CN112104547B - Method and device for avoiding loop in EVPN multi-homing networking - Google Patents
Method and device for avoiding loop in EVPN multi-homing networking Download PDFInfo
- Publication number
- CN112104547B CN112104547B CN202010776964.0A CN202010776964A CN112104547B CN 112104547 B CN112104547 B CN 112104547B CN 202010776964 A CN202010776964 A CN 202010776964A CN 112104547 B CN112104547 B CN 112104547B
- Authority
- CN
- China
- Prior art keywords
- bypass
- label
- link
- vpn
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/18—Loop-free operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The application provides a method and a device for avoiding a loop in an EVPN multi-homing networking, wherein the method comprises the following steps: receiving a first network message sent by a far-end PE, wherein the first network message comprises a first VPN label of the first PE; according to the first VPN label, acquiring a local VPN example corresponding to the first VPN label, and acquiring a first output interface of the VPN example; and when determining that the first link corresponding to the first output interface fails, sending a second network message to the second PE through the bypass link, wherein the second network message comprises a bypass label of the second PE and a second VPN label of the second PE, so that the second PE determines that the second network message is sent through the bypass link for the first PE belonging to the same multi-attribution group according to the bypass label of the second PE, and discards the second network message when determining that the corresponding second link fails according to the second VPN label.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for avoiding a loop in an EVPN multi-homing networking.
Background
In an Ethernet Virtual Private Network (EVPN) multi-homing Network, when a link fails, a bypass (bypass) link technology is usually used to achieve the purpose of traffic interruption. As shown in fig. 1, fig. 1 is a schematic diagram of an EVPN multi-homing networking. After a data message sent by a user Edge (CE) 2 reaches PE3, PE3 encapsulates the data message, and then forwards the encapsulated network message to an operator Edge (PE) 1 or PE2 through an equivalent path between PE1 and PE2, and any PE of PE1 and PE2 decapsulates the network message and sends the data message to CE 1. When the link between PE1 and CE1 is down, the network packet sent by PE3 to PE1 will pass through PE2 via the protection link between PE1 and PE2, and then reach CE 1.
As described above, when the link between CE1 and PE1 and PE2 is down at the same time, or the failure of CE1 causes the link between CE1 and PE1 and PE2 to be down at the same time, that is, CE1 is off-line. Because the positions of PE1 and PE2 are symmetrical and a bypass link exists between PE1 and PE2, a network message sent by PE3 will be forwarded between PE1 and PE2 without stop, and a short loop occurs until one of PE1 and PE2 cancels its own issued EVPN route.
In order to solve the aforementioned problem of the short loop occurring between PE1 and PE2, two tags are usually allocated to each EVPN instance configured in the PE currently, where one tag identifies a network packet sent by a far-end network side (e.g., PE3), and the other tag identifies a network packet sent by a bypass link side. Therefore, after the multi-homing member PE in the multi-homing group receives the network message, the source of the network message can be distinguished through different labels, and for the network message sent from the bypass link side, when the link between the PE and the CE is down, the network message does not return through the bypass link any more, so that a loop is avoided.
However, this approach, while avoiding the loop formation, has the following drawbacks: 1) the bypass tag used for identifying the bypass link side needs to be configured independently, and if an independent bypass tag is not configured, the problem of the transient loop can occur; 2) if an independent bypass tag is configured, multiple tags need to be configured for each EVPN instance in the PE, and thus, the problem of excessive number of application tags may also occur.
Disclosure of Invention
In view of this, the present application provides a method and an apparatus for avoiding a loop in an EVPN multi-homing networking, so as to solve the problem in the prior art that a PE cannot identify a network packet source without configuring an independent bypass tag, which results in a transient loop in networking, and the problem that the PE configures an independent bypass tag, which results in an excessive number of tags.
In a first aspect, the present application provides a method for avoiding a loop in an EVPN multihoming networking, where the method is applied to a first PE, the first PE is in a multihoming networking, the multihoming networking further includes a CE and a second PE, the CE is connected with the first PE and the second PE through a first link and a second link, respectively, the first PE is connected with the second PE through a bypass link, and the method includes:
receiving a first network message sent by a far-end PE, wherein the first network message comprises a first VPN label of the first PE;
acquiring a local VPN instance corresponding to the first VPN label according to the first VPN label, and acquiring a first output interface of the VPN instance;
when determining that the first link corresponding to the first output interface fails, sending a second network message to the second PE through the bypass link, wherein the second network message comprises a bypass label of the second PE and a second VPN label of the second PE, so that the second PE determines that the second network message belongs to the same multi-attribution group according to the bypass label of the second PE, the first PE sends the second network message through the bypass link, and the second PE discards the second network message when determining that the corresponding second link fails according to the second VPN label.
In a second aspect, the present application provides a device for avoiding a loop in EVPN multi-homing networking, the device is applied to a first PE, the first PE is in the multi-homing networking, the multi-homing networking further includes a CE and a second PE, the CE is respectively connected with the first PE and the second PE through a first link and a second link, the first PE with be connected through a bypass link between the second PE, the device includes:
a receiving unit, configured to receive a first network packet sent by a far-end PE, where the first network packet includes a first VPN label of the first PE;
an obtaining unit, configured to obtain, according to the first VPN label, a local VPN instance corresponding to the first VPN label, and obtain a first output interface of the VPN instance;
and the sending unit is used for sending a second network message to the second PE through the bypass link when determining that the first link corresponding to the first output interface fails, wherein the second network message comprises a bypass label of the second PE and a second VPN label of the second PE, so that the second PE determines that the second network message belongs to the same multi-attribution group according to the bypass label of the second PE, the first PE sends the second network message through the bypass link, and the second network message is discarded when determining that the corresponding second link fails according to the second VPN label.
In a third aspect, the present application provides a network device comprising a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor, the processor being caused by the machine-executable instructions to perform the method provided by the first aspect of the present application.
Therefore, by applying the method and the device for avoiding the loop in the EVPN multi-homing networking, the first PE obtains the corresponding local VPN instance and the first outgoing interface of the VPN instance according to the first VPN label after receiving the first network packet carrying the first VPN label of the first PE. When the first PE determines that the link corresponding to the first output interface fails, a second network message carrying a bypass label of the second PE and a second VPN label of the second PE is sent to the second PE through the bypass link, so that the second PE determines that the second network message is sent through the bypass link for the first PE belonging to the same multi-attribution group according to the bypass label of the second PE, and discards the second network message when determining that the corresponding second link fails according to the second VPN label. In the process of forwarding the network message, the PE can determine the sender of the network message through the bypass label, so that the problems that in the prior art, the PE is not provided with an independent bypass label and cannot identify the source of the network message, so that a short loop in networking is caused, and the PE is provided with an independent bypass label and the number of labels is too large can be solved.
Drawings
Fig. 1 is a schematic diagram of an EVPN multi-homing networking;
fig. 2 is a flowchart of a method for avoiding a loop in EVPN multihoming networking according to an embodiment of the present application;
fig. 3 is a format diagram of a field where a bypass tag is carried in a route advertisement packet according to an embodiment of the present application;
fig. 4 is a diagram of an apparatus structure for avoiding a loop in an EVPN multihoming networking according to an embodiment of the present application;
fig. 5 is a hardware structure diagram of a network device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the corresponding listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The method for avoiding loops in EVPN multihoming networking provided in the embodiments of the present application is described in detail below. Referring to fig. 2, fig. 2 is a flowchart of a method for avoiding loops in EVPN multihoming networking according to an embodiment of the present application. The method is applied to a first PE. The first PE is in a multi-homing network, the multi-homing network further comprises a CE and a second PE, the CE is a multi-homing device, namely the CE is respectively connected with the first PE and the second PE through a first link and a second link, and the first PE and the second PE belong to the same multi-homing group. The first PE and the second PE are connected through a bypass link. The method for avoiding the loop in the EVPN multi-homing networking provided by the embodiment of the application can comprise the following steps.
Specifically, as shown in fig. 1. The networking includes CE1, CE2, PE1, PE2, and PE 3. CE1 is a multihomed device and is connected to PE1 and PE2 via a first link and a second link, respectively. PE1 and PE2 are connected through a bypass link, and PE1 and PE2 belong to multi-homing members of the same multi-homing group. PE3 is connected to PE1 and PE2 via a tunnel (e.g., a Virtual eXtensible Local Area Network (VXLAN) tunnel).
In the embodiment of the present application, PE1 is used as the first PE for explanation. It will be appreciated that other multi-homed members in the same multi-homed group as PE1 also perform the same process.
In this step, after receiving the data packet sent by the CE2, the far-end PE (i.e., PE3) encapsulates the data packet, so as to obtain a first network packet. PE3 forwards to PE1 via a tunnel (of course, it may also forward to PE2, and PE2 performs the same steps as PE 1). After receiving the first Network packet sent by PE3, PE1 obtains a first Virtual Private Network (VPN) label of the first PE from the first Network packet.
Further, before this step, a process is included in which the first PE starts a bypass protection function and assigns its own bypass tag.
Specifically, PE1 receives a configuration instruction input by a user, where the configuration instruction is used to instruct a first PE to open a bypass protection function. According to the configuration instruction, PE1 allocates a bypass tag to its own device, where the bypass tag is used to identify that the sender of the network packet carrying the bypass tag is a multi-homing member in the multi-homing group.
Further, before this step, a process of mutually advertising EVPN routes by PEs within the group is also included.
Specifically, after a PE in the networking joins the EVPN multi-homing group and establishes peers with other PEs in the networking, EVPN routes are generated and advertised to each other. For example, PE2 generates a first route advertisement message that includes the bypass tag of PE2 and the ethernet segment ES information. After receiving the first route advertisement packet sent by PE2, PE1 obtains the bypass tag and Ethernet Segment (ES) information of PE2 from the first route advertisement packet. PE1 determines the value of ES information. If the value of ES information is a first value (e.g., the first value is 0), PE1 saves the bypass tag of PE 2.
In the embodiment of the present application, the bypass tag of PE2 is allocated by PE2, and the specific allocation process may refer to the foregoing process of PE1 allocating its own bypass tag. The ES information is specifically a value of Ethernet Segment Identifier (ESI), and when the ESI is 0, it indicates that the ES information is not related to any ES link but only to a device.
It is understood that PE1 also generates a second route advertisement message that includes the bypass tag of PE1 and ES information. After receiving the second route advertisement packet sent by PE1, PE2 obtains the bypass tag and ES information of PE1 from the second route advertisement packet. PE2 determines the value of ES information. If the value of ES information is a first value (e.g., the first value is 0), PE2 saves the bypass tag of PE 1.
In this embodiment of the present application, the first Route advertisement packet and the second Route advertisement packet may specifically be EVPN 1-type routes (i.e., Ethernet Auto-discovery routes), where the Route advertisement packet adds an Extended Community attribute (i.e., BYPASS Extended Community) field, and the Extended Community attribute field is used for carrying a BYPASS label of the PE. As shown in fig. 3, fig. 3 is a format diagram of a field where a bypass tag is carried in a route advertisement packet according to the embodiment of the present application.
Wherein the extended community attribute includes a Type (Type) field that can be set to 0x06, a Sub-Type (Sub-Type) field that can be set to 0x05, a Reserved (Reserved) field, and a Bypass Label (Bypass Label) field.
Further, EVPN 1-type routes specifically include EVPN AD per ES routes and EVPN AD per EVI routes. The EVPN1 type route carrying the bypass label in the foregoing is specifically an EVPN AD per ES route, or is called a special EVPN AD per ES route.
It is to be appreciated that each PE (e.g., PE1) issues two EVPN 1-like routes to the outside (i.e., PE2, PE3) after establishing peers with other PEs within the networking. Namely EVPN AD per ES routing and EVPN AD per EVI routing. Where EVPN AD per ES routing is used to advertise its ES link state. The EVPN AD per EVI route is used for advertising own Virtual Private Wire Service (VPWS) VPN information. Both routes include a Route Identifier (RD), an Ethernet Segment Identifier (ESI), an Ethernet Tag id (Ethernet Tag id), and an MPLS label.
In the EVPN AD per ES route, the RD field is a BGP route site flag, which is set to a local configuration value, the ESI field is set to a PE ES link value, the ethernet flag ID is set to 0 xfffffffff, and the MPLS label field is set to 0. In the EVPN AD per EVI route, an RD field is a BGP routing site mark and is set as a local configuration value, an ESI field is set as an ES link value of a PE, an Ethernet mark ID is set as site information of the PE, and an MPLS label field is set as a VPN label of the PE.
After PE1 externally announces an EVPN AD per ES route, PE2 and PE3 acquire and store a bypass label of PE1 after receiving the route; after the PE1 externally advertises the EVPN AD per EVI route, and after receiving the route, the PE2 and the PE3 acquire and store the first VPN label of the PE1 from the route.
Thus, in this step, after receiving the data packet sent by the CE2, the PE3 determines that the next hop is PE1 or PE2 according to the destination IP carried in the data packet. If PE3 selects the next hop to be PE1, PE3 encapsulates the stored first VPN label before the data packet when encapsulating the first network packet.
It is understood that PE3 also encapsulates an ethernet Header (ETH Header) and a TUNNEL LABEL (TUNNEL LABEL) together before the first VPN LABEL during the encapsulation process.
Similarly, PE2 also issues the two EVPN1 routes to the outside. After receiving the routes, PE1 and PE3 obtain and store the second VPN label of PE 2.
In this embodiment of the present application, after PE1 and PE2 assign their own bypass tags, they also carry bypass tags through a special EVPN AD per ES route, so that a PE receiving the EVPN AD per ES route stores the bypass tags, for example, PE2 stores the bypass tag of PE1, and PE1 stores the bypass tag of PE 2.
The special EVPN AD per ES route further includes ES information, which is specifically the value of ESI. The special EVPN AD per ES route also includes RT, and the value of the RT is the RT aggregation of VPN examples in PE.
Note that the ESI value is 0, which means that the ESI value is independent of any ES link and is only device-dependent. And the PE receiving the special EVPN AD per ES route determines that the EVPN AD per ES route is a route for carrying a bypass label when judging that the ESI value is 0, and the PE stores the bypass label.
Specifically, after PE1 obtains the first VPN label from the first network packet, PE1 finds the local VPN instance corresponding to the first VPN label according to the first VPN label, and obtains the first outgoing interface of the VPN instance.
In this embodiment of the present application, a link corresponding to the first outgoing interface is a first link.
Specifically, when PE1 determines that the first link failed, PE1 obtains the bypass tag of PE2 and the second VPN tag of PE2 locally. PE1 generates a second network packet that includes the bypass tag of PE2 and the second VPN tag. PE1 sends the second network packet to PE2 via the bypass link.
It is understood that PE1 encapsulates the second VPN label and the bypass label of PE2 after the tunnel label before the data packet in the process of generating the second network packet.
After receiving the second network packet, PE2 obtains the bypass tag and the second VPN tag of PE2 from the second network packet. According to the bypass label of PE2, PE2 determines that the second network packet is sent by a multihomed member in the same multihomed group as the PE2, that is, PE2 determines that the second network packet is sent by a bypass link for PE1 belonging to the same multihomed group. Meanwhile, the PE2 finds the local VPN instance corresponding to the second VPN label according to the second VPN label, and obtains the second outgoing interface of the VPN instance.
In this embodiment of the application, the link corresponding to the second outgoing interface is the second link.
When PE2 determines that the second link failed, PE2 discards the second network packet.
Therefore, by applying the method for avoiding the loop in the EVPN multi-homing networking provided by the present application, after receiving the first network packet carrying the first VPN label of the first PE, the first PE obtains the corresponding local VPN instance and the first outgoing interface of the VPN instance according to the first VPN label. When the first PE determines that the link corresponding to the first output interface fails, a second network message carrying a bypass label of the second PE and a second VPN label of the second PE is sent to the second PE through the bypass link, so that the second PE determines that the second network message is sent through the bypass link for the first PE belonging to the same multi-attribution group according to the bypass label of the second PE, and discards the second network message when determining that the corresponding second link fails according to the second VPN label. In the process of forwarding the network message, the PE can determine the sender of the network message through the bypass label, so that the problems that in the prior art, the PE is not provided with an independent bypass label and cannot identify the source of the network message, so that a short loop in networking is caused, and the PE is provided with an independent bypass label and the number of labels is too large can be solved.
Optionally, PE2 also performs the process of steps 210-230 when the first network packet sent by PE3 is forwarded to PE 2.
That is, when PE2 determines that the second link corresponding to the second egress interface fails, the third network packet is sent to PE1 through the bypass link. After receiving the third network packet, PE1 obtains the bypass tag and the first VPN tag of PE1 from the third network packet. According to the bypass label of PE1, PE1 determines that the third network packet is sent by a multihomed member in the same multihomed group as the third network packet, that is, PE1 determines that the third network packet is sent by a bypass link for PE2 belonging to the same multihomed group. Meanwhile, the PE1 finds the local VPN instance corresponding to the first VPN label according to the first VPN label, and obtains the first output interface of the VPN instance.
In this embodiment, a link corresponding to the first outgoing interface is a first link.
When PE1 determines that the first link failed, PE1 discards the third network packet.
Based on the same inventive concept, the embodiment of the application also provides a device for avoiding the EVPN multi-homing networking loop, which corresponds to the method for avoiding the EVPN multi-homing networking loop. Referring to fig. 4, fig. 4 is a structure diagram of an apparatus for avoiding a loop in an EVPN multi-homing networking according to an embodiment of the present disclosure, where the apparatus is applied to a first PE, the first PE is in the multi-homing networking, the multi-homing networking further includes a CE and a second PE, the CE is connected to the first PE and the second PE through a first link and a second link, respectively, and the first PE is connected to the second PE through a bypass link, and the apparatus includes:
a receiving unit 410, configured to receive a first network packet sent by a far-end PE, where the first network packet includes a first VPN label of the first PE;
an obtaining unit 420, configured to obtain, according to the first VPN label, a local VPN instance corresponding to the first VPN label, and obtain a first output interface of the VPN instance;
a sending unit 430, configured to send, when it is determined that the first link corresponding to the first egress interface fails, a second network packet to the second PE through the bypass link, where the second network packet includes a bypass tag of the second PE and a second VPN tag of the second PE, so that the second PE determines, according to the bypass tag of the second PE, that the second network packet is sent through the bypass link for the first PE belonging to the same multi-homing group, and discards the second network packet when it determines that the corresponding second link fails according to the second VPN tag.
Optionally, the receiving unit 410 is further configured to receive a configuration instruction input by a user, where the configuration instruction is used to instruct the first PE to start a bypass protection function;
the device further comprises: and an allocating unit (not shown in the figure) configured to allocate a bypass tag to the first PE according to the configuration instruction, where the bypass tag is used to identify that a sender of the network packet bearing the bypass tag is a multi-homing member in a multi-homing group.
Optionally, the receiving unit 410 is further configured to receive a first route advertisement packet sent by the second PE, where the first route advertisement packet includes a bypass tag of the second PE and ethernet segment ES information;
the device further comprises: a holding unit (not shown in the figure) for holding the bypass tag of the second PE when the value of the ES information is the first value.
Optionally, the receiving unit 410 is further configured to receive a third network packet sent by the second PE, where the third network packet includes a bypass tag of the first PE and the first VPN tag;
the obtaining unit 420 is further configured to obtain, according to the first VPN label, a local VPN instance corresponding to the first VPN label, and obtain the first output interface;
the device further comprises: a determining unit (not shown in the figure), configured to determine, according to the bypass tag of the first PE, that the third network packet is sent by the second PE;
a discarding unit (not shown in the figure), configured to discard the third network packet when it is determined that the first link corresponding to the first egress interface fails.
Optionally, the sending unit 430 is further configured to send a second route advertisement packet to the second PE, where the second route advertisement packet includes the bypass tag of the first PE and the ES information, so that when the second PE determines that the value of the ES information is the first value, the bypass tag of the first PE is stored.
Optionally, the route advertisement packet is an EVPN 1-type route, and the route advertisement packet includes an extended community attribute field, where the extended community attribute field carries a bypass tag of the PE.
Therefore, by applying the device for avoiding the loop in the EVPN multi-homing networking provided by the present application, after receiving the first network packet carrying the first VPN label of the first PE, the device acquires the corresponding local VPN instance and the first outgoing interface of the VPN instance according to the first VPN label. When the first PE determines that the link corresponding to the first output interface fails, the device sends a second network message carrying a bypass label of the second PE and a second VPN label of the second PE to the second PE through the bypass link, so that the second PE determines that the second network message is sent through the bypass link for the first PE belonging to the same multi-attribution group according to the bypass label of the second PE, and discards the second network message when determining that the corresponding second link fails according to the second VPN label. Because the sending party of the network message can be determined by the bypass label in the process of forwarding the network message by the PE, the problem that in the prior art, the source of the network message cannot be identified because the PE is not provided with the independent bypass label, so that a transient loop in networking is caused can be solved, and the problem that the PE is provided with the independent bypass label and the number of labels is too large is caused.
Based on the same inventive concept, the embodiment of the present application further provides a network device, as shown in fig. 5, including a processor 510, a transceiver 520, and a machine-readable storage medium 530, where the machine-readable storage medium 530 stores machine-executable instructions capable of being executed by the processor 510, and the processor 510 is caused by the machine-executable instructions to perform the method for avoiding loops in EVPN multi-homing networking provided by the embodiment of the present application. The aforementioned EVPN multihoming networking loop avoidance apparatus shown in fig. 5 may be implemented by using a hardware structure of a network device shown in fig. 5.
The computer-readable storage medium 530 may include a Random Access Memory (RAM) or a Non-volatile Memory (NVM), such as at least one disk Memory. Alternatively, the computer-readable storage medium 530 may also be at least one storage device located remotely from the processor 510.
The Processor 510 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
In an embodiment of the present application, the processor 510, by reading machine executable instructions stored in the machine readable storage medium 530, is caused by the machine executable instructions to implement the method for avoiding a loop in EVPN multihoming networking, which is described in the foregoing embodiment of the present application, performed by the processor 510 itself and the call transceiver 520.
Additionally, embodiments of the present application provide a machine-readable storage medium 530, the machine-readable storage medium 530 storing machine executable instructions that, when invoked and executed by the processor 510, cause the processor 510 itself and the invoking transceiver 520 to perform the aforementioned method for EVPN multihoming networking loop avoidance described in embodiments of the present application.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
For the EVPN multihoming networking loop avoidance apparatus and the machine-readable storage medium embodiment, since the content of the related method is substantially similar to the foregoing method embodiment, the description is relatively simple, and the relevant points can be referred to the partial description of the method embodiment.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (12)
1. The method for avoiding the loop in the EVPN multi-homing networking is characterized in that the method is applied to a first PE, the first PE is in the multi-homing networking, the multi-homing networking further comprises a CE and a second PE, the CE is respectively connected with the first PE and the second PE through a first link and a second link, and the first PE is connected with the second PE through a bypass link, and the method comprises the following steps:
receiving a first network message sent by a far-end PE, wherein the first network message comprises a first VPN label of the first PE;
acquiring a local VPN instance corresponding to the first VPN label according to the first VPN label, and acquiring a first output interface of the VPN instance;
when determining that the first link corresponding to the first output interface fails, sending a second network message to the second PE through the bypass link, wherein the second network message comprises a bypass label of the second PE and a second VPN label of the second PE, so that the second PE determines that the second network message belongs to the same multi-attribution group according to the bypass label of the second PE, the first PE sends the second network message through the bypass link, and the second PE discards the second network message when determining that the corresponding second link fails according to the second VPN label.
2. The method according to claim 1, wherein before receiving the first network packet sent by the far-end PE, the method further comprises:
receiving a configuration instruction input by a user, wherein the configuration instruction is used for indicating the first PE to open a bypass protection function;
and according to the configuration instruction, allocating a bypass label to the first PE, wherein the bypass label is used for identifying that a sender of the network message bearing the bypass label is a multi-homing member in a multi-homing group.
3. The method according to claim 1, wherein before receiving the first network packet sent by the far-end PE, the method further comprises:
receiving a first route notification message sent by the second PE, wherein the first route notification message comprises a bypass label of the second PE and Ethernet segment ES information;
and when the value of the ES information is a first value, saving the bypass label of the second PE.
4. The method of claim 1, further comprising:
receiving a third network message sent by the second PE, wherein the third network message comprises a bypass label of the first PE and the first VPN label;
acquiring a local VPN instance corresponding to the first VPN label according to the first VPN label, and acquiring the first output interface;
determining that the third network message is sent by the second PE according to the bypass label of the first PE;
and when the first link corresponding to the first outgoing interface is determined to be in fault, discarding the third network message.
5. The method of claim 1, further comprising:
and sending a second route notification message to the second PE, wherein the second route notification message comprises the bypass label of the first PE and the ES information, so that the bypass label of the first PE is stored when the second PE determines that the value of the ES information is a first value.
6. The method according to any of claims 3 or 5, wherein the first route advertisement packet and the second route advertisement packet are both EVPN 1-type routes, and wherein the first route advertisement packet and the second route advertisement packet each include an extended community attribute field, and wherein the extended community attribute field carries a bypass label of the PE.
7. The utility model provides a device of EVPN multi-homing network avoids loop, its characterized in that, the device is applied to first PE, first PE is in multi-homing network, multi-homing network still includes CE and second PE, CE respectively through first link, second link with first PE, second PE connect, first PE with connect through bypass link between the second PE, the device includes:
a receiving unit, configured to receive a first network packet sent by a far-end PE, where the first network packet includes a first VPN label of the first PE;
an obtaining unit, configured to obtain, according to the first VPN label, a local VPN instance corresponding to the first VPN label, and obtain a first output interface of the VPN instance;
and the sending unit is used for sending a second network message to the second PE through the bypass link when determining that the first link corresponding to the first output interface fails, wherein the second network message comprises a bypass label of the second PE and a second VPN label of the second PE, so that the second PE determines that the second network message belongs to the same multi-attribution group according to the bypass label of the second PE, the first PE sends the second network message through the bypass link, and the second network message is discarded when determining that the corresponding second link fails according to the second VPN label.
8. The apparatus according to claim 7, wherein the receiving unit is further configured to receive a configuration instruction input by a user, where the configuration instruction is used to instruct the first PE to start a bypass protection function;
the device further comprises: and the allocation unit is used for allocating a bypass label to the first PE according to the configuration instruction, wherein the bypass label is used for identifying that a sender of the network message bearing the bypass label is a multi-homing member in a multi-homing group.
9. The apparatus according to claim 7, wherein the receiving unit is further configured to receive a first route advertisement packet sent by the second PE, where the first route advertisement packet includes a bypass tag and ethernet segment ES information of the second PE;
the device further comprises: and the storage unit is used for storing the bypass label of the second PE when the value of the ES information is a first value.
10. The apparatus according to claim 7, wherein the receiving unit is further configured to receive a third network packet sent by the second PE, where the third network packet includes a bypass tag of the first PE and the first VPN tag;
the obtaining unit is further configured to obtain, according to the first VPN label, a local VPN instance corresponding to the first VPN label, and obtain the first outgoing interface;
the device further comprises: a determining unit, configured to determine, according to the bypass tag of the first PE, that the third network packet is sent by the second PE;
and a discarding unit, configured to discard the third network packet when it is determined that the first link corresponding to the first egress interface fails.
11. The apparatus of claim 7, wherein the sending unit is further configured to send a second route advertisement packet to the second PE, where the second route advertisement packet includes a bypass tag of the first PE and ES information, so that when the second PE determines that the value of the ES information is a first value, the bypass tag of the first PE is saved.
12. The apparatus according to any of claims 9 or 11, wherein the first route advertisement packet and the second route advertisement packet are both EVPN 1-type routes, and wherein the first route advertisement packet and the second route advertisement packet each include an extended community attribute field, and wherein the extended community attribute field carries a bypass label of the PE.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010776964.0A CN112104547B (en) | 2020-08-05 | 2020-08-05 | Method and device for avoiding loop in EVPN multi-homing networking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010776964.0A CN112104547B (en) | 2020-08-05 | 2020-08-05 | Method and device for avoiding loop in EVPN multi-homing networking |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112104547A CN112104547A (en) | 2020-12-18 |
CN112104547B true CN112104547B (en) | 2022-07-12 |
Family
ID=73749555
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010776964.0A Active CN112104547B (en) | 2020-08-05 | 2020-08-05 | Method and device for avoiding loop in EVPN multi-homing networking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112104547B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112887139B (en) * | 2021-01-22 | 2022-05-27 | 新华三信息安全技术有限公司 | Message processing method and device |
CN113452606B (en) * | 2021-05-18 | 2023-12-26 | 新华三信息安全技术有限公司 | Communication method and device |
CN113438174B (en) * | 2021-06-15 | 2022-07-01 | 新华三技术有限公司 | Message forwarding method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005122490A1 (en) * | 2004-06-11 | 2005-12-22 | Huawei Technologies Co., Ltd. | A method for implementing virtual private network |
WO2013182061A1 (en) * | 2012-06-06 | 2013-12-12 | 华为技术有限公司 | Network label distribution method, device and system |
CN105099846A (en) * | 2014-04-30 | 2015-11-25 | 华为技术有限公司 | Method of transmitting data messages and provider edge (PE) devices |
CN108156067A (en) * | 2018-01-07 | 2018-06-12 | 何顺民 | It is a kind of to realize the method and system based on Ethernet Virtual Private Network |
CN109951371A (en) * | 2019-03-29 | 2019-06-28 | 新华三技术有限公司 | Data forwarding method and device |
CN110324226A (en) * | 2018-03-30 | 2019-10-11 | 瞻博网络公司 | Improve the aliasing behavior of more host site flows in ether Virtual Private Network network |
CN110661701A (en) * | 2018-06-30 | 2020-01-07 | 华为技术有限公司 | Communication method, equipment and system for avoiding loop |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10536285B2 (en) * | 2018-01-25 | 2020-01-14 | Juniper Networks, Inc. | Multicast join message processing by multi-homing devices in an ethernet VPN |
-
2020
- 2020-08-05 CN CN202010776964.0A patent/CN112104547B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005122490A1 (en) * | 2004-06-11 | 2005-12-22 | Huawei Technologies Co., Ltd. | A method for implementing virtual private network |
WO2013182061A1 (en) * | 2012-06-06 | 2013-12-12 | 华为技术有限公司 | Network label distribution method, device and system |
CN105099846A (en) * | 2014-04-30 | 2015-11-25 | 华为技术有限公司 | Method of transmitting data messages and provider edge (PE) devices |
CN108156067A (en) * | 2018-01-07 | 2018-06-12 | 何顺民 | It is a kind of to realize the method and system based on Ethernet Virtual Private Network |
CN110324226A (en) * | 2018-03-30 | 2019-10-11 | 瞻博网络公司 | Improve the aliasing behavior of more host site flows in ether Virtual Private Network network |
CN110661701A (en) * | 2018-06-30 | 2020-01-07 | 华为技术有限公司 | Communication method, equipment and system for avoiding loop |
CN109951371A (en) * | 2019-03-29 | 2019-06-28 | 新华三技术有限公司 | Data forwarding method and device |
Non-Patent Citations (1)
Title |
---|
防止双归属组网路由环路方法的研究;陈佑建;《科技资讯》;20150203(第04期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112104547A (en) | 2020-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11533249B2 (en) | Route processing method and apparatus, and data transmission method and apparatus | |
CN101645836B (en) | Packet transmission method and device in multi-protocol label switching network | |
CN112104547B (en) | Method and device for avoiding loop in EVPN multi-homing networking | |
CN112087386B (en) | Message processing method, device and system | |
US20230137778A1 (en) | Packet Sending Method and Apparatus, Network Device, System, and Storage Medium | |
WO2015192501A1 (en) | Address information publishing method and apparatus | |
US9813332B2 (en) | Method, device and system for establishing label switched path | |
CN110932895B (en) | Message forwarding method and device for network slice | |
CN112887139B (en) | Message processing method and device | |
CN111740907A (en) | Message transmission method, device, equipment and machine readable storage medium | |
US11929923B2 (en) | Packet transmission method and apparatus | |
CN112511427A (en) | Segment routing service processing method and device, routing equipment and storage medium | |
CN114666267A (en) | Data processing method, equipment and storage medium of Ethernet virtual private network | |
US20230198885A1 (en) | Network layer reachable information transmission method, system, and apparatus and network device | |
CN113328937B (en) | Method and device for realizing distributed aggregation | |
US12058027B2 (en) | Packet transmission method, correspondence obtaining method, apparatus, and system | |
US10862708B2 (en) | Interoperability between separate and collapsed service-layer and transport-layer tunnels | |
CN109218258B (en) | Data packet transmission method and gateway equipment | |
CN113542126B (en) | Generalized SRv6 full-path compression method and device | |
CN113452606A (en) | Communication method and device | |
US20240244002A1 (en) | Route advertisement method, packet forwarding method, device, and system | |
US11929922B2 (en) | Routing information processing method and apparatus | |
US20240214310A1 (en) | Route advertisement method, network device, and computer storage medium | |
WO2023125774A1 (en) | Vxlan packet transmission method, network device, and system | |
CN115460140A (en) | Network intercommunication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230627 Address after: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province Patentee after: H3C INFORMATION TECHNOLOGY Co.,Ltd. Address before: 310052 Changhe Road, Binjiang District, Hangzhou, Zhejiang Province, No. 466 Patentee before: NEW H3C TECHNOLOGIES Co.,Ltd. |
|
TR01 | Transfer of patent right |