108
# Shut down interface VLAN-interface 2 on Switch B, and then tracert the tunnel destination. The
output shows that packets are forwarded on the CRLSP that traverses Switch D.
[SwitchA] tracert –a 1.1.1.9 3.3.3.9
traceroute to 3.3.3.9 (3.3.3.9) from 9.1.1.1, 30 hops at most, 40 bytes each pac
ket, press CTRL_C to break
1 30.1.1.2 (30.1.1.2) 3.000 ms 7.000 ms 3.000 ms
2 * * *
# Execute the
display mpls lsp
command on Switch A. The output shows that only one CRLSP
exists on the switch.
[SwitchA] display mpls lsp
FEC Proto In/Out Label Interface/Out NHLFE
1.1.1.9/3/48984 RSVP -/1150 Vlan4
30.1.1.2 Local -/- Vlan4
# Execute the
display ip routing-table
command on Switch A. The output shows a static route entry
with interface Tunnel 3 as the output interface. (Details not shown.)
Manual bypass tunnel for FRR configuration example
Network requirements
On the primary CRLSP Switch A—Switch B—Switch C—Switch D, use FRR to protect the link
Switch B—Switch C.
Use RSVP-TE to establish the primary CRLSP and bypass tunnel of the MPLS TE tunnel based on
the constraints of the explicit paths. The bypass tunnel uses path Switch B—Switch E—Switch C.
Switch B is the PLR and Switch C is the MP.
Configure BFD for RSVP-TE between Switch B and Switch C. When the link between Switch B and
Switch C fails, BFD can detect the failure quickly and notify RSVP-TE of the failure, so RSVP-TE can
switch traffic to the bypass tunnel.
Figure 32 Network diagram
Table 7 Interface and IP address assignment
Device
Interface
IP address
Device
Interface
IP address
Switch A
Loop0
1.1.1.1/32
Switch E
Loop0
5.5.5.5/32
Vlan-int1
2.1.1.1/24
Vlan-int4
3.2.1.2/24
Switch B
Loop0
2.2.2.2/32
Vlan-int5
3.3.1.1/24
Switch A
Switch B
Switch C
Switch D
Switch E
Vlan-int1
Loop0
Loop0
Loop0
Loop0
Vlan-int1
Vlan-int2
Vlan-int2
Vlan-int3
Vlan-int3
Vlan-int4
Vlan-int4
Primary CRLSP
Bypass tunnel
Vlan-int5
Vlan-int5
Loop0