Technical data

28 Brocade 6910 Ethernet Access Switch Diagnostic Guide
53-1002348-02
Ethernet Ring Protection switching
Ethernet Ring Protection switching
The ITU G.8032 recommendation specifies a protection switching mechanism and protocol for
Ethernet layer network rings. Ethernet rings can provide wide-area multipoint connectivity and
redundancy more economically due to their reduced number of links. The mechanisms and
protocol defined in G.8032 achieve highly reliable and stable protection; and never form loops,
which would fatally affect network operation and service availability.
To configure Ethernet Protection Ring Switching (ERPS), follow the guidelines in the Brocade 6910
Ethernet Access Switch Configuration Guide. If you encounter any problems, use the following
show command to display a summary of the configuration settings and operational status for all
rings, or detailed information for a specific ring.
ERPS show commands
Syntax: show erps
Syntax: show erps [domain ring-name]
ring-name - Name of a specific ERPS ring. (Range: 1-32 characters)
This command displays the configuration settings and operational status of ERPS.
Console# show erps
ERPS Status : Enabled
Number of ERPS Domains : 1
Domain State MEL Enabled West East RPL Owner Ctrl VLAN
------------ ---------- --- ------- -------- -------- --------- ---------
rd1 Idle 0 Yes Eth 1/12 Eth 1/10 Yes 100
rd2 Protection 0 Yes Eth 1/3 Eth 1/4 No 200
This command displays detailed information for a specific ring.
Console#show erps domain rd1
Domain Name : rd1
Admin Status : Enabled
MEG Level : 1
Node ID : 00-12-CF-61-24-2F
Node State : Idle
West Port : Eth 1/ 1 (Blocking)
East Port : Eth 1/ 2 (Forwarding)
RPL Port : West
RPL Owner : Enabled
Holdoff Timer : 300 ms
Guard Timer : 300 ms
WTR Timer : 5 minutes
Control VLAN : 2
Propagate TC : Disabled
Connectivity Fault Management
Connectivity Fault Management (CFM) is an OAM protocol that includes proactive connectivity
monitoring using continuity check messages, fault verification through loop back messages, and
fault isolation by examining end-to-end connections between provider edge devices or between
customer edge devices.