The (Unofficial) CCNP-SP Study Guide
  • About
    • About the Author
    • About This Study Guide
  • MPLS
    • LDP
      • LDP Transport Address
      • LDP Conditional Advertisement
      • LDP Authentication
      • LDP/IGP Sync
      • LDP Session Protection
    • MPLS-TE
      • MPLS-TE Basics, Pt. 1 (TED)
      • MPLS-TE Basics, Pt.2 (RSVP)
      • MPLS-TE Basics, Pt.3 (CSPF)
      • MPLS-TE Basics, Pt.4 (Routing)
      • MPLS-TE Fast Reroute (FRR)
      • MPLS-TE with OSPF
    • Unified MPLS
    • Segment Routing
      • Introduction, Theory Pt.1
      • Introduction, Lab (OSPF) Pt.2
      • Introduction, Lab (ISIS) Pt. 3
      • Multi-Area/Level Segment Routing
      • Segment Routing using BGP
      • Migrating LDP to SR
      • LDP/SR Interworking
      • TI-LFA Pt. 1 (Theory)
      • TI-LFA Pt. 2 (Implementation)
      • TI-LFA Pt. 3 (Node and SRLG Protection)
      • SR-TE Pt. 1 (Overview)
      • SR-TE Pt. 2 (Creating an SR-TE Policy)
      • SR-TE Pt. 3 (Using a PCE)
      • SR-TE Pt. 4 (Automated Steering)
      • SR-TE Pt. 5 (On-Demand Nexthop)
      • SR-TE Pt. 6 (Flex Algo)
    • MPLS OAM
      • Classic Traceroute Behavior in MPLS Networks
      • LSP Ping
      • LSP Traceroute
  • Routing
    • BGP
      • BGP Synchronization
      • BGP Load Sharing (Multipath)
      • An Intuitive Look at Path Attributes
      • AS Path Prepending on XE and XR
      • RPL
    • BGP Security
      • BGP TTL Security, Pt. 1
      • BGP TTL Security, Pt. 2 (IOS-XE)
      • BGP TTL Security, Pt. 3 (IOS-XR)
      • BGP MD5 Authentication
      • BGP Maximum Prefixes
      • BGP RFD (Route Flap Dampening)
      • RTBH
      • Flowspec
      • BGPsec
    • L3VPN
      • An In-Depth Look at RD and RT, Pt. 1
      • An In-Depth Look at RD and RT, Pt. 2
      • An In-Depth Look at RD and RT, Pt. 3
      • An In-Depth Look at RD and RT, Pt. 4
      • Inter-AS L3VPN Pt. 1, Overview
      • Inter-AS L3VPN Pt. 2, Option A
      • Inter-AS L3VPN Pt. 3, Option B
      • Inter-AS L3VPN Pt. 4, Option C
      • CSC (Carrier Supporting Carrier)
      • PE NAT
    • OSPF
      • Type 7 to Type 5 Translation
      • OSPF Authentication
      • Troubleshooting OSPF Adjacencies
      • OSPFv3 LSA Types
      • OSPFv3 LSAs Example (Single Area)
    • ISIS
      • The Potential for Asymmetric Routing with Multi-Area ISIS
      • Interarea Routing is Distance-Vector
      • Basic ISIS - LSPDB
      • Multitopology
      • What is the role of CLNS and CLNP in ISIS?
      • Troubleshooting ISIS Adjacencies
    • IPv6 Transition
      • Overview
      • NAT64
      • 6to4
      • 6RD (IPv6 Rapid Deployment)
      • DS Lite (Dual Stack Lite)
      • MAP (Mapping of Address and Port)
      • Tunneling IPv6 Dynamic Routing Protocols over IPv4
    • Multicast
      • Introduction
      • IP and MAC Addressing
      • Tree Formation and Packet Forwarding
      • IGMP
      • PIM-DM (Dense Mode)
      • PIM-SM (Sparse Mode)
      • PIM-SM SPT Switchover
      • PIM-SM Tunnel Interfaces
      • PIM DR and the Assert Message
      • PIM-SM RP Discovery
      • PIM-BiDir
      • PIM-SSM (Source-Specific Multicast)
      • Interdomain Multicast (PIM-SM)
      • IPv6 Multicast
      • mVPN Introduction
      • mVPN Profile 0
      • mVPN Profile 1
      • Multicast Routing on IOS-XR
  • L2VPN & Ethernet
    • IOS-XE Ethernet Services
      • Service Instances
      • E-Line
      • E-LAN (VPLS)
      • E-Tree
      • E-Access
      • VPLS with BGP Autodiscovery
      • Martini/Kompella Circuits
    • EVPN
      • Introduction to EVPN
      • Learning EVPN VXLAN First
      • E-Line (EVPN VPWS)
      • E-Line (EVPN VPWS) on IOS-XR
      • E-Line (EVPN VPWS) Multi-Homed
      • E-LAN (EVPN Single-Homed)
    • Carrier Ethernet
      • 802.1ah (MAC-in-MAC)
      • 802.3ah (Ethernet OAM)
      • 802.1ag (CFM)
      • Cisco REP (Resilient Ethernet Protocol)
      • ITU G.8032 ERPS (Ethernet Ring Protection Switching)
  • Security
    • CoPP (Control Plane Policing)
    • LPTS (Local Packet Transport Services)
  • Misc
    • QoS
      • QoS Introduction (Part 1)
      • QoS Tools Overview and QoS Models (Part 2)
      • QoS Classification and Marking (Part 3)
      • QoS Queuing/Congestion Management (Part 4)
      • QoS Shaping and Policing (Part 5)
      • QoS for IPv6
      • MPLS QoS Basics
      • MPLS QoS Modes
      • MPLS TE QoS (DS-TE)
      • MPLS TE CBTS/PBTS
    • Automation and Assurance
      • NSO
      • NSO Command Cheat Sheet
      • Intro to YANG/NETCONF
      • YANG In-Depth
      • NETCONF In-Depth
      • RESTCONF
      • Model-Driven Telemetry
      • Automation Tool Comparison
      • Netflow
      • SNMP
    • Virtualization
      • NFV (Network Function Virtualization)
      • OpenStack
    • Transport
      • xPON
      • SONET/SDH
      • WDM
      • 4G and 5G RAN
    • High Availability (HA)
      • NSF/GR
      • NSR
      • NSF/NSR Whitepapers
      • BFD
      • Link Aggregation on IOS-XE
      • Link Aggregation on IOS-XR
    • IOS Software Overview
  • Labs
    • Lab Challenges
      • How to Use These Labs
      • Basic LDP
      • Advanced LDP
      • BGP Security
      • Unified MPLS
      • BGP Fundamentals
      • Ethernet Services
      • L3VPN Extranet
      • Multicast
      • Inter-area OSPF
      • ISIS
      • MPLS-TE
      • Control Plane Policing
      • QoS
Powered by GitBook
On this page
  • Configuration
  • Further Reading
  1. L2VPN & Ethernet
  2. Carrier Ethernet

ITU G.8032 ERPS (Ethernet Ring Protection Switching)

PreviousCisco REP (Resilient Ethernet Protocol)NextCoPP (Control Plane Policing)

Last updated 2 years ago

G.8032 is an ITU-T standards-based Ethernet ring loop protection protocol. It is also known as ERPS (Ethernet Ring Protection Switching). G.8032 is an alternative to REP, and shares many similarities with Cisco’s propreitary ring protection protocol. I believe G.8032 converges even faster than REP because it uses CFM for link failure detection.

One big difference in G.8032 compared to REP, is that in G.8032 you pick the link that you want to block. This link is called the RPL (ring protection link). The device and port the link connects to is called the RPL owner and the RPL port, respectively. There is no such thing as an “edge port” in G.8032.

If a link in the ring fails, the devices on either end of the failed link send R-APS (Ring Automatic Protection Switching) messages indicating that the link has failed and to unblock the RPL port. This message is called an R-APS SF (Signal Failure) message.

If the link comes back up, the devices send R-APS NR (No Request) messages that indicate that the link is back up, and to block the RPL port again. The R-APS messages are basically on/off switches that turn the RPL link on and off depending on whether there is link failure in the topology. Just like REP, you can only have at most one single link fail at any given time.

Link Failure Detection

Instead of PDUs, G.8032 relies on CFM to detect link failures. Therefore to run G.8032 you need to enable CFM on all nodes and configure a CFM domain. G.8032 uses CFM continuity check messages for which you can configure the interval as low as 3.3msec. This allows for extremely fast failover.

Configuration

Just like REP, we cannot run G.8032 on virtual equipment. However we can examine the basic configuration steps to understand how it works.

  1. Enable CFM and configure g8032 as a registered client of CFM. This is very similar to the way routing protocols register with BFD. When CFM detects the link down, it notifies g8032. efd stands for Ethernet Fault Detection.

    ethernet cfm ieee
    ethernet cfm global
    ethernet cfm domain name level level-num
     service name evc name
      continuity-check
      continuity-check interval interval  ! This can be as low as 3.3msec
      efd notify g8032
    !
    int Gi0/0
     service instance number ethernet evc-name
      cfm mep domain name mpid number

    Each device should have a unique mpid, and you should be able to use the same mpid on each of the two interfaces. (R1 can use mpid 1 on both interfaces, R2 can use mpid 2 on both interfaces, etc). By defining every interface as a MEP, it means that every CFM domain only spans a single link. Put another way, every link in the ring has its own independent CFM domain.

  2. Create a g8032 ring profile.

    ethernet ring g8032 profile name

  3. Define the ring. You must associate up to two ports with the ring on every device. This is a basic rule of closed rings - every device has exactly two ports belonging to the ring. If the ring is an open ring, two devices will only have one port in the ring. I believe every device in the open ring will need to define the ring as an open-ring in this case.

    ethernet ring g8032 ring-name
     open-ring  ! Optional
    
     port0 interface Gi0/0
      monitor service instance instance-id
     port1 interface Gi0/1
      monitor service instance instance-id
    
     instance number
      profile profile-name
    
      ! On the PRL owner
      rpl port0 owner
    	
      ! VLANs included in the ring. This allows you to load-balance per-VLAN like REP
      inclusion-list vlan-ids ids
    
      ! This defines the ports/service instances that will be used for the R-APS messages
      aps-channel
       level num
       port0 service instance instance-id
       port1 service instance instance-id

Further Reading

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cether/configuration/15-s/ce-15-s-book/ce-g8032-ering-pro.html
https://www.youtube.com/watch?v=68JuiPNl8kQ