Configures protection and resiliency on IPv4 and IPv6 static routes.
|ipv4_or_ipv6_network||IPv4 or IPv6 network address.|
|gateway||Gateway IP address.|
|protection||Selects the type of protection on this route (default is none).|
|bfd||Enables BFD protection on this route.|
|ping||Enables ICMP ping protection on this route.|
|none||Disables all protection on this route (default).|
No protection is the default.
For static routes configured with protection type ping, static routes are initially down. Static routes become "up" for each configured gateway/device IP when a timely ICMP Echo Reply is received from that IP within the configured ping interval. Static routes transition from up to down when no timely reply is received for the configured number of missed intervals. Severely delayed ICMP Echo Replies are ignored if received after the configured interval time elapses, because a new ICMP Echo Request has already been sent. Static routes with ping protection need not be ECMP routes. Thus when a device is unresponsive, a different route with a higher cost or shorter prefix length can route packets elsewhere.
The protection type (BFD, ping, or none) for an existing static route can be changed dynamically without deleting the route. To change the protection type, simply re-add an existing static route with a different protection type.
The following example adds a static route for 184.108.40.206/24 with ping health check monitoring to gateway IP 220.127.116.11.
# configure iproute add 18.104.22.168/24 22.214.171.124 protection ping
ExtremeXOS initiates ping health check monitoring to the adjacent device with IP address 126.96.36.199. The route for 188.8.131.52/24 is protected, meaning if ping responses are received from 184.108.40.206 in a timely manner, the static route for 220.127.116.11/24 to 18.104.22.168 is “up” in the routing table. If no ping response is received in a timely manner, the route is down.
In an example with ECMP, assuming enable iproute sharing:
# configure iproute add 22.214.171.124/24 126.96.36.199 protection ping
If ping responses are received by both 188.8.131.52 and 184.108.40.206, IP packets destined to subnet 220.127.116.11/24 are Layer-3 load balanced by hardware between 18.104.22.168 and 22.214.171.124. If for example, no ping response is received from 126.96.36.199 in a timely manner, IP packets destined to 188.8.131.52/24 are sent only to 184.108.40.206. Later, upon receiving a ping response from 220.127.116.11, packets are load balanced again.
This command was first available in ExtremeXOS 22.1.
This command is available on all platforms with an Edge or Base license or higher as described in the ExtremeXOS 32.2 Feature License Requirements document.