Configuring A Bypass Tunnel On Its Plr - HP HSR6800 Configuration Manual

Hide thumbs Also See for HSR6800:
Table of Contents

Advertisement

Step
1.
Enter system view.
2.
Enter tunnel interface view of
the protected LSP.
3.
Enable FRR.
4.
Submit current tunnel
configuration.

Configuring a bypass tunnel on its PLR

After a tunnel is specified to protect an interface, its corresponding LSP becomes a bypass LSP. The
setup of a bypass LSP must be manually performed on the PLR. The configuration of a bypass LSP
is similar to that of a common LSP, but a bypass LSP cannot act as an LSP to be protected by
another LSP at the same time.
When specifying a bypass tunnel for an interface, ensure the following:
The bypass tunnel is up.
The protected interface is not the outgoing interface of the bypass tunnel.
Up to three bypass tunnels can be specified for a protected interface. The best-fit algorithm
determines which of them is used in case a failure occurs.
Your device has a restriction on links that use the same bypass tunnel so their total bandwidth does
not exceeds a specific value.
To configure a bypass tunnel on its PLR:
Step
1.
Enter system view.
2.
Enter interface view of the
bypass tunnel.
3.
Specify the destination
address of the bypass
tunnel.
4.
Configure the bandwidth and
the type of LSPs that the
bypass tunnel can protect.
5.
Submit current tunnel
configuration.
6.
Return to system view.
7.
Enter interface view of the
outgoing interface of the
protected LSP.
Command
system-view
interface tunnel tunnel-number
mpls te fast-reroute
mpls te commit
Command
system-view
interface tunnel tunnel-number
destination ip-address
mpls te backup bandwidth
{ bandwidth | { ct0 | ct1 | ct2 | ct3 }
{ bandwidth | un-limited } }
mpls te commit
quit
interface interface-type
interface-number
74
Remarks
N/A
N/A
Disabled by default.
N/A
Remarks
N/A
N/A
For node protection, this is
the LSR ID of the next hop
router of PLR.
For link protection, this is the
LSR ID of the next hop
device of PLR.
Bandwidth is not protected by
default.
You must configure the bandwidth
that it is intended to protect with
the mpls te backup bandwidth
command. Otherwise, the bypass
tunnel cannot be bound with a
protected LSP successfully.
N/A
N/A
N/A

Advertisement

Table of Contents
loading

Table of Contents