73
Configuring a bypass tunnel on its PLR
After a tunnel is specified to protect an interface, its corresponding LSP becomes a bypass LSP. The setup
of a bypass LSP must be manually performed on the PLR. The configuration of a bypass LSP is similar to
that of a common LSP, but a bypass LSP cannot act as a primary LSP to be protected by another LSP at
the same time.
When specifying a bypass tunnel for an interface, ensure the following:
•
The bypass tunnel is up.
•
The protected interface is not the outgoing interface of the bypass tunnel.
Up to three bypass tunnels can be specified for a protected interface. The best-fit algorithm is used to
determine which of them is used in case failure occurs.
Your device has restriction on links that use the same bypass tunnel so that their total bandwidth does not
exceeds a specific value.
To configure a bypass tunnel on its PLR:
To do…
Use the command...
Remarks
Enter system view
system-view
––
Enter interface view of the bypass
tunnel
interface tunnel
tunnel-number
––
Specify the destination address of
the bypass tunnel
destination
ip-address
Required
•
For node protection, this is the
LSR ID of the next hop router of
PLR.
•
For link protection, this is the
LSR ID of the next hop device of
PLR.
Configure the bandwidth and type
of LSP that the bypass tunnel can
protect
mpls te backup bandwidth
{
bandwidth
| {
ct0
|
ct1
|
ct2
|
ct3
} {
bandwidth
|
un-limited
} }
Required
Bandwidth is not protected by
default.
Submit current tunnel configuration
mpls te commit
Required
Exit to system view
quit
––
Enter interface view of the
outgoing interface of the protected
LSP
interface
interface-type
interface-number
––
Bind the bypass tunnel with the
protected interface
mpls te fast-reroute bypass-tunnel
tunnel
tunnel-number
Required
CAUTION:
Bypass tunnels do not protect bandwidth by default. This can defeat your attempts to binding a primary
LSP to a bypass tunnel. Therefore, when configuring a bypass tunnel, you must configure the bandwidth
that it is intended to protect with the
mpls te backup bandwidth
command.
Configuring node protection
To use FRR for node protection, perform the tasks in this section on the PLR and the protected node. If you
only need to protect links, skip this section.