After deploying MAC flapping-based loop detection, you can configure a blocking policy for AC-side interfaces or PWs (AC is short for attachment circuit, and PW for pseudo wire).
Blocking interfaces based on their blocking priorities
The blocking priority of an interface can be configured. When detecting a loop, a device blocks the interface with a lower blocking priority.
Blocking interfaces based on their trusted or untrusted states (accurate blocking)
If a dynamic MAC address entry remains the same in the MAC address table within a specified period and is not deleted, the outbound interface in the MAC address entry is trusted. When detecting a loop, a device blocks an interface that is not trusted.
After MAC flapping-based loop detection is deployed on a device and the device detects a loop, the device blocks an AC interface with a lower blocking priority by default. However, MAC address entries of interfaces without loops may change due to the impact from a remote loop, and traffic over the interfaces with lower blocking priorities is interrupted. To address this problem, deploy accurate blocking of MAC flapping-based loop detection. Accurate blocking determines trusted and untrusted interfaces by analyzing the frequency of MAC address entry flapping. When a MAC address entry changes repeatedly, accurate blocking can accurately locate and block the interface with a loop, which is an untrusted interface.
A device on which MAC flapping-based loop detection is deployed blocks PWs based only on the blocking priorities of the PWs. If the device detects a loop, it blocks the PW with a lower blocking priority.
If no blocking policies are configured, both AC-side interfaces and PWs are blocked based on their blocking priorities. If a loop occurs and the AC-side interfaces or PWs have the same blocking priority, the AC-side interfaces or PWs are all blocked.
Blocking interfaces based on their blocking priorities
Run system-view
The system view is displayed.
Run interface interface-type interface-number
The AC-side interface view is displayed.
Run loop-detect eth-loop priority priority
A blocking policy is configured for the AC-side interface.
Run commit
The configuration is committed.
Blocking interfaces based on their trusted or untrusted states (accurate blocking)
Run system-view
The system view is displayed.
Run loop-detect eth-loop precise-block trust-port generate-time generate-time
The interval for generating a trusted interface is configured.
(Optional) Run loop-detect eth-loop precise-block policy no-block
The device is configured not to block any interfaces with MAC address entry flapping in a virtual switching instance (VSI) or a bridge-domain (BD) if the device does not have any trusted interfaces.
Run vsi vsi-name or bridge-domain bd-id
The VSI view or the bridge domain (BD) view is displayed.
Run loop-detect eth-loop precise-block enable
Accurate blocking is enabled, and the device blocks only untrusted interfaces.
Run commit
The configuration is committed.
Run system-view
The system view is displayed.
Run vsi vsi-name
The VSI view is displayed.
Run pwsignal ldp
The VSI-LDP view is displayed (LDP is short for Label Distribution Protocol).
Run vsi-id vsi-id
An ID is configured for the VSI.
Run peer peer-address [ negotiation-vc-id vc-id ] [ tnl-policy policy-name ] [ upe ] [ ignore-standby-state ]
A peer IP address is configured for the VSI.
Run peer peer-address [ negotiation-vc-id vc-id ] pw pw-name
The VSI-LDP-PW view is displayed.
Run loop-detect eth-loop priority priority
A blocking priority is configured for the PW.
Run commit
The configuration is committed.
After MAC flapping-based loop detection is configured, if an AC-side interface or PW is blocked due to a loop, the interface or PW does not forward user traffic. To unblock the interface or PW so that it can forward user traffic, run the reset loop-detect eth-loop command.