Chapter 13
| Basic Administration Protocols
Ethernet Ring Protection Switching
–
429
–
c.
A ring node accepting an R-APS (FS) message, without any local
higher priority requests unblocks any blocked ring port. This action
subsequently unblocks the traffic channel over the RPL.
d.
The ring node accepting an R-APS (FS) message, without any local
higher priority requests stops transmission of R-APS messages.
e.
The ring node receiving an R-APS (FS) message flushes its FDB.
■
Protection switching on a forced switch request is completed when the
above actions are performed by each ring node. At this point, traffic
flows around the ring are resumed. From this point on the following
rules apply regarding processing of further forced switch commands:
■
While an existing forced switch request is present in a ring, any new
forced switch request is accepted, except on a ring node having a
prior local forced switch request. The ring nodes where further
forced switch commands are issued block the traffic channel and R-
APS channel on the ring port at which the forced switch was issued.
The ring node where the forced switch command was issued
transmits an R-APS message over both ring ports indicating FS. R-
APS (FS) messages are continuously transmitted by this ring node
while the local FS command is the ring
node’s
highest priority
command. As such, two or more forced switches are allowed in the
ring, which may inadvertently cause the segmentation of an ring. It
is the responsibility of the operator to prevent this effect if it is
undesirable.
Ring protection requests, commands and R-APS signals have the
priorities as specified in the following table.
Table 28: ERPS Request/State Priority
Request / State and Status
Type
Priority
Clear
local
highest
FS
local
|
R-APS (FS)
remote
|
local SF
*
local
|
local clear SF
local
|
R-APS (SF)
remote
|
R-APS (MS)
remote
|
MS
local
|
WTR Expires
local
|
WTR Running
local
|
WTB Expires
local
|
WTB Running
local
|
Summary of Contents for GEL-5261
Page 14: ...14 Contents Glossary 551 Index 559...
Page 26: ...26 Figures...
Page 30: ...30 Section I Getting Started...
Page 42: ...42 Section II Web Configuration IP Services on page 527...
Page 45: ...Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface 45 Figure 1 Dashboard...
Page 62: ...62 Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface...
Page 180: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 180...
Page 208: ...Chapter 8 Congestion Control Storm Control 208 Figure 121 Configuring Storm Control...
Page 228: ...228 Chapter 10 Quality of Service Attaching a Policy Map to a Port...
Page 332: ...Chapter 12 Security Measures ARP Inspection 332 Figure 207 Displaying the ARP Inspection Log...
Page 436: ...Chapter 13 Basic Administration Protocols LBD Configuration 436...
Page 488: ...488 Chapter 14 Multicast Filtering Filtering MLD Query Packets on an Interface...
Page 498: ...Chapter 15 IP Tools Address Resolution Protocol 498...
Page 517: ...517 Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 interface...
Page 542: ...540 Section III Appendices...
Page 560: ...Glossary 558...
Page 570: ...568 Index E062017 ST R01...