
C
HAPTER
14
| Basic Administration Protocols
Ethernet Ring Protection Switching
– 532 –
■
Only one RPL owner can be configured on a ring. The owner
blocks traffic on the RPL during Idle state, and unblocks it during
Protection state (that is, when a signal fault is detected on the
ring or the protection state is enabled with the Forced Switch or
Manual Switch commands on the Configure Operation page).
■
The east and west connections to the ring must be specified for
all ring nodes. When this switch is configured as the RPL owner,
the west ring port is automatically set as being connected to the
RPL.
■
RPL Neighbor
– Specifies a ring node to be the RPL neighbor.
■
The RPL neighbor node, when configured, is a ring node
adjacent to the RPL that is responsible for blocking its end of the
RPL under normal conditions (i.e., the ring is established and no
requests are present in the ring) in addition to the block at the
other end by the RPL Owner Node. The RPL neighbor node may
participate in blocking or unblocking its end of the RPL, but is
not responsible for activating the reversion behavior.
■
Only one RPL owner can be configured on a ring. If the switch is
set as the RPL owner for an ERPS domain, the west ring port is
set as one end of the RPL. If the switch is set as the RPL
neighbor for an ERPS domain, the east ring port is set as the
other end of the RPL.
■
The east and west connections to the ring must be specified for
all ring nodes. When this switch is configured as the RPL
neighbor, the east ring port is set as being connected to the RPL.
■
Note that is not mandatory to declare a RPL neighbor.
◆
Revertive
– Sets the method of recovery to Idle State through
revertive or non-revertive mode. (Default: Enabled)
■
Revertive behavior allows the switch to automatically return the RPL
from Protection state to Idle state through the exchange of protocol
messages.
Non-revertive behavior for Protection, Forced Switch (FS), and
Manual Switch (MS) states are basically the same. Non-revertive
behavior requires the RPL to be restored from Protection state to
Idle state using the Clear command (Configure Operation page).
■
Recovery for Protection Switching – A ring node that has one or
more ring ports in an SF (Signal Fail) condition, upon detecting the
SF condition cleared, keeps at least one of its ring ports blocked for
the traffic channel and for the R-APS channel, until the RPL is
blocked as a result of ring protection reversion, or until there is
another higher priority request (e.g., an SF condition) in the ring.
A ring node that has one ring port in an SF condition and detects
the SF condition cleared, continuously transmits the R-APS (NR – no
request) message with its own Node ID as the priority information
Содержание ECS4660-28F
Страница 1: ...Management Guide www edge core com ECS4660 28F Layer 3 Gigabit Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 12: ...ABOUT THIS GUIDE 12...
Страница 64: ...CONTENTS 64...
Страница 90: ...TABLES 90...
Страница 92: ...SECTION I Getting Started 92...
Страница 122: ...SECTION II Web Configuration 122 Multicast Routing on page 825...
Страница 148: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 148...
Страница 224: ...CHAPTER 5 Interface Configuration VLAN Trunking 224 Figure 68 Configuring VLAN Trunking...
Страница 262: ...CHAPTER 6 VLAN Configuration Configuring VLAN Translation 262...
Страница 304: ...CHAPTER 9 Congestion Control Automatic Traffic Control 304...
Страница 340: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 340...
Страница 452: ...CHAPTER 13 Security Measures DHCP Snooping 452...
Страница 740: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 740...
Страница 866: ...CHAPTER 21 Multicast Routing Configuring PIMv6 for IPv6 866...
Страница 882: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 882...
Страница 1024: ...CHAPTER 26 Remote Monitoring Commands 1024...
Страница 1030: ...CHAPTER 27 Flow Sampling Commands 1030...
Страница 1088: ...CHAPTER 28 Authentication Commands PPPoE Intermediate Agent 1088...
Страница 1162: ...CHAPTER 29 General Security Measures Configuring Port based Traffic Segmentation 1162...
Страница 1186: ...CHAPTER 30 Access Control Lists ACL Information 1186...
Страница 1214: ...CHAPTER 31 Interface Commands Transceiver Threshold Configuration 1214...
Страница 1238: ...CHAPTER 33 Port Mirroring Commands RSPAN Mirroring Commands 1238...
Страница 1258: ...CHAPTER 34 Congestion Control Commands Automatic Traffic Control Commands 1258...
Страница 1270: ...CHAPTER 36 UniDirectional Link Detection Commands 1270...
Страница 1276: ...CHAPTER 37 Address Table Commands 1276...
Страница 1336: ...CHAPTER 39 ERPS Commands 1336...
Страница 1386: ...CHAPTER 40 VLAN Commands Configuring Voice VLANs 1386...
Страница 1406: ...CHAPTER 41 Class of Service Commands Priority Commands Layer 3 and 4 1406...
Страница 1424: ...CHAPTER 42 Quality of Service Commands 1424...
Страница 1536: ...CHAPTER 43 Multicast Filtering Commands MLD Proxy Routing 1536...
Страница 1602: ...CHAPTER 45 CFM Commands Delay Measure Operations 1602...
Страница 1624: ...CHAPTER 47 Domain Name Service Commands 1624...
Страница 1646: ...CHAPTER 48 DHCP Commands DHCP Server 1646...
Страница 1974: ...SECTION IV Appendices 1974...
Страница 1980: ...APPENDIX A Software Specifications Management Information Bases 1980...
Страница 2020: ...ECS4660 28F E102013 ST R03 149100000140A...