a primary FEB is specified for the group, the
backup FEB reboots so that the forwarding state from the other FEB can be downloaded
to the backup FEB and forwarding can continue. Automatic failover from a FEB that is
not specified as a primary FEB results in higher packet loss. The duration of packet loss
depends on the number of interfaces and on the size of the routing table, but it can be
minutes.
If a failover from a FEB occurs when no primary FEB is specified in the redundancy group,
the backup FEB does not reboot and the interfaces on the FPC connected to the previously
active FEB remain online. The backup FEB must obtain the entire forwarding state from
the Routing Engine after a switchover, and this update may take a few minutes. If you do
not want the interfaces to remain online during the switchover for the other FEB, configure
a primary FEB for the redundancy group.
Failover to a backup FEB occurs automatically if a FEB in a redundancy group fails. You
can disable automatic failover for any redundancy group by including the no-auto-failover
statement at the [edit chassis redundancy feb redundancy-group group-name] hierarchy
level.
You can also initiate a manual switchover by issuing the request chassis redundancy feb
slot slot-number switch-to-backup command, where slot-number is the number of the
active FEB. For more information, see the CLI Explorer.
The following conditions result in failover as long as the backup FEB in a redundancy
group is available:
• The FEB was disabled when the offline button for the FEB was pressed.
• Errors occurred on the links between all the active fabric planes and the FEB. This
situation results in failover to the backup FEB if it has at least one valid fabric link.
• Errors occurred on the link between the FEB and all of the FPCs connected to it.
After a switchover occurs, a backup FEB is no longer available for the redundancy group.
You can revert from the backup FEB to the previously active FEB by issuing the operational
mode command request chassis redundancy feb slot slot-number revert-from-backup,
where slot-number is the number of the previously active FEB. For more information, see
the CLI Explorer.
When you revert from the backup FEB, it becomes available again for a switchover. If the
redundancy group does not have a primary FEB, the backup FEB reboots after you revert
back to the previously active FEB. If the FEB to which you revert back is not a primary
FEB, the backup FEB is rebooted so that it can aligned with the state of the primary FEB.
If you modify the configuration for an existing redundancy group so that a FEB connects
to a different FPC, the FEB is rebooted unless the FEB was already connected to one or
two Type 1 FPCs and the change only resulted in the FEB being connected either to one
additional or one fewer Type 1 FPC. For more information about how to map a connection
between an FPC and a FEB, see the Junos OS Administration Library. If you change the
primary FEB in a redundancy group, the backup FEB is rebooted. The FEB is also rebooted
if you change a backup FEB to a nonbackup FEB or change an active FEB to a backup
FEB.
To view the status of configured FEB redundancy groups, issue the show chassis
redundancy feb operational mode command. For more information, see the CLI Explorer.
• Outgoing data cell transfer to the FPCs—A second Distributed Buffer Manager ASIC
on the SSB passes data cells to the FPCs for packet reassembly when the data is ready
to be transmitted.
• Route lookups—The Internet Processor ASIC on the SSB performs route lookups using
the forwarding table stored in SSRAM. After performing the lookup, the Internet
Processor ASIC informs the midplane of the forwarding decision, and the midplane
forwards the decision to the appropriate outgoing interface.
• Exception and control packet transfer—The Internet Processor ASIC passes exception
packets to a microprocessor on the SSB, which processes almost all of them. The
remaining packets are sent to the Routing Engine for further processing. Any errors that
originate in the Packet Forwarding Engine and are detected by the SSB are sent to the
Routing Engine using system log messages.
• FPC reset control—The SSB monitors the operation of the FPCs. If it detects errors in
an FPC, the SSB attempts to reset the FPC. After three unsuccessful resets, the SSB
takes the FPC offline and informs the Routing Engine. Other FPCs are unaffected, and
normal system operation continues.
The M20 router holds up to two SSBs. One SSB is configured to act as the master and
the other is configured to serve as a backup in case the master fails. You can initiate a
manual switchover by issuing the request chassis ssb master switch command. For more
information, see the CLI Explorer.
The M40e router holds up to two SFMs, one that is configured to act as the master and
the other configured to serve as a backup in case the master fails. Removing the standby
SFM has no effect on router function. If the active SFM fails or is removed from the chassis,
forwarding halts until the standby SFM boots and becomes active. It takes approximately
1 minute for the new SFM to become active. Synchronizing router configuration information
can take additional time, depending on the complexity of the configuration.
The M160 router holds up to four SFMs. All SFMs are active at the same time. A failure
or taking an SFM offline has no effect on router function. Forwarding continues
uninterrupted.
You can initiate a manual switchover by issuing the request chassis sfm master switch
command. For more information, see the CLI Explorer.
• request chassis cb
The Compact Forwarding Engine Board (CFEB) on the M10i router provides route lookup,
filtering, and switching on incoming data packets, and then directs outbound packets to
the appropriate interface for transmission to the network. The CFEB communicates with
the Routing Engine using a dedicated 100-Mbps Fast Ethernet link that transfers routing
table data from the Routing Engine to the forwarding table in the integrated ASIC. The
link is also used to transfer from the CFEB to the Routing Engine routing link-state updates
and other packets destined for the router that have been received through the router
interfaces.
To configure a CFEB redundancy group, include the following statements at the [edit
chassis redundancy] hierarchy level:
slot-number can be 0 or 1.
To manually switch CFEB mastership, issue the request chassis cfeb master switch
command. To view CFEB status, issue the show chassis cfeb command.
To configure a FEB redundancy group for the M120 router, include the following statements
at the [edit chassis redundancy feb] hierarchy level:
group-name is the unique name for the redundancy group. The maximum length is 39
alphanumeric characters.
slot-number is the slot number of each FEB you want to include in the redundancy group.
The range is from 0 through 5. You must specify exactly one FEB as a backup FEB per
redundancy group. Include the backup keyword when configuring the backup FEB and
make sure that the FEB is not connected to an FPC.
Include the primary keyword to optionally specify one primary FEB per redundancy group.
When the primary keyword is specified for a particular FEB, that FEB is configured for 1:1
redundancy. With 1:1 redundancy, the backup FEB contains the same forwarding state
as the primary FEB. When no FEB in the redundancy group is configured as a primary FEB,
the redundancy group is configured for n:1 redundancy. In this case, the backup FEB has
no forwarding state. When a FEB fails, the forwarding state must be downloaded from
the Routing Engine to the backup FEB before forwarding continues.
A combination of 1:1 and n:1 redundancy is possible when more than two FEBs are present
in a group. The backup FEB contains the same forwarding state as the primary FEB, so
that when the primary FEB fails, 1:1 failover is in effect. When a nonprimary FEB fails, the
backup FEB must be rebooted so that the forwarding state from the nonprimary FEB is
installed on the backup FEB before it can continue forwarding.
You can optionally include the description statement to describe a redundancy group.
To view FEB status, issue the show chassis feb command. For more information, see the
CLI Explorer.
When an active FEB in group0 fails, automatic failover to the backup FEB does not
occur. For group0, you can only perform a manual switchover.
Because you must explicitly configure an FPC not to connect to the backup FEB,
connectivity is set to none between fpc 0 and feb 0 and between fpc 5 and feb 5.
FPC to primary FEB connectivity is not explicitly configured, so by default, the software
automatically assigns connectivity based on the numerical order of the FPCs.
[edit]
chassis {
fpc-feb-connectivity {
fpc 0 feb none;
fpc 5 feb none;
}
redundancy feb {
redundancy-group group0 {
description “Interfaces to Customer X”;
feb 2 primary;
feb 1;
feb 0 backup;
no-auto-failover;
}
redundancy-group group1 {
feb 3;
feb 5 backup;
}
}
By default, the Switching and Forwarding Module (SFM) in slot 0 is the master and the
SFM in slot 1 is the backup. To modify the default configuration, include the sfm statement
at the [edit chassis redundancy] hierarchy level:
To manually switch mastership between SFMs, issue the request chassis sfm master
switch command. To view SFM status, issue the show chassis sfm command. For more
information, see the CLI Explorer.
For M20 routers with two System and Switch Boards (SSBs), you can configure which
SSB is the master and which is the backup. By default, the SSB in slot 0 is the master
and the SSB in slot 1 is the backup. To modify the default configuration, include the ssb
statement at the [edit chassis redundancy] hierarchy level:
slot-number is 0 or 1.
To manually switch mastership between SSBs, issue the request chassis ssb master
switch command.
To display SSB status information, issue the show chassis ssb command. The command
output displays the number of times the mastership has changed, the SSB slot number,
and the current state of the SSB: master, backup, or empty. For more information, see
the CLI Explorer.
• Understanding BFD for Static Routes for Faster Network Failure Detection on page 27
• Understanding BFD for BGP on page 31
• Understanding BFD for OSPF on page 33
• Understanding BFD for IS-IS on page 35
• Understanding BFD for RIP on page 38
• Understanding Independent Micro BFD Sessions for LAG on page 39
• Understanding Distributed BFD on page 42
• Understanding Static Route State When BFD is in Admin Down State on page 45
Understanding BFD for Static Routes for Faster Network Failure Detection
The Bidirectional Forwarding Detection (BFD) protocol is a simple hello mechanism that
detects failures in a network. BFD works with a wide variety of network environments
and topologies. A pair of routing devices exchanges BFD packets. Hello packets are sent
at a specified, regular interval. A neighbor failure is detected when the routing device
stops receiving a reply after a specified interval. The BFD failure detection timers have
shorter time limits than the static route failure detection mechanisms, so they provide
faster detection.
The BFD failure detection timers can be adjusted to be faster or slower. The lower the
BFD failure detection timer value, the faster the failure detection and vice versa. For
example, the timers can adapt to a higher value if the adjacency fails (that is, the timer
detects failures more slowly). Or a neighbor can negotiate a higher value for a timer than
the configured value. The timers adapt to a higher value when a BFD session flap occurs
more than three times in a span of 15 seconds. A back-off algorithm increases the receive
(Rx) interval by two if the local BFD instance is the reason for the session flap. The
transmission (Tx) interval is increased by two if the remote BFD instance is the reason
for the session flap. You can use the clear bfd adaptation command to return BFD interval
timers to their configured values. The clear bfd adaptation command is hitless, meaning
that the command does not affect traffic flow on the routing device.
In Junos OS Release 9.1 and later, the BFD protocol is supported for IPv6 static routes.
Global unicast and link-local IPv6 addresses are supported for static routes. The BFD
protocol is not supported on multicast or anycast IPv6 addresses. For IPv6, the BFD
protocol supports only static routes and only in Junos OS Release 9.3 and later. IPv6 for
BFD is also supported for the eBGP protocol.
There are three types of BFD sessions based on the source from which BFD packets are
sent to the neighbors. Different types of BFD sessions and their descriptions are:
NOTE: Starting in Junos OS Release 16.1R1, the inline BFD sessions are
supported on integrated routing and bridging (IRB) interfaces.
To configure the BFD protocol for IPv6 static routes, include the bfd-liveness-detection
statement at the [edit routing-options rib inet6.0 static route destination-prefix] hierarchy
level.
In Junos OS Release 8.5 and later, you can configure a hold-down interval to specify how
long the BFD session must remain up before a state change notification is sent.
To specify the hold-down interval, include the holddown-interval statement in the BFD
configuration.
You can configure a number in the range from 0 through 255,000 milliseconds. The
default is 0. If the BFD session goes down and then comes back up during the hold-down
interval, the timer is restarted.
NOTE: If a single BFD session includes multiple static routes, the hold-down
interval with the highest value is used.
To specify the minimum transmit and receive intervals for failure detection, include the
minimum-interval statement in the BFD configuration.
This value represents both the minimum interval after which the local routing device
transmits hello packets and the minimum interval after which the routing device expects
to receive a reply from the neighbor with which it has established a BFD session. You can
configure a number in the range from 1 through 255,000 milliseconds. Optionally, instead
of using this statement, you can configure the minimum transmit and receive intervals
separately using the transmit-interval minimum-interval and minimum-receive-interval
statements.
To specify the minimum receive interval for failure detection, include the
minimum-receive-interval statement in the BFD configuration. This value represents the
minimum interval after which the routing device expects to receive a reply from a neighbor
with which it has established a BFD session. You can configure a number in the range
from 1 through 255,000 milliseconds. Optionally, instead of using this statement, you
can configure the minimum receive interval using the minimum-interval statement at the
[edit routing-options static route destination-prefix bfd-liveness-detection] hierarchy level.
To specify the number of hello packets not received by the neighbor that causes the
originating interface to be declared down, include the multiplier statement in the BFD
configuration.
The default value is 3. You can configure a number in the range from 1 through 255.
To specify a threshold for detecting the adaptation of the detection time, include the
threshold statement in the BFD configuration.
When the BFD session detection time adapts to a value equal to or higher than the
threshold, a single trap and a system log message are sent. The detection time is based
on the multiplier of the minimum-interval or the minimum-receive-interval value. The
threshold must be a higher value than the multiplier for either of these configured values.
For example if the minimum-receive-interval is 300 ms and the multiplier is 3, the total
detection time is 900 ms. Therefore, the detection time threshold must have a value
higher than 900.
To specify the minimum transmit interval for failure detection, include the transmit-interval
minimum-interval statement in the BFD configuration.
This value represents the minimum interval after which the local routing device transmits
hello packets to the neighbor with which it has established a BFD session. You can
configure a value in the range from 1 through 255,000 milliseconds. Optionally, instead
of using this statement, you can configure the minimum transmit interval using the
minimum-interval statement at the [edit routing-options static route destination-prefix
bfd-liveness-detection] hierarchy level.
To specify the threshold for the adaptation of the transmit interval, include the
transmit-interval threshold statement in the BFD configuration.
The threshold value must be greater than the transmit interval. When the BFD session
transmit time adapts to a value greater than the threshold, a single trap and a system
log message are sent. The detection time is based on the multiplier of the value for the
minimum-interval or the minimum-receive-interval statement at the [edit routing-options
static route destination-prefix bfd-liveness-detection] hierarchy level. The threshold must
be a higher value than the multiplier for either of these configured values.
To specify the BFD version, include the version statement in the BFD configuration. The
default is to have the version detected automatically.
To include an IP address for the next hop of the BFD session, include the neighbor
statement in the BFD configuration.
NOTE: You must configure the neighbor statement if the next hop specified
is an interface name. If you specify an IP address as the next hop, that address
is used as the neighbor address for the BFD session.
In Junos OS Release 9.0 and later, you can configure BFD sessions not to adapt to
changing network conditions.
To disable BFD adaptation, include the no-adaptation statement in the BFD configuration.
NOTE: If BFD is configured only on one end of a static route, the route is
removed from the routing table. BFD establishes a session when BFD is
configured on both ends of the static route.
BFD is not supported on ISO address families in static routes. BFD does
support IS-IS.
If you configure graceful Routing Engine switchover (GRES) at the same time
as BFD, GRES does not preserve the BFD state information during a failover.
16.1R1 Starting in Junos OS Release 16.1R1, the inline BFD sessions are supported on
integrated routing and bridging (IRB) interfaces.
15.1X49-D70 Starting with Junos OS Release 15.1X49-D70 and Junos OS Release 17.3R1, the
bfd-liveness-detection command includes the description field. The
description is an attribute under the bfd-liveness-detection object and it is
supported only on SRX Series devices. This field is applicable only for the static
routes.
15.1F6 Inline BFD is supported on PTX3000 routers with third-generation FPCs starting
in Junos OS Release 15.1F6 and 16.1R2.
15.1F3 Inline BFD is supported on PTX5000 routers with third-generation FPCs starting
in Junos OS Release 15.1F3 and 16.1R2.
13.3 Starting in Junos OS Release 13.3, inline BFD is supported only on static MX
Series routers with MPCs/MICs that have configured enhanced-ip.
• Example: Enabling BFD on Qualified Next Hops in Static Routes for Route Selection
The Bidirectional Forwarding Detection (BFD) protocol is a simple hello mechanism that
detects failures in a network. Hello packets are sent at a specified, regular interval. A
neighbor failure is detected when the routing device stops receiving a reply after a specified
interval. BFD works with a wide variety of network environments and topologies. The
failure detection timers for BFD have shorter time limits than default failure detection
mechanisms for BGP, so they provide faster detection.
NOTE: Configuring both BFD and graceful restart for BGP on the same device
is counterproductive. When an interface goes down, BFD detects this instantly,
stops traffic forwarding and the BGP session goes down whereas graceful
restart forwards traffic despite the interface failure, this behavior might cause
network issues. Hence we do not recommend configuring both BFD and
graceful restart on the same device.
The BFD failure detection timers can be adjusted to be faster or slower. The lower the
BFD failure detection timer value, the faster the failure detection and vice versa. For
example, the timers can adapt to a higher value if the adjacency fails (that is, the timer
detects failures more slowly). Or a neighbor can negotiate a higher value for a timer than
the configured value. The timers adapt to a higher value when a BFD session flap occurs
more than three times in a span of 15 seconds. A back-off algorithm increases the receive
(Rx) interval by two if the local BFD instance is the reason for the session flap. The
transmission (Tx) interval is increased by two if the remote BFD instance is the reason
for the session flap. You can use the clear bfd adaptation command to return BFD interval
timers to their configured values. The clear bfd adaptation command is hitless, meaning
that the command does not affect traffic flow on the routing device.
NOTE: On all SRX Series devices, high CPU utilization triggered for reasons
such as CPU intensive commands and SNMP walks causes the BFD protocol
to flap while processing large BGP updates. (Platform support depends on
the Junos OS release in your installation.)
In Junos OS Release 8.3 and later, BFD is supported on internal BGP (IBGP) and multihop
external BGP (EBGP) sessions as well as on single-hop EBGP sessions. In Junos OS
Release 9.1 through Junos OS Release 11.1, BFD supports IPv6 interfaces in static routes
only. In Junos OS Release 11.2 and later, BFD supports IPv6 interfaces with BGP.
15.1X49-D100 Starting with Junos OS Release 15.1X49-D100, SRX300 and SRX320 devices
support real-time BFD.
11.2 In Junos OS Release 11.2 and later, BFD supports IPv6 interfaces with BGP.
9.1 In Junos OS Release 9.1 through Junos OS Release 11.1, BFD supports IPv6
interfaces in static routes only.
8.3 In Junos OS Release 8.3 and later, BFD is supported on internal BGP (IBGP)
and multihop external BGP (EBGP) sessions as well as on single-hop EBGP
sessions.
The Bidirectional Forwarding Detection (BFD) protocol is a simple hello mechanism that
detects failures in a network. BFD works with a wide variety of network environments
and topologies. A pair of routing devices exchange BFD packets. Hello packets are sent
at a specified, regular interval. A neighbor failure is detected when the routing device
stops receiving a reply after a specified interval. The BFD failure detection timers have
shorter time limits than the OSPF failure detection mechanisms, so they provide faster
detection.
The BFD failure detection timers are adaptive and can be adjusted to be faster or slower.
The lower the BFD failure detection timer value, the faster the failure detection and vice
versa. For example, the timers can adapt to a higher value if the adjacency fails (that is,
the timer detects failures more slowly). Or a neighbor can negotiate a higher value for a
timer than the configured value. The timers adapt to a higher value when a BFD session
flap occurs more than three times in a span of 15 seconds. A back-off algorithm increases
the receive (Rx) interval by two if the local BFD instance is the reason for the session
flap. The transmission (Tx) interval is increased by two if the remote BFD instance is the
reason for the session flap. You can use the clear bfd adaptation command to return BFD
interval timers to their configured values. The clear bfd adaptation command is hitless,
meaning that the command does not affect traffic flow on the routing device.
NOTE: BFD is supported for OSPFv3 in Junos OS Release 9.3 and later.
• full-neighbors-only—Ability to establish BFD sessions only for OSPF neighbors with full
neighbor adjacency. The default behavior is to establish BFD sessions for all OSPF
neighbors. This setting is available in Junos OS Release 9.5 and later.
• multiplier—Multiplier for hello packets. This setting configures the number of hello
packets that are not received by a neighbor, which causes the originating interface to
be declared down. By default, three missed hello packets cause the originating interface
to be declared down.
• version—BFD version. This setting configures the BFD version used for detection. You
can explicitly configure BFD version 1, or the routing device can automatically detect
the BFD version. By default, the routing device automatically detects the BFD version
automatically, which is either 0 or 1.
The Bidirectional Forwarding Detection (BFD) protocol is a simple hello mechanism that
detects failures in a network. Hello packets are sent at a specified, regular interval. A
neighbor failure is detected when the routing device stops receiving a reply after a specified
interval. BFD works with a wide variety of network environments and topologies. The
failure detection timers for BFD have shorter time limits than the failure detection
mechanisms of IS-IS, providing faster detection.
The BFD failure detection timers are adaptive and can be adjusted to be faster or slower.
For example, the timers can adapt to a higher value if the adjacency fails, or a neighbor
can negotiate a higher value for a timer than the configured value. The timers adapt to
a higher value when a BFD session flap occurs more than three times in a span of 15
seconds. A back-off algorithm increases the receive (RX) interval by two if the local BFD
instance is the reason for the session flap. The transmission (TX) interval is increased by
two if the remote BFD instance is the reason for the session flap.
You can use the clear bfd adaptation command to return BFD interval timers to their
configured values. The clear bfd adaptation command is hitless, meaning that the
command does not affect traffic flow on the routing device.
NOTE: Starting with Junos OS Release 16.1R1, you can configure IS-IS BFD
sessions for IPv6 by including the bfd-liveness-detection statement at the
[edit protocols isis interface interface-name family inet|inet6] hierarchy level.
• For interfaces that support both IPv4 and IPv6 routing, the
bfd-liveness-detection statement must be configured separately for each
inet family.
• BFD over IPv6 link local address is currently not distributed because IS-IS
uses link local addresses for forming adjacencies.
• BFD sessions over IPv6 must not have the same aggressive detection
intervals as IPv4 sessions.
• BFD IPv6 sessions with detection intervals less than 2.5 seconds are
currently not supported when nonstop active routing (NSR) is enabled.
To detect failures in the network, the set of statements in Table 3 on page 36 are used
in the configuration.
minimum-interval Specify the minimum transmit and receive intervals for failure detection.
milliseconds
This value represents the minimum interval at which the local router transmits hellos packets as
well as the minimum interval at which the router expects to receive a reply from a neighbor with
which it has established a BFD session. You can configure a number from 1 through
255,000 milliseconds. You can also specify the minimum transmit and receive intervals separately.
NOTE: BFD is an intensive protocol that consumes system resources. Specifying a minimum interval
for BFD less than 100 ms for Routing Engine-based sessions and 10 ms for distributed BFD sessions
can cause undesired BFD flapping.
• For large-scale network deployments with a large number of BFD sessions, specify a minimum
interval of 300 ms for Routing Engine-based sessions and 100 ms for distributed BFD sessions.
• For very large-scale network deployments with a large number of BFD sessions, please contact
Juniper Networks customer support for more information.
• For BFD sessions to remain up during a Routing Engine switchover event when nonstop active
routing (NSR) is configured, specify a minimum interval of 2500 ms for Routing Engine-based
sessions. For distributed BFD sessions with nonstop active routing configured, the minimum
interval recommendations are unchanged and depend only on your network deployment.
minimum-receive-interval Specify only the minimum receive interval for failure detection.
milliseconds
This value represents the minimum interval at which the local router expects to receive a reply
from a neighbor with which it has established a BFD session. You can configure a number from 1
through 255,000 milliseconds.
multiplier number Specify the number of hello packets not received by the neighbor that causes the originating
interface to be declared down.
The default is 3, and you can configure a value from 1 through 225.
In Junos OS Release 9.0 and later, you can specify that the BFD sessions not adapt to changing
network conditions.
NOTE: We recommend that you not disable BFD adaptation unless it is preferable not to have
BFD adaptation enabled in your network.
NOTE: The threshold value must be greater than the minimum transmit interval multiplied by the
multiplier number.
NOTE: You can trace BFD operations by including the traceoptions statement
at the [edit protocols bfd] hierarchy level.
For a list of hierarchy levels at which you can include these statements, see the statement
summary sections for these statements.
The Bidirectional Forwarding Detection (BFD) Protocol is a simple hello mechanism that
detects failures in a network. Hello packets are sent at a specified, regular interval. A
neighbor failure is detected when the routing device stops receiving a reply after a specified
interval. BFD works with a wide variety of network environments and topologies. BFD
failure detection times are shorter than RIP detection times, providing faster reaction
times to various kinds of failures in the network. Instead of waiting for the routing protocol
neighbor timeout, BFD provides rapid detection of link failures. BFD timers are adaptive
and can be adjusted to be more or less aggressive. For example, a timer can adapt to a
higher value if the adjacency fails, or a neighbor can negotiate a higher value for a timer
than the one configured. Note that the functionality of configuring BFD for RIP described
in this topic is not supported in Junos OS Releases 15.1X49, 15.1X49-D30, or 15.1X49-D40.
BFD enables quick failover between a primary and a secondary routed path. The protocol
tests the operational status of the interface multiple times per second. BFD provides for
configuration timers and thresholds for failure detection. For example, if the minimum
interval is set for 50 milliseconds and the threshold uses the default value of three missed
messages, a failure is detected on an interface within 200 milliseconds of the failure.
Intervening devices (for example, an Ethernet LAN switch) hide link-layer failures from
routing protocol peers, such as when two routers are connected by way of a LAN switch,
where the local interface status remains up even when a physical fault happens on the
remote link. Link-layer failure detection times vary, depending on the physical media and
the Layer 2 encapsulation. BFD can provide fast failure detection times for all media
types, encapsulations, topologies, and routing protocols.
To enable BFD for RIP, both sides of the connection must receive an update message
from the peer. By default, RIP does not export any routes. Therefore, you must enable
update messages to be sent by configuring an export policy for routes before a BFD
session is triggered.
15.1X49 Note that the functionality of configuring BFD for RIP described in this
topic is not supported in Junos OS Releases 15.1X49, 15.1X49-D30, or
15.1X49-D40.
Starting with Junos OS Release 13.3, this feature is supported on the following PIC/FPC
types:
• All FPCs on PTX Series with Ethernet interfaces in Junos OS Release 14.1R3 and later
14.1 releases, and Junos 14.2 and later
TIP: See PTX Series PIC/FPC Compatibility for a list of PICs that are supported
on each PTX Series FPC.
the status of the UDP port, independent micro BFD sessions monitor the status of
individual member links.
The individual BFD sessions determine the Layer 2 and Layer 3 connectivity of each
member link in the LAG. Once a BFD session is established on a particular link, the member
links are attached to the LAG and the load balancer either by a static configuration or by
the Link Aggregation Control Protocol (LACP). If the member links are attached to the
LAG by a static configuration, the device control process acts as the client to the micro
BFD session. When member links are attached to the LAG by the LACP, the LACP acts
as the client to the micro BFD session.
When the micro BFD session is up, a LAG link is established and data is transmitted over
that LAG link. If the micro BFD session on a member link is down, that particular member
link is removed from the load balancer, and the LAG managers stop directing traffic to
that link. These micro BFD sessions are independent of each other despite having a single
client that manages the LAG interface.
• Non-Distribution Mode—You can configure the BFD session to run in this mode by
including the no-delegate-processing statement under periodic packet management
(PPM). In this mode, the packets are being sent or received by the Routing Engine at
Layer 2.
A pair of routing devices in a LAG exchange BFD packets at a specified, regular interval.
The routing device detects a neighbor failure when it stops receiving a reply after a
specified interval. This allows the quick verification of member link connectivity with or
without LACP. A UDP port distinguishes BFD over LAG packets from BFD over single-hop
IP.
NOTE: IANA has allocated 6784 as the UDP destination port for micro BFD.
To enable failure detection for LAG networks for aggregated Ethernet interfaces:
• Specify a hold-down interval value to set the minimum time that the BFD session must
remain up before a state change notification is sent to the other members in the LAG
network.
• Specify the minimum interval that indicates the time interval for transmitting and
receiving data.
• Starting with Junos OS Release 14.1, specify the neighbor in a BFD session. In releases
prior to Junos OS Release 16.1, you must configure the loopback address of the remote
destination as the neighbor address. Beginning with Junos OS Release 16.1, you can
also configure this feature with the AE interface address of the remote destination as
the neighbor address.
NOTE: Beginning with Release 16.1R2, Junos OS checks and validates the
configured micro BFD local-address against the interface or loopback IP
address before the configuration commit. Junos OS performs this check
on both IPv4 and IPv6 micro BFD address configurations, and if they do
not match, the commit fails.
NOTE: This feature works only when both the devices support BFD. If BFD is
configured at one end of the LAG, this feature does not work.
For the IPv6 address family, disable duplicate address detection before
configuring this feature with AE interface addresses. To disable duplicate
address detection, include the dad-disable statement at the [edit interface
aex unit y family inet6] hierarchy level.
16.1 Beginning with Release 16.1R2, Junos OS checks and validates the configured
micro BFD local-address against the interface or loopback IP address before the
configuration commit.
14.1 Starting with Junos OS Release 14.1, specify the neighbor in a BFD session. In
releases prior to Junos OS Release 16.1, you must configure the loopback address
of the remote destination as the neighbor address.
13.3 Starting with Junos OS Release 13.3, IANA has allocated 01-00-5E-90-00-01 as
the dedicated MAC address for micro BFD.
The terms nondistributed BFD and centralized BFD refer to BFD that runs on the Routing
Engine. The term distributed BFD refers to BFD that runs on the Packet Forwarding Engine.
For both single-hop BFD and multihop BFD, the BFD session can be made to run on the
Routing Engine (in nondistributed mode) by configuring set routing-options ppm
no-delegate-processing and then running the clear bfd session command.
The benefits of distributed BFD are mainly in the scaling and performance areas.
• Runs BFD sessions with a shorter transfer/receive timer interval, which can in turn be
used to bring down the overall detection time.
• Separates the functionality of BFD from that of the Routing Engine. This means that
a BFD session can stay up during graceful restart, even with an aggressive interval. The
minimum interval for Routing Engine-based BFD sessions to survive graceful Routing
Engine switchover is 2500 ms, This is improved to sub-second times with distribution.
• Offloads the processing to the FPC CPU. This frees up the Routing Engine CPU, resulting
in improved scaling and performance for Routing Engine-based applications.
• To enable real-time BFD on SRX300 and SRX320 devices, use the set chassis
realtime-ukern-thread command.
Table 4 on page 43 lists the BFD modes supported on SRX Series devices.
SRX Series devices support the following maximum number of BFD sessions:
To determine if a BFD peer is running distributed BFD, run the show bfd sessions extensive
command and look for Remote is control-plane independent in the command output.
For distributed BFD to work, you need to configure the lo0 interface with unit 0 and the
appropriate family.
• BFD over VLAN interfaces in EX Series switches, both IPv4 and IPv6
• Virtual Circuit Connectivity Verification (VCCV) BFD (Layer 2 circuit, Layer 3 VPN, and
VPLS) (MPLS)
For information about troubleshooting BFD, see Juniper Networks Knowledge Base article
26746.
The term redirect rule here denotes the capability of an interface to send
protocol redirect messages. See Disabling the Transmission of Redirect
Messages on an Interface.
13.3R5 Starting in Junos OS Release 13.3R5, if you apply a firewall filter on a loopback
interface for a multihop BFD session with a delegated anchor FPC, Junos OS
does not execute this filter, because there is an implicit filter on all ingress
FPCs to forward packets to the anchor FPC.
13.3 Starting in Junos OS Release 13.3, the distribution of adjacency entry (the IP
addresses of adjacent routers) and transmit entry (the IP address of
transmitting routers) for a BFD session is asymmetric.
• Understanding BFD for Static Routes for Faster Network Failure Detection on page 27
The Bidirectional Forwarding Detection (BFD) Admin Down state is used to bring down
a BFD session administratively (applicable for normal BFD session and micro BFD session),
to protect client applications from BFD configuration removal, license issues, and clearing
of BFD sessions.
When BFD enters the Admin Down state, BFD notifies the new state to its peer for a
failure detection time and after the time expires, the client stops transmitting packets.
For the Admin Down state to work, the peer, which receives the Admin Down state
notification, must have the capability to distinguish between administratively down state
and real link failure.
A BFD session moves to the Admin Down state under the following conditions:
• If BFD configuration is removed for the last client tied to a BFD session, BFD moves to
Admin Down state and communicates the change to the peer, to enable the client
protocols without going down.
• If BFD license is removed on the client, BFD moves to Admin Down state and
communicates the change to the remote system to enable the client protocols without
going down.
• When clear bfd session command is executed, the BFD sessions move to Admin Down
state before restarting. This clear bfd session command also ensures that the client
applications are not impacted.
Starting from Junos OS 16.1R1 release, you can set the state of static route in BFD Admin
Down state by configuring one of the following commands:
Related • Understanding BFD for Static Routes for Faster Network Failure Detection on page 27
Documentation
• Example: Configuring BFD for Static Routes for Faster Network Failure Detection on
page 47
Configuring BFD
• Example: Configuring BFD for Static Routes for Faster Network Failure
Detection on page 47
• Example: Configuring BFD on Internal BGP Peer Sessions on page 53
• Example: Configuring BFD for OSPF on page 62
• Example: Configuring BFD for IS-IS on page 66
• Example: Configuring BFD for RIP on page 73
• Configuring Independent Micro BFD Sessions for LAG on page 79
• Example: Configuring Independent Micro BFD Sessions for LAG on page 84
• Configuring BFD for PIM on page 94
• Enabling Dedicated and Real-time BFD on page 96
Example: Configuring BFD for Static Routes for Faster Network Failure Detection
This example shows how to configure Bidirectional Forwarding Detection (BFD) for static
routes.
• Requirements on page 47
• Overview on page 47
• Configuration on page 48
• Verification on page 51
Requirements
In this example, no special configuration beyond device initialization is required.
Overview
There are many practical applications for static routes. Static routing is often used at the
network edge to support attachment to stub networks, which, given their single point of
entry and egress, are well suited to the simplicity of a static route. In Junos OS, static
routes have a global preference of 5. Static routes are activated if the specified next hop
is reachable.
In this example, you configure the static route [Link]/24 from the provider network
to the customer network, using the next-hop address of [Link]. You also configure a
static default route of [Link]/0 from the customer network to the provider network,
using a next-hop address of [Link].
For demonstration purposes, some loopback interfaces are configured on Device B and
Device D. These loopback interfaces provide addresses to ping and thus verify that the
static routes are working.
Provider network
[Link]
[Link]
...
.1
[Link]/24
.2
Customer network
[Link]
[Link]
g041171
...
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@B# set ge-1/2/0 unit 0 description B->D
user@B# set ge-1/2/0 unit 0 family inet address [Link]/24
user@B# set lo0 unit 57 family inet address [Link]/32
user@B# set lo0 unit 57 family inet address [Link]/32
[edit routing-options]
user@B# set static route [Link]/24 next-hop [Link]
[edit routing-options]
user@B# set static route [Link]/24 bfd-liveness-detection minimum-interval
1000
set routing-options static route [Link]/24 bfd-liveness-detection description
Site-xxx
[edit protocols]
user@B# set bfd traceoptions file bfd-trace
user@B# set bfd traceoptions flag all
[edit]
user@B# commit
[edit interfaces]
user@D# set ge-1/2/0 unit 1 description D->B
user@D# set ge-1/2/0 unit 1 family inet address [Link]/24
user@D# set lo0 unit 2 family inet address [Link]/32
user@D# set lo0 unit 2 family inet address [Link]/32
[edit routing-options]
[edit routing-options]
user@D# set static route [Link]/0 bfd-liveness-detection minimum-interval 1000
[edit protocols]
user@D# set bfd traceoptions file bfd-trace
user@D# set bfd traceoptions flag all
[edit]
user@D# commit
Results
Confirm your configuration by issuing the show interfaces, show protocols, and show
routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
next-hop [Link];
bfd-liveness-detection {
description Site- xxx;
minimum-interval 1000;
}
}
}
Verification
Confirm that the configuration is working properly.
Purpose Verify that the BFD sessions are up, and view details about the BFD sessions.
Action From operational mode, enter the show bfd session extensive command.
1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
NOTE: The description Site- <xxx> is supported only on the SRX Series
devices.
If each client has more than one description field, then it displays "and more"
along with the first description field.
1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
Meaning The TX interval 1.000, RX interval 1.000 output represents the setting configured with the
minimum-interval statement. All of the other output represents the default settings for
BFD. To modify the default settings, include the optional statements under the
bfd-liveness-detection statement.
Purpose View the contents of the BFD trace file to assist in troubleshooting, if needed.
Action From operational mode, enter the file show /var/log/bfd-trace command.
Related • Understanding BFD for Static Routes for Faster Network Failure Detection on page 27
Documentation
This example shows how to configure internal BGP (IBGP) peer sessions with the
Bidirectional Forwarding Detection (BFD) protocol to detect failures in a network.
• Requirements on page 53
• Overview on page 53
• Configuration on page 55
• Verification on page 59
Requirements
No special configuration beyond device initialization is required before you configure this
example.
Overview
The minimum configuration to enable BFD on IBGP sessions is to include the
bfd-liveness-detection minimum-interval statement in the BGP configuration of all
neighbors participating in the BFD session. The minimum-interval statement specifies
the minimum transmit and receive intervals for failure detection. Specifically, this value
represents the minimum interval after which the local routing device transmits hello
packets as well as the minimum interval that the routing device expects to receive a reply
from a neighbor with which it has established a BFD session. You can configure a value
from 1 through 255,000 milliseconds.
Optionally, you can specify the minimum transmit and receive intervals separately using
the transmit-interval minimum-interval and minimum-receive-interval statements. For
information about these and other optional BFD configuration statements, see
bfd-liveness-detection.
• For BFD sessions to remain up during the dual chassis cluster control link
scenario, when the first control link fails, specify the minimum interval of
6 seconds to prevent the LACP from flapping on the secondary node for
Routing Engine-based sessions.
BFD is supported on the default routing instance (the main router), routing instances,
and logical systems. This example shows BFD on logical systems.
[Link]
AS 17 A
[Link]
C B
[Link]
g040732
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Configuring Device A
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure Device A:
3. Configure BGP.
The neighbor statements are included for both Device B and Device C, even though
Device A is not directly connected to Device C.
4. Configure BFD.
You must configure the same minimum interval on the connecting peer.
6. Configure OSPF.
Other useful options for this scenario might be to accept routes learned through
OSPF or local routes.
[edit routing-options]
user@host:A# set router-id [Link]
user@host:A# set autonomous-system 17
9. If you are done configuring the device, enter commit from configuration mode.
Repeat these steps to configure Device B and Device C.
Results From configuration mode, confirm your configuration by entering the show interfaces,
show policy-options, show protocols, and show routing-options commands. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show bgp neighbor command. You can use the | match
bfd filter to narrow the output.
Meaning The output shows that Logical System A has two neighbors with BFD enabled. When
BFD is not enabled, the output displays BFD: disabled, down, and the <BfdEnabled> option
is absent. If BFD is enabled and the session is down, the output displays BFD: enabled,
down. The output also shows that BFD-related events are being written to a log file
because trace operations are configured.
Purpose Verify that the BFD sessions are up, and view details about the BFD sessions.
Action From operational mode, enter the show bfd session extensive command.
Detect Transmit
Address State Interface Time Interval Multiplier
[Link] Up 3.000 1.000 3
Client BGP, TX interval 1.000, RX interval 1.000
Session up time [Link]
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
Logical system 12, routing table index 25
Min async interval 1.000, min slow interval 1.000
Adaptive async TX interval 1.000, RX interval 1.000
Local min TX interval 1.000, minimum RX interval 1.000, multiplier 3
Remote min TX interval 1.000, min RX interval 1.000, multiplier 3
Local discriminator 14, remote discriminator 13
Echo mode disabled/inactive
Multi-hop route table 25, local-address [Link]
2 sessions, 2 clients
Cumulative transmit rate 2.0 pps, cumulative receive rate 2.0 pps
Meaning The TX interval 1.000, RX interval 1.000 output represents the setting configured with the
minimum-interval statement. All of the other output represents the default settings for
BFD. To modify the default settings, include the optional statements under the
bfd-liveness-detection statement.
Purpose View the contents of the BFD trace file to assist in troubleshooting, if needed.
Action From operational mode, enter the file show /var/log/A/bgp-bfd command.
Meaning Before the routes are established, the No route to host message appears in the output.
After the routes are established, the last two lines show that both BFD sessions come
up.
Purpose Check to see what happens after bringing down a router or switch and then bringing it
back up. To simulate bringing down a router or switch, deactivate the loopback interface
on Logical System B.
Action 1. From configuration mode, enter the deactivate logical-systems B interfaces lo0 unit 2
family inet command.
3. From configuration mode, enter the activate logical-systems B interfaces lo0 unit 2
family inet command.
This example shows how to configure the Bidirectional Forwarding Detection (BFD)
protocol for OSPF.
• Requirements on page 62
• Overview on page 63
• Configuration on page 64
• Verification on page 66
Requirements
Before you begin:
• Configure the device interfaces. See the Junos OS Network Interfaces Library for Routing
Devices.
• Configure the router identifiers for the devices in your OSPF network. See Example:
Configuring an OSPF Router Identifier.
• Control OSPF designated router election. See Example: Controlling OSPF Designated
Router Election.
Overview
An alternative to adjusting the OSPF hello interval and dead interval settings to increase
route convergence is to configure BFD. The BFD protocol is a simple hello mechanism
that detects failures in a network. The BFD failure detection timers have shorter timer
limits than the OSPF failure detection mechanisms, thereby providing faster detection.
BFD is useful on interfaces that are unable to detect failure quickly, such as Ethernet
interfaces. Other interfaces, such as SONET interfaces, already have built-in failure
detection. Configuring BFD on those interfaces is unnecessary.
You configure BFD on a pair of neighboring OSPF interfaces. Unlike the OSPF hello interval
and dead interval settings, you do not have to enable BFD on all interfaces in an OSPF
area.
• full-neighbors-only—In Junos OS Release 9.5 and later, configures the BFD protocol to
establish BFD sessions only for OSPF neighbors with full neighbor adjacency. The
default behavior is to establish BFD sessions for all OSPF neighbors.
NOTE:
• For the bfdd process, the detection time interval set is lower
Configuration
CLI Quick To quickly configure the BFD protocol for OSPF, copy the following commands, paste
Configuration them into a text file, remove any line breaks, change any details necessary to match your
network configuration, copy and paste the commands into the CLI at the [edit] hierarchy
level, and then enter commit from configuration mode.
[edit]
set protocols ospf area [Link] interface fe-0/0/1 bfd-liveness-detection minimum-interval
300
set protocols ospf area [Link] interface fe-0/0/1 bfd-liveness-detection multiplier 4
set protocols ospf area [Link] interface fe-0/0/1 bfd-liveness-detection full-neighbors-only
Step-by-Step To configure the BFD protocol for OSPF on one neighboring interface:
Procedure
1. Create an OSPF area.
[edit]
user@host# edit protocols ospf area [Link]
4. Configure the number of missed hello packets that cause the originating interface
to be declared down.
5. Configure BFD sessions only for OSPF neighbors with full neighbor adjacency.
Results Confirm your configuration by entering the show protocols ospf command. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
minimum-interval 300;
multiplier 4;
full-neighbors-only;
}
}
}
To confirm your OSPFv3 configuration, enter the show protocols ospf3 command.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the OSPF interfaces have active BFD sessions, and that session components
have been configured correctly.
Action From operational mode, enter the show bfd session detail command.
• The Interface field displays the interface you configured for BFD.
• The State field displays the state of the neighbor and should show Full to reflect the
full neighbor adjacency that you configured.
• The Transmit Interval field displays the time interval you configured to send BFD
packets.
This example describes how to configure the Bidirectional Forwarding Detection (BFD)
protocol to detect failures in an IS-IS network.
NOTE: BFD is not supported with ISIS for IPV6 on QFX10000 series switches.
• Requirements on page 67
• Overview on page 67
• Configuration on page 67
• Verification on page 70
Requirements
Before you begin, configure IS-IS on both routers. See Example: Configuring IS-IS for
information about the required IS-IS configuration.
Overview
This example shows two routers connected to each other. A loopback interface is
configured on each router. IS-IS and BFD protocols are configured on both routers.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Router R1
Router R2
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode.
NOTE: To simply configure BFD for IS-IS, only the minimum-interval statement
is required. The BFD protocol selects default parameters for all the other
configuration statements when you use the bfd-liveness-detection statement
without specifying any parameters.
NOTE: You can change parameters at any time without stopping or restarting
the existing session. BFD automatically adjusts to the new parameter value.
However, no changes to BFD parameters take place until the values
resynchronize with each BFD peer.
2. Configure the threshold for the adaptation of the detection time, which must be
greater than the multiplier number multiplied by the minimum interval.
3. Configure the minimum transmit and receive intervals for failure detection.
6. Configure the threshold for the transmit interval, which must be greater than the
minimum transmit interval.
8. Configure the multiplier number, which is the number of hello packets not received
by the neighbor that causes the originating interface to be declared down.
Results
From configuration mode, confirm your configuration by issuing the show protocols isis
interface command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
bfd-liveness-detection {
version automatic;
minimum-interval 2;
minimum-receive-interval 1;
multiplier 2;
no-adaptation;
transmit-interval {
minimum-interval 1;
threshold 3;
}
detection-time {
threshold 5;
}
}
...
bfd-liveness-detection {
version automatic;
minimum-interval 3;
minimum-receive-interval 1;
multiplier 2;
no-adaptation;
transmit-interval {
minimum-interval 1;
threshold 4;
}
detection-time {
threshold 6;
}
}
...
Verification
Confirm that the configuration is working properly.
Purpose Make sure that Routers R1 and R2 are connected to each other.
Action Ping the other router to check the connectivity between the two routers as per the network
topology.
Purpose Make sure that the IS-IS instance is running on both routers.
Action Use the show isis database statement to check if the IS-IS instance is running on both
routers, R1 and R2.
Purpose Make sure that the BFD instance is running on both routers, R1 and R2.
Action Use the show bfd session detail statement to check if BFD instance is running on the
routers.
1 sessions, 2 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
1 sessions, 1 clients
Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
Meaning BFD is configured on Routers R1 and R2 for detecting failures in the IS-IS network.
This example shows how to configure Bidirectional Forwarding Detection (BFD) for a
RIP network.
• Requirements on page 73
• Overview on page 73
• Configuration on page 75
• Verification on page 77
Requirements
No special configuration beyond device initialization is required before configuring this
example.
Overview
To enable failure detection, include the bfd-liveness-detection statement:
bfd-liveness-detection {
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
version (1 | automatic);
}
Optionally, you can specify the threshold for the adaptation of the detection time by
including the threshold statement. When the BFD session detection time adapts to a
value equal to or greater than the threshold, a single trap and a system log message are
sent.
To specify the minimum transmit and receive interval for failure detection, include the
minimum-interval statement. This value represents the minimum interval at which the
local routing device transmits hello packets as well as the minimum interval at which
the routing device expects to receive a reply from a neighbor with which it has established
a BFD session. You can configure a value in the range from 1 through 255,000 milliseconds.
This examples sets a minimum interval of 600 milliseconds.
You can optionally specify the minimum transmit and receive intervals separately.
To specify only the minimum receive interval for failure detection, include the
minimum-receive-interval statement. This value represents the minimum interval at which
the local routing device expects to receive a reply from a neighbor with which it has
established a BFD session. You can configure a value in the range from 1 through
255,00 milliseconds.
To specify only the minimum transmit interval for failure detection, include the
transmit-interval minimum-interval statement. This value represents the minimum interval
at which the local routing device transmits hello packets to the neighbor with which it
has established a BFD session. You can configure a value in the range from 1 through
255,000 milliseconds.
To specify the number of hello packets not received by a neighbor that causes the
originating interface to be declared down, include the multiplier statement. The default
is 3, and you can configure a value in the range from 1 through 255.
To specify the threshold for detecting the adaptation of the transmit interval, include
the transmit-interval threshold statement. The threshold value must be greater than the
transmit interval.
To specify the BFD version used for detection, include the version statement. The default
is to have the version detected automatically.
You can trace BFD operations by including the traceoptions statement at the [edit
protocols bfd] hierarchy level.
In Junos OS Release 9.0 and later, you can configure BFD sessions not to adapt to
changing network conditions. To disable BFD adaptation, include the no-adaptation
statement. We recommend that you not disable BFD adaptation unless it is preferable
not to have BFD adaptation enabled in your network.
[Link]/30 [Link]/30
R1 R2
[Link]/30
[Link]/32 lo0:[Link] lo0:[Link] [Link]/32
[Link]/30
R3
g041216
[Link]/32 lo0:[Link]
“CLI Quick Configuration” on page 75 shows the configuration for all of the devices in
Figure 4 on page 75. The section “Step-by-Step Procedure” on page 76 describes the
steps on Device R1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit interfaces]
user@R1# set fe-1/2/0 unit 1 family inet address [Link]/30
To configure RIP in Junos OS, you must configure a group that contains the interfaces
on which RIP is enabled. You do not need to enable RIP on the loopback interface.
3. Create the routing policy to advertise both direct and RIP-learned routes.
In Junos OS, you can only apply RIP export policies at the group level.
5. Enable BFD.
Results From configuration mode, confirm your configuration by entering the show interfaces,
show protocols, and show policy-options commands. If the output does not display the
intended configuration, repeat the configuration instructions in this example to correct
it.
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show bfd session command.
1 sessions, 1 clients
Cumulative transmit rate 1.7 pps, cumulative receive rate 1.7 pps
Purpose Use tracing operations to verify that BFD packets are being exchanged.
1. Include the following statement in the configuration at the [edit interfaces aex
aggregated-ether-options] hierarchy level:
bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
holddown-interval milliseconds;
local-address bfd-local-address;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
neighbor bfd-neighbor-address;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (1 | automatic);
}
bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
}
• Specify the algorithm to be used to authenticate the BFD session. You can use one
of the following algorithms for authentication:
• keyed-md5
• keyed-sha-1
• meticulous-keyed-md5
• meticulous-keyed-sha-1
• simple-password
• To configure the key chain, specify the name that is associated with the security
key for the BFD session. The name you specify must match one of the key chains
configured in the authentication-key-chains key-chain statement at the [edit security]
hierarchy level.
• Configure loose authentication checking on the BFD session. Use only for transitional
periods when authentication might not be configured at both ends of the BFD
session.
bfd-liveness-detection {
detection-time {
threshold milliseconds;
}
}
Specify the threshold value. This is the maximum time interval for detecting a BFD
neighbor. If the transmit interval is greater than this value, the device triggers a trap.
4. Configure a hold-down interval value to set the minimum time that the BFD session
must remain up before a state change notification is sent to the other members in the
LAG network.
bfd-liveness-detection {
holddown-interval milliseconds;
}
You can configure a number in the range from 0 through 255,000 milliseconds, and
the default is 0. If the BFD session goes down and then comes back up during the
hold-down interval, the timer is restarted.
This value represents the minimum interval at which the local routing device transmits
BFD packets, as well as the minimum interval in which the routing device expects to
receive a reply from a neighbor with which it has established a BFD session. You can
configure a number in the range from 1 through 255,000 milliseconds. You can also
specify the minimum transmit and receive intervals separately.
bfd-liveness-detection {
local-address bfd-local-address;
}
The BFD local address is the loopback address of the source of the BFD session.
NOTE: Beginning with Junos OS Release 16.1, you can also configure this
feature with the AE interface address as the local address in a micro BFD
session. For the IPv6 address family, disable duplicate address detection
before configuring this feature with the AE interface address. To disable
duplicate address detection, include the dad-disable statement at the
[edit interface aex unit y family inet6] hierarchy level.
6. Specify the minimum interval that indicates the time interval for transmitting and
receiving data.
This value represents the minimum interval at which the local routing device transmits
BFD packets, as well as the minimum interval in which the routing device expects to
receive a reply from a neighbor with which it has established a BFD session. You can
configure a number in the range from 1 through 255,000 milliseconds. You can also
specify the minimum transmit and receive intervals separately.
To specify the minimum transmit and receive intervals for failure detection, include
the minimum-interval statement:
bfd-liveness-detection {
minimum-interval milliseconds;
}
7. Specify only the minimum receive interval for failure detection by including the
minimum-receive-interval statement:
bfd-liveness-detection {
minimum-receive-interval milliseconds;
}
This value represents the minimum interval in which the local routing device expects
to receive a reply from a neighbor with which it has established a BFD session. You
can configure a number in the range from 1 through 255,000 milliseconds.
8. Specify the number of BFD packets that were not received by the neighbor that causes
the originating interface to be declared down by including the multiplier statement:
bfd-liveness-detection {
multiplier number;
}
The default value is 3. You can configure a number in the range from 1 through 255.
To specify the next hop of the BFD session, include the neighbor statement:
bfd-liveness-detection {
neighbor bfd-neighbor-address;
}
The BFD neighbor address is the loopback address of the remote destination of the
BFD session.
NOTE: Beginning with Junos OS Release 16.1, you can also configure the
AE interface address of the remote destination as the BFD neighbor
address in a micro BFD session.
10. (Optional) Configure BFD sessions not to adapt to changing network conditions.
bfd-liveness-detection {
no-adaptation;
}
11. Specify a threshold for detecting the adaptation of the detection time by including
the threshold statement:
bfd-liveness-detection {
detection-time {
threshold milliseconds;
}
}
When the BFD session detection time adapts to a value equal to or greater than the
threshold, a single trap and a system log message are sent. The detection time is
based on the multiplier of the minimum-interval or the minimum-receive-interval
value. The threshold must be a higher value than the multiplier for either of these
configured values. For example, if the minimum-receive-interval is 300 ms and the
multiplier is 3, the total detection time is 900 ms. Therefore, the detection time
threshold must have a value greater than 900.
12. Specify only the minimum transmit interval for failure detection by including the
transmit-interval minimum-interval statement:
bfd-liveness-detection {
transmit-interval {
minimum-interval milliseconds;
}
}
This value represents the minimum interval at which the local routing device transmits
BFD packets to the neighbor with which it has established a BFD session. You can
configure a value in the range from 1 through 255,000 milliseconds.
13. Specify the transmit threshold for detecting the adaptation of the transmit interval
by including the transmit-interval threshold statement:
bfd-liveness-detection {
transmit-interval {
threshold milliseconds;
}
}
The threshold value must be greater than the transmit interval. When the BFD session
detection time adapts to a value greater than the threshold, a single trap and a system
log message are sent. The detection time is based on the multiplier of the
minimum-interval or the minimum-receive-interval value. The threshold must be a
higher value than the multiplier for either of these configured values.
bfd-liveness-detection {
version (1 | automatic);
}
NOTE: This feature works when both the devices support BFD. If BFD is
configured at only one end of the LAG, this feature does not work.
This example shows how to configure an independent micro BFD session for aggregated
Ethernet interfaces.
• Requirements on page 85
• Overview on page 85
• Configuration on page 85
• Verification on page 91
Requirements
This example uses the following hardware and software components:
Overview
The example includes two routers that are directly connected. Configure two aggregated
Ethernet interfaces, AE0 for IPv4 connectivity and AE1 for IPv6 connectivity. Configure
micro BFD session on the AE0 bundle using IPv4 addresses as local and neighbor
endpoints on both routers. Configure micro BFD session on the AE1 bundle using IPv6
addresses as local and neighbor endpoints on both routers. This example verifies that
independent micro BFD sessions are active in the output.
Topology
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires that you navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see “Using the CLI Editor in
Configuration Mode” in the CLI User Guide.
NOTE: Repeat this procedure for Router R1, modifying the appropriate
interface names, addresses, and any other parameters for each router.
To configure a micro BFD session for aggregated Ethernet interfaces on Router R0:
[edit interfaces]
user@R0# set ge-1/0/1 unit 0 family inet address [Link]/30
user@R0# set ge-1/0/1 unit 0 family inet6 address 3ffe::1:1/126
user@R0# set xe-4/0/0 gigether-options 802.3ad ae0
user@R0# set xe-4/0/1 gigether-options 802.3ad ae0
user@R0# set xe-4/1/0 gigether-options 802.3ad ae1
user@R0# set xe-4/1/1 gigether-options 802.3ad ae1
[edit interfaces]
user@R0# set lo0 unit 0 family inet address [Link]/32
user@R0# set lo0 unit 0 family inet6 address [Link]/128
3. Configure an IP address on the aggregated Ethernet interface ae0 with either IPv4
or IPv6 addresses, as per your network requirements.
[edit interfaces]
user@R0# set ae0 unit 0 family inet address [Link]/30
4. Set the routing option, create a static route, and set the next-hop address.
NOTE: You can configure either an IPv4 or IPv6 static route, depending
on your network requirements.
[edit routing-options]
[edit interfaces]
user@R0# set ae0 aggregated-ether-options lacp active
6. Configure BFD for the aggregated Ethernet interface ae0, and specify the minimum
interval, local IP address, and the neighbor IP address.
[edit interfaces]
user@R0# set ae0 aggregated-ether-options bfd-liveness-detection
minimum-interval 100
user@R0# set ae0 aggregated-ether-options bfd-liveness-detection multiplier 3
user@R0# set ae0 aggregated-ether-options bfd-liveness-detection neighbor
[Link]
user@R0# set ae0 aggregated-ether-options bfd-liveness-detection local-address
[Link]
user@R0# set ae0 aggregated-ether-options minimum-links 1
user@R0# set ae0 aggregated-ether-options link-speed 10g
You can assign either IPv4 or IPv6 addresses as per your network requirements.
[edit interfaces]
user@R0# set ae1 unit 0 family inet6 address 5555::1/126
[edit interfaces]
user@R0# set ae1 aggregated-ether-options bfd-liveness-detection
minimum-interval 100
user@R0# set ae1 aggregated-ether-options bfd-liveness-detection multiplier 3
user@R0# set ae1 aggregated-ether-options bfd-liveness-detection neighbor
[Link]
user@R0# set ae1 aggregated-ether-options bfd-liveness-detection local-address
[Link]
user@R0# set ae1 aggregated-ether-options minimum-links 1
user@R0# set ae1 aggregated-ether-options link-speed 10g
NOTE: Beginning with Junos OS Release 16.1, you can also configure
this feature with the AE interface address as the local address in a micro
BFD session.
[edit protocols]
user@R0# set bfd traceoptions file bfd
user@R0# set bfd traceoptions file size 100m
user@R0# set bfd traceoptions file files 10
user@R0# set bfd traceoptions flag all
Results
From configuration mode, enter the show interfaces, show protocols, and show
routing-options commands and confirm your configuration. If the output does not display
the intended configuration, repeat the instructions in this example to correct the
configuration.
}
family inet6 {
address [Link]/128;
}
}
}
ae0 {
aggregated-ether-options {
bfd-liveness-detection {
minimum-interval 100;
neighbor [Link];
local-address [Link];
}
minimum-links 1;
link-speed 10g;
lacp {
active;
}
}
unit 0 {
family inet {
address [Link]/30;
}
}
}
ae1 {
aggregated-ether-options {
bfd-liveness-detection {
minimum-interval 100;
multiplier 3;
neighbor [Link];
local-address [Link];
}
minimum-links 1
link-speed 10g;
}
unit 0 {
family inet6 {
address 5555::1/126;
}
}
}
}
}
}
static {
route [Link]/30 {
next-hop [Link];
}
}
user@R0# commit
Verification
Confirm that the configuration is working properly.
Purpose Verify that the micro BFD sessions are up, and view details about the BFD sessions.
Action From operational mode, enter the show bfd session extensive command.
Detect Transmit
Address State Interface Time Interval Multiplier
[Link] Up xe-4/0/1 9.000 3.000 3
Detect Transmit
Address State Interface Time Interval Multiplier
[Link] Up xe-4/1/1 9.000 3.000
3
Client LACPD, TX interval 0.100, RX interval 0.100
Session up time 4d 23:13
Local diagnostic None, remote diagnostic None
Remote not heard, hears us, version 1
Replicated
Session type: Micro BFD
Min async interval 0.100, min slow interval 1.000
Adaptive async TX interval 0.100, RX interval 0.100
Local min TX interval 1.000, minimum RX interval 0.100, multiplier 3
Remote min TX interval 3.000, min RX interval 3.000, multiplier 3
Local discriminator 17, remote discriminator 67
Echo mode disabled/inactive, no-absorb, no-refresh
Remote is control-plane independent
Session ID: 0x0
Detect Transmit
Address State Interface Time Interval Multiplier
[Link] UP xe-4/1/0 9.000 3.000
3
Client LACPD, TX interval 0.100, RX interval 0.100
Session up time 4d 23:13
Local diagnostic None, remote diagnostic None
Remote not heard, hears us, version 1
Replicated
Session type: Micro BFD
Min async interval 0.100, min slow interval 1.000
Adaptive async TX interval 0.100, RX interval 0.100
Local min TX interval 1.000, minimum RX interval 0.100, multiplier 3
Remote min TX interval 3.000, min RX interval 3.000, multiplier 3
Local discriminator 16, remote discriminator 66
Echo mode disabled/inactive, no-absorb, no-refresh
Remote is control-plane independent
Session ID: 0x0
4 sessions, 4 clients
Cumulative transmit rate 2.0 pps, cumulative receive rate 1.7 pps
Meaning The Micro BFD field represents the independent micro BFD sessions running on the links
in a LAG. The TX interval item, RX interval item output represents the setting configured
with the minimum-interval statement. All of the other output represents the default
settings for BFD. To modify the default settings, include the optional statements under
bfd-liveness-detection statement.
Purpose View the contents of the BFD trace file to assist in troubleshooting, if required.
Action From operational mode, enter the file show /var/log/bfd command.
Meaning BFD messages are being written to the specified trace file.
The Bidirectional Forwarding Detection (BFD) Protocol is a simple hello mechanism that
detects failures in a network. BFD works with a wide variety of network environments
and topologies. A pair of routing devices exchanges BFD packets. Hello packets are sent
at a specified, regular interval. A neighbor failure is detected when the routing device
stops receiving a reply after a specified interval. The BFD failure detection timers have
shorter time limits than the Protocol Independent Multicast (PIM) hello hold time, so
they provide faster detection.
The BFD failure detection timers are adaptive and can be adjusted to be faster or slower.
The lower the BFD failure detection timer value, the faster the failure detection and vice
versa. For example, the timers can adapt to a higher value if the adjacency fails (that is,
the timer detects failures more slowly). Or a neighbor can negotiate a higher value for a
timer than the configured value. The timers adapt to a higher value when a BFD session
flap occurs more than three times in a span of 15 seconds. A back-off algorithm increases
the receive (Rx) interval by two if the local BFD instance is the reason for the session
flap. The transmission (Tx) interval is increased by two if the remote BFD instance is the
reason for the session flap. You can use the clear bfd adaptation command to return BFD
interval timers to their configured values. The clear bfd adaptation command is hitless,
meaning that the command does not affect traffic flow on the routing device.
You must specify the minimum transmit and minimum receive intervals to enable BFD
on PIM.
This is the minimum interval after which the routing device transmits hello packets
to a neighbor with which it has established a BFD session. Specifying an interval smaller
than 300 ms can cause undesired BFD flapping.
3. Configure the minimum interval after which the routing device expects to receive a
reply from a neighbor with which it has established a BFD session.
Specifying an interval smaller than 300 ms can cause undesired BFD flapping.
5. Configure the threshold for the adaptation of the BFD session detection time.
When the detection time adapts to a value equal to or greater than the threshold, a
single trap and a single system log message are sent.
6. Configure the number of hello packets not received by a neighbor that causes the
originating interface to be declared down.
8. Specify that BFD sessions should not adapt to changing network conditions.
We recommend that you not disable BFD adaptation unless it is preferable not to
have BFD adaptation enabled in your network.
9. Verify the configuration by checking the output of the show bfd session command.
Starting with Junos OS Release 15.1X49-D100, SRX340, SRX345, and SRX1500 devices
support dedicated BFD.
Starting with Junos OS Release 15.1X49-D100, SRX300 and SRX320 devices support
real-time BFD.
Starting with Junos OS Release 15.1X49-D110, SRX550M devices support distributed BFD.
• SRX Series devices support the following maximum number of BFD sessions supported
are:
1. Include the dedicated-ukern-cpu statement at the [edit chassis] hierarchy level and
then commit the configuration.
[edit]
user@host# commit
1. Include the realtime-ukern-thread statement at the [edit chassis] hierarchy level and
then commit the configuration.
[edit]
user@host# commit
When a Routing Engine is configured as master, it has full functionality. It receives and
transmits routing information, builds and maintains routing tables, communicates with
interfaces and Packet Forwarding Engine components, and has full control over the
chassis. When a Routing Engine is configured to be the backup, it does not communicate
with the Packet Forwarding Engine or chassis components.
NOTE: On devices running Junos OS Release 8.4 or later, both Routing Engines
cannot be configured to be master at the same time. This configuration causes
the commit check to fail.
A failover from the master Routing Engine to the backup Routing Engine occurs
automatically when the master Routing Engine experiences a hardware failure or when
you have configured the software to support a change in mastership based on specific
conditions. You can also manually switch Routing Engine mastership by issuing one of
the request chassis routing-engine commands. In this topic, the term failover refers to an
automatic event, whereas switchover refers to either an automatic or a manual event.
When a failover or a switchover occurs, the backup Routing Engine takes control of the
system as the new master Routing Engine.
• If graceful Routing Engine switchover is not configured, when the backup Routing
Engine becomes master, it resets the switch plane and downloads its own version of
the microkernel to the Packet Forwarding Engine components. Traffic is interrupted
while the Packet Forwarding Engine is reinitialized. All kernel and forwarding processes
are restarted.
• If graceful Routing Engine switchover and nonstop active routing (NSR) are configured,
traffic is not interrupted during the switchover. Interface, kernel, and routing protocol
information is preserved. For more information about nonstop active routing, see
“Nonstop Active Routing Concepts” on page 151.
• If graceful Routing Engine switchover and graceful restart are configured, traffic is not
interrupted during the switchover. Interface and kernel information is preserved. Graceful
restart protocol extensions quickly collect and restore routing information from the
neighboring routers. For more information about graceful restart, see “Graceful Restart
Concepts” on page 181.
• The routing platform experiences a software failure, such as a kernel crash or a CPU
lock. You must configure the backup Routing Engine to take mastership when it detects
a loss of keepalive signal. To enable this failover method, include the failover
on-loss-of-keepalives statement at the [edit chassis redundancy] hierarchy level.
• The routing platform experiences an em0 interface failure on the master Routing
Engine. You must configure the backup Routing Engine to take mastership when it
detects the em0 interface failure. To enable this failover method, include the
on-re-to-fpc-stale statement at the [edit chassis redundancy failover] hierarchy level.
• A specific software process fails. You can configure the backup Routing Engine to take
mastership when one or more specified processes fail at least four times within 30
seconds. Include the failover other-routing-engine statement at the [edit system
processes process-name] hierarchy level.
If any of these conditions is met, a message is logged and the backup Routing Engine
attempts to take mastership. By default, an alarm is generated when the backup Routing
Engine becomes active. After the backup Routing Engine takes mastership, it continues
to function as master even after the originally configured master Routing Engine has
successfully resumed operation. You must manually restore it to its previous backup
status. (However, if at any time one of the Routing Engines is not present, the other
Routing Engine becomes master automatically, regardless of how redundancy is
configured.)
NOTE: A single Routing Engine in the chassis always becomes the master
Routing Engine even if it was previously the backup Routing Engine.
Perform the following steps to see how the default Routing Engine redundancy setting
works:
2. Manually switch the state of Routing Engine mastership by issuing the request chassis
routing-engine master switch command from the master Routing Engine. re0 is now
the backup Routing Engine and re1 is the master Routing Engine.
NOTE: On the next reboot of the master Routing Engine, Junos OS returns
the router to the default state because you have not configured the Routing
Engines to maintain this state after a reboot.
The Routing Engine boots up and reads the configuration. Because you have not
specified in the configuration which Routing Engine is the master, re1 uses the default
configuration as the backup. Now both re0 and re1 are in a backup state. Junos OS
detects this conflict and, to prevent a no-master state, reverts to the default
configuration to direct re0 to become master.
If the same Junos OS release is not running on all master and backup Routing Engines in
the routing matrix, the following consequences occur when the failover
on-loss-of-keepalives statement is included at the [edit chassis redundancy] hierarchy
level:
• When you manually change mastership to a backup Routing Engine in a T640 router
using the request chassis routing-engine master command, the new master Routing
Engine in the T640 router detects a software release mismatch with the master Routing
Engine in the TX Matrix router and relinquishes mastership to the original master Routing
Engine. (Routing Engine mastership in the TX Matrix router does not switch in this
case.)
If the same Junos OS release is not running on all master and backup Routing Engines in
the routing matrix, the following consequences occur when the failover
on-loss-of-keepalives statement is not included at the [edit chassis redundancy] hierarchy
level:
• If you initiate a change in mastership to the backup Routing Engine in the TX Matrix
router, all T640 routers are logically disconnected from the TX Matrix router. To
reconnect the T640 routers, switch mastership of all master Routing Engines in the
T640 routers to their backup Routing Engines.
• If you initiate a change in mastership to a backup Routing Engine in a T640 router, the
T640 router is logically disconnected from the TX Matrix router. To reconnect the T640
router, switch mastership of the new master Routing Engine in the T640 router back
to the original master Routing Engine.
If the same Junos OS release is not running on all master and backup Routing Engines in
the routing matrix, the following scenarios occur when the failover on-loss-of-keepalives
statement is included at the [edit chassis redundancy] hierarchy level:
If the same Junos OS release is not running on all master and backup Routing Engines in
the routing matrix, the following scenarios occur when the failover on-loss-of-keepalives
statement is not included at the [edit chassis redundancy] hierarchy level:
• If you initiate a change in mastership to the backup Routing Engine in the TX Matrix
Plus router, all connected LCCs are logically disconnected from the TX Matrix Plus
router. To reconnect the connected LCC, switch mastership of all master Routing
Engines in the connected LCC to their backup Routing Engines.
If you halt the master Routing Engine and do not power it off or remove it, the backup
Routing Engine remains inactive unless you have configured it to become the master
when it detects a loss of keepalive signal from the master Routing Engine.
NOTE: To restart the router, you must log in to the console port (rather than
the Ethernet management port) of the Routing Engine. When you log in to
the console port of the master Routing Engine, the system automatically
reboots. After you log in to the console port of the backup Routing Engine,
press Enter to reboot it.
NOTE: If you have upgraded the backup Routing Engine, first reboot it and
then reboot the master Routing Engine.
NOTE: To complete the tasks in the following sections, re0 and re1
configuration groups must be defined. For more information about
configuration groups, see the CLI User Guide.
NOTE: In systems with two Routing Engines, both Routing Engines cannot
be configured to be master at the same time. This configuration causes the
commit check to fail.
To modify the default configuration, include the routing-engine statement at the [edit
chassis redundancy] hierarchy level:
slot-number can be 0 or 1. To configure the Routing Engine to be the master, specify the
master option. To configure it to be the backup, specify the backup option. To disable a
Routing Engine, specify the disabled option.
NOTE: To switch between the master and the backup Routing Engines, you
must modify the configuration and then activate it by issuing the commit
synchronize command.
For routers with two Routing Engines, you can configure graceful Routing Engine
switchover (GRES). When graceful switchover is configured, socket reconnection occurs
seamlessly without interruption to packet forwarding. For information about how to
configure graceful Routing Engine switchover, see “Configuring Graceful Routing Engine
Switchover” on page 134.
If the LCMD process is crashing on the master, the system will switchover after one minute
provided the backup RE LCMD connection is stable. The system will not switchover under
the following conditions: if the backup RE LCMD connection is unstable or if the current
master just gained mastership. When the master has just gained mastership, the
switchover happens only after four minutes.
After you configure a backup Routing Engine, you can direct it to take mastership
automatically if it detects a loss of keepalive signal from the master Routing Engine.
When graceful Routing Engine switchover is not configured, by default, failover occurs
after 300 seconds (5 minutes). You can configure a shorter or longer time interval.
NOTE: The keepalive time period is reset to 360 seconds when the master
Routing Engine has been manually rebooted or halted.
To change the keepalive time period, include the keepalive-time statement at the [edit
chassis redundancy] hierarchy level:
The following example describes the sequence of events if you configure the backup
Routing Engine to detect a loss of keepalive signal in the master Routing Engine:
2. After the Packet Forwarding Engine connection to the primary Routing Engine is lost
and the keepalive timer expires, packet forwarding is interrupted.
3. After 25 seconds of keepalive loss, a message is logged, and the backup Routing
Engine attempts to take mastership. An alarm is generated when the backup Routing
Engine becomes active, and the display is updated with the current status of the
Routing Engine.
4. After the backup Routing Engine takes mastership, it continues to function as master.
NOTE: When you halt or reboot the master Routing Engine, Junos OS resets
the keepalive time to 360 seconds, and the backup Routing Engine does not
take over mastership until the 360-second keepalive time period expires.
A former master Routing Engine becomes a backup Routing Engine if it returns to service
after a failover to the backup Routing Engine. To restore master status to the former
master Routing Engine, you can use the request chassis routing-engine master switch
operational mode command.
If at any time one of the Routing Engines is not present, the remaining Routing Engine
becomes master automatically, regardless of how redundancy is configured.
process-name is one of the valid process names. If this statement is configured for a
process, and that process fails four times within 30 seconds, the router reboots from the
other Routing Engine. Another statement available at the [edit system processes] hierarchy
level is failover alternate-media. For information about the alternate media option, see
the Junos OS Administration Library.
• On the backup Routing Engine, request that the backup Routing Engine take mastership
by issuing the request chassis routing-engine master acquire command.
• On the master Routing Engine, request that the backup Routing Engine take mastership
by using the request chassis routing-engine master release command.
• On either Routing Engine, switch mastership by issuing the request chassis routing-engine
master switch command.
E_MAXTRY The maximum number of tries to acquire or release mastership was exceeded.
E_CMD_A The command request chassis routing-engine master acquire was issued from the backup
Routing Engine.
E_CMD_F The command request chassis routing-engine master acquire force was issued from the
backup Routing Engine.
E_CMD_R The command request chassis routing-engine master release was issued from the master
Routing Engine.
E_CMD_S The command request chassis routing-engine master switch was issued from a Routing
Engine.
Related • Understanding Routing Engine Redundancy on Juniper Networks Routers on page 101
Documentation
• Understanding Switching Control Board Redundancy on page 13
You can use configuration groups to ensure that the correct IP addresses are used for
each Routing Engine and to maintain a single configuration file for both Routing Engines.
The following example defines configuration groups re0 and re1 with separate IP
addresses. These well-known configuration group names take effect only on the
appropriate Routing Engine.
groups {
re0 {
system {
host-name my-re0;
}
interfaces {
fxp0 {
description "10/100 Management interface";
unit 0 {
family inet {
address [Link]/24;
}
}
}
}
}
re1 {
system {
host-name my-re1;
}
interfaces {
fxp0 {
description "10/100 Management interface";
unit 0 {
family inet {
address [Link]/24;
}
}
}
}
}
}
You can assign an additional IP address to the management Ethernet interface (fxp0 in
this example) on both Routing Engines. The assigned address uses the master-only
keyword and is identical for both Routing Engines, ensuring that the IP address for the
master Routing Engine can be accessed at any time. The address is active only on the
master Routing Engine's management Ethernet interface. During a Routing Engine
switchover, the address moves over to the new master Routing Engine.
For more information about the initial configuration of dual Routing Engines, see the
Installation and Upgrade Guide. For more information about assigning an additional IP
address to the management Ethernet interface with the master-only keyword on both
Routing Engines, see the CLI User Guide.
Related • Understanding Routing Engine Redundancy on Juniper Networks Routers on page 101
Documentation
• Understanding Switching Control Board Redundancy on page 13
You can use either the console port or the management Ethernet port to establish
connectivity between the two Routing Engines. You can then copy or use FTP to transfer
the configuration from the master to the backup, and load the file and commit it in the
normal way.
To connect to the other Routing Engine using the management Ethernet port, issue the
following command:
On a TX Matrix router, to make connections to the other Routing Engine using the
management Ethernet port, issue the following command:
For more information about the request routing-engine login command, see the CLI
Explorer.
To copy a configuration file from one Routing Engine to the other, issue the file copy
command:
In this case, source is the name of the configuration file. These files are stored in the
directory /config. The active configuration is /config/[Link], and older configurations
are in /config/[Link] {1...9}. The destination is a file on the other Routing Engine.
The following example copies a configuration file from Routing Engine 0 to Routing
Engine 1:
The following example copies a configuration file from Routing Engine 0 to Routing
Engine 1 on a TX Matrix router:
To load the configuration file, enter the load replace command at the [edit] hierarchy
level:
Related • Understanding Routing Engine Redundancy on Juniper Networks Routers on page 101
Documentation
• Understanding Switching Control Board Redundancy on page 13
• Loading a Software Package from the Other Routing Engine on page 116
You can load a package from the other Routing Engine onto the local Routing Engine
using the existing request system software add package-name command:
In the re portion of the URL, specify the number of the other Routing Engine. In the filename
portion of the URL, specify the path to the package. Packages are typically in the directory
/var/sw/pkg.
Related • Understanding Routing Engine Redundancy on Juniper Networks Routers on page 101
Documentation
• Understanding Switching Control Board Redundancy on page 13
• Copying a Configuration File from One Routing Engine to the Other on page 115
NOTE: On T Series routers, TX Matrix routers, and TX Matrix Plus routers, the
control plane is preserved in case of GRES with nonstop active routing (NSR),
and nearly 75 percent of line rate worth of traffic per Packet Forwarding
Engine remains uninterrupted during GRES.
Neighboring routers detect that the router has experienced a restart and react to the
event in a manner prescribed by individual routing protocol specifications.
Any updates to the master Routing Engine are replicated to the backup Routing Engine
as soon as they occur.
If the backup Routing Engine does not receive a keepalive from the master Routing Engine
after 2 seconds (4 seconds on M20 routers), it determines that the master Routing Engine
has failed; and assumes mastership.
The new master Routing Engine and the Packet Forwarding Engine then become
synchronized. If the new master Routing Engine detects that the Packet Forwarding
Engine state is not up to date, it resends state update messages.
To ensure that these adjacencies are maintained, change the hold-time for
IS-IS protocols from the default of 27 seconds to a value higher than 40
seconds.
NOTE: Starting from Junos OS Release 14.2, when you perform GRES on
MX Series routers, you must execute the clear synchronous-ethernet
wait-to-restore operational mode command on the new master Routing
Engine to clear the wait-to-restore timer on it. This is because the clear
synchronous-ethernet wait-to-restore operational mode command clears the
wait-to-restore timer only on the local Routing Engine.
NOTE: In a routing matrix with TX Matrix Plus router with 3D SIBs, for
successive Routing Engine switchover, events must be a minimum of 900
seconds (15 minutes) apart after both Routing Engines have come up.
NOTE:
• We do not recommend performing a commit operation on the backup
Routing Engine when GRES is enabled on the router or switch.
Figure 6 on page 124 shows the system architecture of graceful Routing Engine switchover
and the process a routing platform follows to prepare for a switchover.
• The request chassis routing-engine master switch check command from the
master Routing Engine
• The show system switchover command from the Backup Routing Engine
2. The routing platform processes (such as the chassis process [chassisd]) start.
3. The Packet Forwarding Engine starts and connects to the master Routing Engine.
7. The kernel synchronization process (ksyncd) synchronizes the backup Routing Engine
with the master Routing Engine.
8. After ksyncd completes the synchronization, all state information and the forwarding
table are updated.
Figure 7 on page 125 shows the effects of a switchover on the routing (or switching
)platform.
1. When keepalives from the master Routing Engine are lost, the system switches over
gracefully to the backup Routing Engine.
2. The Packet Forwarding Engine connects to the backup Routing Engine, which becomes
the new master.
3. Routing platform processes that are not part of GRES (such as the routing protocol
process rpd) restart.
4. State information learned from the point of the switchover is updated in the system.
NOTE: During GRES on T Series and M320 routers during GRES, the Switch
Interface Boards (SIBs) are taken offline and restarted one by one. This is
done to provide the Switch Processor Mezzanine Board (SPMB) that manages
the SIB enough time to populate state information for its associated SIB.
However, on a fully populated chassis where all FPCs are sending traffic at
full line rate, there might be momentary packet loss during the switchover.
• Graceful restart
Dual Routing Engines only (no features • When the switchover to the new • All physical interfaces are taken
enabled) master Routing Engine is complete, offline.
routing convergence takes place and • Packet Forwarding Engines restart.
traffic is resumed.
• The backup Routing Engine restarts
the routing protocol process (rpd).
• All hardware and interfaces are
discovered by the new master Routing
Engine.
• The switchover takes several minutes.
• All of the router's adjacencies are
aware of the physical (interface
alarms) and routing (topology)
changes.
GRES enabled • During the switchover, interface and • The new master Routing Engine
kernel information is preserved. restarts the routing protocol process
• The switchover is faster because the (rpd).
Packet Forwarding Engines are not • All hardware and interfaces are
restarted. acquired by a process that is similar
to a warm restart.
• All adjacencies are aware of the
router's change in state.
GRES and NSR enabled • Traffic is not interrupted during the • Unsupported protocols must be
switchover. refreshed using the normal recovery
• Interface and kernel information are mechanisms inherent in each protocol.
preserved.
GRES and graceful restart enabled • Traffic is not interrupted during the • Neighbors are required to support
switchover. graceful restart, and a wait interval is
• Interface and kernel information are required.
preserved. • The routing protocol process (rpd)
• Graceful restart protocol extensions restarts.
quickly collect and restore routing • For certain protocols, a significant
information from the neighboring change in the network can cause
routers. graceful restart to stop.
• Starting with Junos OS Release 12.2, if
adjacencies between the restarting
router and the neighboring peer
'helper' routers time out, graceful
restart can stop and cause
interruptions in traffic.
However, if GRES is triggered by a CLI commit or FPC restart or crash, the backup Routing
Engine updates the ASI state. For example:
Or:
14.2 Starting from Junos OS Release 14.2, when you perform GRES on MX Series routers,
you must execute the clear synchronous-ethernet wait-to-restore operational
mode command on the new master Routing Engine to clear the wait-to-restore
timer on it.
12.2 Starting with Junos OS Release 12.2, if adjacencies between the restarting router
and the neighboring peer 'helper' routers time out, graceful restart protocol
extensions are unable to notify the peer 'helper' routers about the impending restart.
12.2 Starting with Junos OS Release 12.2, if adjacencies between the restarting router
and the neighboring peer 'helper' routers time out, graceful restart can stop and
cause interruptions in traffic.
• hold-time
Graceful Routing Engine switchover is supported on all routing (or switching) platforms
that contain dual Routing Engines. All Routing Engines configured for graceful Routing
Engine switchover must run the same Junos OS release. Hardware and software support
for graceful Routing Engine switchover is described in the following sections:
• T320 router, T640 router, and TX Matrix router—Junos OS Release 7.0 or later
• EX Series switches with dual Routing Engines or in a Virtual Chassis — Junos OS Release
9.2 or later for EX Series switches
• QFX Series switches in a Virtual Chassis —Junos OS Release 13.2 or later for the QFX
Series
For more information about support for graceful Routing Engine switchover, see the
sections that follow.
NOTE: In Junos OS Release 9.3 and later, the logical router feature is
renamed to logical system.
The following constraints apply to graceful Routing Engine switchover feature support:
• When graceful Routing Engine switchover and aggregated Ethernet interfaces are
configured in the same system, the aggregated Ethernet interfaces must not be
configured for fast-polling LACP. When fast polling is configured, the LACP polls time
out at the remote end during the Routing Engine mastership switchover. When LACP
polling times out, the aggregated link and interface are disabled. The Routing Engine
mastership change is fast enough that standard and slow LACP polling do not time
out during the procedure. However, note that this restriction does not apply to MX
Series Routers that are running Junos OS Release 9.4 or later and have distributed
periodic packet management (PPM) enabled—which is the default configuration—on
them. In such cases, you can configure graceful Routing Engine switchover and have
aggregated Ethernet interfaces configured for fast-polling LACP on the same device.
NOTE: MACSec sessions will flap upon Graceful Routing Engine switchover.
Starting with Junos OS Release 13.2, when a graceful Routing Engine switchover occurs,
the VRRP state does not change. VRRP is supported by graceful Routing Engine
switchover only in the case that PPM delegation is enabled (which the default).
The following constraints apply to graceful Routing Engine switchover support for services
PICs:
• You can include the graceful-switchover statement at the [edit chassis redundancy]
hierarchy level on a router with Adaptive Services, Multiservices, and Tunnel Services
PICs configured on it and successfully commit the configuration. However, all services
on these PICs—except the Layer 2 service packages and extension-provider and SDK
applications on Multiservices PICs—are reset during a switchover.
• Graceful Routing Engine switchover is not supported on any Monitoring Services PICs
or Multilink Services PICs. If you include the graceful-switchover statement at the [edit
chassis redundancy] hierarchy level on a router with either of these PIC types configured
on it and issue the commit command, the commit fails.
13.2 Starting with Junos OS Release 13.2, when a graceful Routing Engine
switchover occurs, the VRRP state does not change.
Configuring GRES
For example, if you configure the static route [Link]/12 from the
management Ethernet interface for management purposes, you must specify
the backup router configuration as follows:
When you enable GRES, the command-line interface (CLI) indicates which Routing Engine
you are using. For example:
{master} [edit]
user@host#
To disable GRES, delete the graceful-switchover statement from the [edit chassis
redundancy] hierarchy level.
To ensure that these adjacencies are kept, change the hold-time for IS-IS protocols from
the default of 27 seconds to a value higher than 40 seconds.
When you configure GRES, you can bring the backup Routing Engine online
after the master Routing Engine is already running. There is no requirement
to start the two Routing Engines simultaneously.
Only when you enable the graceful Routing Engine switchover, you can copy the running
Junos OS version of the master Routing Engine to the backup Routing Engine.
NOTE: If the system is in ISSU state, you cannot copy the running Junos OS
version of the master Router Engine.
Starting in Junos OS release 14.1, you can enable automatic synchronization of the master
Routing Engine configuration with the backup Routing Engine by including the events
CHASSISD_SNMP_TRAP7 statement at the [edit event-options policy policy-name]
hierarchy level.
[edit event-options]
policy UPGRADE-BACKUPRE {
events CHASSISD_SNMP_TRAP7;
attributes-match {
CHASSISD_SNMP_TRAP7.value5 matches "Routing Engine";
CHASSISD_SNMP_TRAP7.trap matches "Fru Online";
CHASSISD_SNMP_TRAP7.argument5 matches jnxFruName;
}
then {
event-script [Link] {
arguments {
trap "{$$.trap}";
value5 "{$$.value5}";
argument5 "{$$.argument5}";
}
}
}
}
event-script {
file [Link];
}
After receiving this event, the event policy on the master Router Engine is triggered and
the image available in the /var/sw/pkg path is pushed to the backup Router Engine
upgrade. During script execution, the image is copied to the backup Routing Engine's
/var/sw/pkg path.
NOTE: If the image is not available in the /var/sw/pkg path, the script is
terminated with an appropriate syslog message.
If the Routing Engine is running at the Junos OS Release 13.2 or later, the Junos automation
scripts is synchronized automatically.
After the master Router Engine is rebooted, the event script available at the
/usr/libexec/scripts/event/[Link] must be copied to the
/var/db/scripts/event path.
Graceful switchover: On
Configuration database: Ready
Kernel database: Ready
Peer state: Steady state
NOTE: You must issue the show system switchover command on the backup
Routing Engine. This command is not supported on the master Routing Engine.
For more information about the show system switchover command, see the CLI Explorer.
14.1 Starting in Junos OS release 14.1, you can enable automatic synchronization of
the master Routing Engine configuration with the backup Routing Engine by
including the events CHASSISD_SNMP_TRAP7 statement at the [edit
event-options policy policy-name] hierarchy level.
• graceful-switchover
• hold-time
Unexpected slow disk access can happen for various reasons—a faulty or bad sector, for
example—causing a hold up of the normal operation of processes such as the routing
process (rpd). Eventually, the router’s performance will be impacted. Under these
circumstances, it may take longer for the typical failover mechanism to be triggered.
Juniper Networks has introduced a disk monitoring daemon to solve this dilemma. The
daemon detects slow disk access and initiates failover. Failover can minimize the traffic
impact and ease the load on the original master Routing Engine for its backlog clean up.
However, there are instances when you might not want failover to occur. You might
commit a large set of changes or even minor changes that might lead to a series of
updates on the routing topology. Such activity could lead to extensive disk access delay
and, therefore, trigger failover. For expected disk access delays like this, where you do
not want to trigger failover, you can choose to not have failover occur by setting the
chassis redundancy failover not-on-disk-underperform configuration command. Another
way is to disable the disk monitoring daemon completely by setting the system processes
gstatd disable command.
• Set the option for preventing gstatd from initiating failovers in response to slow disks
at the [edit chassis redundancy failover] hierarchy level.
[edit]
user@host# set chassis redundancy failover not-on-disk-underperform
When you enable graceful Routing Engine switchover, the master Routing Engine
configuration is copied and loaded to the backup Routing Engine. User files, accounting
information, and trace options information are not replicated to the backup Routing
Engine.
When a graceful Routing Engine switchover occurs, local statistics such as process
statistics and networking statistics are displayed as a cumulative value from the time
the process first came online. Because processes on the master Routing Engine can start
at different times from the processes on the backup Routing Engine, the statistics on the
two Routing Engines for the same process might differ. After a graceful Routing Engine
switchover, we recommend that you issue the clear interface statistics (interface-name
| all) command to reset the cumulative values for local statistics. Forwarding statistics
are not affected by graceful Routing Engine switchover.
For information about how to use the clear command to clear statistics and protocol
database information, see the CLI Explorer.
NOTE: The clear firewall command cannot be used to clear the Routing Engine
filter counters on a backup Routing Engine that is enabled for graceful Routing
Engine switchover.
Nonstop bridging uses the same infrastructure as graceful Routing Engine switchover
(GRES) to preserve interface and kernel information. However, nonstop bridging also
saves Layer 2 Control Protocol (L2CP) information by running the Layer 2 Control Protocol
process (l2cpd) on the backup Routing Engine.
NOTE: To use nonstop bridging, you must first enable graceful Routing Engine
switchover on your routing (or switching) platform. For more information
about graceful Routing Engine switchover, see “Understanding Graceful
Routing Engine Switchover” on page 121.
Figure 8 on page 142 shows the system architecture of nonstop bridging and the process
a routing (or switching) platform follows to prepare for a switchover.
The switchover preparation process for nonstop bridging follows these steps:
2. The routing platform processes on the master Routing Engine (such as the chassis
process [chassisd] and the Layer 2 Control Protocol process [l2cpd]) start.
3. The Packet Forwarding Engine starts and connects to the master Routing Engine.
5. The backup Routing Engine starts, including the chassis process (chassisd) and the
Layer 2 Control Protocol process (l2cpd).
6. The system determines whether graceful Routing Engine switchover and nonstop
bridging have been enabled.
7. The kernel synchronization process (ksyncd) synchronizes the backup Routing Engine
with the master Routing Engine.
8. For supported protocols, state information is updated directly between the l2cpds on
the master and backup Routing Engines.
Figure 9 on page 143 shows the effects of a switchover on the routing platform.
1. When keepalives from the master Routing Engine are lost, the system switches over
gracefully to the backup Routing Engine.
2. The Packet Forwarding Engine connects to the backup Routing Engine, which becomes
the new master. Because the Layer 2 Control Protocol process (l2cpd) and chassis
process (chassisd) are already running, these processes do not need to restart.
3. State information learned from the point of the switchover is updated in the system.
Forwarding and bridging are continued during the switchover, resulting in minimal
packet loss.
Platform Support
Nonstop bridging is supported on MX Series 3D Universal Edge Routers. Your system
must be running Junos OS Release 8.4 or later.
For a list of the EX Series switches and Layer 2 protocols that support nonstop bridging,
see EX Series Switch Software Features Overview.
NOTE: All Routing Engines configured for nonstop bridging must be running
the same Junos OS release.
Protocol Support
Nonstop bridging is supported for the following Layer 2 control protocols:
To disable nonstop active routing, remove the nonstop-bridging statement from the [edit
protocols layer2–control] hierarchy level.
When you configure nonstop bridging, you can bring the backup Routing
Engine online after the master Routing Engine is already running. There is no
requirement to start the two Routing Engines simultaneously.
Nonstop active routing (NSR) uses the same infrastructure as graceful Routing Engine
switchover (GRES) to preserve interface and kernel information. However, NSR also
saves routing protocol information by running the routing protocol process (rpd) on the
backup Routing Engine. By saving this additional information, NSR is self-contained and
does not rely on helper routers (or switches) to assist the routing platform in restoring
routing protocol information. NSR is advantageous in networks in which neighbor routers
(or switches) do not support graceful restart protocol extensions. As a result of this
enhanced functionality, NSR is a natural replacement for graceful restart.
Starting with Junos OS Release 15.1R1, if you have NSR configured, it is never valid to issue
the restart routing command in any form on the NSR master Routing Engine. Doing so
results in a loss of protocol adjacencies and neighbors and a drop in traffic.
NOTE: To use NSR, you must first enable GRES on your routing (or switching)
platform. For more information about GRES, see “Understanding Graceful
Routing Engine Switchover” on page 121.
NOTE: If NSR is enabled, certain system log (syslog) messages are sent from
the backup Routing Engine if the configured syslog host is reachable through
the fxp0 interface.
Figure 10 on page 153 shows the system architecture of nonstop active routing and the
process a routing (or switching) platform follows to prepare for a switchover.
7
Kernel 1 5 Kernel 5
7 8
g016706
3 3
The switchover preparation process for NSR comprises the following steps:
2. The routing (or switching) platform processes on the master Routing Engine (such
as the chassis process [chassisd] and the routing protocol process [rpd]) start.
3. The Packet Forwarding Engine starts and connects to the master Routing Engine.
5. The backup Routing Engine starts, including the chassis process (chassisd) and the
routing protocol process (rpd).
6. The system determines whether GRES and NSR have been enabled.
7. The kernel synchronization process (ksyncd) synchronizes the backup Routing Engine
with the master Routing Engine.
8. For supported protocols, state information is updated directly between the routing
protocol processes on the master and backup Routing Engines.
Figure 11 on page 154 shows the effects of a switchover on the routing platform.
1. When keepalives from the master Routing Engine are lost, the system switches over
gracefully to the backup Routing Engine.
2. The Packet Forwarding Engine connects to the backup Routing Engine, which becomes
the new master. Because the routing protocol process (rpd) and chassis process
(chassisd) are already running, these processes do not need to restart.
3. State information learned from the point of the switchover is updated in the system.
Forwarding and routing are continued during the switchover, resulting in minimal
packet loss.
4. Peer routers (or switches) continue to interact with the routing platform as if no change
had occurred. Routing adjacencies and session state relying on underlying routing
information are preserved and not reset.
15.1R1 Starting with Junos OS Release 15.1R1, if you have NSR configured, it is never
valid to issue the restart routing command in any form on the NSR master
Routing Engine.
12.3 Starting with Junos OS Release 12.3, because of its synchronization requirements
and logic, NSR or GRES performance is limited by the slowest Routing Engine
in the system.
• Nonstop Active Routing Platform and Switching Platform Support on page 157
• Nonstop Active Routing Protocol and Feature Support on page 159
• Nonstop Active Routing BFD Support on page 162
• Nonstop Active Routing BGP Support on page 163
• Nonstop Active Routing Layer 2 Circuit and VPLS Support on page 164
• Nonstop Active Routing PIM Support on page 164
• Nonstop Active Routing MSDP Support on page 166
• Nonstop Active Routing Support for RSVP-TE LSPs on page 167
NOTE:
Nonstop active routing (NSR) switchover on PTX series is supported only for
the following MPLS and VPN protocols and applications using chained
composite next hops:
• Labeled BGP
• Layer 2 VPNs excluding Layer 2 interworking (Layer 2 switching)
• Layer 3 VPNs
• LDP
• RSVP
NOTE:
Nonstop active routing (NSR) switchover on PTX series is supported only for
the following MPLS and VPN protocols and applications using chained
composite next hops:
• Labeled BGP
• Layer 2 VPNs excluding Layer 2 interworking (Layer 2 stitching)
• Layer 3 VPNs
• LDP
• RSVP
NOTE:
Nonstop active routing (NSR) switchover on PTX series is supported only for
the following MPLS and VPN protocols and applications using chained
composite next hops:
• Labeled BGP
• Layer 2 VPNs excluding Layer 2 interworking (Layer 2 stitching)
• Layer 3 VPNs
• LDP
• RSVP
EX Series switch with dual Routing Engines or in a Virtual Chassis 10.4 or later for EX Series switches
EX Series or QFX Series switches in a Virtual Chassis Fabric 13.2X51-D20 or later for the EX Series and QFX
Series switches
NOTE: All Routing Engines configured for nonstop active routing must be
running the same Junos OS release.
Aggregated Ethernet interfaces with Link Aggregation Control Protocol 9.4 or later
(LACP)
Labeled BGP (PTX Series Packet Transport Routers: only) 12.1R4 or later
Nonstop active routing support for LDP includes: (for LDP Point-to-Multipoint LSPs) 13.3R1 or later
• LDP unicast transit LSPs (for LDP ingress LSPs) 13.3R1 or later
• LDP egress LSPs for labeled internal BGP (IBGP) and external BGP
(EBGP)
• LDP over RSVP transit LSPs
• LDP transit LSPs with indexed next hops
• LDP transit LSPs with unequal cost load balancing
• LDP Point-to-Multipoint LSPs
• LDP ingress LSPs
Layer 2 VPNs (PTX Series Packet Transport Routers only) 12.1R4 or later
Layer 3 VPNs (see the first Note after this table for restrictions) 9.2 or later
Layer 3 VPNs (PTX Series Packet Transport Routers only) 12.1R4 or later
For more information, see “Nonstop Active Routing PIM Support” on (for IPv6) 10.4 or later
page 164.
• Point-to-Multipoint LSPs
• RSVP Point-to-Multipoint ingress, transit, and egress LSPs using
existing non-chained next hop.
• RSVP Point-to-Multipoint transit LSPs using composite next hops
for Point-to-Multipoint label routes.
• Point-to-Point LSPs
• RSVP Point-to-Point ingress, transit, and egress LSPs using
non-chained next hops.
• RSVP Point-to-Point transit LSPs using chained composite next
hops.
For more information, see “Nonstop Active Routing Support for RSVP-TE
LSPs” on page 167.
NOTE: Layer 3 VPN support does not include dynamic GRE tunnels, multicast
VPNs, or BGP flow routes.
NOTE: On routers that have logical systems configured on them, NSR is only
supported in the main instance.
NOTE: Starting with Junos OS Release 13.3R5, on EX9214 switches, the VRRP
master state might change during graceful Routing Engine switchover, even
when nonstop active routing is enabled.
NOTE: BFD session states are saved only for clients using aggregate or static
routes or for BGP, IS-IS, OSPF/OSPFv3, PIM, or RSVP.
When a BFD session is distributed to the Packet Forwarding Engine, BFD packets continue
to be sent during a Routing Engine switchover. If nondistributed BFD sessions are to be
kept alive during a switchover, you must ensure that the session failure detection time
is greater than the Routing Engine switchover time. The following BFD sessions are not
distributed to the Packet Forwarding Engine: multihop sessions, tunnel-encapsulated
sessions, and sessions over integrated routing and bridging (IRB) interfaces.
• You must include the path-selection external-router-ID statement at the [edit protocols
bgp] hierarchy level to ensure consistent path selection between the master and backup
Routing Engines during and after the nonstop active routing switchover.
• BGP session uptime and downtime statistics are not synchronized between the primary
and backup Routing Engines during Nonstop Active Routing and ISSU. The backup
Routing Engine maintains its own session uptime based on the time when the backup
first becomes aware of the established sessions. For example, if the backup Routing
Engine is rebooted (or if you run restart routing on the backup Routing Engine), the
backup's uptime is a short duration, because the backup has just learned about the
established sessions. If the backup is operating when the BGP sessions first come up
on the primary, the uptime on the primary and the uptime on the backup are almost
the same duration. After a Routing Engine switchover, the new master continues from
the time left on the backup Routing Engine.
• If the BGP peer in the master Routing Engine has negotiated address-family capabilities
that are not supported for nonstop active routing, then the corresponding BGP neighbor
state on the backup Routing Engine shows as idle. On switchover, the BGP session is
reestablished from the new master Routing Engine.
Only the following address families are supported for nonstop active routing.
NOTE: Address families are supported only on the main instance of BGP.
Only unicast is supported on VRF instances.
• inet labeled-unicast
• inet-mdt
• inet multicast
• inet-mvpn
• inet unicast
• inet-vpn unicast
• inet6 labeled-unicast
• inet6 multicast
• inet6-mvpn
• inet6 unicast
• inet6-vpn unicast
• iso-vpn
• l2vpn signaling
• route-target
• BGP route dampening does not work on the backup Routing Engine when nonstop
active routing is enabled.
in Junos OS Release 9.6 and later, nonstop active routing support is extended to the
Layer 2 circuit and LDP-based VPLS pseudowire redundant configurations.
NOTE: Nonstop active routing for PIM is supported for IPv4 on Junos OS
Release 9.3 and later, and for IPv6 on Junos OS Release 10.4 and later. Starting
with Release 11.1, Junos OS also supports nonstop active routing for PIM on
devices that have both IPv4 and IPv6 configured on them.
To configure nonstop active routing for PIM, include the same statements in the
configuration as for other protocols: the nonstop-routing statement at the [edit
routing-options] hierarchy level and the graceful-switchover statement at the [edit chassis
redundancy] hierarchy level. To trace PIM nonstop active routing events, include the flag
nsr-synchronization statement at the [edit protocols pim traceoptions] hierarchy level.
NOTE: The clear pim join, clear pim register, and clear pim statistics operational
mode commands are not supported on the backup Routing Engine when
nonstop active routing is enabled.
Nonstop active routing support varies for different PIM features. The features fall into
the following three categories: supported features, unsupported features, and
incompatible features.
Supported features:
• Auto-RP
NOTE: Nonstop active routing PIM support on IPv6 does not support
auto-RP because IPv6 does not support auto-RP.
• Static RPs
• Local RP
• BFD
• Dense mode
• Sparse mode
• Flow maps
• Unified ISSU
• Policy features such as neighbor policy, bootstrap router export and import policies,
scope policy, flow maps, and reverse path forwarding (RPF) check policies
Starting with Release 12.2, Junos OS extends the nonstop active routing PIM support to
draft Rosen MVPNs. Nonstop active routing PIM support for draft Rosen MVPNs enables
nonstop active routing-enabled devices to preserve draft Rosen MPVN-related
information—such as default and data multicast distribution tree (MDT) states—across
switchovers. In releases earlier than 12.2, nonstop active routing PIM configuration was
incompatible with draft Rosen MVPN configuration.
The backup Routing Engine sets up the default MDT based on the configuration and the
information it receives from the master Routing Engine, and keeps updating the default
MDT state information.
However, for data MDTs, the backup Routing Engine relies on the master Routing Engine
to provide updates when data MDTs are created, updated, or deleted. The backup Routing
Engine neither monitors data MDT flow rates nor triggers a data MDT switchover based
on variations in flow rates. Similarly, the backup Routing Engine does not maintain the
data MDT delay timer or timeout timer. It does not send MDT join TLV packets for the
data MDTs until it takes over as the master Routing Engine. After the switchover, the new
master Routing Engine starts sending MDT join TLV packets for each data MDT, and also
resets the data MDT timers. Note that the expiration time for the timers might vary from
the original values on the previous master Routing Engine.
Starting with Release 12.3, Junos OS extends the Protocol Independent Multicast (PIM)
nonstop active routing support to IGMP-only interfaces.
In Junos OS releases earlier than 12.3, the PIM joins created on IGMP-only interfaces were
not replicated on the backup Routing Engine. Thus, the corresponding multicast routes
were marked as pruned (meaning discarded) on the backup Routing Engine. Because of
this limitation, after a switchover, the new master Routing Engine had to wait for the
IGMP module to come up and start receiving reports to create PIM joins and to install
multicast routes. This caused traffic loss until the multicast joins and routes were
reinstated.
However, in Junos OS Release 12.3 and later, the multicast joins on the IGMP-only
interfaces are mapped to PIM states, and these states are replicated on the backup
Routing Engine. If the corresponding PIM states are available on the backup, the multicast
routes are marked as forwarding on the backup Routing Engine. This enables uninterrupted
traffic flow after a switchover. This enhancement covers IGMPv2, IGMPv3, MLDv1, and
MLDv2 reports and leaves.
Unsupported features: You can configure the following PIM features on a router along
with nonstop active routing, but they function as if nonstop active routing is not enabled.
In other words, during Routing Engine switchover and other outages, their state information
is not preserved, and traffic loss is to be expected.
• IGMP snooping
Nonstop active routing is not supported for next-generation MVPNs with PIM provider
tunnels. The commit operation fails if the configuration includes both nonstop active
routing and next-generation MVPNs with PIM provider tunnels.
Junos OS provides a configuration statement that disables nonstop active routing for
PIM only, so that you can activate incompatible PIM features and continue to use nonstop
active routing for the other protocols on the router. Before activating an incompatible
PIM feature, include the nonstop-routing disable statement at the [edit protocols pim]
hierarchy level. Note that in this case, nonstop active routing is disabled for all PIM
features, not just incompatible features.
Nonstop active routing support for MSDP preserves the following MSDP-related
information across the switchover:
However, note that the following restrictions or limitations apply to nonstop active routing
MSDP support:
• Because the backup Routing Engine learns the active source information by processing
the source-active messages from the network, synchronizing of source active
information between the master and backup Routing Engines might take up to 60
seconds. So, no planned switchover is allowed within 60 seconds of the initial replication
of the sockets.
• Similarly, Junos OS does not support two planned switchovers within 240 seconds of
each other.
Junos OS enables you to trace MSDP nonstop active routing events by including the flag
nsr-synchronization statement at the [edit protocols msdp traceoptions] hierarchy level.
You can use the show rsvp version command to view the nonstop active routing mode
and state on an LSR. Similarly, you can use the show mpls lsp and show rsvp session
commands on the backup Routing Engine to view the state recreated on the backup
Routing Engine.
However, Junos OS nonstop active routing support for RSVP point-to-multipoint LSPs
does not include support for dynamically created point-to-multipoint LSPs, such as
VPLS.
Starting with Release 14.1, Junos OS extends nonstop active routing support to the
next-generation multicast VPNs (MPVNs).
The show rsvp session detail command enables you to check the point-to-multipoint
LSP remerge state information (P2MP LSP re-merge; possible values are head, member,
and none).
However, Junos OS does not support nonstop active routing for the following features:
• Starting with Junos OS Release 14.2, IP2MP LSPs used by VPLS and MVPN
Nonstop active routing support for RSVP-TE LSPs is subject to the following limitations
and restrictions:
• Detour LSPs are not maintained across a switchover and so, detour LSPs might fail to
come back online after the switchover.
• Control plane statistics corresponding to the show rsvp statistics and show rsvp interface
detail | extensive commands are not maintained across Routing Engine switchovers.
• Statistics from the backup Routing Engine are not reported for show mpls lsp statistics
and monitor mpls label-switched-path commands. However, if a switchover occurs,
the backup Routing Engine, after taking over as the master, starts reporting statistics.
Note that the clear statistics command issued on the old master Routing Engine does
not have any effect on the new master Routing Engine, which reports statistics, including
any uncleared statistics.
• State timeouts might take additional time during nonstop active routing switchover.
For example, if a switchover occurs after a neighbor has missed sending two hello
messages to the master, the new master Routing Engine waits for another three hello
periods before timing out the neighbor.
• Backup LSPs —LSPs that are established between the point of local repair (PLR) and
the merge point after a node or link failure—are not preserved during a Routing Engine
switchover.
• When nonstop active routing is enabled, graceful restart is not supported. However,
graceful restart helper mode is supported.
14.2 Starting with Junos OS Release 14.2, IP2MP LSPs used by VPLS and MVPN
14.1 Starting with Junos OS Release 14.1, you must include the
advertise-from-main-vpn-tables statement at the [edit protocols bgp]
hierarchy level to prevent BGP sessions from going down when route reflector
(RR) or autonomous system border router (ASBR) functionality is enabled or
disabled on a routing device that has VPN address families configured.
14.1 Starting with Release 14.1, Junos OS extends nonstop active routing support to
the next-generation multicast VPNs (MPVNs).
13.3R5 Starting with Junos OS Release 13.3R5, on EX9214 switches, the VRRP master
state might change during graceful Routing Engine switchover, even when nonstop
active routing is enabled.
By default, nonstop active routing is disabled. To enable nonstop active routing, include
the nonstop-routing statement at the [edit routing-options] hierarchy level:
[edit routing-options]
nonstop-routing;
To disable nonstop active routing, remove the nonstop-routing statement from the [edit
routing-options] hierarchy level.
NOTE: When you enable nonstop active routing, you cannot enable automatic
route distinguishers for multicast VPN routing instances. Automatic route
distinguishers are enabled by configuring the route-distinguisher-id statement
at the [edit routing-instances instance-name] hierarchy level; for more
information, see the Junos OS VPNs Library for Routing Devices.
If the routing protocol process (rpd) on the NSR master Routing Engine crashes, the
master Routing Engine simply restarts rpd (with no Routing Engine switchover), which
impacts routing protocol adjacencies and neighbors and results in traffic loss. To prevent
this negative impact on traffic flow, configure the switchover-on-routing-crash statement
at the [edit system] hierarchy level. This configuration forces an NSR Routing Engine
switchover if rpd on the master Routing Engine crashes.
[edit system]
user@host# set switchover-on-routing-crash
To enable the routing platform to switch over to the backup Routing Engine when the
routing protocol process (rpd) fails rapidly three times in succession, include the
other-routing-engine statement at the [edit system processes routing failover] hierarchy
level.
For more information about the other-routing-engine statement, see the Junos OS
Administration Library.
[edit system]
synchronize;
If you try to commit the nonstop active routing configuration without including the commit
synchronize statement, the commit fails.
If you configure the commit synchronize statement at the [edit system] hierarchy level
and issue a commit in the master Routing Engine, the master configuration is automatically
synchronized with the backup.
However, if the backup Routing Engine is down when you issue the commit, the Junos
OS displays a warning and commits the candidate configuration in the master Routing
Engine. When the backup Routing Engine comes up, its configuration will automatically
be synchronized with the master.
When you configure nonstop active routing, you can bring the backup Routing
Engine online after the master Routing Engine is already running. There is no
requirement to start the two Routing Engines simultaneously.
For more information about these commands, see the CLI Explorer.
When you enable nonstop active routing or graceful Routing Engine switchover and issue
routing-related operational mode commands on the backup Routing Engine (such as
show route, show bgp neighbor, show ospf database, and so on), the output might not
match the output of the same commands issued on the master Routing Engine. For
example, it is normal for the routing table on the backup Routing Engine to contain
persistent phantom routes that are not present in the routing table on the master Routing
Engine.
To display BFD state replication status, issue the show bfd session command. The
replicated flag appears in the output for this command when a BFD session has been
replicated to the backup Routing Engine. For more information, see the CLI Explorer.
It is useful to prevent a BGP peer session from automatically being reestablished after
a nonstop active routing (NSR) switchover when you have applied routing policies
configured in the dynamic database. When NSR is enabled, the dynamic database is not
synchronized with the backup Routing Engine. Therefore, when a switchover occurs,
import and export policies configured in the dynamic database might no longer be
available. For more information about configuring dynamic routing policies, see the
Routing Policies, Firewall Filters, and Traffic Policers Feature Guide.
NOTE: The BGP established timers are not maintained across switchovers.
You can configure the routing device not to reestablish a BGP peer session after an NSR
switchover either for a specified period or until you manually reestablish the session.
Include the idle-after-switch-over statement at the [edit protocols bgp] hierarchy level:
For a list of hierarchy levels at which you can configure this statement, see the
configuration statement summary for this statement.
For seconds, specify a value from 1 through 4294967295. The BGP peer session is not
reestablished until after the specified period. If you specify the forever option, the BGP
peer session is not reestablished until you issue the clear bgp neighbor command.
The following example enables graceful Routing Engine switchover, nonstop active
routing, and nonstop active routing trace options for BGP, IS-IS, and OSPF.
[edit]
system commit {
synchronize;
}
chassis {
redundancy {
graceful-switchover; # This enables graceful Routing Engine switchover on
# the routing platform.
}
}
interfaces {
so-0/0/0 {
unit 0 {
family inet {
address [Link]/30;
}
family iso;
}
}
so-0/0/1 {
unit 0 {
family inet {
address [Link]/30;
}
family iso;
}
}
so-0/0/2 {
unit 0 {
family inet {
address [Link]/30;
}
family iso;
}
}
so-0/0/3 {
unit 0 {
family inet {
address [Link]/30;
}
family iso;
}
}
lo0 {
unit 0 {
family inet {
address [Link]/32;
}
family iso {
address 49.0004.1921.6800.2001.00;
}
}
}
}
routing-options {
nonstop-routing; # This enables nonstop active routing on the routing platform.
router-id [Link];
autonomous-system 65432;
}
protocols {
bgp {
traceoptions {
flag nsr-synchronization detail; # This logs nonstop active routing
# events for BGP.
}
advertise-from-main-vpn-tables;
local-address [Link];
group external-group {
type external;
export BGP_export;
neighbor [Link] {
family inet {
unicast;
}
peer-as 65103;
}
}
group internal-group {
type internal;
neighbor [Link];
neighbor [Link];
neighbor [Link];
}
}
isis {
traceoptions {
flag nsr-synchronization detail; # This logs nonstop active routing events
# for IS-IS.
}
interface all;
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
ospf {
traceoptions {
flag nsr-synchronization detail; # This logs nonstop active routing events
# for OSPF.
}
area [Link] {
interface all;
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
}
}
policy-options {
policy-statement BGP_export {
term direct {
from {
protocol direct;
}
then accept;
}
term final {
then reject;
}
}
}
To track the progress of nonstop active routing synchronization between Routing Engines,
you can configure nonstop active routing trace options flags for each supported protocol
and for BFD sessions and record these operations to a log file.
To configure nonstop active routing trace options for supported routing protocols, include
the nsr-synchronization statement at the [edit protocols protocol-name traceoptions flag]
hierarchy level and optionally specify one or more of the detail, disable, receive, and send
options:
[edit protocols]
bgp {
traceoptions {
flag nsr-synchronization <detail> <disable> <receive> <send>;
}
}
isis {
traceoptions {
flag nsr-synchronization <detail> <disable> <receive> <send>;
}
}
ldp {
traceoptions {
flag nsr-synchronization <detail> <disable> <receive> <send>;
}
}
mpls {
traceoptions {
flag nsr-synchronization;
flag nsr-synchronization-detail;
}
}
msdp {
traceoptions {
flag nsr-synchronization <detail> <disable> <receive> <send>;
}
}
(ospf | ospf3) {
traceoptions {
flag nsr-synchronization <detail> <disable> <receive> <send>;
}
}
rip {
traceoptions {
flag nsr-synchronization <detail> <disable> <receive> <send>;
}
}
ripng {
traceoptions {
flag nsr-synchronization <detail> <disable> <receive> <send>;
}
}
pim {
traceoptions {
flag nsr-synchronization <detail> <disable> <receive> <send>;
}
}
To configure nonstop active routing trace options for BFD sessions, include the
nsr-synchronization and nsr-packet statements at the [edit protocols bfd traceoptions
flag] hierarchy level.
[edit protocols]
bfd {
traceoptions {
flag nsr-synchronization;
flag nsr-packet;
}
}
To trace the Layer 2 VPN signaling state replicated from routes advertised by BGP, include
the nsr-synchronization statement at the [edit routing-options traceoptions flag] hierarchy
level. This flag also traces the label and logical interface association that VPLS receives
from the kernel replication state.
[edit routing-options]
traceoptions {
flag nsr-synchronization;
}
After a graceful Routing Engine switchover, we recommend that you issue the clear
interface statistics (interface-name | all) command to reset the cumulative values for
local statistics on the new master Routing Engine.
With routing protocols, any service interruption requires that an affected router recalculate
adjacencies with neighboring routers, restore routing table entries, and update other
protocol-specific information. An unprotected restart of a router can result in forwarding
delays, route flapping, wait times stemming from protocol reconvergence, and even
dropped packets. The main benefits of graceful restart are uninterrupted packet
forwarding and temporary suppression of all routing protocol updates. Graceful restart
enables a router to pass through intermediate convergence states that are hidden from
the rest of the network.
Three main types of graceful restart are available on Juniper Networks routing platforms:
• Graceful restart for aggregate and static routes and for routing protocols—Provides
protection for aggregate and static routes and for Border Gateway Protocol (BGP),
End System-to-Intermediate System (ES-IS), Intermediate System-to-Intermediate
System (IS-IS), Open Shortest Path First (OSPF), Routing Information Protocol (RIP),
next-generation RIP (RIPng), and Protocol Independent Multicast (PIM) sparse mode
routing protocols.
• Graceful restart for virtual private networks (VPNs)—Provides protection for Layer 2
and Layer 3 VPNs.
Graceful restart works similarly for routing protocols and MPLS protocols and combines
components of these protocol types to enable graceful restart in VPNs. The main benefits
of graceful restart are uninterrupted packet forwarding and temporary suppression of
all routing protocol updates. Graceful restart thus enables a router to pass through
intermediate convergence states that are hidden from the rest of the network.
Most graceful restart implementations define two types of routers—the restarting router
and the helper router. The restarting router requires rapid restoration of forwarding state
information so it can resume the forwarding of network traffic. The helper router assists
the restarting router in this process. Graceful restart configuration statements typically
affect either the restarting router or the helper router.
When you include the graceful-restart statement at the [edit routing-options] hierarchy
level, any static routes or aggregated routes that have been configured are protected.
Because no helper router assists in the restart, these routes are retained in the forwarding
table while the router restarts (rather than being discarded or refreshed).
BGP
When a router enabled for BGP graceful restart restarts, it retains BGP peer routes in its
forwarding table and marks them as stale. However, it continues to forward traffic to
other peers (or receiving peers) during the restart. To reestablish sessions, the restarting
router sets the “restart state” bit in the BGP OPEN message and sends it to all participating
peers. The receiving peers reply to the restarting router with messages containing
end-of-routing-table markers. When the restarting router or switch receives all replies
from the receiving peers, the restarting router performs route selection, the forwarding
table is updated, and the routes previously marked as stale are discarded. At this point,
all BGP sessions are reestablished and the restarting peer can receive and process BGP
messages as usual.
While the restarting router does its processing, the receiving peers also temporarily retain
routing information. When a receiving peer detects a TCP transport reset, it retains the
routes received and marks the routes as stale. After the session is reestablished with the
restarting router or switch , the stale routes are replaced with updated route information.
IS-IS
Normally, IS-IS routers move neighbor adjacencies to the down state when changes
occur. However, a router enabled for IS-IS graceful restart sends out Hello messages
with the Restart Request (RR) bit set in a restart type length value (TLV) message. This
indicates to neighboring routers that a graceful restart is in progress and to leave the
IS-IS adjacency intact. The neighboring routers must interpret and implement restart
signaling themselves. Besides maintaining the adjacency, the neighbors send complete
sequence number PDUs (CSNPs) to the restarting router and flood their entire database.
The restarting router never floods any of its own link-state PDUs (LSPs), including
pseudonode LSPs, to IS-IS neighbors while undergoing graceful restart. This enables
neighbors to reestablish their adjacencies without transitioning to the down state and
enables the restarting router to reinitiate a smooth database synchronization.
LSAs during the restart period. To reestablish OSPF adjacencies with neighbors, the
restarting router must send a grace LSA to all neighbors. In response, the helper routers
enter helper mode and send an acknowledgement back to the restarting router. If there
are no topology changes, the helper routers continue to advertise LSAs as if the restarting
router had remained in continuous OSPF operation.
When the restarting router receives replies from all the helper routers, the restarting
router selects routes, updates the forwarding table, and discards the old routes. At this
point, full OSPF adjacencies are reestablished and the restarting router receives and
processes OSPF LSAs as usual. When the helper routers no longer receive grace LSAs
from the restarting router or the topology of the network changes, the helper routers also
resume normal operation.
NOTE: For more information about the standard helper mode implementation,
see RFC 3623, Graceful OSPF Restart.
Starting with Release 11.3, Junos OS supports the restart signaling-based helper mode
for OSPF graceful restart configurations. The helper modes, both standard and restart
signaling-based, are enabled by default. In restart signaling-based helper mode
implementations, the restarting router relays the restart status to its neighbors only after
the restart is complete. When the restart is complete, the restarting router sends hello
messages to its helper routers with the restart signal (RS) bit set in the hello packet
header. When a helper router receives a hello packet with the RS bit set in the header,
the helper router returns a hello message to the restarting router. The reply hello message
from the helper router contains the ResyncState flag and the ResyncTimeout timer that
enable the restarting router to keep track of the helper routers that are syncing up with
it. When all helpers complete the synchronization, the restarting router exits the restart
mode.
NOTE:
The restart phase completes when either the PIM state becomes stable or when the
restart interval timer expires. If the neighbors do not support graceful restart or connect
to each other using multipoint interfaces, the restarting router uses the restart interval
timer to define the restart period.
LDP
LDP graceful restart enables a router whose LDP control plane is undergoing a restart to
continue to forward traffic while recovering its state from neighboring routers. It also
enables a router on which helper mode is enabled to assist a neighboring router that is
attempting to restart LDP.
During session initialization, a router advertises its ability to perform LDP graceful restart
or to take advantage of a neighbor performing LDP graceful restart by sending the graceful
restart TLV. This TLV contains two fields relevant to LDP graceful restart: the reconnect
time and the recovery time. The values of the reconnect and recovery times indicate the
graceful restart capabilities supported by the router.
When a router discovers that a neighboring router is restarting, it waits until the end of
the recovery time before attempting to reconnect. The recovery time is the length of time
a router waits for LDP to restart gracefully. The recovery time period begins when an
initialization message is sent or received. This time period is also typically the length of
time that a neighboring router maintains its information about the restarting router, so
it can continue to forward traffic.
You can configure LDP graceful restart both in the master instance for the LDP protocol
and for a specific routing instance. You can disable graceful restart at the global level
for all protocols, at the protocol level for LDP only, and for a specific routing instance
only.
RSVP
RSVP graceful restart enables a router undergoing a restart to inform its adjacent
neighbors of its condition. The restarting router requests a grace period from the neighbor
or peer, which can then cooperate with the restarting router. The restarting router can
still forward MPLS traffic during the restart period; convergence in the network is not
disrupted. The restart is not visible to the rest of the network, and the restarting router is
not removed from the network topology. RSVP graceful restart can be enabled on both
transit routers and ingress routers. It is available for both point-to-point LSPs and
point-to-multipoint LSPs.
RSVP graceful restart must be enabled on the provider edge (PE) routers and provider
(P) routers to enable graceful restart for CCC and TCC. Also, because RSVP is used as
the signaling protocol for signaling label information, the neighboring router must use
helper mode to assist with the RSVP restart procedures.
Starting with Release 11.4, Junos OS supports restart signaling-based helper mode for
OSPF graceful restart configurations.
NOTE:
• Restart signaling-based graceful restart helper mode is not supported for
OSPFv3 configurations.
Both standard and restart signaling-based helper modes are enabled by default,
irrespective of the graceful-restart configuration status on the device.
For more information about restart signaling-based graceful restart helper mode
implementation, see RFC 4811, OSPF Out-of-Band Link State Database (LSDB)
Resynchronization, RFC 4812, OSPF Restart Signalingand RFC 4813, OSPF Link-Local
Signaling.
Related • Example: Managing Helper Modes for OSPF Graceful Restart on page 228
Documentation
• Tracing Restart Signaling-Based Helper Mode Events for OSPF Graceful Restart on
page 231
1. BGP graceful restart functionality is used on all PE-to-PE BGP sessions. This affects
sessions carrying any service signaling data for network layer reachability information
(NLRI), for example, an IPv4 VPN or Layer 2 VPN NLRI.
2. OSPF, IS-IS, LDP, or RSVP graceful restart functionality is used in all core routers.
Routes added by these protocols are used to resolve Layer 2 and Layer 3 VPN NLRI.
3. Protocol restart functionality is used for any Layer 3 protocol (RIP, OSPF, LDP, and
so on) used between the PE and customer edge (CE) routers. This does not apply to
Layer 2 VPNs because Layer 2 protocols used between the CE and PE routers do not
have graceful restart capabilities.
Before VPN graceful restart can work properly, all of the components must restart
gracefully. In other words, the routers must preserve their forwarding states and request
neighbors to continue forwarding to the router in case of a restart. If all of the conditions
are satisfied, VPN graceful restart imposes the following rules on a restarting router:
• The router must wait to receive all BGP NLRI information from other PE routers before
advertising routes to the CE routers.
• The router must wait for all protocols in all routing instances to converge (or complete
the restart process) before it sends CE router information to other PE routers. In other
words, the router must wait for all instance information (whether derived from local
configuration or advertisements received from a remote peer) to be processed before
it sends this information to other PE routers.
• The router must preserve all forwarding state in the [Link].0 tables until the
new labels and transit routes are allocated and announced to other PE routers (and
CE routers in a carrier-of-carriers scenario).
If any condition is not met, VPN graceful restart does not succeed in providing
uninterrupted forwarding between CE routers across the VPN infrastructure.
Graceful restart for a logical system functions much as graceful restart does in the main
router. The only difference is the location of the graceful-restart statement:
• For a logical system, include the graceful-restart statement at the [edit logical-systems
logical-system-name routing-options] hierarchy level.
• For a routing instance inside a logical system, include the graceful-restart statement
at both the [edit logical-systems logical-system-name routing-options] and [edit
logical-systems logical-system-name routing-instances instance-name routing-options]
hierarchy levels.
Graceful restart is supported on all routing platforms. To implement graceful restart for
particular features, your system must meet these minimum requirements:
• Junos OS Release 5.3 or later for aggregate route, BGP, IS-IS, OSPF, RIP, RIPng, or
static route graceful restart.
• Junos OS Release 5.5 or later for RSVP on egress provider edge (PE) routers.
• Junos OS Release 5.6 or later for the CCC, TCC, Layer 2 VPN, or Layer 3 VPN
implementations of graceful restart.
• Junos OS Release 6.1 or later for RSVP graceful restart on ingress PE routers.
• Junos OS Release 6.4 or later for PIM sparse mode graceful restart.
• Junos OS Release 8.5 or later for BFD session (helper mode only)—If a node is
undergoing a graceful restart and its BFD sessions are distributed to the Packet
Forwarding Engine, the peer node can help the peer with the graceful restart.
• Junos OS Release 9.2 or later for BGP to support helper mode without requiring that
graceful restart be configured.
Graceful restart is disabled by default. You must configure graceful restart at the [edit
routing-options] or [edit routing-instances instance-name routing-options] hierarchy level
to enable the feature globally.
For example:
routing-options {
graceful-restart;
}
You can, optionally, modify the global settings at the individual protocol level or, as of
Junos OS 15.1, at the individual routing instance level.
NOTE: If you configure graceful restart after a BGP or LDP session has been
established, the BGP or LDP session restarts and the peers negotiate graceful
restart capabilities.
To disable graceful restart, include the disable statement. You can do this globally for
all protocols by including the disable statement at the [edit routing-options] hierarchy
level, or you can disable graceful restart for a single protocol by including the disable
statement at the [edit protocols protocol graceful-restart] hierarchy level. To configure
a time period for complete restart, include the restart-duration statement. You can specify
a number between 120 and 900.
For a list of hierarchy levels at which you can include this statement, see the statement
summary section for this statement.
When you include the graceful-restart statement at the [edit routing-options] hierarchy
level, graceful restart is also enabled for aggregate and static routes.
15.1 You can, optionally, modify the global settings at the individual protocol
level or, as of Junos OS 15.1, at the individual routing instance level.
For example:
protocols {
bgp {
group ext {
graceful-restart {
restart-time 400;
}
}
}
}
routing-options {
graceful-restart;
}
Figure 12 on page 193 shows a standard MPLS VPN network. Routers CE1 and CE2 are
customer edge routers, PE1 and PE2 are provider edge routers, and P0 is a provider core
router. Several Layer 3 VPNs are configured across this network, as well as one Layer 2
VPN. Interfaces are shown in the diagram and are not included in the configuration
example that follows.
Router CE1 On Router CE1, configure the following protocols on the logical interfaces of t3-3/1/0:
OSPF on unit 101, RIP on unit 102, BGP on unit 103, and IS-IS on unit 512. Also configure
graceful restart, BGP, IS-IS, OSPF, and RIP on the main instance to be able to connect
to the routing instances on Router PE1.
[edit]
interfaces {
t3-3/1/0 {
encapsulation frame-relay;
unit 100 {
dlci 100;
family inet {
address [Link]/30;
}
}
unit 101 {
dlci 101;
family inet {
address [Link]/30;
}
}
unit 102 {
dlci 102;
family inet {
address [Link]/30;
}
}
unit 103 {
dlci 103;
family inet {
address [Link]/30;
}
}
unit 512 {
dlci 512;
family inet {
address [Link]/30;
}
}
}
lo0 {
unit 0 {
family inet {
address [Link]/32;
primary;
}
address [Link]/32;
address [Link]/32;
address [Link]/32;
address [Link]/32;
address [Link]/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.0102.4501.4172.00;
}
}
}
routing-options {
graceful-restart;
autonomous-system 65100;
}
protocols {
bgp {
group CE-PE-INET {
type external;
export BGP_INET_LB_DIRECT;
neighbor [Link] {
local-address [Link];
family inet {
unicast;
}
peer-as 65103;
}
}
}
isis {
export ISIS_L2VPN_LB_DIRECT;
interface t3-3/1/0.512;
}
ospf {
export OSPF_LB_DIRECT;
area [Link] {
interface t3-3/1/0.101;
}
}
rip {
group RIP {
export RIP_LB_DIRECT;
neighbor t3-3/1/0.102;
}
}
}
policy-options {
policy-statement OSPF_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter [Link]/30 exact;
route-filter [Link]/32 exact;
}
then accept;
}
term final {
then reject;
}
}
policy-statement RIP_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter [Link]/30 exact;
route-filter [Link]/32 exact;
}
then accept;
}
term final {
then reject;
}
}
policy-statement BGP_INET_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter [Link]/30 exact;
route-filter [Link]/32 exact;
}
then accept;
}
term final {
then reject;
}
}
policy-statement ISIS_L2VPN_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter [Link]/32 exact;
}
then accept;
}
term final {
then reject;
}
}
}
Router PE1 On Router PE1, configure graceful restart in the master instance, along with BGP, OSPF,
MPLS, and LDP. Next, configure several protocol-specific instances of graceful restart.
By including instances for BGP, OSPF, Layer 2 VPNs, RIP, and static routes, you can
observe the wide range of options available when you implement graceful restart.
Configure the following protocols in individual instances on the logical interfaces of
t3-0/0/0: a static route on unit 100, OSPF on unit 101, RIP on unit 102, BGP on unit 103,
and Frame Relay on unit 512 for the Layer 2 VPN instance.
[edit]
interfaces {
t3-0/0/0 {
dce;
encapsulation frame-relay-ccc;
unit 100 {
dlci 100;
family inet {
address [Link]/30;
}
family mpls;
}
unit 101 {
dlci 101;
family inet {
address [Link]/30;
}
family mpls;
}
unit 102 {
dlci 102;
family inet {
address [Link]/30;
}
family mpls;
}
unit 103 {
dlci 103;
family inet {
address [Link]/30;
}
family mpls;
}
unit 512 {
encapsulation frame-relay-ccc;
dlci 512;
}
}
t1-0/1/0 {
unit 0 {
family inet {
address [Link]/30;
}
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address [Link]/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.0102.4501.4176.00;
}
}
}
}
routing-options {
graceful-restart;
router-id [Link];
autonomous-system 69;
}
protocols {
mpls {
interface all;
}
bgp {
group PEPE {
type internal;
neighbor [Link] {
local-address [Link];
family inet-vpn {
unicast;
}
family l2vpn {
unicast;
}
}
}
}
ospf {
area [Link] {
interface t1-0/1/0.0;
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
}
ldp {
interface all;
}
}
policy-options {
policy-statement STATIC-import {
from community STATIC;
then accept;
}
policy-statement STATIC-export {
then {
community add STATIC;
accept;
}
}
policy-statement OSPF-import {
from community OSPF;
then accept;
}
policy-statement OSPF-export {
then {
community add OSPF;
accept;
}
}
policy-statement RIP-import {
from community RIP;
then accept;
}
policy-statement RIP-export {
then {
community add RIP;
accept;
}
}
policy-statement BGP-INET-import {
from community BGP-INET;
then accept;
}
policy-statement BGP-INET-export {
then {
community add BGP-INET;
accept;
}
}
policy-statement L2VPN-import {
from community L2VPN;
then accept;
}
policy-statement L2VPN-export {
then {
community add L2VPN;
accept;
}
}
community BGP-INET members target:69:103;
community L2VPN members target:69:512;
community OSPF members target:69:101;
community RIP members target:69:102;
community STATIC members target:69:100;
}
routing-instances {
BGP-INET {
instance-type vrf;
interface t3-0/0/0.103;
route-distinguisher [Link]:103;
vrf-import BGP-INET-import;
vrf-export BGP-INET-export;
routing-options {
graceful-restart;
autonomous-system 65103;
}
protocols {
bgp {
group BGP-INET {
type external;
export BGP-INET-import;
neighbor [Link] {
local-address [Link];
family inet {
unicast;
}
peer-as 65100;
}
}
}
}
}
L2VPN {
instance-type l2vpn;
interface t3-0/0/0.512;
route-distinguisher [Link]:512;
vrf-import L2VPN-import;
vrf-export L2VPN-export;
protocols {# There is no graceful-restart statement for Layer 2 VPN instances.
l2vpn {
encapsulation-type frame-relay;
site CE1-ISIS {
site-identifier 512;
interface t3-0/0/0.512 {
remote-site-id 612;
}
}
}
}
}
OSPF {
instance-type vrf;
interface t3-0/0/0.101;
route-distinguisher [Link]:101;
vrf-import OSPF-import;
vrf-export OSPF-export;
routing-options {
graceful-restart;
}
protocols {
ospf {
export OSPF-import;
area [Link] {
interface all;
}
}
}
}
RIP {
instance-type vrf;
interface t3-0/0/0.102;
route-distinguisher [Link]:102;
vrf-import RIP-import;
vrf-export RIP-export;
routing-options {
graceful-restart;
}
protocols {
rip {
group RIP {
export RIP-import;
neighbor t3-0/0/0.102;
}
}
}
}
STATIC {
instance-type vrf;
interface t3-0/0/0.100;
route-distinguisher [Link]:100;
vrf-import STATIC-import;
vrf-export STATIC-export;
routing-options {
graceful-restart;
static {
route [Link]/32 next-hop t3-0/0/0.100;
}
}
}
}
Router P0 On Router P0, configure graceful restart in the main instance, along with OSPF, MPLS,
and LDP. This allows the protocols on the PE routers to reach one another.
[edit]
interfaces {
t3-0/1/3 {
unit 0 {
family inet {
address [Link]/30;
}
family mpls;
}
}
t1-0/2/0 {
unit 0 {
family inet {
address [Link]/30;
}
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address [Link]/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.0102.4501.4174.00;
}
}
}
}
routing-options {
graceful-restart;
router-id [Link];
autonomous-system 69;
}
protocols {
mpls {
interface all;
}
ospf {
area [Link] {
interface t1-0/2/0.0;
interface t3-0/1/3.0;
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
}
ldp {
interface all;
}
}
Router PE2 On Router PE2, configure BGP, OSPF, MPLS, LDP, and graceful restart in the master
instance. Configure the following protocols in individual instances on the logical interfaces
of t1-0/1/3: a static route on unit 200, OSPF on unit 201, RIP on unit 202, BGP on unit 203,
and Frame Relay on unit 612 for the Layer 2 VPN instance. Also configure protocol-specific
graceful restart in all routing instances, except the Layer 2 VPN instance.
[edit]
interfaces {
t3-0/0/0 {
unit 0 {
family inet {
address [Link]/30;
}
family mpls;
}
}
t1-0/1/3 {
dce;
encapsulation frame-relay-ccc;
unit 200 {
dlci 200;
family inet {
address [Link]/30;
}
family mpls;
}
unit 201 {
dlci 201;
family inet {
address [Link]/30;
}
family mpls;
}
unit 202 {
dlci 202;
family inet {
address [Link]/30;
}
family mpls;
}
unit 203 {
dlci 203;
family inet {
address [Link]/30;
}
family mpls;
}
unit 612 {
encapsulation frame-relay-ccc;
dlci 612;
}
}
lo0 {
unit 0 {
family inet {
address [Link]/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.0102.4501.4182.00;
}
}
}
}
routing-options {
graceful-restart;
router-id [Link];
autonomous-system 69;
}
protocols {
mpls {
interface all;
}
bgp {
group PEPE {
type internal;
neighbor [Link] {
local-address [Link];
family inet-vpn {
unicast;
}
family l2vpn {
unicast;
}
}
}
}
ospf {
area [Link] {
interface t3-0/0/0.0;
interface fxp0.0 {
disable;
}
interface lo0.0 {
passive;
}
}
}
ldp {
interface all;
}
policy-options {
policy-statement STATIC-import {
from community STATIC;
then accept;
}
policy-statement STATIC-export {
then {
community add STATIC;
accept;
}
}
policy-statement OSPF-import {
from community OSPF;
then accept;
}
policy-statement OSPF-export {
then {
community add OSPF;
accept;
}
}
policy-statement RIP-import {
from community RIP;
then accept;
}
policy-statement RIP-export {
then {
community add RIP;
accept;
}
}
policy-statement BGP-INET-import {
from community BGP-INET;
then accept;
}
policy-statement BGP-INET-export {
then {
community add BGP-INET;
accept;
}
}
policy-statement L2VPN-import {
from community L2VPN;
then accept;
}
policy-statement L2VPN-export {
then {
community add L2VPN;
accept;
}
}
community BGP-INET members target:69:103;
community L2VPN members target:69:512;
community OSPF members target:69:101;
community RIP members target:69:102;
community STATIC members target:69:100;
}
routing-instances {
BGP-INET {
instance-type vrf;
interface t1-0/1/3.203;
route-distinguisher [Link]:203;
vrf-import BGP-INET-import;
vrf-export BGP-INET-export;
routing-options {
graceful-restart;
autonomous-system 65203;
}
protocols {
bgp {
group BGP-INET {
type external;
export BGP-INET-import;
neighbor [Link] {
local-address [Link];
family inet {
unicast;
}
peer-as 65200;
}
}
}
}
}
L2VPN {
instance-type l2vpn;
interface t1-0/1/3.612;
route-distinguisher [Link]:612;
vrf-import L2VPN-import;
vrf-export L2VPN-export;
protocols {# There is no graceful-restart statement for Layer 2 VPN instances.
l2vpn {
encapsulation-type frame-relay;
site CE2-ISIS {
site-identifier 612;
interface t1-0/1/3.612 {
remote-site-id 512;
}
}
}
}
}
OSPF {
instance-type vrf;
interface t1-0/1/3.201;
route-distinguisher [Link]:201;
vrf-import OSPF-import;
vrf-export OSPF-export;
routing-options {
graceful-restart;
}
protocols {
ospf {
export OSPF-import;
area [Link] {
interface all;
}
}
}
}
RIP {
instance-type vrf;
interface t1-0/1/3.202;
route-distinguisher [Link]:202;
vrf-import RIP-import;
vrf-export RIP-export;
routing-options {
graceful-restart;
}
protocols {
rip {
group RIP {
export RIP-import;
neighbor t1-0/1/3.202;
}
}
}
}
STATIC {
instance-type vrf;
interface t1-0/1/3.200;
route-distinguisher [Link]:200;
vrf-import STATIC-import;
vrf-export STATIC-export;
routing-options {
graceful-restart;
static {
route [Link]/32 next-hop t1-0/1/3.200;
}
}
}
}
}
Router CE2 On Router CE2, complete the Layer 2 and Layer 3 VPN configuration by mirroring the
protocols already set on Routers PE2 and CE1. Specifically, configure the following on
the logical interfaces of t1-0/0/3: OSPF on unit 201, RIP on unit 202, BGP on unit 203,
and IS-IS on unit 612. Finally, configure graceful restart, BGP, IS-IS, OSPF, and RIP on the
main instance to be able to connect to the routing instances on Router PE2.
[edit]
interfaces {
t1-0/0/3 {
encapsulation frame-relay;
unit 200 {
dlci 200;
family inet {
address [Link]/30;
}
}
unit 201 {
dlci 201;
family inet {
address [Link]/30;
}
}
unit 202 {
dlci 202;
family inet {
address [Link]/30;
}
}
unit 203 {
dlci 203;
family inet {
address [Link]/30;
}
}
unit 512 {
dlci 512;
family inet {
address [Link]/30;
}
}
}
lo0 {
unit 0 {
family inet {
address [Link]/32 {
primary;
}
address [Link]/32;
address [Link]/32;
address [Link]/32;
address [Link]/32;
address [Link]/32;
}
family iso {
address 47.0005.80ff.f800.0000.0108.0001.0102.4501.4180.00;
}
}
}
}
routing-options {
graceful-restart;
autonomous-system 65200;
}
protocols {
bgp {
group CE-PE-INET {
type external;
export BGP_INET_LB_DIRECT;
neighbor [Link] {
local-address [Link];
family inet {
unicast;
}
peer-as 65203;
}
}
}
isis {
export ISIS_L2VPN_LB_DIRECT;
interface t1-0/0/3.612;
}
ospf {
export OSPF_LB_DIRECT;
area [Link] {
interface t1-0/0/3.201;
}
}
rip {
group RIP {
export RIP_LB_DIRECT;
neighbor t1-0/0/3.202;
}
}
}
policy-options {
policy-statement OSPF_LB_DIRECT {
term direct {
from {
protocol direct;
route-filter [Link]/30 exact;
route-filter [Link]/32 exact;
}
then accept;
}
term final {
then reject;
}
}
policy-statement RIP_LB_DIRECT {
term direct {
from {
protocol direct;
The following example displays neighbor relationships on Router PE1 before a restart
happens:
Restart Complete
inet6.0 : 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
bgp.l2vpn.0 : 1 routes (1 active, 0 holddown, 0 hidden)
Restart Complete
BGP-INET:
Router ID: [Link]
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.103
Route-distinguisher: [Link]:103
Vrf-import: [ BGP-INET-import ]
Vrf-export: [ BGP-INET-export ]
Tables:
[Link].0 : 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
L2VPN:
Router ID: [Link]
Type: l2vpn State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.512
Route-distinguisher: [Link]:512
Vrf-import: [ L2VPN-import ]
Vrf-export: [ L2VPN-export ]
Tables:
L2VPN.l2vpn.0 : 2 routes (2 active, 0 holddown, 0 hidden)
Restart Complete
OSPF:
Router ID: [Link]
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.101
Route-distinguisher: [Link]:101
Vrf-import: [ OSPF-import ]
Vrf-export: [ OSPF-export ]
Tables:
[Link].0 : 8 routes (7 active, 0 holddown, 0 hidden)
Restart Complete
RIP:
Router ID: [Link]
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.102
Route-distinguisher: [Link]:102
Vrf-import: [ RIP-import ]
Vrf-export: [ RIP-export ]
Tables:
[Link].0 : 6 routes (6 active, 0 holddown, 0 hidden)
Restart Complete
STATIC:
Router ID: [Link]
Type: vrf State: Active
Restart State: Complete Path selection timeout: 300
Interfaces:
t3-0/0/0.100
Route-distinguisher: [Link]:100
Vrf-import: [ STATIC-import ]
Vrf-export: [ STATIC-export ]
Tables:
[Link].0 : 4 routes (4 active, 0 holddown, 0 hidden)
Restart Complete
__juniper_private1__:
Router ID: [Link]
Type: forwarding State: Active
Before you can verify that graceful restart is working, you must simulate a router restart.
To cause the routing process to refresh and simulate a restart, use the restart routing
operational mode command:
l3vpn.0 0/0/0
inet6.0 2/0/0
l2vpn.0 0/0/0
l2circuit.0 0/0/0
BGP-INET vrf
[Link].0 5/0/0
[Link].0 0/0/0
BGP-INET.inet6.0 0/0/0
L2VPN l2vpn
[Link].0 0/0/0
[Link].0 0/0/0
L2VPN.inet6.0 0/0/0
L2VPN.l2vpn.0 2/0/0
OSPF vrf
[Link].0 7/0/0
[Link].0 0/0/0
OSPF.inet6.0 0/0/0
RIP vrf
[Link].0 6/0/0
[Link].0 0/0/0
RIP.inet6.0 0/0/0
STATIC vrf
[Link].0 4/0/0
[Link].0 0/0/0
STATIC.inet6.0 0/0/0
__juniper_private1__ forwarding
__juniper_priva.inet.0 0/0/0
__juniper_privat.iso.0 0/0/0
__juniper_priv.inet6.0 0/0/0
[Link]:512:512:611/96
*[L2VPN/7] [Link]
Discard
bgp.l2vpn.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden)
Restart Pending: BGP VPN
For example:
routing-options {
graceful-restart;
}
To configure the duration of the graceful restart period, include the restart-duration at
the [edit routing-options graceful-restart] hierarchy level.
[edit]
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
To disable graceful restart globally, include the disable statement at the [edit
routing-options graceful-restart] hierarchy level.
When graceful restart is enabled for all routing protocols at the [edit routing-options
graceful-restart] hierarchy level, you can disable graceful restart on a per-protocol basis.
NOTE: If you configure graceful restart after a BGP or LDP session has been
established, the BGP or LDP session restarts and the peers negotiate graceful
restart capabilities. Also, the BGP peer routing statistics are reset to zero.
[edit]
protocols {
bgp {
graceful-restart {
disable;
restart-time seconds;
stale-routes-time seconds;
}
}
}
routing-options {
graceful-restart;
}
To disable BGP graceful restart capability for all BGP sessions, include the disable
statement at the [edit protocols bgp graceful-restart] hierarchy level.
NOTE: To set BGP graceful restart properties or disable them for a group,
include the desired statements at the [edit protocols bgp group group-name
graceful-restart] hierarchy level.
To set BGP graceful restart properties or disable them for a specific neighbor
in a group, include the desired statements at the [edit protocols bgp group
group-name neighbor ip-address graceful-restart] hierarchy level.
NOTE: Configuring graceful restart for BGP resets the BGP peer routing
statistics to zero. Also, existing BGP sessions restart, and the peers negotiate
graceful restart capabilities.
[edit]
protocols {
esis {
graceful-restart {
disable;
restart-duration seconds;
}
}
}
routing-options {
graceful-restart;
}
To disable ES-IS graceful restart capability, include the disable statement at the [edit
protocols esis graceful-restart] hierarchy level.
[edit]
protocols {
isis {
graceful-restart {
disable;
helper-disable;
restart-duration seconds;
}
}
}
routing-options {
graceful-restart;
}
To disable IS-IS graceful restart helper capability, include the helper-disable statement
at the [edit protocols isis graceful-restart] hierarchy level. To disable IS-IS graceful restart
capability, include the disable statement at the [edit protocols isis graceful-restart]
hierarchy level.
To ensure that these adjacencies are kept, change the hold-time for IS-IS
protocols from the default of 27 seconds to a value higher than 40 seconds.
NOTE: You can also track graceful restart events with the traceoptions
statement at the [edit protocols isis] hierarchy level. For more information,
see “Tracking Graceful Restart Events” on page 223.
[edit]
protocols {
ospf | ospfv3{
graceful-restart {
disable;
helper-disable
no-strict-lsa-checking;
notify-duration seconds;
restart-duration seconds;
}
}
}
routing-options {
graceful-restart;
}
To disable OSPF/OSPFv3 graceful restart, include the disable statement at the [edit
protocols (ospf | ospf3) graceful-restart] hierarchy level.
Starting with Release 11.3, the Junos OS supports both the standard (based on RFC 3623,
Graceful OSPF Restart) and the restart signaling-based (as specified in RFC 4811, RFC
4812, and RFC 4813) helper modes for OSPF version 2 graceful restart configurations.
Both the standard and restart signaling-based helper modes are enabled by default. To
disable the helper mode for OSPF version 2 graceful restart configurations, include the
helper-disable <both | restart-signaling | standard> statement at the [edit protocols ospf
graceful-restart] hierarchy level. Note that the last committed statement always takes
precedence over the previous one.
To reenable the helper mode, delete the helper-disable statement from the configuration
by using the delete protocols ospf graceful-restarthelper-disable <restart-signaling |
standard | both> command. In this case also, the last executed command takes
precedence over the previous ones.
NOTE:
TIP: You can also track graceful restart events with the traceoptions statement
at the [edit protocols (ospf | ospf3)] hierarchy level. For more information,
see “Tracking Graceful Restart Events” on page 223.
[edit]
protocols {
(rip | ripng) {
graceful-restart {
disable;
restart-time seconds;
}
}
}
routing-options {
graceful-restart;
}
To disable RIP or RIPng graceful restart capability, include the disable statement at the
[edit protocols (rip | ripng) graceful-restart] hierarchy level.
PIM sparse mode-enabled routing platforms generate a unique 32-bit random number
called a generation identifier. Generation identifiers are included by default in PIM hello
messages, as specified in the IETF Internet draft Protocol Independent Multicast - Sparse
Mode (PIM-SM): Protocol Specification (Revised). When a routing platform receives PIM
hellos containing generation identifiers on a point-to-point interface, Junos OS activates
an algorithm that optimizes graceful restart.
Before PIM sparse mode graceful restart occurs, each routing platform creates a
generation identifier and sends it to its multicast neighbors. If a PIM sparse mode-enabled
routing platform restarts, it creates a new generation identifier and sends it to its neighbors.
When a neighbor receives the new identifier, it resends multicast updates to the restarting
router to allow it to exit graceful restart efficiently. The restart phase completes when
either the PIM state becomes stable or when the restart interval timer expires.
To configure the duration of the PIM graceful restart period, include the restart-duration
statement at the [edit protocols pim graceful-restart] hierarchy level:
[edit]
protocols {
pim {
graceful-restart {
disable;
restart-duration seconds;
}
}
}
routing-options {
graceful-restart;
}
To disable PIM sparse mode graceful restart capability, include the disable statement
at the [edit protocols pim graceful-restart] hierarchy level.
[edit protocols]
isis {
traceoptions {
flag graceful-restart;
}
}
(ospf | ospf3) {
traceoptions {
flag graceful-restart;
}
}
12.3 Starting with Junos OS Release 12.3, if adjacencies between the Routing Engine
and the neighboring peer 'helper' routers time out, graceful restart protocol
extensions are unable to notify the peer 'helper' routers about the impending
restart.
[edit]
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
To disable graceful restart globally, include the disable statement at the [edit
routing-options graceful-restart] hierarchy level.
To configure how long the router retains the state of its RSVP neighbors while they
undergo a graceful restart, include the maximum-helper-recovery-time statement at the
[edit protocols rsvp graceful-restart] hierarchy level. This value is applied to all neighboring
routers, so it should be based on the time required by the slowest RSVP neighbor to
recover.
To configure the delay between when the router discovers that a neighboring router has
gone down and when it declares the neighbor down, include the
maximum-helper-restart-time statement at the [edit protocols rsvp graceful-restart]
hierarchy level. This value is applied to all neighboring routers, so it should be based on
the time required by the slowest RSVP neighbor to restart.
[edit]
protocols {
rsvp {
graceful-restart {
disable;
helper-disable;
maximum-helper-recovery-time;
maximum-helper-restart-time;
}
}
}
routing-options {
graceful-restart;
}
To disable RSVP, CCC, and TCC graceful restart, include the disable statement at the
[edit protocols rsvp graceful-restart] hierarchy level. To disable RSVP, CCC, and TCC
helper capability, include the helper-disable statement at the [edit protocols rsvp
graceful-restart] hierarchy level.
[edit routing-options]
graceful-restart;
The statements have the following effects on the graceful restart process:
• To configure the length of time required to reestablish a session after a graceful restart,
include the reconnect-time statement; the range is 30 through 300 seconds. To limit
the maximum reconnect time allowed from a restarting neighbor router, include the
maximum-neighbor-reconnect-time statement; the range is 30 through 300 seconds.
• To configure the length of time that helper routers are required to maintain the old
forwarding state during a graceful restart, include the recovery-time statement; the
range is 120 through 1800 seconds. On the helper router, you can configure a statement
that overrides the request from the restarting router and sets the maximum length of
time the helper router will maintain the old forwarding state. To configure this feature,
include the maximum-neighbor-recovery-time statement; the range is 140 through 1900
seconds.
• To disable LDP graceful restart capability, include the disable statement. To disable
LDP graceful restart helper capability, include the helper-disable statement.
Graceful restart allows a router whose VPN control plane is undergoing a restart to
continue to forward traffic while recovering its state from neighboring routers. Without
graceful restart, a control plane restart disrupts any VPN services provided by the router.
Graceful restart is supported on Layer 2 VPNs, Layer 3 VPNs, virtual-router routing
instances, and VPLS.
To implement graceful restart for a Layer 2 VPN or Layer 3 VPN, perform the configuration
tasks described in the following sections:
[edit]
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
To disable graceful restart globally, include the disable statement at the [edit
routing-options graceful-restart] hierarchy level.
[edit]
routing-instances {
instance-name {
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
}
}
You can disable graceful restart for individual protocols with the disable statement at
the [edit routing-instances instance-name protocols protocol-name graceful-restart]
hierarchy level.
Graceful restart for a logical system functions much as graceful restart does in the main
router. The only difference is the location of the graceful-restart statement.
The following topics describe what to configure to implement graceful restart in a logical
system:
[edit]
logical-systems {
logical-system-name {
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
}
}
To disable graceful restart globally, include the disable statement at the [edit
logical-systems logical-system-name routing-options graceful-restart] hierarchy level.
[edit]
logical-systems {
logical-system-name {
routing-instances {
instance-name {
routing-options {
graceful-restart {
disable;
restart-duration seconds;
}
}
}
}
}
}
To disable graceful restart for individual protocols with the disable statement at the [edit
logical-systems logical-system-name routing-instances instance-name protocols
protocol-name graceful-restart] hierarchy level.
Requirements
M Series or T Series routers running Junos OS Release 11.4 or later and EX Series switches.
Overview
Junos OS Release 11.4 extends OSPF graceful restart support to include restart
signaling-based helper mode. Both standard (RFC 3623-based) and restart
signaling-based helper modes are enabled by default, irrespective of the graceful-restart
configuration status on the routing device.
Junos OS, however, enables you to choose between the helper modes with the
helper-disable <standard | restart-signaling | both> statement.
Configuration
Both standard and restart signaling-based helper modes are enabled by default,
irrespective of the graceful-restart configuration status on the routing device. Junos OS
allows you to disable or enable the helper modes based on your requirements.
[edit routing-options]
user@host# set graceful-restart
The helper modes, both standard and restart signaling-based, are enabled by default.
2. To disable one or both of the helper modes, add the helper-disable <both |
restart-signaling | standard> statement at the [edit protocols ospf graceful-restart]
hierarchy level.
NOTE: You must commit the configuration before the change takes effect.
The last committed statement always takes precedence over the previous
one.
3. To enable one or both of the helper modes when the helper modes are disabled, delete
the helper-disable <both | restart-signaling | standard> statement from the [edit
protocols ospf graceful-restart] hierarchy level.
NOTE: You must commit the configuration before the change takes effect.
The last committed statement always takes precedence over the previous
one.
Verification
Confirm that the configuration is working properly.
• Verifying OSPF Graceful Restart and Helper Mode Configuration on page 230
Purpose Verify the OSPF graceful restart and helper mode configuration on a router.
Action • Enter the run show ospf overview command from configuration mode.
~
~
~
Restart: Enabled
Restart duration: 180 sec
Restart grace period: 210 sec
Graceful restart helper mode: Enabled
Restart-signaling helper mode: Enabled
~
~
~
Meaning The output shows that graceful restart and both of the helper modes are enabled.
Related • Understanding Restart Signaling-Based Helper Mode Support for OSPF Graceful
Documentation Restart on page 186
• Tracing Restart Signaling-Based Helper Mode Events for OSPF Graceful Restart on
page 231
Tracing Restart Signaling-Based Helper Mode Events for OSPF Graceful Restart
Junos OS provides a tracing option to log restart signaling-based helper mode events for
OSPF graceful restart. To enable tracing for restart signaling-based helper mode events,
include the traceoptions flag restart-signaling statement at the [edit protocols ospf]
hierarchy level.
The logs are saved to the ospf-log file in the /var/log folder.
To view the restart signaling-based events from the log file, type:
Related • Understanding Restart Signaling-Based Helper Mode Support for OSPF Graceful
Documentation Restart on page 186
• Example: Managing Helper Modes for OSPF Graceful Restart on page 228
• show route instance detail (for Layer 3 VPN graceful restart and for any protocols using
graceful restart in a routing instance)
For more information about these commands and a description of their output fields,
see the CLI Explorer.
Understanding VRRP
For Ethernet, Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet, and logical interfaces,
you can configure the Virtual Router Redundancy Protocol (VRRP) or VRRP for IPv6.
VRRP enables hosts on a LAN to make use of redundant routing platforms on that LAN
without requiring more than the static configuration of a single default route on the hosts.
The VRRP routing platforms share the IP address corresponding to the default route
configured on the hosts. At any time, one of the VRRP routing platforms is the master
(active) and the others are backups. If the master fails, one of the backup routers becomes
the new master router, providing a virtual default routing platform and enabling traffic
on the LAN to be routed without relying on a single routing platform. Using VRRP, a backup
router can take over a failed default router within a few seconds. This is done with
minimum VRRP traffic and without any interaction with the hosts.
Routers running VRRP dynamically elect master and backup routers. You can also force
assignment of master and backup routers using priorities from 1 through 255, with 255
being the highest priority. In VRRP operation, the default master router sends
advertisements to backup routers at regular intervals. The default interval is 1 second. If
a backup router does not receive an advertisement for a set period, the backup router
with the next highest priority takes over as master and begins forwarding packets.
NOTE: To minimize network traffic, VRRP is designed in such a way that only
the router that is acting as the master sends out VRRP advertisements at
any given point in time. The backup routers do not send any advertisement
until and unless they take over mastership.
VRRP for IPv6 provides a much faster switchover to an alternate default router than IPv6
neighbor discovery procedures. Typical deployments use only one backup router.
Figure 13 on page 238 illustrates a basic VRRP topology. In this example, Routers A, B, and
C are running VRRP and together make up a virtual router. The IP address of this virtual
router is [Link] (the same address as the physical interface of Router A).
Because the virtual router uses the IP address of the physical interface of Router A, Router
A is the master VRRP router, while routers B and C function as backup VRRP routers.
Clients 1 through 3 are configured with the default gateway IP address of [Link]. As the
master router, Router A forwards packets sent to its IP address. If the master virtual router
fails, the router configured with the higher priority becomes the master virtual router and
provides uninterrupted service for the LAN hosts. When Router A recovers, it becomes
the master virtual router again.
VRRP is defined in RFC 3768, Virtual Router Redundancy Protocol. VRRP for IPv6 is defined
in [Link], Virtual Router Redundancy Protocol for IPv6. See also
[Link], Definitions of Managed Objects for the VRRP over IPv4
and IPv6.
NOTE: Even though VRRP, as defined in RFC 3768, does not support
authentication, the Junos OS implementation of VRRP supports
authentication as defined in RFC 2338. This support is achieved through the
backward compatibility options in RFC 3768.
14.2R1 In Junos OS Release 14.2R1, in some cases, during an inherit session, there is a
small time frame during which two routers are in Master-Master state. In such
cases, the VRRP groups that inherit the state do send out VRRP advertisements
every 120 seconds.
The advantage of using VRRPv3 is that VRRPv3 supports both IPv4 and IPv6 address
families, whereas VRRPv2 supports only IPv4 addresses.
The following topics describe the Junos OS support for and interoperability of VRRPv3,
as well as some differences between VRRPv3 and its precursors:
VRRPv3 is not supported on routers that use releases earlier than Junos OS Release 12.2
and is also not supported for IPv6 on QFX10000 switches.
• RFC 5798, Virtual Router Redundancy Protocol (VRRP) Version 3 for IPv4 and IPv6
• RFC 6527, Definitions of Managed Objects for Virtual Router Redundancy Protocol
Version 3 (VRRPv3)
NOTE: VRRP (for IPv6) on routers that use Junos OS Release 12.2 and later
releases does not interoperate with VRRP (for IPv6) on routers with earlier
Junos OS releases because of the differences in VRRP checksum calculations.
See “IPv6 VRRP Checksum Behavioral Differences” on page 240.
• In releases earlier than Junos OS Release 12.2, when VRRP for IPv6 is configured, the
VRRP checksum is calculated according to section 5.3.8 of RFC 3768, Virtual Router
Redundancy Protocol (VRRP).
• Starting with Junos OS Release 12.2, when VRRP for IPv6 is configured, irrespective of
VRRPv3 being enabled or not, the VRRP checksum is calculated according to section
5.2.8 of RFC 5798, Virtual Router Redundancy Protocol (VRRP) Version 3 for IPv4 and
IPv6.
Moreover, the pseudoheader is included only when calculating the IPv6 VRRP checksum.
The pseudoheader is not included when calculating the IPv4 VRRP checksum.
To make the router with Junos OS Release 12.2 (or later Junos OS releases) IPv6 VRRP
interoperate with the router running a Junos OS release earlier than Release 12.2, include
the checksum-without-pseudoheader configuration statement at the [edit protocols
vrrp] hierarchy level in the router running Junos OS Release 12.2 or later.
• The tcpdump utility in Junos OS Release 12.2 and later calculates the VRRP checksum
according to RFC 5798, Virtual Router Redundancy Protocol (VRRP) Version 3 for IPv4
and IPv6. Therefore, when tcpdump parses IPv6 VRRP packets that are received from
older Junos OS releases (earlier than Junos OS Release 12.2), the bad vrrp cksum
message is displayed:
[Link].657328 Out
...
-----original packet-----
[Link] > [Link], ethertype IPv6 (0x86dd), length
94: (class 0xc0, hlim 255, next-header: VRRP (112), length: 40)
fe80::224:dcff:fe47:57f > ff02::12: VRRPv3-advertisement 40: vrid=3 prio=100
intvl=100(centisec) (bad vrrp cksum b4e2!) addrs(2):
fe80::200:5eff:fe00:3,[Link]
3333 0000 0012 0000 5e00 0203 86dd 6c00
0000 0028 70ff fe80 0000 0000 0000 0224
dcff fe47 057f ff02 0000 0000 0000 0000
0000 0000 0012 3103 6402 0064 b4e2 fe80
0000 0000 0000 0200 5eff fe00 0003 2001
4818 f000 0014 0000 0000 0000 0001
You can ignore this message because it does not indicate VRRP failure.
VRRP Interoperability
In releases earlier than Junos OS Release 12.2, VRRP (IPv6) followed Internet draft
draft-ietf-vrrp-ipv6-spec-08, but checksum was calculated based on RFC 3768 section
5.3.8. Starting with Release 12.2, VRRP (IPv6) follows RFC 5798 and checksum is
calculated based on RFC 5798 section 5.2.8. Because of the differences in VRRP checksum
calculations, IPv6 VRRP configured on routers that use Junos OS Release 12.2 and later
releases does not interoperate with IPv6 VRRP configured in releases before Junos OS
Release 12.2.
To make the router with Junos OS Release 12.2 (or later Junos OS releases) IPv6 VRRP
interoperate with the router running Junos OS releases earlier than Release 12.2, include
the checksum-without-pseudoheader configuration statement at the [edit protocols vrrp]
hierarchy level in the router with Junos OS Release 12.2 or later.
• If you have configured VRRPv3 (IPv4 or IPv6) on routers that use Junos OS Release
12.2 or later releases, it will not operate with routers that use Junos OS Release 12.1 or
earlier releases. This is because only Junos OS Release 12.2 and later releases support
VRRPv3.
• VRRP (IPv4 or IPv6) configured on routers that use Junos OS Release 12.2 and later
releases interoperate with VRRP (IPv4 or IPv6) configured on routers that use releases
earlier than Junos OS Release 12.2.
• VRRPv3 for IPv4 does not interoperate with the previous versions of VRRP. If VRRPv2
IPv4 advertisement packets are received by a router on which VRRPv3 is enabled, the
router transitions itself to the backup state to avoid creating multiple masters in the
network. Due to this behavior, you must be cautious when enabling VRRPv3 on your
existing VRRPv2 networks. See “Upgrading from VRRPv2 to VRRPv3” on page 241 for
more information.
Enable VRRPv3 on your VRRPv2 network only when upgrading from VRRPv2 to VRRPv3.
Mixing the two versions of VRRP is not a permanent solution.
Upgrading from VRRPv2 to VRRPv3 must be done very carefully to avoid traffic loss, due
to these considerations:
• During the transition period, both VRRPv2 and VRRPv3 operate in the network.
• Changing VRRP versions restarts the state machine for all VRRP groups.
• VRRPv3 (for IPv4) routers default to the backup state when they get VRRPv2 (for
IPv4) advertisement packets.
• VRRPv2 (for IPv4) packets are always given the highest priority.
• Checksum differences between VRRPv2 and VRRPv3 (for IPv6) can create multiple
master routers.
Disable VRRPv3 (for IPv6) on the backup routers while upgrading to avoid creating
multiple master routers.
Table 10 on page 242 illustrates the steps and events that take place during a VRRPv2 to
VRRPv3 transition. In Table 10 on page 242, two VRRPv2 routers, R1 and R2, are configured
in two groups, G1 and G2. Router R1 acts as the master for G1, and Router R2 acts as the
master for G2.
When enabling VRRPv3, make sure that VRRPv3 is enabled on all the VRRP routers in
the network because VRRPv3 (IPv4) does not interoperate with the previous versions of
VRRP. For example, if VRRPv2 IPv4 advertisement packets are received by a router on
which VRRPv3 is enabled, the router transitions itself to the backup state to avoid creating
multiple masters in the network.
You can enable VRRPv3 by configuring the version-3 statement at the [edit protocols
vrrp] hierarchy level (for IPv4 or IPv6 networks). Configure the same protocol version on
all VRRP routers on the LAN.
VRRPv3 Authentication
VRRPv3 (for IPv4 and IPv6) advertisement intervals must be set with the fast-interval
statement at the [edit interfaces interface-name unit 0 family inet address ip-address
vrrp-group group-name] hierarchy level.
Design changes for VRRP unified in-service software upgrade (ISSU) are made in Junos
OS Release 15.1 to achieve the following functionality:
• Maintain protocol adjacency with peer routers during unified ISSU. Protocol adjacency
created on peer routers for the router undergoing unified ISSU should not flap, which
means that VRRP on the remote peer router should not flap.
• Maintain interoperability with other Junos OS releases and other Juniper Network
products.
The values of the following configurations (found at the [edit interfaces interface-name
unit 0 family inet address ip-address vrrp-group group-name] hierarchy level) need to be
kept at maximum values to support unified ISSU:
• On the master router, the advertisement interval (the fast-interval statement) needs
to be kept at 40950 milliseconds.
This VRRP unified ISSU design only works for VRRPv3. It is not supported on VRRPv1 or
VRRPv2. Other limitations include the following:
• The VRRP unified ISSU takes care of VRRP only. Packet forwarding is the responsibility
of the Packet Forwarding Engine. The Packet Forwarding Engine unified ISSU should
ensure uninterrupted traffic flow.
• VRRP is not affected by any change event during unified ISSU, for example, the
switchover of the master Routing Engine to backup or the backup Routing Engine to
master.
• VRRP might stop and discard any running timer before entering into unified ISSU. This
means the expected action upon the expiry of the timer never takes place. However,
you can defer unified ISSU until the expiration of all running timers.
• Unified ISSU at both local and remote routers cannot be done simultaneously.
Failover is a backup operational mode in which the functions of a network device are
assumed by a secondary device when the primary device becomes unavailable because
of a failure or a scheduled down time. Failover is typically an integral part of mission-critical
systems that must be constantly available on the network.
A fast failover requires a short delay. Thus, failover-delay configures the failover delay
time, in milliseconds, for VRRP and VRRP for IPv6 operations. Junos OS supports a range
of 50 through 100000 milliseconds for delay in failover time.
The VRRP process (vrrpd) running on the Routing Engine communicates a VRRP
mastership change to the Packet Forwarding Engine for every VRRP session. Each VRRP
group can trigger such communication to update the Packet Forwarding Engine with its
own state or the state inherited form an active VRRP group. To avoid overloading the
Packet Forwarding Engine with such messages, you can configure a failover-delay to
specify the delay between subsequent Routing Engine to Packet Forwarding Engine
communications.
The Routing Engine communicates a VRRP mastership change to the Packet Forwarding
Engine to facilitate necessary state change on the Packet Forwarding Engine, such as
reprogramming of Packet Forwarding Engine hardware filters, VRRP sessions and so on.
The following sections elaborate the Routing Engine to Packet Forwarding Engine
communication in two scenarios:
1. When the first VRRP group detected by the Routing Engine changes state, and the
new state is master, the Routing Engine generates appropriate VRRP announcement
messages. The Packet Forwarding Engine is informed about the state change, so that
hardware filters for that group are reprogrammed without delay. The new master then
sends gratuitous ARP message to the VRRP groups.
3. The Routing Engine performs one-by-one state change for subsequent VRRP groups.
Every time there is a state change, and the new state for a particular VRRP group is
master, the Routing Engine generates appropriate VRRP announcement messages.
However, communication toward the Packet Forwarding Engine is suppressed until
the failover-delay timer expires.
4. After failover-delay timer expires, the Routing Engine sends message to the Packet
Forwarding Engine about all VRRP groups that managed to change the state. As a
consequence, hardware filters for those groups are reprogrammed, and for those
groups whose new state is master, gratuitous ARP messages are sent.
This process repeats until state transition for all VRRP groups is complete.
Thus, without configuring failover-delay, the full state transition (including states on the
Routing Engine and the Packet Forwarding Engine) for the first VRRP group is performed
immediately, while state transition on the Packet Forwarding Engine for remaining VRRP
groups is delayed by at least 0.5-10 seconds, depending on the configured VRRP
announcement timers and the number of VRRP groups. During this intermediate state,
receiving traffic for VRRP groups for state changes that were not yet completed on the
Packet Forwarding Engine might be dropped at the Packet Forwarding Engine level due
to deferred reconfiguration of hardware filters.
1. The Routing Engine detects that some VRRP groups require a state change.
2. The failover-delay starts for the period configured. The allowed failover-delay timer
range is 50 through 100000 miliseconds.
3. The Routing Engine performs one-by-one state change for the VRRP groups. Every
time there is a state change, and the new state for a particular VRRP group is master,
the Routing Engine generates appropriate VRRP announcement messages. However,
communication toward the Packet Forwarding Engine is suppressed until the
failover-delay timer expires.
4. After failover-delay timer expires, the Routing Enigne sends message to the Packet
Forwarding Engine about all VRRP groups that managed to change the state. As a
consequence, hardware filters for those groups are reprogrammed, and for those
groups whose new state is master, gratuitous ARP messages are sent.
This process repeats until state transition for all VRRP groups is complete.
Thus, when failover-delay is configured even the Packet Forwarding Engine state for the
first VRRP group is deferred. However, the network operator has the advantage of
configuring a failover-delay value that best suits the need of the network deployment to
ensure minimal outage during VRRP state change.
Related • failover-delay
Documentation
Configuring VRRP
NOTE: Starting in Junos OS Release 13.2, VRRP nonstop active routing (NSR)
is enabled only when you configure the nonstop-routing statement at the
[edit routing-options] or [edit logical system logical-system-name
routing-options] hierarchy level.
The Virtual Router Redundancy Protocol (VRRP) groups multiple routing devices into a
virtual router. At any time, one of the VRRP routing platforms is the master (active) and
the others are backups. If the master fails, one of the backup routing platforms becomes
the new master router.
To configure basic VRRP support, you configure VRRP groups on interfaces. An interface
can be a member of one or more VRRP groups. Within a VRRP group, the master virtual
router and the backup virtual router must be configured on different routing platforms.
Mandatory parameters to configure a VRRP group are as follows (examples will follow):
• Configure the virtual IP address of one or more virtual routers that are members of
the VRRP group (mandatory).
• Configure the virtual link-local address (VRRP for IPv6 only). The virtual link-local
address is autogenerated when you enable VRRPv3 on the interface. You may
explicitly define a virtual link-local address for each VRRP for the IPv6 group. The
virtual link-local address must be on the same subnet as the physical interface
address.
• Configure the priority for the routing platform to become the master virtual router
(mandatory).
• The virtual IP address must be the same for all routing platforms in the VRRP group.
• If you configure a virtual IP address to be the same as the physical interface’s address,
the interface becomes the master virtual router for the group. In this case, you must
configure the priority to be 255, and you must configure preemption by including the
preempt statement.
• If the virtual IP address you choose is not the same as the physical interface’s address,
you must ensure that the virtual IP address does not appear anywhere else in the
routing platform’s configuration. Verify that you do not use this address for other
interfaces, for the IP address of a tunnel, or for the IP address of static ARP entries.
• You cannot configure a virtual IP address to be the same as the interface’s address for
an aggregated Ethernet interface. This configuration is not supported.
• For VRRP for IPv6, the EUI-64 option cannot be used. In addition, the Duplicate Address
Detection (DAD) process will not run for virtual IPv6 addresses.
• You cannot configure the same virtual IP address on interfaces that belong to the same
logical system and routing instance combination. However, you can configure the same
virtual IP address on interfaces that belong to different logical systems and routing
instance combinations.
In determining what priority will make a given routing platform in a VRRP group a master
or backup, consider the following:
• You can force assignment of master and backup routers using priorities from 1 through
255, where 255 is the highest priority.
• The priority value for the VRRP router that owns the IP address(es) associated with
the virtual router must be 255.
• VRRP routers backing up a virtual router must use priority values from 1 through 254.
• The default priority value for VRRP routers backing up a virtual router is 100.
The priority cost is the value associated with a tracked logical interface or route that
is to be subtracted from the configured VRRP priority when the tracked logical interface
or route goes down, forcing a new master router election. The value of a priority cost
can be from 1 through 254. The sum of the priority costs for all tracked logical interfaces
or routes must be less than or equal to the configured priority of the VRRP group.
NOTE: Mixed tagging (configuring two logical interfaces on the same Ethernet
port, one with single-tag framing and one with dual-tag framing) is supported
only for interfaces on Gigabit Ethernet IQ2 and IQ PICs. If you include the
flexible-vlan-tagging statement at the [edit interfaces interface-name] hierarchy
level for a VRRP-enabled interface on a PIC that does not support mixed
tagging, VRRP on that interface is disabled. In the output of the show vrrp
summary operational command, the interface status is listed as Down.
NOTE: If you enable MAC source address filtering on an interface, you must
include the virtual MAC address in the list of source MAC addresses that you
specify in the source-address-filter statement at the [edit interfaces
interface-name] hierarchy level. (For more information, see the Junos OS
Network Interfaces Library for Routing Devices.) MAC addresses ranging from
[Link] through [Link] are reserved for VRRP, as
defined in RFC 2378. The VRRP group number must be the decimal equivalent
of the last hexadecimal byte of the virtual MAC address.
NOTE: You should not use the same VRRP group identifier on more than one
subinterface on a given physical interface. This causes the VRRP virtual MAC
address to be deleted from the packet forwarding engine, resulting in packet
drops due to unknown MAC address. If your VRRP configuration needs to
scale beyond 255 groups, consider configuring VRRP over an integrated
routing and bridging (IRB) interface, since this restriction does not apply to
IRB interfaces.
NOTE: You can also configure a VRRP IPv4 group at the [edit logical-systems
logical-system-name] hierarchy level.
• Configure the virtual IP address of one or more virtual routers that are members of
the VRRP group.
Normally, you configure only one virtual IP address per group. However, you can
configure up to eight addresses. Do not include a prefix length in a virtual IP address.
• Configure the priority for this routing platform to become the master virtual router.
Configure the value used to elect the master virtual router in the VRRP group. It can
be a number from 1 through 255. The default value for backup routers is 100. A larger
value indicates a higher priority. The routing platform with the highest priority within
the group becomes the master router. If there are two or more backup routers with
the same priority, the router that has the highest primary address becomes the
master.
Configuring VRRP for To configure basic VRRP for IPv6 groups on interfaces:
IPv6 Groups
NOTE: You can also configure a VRRP IPv6 group at the [edit logical-systems
logical-system-name] hierarchy level.
• Configure the virtual IP address of one or more virtual routers that are members of
the VRRP group.
Normally, you configure only one virtual IP address per group. However, you can
configure up to eight addresses. Do not include a prefix length in a virtual IP address.
You must explicitly define a virtual link-local address for each VRRP for IPv6 group.
Otherwise, when you attempt to commit the configuration, the commit request
fails. The virtual link-local address must be on the same subnet as the physical
interface address.
• Configure the priority for this routing platform to become the master virtual router.
Configure the value used to elect the master virtual router in the VRRP group. It can
be a number from 1 through 255. The default value for backup routers is 100. A larger
value indicates a higher priority. The routing platform with the highest priority within
the group becomes the master router. If there are two or more backup routers with
the same priority, the router that has the highest primary address becomes the
master.
13.2 Starting in Junos OS Release 13.2, VRRP nonstop active routing (NSR) is enabled
only when you configure the nonstop-routing statement at the [edit
routing-options] or [edit logical system logical-system-name
routing-options] hierarchy level.
Related • Configuring a Logical Interface to Be Tracked for a VRRP Group on page 263
Documentation
• Configuring a Route to Be Tracked for a VRRP Group on page 265
• Configuring the Advertisement Interval for the VRRP Master Router on page 256
Configuring VRRP
Configure one master (Router A) and one backup (Router B) routing platform. The
address configured in the virtual-address statements differs from the addresses configured
in the address statements. When you configure multiple VRRP groups on an interface,
you configure one to be the master virtual router for that group.
priority 200;
authentication-type simple;
authentication-key booJUM;
}
}
}
}
}
Configuring VRRP and The VRRP group number is the decimal equivalent of the last byte of the virtual MAC
MAC Source Address address.
Filtering
[edit interfaces]
ge-5/2/0 {
gigether-options {
source-filtering;
source-address-filter {
[Link]; # Virtual MAC address
}
}
unit 0 {
family inet {
address [Link]/24 {
vrrp-group 10; # VRRP group number
virtual-address [Link];
priority 255;
preempt;
}
}
}
}
Configure VRRP properties for IPv6 in one master (Router A) and one backup (Router B).
[edit protocols]
router-advertisement {
interface ge-1/0/0.0 {
prefix fec0::/64;
max-advertisement-interval 4;
}
}
[edit protocols]
router-advertisement {
interface ge-1/0/0.0 {
prefix fec0::/64;
max-advertisement-interval 4;
}
}
VRRP (IPv4 only) protocol exchanges can be authenticated to guarantee that only trusted
routing platforms participate in routing in an autonomous system (AS). By default, VRRP
authentication is disabled. You can configure one of the following authentication methods.
Each VRRP group must use the same method.
authentication-type authentication;
authentication can be simple or md5. The authentication type must be the same for all
routing platforms in the VRRP group.
If you include the authentication-type statement, you can configure a key (password) on
each interface by including the authentication-key statement:
authentication-key key;
key (the password) is an ASCII string. For simple authentication, it can be from 1 through
8 characters long. For MD5 authentication, it can be from 1 through 16 characters long.
If you include spaces, enclose all characters in quotation marks (“ ”). The key must be
the same for all routing platforms in the VRRP group.
By default, the master router sends VRRP advertisement packets every second to all
members of the VRRP group. These packets indicate that the master router is still
operational. If the master router fails or becomes unreachable, the backup router with
the highest priority value becomes the new master router.
You can modify the advertisement interval in seconds or in milliseconds. The interval
must be the same for all routing platforms in the VRRP group.
For VRRP for IPv6, you must configure IPv6 router advertisements for the interface on
which VRRP is configured to send IPv6 router advertisements for the VRRP group. To do
so, include the interface interface-name statement at the [edit protocols
router-advertisement] hierarchy level. (For information about this statement and
guidelines, see the Junos OS Routing Protocols Library.) When an interface receives an
IPv6 router solicitation message, it sends an IPv6 router advertisement to all VRRP groups
configured on it. In the case of logical systems, IPv6 router advertisements are not sent
to VRRP groups.
NOTE: The master VRRP for an IPv6 router must respond to a router
solicitation message with the virtual IP address of the router. However, when
the interface interface-name statement is included at the [edit protocols
router-advertisement] hierarchy level, the backup VRRP for an IPv6 router
might send a response before the VRRP master responds, so that the default
route of the client is not set to the master VRRP router’s virtual IP address.
To avoid this situation, include the virtual-router-only statement at the [edit
protocols router-advertisement interface interface-name] hierarchy level. When
this statement is included, router advertisements are sent only for VRRP IPv6
groups configured on the interface (if the groups are in the master state).
You must include this statement on both the master and backup VRRP for
IPv6 routers.
advertise-interval seconds;
fast-interval milliseconds;
NOTE: In the VRRP PDU, Junos OS sets the advertisement interval to 0. When
you configure VRRP with other vendors’ routers, the fast-interval statement
works correctly only when the other routers also have an advertisement
interval set to 0 in the VRRP PDUs. Otherwise, Junos OS interprets other
routers’ settings as advertisement timer errors.
To modify the time, in milliseconds, between the sending of VRRP for IPv6 advertisement
packets, include the inet6-advertise-interval statement:
inet6-advertise-interval ms;
• Configuring a Backup Router to Preempt the VRRP Master Router on page 259
• Modifying the Preemption Hold-Time Value for the VRRP Master Router on page 260
• Configuring the Asymmetric Hold Time for VRRP Routers on page 260
• Configuring the Silent Period to Avoid Alarms Due to Delay in Receiving VRRP
Advertisement Packets on page 276
To configure the startup period for VRRP operations, include the startup-silent-period
statement at the [edit protocols vrrp] hierarchy level:
NOTE: During the silent startup period, the show vrrp detail command output
shows a value of 0 for Master priority, and your own IP address for Master
router. These values indicate that the Master selection is not completed yet,
and these values can be ignored.
preempt;
no-preempt;
• Modifying the Preemption Hold-Time Value for the VRRP Master Router on page 260
• Configuring the Asymmetric Hold Time for VRRP Routers on page 260
Modifying the Preemption Hold-Time Value for the VRRP Master Router
The hold time is the maximum number of seconds that can elapse before a higher-priority
backup router preempts the master router. You might want to configure a hold time so
that all Junos OS components converge before preemption.
By default, the hold-time value is 0 seconds. A value of 0 means that preemption can
occur immediately after the backup router comes online. Note that the hold time is
counted from the time the backup router comes online. The hold time is only valid when
the VRRP router is just coming online.
hold-time seconds;
Related • Configuring the Advertisement Interval for the VRRP Master Router on page 256
Documentation
• Configuring a Backup Router to Preempt the VRRP Master Router on page 259
• Configuring the Asymmetric Hold Time for VRRP Routers on page 260
In Junos OS Release 9.5 and later, the asymmetric-hold-time statement at the [edit
protocols vrrp] hierarchy level enables you to configure a VRRP master router to switch
over to the backup router immediately—that is, without waiting for the priority hold time
to expire—when a tracked interface or route goes down or when the bandwidth of a
tracked interface decreases. Such events can cause an immediate reduction in the priority
based on the configured priority cost for the event, and trigger a mastership election.
However, when the tracked route or interface comes up again, or when the bandwidth
for a tracked interface increases, the backup (original master) router waits for the hold
time to expire before it updates the priority and initiates the switchover if the priority is
higher than the priority for the VRRP master (original backup) router.
If the asymmetric-hold-time statement is not configured, the VRRP master waits for the
hold time to expire before it initiates a switchover when a tracked route goes down.
Related • Configuring the Advertisement Interval for the VRRP Master Router on page 256
Documentation
• Configuring a Backup Router to Preempt the VRRP Master Router on page 259
• Modifying the Preemption Hold-Time Value for the VRRP Master Router on page 260
By default, the backup VRRP router drops ARP requests for the VRRP-IP to VRRP-MAC
address translation. This means that the backup router does not learn the ARP (IP-to-MAC
address) mappings for the hosts sending the requests. When it detects a failure of the
master router and transitions to become the new master router, the backup router must
re-learn all the entries that were present in the ARP cache of the master router. In
environments with many directly attached hosts, such as metro Ethernet environments,
the number of ARP entries to learn can be high. This can cause a significant transition
delay, during which the traffic transmitted to some of the hosts might be dropped.
Passive ARP learning enables the ARP cache in the backup router to hold approximately
the same contents as the ARP cache in the master router, thus preventing the problem
of learning ARP entries in a burst. To enable passive ARP learning, include the
passive-learning statement at the [edit system arp] hierarchy level:
We recommend setting passive learning on both the backup and master VRRP routers.
Doing so prevents the need to manually intervene when the master router becomes the
backup router. While a router is operating as the master router, the passive learning
configuration has no operational impact. The configuration takes effect only when the
router is operating as a backup router.
For information about configuring gratuitous ARP and the ARP aging timer, see the Junos
OS Administration Library.
Configure Routers R1 and R2 to run VRRP. Configure static routes and a policy for exporting
the static routes on Router R3. The VRRP routing instances on R2 track the routes that
are advertised by R3.
ge-1/0/3 {
unit 0 {
vlan-id 1;
family inet {
address [Link]/24 {
vrrp-group 0 {
virtual-address [Link];
priority 195;
}
}
}
}
}
On Router R3 [edit]
policy-options {
policy-statement static-policy {
term term1 {
then accept;
}
}
}
protocols {
ospf {
export static-policy;
reference-bandwidth 4g;
area [Link] {
interface all;
interface fxp0.0 {
disable;
}
}
}
}
routing-options {
static {
route [Link]/32 next-hop [Link];
route [Link]/32 next-hop [Link];
route [Link]/32 next-hop [Link];
}
}
VRRP can track whether a logical interface is up, down, or not present, and can also
dynamically change the priority of the VRRP group based on the state of the tracked
logical interface, triggering a new master router election. VRRP can also track the
operational speed of a logical interface and dynamically update the priority of the VRRP
group when the speed crosses a configured threshold.
When interface tracking is enabled, you cannot configure a priority of 255 (a priority of
255 designates the master router). For each VRRP group, you can track up to 10 logical
interfaces.
track {
interface interface-name {
bandwidth-threshold bits-per-second priority-cost priority;
priority-cost priority;
}
priority-hold-time seconds;
}
interface et-0/0/0 {
priority-cost 30;
}
The interface specified is the interface to be tracked for the VRRP group. The priority hold
time is the minimum length of time that must elapse between dynamic priority changes.
A tracking event, such as an interface state change (up or down) or a change in bandwidth,
triggers one of the following responses:
• The first tracking event initiates the priority hold timer, and also initializes the pending
priority based on the current priority and the priority cost. However, the current priority
remains unchanged.
• A tracking event or a manual configuration change that occurs while the priority hold
timer is on triggers a pending priority update. However, the current priority remains
unchanged.
This ensures that Junos OS does not initiate mastership elections every time a tracked
interface flaps.
When the priority hold time expires, the current priority inherits the value from the pending
priority, and the pending priority ceases.
NOTE: If you have configured asymmetric-hold-time, VRRP does not wait for
the priority hold time to expire before initiating mastership elections if a
tracked interface fails (state changes from up to down), or if the available
bandwidth for a tracked interface decreases. For more information about
asymmetric-hold-time, see “Configuring the Asymmetric Hold Time for VRRP
Routers” on page 260.
There are two priority-cost statements that show at this hierarchy level. The
bandwidth-threshold statement specifies a threshold for the tracked interface. When
the bandwidth of the tracked interface drops below the configured bandwidth threshold
value, the VRRP group uses the bandwidth threshold priority cost. You can track up to
five bandwidth threshold statements for each tracked interface. Just under the interface
statement there is a priority-cost statement that gives the value to subtract from priority
when the interface is down.
The sum of the priority costs for all tracked logical interfaces must be less than or equal
to the configured priority of the VRRP group. If you are tracking more than one interface,
the router applies the sum of the priority costs for the tracked interfaces (at most, only
one priority cost for each tracked interface) to the VRRP group priority.
Prior to Junos OS Release 15.1, an adjusted priority could not be zero. If the difference
between the priority costs and the configured priority of the VRRP group was zero, the
adjusted priority would become 1.
NOTE: In Junos OS Release 15.1 and later, an adjusted priority can be zero.
The priority value zero (0) indicates that the current master router has stopped
participating in VRRP. Such a priority value is used to trigger one of the backup routers
to quickly transition to the master router without having to wait for the current master
to time out.
If you are tracking more than one interface, the router applies the sum of the priority costs
for the tracked interfaces (at most, only one priority cost for each tracked interface) to
the VRRP group priority. However, the interface priority cost and bandwidth threshold
priority cost values for each VRRP group are not cumulative. The router uses only one
priority cost to a tracked interface as indicated in Table 11 on page 265.
Not down; media speed below one or more Priority cost of the lowest applicable bandwidth
bandwidth thresholds threshold
You must configure an interface priority cost only if you have configured no bandwidth
thresholds. If you have not configured an interface priority cost value, and the interface
is down, the interface uses the bandwidth threshold priority cost value of the lowest
bandwidth threshold.
15.1 In Junos OS Release 15.1 and later, an adjusted priority can be zero.
VRRP can track whether a route is reachable (that is, the route exists in the routing table
of the routing instance included in the configuration) and dynamically change the priority
of the VRRP group based on the reachability of the tracked route, triggering a new master
router election.
track {
priority-hold-time seconds;
route prefix/prefix-length routing-instance instance-name priority-cost priority;
}
The route prefix specified is the route to be tracked for the VRRP group. The priority hold
time is the minimum length of time that must elapse between dynamic priority changes.
A route tracking event, such as adding a route to or removing a route from the routing
table, might trigger one or more of the following:
• The first tracking event initiates the priority hold timer, and also initializes the pending
priority based on the current priority and the priority cost. However, the current priority
remains unchanged.
• A tracking event or a manual configuration change that occurs while the priority hold
timer is on triggers a pending priority update. However, the current priority remains
unchanged.
When the priority hold time expires, the current priority inherits the value from the pending
priority, and the pending priority ceases.
This ensures that Junos OS does not initiate mastership elections every time a tracked
route flaps.
NOTE: If you have configured asymmetric-hold-time, VRRP does not wait for
the priority hold time to expire before initiating mastership elections if a
tracked route is removed from the routing table. For more information about
asymmetric-hold-time, see “Configuring the Asymmetric Hold Time for VRRP
Routers” on page 260.
The routing instance is the routing instance in which the route is to be tracked. If the route
is in the default, or global, routing instance, specify the instance name as default.
The priority cost is the value to be subtracted from the configured VRRP priority when
the tracked route goes down, forcing a new master router election. The value can be
from 1 through 254.
The sum of the priority costs for all tracked routes must be less than or equal to the
configured priority of the VRRP group. If you are tracking more than one route, the router
applies the sum of the priority costs for the tracked routes (at most, only one priority cost
for each tracked route) to the VRRP group priority.
Prior to Junos OS Release 15.1, an adjusted priority could not be zero. If the difference
between the priority costs and the configured priority of the VRRP group was zero, the
adjusted priority would become 1.
NOTE: In Junos OS Release 15.1 and later, an adjusted priority can be zero.
The priority value zero (0) indicates that the current master router has stopped
participating in VRRP. Such a priority value is used to trigger one of the backup routers
to quickly transition to the master router without having to wait for the current master
to time out.
15.1 Prior to Junos OS Release 15.1, an adjusted priority could not be zero.
These examples show how to configure multiple virtual router redundancy protocol
(VRRP) IPv4 and IPv6 owner groups.
Requirements
This example uses the following hardware and software components:
Overview
Multiple VRRP owner groups allows users to reuse interface address identifiers (IFAs)
as virtual IP addresses (VIPs). You can configure multiple IPv4 owner groups, multiple
IPv6 owner groups, or a mix of IPv4 and IPv6 owner groups.
Configuration
CLI Quick To quickly configure this section of the example, copy the following commands, paste
Configuration them into a text file, remove any line breaks, change any details necessary to match your
network configuration, and then copy and paste the commands into the CLI at the [edit]
hierarchy level.
[edit]
user@host# edit interfaces ge-1/0/0 unit 0 family inet
[edit]
user@host# edit interfaces ge-1/0/0 unit 0 family inet6
2. Configure the inet6 address for the first IPv6 owner group
[edit]
user@host# edit interfaces ge-1/0/0 unit 0
2. Configure the family inet address and virtual address for the IPv4 owner group
4. Configure the inet6 address for the first IPv6 owner group
5. Set the virtual link local address for the first IPv6 owner group
7. Configure the inet6 address for the second IPv6 owner group
8. Set the virtual link local address for the second IPv6 owner group
10. Configure the inet6 address for the third IPv6 owner group
11. Set the virtual link local address for the third IPv6 owner group
Results
vrrp-group 2 {
virtual-address [Link];
accept-data;
}
}
address [Link]/24 {
vrrp-group 3 {
virtual-address [Link];
priority 255;
}
}
address [Link]/24 {
vrrp-group 4 {
virtual-address [Link];
priority 255;
}
}
}
}
vrrp-group 5 {
virtual-address [Link];
priority 255;
}
}
}
family inet6 {
address [Link]/64 {
vrrp-inet6-group 1 {
virtual-inet6-address [Link];
virtual-link-local-address [Link];
priority 255;
}
}
address [Link]/64 {
vrrp-inet6-group 2 {
virtual-inet6-address [Link];
virtual-link-local-address [Link];
priority 255;
}
}
address [Link]/64 {
vrrp-inet6-group 3 {
virtual-inet6-address [Link];
virtual-link-local-address [Link];
priority 250;
}
}
}
}
Verification
To verify the configuration, run the show interfaces ge-1/0/0 command, or use whichever
name you assigned to the interface.
Junos OS enables you to configure VRRP groups on the various subnets of a VLAN to
inherit the state and configuration of one of the groups, which is known as the active
VRRP group. When the vrrp-inherit-from configuration statement is included in the
configuration, only the active VRRP group, from which the other VRRP groups are inheriting
the state, sends out frequent VRRP advertisements, and processes incoming VRRP
advertisements. The groups that are inheriting the state do not process any incoming
VRRP advertisement because the state is always inherited from the active VRRP group.
However, the groups that are inheriting the state do send out VRRP advertisements once
every 2 to 3 minutes to facilitate MAC address learning on the switches placed between
the VRRP routers.
If the vrrp-inherit-from statement is not configured, each of the VRRP master groups in
the various subnets on the VLAN sends out separate VRRP advertisements and adds to
the traffic on the VLAN.
When you configure a group to inherit a state from another group, the inheriting groups
and the active group must be on the same physical interface and logical system. However,
the groups do not need to necessarily be on the same routing instance (as was in Junos
OS releases earlier than 9.6), VLAN, or logical interface.
When you include the vrrp-inherit-from statement for a VRRP group, the VRRP group
inherits the following parameters from the active group:
• advertise-interval
• authentication-key
• authentication-type
• fast-interval
• preempt | no-preempt
• priority
• track interfaces
• track route
However, you can configure the accept-data | no-accept-data statement for the group
to specify whether the interface should accept packets destined for the virtual IP address.
Configuring an Interface to Accept All Packets Destined for the Virtual IP Address of
a VRRP Group
In VRRP implementations where the router acting as the master router is not the IP
address owner—the IP address owner is the router that has the interface whose actual
IP address is used as the virtual router’s IP address (virtual IP address)— the master
router accepts only the ARP packets from the packets that are sent to the virtual IP
address. Junos OS enables you to override this limitation with the help of the accept-data
configuration. When the accept-data statement is included in the configuration, the
master router accepts all packets sent to the virtual IP address even when the master
router is not the IP address owner.
NOTE: If the master router is the IP address owner or has its priority set to
255, the master router, by default, accepts all packets addressed to the virtual
IP address. In such cases, the accept-data configuration is not required.
To configure an interface to accept all packets sent to the virtual IP address, include the
accept-data statement:
accept-data;
To prevent a master router that is the IP address owner or has its priority set to 255 from
accepting packets other than the ARP packets addressed to the virtual IP address, include
the no-accept-data statement:
no-accept-data;
NOTE:
• If you want to restrict the incoming IP packets to ICMP packets only, you
must configure firewall filters to accept only ICMP packets.
Configuring the Silent Period to Avoid Alarms Due to Delay in Receiving VRRP
Advertisement Packets
The silent period starts when the interface state is changed from down to up. During this
period, the Master Down Event is ignored. Configure the silent period interval to avoid
alarms caused by the delay or interruption of the incoming VRRP advertisement packets
during the interface startup phase.
To configure the silent period interval that the Master Down Event timer ignores, include
the startup-silent-period statement at the [edit protocols vrrp] hierarchy level:
NOTE: During the silent startup period, the show vrrp detail command output
shows a value of 0 for Master priority and your IP address for Master router.
These values indicate that the Master selection is not completed yet, and
these values can be ignored.
When you have configured startup-silent-period, the Master Down Event is ignored until
the startup-silent-period expires.
For example, configure a VRRP group, vrrp-group1, with an advertise interval of 1 second,
startup silent period of 10 seconds, and an interface interface1 with a priority less than
255.
• The vrrp-group1 group moves to the backup state, and starts the Master Down Event
timer (3 seconds; three times the value of the advertise interval, which is 1 second in
this case).
• If no VRRP PDU is received during the 3-second period, the startup-silent-period (10
seconds in this case) is checked, and if the startup silent period has not expired, the
Master Down Event timer is restarted. This is repeated until the startup-silent-period
expires. In this example, the Master Down Event timer runs four times (12 seconds) by
the time the 10-second startup silent period expires.
• If no VRRP PDU is received by the end of the fourth 3-second cycle, vrrp-group1 takes
over mastership.
Typically, VRRP advertisements are sent by the VRRP process (vrrpd) on the master
VRRP router at regular intervals to let other members of the group know that the VRRP
master router is operational.
When the vrrpd process is busy and does not send VRRP advertisements, the backup
VRRP routers might assume that the master router is down and take over as the master
router, causing unnecessary flaps. This takeover might occur even though the original
master router is still active and available and might resume sending advertisements after
the traffic has decreased. To address this problem and to reduce the load on the vrrpd
process, Junos OS uses the periodic packet management process (ppmd) to send VRRP
advertisements on behalf of the vrrpd process. However, you can further delegate the
job of sending VRRP advertisements to the distributed ppmd process that resides on the
Packet Forwarding Engine.
The ability to delegate the sending of VRRP advertisements to the distributed ppmd
process ensures that the VRRP advertisements are sent even when the ppmd
process—which is now responsible for sending VRRP advertisements—is busy. Such
delegation prevents the possibility of false alarms when the ppmd process is busy. The
ability to delegate the sending of VRRP advertisements to distributed ppmd also adds
to scalability because the load is shared across multiple ppmd instances and is not
concentrated on any single unit.
To configure the distributed ppmd process to send VRRP advertisements, include the
delegate-processing statement at the [edit protocols vrrp] hierarchy level:
To configure the distributed ppmd process to send VRRP advertisements over aggregated
Ethernet and IRB interfaces, include the delegate-processing ae-irb statement at the [edit
protocols vrrp] hierarchy level:
You can enable faster convergence time for the configured Virtual Router Redundancy
Protocol (VRRP), thereby reducing the traffic restoration time to less than 1 second. To
improve the convergence time for the VRRP, perform the following tasks:
• Disable the skew timer—The skew timer in VRRP is used to ensure that two backup
routers do not switch to the master state at the same time in case of a failover situation.
When there is only one master router and one backup router in the network deployment,
you can disable the skew timer, thereby reducing the time required to transition to the
master state.
To disable the skew timer, include the skew-timer-disable statement at the [edit
protocols vrrp] hierarchy level.
• Configure the number of fast advertisements that can be missed by a backup router
before it starts transitioning to the master state—The backup router waits until a
certain number of advertisement packets are lost after which it transitions to the master
state. This waiting time can be fatal in scenarios such as router failure or link failure.
To avoid such a situation and to enable faster convergence time, in Junos OS Release
12.2 and later, you can configure a fast advertisement interval value that specifies the
number of fast advertisements that can be missed by a backup router before it starts
transitioning to the master state.
NOTE:
• Inheritance of VRRP groups is supported with all types of interfaces. Other
measures to reduce convergence time, such as VRRP distribution, disabling
skew timer, and reducing advertisement threshold.
• Compared to other routers, the convergence time and the traffic restoration
time are less for MX Series routers with MPCs.
You can enable faster convergence time for the configured Virtual Router Redundancy
Protocol (VRRP), thereby reducing the traffic restoration time to less than 1 second. To
improve the convergence time for VRRP, perform the following tasks.
Before you begin, configure VRRP. See “Configuring VRRP” on page 252.
1. Configure the distributed periodic packet management (PPM) process to send VRRP
advertisements when the VRRP process is busy.
[edit]
user@host# set protocols vrrp delegate-processing
2. Disable the skew timer to reduce the time required to transition to the master state.
[edit]
user@host# set protocols vrrp skew-timer-disable
NOTE: When there is only one master router and one backup router in the
network deployment, you can disable the skew timer, thereby reducing
the time required to transition to the master state.
3. Configure the number of fast advertisements that can be missed by a backup router
before it starts transitioning to the master state.
[edit]
user@host# set protocols vrrp global-advertisement-threshold advertisement-value
4. Configure VRRP groups on the various subnets of a VLAN to inherit the state and to
configure one of the groups.
[edit]
user@host# set interfaces interface-name unit logical-unit-number family inet address
address vrrp-group group-id
[edit]
user@host# show protocols vrrp
NOTE:
• Inheritance of VRRP groups is supported with all types of interfaces. Other
measures to reduce convergence time, such as VRRP distribution, disabling
skew timer, and reducing advertisement threshold, are not applicable when
VRRP is configured over integrated routing and bridging (IRB) interfaces,
aggregated Ethernet interfaces, and multichassis link aggregation group
(MC-LAG) interfaces.
• Compared to other routers, the convergence time and the traffic restoration
time are less for MX Series routers with MPCs.
To trace VRRP operations, include the traceoptions statement at the [edit protocols vrrp]
hierarchy level.
By default, VRRP logs the error, data carrier detect (DCD) configuration, and routing
socket events in a file in the /var/log directory. By default, this file is named /var/log/vrrpd.
The default file size is 1 megabyte (MB), and three files are created before the first one
gets overwritten.
To change the configuration of the logging file, include the traceoptions statement at the
[edit protocols vrrp] hierarchy level:
The unified in-service software upgrade (ISSU) feature enables you to upgrade between
two different Junos OS releases with no disruption on the control plane and with minimal
disruption of traffic.
To quickly access the information you need, click on the link in Table 12 on page 285.
Table 12: Locating the Information You Need to Work With ISSU
Task You Need to Perform Where The Information Is Located
Verify unified ISSU support for your device “Unified ISSU System Requirements” on page 299
Verify that the unified ISSU is successful “Verifying a Unified ISSU” on page 349
Understand how the unified ISSU process works “Understanding the Unified ISSU Process” on page 286
Unified ISSU takes advantage of the redundancy provided by dual Routing Engines and
works in conjunction with the graceful Routing Engine switchover feature and the nonstop
active routing feature.
This topic explains the unified ISSU processes that take place on a router, on a TX Matrix
router, on a TX Matrix Plus router and its connected line-card chassis (LCCs), as well as
on a TX Matrix Plus router with 3D SIBs and its connected LCCs.
After you use the request system software in-service-upgrade command, the following
process occurs.
• A solid line indicates the high-speed internal link between a Routing Engine and a
Packet Forwarding Engine.
• A dotted line indicates the messages exchanged between the Packet Forwarding
Engine and the chassis process (chassisd) on the Routing Engine.
• RE0m and RE1b indicate master and backup Routing Engines, respectively.
• The check mark indicates that the device is running the new version of software.
NOTE: Unified ISSU can only upgrade up to three major releases ahead of
the current release on a device. To upgrade to a release more than three
releases ahead of the current release on a device, use the unified ISSU process
to upgrade the device to one or more intermediate releases until the device
is within three major releases of the target release.
1. The master Routing Engine validates the router configuration to ensure that it can be
committed when you use the new software version.
• Disk space is available for the /var file system on both Routing Engines.
These checks are the same as the checks made when you enter the request system
software validate in-service-upgrade command. If there is insufficient disk space
available on either of the Routing Engines, the unified ISSU process fails and returns
an error message. However, unsupported PICs do not prevent a unified ISSU. If there
are unsupported PICs, the system issues a warning to indicate that these PICs will
restart during the upgrade. Similarly, if there is an unsupported protocol configured,
the system issues a warning that packet loss might occur for the unsupported protocol
during the upgrade.
2. After the validation succeeds, the management process installs (copies) the new
software image to the backup Routing Engine.
4. After the backup Routing Engine is rebooted and is running the new software, the
kernel state synchronization process (ksyncd) synchronizes (copies) the configuration
file and the kernel state from the master Routing Engine.
Figure 15: Device Status After the Backup Routing Engine Is Upgraded
5. After the configuration file and the kernel state are synchronized to the backup Routing
Engine, the chassis process (chassisd) on the master Routing Engine prepares other
software processes for the unified ISSU. The chassis process informs the various
software processes (such as rpd, apsd, bfdd, and so on) about the unified ISSU and
waits for responses from them. When all the processes are ready, the chassis process
sends an ISSU_PREPARE message to the FPCs installed in the router. You can display
the unified ISSU process messages by using the show log messages command.
6. The Packet Forwarding Engine on each FPC saves its state and downloads the new
software image from the backup Routing Engine. Next, each Packet Forwarding Engine
sends an ISSU_READY message to the chassis process.
Figure 16: Device Status After One Packet Forwarding Engine Downloads
the New Software
7. After receiving an ISSU_READY message from a Packet Forwarding Engine, the chassis
process sends an ISSU_REBOOT message to the FPC on which the Packet Forwarding
Engine resides. The FPC reboots with the new software image. After the FPC is
rebooted, the Packet Forwarding Engine restores the FPC state, and a high-speed
internal link is established with the backup Routing Engine running the new software.
The chassis process link is also reestablished with the master Routing Engine.
NOTE: The Packet Forwarding Engine reboots that occur during an unified
ISSU are designed to have a very short window of down time.
8. After all Packet Forwarding Engines have sent a READY message using the chassis
process on the master Routing Engine, other software processes are prepared for a
Routing Engine switchover. The system is ready for a switchover at this point.
NOTE: For M120 routers, the FEBs are upgraded at this point. When all
FEBs have been upgraded, the system is ready for a switchover.
9. The Routing Engine switchover occurs, and the Routing Engine (re1) that was the
backup now becomes the master Routing Engine.
10. The new backup Routing Engine is now upgraded to the new software image. (This
step is skipped if you have specified the no-old-master-upgrade option in the request
system software in-service-upgrade command.)
11. When the backup Routing Engine has been successfully upgraded, the unified ISSU
is complete.
This section describes the processes that take place on a TX Matrix router and the routers
acting as connected line-card chassis (LCCs).
After you use the request system software in-service-upgrade command on a TX Matrix
router, the following process occurs:
1. The management process (mgd) on the master Routing Engine of the TX Matrix router
(global master) checks the current configuration.
• Disk space is available for the /var file system on all Routing Engines.
2. After successful validation of the configuration, the management process copies the
new image to the backup Routing Engines on the TX Matrix router and the T640
routers.
4. The global backup Routing Engine is upgraded with the new software. Next the global
backup Routing Engine is rebooted. Then the global backup Routing Engine
synchronizes the configuration and kernel state from the global master Routing Engine.
5. The LCC backup Routing Engines are upgraded and rebooted. Then the LCC backup
Routing Engines connect with the upgraded global backup Routing Engine and
synchronize the configuration and kernel state.
6. The unified ISSU control moves from the management process to the chassis process
(chassisd). The chassis process informs the various software processes (such as rpd,
apsd, bfdd, and so on) about the unified ISSU and waits for responses from them.
7. After receiving messages from the software processes indicating that the processes
are ready for unified ISSU, the chassis process on the global master Routing Engine
sends messages to the chassis process on the routing nodes to start the unified ISSU.
8. The chassis process on the routing nodes sends ISSU_PREPARE messages to the
field-replaceable units (FRUs), such as FPCs and intelligent PICs.
9. After receiving an ISSU_PREPARE message, the Packet Forwarding Engines save the
current state information and download the new software image from the backup
Routing Engines. Next, each Packet Forwarding Engine sends ISSU_READY messages
to the chassis process. You can display the unified ISSU process messages by using
the show log messages command.
10. After receiving an ISSU_READY message from the Packet Forwarding Engines, the
chassis process sends an ISSU_REBOOT message to the FRUs. While the upgrade is
in progress, the FRUs keep sending ISSU_IN_PROGRESS messages to the chassis
process on the routing nodes. The chassis process on each routing node, in turn, sends
an ISSU_IN_PROGRESS message to the chassis process on the global master Routing
Engine.
NOTE: The Packet Forwarding Engine reboots that occur during a unified
ISSU are designed to have a very short window of down time.
11. After the unified ISSU reboot, the Packet Forwarding Engines restore the saved state
information and connect back to the routing nodes. The chassis process on each
routing node sends an ISSU_READY message to the chassis process on the global
master Routing Engine. The CM_MSG_READY message from the chassis process on
the routing nodes indicate that the unified ISSU is complete on the FRUs.
12. The unified ISSU control moves back to the management process on the global master
Routing Engine.
13. The management process initiates Routing Engine switchover on the master Routing
Engines.
14. Routing Engine switchover occurs on the TX Matrix router and the T640 routers.
15. After the switchover, the FRUs connect to the new master Routing Engines. Then the
chassis manager and Packet Forwarding Engine manager on the T640 router FRUs
connect to the new master Routing Engines on the T640 routers.
16. The management process on the global master Routing Engine initiates the upgrade
process on the old master Routing Engines on the T640 routers. (This step is skipped
if you have specified the no-old-master-upgrade option in the request system software
in-service-upgrade command.)
17. After the Routing Engines that were previously the masters on the T640 routers are
upgraded, the management process initiates the upgrade of the Routing Engine that
was previously the global master on the TX Matrix router.
18. After a successful unified ISSU, the TX Matrix router and the T640 routers are rebooted
if you specified the reboot option in the request system software in-service-upgrade
command.
Understanding the Unified ISSU Process on the TX Matrix Plus Router and on the TX Matrix
Plus Router with 3D SIBs
This topic describes the processes that take place on a TX Matrix Plus router and the
routers acting as connected line-card chassis (LCCs) as well as on a TX Matrix Plus router
with 3D SIBs and its connected routers acting as LCCs.
• Unified ISSU Process on the TX Matrix Plus Router and on the TX Matrix Plus Router
with 3D SIBs on page 295
Unified ISSU Process on the TX Matrix Plus Router and on the TX Matrix Plus
Router with 3D SIBs
After you use the request system software in-service-upgrade command, the following
process occurs:
1. The management process (mgd) on the master Routing Engine of the TX Matrix Plus
router (global master) checks the current configuration.
• Disk space is available for the /var file system on both Routing Engines.
2. After successful validation of the configuration, the management process copies the
new image to the backup Routing Engines on the TX Matrix Plus router and the
connected T1600 router LCCs.
4. The global backup Routing Engine is upgraded with the new software. Next the global
backup Routing Engine is rebooted. Then the global backup Routing Engine
synchronizes the configuration and kernel state from the global master Routing Engine.
5. The unified ISSU control moves from the management process to the chassis process
(chassisd). The chassis process informs the various software processes (such as rpd,
apsd, bfdd, and so on) about the unified ISSU and waits for responses from them.
6. After receiving messages from the software processes indicating that the processes
are ready for unified ISSU, the chassis process on the global master Routing Engine
sends messages to the chassis process on the routers to start the unified ISSU.
8. After receiving an ISSU_PREPARE message, the Packet Forwarding Engines save the
current state information and download the new software image from the backup
Routing Engines. Next, each Packet Forwarding Engine sends ISSU_READY messages
to the chassis process. You can display the unified ISSU process messages by using
the show log messages command.
9. After receiving an ISSU_READY message from the Packet Forwarding Engines, the
chassis process sends an ISSU_REBOOT message to the FRUs. While the upgrade is
in progress, the FRUs keep sending ISSU_IN_PROGRESS messages to the chassis
process. The chassis process on each router, in turn, sends an ISSU_IN_PROGRESS
message to the chassis process on the global master Routing Engine.
10. After the unified ISSU reboot, the Packet Forwarding Engines restore the saved state
information and connect back to the router. Then the chassis process on each router
sends an ISSU_READY message to the chassis process on the global master Routing
Engine. The CM_MSG_READY message (this message is sent from the LCC chassisd
to the global master’s chassisd) indicates that the unified ISSU is complete on the
FRUs.
11. The unified ISSU control moves back to the management process on the global master
Routing Engine.
12. The management process initiates a Routing Engine switchover on the master Routing
Engines.
13. Routing Engine switchover occurs on the TX Matrix Plus router and all the connected
LCCs.
14. After the switchover, the FRUs connect to the new master Routing Engines, and the
chassis manager and Packet Forwarding Engine manager on the connected LCC FRUs
connect to the new master Routing Engines on the connected LCCs.
15. The management process on the global master Routing Engine initiates the upgrade
process on the Routing Engines that were previously the masters on the connected
T1600 router LCCs. (This step is skipped if you have specified the
no-old-master-upgrade option in the request system software in-service-upgrade
command.)
16. After the Routing Engines that were previously the masters on the connected T1600
router LCCs are upgraded, the management process initiates the upgrade of the
Routing Engine that was previously the global master on the TX Matrix Plus router
and all its connected LCCs.
17. After a successful unified ISSU, the TX Matrix Plus global Routing Engine (re1) that
was previously the master and is now the backup and the LCC Routing Engines that
were previously the masters and are now the backups are rebooted if you specified
the reboot option in the request system software in-service-upgrade command.
Related • Getting Started with Unified In-Service Software Upgrade on page 285
Documentation
• Best Practices for Performing a Unified ISSU on page 321
The unified in-service software upgrade (ISSU) feature enables you to upgrade your
device between two different Junos OS releases with no disruption on the control plane
and with minimal disruption of traffic. Unified ISSU is supported only on dual Routing
Engine platforms. In addition, the graceful Routing Engine switchover (GRES) and nonstop
active routing (NSR) features must be enabled.
To access an interactive tool for verifying hardware support for unified ISSU, see the
Juniper Networks Feature Explorer ([Link]
• We recommend that you not use unified ISSU to upgrade from an earlier Junos OS
release to Junos OS Release 14.2.R1 or 15.1.R1. ISSU is not supported in Junos OS Release
14.2. For more information about Junos OS Release 14.2 see
[Link]
For more information about Junos OS Release 15.1, see
[Link]
• Using unified ISSU to upgrade from an earlier Junos OS release to Junos OS Release
17.1R1 or later does not work if VPLS dynamic profiles are configured and enhanced
subscriber management is not configured.
• The master Routing Engine and backup Routing Engine must be running the same
software version before you can perform a unified ISSU.
• The unified ISSU process is aborted and a message is displayed if the Junos OS version
specified for installation is a version earlier than the one currently running on the device.
• The unified ISSU process is aborted if the specified upgrade has conflicts with the
current configuration, components supported, and so forth.
• You cannot take PICs offline or bring them online during a unified ISSU.
• Unified ISSU does not support extension application packages developed with the
Junos SDK.
• BGP session uptime and downtime statistics are not synchronized between the master
and backup Routing Engines during a unified ISSU. The backup Routing Engine maintains
its own session uptime based on the time when the backup first becomes aware of
the established sessions. For example, if the backup Routing Engine is rebooted (or if
you run restart routing on the backup Routing Engine), the backup Routing Engine
uptime is a short duration, because the backup has just learned about the established
sessions. If the backup is operating when the BGP sessions first come up on the master,
the uptime on the master and the uptime on the backup are almost the same duration.
After a Routing Engine switchover, the new master continues from the time left on the
backup Routing Engine.
• If proxy ARP is enabled on your device, you must delete the unconditional-src-learn
statement from the [edit interfaces interface-name unit 0 family inet] hierarchy level
before the unified ISSU process begins and include it after the unified ISSU process is
complete. Note that the unconditional-src-learn statement is not included by default.
• On MX Series 3D Universal Edge Routers with MPC3E and MPC4E interfaces, unified
ISSU is supported starting with Junos OS Release 13.3.
• Unified ISSU is not supported with Junos OS Release 16.2 for MX Series routers with
MX-MPC2E-3D-NG, MX-MPC2E-3D-NG-Q, MX-MPC3E-3D-NG, or MX-MPC3E-3D-NG-Q
Flexible Port Concentrators (FPCs). If you perform a unified ISSU on a MX Series router
with these FPCs installed, the FPCs need to be rebooted in order to complete the
unified ISSU process.
• Unified ISSU for MX Series routers does not support the IEEE 802.1ag OAM and IEEE
802.3ah protocols.
• Unified ISSU is not supported when clock synchronization is configured for Synchronous
Ethernet, Precision Time Protocol (PTP), and hybrid mode on the MICs and MPCEs on
MX240, MX480, and MX960 routers. If clock synchronization is configured, the unified
ISSU process aborts.
• On MX Series routers with MPC/MIC interfaces, the policers for transit traffic and
statistics are disabled temporarily during the unified ISSU process.
• On MX Series MPCs, interface-specific and firewall filter statistics are preserved across
a unified ISSU. During the unified ISSU, counter and policer operations are disabled.
• After a unified ISSU operation is completed, an MPC reboot is required for MACsec to
work. If you upgrade a router from an earlier Junos OS release to Release 14.2R2 or
Release 15.1R1 using unified ISSU and MACsec is configured on that router, you must
reboot the MPC for MACsec to function properly.
• When there is a large number of subscribers configured, the Layer 2 scheduler can
become oversubscribed. The unified ISSU process might abort when the system runs
out of schedulers. The system generates log messages with ISSU failures and CRC
errors on the control plane. If you encounter this issue, please contact JTAC for
assistance in eliminating the Layer 2 scheduler oversubscription in your configuration.
• Starting with Junos OS Release 13.2, unified ISSU is supported on the PTX5000 and
PTX 3000 with the FPC-PTX-P1-A FPC. However, you can perform unified ISSU only
from Junos OS Release 13.2 to 13.3 and from Junos OS Release 14.1 to a later release.
You must not perform unified ISSU from Junos OS Release 13.2 or 13.3 to 14.1 and later
releases.
• Link Aggregation Control Protocol (LACP) is not supported during unified ISSU on PTX
Series routers. You must disable the lacp statement at the [edit interfaces interface-name
aggregated-ether-options] hierarchy level before the unified ISSU process begins and
enable it after the unified ISSU process is complete.
• During the unified ISSU process on a routing matrix with TX Matrix Plus routers with
3D SIBs, only 75 percent of the traffic remains uninterrupted.
• The PD-4XGE-XFP PIC goes offline during a unified ISSU if the PIC is installed in a
T-1600-FPC4-ES with part number 710-013037 revision 12 or earlier.
• In the FPCs on T4000 routers, interface-specific and firewall filter statistics are
preserved across a unified ISSU. During the unified ISSU, counter and policer operations
are disabled.
• To preserve statistics across a unified ISSU on T4000 routers with FPC/PIC interfaces,
the router stores the statistics data as binary large objects. The router collects the
statistics before the unified ISSU is initialized, and restores the statistics after the
unified ISSU completes. No statistics are collected during the unified ISSU process.
• To verify that statistics are preserved across the unified ISSU, you can issue CLI
operational commands such as show interfaces statistics after the unified ISSU
completes.
verify that the field-replaceable unit, such as PICs, that are installed also support unified
ISSU.
To access an interactive tool for verifying hardware support for unified ISSU, see the
Juniper Networks Feature Explorer ([Link]
Table 13: Unified ISSU Support for Dual Routing Engine Platforms
Platform Junos OS Release
Unified ISSU Protocol Support for M Series, MX Series, and T Series Routers and EX9200
Switches
To find out which releases support ISSU, please use the ISSU Feature Explorer tool on
the Juniper Networks website. The ISSU Feature Explorer tool contains information about
the Juniper Networks devices that support ISSU, the releases that support ISSU for each
device, and the SKUs that support ISSU for each release.
NOTE: To gain access to the ISSU Feature Explorer tool, you need to log in
with a customer or partner account on the Juniper Networks website. For
more information on setting up a Juniper Networks account, please see the
Juniper Networks Guide to Creating a User Account.
• Link Aggregation Control Protocol (LACP)—Link changes are not processed until after
the unified ISSU is complete.
NOTE: When you configure the unified ISSU feature on the T4000 Core
Router, you can also configure LACP. However, LACP periodic fast mode
is not supported. If you configure LACP periodic transmission, set it to slow
mode at both sides before initiating a unified ISSU. If fast mode is
configured, the configuration can be committed without any commit or
system log error messages, but you might notice that a larger than expected
amount of traffic drops because of the LACP links going down during a
unified ISSU.
NOTE: LACP is not supported on the PTX5000 and PTX 3000 routers
during a unified ISSU.
• Logical systems—On devices that have logical systems configured on them, only the
master logical system supports unified ISSU.
NOTE: For information about ISSU support on individual PICs based on device
and release, use the ISSU Feature Explorer tool.
NOTE: For information about Flexible PIC Concentrator (FPC) types, FPC/PIC
compatibility, and the initial Junos OS release in which a particular PIC is
supported on an FPC, see the PIC guide for your platform.
PIC Considerations
Take the following PIC restrictions into consideration before performing a unified ISSU:
• Unsupported PICs—If a PIC is not supported by unified ISSU, at the beginning of the
upgrade, the software issues a warning that the PIC will be taken offline. After the PIC
is brought offline and the unified ISSU is complete, the PIC is brought back online with
the new firmware.
• PIC combinations—For some PICs, newer Junos OS services can require significant
Internet Processor ASIC memory, and some configuration rules might limit certain
combinations of PICs on particular platforms. With a unified ISSU:
• If a PIC combination is not supported by the software version that the device is being
upgraded from, the validation check displays a message and aborts the upgrade.
• If a PIC combination is not supported by the software version to which the device is
being upgraded, the validation check displays a message and aborts the upgrade,
even if the PIC combination is supported by the software version from which the
device is being upgraded.
• During bootup of the new microkernel on the Packet Forwarding Engine, host-bound
traffic is not handled and might be dropped, causing packet loss.
• During the hardware update of the Packet Forwarding Engine and its interfaces,
traffic is halted and discarded. (The duration of the hardware update depends on
the number and type of interfaces and on the device configuration.)
• And the sum of the CIR exceeds the physical interface's bandwidth, after a unified
ISSU is performed, each logical interface might not be given its original CIR.
• And the sum of the delay buffer rate configured on logical interfaces exceeds the
physical interface's bandwidth, after a unified ISSU is performed, each logical
interface might not receive its original delay-buffer-rate calculation.
SONET/SDH PICs
Table 14 on page 307 lists the SONET/SDH PICs that are supported during a unified ISSU.
PE-4OC3-SON-MM—(EOL) M10i
PE-4OC3-SON-SMIR—(EOL)
2 PE-2OC3-SON-MM—(EOL)
PE-2OC3-SON-SMIR—(EOL)
PE-4OC3-1OC12-SON-SFP M10i
PE-1OC12-SON-MM—(EOL)
PE-1OC12-SON-SMIR—(EOL)
4 PB-4OC12-SON-MM
PB-4OC12-SON-SMIR
PC-1OC192-VSR
Table 15 on page 309 lists the Fast Ethernet and Gigabit Ethernet PICs that are supported
during a unified ISSU.
NOTE: Starting with Junos OS Release 9.2, new Ethernet IQ2 PIC features
might cause the software to reboot the PIC when a unified ISSU is performed.
For information about applicable new Ethernet IQ2 PIC features, refer to the
release notes for the specific Junos OS release.
Table 15: Unified ISSU PIC Support: Fast Ethernet and Gigabit Ethernet
Number
PIC Type of Ports Model Number Device
PE-4FE-TX M10i
PE-8FE-FX M10i
PB-12FE-TX-MDIX
PE-12FE-TX-MDI M10i
PE-12FE-TX-MDIX
PB-48FE-TX-MDIX
4 PB-4GE-SFP
10 PC-10GE-SFP
40 EX9200-40F EX9200
Gigabit Ethernet IQ2, SFP 4 PB-4GE-TYPE1-SFP-IQ2 M120, M320, T320, T640, T1600, T4000,
TX Matrix, TX Matrix Plus, TX Matrix Plus
with 3D SIBs
8 PB-8GE-TYPE2-SFP-IQ2
PC-8GE-TYPE3-SFP-IQ2
Table 15: Unified ISSU PIC Support: Fast Ethernet and Gigabit Ethernet (continued)
Number
PIC Type of Ports Model Number Device
Gigabit Ethernet IQ2, XFP 1 PC-1XGE-TYPE3-XFP-IQ2 M120, M320, T320, T640, T1600, TX
Matrix, TX Matrix Plus, TX Matrix Plus
with 3D SIBs
24 P1-PTX-24-10GE-SFPP PTX5000
EX9200-6QS EX9200
32 EX9200-32XS EX9200
Table 15: Unified ISSU PIC Support: Fast Ethernet and Gigabit Ethernet (continued)
Number
PIC Type of Ports Model Number Device
2 P1-PTX-2-100GE-CFP PTX5000
4 P2-100GE-CFP2 PTX5000
Channelized PICs
Table 16 on page 311 lists the channelized PICs that are supported during a unified ISSU.
PB-10CHE1-RJ48-QPP-N M120
PE-10CHE1-RJ48-QPP M10i
PE-10CHE1-RJ48-QPP-N
PE-10CHT1-RJ48-QPP M10i
PB-1CHOC3-SMIR-QPP
PE-1CHOC12SMIR-QPP M10i
PE-1CHOC3-SMIR-QPP
PE-4CHDS3-QPP M10i
Table 17 on page 312 lists the Tunnel Services PICs that are supported during a unified
ISSU.
ATM PICs
Table 18 on page 312 lists the ATM PICs that are supported during a unified ISSU. The
table includes support on Enhanced III FPCs.
PE-4DS3-ATM2 M10i
2 PE-2E3-ATM2 M10i
PE-2OC3-ATM2-MM M10i
PE-2OC3-ATM2-SMIR
1 PE-1OC12-ATM2-MM M10i
PE-1OC12-ATM2-SMIR
Serial PICs
• PB-2EIA530 on M320 routers with Enhanced III FPCs, and on M120 routers
Unified ISSU supports the following PICs on M120, M320, and T320 routers; T640 and
T1600 routers; and the TX Matrix router:
NOTE: Unified ISSU is also supported on the 4-Port DS3 PIC (PB-4DS3) and
the 4-Port E3 IQ PIC (PB-4E3-QPP) on the TX Matrix Plus router.
Enhanced IQ PICs
Unified ISSU supports the following PICs on M120 router, M320 router, and on T320
routers; T640 routers, T1600 routers, TX Matrix router, and the TX Matrix Plus router:
Unified ISSU supports 1-port Channelized OC48/STM16 Enhanced IQ (IQE) PIC with SFP
(PB-1CHOC48-STM16-IQE-SFP) on MX Series routers.
Unified ISSU supports the enhanced IQ2 ESE PICs listed in Table 19 on page 314.
Table 19: Unified ISSU Support: Enhanced IQ2 Ethernet Services Engine (ESE) PIC
Model Number Number of Ports Platform
PE-4GE-TYPE1-SFP-IQ2E 4 M10i
Table 19: Unified ISSU Support: Enhanced IQ2 Ethernet Services Engine (ESE) PIC (continued)
Model Number Number of Ports Platform
PE-4GE-TYPE1-SFP-IQ2 4 M10i
In the FPCs on T4000 routers, interface-specific and firewall filter statistics are preserved
across a unified ISSU. During the unified ISSU, counter and policer operations are disabled.
To preserve statistics across a unified ISSU on T4000 routers with FPC/PIC interfaces,
the router stores the statistics data as binary large objects. The router collects the
statistics before the unified ISSU is initialized, and restores the statistics after the unified
ISSU completes. No statistics are collected during the unified ISSU process.
To verify that statistics are preserved across the unified ISSU, you can issue CLI operational
commands such as show interfaces statistics after the unified ISSU completes.
NOTE: The aforementioned FPCs are also supported on TX Matrix Plus routers
with 3D SIBs.
The following sections list the Dense Port Concentrators (DPCs), Flexible PIC
Concentrators (FPCs), Modular Port Concentrators (MPCs), and Modular Interface Cards
(MICs) that are supported during a unified ISSU on MX Series routers.
• Unified ISSU DPC and FPC Support on MX Series Routers on page 315
• Unified ISSU MIC and MPC Support on MX Series Routers on page 316
• Unified ISSU Limitations on MX Series Routers on page 318
Unified ISSU supports all DPCs except the Multiservices DPC on MX Series routers. Unified
ISSU also supports Type 2 FPC (MX-FPC2) and Type 3 FPC (MX-FPC3) on MX Series
routers. For more information about DPCs and FPCs on MX Series routers, go to
[Link] en_US/release-independent/junos/
information-products/pathway-pages/mx-series/.
Unified ISSU supports all the Modular Port Concentrators (MPCs) and Modular Interface
Cards (MICs) listed in Table 20 on page 316 and Table 21 on page 317. Unified ISSU is not
supported on MX80 routers.
In the MPCs on MX Series routers, interface-specific and firewall filter statistics are
preserved across a unified ISSU. During the unified ISSU, counter and policer operations
are disabled.
To preserve statistics across a unified ISSU on MX Series routers with MPC/MIC interfaces,
the router stores the statistics data as binary large objects. The router collects the
statistics before the unified ISSU is initialized, and restores the statistics after the unified
ISSU completes. No statistics are collected during the unified ISSU process.
To verify that statistics are preserved across the unified ISSU, you can issue CLI operational
commands such as show interfaces statistics after the unified ISSU completes.
10-Gigabit Ethernet MIC with SFP+ (24 Ports) 24 MIC6-10G MX Series routers
NOTE: Note that unified ISSU is supported only by the MICs listed in
Table 21 on page 317.
Unified ISSU is currently not supported when clock synchronization is configured for
Synchronous Ethernet, Precision Time Protocol (PTP), and hybrid mode on MX80 routers
and on the MICs and MPCEs on MX240, MX480, and MX960 routers.
NOTE: On MX Series routers with MPC/MIC interfaces, the policers for transit
traffic and statistics are disabled temporarily during the unified ISSU process.
16.1r1 Starting with Junos OS Release 16.1R1, while performing a unified ISSU from
a FreeBSD 6.1-based Junos OS to an upgraded FreeBSD 10.x-based Junos OS,
the configuration must be validated on a remote host or on a Routing Engine.
Related • Getting Started with Unified In-Service Software Upgrade on page 285
Documentation
• Best Practices for Performing a Unified ISSU on page 321
When you are planning to perform a unified in-service software upgrade (ISSU), choose
a time when your network is as stable as possible. As with a normal upgrade, Telnet
sessions, SNMP, and CLI access are briefly interrupted. In addition, the following
restrictions apply:
• The master Routing Engine and backup Routing Engine must be running the same
software version before you can perform a unified ISSU.
• Read the “Unified ISSU Considerations” topic in the chapter “Unified ISSU System
Requirements” on page 299 to anticipate any special circumstances that might affect
your upgrade.
This example shows how to perform a unified in-service software upgrade (ISSU).
Requirements
This example uses the following hardware and software components:
• Perform a compatibility check to ensure that the software and hardware components
and the configuration on the device support unified ISSU by using the request system
software validate in-service-upgrade command
• Read the chapter “Unified ISSU System Requirements” on page 299 to anticipate any
special circumstances that might affect your upgrade.
• Verify that the field-replaceable units (FRUs) installed in your platform support the
unified ISSU feature or that you can accept the results of performing the upgrade
with some FRUs that do not support unified ISSU.
• Verify that the protocols and features configured on your platform support the unified
ISSU feature or that you can accept the results of performing the upgrade with some
protocols and features that do not support unified ISSU.
• Download the software package from the Juniper Networks Support website at
[Link] and place the package on your local server.
BEST PRACTICE: When you access the Download Software web page for
your device, record the md5 checksum. After downloading the software
package to your device, confirm that it is not modified in any way by using
the file checksum md5 command. For more information about verifying the
md5 checksum, see
[Link] .
Overview
This procedure can be used to upgrade M Series, T Series, MX Series, EX Series, and PTX
Series devices that have dual Routing Engines installed and support unified ISSU.
In the example, the hostnames, filenames, and FRUs are representational. When you
perform the procedure on your device, the hostnames, filenames, and FRUs are different.
The command output is truncated to only show the text of interest in this procedure.
Topology
Configuration
There are variations of the procedure depending on if you want to install the new software
on one or both Routing Engines and if you want to automatically reboot both Routing
Engines or manually reboot one of the Routing Engines.
In all cases, you must verify that dual Routing Engines are installed and that graceful
Routing Engine switchover (GRES) and nonstop active routing (NSR) are enabled. We
recommend that you back up the device software before the upgrade.
To perform a unified ISSU, select the appropriate tasks from the following list:
• Verifying Dual Routing Engines and Enabling GRES and NSR on page 324
• Verifying the Software Versions and Backing Up the Device Software on page 325
• Adjusting Timers and Changing Feature-Specific Configuration on page 326
• Upgrading and Rebooting Both Routing Engines Automatically on page 328
• Restoring Feature-Specific Configuration on page 333
• Upgrading Both Routing Engines and Rebooting the New Backup Routing Engine
Manually on page 335
• Upgrading and Rebooting Only One Routing Engine on page 342
Step-by-Step Enabling GRES and NSR is required regardless of which variation of the unified ISSU
Procedure procedure you use.
To verify that your device has dual Routing Engines and to enable GRES and NSR:
2. Verify that dual Routing Engines are installed in your device by using the show chassis
hardware command.
The command output contains lines listing Routing Engine 0 and Routing Engine 1.
3. By default, GRES is disabled; if you have not already done so, enable GRES by
including the graceful-switchover statement at the [edit chassis redundancy]
hierarchy level on the master Routing Engine.
[edit ]
user@host# set chassis redundancy graceful-switchover
4. By default, NSR is disabled; if you have not already done so, enable NSR by including
the nonstop-routing statement at the [edit routing-options] hierarchy level.
[edit]
user@host# set routing-options nonstop-routing
5. When you configure NSR, you must also include the commit synchronize statement
at the [edit system] hierarchy level so that configuration changes are synchronized
on both Routing Engines.
[edit]
user@host# set system commit synchronize
6. After you have verified your configuration and are satisfied with it, commit the
changes by using the commit command.
[edit]
user@host# commit
commit complete
When you enable GRES and commit the configuration, the CLI prompt changes to
indicate which Routing Engine you are using. For example:
{master} [edit]
user@host#
{master} [edit]
user@host# exit
Exiting configuration mode
8. Verify that NSR is configured on the master Routing Engine (re0) by using the show
task replication command.
{master}
user@host> show task replication
Stateful Replication: Enabled
RE mode: Master
In the output, verify that the Synchronization Status field displays Complete.
9. Verify that GRES is enabled on the backup Routing Engine (re1) by using the show
system switchover command.
In the output, verify that the Graceful switchover field state displays On. For more
information about the show system switchover command, see show system
switchover.
Step-by-Step Unified ISSU requires that both Routing Engines are running the same version of Junos
Procedure OS before the upgrade. As a preventive measure in case any problems occur during an
upgrade, it is a best practice to back up the system software to the device hard disk.
1. Verify that the same version of Junos OS is installed and running on both Routing
Engines by using the show version command.
{backup}
user@host> show version invoke-on all-routing-engines
re0:
--------------------------------------------------------------------------
Hostname: host
Model: mx480
Junos: 13.3R6.5
JUNOS Base OS boot [13.3R6.5]
JUNOS Base OS Software Suite [13.3R6.5]
re1:
--------------------------------------------------------------------------
Hostname: host
Model: mx480
Junos: 13.3R6.5
JUNOS Base OS boot [13.3R6.5]
JUNOS Base OS Software Suite [13.3R6.5]
JUNOS 64-bit Kernel Software Suite [13.3R6.5]
JUNOS Crypto Software Suite [13.3R6.5]
JUNOS Packet Forwarding Engine Support (M/T/EX Common) [13.3R6.5]
JUNOS Packet Forwarding Engine Support (MX Common) [13.3R6.5]
JUNOS Online Documentation [13.3R6.5]
2. Back up the system software to the device hard disk by using the request system
snapshot command on each Routing Engine.
NOTE: The root file system is backed up to /altroot, and /config is backed
up to /altconfig. After you issue the request system snapshot command,
the device flash and hard disks are identical. You can return to the
previous version of the software only by booting the device from
removable media.
{backup}
user@host> request system snapshot
user@host> request routing-engine login re0
{master}
user@host> request system snapshot
Step-by-Step If you have any of the following feature-specific configuration on your device, perform
Procedure the appropriate steps.
If BFD is enabled on your device and you want to disable the BFD timer negotiation
during the unified ISSU, include the no-issu-timer-negotiation statement at the [edit
protocols bfd] hierarchy level.
{master} [edit]
user@host# set protocols bfd no-issu-timer-negotiation
NOTE: If you include this statement, the BFD timers maintain their
original values during the unified ISSU, and the BFD sessions might flap
during the unified ISSU or Routing Engine switchover, depending on the
detection intervals.
2. If proxy ARP is enabled on your M Series, MX Series, or EX 9200 Series device, remove
the unconditional-src-learn statement from the [edit interfaces interface-name unit
0 family inet] hierarchy level.
By default the statement is not included. This example shows the ge-0/0/1 interface
only.
{master} [edit]
user@host# delete interfaces ge-0/0/1 unit 0 family inet unconditional-src-learn
3. If LACP is enabled on your PTX Series device, remove the lacp statement from the
[edit interfaces interface-name aggregated-ether-options] hierarchy level.
{master} [edit]
user@host# delete interfaces aex aggregated-ether-options lacp
PPP requires three keepalives to fail before it brings down the session. Thirty seconds
(10 seconds x three) provides a safe margin to maintain PPP sessions in case of
any traffic loss during the unified ISSU operation.
{master} [edit]
user@host# set interfaces at-0/0/1 unit 0 keepalives interval 10
5. If ATM OAM is enabled on your M Series or T Series device, set the OAM F5 loopback
cell period to 20 seconds or greater to maintain ATM connectivity across the unified
ISSU.
{master} [edit]
user@host# set interfaces at-0/0/1 unit 0 oam-period 20
6. After you have verified your configuration and are satisfied with it, commit the
changes by using the commit command.
{master} [edit]
user@host# commit
commit complete
{master} [edit]
user@host# exit
{master}
user@host>
Step-by-Step In this procedure, both Routing Engines automatically reboot. Rebooting both Routing
Procedure Engines automatically is the most common scenario. Variations to this procedure are
described in other sections.
Table 22 on page 328 shows the Routing Engine status prior to starting the unified ISSU.
Master Backup
1. Copy the Junos OS software package to the device by using the file copy
[Link] /var/tmp/filename command.
We recommend that you copy the package to the /var/tmp directory, which is a
large file system on the hard disk.
{master}
user@host> file copy
[Link]
/var/tmp/[Link]
BEST PRACTICE: When you access the Download Software web page
for your device, record the md5 checksum. After downloading the
software package to your device, confirm that it is not modified in any
way by using the file checksum md5 command. For more information
about verifying the md5 checksum, see
[Link] .
2. On the master Routing Engine, start the upgrade by using the request system software
in-service-upgrade package-name reboot command.
NOTE: Do not try running any additional commands until after the
Connection closed message is displayed and your session is disconnected.
{master}
user@host> request system software in-service-upgrade
/var/tmp/[Link] reboot
Chassis ISSU Check Done
ISSU: Validating Image
FPC 0 will be offlined (In-Service-Upgrade not supported)
PIC 0/0 will be offlined (In-Service-Upgrade not supported)
PIC 0/1 will be offlined (In-Service-Upgrade not supported)
Do you want to continue with these actions being taken ? [yes,no] (no) yes
Using [Link]
Hardware Database regeneration succeeded
Validating against /config/[Link]
mgd: commit complete
Validation succeeded
ISSU: Preparing Backup RE
Pushing /var/tmp/[Link] to
re1:/var/tmp/[Link]
Installing package '/var/tmp/[Link]' ...
Verified [Link] signed by PackageProductionEc_2015
Verified [Link] signed by PackageProductionRSA_2015
Adding jinstall64...
Verified manifest signed by PackageProductionEc_2015
Rebooting re1
ISSU: Backup RE Prepare Done
Waiting for Backup RE reboot
GRES operational
Initiating Chassis In-Service-Upgrade
Chassis ISSU Started
ISSU: Preparing Daemons
ISSU: Daemons Ready for ISSU
ISSU: Starting Upgrade for FRUs
ISSU: Preparing for Switchover
ISSU: Ready for Switchover
Checking In-Service-Upgrade status
Item Status Reason
FPC 0 Offline Offlined by cli command
Resolving mastership...
Complete. The other routing engine becomes the master.
ISSU: RE switchover Done
ISSU: Upgrading Old Master RE
Installing package '/var/tmp/[Link]' ...
Verified [Link] signed by PackageProductionEc_2015
Verified [Link] signed by PackageProductionRSA_2015
Adding jinstall64...
Verified manifest signed by PackageProductionEc_2015
{backup}
user@host>
{backup}
user@host>
*** FINAL System shutdown message from user@host ***
When the Routing Engine that was previously the master is rebooted, you are logged
out of the device.
Table 23 on page 331 shows the Routing Engine status after the unified ISSU.
Table 23: Routing Engine Status After Upgrading and Rebooting Both
Routing Engines
RE0 RE1
Backup Master
4. Verify that both Routing Engines have been upgraded by using the show version
command.
{backup}
user@host> show version invoke-on all-routing-engines
re0:
--------------------------------------------------------------------------
Hostname: host
Model: mx480
Junos: 14.1R4.10
JUNOS Base OS boot [14.1R4.10]
JUNOS Base OS Software Suite [14.1R4.10]
JUNOS Packet Forwarding Engine Support (M/T/EX Common) [14.1R4.10]
JUNOS Packet Forwarding Engine Support (MX Common) [14.1R4.10]
JUNOS platform Software Suite [14.1R4.10]
JUNOS Runtime Software Suite [14.1R4.10]
JUNOS Online Documentation [14.1R4.10]
re1:
--------------------------------------------------------------------------
Hostname: host
Model: mx480
Junos: 14.1R4.10
JUNOS Base OS boot [14.1R4.10]
JUNOS Base OS Software Suite [14.1R4.10]
JUNOS Packet Forwarding Engine Support (M/T/EX Common) [14.1R4.10]
JUNOS Packet Forwarding Engine Support (MX Common) [14.1R4.10]
JUNOS platform Software Suite [14.1R4.10]
JUNOS Runtime Software Suite [14.1R4.10]
JUNOS Online Documentation [14.1R4.10]
5. If you want to, you can optionally display the unified ISSU log messages by using
the show log messages command.
6. If you want to, you can optionally make re0 the master Routing Engine by using the
request chassis routing-engine master acquire command.
{backup}
user@host> request chassis routing-engine master acquire
Attempt to become the master routing engine ? [yes,no] (no) yes
Resolving mastership...
Complete. The local routing engine becomes the master.
{master}
user@host>
Table 24 on page 332 shows the Routing Engine status after Step 5 is completed.
Master Backup
8. If you are satisfied with the results of your testing, you can optionally back up the
system software to the device’s hard disk by using the request system snapshot
command on each Routing Engine.
NOTE: The root file system is backed up to /altroot, and /config is backed
up to /altconfig. After you issue the request system snapshot command,
you cannot easily return to the previous version of the software, because
the device flash and hard disks are identical. To return to the previous
version of the software, you must boot the device from removable media.
{master}
user@host> request system snapshot
user@host> request routing-engine login re1
{backup}
user@host> request system snapshot
Step-by-Step If you have any of the following feature-specific configuration on your device, perform
Procedure the appropriate steps.
1. If BFD is enabled on your device and you previously disabled the BFD timer
negotiation, delete the no-issu-timer-negotiation statement at the [edit protocols
bfd] hierarchy level.
{master} [edit]
user@host# delete protocols bfd no-issu-timer-negotiation
2. If proxy ARP is enabled on your M Series, MX Series, or EX9200 device and you
previously removed the unconditional-src-learn statement, include the statement
again.
{master} [edit]
user@host# set interfaces ge-0/0/1 unit 0 family inet unconditional-src-learn
3. If LACP is enabled on your PTX Series device and you previously removed the lacp
statement, include the statement again.
{master} [edit]
user@host# set interfaces aex aggregated-ether-options lacp
4. If ATM PPP is enabled on your M Series or T Series device and you previously set
the keepalive interval to 10 seconds or greater, restore the original value.
This example shows the at-0/0/1 interface only and shows the interval being set
to the default 3 seconds.
{master} [edit]
user@host# set interfaces at-0/0/1 unit 0 keepalives interval 3
5. If ATM OAM is enabled on your M Series or T Series device and you previously set
the OAM F5 loopback cell period to 20 seconds or greater, change the configuration
back to the original value.
This example shows the at-0/0/1 interface only and shows the period being set to
10 seconds.
{master} [edit]
user@host# set interfaces at-0/0/1 unit 0 oam-period 10
6. After you have verified your configuration and are satisfied with it, commit the
changes by using the commit command.
{master} [edit]
user@host# commit
commit complete
{master} [edit]
user@host# exit
{master}
user@host>
Upgrading Both Routing Engines and Rebooting the New Backup Routing Engine
Manually
Step-by-Step In certain circumstances, you might want to install the new software on only one Routing
Procedure Engine and reboot only the master until after you can test the new software. A Routing
Engine does not start running the new software until after it is rebooted.
The advantage is if the results of your testing requires you to downgrade the software,
you can switch Routing Engines to run the old software on one Routing Engine and then
install the old software on the other Routing Engine. This is not the typical scenario.
To upgrade both Routing Engines and to reboot the new backup Routing Engine manually:
1. Perform the steps in “Verifying Dual Routing Engines and Enabling GRES and NSR”
on page 324.
2. Perform the steps in “Verifying the Software Versions and Backing Up the Device
Software” on page 325.
4. Copy the Junos OS software package to the device using the file copy
[Link] /var/tmp/filename command.
We recommend that you copy the package to the /var/tmp directory, which is a
large file system on the hard disk.
{master}
user@host> file copy
[Link]
/var/tmp/[Link]
BEST PRACTICE: When you access the Download Software web page
for your device, record the md5 checksum. After downloading the
software package to your device, confirm that it is not modified in any
way by using the file checksum md5 command. For more information
about verifying the md5 checksum, see
[Link] .
Table 25 on page 336 shows the Routing Engine status prior to starting the unified
ISSU.
Master Backup
5. On the master Routing Engine, start the upgrade by using the request system software
in-service-upgrade package-name command without the reboot option.
{master}
user@host> request system software in-service-upgrade
/var/tmp/[Link]
Chassis ISSU Check Done
ISSU: Validating Image
FPC 0 will be offlined (In-Service-Upgrade not supported)
PIC 0/0 will be offlined (In-Service-Upgrade not supported)
PIC 0/1 will be offlined (In-Service-Upgrade not supported)
Do you want to continue with these actions being taken ? [yes,no] (no) yes
Rebooting re1
ISSU: Backup RE Prepare Done
Waiting for Backup RE reboot
GRES operational
Initiating Chassis In-Service-Upgrade
Chassis ISSU Started
ISSU: Preparing Daemons
ISSU: Daemons Ready for ISSU
ISSU: Starting Upgrade for FRUs
ISSU: Preparing for Switchover
ISSU: Ready for Switchover
Checking In-Service-Upgrade status
Table 26 on page 338 shows the Routing Engine status after the unified ISSU and
before manually rebooting the backup Routing Engine.
Table 26: Routing Engine Status After Upgrading and Before Manually
Rebooting the Backup Routing Engine
RE0 RE1
Backup Master
6. Verify that the new backup, (old master) Routing Engine (re0), is still running the
previous software image and that the new master Routing Engine (re1) is running
the new software image, by using the show version command.
{backup}
re1:
--------------------------------------------------------------------------
Hostname: host
Model: mx480
Junos: 14.1R4.10
JUNOS Base OS boot [14.1R4.10]
JUNOS Base OS Software Suite [14.1R4.10]
JUNOS Packet Forwarding Engine Support (M/T/EX Common) [14.1R4.10]
JUNOS Packet Forwarding Engine Support (MX Common) [14.1R4.10]
JUNOS platform Software Suite [14.1R4.10]
JUNOS Runtime Software Suite [14.1R4.10]
JUNOS Online Documentation [14.1R4.10]
7. At this point, if you do not want to install the newer software version on the new
backup Routing Engine (re0), issue the request system software delete package-name
command on it.
8. Reboot the new backup Routing Engine (re0) by issuing the request system reboot
command.
{backup}
user@host> request system reboot
Reboot the system ? [yes,no] (no) yes
Shutdown NOW!
[pid 38432]
{backup}
user@home> Connection closed by foreign host.
If you are not on the console port, you are disconnected from the device session.
Table 27 on page 340 shows the Routing Engine status after the unified ISSU, after
rebooting the backup Routing Engine, but before switching mastership.
Backup Master
10. Verify that both Routing Engines have been upgraded by using the show version
command.
{backup}
user@host> show version invoke-on all-routing-engines
re0:
--------------------------------------------------------------------------
Hostname: host
Model: mx480
Junos: 14.1R4.10
JUNOS Base OS boot [14.1R4.10]
JUNOS Base OS Software Suite [14.1R4.10]
JUNOS Packet Forwarding Engine Support (M/T/EX Common) [14.1R4.10]
JUNOS Packet Forwarding Engine Support (MX Common) [14.1R4.10]
JUNOS platform Software Suite [14.1R4.10]
JUNOS Runtime Software Suite [14.1R4.10]
JUNOS Online Documentation [14.1R4.10]
re1:
--------------------------------------------------------------------------
Hostname: host
Model: mx480
Junos: 14.1R4.10
JUNOS Base OS boot [14.1R4.10]
JUNOS Base OS Software Suite [14.1R4.10]
JUNOS Packet Forwarding Engine Support (M/T/EX Common) [14.1R4.10]
JUNOS Packet Forwarding Engine Support (MX Common) [14.1R4.10]
JUNOS platform Software Suite [14.1R4.10]
JUNOS Runtime Software Suite [14.1R4.10]
JUNOS Online Documentation [14.1R4.10]
11. If you want to, you can optionally display the unified ISSU log messages by using
the show log messages command.
12. If you want to, you can optionally make re0 the master Routing Engine by using the
request chassis routing-engine master acquire command:
{backup}
user@host> request chassis routing-engine master acquire
Resolving mastership...
Complete. The local routing engine becomes the master.
{master}
user@host>
Table 28 on page 341 shows the Routing Engine status after the unified ISSU, after
rebooting the backup Routing Engine, and after switching mastership.
Master Backup
14. If you are satisfied with the results of your testing, you can optionally back up the
system software to the device’s hard disk by using the request system snapshot
command on each Routing Engine.
NOTE: The root file system is backed up to /altroot, and /config is backed
up to /altconfig. After you issue the request system snapshot command,
you cannot easily return to the previous version of the software, because
the device flash and hard disks are identical. To return to the previous
version of the software, you must boot the device from removable media.
{master}
user@host> request system snapshot
user@host> request routing-engine login re1
{backup}
user@host> request system snapshot
Step-by-Step In certain circumstances you might want to install the new software on only one Routing
Procedure Engine.
The advantage is if the results of your testing requires you to downgrade the software,
you can switch Routing Engines to run the old software on one Routing Engine and then
install the old software on the other Routing Engine. This is not the typical scenario.
Table 29 on page 342 shows the Routing Engine status prior to starting the unified ISSU.
Table 29: Routing Engine Status Before Upgrading and Rebooting One
Routing Engine
RE0 RE1
Master Backup
1. Perform the steps in “Verifying Dual Routing Engines and Enabling GRES and NSR”
on page 324.
2. Perform the steps in “Verifying the Software Versions and Backing Up the Device
Software” on page 325.
4. Copy the Junos OS software package to the device by using the file copy
[Link] /var/tmp/filename command.
We recommend that you copy the package to the /var/tmp directory, which is a
large file system on the hard disk.
{master}
user@host> file copy
[Link]
/var/tmp/[Link]
BEST PRACTICE: When you access the Download Software web page
for your device, record the md5 checksum. After downloading the
software package to your device, confirm that it is not modified in any
way by using the file checksum md5 command. For more information
5. On the master Routing Engine, start the upgrade by using the request system software
in-service-upgrade package-name no-old-master-upgrade command.
{master}
user@host> request system software in-service-upgrade
/var/tmp/[Link] no-old-master-upgrade
Chassis ISSU Check Done
ISSU: Validating Image
FPC 0 will be offlined (In-Service-Upgrade not supported)
PIC 0/0 will be offlined (In-Service-Upgrade not supported)
PIC 0/1 will be offlined (In-Service-Upgrade not supported)
Do you want to continue with these actions being taken ? [yes,no] (no) yes
Rebooting re1
ISSU: Backup RE Prepare Done
Waiting for Backup RE reboot
GRES operational
Initiating Chassis In-Service-Upgrade
Chassis ISSU Started
ISSU: Preparing Daemons
ISSU: Daemons Ready for ISSU
ISSU: Starting Upgrade for FRUs
ISSU: Preparing for Switchover
ISSU: Ready for Switchover
Checking In-Service-Upgrade status
Item Status Reason
FPC 0 Offline Offlined by cli command
Resolving mastership...
Complete. The other routing engine becomes the master.
ISSU: RE switchover Done
Skipping Old Master Upgrade
ISSU: IDLE
Table 30 on page 345 shows the Routing Engine status after the unified ISSU upgrades
the master Routing Engine but before the backup Routing Engine is upgraded.
Table 30: Routing Engine Status After Upgrading One Routing Engine
and Before Upgrading the Other Routing Engine
RE0 RE1
Backup Master
6. Verify that the new backup, (old master) Routing Engine (re0), is still running the
previous software image and that the new master Routing Engine (re1) is running
the new software image, by using the show version command.
{backup}
user@host> show version invoke-on all-routing-engines
re0:
--------------------------------------------------------------------------
Hostname: host
Model: mx480
Junos: 13.3R6.5
JUNOS Base OS boot [13.3R6.5]
JUNOS Base OS Software Suite [13.3R6.5]
JUNOS 64-bit Kernel Software Suite [13.3R6.5]
JUNOS Crypto Software Suite [13.3R6.5]
JUNOS Packet Forwarding Engine Support (M/T/EX Common) [13.3R6.5]
JUNOS Packet Forwarding Engine Support (MX Common) [13.3R6.5]
JUNOS Online Documentation [13.3R6.5]
re1:
--------------------------------------------------------------------------
Hostname: host
Model: mx480
Junos: 14.1R4.10
JUNOS Base OS boot [14.1R4.10]
JUNOS Base OS Software Suite [14.1R4.10]
JUNOS Packet Forwarding Engine Support (M/T/EX Common) [14.1R4.10]
JUNOS Packet Forwarding Engine Support (MX Common) [14.1R4.10]
JUNOS platform Software Suite [14.1R4.10]
JUNOS Runtime Software Suite [14.1R4.10]
JUNOS Online Documentation [14.1R4.10]
7. If your testing is complete and you want to install the new software on the backup
Routing Engine, you must first disable GRES and NSR on both Routing Engines and
commit the configuration.
{backup} [edit ]
user@host# delete chassis redundancy graceful-switchover
user@host# delete routing-options nonstop-routing
user@host# commit
warning: Graceful-switchover is enabled, commit on backup is not recommended
Continue commit on backup RE? [yes,no] (no) yes
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
[edit ]
user@host#
8. Install the new software on the backup Routing Engine (re0) by using the request
system software add /var/tmp/[Link] command.
Shutdown NOW!
[pid 22857]
If you are not on the console port, you are disconnected from the router session.
11. Verify that both Routing Engines are running the new software image by using the
show version command.
{backup}
user@host> show version invoke-on all-routing-engines
Hostname: host
Model: mx480
Junos: 14.1R4.10
JUNOS Base OS boot [14.1R4.10]
JUNOS Base OS Software Suite [14.1R4.10]
JUNOS Packet Forwarding Engine Support (M/T/EX Common) [14.1R4.10]
JUNOS Packet Forwarding Engine Support (MX Common) [14.1R4.10]
JUNOS platform Software Suite [14.1R4.10]
JUNOS Runtime Software Suite [14.1R4.10]
JUNOS Online Documentation [14.1R4.10]
re1:
--------------------------------------------------------------------------
Hostname: host
Model: mx480
Junos: 14.1R4.10
JUNOS Base OS boot [14.1R4.10]
JUNOS Base OS Software Suite [14.1R4.10]
JUNOS Packet Forwarding Engine Support (M/T/EX Common) [14.1R4.10]
JUNOS Packet Forwarding Engine Support (MX Common) [14.1R4.10]
JUNOS platform Software Suite [14.1R4.10]
JUNOS Runtime Software Suite [14.1R4.10]
JUNOS Online Documentation [14.1R4.10]
12. If you want to, you can optionally display the unified ISSU log messages by using
the show log messages command.
13. If you want to, make re0 the master Routing Engine by using the request chassis
routing-engine master acquire command.
{backup}
user@host> request chassis routing-engine master acquire
Attempt to become the master routing engine ? [yes,no] (no) yes
Resolving mastership...
Complete. The local routing engine becomes the master.
user@host>
Table 31 on page 348 shows the Routing Engine status after the unified ISSU, after
rebooting the backup Routing Engine, and after switching mastership.
Master Backup
14. Enable GRES and NSR again by performing the steps in “Verifying Dual Routing
Engines and Enabling GRES and NSR” on page 324.
16. If you are satisfied with the results of your testing, you can optionally back up the
system software to the device’s hard disk by using the request system snapshot
command on each Routing Engine.
NOTE: The root file system is backed up to /altroot, and /config is backed
up to /altconfig. After you issue the request system snapshot command,
you cannot easily return to the previous version of the software, because
the device flash and hard disks are identical. To return to the previous
version of the software, you must boot the device from removable media.
{master}
user@host> request system snapshot
user@host> request routing-engine login re1
{backup}
user@host> request system snapshot
Related • Getting Started with Unified In-Service Software Upgrade on page 285
Documentation
• Understanding the Unified ISSU Process on page 286
• Managing and Tracing BFD Sessions During Unified ISSU Procedures on page 351
Purpose Verify the status of FPCs and their corresponding PICs after the most recent unified ISSU.
Action Issue the show chassis in-service-upgrade command on the master Routing Engine.
Display the unified ISSU process messages by using the show log messages command.
• Managing and Tracing BFD Sessions During Unified ISSU Procedures on page 351
1. Open a new session on the master Routing Engine and issue the request system
software abort in-service-upgrade command.
2. Check the existing router session to verify that the upgrade has been aborted.
See request system software abort in-service-upgrade (ICU) for more information.
• Managing and Tracing BFD Sessions During Unified ISSU Procedures on page 351
No additional configuration is necessary to enable unified ISSU for BFD. However, you
can disable the BFD timer negotiation during the unified ISSU by including the
no-issu-timer-negotiation statement at the [edit protocols bfd] hierarchy level.
If you include this statement, the BFD timers maintain their original values during unified
ISSU.
CAUTION: The BFD sessions might flap during unified ISSU or Routing Engine
switchover, depending on the detection intervals.
For more information about BFD, see the Junos OS Routing Protocols Library.
To configure unified ISSU trace options for BFD sessions, include the issu statement at
the [edit protocols bfd traceoptions flag] hierarchy level.
[edit protocols]
bfd {
traceoptions {
flag issu;
}
}
Related • Getting Started with Unified In-Service Software Upgrade on page 285
Documentation
• Understanding the Unified ISSU Process on page 286
dedicated-ukern-cpu (BFD)
Syntax dedicated-ukern-cpu;
Description Enable the dedicated Bidirectional Forwarding Detection (BFD) protocol. One dedicated
CPU core is allocated for the flowd ukernel thread to handle the dedicated BFD. This
ensures that the BFD packet processing does not compete with the Routing Engine
daemons.
realtime-ukern-thread (BFD)
Syntax realtime-ukern-thread;
Description Enable the real-time Bidirectional Forwarding Detection (BFD) protocol. After real-time
BFD is enabled, the priority of the flowd ukernel thread is changed to the highest level
and, therefore, the flowd ukernel thread gets more CPU cycles for processing the BFD
packets.
authentication (LAG)
Syntax authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
Description Configure the authentication criteria of the BFD session for aggregated Ethernet interfaces.
• keyed-md5
• keyed-sha-1
• meticulous-keyed-md5
• meticulous-keyed-sha-1
• simple-password
key-chain key-chain-name—Specify the name that is associated with the security key
for the BFD session. The name you specify must match one of the keychains
configured in the authentication-key-chains key-chain statement at the [edit security]
hierarchy level.
bfd-liveness-detection (LAG)
Syntax bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
holddown-interval milliseconds;
local-address bfd-local-address;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
neighbor bfd-neighbor-address;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (1 | automatic);
}
Description Configure Bidirectional Forwarding Detection (BFD) timers and authentication for
aggregated Ethernet interfaces.
minimum-interval milliseconds— Specify a minimum time interval after which the local
routing device transmits a BFD packet and then expects to receive a reply from the
BFD neighbor. Optionally, instead of using this statement, you can configure the
minimum transmit and receive intervals separately using the transmit-interval
minimum-interval statement.
Range: 1 through 255,000
multiplier number— Specify the number of BFD packets that were not received by the
BFD neighbor before the originating interface is declared down.
Range: 1 through 255
no-adaptation— Disable the BFD adaptation. Include this statement if you do not want
the BFD sessions to adapt to changing network conditions. We recommend that you
do not disable BFD adaptation unless it is preferable not to have BFD adaptation
enabled in your network.
version— Configure the BFD version to detect (BFD version 1) or autodetect (the BFD
version).
Default: automatic
detection-time (LAG)
Syntax detection-time {
threshold milliseconds;
}
Options threshold milliseconds— Specify the maximum time interval for detecting a BFD neighbor.
If the transmit interval is greater than this value, the device triggers a trap.
Syntax traceoptions {
file name <size size> <files number> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
Description Define tracing operations that track unified in-service software upgrade (ISSU)
functionality in the router.
To specify more than one tracing operation, include multiple flag statements.
Default If you do not include this statement, no global tracing operations are performed.
Options disable—(Optional) Disable the tracing operation. You can use this option to disable a
single operation when you have defined a broad group of tracing operations, such
as all.
file name—Name of the file to receive the output of the tracing operation. Enclose the
name within quotation marks. All files are placed in the directory /var/log. We
recommend that you place global routing protocol tracing output in the file
routing-log.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. Then the oldest trace file
is overwritten.
Range: 2 through 1000 files
Default: 2 files
If you specify a maximum number of files, you also must specify a maximum file size with
the size option.
• all—Trace everything.
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB),
or gigabytes (GB). When a trace file named trace-file reaches this size, it is renamed
trace-file.0. When the trace-file again reaches its maximum size, trace-file.0 is renamed
trace-file.1 and trace-file is renamed trace-file.0. This renaming scheme continues
until the maximum number of trace files is reached. Then the oldest trace file is
overwritten.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your system
Default: 128 KB
If you specify a maximum file size, you also must specify a maximum number of trace
files with the files option.
Required Privilege routing and trace—To view this statement in the configuration.
Level routing-control and trace-control—To add this statement to the configuration.
Related • Managing and Tracing BFD Sessions During Unified ISSU Procedures on page 351
Documentation
transmit-interval (LAG)
Syntax transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
Description Configure the minimum interval and the threshold for transmission of BFD packets for
aggregated Ethernet interfaces.
Options minimum-interval milliseconds— Specify the minimum time interval between two
transmissions of packets.
Range: 1 through 255,000
graceful-switchover
Syntax graceful-switchover;
Description For routing platforms with two Routing Engines, configure a master Routing Engine to
switch over gracefully to a backup Routing Engine without interruption to packet
forwarding.
disable
Syntax disable;
Hierarchy Level [edit logical-systems logical-system-name protocols (bgp | isis | ldp | ospf | ospf3 | pim | rip
| ripng | rsvp) graceful-restart],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
(bgp | ldp | ospf | ospf3 | pim) graceful-restart],
[edit protocols (bgp | esis | isis | ospf | ospf3 | ldp | pim | rip | ripng | rsvp) graceful-restart],
[edit protocols bgp group group-name graceful-restart],
[edit protocols bgp group group-name neighbor ip-address graceful-restart],
[edit routing-instances routing-instance-name protocols (bgp | ldp | ospf | ospf3 | pim)
graceful-restart],
[edit routing-instances routing-instance-name routing-options graceful-restart],
[edit routing-options graceful-restart]
Syntax graceful-restart {
disable;
helper-disable;
maximum-helper-recovery-time seconds;
maximum-helper-restart-time seconds;
notify-duration seconds;
recovery-time seconds;
restart-duration seconds;
stale-routes-time seconds;
}
Description You configure the graceful restart routing option globally to enable the feature, but not
to enable graceful restart for all routing protocols in a routing instance. Because all routing
protocols are not usually run on every routing instance, you must also configure graceful
restart for individual routing protocols running on a routing instance, including the main
routing instance. You can, optionally, modify the global settings at the individual protocol
level.
NOTE:
• For VPNs, the graceful-restart statement allows a router whose VPN control
plane is undergoing a restart to continue to forward traffic while recovering
its state from neighboring routers.
• For BGP, if you configure graceful restart after a BGP session has been
established, the BGP session restarts and the peers negotiate graceful
restart capabilities.
Options The remaining statements are explained separately. See CLI Explorer.
Syntax graceful-restart {
disable;
restart-duration seconds;
}
Description Establish the graceful restart duration for multicast snooping. You can set this value
between 0 and 300 seconds. If you set the duration to 0, graceful restart is effectively
disabled. Set this value slightly larger than the IGMP query response interval.
Syntax helper-disable;
Hierarchy Level [edit logical-systems logical-system-name protocols (isis | ldp | ospf | ospf3 | rsvp)
graceful-restart],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
(ldp | ospf | ospf3) graceful-restart],
[edit protocols (isis | ldp | ospf | ospf3 | rsvp) graceful-restart],
[edit routing-instances routing-instance-name protocols (ldp | ospf | ospf3) graceful-restart]
Description Disable helper mode for graceful restart. When helper mode is disabled, a router or switch
cannot help a neighboring router that is attempting to restart.
Default Helper mode is enabled by default for these supported protocols: IS-IS, LDP,
OSPF/OSPFv3, and RSVP.
helper-disable (OSPF)
Description Disable helper mode for graceful restart. When helper mode is disabled, a router cannot
help a neighboring router that is attempting to restart. The last committed statement
takes precedence over the previously configured statement.
Options both—(Optional) Disable helper mode for both standard and restart signaling-based
graceful restart.
standard—(Optional) Disable helper mode for standard graceful restart (based on RFC
3623).
kernel-replication
Syntax kernel-replication {
no-multithreading;
system-reboot recovery-failure;
}
Description Configure kernel replication. Use this configuration statement to debug the kernel
synchronization process (ksyncd) and configure automatic recovery from ksyncd
initialization errors.
maximum-helper-recovery-time
Description Specify the length of time the router or switch retains the state of its Resource Reservation
Protocol (RSVP) neighbors while they undergo a graceful restart.
Options seconds—Legnth of time that the router retains the state of its Resource Reservation
Protocol (RSVP) neighbors while they undergo a graceful restart.
Range: 1 through 3600
Default: 180
Related • Configuring Graceful Restart Options for RSVP, CCC, and TCC on page 224
Documentation
• maximum-helper-restart-time (RSVP) on page 375
maximum-helper-restart-time (RSVP)
Description Specify the length of time the router or switch waits after it discovers that a neighboring
router has gone down before it declares the neighbor down. This value is applied to all
RSVP neighbor routers and should be based on the time that the slowest RSVP neighbor
requires for restart.
Options seconds—The time the router or switch waits after it discovers that a neighboring router
has gone down before it declares the neighbor down.
Range: 1 through 1800
Default: 60
Related • Configuring Graceful Restart Options for RSVP, CCC, and TCC on page 224
Documentation
• maximum-helper-recovery-time on page 374
maximum-neighbor-reconnect-time
Description Specify the maximum length of time allowed to reestablish connection from a restarting
neighbor.
maximum-neighbor-recovery-time
Release Information Statement introduced before Junos OS Release 7.4. Statement changed from
maximum-recovery-time to maximum-neighbor-recovery-time in Junos OS Release 9.1.
Statement introduced in Junos OS Release 12.3X50 for the QFX Series.
Description Specify the maximum amount of time to wait before giving up an attempt to gracefully
restart.
no-strict-lsa-checking
Syntax no-strict-lsa-checking;
Description Disable strict OSPF link-state advertisement (LSA) checking to prevent the termination
of graceful restart by a helping router or switch.
Related • Configuring Graceful Restart Options for OSPF and OSPFv3 on page 220
Documentation
• Configuring Graceful Restart for QFabric Systems
notify-duration
Description Specify the length of time the router or switch notifies helper OSPF routers that it has
completed graceful restart.
Options seconds—Length of time in the router notifies helper OSPF routers that it has completed
graceful restart.
Range: 1 through 3600
Default: 30
Related • Configuring Graceful Restart Options for OSPF and OSPFv3 on page 220
Documentation
• Configuring Graceful Restart for QFabric Systems
not-on-disk-underperform
Syntax not-on-disk-underperform;
Description Prevent gstatd from causing failovers in dual Routing Engines set for graceful Routing
Engine switchover (GRES). The gstatd log message is still generated. This is an optional
configuration.
Related • Preventing Graceful Routing Engine Switchover in the Case of Slow Disks on page 137
Documentation
reconnect-time
Description Specify the length of time required to reestablish a Label Distribution Protocol (LDP)
session after graceful restart.
recovery-time
Description Specify the length of time a router or switch waits for Label Distribution Protocol (LDP)
neighbors to assist it with a graceful restart.
restart-duration
Hierarchy Level [edit logical-systems logical-system-name protocols (isis | ospf | ospf3 | pim)
graceful-restart],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
(ospf | ospf3 | pim) graceful-restart],
[edit protocols (esis | isis | ospf | ospf3 | pim) graceful-restart],
[edit routing-instances routing-instance-name protocols (ospf | ospf3 | pim) graceful-restart],
[edit routing-options graceful-restart]
Additionally, you can individually configure the duration of the graceful restart period for
the End System-to-Intermediate System (ES-IS), Intermediate System-to-Intermediate
System (IS-IS), Open Shortest Path First (OSPF), and OSPFv3 protocols and for Protocol
Independent Multicast (PIM) sparse mode.
Default:
The default value varies according to whether the graceful restart period is being set
globally or for a particular protocol:
• ES-IS—180
• IS-IS—210
• OSPF/OSPFv3—180
• PIM—60
Description Configure the duration of the BGP, RIP, or next-generation RIP (RIPng) graceful restart
period.
stale-routes-time
Description Specify the maximum time that stale routes are kept during a restart. The stale-routes-time
statement allows you to set the length of time the routing device waits to receive
messages from restarting neighbors before declaring them down.
Options seconds—Time the router device waits to receive messages from restarting neighbors
before declaring them down.
Range: 1 through 600 seconds
Default: 300 seconds
traceoptions (Protocols)
Syntax traceoptions {
file name <size size> <files number> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
Description Define tracing operations that graceful restart functionality in the router or switch.
To specify more than one tracing operation, include multiple flag statements.
Default If you do not include this statement, no global tracing operations are performed.
Options disable—(Optional) Disable the tracing operation. You can use this option to disable a
single operation when you have defined a broad group of tracing operations, such
as all.
file name—Name of the file to receive the output of the tracing operation. Enclose the
name within quotation marks. All files are placed in the directory /var/log. We
recommend that you place global routing protocol tracing output in the file
routing-log.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. Then the oldest trace file
is overwritten.
Range: 2 through 1000 files
Default: 2 files
If you specify a maximum number of files, you also must specify a maximum file size with
the size option.
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. The nonstop active routing tracing option is:
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB),
or gigabytes (GB). When a trace file named trace-file reaches this size, it is renamed
trace-file.0. When the trace-file again reaches its maximum size, trace-file.0 is renamed
If you specify a maximum file size, you also must specify a maximum number of trace
files with the files option.
Required Privilege routing and trace—To view this statement in the configuration.
Level routing-control and trace-control—To add this statement to the configuration.
warm-standby
Syntax warm-standby;
Description Set the routing protocols process (rpd) mode to warm standby. Warm standby mode
helps the backup RE stay synchronized with the master RE, allowing for faster RE
switchover during GRES.
nonstop-routing
Syntax nonstop-routing;
Description For routing platforms with two Routing Engines, configure a master Routing Engine to
switch over gracefully to a backup Routing Engine and to preserve routing protocol
information.
Default disabled
switchover-on-routing-crash
Syntax switchover-on-routing-crash;
Release Information Statement introduced in Junos OS Release 13.3 for M Series, MX Series, T Series, TX
Matrix, PTX Series, EX Series, QFX Series.
Description Prevent loss of traffic in the case of NSR being configured. With the
switchover-on-routing-crash configuration statement enabled, when rpd on the master
Routing Engine crashes with NSR configured, the Routing Engine will switch over
immediately to the backup Routing Engine to preserve protocol state and adjacencies.
Prior to having this statement, if NSR was configured and rpd on the master Routing
Engine crashed, it would cause network impact (protocol neighbor and adjacency drops
and traffic loss).
synchronize
Syntax synchronize;
Description For devices with multiple Routing Engines only. Configure the commit command to
automatically perform a commit synchronize action between dual Routing Engines within
the same chassis. The Routing Engine on which you execute the commit command (the
requesting Routing Engine) copies and loads its candidate configuration to the other
(the responding) Routing Engine. Each Routing Engine then performs a syntax check on
the candidate configuration file being committed. If no errors are found, the configuration
is activated and becomes the current operational configuration on both Routing Engines.
NOTE: If you configure the commit synchronize statement at the [edit system]
hierarchy level and issue a commit in the master Routing Engine, the master
configuration is automatically synchronized with the backup. However, if the
backup Routing Engine is down when you issue the commit, the Junos OS
displays a warning and commits the candidate configuration in the master
Routing Engine. When the backup Routing Engine comes up, its configuration
will automatically be synchronized with the master. A newly inserted backup
Routing Engine automatically synchronizes its configuration with the master
Routing Engine configuration.
NOTE: When you configure nonstop active routing (NSR), you must configure
the commit synchronize statement. Otherwise, the commit operation fails.
On the TX Matrix router, synchronization only occurs between the Routing Engines within
the same chassis. When synchronization is complete, the new configuration is then
distributed to the Routing Engines on the T640 routers. That is, the master Routing Engine
on the TX Matrix router distributes the configuration to the master Routing Engine on
each T640 router. Likewise, the backup Routing Engine on the TX Matrix router distributes
the configuration to the backup Routing Engine on each T640 router.
On the TX Matrix Plus router, synchronization only occurs between the Routing Engines
within the switch-fabric chassis and when synchronization is complete, the new
configuration is then distributed to the Routing Engines on the line-card chassis (LCC).
That is, the master Routing Engine on the TX Matrix Plus router distributes the
configuration to the master Routing Engine on each LCC. Likewise, the backup Routing
Engine on the TX Matrix Plus router distributes the configuration to the backup Routing
Engine on each LCC.
traceoptions
Syntax traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <disable>;
}
Description Define tracing operations that track all routing protocol functionality in the routing device.
To specify more than one tracing operation, include multiple flag statements.
Default If you do not include this statement, no global tracing operations are performed.
Options Values:
disable—(Optional) Disable the tracing operation. You can use this option to disable a
single operation when you have defined a broad group of tracing operations, such
as all.
file filename—Name of the file to receive the output of the tracing operation. Enclose the
name within quotation marks. All files are placed in the directory /var/log. We
recommend that you place global routing protocol tracing output in the file
routing-log.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. Then, the oldest trace file
is overwritten. Note that if you specify a maximum number of files, you also must
specify a maximum file size with the size option.
Range: 2 through 1000 files
Default: 10 files
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. These are the global routing protocol tracing
options:
• condition-manager—Condition-manager events
• config-internal—Configuration internals
• general—All normal operations and routing table changes (a combination of the normal
and route trace operations)
• parse—Configuration parsing
• regex-parse—Regular-expression parsing
• state—State transitions
• timer—Timer usage
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB),
or gigabytes (GB). When a trace file named trace-file reaches this size, it is renamed
trace-file.0. When the trace-file again reaches its maximum size, trace-file.0 is renamed
trace-file.1 and trace-file is renamed trace-file.0. This renaming scheme continues
until the maximum number of trace files is reached. Then, the oldest trace file is
overwritten. Note that if you specify a maximum file size, you also must specify a
maximum number of trace files with the files option.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your system
Default: 128 KB
Required Privilege routing and trace—To view this statement in the configuration.
Level routing-control and trace-control—To add this statement to the configuration.
nonstop-bridging
Syntax nonstop-bridging;
Description For platforms with two Routing Engines, configure a master Routing Engine to switch
over gracefully to a backup Routing Engine and preserve Layer 2 Control Protocol (L2CP)
information.
• For information about configuring NSB on EX Series switches that do not support the
Enhanced Layer 2 Software (ELS) CLI style, see Configuring Nonstop Bridging on EX
Series Switches (CLI Procedure)
• For information about configuring NSB on switches that support ELS, see Configuring
Nonstop Bridging on Switches (CLI Procedure)
cfeb
Description On M10i routers only, configure which Compact Forwarding Engine Board (CFEB) is the
master and which is the backup.
Default By default, the CFEB in slot 0 is the master and the CFEB in slot 1 is the backup.
Options slot-number—Specify which slot is the master and which is the backup.
failover (Chassis)
Syntax failover {
on-disk-failure;
on-loss-of-keepalives;
on-re-to-fpc-stale;
}
Description Specify conditions on the master Routing Engine that cause the backup router to take
mastership.
Related • On Detection of a Hard Disk Error on the Master Routing Engine on page 110
Documentation
Description Configure the router to reboot if the software process fails four times within 30 seconds,
and specify the software to use during the reboot.
Options process-name—Junos OS process name. Some of the processes that support the failover
statement are bootp, chassis-control, craft-control,
ethernet-connectivity-fault-management, init, interface-control, neighbor-liveness,
pfe, redundancy-interface-process, routing, smg-service, and vrrp.
other-routing-engine—On routers with dual Routing Engines, use the Junos OS image on
the other Routing Engine during the reboot. That Routing Engine assumes mastership;
in the usual configuration, the other Routing Engine is the designated backup Routing
Engine.
Syntax feb {
redundancy-group group-name {
description description;
feb slot-number (backup | primary);
no-auto-failover;
}
}
Description On M120 routers only, configure a Forwarding Engine Board (FEB) redundancy group.
Description On M120 routers only, configure a Forwarding Engine Board (FEB) as part of a FEB
redundancy group.
backup—(Optional) For each redundancy group, you must configure exactly one backup
FEB.
primary—(Optional) For each redundancy group, you can optionally configure one primary
FEB.
keepalive-time
Description Configure the time period that must elapse before the backup router takes mastership
when it detects loss of the keepalive signal.
Default The on-loss-of-keepalives statement at the [edit chassis redundancy failover] hierarchy
level must be included for failover to occur.
Options seconds—Time before the backup router takes mastership when it detects loss of the
keepalive signal. The range of values is 2 through 10,000.
Related • On Detection of a Loss of Keepalive Signal from the Master Routing Engine on page 111
Documentation
• failover (Chassis) on page 401
no-auto-failover
Syntax no-auto-failover;
Description Disable automatic failover to a backup FEB when an active FEB in a redundancy group
fails.
Syntax on-disk-failure;
Description Instruct the backup router to take mastership if it detects hard disk errors on the master
Routing Engine.
Related • On Detection of a Hard Disk Error on the Master Routing Engine on page 110
Documentation
on-loss-of-keepalives
Syntax on-loss-of-keepalives;
Description Instruct the backup router to take mastership if it detects a loss of keepalive signal from
the master Routing Engine.
Default The on-loss-of-keepalives statement must be included at the [edit chassis redundancy
failover] hierarchy level for failover to occur.
Related • On Detection of a Loss of Keepalive Signal from the Master Routing Engine on page 111
Documentation
• keepalive-time on page 405
redundancy
Syntax redundancy {
cfeb slot (always | preferred);
failover {
on-disk-failure;
on-loss-of-keepalives;
on-re-to-fpc-stale;
}
feb {
redundancy-group group-name {
description description;
feb slot-number (backup | primary);
no-auto-failover;
}
}
graceful-switchover;
keepalive-time seconds;
routing-engine slot-number (backup | disabled | master);
sfm slot-number (always | preferred);
ssb slot-number (always | preferred);
}
Options The remaining statements are explained separately. See CLI Explorer.
redundancy-group
Description On M120 routers only, configure a Forwarding Engine Board (FEB) redundancy group.
Options group-name is the unique name for the redundancy group. The maximum length is 39
alphanumeric characters.
Default By default, the Routing Engine in slot 0 is the master Routing Engine and the Routing
Engine in slot 1 is the backup Routing Engine.
Set the function of the Routing Engine for the specified slot:
Description On M40e and M160 routers, configure which Switching and Forwarding Module (SFM)
is the master and which is the backup.
Default By default, the SFM in slot 0 is the master and the SFM in slot 1 is the backup.
Options slot-number—Specify which slot is the master and which is the backup. On the M40e
router, slot-number can be 0 or 1. On the M160 router, slot-number can be 0 through
3.
ssb
Description On M20 routers, configure which System and Switch Board (SSB) is the master and
which is the backup.
Default By default, the SSB in slot 0 is the master and the SSB in slot 1 is the backup.
Options slot-number—Specify which slot is the master and which is the backup.
no-issu-timer-negotiation
Syntax no-issu-timer-negotiation;
Description Disable unified ISSU timer negotiation for Bidirectional Forwarding Detection (BFD)
sessions.
CAUTION: The sessions might flap during unified ISSU or Routing Engine
switchover, depending on the detection intervals.
Related • Managing and Tracing BFD Sessions During Unified ISSU Procedures on page 351
Documentation
• Junos OS Routing Protocols Library
Syntax traceoptions {
file name <size size> <files number> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
Description Define tracing operations that track unified in-service software upgrade (ISSU)
functionality in the router.
To specify more than one tracing operation, include multiple flag statements.
Default If you do not include this statement, no global tracing operations are performed.
Options disable—(Optional) Disable the tracing operation. You can use this option to disable a
single operation when you have defined a broad group of tracing operations, such
as all.
file name—Name of the file to receive the output of the tracing operation. Enclose the
name within quotation marks. All files are placed in the directory /var/log. We
recommend that you place global routing protocol tracing output in the file
routing-log.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. Then the oldest trace file
is overwritten.
Range: 2 through 1000 files
Default: 2 files
If you specify a maximum number of files, you also must specify a maximum file size with
the size option.
• all—Trace everything.
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB),
or gigabytes (GB). When a trace file named trace-file reaches this size, it is renamed
trace-file.0. When the trace-file again reaches its maximum size, trace-file.0 is renamed
trace-file.1 and trace-file is renamed trace-file.0. This renaming scheme continues
until the maximum number of trace files is reached. Then the oldest trace file is
overwritten.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your system
Default: 128 KB
If you specify a maximum file size, you also must specify a maximum number of trace
files with the files option.
Required Privilege routing and trace—To view this statement in the configuration.
Level routing-control and trace-control—To add this statement to the configuration.
Related • Managing and Tracing BFD Sessions During Unified ISSU Procedures on page 351
Documentation
accept-data
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id]
• accept-data—Enable the master router to accept all packets destined for the virtual
IP address.
• no-accept-data—Prevent the master router from accepting packets other than the
ARP packets destined for the virtual IP address.
Default If the router acting as the master router is the IP address owner or has its priority set to
255, the master router, by default, responds to all packets sent to the virtual IP address.
However, if the router acting as the master router does not own the IP address or has its
priority set to a value less than 255, the master router responds only to ARP requests.
NOTE:
• If you want to restrict the incoming IP packets to ICMP packets only, you
must configure firewall filters to accept only ICMP packets.
Related • Configuring an Interface to Accept All Packets Destined for the Virtual IP Address of a
Documentation VRRP Group on page 275
advertise-interval
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id]
Description Configure the interval between Virtual Router Redundancy Protocol (VRRP) IPv4
advertisement packets.
All routers in the VRRP group must use the same advertisement interval.
Related • Configuring the Advertisement Interval for the VRRP Master Router on page 256
Documentation
• fast-interval on page 426
asymmetric-hold-time
Syntax asymmetric-hold-time;
Description Enable the VRRP master router to switch over to the backup router immediately, without
waiting for the priority hold time to expire, when a route goes down. However, when the
route comes back online, the backup router that is acting as the master waits for the
priority hold time to expire before switching the mastership back to the original master
VRRP router.
Related • Configuring the Asymmetric Hold Time for VRRP Routers on page 260
Documentation
authentication-key
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id]
Description Configure a Virtual Router Redundancy Protocol (VRRP) IPv4 authentication key. You
also must specify a VRRP authentication scheme by including the authentication-type
statement.
All routers in the VRRP group must use the same authentication scheme and password.
authentication-type
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id]
Description Enable Virtual Router Redundancy Protocol (VRRP) IPv4 authentication and specify the
authentication scheme for the VRRP group. If you enable authentication, you must specify
a password by including the authentication-key statement.
All routers in the VRRP group must use the same authentication scheme and password.
• md5—Use the MD5 algorithm to create an encoded checksum of the packet. The
encoded checksum is included in the transmitted packet. The receiving routing platform
uses the authentication key to verify the packet, discarding it if the digest does not
match. This algorithm provides a more secure authentication scheme.
bandwidth-threshold
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id track interface interface-name],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id track interface interface-name],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id track interface interface-name],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id track interface interface-name]
Description Specify the bandwidth threshold for Virtual Router Redundancy Protocol (VRRP) logical
interface tracking.
Options bits-per-second—Bandwidth threshold for the tracked interface. When the bandwidth of
the tracked interface drops below the specified value, the VRRP group uses the
bandwidth threshold priority cost value. You can include up to five bandwidth
threshold statements for each interface you track.
Range: 1 through 10000000000000 bits per second
priority-cost priority—The value subtracted from the configured VRRP priority when the
tracked interface or route is down to force a new master router election. The sum of
all the costs for all interfaces or routes that are tracked must be less than or equal
to the configured priority of the VRRP group.
Related • Configuring a Logical Interface to Be Tracked for a VRRP Group on page 263
Documentation
• Configuring a Logical Interface to Be Tracked
delegate-processing (VRRP)
Syntax delegate-processing {
ae-irb;
}
Description Configure the distributed periodic packet management process (ppmd) to send Virtual
Router Redundancy Protocol (VRRP) advertisements .
Using a hash logic based on iflIndex, the vrrp group ID, and the IP version, select one of
the Flexible OIC Concentrators (FPCs) for distribution. The selected FPC is called the
anchor FPC. All transmit instances and receive instances are from and to the anchor FPC.
The anchor FPC is static, and VRRP is not guaranteed to get distributed to all available
FPCs uniformly for all VRRP sessions.
Options ae-irb—Enable distributed ppmd for VRRP over aggregated Ethernet and integrated
routing and bridging (IRB) interfaces.
Using the ae-irb option is only for MPC line cards. Using the ae-irb option requires
use of the enhanced-ip mode.
Related • Enabling the Distributed Periodic Packet Management Process for VRRP on page 277
Documentation
fast-interval
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id]
Description Configure the interval, in milliseconds, between Virtual Router Redundancy Protocol
(VRRP) advertisement packets.
All routers in the VRRP group must use the same advertisement interval.
NOTE: When configuring VRRP for IPv4, if you have chosen not to enable
VRRPv3, you cannot set a value less than 100 for fast-interval. Commit
check fails if a value less than 100 is configured.
Default: 1 second
Related • Configuring the Advertisement Interval for the VRRP Master Router on page 256
Documentation
• Configuring the Advertisement Interval for the VRRP Master
global-advertisements-threshold
Description Configure the number of fast advertisements that can be missed by a backup router
before the master router is declared as down.
NOTE:
• The advertisement value configured using the
global-advertisements-threshold statement is applicable to all the Virtual
Router Redundancy Protocol (VRRP) groups in the system.
hold-time (VRRP)
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id preempt],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id preempt],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id preempt],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id preempt]
Description In a Virtual Router Redundancy Protocol (VRRP) configuration, set the hold time before
a higher-priority backup router preempts the master router.
Related • Configuring a Backup Router to Preempt the VRRP Master Router on page 259
Documentation
• Configuring VRRP Preemption and Hold Time
inherit-advertisement-interval
Description Set the time interval for advertisement for inherit sessions.
Related •
Documentation
inet6-advertise-interval
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id]
Description Configure the interval between Virtual Router Redundancy Protocol (VRRP) IPv6
advertisement packets.
All routers in the VRRP group must use the same advertisement interval.
Related • Configuring the Advertisement Interval for the VRRP Master Router on page 256
Documentation
• advertise-interval on page 420
interface
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id track],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id track],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id track],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id track]
Description Enable logical interface tracking for a Virtual Router Redundancy Protocol (VRRP) group.
Related • Configuring a Logical Interface to Be Tracked for a VRRP Group on page 263
Documentation
• Configuring a Logical Interface to Be Tracked
preempt (VRRP)
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id]
Default By default the preempt statement is enabled, and a higher-priority backup router preempts
a lower-priority master router even if the preempt statement is not explicitly configured.
Related • Configuring a Backup Router to Preempt the VRRP Master Router on page 259
Documentation
• Configuring VRRP Preemption and Hold Time
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id]
Description Configure a Virtual Router Redundancy Protocol (VRRP) router’s priority for becoming
the master default router. The router with the highest priority within the group becomes
the master.
Options priority—Router’s priority for being elected to be the master router in the VRRP group. A
larger value indicates a higher priority for being elected.
Range: 1 through 255
Default: 100. If two or more routers have the highest priority in the VRRP group, the router
with the VRRP interface that has the highest IP address becomes the master, and
the others serve as backups.
priority-cost (VRRP)
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id track interface interface-name],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id track interface interface-name],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id track interface interface-name],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id track interface interface-name]
Description Configure a Virtual Router Redundancy Protocol (VRRP) router’s priority cost for becoming
the master default router. The router with the highest priority within the group becomes
the master.
Options priority—The value subtracted from the configured VRRP priority when the tracked
interface or route is down to force a new master router election. The sum of all the
costs for all interfaces or routes that are tracked must be less than or equal to the
configured priority of the VRRP group.
Range: 1 through 254
Related • Configuring a Logical Interface to Be Tracked for a VRRP Group on page 263
Documentation
• Configuring a Logical Interface to Be Tracked
priority-hold-time
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id track],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id track],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id track],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id track]
Description Configure a Virtual Router Redundancy Protocol (VRRP) router’s priority hold time to
define the minimum length of time that must elapse between dynamic priority changes.
If the dynamic priority changes because of a tracking event, the priority hold timer begins
running. If another tracking event or manual configuration change occurs while the timer
is running, the new dynamic priority update is postponed until the timer expires.
NOTE: When the track feature is configured, and if VRRP should pre-empt
due to the tracking interface or route transition, any configured pre-empt
hold time will be ignored. VRRP master will pre-empt according to the
configuration of the priority-hold time.
Options seconds—Minimum length of time that must elapse between dynamic priority changes.
Range: 0through 3600 seconds
Related • Configuring a Logical Interface to Be Tracked for a VRRP Group on page 263
Documentation
• Configuring a Logical Interface to Be Tracked
route (Interfaces)
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id track],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id track],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id track],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id track]
Description Enable route tracking for a Virtual Router Redundancy Protocol (VRRP) group.
priority-cost priority—The value subtracted from the configured VRRP priority when the
tracked interface or route is down, forcing a new master router election. The sum of
all the costs for all interfaces or routes that are tracked must be less than or equal
to the configured priority of the VRRP group.
skew-timer-disable
Syntax skew-timer-disable;
Description Disable the skew timer, thereby reducing the time required to transition from the backup
state to the master state.
Default By default, the skew timer is enabled for all the VRRP groups.
startup-silent-period
Description Instruct the system to ignore the Master Down Event when an interface transitions from
the down state to the up state. This statement is used to avoid incorrect error alarms
caused by the delay or interruption of incoming Virtual Router Redundancy Protocol
(VRRP) advertisement packets during the interface startup phase.
Related • Configuring the Startup Period for VRRP Operations on page 259
Documentation
• Configuring the Startup Period for VRRP Operations
Syntax traceoptions {
file filename <files number> <match regular-expression> <microsecond-stamp> <size size>
<world-readable | no-world-readable>;
flag flag;
no-remote-trace;
}
Description Define tracing operations for the Virtual Router Redundancy Protocol (VRRP) process.
To specify more than one tracing operation, include multiple flag statements.
By default, VRRP logs the error, dcd configuration, and routing socket events in a file in
the directory /var/log.
Default If you do not include this statement, no VRRP-specific tracing operations are performed.
Options file filename—Name of the file to receive the output of the tracing operation. Enclose the
name within quotation marks. All files are placed in the directory /var/log. By default,
VRRP tracing output is placed in the file vrrpd.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. When the maximum
number is reached, the oldest trace file is overwritten.
Range: 0 through 4,294,967,296 files
Default: 3 files
If you specify a maximum number of files, you also must specify a maximum file size with
the size option.
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. These are the VRRP-specific tracing options:
• database—Database changes
• general—General events
• interfaces—Interface changes
• normal—Normal events
• state—State transitions
• timer—Timer events
match regular-expression—(Optional) Refine the output to include only those lines that
match the given regular expression.
size size—(Optional) Maximum size of each trace file, in kilobytes, megabytes, or gigabytes.
When a trace file named trace-file reaches this size, it is renamed trace-file.0. When
the trace-file again reaches its maximum size, trace-file.0. is renamed trace-file.1 and
trace-file is renamed trace-file.0. This renaming scheme continues until the maximum
number of trace files is reached. Then the oldest trace file is overwritten.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through the maximum file size supported on your routing platform
Default: 1 MB
If you specify a maximum file size, you also must specify a maximum number of trace
files with the files option.
track (VRRP)
Syntax track {
interface interface-name {
bandwidth-threshold bits-per-second priority-cost priority;
priority-cost priority;
}
priority-hold-time seconds;
route prefix/prefix-length routing-instance instance-name priority-cost priority;
}
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id],
[edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id]
Description Enable logical interface tracking, route tracking, or both, for a Virtual Router Redundancy
Protocol (VRRP) group.
Related • Configuring a Logical Interface to Be Tracked for a VRRP Group on page 263
Documentation
• Configuring a Route to Be Tracked for a VRRP Group on page 265
version-3
Syntax version-3;
NOTE:
• Even though the version-3 statement can be configured only at the [edit
protocols vrrp] hierarchy level, VRRPv3 is enabled on all the configured
logical systems as well.
• When enabling VRRPv3, you must ensure that VRRPv3 is enabled on all
the VRRP routers in the network. This is because VRRPv3 does not
interoperate with the previous versions of VRRP.
virtual-address
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address
vrrp-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address vrrp-group group-id]
Description Configure the addresses of the virtual routers in a Virtual Router Redundancy Protocol
(VRRP) IPv4 or IPv6 group. You can configure up to eight addresses.
Options addresses—Addresses of one or more virtual routers. Do not include a prefix length. If the
address is the same as the interface’s physical address, the interface becomes the
master virtual router for the group.
virtual-inet6-address
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id]
Description Configure the addresses of the virtual routers in a Virtual Router Redundancy Protocol
(VRRP) IPv6 group. You can configure up to eight addresses.
Options addresses—Addresses of one or more virtual routers. Do not include a prefix length. If the
address is the same as the interface’s physical address, the interface becomes the
master virtual router for the group.
virtual-link-local-address
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet6 address address
vrrp-inet6-group group-id],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address vrrp-inet6-group group-id]
Description Configure a virtual link-local address for a Virtual Router Redundancy Protocol (VRRP)
IPv6 group. You must explicitly define a virtual link-local address for each VRRP for IPv6
group. The virtual link-local address must be in the same subnet as the physical interface
address.
NOTE: You do not need to configure link-local addresses and virtual link-local
addresses when configuring VRRP for IPv6. Junos OS automatically generates
link-local addresses and virtual link-local addresses. However, if link local
addresses and virtual link-local addresses are configured, Junos OS considers
the configured addresses.
Options ipv6-address—virtual link-local IPv6 address for VRRP for an IPv6 group.
Range: 0 through 255
vrrp-group
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet address address],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet address address]
Description Configure a Virtual Router Redundancy Protocol (VRRP) IPv4 group. As of Junos OS
Release 13.2, VRRP nonstop active routing (NSR) is enabled only when you configure the
nonstop-routing statement at the [edit routing-options] or [edit logical system
logical-system-name routing-options hierarchy level.
NOTE: The group identifier that you enter must be different from any other
group identifiers that you configured for logical units of this same physical
interface.
Options group-id—VRRP group identifier. If you enable MAC source address filtering on the
interface, you must include the virtual MAC address in the list of source MAC
addresses that you specify in the source-address-filter statement. MAC addresses
ranging from [Link] through [Link] are reserved for VRRP,
as defined in RFC 2338. The VRRP group number must be the decimal equivalent
of the last hexadecimal byte of the virtual MAC address.
Range: 0 through 255
vrrp-inet6-group
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet6 address address],
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
family inet6 address address]
NOTE: The group identifier that you enter must be different from any other
group identifiers that you configured for logical units of this same physical
interface.
Options group-id—VRRP group identifier. If you enable MAC source address filtering on the
interface, you must include the virtual MAC address in the list of source MAC
addresses that you specify in the source-address-filter statement. MAC addresses
ranging from [Link] through [Link] are reserved for VRRP,
as defined in RFC 2338. The VRRP group number must be the decimal equivalent
of the last hexadecimal byte of the virtual MAC address.
Range: 0 through 255
vrrp-inherit-from
Syntax vrrp-inherit-from {
active-group group-index;
active-interface active-interface-name;
}
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family inet6 vrrp-inet6-group
group-id]
[edit interfaces interface-name unit logical-unit-number family inet vrrp-group group-id]
Operational Commands
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Description Display whether real-time Bidirectional Forwarding Detection (BFD) is enabled or disabled.
If real-time BFD is enabled, the output of the show command displays the value of the
realtime Ukern thread Status field as Enabled.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
clear vrrp
Description Set Virtual Router Redundancy Protocol (VRRP) interface statistics to zero.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Description (M20 router only) Control which System and Switch Board (SSB) is master.
Additional Information By default, the SSB in slot 0 (SSB0) is the master and the SSB in slot 1 (SSB1) is the
backup. If you use this command to change the master, and then restart the chassis
software for any reason, the master reverts to the default setting. To change the default
master SSB, include the ssb statement at the [edit chassis redundancy] hierarchy level
in the configuration. For more information, see the Junos OS Administration Library.
The configurations on the two SSBs do not have to be the same, and they are not
automatically synchronized. If you configure both SSBs as masters, when the chassis
software restarts for any reason, the SSB in slot 0 becomes the master and the one in
slot 1 becomes the backup.
The switchover from the primary SSB to the backup SSB is immediate. The SSB takes
several seconds to reinitialize the Flexible PIC Concentrators (FPCs) and restart the PICs.
The interior gateway protocol (IGP) and BGP convergence times depend on the specific
network environment.
List of Sample Output request chassis ssb master switch on page 455
request chassis ssb master switch no-confirm on page 456
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Syntax (QFX5100
Syntax request system software in-service-upgrade package-name
Switches)
Description Perform a unified in-service software upgrade (ISSU). A unified ISSU enables you to
upgrade from one Junos OS Release to another with no disruption on the control plane
and with minimal disruption of traffic. In addition, graceful Routing Engine switchover
(GRES) and nonstop active routing (NSR) must be enabled. On QFX5100 switches,
nonstop bridging (NSB) must be enabled if you are using the Layer 2 Control Protocol
process (l2cpd) to transmit Layer 2 spanning tree protocols in a Layer 2 bridge
environment.
reboot—(Optional) When the reboot option is included, the former master (new backup)
Routing Engine is automatically rebooted after being upgraded to the new software.
When the reboot option is not included, you must manually reboot the former master
(new backup) Routing Engine using the request system reboot command.
• Unified ISSU is not supported on every platform. For a list of supported platforms, see
“Unified ISSU System Requirements” on page 299.
• Unsupported PICs are restarted during a unified ISSU on certain routing devices. For
information about supported PICs, see the Junos OS High Availability Library for Routing
Devices.
• Unsupported protocols will experience packet loss during a unified ISSU. For information
about supported protocols, see the Junos OS High Availability Library for Routing Devices.
• During a unified ISSU, you cannot bring any PICs online or offline on certain routing
devices.
For more information, see the Junos OS High Availability Library for Routing Devices.
List of Sample Output request system software-in-service upgrade reboot on page 458
request system software-in-service upgrade reboot (TX Matrix Plus Router) on page 461
request system software-in-service upgrade (QFX5100 Switch) on page 469
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Rebooting re1
Rebooting sfc0-re1
ISSU: SFC Backup RE Prepare Done
Waiting for SFC Backup RE reboot
Rebooting lcc0-re1
Rebooting LCC [lcc0-re1]
Rebooting lcc1-re1
Rebooting LCC [lcc1-re1]
Rebooting lcc2-re1
Rebooting LCC [lcc2-re1]
Rebooting lcc3-re1
Rebooting LCC [lcc3-re1]
LCC Backup REs have rebooted
Waiting for LCC Backup REs come back online
ISSU: LCC Backup REs Prepare Done
GRES operational
Initiating Chassis In-Service-Upgrade
Chassis ISSU Started
ISSU: Preparing Daemons
ISSU: Daemons Ready for ISSU
ISSU: Starting Upgrade for FRUs
ISSU: Preparing for Switchover
ISSU: Ready for Switchover
Checking In-Service-Upgrade status
lcc0-re0:
--------------------------------------------------------------------------
Item Status Reason
FPC 1 Online (ISSU)
PIC 0 Online (ISSU)
FPC 2 Online (ISSU)
FPC 3 Online (ISSU)
PIC 1 Online (ISSU)
FPC 4 Online (ISSU)
FPC 6 Online (ISSU)
FPC 7 Online (ISSU)
lcc1-re0:
--------------------------------------------------------------------------
Item Status Reason
FPC 0 Online (ISSU)
PIC 3 Online (ISSU)
FPC 1 Online (ISSU)
FPC 2 Online (ISSU)
FPC 4 Online (ISSU)
FPC 6 Online (ISSU)
FPC 7 Online (ISSU)
lcc2-re0:
--------------------------------------------------------------------------
Item Status Reason
FPC 0 Online (ISSU)
FPC 2 Online (ISSU)
FPC 3 Online (ISSU)
PIC 0 Online (ISSU)
FPC 4 Online (ISSU)
FPC 6 Online (ISSU)
FPC 7 Online (ISSU)
PIC 1 Online (ISSU)
lcc3-re0:
--------------------------------------------------------------------------
Item Status Reason
FPC 0 Online (ISSU)
PIC 0 Online (ISSU)
FPC 1 Online (ISSU)
FPC 2 Online (ISSU)
FPC 3 Online (ISSU)
PIC 2 Online (ISSU)
FPC 4 Online (ISSU)
FPC 5 Online (ISSU)
FPC 6 Online (ISSU)
FPC 7 Online (ISSU)
PIC 1 Online (ISSU)
lcc0-re0:
--------------------------------------------------------------------------
Resolving mastership...
Complete. The other routing engine becomes the master.
lcc1-re0:
--------------------------------------------------------------------------
Resolving mastership...
Complete. The other routing engine becomes the master.
lcc2-re0:
--------------------------------------------------------------------------
Resolving mastership...
Complete. The other routing engine becomes the master.
lcc3-re0:
--------------------------------------------------------------------------
Resolving mastership...
Complete. The other routing engine becomes the master.
Resolving mastership...
Complete. The other routing engine becomes the master.
ISSU: RE switchover Done
ISSU: Upgrading SFC Old Master RE
lcc0-re0:
Installing package '/var/tmp/[Link]' ...
Verified [Link] signed by PackageProduction_12_3_0
Adding jinstall...
Verified manifest signed by PackageProduction_12_3_0
lcc1-re0:
Installing package '/var/tmp/[Link]' ...
Verified [Link] signed by PackageProduction_12_3_0
Adding jinstall...
Verified manifest signed by PackageProduction_12_3_0
lcc2-re0:
Installing package '/var/tmp/[Link]' ...
Verified [Link] signed by PackageProduction_12_3_0
Adding jinstall...
Verified manifest signed by PackageProduction_12_3_0
lcc3-re0:
Installing package '/var/tmp/[Link]' ...
Verified [Link] signed by PackageProduction_12_3_0
Adding jinstall...
Verified manifest signed by PackageProduction_12_3_0
Description Perform a unified in-service software upgrade (unified ISSU). Unified ISSU enables you
to upgrade from one Junos OS release to another with no disruption on the control plane
and with minimal disruption of traffic. Unified ISSU is supported only by dual Routing
Engine platforms. In addition, graceful Routing Engine switchover (GRES) and nonstop
active routing (NSR) must be enabled.
no-copy—(Optional) When the no-copy option is included, copies of package files are
not saved on the Packet Forwarding Engine.
The no-copy option is not available for an MX Series Virtual Chassis or an EX9200
Virtual Chassis.
reboot—(Optional) When the reboot option is included, the former master (new backup)
Routing Engine is automatically rebooted after being upgraded to the new software.
When the reboot option is not included, you must manually reboot the former master
(new backup) Routing Engine using the request system reboot command.
The reboot option is accepted but ignored for an MX Series Virtual Chassis or an
EX9200 Virtual Chassis. A unified ISSU in an MX Series Virtual Chassis or EX9200
Virtual Chassis always reboots all Routing Engines in the member routers or switches.
unlink—(Optional) When the unlink option is included, the package is removed from
/var/home whether the installation is successful or unsuccessful.
The unlink option is not available for an MX Series Virtual Chassis or an EX9200
Virtual Chassis.
• Unified ISSUs are supported on MX Series 3D Universal Edge Routers and EX9200
switches.
• Unsupported PICs (on EX9200, PICs are known as “line cards”) are restarted during a
unified ISSU. For information about supported PICs, see the Junos OS High Availability
Library for Routing Devices. For information about supported EX9200 line cards, see
“Unified ISSU System Requirements” on page 299.
• Unsupported protocols will experience packet loss during a unified ISSU. For information
about supported protocols, see the Junos OS High Availability Library for Routing Devices
or, for EX9200, see “Unified ISSU System Requirements” on page 299.
• During a unified ISSU, you cannot bring any PICs online or offline.
For more information, see the Junos OS High Availability Library for Routing Devices or the
High Availability Feature Guide for EX9200 Switches.
List of Sample Output request system software in-service-upgrade reboot on page 472
request system software in-service-upgrade (MX Series Virtual Chassis) on page 482
Output Fields When you enter this command, you are provided feedback about the status of your
request.
Sample Output
/var/sw/pkg/[Link]...
Auto-deleting old jservices-aacl ...
Removing /opt/sdk/service-packages/jservices-aacl ...
Removing [Link] from /var/sw/pkg ...
Notifying mspd ...
Installing new jservices-aacl ...
Verified [Link] signed by PackageProduction_11_2_0
Creating /opt/sdk/service-packages/jservices-aacl ...
Storing [Link] in /var/sw/pkg ...
Link: /opt/sdk/service-packages/jservices-aacl/jservices-aacl-pic ->
/var/sw/pkg/[Link]...
Auto-deleting old jservices-llpdf ...
Removing /opt/sdk/service-packages/jservices-llpdf ...
Removing [Link] from /var/sw/pkg ...
Notifying mspd ...
Installing new jservices-llpdf ...
Verified [Link] signed by PackageProduction_11_2_0
Creating /opt/sdk/service-packages/jservices-llpdf ...
Storing [Link] in /var/sw/pkg ...
Link: /opt/sdk/service-packages/jservices-llpdf/jservices-llpdf-pic ->
/var/sw/pkg/[Link]...
Auto-deleting old jservices-ptsp ...
Removing /opt/sdk/service-packages/jservices-ptsp ...
Removing [Link] from /var/sw/pkg ...
Notifying mspd ...
Installing new jservices-ptsp ...
Verified [Link] signed by PackageProduction_11_2_0
Creating /opt/sdk/service-packages/jservices-ptsp ...
Storing [Link] in /var/sw/pkg ...
Link: /opt/sdk/service-packages/jservices-ptsp/jservices-ptsp-pic ->
/var/sw/pkg/[Link]...
Auto-deleting old jservices-sfw ...
Removing /opt/sdk/service-packages/jservices-sfw ...
Removing [Link] from /var/sw/pkg ...
Notifying mspd ...
Installing new jservices-sfw ...
Verified [Link] signed by PackageProduction_11_2_0
Creating /opt/sdk/service-packages/jservices-sfw ...
Storing [Link] in /var/sw/pkg ...
Link: /opt/sdk/service-packages/jservices-sfw/jservices-sfw-pic ->
/var/sw/pkg/[Link]...
Auto-deleting old jservices-nat ...
Removing /opt/sdk/service-packages/jservices-nat ...
Removing [Link] from /var/sw/pkg ...
Notifying mspd ...
Installing new jservices-nat ...
Verified [Link] signed by PackageProduction_11_2_0
Creating /opt/sdk/service-packages/jservices-nat ...
Storing [Link] in /var/sw/pkg ...
Link: /opt/sdk/service-packages/jservices-nat/jservices-nat-pic ->
/var/sw/pkg/[Link]...
Auto-deleting old jservices-alg ...
Removing /opt/sdk/service-packages/jservices-alg ...
Removing [Link] from /var/sw/pkg ...
Notifying mspd ...
Installing new jservices-alg ...
Verified [Link] signed by PackageProduction_11_2_0
Creating /opt/sdk/service-packages/jservices-alg ...
Storing [Link] in /var/sw/pkg ...
Link: /opt/sdk/service-packages/jservices-alg/jservices-alg-pic ->
/var/sw/pkg/[Link]...
Rebooting re1
ISSU: Backup RE Prepare Done
Waiting for Backup RE reboot
GRES operational
Initiating Chassis In-Service-Upgrade
Chassis ISSU Started
ISSU: Preparing Daemons
ISSU: Daemons Ready for ISSU
ISSU: Starting Upgrade for FRUs
ISSU: Preparing for Switchover
member1-re0:
--------------------------------------------------------------------------
Installing package
'/var/tmp/jinstall-14.1-20140114_ib_14_1_psd.[Link]' ...
Verified jinstall-14.1-20140114_ib_14_1_psd.[Link] signed by
PackageDevelopmentEc_2014
Adding jinstall...
member1-re1:
--------------------------------------------------------------------------
Installing package
'/var/tmp/jinstall-14.1-20140114_ib_14_1_psd.[Link]' ...
Verified jinstall-14.1-20140114_ib_14_1_psd.[Link] signed by
PackageDevelopmentEc_2014
Adding jinstall...
/var/sw/pkg/jinstall-14.1-20140114_ib_14_1_psd.[Link] ...
Saving state for rollback ...
Installing package
'/var/tmp/jinstall-14.1-20140114_ib_14_1_psd.[Link]' ...
Verified jinstall-14.1-20140114_ib_14_1_psd.[Link] signed by
PackageDevelopmentEc_2014
Adding jinstall...
member1-re0:
--------------------------------------------------------------------------
Shutdown NOW!
Reboot consistency check bypassed - jinstall 14.1-20140114_ib_14_1_psd.1 will
complete installation upon reboot
[pid 10462]
Rebooting locally to complete the in service upgrade.
Shutdown NOW!
Reboot consistency check bypassed - jinstall 14.1-20140114_ib_14_1_psd.1 will
complete installation upon reboot
[pid 13458]
{local:member0-re1}
user@host>
*** FINAL System shutdown message from user@host ***
Description Perform a compatibility check to ensure that the software and hardware components
and the configuration on the device support unified ISSU. The request system software
validate in-service-upgrade command enables you to detect any compatibility issues
before actually issuing the request system software in-service-upgrade command to
initiate unified ISSU.
Additional Information Unified ISSU is not supported on every platform. For a list of supported platforms, see
“Unified ISSU System Requirements” on page 299.
List of Sample Output request system software validate in-service-upgrade on page 488
Output Fields When you enter this command, Junos OS displays the status of your request.
Sample Output
Description (M20 routers only) Display status information about the System and Switch Board (SSB).
slot—(Optional) Display information about the SSB in the specified slot. Replace slot
with 0 or 1.
Output Fields Table 32 on page 490 lists the output fields for theshow chassis ssb command. Output
fields are listed in the approximate order in which they appear.
State Current state of the SSB in this slot. State can be any one of the
following:
CPU utilization Total percentage of the CPU being used by the SSB's processor.
Interrupt utilization Of the total CPU being used by the SSB's processor, the percentage
being used for interrupts.
Heap utilization Percentage of heap space being used by the SSB's processor.
Buffer utilization Percentage of buffer space being used by the SSB's processor.
Sample Output
show nonstop-routing
Description Display the status of nonstop active routing that includes the automerge statistics and
state.
List of Sample Output show nonstop-routing (MX Series Router) on page 493
show nonstop-routing (MX Series Router) on page 494
Output Fields Table 33 on page 492 describes the output fields for the show nonstop-routing command.
Output fields are listed in the approximate order in which they appear.
• Enabled—By default, autokeepalive precision timers are enabled on the kernel after
switchover.
• Completed—Kernel has completed keepalive generation for all the sessions after switchover,
and RPD has taken over all of them successfully.
Precision Timers max period Maximum period, in seconds, after the switchover from standby to master event for which the
kernel autogenerates keepalives on behalf of BGP.
Sample Output
Batching: No
Batch count: 200
Batch count adjust: Exponential
Batch interval: 20 msec
Batch interval adjust: None
Automerge State: Ready
Sessions Processed: 0
Description (M20 routers only) Display Packet Forwarding Engine System and Switch Board (SSB)
status and statistics information.
Output Fields Table 34 on page 495 lists the output fields for the show pfe ssb command. Output fields
are listed in the approximate order in which they appear.
Peer message type Information about Peer message type receive qualifiers.
receive qualifiers
PFE Listener statistics Information about Packet Forwarding Engine listener statistics:
PFE IPC statistics Information about Packet Forwarding Engine IPC statistics.
PFE socket-buffer bytes Information about Packet Forwarding Engine socket-buffer bytes pending for transmit.
pending transmit—
• TX Messages—Number of transmitted messages.
• RX messages—Number of received messages.
Sample Output
SSB status:
Slot: Present
State: Online
Last State Change: 2005-03-06 [Link] PST
Uptime (total): [Link]
Failures: 0
Pending: 0
GHCP 0 0
IRSD 0 0
Monitoring 0 0
RE 0 0
PIC 0 0
ASP cfg 0 0
ASP cmd 0 0
L2TP cfg 0 0
Collector 0 0
PIC state 0 0
Aggregator 0 0
Empty 0 0
19 0
20 0
21 0
Description Display whether graceful Routing Engine switchover is configured, the state of the kernel
replication (ready or synchronizing), any replication errors, and whether the primary and
standby Routing Engines are using compatible versions of the kernel database.
NOTE: Issue the show system switchover command only on the backup
Routing Engine. This command is not supported on the master Routing Engine
because the kernel-replication process daemon does not run on the master
Routing Engine. This process runs only on the backup Routing Engine.
Beginning Junos OS Release 9.6, the show system switchover command has been
deprecated on the master Routing Engine on all routers other than a TX Matrix
(switch-card chassis) or a TX Matrix Plus (switch-fabric chassis) router.
However, in a routing matrix, if you issue the show system switchover command on the
master Routing Engine of the TX Matrix router (or switch-card chassis), the CLI displays
graceful switchover information for the master Routing Engine of the T640 routers (or
line-card chassis) in the routing matrix. Likewise, if you issue the show system switchover
command on the master Routing Engine of a TX Matrix Plus router (or switch-fabric
chassis), the CLI displays output for the master Routing Engine of T1600 or T4000 routers
in the routing matrix.
Options all-chassis—(TX Matrix routers and TX Matrix Plus routers only) (Optional) On a TX
Matrix router, display graceful Routing Engine switchover information for all Routing
Engines on the TX Matrix router and the T640 routers configured in the routing matrix.
On a TX Matrix Plus router, display graceful Routing Engine switchover information
for all Routing Engines on the TX Matrix Plus router and the T1600 or T4000 routers
configured in the routing matrix.
all-lcc—(TX Matrix routers and TX Matrix Plus routers only) (Optional) On a TX Matrix
router, display graceful Routing Engine switchover information for all T640 routers
(or line-card chassis) connected to the TX Matrix router. On a TX Matrix Plus router,
display graceful Routing Engine switchover information for all connected T1600 or
T4000 LCCs.
Note that in this instance, packets get dropped. The LCCs perform GRES on their
own chassis (GRES cannot be handled by one particular chassis for the entire router)
and synchronization is not possible as the LCC plane bringup time varies for each
LCC. Therefore, when there is traffic on these planes, there may be a traffic drop.
lcc number—(TX Matrix routers and TX Matrix Plus routers only) (Optional) On a TX
Matrix router, display graceful Routing Engine switchover information for a specific
T640 router connected to the TX Matrix router. On a TX Matrix Plus router, display
graceful Routing Engine switchover information for a specific router connected to
the TX Matrix Plus router.
Replace number with the following values depending on the LCC configuration:
• 0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.
local—(MX Series routers only) (Optional) Display graceful Routing Engines switchover
information for all Routing Engines on the local Virtual Chassis member.
member member-id—(MX Series routers only) (Optional) Display graceful Routing Engine
switchover information for all Routing Engines on the specified member of the Virtual
Chassis configuration. Replace member-id with a value of 0 or 1.
scc—(TX Matrix router only) (Optional) Display graceful Routing Engine switchover
information for the TX Matrix router (or switch-card chassis).
sfc—(TX Matrix Plus routers only) (Optional) Display graceful Routing Engine switchover
information for the TX Matrix Plus router.
Additional Information If you issue the show system switchover command on a TX Matrix backup Routing Engine,
the command is broadcast to all the T640 backup Routing Engines that are connected
to it.
Likewise, if you issue the show system switchover command on a TX Matrix Plus backup
Routing Engine, the command is broadcast to all the T1600 or T4000 backup Routing
Engines that are connected to it.
If you issue the show system switchover command on the active Routing Engine in the
master router of an MX Series Virtual Chassis, the router displays a message that this
command is not applicable on this member of the Virtual Chassis.
List of Sample Output show system switchover (Backup Routing Engine - Ready) on page 504
show system switchover (Backup Routing Engine - Not Ready) on page 505
show system switchover (MX Virtual Chasiss) on page 505
show system switchover (MX Virtual Chasiss) on page 505
show system switchover (Routing Matrix and Routing Matrix Plus) - Master
Ready on page 505
show system switchover (Routing Matrix and Routing Matrix Plus) - Master Not
Ready on page 506
show system switchover (Routing Matrix and Routing Matrix Plus) - Backup
Ready on page 506
show system switchover (Routing Matrix and Routing Matrix Plus) - Backup Not
Ready on page 506
show system switchover all-lcc (Routing Matrix and Routing Matrix Plus) on page 507
Output Fields Table 35 on page 503 describes the output fields for the show system switchover command.
Output fields are listed in the approximate order in which they appear.
• Ready—Kernel database has synchronized. This message implies that the system is ready for GRES.
• Synchronizing—Kernel database is synchronizing. Displayed when there are updates within the last
5 seconds.
• Version incompatible—The primary and standby Routing Engines are running incompatible kernel
database versions.
• Replication error—An error occurred when the state was replicated from the primary Routing Engine.
Inspect Steady State for possible causes, or notify Juniper Networks customer support.
This field is displayed only when ksyncd is running in multichassis mode (LCC master).
Sample Output
Switchover Status: Ready is the way the last line of the output reads if you are running
Junos OS Release 16.1R1 or later. If you are running Junos OS Release 15.x, the last line of
the output reads as Switchover Ready, for example:
Switchover Status: Not Ready is the way the last line of the output reads if you are running
Junos OS Release 16.1R1 or later. If you are running Junos OS Release 15.x, the last line of
the output reads as Not ready for mastership switch, try after xxx secs, for example:
{master:member1-re1}
member1:
--------------------------------------------------------------------------
Command is not applicable on this member of the virtual-chassis
{master:member1-re1}
member1:
--------------------------------------------------------------------------
Command is not applicable on this member of the virtual-chassis
show system switchover (Routing Matrix and Routing Matrix Plus) - Master Ready
user@host> show system switchover
lcc0-re1:
--------------------------------------------------------------------------
Multichassis replication: On
Configuration database: Ready
lcc2-re0:
--------------------------------------------------------------------------
Multichassis replication: On
Configuration database: Ready
Kernel database: Ready
Peer state: Steady State
Switchover Status: Ready
show system switchover (Routing Matrix and Routing Matrix Plus) - Master Not Ready
user@host> show system switchover
lcc0-re1:
--------------------------------------------------------------------------
Multichassis replication: On
Configuration database: Ready
Kernel database: Ready
Peer state: Steady State
Switchover Status: Ready
lcc2-re1:
--------------------------------------------------------------------------
Multichassis replication: On
Configuration database: Ready
Kernel database: Ready
Peer state: Steady State
Switchover Status: Not Ready
show system switchover (Routing Matrix and Routing Matrix Plus) - Backup Ready
user@host> show system switchover
scc-re0:
--------------------------------------------------------------------------
Graceful switchover: On
Configuration database: Ready
Kernel database: Ready
Switchover Status: Ready
lcc0-re0:
--------------------------------------------------------------------------
Graceful switchover: On
Configuration database: Ready
Kernel database: Ready
Switchover Status: Ready
lcc2-re1:
--------------------------------------------------------------------------
Graceful switchover: On
Configuration database: Ready
Kernel database: Ready
Switchover Status: Ready
show system switchover (Routing Matrix and Routing Matrix Plus) - Backup Not Ready
user@host> show system switchover
scc-re0:
--------------------------------------------------------------------------
Graceful switchover: On
Configuration database: Ready
Kernel database: Ready
Switchover Status: Not Ready
lcc0-re0:
--------------------------------------------------------------------------
Graceful switchover: On
Configuration database: Ready
Kernel database: Ready
Switchover Status: Ready
lcc2-re1:
--------------------------------------------------------------------------
Graceful switchover: On
Configuration database: Ready
Kernel database: Ready
Switchover Status: Ready
show system switchover all-lcc (Routing Matrix and Routing Matrix Plus)
user@host> show system switchover all-lcc
lcc0-re0:
--------------------------------------------------------------------------
Multichassis replication: On
Configuration database: Ready
Kernel database: Ready
Peer state: Steady State
Switchover Status: Ready
lcc2-re0:
--------------------------------------------------------------------------
Multichassis replication: On
Configuration database: Ready
Kernel database: Ready
Peer state: Steady State
Switchover Status: Ready
Description Displays nonstop active routing (NSR) status. When you issue this command on the
master Routing Engine, the status of nonstop active routing synchronization is also
displayed.
List of Sample Output show task replication (Issued on the Master Routing Engine) on page 509
show task replication (Issued on the Backup Routing Engine) on page 509
Output Fields Table 36 on page 508 lists the output fields for the show task replication command. Output
fields are listed in the approximate order in which they appear.
Synchronization Status Nonstop active routing synchronization status for the supported
protocols. States are NotStarted, InProgress, and Complete.
Sample Output
show vrrp
Description Display status information about Virtual Router Redundancy Protocol (VRRP) groups.
Options none—(Same as brief) Display brief status information about all VRRP interfaces.
Output Fields Table 37 on page 511 lists the output fields for the show vrrp command. Output fields are
listed in the approximate order in which they appear
Interface index Physical interface index number, which reflects its initialization extensive
sequence.
Active Total number of VRRP groups that are active (that is, whose interface extensive
state is either up or down).
Interface VRRP PDU Non-errored statistics for the logical interface: extensive
statistics
• Advertisement sent—Number of VRRP advertisement protocol data
units (PDUs) that the interface has transmitted.
• Advertisement received—Number of VRRP advertisement PDUs
received by the interface.
• Packets received—Number of VRRP packets received for VRRP
groups on the interface.
• No group match received—Number of VRRP packets received for
VRRP groups that do not exist on the interface.
Interface VRRP PDU error Errored statistics for the logical interface: extensive
statistics
• Invalid IPAH next type received—Number of packets received that
use the IP Authentication Header protocol (IPAH) and that do not
encapsulate VRRP packets.
• Invalid VRRP ttl value received—Number of packets received whose
IP time- to-live (TTL) value is not 255.
• Invalid VRRP version received—Number of packets received whose
VRRP version is not 2.
• Invalid VRRP pdu type received—Number of packets received whose
VRRP PDU type is not 1.
• Invalid VRRP authentication type received—Number of packets
received whose VRRP authentication is not none, simple, or md5.
• Invalid VRRP IP count received—Number of packets received whose
VRRP IP count exceeds 8.
• Invalid VRRP checksum received—Number of packets received
whose VRRP checksum does not match the calculated one.
Index Physical interface index number, which reflects its initialization detail extensive
sequence.
SNMP ifIndex SNMP index number for the physical interface. detail extensive
Type and Address Identifier for the address and the address itself: brief none summary
VRRP Mode If the interface inherits its state and configuration from the active detail extensive
VRRP group, or if it is part of the active VRRP group.
Authentication type Configured VRRP authentication type: none, simple, or md5. detail extensive
Advertisement Threshold A value from 1 through 15, used for setting the time when a peer should detail extensive
be considered down.
Computed Send Rate How many protocol data units (PDUs) are generated per second. detail extensive
Preempt Whether preemption is allowed on the interface: yes or no. detail extensive
Accept-data mode Whether the interface is configured to accept packets destined for detail extensive
the virtual IP address: yes or no.
VIP count Number of virtual IP addresses that have been configured on the detail extensive
interface.
Advertisement timer How long, in seconds, until the advertisement timer expires. detail extensive
Master router IP address of the interface that is acting as the master. If the VRRP detail extensive
interface is down, the output is N/A.
Virtual router uptime How long, in seconds, that the virtual router has been up. detail extensive
Master router uptime How long, in seconds, that the master route has been up. detail extensive
Virtual MAC MAC address associated with the virtual IP address. detail extensive
Current priority Current operational priority for being the VRRP master. detail extensive
Configured priority Configured base priority for being the VRRP master. detail extensive
Priority hold-time Minimum time interval, in seconds, between successive changes to detail extensive
the current priority. Disabled indicates no minimum interval.
Remaining-time (track option only) Displays the time remaining in the priority hold-time detail
interval.
Interface tracking Whether interface tracking is enabled or disabled. When enabled, the detail extensive
output also displays the number of tracked interfaces.
Int state/Interface Current operational state of the tracked interface: up or down. detail extensive
state/State
Int speed/Speed Current operational speed, in bits per second, of the tracked interface. detail extensive
Incurred priority cost Operational priority cost incurred due to the state and speed of this detail extensive
tracked interface. This cost is applied to the configured priority to
obtain the current priority.
Threshold Speed below which the corresponding priority cost is incurred. In other detail extensive
words, when the speed of the interface drops below the threshold
speed, the corresponding priority cost is incurred.
Route tracking Whether route tracking is enabled or disabled. When enabled, the detail extensive
output also displays the number of tracked routes.
VRF name The VPN routing and forwarding (VRF) routing instance that the detail extensive
tracked route is in.
Route state The state of the route being tracked: up, down, or unknown. detail extensive
Priority cost Configured priority cost. This value is incurred when the interface detail extensive
speed drops below the corresponding threshold or when the tracked
route goes down.
Active Whether the threshold is active (*). If the threshold is active, the detail extensive
corresponding priority cost is incurred.
Group VRRP PDU statistics Number of VRRP advertisements sent and received by the group. extensive
Group VRRP PDU error Errored statistics for the VRRP group: extensive
statistics
• Bad authentication type received—Number of VRRP PDUs received
with an invalid authentication type. The received authentication
can be none, simple, or md5 and must be the same for all routers
in the VRRP group.
• Bad password received—Number of VRRP PDUs received with an
invalid key (password). The password for simple authentication
must be the same for all routers in the VRRP group
• Bad MD5 digest received—Number of VRRP PDUs received for which
the MD5 digest computed from the VRRP PDU differs from the
digest expected by the VRRP instance configured on the router.
• Bad advertisement timer received—Number of VRRP PDUs received
with an advertisement time interval that is inconsistent with the
one in use among the routers in the VRRP group.
• Bad VIP count received—Number of VRRP PDUs whose virtual IP
address counts differ from the count that has been configured on
the VRRP instance.
• Bad VIPADDR received—Number of VRRP PDUs whose virtual IP
addresses differ from the list of virtual IP addresses configured on
the VRRP instance.
Group state transition State transition statistics for the VRRP group: extensive
statistics
• Idle to master transitions—Number of times that the VRRP instance
transitioned from the idle state to the master state.
• Idle to backup transitions—Number of times that the VRRP instance
transitioned from the idle state to the backup state.
• Backup to master transitions—Number of times that the VRRP
instance transitioned from the backup state to the master state.
• Master to backup transitions—Number of times that the VRRP
instance transitioned from the master state to the backup state.
NOTE: When show vrrp nsr is used on the backup Routing Engine, it
displays the current VRRP state on the master Routing Engine, which
is the future VRRP state for the backup Routing Engine. Do not use
on the master Routing Engine.
NSR VRRP nonstop active routing is enabled for the configured VRRP brief none
group: yes or no.
NOTE: A yes value means that the new master Routing Engine will
immediately start with the VRRP State value from the original master
Routing Engine.
• Start afresh.
• Go through asilent startup period.
• Move to a backup state.
• Wait for the D Timer to run out before becoming the master (only
if the master has not been configured already).
RPD-NSR The routing options have been set to nonstop active routing: yes or brief none
no.
Sample Output
show vrrp
user@host> show vrrp
Interface State Group VR state Timer Type Address
fe-0/0/0.121 up 1 master A 1.052 lcl fec0::12:1:1:1
vip fe80::12:1:1:99
vip fec0::12:1:1:99
fe-0/0/2.131 up 1 master A 0.364 lcl fec0::13:1:1:1
vip fe80::13:1:1:99
vip fec0::13:1:1:99
The output for the show vrrp brief command is identical to that for the show vrrp command.
For sample output, see show vrrp on page 516.
Advertisement received :0
Packets received :0
No group match received :0
Interface VRRP PDU error statistics
Invalid IPAH next type received :0
Invalid VRRP TTL value received :0
Invalid VRRP version received :0
Invalid VRRP PDU type received :0
Invalid VRRP authentication type received:0
Invalid VRRP IP count received :0
Invalid VRRP checksum received :0
This command is similar to show vrrp. Here, the VR state column displays the current
VRRP state on the master Routing Engine, which is the future VRRP state for the backup
Routing Engine. Do not use on the master Routing Engine.
NSR is yes if VRRP nonstop active routing is enabled for the configured VRRP group.
RPD-NSR is yes if the routing options have been set to nonstop active routing.
vip [Link]
vip [Link]
vip [Link]
vip [Link]
vip [Link]
vip
fe80::200:5eff:fe00:1
vip 1000::3
vip
fe80::200:5eff:fe00:2
vip 2000::3
vip
fe80::200:5eff:fe00:3
vip 3000::3
vip
fe80::200:5eff:fe00:4
vip 4000::3
vip
fe80::200:5eff:fe00:5
vip 5000::3
Description Display status information about Virtual Router Redundancy Protocol (VRRP) tracked
routes and tracked interfaces.
Related • Configuring a Logical Interface to Be Tracked for a VRRP Group on page 263
Documentation
• Configuring a Route to Be Tracked for a VRRP Group on page 265
Output Fields Table 38 on page 522 lists the output fields for the show vrrp track command. Output
fields are listed in the approximate order in which they appear.
State Current operational state of the tracked interface: up or down. detail or summary
Speed Current operational speed, in bits per second, of the tracked interface. detail or summary
Incurred priority cost Operational priority cost incurred resulting from the state and speed of detail
this tracked interface. This cost is applied to the configured priority to
obtain the current priority cost.
NOTE: When the show vrrp nsr command is used on the backup Routing
Engine, it displays the current VRRP state on the master Routing Engine,
which is the future VRRP state for the backup Routing Engine. Do not use
the show vrrp nsr command on the master Routing Engine.
Current priority Current operational priority for being the VRRP master. detail or summary
Priority hold-time Minimum time interval, in seconds, between successive changes to the detail
current priority cost. Disabled indicates no minimum interval.
State State of route. Possible values are unknown, up, and down. detail or summary
Cost Priority cost. When the route state is not up, the cost will be deducted from detail or summary
the configured priority of the VRRP session.
Interface Name of the logical interface (for example, ge-0/0/1.0) on which the detail or summary
corresponding VRRP session is configured.
Sample Output
Track Int State Speed VRRP Int Group VR State Current prio
ge-0/0/2.0 up 1g ge-0/0/1.0 1 master 80
ge-0/0/8.0 up 1g ge-0/0/1.0 1 master 80
VR State: master
Current priority: 80, Configured priority: 100
Priority hold-time: disabled
The output for show vrrp track routes detail is the same as that for show vrrp track routes
summary.