HPE FlexFabric 5950 Series Configuration Manual page 102

Mpls
Hide thumbs Also See for FlexFabric 5950 Series:
Table of Contents

Advertisement

Bandwidt
h required
by
primary
CRLSP
C onfiguration restrictions and guidelines
3 9 7 B
When you configure a bypass tunnel on the PLR, follow these restrictions and guidelines:
Use bypass tunnels to protect only critical interfaces or links when bandwidth is insufficient.
Bypass tunnels are pre-established and require extra bandwidth.
Make sure the bandwidth assigned to the bypass tunnel is no less than the total bandwidth
needed by all primary CRLSPs to be protected by the bypass tunnel. Otherwise, some primary
CRLSPs might not be protected by the bypass tunnel.
A bypass tunnel typically does not forward data when the primary CRLSP operates correctly.
For a bypass tunnel to also forward data during tunnel protection, you must assign adequate
bandwidth to the bypass tunnel.
A bypass tunnel cannot be used for services such as VPN.
You cannot configure FRR for a bypass tunnel. A bypass tunnel cannot act as a primary CRLSP.
Make sure the protected node or interface is not on the bypass tunnel.
After you associate a primary CRLSP that does not require bandwidth protection with a bypass
tunnel that provides bandwidth protection, the primary CRLSP occupies the bandwidth that the
bypass tunnel protects. The bandwidth is protected on a first-come-first-served basis. The
primary CRLSP that needs bandwidth protection cannot preempt the one that does not need
bandwidth protection.
After an FRR, the primary CRLSP will be down if you modify the bandwidth that the bypass
tunnel can protect and your modification results in one of the following:
The CT type changes.
The bypass tunnel cannot protect adequate bandwidth as configured.
FRR protection type (whether or not to provide bandwidth protection for the primary CRLSP)
changes.
M anually configuring a bypass tunnel
3 9 8 B
The bypass tunnel setup method is the same as a normal MPLS TE tunnel. This section describes
only FRR-related configurations.
To configure a bypass tunnel on the PLR:
Step
1.
Enter system view.
2.
Enter tunnel interface view of
the bypass tunnel.
3.
Specify the destination
address of the bypass
tunnel.
4.
Configure the bandwidth and
the CT to be protected by the
bypass tunnel.
5.
Return to system view.
Primary
CRLSP
requires
Bypass tunnel providing
bandwidth
bandwidth protection
protection or
not
primary CRLSP.
Command
system-view
interface tunnel tunnel-number
[ mode mpls-te ]
destination ip-address
mpls te backup bandwidth [ ct0
| ct1 | ct2 | ct3 ] { bandwidth |
un-limited }
quit
94
Bypass tunnel providing no
bandwidth protection
Remarks
N/A
N/A
The bypass tunnel destination
address is the LSR ID of the MP.
By default, the bandwidth and the
CT to be protected by the bypass
tunnel are not specified.
N/A

Advertisement

Table of Contents
loading

Table of Contents