AC6605 Access Controller
Dual-Link Backup White Paper
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Contents
About This Document ............................................................................................................... ii
1 Dual-Link Backup .................................................................................................................... 1
1.1 Introduction to Dual-Link Backup .............................................................................................................. 1
1.2 Availability ................................................................................................................................................ 2
1.3 Principles .................................................................................................................................................. 2
1.3.1 Dual-Link Backup Mechanism .......................................................................................................... 2
1.3.2 AP Login Process .............................................................................................................................. 3
1.3.3 STA Login Process............................................................................................................................ 6
1.3.4 Active/Standby Switchover and Revertive Switchover ....................................................................... 6
1.3.5 Loop Prevention in VLANs............................................................................................................... 7
1.3.6 Dual-Link Backup in Layer 2 Networking and Configuration Notes .................................................10
1.3.7 Dual-Link Backup in Layer 3 Networking and Configuration Notes .................................................18
1.4 Applications .............................................................................................................................................29
1.4.1 Direct Forwarding in Layer 3 Chain Networking ..............................................................................29
1.4.2 Tunnel Forwarding in Layer 2 Branched Networking........................................................................33