beautypg.com

Cr-lsp backup protection, Configuring cr-lsp backup protection, Configuration prerequisites – H3C Technologies H3C Intelligent Management Center User Manual

Page 192: Querying for a tunnel for cr-lsp backup

background image

when the link or node fails, its traffic can travel through the backup link or node instead. The supported
protection types are CR-LSP backup protection and FRR.

CR-LSP backup protection

CR-LSP backup provides end-to-end path protection for the entire LSP without time limitation. This is
different from Fast Reroute (FRR) which provides quick but temporary per-link or per-node protection on an
LSP.

In the same TE tunnel, the LSP used to back up a primary LSP is called a secondary LSP. When the ingress
of a TE tunnel detects that the primary LSP is unavailable, it switches traffic to the secondary LSP and after
the primary LSP becomes available, switches traffic back. This is how LSP path protection is achieved.

Configuring CR-LSP backup protection

Configuration prerequisites

Before you configure CR-LSP backup, complete the following tasks:

Configure MPLS basic capabilities.

Configure MPLS TE basic capabilities.

Configure MPLS TE tunnels.
You need to make sure that MPLS and MPLS TE basic capabilities are enabled on your devices
before you can manage your TE networks using MPLS TE Management. The configuration
instructions for enabling MPLS and MPLS TE basic capabilities may differ from device to device.
For detailed configuration instructions, see the configuration guide of your device.

NOTE:

CR-LSP backup should be configured at the ingress node of a tunnel. The system routes the primary LSP
and backup LSP automatically. You do not need to configure them.

Querying for a tunnel for CR-LSP backup

To query for a tunnel for CR-LSP backup:

1.

Click Service > MPLS TE Manager > Protection Mng from the tabular navigation system on the top
of the IMC main page.

2.

In the Tunnel Query section of the page, select MPLS TE Tunnel name, Tunnel State, or Protocol
from the Query Type list, specify the corresponding value in the Value field, and then click Query.
Tunnels matching this description appear in the Protected Tunnel List section of the page, as shown
in

Figure 56

.

182