NE40E&80E V600R008C10 Configuration Guide - MPLS 01 PDF
NE40E&80E V600R008C10 Configuration Guide - MPLS 01 PDF
NE40E&80E V600R008C10 Configuration Guide - MPLS 01 PDF
V600R008C10
Issue 02
Date 2014-09-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: [email protected]
Purpose
This document provides the basic concepts, configuration procedures, and configuration
examples in different application scenarios of the MPLS feature supported by the NE80E/40E.
NOTICE
Note the following precautions:
l The encryption algorithms DES/3DES/SKIPJACK/RC2/RSA (RSA-1024 or lower)/MD2/
MD4/MD5 (in digital signature scenarios and password encryption)/SHA1 (in digital
signature scenarios) have a low security, which may bring security risks. If protocols allowed,
using more secure encryption algorithms, such as AES/RSA (RSA-2048 or higher)/SHA2/
HMAC-SHA2, is recommended.
l If the plain parameter is specified, the password will be saved in plaintext in the configuration
file, which has a high security risk. Therefore, specifying the cipher parameter is
recommended. To further improve device security, periodically change the password.
l Do not set both the start and end characters of a password to "%$%$." This causes the
password to be displayed directly in the configuration file.
Related Versions
The following table lists the product versions related to this document.
Intended Audience
This document is intended for:
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Convention Description
&<1-n> The parameter before the & sign can be repeated 1 to n times.
Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes made in earlier issues.
Contents
3 MPLS TE Configuration...........................................................................................................270
3.1 Introduction................................................................................................................................................................273
3.1.1 MPLS TE Overview................................................................................................................................................273
3.1.2 MPLS TE Features Supported by the NE80E/40E..................................................................................................273
3.2 Configuring Static CR-LSP........................................................................................................................................278
3.2.1 Before You Start......................................................................................................................................................278
3.2.2 Enabling MPLS TE.................................................................................................................................................279
3.2.3 (Optional) Configuring Link Bandwidth.................................................................................................................280
3.2.4 Configuring the MPLS TE Tunnel Interface...........................................................................................................281
3.2.5 Configuring the Ingress of the Static CR-LSP........................................................................................................282
3.2.6 Configuring the Transit of the Static CR-LSP.........................................................................................................283
3.2.7 Configuring the Egress of the Static CR-LSP.........................................................................................................284
3.2.8 Checking the Configurations...................................................................................................................................284
3.3 Configuring a Static Bidirectional Co-routed CR-LSP..............................................................................................285
3.3.1 Before You Start......................................................................................................................................................285
3.3.2 Enabling MPLS TE.................................................................................................................................................286
3.3.3 (Optional) Configuring Link Bandwidth.................................................................................................................287
3.4 Configuring the Statistics Function for a Static Bidirectional Co-routed CR-LSP....................................................288
3.5 Configuring an RSVP-TE Tunnel..............................................................................................................................290
3.5.1 Before You Start......................................................................................................................................................290
3.5.2 Enabling MPLS TE and RSVP-TE.........................................................................................................................291
3.5.3 (Optional) Configuring Link Bandwidth.................................................................................................................292
3.5.4 Configuring OSPF TE.............................................................................................................................................293
3.5.5 Configuring IS-IS TE..............................................................................................................................................294
3.5.6 (Optional) Configuring an MPLS TE Explicit Path................................................................................................295
3.5.7 Configuring an MPLS TE Tunnel Interface............................................................................................................297
3.5.8 (Optional) Configuring Tunnel Constraints............................................................................................................298
3.5.9 (Optional) Configuring an RSVP Resource Reservation Style...............................................................................299
3.5.10 Configuring CSPF.................................................................................................................................................300
3.5.11 Checking the Configurations.................................................................................................................................301
A Glossary......................................................................................................................................937
B Acronyms and Abbreviations.................................................................................................943
You can set up a static Label Switched Path (LSP) by manually assigning labels to Label
Switching Routers (LSRs). The static LSP applies stable, small-scale networks.
1.1 Introduction
Labels can be assigned manually to LSRs to establish static LSPs.
1.1 Introduction
Labels can be assigned manually to LSRs to establish static LSPs.
1.1.1 Overview
The static LSP cannot be established using a label distribution protocol but can be established
by an administrator. Static LSPs can be used in stable, small-scaled networks with a simple
topology.
When configuring a static LSP, the administrator must manually allocate labels for each LSR
ensuring that the value of the outgoing label of the previous node is equal to the value of the
incoming label of the next node. LSRs on the static LSP cannot detect the changes in other LSRs
on the same LSP. Therefore, the static LSP is a local concept.
Static LSPs are set up without using label distribution protocols and do not need to exchange
control packets. Therefore, they consume a few resources and are transmitted on small-scale
networks with simple and stable topology. Static LSPs are not automatically adjusted when the
network topology changes. The administrator must adjust the static LSP according to the network
topology.
Static LSPs
Static LSPs must be configured manually by an administrator. LSRs on the static LSP cannot
detect the changes in other LSRs on the same LSP. Therefore, the static LSP is a local concept.
Static LSPs are not automatically adjusted when the network topology changes. The
administrator must adjust the static LSP according to the network topology.
Usage Scenario
A static LSP works properly only after all the LSRs along the LSP are configured.
Setting up static LSPs does not require the label distribution protocol or the exchange of any
control packets. Therefore, static LSPs consume few resources and can be used on small-scale
networks with a simple and stable topology. Static LSPs are not automatically adjusted when
the network topology changes. The administrator needs to adjust the static LSPs according to
the network topology.
Static LSPs and static CR-LSPs share the same label space (16 - 1023).
For information about the MPLS L2VPN configuration, see the HUAWEI NetEngine80E/40E
Router Configuration Guide - VPN.
Pre-configuration Tasks
Before configuring static LSPs, configure a static unicast route or an IGP to connect LSRs at
the network layer.
Data Preparation
To configure static LSPs, you need the following data.
No. Data
Context
When configuring an LSR ID, note the following issues:
l The LSR ID must be configured before other MPLS commands are run.
l The LSR ID does not have a default value and must be configured manually.
l Using the address of the loopback interface of the LSR as the LSR ID is recommended.
l To modify the configured LSR ID, run the undo mpls command in the system view to
delete all the MPLS configurations.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls lsr-id lsr-id
----End
Context
Perform the following steps on each LSR in an MPLS domain:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
quit
Step 4 Run:
interface interface-type interface-number
Step 5 Run:
mpls
----End
Context
Perform the following steps on the LSR to be configured as the ingress:
Procedure
Step 1 Run:
system-view
NOTE
It is recommended to set up a static LSP by specifying a next hop. Ensure that the local routing table contains
the route entries, including the destination IP address and the next hop IP addresses of the LSP to be
established.
----End
Context
Perform the following steps on the LSR to be configured as a transit node:
Procedure
Step 1 Run:
system-view
NOTE
It is recommended to set up a static LSP by specifying a next hop address. In addition, ensure that the local
routing table contains the route entries, including the destination IP address and the next hop IP address of
the LSP to be established.
----End
Context
Perform the following steps on the LSR to be configured as the egress:
Procedure
Step 1 Run:
system-view
Step 2 Run:
static-lsp egress lsp-name incoming-interface interface-type interface-number in-
label in-label [ lsrid ingress-lsr-id tunnel-id tunnel-id ]
----End
Prerequisites
The static LSP function has been configured.
Procedure
l Run the display mpls static-lsp [ lsp-name ] [ { include | exclude } ip-address mask-
length ] [ verbose ] command to check the static LSP information.
----End
Example
After completing the configurations run the preceding commands to display information about
the static LSP.
l Run the display mpls static-lsp command to view information about the static LSP
configuration. The command output includes the name of the static LSP, FEC, values of
the incoming and outgoing labels, and the inbound and outbound interfaces. In addition,
the status of the LSP is Up.
<HUAWEI> display mpls static-lsp
TOTAL : 1 STATIC LSP(S)
UP : 1 STATIC LSP(S)
DOWN : 0 STATIC LSP(S)
Name FEC I/O Label I/O If Status
lsp1 3.3.3.9/32 NULL/100 -/GE1/0/0 Up
Usage Scenario
BFD is used to monitor the connectivity of static LSPs established manually.
NOTE
When static BFD is being used for a static LSP, you can create a static BFD session for non-host routes.
Static BFD for static LSPs can function properly even if the forward path is an LSP and the reverse path
is an IP link. The forward and reverse paths must be established over the same link. If they use different
links and a fault occurs, BFD cannot identify the faulty path.
Pre-configuration Tasks
Before configuring static BFD for static LSP, configure a static LSP.
NOTE
For static CR-LSPs bound to an MPLS TE tunnel, BFD is available after it is bound to the MPLS TE tunnel.
Data Preparations
Before configuring static BFD for static LSP, you need the following data.
No. Data
Context
Perform the following steps on each LSR at both ends of the link to be monitored:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
This node is enabled with the global BFD function. The global BFD view is displayed.
----End
Context
Perform the following steps on the ingress of a static LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd bfd-name bind static-lsp lsp-name
The local minimum interval at which BFD packets are sent is set.
The local minimum interval at which BFD packets are received is set.
NOTE
l Effective local interval at which BFD packets are sent = MAX { Configured local interval at which
BFD packets are sent, Configured remote interval at which BFD packets are received }
l Effective local interval at which BFD packets are received = MAX { Configured remote interval at
which BFD packets are sent, Configured local interval at which BFD packets are received }
l Effective local detection interval = Effective local interval at which BFD packets are received x
Configured remote detection multiplier
For example, if:
l The interval at which BFD packets are sent is set to 200 ms, the local interval at which BFD packets
are received is set to 300 ms, and the detection multiplier is set to 4.
l The remote interval at which BFD packets are sent is set to 100 ms, the remote interval at which BFD
packets are received is set to 600 ms, and the remote detection multiplier is set to 5.
Then,
l Effective local interval at which BFD packets are sent = MAX {200 ms, 600 ms} = 600 ms; effective
local interval at which BFD packets are received = MAX {100 ms, 300 ms} = 300 ms; effective local
detection period = 300 ms x 5 = 1500 ms
l Effective remote interval at which BFD packets are sent = MAX { 100 ms, 300 ms } = 300 ms; effective
remote interval at which BFD packets are received = MAX { 200 ms, 600 ms } = 600 ms; effective
remote detection period = 600 ms x 4 = 2400 ms
Step 7 Run:
process-pst
If the BFD session status changes, the interface status table is modified.
If the BFD session status changes, the static LSP status in the interface status table is modified.
Step 8 Run:
commit
l If the static LSP status goes Up, the BFD session is reestablished.
l If the static LSP status goes Down, the BFD session also goes Down.
----End
Context
The egress can use an IP link, LSP, or TE tunnel as a reverse tunnel to notify the ingress of a
fault. To ensure that the forward and reverse paths travel through the same link, an LSP is
preferentially selected to notify the ingress of an LSP fault.
Procedure
Step 1 Run:
system-view
The local minimum interval at which BFD packets are sent is set.
The local minimum interval at which BFD packets are received is set.
The device is enabled to modify the PST if the BFD session status changes.
If an LSP or a TE tunnel is used as a reverse tunnel to notify the ingress of a fault, you can run
this command to allow the reverse tunnel to switch traffic if the BFD session goes Down. If a
single-hop IP link is used as a reverse tunnel, this command can be configured, because the
process-pst command can only be configured for BFD single-link detection.
Step 8 Run:
commit
----End
Prerequisites
The static BFD for static LSP function has been configured.
Procedure
l Run the display bfd configuration { all | static } [ for-lsp ] command to check the BFD
configuration.
l Run the display bfd session { all | static } [ for-lsp ] command to check BFD session
information.
l Run the display bfd statistics session { all | static } [ for-ip | for-lsp ] command to check
BFD statistics.
l Run the display mpls static-lsp [ lsp-name ] [ { include | exclude } ip-address mask-
length ] [ verbose ] command to check the static LSP information.
----End
Context
You can run the following commands in any view to perform MPLS ping and MPLS tracert.
Procedure
l Run the ping lsp [ -a source-ip | -c count | -exp exp-value | -h ttl-value | -m interval | -r
reply-mode | -s packet-size | -t time-out | -v ] * ip destination-address mask-length [ ip-
address ] [ nexthop nexthop-address | draft6 ] command to perform MPLS ping.
l Run the tracert lsp [ -a source-ip | -exp exp-value | -h ttl-value | -r reply-mode | -t time-
out ] * ip destination-address mask-length [ ip-address ] [ nexthop nexthop-address |
draft6 ] command to perform MPLS tracert.
----End
Context
Run the following commands in the system view to notify the Network Management System
(NMS) of LSP status changes.
Procedure
l Run the snmp-agent trap suppress feature-name lsp trap-name { mplsxcup |
mplsxcdown } trap-interval trap-interval [ max-trap-number max-trap-number ]
command in the system view to enable the trap function for the LSP and enable the
debugging of excessive mplsxcup or mplsxcdown information.
----End
Networking Requirements
LSRs support MPLS and OSPF as an IGP running on the MPLS backbone network as shown
in Figure 1-1.
Bidirectional static LSPs are set up between LSRA and LSRD. The LSP between LSRA and
LSRD is along the path LSRA -> LSRB -> LSRD. The LSP between LSRD and LSRA is along
the path LSRD -> LSRC -> LSRA.
P
LSRA 1 OS 0
0.3 2/0 2/0/ 30 LSRD
.1. /0 S 2/
1/3 LSRC PO 4.1.
0 POS .
10 /0 10
.3. 1/0/
1.2 0 S 2/0 /30
/30 PO 4.1.1
.
10
Loopback1
3.3.3.9/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure the IP address of each interface, use the loopback address as an LSR ID, and
enable OSPF to advertise routes of network segments to which the interfaces are connected
and LSR ID host routes.
2. Enable MPLS globally on each LSR.
3. Enable MPLS on the interfaces.
4. Specify the destination address, outbound interface or next hop address, and outgoing label
for the LSP on the ingress LSR.
5. Specify the inbound interface, incoming label (equal to the outgoing label used by the
previous hop), outgoing label, and outbound interface or next hop address of the LSP on
the transit node.
6. Specify the inbound interface and the incoming label (equal to the outgoing label used by
the previous hop) on the egress.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of the interfaces on each LSR as shown in Figure 1-1, OSPF process ID, and
area ID
l Name of the static LSP
l Outgoing labels of the interfaces
Procedure
Step 1 Assign an IP address to each interface.
According to Figure 1-1, configure the IP address and the mask of the interfaces, including the
loopback interface. For configuration details, see Configuration Files in this section.
Step 2 Use OSPF to advertise LSR ID host routes and routes of the network segments to which the
interfaces are connected.
# Configure LSRA.
[LSRA] ospf 1
[LSRA-ospf-1] area 0
[LSRA-ospf-1-area-0.0.0.0] network 1.1.1.9 0.0.0.0
[LSRA-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.3
[LSRA-ospf-1-area-0.0.0.0] network 10.3.1.0 0.0.0.3
[LSRA-ospf-1-area-0.0.0.0] quit
[LSRA-ospf-1] quit
# Configure LSRB.
[LSRB] ospf 1
[LSRB-ospf-1] area 0
[LSRB-ospf-1-area-0.0.0.0] network 2.2.2.9 0.0.0.0
[LSRB-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.3
[LSRB-ospf-1-area-0.0.0.0] network 10.2.1.0 0.0.0.3
[LSRB-ospf-1-area-0.0.0.0] quit
[LSRB-ospf-1] quit
# Configure LSRC.
[LSRC] ospf 1
[LSRC-ospf-1] area 0
[LSRC-ospf-1-area-0.0.0.0] network 3.3.3.9 0.0.0.0
[LSRC-ospf-1-area-0.0.0.0] network 10.3.1.0 0.0.0.3
[LSRC-ospf-1-area-0.0.0.0] network 10.4.1.0 0.0.0.3
[LSRC-ospf-1-area-0.0.0.0] quit
[LSRC-ospf-1] quit
# Configure LSRD.
[LSRD] ospf 1
[LSRD-ospf-1] area 0
[LSRD-ospf-1-area-0.0.0.0] network 4.4.4.9 0.0.0.0
[LSRD-ospf-1-area-0.0.0.0] network 10.2.1.0 0.0.0.3
[LSRD-ospf-1-area-0.0.0.0] network 10.4.1.0 0.0.0.3
[LSRD-ospf-1-area-0.0.0.0] quit
[LSRD-ospf-1] quit
After completing the configuration, run the display ip routing-table command on the LSRs.
The LSRs already learn routes from each other.
The following example uses the command output on LSRA.
[LSRA] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 14 Routes : 15
Destination/Mask Proto Pre Cost Flags NextHop Interface
1.1.1.9/32 Direct 0 0 D 127.0.0.1 LoopBack1
2.2.2.9/32 OSPF 10 2 D 10.1.1.2 Pos1/0/0
3.3.3.9/32 OSPF 10 2 D 10.3.1.2 Pos2/0/0
4.4.4.9/32 OSPF 10 3 D 10.1.1.2 Pos1/0/0
OSPF 10 3 D 10.3.1.2 Pos2/0/0
The routing table contains the next hop address or outbound interface in boldface of the static
LSP on 4.4.4.9/32 originating from LSRA and destined for LSRD. In this example, the next hop
IP address is 10.1.1.2/30.
The routing table contains the next hop address or outbound interface in boldface of the static
LSP on 1.1.1.9/32 originating from LSRD and destined for LSRA. In this example, the next hop
IP address is 10.4.1.1/30.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
# Configure LSRB.
[LSRB] mpls lsr-id 2.2.2.9
[LSRB] mpls
[LSRB-mpls] quit
# Configure LSRC.
[LSRC] mpls lsr-id 3.3.3.9
[LSRC] mpls
[LSRC-mpls] quit
# Configure LSRD.
[LSRD] mpls lsr-id 4.4.4.9
[LSRD] mpls
[LSRD-mpls] quit
# Configure LSRB.
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls
[LSRC-Pos1/0/0] quit
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] mpls
[LSRC-Pos2/0/0] quit
# Configure LSRD.
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] mpls
[LSRD-Pos1/0/0] quit
[LSRD] interface pos 2/0/0
[LSRD-Pos2/0/0] mpls
[LSRD-Pos2/0/0] quit
Step 5 Establish a static LSP originating from LSRA and destined for LSRD.
# Configure the ingress LSRA.
[LSRA] static-lsp ingress RAtoRD destination 4.4.4.9 32 nexthop 10.1.1.2 out-label
20
After completing the configuration, run the display mpls static-lsp verbose or display mpls
lsp command on each LSR to view the LSP status.
The following example uses the command output on LSRA.
[LSRA] display mpls static-lsp
TOTAL : 1 STATIC LSP(S)
UP : 1 STATIC LSP(S)
DOWN : 0 STATIC LSP(S)
Name FEC I/O Label I/O If Status
RAtoRD 4.4.4.9/32 NULL/20 -/Pos1/0/0 Up
As the LSP is unidirectional, configure a static LSP originating from LSRD and destined for
LSRA.
Using the same method, configure the static LSP originating from LSRD and destined for LSRA.
# After completing the configuration, run the ping lsp ip 1.1.1.9 32 command on LSRD. The
LSP is reachable.
Run the display mpls static-lsp or display mpls static-lsp verbose command on the LSRs to
view the status and detailed information about the static LSP.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.1.1 255.255.255.252
mpls
#
interface Pos2/0/0
link-protocol ppp
undo shutdown
ip address 10.3.1.1 255.255.255.252
mpls
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.3
network 10.3.1.0 0.0.0.3
#
static-lsp ingress RAtoRD destination 4.4.4.9 32 nexthop 10.1.1.2 out-label 20
static-lsp egress RDtoRA incoming-interface Pos2/0/0 in-label 60
#
return
return
Networking Requirements
As shown in Figure 1-2:
Figure 1-2 Networking diagram for static BFD for static LSP
Loopback1
2.2.2.2/32
P
0
/0/ 24 10 OS1
1 .1. /0
S 2/ 5.2 /2
PO 1.1. /24
. P
Loopback1 0
/0/ 4 10 P1 10 OS1 Loopback1
1.1.1.1/32 OS1 .1/2 .1. /0/ 4.4.4.4/32
5.1 0
P 1.1 /24
.
10 Static LSP
P
PE1 10 OS 1
/0/ 24 PE2
.1. 1/0/ 1
S 1/
2.1 1
/24 PO 1.4.
.
P P2 10
10 OS1 /2
.1. /0/ S 1/0 /24
2.2 0
/24 PO 1.4.2
.
10
Loopback1
3.3.3.3/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure OSPF for the MPLS domain and reachable IP routes to each LSR.
2. Configure a BFD session on PE1 to monitor the static LSP.
3. Configure a BFD session on PE2, which advertises a failure in static LSP to PE1 (the reverse
link of the LSP is an IP link).
Data Preparations
To complete the configuration, you need the following data:
Procedure
Step 1 Configure the IP address and the OSPF protocol for each interface.
Assign an IP address and a mask to each interface as shown in Figure 1-2, including loopback
interfaces.
Configure OSPF on all LSRs to advertise the host route of the loopback interface. For
configuration details, see Configuration Files in this section.
After the configuration is complete, each LSR can ping the other LSR ID. Run the display ip
routing-table command to view the route table on each LSR. The following example uses the
command output on PE1.
<PE1> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 14 Routes : 15
Destination/Mask Proto Pre Cost Flags NextHop Interface
1.1.1.1/32 Direct 0 0 127.0.0.1 LoopBack1
2.2.2.2/32 OSPF 10 2 10.1.1.2 Pos1/0/0
3.3.3.3/32 OSPF 10 2 10.1.2.2 Pos1/0/1
4.4.4.4/32 OSPF 10 3 10.1.1.2 Pos1/0/0
OSPF 10 3 10.1.2.2 Pos1/0/1
10.1.1.0/24 Direct 0 0 10.1.1.1 Pos1/0/0
10.1.1.1/32 Direct 0 0 127.0.0.1 Pos1/0/0
10.1.1.2/32 Direct 0 0 10.1.1.2 Pos1/0/0
10.1.2.0/24 Direct 0 0 10.1.2.1 Pos1/0/1
10.1.2.1/32 Direct 0 0 127.0.0.1 Pos1/0/1
10.1.2.2/32 Direct 0 0 10.1.2.2 Pos1/0/1
10.1.4.0/24 OSPF 10 2 10.1.2.2 Pos1/0/1
10.1.5.0/24 OSPF 10 2 10.1.1.2 Pos1/0/0
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0
# Enable MPLS on PE1 globally and on each interface. The following example uses the
command output on PE1.
<PE1> system-view
[PE1] mpls lsr-id 1.1.1.1
[PE1] mpls
[PE1-mpls] quit
[PE1] interface pos 1/0/0
[PE1-Pos1/0/0] mpls
[PE1-Pos1/0/0] quit
[PE1] interface pos 1/0/1
[PE1-Pos1/0/1] mpls
[PE1-Pos1/0/1] quit
Step 3 Create a static LSP with PE1 functioning as the ingress and PE2 functioning as the egress.
After completing the configuration, run the ping lsp ip 4.4.4.4 32 command on PE1. The LSP
is reachable.
# Configure a BFD session on PE1 (ingress). Set the local discriminator to 1 and remote
discriminator to 2. Set the minimal intervals between packet transmissions and receipts to 10
seconds. Enable the BFD session to modify the interface status table.
[PE1] bfd 1to4 bind static-lsp 1to4
[PE1-bfd-lsp-session-1to4] discriminator local 1
[PE1-bfd-lsp-session-1to4] discriminator remote 2
[PE1-bfd-lsp-session-1to4] min-tx-interval 10
[PE1-bfd-lsp-session-1to4] min-rx-interval 10
[PE1-bfd-lsp-session-1to4] process-pst
[PE1-bfd-lsp-session-1to4] commit
[PE1-bfd-lsp-session-1to4] quit
# Configure the BFD session on PE2 (egress) that advertises a static LSP failure using the IP
route.
[PE2] bfd 4to1 bind peer-ip 1.1.1.1
[PE2-bfd-session-4to1] discriminator local 2
[PE2-bfd-session-4to1] discriminator remote 1
[PE2-bfd-session-4to1] min-tx-interval 10
[PE2-bfd-session-4to1] min-rx-interval 10
[PE2-bfd-session-4to1] commit
[PE2-bfd-session-4to1] quit
# Run the display bfd session all verbose command. The BFD session on PE1 is Up. The
following example uses the command output on PE1.
[PE1] display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 256 (One Hop)State : Up Name : 1to4
--------------------------------------------------------------------------------
Local Discriminator : 1 Remote Discriminator : 2
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : STATIC_LSP
Bind Session Type : Static
Bind Peer Ip Address : 4.4.4.4
NextHop Ip Address : 10.1.1.2
Static LSP name : 1to4 LSP Token : 0x1002000
Bind Interface : --
FSM Board Id : 1 TOS-EXP : 7
Min Tx Interval (ms) : 10 Min Rx Interval (ms) : 10
Actual Tx Interval (ms): 10 Actual Rx Interval (ms): 10
Local Detect Multi : 3 Detect Interval (ms) : 30
# Run the display bfd session all verbose command on PE2 to view the configuration.
[PE2] display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 256 (Multi Hop) State : Up Name : 4to1
--------------------------------------------------------------------------------
Local Discriminator : 2 Remote Discriminator : 1
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Peer Ip Address
Bind Session Type : Static
Bind Peer Ip Address : 1.1.1.1
NextHop Ip Address : 10.1.4.2
Bind Interface : --
FSM Board Id : 1 TOS-EXP : 7
Min Tx Interval (ms) : 10 Min Rx Interval (ms) : 10
Actual Tx Interval (ms): 10 Actual Rx Interval (ms): 10
Local Detect Multi : 3 Detect Interval (ms) : 30
Echo Passive : Disable Acl Number : -
Proc Interface Status : Disable Process PST : Disable
WTR Interval (ms) : - Local Demand Mode : Disable
Active Multi : 3
Local Demand Mode : Disable
Last Local Diagnostic : Control Detection Time Expired
Bind Application : No Application Bind
Session TX TmrID : -- Session Detect TmrID : --
Session Init TmrID : -- Session WTR TmrID : --
Session Echo Tx TmrID : -
PDT Index : FSM-0|RCV-0|IF-0|TOKEN-0
Session Description : -
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
# Run the display bfd session all verbose command on each PE to view the BFD status.
[PE2] display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 256 (Multi Hop) State : Down Name : 4to1
--------------------------------------------------------------------------------
Local Discriminator : 2 Remote Discriminator : 1
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Peer Ip Address
Bind Session Type : Static
Bind Peer Ip Address : 1.1.1.1
Bind Interface : -
FSM Board Id : 1 TOS-EXP : 7
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
mpls lsr-id 1.1.1.1
mpls
#
bfd
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
l P1 configuration file
#
sysname P1
#
mpls lsr-id 2.2.2.2
mpls
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.1.2 255.255.255.0
mpls
#
interface Pos1/0/2
link-protocol ppp
undo shutdown
ip address 10.1.5.2 255.255.255.0
mpls
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
#
ospf 100
area 0.0.0.0
network 2.2.2.2 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.5.0 0.0.0.255
#
static-lsp transit 1to4 incoming-interface Pos1/0/0 in-label 20 nexthop
10.1.5.1 out-label 30
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 3.3.3.3
mpls
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.2.2 255.255.255.0
mpls
#
interface Pos1/0/2
link-protocol ppp
undo shutdown
ip address 10.1.4.2 255.255.255.0
mpls
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
#
ospf 100
area 0.0.0.0
network 3.3.3.3 0.0.0.0
network 10.1.2.0 0.0.0.255
network 10.1.4.0 0.0.0.255
#
return
Multiprotocol Label Switching (MPLS) Label Distribution Protocol (LDP) defines the messages
used during label distribution and the processing of the messages used to negotiate parameters
between label switching routers (LSRs) and allocate labels to set up a label switched path (LSP).
2.7 Configuring a Node to Report LSP Fault Locations and Causes to the Ingress
Nodes on an LDP LSP can be enabled to report the locations and causes of LSP faults to the
ingress. After receiving fault notifications, the ingress notifies the NMS of fault information so
that the NMS is able to associates the root trap with the other traps. Administrators can rectify
the fault only using the root trap information, which improves fault-handling efficiency.
An automatic mLDP P2MP tunnel must be configured before it can be automatically established
to transmit multicast services when the multicast services arrive in an IP/MPLS backbone
network.
The following sections provide several examples for configuring MPLS LDP.
The IP-based Internet prevailed in the middle 1990s. However, IP technology is inefficient at
forwarding packets because software must search for routes through the longest match algorithm.
As a result, the forwarding capability of IP technology becomes a bottleneck of network
development. The Asynchronous Transfer Mode (ATM) technology has been created from the
evolution of network technologies. It uses labels (particularly, cells) of fixed length and
maintains a label table that is much smaller than a routing table. Therefore, compared to IP
technology, ATM technology is much more efficient at forwarding packets. ATM technology,
however, is a complex protocol with a high cost of deployment, which hinders its widespread
popularity and growth.
Traditional IP technology, however, is simple and costs little to deploy. People are eager to use
technology that combines the best that IP and ATM technologies have to offer. This has sparked
the emergence of Multiprotocol Label Switching (MPLS) technology.
Initially, MPLS was created to increase forwarding rates. With the development of the
application-specific integrated circuit (ASIC) technology Application specific integrated circuit
(ASIC) technology has now been developed, and the routing rate is no longer a bottleneck to
network development. As a result, MPLS no longer has the high-speed forwarding advantage.
MPLS is widely used in virtual private network (VPN), traffic engineering (TE), and quality of
service (QoS) because of its support for multi-layer labels, the connection-oriented forwarding
plane, and the connectionless control plane.
LDP is an MPLS control protocol. Similar to most routing protocols, LDP sends multicast Hello
messages to automatically discover LDP peers and establish peer relationships, or sends unicast
Hello messages to establish target peer relationships. LDP uses negotiated parameters to
establish LDP sessions over TCP connections between peers. LDP sessions send Label Mapping
messages, distribute labels related to routes, and establish LSPs. Data packets travel along the
LSPs over MPLS networks.
In real world situations, LDP is run on the provider (P) devices to forward LDP messages and
on provider edge (PE) devices to support services such as LDP over TE on backbone networks.
Service provider's
VPN 2
VPN 1 backbone Site
Site P P P PE
CE CE
PE
VPN 1
Site
VPN 2
PE
Site P P P
CE
CE
Equal-cost LDP LSPs for the same FEC can be established on the ingress or a transit node
to balance traffic. You can adjust the maximum number of equal-cost LDP LSPs that can
be established to improve link usage efficiency or save LDP LSP resources.
l mLDP
The multipoint extensions for Label Distribution Protocol (mLDP) transmits multicast
services over IP/MPLS backbone networks, which simplifies network deployment and
improves the efficiency of bandwidth usage.
In some applications, such as IPTV, a fixed multicast source and multiple receivers are
configured. To transmit such applications, the mLDP point-to-multipoint (P2MP)
technique can be used. mLDP P2MP extends the MPLS LDP protocol to establish P2MP
paths. A tree-shaped mLDP P2MP LSP consists of sub-LSPs originating from the root node
(ingress) and destined for leaf nodes. The root node directs multicast traffic to the P2MP
LSP and sends packets to a branch node for replication. The branch node replicates the
packets and forwards the packets to leaf nodes connected to the branch node.
l LDP over TE
MPLS TE supports strong traffic engineering capabilities and provides various QoS
guarantees. Due to live network limitations, such as application types and costs, deploying
MPLS TE on the entire network is difficult. Therefore, LDP over TE can be used to deploy
MPLS TE on a core area and LDP on non-core areas.
Reliability
The NE80E/40E supports the following reliability features for LDP LSPs:
l BFD
Bidirectional forwarding detection (BFD) detects faults in LDP LSPs. BFD packets are in
a fixed format and easily traverse firewalls, with low hardware requirements. BFD has the
following advantages:
– Rapid detection
– Detection for faults in a large number of LSPs
l LDP FRR
Traditional IP fast reroute (FRR) cannot protect MPLS traffic. The NE80E/40E supports
LDP FRR and provides interface-level protection solutions.
When there is no fault, a primary LSP is forwarding traffic. If the outbound interface of the
primary LSP goes Down, a backup LSP takes over traffic, ensuring uninterrupted traffic
transmission during network convergence.
The NE80E/40E supports LDP Auto FRR and LDP manual FRR.
l LDP-IGP synchronization
On an MPLS network with both the primary and backup LSPs, if the primary LSP fails,
traffic switches from the primary LSP to the backup LSP. This process causes traffic
interruption hundreds of milliseconds. After the primary LSP recovers, traffic switches
back to the primary LSP. This process causes traffic interruption approximately 5 seconds.
LDP-IGP synchronization can be configured, minimizing traffic interruption during a
traffic switchback to milliseconds.
l LDP and static route synchronization
On an MPLS network with both the primary and backup LSPs, LSRs use static routes to
establish LSPs. If the primary LSP fails, traffic switches from the primary LSP to the backup
LSP. This process causes traffic interruption hundreds of milliseconds. After the primary
LSP recovers, traffic switches back to the primary LSP. This process causes traffic
interruption several seconds.
LDP and static route synchronization can be configured, minimizing traffic interruption
during a traffic switchback to milliseconds.
LDP and static route synchronization sets static routes to the inactive state to delay the
traffic switchback. This allows the static route and the primary LSP to become available
simultaneously.
l LDP GR
Graceful restart (GR) is a key technique for high availability (HA). GR is used to protect
traffic during active main board (AMB)/standby main board (SMB) switchovers and
upgrade. LDP GR prevents the system from resetting an interface board when an AMB/
SMB switchover is performed. This helps retain LDP LSP information on the data plane,
ensures uninterrupted LSP forwarding, and minimizes adverse impact on MPLS packet
forwarding.
l LDP NSR
Non-stop routing (NSR) ensures uninterrupted traffic transmission and proper connections
on the control plane if a software or hardware fault occurs. This prevents the control plane
on a neighbor device from detecting the fault and being affected.
Usage Scenario
A local LDP session must be created between each pair of directly connected LSRs before an
LSP is established. LDP distributes and swaps label along an LSP.
When LDP LSPs carry L2VPN and L3VPN services, you can specify an LSR ID for each local
LDP session on the current LSR to isolate VPN services.
Pre-configuration Tasks
Before configuring a local LDP session, configure static routes or an IGP to implement reachable
routes between LSRs.
Data Preparation
To configure a local LDP session, you need the following data.
Item Data
2 Type and number of the interface on which the local LDP session is to be set up
Procedure
Step 1 Run:
system-view
l LSR IDs must be set before other MPLS commands are run.
l No default LSR ID is provided and the LSR ID needs to be configured.
l Using the IP address of a loopback interface as the LSR ID is recommended for an LSR.
l Before a configured LSR ID is changed, the undo mpls command must be run in the system
view to delete all MPLS configurations.
NOTICE
After the undo mpls command is run, all MPLS configurations including LDP sessions and
LSPs will be deleted and services will be interrupted. Correctly plan and set all LSR IDs for
LSRs on an MPLS network to prevent this problem.
Step 3 Run:
mpls
Step 4 Run:
quit
Step 5 Run:
mpls ldp
The default LSR ID of an LDP instance is the LSR ID of the LSR where the LDP instance is
configured. Using the default value is recommended.
----End
Context
On an LSR disabled from the dynamic LDP negotiation capability, if an extended LDP function
is enabled after an LDP session has been created, the LDP session will be interrupted and the
extended LDP function will be negotiated, affecting LSP stability. The dynamic LDP
advertisement capability allows an extended LDP function to be enabled or disabled dynamically
during proper operation of an LDP session, ensuring LSP stability.
NOTE
Enabling this function immediately after LDP is enabled globally is recommended. The dynamic LDP
advertisement capability does not affect existing LDP functions.
Before the dynamic LDP advertisement capability is enabled, MPLS and LDP must be enabled globally.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
capability-announcement
NOTE
Enabling dynamic LDP advertisement after an LDP session is established will result in reestablishment of
the LDP session.
----End
Context
The NE80E/40E does not support LDP loop detection. To establish an LDP session with a device
enabled with LDP loop detection, the NE80E/40E needs to be enabled with the capability of
negotiating LDP loop detection.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
loop-detect
LDP loop detection negotiation is enabled. This allows the NE80E/40E to negotiate LDP
parameters during the initialization phase and establish an LDP session with a peer device that
is enabled with LDP loop detection.
NOTE
After the loop-detect command is run, the NE80E/40E obtains the capability of negotiating LDP loop
detection but still does not support LDP loop detection.
A path vector is carried in a Mapping message to record the addresses of nodes that an LDP LSP
has passed. By setting the maximum hops that a path vector can record, you can adjust the
sensitivity of LDP loop detection. If the maximum hops of a path vector is n, the egress LSP
triggered by local routes detects a loop after n + 1 hops, and the egress LSP triggered by non-
local routes detects a loop after n hops.
----End
Context
A local LDP session is created over a TCP connection. After a TCP connection is established,
LSRs negotiate LDP session parameters with each other. If LSRs on both ends of an LDP session
agree on negotiated parameters, a local LDP session can be established.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls
Step 4 Run:
mpls ldp
NOTE
Disabling LDP on an interface causes the interface to terminate all LDP sessions on it and delete all LSPs
established using the LDP sessions.
----End
Context
LDP transport addresses are used to set up a TCP connection and need to be configured on both
nodes of a local LDP session. The default transport address is the loopback interface address
used as an LSR ID.
NOTE
l If LDP sessions are to be established over multiple links connecting two LSRs, LDP-enabled interfaces
of either LSR must use the default transport address or the same transport address. If multiple transport
addresses are configured on an LSR, only one transport address can be used to establish only one LDP
session.
l A change in an LDP transport address will terminate an LDP session. Exercise caution when running
the mpls ldp transport-address command.
Procedure
Step 1 Run:
system-view
The view of the interface on which the LDP session is set up is displayed.
Step 3 Run:
mpls ldp transport-address { interface-type interface-number | interface }
An LDP transport address is specified. Either of the following settings can be used:
----End
Context
A local LDP session uses the following timers.
Link Hello send Used to send Hello messages On an unstable network, decrease the
timer periodically to notify a peer LSR value of a link Hello send timer,
of the local LSR's presence and speeding up network fault detection.
establish a Hello adjacency.
Similar to a remote LDP session,
a local LDP session uses a link
Hello send timer.
Link Hello hold Used to exchange Hello On a network with unstable links or a
timer messages periodically between large number of packets, increase the
two LDP peers to maintain the value of the link Hello hold timer,
Hello adjacency. If no Hello preventing a local LDP session from
message is received after the link being torn down and set up frequently.
Hello hold timer expires, the
Hello adjacency is torn down.
Similar to a remote LDP session,
a local LDP session uses a link
Hello hold timer.
KeepAlive hold Used to send LDP PDUs over an On a network with unstable links,
timer LDP session, maintaining the increase the value of the KeepAlive
local LDP session. If no LDP hold timer, preventing the local LDP
PDU is received after the session from flapping.
KeepAlive hold timer expires,
the TCP connection is closed and
the local LDP session is
terminated.
Procedure
l Perform the following steps to configure a link Hello send timer:
1. Run:
system-view
A smaller value between two configured link Hello hold timers on both ends of the
LDP session takes effect.
l Configure a KeepAlive send timer.
1. Run:
system-view
The default value of a KeepAlive send timer is one third of the value of the KeepAlive
hold timer.
Effective value of a KeepAlive send timer = Min { Configured value of the KeepAlive
send timer, one third of the value of the KeepAlive hold timer }
If more than one LDP-enabled links connect two LSRs, the values of KeepAlive send
timers for all links must be the same. Otherwise, LDP sessions become unstable.
NOTICE
Changing the value of a KeepAlive send timer may lead to reestablishment of related
LDP sessions.
A smaller value between two configured KeepAlive hold timers on both ends of the
LDP session takes effect.
If more than one LDP-enabled links connect two LSRs, the values of KeepAlive hold
timers for all links must be the same. Otherwise, LDP sessions may fail to be set up.
NOTICE
Changing the value of a KeepAlive hold timer may lead to reestablishment of related
LDP sessions.
– init: specifies the initial value of an Exponential backoff timer. The value is an
integer ranging from 5 to 2147483, in seconds. The default value is 15.
– max: specifies the maximum value of an Exponential backoff timer. The value is
an integer ranging from 5 to 2147483, in seconds. The default value is 120.
NOTE
Setting the initial value equal to or greater than 15 and the maximum value equal to or greater
than 120 is recommended.
The backoff timer command helps the active role adjust the interval between attempts
to establish an LDP session.
– The initial and maximum values can be increased to allow a longer interval between
attempts to establish an LDP session during device upgrade.
– The initial and maximum values can be decreased to allow a shorter interval
between attempts to establish an LDP session if intermittent service interruptions
occur.
----End
Prerequisites
A local LDP session has been configured.
Procedure
l Run the display mpls interface [ interface-type interface-number ] [ verbose ] command
to check information about MPLS-enabled interfaces.
l Run the display mpls ldp [ all ] [ verbose ] command to check LDP information.
l Run either of the following commands to check information about LDP-enabled interfaces:
– display mpls ldp interface [ interface-type interface-number | verbose ]
– display mpls ldp interface [ all ] [ verbose ]
l Run either of the following commands to check the LDP session status:
– display mpls ldp session [ verbose | peer-id ]
– display mpls ldp session [ all ] [ verbose ]
l Run either of the following commands to check information about LDP peers:
– display mpls ldp peer [ verbose | peer-id ]
– display mpls ldp peer [ all ] [ verbose ]
----End
Example
Run the display mpls interface command to view information about all MPLS-enabled
interfaces.
<HUAWEI> display mpls interface
Interface Status TE Attr LSP Count CRLSP Count Effective MTU
Pos1/0/0 Up Dis 0 0 1500
Run the display mpls ldp command to view global LDP information, including timers.
<HUAWEI> display mpls ldp
LDP Global Information
--------------------------------------------------------------------------
Protocol Version : V1 Neighbor Liveness : 600 Sec
Graceful Restart : Off FT Reconnect Timer : 300 Sec
MTU Signaling : On Recovery Timer : 300 Sec
Capability-Announcement : On Longest-match : On
mLDP P2MP Capability : Off mLDP MBB Capability : Off
mLDP MP2MP Capability : Off
LDP Instance Information
--------------------------------------------------------------------------
Instance ID : 0 VPN-Instance :
Instance Status : Active LSR ID : 4.4.4.4
Loop Detection : Off Path Vector Limit : 32
Label Distribution Mode : Ordered
Label Retention Mode : Liberal(DU)/Conservative(DOD)
Instance Deleting State : No Instance Reseting State : No
Graceful-Delete : Off Graceful-Delete Timer : 5 Sec
--------------------------------------------------------------------------
Run the display mpls ldp interface [ verbose ] command to view LDP-enabled interface
information, including transport addresses and timers.
<HUAWEI> display mpls ldp interface
Run the display mpls ldp session [ verbose ] command. The command output shows that the
LDP session status is Operational.
<HUAWEI> display mpls ldp session
LDP Session(s) in Public Network
Codes: LAM(Label Advertisement Mode), SsnAge Unit(DDDD:HH:MM)
A '*' before a session means the session is being deleted.
------------------------------------------------------------------------------
PeerID Status LAM SsnRole SsnAge KASent/Rcv
------------------------------------------------------------------------------
2.2.2.2:0 Operational DU Passive 0000:01:36 387/386
3.3.3.3:0 Operational DU Passive 0000:01:30 361/361
------------------------------------------------------------------------------
TOTAL: 2 session(s) Found.
<HUAWEI> display mpls ldp session verbose
Capability:
Capability-Announcement : On
mLDP P2MP Capability : Off
mLDP MP2MP Capability : Off
mLDP MBB Capability : Off
------------------------------------------------------------------------------
Run the display mpls ldp peer command to view LDP peer information.
<HUAWEI> display mpls ldp peer
LDP Peer Information in Public network
A '*' before a peer means the peer is being deleted.
------------------------------------------------------------------------------
PeerID TransportAddress DiscoverySource
------------------------------------------------------------------------------
2.2.2.2:0 2.2.2.2 Remote Peer : rtb
Serial0/0/0
3.3.3.3:0 3.3.3.3 Remote Peer : rtc
------------------------------------------------------------------------------
TOTAL: 2 Peer(s) Found.
Usage Scenario
A remote LDP session supports the following applications:
l Allocating inner labels for L2VPN
If a Martini VLL or VPLS connection is to be established between two LSRs, the remote
LDP session must be established between the LSRs to allocate inner labels.
l Configuring LDP over TE
If the core area on an MPLS network supports TE and the edge devices run LDP, two LSRs
at the edge establish the remote LDP session. LDP over TE allows a TE tunnel to function
as a hop on an LDP LSP.
When LDP LSPs carry L2VPN and L3VPN services, you can configure an LSR ID for each
remote LDP session on the LSR to isolate VPN services.
Pre-configuration Tasks
Before configuring a remote LDP session, configure static routes or an IGP to implement
reachable routes between LSRs.
Data Preparation
To configure a remote LDP session, you need the following data.
No. Data
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls lsr-id lsr-id
NOTICE
After the undo mpls command is run, all MPLS configurations including LDP sessions and
LSPs will be deleted and services will be interrupted. Correctly plan and set all LSR IDs for
LSRs on an MPLS network to prevent this problem.
Step 3 Run:
mpls
----End
Context
On an LSR disabled from the dynamic LDP negotiation capability, if an extended LDP function
is enabled after an LDP session has been created, the LDP session will be interrupted and the
extended LDP function will be negotiated, affecting LSP stability. The dynamic LDP
advertisement capability allows an extended LDP function to be enabled or disabled dynamically
during proper operation of an LDP session, ensuring LSP stability.
NOTE
Enabling this function immediately after LDP is enabled globally is recommended. The dynamic LDP
advertisement capability does not affect existing LDP functions.
Before the dynamic LDP advertisement capability is enabled, MPLS and LDP must be enabled globally.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
capability-announcement
NOTE
Enabling dynamic LDP advertisement after an LDP session is established will result in reestablishment of
the LDP session.
----End
Context
The NE80E/40E does not support LDP loop detection. To establish an LDP session with a device
enabled with LDP loop detection, the NE80E/40E needs to be enabled with the capability of
negotiating LDP loop detection.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
loop-detect
LDP loop detection negotiation is enabled. This allows the NE80E/40E to negotiate LDP
parameters during the initialization phase and establish an LDP session with a peer device that
is enabled with LDP loop detection.
NOTE
After the loop-detect command is run, the NE80E/40E obtains the capability of negotiating LDP loop
detection but still does not support LDP loop detection.
A path vector is carried in a Mapping message to record the addresses of nodes that an LDP LSP
has passed. By setting the maximum hops that a path vector can record, you can adjust the
sensitivity of LDP loop detection. If the maximum hops of a path vector is n, the egress LSP
triggered by local routes detects a loop after n + 1 hops, and the egress LSP triggered by non-
local routes detects a loop after n hops.
----End
Context
A remote LDP session can be established between two indirectly connected LSRs or two directly
connected LSRs.
A local LDP session and a remote LDP session can be established simultaneously between two
LSRs.
When a local LDP session and a remote LDP session are established between two LSRs, the
configurations that both the local and remote LDP sessions support must be the same.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp remote-peer remote-peer-name
A remote MPLS LDP peer is created, and the peer MPLS-LDP view is displayed.
Step 3 Run:
remote-ip ip-address [ pwe3 ]
PEs on both ends of an MPLS L2VPN that runs LDP signaling can establish a remote LDP
session. The MPLS L2VPN can be a Martini VLL, PWE3, or Martini VPLS network. The remote
LDP session is expected to transmit Label Mapping messages carrying VC labels, not LDP
labels. By default, the PE distributes LDP labels to its peer. To disable the PE from distributing
LDP labels to its peer, configure pwe3 in the remote-ip command to disable the PE from
distributing LDP labels to a specified remote LDP peer.
NOTE
l The IP address must be the local LSR ID of the current LDP session on the remote LDP peer.
l Modifying or deleting a configured IP address of a remote peer also deletes the remote LDP session.
l If a remote peer IP address is specified using the remote-ip ip-address command, ip-address cannot
be used as a local interface IP address. If it is used as a local interface IP address, the remote LDP
session is interrupted.
----End
Context
PEs on both ends of an MPLS L2VPN that runs LDP signaling can establish a remote LDP
session. The MPLS L2VPN can be a Martini VLL, PWE3, or Martini VPLS network. The remote
LDP session is expected to transmit Label Mapping messages carrying VC labels, not LDP
labels. By default, the PE distributes LDP labels to its peer. To disable the PE from distributing
LDP labels to its peer, perform either of the following operations, which helps prevent LDP
label wastes and minimize memory usage.
l In the LDP view, disable the PE from distributing labels to all remote peers.
l In the view of a specified remote peer, disable the PE from distributing labels to the specified
remote peer.
Procedure
l Disable a device from distributing LDP labels to all remote peers.
1. Run:
system-view
The device is disabled from distributing LDP labels to all remote peers.
l Disable a device from distributing labels to a specified remote peer.
1. Run:
system-view
A device is disabled from distributing LDP labels to the specified remote peer.
----End
Context
Table 2-2 lists timers that a remote LDP session uses.
Keepalive hold Sends LDP PDUs over an LDP On a network with unstable links,
timer session to maintain the remote increase the value of a Keepalive hold
LDP session. If no LDP PDU is timer, preventing a remote LDP
received after the Keepalive hold session from flapping.
timer expires, the TCP
connection is closed and the
remote LDP session is
terminated.
Exponential Started by an LSR that plays an l The initial and maximum values
backoff timer active role after the LSR fails to can be increased to allow a longer
process an LDP Initialization interval between attempts to
message or is notified that establish an LDP session during
another LSR playing a passive device upgrade.
role rejects parameters carried in l The initial and maximum values
the received LDP Initialization can be reduced to allow a shorter
message. The LSR playing the interval between attempts to
active role periodically resends establish an LDP session if
an LDP Initialization message to intermittent service interruptions
initiate an LDP session before occur.
the Exponential backoff timer
expires.
Procedure
l Configure a target Hello send timer.
1. Run:
system-view
The default value of the target Hello hold timer is 45, in seconds.
The value of the target Hello hold timer configured using the mpls ldp timer hello-
hold command may not be equal to the value of the timer that takes effect. The smaller
value between the timers configured at both ends of a remote LDP session takes effect.
l Configure a Keepalive send timer for a remote LDP session.
1. Run:
system-view
The default value of the Keepalive send timer is one third of the value of the effective
Keepalive hold timer.
Effective value of a Keepalive send timer = Min {Configured value of the Keepalive
send timer, One third of the effective value of the Keepalive hold timer}
If more than one LDP-enabled links connect to two LSRs, the values of Keepalive
send timers for all links must be the same. Different settings cause the LDP sessions
to be unstable.
NOTICE
Changing the value of a Keepalive send timer causes the reestablishment of related
LDP sessions.
The value of the Keepalive hold timer configured on the LSR may not be equal to the
value of the timer that takes effect. The smaller value between the timers configured
at both ends of a remote LDP session takes effect.
If there is more than one LDP link between two LSRs, the values of the Keepalive
hold timers configured for the links must be the same. Different settings cause the
LDP sessions to be unstable.
NOTICE
Changing the value of a Keepalive hold timer causes the reestablishment of related
LDP sessions.
– init: specifies the initial value of the Exponential backoff timer. The value is an
integer ranging from 5 to 2147483, in seconds. The default value is 15.
– max: specifies the maximum value of the Exponential backoff timer. The value is
an integer ranging from 5 to 2147483, in seconds. The default value is 120.
NOTE
Setting the initial value of the Exponential backoff timer to be greater than or equal to 15s and
the maximum value to be greater than or equal to 120s is recommended.
The backoff timer command can be used to change the interval between attempts to
set up a session. Its usage is as follows:
– When a device is being upgraded, increase the initial and maximum values to set
a large interval between attempts to set up a session.
– When a device that is transmitting services is prone to intermittent interruptions,
reduce the initial and maximum values to set a small interval between attempts to
set up a session.
----End
Prerequisites
The remote LDP session has been configured.
Procedure
l Run the display mpls ldp [ all ] [ verbose ] command to check LDP configurations.
l Run either of the following commands to check the LDP session status:
– display mpls ldp session [ verbose | peer-id ]
– display mpls ldp session [ all ] [ verbose ]
l Run either of the following commands to check information about LDP peers:
– display mpls ldp peer [ verbose | peer-id ]
– display mpls ldp peer [ all ] [ verbose ]
l Run the display mpls ldp remote-peer [ remote-peer-name ] command to check
information about remote LDP peers.
----End
Example
Run the display mpls ldp command to view global LDP information, including timers.
<HUAWEI> display mpls ldp
LDP Global Information
--------------------------------------------------------------------------
Protocol Version : V1 Neighbor Liveness : 600 Sec
Graceful Restart : Off FT Reconnect Timer : 300 Sec
MTU Signaling : On Recovery Timer : 300 Sec
Capability-Announcement : On Longest-match : On
mLDP P2MP Capability : Off mLDP MBB Capability : Off
mLDP MP2MP Capability : Off
LDP Instance Information
--------------------------------------------------------------------------
Instance ID : 0 VPN-Instance :
Instance Status : Active LSR ID : 4.4.4.4
Loop Detection : Off Path Vector Limit : 32
Label Distribution Mode : Ordered
Label Retention Mode : Liberal(DU)/Conservative(DOD)
Run the display mpls ldp interface [ verbose ] command to view LDP-enabled interface
information, including transport addresses and timers.
<HUAWEI> display mpls ldp interface
Run the display mpls ldp session [ verbose ] command. The command output shows that the
LDP session status is Operational.
<HUAWEI> display mpls ldp session
LDP Session(s) in Public Network
Codes: LAM(Label Advertisement Mode), SsnAge Unit(DDDD:HH:MM)
A '*' before a session means the session is being deleted.
------------------------------------------------------------------------------
PeerID Status LAM SsnRole SsnAge KASent/Rcv
------------------------------------------------------------------------------
2.2.2.2:0 Operational DU Passive 0000:01:36 387/386
3.3.3.3:0 Operational DU Passive 0000:01:30 361/361
------------------------------------------------------------------------------
TOTAL: 2 session(s) Found.
<HUAWEI> display mpls ldp session verbose
Capability:
Capability-Announcement : On
mLDP P2MP Capability : Off
mLDP MP2MP Capability : Off
mLDP MBB Capability : Off
------------------------------------------------------------------------------
Run the display mpls ldp peer command to view LDP peer information.
<HUAWEI> display mpls ldp peer
LDP Peer Information in Public network
A '*' before a peer means the peer is being deleted.
------------------------------------------------------------------------------
PeerID TransportAddress DiscoverySource
------------------------------------------------------------------------------
2.2.2.2:0 2.2.2.2 Remote Peer : rtb
Serial0/0/0
3.3.3.3:0 3.3.3.3 Remote Peer : rtc
------------------------------------------------------------------------------
TOTAL: 2 Peer(s) Found.
Run the display mpls ldp remote-peer command to view remote LDP peer information.
<HUAWEI> display mpls ldp remote-peer
Usage Scenario
LDP is used to distribute labels on an MPLS network and establish LSPs automatically in the
situation where paths for the LSPs do not need to be specified and traffic engineering (TE) does
not need to be deployed on the MPLS network.
The number of LSPs that an LSR supports depends on the capacity and performance of the LSR.
A large number of LSPs probably lead to unstable LSR operation.
LSPs can be established based on eligible routes and a policy for triggering LSP establishment.
The LSP establishment policy filters out unqualified routes and allows LDP to use eligible routes
to establish LSPs and control the number of LSPs.
Policies for triggering the LSP establishment are used based on the following types of LSPs:
Pre-configuration Tasks
Before configuring LDP LSPs, configure a local LDP session.
Data Preparation
To configure LDP LSPs, you need the following data.
No. Data
Prerequisites
The task described in 2.2 Configuring a Local LDP Session is complete.
Context
An MPLS LDP session is configured between each pair of adjacent LSRs along an LSP to be
established. After MPLS LDP sessions are established, LDP LSPs are automatically established.
Context
No label needs to be swapped on the egress of an LSP. PHP can be configured on the egress to
allow the LSR at the penultimate hop to pop out the label from an MPLS packet and send the
packet to the egress. After receiving the packet, the egress directly forwards the unlabeled IP
packet or the single-labeled packet. PHP helps reduce the burden on the egress.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
label advertise { explicit-null | implicit-null | non-null }
The label allocated to the LSR at the penultimate hop is configured. One of the following
parameters can be configured in this command:
l implicit-null: is the default value and means that PHP is supported. If this parameter is
configured, the egress allocates an implicit null label with the value of 3 to the LSR at the
penultimate hop.
l explicit-null: means that PHP is not supported. If this parameter is configured, the egress
allocates an explicit null label with the value of 0 to the LSR at the penultimate hop. The
explicit-null parameter can be configured when MPLS QoS attributes are used.
l non-null: means that PHP is not supported. If this parameter is configured, the egress
allocates a common label with a value greater than or equal to 16 to the LSR at the penultimate
hop.
Exercise caution when using the explicit-null or non-null parameter. The setting leads to a great
deal of resource consumption on the egress.
NOTE
PHP takes effect on LSPs that will be established after PHP is configured.
----End
Context
A downstream LSR sends a Label Mapping message to an upstream LSR in downstream
unsolicited mode (DU) by default. This allows multiple LSPs including backup LSPs to be
established. If a network fault occurs, services rapidly switch to a backup LSP, improving
network reliability. Establishing a large number of LSPs burdens an LSR such as a digital
subscriber link access multiplexer (DSLAM) that is a low-performance access device deployed
on an MPLS network. On a large-scale network, a DSLAM can be configured to send Label
Mapping messages to only upstream LSRs only after receiving requests for labels. This
minimizes the number of unwanted MPLS forwarding entries forwarded by the DSLAM.
Procedure
l Configuring an LDP Label Advertisement Mode of local LDP session.
1. Run:
system-view
NOTE
l A pair of LDP peers must have the same label advertisement mode. Inconsistency in label
advertisement modes causes the two LDP peers to fail to establish LDP LSPs between them
over multiple links.
l Modifying a configured label advertisement mode leads to the reestablishment of an LDP
session, resulting in service interruptions.
l Configuring an LDP Label Advertisement Mode of remote LDP session.
1. Run:
system-view
The remote MPLS LDP peer is created and the remote MPLS LDP peer view is
displayed.
3. Run:
mpls ldp advertisement { dod | du }
NOTE
When the local and remote LDP sessions coexist, they must have the same label advertisement
mode.
----End
Context
On a large-scale network with a great number of remote LDP peers deployed, DSLAMs that are
low-end devices on the edge of the network cannot ensure network stability or prevent wasting
resources. Run the remote-ip auto-dod-request command or the remote-peer auto-dod-
request command to configure the function of triggering a request to a downstream node for a
Label Mapping message associated with all remote LDP peers or a remote LDP peer with a
specified LSR ID in DoD mode, which can save system resources.
To disable an LSR from automatically sending a request to a downstream node for a Label
Mapping message associated with a specified LSR ID in DoD mode, you can run the remote-
ip auto-dod-request block command.
NOTE
l A remote LDP session must be configured before the remote-peer auto-dod-request or remote-ip
auto-dod-request command is run.
l Run the longest-match command to configure LDP extension for inter-area LSPs before running the
remote-peer auto-dod-request or remote-ip auto-dod-request command.
l The mpls ldp advertisement dod command must be run to create an LDP session with a downstream
node in DoD mode before you run the remote-peer auto-dod-request or remote-ip auto-dod-
request command.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 You can perform either of the following procedures to enable a device to automatically send
DoD requests for Label Mapping messages to a specified or all downstream remote LDP peers.
l To enable the device to automatically send DoD requests for Label Mapping messages to all
downstream remote LDP peers, run:
remote-peer auto-dod-request
l You can perform the following procedures to enable the device to automatically send DoD
requests for Label Mapping messages to a specified downstream remote LDP peer.
1. Run:
quit
The remote MPLS LDP peer is created, and the remote MPLS LDP peer view is
displayed.
3. Run:
remote-ip ip-address
The IP address of the remote MPLS LDP peer is configured.
NOTE
l This IP address must be the LSR ID that the remote LDP peer uses to establish the existing
remote LDP session.
l Modifying or deleting the configured address of a remote peer also deletes the remote LDP
session.
4. Run:
remote-ip auto-dod-request
The device is enabled to automatically send DoD requests for Label Mapping messages
to a specified downstream remote LDP peer.
NOTE
To disable the function of the remote-peer auto-dod-request command, run the remote-ip auto-
dod-request block command.
----End
Context
MTU is short for maximum transmission unit. An MTU value determines the maximum number
of bytes each time a sender can send. If the size of packets exceeds the MTU supported by a
transit node or a receiver, the transit node or receiver fragments the packets or even discards
them, aggravating the network transmission load. MTU values must be correctly negotiated
between LSRs to allow packets to successfully reach the receiver.
LDP MTU = Min { All MTUs advertised by downstream devices, Local outbound interface
MTU }
A downstream LSR uses the preceding formula to calculate an MTU value, adds it to the MTU
TLV in a Label Mapping message, and sends the Label Mapping message upstream.
If an MTU value changes (such as when the local outbound interface or its configuration is
changed), an LSR recalculates an MTU value and sends a Label Mapping message carrying the
new MTU value upstream. The comparison process repeats to update MTU information along
an LSP.
The relationships between the MPLS MTU and the interface MTU are as follows:
l If an interface MTU but not an MPLS MTU is configured on an interface, the interface
MTU is used.
l If both an MPLS MTU and an interface MTU are configured on an interface, the smaller
value between the MPLS MTU and the interface MTU is used.
Procedure
Step 1 Run:
system-view
NOTE
The configured MPLS MTU takes effect immediately and there is no need to restart the interface.
----End
Context
An MPLS LDP-enabled LSR by default sends a Huawei proprietary MTU TLV different from
the MTU TLV defined in RFC 3988.
l Using the default MTU setting is recommended.
l Before a Huawei device is interconnected to a non-Huawei device, run the mtu-
signalling apply-tlv command on the Huawei device. This command allows the Huawei
device to send the MTU TLV in compliance with RFC 3988 to the non-Huawei device. If
this command is not run, a configured LDP MTU may fail to take effect.
Procedure
Step 1 Run:
system-view
Step 3 Run:
mtu-signalling [ apply-tlv ]
NOTE
Enabling or disabling the function to send an MTU TLV leads the reestablishment of existing LDP sessions.
----End
Context
An LSR sends Label Mapping messages to both upstream and downstream LDP peers by default,
speeding up LDP LSP convergence. DSLAMs functioning as access devices on an MPLS
network have low performance. All LDP peers (DSLAMs) by default exchange labels with each
other to establish a large number of LSPs. As a result, the DSLAMs are heavily burdened. An
LDP split horizon policy can be configured to reduce the number of unwanted LSPs and
efficiently use memory.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
outbound peer { peer-id | all } split-horizon
A split horizon policy is configured to distribute labels to only upstream LDP peers.
By default, split horizon is not enabled and an LSR distributes labels to both upstream and
downstream LDP peers.
In the outbound peer command, configure either of the following parameters to prevent an LSR
from distributing labels to specified downstream peers:
l peer-id: prevents the LSR from distributing labels to a specified downstream peer.
l all: prevents the LSR from distributing labels to all downstream peers.
NOTE
The all parameter takes preference over the peer-id parameter. For example, the outbound peer all split-
horizon and then outbound peer 2.2.2.2 split-horizon commands are run, the outbound peer all split-
horizon command can be saved in the configuration file and take effect, not the outbound peer 2.2.2.2
split-horizon command.
----End
Context
An LSR is usually able to receive Label Mapping messages from all LDP peers or send Label
Mapping messages to both upstream and downstream LDP peers, speeding up LDP LSP
convergence. This leads to a great number of unwanted LSPs to be established, wasting
resources. An inbound LDP policy can be configured to reduce the number of Label Mapping
messages to be received; an outbound LDP policy can be configured to reduce the number of
Label Mapping messages to be sent. The inbound and outbound LDP policies help reduce the
number of unwanted LSPs to be established and efficiently use memory.
Procedure
l Configure an inbound LDP policy.
1. Run:
system-view
An inbound policy for allowing the local LSR to receive label mapping messages from
a specified LDP peer for a specified IGP route is configured.
To apply a policy associated with a single FEC range to an LDP peer group or all LDP
peers from which the local LSR receive Label Mapping messages, configure either
the peer-group peer-group-name or all parameter in the command.
NOTE
If multiple inbound policies are configured for a specified LDP peer, the first configured one
takes effect. For example, the following two inbound policies are configured:
inbound peer 2.2.2.2 fec host
inbound peer peer-group group1 fec none
As group1 also contains an LDP peer with peer-id of 2.2.2.2, the following inbound policy
takes effect:
inbound peer 2.2.2.2 fec host
If two inbound policies are configured in sequence and the peer parameters in the two
commands are the same, the second command overwrites the first one. For example, the
following two inbound policies are configured:
inbound peer 2.2.2.2 fec host
inbound peer 2.2.2.2 fec none
The second configuration overwrites the first one. This means that the following inbound policy
takes effect on the LDP peer with peer-id of 2.2.2.2:
inbound peer 2.2.2.2 fec none
MPLS and MPLS LDP must be enabled globally before an inbound policy is configured.
To delete all inbound policies simultaneously, run the undo inbound peer all command.
l Configure an outbound LDP policy.
1. Run:
system-view
– To configure an outbound policy that allows Label Mapping messages for specified
labeled BGP routes to be sent to a specified LDP peer, run:
outbound peer { peer-id | peer-group peer-group-name | all } bgp-label-
route { none | ip-prefix prefix-name }
To apply a policy associated with a single FEC range to an LDP peer group or all LDP
peers to which the local LSR sends Label Mapping messages, configure either the
peer-group peer-group-name or all parameter in the command.
NOTE
If multiple outbound policies are configured for a specified LDP peer, the first configured one
takes effect. For example, the following two outbound policies are configured:
outbound peer 2.2.2.2 fec host
outbound peer peer-group group1 fec none
As group1 also contains an LDP peer with peer-id of 2.2.2.2, the following outbound policy
takes effect:
outbound peer 2.2.2.2 fec host
If two outbound policies are configured in sequence and the peer parameters in the two
commands are the same, the second command overwrites the first one. For example, the
following two outbound policies are configured:
outbound peer 2.2.2.2 fec host
outbound peer 2.2.2.2 fec none
The second configuration overwrites the first one. This means that the following outbound
policy takes effect on the LDP peer with peer-id of 2.2.2.2:
outbound peer 2.2.2.2 fec none
MPLS and MPLS LDP must be enabled globally before an outbound policy is configured.
To delete all outbound policies simultaneously, run the undo outbound peer all command.
----End
Context
After MPLS LDP is enabled, LSPs are automatically established. If no policy is configured, an
increasing number of LSPs are established, wasting resources.
A policy can be configured to allow LDP to use eligible routes to establish ingress and egress
LSPs on a public network. The policy allows only specified routes to trigger LDP LSP
establishment, controlling the number of LSPs and minimizing resource wastes.
NOTE
Do not use the lsp-trigger all command. If this command is run, all IGP routes can be used by LDP to
establish LSPs. This causes a large number of unwanted LSPs to be established, wasting system resources.
Before using the lsp-trigger all command, configure a policy for filtering out routes that LDP will not use
to establish LSPs. This reduces the number of LSPs to be established and saves system resources.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Perform either of the following steps to configure a policy for triggering LDP LSP establishment:
l To allow static routes and IGP routes to trigger LDP LSP establishment, run:
lsp-trigger { all | host | ip-prefix ip-prefix-name | none }
l To allow labeled public network BGP routes to trigger LDP LSP establishment, run:
lsp-trigger bgp-label-route [ ip-prefix ip-prefix-name ]
l host: is the default policy and allows LDP to use 32-bit host-address route ( except 32-bit
host-address of interfaces ) to establish LSPs.
l all: allows LDP to use all static and IGP routes, but not public network BGP routes, to
establish LSPs.
l ip-prefix: allows LDP to use the routes that match an IP address prefix list to establish LSPs.
l none: does not allow LDP to use any routes to establish LSPs.
l bgp-label-route: allows LDP to use labeled public network BGP routes to establish LSPs.
NOTE
LSPs can be established using exactly matching routes on LSRs. For example, an exactly matching host
route to an IP address with a 32-bit mask of a loopback interface can be used to trigger LSP establishment.
A policy for triggering LSP establishment cannot be modified during the LDP graceful restart (GR) process.
Step 4 Run:
proxy-egress disable
A policy for disabling a device from establishing proxy egress LSPs is configured.
If the current policy allows a device to establish LSPs for all static and IGP routes or use an IP
address prefix list to establish LSPs, the policy also triggers proxy egress LSP establishment.
However, the proxy egress LSPs may be unavailable, which wastes system resources. To prevent
this problem, run the proxy-egress disable command to disable a device from establishing such
proxy egress LSPs.
NOTE
During the LDP GR, the proxy-egress disable command cannot be run.
----End
Context
After MPLS LDP is enabled, LDP LSPs will be automatically established, leading to a large
number of transit LSPs and resulting in resource wastes. A policy for triggering transit LSP
establishment can be configured to allow LDP to only send Label Mapping messages upstream
for routes that match specified conditions to establish a transit LSP. This reduces the number of
unwanted LSPs and efficiently uses network resources.
Procedure
Step 1 Run:
system-view
NOTE
The policy for triggering transit LSP establishment cannot be modified during the LDP GR process.
----End
Prerequisites
The LDP LSPs have been established.
Procedure
l Run the display mpls ldp [ all ] [ verbose ] command to check LDP configurations.
l Run the display mpls ldp lsp [ all ] command to check LDP information.
l Run the display mpls lsp [ verbose ] command to check LSP information.
----End
Example
If the configurations succeed, you can run the preceding commands to obtain the following
results:
Run the display mpls ldp command to view LDP information.
<HUAWEI> display mpls ldp
Run the display mpls ldp lsp command to view LDP LSP information.
<HUAWEI> display mpls ldp lsp
Usage Scenario
On a large-scale network, multiple IGP areas usually need to be configured for flexible network
deployment and fast route convergence. When advertising routes between IGP areas, to prevent
a large number of routes from consuming too many resources, an area border router (ABR) needs
to aggregate the routes in the area and then advertise the aggregated routes to the neighboring
IGP areas. However, by default, when establishing LSPs, LDP searches the routing table for the
route that exactly matches the forwarding equivalence class (FEC) carried in the received Label
Mapping message. For aggregated routes, only liberal LDP LSPs, not inter-area LDP LSPs, can
be set up.
In this case, you can run the longest-match command to configure LDP to search for routes
based on the longest match rule to establish inter-area LDP LSPs.
Pre-configuration Tasks
Before configuring LDP extension for inter-area LSP, complete the following tasks:
l Assign IP addresses to interfaces to make neighboring nodes on the network layer
reachable.
l Configure an IGP to advertise the network segments connecting to interfaces on each node
and to advertise the routes of hosts with LSR IDs.
l Configure the policy for aggregating routes.
l Configure MPLS and MPLS LDP.
Data Preparation
To configure LDP extension for inter-area LSP, you need the following data.
No. Data
1 IS-IS area ID of each node and level of each node and interface
Procedure
Step 1 Run:
system-view
LDP is configured to search for routes based on the longest match rule to establish LSPs.
NOTE
----End
Prerequisites
The LDP extension for inter-area LSP has been configured.
Procedure
l Run the display mpls lsp command to check the setup of inter-area LSPs after LDP is
configured to search for routes based on the longest match rule to establish LSPs.
----End
Example
Configure LDP to search for routes based on the longest match rule to establish LSPs. 1.3.0.1/32
and 1.3.0.2/32 are routes to another IGP area. Run the display mpls lsp command. The command
output shows that an inter-area LSP has been established.
[HUAWEI] display mpls lsp
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
1.2.0.1/32 NULL/3 -/GE1/0/0
1.2.0.1/32 1024/3 -/GE1/0/0
1.3.0.1/32 NULL/1025 -/GE1/0/0
1.3.0.1/32 1025/1025 -/GE1/0/0
1.3.0.2/32 NULL/1026 -/GE1/0/0
1.3.0.2/32 1026/1026 -/GE1/0/0
Usage Scenario
The LDP multi-instance is used on the BGP/MPLS VPN. To configure the LDP multi-instance,
bind LDP to a created IP VPN instance.
Pre-configuration Tasks
Before configuring an LDP multi-instance, complete the following tasks:
l Enable MPLS.
l Enable MPLS LDP.
l Configure the IP VPN instance.
Data Preparation
To configure an LDP multi-instance, you need the following data.
No. Data
Context
To configure the transport address for an LDP instance, you must use the IP address of the
interfaces that are bound to the same VPN instance.
NOTE
In LDP multiple instances, you can use the interface address to establish a session.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp vpn-instance vpn-instance-name
LDP for the specified VPN instance is enabled, and the MPLS LDP VPN instance view is
displayed.
l Configurations in the MPLS LDP VPN instance view only take effect on LDP-enabled
interfaces that are bound to the same VPN instance.
l Configurations in the MPLS LDP view do not take effect on LDP-enabled interfaces that are
bound to the VPN instance.
NOTE
In most applications, use the default LDP LSR ID. In some networking schemes that VPN instances are
used, for example, BGP or MPLS VPN, configure an LSR ID separately for the LDP multi-instance to
ensure normal establishment of a TCP connection, if the address space of the VPN overlaps that of the
public network.
----End
Prerequisites
The LDP multi-instance function has been configured.
Procedure
l Run the display mpls ldp vpn-instance vpn-instance-name command to check information
about LDP of a specified VPN instance.
----End
Example
After completing the configuration, run the display mpls ldp vpn-instance command to view
information about LDP of a specified VPN instance.
<HUAWEI> display mpls ldp vpn-instance vpn1
LDP Global Information
--------------------------------------------------------------------
Protocol Version : V1 Neighbor Liveness : 60 Sec
Graceful Restart : Off FT Reconnect Timer : 60 Sec
MTU Signaling : On Recovery Timer : 60 Sec
Capability-Announcement : On Longest-match : Off
mLDP P2MP Capability : On mLDP MBB Capability : On
mLDP MP2MP Capability : Off
LDP Instance Information
--------------------------------------------------------------------
Instance ID : 1 VPN-Instance : vpn1
Instance Status : Active LSR ID : 1.1.1.9
Loop Detection : Off Path Vector Limit : 32
Label Distribution Mode : Ordered Label Retention Mode : Liberal
Instance Deleting State : No Instance Reseting State : No
Graceful-Delete : Off Graceful-Delete Timer : 5 Sec
Context
If an LDP LSP is torn down due to a fault, the ingress cannot locate the fault or find the cause.
For example, L2VPN traffic travels through an LDP LSP. If a link fault occurs, the LDP LSP
is torn down, which causes an L2VPN traffic interruption. In addition, the NMS receives several
traps, including the root trap and its associated traps. For example, the LDP LSP failure trap is
the root trap, and the L2VPN failure alarm is an associated trap. The NMS cannot distinguish
between the root trap and its associated traps. Administrators process all traps, which reduces
fault-handling efficiency.
To address this problem, nodes can be configured to report the locations and causes of LSP faults
to the ingress. The ingress then reports fault information to the NMS so that the NMS is able to
associate the root trap with the other traps. Administrators are then able to rectify the fault only
using the root trap information, which improves fault-handling efficiency.
The label withdraw delay function can be configured so that the ingress can obtain the location
and cause of an LSP failure. If a route change causes an LDP LSP failure, the upstream node of
the faulty node may detect the route change and send a Label Withdraw message to instruct the
ingress to tear down the LSP before receiving an LSP Down Reason message from the faulty
node. When the LSP Down Reason message arrives at the upstream node, this node discards the
message because the LSP has been torn down. As a result, the ingress cannot obtain fault
information carried in the LSP Down Reason message. The label withdraw delay function can
be enabled to address this problem.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
send-message lsp-down-reason
The node is enabled to report the locations and causes of LSP failures to the ingress.
Step 4 Run:
label-withdraw-delay
NOTE
The label withdraw delay function prevents downstream LSP flapping from spreading to upstream nodes.
For example, an LSP on a local node flaps because an LDP session between the node and its downstream
peer flaps, a route flaps, or an LDP policy is modified. The local node repeatedly sends Label Withdraw
and Label Mapping messages in sequence to upstream nodes. This causes the upstream nodes to repeatedly
tear down and reestablish LSPs. As a result, the entire LDP LSP flaps. The label withdraw delay function
prevents the entire LDP LSP from flapping.
----End
Usage Scenario
There is an increasing diversity of multicast services, such as IPTV, massively multiplayer online
role-playing games (MMORPGs), and multimedia conferences. These services are transmitted
over service bearer networks that must meet the following requirements:
l Forward multicast traffic even during traffic congestion.
l Rapidly detect network faults and switch traffic to standby links.
The multicast virtual private LAN service (VPLS) solution meets these requirements. In some
applications, such as IPTV, a fixed multicast source and multiple receivers are configured. To
transmit such applications, when multicast VPLS traffic arrives, the IP/MPLS network enables
nodes to automatically establish an mLDP P2MP tunnel and direct multicast traffic to the tunnel.
This solution eliminates the need to deploy Protocol Independent Multicast (PIM) or hierarchical
virtual private LAN service (HVPLS) and prevents duplicate packets from wasting LSP
bandwidth.
NOTE
After the configuration is complete, an mLDP P2MP tunnel can be established automatically when
multicast VPLS is being deployed.
Pre-configuration Tasks
Before configuring an automatic mLDP P2MP tunnel, configure a local LDP session.
Context
mLDP P2MP must be globally enabled on LDP peers to establish mLDP P2MP sessions.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
mldp p2mp
After this step is performed, mLDP P2MP is enabled automatically on all MPLS LDP-enabled
interfaces on the node.
----End
Context
If the optimal route destined for a root node on a non-root node changes on an mLDP network,
the non-root node re-selects an upstream node and by default tears down the existing MP2MP
LSP. As a result, traffic is dropped before a new MP2MP LSP is established. To minimize traffic
loss, enable the mLDP MBB capability on each node on the mLDP MP2MP network. If the
optimal route destined for the root node changes, the non-root node establishes a new MP2MP
LSP before tearing down the original MP2MP LSP, which minimizes traffic loss.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
mldp make-before-break
The time for a local node to wait to receive an MBB ACK Notification message is set. The delay
time for performing an MBB switchover is also set.
If a local route destined for a root node changes, the local node attempts to send an MBB Mapping
message to another upstream node to establish an MBB LSP. After the upstream node replies
with an MBB ACK Notification message, the local node can successfully establish the MBB
LSP. If the local node does not receive an MBB ACK Notification message after a specified
period of time elapses, traffic is switched to the MBB LSP immediately. The default time for
waiting for an MBB ACK Notification message is 10s. The default time is recommended. The
waiting time can be configured using the wait-ack-time parameter in the mldp make-before-
break timer command.
Although the MBB LSP is established on the control plane, a local node has to wait a period of
time before the new upstream node generates and delivers a forwarding entry. In this situation,
if traffic is switched to this MBB LSP, traffic is dropped because there is no available forwarding
entry. Therefore, to prevent packet loss, the local node has to delay switching traffic to the MBB
LSP. The default delay time is 100 ms. The default time is recommended. The delay time can
be configured using the switch-delay-time parameter in the mldp make-before-break timer
command.
----End
Context
Disabling mLDP P2MP on an interface helps you plan a network. For example, if links balance
traffic on a network, to enable P2MP traffic to travel along a specific link, disable mLDP P2MP
on interfaces connected to other links.
Procedure
Step 1 Run:
system-view
----End
Prerequisites
The automatic mLDP P2MP tunnel has been configured so that the establishment of an mLDP
P2MP LSP can be triggered when multicast VPLS is deployed.
Procedure
l Run the ping multicast-lsp mldp p2mp root-ip root-ip-address { lsp-id lsp-id | opaque-
value opaque-value } command on the ingress to check mLDP P2MP LSP connectivity.
l Run the display mpls mldp lsp p2mp [ root-ip root-ip-address { lsp-id lsp-id | opaque-
value opaque-value } ] command to check mLDP P2MP LSP information on a local node.
l Run the display mpls multicast-lsp protocol mldp p2mp [ root-ip root-ip-address { lsp-
id lsp-id | opaque-value opaque-value } ] [ lsr-role { bud | ingress | transit | egress } ]
command to check mLDP P2MP LSP forwarding information.
----End
Example
# Run the ping multicast-lsp mldp p2mp command on the root node to check mLDP P2MP
LSP connectivity.
<HUAWEI> ping multicast-lsp mldp p2mp root-ip 1.1.1.1 lsp-id 100
LSP PING FEC: root-ip 1.1.1.1 : 100 data bytes, press CTRL_C to break
Reply from 3.3.3.3: bytes=100 Sequence=1 time=80 ms
Run the following commands to view LDP siganling and forwarding plane information about
mLDP P2MP LSPs on a transit node.
# Run the display mpls mldp lsp p2mp command to view information about all mLDP P2MP
LSPs on the transit node.
<HUAWEI> display mpls mldp lsp p2mp
A '*' before a Label means the USCB or DSCB is stale
A '*' before a Peer means the session is stale
-------------------------------------------------------------------------------
LSP Information: mLDP P2MP LSP
-------------------------------------------------------------------------------
Root IP : 1.1.1.1 Instance : --
Opaque decoded : LSP-ID 100
Opaque value : 01 0004 00000064
Lsr Type : Transit
Trigger Type : --
Upstream Count : 1 Downstream Count : 2
Upstream:
In Label Peer MBB State
1029 1.1.1.1 --
Downstream:
Out Label Peer MBB State Next Hop Out Interface
1029 3.3.3.3 -- 10.1.3.2 GigabitEthernet1/0/2
1030 4.4.4.4 -- 10.1.2.2 GigabitEthernet1/0/1
-------------------------------------------------------------------------------
# Run the display mpls multicast-lsp protocol mldp p2mp command to view forwarding
information about all mLDP P2MP LSPs on the transit node.
<HUAWEI> display mpls multicast-lsp protocol mldp p2mp
------------------------------------------------------------------------------
LSP Information: mLDP P2MP-LSP
------------------------------------------------------------------------------
Root IP : 1.1.1.1 Instance : --
Opaque decoded : LSP-ID 100
Opaque value : 01 0004 00000064
Lsr Type : Transit
Forward ID : 0x80000000
Insegment Count : 1 Outsegment Count : 2
Insegment:
In Label State Age
1029 Active 0d12h48m51s
Outsegment:
Out Label MTU Token Age Next Hop Out Interface
1029 1500 0x80080a 0d12h48m51s 10.1.3.2 GigabitEthernet1/0/2
1030 1500 0x800810 0d12h43m49s 10.1.2.2 GigabitEthernet1/0/1
------------------------------------------------------------------------------
Usage Scenario
MPLS TE supports strong traffic engineering capabilities and provides various QoS guarantees.
Due to live network limitations, such as application types and costs, deploying MPLS TE on the
entire network is difficult. Therefore, LDP over TE can be used to deploy MPLS TE on a core
area and LDP on non-core areas.
Pre-configuration Tasks
Before configuring LDP over TE, complete the following tasks:
Data Preparation
To configure LDP over TE, you need the following data.
No. Data
Context
The routing protocol performs bidirectional detection on a link. When using the forwarding
adjacency to advertise LSP links to other nodes, configure another tunnel for transferring data
packets in the reverse direction. Then, enable the forwarding adjacency on these two tunnels.
NOTE
Procedure
Step 1 Run:
system-view
NOTE
The IGP metric value must be set properly to ensure that the LSP is advertised and used correctly. For
example, the metric of a TE tunnel must be less than that of IGP routes to ensure that the TE tunnel is used
as a route link.
Step 5 Run:
mpls te commit
----End
Context
Perform the following steps on the ingress and egress of a TE tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp remote-peer remote-peer-name
Step 3 Run:
remote-ip ip-address
----End
Context
After two devices on both ends of a TE tunnel establish an LDP peer relationship, LDP traffic
cannot be automatically directed to the TE tunnel. To direct LDP traffic to the TE tunnel, use
either of the following methods:
l IGP shortcut: The TE tunnel is considered as a logical link used to locally calculate an IGP
route. In this situation, the tunnel interface is used as an outbound interface in an IGP route.
With the IGP shortcut method, a device does not advertise the TE tunnel route to peers,
and the peers cannot use the TE tunnel to transmit traffic.
l Forwarding adjacency: The TE tunnel is considered as a logical link used to globally
calculate an IGP route. In this situation, the tunnel interface is used as an outbound interface
in an IGP route. With the forwarding adjacency method, a device advertises the TE tunnel
route to peers, and the peers can use the TE tunnel to transmit traffic.
Procedure
l Configure the IGP shortcut.
l Configure the forwarding adjacency.
----End
Context
Perform the following steps on the ingress and egress of a TE tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
lsp-trigger { all | host | ip-prefix ip-prefix-name | none }
----End
Procedure
Step 1 Run the display mpls ldp lsp [ all | [ vpn-instance vpn-instance-name ] destination-address
mask-length ] command to check information about the tunnel interface on the ingress of an
LDP LSP.
----End
Example
After the configurations are successful, run the display mpls ldp lsp command. LDP LSP over
TE is added.
Usage Scenario
When a static BFD session monitors an LDP LSP, note that:
l BFD can be bound only on the ingress of the LDP LSP.
l One LSP can only be bound to one BFD session.
l BFD only monitors the LDP LSP that is established using a host route.
NOTE
BFD for LSP can function properly even if the reverse path of a forward LSP is an IP link. The forward
and reverse paths must be established over the same link. If they are established using different links, and
a fault occurs, BFD cannot identify the faulty path. Before you deploy BFD, ensure that the forward and
reverse paths are established over the same link so that BFD can correctly identify the faulty path.
Pre-configuration Tasks
Before configuring static BFD for LDP LSP, complete the following tasks:
l Configure the network layer parameters to make the network accessible.
l Enable MPLS LDPs on all nodes and establish an LDP session.
l Configure an LDP LSP.
Data Preparations
Before configuring static BFD for LDP LSP, you need the following data.
No. Data
Context
Perform the following steps on each LSR on both ends of a link that to be monitored:
Procedure
Step 1 Run:
system-view
The global BFD function is enabled on this node. The BFD global view is displayed.
----End
Context
Perform the following steps on the ingress of an LSP:
Procedure
Step 1 Run:
system-view
NOTE
When configuring static BFD for LDP LSP on a network deployed with LDP over TE, configure
interface interface-type interface-number to specify the tunnel interface.
NOTE
The local and remote discriminators on both ends of a BFD session must accord with each other. Otherwise,
the session cannot be established. In addition, once configured, the local and remote discriminators cannot
be modified.
The local minimum interval at which BFD packets are sent is set.
The local minimum interval at which BFD packets are received is set.
NOTE
l Effective local interval at which BFD packets are sent = MAX { Configured local interval at which
BFD packets are sent, Configured remote interval at which BFD packets are received }
l Effective local interval at which BFD packets are received = MAX { Configured remote interval at
which BFD packets are sent, Configured local interval at which BFD packets are received }
l Effective local detection interval = Effective local interval at which BFD packets are received x
Configured remote detection multiplier
For example, if:
l The local interval at which BFD packets are sent is set to 200 ms, the local interval at which BFD
packets are received is set to 300 ms, and the local detection multiplier is set to 4.
l The remote interval at which BFD packets are sent is set to 100 ms, the remote interval at which BFD
packets are received is set to 600 ms, and the remote detection multiplier is set to 5.
Then,
l Effective local interval at which BFD packets are sent = MAX { 200 ms, 600 ms } = 600 ms; effective
local interval at which BFD packets are received = MAX { 100 ms, 300 ms } = 300 ms; effective local
detection period = 300 ms x 5 = 1500 ms
l Effective remote interval at which BFD packets are sent = MAX { 100 ms, 300 ms } = 300 ms; effective
remote interval at which BFD packets are received = MAX { 200 ms, 600 ms } = 600 ms; effective
remote detection period = 600 ms x 4 = 2400 ms
Step 7 Run:
process-pst
The BFD session status changes can be advertised to a specific upper-layer application.
Step 8 Run:
commit
----End
Follow-up Procedure
After the BFD session is established and its status is Up, the BFD starts to detect failures in an
LDP LSP.
If the LDP LSP is torn down, the BFD status also goes Down.
Context
The egress can use an IP link, LSP, or TE tunnel as a reverse tunnel to inform the ingress of a
fault. To ensure that the forward and reverse paths are over the same link, an LSP is preferentially
selected to notify the ingress of an LSP fault.
Procedure
Step 1 Run:
system-view
NOTE
The local discriminator on a local device must be the same as the remote discriminator on the other device
on the remote end of a BFD session. Otherwise, the session cannot be established correctly. In addition,
the local and remote discriminators cannot be modified after being configured.
The local minimum interval at which BFD packets are sent is set.
The local minimum interval at which BFD packets are received is set.
The device is enabled to modify the PST if the BFD session status changes.
If an LSP is used as a reverse tunnel to notify the ingress of a fault, you can run this command
to allow the reverse tunnel to switch traffic if the BFD session goes Down. If a single-hop IP
link is used as a reverse tunnel, this command can be configured because the process-pst
command can only be configured for BFD single-link detection.
Step 8 Run:
commit
----End
Prerequisites
The static BFD for LDP LSP function has been configured.
Procedure
l Run the display bfd configuration { all | static } [ for-lsp ] command to check the BFD
configuration.
l Run the display bfd session { all | static } [ for-lsp ] command to check BFD session
information.
l Run the display bfd statistics session { all | static } [ for-ip | for-lsp ] command to check
BFD statistics.
----End
Example
Run the display bfd session all verbose command on the ingress. Up is displayed in the
State field, and LDP_LSP is displayed in the BFD Bind Type field.
<HUAWEI> display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 256 State : Up Name : 1to4
--------------------------------------------------------------------------------
Local Discriminator : 1 Remote Discriminator : 2
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : LDP_LSP
Bind Session Type : Static
Usage Scenario
With dynamic BFD for LDP LSP, failure detection speeds up and configuration workload
decreases. In addition, LDP FRR is well supported for the LSP to provide better services.
NOTE
Dynamic BFD only monitors the LDP LSP established using a host route.
BFD for LSP can function properly even if the reverse path of a forward LSP is an IP link. The forward
and reverse paths must be established over the same link. If they are established using different links, and
a fault occurs, BFD cannot identify the faulty path.
Pre-configuration Tasks
Before configuring dynamic BFD for LDP LSP, complete the following tasks:
Data Preparations
To configure dynamic BFD for LDP LSP, you need the following data.
No. Data
Context
Perform the following steps on the ingress and egress:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
----End
Procedure
l Perform the following steps on the ingress:
1. Run:
system-view
An LDP LSP is enabled with the capability of dynamically creating a BFD session.
A BFD session is not created after this command is run. The BFD session is established
only after the egress receives an LSP ping request packet containing the BFD TLV
sent by the ingress.
----End
2.11.4 Configuring the Policy for Triggering Dynamic BFD for LDP
LSP
There are two trigger policies to establish a dynamic BFD session for LDP LSP: host and FEC
list policies.
Context
A policy can be enforced to establish a session of dynamic BFD for LDP LSP in either of the
following modes:
l Host policy: All host addresses are used to establish a BFD session. Specify nexthop and
outgoing-interface parameters to define the LSPs that can establish a BFD session.
l FEC list policy: Only some host addresses are used to establish a BFD session. Use the
fec-list command to specify host addresses that trigger BFD session creation.
Procedure
Step 1 Run:
system-view
Step 2 (Optional) If you need the FEC list, perform the following operations:
1. Run:
fec-list list-name
Step 3 Run:
mpls
Step 4 Run:
mpls bfd-trigger [ host [ nexthop next-hop-address | outgoing-interface interface-
type interface-number ] * | fec-list list-name ]
The policy for establishing a dynamic BFD session for LDP LSP is configured.
After the command is run, the device starts to establish a BFD session.
----End
Context
Perform the following steps on the ingress:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
Step 3 Run:
mpls ping interval interval
Step 4 Run:
quit
Step 5 Run:
mpls
Step 6 Run:
mpls bfd { min-tx-interval interval | min-rx-interval interval | detect-multiplier
multiplier }*
By default, the minimum interval at which BFD packets are sent and the minimum interval at
which BFD packets are received are 1000 ms, and the detection multiplier is 3 on the ingress.
l Effective local interval at which BFD packets are sent = MAX { Configured local interval
at which BFD packets are sent, Configured remote interval at which BFD packets are
received }
l Effective local interval at which BFD packets are received = MAX { Configured remote
interval at which BFD packets are sent, Configured local interval at which BFD packets are
received }
l Effective local detection interval = Effective local interval at which BFD packets are received
x Configured remote detection multiplier
The minimum interval at which BFD packets are sent and the minimum interval at which BFD
packets are received are 100 ms, and the detection multiplier is 3 on the egress, which are fixed
values.
Therefore, you can adjust the minimum interval at which BFD packets are sent, the minimum
interval at which BFD packets are received, and the detection multiplier only on the ingress to
update BFD detection time on the ingress and egress.
----End
Prerequisites
The dynamic BFD for LDP LSP function has been configured.
Procedure
l Run the display bfd configuration all [ verbose ] command to check the BFD
configuration on the ingress.
l Run the display bfd configuration passive-dynamic [ peer-ip peer-ip remote-
discriminator discriminator ] [ verbose ] command to check the BFD configuration on
the egress.
l Run the display bfd session all [ verbose ] command to check information about the BFD
session on the ingress.
Example
Run the display bfd session all command to view the state of BFD session that is established
dynamically. The status of the BFD session is Up, and the type of the link that is bound to the
session is LDP_LSP.
<HUAWEI> display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 256 State : Up Name : dyn_8192
--------------------------------------------------------------------------------
Local Discriminator : 8192 Remote Discriminator : 8192
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : LDP_LSP
Bind Session Type : Dynamic
Bind Peer Ip Address : 3.3.3.3
NextHop Ip Address : 192.168.1.2
Bind Interface : GE1/0/0
LSP Token : 0x3002001
FSM Board Id : 3 TOS-EXP : 6
Min Tx Interval (ms) : 100 Min Rx Interval (ms) : 100
Actual Tx Interval (ms): 100 Actual Rx Interval (ms): 100
Local Detect Multi : 4 Detect Interval (ms) : 400
Echo Passive : Disable Acl Number : -
Destination Port : 3784 TTL : 1
Proc interface status : Disable
WTR Interval (ms) : -- Process PST : Enable
Active Multi : 3
Last Local Diagnostic : No Diagnostic
Bind Application : VRRP | LSPM | LSPM | L2VPN | OAM_MANAGER
Session TX TmrID : -- Session Detect TmrID : --
Session Init TmrID : -- Session WTR TmrID : --
Session Echo Tx TmrID : -
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0
Session Description : --
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
Run the display bfd session passive-dynamic verbose command on the egress to view the status
of the BFD session that is established passively. The BFD Bind Type field value is peer IP
address. The BFD packets sent by this egress are transported over IP routes. BFD parameters
cannot be adjusted on the egress. By default, the min-tx-interval and min-tx-interval values
are 10. The interval at which BFD packets are sent and the interval at which BFD packets are
received are negotiated by both ends of the BFD session before the intervals take effect.
<HUAWEI> display bfd session passive-dynamic verbose
--------------------------------------------------------------------------------
Session MIndex : 256 (Multi Hop) State : Up Name : dyn_8192
--------------------------------------------------------------------------------
Local Discriminator : 8192 Remote Discriminator : 8192
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Peer Ip Address
Bind Session Type : Entire_Dynamic
Usage Scenario
When LDP LSPs transmit application traffic, for example, VPN, to improve network reliability,
LDP FRR and an LDP upper-layer protection mechanism, such as VPN FRR or VPN equal-cost
multipath (ECMP), are used. BFD for LDP LSP only detects primary LSP faults and switches
traffic to an FRR LSP. If the primary and FRR LSP fail simultaneously, the BFD mechanism
does not take effect. In this situation, LDP can instruct its upper-layer application to perform a
protection switchover only after LDP detects the FRR LSP failure. As a result, a great number
of packets are dropped.
To minimize packet loss, dynamic BFD can be configured to establish dynamic BFD sessions
to monitor both the primary and FRR LSPs. If both primary and FRR LSPs fail, BFD rapidly
detects the failures and instructs a specific LDP upper-layer application to perform a protection
switchover.
Pre-configuration Tasks
Before configuring dynamic BFD to monitor an LDP tunnel, complete the following tasks:
Data Preparation
To configure dynamic BFD to monitor LDP tunnels, you need the following data.
No. Data
Procedure
l Perform the following steps on the ingress:
1. Run:
system-view
The mpls bfd enable command does not create a BFD session.
l Perform the following steps on the egress:
1. Run:
system-view
The mpls-passive command does not create a BFD session. The egress has to receive
an LSP ping request carrying a BFD TLV before creating a BFD session with the
ingress.
----End
Context
Either of the following trigger policies can be used to establish BFD sessions to monitor LDP
tunnels:
l Host address-based policy: used when all host addresses are available to trigger the creation
of BFD sessions.
l FEC list-based policy: used when only some host addresses are available to establish BFD
sessions. The FEC list contains specified host addresses.
Perform the following steps on the ingress on which an LDP tunnel to be monitored is
established:
Procedure
Step 1 Run:
system-view
Step 2 (Optional) If a FEC list is used to establish a dynamic BFD session, perform the following steps:
1. Run:
fec-list list-name
Do not specify an outbound interface name or next hop address for the FEC node to be
added to the FEC list.
3. Run:
quit
----End
Context
Perform the following steps on the ingress:
Procedure
Step 1 Run:
system-view
By default, the minimum interval at which BFD packets are sent and the minimum interval at
which BFD packets are received are 1000 ms, and the detection multiplier is 3 on the ingress.
BFD detection intervals are calculated as follows:
l Effective local interval at which BFD packets are sent = MAX { Configured local interval
at which BFD packets are sent, Configured remote interval at which BFD packets are
received }
l Effective local interval at which BFD packets are received = MAX { Configured remote
interval at which BFD packets are sent, Configured local interval at which BFD packets are
received }
l Effective local detection interval = Effective local interval at which BFD packets are received
x Configured remote detection multiplier
The minimum interval at which BFD packets are sent and the minimum interval at which BFD
packets are received are 100 ms, and the detection multiplier is 3 on the egress, which are fixed
values.
Therefore, you can adjust the minimum interval at which BFD packets are sent, the minimum
interval at which BFD packets are received, and the detection multiplier only on the ingress to
update BFD detection time on the ingress and egress.
----End
Prerequisites
The dynamic BFD for LDP tunnel function has been configured.
Procedure
l Run the display bfd session all [ verbose ] command to check information about all BFD
sessions on the ingress.
l Run the display mpls bfd session [ verbose ] command to check information about all
BFD sessions that monitor MPLS tunnels on the ingress.
----End
Example
Run the display bfd session all verbose command on the ingress. The command output shows
that a BFD session is in the Up state and has been bound to a tunnel with the type of
LDP_TUNNEL.
<HUAWEI> display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 4099 State : Up Name : dyn_8195
--------------------------------------------------------------------------------
Local Discriminator : 8195 Remote Discriminator : 8193
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : LDP_TUNNEL
Bind Session Type : Dynamic
Run the display mpls bfd session command on the ingress to view information about a BFD
session that monitors an LDP tunnel.
<HUAWEI> display mpls bfd session
-------------------------------------------------------------------------------
BFD Information: LDP Tunnel
-------------------------------------------------------------------------------
FEC DISC OUT-IF NEXTHOP TUNNEL STATE
4.4.4.4 8195 GE1/0/0 10.1.1.2 - Up
Usage Scenario
LDP FRR provides MPLS with a fast reroute function to implement the local port-level backup,
which reduces data loss.
Pre-configuration Tasks
Before configuring manual LDP FRR, complete the following tasks:
l Configure MPLS.
l Configure MPLS LDP.
For detailed information about one-hop BFD, see "BFD Configuration" in the HUAWEI
NetEngine80E/40E Router Configuration Guide - Reliability.
Data Preparation
To configure LDP FRR, you need the following data.
No. Data
3 Name of the IP prefix list that can trigger the establishment of bypass LSPs
Context
Perform the following steps on the ingress or transit node:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls ldp frr nexthop nexthop-address [ ip-prefix ip-prefix-name ] [ priority
priority ]
On the same interface, you can configure a maximum of 10 LDP FRR entries with different
precedences. Based on different precedences, only a single bypass LSP is generated. The smaller
the value is, the higher the precedence is. By default, the precedence value is 50.
NOTE
----End
Context
The procedure is only used to configure LDP FRR based on BFD.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd bfd-name
Step 3 Run:
process-pst
Step 4 Run:
commit
----End
Context
LDP graceful deletion can be configured in the LDP-IGP synchronization or LDP FRR scenario
to speed up traffic switching and ensure uninterrupted traffic during traffic switching, improving
reliability of the entire network.
If the primary link goes Down and the LDP session on the primary link goes Down accordingly,
LDP immediately instructs the upstream device to withdraw labels and triggers LDP Auto FRR,
and the LSP convergence on the secondary link requires LDP to allocate labels to the upstream
device again, prolonging the convergence time and traffic switching using FRR. As a result,
packet loss occurs.
If LDP graceful deletion is configured and the LDP session goes Down, LDP delays deleting
the LDP session and keeps the relevant labels and LSP. The LSP on the secondary link does not
require LDP to allocate labels to the upstream device again, shortening traffic switching using
LDP FRR and reducing packet loss.
Perform the following operations on the LSR configured with LDP FRR.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
graceful-delete
After the LDP session goes Down, forwarding entries on the LSR remain unchanged for the
time specified by the graceful deletion timer.
NOTE
If the value of the graceful deletion timer is too large, the invalid LSP will be kept for a long time, consuming
system resources.
----End
Prerequisites
The LDP FRR function has been configured.
Procedure
l Run the display mpls lsp command to check information about LSPs enabled with LDP
FRR.
l Run the display bfd interface [ interface-type interface-number ] command to check
information about the BFD interface.
----End
Example
Run the display mpls lsp command, you can see LDP FRR is enabled on the related LDP LSP.
<HUAWEI> display mpls lsp
----------------------------------------------------------------------
LSP Information: LDP LSP
----------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
3.3.3.9/32 NULL/3 -/GigabitEthernet2/0/0
**LDP FRR** /1025 /GigabitEthernet1/0/0
3.3.3.9/32 1025/3 -/GigabitEthernet2/0/0
**LDP FRR** /1025 /GigabitEthernet1/0/0
2.2.2.9/32 NULL/3 -/GigabitEthernet1/0/0
2.2.2.9/32 1024/3 -/GigabitEthernet1/0/0
Usage Scenario
On an MPLS network with a backup link, if a link fault occurs, IGP routes converge and routes
related to the backup link become available. After IGP route convergence is complete, an LDP
LSP over the backup link becomes available. During this process, traffic is interrupted. To
prevent traffic interruption, LDP FRR can be configured.
LDP FRR uses the liberal label retention mode, obtains a liberal label, applies for a forwarding
entry associated with the label, and forwards the forwarding entry to the forwarding plane as a
backup forwarding entry used by the primary LSP. On the network enabled with LDP FRR, if
an interface failure (detected by the interface itself or by an associated BFD session) or a primary
LSP failure (detected by an associated BFD session)occurs, LDP FRR is notified of the failure
and rapidly forwards traffic to a backup LSP, protecting traffic on the primary LSP. The traffic
switchover is performed within 50 milliseconds, minimizing the traffic interruption time.
LDP FRR is classified into the following types:
Pre-configuration Tasks
Before configuring LDP Auto FRR, complete the following tasks:
Data Preparation
To configure LDP Auto FRR, you need the following data.
No. Data
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
auto-frr lsp-trigger { all | host | ip-prefix ip-prefix-name | none }
By default, LDP uses backup routes to addresses with 32-bit masks to set up backup LSPs.
NOTE
LDP Auto FRR depends on IGP Auto FRR. After the frr (IS-IS) or frr (OSPF)ommand is used to enable
IGP Auto FRR, LDP Auto FRR will be automatically enabled. The auto-frr lsp-trigger command is used
to configure or change a policy for triggering LDP LSP establishment.
If both the auto-frr lsp-trigger command and the lsp-trigger command are run, the established backup
LSPs satisfy both the policy for triggering LDP LSP establishment and the policy for triggering backup
LDP LSP establishment.
During the LDP GR process, changing a policy for triggering the backup LDP LSP establishment is not
allowed.
----End
Context
LDP graceful deletion can be configured in the LDP-IGP synchronization or LDP FRR scenario
to speed up traffic switching and ensure uninterrupted traffic during traffic switching, improving
reliability of the entire network.
If the primary link goes Down and the LDP session on the primary link goes Down accordingly,
LDP immediately instructs the upstream device to withdraw labels and triggers LDP Auto FRR,
and the LSP convergence on the secondary link requires LDP to allocate labels to the upstream
device again, prolonging the convergence time and traffic switching using FRR. As a result,
packet loss occurs.
If LDP graceful deletion is configured and the LDP session goes Down, LDP delays deleting
the LDP session and keeps the relevant labels and LSP. The LSP on the secondary link does not
require LDP to allocate labels to the upstream device again, shortening traffic switching using
LDP FRR and reducing packet loss.
Perform the following operations on the LSR configured with LDP FRR.
Procedure
Step 1 Run:
system-view
After the LDP session goes Down, forwarding entries on the LSR remain unchanged for the
time specified by the graceful deletion timer.
NOTE
If the value of the graceful deletion timer is too large, the invalid LSP will be kept for a long time, consuming
system resources.
----End
Prerequisites
LDP Auto FRR has been configured.
Procedure
l Run the display mpls lsp command to check information about LSPs after LDP Auto FRR
is enabled.
----End
Example
After configuring LDP Auto FRR, run the display mpls lsp command to view information about
a backup LSP with the destination address of 2.2.2.9/32. The command output is as follows:
<HUAWEI> display mpls lsp
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
2.2.2.9/32 NULL/3 -/Pos1/0/0
**LDP FRR** /1025 /Pos1/0/1
2.2.2.9/32 1024/3 -/Pos1/0/0
**LDP FRR** /1025 /Pos1/0/1
3.3.3.9/32 NULL/3 -/Pos1/0/1
**LDP FRR** /1025 /Pos1/0/0
3.3.3.9/32 1025/3 -/Pos1/0/1
**LDP FRR** /1025 /Pos1/0/0
4.4.4.9/32 NULL/1026 -/Pos1/0/1
**LDP FRR** /1026 /Pos1/0/0
4.4.4.9/32 1026/1026 -/Pos1/0/1
**LDP FRR** /1026 /Pos1/0/0
10.1.3.0/24 1027/3 -/Pos1/0/1
10.1.4.0/24 1028/3 -/Pos1/0/1
**LDP FRR** /1027 /Pos1/0/0
Usage Scenario
In the networking where primary and backup LSPs are used, synchronization between LDP and
IGP is used to prevent traffic loss if the primary LSP fails. The situations are as follows:
l If the primary LSP fails, IGP and LSP traffic is switched to a backup LSP. When the primary
LSP recovers, IGP converges more rapidly than the creation of the LDP session. IGP traffic
is switched back to the primary LSP before the LDP session is set up, which causes LSP
traffic loss.
l When the primary LSP is working properly, whereas the LDP sessions between the nodes
along the primary LSP fail, the LSP traffic is switched to the backup LSP. The IGP traffic
is still transmitted along the primary LSP. As a result, LSP traffic is lost.
LDP-IGP synchronization delays IGP route advertisement so that the LDP session and IGP route
can converge simultaneously.
LDP-IGP synchronization is configured on the LDP peer nodes (for example, LSR3 in Figure
2-2) on the active link and the cross node (for example, LSR2 in Figure 2-2) of the active and
standby links. Figure 2-2 shows the LDP-IGP synchronization networking.
Active link
Standby link
LSR4
Pre-configuration Tasks
Before configuring synchronization between LDP and IGP, complete the following tasks:
Data Preparation
To configure synchronization between LDP and IGP, you need the following data.
No. Data
1 Type and number of the interface on which the backup LSP is set up
Context
LDP-IGP synchronization can be enabled in either of the following modes:
Procedure
l If OSPF is used as an IGP, perform the following steps on an interface:
1. Run:
system-view
1. Run:
system-view
IS-IS is enabled.
4. Run:
isis ldp-sync
Synchronization between LDP and IS-IS is enabled on all interfaces in the specified
IS-IS process.
If you want to enable synchronization between LDP and IS-IS on MPLS LDP-enabled
interfaces, please specify the parameter mpls-binding-only.
----End
Context
The ldp-sync enable command run in an IS-IS process enables synchronization between LDP
and IS-IS on all local IS-IS interfaces. On an IS-IS interface transmits importance services, LDP
and IS-IS synchronization may affect service transmission. If the link is working properly and
an LDP session over the link fails, IS-IS sends link state PDUs (LSPs) to advertise the maximum
cost of the link. As a result, IS-IS does not select the route for the link, which affects important
service transmission.
To prevent the preceding problem, block LDP and IS-IS synchronization on an IS-IS interface
that transmits important services.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
isis ldp-sync block
----End
Context
On a device that has LDP-IGP synchronization enabled, if the active physical link recovers, an
IGP enters the Hold-down state, and a Hold-down timer starts. Before the Hold-down timer
expires, the IGP delays establishing an IGP neighbor relationship until an LDP session is
established over the active link so that the LDP session over and IGP route for the active link
can become available simultaneously.
NOTE
A Hold-down timer can be set on either an OSPF or IS-IS interface and can only be set in an IS-IS process,
not an OSPF process.
If different Hold-down values on an interface and in an IS-IS process are set, the setting on the interface
takes effect.
Procedure
l If OSPF is used as an IGP, perform the following steps on an interface:
1. Run:
system-view
The Hold-down timer is set, which enables an OSPF interface to delay establishing
an OSPF neighbor relationship until an LDP session is established.
The Hold-down timer is set, which enables an IS-IS interface to delay establishing an
IS-IS neighbor relationship until an LDP session is established.
The Hold-down timer is set, which enables all IS-IS interfaces within an IS-IS process
to delay establishing IS-IS neighbor relationships until LDP sessions are established.
----End
Context
If an LDP session over the active link fails but an IGP route for the active link is reachable, a
node that has LDP-IGP synchronization enabled uses a Hold-max-cost timer to enable an IGP
to advertise LSAs or LSPs carrying the maximum route cost, which delays IGP route
convergence until an LDP session is established. Therefore, an IGP route for a standby link and
an LDP session over the standby link can become available simultaneously.
NOTE
A Hold-max-cost timer can be set on either an OSPF or IS-IS interface and can only be set in an IS-IS
process, not an OSPF process.
If different Hold-max-cost values on an interface and in an IS-IS process are set, the setting on the interface
takes effect.
Procedure
l If OSPF is used as an IGP, perform the following steps on an interface:
1. Run:
system-view
The Hold-max-cost timer is set, which enables OSPF to keep advertising LSAs
carrying the maximum route cost.
If the ospf timer ldp-sync hold-max-cost command is run more than once, the latest
configuration overrides the previous one.
l If IS-IS is used as an IGP, perform the following steps:
Set the Hold-max-cost timer on a specified IS-IS interface.
1. Run:
system-view
The Hold-max-cost timer is set, which enables IS-IS to keep advertising LSPs carrying
the maximum route cost.
If the isis timer ldp-sync hold-max-cost command is run more than once, the latest
configuration overrides the previous one.
Set the Hold-max-cost timer on all IS-IS interfaces in a specified IS-IS process.
1. Run:
system-view
The Hold-max-cost timer is set, which enables IS-IS to keep advertising LSPs carrying
the maximum route cost on all interfaces within an IS-IS process.
If different Hold-max-cost values on an interface and in an IS-IS process are set, the
setting on the interface takes effect.
----End
Context
Perform the following steps on the interfaces of both ends of the link between the crossing node
of active and standby links and the LDP neighboring node on the active link:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls ldp timer igp-sync-delay value
The period of waiting for the LSP setup after the establishment of an LDP session is set.
----End
Context
LDP graceful deletion can be configured in the LDP-IGP synchronization or LDP FRR scenario
to speed up traffic switching and ensure uninterrupted traffic during traffic switching, improving
reliability of the entire network.
If the physical and protocol status of the primary link is proper but the LDP session on the primary
link goes Down, LDP-IGP synchronization enables LDP to inform the IGP of the primary link
fault, and the IGP configures the maximum cost value for the primary link. After that, LDP
immediately instructs the upstream device to withdraw labels and allocates labels to the upstream
device because a new LSP is set up on the secondary link, prolonging the LSP convergence time.
As a result, packet loss occurs.
After the LDP session on the faulty link goes Down, LDP does not immediately instruct the
upstream device to withdraw labels but keeps the labels and LSP and allows traffic to be
transmitted on the primary link until the LSP convergence is complete on the secondary link.
This ensures uninterrupted traffic and speeds up the LDP-IGP synchronization.
Perform the following operations on the LSR configured with LDP-IGP synchronization.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
graceful-delete
After the LDP session goes Down, LDP does not instruct the upstream device to withdraw labels
until the graceful deletion timer expires.
NOTE
If the value of the graceful deletion timer is too large, the invalid LSP will be kept for a long time, consuming
system resources.
----End
Prerequisites
The synchronization between LDP and IGP function has been configured.
Procedure
l Run the display ospf ldp-sync interface { all | interface-type interface-number } command
to check information about synchronization between LDP and OSPF on a specified
interface or all interfaces.
l Run the display isis [ process-id | vpn-instance vpn-instance-name ] ldp-sync interface
command to check information about synchronization between LDP and IS-IS on a
specified interface or all interfaces.
l Run the display rm interface [ interface-type interface-number | vpn-instance vpn-
instance-name ] command to check information about the route management module.
----End
Example
Run the display ospf ldp-sync interface-type interface-number command, and you can find that
the interface status becomes Sync-Achieved.
<HUAWEI> display ospf ldp-sync interface gigabitethernet 1/0/0
Interface gigabitethernet1/0/0
HoldDown Timer: 9 HoldMaxCost Timer: 50
LDP State: Up OSPF Sync State: Sync-Achieved
Run the display isis ldp-sync interface command, and you can find that the interface status
becomes Sync-Achieved.
<HUAWEI> display isis ldp-sync interface
Ldp Sync interface information for ISIS(1)
------------------------------------------
Interface HoldDownTimer HoldMaxCostTimer LDP State Sync State
GigabitEthernet1/0/0 10 10 Down Sync-Achieved
Usage Scenario
Synchronization between LDP and static routes is applicable to an MPLS network with primary
and backup LSPs. On this type of MPLS network, LSRs establish LSPs based on static routes.
When the LDP session of the primary link becomes faulty (the fault is not caused by a link
failure) or the primary link recovers, synchronization between LDP and static routes minimizes
traffic loss during traffic switchover and switchback. As shown in Figure 2-3, there is a static
route between LSRA and LSRD, and an LSP is established between the two devices based on
the static route. Normally, the link LSRA→LSRB→LSRD is preferred.
l In a switchover scenario, when the LDP session of the primary link becomes faulty (the
fault is not caused by a link failure), traffic transmitted through the static route is not
switched to the backup link. As a result, MPLS traffic on the primary link is interrupted.
Normally, after an LDP session is established, MPLS traffic is forwarded along the primary
link LSRA→LSRB→LSRD. If the LDP session between LSRA and LSRB is disconnected,
the LSP is immediately switched to the backup link LSRA→LSRC→LSRD. Because the
link between LSRA and LSRB works properly, traffic transmitted through the static route
is not switched to the backup link. As a result, LDP is not synchronous with the static route,
and MPLS traffic is interrupted.
After synchronization between LDP and static routes is enabled, when the LDP session
goes Down, traffic is automatically switched to the backup link, ensuring non-stop traffic
forwarding.
l In a switchback scenario, when the primary link recovers, traffic transmitted through a
static route is first switched back to the primary link because the static route converges
faster than LDP. However, the backup LSP becomes unavailable, and the primary LSP has
not been established. As a result, MPLS traffic is interrupted.
When the link between LSRA and LSRB becomes faulty, traffic is immediately switched
to the backup link LSRA→LSRC→LSRD. After the link between LSRA and LSRB
recovers, traffic transmitted through the static route is immediately switched to the primary
link LSRA→LSRB→LSRD. However, the backup LSP becomes unavailable, and the
primary LSP has not recovered. Therefore, traffic is interrupted.
After synchronization between LDP and static routes is enabled, when the primary LSP is
established, traffic is switched back to the primary link, ensuring non-stop traffic
forwarding.
Figure 2-3 Networking diagram for configuring synchronization between LDP and static routes
LSRB
LSRC
Primary link
Bypass link
Pre-configuration Tasks
Before configuring synchronization between LDP and static routes, complete the following
tasks:
l Enable MPLS.
l Configure MPLS LDP in the system view and interface view.
l Establish LDP sessions between devices.
Data Preparation
To configure synchronization between LDP and static routes, you need the following data.
No. Data
2 Time during which a static route waits for an LDP session to be established, that is,
time of the Hold-down timer (optional)
Context
With synchronization between LDP and static routes, you can switch traffic from the faulty
primary link to the backup link by suppressing the activation of static routes and delay traffic
switchback to the primary link, ensuring that LDP is synchronous with static routes.
NOTE
Only the static route with a specified outbound interface can be configured with synchronization between
LDP and static routes.
Perform the following steps on devices on both ends of the primary and backup links:
Procedure
Step 1 Run:
system-view
Step 2 Run:
ip route-static ip-address { mask | mask-length } interface-type interface-number
[ nexthop-address ] [ preference preference | tag tag ] * ldp-sync [ description
text ]
----End
Context
After a Hold-down timer is set on an interface, the static route enabled with synchronization
between LDP and static routes becomes inactive temporarily and waits for an LDP session to
be established before the Hold-down timer expires. This implements synchronization between
LDP and static routes. If the Hold-down timer expires, the static route becomes active regardless
of whether the LDP session has been established.
NOTE
Procedure
Step 1 Run:
system-view
Step 2 Run:
The outbound interface view of the primary link of the static route is displayed.
Step 3 Run:
static-route timer ldp-sync hold-down { timer | infinite }
----End
Prerequisites
Synchronization between LDP and static routes has been configured.
Procedure
l Run the display static-route ldp-sync [ interface interface-type interface-number ]
command to check the status of the interface configured with synchronization between LDP
and static routes.
If the parameter interface interface-type interface-number is specified, only the status of
a specified interface is displayed.
----End
Example
Run the display static-route ldp-sync command after configuring synchronization between
LDP and static routes. If the following is displayed, it means that the configuration succeeds.
<HUAWEI> display static-route ldp-sync
Total number of routes enable LDP-sync: 1
--------------------------------------------------------
interface GigabitEthernet1/0/0
Enable ldp-sync static routes number: 1
Static-route ldp-sync holddown timer: 10s
Sync State: Normal
Dest = 1.1.1.1, Mask = 32, NextHop = 2.2.2.2
---------------------------------------------------------
Usage Scenario
The following LDP security features can be configured to meet network security requirements:
l LDP MD5 authentication
A typical MD5 application is to calculate a message digest to prevent message spoofing.
The MD5 message digest is a unique result calculated using an irreversible character string
conversion. If a message is modified during transmission, a different digest is generated.
After the message arrives at the receiving end, the receiving end can detect the modification
after comparing the received digest with a pre-computed digest.
The password of MD5 authentication can be recorded in either plaintext or cipher text.
During MD5 authentication configuration, two peers of an LDP session can be configured
with different record modes for password and must be configured with a single password.
l LDP keychain authentication
Keychain, an enhanced encryption algorithm similar to MD5, calculates a message digest
for an LDP message to prevent the message from being modified.
During keychain authentication, a group of passwords are defined in the format of a
password string, and each password is assigned a specified encryption and decryption
algorithm such as MD5 or secure hash algorithm-1 (SHA-1) and configured with a validity
period. When sending or receiving a packet, the system selects a valid password. Within
the validity period of the password, the system uses the encryption algorithm matching the
password to encrypt the packet before sending it out, or uses the decryption algorithm
matching the password to decrypt the packet before accepting it. In addition, the system
automatically uses a new password after the previous password expires, minimizing
password decryption risks.
Before configuring LDP keychain authentication, configure keychain authentication
globally. If LDP keychain authentication is configured before global keychain
authentication is configured, the LDP session will be disconnected.
l LDP GTSM
The GTSM checks TTL values to defend against attacks. An attacker simulates unicast
LDP messages and sends them to nodes. After receiving these messages, an interface board
on a node finds that the messages are destined for itself and directly sends them to the LDP
module on the control plane without verifying them. As a result, the node is busy in
processing these forged messages on the control plane, leading to high CPU usage.
To address this problem, the GTSM can be configured to check whether or not the TTL
value in the IP header is within a specified range, protecting the nodes against attacks and
improving system security.
Pre-configuration Tasks
Before configuring LDP security features, enable MPLS and MPLS LDP.
Data Preparation
To configure LDP security features, you need the following data.
No. Data
Context
MD5 authentication can be configured for a TCP connection over which an LDP session is
established, improving security. Note that the peers of an LDP session can be configured with
different authentication modes, but must be configured with a single password.
LDP MD5 authentication generates a unique digest for an information segment to prevent LDP
packets from being modified. LDP MD5 authentication is stricter than common checksum
verification for TCP connections.
You can configure either LDP MD5 authentication or LDP keychain authentication based on
their separate characteristics:
l The MD5 algorithm is easy to configure and generates a single password which can be
changed only manually. MD5 authentication applies to the network requiring short-period
encryption.
l Keychain authentication involves a set of passwords and uses a new password when the
previous one expires. Keychain authentication is complex to configure and applies to a
network requiring high security.
NOTE
Keychain authentication and MD5 authentication cannot be both configured on a single LDP peer.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
md5-password { plain | cipher } peer-lsr-id password
The password can be set in either plaintext or cipher text. A plaintext password is a pre-
configured character string that is directly recorded in a configuration file. A cipher text password
is a character string that is encrypted using a specified algorithm and recorded in a configuration
file.
NOTICE
l When configuring an authentication password, select the ciphertext mode because the
password is saved in configuration files in plaintext if you select plaintext mode, which has
a high risk. To ensure device security, change the password periodically.
l Configuring LDP keychain authentication leads to reestablishment of an LDP session and
deletes the LSP associated with the LDP session.
----End
Context
To help improve LDP session security, keychain authentication can be configured for a TCP
connection over which an LDP session has been established.
During keychain authentication, a group of passwords are defined in the format of a password
string, and each password is assigned a specified encryption and decryption algorithm such as
MD5 or secure hash algorithm-1 (SHA-1) and configured with a validity period. When sending
or receiving a packet, the system selects a valid password. Within the validity period of the
password, the system uses the encryption algorithm matching the password to encrypt the packet
before sending it out, or uses the decryption algorithm matching the password to decrypt the
packet before accepting it. In addition, the system automatically uses a new password after the
previous password expires, minimizing password decryption risks.
You can configure either LDP MD5 authentication or LDP keychain authentication based on
their separate characteristics:
l The MD5 algorithm is easy to configure and generates a single password which can be
changed only manually. MD5 authentication applies to the network requiring short-period
encryption.
l Keychain authentication involves a set of passwords and uses a new password when the
previous one expires. Keychain authentication is complex to configure and applies to a
network requiring high security.
NOTE
Keychain authentication and MD5 authentication cannot be both configured on a single LDP peer.
Before configuring LDP keychain authentication, configure keychain globally. For the detailed
configuration procedure, see the HUAWEI NetEngine80E/40E Router Configuration Guide -
Security.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
authentication key-chain peer peer-id name keychain-name
NOTICE
Configuring LDP keychain authentication leads to reestablishment of an LDP session and deletes
the LSP associated with the LDP session.
----End
Context
The GTSM checks TTL values to verify packets and defend devices against attacks. LDP peers
are configured with the GTSM and a valid TTL range to check TTLs in LDP packets exchanged
between them. If the TTL in an LDP packet is out of the valid range, this LDP message is
considered invalid and discarded. The GTSM defends against CPU-based attacks initiated using
a large number of forged packets and protects upper-layer protocols.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
----End
Prerequisites
LDP security features have been configured.
Procedure
l Run the display mpls ldp session verbose command to check the configurations of LDP
MD5 authentication and LDP keychain authentication.
l Run the display gtsm statistics { slot-id | all } command to check GTSM statistics.
----End
Example
Run the display mpls ldp session verbose command to view the LDP MD5 authentication status
and the globally referenced keychain authentication name.
<HUAWEI> display mpls ldp session verbose
Capability:
Capability-Announcement : On
------------------------------------------------------------------------------
Run the display gtsm statistics to view GTSM statistics on interface boards, including the
number of LDP, BGP, BGPv6, and OSPF packets that are received, accepted, and dropped.
<HUAWEI> display gtsm statistics all
GTSM Statistics Table
----------------------------------------------------------------
SlotId Protocol Total Counters Drop Counters Pass Counters
----------------------------------------------------------------
6 BGP 0 0 0
6 BGPv6 0 0 0
6 OSPF 0 0 0
6 LDP 11 0 11
0 OSPFv3 0 0 0
0 RIP 0 0 0
----------------------------------------------------------------
Usage Scenario
You can enable LDP GR to maintain proper forwarding and resume the LDP session and
establish LSPs after a switchover or system update is performed.
NOTE
In practical applications, system-level GR is usually configured in the hardware environment with dual
main control boards. System-level GR allows the system to forward services if the main control board fails.
Pre-configuration Tasks
Before configuring LDP GR, complete the following tasks:
Data Preparation
To configure LDP GR, you need the following data.
No. Data
Context
Perform the following steps on the LDP GR Restarter and its neighbor nodes:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls lsr-id lsr-id
Step 3 Run:
mpls
The MPLS function is enabled on the local node, and the MPLS view is displayed.
Step 4 Run:
quit
Step 5 Run:
mpls ldp
The LDP function is enabled on the local node, and the LDP view is displayed.
Step 6 Run:
graceful-restart
NOTE
----End
Context
Perform the following steps on the GR restarter:
NOTE
Modifying the values of LDP GR timers may lead to reestablishment of LDP sessions.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
The MPLS-LDP view is displayed.
Step 3 Run:
graceful-restart timer neighbor-liveness time
----End
Context
Perform the following steps on the GR Helper:
NOTE
If any timer value related to LDP GR is modified, the LDP session is reestablished.
Procedure
Step 1 Run:
system-view
----End
Prerequisites
The LDP GR function has been configured.
Procedure
l Run the display mpls graceful-restart command to check information about GR of all
protocols related to MPLS.
l Run the display mpls ldp [ all ] [ verbose ] command to check LDP information.
l Run the display mpls ldp session [ all ] [ verbose ] command to check LDP session
information.
----End
Example
l Run the display mpls ldp command. The state of Graceful Restart is On, which means
that LDP GR has been enabled.
------------------------------------------------------------------------------
Protocol Version : V1 Neighbor Liveness : 600 Sec
Graceful Restart : On FT Reconnect Timer : 300 Sec
MTU Signaling : On Recovery Timer : 300 Sec
Capability-Announcement : Off Longest-match : Off
mLDP P2MP Capability : Off mLDP MBB Capability : Off
mLDP MP2MP Capability : Off
LDP Instance Information
------------------------------------------------------------------------------
Instance ID : 0 VPN-Instance :
Instance Status : Active LSR ID : 10.0.35.7
Loop Detection : Off Path Vector Limit : 32
Label Distribution Mode : Ordered
Label Retention Mode : Liberal(DU)/Conservative(DOD)
Instance Deleting State : No Instance Reseting State : No
Graceful-Delete : Off Graceful-Delete Timer : 5 Sec
------------------------------------------------------------------------------
l Run the display mpls ldp command or the display mpls ldp session verbose command
to view the values of the LDP session Reconnect timer, Neighbor-liveness timer, and LSP
Recovery timer.
<HUAWEI> display mpls ldp session verbose
LDP Session(s) in Public Network
------------------------------------------------------------------------------
Peer LDP ID : 10.0.35.2:0 Local LDP ID : 10.0.35.7:0
TCP Connection : 10.0.35.7 -> 10.0.35.2
Session State : Operational Session Role : Active
Session FT Flag : On MD5 Flag : Off
Reconnect Timer : 300 Sec Recovery Timer : 300 Sec
Keychain Name : ---
Capability:
Capability-Announcement : On
mLDP P2MP Capability : Off
mLDP MP2MP Capability : Off
mLDP MBB Capability : Off
------------------------------------------------------------------------------
Context
NOTICE
Resetting LDP may temporarily affect the reestablishment of the LSP. Exercise caution when
resetting LDP.
Resetting LDP is prohibited during the LDP GR.
After you confirm to reset LDP, run the following commands in the user view.
Procedure
l Run the reset mpls ldp command to reset the configurations of the global LDP instance.
l Run the reset mpls ldp vpn-instance vpn-instance-name command to reset LDP
configurations in a specified LDP instance.
l Run the reset mpls ldp all command to reset configurations in all LDP instances.
l Run the reset mpls ldp peer peer-id command to reset a specified peer.
l Run the reset mpls ldp vpn-instance vpn-instance-name peer peer-id command to reset
the peer in a specified VPN instance.
----End
Context
You can run the following commands in any view to perform MPLS ping and MPLS tracert.
Procedure
l Run the ping lsp [ -a source-ip | -c count | -exp exp-value | -h ttl-value | -m interval | -r
reply-mode | -s packet-size | -t time-out | -v ] * ip destination-address mask-length [ ip-
address ] [ nexthop nexthop-address | draft6 ] command to perform MPLS ping.
----End
Context
Run the following commands in the system view to notify the NMS of LSP status changes.
By default, the trap function is disabled during the setup of an LDP LSP.
Procedure
l Run the snmp-agent trap suppress feature-name lsp trap-name { mplsxcup |
mplsxcdown } trap-interval trap-interval [ max-trap-number max-trap-number ]
command in the system view to enable the trap function for the LDP LSP and enable the
debugging of excessive mplsxcup or mplsxcdown information.
----End
Context
In an LDP multi-instance scenario, a session status change by default triggers either an
mplsLdpSessionDown or mplsLdpSessionUp alarm for an LDP session in either a public
network instance or VPN instance. To allow a status change in an LDP session only in a public
network instance to trigger an alarm, configure a policy for triggering an LDP session status
alarm.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls ldp
Step 3 Run:
session-state-trap public-only
A policy for only allowing a public instance's LDP session status change to trigger an alarm is
configured.
----End
Networking Requirements
As shown in Figure 2-4, LSRA, LSRB, and LSRC are core routers on an MPLS network. A PE
transmits data traffic to the MPLS network. Before establishing an LSP to forward data traffic
within the MPLS network, configure local LDP sessions between LSRA and LSRB, and LSRB
and LSRC.
Addresses of interfaces are planned for LSRA, LSRB, and LSRC shown in Figure 2-5.
Service provider's
backbone VPN 2
VPN 1
Site LSRA LSRB LSRC Site
CE CE
PE
PE
VPN 1
VPN 2 PE Site
Site P P P
CE
CE
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable global MPLS and LDP on each LSR.
2. Enable MPLS on interfaces of each LSR.
3. Enable LDP on directly connected interfaces where local LDP sessions are to be
established.
Data Preparation
To complete the configuration, you need the following data:
l IP address of every interface on every LSR as shown in Figure 2-5, OSPF process ID, and
OSPF area ID
l LSR ID of every LSR
Procedure
Step 1 Assign an IP address to every interface.
Configure IP addresses for interfaces on every LSR as shown in Figure 2-5, specify loopback
addresses as LSR IDs, and configure OSPF to advertise routes of network segments to which
the interfaces are connected and routes to the loopback addresses. For configuration details, see
Configuration files in this section.
Step 2 Enable global MPLS and LDP on every LSR.
# Configure LSRA.
<LSRA> system-view
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] mpls lsr-id 2.2.2.9
[LSRB] mpls
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] mpls lsr-id 3.3.3.9
[LSRC] mpls
[LSRC-mpls] quit
[LSRC] mpls ldp
[LSRC-mpls-ldp] quit
# Configure LSRB.
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls
[LSRC-Pos1/0/0] quit
Step 4 Enable LDP on interfaces where local LDP sessions are to be established.
# Configure LSRA.
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
# Configure LSRB.
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls ldp
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls ldp
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls ldp
[LSRC-Pos1/0/0] quit
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.1.1 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.3
#
return
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.2.1.2 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 3.3.3.9 0.0.0.0
network 10.2.1.0 0.0.0.3
#
return
Networking Requirements
LSRA and LSRC are edge routers on a backbone network shown in Figure 2-6. An LDP LSP
can be configured across the backbone network to provide services for VPN sites. To establish
the LDP LSP, LSRA and LSRC must establish a remote LDP session between them.
Addresses of interfaces are planned for LSRA, LSRB, and LSRC shown in Figure 2-7.
Service provider's
backbone
VPN 1 VPN 2
P
Site (LSRB) Site
CE CE
PE
PE (LSRC)
(LSRA)
VPN 1
VPN 2 Site
Site P PE
CE
CE
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable MPLS and LDP globally on each LSR.
2. Specify a remote LDP peer and its IP address on two LSRs at both ends of a remote LDP
session.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of the interfaces on each LSR, as listed in "Data Preparation" of Figure 2-7,
OSPF process IDs, and OSPF area IDs
l LSR ID of each LSR
l Name and IP address of each remote LDP peer of a remote LDP session
Procedure
Step 1 Assign an IP address to each interface and configure OSPF.
Assign an IP address and its mask to every physical interface; configure a loopback interface
address as an LSR ID on every LSR shown in Figure 2-7; configure OSPF to advertise the route
of the network segment of each interface and a host rout to each LSR ID. For configuration
details, see Configuration Files in this section.
# Configure LSRA.
<LSRA> system-view
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] mpls lsr-id 2.2.2.9
[LSRB] mpls
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] mpls lsr-id 3.3.3.9
[LSRC] mpls
[LSRC-mpls] quit
[LSRC] mpls ldp
[LSRC-mpls-ldp] quit
Step 3 Specify a remote LDP peer and its IP address on two LSRs at both ends of a remote LDP session.
# Configure LSRA.
[LSRA] mpls ldp remote-peer LSRC
[LSRA-mpls-ldp-remote-lsrc] remote-ip 3.3.3.9
[LSRA-mpls-ldp-remote-lsrc] quit
# Configure LSRC.
[LSRC] mpls ldp remote-peer LSRA
[LSRC-mpls-ldp-remote-lsra] remote-ip 1.1.1.9
[LSRC-mpls-ldp-remote-lsra] quit
# After completing the preceding configurations, run the display mpls ldp session command
on each LSR. The command output shows that the remote LDP session between LSRA and
LSRC is in the Operational state.
# Run the display mpls ldp remote-peer command on each LSR to view remote LDP peer
information.
------------------------------------------------------------------------------
TOTAL: 1 Peer(s) Found.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
#
mpls ldp remote-peer LSRC
remote-ip 3.3.3.9
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.1.1 255.255.255.252
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.3
#
return
sysname LSRC
#
mpls lsr-id 3.3.3.9
mpls
#
mpls ldp
#
mpls ldp remote-peer LSRA
remote-ip 1.1.1.9
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.2.1.2 255.255.255.252
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 3.3.3.9 0.0.0.0
network 10.2.1.0 0.0.0.3
#
return
Networking Requirements
LSRA, LSRB, and LSRC are core devices on an MPLS network shown in Figure 2-8. Adjacent
LSRs establish local LDP sessions between each other to establish LDP LSPs and swap labels
so that MPLS services can be transmitted. On the network shown in Figure 2-9, LDP is used to
establish an LSP between LSRA and LSRC.
Service provider's
backbone VPN 2
VPN 1
Site LSRA LSRB LSRC Site
CE CE
PE
PE
VPN 1
VPN 2 PE Site
Site P P P
CE
CE
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a local LDP session.
2. (Optional) Modify a policy for triggering LDP LSP establishment on each LSR.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of the interfaces on each LSR, as listed in "Data Preparation" of Figure 2-9,
OSPF process IDs, and OSPF area IDs
l (Optional) Policy for triggering LDP LSP establishment on each LSR
Procedure
Step 1 Configure LDP LSPs.
After completing the procedure described in 2.20.1 Example for Configuring Local LDP
Sessions on each LSR, LSPs use all hosts routes to establish LDP LSPs based on the default
policy for triggering LDP LSP establishment.
Run the display mpls ldp lsp command on each LSR. The command output shows that LDP
LSPs are established using all host routes.
The following example uses the command output on LSRA.
[LSRA] display mpls ldp lsp
LDP LSP Information
-------------------------------------------------------------------------------
DestAddress/Mask In/OutLabel UpstreamPeer NextHop OutInterface
-------------------------------------------------------------------------------
1.1.1.9/32 3/NULL 2.2.2.9 127.0.0.1 InLoop0
*1.1.1.9/32 Liberal DS/2.2.2.9
2.2.2.9/32 NULL/3 - 10.1.1.2 Pos1/0/0
2.2.2.9/32 1024/3 2.2.2.9 10.1.1.2 Pos1/0/0
3.3.3.9/32 NULL/1025 - 10.1.1.2 Pos1/0/0
3.3.3.9/32 1025/1025 2.2.2.9 10.1.1.2 Pos1/0/0
-------------------------------------------------------------------------------
TOTAL: 5 Normal LSP(s) Found.
TOTAL: 1 Liberal LSP(s) Found.
TOTAL: 0 Frr LSP(s) Found.
A '*' before an LSP means the LSP is not established
A '*' before a Label means the USCB or DSCB is stale
A '*' before a UpstreamPeer means the session is stale
NOTE
Usually, the default policy is used. Host routes are used to trigger LDP LSP establishment. In addition to
the default policy, a policy for triggering LDP LSP establishment can be configured manually. Perform
the following steps to configure a policy on each LSR.
Modify the default policy and allow LDP to use all routes including all static and IGP routes in
the routing table to establish LDP LSPs on each LSR.
# Configure LSRA.
[LSRA] mpls
[LSRA-mpls] lsp-trigger all
[LSRA-mpls] quit
# Configure LSRB.
[LSRB] mpls
[LSRB-mpls] lsp-trigger all
[LSRB-mpls] quit
# Configure LSRC.
[LSRC] mpls
[LSRC-mpls] lsp-trigger all
[LSRC-mpls] quit
After completing the preceding configurations, run the display mpls ldp lsp command to view
the established LDP LSPs.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
lsp-trigger all
#
mpls ldp
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.1.1 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.3
#
return
#
mpls lsr-id 3.3.3.9
mpls
lsp-trigger all
#
mpls ldp
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.2.1.2 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 3.3.3.9 0.0.0.0
network 10.2.1.0 0.0.0.3
#
return
Networking Requirements
On the network shown in Figure 2-10, PE1, PE2, and PE3 are connected to each other through
a P device on the MPLS backbone network, and IS-IS is enabled on all devices. LDP sessions
are established between PE1 and PE2 and between PE1 and PE3 to transmit VPN Label Mapping
messages to establish LSPs. Dynamic PWs are established between PE1 and PE2 and between
PE1 and PE3 over the LSPs.
The remote LDP sessions are expected to transmit Label Mapping messages carrying VC labels,
not LDP labels. PE1, PE2, and PE3 can be disabled from distributing LDP labels to remote peers,
which helps prevent LDP label wastes and minimize memory usage.
NOTE
In this example, routes to PEs' loopback interfaces are used as private routes. For configuration details, see
PWE3 Configuration.
Figure 2-10 Networking diagram for disabling devices from distributing LDP labels to remote
peers
Loopback 0
5.5.5.5/32
PE2
Loopback 0
.1 3
.2 1
.1 0/
PO 24
.1 0/
4
1.1.1.1/32
.1 1/
.1 1/
/2
/
20 OS
20 S
P
POS1/0/1
10.1.1.2/24 Loopback 0
POS1/0/1 2.2.2.2/32
10.1.1.1/24 P P
PE1 P 30 OS
30 OS .1 1/
.1 1/ .1 0 /
.1 0/ .2 0
.1 0 /2
/2 4
4
PE3
Loopback 0
4.4.4.4/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable an IGP on the backbone network to allow devices on the backbone network to
communicate with each other.
2. Enable basic MPLS capabilities over the backbone network and set up LSPs.
3. Establish a remote MPLS LDP peer relationship between PEs on both ends of each PW.
4. Disable PEs on both ends of each PW from distributing LDP labels to remote peers.
5. Create MPLS L2VCs on PEs.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address to each interface.
Step 2 Enable MPLS and MPLS LDP globally and on each interface.
# Configure PE1.
<PE1> system-view
[PE1] mpls lsr-id 1.1.1.1
[PE1] mpls
[PE1-mpls] quit
[PE1] mpls ldp
[PE1-mpls-ldp] quit
[PE1] interface pos 1/0/1
[PE1-Pos1/0/1] mpls
[PE1-Pos1/0/1] mpls ldp
[PE1-Pos1/0/1] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls lsr-id 5.5.5.5
[PE2] mpls
[PE2-mpls] quit
[PE2] mpls ldp
[PE2-mpls-ldp] quit
[PE2] interface pos 1/0/1
[PE2-Pos1/0/1] mpls
[PE2-Pos1/0/1] mpls ldp
[PE2-Pos1/0/1] quit
# Configure PE3.
<PE3> system-view
[PE3] mpls lsr-id 4.4.4.4
[PE3] mpls
[PE3-mpls] quit
[PE3] mpls ldp
[PE3-mpls-ldp] quit
[PE3] interface pos 1/0/0
[PE3-Pos1/0/0] mpls
[PE3-Pos1/0/0] mpls ldp
[PE3-Pos1/0/0] quit
After completing the preceding configurations, run the display mpls ldp session command on
each device. The command output shows that the Status field is Operational. An LSP has been
established over an LDP session between each pair of directly connected devices on the public
network.
Run the display mpls ldp lsp command to view information about LSPs and label advertisement.
Step 3 Establish a remote MPLS LDP peer relationship between PEs on both ends of each PW.
# Configure PE1.
<PE1> system-view
[PE1] mpls ldp
[PE1-mpls-ldp] mpls ldp remote-peer PE2
[PE1-mpls-ldp-remote-pe2] remote-ip 5.5.5.5
[PE1-mpls-ldp-remote-pe2] mpls ldp remote-peer PE3
[PE1-mpls-ldp-remote-pe3] remote-ip 4.4.4.4
[PE1-mpls-ldp-remote-pe3] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls ldp
[PE2-mpls-ldp] mpls ldp remote-peer PE1
[PE2-mpls-ldp-remote-pe1] remote-ip 1.1.1.1
[PE2-mpls-ldp-remote-pe1] quit
# Configure PE3.
<PE3> system-view
[PE3] mpls ldp
[PE3-mpls-ldp] mpls ldp remote-peer PE1
[PE3-mpls-ldp-remote-pe1] remote-ip 1.1.1.1
[PE3-mpls-ldp-remote-pe1] quit
After completing the preceding configurations, run the display mpls ldp session command on
each device. The command output shows that the Status field is Operational. Remote LDP
sessions between PEs have been established. The following example uses the command output
on PE1.
<PE1> display mpls ldp session
[PE1]display mpls ldp session
Run the display mpls ldp lsp command. The command output shows that each PE has assigned
liberal labels to its remote peers. LDP labels that are not used on the MPLS PWE3 L2VPN are
wasted.
<PE1> display mpls ldp lsp
LDP LSP Information
-------------------------------------------------------------------------------
DestAddress/Mask In/OutLabel UpstreamPeer NextHop OutInterface
-------------------------------------------------------------------------------
1.1.1.1/32 3/NULL 2.2.2.2 127.0.0.1 InLoop0
1.1.1.1/32 3/NULL 5.5.5.5 127.0.0.1 InLoop0
1.1.1.1/32 3/NULL 4.4.4.4 127.0.0.1 InLoop0
*1.1.1.1/32 Liberal/1025 DS/2.2.2.2
*1.1.1.1/32 Liberal/1024 DS/5.5.5.5
*1.1.1.1/32 Liberal/1025 DS/4.4.4.4
2.2.2.2/32 NULL/3 - 10.1.1.2 Pos1/0/1
2.2.2.2/32 1024/3 2.2.2.2 10.1.1.2 Pos1/0/1
2.2.2.2/32 1024/3 5.5.5.5 10.1.1.2 Pos1/0/1
2.2.2.2/32 1024/3 4.4.4.4 10.1.1.2 Pos1/0/1
*2.2.2.2/32 Liberal/1025 DS/5.5.5.5
*2.2.2.2/32 Liberal/1024 DS/4.4.4.4
4.4.4.4/32 NULL/1024 - 10.1.1.2 Pos1/0/1
4.4.4.4/32 1025/1024 2.2.2.2 10.1.1.2 Pos1/0/1
4.4.4.4/32 1025/1024 5.5.5.5 10.1.1.2 Pos1/0/1
4.4.4.4/32 1025/1024 4.4.4.4 10.1.1.2 Pos1/0/1
*4.4.4.4/32 Liberal/1026 DS/5.5.5.5
*4.4.4.4/32 Liberal/3 DS/4.4.4.4
5.5.5.5/32 NULL/1026 - 10.1.1.2 Pos1/0/1
5.5.5.5/32 1026/1026 2.2.2.2 10.1.1.2 Pos1/0/1
5.5.5.5/32 1026/1026 5.5.5.5 10.1.1.2 Pos1/0/1
5.5.5.5/32 1026/1026 4.4.4.4 10.1.1.2 Pos1/0/1
*5.5.5.5/32 Liberal/3 DS/5.5.5.5
*5.5.5.5/32 Liberal/1026 DS/4.4.4.4
-------------------------------------------------------------------------------
TOTAL: 15 Normal LSP(s) Found.
TOTAL: 9 Liberal LSP(s) Found.
TOTAL: 0 Frr LSP(s) Found.
A '*' before an LSP means the LSP is not established
A '*' before a Label means the USCB or DSCB is stale
A '*' before a UpstreamPeer means the session is stale
Step 4 Disable PEs on both ends of each PW from distributing LDP labels to remote peers.
# Configure PE1.
<PE1> system-view
[PE1-mpls-ldp] mpls ldp remote-peer PE2
[PE1-mpls-ldp-remote-pe2] remote-ip 5.5.5.5 pwe3
[PE1-mpls-ldp-remote-pe2] mpls ldp remote-peer PE3
[PE1-mpls-ldp-remote-pe3] remote-ip 4.4.4.4 pwe3
[PE1-mpls-ldp-remote-pe3] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls ldp remote-peer PE1
[PE2-mpls-ldp-remote-pe1] remote-ip 1.1.1.1 pwe3
[PE2-mpls-ldp-remote-pe1] quit
# Configure PE3.
<PE3> system-view
[PE3] mpls ldp remote-peer PE1
[PE3-mpls-ldp-remote-pe1] remote-ip 1.1.1.1 pwe3
[PE3-mpls-ldp-remote-pe1] quit
After completing the preceding configurations, run the display mpls ldp lsp command on each
PE to view information about LSPs that are established after a PWE3 policy is configured. LDP
labels for remote LDP sessions are not assigned to a directly connected PE.
Run the display mpls ldp lsp command. The command output shows that LDP labels have been
withdrawn and LSPs established using the labels have been torn down. LSPs are established
only over local LDP sessions.
Step 5 Create a loopback interface on each PE to simulate VPN routes and create MPLS L2VCs using
the configured PW template.
# Configure PE1.
<PE1> system-view
[PE1] mpls l2vpn
[PE1-l2vpn] quit
[PE1] pw-template 1to3
[PE1-pw-template-1to3] peer-address 4.4.4.4
[PE1-pw-template-1to3] control-word
[PE1-pw-template-1to3] quit
[PE1-pw-template-1to2] peer-address 5.5.5.5
[PE1-pw-template-1to2] control-word
[PE1-pw-template-1to2] quit
[PE1] interface LoopBack 1
[PE1-LoopBack1] mpls l2vc pw-template 1to2 100 control-word
[PE1-LoopBack1] ip address 10.3.1.1 30
[PE1-LoopBack1] quit
[PE1] pw-template 1to2
[PE1] interface LoopBack 2
[PE1-LoopBack1] mpls l2vc pw-template 1to3 200 control-word
[PE1-LoopBack1] ip address 11.2.1.1 30
[PE1-LoopBack1] quit
# Configure PE3.
<PE3> system-view
[PE3] mpls l2vpn
[PE3-l2vpn] quit
[PE3] pw-template 3to1
[PE3-pw-template-3to1] peer-address 1.1.1.1
[PE3-pw-template-3to1] control-word
[PE3-pw-template-3to1] quit
[PE3] interface LoopBack 1
[PE3-LoopBack1] mpls l2vc pw-template 3to1 100 control-word
[PE3-LoopBack1] ip address 10.5.1.1 30
[PE3-LoopBack1] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls l2vpn
[PE2-l2vpn] quit
[PE2] pw-template 2to1
[PE2-pw-template-2to1] peer-address 1.1.1.1
[PE2-pw-template-2to1] control-word
[PE2-pw-template-2to1] quit
[PE2] interface LoopBack 2
[PE2-LoopBack2] mpls l2vc pw-template 2to1 200 control-word
[PE2-LoopBack2] ip address 11.1.1.1 30
[PE2-LoopBack2] quit
After completing the preceding configurations, run the display mpls l2vc command on PE1.
The command output shows that that VCs are Up.
[PE1] display mpls l2vc
This command output shows that the VCs can be established properly after a local PE is disabled
from distributing labels to its remote peer PE.
Run the ping vc ip-interworking 100 control-word remote 10.5.1.1 100 command on PE1.
The command output shows that PE1 and PE3 can communicate with each other using the VCs.
[PE1] ping vc ip-interworking 100 control-word remote 10.5.1.1 100
--- FEC: FEC 128 PSEUDOWIRE (NEW). Type = ip-interworking, ID = 100 ping
statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 60/132/190 ms
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
mpls lsr-id 1.1.1.1
mpls
#
mpls l2vpn
#
pw-template 1to2
peer-address 4.4.4.4
control-word
#
pw-template 1to3
peer-address 5.5.5.5
control-word
#
mpls ldp
#
#
mpls ldp remote-peer pe2
remote-ip 4.4.4.4 pwe3
#
mpls ldp remote-peer pe3
remote-ip 5.5.5.5 pwe3
#
isis 1
is-level level-2
network-entity 86.4501.0010.0100.0001.00
#
interface Pos1/0/1
link-protocol ppp
undo shutdown
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface LoopBack1
ip address 10.3.1.1 255.255.255.252
l P configuration file
#
sysname P
#
mpls lsr-id 2.2.2.2
mpls
#
mpls ldp
#
isis 1
is-level level-2
network-entity 86.4501.0030.0300.0003.00
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 30.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface Pos1/0/1
link-protocol ppp
undo shutdown
ip address 10.1.1.2 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface Pos1/0/3
link-protocol ppp
undo shutdown
ip address 20.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
Networking Requirements
On the network shown in Figure 2-11, LDP is run between LSRA and LSRB, and between
LSRD and LSRE. LDP does not run between LSRB, LSRC and LSRD. RSVP tunnels from
LSRB to LSRD and from LSRD to LSRB are established. It is required that traffic between
LSRA and LSRE pass transmitted over tunnels.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IP addresses for interfaces on each LSR, configure loopback address as the LSR
IDs, and enable IGP.
2. Enable OSPF TE or IS-IS TE in the area supporting TE and create an MPLS TE tunnel.
3. Enable MPLS LDP in the area that does not support TE and configure LDP remote peer
on the border of TE.
4. Configure forwarding adjacency on the border of TE.
Data Preparation
To complete the configuration, you need the following data.
l Tunnel interface names, IP addresses, destination addresses, tunnel IDs, tunnel signaling
protocols (default RSVP-TE), tunnel bandwidths, TE metric values, and link cost values
of LSRB and LSRD
Procedure
Step 1 Assign an IP address to each interface.
Configure the IP address and mask for each interface as shown in Figure 2-11, including the
loopback interface. For configuration details, see Configuration Files in this section.
# Configure LSRA.
[LSRA] isis 1
[LSRA-isis-1] network-entity 86.1111.1111.1111.00
[LSRA-isis-1] is-level level-2
[LSRA-isis-1] cost-style wide
[LSRA-isis-1] quit
[LSRA] interface loopback 1
[LSRA-LoopBack1] isis enable 1
[LSRA-LoopBack1] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] isis enable 1
[LSRA-Pos1/0/0] quit
# Configure LSRB.
[LSRB] isis 1
[LSRB-isis-1] network-entity 86.2222.2222.2222.00
[LSRB-isis-1] is-level level-2
[LSRB-isis-1] cost-style wide
[LSRB-isis-1] traffic-eng level-2
[LSRB-isis-1] quit
[LSRB] interface loopback 1
[LSRB-LoopBack1] isis enable 1
[LSRB-LoopBack1] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] isis enable 1
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] isis enable 1
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] network-entity 86.3333.3333.3333.00
[LSRC-isis-1] is-level level-2
[LSRC-isis-1] cost-style wide
[LSRC-isis-1] traffic-eng level-2
[LSRC-isis-1] quit
[LSRC] interface loopback 1
[LSRC-LoopBack1] isis enable 1
[LSRC-LoopBack1] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] isis enable 1
[LSRC-Pos1/0/0] quit
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] isis enable 1
[LSRC-Pos2/0/0] quit
# Configure LSRD.
[LSRD] isis 1
[LSRD-isis-1] network-entity 86.4444.4444.4444.00
[LSRD-isis-1] is-level level-2
[LSRD-isis-1] cost-style wide
[LSRD-isis-1] traffic-eng level-2
[LSRD-isis-1] quit
[LSRD] interface loopback 1
[LSRD-LoopBack1] isis enable 1
[LSRD-LoopBack1] quit
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] isis enable 1
[LSRD-Pos1/0/0] quit
[LSRD] interface pos 2/0/0
[LSRD-Pos2/0/0] isis enable 1
[LSRD-Pos2/0/0] quit
# Configure LSRE.
[LSRE] isis 1
[LSRE-isis-1] network-entity 86.5555.5555.5555.00
[LSRE-isis-1] is-level level-2
[LSRE-isis-1] cost-style wide
[LSRE-isis-1] quit
[LSRE] interface loopback 1
[LSRE-LoopBack1] isis enable 1
[LSRE-LoopBack1] quit
[LSRE] interface pos 1/0/0
[LSRE-Pos1/0/0] isis enable 1
[LSRE-Pos1/0/0] quit
After completing the configuration, run the display ip routing-table command on each LSR.
LSRs can learn routes from each other.
The following example uses the command output on LSRA.
[LSRA] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 13 Routes : 13
Destination/Mask Proto Pre Cost Flags NextHop Interface
1.1.1.1/32 Direct 0 0 D 127.0.0.1 LoopBack1
2.2.2.2/32 ISIS 15 10 D 10.1.1.2 Pos1/0/0
3.3.3.3/32 ISIS 15 20 D 10.1.1.2 Pos1/0/0
4.4.4.4/32 ISIS 15 30 D 10.1.1.2 Pos1/0/0
5.5.5.5/32 ISIS 15 40 D 10.1.1.2 Pos1/0/0
10.1.1.0/24 Direct 0 0 D 10.1.1.1 Pos1/0/0
10.1.1.1/32 Direct 0 0 D 127.0.0.1 Pos1/0/0
10.1.1.2/32 Direct 0 0 D 10.1.1.2 Pos1/0/0
20.1.1.0/24 ISIS 15 20 D 10.1.1.2 Pos1/0/0
30.1.1.0/24 ISIS 15 30 D 10.1.1.2 Pos1/0/0
40.1.1.0/24 ISIS 15 40 D 10.1.1.2 Pos1/0/0
127.0.0.0/8 Direct 0 0 D 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
Step 3 Configure basic MPLS functions on all LSRs, enable LDP on LSRA, LSRB, LSRD, and LSRE,
and enable RSVP on LSRB, LSRC, and LSRD.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
# Configure LSRB.
[LSRB] mpls lsr-id 2.2.2.2
[LSRB] mpls
[LSRB-mpls] mpls te
[LSRB-mpls] mpls rsvp-te
[LSRB-mpls] mpls te cspf
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] mpls ldp
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls
[LSRB-Pos2/0/0] mpls te
[LSRB-Pos2/0/0] mpls rsvp-te
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] mpls lsr-id 3.3.3.3
[LSRC] mpls
[LSRC-mpls] mpls te
[LSRC-mpls] mpls rsvp-te
[LSRC-mpls] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls
[LSRC-Pos1/0/0] mpls te
[LSRC-Pos1/0/0] mpls rsvp-te
[LSRC-Pos1/0/0] quit
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] mpls
[LSRC-Pos2/0/0] mpls te
[LSRC-Pos2/0/0] mpls rsvp-te
[LSRC-Pos2/0/0] quit
# Configure LSRD.
[LSRD] mpls lsr-id 4.4.4.4
[LSRD] mpls
[LSRD-mpls] mpls te
[LSRD-mpls] mpls rsvp-te
[LSRD-mpls] mpls te cspf
[LSRD-mpls] quit
[LSRD] mpls ldp
[LSRD-mpls-ldp] quit
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] mpls
[LSRD-Pos1/0/0] mpls te
[LSRD-Pos1/0/0] mpls rsvp-te
[LSRD-Pos1/0/0] quit
[LSRD] interface pos 2/0/0
[LSRD-Pos2/0/0] mpls
[LSRD-Pos2/0/0] mpls ldp
[LSRD-Pos2/0/0] quit
# Configure LSRE.
[LSRE] mpls lsr-id 5.5.5.5
[LSRE] mpls
[LSRE-mpls] quit
After the configuration, the LDP session is established successfully between LSRA and LSRB,
and between LSRD and LSRE.
Run the display mpls ldp session command on LSRA, LSRB, LSRD, and LSRE. You can ss
whether LDP sessions are established.
Run the display mpls ldp peer command. You can see whether LDP peers have been set up.
Run the display mpls lsp command. RSVP LSP is not set up.
Step 4 Configure the LDP remote session between LSRB and LSRD.
# Configure LSRB.
[LSRB] mpls ldp remote-peer LSRD
[LSRB-mpls-ldp-remote-LSRD] remote-ip 4.4.4.4
[LSRB-mpls-ldp-remote-LSRD] quit
# Configure LSRD.
[LSRB] mpls ldp remote-peer LSRB
[LSRB-mpls-ldp-remote-LSRB] remote-ip 2.2.2.2
[LSRB-mpls-ldp-remote-LSRB] quit
After completing the configuration, run the display mpls ldp remote-peer command on LSRB
or LSRD. The remote session is set up successfully between LSRB and LSRD.
Step 5 Configure the bandwidth attributes for the outbound interfaces of links along the TE tunnel.
# Configure LSRB.
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls te bandwidth max-reservable-bandwidth 20000
[LSRB-Pos2/0/0] mpls te bandwidth bc0 20000
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls te bandwidth max-reservable-bandwidth 20000
[LSRC-Pos1/0/0] mpls te bandwidth bc0 20000
[LSRC-Pos1/0/0] quit
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] mpls te bandwidth max-reservable-bandwidth 20000
[LSRC-Pos2/0/0] mpls te bandwidth bc0 20000
[LSRC-Pos2/0/0] quit
# Configure LSRD.
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] mpls te bandwidth max-reservable-bandwidth 20000
[LSRD-Pos1/0/0] mpls te bandwidth bc0 20000
[LSRD-Pos1/0/0] quit
# On LSRB, enable forwarding adjacency on the tunnel interface and adjust the metric value of
forwarding adjacency to direct traffic of LSRD or LSRE to pass through the tunnel.
[LSRB] interface tunnel 1/0/0
[LSRB-Tunnel1/0/0] ip address unnumbered interface loopback 1
[LSRB-Tunnel1/0/0] tunnel-protocol mpls te
[LSRB-Tunnel1/0/0] destination 4.4.4.4
[LSRB-Tunnel1/0/0] mpls te tunnel-id 100
[LSRB-Tunnel1/0/0] mpls te bandwidth ct0 10000
[LSRB-Tunnel1/0/0] mpls te igp advertise
[LSRB-Tunnel1/0/0] mpls te igp metric absolute 1
[LSRB-Tunnel1/0/0] mpls te commit
[LSRB-Tunnel1/0/0] isis enable 1
# On LSRD, enable forwarding adjacency on the tunnel interface and adjust the metric value of
forwarding adjacency to direct traffic of LSRA or LSRB to pass through the tunnel.
[LSRD] interface tunnel 1/0/0
[LSRD-Tunnel1/0/0] ip address unnumbered interface loopback 1
[LSRD-Tunnel1/0/0] tunnel-protocol mpls te
[LSRD-Tunnel1/0/0] destination 2.2.2.2
[LSRD-Tunnel1/0/0] mpls te tunnel-id 100
[LSRD-Tunnel1/0/0] mpls te bandwidth ct0 10000
[LSRD-Tunnel1/0/0] mpls te igp advertise
[LSRD-Tunnel1/0/0] mpls te igp metric absolute 1
[LSRD-Tunnel1/0/0] mpls te commit
[LSRD-Tunnel1/0/0] isis enable 1
# Run the display interface tunnel command. The tunnel has been set up.
[LSRB] display interface tunnel
Tunnel1/0/0 current state : UP
Line protocol current state : UP
Last up time: 2007-10-29, 16:35:10
Description : Tunnel1/0/0Interface
...
# Run the display mpls lsp command on LSRB, LSRC, and LSRD. The RSVP LSP has been
set up between them.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
#
mpls ldp
#
isis 1
is-level level-2
cost-style wide
network-entity 86.1111.1111.1111.00
#
interface Pos1/0/0
link-protocol ppp
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
return
isis enable 1
#
return
link-protocol ppp
ip address 30.1.1.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 20000
mpls te bandwidth bc0 20000
mpls rsvp-te
#
interface Pos2/0/0
link-protocol ppp
ip address 40.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 2.2.2.2
mpls te tunnel-id 100
mpls te bandwidth ct0 10000
mpls te igp advertise
mpls te igp metric absolute 1
mpls te commit
isis enable 1
#
return
Networking Requirements
As shown in Figure 2-12, two links are configured between PE1 and PE4. The link of PE1->P1-
>P2->P4 is the primary link; the link of PE1->P1->P3->P4 is the secondary link.
If the link between P1 and P2 becomes faulty, either of the following problems occurs:
l If the primary link physically goes Down, the LDP session and routes on the primary link
go Down accordingly. LDP immediately instructs the upstream device to withdraw labels
and triggers LDP Auto FRR, and the LSP on the secondary link will allocate labels to the
upstream device again, prolonging the convergence time. As a result, FRR switching is not
performed in time, causing packet loss.
l If the physical and protocol status of the primary link is proper but the LDP session on the
primary link goes Down, LDP-IGP synchronization enables LDP to inform the IGP of the
primary link fault, and the IGP configures the maximum cost value for the primary link.
After that, LDP immediately instructs the upstream device to withdraw labels and allocates
labels to the upstream device because a new LSP is set up on the secondary link, prolonging
the LSP convergence time. As a result, packet loss occurs.
LDP graceful deletion can resolve the preceding problems. If LDP graceful deletion is
configured, after the LDP session goes Down, the local device does not immediately instruct
the upstream device to withdraw labels but allows the upstream device to keep the labels,
speeding up the convergence of LDP Auto FRR and LDP-IGP synchronization and the primary/
secondary link switchover.
LDP Auto FRR, LDP-IGP synchronization, and LDP graceful deletion are configured on
interfaces of the intersecting device P1 and its directly connected device P2.
Loopback1
2.2.2.9/32
/1 G
10 E1/
E 1 /0 2 /3 0 .2. 0/3
Loopback1 Loopback1 G .1 . 1.1
.1 /30 Loopback1
5.5.5.9/32 1.1.1.9/32 /0/1 010 P2 G
10 E1/ 4.4.4.9/32
E 1 1 /3 .2. 0/1
GE1/0/1 G .1. 1.2
.1 /30
10.5.1.2/30 10
GE1/0/3
PE1 10.5.1.1/30 P1 G P4
10 E1 / 0/2 30
.3 . /0 / 1 /
1.1 2 G E .1 .2
/3 0 .4
G P3 10
10 E1/ /4
.3. 0/2
1.2 E 1/ 0 1/ 30
/30 G . 1.
.4
10
Loopback1 Primary link
3.3.3.9/32
Bypass link
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IP addresses for interfaces, and configure IS-IS to advertise routes to the network
segments where the interfaces reside and to advertise the routes to devices with LSR IDs.
2. Enable MPLS and MPLS LDP globally and on each interface.
3. Enable IS-IS Auto FRR on P1.
4. Configure the LDP LSP trigger policy for the backup LSP on P1.
5. Enable LDP Auto FRR, LDP-IGP synchronization, and LDP graceful deletion on interfaces
of the intersecting device P1 and its directly connected device P2.
6. Enable LDP graceful deletion on the intersecting device P1 and its directly connected device
P2.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of the interfaces on each device, as listed in Figure 2-12, IS-IS process IDs,
and the area where each device resides
l Values of the hold-down timer and the delay timer
l LSP trigger policy for the backup LSP
Procedure
Step 1 Assign IP addresses to interfaces. Configure dynamic routes to make the devices reachable.
Configure IP addresses and masks for interfaces including loopback interfaces as shown in
Figure 2-12, and configure IS-IS to advertise routes to network segments to which the IP
addresses of interfaces belong and routes to hosts with LSR IDs. For configuration details, see
Configuration Files in this section.
The link of PE1->P1->P2->P4 is the primary link; the link of PE1->P1->P3->P4 is the secondary
link. The cost of GE 1/0/2 on P1 is 60.
Step 2 Enable MPLS and MPLS LDP globally and on each interface.
# Configure P1.
<P1> system-view
[P1] mpls lsr-id 1.1.1.9
[P1] mpls
[P1-mpls] quit
[P1] mpls ldp
[P1-mpls-ldp] quit
[P1] interface GigabitEthernet 1/0/1
[P1-GigabitEthernet 1/0/1] mpls
[P1-GigabitEthernet 1/0/1] mpls ldp
[P1-GigabitEthernet 1/0/1] quit
[P1] interface GigabitEthernet 1/0/2
[P1-GigabitEthernet 1/0/2] mpls
[P1-GigabitEthernet 1/0/2] mpls ldp
[P1-GigabitEthernet 1/0/2] quit
[P1] interface GigabitEthernet 1/0/3
[P1-GigabitEthernet 1/0/3] mpls
[P1-GigabitEthernet 1/0/3] mpls ldp
# Configure P2.
<P2> system-view
[P2] mpls lsr-id 2.2.2.9
[P2] mpls
[P2-mpls] quit
[P2] mpls ldp
[P2-mpls-ldp] quit
[P2] interface GigabitEthernet 1/0/1
[P2-GigabitEthernet 1/0/1] mpls
[P2-GigabitEthernet 1/0/1] mpls ldp
[P2-GigabitEthernet 1/0/1] quit
[P2] interface GigabitEthernet 1/0/3
[P2-GigabitEthernet 1/0/3] mpls
[P2-GigabitEthernet 1/0/3] mpls ldp
[P2-GigabitEthernet 1/0/3] quit
# Configure P3.
<P3> system-view
[P3] mpls lsr-id 3.3.3.9
[P3] mpls
[P3-mpls] quit
[P3] mpls ldp
[P3-mpls-ldp] quit
[P3] interface GigabitEthernet 1/0/2
[P3-GigabitEthernet 1/0/2] mpls
[P3-GigabitEthernet 1/0/2] mpls ldp
[P3-GigabitEthernet 1/0/2] quit
[P3] interface GigabitEthernet 1/0/4
[P3-GigabitEthernet 1/0/4] mpls
[P3-GigabitEthernet 1/0/4] mpls ldp
[P3-GigabitEthernet 1/0/4] quit
# Configure P4.
<P4> system-view
[P4] mpls lsr-id 3.3.3.9
[P4] mpls
[P4-mpls] quit
[P4] mpls ldp
[P4-mpls-ldp] quit
[P4] interface GigabitEthernet 1/0/1
[P4-GigabitEthernet 1/0/1] mpls
[P4-GigabitEthernet 1/0/1] mpls ldp
[P4-GigabitEthernet 1/0/1] quit
[P4] interface GigabitEthernet 1/0/2
[P4-GigabitEthernet 1/0/2] mpls
[P4-GigabitEthernet 1/0/2] mpls ldp
[P4-GigabitEthernet 1/0/2] quit
# Configure PE1.
<PE1> system-view
[PE1] mpls lsr-id 4.4.4.9
[PE1] mpls
[PE1-mpls] quit
[PE1] mpls ldp
[PE1-mpls-ldp] quit
[PE1] interface GigabitEthernet 1/0/1
[PE1-GigabitEthernet 1/0/1] mpls
[PE1-GigabitEthernet 1/0/1] mpls ldp
[PE1-GigabitEthernet 1/0/1] quit
After the preceding configuration is complete, LDP sessions are set up between directly
connected devices. Run the display mpls ldp session command on each device to view that the
value of the Status field is Operational. The following example uses the command output on
P1.
<P1> display mpls ldp session
LDP Session(s) in Public Network
Codes: LAM(Label Advertisement Mode), SsnAge Unit(DDDD:HH:MM)
A '*' before a session means the session is being deleted.
------------------------------------------------------------------------------
PeerID Status LAM SsnRole SsnAge KASent/Rcv
------------------------------------------------------------------------------
2.2.2.9:0 Operational DU Passive 0000:00:56 227/227
3.3.3.9:0 Operational DU Passive 0000:00:56 227/227
5.5.5.9:0 Operational DU Passive 0000:00:56 227/227
------------------------------------------------------------------------------
TOTAL: 3 session(s) Found.
Step 3 Enable IS-IS Auto FRR on P1. View the routing information and the setup of the LSPs.
# Configure P1.
[P1] isis 1
[P1-isis-1] frr
[P1-isis-1-frr] loop-free-alternate
[P1-isis-1-frr] quit
[P1-isis-1] quit
Destination: 4.4.4.9/32
Protocol: ISIS-L1 Process ID: 1
Preference: 15 Cost: 20
NextHop: 10.1.1.2 Neighbour: 0.0.0.0
State: Active Adv Age: 00h05m02s
Tag: 0 Priority: medium
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: GigabitEthernet1/0/1
TunnelID: 0x80001a Flags: D
BkNextHop: 10.3.1.2 BkInterface: GigabitEthernet1/0/2
BkLabel: NULL SecTunnelID: 0x800020
BkPETunnelID: 0x0 BkPESecTunnelID: 0x0
BkIndirectID: 0x0
The command output shows that IS-IS Auto FRR enables IS-IS to generate a backup route.
# Run the display mpls lsp command on P1 to view the setup of the LSPs.
[P1] display mpls lsp
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
1.1.1.9/32 3/NULL -/-
2.2.2.9/32 NULL/3 -/GE1/0/1
2.2.2.9/32 1024/3 -/GE1/0/1
3.3.3.9/32 NULL/1025 -/GE1/0/1
**LDP FRR** /3 /GE1/0/2
3.3.3.9/32 1025/1025 -/GE1/0/1
**LDP FRR** /3 /GE1/0/2
The preceding command output shows that the setup of a backup LSP is triggered by LDP for
the routes with 32-bit addresses by default.
Step 4 Enable LDP Auto FRR and LDP-IGP synchronization and configure parameters on interfaces
of the intersecting device P1 and its directly connected device P2.
# Configure P1.
<P1> system-view
[P1] interface GigabitEthernet 1/0/1
[P1-GigabitEthernet 1/0/1] isis ldp-sync
[P1-GigabitEthernet 1/0/1] isis timer ldp-sync hold-down 8
[P1-GigabitEthernet 1/0/1] isis timer ldp-sync hold-max-cost infinite
[P1-GigabitEthernet 1/0/1] mpls ldp timer igp-sync-delay 6
[P1-GigabitEthernet 1/0/0] quit
# Configure P2.
<P2> system-view
[P2] interface GigabitEthernet 1/0/1
[P2-GigabitEthernet 1/0/1] isis ldp-sync
[P2-GigabitEthernet 1/0/1] isis timer ldp-sync hold-down 8
[P2-GigabitEthernet 1/0/1] isis timer ldp-sync hold-max-cost infinite
[P2-GigabitEthernet 1/0/1] mpls ldp timer igp-sync-delay 6
[P2-GigabitEthernet 1/0/1] quit
Step 5 Enable LDP graceful deletion on the intersecting device P1 and its directly connected P2.
# Configure P1.
<P1> system-view
[P1] mpls ldp
[P1-mpls-ldp] graceful-delete
[P1] quit
# Configure P2.
<P2> system-view
[P2] mpls ldp
[P2-mpls-ldp] graceful-delete
[P2] quit
------------------------------------------------------------------------------
----End
Configuration Files
l P1 configuration file
#
sysname P1
l P2 configuration file
#
sysname P2
#
mpls lsr-id 2.2.2.9
mpls
#
mpls ldp
#
#
isis 1
is-level level-2
network-entity 10.0000.0000.0002.00
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.1.2 255.255.255.252
isis enable 1
isis ldp-sync
isis timer ldp-sync hold-down 8
isis timer ldp-sync hold-max-cost infinite
mpls
mpls ldp
mpls ldp timer igp-sync-delay 6
#
interface GigabitEthernet1/0/3
undo shutdown
ip address 10.2.1.1 255.255.255.252
isis enable 1
mpls
mpls ldp
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
isis enable 1
#
return
l P3 configuration file
#
sysname P3
#
mpls lsr-id 3.3.3.9
mpls
#
mpls ldp
#
#
isis 1
is-level level-2
network-entity 10.0000.0000.0003.00
#
interface GigabitEthernet1/0/2
undo shutdown
ip address 10.3.1.2 255.255.255.252
isis enable 1
mpls
mpls ldp
#
interface GigabitEthernet1/0/4
undo shutdown
ip address 10.4.1.1 255.255.255.252
isis enable 1
mpls
mpls ldp
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
isis enable 1
#
return
l P4 configuration file
#
sysname P4
#
mpls lsr-id 4.4.4.9
mpls
#
mpls ldp
#
#
isis 1
is-level level-2
network-entity 10.0000.0000.0004.00
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.2.1.2 255.255.255.252
isis enable 1
mpls
mpls ldp
#
interface GigabitEthernet1/0/2
undo shutdown
ip address 10.4.1.2 255.255.255.252
isis enable 1
mpls
mpls ldp
#
interface LoopBack1
ip address 4.4.4.9 255.255.255.255
isis enable 1
#
return
#
sysname PE1
#
mpls lsr-id 5.5.5.9
mpls
#
mpls ldp
#
#
isis 1
is-level level-2
network-entity 10.0000.0000.0005.00
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.5.1.1 255.255.255.252
isis enable 1
mpls
mpls ldp
#
interface LoopBack1
ip address 5.5.5.9 255.255.255.255
isis enable 1
#
return
Networking Requirements
MPLS LDP services are transmitted on the network shown in Figure 2-13. LSRD is a DSLAM
that is a low-performance access device. LSRD by default receives Label Mapping messages
from all peers and uses the routing information in these messages to establish a large number of
LSPs. As a result, memory on LSRD is overused and LSRD is overburdened. An inbound LDP
policy can be configured to allow LSRD to receive only Label Mapping messages for routes to
LSRC. Only an LSP originating from LSRD and destined for LSRC can be established,
efficiently using resources.
LSRB
LSRA LSRC
POS1/0/2
10.1.3.2/24
Loopback1
4.4.4.9/32
POS1/0/0
10.1.3.1/24
LSRD
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l IP address of every interface on every LSR shown in Figure 2-13, OSPF process IDs, and
OSPF area IDs
l LSR ID of every LSR
Procedure
Step 1 Assign an IP address to each interface and configure an IGP.
Assign an IP address and its mask to every physical interface; configure a loopback interface
address as an LSR ID on every LSR shown in Figure 2-13; configure OSPF to advertise the
route of the network segment of each interface and a host rout to each LSR ID. For configuration
details, see Configuration Files in this section.
Step 2 Enable MPLS and MPLS LDP on each LSR and its interfaces.
# Configure LSRA.
<LSRA> system-view
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] mpls lsr-id 2.2.2.9
[LSRB] mpls
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] mpls ldp
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 1/0/1
[LSRB-Pos1/0/1] mpls
[LSRB-Pos1/0/1] mpls ldp
[LSRB-Pos1/0/1] quit
[LSRB] interface pos 1/0/2
[LSRB-Pos1/0/2] mpls
[LSRB-Pos1/0/2] mpls ldp
[LSRB-Pos1/0/2] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] mpls lsr-id 3.3.3.9
[LSRC] mpls
[LSRC-mpls] quit
[LSRC] mpls ldp
[LSRC-mpls-ldp] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls
[LSRC-Pos1/0/0] mpls ldp
[LSRC-Pos1/0/0] quit
# Configure LSRD.
<LSRD> system-view
[LSRD] mpls lsr-id 4.4.4.9
[LSRD] mpls
[LSRD-mpls] quit
[LSRD] mpls ldp
[LSRD-mpls-ldp] quit
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] mpls
[LSRD-Pos1/0/0] mpls ldp
[LSRD-Pos1/0/0] quit
# After completing the preceding configurations, run the display mpls lsp command on LSRD
to view information about the established LSPs.
[LSRD] display mpls lsp
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
1.1.1.9/32 NULL/1024 -/Pos1/0/0
1.1.1.9/32 1024/1024 -/Pos1/0/0
2.2.2.9/32 NULL/3 -/Pos1/0/0
2.2.2.9/32 1025/3 -/Pos1/0/0
3.3.3.9/32 NULL/1025 -/Pos1/0/0
3.3.3.9/32 1026/1025 -/Pos1/0/0
The command output shows that LSPs to LSRA, LSRB, and LSRC have been established on
LSRD.
Step 3 Configure an inbound LDP policy.
# Configure an IP prefix list on LSRD to permit the routes only to LSRC to pass the inbound
LDP policy.
[LSRD] ip ip-prefix prefix1 permit 3.3.3.9 32
# Configure an inbound policy on LSRD to allow LSRD to receive Label Mapping messages
for the routes only to LSRC.
[LSRD] mpls ldp
[LSRD-mpls-ldp] inbound peer 2.2.2.9 fec ip-prefix prefix1
[LSRD-mpls-ldp] quit
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
3.3.3.9/32 NULL/1025 -/Pos1/0/0
3.3.3.9/32 1026/1025 -/Pos1/0/0
----End
Configuration Files
l LSRA configuration file
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
#
interface Pos1/0/0
ip address 10.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.255
#
return
#
sysname LSRB
#
mpls lsr-id 2.2.2.9
mpls
#
mpls ldp
#
interface Pos1/0/0
ip address 10.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface Pos1/0/1
ip address 10.1.2.1 255.255.255.0
mpls
mpls ldp
#
interface Pos1/0/2
ip address 10.1.3.2 255.255.255.0
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 2.2.2.9 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
network 10.1.3.0 0.0.0.255
#
return
#
sysname LSRC
#
mpls lsr-id 3.3.3.9
mpls
#
mpls ldp
#
interface Pos1/0/0
ip address 10.1.2.2 255.255.255.0
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 3.3.3.9 0.0.0.0
network 10.1.2.0 0.0.0.255
#
return
#
sysname LSRD
#
mpls lsr-id 4.4.4.9
mpls
#
mpls ldp
inbound peer 2.2.2.9 fec ip-prefix prefix1
#
interface Pos1/0/0
ip address 10.1.3.1 255.255.255.0
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack1
ip address 4.4.4.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 4.4.4.9 0.0.0.0
network 10.1.3.0 0.0.0.255
#
ip ip-prefix prefix1 index 10 permit 3.3.3.9 32
#
return
Networking Requirements
MPLS LDP services are transmitted on the network shown in Figure 2-14. LSRD is a DSLAM
that is a low-performance access device. LSRD by default receives Label Mapping messages
from all peers and uses the routing information in these messages to establish a large number of
LSPs. As a result, memory on LSRD is overused and LSRD is overburdened. An outbound LDP
policy can be configured on LSRB to send LSRD Label Mapping messages for routes only to
LSRC so that only LSPs to LSRC are established, saving resources.
LSRB
LSRA LSRC
POS1/0/2
10.1.3.2/24
Loopback1
4.4.4.9/32
POS1/0/0
10.1.3.1/24
LSRD
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l IP address of every interface on every LSR shown in Figure 2-14, OSPF process IDs, and
OSPF area IDs
l LSR ID of every LSR
Procedure
Step 1 Assign an IP address to each interface and configure an IGP.
Assign an IP address and its mask to every physical interface; configure a loopback interface
address as an LSR ID on every LSR shown in Figure 2-14; configure OSPF to advertise the
route of the network segment of each interface and a host rout to each LSR ID. For configuration
details, see Configuration Files in this section.
Step 2 Enable MPLS and MPLS LDP on each LSR and its interfaces.
# Configure LSRA.
<LSRA> system-view
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] mpls lsr-id 2.2.2.9
[LSRB] mpls
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] mpls ldp
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 1/0/1
[LSRB-Pos1/0/1] mpls
[LSRB-Pos1/0/1] mpls ldp
[LSRB-Pos1/0/1] quit
[LSRB] interface pos 1/0/2
[LSRB-Pos1/0/2] mpls
[LSRB-Pos1/0/2] mpls ldp
[LSRB-Pos1/0/2] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] mpls lsr-id 3.3.3.9
[LSRC] mpls
[LSRC-mpls] quit
[LSRC] mpls ldp
[LSRC-mpls-ldp] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls
[LSRC-Pos1/0/0] mpls ldp
[LSRC-Pos1/0/0] quit
# Configure LSRD.
<LSRD> system-view
[LSRD] mpls lsr-id 4.4.4.9
[LSRD] mpls
[LSRD-mpls] quit
[LSRD] mpls ldp
[LSRD-mpls-ldp] quit
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] mpls
[LSRD-Pos1/0/0] mpls ldp
[LSRD-Pos1/0/0] quit
# After completing the preceding configurations, run the display mpls lsp command on LSRD
to view information about the established LSPs.
[LSRD] display mpls lsp
-------------------------------------------------------------------------------
The command output shows that LSPs to LSRA, LSRB, and LSRC have been established on
LSRD.
Step 3 Configure an outbound LDP policy.
# Configure an IP prefix list on LSRB to permit the routes to LSRC to pass the outbound LDP
policy.
[LSRB] ip ip-prefix prefix1 permit 3.3.3.9 32
# Configure an outbound policy on LSRB to send LSRD Label Mapping messages for the routes
only to LSRC.
[LSRB] mpls ldp
[LSRB-mpls-ldp] outbound peer 4.4.4.9 fec ip-prefix prefix1
[LSRB-mpls-ldp] quit
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
3.3.3.9/32 NULL/1025 -/Pos1/0/0
3.3.3.9/32 1026/1025 -/Pos1/0/0
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
#
interface Pos1/0/0
ip address 10.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.255
#
return
#
sysname LSRB
#
mpls lsr-id 2.2.2.9
mpls
#
mpls ldp
outbound peer 4.4.4.9 fec ip-prefix prefix1
#
interface Pos1/0/0
ip address 10.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface Pos1/0/1
ip address 10.1.2.1 255.255.255.0
mpls
mpls ldp
#
interface Pos1/0/2
ip address 10.1.3.2 255.255.255.0
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 2.2.2.9 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
network 10.1.3.0 0.0.0.255
#
ip ip-prefix prefix1 index 10 permit 3.3.3.9 32
#
return
#
sysname LSRC
#
mpls lsr-id 3.3.3.9
mpls
#
mpls ldp
#
interface Pos1/0/0
ip address 10.1.2.2 255.255.255.0
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack1
#
sysname LSRD
#
mpls lsr-id 4.4.4.9
mpls
#
mpls ldp
#
interface Pos1/0/0
ip address 10.1.3.1 255.255.255.0
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack1
ip address 4.4.4.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 4.4.4.9 0.0.0.0
network 10.1.3.0 0.0.0.255
#
return
Networking Requirements
After MPLS LDP is enabled, LDP LSPs will be automatically established, leading to a large
number of transit LSPs and resulting in resource wastes. On the network shown in Figure
2-15, a policy for triggering transit LSP establishment can be configured on LSB so that a FEC
for a route to 4.4.4.4/32 can only be used to establish a transit LSP. This efficiently reduces the
number of unwanted LSPs and saves network resources.
POS1/0/0 POS1/0/0
192.168.1.1/24 192.168.3.2/24
LSRA LSRD
Loopback1 Loopback1
1.1.1.1/32 4.4.4.4/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure the IP address and loopback address as an LSR ID of each interface, and
configure OSPF to advertise the route to each network segment of each interface and to
advertise the host route to each LSR ID.
2. Configure an IP prefix list on transit LSRB to filter routes used to establish transit LSPs.
3. Enable MPLS and MPLS LDP globally on each LSR.
4. Enable MPLS and MPLS LDP on each interface.
Data Preparation
To complete the configuration, you need the following data:
l IP address of every interface on every LSR shown in Figure 2-15, OSPF process IDs, and
OSPF area IDs
l Policy for triggering transit LDP LSP establishment
l IP prefix list name and route that transit LSRB can use to establish a transit LSP
Procedure
Step 1 Assign an IP address to each interface and configure OSPF to advertise the route to each network
segment of each interface and to advertise the host route to each LSR ID.
Assign an IP address and its mask to every physical interface; configure a loopback interface
address as an LSR ID on every LSR shown in Figure 2-15; configure OSPF to advertise the
route of the network segment of each interface and a host rout to each LSR ID. For configuration
details, see Configuration Files in this section.
Step 3 Configure MPLS and MPLS LDP on each LSR and its interfaces.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] lsp-trigger all
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
# Configure LSRB.
[LSRB] mpls lsr-id 2.2.2.2
[LSRB] mpls
[LSRB-mpls] lsp-trigger all
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] propagate mapping for ip-prefix FilterOnTransit
[LSRB-mpls-ldp] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] mpls ldp
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls
[LSRB-Pos2/0/0] mpls ldp
[LSRB-Pos2/0/0] quit
Repeat this step for LSRC and LSRD. For configuration details, see Configuration Files in this
section.
Step 4 Verify the configuration.
Run the display mpls ldp lsp command to view established LSPs.
# View LDP LSP information on LSRA.
[LSRA] display mpls ldp lsp
*192.168.2.0/24 Liberal
192.168.3.0/24 3/NULL 2.2.2.2 192.168.3.1 Pos2/0/0
192.168.3.0/24 3/NULL 4.4.4.4 192.168.3.1 Pos2/0/0
*192.168.3.0/24 Liberal
-------------------------------------------------------------------------------
TOTAL: 15 Normal LSP(s) Found.
TOTAL: 7 Liberal LSP(s) Found.
TOTAL: 0 Frr LSP(s) Found.
A '*' before an LSP means the LSP is not established
A '*' before a Label means the USCB or DSCB is stale
A '*' before a UpstreamPeer means the session is in GR state
A '*' before a NextHop means the LSP is FRR LSP
The command output shows that a single transit LDP LSP destined for 4.4.4.4/32 has been
established with the transit node of LSRB.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
lsp-trigger all
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 192.168.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
ospf 1
area 0.0.0.0
network 192.168.1.0 0.0.0.255
network 1.1.1.1 0.0.0.0
#
return
undo shutdown
ip address 192.168.3.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
#
ospf 1
area 0.0.0.0
network 192.168.2.0 0.0.0.255
network 192.168.3.0 0.0.0.255
network 3.3.3.3 0.0.0.0
#
return
Networking Requirements
Pseudo wire emulation edge-to-edge (PWE3) refers to a technology that carries Layer 2 services
on a packet switched network (PSN). PWE3 sets up a pseudo wire (PW) over a public network
tunnel. To establish the public network tunnel, a remote LDP session must be created between
LSRA and LSRD shown in Figure 2-16. LSRA uses the remote LDP session to automatically
send DoD requests to LSRD for a Label Mapping message containing a route to the loopback
address (LSR ID) of LSRD. This reduces unneeded IP and MPLS entries and efficiently uses
network resources.
Figure 2-16 Networking for configuring LDP to automatically send DoD requests
Loopback0 Loopback0 Loopback0 Loopback0
1.1.1.1/32 2.2.2.2/32 3.3.3.3/32 4.4.4.4/32
POS1/0/0 POS1/0/1 POS1/0/1
10.1.1.1/24 10.1.2.1/24 10.1.3.1/24
POS1/0/0 POS1/0/0 POS1/0/0
10.1.1.2/24 10.1.2.2/24 10.1.3.2/24
LSRA LSRB LSRC LSRD
Configuration Roadmap
The configuration roadmap is as follows:
1. Assign an IP address and its mask to every interface and configure a loopback interface
address as an LSR ID on every node.
2. Configure basic IS-IS functions on backbone nodes and static routes to edge nodes and
their adjacent nodes.
3. Enable MPLS and MPLS LDP on each node and its interfaces.
4. Configure the DoD label advertisement mode.
5. Configure the inter-area LDP extension.
6. Configure a remote LDP session and enable LDP to automatically send requests for labels
advertised in DoD mode.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address and its mask to every interface and configure a loopback interface address
as an LSR ID on every node.
Assign an IP address and its mask to every physical interface and configure a loopback interface
address as an LSR ID on every node shown in Figure 2-16. For configuration details, see
Configuration Files in this section.
Step 2 Configure basic IS-IS functions on backbone nodes and static routes to edge nodes and their
adjacent nodes.
[LSRB-Pos1/0/1] quit
[LSRB] interface loopback 0
[LSRB-LoopBack0] isis enable 1
[LSRB-LoopBack0] quit
# Run the display ip routing-table command on LSRA to view route information. The
configured default route exists in the routing table of LSRA.
[LSRA] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 7 Routes : 7
# Run the display ip routing-table command on LSRB to view route information. The
configured static route to LSRA exists in the routing table of LSRB.
[LSRB] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 12 Routes : 12
Step 3 Enable MPLS and MPLS LDP on each node and its interfaces.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
Repeat this step for LSRB, LSRC, and LSRD. For configuration details, see Configuration
Files in this section.
# Configure LSRA.
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls ldp advertisement dod
[LSRA-Pos1/0/0] quit
# Configure LSRB.
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls ldp advertisement dod
[LSRB-Pos1/0/0] quit
# Configure LSRC.
[LSRC] interface pos 1/0/1
[LSRC-Pos1/0/1] mpls ldp advertisement dod
[LSRC-Pos1/0/1] quit
# Configure LSRD.
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] mpls ldp advertisement dod
[LSRD-Pos1/0/0] quit
Step 5 Configure the inter-area LDP extension to enable the longest match rule.
# Run the longest-match command on LSRA to enable LDP to use the longest match rule to
search for routes related to an LSP to be established.
[LSRA] mpls ldp
[LSRA-mpls-ldp] longest-match
[LSRA-mpls-ldp] quit
# Run the longest-match command on LSRD to enable LDP to use the longest match rule to
search for routes related to an LSP to be established.
[LSRD] mpls ldp
[LSRD-mpls-ldp] longest-match
[LSRD-mpls-ldp] quit
Step 6 Configure a remote LDP session and enable LDP to automatically send DoD requests.
# Configure LSRA.
[LSRA] mpls ldp remote-peer lsrd
[LSRA-mpls-ldp-remote-lsrd] remote-ip 4.4.4.4
[LSRA-mpls-ldp-remote-lsrd] remote-ip auto-dod-request
[LSRA-mpls-ldp-remote-lsrd] quit
# Configure LSRD.
[LSRD] mpls ldp remote-peer lsra
[LSRD-mpls-ldp-remote-lsra] remote-ip 1.1.1.1
[LSRD-mpls-ldp-remote-lsra] remote-ip auto-dod-request
[LSRD-mpls-ldp-remote-lsra] quit
# After completing the preceding configurations, run the display ip routing-table 4.4.4.4
command to view the route to LSRD (4.4.4.4) on LSRA.
[LSRA] display ip routing-table 4.4.4.4
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Table : Public
Summary Count : 1
Destination/Mask Proto Pre Cost Flags NextHop Interface
The command output shows that there is only a default route to 4.4.4.4 in the routing table.
# Run the display mpls ldp lsp command on LSRA to view information about the established
LSP.
[LSRA] display mpls ldp lsp
The command output shows that an LSP destined for LSRD (4.4.4.4) has been established on
LSRA. LSRA has requested for a Label mapping message containing the route to 4.4.4.4 and
obtained the route, and the LSP has been successfully established.
# Run the display tunnel-info all command on LSRA to view information about the established
LSP.
The command output shows that the LSP originated from LSRA and destined for LSRD has
been established.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
#
mpls ldp
longest-match
#
#
mpls ldp remote-peer lsrd
remote-ip 4.4.4.4
undo remote-ip pwe3
remote-ip auto-dod-request
#
interface Pos1/0/0
link-protocol ppp
ip address 10.1.1.1 255.255.255.0
mpls
mpls ldp
mpls ldp advertisement dod
#
interface NULL0
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
#
ip route-static 0.0.0.0 0.0.0.0 10.1.1.2
#
return
interface Pos1/0/1
link-protocol ppp
ip address 10.1.2.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack0
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
ip route-static 1.1.1.1 255.255.255.255 10.1.1.1
#
return
remote-ip 1.1.1.1
undo remote-ip pwe3
remote-ip auto-dod-request
#
interface Pos1/0/0
link-protocol ppp
ip address 10.1.3.2 255.255.255.0
mpls
mpls ldp
mpls ldp advertisement dod
#
interface NULL0
#
interface LoopBack0
ip address 4.4.4.4 255.255.255.255
#
ip route-static 0.0.0.0 0.0.0.0 10.1.3.1
#
return
Networking Requirements
Network services such as VoIP, online video services, and online games are transmitted based
on VPN technologies, requiring high continuity. VPN services usually travel through LDP LSPs.
Data loss due to link faults adversely affects these services.
To improve service reliability, LDP Auto FRR can be configured. Compared with manual LDP
FRR, LDP Auto FRR does not require to specify a next-hop address. When LDP Auto FRR is
configured, a backup LSP is automatically created based on IGP routes. LDP Auto FRR
simplifies the configuration process and avoids loops that may occur in manual LDP FRR. It
applies to complex and large networks.
On the network shown in Figure 2-17, a primary LSP between LSRA and LSRC and a backup
LSP over a path LSRA -> LSRB -> LSRC are established. To allow traffic to rapidly switch to
the backup LSP if the primary LSP fails, LSRA can be configured with LDP Auto FRR,
minimizing traffic loss.
P
10 O S
.2 0
.1 1/
.1 0/
4
.3 0/
/2
.1 1/
.1 1
10 O S
LSRB /2
4
P backup LSP
PO .1.3
.1 0
10
.1 0/
4
S1 .2/
/2
.1 1/
10 O S
/ 0 24
/2
P
Configuration Roadmap
The configuration roadmap is as follows:
1. Assign an IP address and its mask to every interface and configure a loopback interface
address as an LSR ID on every node.
2. Configure IS-IS to advertise the route to each network segment of each interface and to
advertise the host route to each LSR ID.
3. Enable MPLS and MPLS LDP on each node and its interfaces.
4. Enable IS-IS Auto FRR on the ingress to protect traffic.
5. Configure a policy for triggering LDP LSP establishment based on all routes.
6. Configure a policy for triggering backup LDP LSP establishment on LSRA.
Data Preparation
To complete the configuration, you need the following data:
l IP address of every interface on every node shown in Figure 2-17, IS-IS process ID, and
IS-IS area ID
l Policy for triggering backup LDP LSP establishment
Procedure
Step 1 Assign an IP address to every interface.
Assign an IP address and its mask to every physical interface and configure a loopback interface
address as an LSR ID on every node shown in Figure 2-17. For configuration details, see
Configuration Files in this section.
Step 2 Configure IS-IS to advertise the route to each network segment of each interface and to advertise
the host route to each LSR ID.
# Configure LSRA.
<LSRA> system-view
[LSRA] isis 1
[LSRA-isis-1] network-entity 10.0000.0000.0001.00
[LSRA-isis-1] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] isis enable 1
[LSRA-Pos1/0/0] quit
[LSRA] interface pos 1/0/1
[LSRA-Pos1/0/1] isis enable 1
[LSRA-Pos1/0/1] quit
[LSRA] interface loopBack 0
[LSRA-LoopBack0] isis enable 1
[LSRA-LoopBack0] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] isis 1
[LSRB-isis-1] network-entity 10.0000.0000.0002.00
[LSRB-isis-1] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] isis enable 1
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 1/0/1
[LSRB-Pos1/0/1] isis enable 1
[LSRB-Pos1/0/1] quit
[LSRB] interface loopBack 0
[LSRB-LoopBack0] isis enable 1
[LSRB-LoopBack0] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] isis 1
[LSRC-isis-1] network-entity 10.0000.0000.0003.00
[LSRC-isis-1] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] isis enable 1
[LSRC-Pos1/0/0] quit
[LSRC] interface pos 1/0/1
[LSRC-Pos1/0/1] isis enable 1
[LSRC-Pos1/0/1] quit
[LSRC] interface pos 1/0/2
[LSRC-Pos1/0/2] isis enable 1
[LSRC-Pos1/0/2] quit
[LSRC] interface loopBack 0
[LSRC-LoopBack0] isis enable 1
[LSRC-LoopBack0] quit
# Configure LSRD.
<LSRD> system-view
[LSRD] isis 1
[LSRD-isis-1] network-entity 10.0000.0000.0004.00
[LSRD-isis-1] quit
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] isis enable 1
[LSRD-Pos1/0/0] quit
[LSRD] interface loopBack 0
[LSRD-LoopBack0] isis enable 1
[LSRD-LoopBack0] quit
Step 3 Configure MPLS and MPLS LDP on every node and its interfaces to forward MPLS traffic, and
verify LSP information.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
[LSRA] interface pos 1/0/1
[LSRA-Pos1/0/1] mpls
[LSRA-Pos1/0/1] mpls ldp
[LSRA-Pos1/0/1] quit
# Configure LSRB.
[LSRB] mpls lsr-id 2.2.2.9
[LSRB] mpls
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] mpls ldp
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 1/0/1
[LSRB-Pos1/0/1] mpls
[LSRB-Pos1/0/1] mpls ldp
[LSRB-Pos1/0/1] quit
# Configure LSRC.
[LSRC] mpls lsr-id 3.3.3.9
[LSRC] mpls
[LSRC-mpls] quit
[LSRC] mpls ldp
[LSRC-mpls-ldp] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls
[LSRC-Pos1/0/0] mpls ldp
[LSRC-Pos1/0/0] quit
[LSRC] interface pos 1/0/1
[LSRC-Pos1/0/1] mpls
[LSRC-Pos1/0/1] mpls ldp
[LSRC-Pos1/0/1] quit
[LSRC] interface pos 1/0/2
[LSRC-Pos1/0/2] mpls
[LSRC-Pos1/0/2] mpls ldp
[LSRC-Pos1/0/2] quit
# Configure LSRD.
[LSRD] mpls lsr-id 4.4.4.9
[LSRD] mpls
[LSRD-mpls] quit
[LSRD] mpls ldp
[LSRD-mpls-ldp] quit
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] mpls
[LSRD-Pos1/0/0] mpls ldp
[LSRD-Pos1/0/0] quit
# After completing the preceding configurations, run the display mpls lsp command on LSRA
to view information about the established LSP.
[LSRA] display mpls lsp
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
2.2.2.9/32 NULL/3 -/Pos1/0/0
2.2.2.9/32 1024/3 -/Pos1/0/0
3.3.3.9/32 NULL/3 -/Pos1/0/1
3.3.3.9/32 1025/3 -/Pos1/0/1
4.4.4.9/32 NULL/1026 -/Pos1/0/1
4.4.4.9/32 1026/1026 -/Pos1/0/1
The command output shows that the host route to an address with a 32-bit mask is used to
establish the LDP LSP. This means that the default policy for triggering LSP establishment is
used.
Step 4 Enable IS-IS Auto FRR on LSRA, and verify routing information and backup LSP information.
# Enable IS-IS Auto FRR on LSRA.
[LSRA] isis
[LSRA-isis-1] frr
[LSRA-isis-1-frr] loop-free-alternate
[LSRA-isis-1-frr] quit
[LSRA-isis-1] quit
# View routing information of direct links between LSRA and LSRC and between LSRC and
LSRD. The command output shows that a backup IS-IS route has been generated after IS-IS
Auto FRR was enabled.
[LSRA] display ip routing-table 10.1.4.0 verbose
Destination: 10.1.4.0/24
Protocol: ISIS Process ID: 1
Preference: 15 Cost: 20
NextHop: 10.1.2.2 Neighbour: 0.0.0.0
State: Active Adv Age: 00h05m38s
Tag: 0 Priority: low
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: Pos1/0/1
TunnelID: 0x0 Flags: D
BkNextHop: 10.1.1.2 BkInterface: Pos1/0/0
BkLabel: NULL SecTunnelID: 0x0
BkPETunnelID: 0x0 BkPESecTunnelID: 0x0
BkIndirectID: 0x0
# Run the display mpls lsp command on LSRA to view LSP information.
[LSRA] display mpls lsp
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
2.2.2.9/32 NULL/3 -/Pos1/0/0
**LDP FRR** /1025 /Pos1/0/1
The command output shows that the backup route to an address with a 32-bit mask is used to
establish the backup LSP. This means that the default policy for triggering backup LSP
establishment is used.
Step 5 Configure a policy to allow all routes to be used to trigger LDP LSP establishment, and view
LSP information.
# Run the lsp-trigger command on LSRC to allow all routes to be used to trigger LDP LSP
establishment and view LSP information.
[LSRC] mpls
[LSRC-mpls] lsp-trigger all
[LSRC-mpls] quit
# Run the display mpls lsp command on LSRA to view LSP information.
[LSRA] display mpls lsp
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
2.2.2.9/32 NULL/3 -/Pos1/0/0
**LDP FRR** /1025 /Pos1/0/1
2.2.2.9/32 1024/3 -/Pos1/0/0
**LDP FRR** /1025 /Pos1/0/1
3.3.3.9/32 NULL/3 -/Pos1/0/1
**LDP FRR** /1025 /Pos1/0/0
3.3.3.9/32 1025/3 -/Pos1/0/1
**LDP FRR** /1025 /Pos1/0/0
4.4.4.9/32 NULL/1026 -/Pos1/0/1
**LDP FRR** /1026 /Pos1/0/0
4.4.4.9/32 1026/1026 -/Pos1/0/1
**LDP FRR** /1026 /Pos1/0/0
10.1.3.0/24 1027/3 -/Pos1/0/1
10.1.4.0/24 1028/3 -/Pos1/0/1
The command output shows that routes to addresses with 24-bit masks are used to set up LSPs.
Step 6 Configure a policy for triggering backup LSP establishment based all routes.
# Run the auto-frr lsp-trigger command on LSRA to allow LDP to use all backup routes to
establish backup LSPs.
[LSRA] mpls ldp
[LSRA-mpls-ldp] auto-frr lsp-trigger all
[LSRA-mpls-ldp] quit
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
2.2.2.9/32 NULL/3 -/Pos1/0/0
**LDP FRR** /1025 /Pos1/0/1
2.2.2.9/32 1024/3 -/Pos1/0/0
**LDP FRR** /1025 /Pos1/0/1
3.3.3.9/32 NULL/3 -/Pos1/0/1
**LDP FRR** /1025 /Pos1/0/0
3.3.3.9/32 1025/3 -/Pos1/0/1
**LDP FRR** /1025 /Pos1/0/0
4.4.4.9/32 NULL/1026 -/Pos1/0/1
**LDP FRR** /1026 /Pos1/0/0
4.4.4.9/32 1026/1026 -/Pos1/0/1
**LDP FRR** /1026 /Pos1/0/0
10.1.3.0/24 1027/3 -/Pos1/0/1
10.1.4.0/24 1028/3 -/Pos1/0/1
**LDP FRR** /1027 /Pos1/0/0
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
auto-frr lsp-trigger all
#
aaa
authentication-scheme default
#
authorization-scheme default
#
accounting-scheme default
#
domain default
#
#
isis 1
frr
loop-free-alternate level-1
loop-free-alternate level-2
network-entity 10.0000.0000.0001.00
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface Pos1/0/1
link-protocol ppp
undo shutdown
ip address 10.1.2.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack0
ip address 1.1.1.9 255.255.255.255
isis enable 1
#
oam-mgr
#
user-interface con 0
user-interface vty 0 4
user-interface vty 16 20
#
return
#
mpls ldp
#
aaa
authentication-scheme default
#
authorization-scheme default
#
accounting-scheme default
#
domain default
#
#
isis 1
network-entity 10.0000.0000.0004.00
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.4.2 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack0
ip address 4.4.4.9 255.255.255.255
isis enable 1
#
oam-mgr
#
user-interface con 0
user-interface vty 0 4
user-interface vty 16 20
#
return
Networking Requirements
To improve LDP session security, you can configure LDP MD5 or keychain authentication for
LDP peers on both ends of an LDP session. You can choose either of the security authentication
modes based on their characteristics:
On the network shown in Figure 2-18, LDP sessions between PE1 and the P and between PE2
and the P are established. LDP LSPs are to be established over the LDP sessions. As the user
network connected to PE1 transmits important services, the LDP session between PE1 and the
P has high security requirements. The user network connected to PE2 transmits regular services.
Therefore, services transmitted over the LDP session between PE2 and the P can be encrypted
within a short term. To meet specific security requirements, you can configure the following
authentication modes:
l LDP keychain authentication for the LDP session between PE1 and the P
l LDP MD5 authentication for the LDP session between PE2 and the P
GE1/0/0
10.1.1.2/24 P
GE1/0/1
Loopback0 10.1.2.2/24
2.2.2.2/32
GE1/0/0
10.1.2.1/24 IP/MPLS
backbone
PE2
CE
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure basic IS-IS functions so that nodes are reachable at the network layer.
2. Configure local LDP sessions between PE1 and the P and between PE2 and the P.
3. Configure LDP keychain authentication for the LDP session between PE1 and the P.
4. Configure LDP MD5 authentication for the LDP session between PE2 and the P.
Data Preparation
To complete the configuration, you need the following data:
l IS-IS process ID (1), area ID (10.0001), system ID converted using the loopback address
of each node, IS-IS level (Level-2)
l LSR ID, the same as the loopback address of each node, as shown in Figure 2-18
l Keychain name (kforldp) on PE1 and the P, TCP type value (180), TCP authentication
algorithm (SHA-1), algorithm ID (4), the tolerance time (15 minutes) for waiting to receive
authentication packets, and periodic validation parameters:
– Key 1: algorithm (SHA-1), password (huaweiwork), validity period (Monday to
Thursday)
– Key 2: algorithm (SHA-1), password (testpass), validity period (Friday to Sunday)
l MD5 authentication password (md5forLDP) for the LDP session between PE2 and the P
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address to each interface shown in Figure 2-18 and create a loopback interface on
each node. For configuration details, see Configuration Files in this section.
Step 2 Configure basic IS-IS functions and enable IS-IS on interfaces, including loopback interfaces,
on each node.
# Configure PE1.
<PE1> system-view
[PE1] is-is 1
[PE1-is-is-1] network-entity 10.0001.0010.0100.1001.00
[PE1-is-is-1] is-level level-2
[PE1-is-is-1] quit
[PE1] interface LoopBack0
[PE1-LoopBack0] isis enable 1
[PE1-LoopBack0] quit
[PE1] interface GigabitEthernet1/0/0
[PE1-GigabitEthernet1/0/0] isis enable 1
[PE1-GigabitEthernet1/0/0] quit
Repeat the preceding step on PE2 and the P. For configuration details, see Configuration
Files in this section.
Step 3 Configure local LDP sessions.
# Configure PE1.
[PE1] mpls lsr-id 1.1.1.1
[PE1] mpls
[PE1-mpls] mpls ldp
[PE1-mpls-ldp] quit
[PE1] interface GigabitEthernet1/0/0
[PE1-GigabitEthernet1/0/0] mpls
[PE1-GigabitEthernet1/0/0] mpls ldp
[PE1-GigabitEthernet1/0/0] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls lsr-id 2.2.2.2
[PE2] mpls
[PE2-mpls] mpls ldp
[PE2-mpls-ldp] quit
[PE2] interface GigabitEthernet1/0/0
[PE2-GigabitEthernet1/0/0] mpls
[PE2-GigabitEthernet1/0/0] mpls ldp
[PE2-GigabitEthernet1/0/0] quit
# Configure the P.
<P> system-view
[P] mpls lsr-id 3.3.3.3
[P] mpls
[P-mpls] mpls ldp
[P-mpls-ldp] quit
[P] interface GigabitEthernet1/0/0
[P-GigabitEthernet1/0/0] mpls
[P-GigabitEthernet1/0/0] mpls ldp
[P-GigabitEthernet1/0/0] quit
# Configure the P.
[P] keychain kforldp mode absolute
[P-keychain-kforldp] tcp-kind 180
[P-keychain-kforldp] tcp-algorithm-id sha-1 4
[P-keychain-kforldp] receive-tolerance 15
[P-keychain-kforldp] key-id 1
[P-keychain-kforldp-keyid-1] algorithm sha-1
[P-keychain-kforldp-keyid-1] key-string plain huaweiwork
[P-keychain-kforldp-keyid-1] send-time day mon to thu
[P-keychain-kforldp-keyid-1] receive-time day mon to thu
[P-keychain-kforldp-keyid-1] quit
[P-keychain-kforldp] key-id 2
[P-keychain-kforldp-keyid-2] algorithm sha-1
[P-keychain-kforldp-keyid-2] key-string plain testpass
[P-keychain-kforldp-keyid-2] send-time day fri to sun
[P-keychain-kforldp-keyid-2] receive-time day fri to sun
[P-keychain-kforldp-keyid-2] quit
[P-keychain-kforldp] quit
# Configure the P.
[P] mpls ldp
[P-mpls-ldp] authentication key-chain peer 1.1.1.1 name kforldp
[P-mpls-ldp] quit
# Configure the P.
[P] mpls ldp
[P-mpls-ldp] md5-password plain 2.2.2.2 md5forLDP
[P-mpls-ldp] quit
Capability:
Capability-Announcement : On
mLDP P2MP Capability : On
mLDP MP2MP Capability : Off
mLDP MBB Capability : On
Capability:
Capability-Announcement : On
mLDP P2MP Capability : On
mLDP MP2MP Capability : Off
mLDP MBB Capability : On
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
mpls lsr-id 1.1.1.1
mpls
#
mpls ldp
authentication key-chain peer 3.3.3.3 name kforldp
#
#
keychain kforldp mode periodic weekly
receive-tolerance 15
tcp-kind 180
key-id 1
algorithm sha-1
key-string plain huaweiwork
send-time day mon to thu
receive-time day mon to thu
key-id 2
algorithm sha-1
key-string plain testpass
send-time day fri to sun
receive-time day fri to sun
#
isis 1
is-level level-2
network-entity 10.0001.0010.0100.1001.00
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
return
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.2.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
l P configuration file
#
sysname P
#
mpls lsr-id 3.3.3.3
mpls
#
mpls ldp
authentication key-chain peer 1.1.1.1 name kforldp
md5-password plain 2.2.2.2 md5forLDP
#
#
keychain kforldp mode periodic weekly
receive-tolerance 15
tcp-kind 180
key-id 1
algorithm sha-1
key-string plain huaweiwork
send-time day mon to thu
receive-time day mon to thu
key-id 2
algorithm sha-1
key-string plain testpass
send-time day fri to sun
receive-time day fri to sun
#
isis 1
is-level level-2
network-entity 10.0001.0030.0300.3003.00
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.2 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.2.2 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 3.3.3.3 255.255.255.255
isis enable 1
#
return
Networking Requirements
On the network shown in Figure 2-19, LSRs run MPLS and MPLS LDP. An attacker can send
simulated unicast LDP packets to LSRB, causing LSRB to be busy processing packets and
resulting in high CPU usage. To defend against the attack, LSRB can be configured with the
GTSM to accept packets carrying the TTL values within a specified range, improving system
security.
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address and its mask to every interface. For configuration details, see
Configuration Files in this section.
Step 2 Configure OSPF to advertise the route of each network segment of each interface and to advertise
each host route to each LSR ID. For configuration details, see Configuration Files in this
section.
Step 3 Configure MPLS and MPLS LDP on LSRs and their interfaces. For configuration details, see
Configuration Files in this section.
After completing the preceding configurations, run the display mpls ldp session command on
each LSR to view information about an LDP session. The following example uses the command
output on LSRA.
<LSRA> display mpls ldp session
LDP Session(s) in Public Network
Codes: LAM(Label Advertisement Mode), SsnAge Unit(DDDD:HH:MM)
A '*' before a session means the session is being deleted.
------------------------------------------------------------------------------
PeerID Status LAM SsnRole SsnAge KASent/Rcv
------------------------------------------------------------------------------
2.2.2.9:0 Operational DU Passive 0000:00:02 9/9
------------------------------------------------------------------------------
TOTAL: 1 session(s) Found.
# On LSRA, set the valid TTL value to a range of 253 to 255 for LDP packets sent from LSRB
to LSRA.
<LSRA> system-view
[LSRA] mpls ldp
[LSRA-mpls-ldp] gtsm peer 2.2.2.9 valid-ttl-hops 3
# On LSRB, set the valid TTL value to a range of 252 to 255 for LDP packets sent from LSRA
to LSRB; set the valid TTL value to a range of 251 to 255 for LDP packets sent from LSRC to
LSRB.
<LSRB> system-view
[LSRB] mpls ldp
[LSRB-mpls-ldp] gtsm peer 1.1.1.9 valid-ttl-hops 4
[LSRB-mpls-ldp] gtsm peer 3.3.3.9 valid-ttl-hops 5
# On LSRC, set the valid TTL value to a range of 250 to 255 for LDP packets sent from LSRB
to LSRC.
<LSRC> system-view
[LSRC] mpls ldp
[LSRC-mpls-ldp] gtsm peer 2.2.2.9 valid-ttl-hops 6
Use a PC to simulate LSRA and send LDP packets with TTL values that are beyond the range
of 252 to 255 to LSRB. After receiving the LDP packets and detecting that the TTL values in
the received packets are not in the configured range, LSRB discards the packets. GTSM statistics
on LSRB show that the number of dropped packets increases.
----End
Configuration Files
l Configuration file of LSRA
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
gtsm peer 2.2.2.9 valid-ttl-hops 3
#
interface GE1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.1.1 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.3
#
return
Networking Requirements
On the network shown in Figure 2-20, there are two IGP areas, Area 10 and Area 20. Inter-area
LSPs need to be established from LSRA to LSRB and from LSRA to LSRC. An inter-area LSP
needs to be configured on LSRA so that LSRA can search for routes based on the longest match
rule to establish LSPs.
Figure 2-20 Networking diagram for configuring LDP Extension for Inter-Area LSP
Loopback0
1.3.0.1/32
0/1
Loopback0 Loopback0 S1/ /24 0 LSRB
O 1 /0/ 24
1.1.0.1/32 1.2.0.1/32 P .1.1. 1
S 2/
POS1/0/0 20 PO 1.1.
. IS-IS
10.1.1.1/24 PO 20
20 S1 Area10
POS1/0/0 .1. /0/
2.1 2
LSRA 10.1.1.2/24 LSRD /24 Loopback0
1.3.0.2/32
IS-IS PO
Area20 20 S1
.1. /0/
2.2 0
/24
LSRC
Configuration Roadmap
The configuration roadmap is as follows:
1. Assign IP addresses to interfaces on each node and configure the loopback addresses that
are used as LSR IDs.
2. Enable IS-IS.
3. Configure the policy for aggregating routes.
4. Enable global and interface-based MPLS and MPLS LDP on each node.
5. Configure LDP extension for inter-area LSPs.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign IP addresses to interfaces on each node and configure the loopback addresses that are
used as LSR IDs.
Assign an IP address and a mask to each interface, including a loopback interface, according to
Figure 2-20. For configuration details, see Configuration Files in this section.
# Configure LSRA.
<LSRA> system-view
[LSRA] isis 1
[LSRA-isis-1] is-level level-2
[LSRA-isis-1] network-entity 20.0010.0100.0001.00
[LSRA-isis-1] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] isis enable 1
[LSRA-Pos1/0/0] quit
[LSRA] interface loopback 0
[LSRA-LoopBack0] isis enable 1
[LSRA-LoopBack0] quit
# Configure LSRD.
<LSRD> system-view
[LSRD] isis 1
[LSRD-isis-1] network-entity 10.0010.0200.0001.00
[LSRD-isis-1] quit
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] isis enable 1
[LSRD-Pos1/0/0] isis circuit-level level-2
[LSRD-Pos1/0/0] quit
[LSRD] interface pos 1/0/1
[LSRD-Pos1/0/1] isis enable 1
[LSRD-Pos1/0/1] isis circuit-level level-1
[LSRD-Pos1/0/1] quit
[LSRD] interface pos 1/0/2
[LSRD-Pos1/0/2] isis enable 1
[LSRD-Pos1/0/2] isis circuit-level level-1
[LSRD-Pos1/0/2] quit
[LSRD] interface loopback 0
[LSRD-LoopBack0] isis enable 1
[LSRD-LoopBack0] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] isis 1
[LSRB-isis-1] is-level level-1
[LSRB-isis-1] network-entity 10.0010.0300.0001.00
[LSRB-isis-1] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] isis enable 1
[LSRB-Pos1/0/0] quit
[LSRB] interface loopback 0
[LSRB-LoopBack0] isis enable 1
[LSRB-LoopBack0] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] isis 1
[LSRC-isis-1] is-level level-1
[LSRC-isis-1] network-entity 10.0010.0300.0002.00
[LSRC-isis-1] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] isis enable 1
[LSRC-Pos1/0/0] quit
[LSRC] interface loopback 0
[LSRC-LoopBack0] isis enable 1
[LSRC-LoopBack0] quit
The command output shows that the host routes to LSRB and LSRC have been aggregated.
Step 4 Configure global and interface-based MPLS and MPLS LDP on each node so that the network
can forward MPLS traffic, and view the setup of the LSP.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.0.1
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
# Configure LSRD.
[LSRD] mpls lsr-id 1.2.0.1
[LSRD] mpls
[LSRD-mpls] quit
[LSRD] mpls ldp
[LSRD-mpls-ldp] quit
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] mpls
[LSRD-Pos1/0/0] mpls ldp
[LSRD-Pos1/0/0] quit
[LSRD] interface pos 1/0/1
[LSRD-Pos1/0/1] mpls
[LSRD-Pos1/0/1] mpls ldp
[LSRD-Pos1/0/1] quit
[LSRD] interface pos 1/0/2
[LSRD-Pos1/0/2] mpls
[LSRD-Pos1/0/2] mpls ldp
[LSRD-Pos1/0/2] quit
# Configure LSRB.
[LSRB] mpls lsr-id 1.3.0.1
[LSRB] mpls
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] mpls ldp
[LSRB-Pos1/0/0] quit
# Configure LSRC.
[LSRC] mpls lsr-id 1.3.0.2
[LSRC] mpls
[LSRC-mpls] quit
[LSRC] mpls ldp
[LSRC-mpls-ldp] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls
[LSRC-Pos1/0/0] mpls ldp
[LSRC-Pos1/0/0] quit
# After completing the configuration, run the display mpls lsp command on LSRA to view the
established LSP.
[LSRA] display mpls lsp
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
1.2.0.1/32 NULL/3 -/Pos1/0/0
1.2.0.1/32 1024/3 -/Pos1/0/0
The preceding command output shows that by default, LDP does not establish the inter-area
LSPs from LSRA to LSRB and from LSRA to LSRC.
# Run the longest-match command on LSRA to configure LDP to search for a route based on
the longest match rule to establish an inter-area LDP LSP.
[LSRA] mpls ldp
[LSRA-mpls-ldp] longest-match
[LSRA-mpls-ldp] quit
# After completing the preceding configuration, run the display mpls lsp command on LSRA
to view the established LSP.
[LSRA] display mpls lsp
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
1.2.0.1/32 NULL/3 -/Pos1/0/0
1.2.0.1/32 1024/3 -/Pos1/0/0
1.3.0.1/32 NULL/1025 -/Pos1/0/0
1.3.0.1/32 1025/1025 -/Pos1/0/0
1.3.0.2/32 NULL/1026 -/Pos1/0/0
1.3.0.2/32 1026/1026 -/Pos1/0/0
The preceding command output shows that LDP establishes the inter-area LSPs from LSRA to
LSRB and from LSRA to LSRC.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.0.1
mpls
#
mpls ldp
longest-match
#
isis 1
is-level level-2
network-entity 20.0010.0100.0001.00
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface NULL0
#
interface LoopBack0
ip address 1.1.0.1 255.255.255.255
isis enable 1
#
return
#
return
Networking Requirements
As shown in Figure 2-21, an LDP LSP is set up along the path of PE1 → P1→ PE2, and the
path of PE2 → P2 → PE1 works as an IP link. Static BFD sessions are required to monitor the
connectivity of the LDP LSP.
Figure 2-21 Networking diagram for static BFD for LDP LSP
Loopback1
2.2.2.9/32
P
0
/0/ 24 10 OS1
1 .1. /0
S 2/ 5.2 /1
PO 1.1. /24
. P
Loopback1 0
/0/ 4 10 P1 10 OS1 Loopback1
1.1.1.9/32 OS1 .1/2 .1. /0/ 4.4.4.9/32
5.1 0
P 1.1 /24
.
10 LDP LSP
P
PE1 10 OS 1
/0/ 24 PE2
.1. 1/0/ 1
S 1/
2.1 1
/24 PO 1.4.
.
P P2 10
10 OS1 /1
.1. /0/ S 1/0 /24
2.2 0
/24 PO 1.4.2
.
10
Loopback1
3.3.3.9/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure OSPF for the MPLS domain and reachable IP routes to each LSR.
2. Set up an LDP LSP along the path of PE1 → P1 → PE2.
3. Configure PE1 with a BFD session that is bound to the LDP LSP.
4. Configure PE2 with a BFD session that is bound to the IP link to notify PE1 of the LDP
LSP faults.
Data Preparations
To complete the configuration, you need the following data:
Procedure
Step 1 Configure the IP address and the OSPF protocol for each interface.
Assign the IP address and mask to each interface as shown in Figure 2-21, including loopback
interfaces.
Configure OSPF on all LSRs to advertise the host route of the loopback interface. For
configuration details, see Configuration Files in this section.
After the configuration is complete, each LSR can ping each other using the LSR ID. Run the
display ip routing-table command to view the routing table on each LSR. The following
example uses the command output on PE1.
<PE1> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 14 Routes : 15
# Configure PE1.
<PE1> system-view
[PE1] mpls lsr-id 1.1.1.9
[PE1] mpls
[PE1-mpls] quit
[PE1] mpls ldp
[PE1-mpls] quit
[PE1]interface pos 1/0/0
[PE1-Pos1/0/0] mpls
[PE1-Pos1/0/0] mpls ldp
[PE1-Pos1/0/0] quit
# Configure P1.
<P1> system-view
[P1] mpls lsr-id 2.2.2.9
[P1] mpls
[P1-mpls] quit
[P1] mpls ldp
[P1-mpls] quit
[P1]interface pos 1/0/0
[P1-Pos1/0/0] mpls
[P1-Pos1/0/0] mpls ldp
[P1-Pos1/0/0] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls lsr-id 4.4.4.9
[PE2] mpls
[PE2-mpls] quit
[PE2] mpls ldp
[PE2-mpls] quit
[PE2]interface pos 1/0/0
[PE2-Pos1/0/0] mpls
[PE2-Pos1/0/0] mpls ldp
[PE2-Pos1/0/0] quit
# Run the display mpls ldp lsp command. An LDP LSP destined for 4.4.4.9/32 is set up on PE1.
The following example uses the command output on PE1.
<PE1> display mpls ldp lsp
Step 3 Enable global BFD functions on LSRs at both ends of the monitored link.
# Configure PE1.
<PE1> system-view
[PE1] bfd
[PE1-bfd] quit
# Configure PE2.
<PE2> system-view
[PE2] bfd
[PE2-bfd] quit
Step 4 On the ingress, set up a BFD session that is bound to the LDP LSP.
# Configure PE1.
<PE1> system-view
[PE1] bfd 1to4 bind ldp-lsp peer-ip 4.4.4.9 nexthop 10.1.1.2 interface pos 1/0/0
[PE1-bfd-lsp-session-1to4] discriminator local 1
[PE1-bfd-lsp-session-1to4] discriminator remote 2
[PE1-bfd-lsp-session-1to4] process-pst
[PE1-bfd-lsp-session-1to4] commit
[PE1-bfd-lsp-session-1to4] quit
Step 5 On the egress, create a BFD session that is bound to the IP link to notify the ingress of LDP LSP
faults.
# Configure PE2.
<PE2> system-view
[PE2] bfd 4to1 bind peer-ip 1.1.1.9
[PE2-bfd-session-4ot1] discriminator local 2
[PE2-bfd-session-4ot1] discriminator remote 1
[PE2-bfd-session-4ot1] commit
[PE2-bfd-session-4ot1] quit
# After completing the preceding configuration, run the display bfd session all verbose
command on the egress PE2. Up is displayed in the (MultiHop) State field, and Peer IP
Address is displayed in the BFD Bind Type field.
<PE2> display bfd session all verbose
--------------------------------------------------------------------------------
Session MIndex : 256 (Multi Hop) State : Up Name : 4to1
--------------------------------------------------------------------------------
Local Discriminator : 2 Remote Discriminator : 1
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : Peer IP Address
Bind Session Type : Static
Bind Peer IP Address : 1.1.1.9
Bind Interface : -
FSM Board Id : 6 TOS-EXP : 6
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
bfd
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface Pos1/0/1
undo shutdown
link-protocol ppp
ip address 10.1.2.1 255.255.255.0
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
#
bfd 1to4 bind ldp-lsp peer-ip 4.4.4.9 nexthop 10.1.1.2 interface Pos1/0/0
discriminator local 1
discriminator remote 2
process-pst
commit
#
return
bfd
#
mpls lsr-id 4.4.4.9
mpls
#
mpls ldp
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.5.1 255.255.255.0
mpls
mpls ldp
#
interface Pos1/0/1
undo shutdown
link-protocol ppp
ip address 10.1.4.1 255.255.255.0
#
interface LoopBack1
ip address 4.4.4.9 255.255.255.255
#
bfd 4to1 bind peer-ip 1.1.1.9
discriminator local 2
discriminator remote 1
commit
#
ospf 1
area 0.0.0.0
network 10.1.5.0 0.0.0.255
network 10.1.4.0 0.0.0.255
network 4.4.4.9 0.0.0.0
#
return
l P1 configuration file
#
sysname P1
#
mpls lsr-id 2.2.2.9
mpls
#
mpls ldp
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface Pos1/0/1
undo shutdown
link-protocol ppp
ip address 10.1.5.2 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 2.2.2.9 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.5.0 0.0.0.255
#
return
l P2 configuration file
#
sysname P2
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.2.2 255.255.255.0
#
interface Pos1/0/1
undo shutdown
link-protocol ppp
ip address 10.1.4.2 255.255.255.0
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 3.3.3.9 0.0.0.0
network 10.1.4.0 0.0.0.255
network 10.1.2.0 0.0.0.255
#
return
Networking Requirements
As shown in Figure 2-22, LSRA, LSRB, and LSRC locate in one MPLS domain. An LDP LSP
is established between LSRA and LSRC that requires dynamic BFD for LDP LSP. The time to
detect a failure is within 50 ms.
Figure 2-22 Networking diagram for dynamic BFD for LDP LSP
Loopback1 Loopback1 Loopback1
1.1.1.9/32 2.2.2.9/32 3.3.3.9/32
POS1/0/0 POS2/0/0
192.168.1.1/24 192.168.2.1/24
POS1/0/0 POS1/0/0
LSRA 192.168.1.2/24 LSRB 192.168.2.2/24 LSRC
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable basic MPLS function on each LSR and establish the LDP LSP links.
2. Configuration basic BFD functions.
Data Preparations
Before configuring, you need the following data:
Procedure
Step 1 Assign the IP address and mask to each interface. For configuration details, see Configuration
Files in this section.
Step 2 Configure OSPF. For configuration details, see Configuration Files in this section.
# Configure LSRA.
<LSRA> system-view
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
# The configuration on LSRB and LSRC is the same as that on LSRA. The configuration details
are not provided here.
After completing the configuration, run the display mpls ldp lsp command on LSRA. An LDP
LSP is set up between LSRA and LSRC.
Step 4 Configure dynamic BFD for LDP LSP from LSRA to LSRC.
# Configure a FEC list on LSRA to ensure that BFD for LDP LSP only from LSRA to LSRC is
triggered.
[LSRA] fec-list tortc
[LSRA-fec-list-tortc] fec-node 3.3.3.9
# Enable BFD on LSRA. Specify the FEC list that triggers a BFD session dynamically. Adjust
BFD parameters.
[LSRA] bfd
[LSRA-bfd] quit
[LSRA] mpls
[LSRA-mpls] mpls bfd-trigger fec-list tortc
[LSRA-mpls] mpls bfd enable
[LSRA-mpls] mpls bfd min-tx-interval 600 min-rx-interval 600 detect-multiplier 4
# Run the display bfd session all verbose command to view the status of the BFD session that
is created dynamically. The following example uses the command output on LSRA.
<LSRA> display bfd session all verbose
-----------------------------------------------------------
Session MIndex : 256 State : Up Name : dyn_8192
-----------------------------------------------------------
Local Discriminator: 8192 Remote Discriminator : 8193
Session Detect Mode : Asynchronous Mode Without Echo Function
BFD Bind Type : LDP_LSP
Bind Session Type : Dynamic
Bind Peer Ip Address : 3.3.3.9
NextHop Ip Address : 192.168.1.2
Bind Interface : Pos1/0/0
FSM Board Id : 1 TOS-EXP : 6
Min Tx Interval (ms) : 100 Min Rx Interval (ms) : 600
Actual Tx Interval (ms): 100 Actual Rx Interval (ms): 600
Local Detect Multi : 4 Detect Interval (ms) : 1800
Echo Passive : Disable Acl Number : --
Destination Port : 3784 TTL : 1
Proc interface status : Disable Process PST : Enable
WTR Interval (ms) : --
Active Multi : 3
Last Local Diagnostic : No Diagnostic
Bind Application : LSPM | L2VPN | OAM_MANAGER
Session TX TmrID : 77 Session Detect TmrID : 78
Session Init TmrID : -- Session WTR TmrID : --
Session Echo Tx TmrID : --
PDT Index : FSM-0 | RCV-0 | IF-0 | TOKEN-0
Session Description : --
-----------------------------------------------------------
Total UP/DOWN Session Number : 1/0
# Display the status of the BFD session created dynamically on LSRC. The field of BFD bind
type is Peer IP Address. This indicates that the BFD packets sent by LSRC are transported over
IP routes.
<LSRC> display bfd session passive-dynamic verbose
-----------------------------------------------------------
Session MIndex : 257 (Multi Hop) State : Up Name : dyn_8193
-----------------------------------------------------------
Local Discriminator : 8193 Remote Discriminator : 8192
Session Detect Mode : Asynchronous Mode Without Echo Function
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
bfd
#
mpls lsr-id 1.1.1.9
mpls
mpls bfd enable
mpls bfd-trigger fec-list tortc
mpls bfd min-tx-interval 600 min-rx-interval 600 detect-multiplier 4
#
fec-list tortc
fec-node 3.3.3.9
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 192.168.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 100
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 192.168.1.0 0.0.0.255
#
return
mpls
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 192.168.1.2 255.255.255.0
mpls
mpls ldp
#
interface Pos2/0/0
link-protocol ppp
undo shutdown
ip address 192.168.2.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
#
ospf 100
area 0.0.0.0
network 2.2.2.9 0.0.0.0
network 192.168.1.0 0.0.0.255
network 192.168.2.0 0.0.0.255
#
return
Networking Requirements
When LDP LSPs transmit application traffic, for example, VPN, to improve network reliability,
LDP FRR and an LDP upper-layer protection mechanism, such as VPN FRR or VPN equal-cost
multipath (ECMP), are used. BFD for LDP LSP only detects primary LSP faults and switches
traffic to an FRR LSP. If the primary and FRR LSP fail simultaneously, the BFD mechanism
does not take effect. In this situation, LDP can instruct its upper-layer application to perform a
protection switchover only after LDP detects the FRR LSP failure. As a result, a great number
of packets are dropped.
To minimize packet loss, dynamic BFD can be configured to dynamically establish BFD sessions
to monitor both the primary and FRR LSPs in an LDP tunnel. If both primary and FRR LSPs
fail, BFD rapidly detects the failures and instructs a specific LDP upper-layer application to
perform a protection switchover.
On the network shown in Figure 2-23, an LDP LSP originates from LSRA and is destined for
LSRD. LDP Auto FRR is configured to protect LSP traffic. LSRA establishes the primary LSP
over the path LSRA -> LSRC -> LSRD and the FRR LSP over the path LSRA -> LSRB ->
LSRC -> LSRD. Dynamic BFD for LDP tunnel can be configured to dynamically create a BFD
session to monitor both the primary and FRR LSPs.
10 GE
.1 1/0
.2 /1
.7 /0
4
.1 1/0
/2
.2
.2
/2
10 GE
LSRB 4
FRR LSP
G 1.7
.2 /1
10
E1 . 1
4
.1 1/0
/2
.
/ 0 / 24
.1
10 GE
/1
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address to each interface. For configuration details, see Configuration Files in
this section.
Step 2 Configure basic IS-IS functions. For configuration details, see Configuration Files in this
section.
# Configure LSRA.
<LSRA> system-view
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
[LSRA] interface GigabitEthernet 1/0/0
[LSRA-GigabitEthernet1/0/0] mpls
[LSRA-GigabitEthernet1/0/0] mpls ldp
[LSRA-GigabitEthernet1/0/0] quit
[LSRA] interface GigabitEthernet 1/0/1
[LSRA-GigabitEthernet1/0/1] mpls
[LSRA-GigabitEthernet1/0/1] mpls ldp
[LSRA-GigabitEthernet1/0/1] quit
# Repeat this step for LSRB, LSRC, and LSRD. For configuration details, see Configuration
Files in this section.
After IS-IS Auto FRR is enabled, LDP Auto FRR automatically takes effect. Then, run the
display mpls lsp command on LSRA to view information about the primary and FRR LSPs in
the LDP tunnel.
[LSRA] display mpls lsp
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
1.1.1.1/32 3/NULL -/-
# Configure LSRD.
[LSRD] bfd
[LSRD-bfd] quit
Step 6 Enable the ingress LSRA and egress LSRD to dynamically establish a BFD session.
# Configure LSRA.
[LSRA] mpls
[LSRA-mpls] mpls bfd enable
[LSRA-mpls] quit
# Configure LSRD.
[LSRD] bfd
[LSRD-bfd] mpls-passive
[LSRD-bfd] quit
Step 7 Configure a policy for triggering dynamic BFD for LDP tunnel.
# On LSRA, create a FEC list and add a node with IP address 4.4.4.4 to the list so that the FEC
list is used to establish a BFD session only to monitor the LDP tunnel between LSRA and LSRD.
[LSRA] fec-list list1
[LSRA-fec-list-list1] fec-node 4.4.4.4
[LSRA-fec-list-list1] quit
# Specify the FEC list on LSRA so that LSRA uses it to establish a BFD session.
[LSRA] mpls
[LSRA-mpls] mpls bfd-trigger-tunnel fec-list list1
[LSRA-mpls] quit
# Run the display mpls bfd session command on LSRA to view information about the BFD
session that monitors an LDP tunnel.
[LSRA] display mpls bfd session
-------------------------------------------------------------------------------
BFD Information: LDP Tunnel
-------------------------------------------------------------------------------
FEC DISC OUT-IF NEXTHOP TUNNEL STATE
4.4.4.4 8195 GE1/0/0 10.1.1.2 - Up
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
bfd
#
mpls lsr-id 1.1.1.1
mpls
mpls bfd enable
mpls bfd-trigger-tunnel fec-list list1
#
fec-list list1
fec-node 4.4.4.4
#
mpls ldp
#
isis 1
is-level level-2
network-entity 01.0000.0000.0003.00
frr
loop-free-alternate level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.2.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
return
mpls ldp
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.7.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface GigabitEthernet1/0/2
undo shutdown
ip address 10.1.3.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
Networking Requirements
As shown in Figure 2-24, two LSPs are required from LSRA to LSRC. One is the primary LSP
along the path LSRA -> LSRC, and another is the bypass LSP along the path LSRA -> LSRB
-> LSRC. Manual LDP FRR is required on LSRA for local interface backup to reduce data loss.
Here, only LSRA must support Manual LDP FRR.
NOTE
In networking of Manual LDP FRR, the bypass LSP must be in liberal state. On an LSR that is enabled
with FRR, run the display ip routing-table ip-address verbose command. The command output shows
that the route state of the bypass LSP is "Inactive Adv."
/0
S 1/0 /30 LSRB
2
PO 1.1.
.
10
10.2.1.1/30 10.2.1.2/30
Loopback1 /0
POS2/0/0 POS2/0/0
1.1.1.9/32 S 1/0 /30
1
PO 1.1.
.
10
LSRA P
10 OS2
.3. /0
1.1 /0
/30 PO
10 S1
.3. /0/ LSRC
1.2 0
/30 Primary LSP
Loopback1
3.3.3.9/32 Bypass LSP
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure the IP address of the interfaces, set the loopback address as the LSR ID, and use
OSPF to advertise the network segments that the interfaces are connected to and the LSR
ID host route.
2. Enable MPLS and MPLS LDP globally on the LSRs.
3. Enable MPLS and MPLS LDP on the interfaces.
4. Specify the next hop address that is used by Manual LDP FRR to generate the backup LSP
on the protected interface.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure the IP address for each interface.
Configure the IP address and mask for each interface, including each Loopback interface as
shown in Figure 2-24. For configuration details, see Configuration Files in this section.
Step 2 Configure OSPF to advertise the LSR ID host route and network segments to which the interfaces
are connected.
# Configure LSRA.
<LSRA> system-view
[LSRA] ospf 1
[LSRA-ospf-1] area 0
[LSRA-ospf-1-area-0.0.0.0] network 1.1.1.9 0.0.0.0
[LSRA-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.3
[LSRA-ospf-1-area-0.0.0.0] network 10.3.1.0 0.0.0.3
[LSRA-ospf-1-area-0.0.0.0] quit
[LSRA-ospf-1] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] ospf 1
[LSRB-ospf-1] area 0
[LSRB-ospf-1-area-0.0.0.0] network 2.2.2.9 0.0.0.0
[LSRB-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.3
[LSRB-ospf-1-area-0.0.0.0] network 10.2.1.0 0.0.0.3
[LSRB-ospf-1-area-0.0.0.0] quit
[LSRB-ospf-1] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] ospf 1
[LSRC-ospf-1] area 0
[LSRC-ospf-1-area-0.0.0.0] network 3.3.3.9 0.0.0.0
[LSRC-ospf-1-area-0.0.0.0] network 10.3.1.0 0.0.0.3
[LSRC-ospf-1-area-0.0.0.0] network 10.2.1.0 0.0.0.3
[LSRC-ospf-1-area-0.0.0.0] quit
[LSRC-ospf-1] quit
After completing the configuration, run the display ip routing-table command on each LSR.
LSRs learn the routes from each other.
The following example uses the command output on LSRA.
<LSRA> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 12 Routes : 13
Destination/Mask Proto Pre Cost Flags NextHop Interface
1.1.1.9/32 Direct 0 0 D 127.0.0.1 LoopBack1
2.2.2.9/32 OSPF 10 2 D 10.1.1.2 Pos1/0/0
3.3.3.9/32 OSPF 10 2 D 10.3.1.2 Pos2/0/0
10.1.1.0/30 Direct 0 0 D 10.1.1.1 Pos1/0/0
10.1.1.1/32 Direct 0 0 D 127.0.0.1 Pos1/0/0
10.1.1.2/32 Direct 0 0 D 10.1.1.2 Pos1/0/0
10.2.1.0/30 OSPF 10 2 D 10.3.1.2 Pos2/0/0
OSPF 10 2 D 10.1.1.2 Pos1/0/0
10.3.1.0/30 Direct 0 0 D 10.3.1.1 Pos2/0/0
10.3.1.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
10.3.1.2/32 Direct 0 0 D 10.3.1.2 Pos2/0/0
127.0.0.0/8 Direct 0 0 D 127.0.0.1 InLoopBack0
Step 3 Configure the MPLS and MPLS LDP functions on the nodes globally and on the interfaces to
forward the MPLS traffic over the network.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
[LSRA] interface pos 2/0/0
[LSRA-Pos2/0/0] mpls
[LSRA-Pos2/0/0] mpls ldp
[LSRA-Pos2/0/0] quit
# Configure LSRB.
[LSRB] mpls lsr-id 2.2.2.9
[LSRB] mpls
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] mpls ldp
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls
[LSRB-Pos2/0/0] mpls ldp
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] mpls lsr-id 3.3.3.9
[LSRC] mpls
[LSRC-mpls] quit
[LSRC] mpls ldp
[LSRC-mpls-ldp] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls
[LSRC-Pos1/0/0] mpls ldp
[LSRC-Pos1/0/0] quit
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] mpls
[LSRC-Pos2/0/0] mpls ldp
[LSRC-Pos2/0/0] quit
After the configuration, LDP sessions are established between neighboring LSRs. Run the
display mpls ldp session command on each LSR. Status is displayed as Operational.
------------------------------------------------------------------------------
TOTAL: 2 session(s) Found.
Step 4 Enable Manual LDP FRR on the POS 2/0/0 on LSRA and specify the next hop address for
generating the backup LSP.
# Configure LSRA.
[LSRA] interface pos 2/0/0
[LSRA-Pos2/0/0] mpls ldp frr nexthop 10.1.1.2
[LSRA-Pos2/0/0] quit
Run the display mpls lsp command on LSRA. Manual LDP FRR is enabled on the LSP of
LSRC.
<LSRA> display mpls lsp
----------------------------------------------------------------------
LSP Information: LDP LSP
----------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
3.3.3.9/32 NULL/3 -/Pos2/0/0
**LDP FRR** /1025 /Pos1/0/0
3.3.3.9/32 1025/3 -/Pos2/0/0
**LDP FRR** /1025 /Pos1/0/0
2.2.2.9/32 NULL/3 -/Pos1/0/0
2.2.2.9/32 1024/3 -/Pos1/0/0
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.1.1 255.255.255.252
mpls
mpls ldp
#
interface Pos2/0/0
link-protocol ppp
undo shutdown
ip address 10.3.1.1 255.255.255.252
mpls
mpls ldp
mpls ldp frr nexthop 10.1.1.2
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.3
network 10.3.1.0 0.0.0.3
#
return
Networking Requirements
As shown in Figure 2-25, two links are established between PE1 and PE2. The link PE1 -> P1
-> P2 -> PE2 is an active link, and the link PE1 -> P1 -> P3 -> PE2 is a standby link.
Configure synchronization between LDP and IGP on the P1 and P2 interfaces. P1 is the crossing
node of active and standby links and P2 is the LDP neighbor node of the active link. After the
active link recovers from the fault, configuring synchronization can shorten the time that it takes
to switch traffic from the standby link to the active link to within milliseconds.
Figure 2-25 Networking diagram for synchronization between LDP and IGP
Loopback1
2.2.2.9/32
0 P
1/0/ 30 10 OS2
S 2/ .2. /0/
Loopback1 PO 1.1. 1.1 0
/30 P Loopback1
0 .
1.1.1.9/32 1/0/ 010 P2
10 OS1 4.4.4.9/32
S 1/3 .2. /0/
PO 1.1. 1.2 0
. /30
10
PE1 P1 P /0 PE2
10 OS2 2/ 0 30
.3. /0 S .2/
1.1 /0 PO .4.1
/30 P P3 10
10 OS1 0
/0/ 30
.3. /0 2
S .1/
1.2 /0
/30 PO .4.1
10
Loopback1 Primary link
3.3.3.9/32
Bypass link
Configuration Roadmap
The configuration roadmap is as follows:
1. Establish LDP sessions between neighboring nodes and between P1 and PE2.
2. Configure LDP and IGP synchronization on the P1 and P2 interfaces. P1 is the crossing
node of active and standby links and P2 is the LDP neighboring node of the active link.
3. Configure the values of the hold-down, hold-max-cost, and delay timers on the P1 and P2
interfaces.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign IP addresses for the node interfaces and the address of the loopback interface as the LSR
ID, and advertise routes using OSPF. For configuration details, see Configuration Files in this
section.
The link PE1 -> P1 -> P2 -> PE2 is an active link, and the link PE1 -> P1 -> P3 -> PE2 is a
standby link. The cost value of POS 2/0/0 on P1 is 1000.
After completing the configuration, run the display ip routing-table command on each node.
They have learned routes from each other. The outbound interface of the P1 route is POS 1/0/0.
Step 2 Enable MPLS and MPLS LDP globally and on all interfaces on the nodes.
# Configure P1.
<P1> system-view
[P1] mpls lsr-id 1.1.1.9
[P1] mpls
[P1-mpls] quit
[P1] mpls ldp
[P1-mpls-ldp] quit
[P1] interface pos 1/0/0
[P1-Pos1/0/0] mpls
# Configure P2.
<P2> system-view
[P2] mpls lsr-id 2.2.2.9
[P2] mpls
[P2-mpls] quit
[P2] mpls ldp
[P2-mpls-ldp] quit
[P2] interface pos 1/0/0
[P2-Pos1/0/0] mpls
[P2-Pos1/0/0] mpls ldp
[P2-Pos1/0/0] quit
[P2] interface pos 2/0/0
[P2-Pos2/0/0] mpls
[P2-Pos2/0/0] mpls ldp
[P2-Pos2/0/0] quit
# Configure P3.
<P3> system-view
[P3] mpls lsr-id 3.3.3.9
[P3] mpls
[P3-mpls] quit
[P3] mpls ldp
[P3-mpls-ldp] quit
[P3] interface pos 1/0/0
[P3-Pos1/0/0] mpls
[P3-Pos1/0/0] mpls ldp
[P3-Pos1/0/0] quit
[P3] interface pos 2/0/0
[P3-Pos2/0/0] mpls
[P3-Pos2/0/0] mpls ldp
[P3-Pos2/0/0] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls lsr-id 4.4.4.9
[PE2] mpls
[PE2-mpls] quit
[PE2] mpls ldp
[PE2-mpls-ldp] quit
[PE2] interface pos 1/0/0
[PE2-Pos1/0/0] mpls
[PE2-Pos1/0/0] mpls ldp
[PE2-Pos1/0/0] quit
[PE2] interface pos 2/0/0
[PE2-Pos2/0/0] mpls
[PE2-Pos2/0/0] mpls ldp
[PE2-Pos2/0/0] quit
After the configuration is complete, LDP sessions are set up between adjacent nodes. Run the
display mpls ldp session command on each node. The Status is Operational.
------------------------------------------------------------------------------
PeerID Status LAM SsnRole SsnAge KASent/Rcv
------------------------------------------------------------------------------
2.2.2.9:0 Operational DU Passive 0000:00:56 227/227
3.3.3.9:0 Operational DU Passive 0000:00:56 227/227
------------------------------------------------------------------------------
TOTAL: 2 session(s) Found.
Step 3 Enable synchronization between LDP and IGP on the P1 and P2 interfaces.
# Configure P1.
<P1> system-view
[P1] interface pos 1/0/0
[P1-Pos1/0/0] ospf ldp-sync
[P1-Pos1/0/0] quit
# Configure P2.
<P2> system-view
[P2] interface pos 1/0/0
[P2-Pos1/0/0] ospf ldp-sync
[P2-Pos1/0/0] quit
Step 4 Set a value for the hold-down timer on the P1 and P2 interfaces.
# Configure P1.
<P1> system-view
[P1] interface pos 1/0/0
[P1-Pos1/0/0] ospf timer ldp-sync hold-down 8
[P1-Pos1/0/0] quit
# Configure P2.
<P2> system-view
[P2] interface pos 1/0/0
[P2-Pos1/0/0] ospf timer ldp-sync hold-down 8
[P2-Pos1/0/0] quit
Step 5 Set a value for the hold-max-cost timer on the P1 and P2 interfaces.
# Configure P1.
<P1> system-view
[P1] interface pos 1/0/0
[P1-Pos1/0/0] ospf timer ldp-sync hold-max-cost 9
[P1-Pos1/0/0] quit
# Configure P2.
<P2> system-view
[P2] interface pos 1/0/0
[P2-Pos1/0/0] ospf timer ldp-sync hold-max-cost 9
[P2-Pos1/0/0] quit
Step 6 Set a value for the delay timer on the P1 and P2 interfaces.
# Configure P1.
<P1> system-view
[P1] interface pos 1/0/0
[P1-Pos1/0/0] mpls ldp timer igp-sync-delay 6
[P1-Pos1/0/0] quit
# Configure P2.
<P2> system-view
----End
Configuration Files
l P1 configuration file
#
sysname P1
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.1.1 255.255.255.252
ospf ldp-sync
ospf timer ldp-sync hold-down 8
ospf timer ldp-sync hold-max-cost 9
mpls
mpls ldp
mpls ldp timer igp-sync-delay 6
#
interface Pos2/0/0
link-protocol ppp
undo shutdown
ip address 10.3.1.1 255.255.255.252
ospf cost 1000
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.3
network 10.3.1.0 0.0.0.3
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 2.2.2.9
mpls
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.1.2 255.255.255.252
ospf ldp-sync
ospf timer ldp-sync hold-down 8
ospf timer ldp-sync hold-max-cost 9
mpls
mpls ldp
mpls ldp timer igp-sync-delay 6
#
interface Pos2/0/0
link-protocol ppp
undo shutdown
ip address 10.2.1.1 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 2.2.2.9 0.0.0.0
network 10.1.1.0 0.0.0.3
network 10.2.1.0 0.0.0.3
#
return
l P3 configuration file
#
sysname P3
#
mpls lsr-id 3.3.3.9
mpls
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.3.1.2 255.255.255.252
mpls
mpls ldp
#
interface Pos2/0/0
link-protocol ppp
undo shutdown
ip address 10.4.1.1 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 3.3.3.9 0.0.0.0
network 10.3.1.0 0.0.0.3
network 10.4.1.0 0.0.0.3
#
return
sysname PE2
#
mpls lsr-id 4.4.4.9
mpls
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.2.1.2 255.255.255.252
mpls
mpls ldp
#
interface Pos2/0/0
link-protocol ppp
undo shutdown
ip address 10.4.1.2 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 4.4.4.9 255.255.255.255
#
#
ospf 1
area 0.0.0.0
network 4.4.4.9 0.0.0.0
network 10.2.1.0 0.0.0.3
network 10.4.1.0 0.0.0.3
#
return
Networking Requirements
On an MPLS network with primary and backup LSPs, LSRs establish LSPs based on static
routes. When the LDP session of the primary link becomes faulty (the fault is not caused by a
link failure) or the primary link recovers, LDP and static routes are unsynchronized, causing
MPLS traffic to be interrupted temporarily.
As shown in Figure 2-26, there are two static routes from LSRA to LSRD, which pass through
LSRB and LSRC respectively. LDP sessions are established based on the static routes. Link A
is the primary link, and Link B is the backup link. It is required that synchronization between
LDP and static routes be configured to ensure non-stop MPLS traffic forwarding when the LDP
session on Link A is disconnected or Link A recovers.
Figure 2-26 Networking diagram for configuring synchronization between LDP and static
routes
Loopback0
LSRB
PO
S2 Loopback0
Loopback0 /0 /0 /0/0
S1/0 S1/0
PO PO PO
LinkA S1
/0/
0
PO LinkB
S2/
0/0 /0 0/0 LSRD
LSRA
PO S2/0 OS2/
S1/ PO P
0/0
LSRC
Loopback0
Device Name Interface Name IP Address and Mask Device Name Interface Name IP Address and Mask
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address to each interface.
# Configure IP addresses for interfaces according to Figure 2-26. For configuration details, see
Configuration Files in this section.
Step 2 Configure static routes on devices to ensure network connectivity.
# On LSRA, configure two static routes with different priorities to LSRD, and on LSRD,
configure two static routes with different priorities to LSRA.
# Configure LSRA.
[LSRA] ip route-static 2.2.2.2 32 pos1/0/0
[LSRA] ip route-static 3.3.3.3 32 pos2/0/0
[LSRA] ip route-static 30.1.1.1 30 pos1/0/0
[LSRA] ip route-static 40.1.1.1 30 pos2/0/0
[LSRA] ip route-static 4.4.4.4 32 pos1/0/0 preference 40
[LSRA] ip route-static 4.4.4.4 32 pos2/0/0 preference 60
# Configure LSRB.
[LSRB] ip route-static 1.1.1.1 32 pos1/0/0
[LSRB] ip route-static 4.4.4.4 32 pos2/0/0
# Configure LSRC.
[LSRC] ip route-static 1.1.1.1 32 pos1/0/0
[LSRC] ip route-static 4.4.4.4 32 pos2/0/0
# Configure LSRD.
[LSRD] ip route-static 2.2.2.2 32 pos1/0/0
[LSRD] ip route-static 3.3.3.3 32 pos2/0/0
[LSRD] ip route-static 10.1.1.2 30 pos1/0/0
[LSRD] ip route-static 20.1.1.2 30 pos2/0/0
[LSRD] ip route-static 1.1.1.1 32 pos1/0/0 preference 40
[LSRD] ip route-static 1.1.1.1 32 pos2/0/0 preference 60
# After completing the preceding configurations, run the display ip routing-table protocol
static command on each LSR. The command output shows the configured static routes. The
following example uses the command output on LSRA.
[LSRA] display ip routing-table protocol static
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Public routing table : Static
Destinations : 5 Routes : 6 Configured Routes : 6
The configurations for LSRB, LSRC, and LSRD are similar to the configuration for LSRA, and
are not described here. For configuration details, see Configuration Files in this section.
# Run the display mpls ldp session command on each LSR. The command output shows that
the status of LDP sessions is Operational. This indicates that LDP sessions have been
established. The following example uses the command output on LSRA.
[LSRA] display mpls ldp session
LDP Session(s) in Public Network
Codes: LAM(Label Advertisement Mode), SsnAge Unit(DDDD:HH:MM)
A '*' before a session means the session is being deleted.
------------------------------------------------------------------------------
PeerID Status LAM SsnRole SsnAge KASent/Rcv
------------------------------------------------------------------------------
2.2.2.2:0 Operational DU Passive 0000:00:00 1/1
3.3.3.3:0 Operational DU Passive 0000:00:02 12/12
------------------------------------------------------------------------------
TOTAL: 2 session(s) Found.
Step 4 Configure synchronization between LDP and static routes on LSRA and LSRD.
# Configure LSRA.
[LSRA] ip route-static 4.4.4.4 32 pos1/0/0 preference 40 ldp-sync
[LSRA] interface pos1/0/0
[LSRA-Pos1/0/0] static-route timer ldp-sync hold-down 20
[LSRA-Pos1/0/0] quit
# Configure LSRD.
[LSRD] ip route-static 1.1.1.1 32 pos1/0/0 preference 40 ldp-sync
[LSRD] interface pos1/0/0
[LSRD-Pos1/0/0] static-route timer ldp-sync hold-down 20
[LSRD-Pos1/0/0] quit
# On LSRA, check the status of the outbound interface of the static route configured with
synchronization between LDP and static routes.
[LSRA] display static-route ldp-sync
Total number of routes enable Ldp-Sync: 1
-----------------------------------------------------
Interface Pos1/0/0
Enable ldp-sync static routes number: 1
Static-route ldp-sync holddown timer: 20s
Sync state: Normal
Dest = 4.4.4.4, Mask = 32, NextHop = 10.1.1.1.
-----------------------------------------------------
The preceding display shows that the status of synchronization between LDP and static routes
is Normal. This indicates that synchronization between LDP and static routes has been
configured.
l If the LDP session of the primary link (Link A) is disconnected, traffic is immediately
switched to the backup link (Link B) to synchronize LDP and static routes. This ensures non-
stop traffic forwarding.
l After the primary link recovers, the static route with the next-hop address 10.1.1.1 is not
preferred immediately. Instead, the static route becomes active only after the LDP session
of the primary link has been established and the Hold-down timer expires (the timeout period
of the timer is 20 seconds). This synchronizes static routes and LDP, ensuring non-stop MPLS
traffic forwarding.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
ip address 10.1.1.1 255.255.255.252
static-route timer ldp-sync hold-down 20
mpls
mpls ldp
#
interface Pos2/0/0
link-protocol ppp
ip address 20.1.1.1 255.255.255.252
mpls
mpls ldp
#
interface loopback0
ip address 1.1.1.1 255.255.255.255
#
ip route-static 2.2.2.2 255.255.255.255 Pos1/0/0
ip route-static 3.3.3.3 255.255.255.255 Pos2/0/0
ip route-static 4.4.4.4 255.255.255.255 Pos1/0/0 preference 40 ldp-sync
ip route-static 4.4.4.4 255.255.255.255 Pos2/0/0 preference 60
ip route-static 30.1.1.0 255.255.255.252 Pos1/0/0
ip route-static 40.1.1.0 255.255.255.252 Pos2/0/0
#
return
mpls
mpls ldp
#
interface Pos2/0/0
link-protocol ppp
ip address 30.1.1.1 255.255.255.252
mpls
mpls ldp
#
interface loopback0
ip address 2.2.2.2 255.255.255.255
#
ip route-static 1.1.1.1 255.255.255.255 Pos1/0/0
ip route-static 4.4.4.4 255.255.255.255 Pos2/0/0
#
return
interface loopback0
ip address 4.4.4.4 255.255.255.255
#
ip route-static 1.1.1.1 255.255.255.255 Pos1/0/0 preference 40 ldp-sync
ip route-static 1.1.1.1 255.255.255.255 Pos2/0/0 preference 60
ip route-static 2.2.2.2 255.255.255.255 Pos1/0/0
ip route-static 3.3.3.3 255.255.255.255 Pos2/0/0
ip route-static 10.1.1.0 255.255.255.252 Pos1/0/0
ip route-static 20.1.1.0 255.255.255.252 Pos2/0/0
#
return
Networking Requirements
As shown in Figure 2-27, LSRA, LSRB, and LSRC are LSRs with dual main control boards.
The three LSRs belong to the same OSPF area and are interconnected using OSPF. All of them
support the GR mechanism.
After establishing the LDP sessions between them, LSRA, LSRB, and LSRC start to establish
the LDP GR sessions. When the main control board of LSRB fails and is switched, the LDP GR
mechanism is used in synchronization with neighbor LSRs.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IP address of each interface on the LSRs and the Loopback address used as the
LSR ID, and configure OSPF to advertise the network segments that the interfaces are
connected to and the LSR ID host route.
2. Configure the OSPF GR function on each LSR.
3. Enable MPLS and MPLS LDP on each LSR globally.
4. Enable MPLS and MPLS LDP on each interface.
5. Configure parameters during LDP session negotiation on LSRB.
6. Enable the GR function of MPLS LDP on each LSR.
7. Configure the GR session of MPLS LDP and neighboring parameters on LSRB.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign the IP address to each interface. The configuration details are not provided here.
Step 2 Configure OSPF to advertise the network segments to which the interfaces are connected and
the LSR ID host route. For configuration details, see Configuration Files in this section.
# Configure LSRA.
<LSRA> system-view
[LSRA] ospf 1
[LSRA-ospf-1] opaque-capability enable
[LSRA-ospf-1] graceful-restart
[LSRA-ospf-1] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] ospf 1
[LSRB-ospf-1] opaque-capability enable
[LSRB-ospf-1] graceful-restart
[LSRB-ospf-1] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] ospf 1
[LSRC-ospf-1] opaque-capability enable
[LSRC-ospf-1] graceful-restart
[LSRC-ospf-1] quit
Step 4 Configure the MPLS and MPLS LDP functions on each node globally.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
# Configure LSRB.
[LSRB] mpls lsr-id 2.2.2.9
[LSRB] mpls
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] quit
# Configure LSRC.
Step 5 Configure the MPLS and MPLS LDP functions on each interface.
# Configure LSRA.
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
# Configure LSRB.
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] mpls ldp
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls
[LSRB-Pos2/0/0] mpls ldp
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls
[LSRC-Pos1/0/0] mpls ldp
[LSRC-Pos1/0/0] quit
After the preceding configuration is complete, the local LDP sessions are established between
LSRA and LSRB, and between LSRB and LSRC.
Run the display mpls ldp session command on each LSR to view the established LDP session.
# Configure LSRA.
[LSRA] mpls ldp
[LSRA-mpls-ldp] graceful-restart
Warning: All the related sessions will be deleted if the operation is performed
!Continue? (y/n)y
[LSRA-mpls-ldp] quit
# Configure LSRB.
[LSRB] mpls ldp
[LSRB-mpls-ldp] graceful-restart
Warning: All the related sessions will be deleted if the operation is performed
!Continue? (y/n)y
[LSRB-mpls-ldp] quit
# Configure LSRC.
[LSRC] mpls ldp
[LSRC-mpls-ldp] graceful-restart
Warning: All the related sessions will be deleted if the operation is performed
!Continue? (y/n)y
[LSRC-mpls-ldp] quit
# Configure LSRB.
[LSRB] mpls ldp
[LSRB-mpls-ldp] graceful-restart timer reconnect 300
Warning: All the related sessions will be deleted if the operation is performed
!Continue? (y/n)y
[LSRB-mpls-ldp] graceful-restart timer neighbor-liveness 600
Warning: All the related sessions will be deleted if the operation is performed
!Continue? (y/n)y
[LSRB-mpls-ldp] graceful-restart timer recovery 300
Warning: All the related sessions will be deleted if the operation is performed
!Continue? (y/n)y
[LSRB-mpls-ldp] quit
# After completing the configuration, run the display mpls ldp session verbose command on
the LSR. On is displayed in the Session FT Flag field.
Capability:
Capability-Announcement : Off
mLDP P2MP Capability : Off
mLDP MP2MP Capability : Off
mLDP MBB Capability : Off
------------------------------------------------------------------------------
Alternatively, run the display mpls ldp peer verbose command on the LSR. On is displayed
in the Peer FT Flag field.
----End
Configuration Files
l LSA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
graceful-restart
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 10.1.1.1 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
opaque-capability enable
graceful-restart
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.3
#
return
undo shutdown
ip address 10.1.1.2 255.255.255.252
mpls
mpls ldp
#
interface Pos2/0/0
link-protocol ppp
undo shutdown
ip address 10.2.1.1 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
#
ospf 1
opaque-capability enable
graceful-restart
area 0.0.0.0
network 2.2.2.9 0.0.0.0
network 10.1.1.0 0.0.0.3
network 10.2.1.0 0.0.0.3
#
return
Networking Requirements
As shown in Figure 2-28, LSRA, LSRB, and LSRC belong to a VPN backbone network and
run IS-IS. LSRA and LSRC run GRE, implementing interconnection between PC1 and PC2.
For L2VPN service transmission, an LDP LSP needs to be set up between LSRA and LSRC
over the GRE tunnel. This is called LDP over GRE.
LSRB
Loopback1 Loopback1
11.11.11.1132 33.33.33.33/32
POS1/0/0 POS1/0/0
Loopback0 20.1.1.1/24 30.1.1.2/24 Loopback0
1.1.1.9/32 Tunnel 3.3.3.9/32
Tunnel1/0/1 Tunnel1/0/1 LSRC
LSRA
40.1.1.1/24 40.1.1.2/24
PC1 PC2
Configuration Roadmap
The configuration roadmap is as follows:
1. Assign IP addresses to interfaces on each node, configure the loopback addresses, and
configure an IGP to advertise routes.
2. Configure basic MPLS functions.
3. Configure a tunnel interface on LSRA and LSRC and specify the source address and
destination address of the tunnel.
4. Enable MPLS LDP on tunnel interfaces.
NOTE
In configuration, the address of loopback 0 is used as an LSR ID for each LSR. That is, LDP uses loopback
0 to establish a session. GRE tunnel interfaces need to be configured with IP addresses. The addresses of
loopback 1 on the LSRs on both ends of a GRE tunnel are used as a source address and a destination address
respectively. The source address, destination address, and addresses of physical interfaces of a GRE tunnel
are advertised by using an IGP. The addresses of loopback 0 interfaces and tunnel interface addresses are
advertised by using another IGP or static routes (the outbound interfaces of the static routes must be tunnel
interfaces).
Data Preparation
To complete the configuration, you need the following data:
l Source address and destination address of a GRE tunnel, and IP addresses of tunnel
interfaces
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address to each interface according to Figure 2-28, including addresses of loopback
0 and loopback 1 on LSRA and LSRC. For configuration details, see Configuration Files in
this section.
# Configure LSRA.
[LSRA] isis 1
[LSRA-isis-1] network-entity 10.0000.0000.0001.00
[LSRA-isis-1] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] isis enable 1
[LSRA-Pos1/0/0] quit
# Configure LSRB.
[LSRB] isis 1
[LSRB-isis-1] network-entity 10.0000.0000.0002.00
[LSRB-isis-1] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] isis enable 1
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] isis enable 1
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] network-entity 10.0000.0000.0003.00
[LSRC-isis-1] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] isis enable 1
[LSRC-Pos1/0/0] quit
Step 3 Configure the basic MPLS functions and MPLS LDP functions on LSRA and LSRC.
# Configure LSRA.
<LSRA> system-view
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] mpls lsr-id 3.3.3.9
[LSRC] mpls
[LSRC-mpls] quit
[LSRC] mpls ldp
[LSRC-mpls-ldp] quit
# Configure LSRA.
[LSRA] interface loopback1
[LSRA-LoopBack1] target-board 1
# Configure LSRC.
[LSRC] interface loopback1
[LSRC-LoopBack1] target-board 1
[LSRC-LoopBack1] binding tunnel gre
[LSRC-LoopBack1] isis enable 1
[LSRC-LoopBack1] quit
[LSRC] interface tunnel 1/0/1
[LSRC-Tunnel1/0/1] tunnel-protocol gre
[LSRC-Tunnel1/0/1] ip address 40.1.1.2 255.255.255.0
[LSRC-Tunnel1/0/1] source loopback1
[LSRC-Tunnel1/0/1] destination 11.11.11.11
[LSRC-Tunnel1/0/1] quit
# Configure LSRA.
[LSRA] ospf 1
[LSRA-ospf-1] area 0
[LSRA-ospf-1-area-0.0.0.0] network 40.1.1.0 0.0.0.255
[LSRA-ospf-1-area-0.0.0.0] network 1.1.1.9 0.0.0.0
[LSRA-ospf-1-area-0.0.0.0] quit
[LSRA-ospf-1] quit
# Configure LSRC.
[LSRC] ospf 1
[LSRC-ospf-1] area 0
[LSRC-ospf-1-area-0.0.0.0] network 40.1.1.0 0.0.0.255
[LSRC-ospf-1-area-0.0.0.0] network 3.3.3.9 0.0.0.0
[LSRC-ospf-1-area-0.0.0.0] quit
[LSRC-ospf-1] quit
# Configure LSRA.
[LSRA] interface tunnel 1/0/1
[LSRA-Tunnel1/0/1] mpls
[LSRA-Tunnel1/0/1] mpls ldp
[LSRA-Tunnel1/0/1] quit
# Configure LSRC.
[LSRC] interface tunnel 1/0/1
[LSRC-Tunnel1/0/1] mpls
[LSRC-Tunnel1/0/1] mpls ldp
[LSRC-Tunnel1/0/1] quit
# After completing the configuration, run the display mpls lsp command on LSRA. You can
view that the LDP LSP with the outbound interface being Tunnel 1/0/1 is set up between LSRA
and LSRC.
[LSRA] display mpls lsp include 3.3.3.9 32
-------------------------------------------------------------------------------
LSP Information: LDP LSP
-------------------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
3.3.3.9/32 NULL/3 -/Tun1/0/1
3.3.3.9/32 1028/3 -/Tun1/0/1
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
#
isis 1
network-entity 10.0000.0000.0001.00
#
interface Pos1/0/0
link-protocol ppp
undo shutdown
ip address 20.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 1.1.1.9 255.255.255.255
#
interface LoopBack1
ip address 11.11.11.11 255.255.255.255
target-board 1
binding tunnel gre
isis enable 1
#
interface Tunnel1/0/1
ip address 40.1.1.1 255.255.255.0
tunnel-protocol gre
source LoopBack1
destination 33.33.33.33
mpls
mpls ldp
#
ospf 1
area 0.0.0.0
network 40.1.1.0 0.0.0.255
network 1.1.1.9 0.0.0.0
#
return
link-protocol ppp
undo shutdown
ip address 20.1.1.2 255.255.255.0
isis enable 1
#
interface Pos2/0/0
link-protocol ppp
undo shutdown
ip address 30.1.1.1 255.255.255.0
isis enable 1
#
return
3 MPLS TE Configuration
MPLS TE tunnels transmit MPLS L2VPN (VLL and VPLS) services and MPLS L3VPN
services, provide high security, and guarantee reliable QoS for VPN services.
3.1 Introduction
Integrating the Multiprotocol Label Switching (MPLS) technology with the traffic engineering
(TE) technology, MPLS TE addresses the problem of congestions caused by load imbalance.
3.4 Configuring the Statistics Function for a Static Bidirectional Co-routed CR-LSP
The statistics function for a static bidirectional co-routed CR-LSP enables a device to collect
statistics about traffic on nodes of a static bidirectional co-routed CR-LSP. the statistics helps
locate faulty nodes.
A configured protection tunnel can be bound to a working tunnel to form a tunnel protection
group. If the working tunnel fails, traffic switches to the protection tunnel. The tunnel protection
group helps improve tunnel reliability.
TE manual FRR is a local protection mechanism used on MPLS TE networks. TE manual FRR
switches traffic on a primary MPLS TE tunnel to a manually configured bypass tunnel if a link
or node on the primary tunnel fails.
3.22 Configuring Synchronization of the Bypass Tunnel and the Backup CR-LSP
This section describes that after the primary CR-LSP is faulty, the system starts the TE FRR
bypass tunnel and tries to restore the primary CR-LSP the same time it sets up a backup CR-
LSP.
3.1 Introduction
Integrating the Multiprotocol Label Switching (MPLS) technology with the traffic engineering
(TE) technology, MPLS TE addresses the problem of congestions caused by load imbalance.
TE
Network resource insufficiency and load imbalance result in congestions on a network, which
affects the performance of a backbone network. TE prevents network congestions and optimizes
the network resources.
TE dynamically monitors traffic and load on network elements and adjusts parameters relevant
to traffic control, routing, and resource constraints in real time. This optimizes the utilization of
network resources and prevents imbalance-triggered congestions.
MPLS TE
As a combination of MPLS and TE, MPLS TE load-balances traffic on a network by setting up
an LSP over a specified path to reserve resources for traffic that will not pass through congested
nodes.
An LSP with a higher priority preempts bandwidth resources of LSPs with lower priorities to
provide sufficient bandwidth for services on the LSP with a higher priority in the case of
bandwidth insufficiency.
If a link fault or a node fault occurs, MPLS TE uses path backup and fast reroute (FRR) to ensure
uninterrupted traffic.
Administrators use MPLS TE to create LSPs to eliminate network congestions and use special
offline utility to analyze traffic if the number of LSPs increases to a certain extent.
Static MPLS TE tunnels have the highest priorities, which means that their bandwidth cannot
be preempted. Static MPLS TE tunnels will not preempt bandwidth of other types of LSPs.
RSVP-TE Tunnels
RSVP-TE signaling is used to set up RSVP-TE tunnels or adapt RSVP-TE tunnels to changing
network conditions.
– Affinity property
– Explicit path
– Maximum hop limit
– Shared risk link group (SRLG)
l Establishing an RSVP-TE tunnel
NE80E/40Es can be configured to record information about routes and labels during the
establishment of an RSVP-TE tunnel. If resources are insufficient, the NE80E/40Es
preempt bandwidth of other RSVP-TE tunnels with lower setup and holding priorities for
an RSVP-TE tunnel to be established.
If the NE80E/40E fails to establish an RSVP-TE tunnel, it attempts to reestablish the RSVP-
TE tunnel periodically.
l Signaling mechanism
The NE80E/40E reserves resources using RSVP-TE in either fixed filter (FF) or shared-
explicit (SE) style. The NE80E/40E supports RSVP extensions, such as confirmation and
retransmission of RSVP messages, summary refresh (Srefresh), and the Hello mechanism.
The RSVP extensions help the NE80E/40E relieve network loads and improve network
reliability. In addition, the NE80E/40E supports RSVP authentication, improving network
security.
l Traffic forwarding
Virtual Private Network (VPN) traffic can be directed to TE tunnels using configured
policy-based routing. Non-VPN traffic can be directed to TE tunnels using the configured
static routes, policy-based routing, IGP shortcut, or forwarding adjacency.
l Optimizing and adjusting tunnels
Established TE tunnels can be adjusted and optimized using the following features:
– Tunnel reoptimization: If the NE80E/40E calculates a better path for a CR-LSP, it
establishes a CR-LSP over the new path. After the new CR-LSP has been established,
the NE80E/40E switches traffic to the new CR-LSP. Tunnel reoptimization is performed
in either automatic or manual mode. Automatic tunnel reoptimization means that the
NE80E/40E periodically resends a request for calculating a better path for a CR-LSP.
Manual tunnel reoptimization means that path calculation for a CR-LSP is manually
triggered.
– Automatic bandwidth adjustment: When the service volume changes, the bandwidth
for the CR-LSP that carries services is automatically adjusted.
DS-TE
MPLS TE tunnels apply to one of the following VPN scenarios:
l Each TE tunnel transmits various types of non-VPN services such as video, voice, and data.
l A single TE tunnel transmits various types of services in a VPN.
l A single TE tunnel transmits various types of services in multiple VPNs.
l A single TE tunnel transmits various types of VPN and non-VPN services.
Traditional MPLS TE tunnels (non-standard DS-TE tunnels) cannot transmit services based on
service types in compliance with the quality of service (QoS). For example, when a TE tunnel
carries both voice and video flows, video flows may have more duplicate frames than voice
flows. Therefore, video flows require higher drop precedence than the voice flows. The same
drop precedence, however, is used for voice and video flows on MPLS TE tunnels.
DiffServ-aware Traffic Engineering (DS-TE) maps various service types of traffic (such as
voice, video, and data traffic) to LSPs. This allows traffic to travel through a path that meets
traffic engineering constraints for the specific service type. DS-TE improves network resource
usage.
DS-TE implemented on the NE80E/40E supports the Non-IETF mode and the IETF mode. The
two modes have the following specifications:
l The Non-IETF (non-standard) mode supports two CTs (CT0 and CT1), eight priorities
(0-7), and two bandwidth constraint models (Russian Dolls Model [RDM] and Maximum
Allocation Model [MAM]).
The CT refers to the class type of a specific service flow. The priority refers to the LSP
preemption priority.
l The IETF (standard) mode supports eight CTs (CT0 to CT7), eight priorities (0-7), and
three bandwidth constraint models (RDM, MAM, and extended MAM).
DS-TE supports TE Fast Reroute (FRR), hot standby, protection group switchover, and CT-
based traffic statistics collection.
Reliability
CR-LSP backup provides an end-to-end protection mechanism. CR-LSP backup is usually used
together with another rapid detection or protection mechanism to implement rapid traffic
switchovers and prevent traffic loss. The following feature combinations are supported:
NOTE
FRR requires reserved bandwidth for a bypass tunnel to be established before a fault occurs. If
available bandwidth is insufficient, FRR protects only important nodes or links.
l CR-LSP backup
Backup CR-LSPs are established on networks requiring high reliability to provide end-to-
end protection, ensuring network reliability. If a primary CR-LSP fails, traffic rapidly
switches to a backup CR-LSP, ensuring uninterrupted traffic transmission.
Hot standby and ordinary backup are supported. If both primary and backup CR-LSPs fail,
best-effort paths can be established, improving reliability. Backup CR-LSPs and best-effort
paths are established in different ways:
– Hot-standby backup: The NE80E/40E establishes a primary CR-LSP and a backup CR-
LSP using separate paths simultaneously.
– Ordinary backup: The NE80E/40E establishes a backup CR-LSP over an explicit path
only if a primary CR-LSP fails.
– Best-effort path: The NE80E/40E establishes a best-effort path over available paths if
the primary and backup CR-LSP both fail.
l BFD
BFD can detect CR-LSP faults in milliseconds. BFD can be used if no hardware detection
mechanism is available and rapid detection is required, which helps speed up fault
detection.
BFD configured on the NE80E/40E can monitor hot-standby CR-LSPs and tunnel
protection groups.
l RSVP GR
RSVP graceful restart (GR) is a state recovery mechanism for RSVP-TE. If the control
plane fails or a manual master/slave switchover is performed, RSVP GR ensures
uninterrupted data transmission on the forwarding plane and restores the proper status for
RSVP-TE LSPs. FRR can be performed during the GR process.
l Tunnel protection group
A tunnel protection group provides an end-to-end protection mechanism for MPLS TE
tunnels. Its applications are not limited to RSVP-TE networking. In a tunnel protection
group, a tunnel protects one or more tunnels.
NOTE
For more information about how to configure a tunnel protection group, see the chapter "MPLS
OAM" in HUAWEI NetEngine80E/40E Router Configuration Guide - MPLS.
l NSR
Non-stop routing (NSR) ensures uninterrupted traffic transmission and proper connections
on the control plane if a software or hardware fault occurs. This prevents the control plane
on a neighbor device from detecting the fault or being affected.
P2MP TE
Point-to-multipoint (P2MP) TE provides a solution to multicast transmission on IP/MPLS
networks. P2MP TE has combined advantages of high IP multicast transmission efficiency and
MPLS TE E2E quality of service (QoS) guarantee. P2MP TE establishes a tree-shaped tunnel
that originates from a root and terminates at leaf nodes and directs multicast traffic to the P2MP
TE tunnel. P2MP TE helps simplify multicast service deployment on IP/MPLS networks because
service configurations, such as multicast protocols or L2VPN parameters, are not performed.
P2MP TE is integrated with advantages of TE, QoS, and reliability on MPLS networks.
Usage Scenario
The configuration of a static CR-LSP is a simple process. Labels are manually allocated, and no
signaling protocol or exchange of control packets are needed. The setup of a static CR-LSP
consumes a few resources. In addition, neither IGP TE nor CSPF needs to be configured for the
static CR-LSP.
The static CR-LSP cannot dynamically adapt to a changing network. Therefore, its application
is very limited.
NOTE
After a static CR-LSP is bound to a tunnel interface, the static CR-LSP takes effect without an IP route
configured.
Pre-configuration Tasks
Before configuring a static CR-LSP, complete the following tasks:
Data Preparation
To configure a static CR-LSP, you need the following data.
No. Data
No. Data
NOTE
l The value of the outgoing label on each node is the value of the incoming label of its next node.
l The destination address of a static CR-LSP is the destination address of the TE tunnel interface.
Context
Perform the following steps on each node along a static CR-LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls te
Before you enable MPLS TE on each interface, enable MPLS TE globally in the MPLS view.
Step 4 Run:
quit
Step 5 Run:
interface interface-type interface-number
Step 6 Run:
mpls
Step 7 Run:
mpls te
NOTE
When the MPLS TE is disabled in the interface view, all CR-LSPs on the current interface go Down.
When the MPLS TE is disabled in the MPLS view, the MPLS TE on each interface is disabled, and all
CR-LSPs are torn down.
----End
Context
NOTE
To constrain the bandwidth of CR-LSPs, the procedure is mandatory. In addition, the mpls te lsp-tp
outbound command must be run on the corresponding tunnel interface.
By default, the maximum reservable bandwidth on the link is 0 bit/s. If the maximum reservable bandwidth
is not configured, when the bandwidth of the CR-LSP is constrained, the bandwidth of the CR-LSP is more
than the maximum reservable bandwidth. Therefore, the CR-LSP cannot be set up.
Procedure
Step 1 Run:
system-view
NOTE
l The maximum reservable bandwidth of a link cannot be higher than the actual bandwidth of the link.
A maximum of 80% of the actual bandwidth of the link is recommended for the maximum reservable
bandwidth of the link.
l Neither the BC0 bandwidth nor the BC1 bandwidth can be higher than the maximum reservable
bandwidth of the link.
----End
Context
Perform the following steps on the ingress of a static CR-LSP:
Procedure
Step 1 Run:
system-view
The tunnel interface is created, and the tunnel interface view is displayed.
Step 3 To configure the IP address of the tunnel interface, select one of the following commands.
l To specify the IP address of the tunnel interface, run:
ip address ip-address { mask | mask-length } [ sub ]
The secondary IP address of the tunnel interface can be configured only after the primary IP
address is configured.
l To borrow an IP address from another interface, run:
ip address unnumbered interface interface-type interface-number
An MPLS TE tunnel can be established even if the tunnel interface is assigned no IP address.
But the tunnel interface must obtain an IP address before forwarding traffic. An MPLS TE tunnel
is unidirectional; therefore, its peer address is irrelevant to traffic forwarding. A tunnel interface
does not need to be assigned an IP address but uses the ingress LSR ID as its IP address.
NOTE
Because the type of packet forwarded by the MPLS TE tunnel is MPLS, the commands, such as ip urpf
commands, related to IP packet forwarding configured on this interface are invalid.
Step 4 Run:
tunnel-protocol mpls te
The destination address of the tunnel is configured, which is usually the LSR ID of the egress
node.
Different types of tunnels need different destination addresses. When the tunnel protocol is
changed to MPLS TE from other different protocols, the configured destination is deleted
automatically and needs to be reconfigured.
Step 6 Run:
mpls te tunnel-id tunnel-id
Step 7 Run:
mpls te signal-protocol cr-static
Step 8 Run:
mpls te commit
NOTE
If MPLS TE parameters on a tunnel interface are modified, run the mpls te commit command to make the
configuration take effect.
----End
Context
Perform the following steps on the ingress of a static CR-LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
static-cr-lsp ingress { tunnel-interface tunnel interface-number | tunnel-name }
destination destination-address { nexthop next-hop-address | outgoing-interface
interface-type interface-number } * out-label out-label [ bandwidth [ ct0 | ct1 |
ct2 | ct3 | ct4 | ct5 | ct6 | ct7 ] bandwidth | pir pir-value | cbs cbs-value |
pbs pbs-value | mtu mtu-value ] * [ description description-text ]
l The tunnel interface-number and tunnel-name specify the MPLS TE tunnel that uses the
specified static CR-LSP.
l The next-hop IP address and outbound interface name are determined by an ingress-to-egress
route. For detailed configurations of the next-hop IP address and outbound interface, see
"Configuring a Static Route" in HUAWEI NetEngine80E/40E Router Configuration Guide
- IP Routing.
l The default class type is ct0, and the default bandwidth is 0 kbit/s. The bandwidth used by
a tunnel cannot exceed the maximum link reservable bandwidth.
l pir pir-value specifies the peak information rate (PIR) for reservable bandwidth for the static
CR-LSP. The specified PIR must be greater than or equal to the specified bandwidth.
l cbs cbs-value specifies the committed burst size (CBS) of the static CR-LSP. pbs pbs-
value specifies the peak burst size (PBS) of the static CR-LSP.
l mtu mtu-value specifies the maximum transmission unite (MTU) for the static CR-LSP. By
default, the outbound interface's MTU is used as the MTU of a static CR-LSP.
NOTE
The specified MTU value only takes effect on a local node. If MTU values on nodes on an MPLS
protection ring are different, the smallest value takes effect.
l description description-text specifies the description of the static CR-LSP, which facilitates
management.
l All parameters, except tunnel-interface and tunnel-name, can be dynamically updated.
----End
Context
If the static CR-LSP only has the ingress and egress, configuring a transit node is not needed. If
the static CR-LSP has one or more transit nodes, perform the following steps on each transit
node:
Procedure
Step 1 Run:
system-view
l On the transit and egress nodes, the lsp-name parameter must be unique locally.
l The default class type is ct0, and the default bandwidth is 0 kbit/s. The bandwidth used by
a tunnel cannot exceed the maximum link reservable bandwidth.
l pir pir-value specifies the peak information rate (PIR) for reservable bandwidth for a static
CR-LSP. The specified PIR must be greater than or equal to the specified bandwidth.
l cbs cbs-value specifies the committed burst size (CBS) of the static CR-LSP. pbs pbs-
value specifies the peak burst size (PBS) of the static CR-LSP.
l mtu mtu-value specifies the maximum transmission unite (MTU) for the static CR-LSP. By
default, the outbound interface's MTU is used as the MTU of a static CR-LSP.
NOTE
The specified MTU value only takes effect on a local node. If MTU values on nodes on an MPLS
protection ring are different, the smallest value takes effect.
l description text specifies the description of the static CR-LSP, which facilitates
management.
l All parameters, except lsp-name, can be dynamically updated.
----End
Context
Perform the following steps on the egress of a static CR-LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
static-cr-lsp egress lsp-name incoming-interface interface-type interface-number
in-label in-label [ lsrid ingress-lsr-id tunnel-id tunnel-id ] [ description
description-text ]
l description description-text specifies the description of the static CR-LSP, which facilitates
management.
l ingress-lsr-id specifies the LSR ID of the ingress on the static CR-LSP. tunnel-id specifies
the tunnel ID of an MPLS TE tunnel that uses the static CR-LSP.
NOTE
Before you use MPLS OAM to monitor the Trail Termination Source Identifier (TTSI) of a static CR-
LSP, configure lsrid ingress-lsr-id and tunnel-id tunnel-id in the static-lsp egress command. The LSR
ID and tunnel ID uniquely specify a static CR-LSP. If either LSR ID or tunnel ID is different from the
effective value on the ingress, MPLS OAM considers that a TTSI error occurs and prompts a user with
a configuration error message.
l All parameters, except lsp-name, can be dynamically updated.
----End
Prerequisites
The static CR-LSP has been configured.
Procedure
l Run the display mpls static-cr-lsp [ lsp-name ] [ { include | exclude } ip-address mask-
length ] [ verbose ] command to check information about the static CR-LSP.
l Run the display mpls te tunnel [ destination ip-address ] [ lsp-id ingress-lsr-id session-
id local-lsp-id | lsr-role { all | egress | ingress | remote | transit } ] [ name tunnel-name ]
[ { incoming-interface | interface | outgoing-interface } interface-type interface-
number ] [ te-class0 | te-class1 | te-class2 | te-class3 | te-class4 | te-class5 | te-class6 | te-
class7 ] [ verbose ] command to check information about the tunnel.
l Run the display mpls te tunnel statistics or display mpls lsp statistics command to check
the tunnel statistics.
l Run the display mpls te tunnel-interface [ tunnel interface-number ] command to check
information about the tunnel interface on the ingress.
----End
Example
If the configurations are successful, run the preceding commands to view the following
information:
l Information about the static CR-LSP name, the incoming and outgoing labels, and the
incoming and outgoing interfaces. The status of CR-LSP is Up.
l Statistics about the tunnel status on the LSR.
l Detailed information about the tunnel interface, including the tunnel name, state
description, and attributes. The tunnel attributes include the LSP ID, ingress, egress, and
signaling protocol.
Usage Scenario
A static bidirectional co-routed LSP is applicable to MPLS Transport Profile (TP) networks,
improving network maintainability.
A static CR-LSP is easy to configure: labels are manually allocated, and no signaling protocol
is used to exchange control packets. The setup of a static CR-LSP consumes only a few resources,
and you do not need to configure IGP TE or CSPF for the static CR-LSP. However, static CR-
LSP application is quite limited. A static CR-LSP cannot dynamically adapt to network changes,
and it uses the same label range (16 to 1023) as a common static LSP.
Pre-configuration Tasks
Before configuring a static bidirectional co-routed LSP, complete the following tasks:
l Configure unicast static routes or an IGP to implement the reachability between LSRs.
l Configure an LSR ID for each LSR.
l Enable MPLS globally and on interfaces on all LSRs.
Data Preparation
To configure a static bidirectional co-routed LSP, you need the following data.
No. Data
5 Inbound interface and next-hop address or outbound interface on each transit node
NOTE
l The value of the outgoing label on each node is the value of the incoming label on its next hop.
l The destination address of a static bidirectional co-routed LSP is the destination address specified
on the tunnel interface.
Context
Perform the following steps on each node along a static CR-LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls te
Before you enable MPLS TE on each interface, enable MPLS TE globally in the MPLS view.
Step 4 Run:
quit
Step 5 Run:
interface interface-type interface-number
Step 6 Run:
mpls
Step 7 Run:
mpls te
NOTE
When the MPLS TE is disabled in the interface view, all CR-LSPs on the current interface go Down.
When the MPLS TE is disabled in the MPLS view, the MPLS TE on each interface is disabled, and all
CR-LSPs are torn down.
----End
Context
NOTE
To constrain the bandwidth of CR-LSPs, the procedure is mandatory. In addition, the mpls te lsp-tp
outbound command must be run on the corresponding tunnel interface.
By default, the maximum reservable bandwidth on the link is 0 bit/s. If the maximum reservable bandwidth
is not configured, when the bandwidth of the CR-LSP is constrained, the bandwidth of the CR-LSP is more
than the maximum reservable bandwidth. Therefore, the CR-LSP cannot be set up.
Procedure
Step 1 Run:
system-view
NOTE
l The maximum reservable bandwidth of a link cannot be higher than the actual bandwidth of the link.
A maximum of 80% of the actual bandwidth of the link is recommended for the maximum reservable
bandwidth of the link.
l Neither the BC0 bandwidth nor the BC1 bandwidth can be higher than the maximum reservable
bandwidth of the link.
----End
Usage Scenario
No mechanisms can locate the faulty node that discards traffic on a static bidirectional co-routed
CR-LSP that takes effect. To help locate the faulty node, the statistics function for a static
bidirectional co-routed CR-LSP can be configured. With the CR-LSP traffic statistics function,
the CR-LSP manager checks the difference between the rate at which the upstream node sends
packets and the rate at which the downstream node receives packets. The CR-LSP manager can
then locate the node on which traffic is dropped on the CR-LSP based on the difference.
l If the difference is slight, no traffic is dropped.
l If the difference is significant, traffic is dropped.
Pre-configuration Tasks
Before configuring the statistics function for a static bidirectional co-routed CR-LSP, configure
a static bidirectional co-routed CR-LSP.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls traffic-statistics
Step 3 Run:
bidirectional static-cr-lsp name
Statistics about packets transmitted on a static bidirectional co-routed CR-LSP are collected.
With the CR-LSP traffic statistics function, the device records packet statistics on the static
bidirectional co-routed CR-LSP. The statistics include the number of sent and received bytes
and packets. To delete existing statistics, run the reset mpls traffic-statistics command. To re-
collect statistics, run the display mpls traffic-statistics command. These two commands can
be run simultaneously to collect statistics about the sent and received traffic on CR-LSPs within
a specified period. The statistics help locate nodes that discard packets.
l If CR-LSP performance is good, increase the sampling interval, which helps reduce system
resource consumption during the sampling process.
l If CR-LSP performance deteriorates, decrease the sampling interval, which helps effectively
locate the node that discards traffic.
Setting the same sampling interval on all nodes along a CR-LSP is recommended, which helps
obtain comparable statistics on upstream and downstream nodes on the CR-LSP.
----End
Run the display mpls traffic-statistics protocol static-cr name lsp1 command to view statistics
about traffic transmitted on a static bidirectional co-routed CR-LSP named lsp1.
<HUAWEI> display mpls traffic-statistics protocol static-cr name lsp1
-------------------------------------------------------------------------------
Traffic Statistics Information: BISTATIC CR-LSP
-------------------------------------------------------------------------------
lsp1 traffic-statistics:
Forward:
Last 300 seconds input rate 16 bytes/sec, 0 packets/sec
Applicable Environment
RSVP-TE is a dynamic signaling protocol that provides the same resource reservation function
as the RSVP protocol. Unlike RSVP, RSVP-TE supports extended functions for label
distribution and management, explicit paths, and dynamic TE tunnel attribute adjustment.
RSVP-TE also supports advanced features such as TE fast reroute (FRR) and constraint-based
routed label switched path (CR-LSP) backup, which can rapidly trigger a traffic switchover if a
fault occurs. Using RSVP-TE tunnels is recommended for transmitting MPLS TE services.
Pre-configuration Tasks
Before configuring an RSVP-TE tunnel, complete the following tasks:
Data Preparation
To configure an RSVP-TE tunnel, you need the following data.
No. Data
2 (Optional) IP address and name of each interface connected to each physical MPLS
TE link
No. Data
5 Tunnel ID
8 (Optional) RSVP resource reservation style (shared explicit [SE] style by default)
Context
MPLS TE and RSVP-TE must be enabled on each node and its interfaces. After this, an RSVP-
TE tunnel can be established and settings such as link bandwidth attributes and Constraint
Shortest Path First (CSPF) parameters can be configured.
Procedure
Step 1 Run:
system-view
Step 7 Run:
mpls te
Step 8 Run:
mpls rsvp-te
NOTE
l If MPLS TE is disabled in the MPLS view, MPLS TE will also be disabled on interfaces and all the
CR-LSPs configured on the interfaces will go Down.
l If MPLS TE is disabled in the interface view, all the CR-LSPs configured on the interface will go
Down.
l If RSVP-TE is disabled in the MPLS view, RSVP-TE will also be disabled on interfaces on the node.
----End
Context
NOTE
To constrain the bandwidth of CR-LSPs, the procedure is mandatory. In addition, the mpls te lsp-tp
outbound command must be run on the corresponding tunnel interface.
By default, the maximum reservable bandwidth on the link is 0 bit/s. If the maximum reservable bandwidth
is not configured, when the bandwidth of the CR-LSP is constrained, the bandwidth of the CR-LSP is more
than the maximum reservable bandwidth. Therefore, the CR-LSP cannot be set up.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls te bandwidth max-reservable-bandwidth bw-value
Step 4 Run:
mpls te bandwidth { bc0 bc0-bw-value | bc1 bc1-bw-value }*
NOTE
l The maximum reservable bandwidth of a link cannot be higher than the actual bandwidth of the link.
A maximum of 80% of the actual bandwidth of the link is recommended for the maximum reservable
bandwidth of the link.
l Neither the BC0 bandwidth nor the BC1 bandwidth can be higher than the maximum reservable
bandwidth of the link.
----End
Context
Nodes on an MPLS network use OSPF TE to exchange TE link attributes such as bandwidth
and colors to generate TEDBs. TEDB information is used by CSPF to calculate paths for RSVP-
TE tunnels. OSPF TE extends OSPF functions and supports Opaque Type 10 LSAs to carry TE
link attributes.
OSPF areas do not support TE by default. The OSPF Opaque capability must be enabled to
support OSPF TE, and a node can generate Opaque Type 10 LSAs only if at least one OSPF
neighbor is in the Full state.
NOTE
If OSPF TE is disabled, no Opaque Type 10 LSA is generated or exchanged by nodes to generate TEDBs.
On an OSPF TE-incapable network, CR-LSPs are established using OSPF routes but not CSPF calculation
results.
Procedure
Step 1 Run:
system-view
Step 2 Run:
ospf [ process-id ]
Step 3 Run:
opaque-capability enable
NOTE
This step is performed only on an area border router (ABR) connected to multiple OSPF areas.
Step 5 Run:
area area-id
Step 6 Run:
mpls-te enable [ standard-complying ]
----End
Context
IS-IS TE is an IS-IS extension used on an MPLS TE network. IS-IS TE defines a new TLV in
Link State Packets (LSPs) and IS-IS TE-enabled nodes send these LSPs to flood and synchronize
TE link information. IS-IS TE extracts TE link information from LSPs and then transmits the
TE link information to the CSPF module for calculating tunnel paths.
Procedure
Step 1 Run:
system-view
Step 2 Run:
isis [ process-id ]
Step 3 Run:
cost-style { compatible [ relax-spf-limit ] | wide | wide-compatible }
IS-IS TE uses sub-TLVs of the IS reachability TLV (type 22) to carry TE link information. The
IS-IS wide metric must be configured to support the IS reachability TLV. The IS-IS wide metric
supports the wide, compatible, and wide-compatible metric types. By default, IS-IS sends and
receives LSPs with narrow metric values.
Step 4 Run:
traffic-eng [ level-1 | level-2 | level-1-2 ]
IS-IS TE is enabled.
If no IS-IS level is specified, the node is a Level-1-2 device that can generate two TEDBs for
communicating with Level-1 and Level-2 devices.
The type and value of a sub-TLV carrying DS-TE parameters are specified.
By default, the value of the Unreserve-BW-Sub-Pool sub-TLV is 251; the value of the BW-
constraint sub-TLV is 252; the value of the Local Overbooking Multiplier (LOM) sub-TLV is
253.
----End
Context
An explicit path refers to a vector path on which a series of nodes are arranged in configuration
sequence. The IP address of an interface on the egress is usually used as the destination address
of the explicit path. Links or nodes can be specified for an explicit path so that a CR-LSP can
be established over the specified path, facilitating resource allocation and efficiently controlling
CR-LSP establishment.
Two adjacent nodes are connected in either of the following modes on an explicit path:
The strict and loose modes are used either separately or together.
NOTE
TE tunnels are classified as intra-area tunnels and inter-area tunnels. In this situation, areas indicate OSPF and
IS-IS areas, but not an autonomous system (AS) running the Border Gateway Protocol (BGP). OSPF areas are
divided based on different area IDs while IS-IS areas are divided based on different levels.
l Intra-area tunnel: is a TE tunnel in a single OSPF or IS-IS area. An intra-area tunnel can be established over
a strict or loose explicit path.
l Inter-area tunnel: is a TE tunnel traversing multiple OSPF or IS-IS areas. An explicit path must be used to
establish an inter-area TE tunnel and an ABR or an Autonomous System Boundary Router (ASBR) must
be included in the explicit path.
The explicit path in use can be updated.
Procedure
Step 1 Run:
system-view
Step 2 Run:
explicit-path path-name
The address of a node is changed to allow another specified node to be used by the explicit
path.
Either of the following parameters can be configured:
– incoming: sets the ip-address2 to the IP address of an inbound interface of the modified
node.
– outgoing: sets the ip-address2 to the IP address of an outbound interface of the modified
node.
l Run:
delete hop ip-address
By default, the include strict parameters are configured, meaning that a hop and its next hop must be directly
connected. An explicit path can be configured to pass through a specified node or not to pass through a specified
node.
include means that a CR-LSP must pass through a specified node; exclude means that a CR-LSP cannot pass
through a specified node.
----End
Context
A tunnel interface supports the following functions:
l Establishes a tunnel. Tunnel constraints, bandwidth attributes, and advanced attributes such
as TE FRR and tunnel re-optimization can be configured on the tunnel interface to establish
the tunnel.
l Manages a tunnel. Tunnel attributes can be modified on the tunnel interface to manage the
tunnel.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunneltunnel-number
NOTICE
Setting the value of tunnel-number to the slot ID of the main control board is recommended.
The slot ID of the main control board is usually 0. If the tunnel interface is configured on an
interface board, the tunnel interface and the established tunnel will be deleted if the interface
board resets.
NOTE
If the shutdown command is run on the tunnel interface, all tunnels established on the tunnel interface will
be deleted.
Step 3 Run either of the following commands to assign an IP address to the tunnel interface:
l To configure an IP address for the tunnel interface, run:
ip address ip-address { mask | mask-length } [ sub ]
The primary IP address must be configured before the secondary IP address is configured.
l To configure the tunnel interface to borrow an IP address of another interface, run:
ip address unnumbered interface interface-type interface-number
An MPLS TE tunnel can be established even if the tunnel interface is assigned no IP address.
But the tunnel interface must obtain an IP address before forwarding traffic. An MPLS TE tunnel
is unidirectional; therefore, its peer address is irrelevant to traffic forwarding. A tunnel interface
does not need to be assigned an IP address but uses the ingress LSR ID as its IP address.
NOTE
Because MPLS TE tunnels forward MPLS packets, not IP packets, IP forwarding-related commands run
on the tunnel interface are invalid.
Step 4 Run:
tunnel-protocol mpls te
A tunnel destination address is configured, which is usually the LSR ID of the egress.
Various types of tunnels require specific destination addresses. If a tunnel protocol is changed
from another protocol to MPLS TE, a configured destination address is deleted automatically
and a new destination address needs to be configured.
Step 6 Run:
mpls te tunnel-id tunnel-id
A tunnel ID is set.
Step 7 Run:
mpls te signal-protocol rsvp-te
Do not perform the constraint shortest path first (CSPF) calculation when a TE tunnel is being
set up.
NOTE
The command is applicable to the inter-AS VPN-OptionC scenario. In other scenarios, do not run the
command.
Step 10 Run:
mpls te commit
NOTE
The mpls te commit command must be run to make configurations take effect each time MPLS TE
parameters are changed on a tunnel interface.
----End
Context
CSPF uses constraints to calculate paths for tunnels. Constraints can be configured to help CSPF
correctly calculate paths for RSVP-TE tunnels.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel tunnel-number
Step 3 Run:
mpls te bandwidth [ ct0 ct0-bw-value | ct1 ct1-bw-value ] [ flow-queue flow-
queue ]
The bandwidth used by the tunnel cannot be greater than the maximum reservable link
bandwidth.
Step 4 Run:
mpls te path explicit-path path-name
Step 5 Run:
mpls te commit
----End
Context
A reservation style is used by an RSVP node to reserve resources after receiving resource
reservation requests from upstream nodes. The HUAWEI NetEngine80E/40E supports the
following reservation styles:
l Fixed filter (FF): reserves resources for each ingress node. The sum of reserved resources
on a node is equal to the sum of reserved resources for all ingress nodes.
l SE: explicitly reserves resources for one or more specified ingress nodes. The ingress nodes
share reserved resources.
The SE style is used for tunnels established using the make-before-break mechanism, whereas
the FF style is seldom used.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel tunnel-number
Step 3 Run:
mpls te resv-style { ff | se }
NOTE
Step 4 Run:
mpls te commit
----End
Context
CSPF extends the shortest path first (SPF) algorithm and is able to calculate the shortest path
meeting MPLS TE requirements. CSPF calculates paths using the following information:
l Link state information sent by IGP-TE and saved in TEDBs
l Network resource attributes, such as the maximum available bandwidth, maximum
reservable bandwidth, and affinity property, sent by IGP-TE and saved in TEDBs
l Configured constraints such as explicit paths
NOTE
l An RSVP-TE tunnel can be established on a CSPF-disabled ingress. However, to allow a path to meet
tunnel constraints, you are advised to enable CSPF on the ingress before establishing the RSVP-TE
tunnel.
l Enabling CSPF on all transit nodes is recommended.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls te cspf
----End
Prerequisites
The RSVP-TE tunnel has been configured.
Procedure
l Run the display mpls te link-administration bandwidth-allocation [ interface interface-
type interface-number ] command to check information about the allocated link bandwidth.
l Run the display ospf [ process-id ] mpls-te [ area area-id ] [ self-originated ] command
to check information about OSPF TE.
l Run one of the following commands to check IS-IS TE information:
– display isis traffic-eng advertisements
– display isis traffic-eng link
– display isis traffic-eng network
----End
Example
If the configuration is successful, run the preceding commands to obtain the following
information:
Usage Scenario
An MPLS TE tunnel can only be established on interfaces with sufficient bandwidth reserved
for the tunnel. Since the physical bandwidth requirements are not static, the amount of bandwidth
that can be reserved for an MPLS TE interface must be flexible, the statically reserved bandwidth
may exceed the maximum bandwidth that can be reserved on that interface. In this case, the
interface cannot reserve sufficient bandwidth for MPLS TE links.
For example, a trunk interface has 1 Gbit/s physical bandwidth. Its maximum reservable
bandwidth is set to 800 Mbit/s and its reserved bandwidth in the BC0 pool is set to 600 Mbit/s.
If a trunk member interface fails, the trunk interface has its physical bandwidth reduced to 500
Mbit/s. As a result, the statically specified maximum reservable bandwidth and bandwidth in
the BC0 pool fail.
To enable the interface to dynamically reserve bandwidth within the reservable bandwidth range,
set the following parameters:
l Proportion of the maximum reservable bandwidth to the physical bandwidth of the interface
l Proportion of the bandwidth in a BC pool to the maximum reservable bandwidth
The two parameters help the interface dynamically reserve bandwidth for an MPLS TE tunnel.
Pre-configuration Task
Before configuring dynamic bandwidth reservation, enable MPLS TE on the interface.
Data Preparation
To configure dynamic bandwidth reservation, you need the following data.
No. Data
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls te bandwidth max-reservable-bandwidth dynamic bw-value-percentage
The proportion of the maximum reservable bandwidth to the physical bandwidth is set.
NOTE
l When both the mpls te bandwidth max-reservable-bandwidth dynamic command and the mpls te
bandwidth max-reservable-bandwidth command are run in a random order on an interface, the last
executed command takes effect.
l After the mpls te bandwidth max-reservable-bandwidth dynamic command is run on an interface,
only the mpls te bandwidth dynamic command can be used to set the proportion of the bandwidth in
a BC pool to the maximum reservable bandwidth.
----End
Context
The maximum reservable bandwidth must be specified before you perform this procedure. The
maximum reservable bandwidth can be either dynamic or static. Using the dynamic maximum
reservable bandwidth is recommended on MPLS TE interfaces.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls te bandwidth dynamic { bc0 bc0-bw-percentage | bc1 bc1-bw-percentage | bc2 bc2-
bw-percentage | bc3 bc3-bw-percentage | bc4 bc4-bw-percentage | bc5 bc5-bw-
percentage | bc6 bc6-bw-percentage | bc7 bc7-bw-percentage } *
The proportion of the bandwidth in each BC pool to the maximum reservable bandwidth is set.
NOTE
l When both the mpls te bandwidth dynamic command and the mpls te bandwidth command are run
in a random order on an interface, the last executed command takes effect.
l The DS-TE non-IETF mode supports BC0 and BC1; the DS-TE IETF mode supports BC0 through
BC7.
l If the non-IETF mode is switched to the IETF mode, the dynamic bandwidth in BC0 and BC1 pools
remains. If the IETF mode is switched to the non-IETF mode, the dynamic bandwidth in BC0 and BC1
pools also remains, and the dynamic bandwidth in all other BC pools are cleared.
----End
Prerequisites
Dynamic bandwidth reservation has been configured.
Procedure
l Run the display mpls te link-administration bandwidth-allocation [ interface interface-
type interface-number ] command to check bandwidth information on a specified or all
MPLS TE interfaces.
----End
Example
For example, on MPLS TE-enabled GE 1/0/0, the maximum reservable bandwidth is 80% of
the physical bandwidth, the bandwidth in the BC0 pool is 60% of the maximum reservable
bandwidth, and the bandwidth in the BC1 pool is 40% of the maximum reservable bandwidth.
Usage Scenario
A tunnel protection group protects E2E MPLS TE tunnels. If a working tunnel in a protection
group fails, traffic switches to a protection tunnel, minimizing traffic interruptions.
A protected tunnel is called a working tunnel. A tunnel that protects the working tunnel is called
a protection tunnel. The working and protection tunnels form a tunnel protection group. A tunnel
protection group works in either 1:1 or N:1 mode. The 1:1 mode enables a protection tunnel to
protect only a single working tunnel. The N:1 mode enables a protection tunnel to protect a
maximum of 16 working tunnels.
Pre-configuration Tasks
Before configuring a tunnel protection group, create a working tunnel and a protection tunnel.
NOTE
A tunnel protection group uses a configured protection tunnel to protect a working tunnel, improving tunnel
reliability. Configuring working and protection tunnels over separate links is recommended.
Data Preparation
To configure a tunnel protection group, you need the following data.
No. Data
3 Parameters for the tunnel protection group, such as the hold-off time, switchback
mode, and WTR time
Context
A tunnel protection group can be configured on the ingress to protect a working tunnel. The
switchback delay time and a switchback mode can also be configured. The switchback modes
are classified into revertive and non-revertive modes. The revertive mode is used by default. A
tunnel protection group working in revertive mode supports the switchback delay time.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te protection tunnel tunnel-id [ holdoff holdoff-time ] [ mode { non-
revertive | revertive [ wtr wtr-time ] } ]
NOTICE
If traffic has been switched to a protection tunnel, you can run the undo mpls te protection
tunnel command to delete the protection tunnel from the protection group after the board on
which the protection tunnel's outbound interface resides fails or is removed. After this command
is run, services will be restored after the working channel recovers. If you do not run this
command, services will not be switched back to the working channel even after the working
channel recovers.
Step 4 Run:
mpls te commit
----End
Follow-up Procedure
You can also perform the preceding steps to modify a protection tunnel group.
Context
An MPLS TE tunnel uses RSVP messages to detect and advertise faults at a low speed. To speed
up fault detection, dynamic BFD can be configured for the working tunnel in a tunnel protection
group.
NOTE
MPLS OAM and BFD cannot be configured for the same CR-LSP in a tunnel protection group.
Procedure
l Perform the following steps on the ingress of a working tunnel:
1. Run:
system-view
The ingress is configured to automatically create a BFD session for the tunnel.
This command run in the tunnel interface view takes effect only on the specific tunnel
interface.
NOTE
To enable the ingress to automatically create BFD sessions for many tunnels, run the mpls te
bfd enable command in the MPLS view to globally enable BFD for TE. To disable the ingress
from automatically creating a BFD session on a specific tunnel interface, run the mpls te bfd
block command in the specific tunnel interface view.
6. (Optional) Run:
The egress has to receive an LSP ping request carrying a BFD TLV before creating a
BFD session.
----End
Context
Before Enabling MPLS OAM to Detect Bidirectional LSPs, complete the following task:
l Configure backward LSPs for the working and protection tunnels. The working LSP and
protection LSP, and their reverse LSPs compose bidirectional LSPs.
l Configuring Basic MPLS OAM Functions of LSP
NOTE
The backward LSP must be a static LSP or static CR-LSP. The working LSP and protection LSP can be a
static LSP, static CR-LSP, or RSVP LSP.
It is recommended that the LSP and the backward LSP of a bidirectional LSP be both static LSPs or both
static CR-LSPs; the protection LSP and the backward LSP are all static LSPs or all static CR-LSPs.
On the ingress, the inbound interface of the backward LSP and the outbound interface of the working LSP
or the protection LSP must be the same.
Procedure
l Enable MPLS OAM to detect the bidirectional LSP of the working tunnel.
1. Run:
system-view
1. Run:
system-view
----End
Context
Pay attention to the Switching rules before configuring the protection switching trigger
mechanism.
Perform the following steps on the ingress of the tunnel protection group as required:
Procedure
Step 1 Run:
system-view
Step 4 Run:
mpls te commit
----End
Prerequisites
A tunnel protection group has been configured.
Procedure
Step 1 Run the display mpls te protection tunnel { all | tunnel-id | interface tunnel interface-
number } [ verbose ] command to check information about a tunnel protection group.
Step 2 Run the display mpls te protection binding protect-tunnel { tunnel-id | interface tunnel
interface-number } command to check the binding between the working and protection tunnels.
----End
Example
If the configurations succeed, you can run a display command to view the configuration of a
tunnel protection group.
# Run the display mpls te protection tunnel all command on the ingress to view information
about the tunnel protection group.
<HUAWEI> display mpls te protection tunnel all
------------------------------------------------------------------------
No. Work-tunnel status /id Protect-tunnel status /id Switch-Result
------------------------------------------------------------------------
1 non-defect /100 non-defect /101 work-tunnel
# Run the display mpls te protection binding protect-tunnel tunnel-id command. The
command output shows that a protection tunnel has been bound to a working tunnel.
<HUAWEI> display mpls te protection binding protect-tunnel 101
------------------------------------------------------------------------
Binding information of( tunnel id: 101 )
------------------------------------------------------------------------
Protect-tunnel id :101
Protect-tunnel name :Tunnel1/0/11
Maximum number of bound work-tunnels :8
Currently bound work-tunnels :Total( 1 )
:Tunnel1/0/10
Usage Scenario
You can create a CR-LSP by using the following methods:
The preceding two methods can be used together. If the TE attribute configured in the tunnel interface view
and the TE attribute configured through a CR-LSP attribute template coexist, the former takes precedence
over the latter.
Pre-configuration Tasks
Before using a CR-LSP attribute template to set up a CR-LSP, complete the following tasks:
Data Preparation
To use a CR-LSP attribute template to set up a CR-LSP, you need the following data.
No. Data
4 (Optional) Affinity value and affinity mask of the CR-LSP attribute template
5 (Optional) Setup priority and hold priority of the CR-LSP attribute template
Context
Perform the following steps on the ingress of the CR-LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
lsp-attribute lsp-attribute-name
A CR-LSP attribute template is created and the LSP attribute view is displayed.
NOTE
A CR-LSP attribute template can be deleted only when it is not used by any tunnel interface.
The bandwidth is set for the CR-LSP attribute template. The optional bandwidth type varies with
DS-TE modes. In non-DS-TE mode, only CT0 and CT1 are supported. In DS-TE mode, if no
TE-Class mapping table is configured, only CT0, CT1, CT2, and CT3 are supported; if a TE-
Class mapping table is configured, the CT types configured in the TE-Class mapping table are
used.
By default, both the affinity value and the affinity mask are 0x0.
The setup priority and hold priority are set for the CR-LSP attribute template.
By default, both the setup priority and the hold priority are 7.
NOTE
Before enabling or disabling FRR for the CR-LSP attribute template, note the following:
l After FRR is enabled, the route recording function is automatically enabled for the CR-LSP.
l After FRR is disabled, attributes of the bypass tunnel are automatically deleted.
The route recording function is enabled for the CR-LSP attribute template.
NOTE
The undo mpls te record-route command can take effect only when FRR is disabled.
The bypass tunnel attributes are configured for the CR-LSP attribute template.
NOTE
This command can take effect only when the following conditions are met:
l The CR-LSP attribute template has been enabled with FRR allowing bandwidth protection.
l The bandwidth for the bypass tunnel is lower than or equal to the bandwidth for the CR-LSP attribute
template.
l The setup priority and hold priority of the bypass tunnel are smaller than the setup priority and hold
priority of the CR-LSP attribute template.
Step 11 Run:
commit
NOTE
----End
Context
Perform the following steps on the ingress of the CR-LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
To configure the TE tunnel interface, refer to the section Configuring MPLS TE Tunnel
Interfaces.
Step 3 Run:
mpls te primary-lsp-constraint { dynamic | lsp-attribute lsp-attribute-name }
The primary CR-LSP is set up through the specified CR-LSP attribute template.
If dynamic is used, it indicates that when a CR-LSP attribute template is used to set up a primary
CR-LSP, all attributes in the template use the default values.
The hot-standby CR-LSP is set up by using the specified CR-LSP attribute template.
A maximum of three CR-LSP attribute templates can be used to set up a hot-standby CR-LSP.
The hot-standby CR-LSP must be consistent with the primary CR-LSP in the attributes of the
setup priority, hold priority, and bandwidth type. To set up a hot-standby CR-LSP, you should
keep on attempting to use CR-LSP attribute templates one by one in ascending order of the
number of the attribute templates until the hot-standby CR-LSP is set up.
If dynamic is used, it indicates that the hot-standby CR-LSP is assigned the same bandwidth
and priority as the primary CR-LSP, but specified with a different path from the primary CR-
LSP.
The Wait to Restore (WTR) time is set for the traffic to switch back from the hot-standby CR-
LSP to the primary CR-LSP.
By default, the WTR time for the traffic to switch back from the hot-standby CR-LSP to the
primary CR-LSP is 10 seconds.
NOTE
The hot-standby CR-LSP specified in the mpls te backup hotstandby-lsp-constraint wtr command must
be an existing one established by running the mpls te hotstandby-lsp-constraint command.
The ordinary backup CR-LSP is set up by using the specified CR-LSP attribute template.
A maximum of three CR-LSP attribute templates can be used to set up an ordinary backup CR-
LSP. The ordinary backup CR-LSP must be consistent with the primary CR-LSP in the attributes
of the setup priority, hold priority, and bandwidth type. To set up an ordinary backup CR-LSP,
you should keep on attempting to use CR-LSP attribute templates one by one in ascending order
of the number of the attribute template until the ordinary backup CR-LSP is set up.
If dynamic is used, it indicates that the ordinary backup CR-LSP is assigned the same bandwidth
and priority as the primary CR-LSP.
Step 7 Run:
mpls te commit
----End
Prerequisites
The CR-LSP has been established using the CR-LSP attribute template .
Procedure
Step 1 Run the display explicit-path [ [ name ] path-name ] [ tunnel-interface | lsp-attribute |
verbose ] command to view information about the explicit path configured for the CR-LSP
attribute template.
Step 2 Run the display mpls te tunnel-interface lsp-constraint [ tunnel interface-number ] command
to view information about the CR-LSP attribute template on the TE tunnel interface.
----End
Example
If the configurations succeed, you can view the following information:
l List of CR-LSP attribute templates that use the specified explicit path
l Information about the CR-LSP attribute templates on the specified TE tunnel interface
l Information about the CR-LSPs that are set up through the specified CR-LSP attribute
template
Usage Scenario
Associated bidirectional dynamic LSPs are configured to address the following problems:
l An RSVP TE tunnel is unidirectional (a forward tunnel), which means that service flows
can be sent only from the ingress to the egress of the tunnel. To send service flows from
the egress to the ingress of the tunnel, use IP forwarding. This, however, may lead to traffic
congestion.
l If another RSVP TE tunnel (a reverse tunnel) is configured to send service flows from the
egress to the ingress, when the forward tunnel or the reverse tunnel becomes faulty and
traffic switching is performed, the corresponding reverse or forward tunnel is not informed
of the fault, and traffic switching is not performed, leading to a service interruption.
Deploy two RSVP TE tunnels on two devices functioning as the source and destination of each
other. Bind two unidirectional dynamic LSPs of the two tunnels to an associated bidirectional
dynamic LSP. The associated bidirectional dynamic LSP can transmit bidirectional traffic,
addressing the problem of network congestions and protecting bidirectional traffic against
interruption by switching traffic to the backup tunnel in case of a tunnel failure.
Prerequisites
Before configuring an associated bidirectional dynamic LSP, create two MPLS TE tunnels over
the same path but in opposite directions.
Data Preparation
To configure an associated bidirectional dynamic LSP, you need the following data.
No. Data
Context
To configure an associated bidirectional dynamic LSP, both the forward and backward tunnels
must be RSVP-TE tunnels.
In the tunnel interface view, configure the RSVP LSP with the local ingress as the egress to be
the reverse LSP. The configuration is performed on both the forward and backward tunnels.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel tunnel-number
Step 3 Run:
mpls te reverse-lsp protocol rsvp-te ingress-lsr-id ingress-lsr-id tunnel-id
tunnel-id
Step 4 Run:
mpls te commit
----End
Prerequisites
An associated bidirectional dynamic LSP has been configured.
Procedure
l Run the display mpls te reverse-lsp command to check information about the reverse LSP.
----End
Example
Run the display mpls te reverse-lsp command to view information about the reverse LSP.
[HUAWEI] display mpls te reverse-lsp verbose
----------------------------------------------------------------------
LSP Information: STATIC LSP
-------------------------------------------------------------------------------
Obverse Tunnel : Tunnel0/0/2
Reverse LSP Name : lsp1
Reverse LSP State : Down
Incoming Label : 30
Incoming Interface : Eth0/0/1
-------------------------------------------------------------------------------
LSP Information: RSVP LSP
-------------------------------------------------------------------------------
Obverse Tunnel : Tunnel0/0/1
Reverse LSP IngressLsrID : 3.3.3.3
Reverse LSP SessionID : 1
Signalled Tunnel Name : -
Reverse LSP State : Down
Usage Scenario
RSVP-TE supports diversified signaling parameters, which helps improve network reliability
and network resource efficiency and offers some MPLS TE advanced features.
Before performing the configuration tasks described in this section, you must know in detail the
purpose of each task and the influences they have on networks.
Pre-configuration Tasks
Before optimizing the RSVP-TE tunnel, configure an RSVP-TE tunnel.
Data Preparation
To optimize the RSVP TE tunnel, you need the following data.
No. Data
Context
Perform the following steps on each node along a TE tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls rsvp-te hello
Step 4 Run:
mpls rsvp-te hello-lost times
When the RSVP Hello extension is enabled, by default, a maximum of three consecutive Hello
ACK messages cannot be received. If more than three Hello ACK messages are dropped, the
link is considered faulty, and the TE tunnel is torn down.
Step 5 Run:
mpls rsvp-te timer hello interval
When the RSVP Hello extension is enabled, by default, the refresh interval of Hello message is
3 seconds.
If the refresh interval is modified, the modification takes effect after the existing timer expires.
Step 6 Run:
quit
Step 7 Run:
interface interface-type interface-number
Step 8 Run:
mpls rsvp-te hello
The RSVP Hello extension mechanism is used to monitor the reachability of RSVP neighboring
nodes. For more information, see RFC 3209.
----End
Context
Perform the following steps on each node along a TE tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls rsvp-te timer refresh interval
The interval at which Path and Resv messages are refreshed is set.
If the refresh interval is modified, the modification takes effect after the existing timer expires.
Do not set a long refresh interval or modify the refresh interval frequently.
Step 4 Run:
mpls rsvp-te keep-multiplier number
----End
Context
Enabling Srefresh in the interface or MPLS view on two nodes that are the neighbors of each
other can reduce the cost and improve network performance. Enabled in the interface view,
Srefresh takes effect only on the interface; enabled in the MPLS view, Srefresh takes effect on
the entire device. After Srefresh is enabled, the retransmission of Srefresh messages is
automatically enabled on the interface or the device.
For example, a node initializes the retransmission interval as Rf seconds. If a node receives no
ACK message within Rf seconds, the node retransmits the RSVP message after (1 + Delta) x
Rf seconds. The value of Delta depends on the link rate. The node retransmits the message until
it receives an ACK message or the times of retransmission reach the threshold (retransmission
increment value).
Procedure
Step 1 Run:
system-view
The Srefresh mechanism that is configured in the interface view takes effect only on the
current interface.
l To enter the MPLS view, run:
mpls
The Srefresh mechanism that is configured in the MPLS view takes effect globally. The
Srefresh mechanism in MPLS view applies to the TE FRR networking. Srefresh is enabled
globally on the Point of Local Repair (PLR) and Merge Point (MP) over an FRR bypass
tunnel. This allows efficient use of network resources and improves Srefresh reliability.
Step 3 Run:
mpls rsvp-te srefresh
Srefresh is enabled.
----End
Context
Perform the following steps on the egress of a TE tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls rsvp-te resvconfirm
The reservation confirmation is initiated by the node that receives a Path message. An object
that requires confirming the reservation is carried in the Resv message sent by the node that
receives the Path message.
----End
Context
If an RSVP-TE tunnel is constructed by Huawei and non-Huawei devices and the format of
RSVP messages sent by a Huawei device is different than that of a non-Huawei device in the
same RSVP-TE tunnel, you can configure the format of RSVP messages to be sent by the Huawei
device, so that the Huawei device can interwork with the non-Huawei device.
You can also configure the Huawei device to add the down-reason object in an RSVP message
to be sent. This object records RSVP-TE tunnel Down causes of transit and egress nodes, so that
the ingress can learn the tunnel Down causes, facilitating fault locating.
Procedure
l Configure the formats of objects in an RSVP message.
Perform the following steps on all Huawei devices along an RSVP-TE tunnel:
1. Run:
system-view
Perform the following steps on all Huawei devices along an RSVP-TE tunnel:
1. Run:
system-view
----End
Procedure
l Run the display mpls rsvp-te command to check information about RSVP-TE.
l Run the display mpls rsvp-te psb-content [ ingress-lsr-id tunnel-id lsp-id ] command to
check information about RSVP-TE PSB.
l Run the display mpls rsvp-te rsb-content [ ingress-lsr-id tunnel-id lsp-id ] command to
check information about RSVP-TE RSB.
l Run the display mpls rsvp-te statistics { global | interface [ interface-type interface-
number ] } command to check RSVP-TE statistics.
----End
Example
If the configurations are successful, run the preceding commands and view the following
information:
Usage Scenario
RSVP key authentication prevents an unauthorized node from setting up RSVP neighbor
relationships with the local node or generating forged packets to attack the local node.
RSVP key authentication prevents the following unauthorized means of setting up RSVP
neighbor relationships, protecting the local node from attacks (for example, malicious
reservation of high bandwidth):
l An unauthorized node attempts to set up a neighbor relationship with the local node.
l A remote node generates and sends forged RSVP messages to set up a neighbor relationship
with the local node.
RSVP key authentication alone cannot prevent replay attacks or RSVP message mis-sequence
during network congestion. RSVP message mis-sequence causes authentication termination
between RSVP neighbors. The handshake and message window functions, together with RSVP
key authentication, can prevent the preceding problems.
The RSVP authentication lifetime can be configured to prevent unceasing RSVP authentication.
When no CR-LSP exists between RSVP neighbors, the neighbor relationship is kept Up until
the RSVP authentication lifetime elapses.
Pre-configuration Tasks
Before configuring RSVP authentication, configure an RSVP-TE tunnel.
Data Preparation
To configure RSVP authentication, you need the following data.
No. Data
Context
RSVP authentication uses authentication objects carried in RSVP messages to authenticate the
RSVP messages, which prevents malicious attacks initiated by the modified or forged RSVP
messages and improves network reliability and security.
RSVP key authentication is configured in either of the following views:
l In the interface view, RSVP key authentication is performed between directly connected
nodes.
l In the MPLS RSVP-TE neighbor view, RSVP key authentication is performed between
neighboring nodes, which is recommended.
HMAC-MD5 or keychain authentication is enabled by configuring one of the following optional
parameters:
l cipher: configures HMAC-MD5 authentication with keys displayed in ciphertext.
l plain: configures HMAC-MD5 authentication with keys displayed in plaintext.
l keychain: configures keychain authentication by using a globally configured keychain.
NOTE
Procedure
l Configure RSVP key authentication in the interface view.
Perform the following steps on each interface between two directly connected nodes:
NOTE
The configuration must be complete on two neighboring nodes within a period of time three times
as long as the refresh interval at which a Path Refresh message is sent. If the configuration is not
complete on either of the two neighboring nodes after three intervals elapse, the session goes Down.
1. Run:
system-view
RSVP key authentication configured in the interface view takes effect only on the
current interface and has the lowest preference.
NOTICE
When configuring an authentication password, select the ciphertext mode because the
password is saved in configuration files in plaintext if you select plaintext mode, which
has a high risk. To ensure device security, change the password periodically.
NOTE
The configuration must be complete on two neighboring nodes within a period of time three times
as long as the refresh interval at which a Path Refresh message is sent. If the configuration is not
complete on either of the two neighboring nodes after three intervals elapse, the session goes Down.
1. Run:
system-view
– When ip-address is specified as an interface address but not the LSR ID of the
RSVP neighbor, key authentication is based on this neighbor's interface address.
RSVP key authentication takes effect only on the specified interface of the
neighbor, which provides high security. RSVP key authentication has the highest
preference.
– When ip-address is specified as an address equal to the LSR ID of the RSVP
neighbor, key authentication is based on the neighbor's LSR ID. RSVP key
authentication takes effect on all interfaces of the neighbor. RSVP key
authentication has the higher preference than that configured in the interface view,
but has the lower preference than that configured based on the neighbor interface
address.
3. Run:
mpls rsvp-te authentication { { { cipher | plain } auth-key } | keychain
keychain-name }
Context
RSVP neighbors to remain the neighbor relationship when no CR-LSP exists between them until
the RSVP authentication lifetime elapses. Configuring the RSVP authentication time does not
affect the existing CR-LSPs.
Procedure
Step 1 Run:
system-view
The RSVP authentication lifetime that is configured in the interface view takes effect only
on the current interface.
l To enter the MPLS RSVP-TE neighbor view, run:
mpls rsvp-te peer ip-address
Step 3 Run:
mpls rsvp-te authentication lifetime lifetime
The lifetime value is in the format of HH:MM:SS. The value ranges from 00:00:01 to 23:59:59.
By default, the time is 00:30:00, that is, 30 minutes.
----End
Context
Perform the following steps on each node along a tunnel:
Procedure
Step 1 Run:
system-view
The handshake function that is configured in the interface view takes effect only on the
current interface.
l To enter the MPLS RSVP-TE neighbor view, run:
mpls rsvp-te peer ip-address
Step 3 Run:
mpls rsvp-te authentication handshake
The handshake function helps a device to establish an RSVP neighbor relationship with its
neighbor. If a device receives RSVP messages from a neighbor, with which the device has not
established an RSVP authentication relationship, the device will send Challenge messages
carrying local identifier to this neighbor. After receiving the Challenge messages, the neighbor
returns Response messages carrying the identifier the same as that in the Challenge messages.
After receiving the Response messages, the local end checks identifier carried in the Response
messages. If identifier in the Response messages is the same as the local one, the device
determines to establish an RSVP authentication relationship with its neighbor.
NOTE
If you run the mpls rsvp-te authentication lifetime command after configuring the handshake function,
note that the RSVP authentication lifetime must be greater than the interval at which RSVP refresh messages
are sent.
If the RSVP authentication lifetime is less than the interval at which RSVP refresh messages are sent, the
RSVP authentication relationship may be deleted because no RSVP refresh message is received within the
RSVP authentication lifetime. In such a case, after the next RSVP refresh message is received, the
handshake operation is triggered. Repeated handshake operations may cause RSVP tunnels unable to be
set up or cause RSVP tunnels to be deleted.
----End
Context
The default window size is 1, which means that a device saves only the largest sequence number
of the RSVP message from neighbors.
When window-size is greater than 1, a device accepts several valid sequence numbers.
Procedure
Step 1 Run:
system-view
The message window function that is configured in the interface view takes effect only on
the current interface.
l To enter the MPLS RSVP-TE neighbor view, run:
mpls rsvp-te peer ip-address
Step 3 Run:
mpls rsvp-te authentication window-size window-size
window-size is the number of valid sequence numbers carried in RSVP messages that a device
can save.
Configuring RSVP Key Authentication must be configured before the message window
function is configured.
NOTE
If RSVP is enabled on an Eth-Trunk interface or an IP-Trunk interface, only one neighbor relationship is
established on the trunk link between RSVP neighbors. Therefore, any member interface of the trunk
interface receives RSVP messages in a random order, which results in RSVP message mis-sequence. The
RSVP message window size can be configured to prevent RSVP message mis-sequence.
The window size greater than 32 is recommended. If the window size is set too small, the RSVP packets
are discarded because the sequence number is out of the range of the window size, which causes an RSVP
neighbor relationship to be terminated.
----End
Prerequisites
The configurations of RSVP authentication are complete.
Procedure
Step 1 Run the display mpls rsvp-te peer [ interface interface-type interface-number ] command to
view information about the RSVP neighbor on an RSVP-TE-enabled interface.
----End
Example
If the configuration is successful, the command output shows that the number of RSBs is not
zero.
Usage Scenario
CSPF uses the TEDB and constraints to calculate appropriate paths, and a singling protocol
establishes CR-LSPs over the paths. MPLS TE provides many methods to affect CSPF
computation to adjust the CR-LSP path:
l Tie-breaking
CSPF calculates only the shortest path to reach the tunnel destination. During path
computation, if there are several paths with the same metric, the device selects one of them.
Tie-breaking methods for selecting the path are as follows:
– Most-fill: selects a link with the largest ratio of the used bandwidth to the maximum
reservable bandwidth. This method ensures that bandwidth resources are used
effectively.
– Least-fill: selects the link with the smallest ratio of the used bandwidth to the maximum
reservable bandwidth. This method ensures that links use bandwidth resources evenly.
– Random: selects the link randomly. This method can distribute LSPs evenly over links
regardless of the bandwidth.
NOTE
Tie-breaking selects the link based on bandwidth ratio. If the ratios are the same, such as no reservable
bandwidth or the equal bandwidth is used, the link that is found firstly is selected, even if least-fill
or most-fill is configured.
l Route pinning
A successfully established CR-LSP does not vary with the route change.
l Administrative group and affinity property
The affinity property of the MPLS TE tunnel determines the links used by the tunnel. The
affinity cooperates with link administrative group to determine which links the tunnel uses.
l SRLG
A shared risk link group (SRLG) is a set of links which are likely to fail concurrently due
to sharing a physical resource. Links in the group have a shared risk. If one of the links
fails, other links in the group may fail too.
In MPLS TE, SRLG is a feature that enhances path reliability for a hot-standby tunnel or
TE FRR tunnel. Two or more links may run the same risk when they share common physical
resources. For example, sub-interfaces share the risk with their main interface. A sub-
interface definitely goes down if its main interface goes down. If the backup or bypass
tunnel goes through a link which shares the same risk with the primary tunnel, the possibility
of backup tunnel going down along with the primary tunnel is high.
l Hop limit
Hop limit is a rule for path selection for setting up a CR-LSP. It limits the number of hops
that a CR-LSP allows.
l Re-optimization
Dynamically optimizing a CR-LSP is to periodically recompute routes for the CR-LSP. If
the route in recomputation is better than the route in use, then a new CR-LSP is established
based on the recomputed route. Meanwhile, services are switched from the old CR-LSP to
the new CR-LSP, and the old one is deleted.
l Isolated LSP computation
To improve the LSP reliability on a network that has the CR-LSP hot standby feature, you
can configure the isolated LSP computation feature so that the device uses both the disjoint
algorithm and the CSPF algorithm to compute isolated primary and hot-standby LSPs.
Pre-configuration Tasks
The configuration tasks described in this section are some special configurations for CSPF in
MPLS TE. Before performing these configuration tasks, understand their influences on the
system.
Data Preparation
To adjust the selection of the CR-LSP, you need the following data.
No. Data
Context
Perform the following steps on the ingress of a CR-LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls te link administrative group value
Step 4 Run:
quit
Step 5 Run:
interface tunnel interface-number
Step 6 Run:
mpls te affinity property properties [ mask mask-value ] [ best-effort |
secondary ]
By default, the values of administrative group, affinity, and mask are all 0x0.
Step 7 Run:
mpls te commit
----End
Follow-up Procedure
The modification of administrative group takes effect only on LSPs that are established after
modification.
After the modified affinity is committed, the established LSP in this tunnel may be affected, and
the system recalculates the path for the TE tunnel.
Context
Configuring Shared Risk Link Group (SRLG) includes:
Procedure
l Configuring SRLG for the link
Perform the following steps on the links which are in the same SRLG.
1. Run:
system-view
On a network with hot standby or TE FRR, the SRLG attribute can be configured for
the tunnel outbound interface of the ingress and other members of the SRLG to which
the outbound interface belongs. A link joins an SRLG after the SRLG attribute is
configured on an outbound interface of the link.
l Configuring SRLG path calculation mode for the tunnel
Perform the following steps on the ingress node of the hot-standby tunnel or the TE FRR
tunnel.
1. Run:
system-view
NOTE
l If you specify the strict keyword, the CSPF always considers the SRLG as a constraint
when calculating the path for the bypass CR-LSP or the backup CR-LSP.
l If you specify the preferred keyword, CSPF tries to calculate the path which avoids the
links in the same SRLG as protected interfaces; if the calculation fails, CSPF does not
consider the SRLG as a constraint anymore.
l Delete the member interfaces of all SRLGs.
Perform the following steps to delete the member interfaces of all SRLGs from an MPLS
TE node:
1. Run:
system-view
The member interfaces of all SRLGs are deleted from the MPLS TE node.
NOTE
The undo mpls te srlg all-config does not delete an SRLG-based path calculation mode
configured in the mpls te srlg path-calculation command in the MPLS view.
----End
Context
Perform the following steps on the ingress of a CR-LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te hop-limit hop-limit-value [ best-effort | secondary ]
The number of hops along the CR-LSP is set. The hop-limit-value is an integer ranging from 1
to 32.
NOTE
If the mpls te hop-limit command is not configured, the maximum number of hops supported by a CR-LSP is
64.
Step 4 Run:
mpls te commit
----End
Procedure
l Specify the metric type used by a tunnel.
Perform the following steps on the ingress along a CR-LSP:
1. Run:
system-view
The path metric type used by the tunnel during route selection is specified.
If the mpls te path metric-type command is not run in the tunnel interface view, the
metric type in the MPLS view is used; otherwise, the metric type in the tunnel interface
view is used.
By default, path metric type used by the tunnel during route selection is TE.
l (Optional) Configure the TE metric value of the path.
If the metric type of a specified tunnel is TE, you can modify the TE metric value of the
path on the outbound interface of the ingress and the transit node.
1. Run:
system-view
NOTE
If OSPF is used as an IGP and the current device is a stub router, the mpls te metric command
does not take effect.
----End
Context
Perform the following steps on the ingress of a CR-LSP:
Procedure
Step 1 Run:
system-view
l least-fill: selects the route with the smallest ratio of the occupied available bandwidth to the
maximum reservable bandwidth.
l most-fill: selects the route with the largest ratio of the occupied available bandwidth to the
maximum reservable bandwidth.
l random: selects a route randomly.
NOTE
The maximum reservable bandwidth is the bandwidth configured using the mpls te bandwidth max-
reservable-bandwidth command.
Step 4 Run:
quit
Step 5 Run:
interface tunnel interface-number
Step 6 Run:
mpls te tie-breaking { least-fill | most-fill | random }
Step 7 Run:
mpls te commit
NOTE
The tunnel preferentially takes the tie-breaking policy configured in its tunnel interface view. If the tie-
breaking policy is not configured in the tunnel interface view, the configuration in the MPLS view is used.
----End
Context
CSPF uses a locally maintained traffic-engineering database (TEDB) to calculate the shortest
path to the destination address. A signaling protocol applies for and reserves resources for the
path. If a link on a network fails, and the routing protocol fails to instruct CSPF to update the
TEDB, the path calculated by CSPF contain the faulty link.
As a result, the control packets, such as RSVP Path messages, of a signaling protocol are
discarded on the faulty link. Then, the signaling protocol returns an error message to the upstream
node. Receiving the link error message on the upstream node triggers CSPF to recalculate a path.
The path recalculated by CSPF and returned to the signaling protocol still contains the faulty
link because the TEDB is not updated. The control packets of the signaling protocol are still
discarded, and the signaling protocol returns an error message to instruct CSPF to recalculate a
path. The procedure repeats until the TEDB is updated.
To prevent the preceding situation, when the signaling protocol returns an error message to notify
CSPF of a link failure, CSPF sets the status of the faulty link to INACTIVE and enables a failed
link timer. Then, CSPF does not use the faulty link in path calculation until CSPF receives a
TEDB update event notification or the failed link timer expires.
Before the failed link timer expires, if a TEDB update event is received, CSPF deletes the failed
link timer.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls te cspf timer failed-link interval
The failed link timer is a local configuration. If the failed link timers of nodes are set to different
values, a failed link that is in ACTIVE state on one node may be in INACTIVE state on other
nodes.
----End
Context
In the loop detection mechanism, a maximum number of 32 hops are allowed on an LSP. If
information about the local LSR is recorded in the path information table, or the number of hops
on the path exceeds 32, a loop occurs, and the LSP fails to be set up.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te loop-detection
Step 4 Run:
mpls te commit
----End
Context
By default, route pinning is disabled.
NOTE
If route pinning is enabled, MPLS TE re-optimization cannot be used at the same time.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te record-route [ label ]
Step 4 Run:
mpls te route-pinning
Step 5 Run:
mpls te commit
----End
Context
Most IP radio access networks (IP RANs) that use Multiprotocol Label Switching (MPLS) TE
have high reliability requirements for LSPs. The CSPF algorithm does not meet this reliability
requirement because CSPF is a metric-based path computing algorithm that may compute two
intersecting LSPs.
Specifying explicit paths can meet this reliability requirement; this method, however, does not
adapt to topology changes. Each time a node is added to or deleted from the IP RAN, operators
must configure new explicit paths, which is time-consuming and laborious.
To resolve these problems, you can configure isolated LSP computation. After this feature is
enabled, the disjoint and CSPF algorithms work together to compute primary and hot-standby
LSPs at the same time and cut off crossover paths of the two LSPs. Then, the device gets the
isolated primary and hot-standby LSPs.
NOTE
l Isolated LSP computation is a best-effort technique. If the disjoint and CSPF algorithms cannot get
isolated primary and hot-standby LSPs or two isolated LSPs do not exist, the device uses the primary
and hot-standby LSPs computed by CSPF.
l The disjoint algorithm cannot work together with the following features: explicit path, affinity property,
hop limit, CR-LSP attribute template, and automatic bandwidth adjustment. Therefore, before you
configure the disjoint algorithm, check that all those features are disabled. Otherwise, the device does
not allow you to configure the disjoint algorithm. After you configure the disjoint algorithm, the device
does not allow you to configure any of those features.
l After you enable the disjoint algorithm, the Shared Risk Link Group (SRLG), if configured, becomes
ineffective.
l Isolated LSP computation requires the collaboration of the CR-LSP hot standby feature and requires
the hot-standby LSP to have the same reserved bandwidth as the primary LSP.
Procedure
Step 1 Run:
system-view
Step 3 Run:
mpls te cspf disjoint
Step 4 Run:
mpls te commit
----End
Prerequisites
All configurations of adjusting the patch for a CR-LSP are complete.
Procedure
Step 1 Run the display mpls te tunnel verbose command to check information about the MPLS TE
tunnel.
Step 2 Run the display mpls te cspf destination ip-address computation-mode disjoint command to
check the computed primary and hot-standby LSPs after the disjoint algorithm is enabled.
----End
Example
If the configuration is successful, run display mpls te tunnel verbose command to view the
affinity values.
Run the display mpls te cspf destination ip-address computation-mode disjoint command to
view the computed primary and hot-standby LSPs after the disjoint algorithm is enabled.
[HUAWEI] display mpls te cspf destination 6.6.6.6 computation-mode disjoint
Main path for the given constraints is:
1.1.1.1 Include LSR-ID
2.1.0.1 Include
2.1.0.2 Include
2.2.2.2 Include LSR-ID
4.2.0.2 Include
4.2.0.4 Include
4.4.4.4 Include LSR-ID
4.6.0.4 Include
4.6.0.6 Include
6.6.6.6 Include LSR-ID
The total metrics of the calculated path is : 3
1.3.0.1 Include
1.3.0.3 Include
3.3.3.3 Include LSR-ID
3.5.0.3 Include
3.5.0.5 Include
5.5.5.5 Include LSR-ID
5.6.0.5 Include
5.6.0.6 Include
6.6.6.6 Include LSR-ID
Complete disjoint path computed and the total metrics of the calculated path is
: 16
Usage Scenario
During the establishment of an MPLS TE tunnel, specific configurations are required in the
practical application. This section describes the special configuration.
Pre-configuration Tasks
Note that tasks introduced in this section are of special MPLS TE configurations. Before
performing these configuration tasks, you must know their influences on the system.
Before adjusting the establishment of the MPLS TE tunnel, configure an RSVP-TE tunnel.
Data Preparation
To adjust the establishment of the MPLS TE tunnel, you need the following data.
No. Data
Context
Perform the following steps on the ingress of a CR-LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te priority setup-priority [ hold-priority ]
Both the setup priority and the holding priority range from 0 to 7. The smaller the value is, the
higher the priority is.
By default, both the setup and holding priorities are 7. If only the setup priority value is set, the
holding priority value is the same as the setup priority value.
NOTE
The setup priority must not be higher than the holding priority. Therefore, the value of the setup priority
must not be less than that of the holding priority.
Step 4 Run:
mpls te commit
----End
Context
NOTE
l If re-optimization is enabled, the route pinning cannot be used at the same time.
l CR-LSP re-optimization cannot be configured when the resource reservation style is fixed filter (FF).
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te reoptimization [ frequency interval ]
Step 4 Run:
mpls te commit
Step 5 Run:
return
After you configure automatic re-optimization in the tunnel interface view, return to the user
view and run the mpls te reoptimization command to attempt to immediately use better path
to reestablish the tunnels on which automatic re-optimization is enabled. After you perform
manual re-optimization, the timer of the automatic re-optimization is reset and starts to count
again.
After you configure the automatic re-optimization in the tunnel interface view, return to the user
view and run the mpls te reoptimization command to attempt to immediately use better path
to reestablish all tunnels or the specified tunnel on which automatic re-optimization is enabled.
After you perform manual re-optimization, the timer of the automatic re-optimization is reset
and starts to count again.
----End
Context
A node becomes overloaded in the following situations:
l When the node is transmitting a large number of services and its system resources are
exhausted, the node marks itself overloaded.
l When the node is transmitting a large number of services and its CPU is overburdened, an
administrator can run the set-overload command to mark the node overloaded.
If there are overloaded nodes on an MPLS TE network, associate CR-LSP establishment with
the IS-IS overload setting to ensure that CR-LSPs are established over paths excluding
overloaded nodes. This configuration prevents overloaded nodes from being further burdened
and improves CR-LSP reliability.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls te path-selection overload
CR-LSP establishment is associated with the IS-IS overload setting. This association allows
CSPF to calculate paths excluding overloaded IS-IS nodes.
NOTE
Before the association is configured, the mpls te cspf command must be run to enable CSPF and the mpls
te record-route command must be run to enable the route and label record.
Traffic travels through an existing CR-LSP before a new CR-LSP is established. After the new CR-LSP
is established, traffic switches to the new CR-LSP and the original CR-LSP is deleted. This traffic
switchover is performed based on the make-before-break mechanism. Traffic is not dropped during the
switchover.
The mpls te path-selection overload command has the following influences on the CR-LSP
establishment:
l CSPF recalculates paths excluding overloaded nodes for established CR-LSPs.
l CSPF calculates paths excluding overloaded nodes for new CR-LSPs.
NOTE
----End
Context
Perform the following steps on the ingress of a CR-LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te retry times
Step 4 Run:
mpls te timer retry interval
Step 5 Run:
mpls te commit
If the establishment of a tunnel fails, the system attempts to reestablish the tunnel at the set
interval, and the maximum number of attempts is the set reestablishment times.
----End
Context
By default, routes and labels are not recorded.
Perform the following steps on the ingress of a CR-LSP:
Procedure
Step 1 Run:
system-view
The route and label are recorded for an MPLS TE tunnel to be established.
Step 4 Run:
mpls te commit
----End
Context
Perform the following steps on each node on which multiple CR-LSPs need to be reestablished:
Procedure
Step 1 Run:
system-view
Step 3 Run:
mpls te signaling-delay-trigger enable
----End
Prerequisites
All configurations of adjusting the establishment of an MPLS TE tunnel are complete.
Procedure
Step 1 Run the display mpls te tunnel-interface [ tunnel interface-number ] command to view
information about the tunnel interface.
----End
Example
If the configurations are successful, run the preceding commands to view the following
information:
l The route record and label record of the tunnel are enabled.
l The times and interval of tunnel reestablishment attempts are displayed.
l The tunnel setup priority and holding priority are displayed.
Usage Scenario
An MPLS TE tunnel does not automatically import traffic. To enable traffic to travel along an
MPLS TE tunnel, use one of the following methods to import the traffic to the MPLS TE tunnel:
l Use static routes. This is the simplest method for importing the traffic to an MPLS TE
tunnel. You only need to configure a static route with a TE tunnel interface as the outbound
interface.
l Use TE policy-based routing (PBR). MPLS TE PBR, the same as IP unicast PBR, is
implemented based on a set of matching rules and behaviors. The rules and behaviors are
defined using an apply clause, in which a specific tunnel interface is used as the outbound
interface. If packets do not match PBR rules, they are forwarded using IP. If packets match
PBR rules, they are forwarded over specific TE tunnels.
For details on how to configure IP unicast PBR, see Class-Based QoS Configuration in the
NE80E/40E Configuration Guide - QoS.
l Use the auto route mechanism. A TE tunnel is used as a logical link for IGP route
calculation. A tunnel interface is used as an outbound interface of a route. The auto route
mechanism can be implemented in either of the following modes:
– IGP shortcut: A device uses a TE tunnel for local route calculation and does not advertise
the TE tunnel to its peers as a route. Therefore, the peers of this device cannot use the
TE tunnel for route calculation.
– Forwarding adjacency: A device uses a TE tunnel for local route calculation and
advertises the TE tunnel to its peers as a route. Therefore, the peers of this device can
use the TE tunnel for route calculation.
To prevent packet loss during MPLS TE tunnel reestablishment, configure the tunnel switching
and deletion delays on the ingress of an MPLS TE tunnel.
Pre-configuration Tasks
Before you import traffic to an MPLS TE tunnel, configure a Resource Reservation Protocol
(RSVP)-TE tunnel (For details on how to configure an RSVP TE tunnel, see Configuring an
RSVP-TE Tunnel).
Data Preparation
To import traffic to an MPLS TE tunnel, you need the following data.
No. Data
Context
NOTE
The IGP shortcut and the forwarding adjacency cannot be used together.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te igp shortcut [ isis | ospf ]
NOTE
Step 4 Run:
mpls te igp metric { absolute | relative } value
By default, the metric value used by the TE tunnel is the same as that of the IGP.
You can specify a metric value used by the TE tunnel when path is calculated in the IGP shortcut
feature.
l If the absolute metric is used, the metric used by the TE tunnel is equal to the configured
metric value.
l If the relative metric is used, the metric used by the TE tunnel is equal to the sum of the
metric value of the corresponding IGP path and relative metric value.
Step 5 Run:
mpls te commit
Step 6 You can select either of the following modes to configure the IGP shortcut.
l For IS-IS, run:
isis enable [ process-id ]
----End
Context
The routing protocol performs bidirectional detection on a link. When using the forwarding
adjacency to advertise LSP links to other nodes, configure another tunnel for transferring data
packets in the reverse direction. Then, enable the forwarding adjacency on these two tunnels.
NOTE
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te igp advertise [ hold-time interval ]
Step 4 Run:
mpls te igp metric { absolute | relative } value
NOTE
The IGP metric value must be set properly to ensure that the LSP is advertised and used correctly. For
example, the metric of a TE tunnel must be less than that of IGP routes to ensure that the TE tunnel is used
as a route link.
Step 5 Run:
mpls te commit
Step 6 You can select either of the following modes to enable the forwarding adjacency.
----End
Context
MPLS TE uses a make-before-break mechanism. When attributes of an MPLS TE tunnel, such
as bandwidth and path, change, a new CR-LSP with new attributes must be established. The
new CR-LSP is also called Modified LSP. To prevent data loss during traffic switching, the new
CR-LSP must be established before the original CR-LSP is torn down. With the make-before-
break mechanism, the system does not need to calculate the bandwidth to be reserved for the
new CR-LSP. The new CR-LSP shares the bandwidth with the original CR-LSP.
In practical applications, if the upstream nodes are not as busy as the downstream nodes, the
original CR-LSP may be torn down in advance, which causes temporary traffic interruptions.
To prevent this problem, configure the switch delay and deletion delay on the ingress of the
tunnel.
Perform the following steps on the ingress:
Procedure
Step 1 Run:
system-view
----End
Prerequisites
Traffic has been imported to an MPLS TE tunnel.
Procedure
Step 1 Run the display current-configuration command to check the configuration for importing
traffic to an MPLS TE tunnel.
Step 2 Run the display ip routing-table command to check the routes with an MPLS TE tunnel
interface as the outbound interface.
----End
Example
Run the display current-configuration command to view the configuration for importing traffic
to an MPLS TE tunnel. The command output contains the following information:
Run the display ip routing-table command to view the routes with an MPLS TE tunnel interface
as the outbound interface.
<HUAWEI> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 12 Routes : 13
Usage Scenario
To form a uniform TE database in an IGP domain, OSPF-TE and ISIS-TE need to be enabled
to update and flood information about the traffic engineering database (TEDB) when the
remaining bandwidth changes on the MPLS interface.
When a number of tunnels that need reservable bandwidth are set up on a node, the system
frequently updates and floods information about the TEDB. For example, suppose that the
bandwidth of a certain link is 100 Mbit/s. When 100 TE tunnels whose bandwidth is 1 Mbit/s
are set up, the flooding is performed for 100 times.
The system provides the following mechanism to suppress the frequency of TEDB update and
flooding.
l When the ratio of the reserved bandwidth for an MPLS TE tunnel on a link to the remaining
bandwidth of the link in the TEDB is equal to or greater than the set threshold (that is, flood
threshold of the bandwidth), OSPF TE and IS-IS TE flood the link information to all the
nodes within the domain and update the TEDB.
l When the ratio of the released bandwidth of the MPLS TE tunnel on a link to the remaining
bandwidth of the link in the TEDB is equal to or greater than the set threshold, OSPF TE
and IS-IS TE flood the link information to all the nodes within the domain and update the
TEDB.
By default, the flood threshold is 10%. Its value can be modified through command lines.
Pre-configuration Tasks
Before adjusting the flood threshold of the bandwidth, configure an RSVP-TE tunnel.
Data Preparation
To adjust the flood threshold of the bandwidth, you need the following data.
No. Data
Context
The bandwidth flooding threshold is the ratio of the link bandwidth used or released by a TE
tunnel to the link bandwidth remained in the TEDB.
If the link bandwidth changes little, bandwidth flooding wastes network resources. For example,
if link bandwidth is 100 Mbit/s and 100 TE tunnels (with bandwidth as 1 Mbit/s) are created
along this link, bandwidth flooding needs to be performed for 100 times.
If the flooding threshold is set to 10%, bandwidth flooding is not performed when tunnels 1 to
9 are created. When tunnel 10 is created, the bandwidth of tunnels 1 to 10 (10 Mbit/s in total) is
flooded. Similarly, bandwidth flooding is not performed when tunnels 11 to 18 are created. When
tunnel 19 is created, the bandwidth of tunnels 11 to 19 is flooded. Therefore, configuring the
bandwidth flooding threshold can reduce the times of bandwidth flooding and ensure the efficient
use of network resources.
By default, on a link, IGP floods information about this link, and CSPF updates the TEDB if
one of the following conditions is met:
l The ratio of the bandwidth reserved for an MPLS TE tunnel to the bandwidth remaining
in the TEDB is equal to or higher than 10%.
l The ratio of the bandwidth released by an MPLS TE tunnel to the bandwidth remaining in
the TEDB is equal to or higher than 10%.
Perform the following steps on the ingress or transit node along a CR-LSP tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls te bandwidth change thresholds { down | up } percent
----End
Prerequisites
The flooding threshold of bandwidth change has been adjusted.
Procedure
Step 1 Run the display current-configuration command to view information about the flooding
threshold of bandwidth.
----End
Example
If the configurations are successful, run the preceding commands to view the following items:
Usage Scenario
When the automatic bandwidth adjustment is enabled, the bandwidth of the tunnel can be
automatically adjusted according to traffic.
The system periodically collects the traffic rates of outgoing interfaces on the tunnel and
calculates the average bandwidth of the tunnel within a period of time. The establishment of an
LSP is requested according to the bandwidth constraint of the sampled maximum value of
average bandwidth. After the LSP is set up, the old LSP is torn down through the make-before-
break feature and the traffic is switched to the new LSP.
Pre-configuration Tasks
Before configuring the bandwidth automatic adjustment, configure an RSVP-TE tunnel.
Data Preparation
To configure the automatic adjustment of the tunnel bandwidth, you need the following data.
No. Data
1 Sampling interval
No. Data
Context
By default, automatic bandwidth adjustment is disabled.
The sampling interval is configured in the MPLS view, and is valid for all MPLS TE tunnels.
The rate of the outbound interface on an MPLS TE tunnel is recorded at each sampling interval.
The actual average bandwidth allocated to the MPLS TE tunnel in a sampling interval can be
obtained.
After automatic bandwidth adjustment is enabled, running the mpls te timer auto-bandwidth
command to configure periodic sampling to help the system obtain the average bandwidth of
the MPLS TE tunnel during a sampling interval. The system recalculates an average bandwidth
based on sampling during a sampling interval and uses the bandwidth to establish an MPLS TE
tunnel. After the MPLS TE tunnel is established, traffic switches to the new MPLS TE tunnel,
and the original MPLS TE tunnel is torn down. If the MPLS TE tunnel fails to be established,
traffic is still being transmitted along the original MPLS TE tunnel. The bandwidth will be
adjusted after the next sampling interval expires.
The system checks whether the difference between the sampled average bandwidth and the actual
bandwidth if the ratio of the difference to the actual bandwidth is greater than the threshold
value. If the difference is greater than or equal to the threshold value, the system automatically
adjusts the bandwidth.
If the traffic volume changes frequently on a network but the bandwidth does not need to be
adjusted, set the threshold value to a large value.
NOTE
The mpls te auto-bandwidth command cannot be configured together with any of the following commands
on one tunnel interface:
l mpls te route-pinning
l mpls te resv-style ff
l mpls te bandwidth (tunnel interface view) with the multi-CT specified
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls te timer auto-bandwidth [ interval ]
The automatic bandwidth adjustment is enabled, and the sampling interval is specified.
By default, the system automatically adjusts bandwidth every 24 hours, and bandwidth range is
not restricted unless interval is specified.
Step 4 Run:
quit
Step 5 Run:
interface tunnel interface-number
Step 6 To configure automatic bandwidth adjustment, run either of the following commands.
l To configure the frequency and allowable bandwidth range for adjustment, run:
mpls te auto-bandwidth adjustment [ threshold percent ] [ frequency interval ]
[ max-bw max-bandwidth min-bw min-bandwidth ]
l To configure the frequency and allowable bandwidth range for collection, run:
mpls te auto-bandwidth collect-bw [ frequency interval ] [ max-bw max-bandwidth
min-bw min-bandwidth ]
Step 7 Run:
mpls te commit
----End
Prerequisites
All configurations of the automatic adjustment of the tunnel bandwidth are complete.
Procedure
Step 1 Run the display current-configuration command to check configuration information about
automatic adjustment of the tunnel bandwidth.
----End
Example
After the configuration is successful, run the display current-configuration command on the
ingress of the tunnel to view the following configuration information about the tunnel.
l Automatically-adjusted frequency
l Minimum bandwidth that can be adjusted
l Maximum bandwidth that can be adjusted
Usage Scenario
For a physical link of a TE tunnel, besides traffic on the TE tunnel, the physical link may bear
MPLS traffic of other TE tunnels, MPLS traffic of other non-CR-LSPs, or even IP traffic
simultaneously. To limit the TE tunnel traffic within a bandwidth range that is actually
configured, set a limit rate for TE tunnel traffic.
After the configuration of the limit rate, TE traffic is limited to a bandwidth range that is actually
configured. TE traffic with the bandwidth higher than the set bandwidth is dropped.
Pre-configuration Tasks
Before configuring the limit rate of MPLS TE traffic, configure a static CR-LSP or an RSVP-
TE tunnel.
Data Preparation
To configure the limit rate of MPLS TE traffic, you need the following data.
No. Data
Context
NOTE
Before you configure the limit rate of MPLS TE traffic, run the mpls te bandwidth command on a tunnel
interface. If this command is not run, the limit rate of MPLS TE traffic is unavailable.
Procedure
Step 1 Run:
system-view
----End
Prerequisites
The limit rate of MPLS TE traffic function has been configured.
Procedure
l Run the display mpls te tunnel-interface [ tunnel interface-number ] command to check
information about the tunnel interface.
----End
Example
Run the display mpls te tunnel-interface command. The CAR policy is enabled.
Usage Scenario
MPLS TE tunnel application may have the following four scenarios:
l One TE tunnel bears all types (such as, video, voice, and data) of non-VPN services.
l One TE tunnel bears different types of services of a VPN.
l One TE tunnel bears different types of different VPN services.
l One TE tunnel bears different types of VPN and non-VPN services.
MPLS TE tunnel without Diff-Serv (Differentiated Services) cannot provide the QoS according
to each traffic type. For example, voice flow and video flow are transmitted over a TE tunnel.
The video data frames may be transmitted more repeatedly than the voice flow. The video data
requires a higher drop precedence than the voice data. The MPLS TE tunnel, however, allocates
the same drop precedence for voice and video flows irrespective of traffic types.
To prevent service interference in one tunnel, you can set up a TE tunnel for each type of each
VPN or non-VPN service. This scheme may waste resources because multiple tunnels need to
be set up if there are large numbers of VPNs bearing different types of services over the network.
In the above listed scenarios, deployment of DS-TE tunnels is the best scheme. The edge nodes
in the DS-TE area divide the traffic into several classes, and add the class information into the
EXP field in packets. The internal node chooses a proper PHB (Per Hop Behavior) for the packet
according to the EXP value.
DS-TE optimizes network resources, classify service types, and reserve resources for different
types of services. One DS-TE tunnel can carry up to 8 types of service.
NOTE
l To configure standard DS-TE tunnel services, configure the ingress and egress to support HQoS. This,
however, is not required on the Non-standard DS-TE tunnel.
l When services of the same type of multiple VPNs are carried on the same CE of the DS-TE tunnel,
you can limit the bandwidth of each type of services for each VPN on the access CE to prevent source
competition among services of the same type of multiple VPNs.
l To prevent non-VPN services and VPN services from completing resources, you can configure DS-
TE to carry VPN services only or configure the bandwidth for non-VPN services in DS-TE.
Pre-configuration Tasks
Before configuring DS-TE, complete the following tasks:
l Configure unicast static routes or IGP on each LSR to implement the reachability between
LSRs at the network layer.
l Configuring the LSR ID on each LSR.
l Enable MPLS in system and interface views on each LSR.
l Enable MPLS TE and MPLS RSVP-TE in system and interface views on each LSR.
l Enable simple traffic classification on the interfaces of each LSR.
Data Preparation
To configure DS-TE, you need the following data.
No. Data
1 DS-TE mode
4 Link bandwidth
Context
Perform the following steps on each LSR in a DS-TE domain:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls te ds-te mode { ietf | non-ietf }
----End
Follow-up Procedure
In the NE80E/40E, the non-IETF mode and the IETF mode can be switched to each other. When
the IETF mode is switched to the Non-IETF mode, part LSPs may be deleted or the interworking
may fail. Therefore, be cautious when using the switch command.
NOTE
When the non-IETF DS-TE mode is switched to the IETF DS-TE mode, the user configurations cannot be
lost or modified; however, when the IETF DS-TE mode is switched to the non-IETF DS-TE mode, the
user configurations that are supported in the non-IETF mode but are not supported in the non-IETF mode
are lost or modified as follows:
l The extended-MAM configured in IETF DS-TE mode is automatically switched to the MAM. which
may cause an interworking problem.
l The interface bandwidth values set for BC2 to BC7 in IETF DS-TE mode are deleted.
Change in The bandwidth values of BC0 and Other BC values are reset to zero except
the BC1 are unchanged. values of BC0 and BC1.
bandwidth
TE-class If the TE-class mapping table is The TE-Class mapping table is not
mapping configured, it is applied. applied.
table Otherwise, the default one is l If a TE-class mapping table is
applied. configured, it is not deleted.
NOTE
For information about the default TE- l If no TE-class mapping table is
class mapping table, see Table 3-3. configured, the default one is deleted.
LSP LSPs whose combination of <CT, The following LSPs are deleted:
deletion set-priority> or <CT, hold- l Multi-CT LSPs
priority> is not in the TE-class
mapping table are deleted. l LSPs of single CT from CT2 to CT7
Context
Perform the following steps on each LSR in a DS-TE domain:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls te ds-te bcm { extend-mam | mam | rdm }
----End
Context
This configuration procedure is unnecessary to the non-IETF DS-TE.
For IETF DS-TE, it is recommended that the TE-class mapping tables applied to the entire DS-
TE domain are the same. Otherwise, Some LSPs may not be set up correctly.
Perform the following steps on each LSR of a DS-TE domain in DS-TE IETF mode:
Procedure
Step 1 Run:
system-view
Step 2 Run:
te-class-mapping
A TE-class mapping table is configured and the TE-Class mapping table view is displayed.
When configuring a TE-class mapping table, pay attention to the following information:
– CTi with priority m can preempt the bandwidth of CTi with priority n or the bandwidth
of CTj with priority n.
– The total bandwidth of CTi is equal to or less than the bandwidth of BCi.
l When the bandwidth of all CTs along an LSP meets the requirements, the preemption can
be performed and the LSP can be set up.
In DS-TE IETF mode, when the TE-class mapping table is not configured, the default TE-class
mapping table is applied. See Table 3-3.
TE-Class CT Priority
TE-Class[0] 0 0
TE-Class[1] 1 0
TE-Class[2] 2 0
TE-Class[3] 3 0
TE-Class[4] 0 7
TE-Class[5] 1 7
TE-Class[6] 2 7
TE-Class[7] 3 7
NOTE
After a TE-class is configured, you can run the { te-class0 | te-class1 | te-class2 | te-class3 | te-class4 | te-
class5 | te-class6 | te-class7 } description description-info command to modify the TE-class description.
----End
Context
Perform the following steps on each outgoing interface along the LSP in a DS-TE domain:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls te bandwidth max-reservable-bandwidth bw-value
Step 4 Run:
mpls te bandwidth { bc0 bc0-bw-value | bc1 bc1-bw-value | bc2 bc2-bw-value | bc3
bc3-bw-value | bc4 bc4-bw-value | bc5 bc5-bw-value | bc6 bc6-bw-value | bc7 bc7-bw-
value }*
----End
Follow-up Procedure
In different bandwidth constraints models, the relationships between the reservable bandwidth
and the bandwidth of each BC are different.
BC is the bandwidth constraint for outgoing interface, while CT bandwidth is the bandwidth of
the class type of DS-TE tunnel. The total bandwidth of BCi (0 <= i <= 7) of an interface is equal
to or greater than the CTi bandwidth of all tunnels passing through this outgoing interface. For
example, three LSPs of CT1 pass through a link and their bandwidth values are x, y, and z
respectively. The bandwidth of BC1 of the link should be equal to or greater than the total
bandwidth of x, y, and z.
Context
Perform the following steps on the ingress of a TE tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
The tunnel interface is created and the tunnel interface view is displayed.
Step 4 Run one of the following commands to configure the IP address of the tunnel interface.
To forward traffic, the tunnel interface must be configured with an IP address. Because that an
MPLS TE tunnel is unidirectional, no peer address exists. Therefore, a tunnel interface needs
not to be assigned with an IP address. Instead, the tunnel interface takes the LSR ID of the local
node as its IP address.
Step 5 Run:
tunnel-protocol mpls te
Step 6 Run:
destination ip-address
The LSR ID of the egress is configured as the destination address of the tunnel.
By default, the tunnel is a GRE tunnel. Different tunnels require different destination addresses.
When the tunnel protocol is changed from another protocol to MPLS TE, the preceding
destination address is deleted and a new one needs to be configured.
Step 7 Run:
mpls te tunnel-id tunnel-id
Step 8 Run:
mpls te signal-protocol { cr-static | rsvp-te }
By default, both the setup-priority and the hold-priority are 7. Both the setup-priority and the
hold-priority range from 0 to 7. The smaller the value is, the higher the priority is.
NOTE
The setup priority should not be higher than the holding priority. When the holding priority is not specified,
it is the same as the setup priority.
Step 10 Run:
mpls te commit
When the MPLS TE parameters are modified each time, run the mpls te commit command to
commit the configuration.
----End
Procedure
l Configure the ingress of the static CR-LSP.
1. Run:
system-view
The ingress of the static CR-LSP is configured and its CT and the bandwidth are
specified.
NOTE
l tunnel interface-number is the interface number of the MPLS TE tunnel of the static CR-
LSP.
l The static CR-LSP supports eight CTs in DS-TE IETF mode and supports only CT0 and
CT1 in DS-TE non-IETF mode. That is, the CT of the static CR-LSP in IETF mode can be
whichever of the CT0 to CT7; the static CR-LSP in non-IETF mode can only be CT0 or
CT1.
l The tunnel bandwidth cannot exceed the max-reservable bandwidth of the link.
l tunnel-name must be the same as that in the interface tunnel interface-number command.
The value is a case-sensitive string without blank space or abbreviation. Assume a tunnel
interface is created through the interface tunnel 2/0/0 command. The tunnel name is
Tunnel 2/0/0 and the parameter of the ingress of the static CR-LSP must be Tunnel 2/0/0.
Otherwise, the tunnel is set up incorrectly. This rule is inapplicable to transit LSRs or the
egress.
The static CR-LSP supports the single CT only in DS-TE IETF mode. The static CR-LSP
has the highest priority whose value is zero, and does not support bandwidth preemption.
That is, when a static CR-LSP is being set up, it does not preempt the resources of other
LSPs regardless whether the unreserved bandwidth of its out interface is enough or not. In
addition, after a static CR-LSP is set up, its bandwidth cannot be preempted by other LSPs.
On one node (ingress, transit LSR, or egress) in any Bandwidth Constraints model, the total
bandwidth of CTi is not more than the bandwidth of BCi (0 <= i <= 7). That is, CTi can
use only bandwidth of BCi.
For instance, the bandwidth of BC1 on PE is x. Two static CR-LSPs with the CT1 bandwidth
being y and z respectively are set up on the PE. The total bandwidth of CT1s (y + z) is not
more than the bandwidth of BC1 (x).
NOTE
If the bandwidth of the MPLS TE tunnel is configured more than 28630 kbit/s, the actual bandwidth
allocation on the MPLS TE tunnel may not be precise. The MPLS TE tunnel, however, can be set
up successfully.
l Configure the transit LSR of the static CR-LSP.
The configuration is unnecessary if the static CR-LSP has only the ingress and egress. When
transit LSRs reside in the static CR-LSP, perform the following steps on each transit LSR:
1. Run:
system-view
On the transit LSR and egress, tunnel-name cannot be specified as the same as the
name of an existing tunnel on the node. The name of the MPLS TE tunnel interface
associated with the static CR-LSP can be used, such as Tunnel2/0/0.
l Configure the egress of the static CR-LSP.
1. Run:
system-view
----End
Procedure
l Configuring IGP TE
For detailed configurations, see the section Configuring OSPF TE or Configuring IS-IS
TE.
l Configuring CSPF
1. Run:
system-view
NOTE
l If you specify the name of the flow queue template referenced by the tunnel in this
command, traffic over the tunnel is then scheduled and assigned bandwidth based on
the flow queue template.
l If the flow queue template referenced by the tunnel is not specified, the system
automatically generates the flow queue template referenced by the tunnel according to
the CT and flow queue mapping configured in the ct-flow-mapping view.
– To configure the multi-CT, run
mpls te bandwidth { ct0 bw-value | ct1 bw-value | ct2 bw-value | ct3 bw-
value | ct4 bw-value | ct5 bw-value | ct6 bw-value | ct7 bw-value } *
NOTE
If the flow queue template needs to be referenced when the single CT is configured, configure
the flow queue template first. For detailed configurations of the flow queue template, refer to
the HUAWEI NetEngine80E/40E Router Configuration Guide - QoS.
In tunnel policy, the multiple class type (multi-CT) CR-LSP supports only the VPN tunnel
binding mode rather than the select-sequence mode.
4. Run:
mpls te commit
On one node in any the Bandwidth Constraints model, the total bandwidth of CTi is not
more than the bandwidth of BCi (0 <= i <= 7) irrespective of. That is, CTi can use only the
bandwidth of BCi.
For instance, the bandwidth of BC1 on a PE is x and two CR-LSPs are set up on the node
with their CT1 bandwidth being y and z respectively. The total bandwidth of CT1 (y + z)
is not more than the bandwidth of BC1 (x).
NOTE
If the bandwidth of the MPLS TE tunnel is configured as more than 28630 kbit/s, the bandwidth
allocation on the MPLS TE tunnel may not be precise. The MPLS TE tunnel, however, can be set
up successfully.
l (Optional) Configure the explicit path of the tunnel.
To specify the path used by the tunnel, perform the following steps on the ingress of the
tunnel:
1. Create and configure the explicit path. See Configuring MPLS-TE Explicit Path.
2. Run:
quit
----End
Context
Perform the following steps on the ingress of a DS-TE tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
ct-flow-mapping template name
The template of mappings between CTs and flow queues is created and the ct-flow-mapping
view is displayed.
Step 3 Run:
map ct ct-number to { cs7 | cs6 | ef | af4 | af3 | af2 | af1 | be } [ pq | wfq |
lpq ]
NOTE
l The system supports flexible mapping between CTs and flow queues.
l The system supports a maximum of eight templates of the mappings between CTs and flow queues. Seven
templates can be manually configured. One default template cannot be modified.
l By default, the default template is used. The default template defines the following mappings between CTs
and flow queues:
l Maps CT 0 to be lpq.
l Maps CT 1 to af1 wfq.
l Maps CT 2 to af2 wfq.
l Maps CT 3 to af3 wfq.
l Maps CT 4 to af4 wfq.
l Maps CT 5 to ef pq.
l Maps CT 6 to cs6 pq.
l Maps CT 7 to cs7 pq.
l Based on the parameters of a flow queue configured using the map ct ct-number to { cs7 | cs6 | ef | af4 |
af3 | af2 | af1 | be } [ pq | wfq | lpq ] command, the system automatically generates a template applicable
to the DS-TE tunnel.
Step 4 Run:
ct-flow-mapping commit
The mappings between CTs and flow queues defined in the template are committed so that the
mappings can take effect.
Step 5 Run:
quit
Step 6 Run:
interface interface-type interface-number
NOTE
The interface is the physical interface that is bound to the DS-TE tunnel on the ingress.
Step 7 Run:
mpls te ct-flow-mapping mapping-name
The template of mappings between CTs and flow queues is applied to the interface.
CTs do not share the bandwidth of each other on the interface enabled with DS-TE.
NOTE
l When the interface enabled with DS-TE is configured to share bandwidths of CTs, eight CTs of a DS-TE
tunnel can share the bandwidth of each other, which allows the bandwidth of the DS-TE tunnel to be
efficiently used. It is recommended you to use the shared attribute by default.
l When CTs can share the bandwidth of each other on the interface enabled with DS-TE, the shaping parameter
of the flow queue parameters is the CIR of the SQ, which is equal to the total bandwidths of CTs.
l When CTs cannot share the bandwidth of each other on the interface enabled with DS-TE, the shaping
parameter of the flow queue parameters is the bandwidth of a specific CT.
l When an interface supports DS-TE and is selected as the outbound interface of a tunnel working in Up state,
reset the tunnel to make the changed shared or unshared attribute on the interface take effect.
----End
Context
Perform the following steps on the interface on the network side on the ingress of a DS-TE
tunnel:
NOTE
l The interface class queue is an interface-specific scheduling policy. You can configure the interface class
queue based on the actual networking.
l It is recommended that traffic of the same service type applies the same queue scheduling mode to the flow
queue and the class queue.
Procedure
Step 1 Run:
system-view
Step 2 Run:
port-wred port-wred-name
A port WRED object is created, and the port WRED view is displayed.
Step 3 Run:
color { green | yellow | red } low-limit low-limit-value high-limit high-limit-
value discard-percentage discard-percentage-value
A WRED object for a class queue is configured, and the upper limit, the lower limit, and the
discard probability are set for packets of different colors.
NOTE
l If you do not configure a WRED object for a class queue, the system uses the default tail-drop policy.
l You can create multiple port-wred objects to be referenced by class queues as required. The system
provides one default port-wred object. You can configure a maximum of seven port-wred objects.
Step 4 Run:
quit
Step 5 Run:
interface interface-type interface-number
Step 6 Run:
port-queue cos-value { { pq | wfq weight weight-value | lpq} | shaping { shaping-
value | shaping-percentage shaping-percentage-value } [ pbs pbs-value ] | port-
wred wred-name | low-latency } * outbound
A class queue is configured and a scheduling policy is set for queues of different priorities.
You can configure scheduling parameters for eight class queues on one interface.
If you do not configure a class queue template, the system uses the default class queue template.
The default class queue template contains the following parameters:
l By default, the system performs PQ on class queues ef, cs6, and cs7.
l The system performs WFQ on class queues be, af1, af2, af3, and af4. The scheduling weight
is 10:10:10:15:15.
l The default shaping value is the maximum bandwidth of the interface.
l The default discard policy is tail drop.
----End
Prerequisites
The DS-TE tunnel function has been configured.
Procedure
l Run the display mpls te ds-te { summary | te-class-mapping [ default | config |
verbose ] } command to check information about DS-TE.
l Run display mpls te te-class-tunnel { all | { ct0 | ct1 | ct2 | ct3 | ct4 | ct5 | ct6 | ct7 }
priority priority } command to check TE tunnels associated with the TE-classes.
l Run the display interface tunnel interface-number command to check information about
traffic of each CT on the tunnel interface.
NOTE
Before viewing traffic information about each CT configured for a DS-TE tunnel, run the mpls te
lsp-tp outbound command in the tunnel interface view to limit the rate at which TE traffic is
transmitted.
----End
Example
After completing the configuration, run the following commands to view the information.
l Run the display mpls te ds-te command on the ingress of the tunnel to view information
about DS-TE.
l Run the display mpls te te-class-tunnel command on the ingress of the tunnel to view TE
tunnels associated with the TE-classes.
l Run the display interface tunnel interface-number command on the ingress of the tunnel
to view information about traffic of each CT on the tunnel.
Usage Scenario
FRR provides rapid local protection for MPLS TE networks requiring high reliability. If a local
failure occurs, FRR rapidly switches traffic to a bypass tunnel, minimizing the impact on traffic.
A backbone network has a large capacity and its reliability requirements are high. If a link or
node failure occurs on the backbone network, a mechanism is required to provide automatic
protection and rapidly remove the fault. The Resource Reservation Protocol (RSVP) usually
establishes MPLS TE LSPs in Downstream on Demand (DoD) mode. If a failure occurs,
Constraint Shortest Path First (CSPF) can re-calculate a reachable path only after the ingress is
notified of the failure. The failure may trigger reestablishment of multiple LSPs and the
reestablishment fails if bandwidth is insufficient. Either the CSPF failure or bandwidth
insufficiency delays the recovery of the MPLS TE network.
NOTE
l FRR requires reserved bandwidth for a bypass tunnel that needs to be pre-established. If available
bandwidth is insufficient, FRR protects only important nodes or links along a tunnel.
l RSVP-TE tunnels using bandwidth reserved in Shared Explicit (SE) style support FRR, but static TE
tunnels do not.
When TE FRR and board removal protection are used on the PLR, ensure that tunnel
interfaces on the primary and bypass tunnels and the outbound interface on the bypass
tunnel are configured on an interface board different from the interface board to be removed.
Configuring the bypass TE tunnel interface on a main control board of the PLR is
recommended.
NOTE
After an interface connected to an LSR or a CR-LSP is deleted or its board is removed, the interface
enters the stale state. If the number of stale interfaces on a node reaches the maximum number allowed
by the license, the node does not implement FRR for the primary tunnel if the interface providing
the outbound interface for the primary tunnel is removed or faulty.
l RSVP GR
On the NE80E/40E, FRR can be performed during the RSVP GR process. This protects
traffic on the primary tunnel and speeds up troubleshooting in the situation where a traffic
switchover or a reboot is triggered after a fault occurs on an MP, the MP's downstream
node, a PLR, or the PLR' upstream node, meanwhile the outbound interface of a primary
tunnel on the PLR fails.
During the RSVP GR process, FRR switching is triggered if the outbound interface of a
primary tunnel on the PLR goes Down.
Pre-configuration Tasks
Before configuring TE manual FRR, complete the following tasks:
Data Preparation
To configure TE manual FRR, you need the following data.
No. Data
5 (Optional) Path State Block (PSB) and Reservation State Block (RSB) timeout
multiplier
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel tunnel-number
Step 3 Run:
mpls te fast-reroute [ bandwidth ]
TE FRR is enabled.
NOTE
Only the primary tunnel in a tunnel protection group can be configured together with TE FRR on the ingress.
Neither the protection tunnel nor the tunnel protection group itself can be used together with TE FRR. If
the tunnel protection group and TE FRR are used, neither of them takes effect.
For example, Tunnel 1/0/0 and Tunnel 2/0/0 are tunnel interfaces on MPLS TE tunnels and the tunnel
named Tunnel 2/0/0 has a tunnel ID of 200. The mpls te protection tunnel 200 and mpls te fast-
reroute commands can be both configured on Tunnel 1/0/0. This means that the tunnel named Tunnel
1/0/0 can be a primary tunnel in a tunnel protection group and a TE FRR primary tunnel. A configuration
failure will occur if the mpls te protection tunnel 200 command is run on Tunnel 1/0/0 and the mpls te
fast-reroute command is run on Tunnel 2/0/0.
Step 4 Run:
mpls te commit
----End
Context
Bypass tunnels are established on selected links or nodes that are not on the protected primary
tunnel. If a link or node on the protected primary tunnel is used for a bypass tunnel and fails, the
bypass tunnel also fails to protect the primary tunnel.
NOTE
l FRR does not take effect if multiple nodes or links fail simultaneously. After FRR switching is
performed to switch data from the primary tunnel to a bypass tunnel, the bypass tunnel must remain
Up when forwarding data. If the bypass tunnel goes Down, the protected traffic is interrupted and FRR
fails. Even though the bypass tunnel goes Up again, traffic is unable to flow through the bypass tunnel
but travels through the primary tunnel after the primary tunnel recovers or is reestablished.
l By default, the system searches for an optimal manual FRR tunnel for each primary tunnel every 1
second and binds the bypass tunnel to the primary tunnel if there is an optimal bypass tunnel.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel tunnel-number
Step 3 Run either of the following commands to configure the IP address for the tunnel interface:
l To configure an IP address for the interface, run:
ip address ip-address { mask | mask-length } [ sub ]
l To configure the tunnel interface to borrow the IP address of another interface, run:
ip address unnumbered interface interface-type interface-number
NOTE
A tunnel interface must have an IP address to forward traffic. An MPLS TE tunnel is unidirectional and
does not need a peer address. Therefore, there is no need to configure a separate IP address for the tunnel
interface. The tunnel interface usually borrows the IP address of the local loopback interface used as an
LSR ID.
Step 4 Run:
tunnel-protocol mpls te
Step 5 Run:
destination ip-address
Step 6 Run:
mpls te tunnel-id tunnel-id
NOTE
Physical links of a bypass tunnel cannot overlap protected physical links of the primary tunnel.
Step 8 (Optional) Run either of the following commands to set the bandwidth for the bypass tunnel:
l mpls te bandwidth { ct0 ct0-bw-value | ct1 ct1-bw-value } [ flow-queue flow-
queue ]
Step 9 Run:
mpls te bypass-tunnel
After a bypass tunnel is configured, the system automatically records routes related to the bypass
tunnel.
NOTE
Step 10 Run:
mpls te protected-interface interface-type interface-number
NOTE
Step 11 Run:
mpls te commit
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls te timer fast-reroute [ weight ]
Set the interval at which the binding between a TE FRR LSP and a primary LSP is refreshed.
By default, the time weight used to calculate the interval is 300 (weight). And the actual interval
at which the binding between a TE FRR LSP and a primary LSP is refreshed depends on device
performance and the maximum number of LSPs that can be established on the device.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls rsvp-te keep-multiplier number
NOTE
Setting the timeout multiplier to 5 or greater is recommended for a network where a large number of CR-
LSPs are established and RSVP GR is configured.
----End
Prerequisites
MPLS TE manual FRR has been configured.
Procedure
l Run the display mpls lsp [ lsp-id ingress-lsr-id session-id lsp-id ] [ verbose ] command
to check information about a specified primary tunnel.
l Run the display mpls lsp attribute bypass-inuse { inuse | not-exists | exists-not-used }
command to check information about the attribute of a specified bypass LSP.
l Run the display mpls lsp attribute bypass-tunnel tunnel-name command to check
information about the attribute of a bypass tunnel.
l Run the display mpls te tunnel-interface [ tunnel tunnel-number | auto-bypass-tunnel
[ tunnel-name ] ] command to check detailed information about the tunnel interface of a
specified primary or bypass tunnel.
l Run the display mpls te tunnel path [ [ [ tunnel-name ] tunnel-name ] [ lsp-id ingress-
lsr-id session-id local-lsp-id ] | fast-reroute { local-protection-available | local-
protection-inuse } | lsr-role { ingress | transit | egress } ] command to check information
about paths of a specified primary or bypass tunnel.
----End
Example
Run the display mpls te tunnel-interface command to view information about the tunnel
interface of a primary or bypass tunnel.
<HUAWEI> display mpls te tunnel-interface tunnel 1/0/0
----------------------------------------------------------------
Tunnel1/0/0
----------------------------------------------------------------
Tunnel State Desc : GRACEFUL SWITCH
Active LSP : Best-Effort LSP
Traffic Switch : Best-Effort LSP -> Ordinary LSP
Session ID : 50
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 2.2.2.2
Admin State : UP Oper State : UP
Primary LSP State : DOWN
Main LSP State : SETTING UP
Hot-Standby LSP State : UP
Main LSP State : READY LSP ID : 32799
Modify LSP State : SETTING UP
Ordinary LSP State : UP
Main LSP State : READY LSP ID : 32782
Best-Effort LSP State : UP
Main LSP State : READY LSP ID : 32780
Run the display mpls te tunnel path command to view information about the paths of a primary
or bypass tunnel.
<HUAWEI> display mpls te tunnel path
Tunnel Interface Name : Tunnel1/0/0
Lsp ID : 1.1.1.9 :100 :1024
Hop Information
Hop 0 10.1.1.1
Hop 1 10.1.1.2
Hop 2 2.2.2.9
Hop 3 20.1.1.1
Hop 4 20.1.1.2
Hop 5 3.3.3.9
Tunnel Interface Name : Tunnel1/0/0
Lsp ID : 1.1.1.9 :100 :2048
Hop Information
Hop 0 30.1.1.1
Hop 1 30.1.1.2
Hop 2 4.4.4.9
Hop 3 40.1.1.1
Hop 4 40.1.1.2
Hop 5 3.3.3.9
Usage Scenario
On the network that requires high reliability, FRR protection is configured to improve network
reliability. If the network topology is complex, and multiple links need to be configured, the
configuration procedure is complicated. Auto FRR can set up a bypass tunnel automatically to
meet the requirements to reduce the workload and improve network reliability.
Similar to common MPLS TE FRR, MPLS TE Auto FRR also supports board hot pulling-out
protection and FRR during RSVP GR. For more information, see Configuring TE Manual
FRR.
Pre-configuration Tasks
Before configuring MPLS TE Auto FRR, complete the following tasks:
Data Preparation
To configure the MPLS Auto FRR, you need the following data.
No. Data
No. Data
Context
Perform the following steps on the ingress and transit nodes of a tunnel:
Procedure
Step 1 Run:
system-view
The interface view of the outbound interface of the primary tunnel is displayed.
Step 6 (Optional) Run:
mpls te auto-frr { link | node | default | self-adapting }
TE Auto FRR is enabled on the outbound interface on the ingress of the primary tunnel.
By default, after Auto FRR is enabled globally, all MPLS TE interfaces are automatically
configured with the mpls te auto-frr default command. To disable Auto FRR on some
interfaces, run the mpls te auto-frr block command on these interfaces. Then, these interfaces
no longer have the Auto FRR capability even if Auto FRR is enabled or is to be re-enabled
globally.
By default, the TE Auto FRR is disabled.
To enable an automatic bypass tunnel bound to the current tunnel to dynamically select node or
link protection based on network conditions, configure self-adapting.
NOTE
l If the mpls te auto-frr default command is configured in the interface view, the Auto FRR capability
of the interface is consistent with the global Auto FRR capability.
l If the mpls te auto-frr node command without self-adapting configured is run, and the requirement
for node protection is not met, the penultimate hop (but not other hops) on the primary tunnel attempts
to set up an automatic bypass tunnel for link protection.
----End
Context
Perform the following steps on the ingress of the primary tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
tunnel-protocol mpls te
Step 4 Run:
mpls te fast-reroute [ bandwidth ]
TE FRR is enabled.
NOTE
l The bypass tunnel attributes can be configured only after the mpls te fast-reroute bandwidth
command is run on the primary tunnel.
l The bandwidth of the bypass tunnel cannot be higher than the bandwidth of the primary tunnel.
l When the attributes of the automatic bypass tunnel are not configured, by default, the bandwidth of the
automatic bypass tunnel is the same as the bandwidth of the primary tunnel.
l The setup priority of the bypass tunnel cannot be higher than the holding priority. The setup priority
of the bypass tunnel cannot be higher than that of the primary tunnel. The holding priority of the bypass
tunnel cannot be higher than that of the primary tunnel.
l If the bandwidth of the primary tunnel is changed or FRR is disabled, bypass tunnel attributes are
cleared automatically.
l On one TE tunnel interface, the bandwidth of the bypass tunnel cannot be configured together with the
multi-CT.
Step 6 Run:
mpls te commit
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls te timer fast-reroute [ weight ]
Set the interval at which the binding between a TE FRR LSP and a primary LSP is refreshed.
By default, the time weight used to calculate the interval is 300 (weight). And the actual interval
at which the binding between a TE FRR LSP and a primary LSP is refreshed depends on device
performance and the maximum number of LSPs that can be established on the device.
----End
situation where information in PSBs and RSBs is dropped due to a timeout before the GR
processes are complete for a large number of CR-LSPs.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls rsvp-te keep-multiplier number
NOTE
Setting the timeout multiplier to 5 or greater is recommended for a network where a large number of CR-
LSPs are established and RSVP GR is configured.
----End
Context
Network changes often cause the changes in optimal paths. Auto bypass tunnel re-optimization
allows the system to re-optimize an auto bypass tunnel if an optimal path to the same destination
is found due to some reasons, such as the changes in the cost. In this manner, network resources
are optimized.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
After you configure the automatic re-optimization in the tunnel interface view, you can return
to the user view and run the mpls te reoptimization command to immediately re-optimize the
tunnels on which the automatic re-optimization is enabled. After you perform the manual re-
optimization, the timer of the automatic re-optimization is reset and counts again.
----End
Prerequisites
The MPLS TE auto FRR function has been configured.
Procedure
l Run the display mpls te tunnel verbose command to check binding information about the
primary tunnel and the auto bypass tunnel.
l Run the display mpls lsp attribute bypass-inuse { inuse | not-exists | exists-not-used }
command to check information about the attribute of a specified bypass LSP.
l Run the display mpls te tunnel-interface [ tunnel interface-number | auto-bypass-
tunnel [ tunnel-name ] ] command to check detailed information about the auto bypass
tunnel.
l Run the display mpls te tunnel path [ [ [ tunnel-name ] tunnel-name ] [ lsp-id ingress-
lsr-id session-id local-lsp-id ] | fast-reroute { local-protection-available | local-
protection-inuse } | lsr-role { ingress | transit | egress } ] command to check path
information about the primary tunnel and the auto bypass tunnel.
----End
Example
Run the display mpls te tunnel verbose command to view information about the binding
between the primary tunnel and the auto bypass tunnel.
<HUAWEI> display mpls te tunnel name Tunnel2/0/0 verbose
No : 1
Tunnel-Name : Tunnel2/0/0
TunnelIndex : 1 LSP Index : 3072
Session ID : 200 LSP ID : 1
LSR Role : Ingress LSP Type : Primary
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 3.3.3.3
In-Interface : -
Out-Interface : GE2/0/0
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : -
ER-Hop Table Index : - AR-Hop Table Index: 2
C-Hop Table Index : -
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 65546
Created Time : 2009/03/30 09:52:03
RSVP LSP Type : -
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Reserved
CT0 Bandwidth(Kbit/sec) : 10000 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x63 Protected Flag : 0x1
Bypass In Use : Not Used
Bypass Tunnel Id : 67141670
BypassTunnel : Tunnel Index[Tunnel0/0/2048], InnerLabel[3]
Bypass LSP ID : - FrrNextHop : 10.1.1.1
ReferAutoBypassHandle : 2049
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
Usage Scenario
Backup CR-LSPs are established on networks requiring high reliability to provide end-to-end
protection, ensuring network reliability. If a primary CR-LSP fails, traffic rapidly switches to a
backup CR-LSP, ensuring uninterrupted traffic transmission.
Hot standby and ordinary backup modes are supported. If both primary and backup CR-LSPs
fail, best-effort paths are established. Table 3-4 lists CR-LSP backup modes.
On the network shown in Figure 3-1, a primary CR-LSP is set up over a path PE1 -> P1 -> PE2;
a backup CR-LSP is set up over a path PE1 -> P2 -> PE2; a best-effort path is set up over a path
PE1 -> P2 -> P1 -> PE2.
Primary path
PE1 PE2 Backup path
Best-effort path
A CR-LSP backup mode can be configured as needed. Table 3-5 lists supported combinations
(marked "√") of CR-LSP backup modes.
Ordinary Best-Effort
Hot Hot Standby Ordinary Backup Path
Standby (Configured Backup (Configured
(Manually Using a TE (Manually Using a TE
Configured Attribute Configured Attribute
) Template) ) Template)
√ √
√ √
√ √
√ √ √
√ √
Pre-configuration Tasks
Before configuring CR-LSP backup, complete the following tasks:
l Enable MPLS, MPLS TE, and RSVP-TE globally and on interfaces of each node along a
backup CR-LSP. (For the configuration procedure, see 3.5.2 Enabling MPLS TE and
RSVP-TE.)
Data Preparation
To configure CR-LSP backup, you need the following data.
No. Data
1 Backup mode
Procedure
Step 1 Run:
system-view
NOTE
A tunnel interface cannot be used for both a bypass tunnel and a backup tunnel. A protection failure will
occur if the mpls te backup and mpls te bypass-tunnel commands are run on the tunnel interface, or if
the mpls te backup and mpls te protected-interface commands are run on the tunnel interface.
A tunnel interface cannot be used for both a bypass tunnel and a protection tunnel in a tunnel protection
group. A protection failure will occur if the mpls te backup and mpls te protection tunnel commands
are run on the tunnel interface.
After hot standby or ordinary backup is configured, the system automatically selects a path for
a backup CR-LSP. To specify a path for a backup CR-LSP, repeatedly perform one or more of
the following steps.
Step 4 (Optional) Run:
mpls te path explicit-path path-name secondary
NOTE
Use a separate explicit path for the backup CR-LSP to prevent the backup CR-LSP from completely
overlapping its primary CR-LSP. Protection will fail if the backup CR-LSP completely overlaps its primary
CR-LSP.
The mpls te path explicit-path command can be run successfully only after an explicit path is set up by
running the explicit-path command in the system view, and the nodes on the path are specified.
By default, a primary CR-LSP and hot-standby CR-LSP are separated. If the network topology
does not meet this requirement, the hot-standby CR-LSP cannot be established. The path
overlapping function allows a hot-standby CR-LSP to use some links of a primary CR-LSP, to
secure the establishment of the hot-standby CR-LSP.
Step 8 Run:
mpls te commit
----End
Procedure
l Before adjusting a primary CR-LSP, perform the following steps:
1. Run:
system-view
NOTE
To prevent traffic loss, check that a backup CR-LSP has been established before running the
hotstandby-switch force command.
4. Run:
mpls te commit
----End
Context
A maximum of three hot-standby or ordinary backup attribute templates can be used for
establishing a hot-standby or an ordinary CR-LSP. TE attribute templates are prioritized. The
system attempts to use each template in ascending order by priority to establish a backup CR-
LSP.
If an existing backup CR-LSP is set up using a lower-priority attribute template, the system
automatically attempts to set up a new backup CR-LSP using a higher-priority attribute template,
which is unneeded sometimes. Locking a CR-LSP attribute template allows the existing CR-
LSP to keep transmitting traffic without triggering unneeded traffic switchovers, efficiently
using system resources.
Procedure
Step 1 Run:
system-view
Step 5 Run either of the following commands as needed to lock a backup CR-LSP attribute template:
l To lock an attribute template for an ordinary backup CR-LSP, run:
mpls te backup ordinary-lsp-constraint lock
NOTE
A used attribute template can be unlocked after the undo mpls te backup ordinary-lsp-constraint lock or
undo mpls te backup hotstandby-lsp-constraint lock command is run. After unlocking templates, the system
uses each available template in ascending order by priority. If a template has a higher priority than that of the
currently used template, the system establishes a CR-LSP using the higher-priority template.
Step 6 Run:
mpls te commit
----End
Context
Hot-standby CR-LSPs are established using reserved bandwidth resources by default. The
dynamic bandwidth function can be configured to allow the system to create a primary CR-LSP
and a hot-standby CR-LSP with the bandwidth of 0 bit/s simultaneously. The hot-standby CR-
LSP does not use bandwidth resources before the primary CR-LSP fails. If the primary tunnel
fails, the system uses the make-before-break mechanism to reestablish a hot-standby CR-LSP
with the desired bandwidth. If bandwidth resources are insufficient, the system is unable to
reestablish a hot-standby CR-LSP with the desired bandwidth, and therefore switches traffic to
the hot-standby CR-LSP with no bandwidth, ensuring uninterrupted traffic transmission.
Procedure
l Perform the following steps to enable the dynamic bandwidth function for hot-standby CR-
LSPs that are established not using attribute templates:
1. Run:
system-view
NOTE
l If a hot-standby CR-LSP has been established before the dynamic bandwidth function is enabled,
the system uses the make-before-break mechanism to establish a new hot-standby CR-LSP with
the bandwidth of 0 bit/s to replace the existing hot-standby CR-LSP.
l The undo mpls te backup hot-standby dynamic-bandwidth command can be used to disable
the dynamic bandwidth function. This allows the hot-standby CR-LSP with no bandwidth to
obtain bandwidth.
5. Run:
mpls te commit
4. Run:
mpls te backup hotstandby-lsp-constraint dynamic-bandwidth
NOTE
l If a hot-standby CR-LSP has been established before the dynamic bandwidth function is enabled,
the system uses the make-before-break mechanism to establish a new hot-standby CR-LSP with
no bandwidth to replace the existing hot-standby CR-LSP.
l The undo mpls te backup hot-standby dynamic-bandwidth command can be used to disable
the dynamic bandwidth function. This allows the hot-standby CR-LSP with no bandwidth to
obtain bandwidth.
5. Run:
mpls te commit
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel tunnel-number
Step 3 Run:
mpls te backup ordinary best-effort
NOTE
A tunnel interface cannot be used for both a best-effort path and a manually configured ordinary backup
tunnel. A protection failure will occur if the mpls te backup ordinary best-effort and mpls te backup
ordinary commands are run on the tunnel interface.
To establish a best-effort path over a specified path, run either or both of step 4 and step 5.
Step 6 Run:
mpls te commit
----End
Prerequisites
CR-LSP backup has been configured.
Procedure
l Run the display mpls te tunnel-interface [ tunnel tunnel-number ] command to check
information about a tunnel interface on the ingress.
l Run the display mpls te hot-standby state { all [ verbose ] | interface tunnel interface-
number } command to check information about the hot-standby status.
l Run the display mpls te tunnel [ destination ip-address ] [ lsp-id ingress-lsr-id session-
id local-lsp-id ] [ lsr-role { all | egress | ingress | remote | transit } ] [ name tunnel-
name ] [ { incoming-interface | interface | outgoing-interface } interface-type interface-
number ] [ te-class0 | te-class1 | te-class2 | te-class3 | te-class4 | te-class5 | te-class6 | te-
class7 ] [ verbose ] command to check CR-LSP information.
----End
Example
After configuring hot standby, run the display mpls te tunnel-interface command to view
information about the path used by a hot-standby CR-LSP.
<HUAWEI> display mpls te tunnel-interface
----------------------------------------------------------------
Tunnel1/0/0
----------------------------------------------------------------
Tunnel State Desc : UP
Active LSP : Hot-Standby LSP
Session ID : 100
Ingress LSR ID : 4.4.4.4 Egress LSR ID: 3.3.3.3
Admin State : UP Oper State : UP
Primary LSP State : DOWN
Main LSP State : SETTING UP
Hot-Standby LSP State : UP
Main LSP State : READY LSP ID : 32769
Modify LSP State : SETTING UP
Run the display mpls te hot-standby state command to view the status of the hot-standby CR-
LSP.
<HUAWEI> display mpls te hot-standby state interface Tunnel 1/0/0
----------------------------------------------------------------
Verbose information about the Tunnel1/0/0 hot-standby state
----------------------------------------------------------------
tunnel name : Tunnel1/0/0
session id : 100
main LSP token : 0x100201a
hot-standby LSP token : 0x100201b
HSB switch result : Best-Effort LSP
HSB switch reason : -
WTR config time : 20s
WTR remain time : -
using overlapped path : -
current state : wait to restore
Usage Scenario
To protect important links and nodes, you can configure the TE FRR bypass tunnel and the end-
to-end backup CR-LSP together. The backup CR-LSP is more reliable than the TE FRR bypass
tunnel. Therefore, to improve the security of the tunnel, you are recommended to configure
synchronization of the TE FRR bypass tunnel and the backup CR-LSP.
When the primary CR-LSP is Up and the hot standby CR-LSP is also in the Up state, more
bandwidth resources are needed. The ordinary CR-LSP is set up only when the primary CR-LSP
is in the FRR-in-use state. That is, when the primary CR-LSP works normally, no more
bandwidth resources are needed. Therefore, the ordinary backup is recommended.
Pre-configuration Tasks
Before configuring synchronization of the bypass tunnel and the backup CR-LSP, complete the
following tasks:
Data Preparation
To configure synchronization of the bypass tunnel and the backup CR-LSP, you need the
following data.
No. Data
1 Protection policy of TE FRR, that is, to protect the link or the node
2 Backup mode
Context
Perform the following steps on the ingress LSR of the primary tunnel:
NOTE
Before the configuration, you must configure the end-to-end protection (except for the best-effort path) in
either hot standby mode or ordinary backup mode and the TE FRR partial protection.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te backup frr-in-use
When the primary CR-LSP is faulty (that is, the primary CR-LSP is in FRR-in-use state), the
system starts the TE FRR bypass tunnel and tries to restore the primary CR-LSP. At the same
time, the system tries to set up a backup CR-LSP.
Step 4 Run:
mpls te commit
Step 5 Run:
quit
----End
Prerequisites
All configurations of synchronization of the bypass tunnel and the backup CR-LSP are complete.
Procedure
l Run the display mpls te tunnel-interface [ tunnel interface-number | auto-bypass-
tunnel [ tunnel-name ] ] command to view information about the tunnel.
----End
Usage Scenario
When an RSVP node performs an active/standby switchover, an RSVP adjacency relationship
between the local node and its neighbor is torn down because of signaling protocol timeout,
which results in removal of a CR-LSP and a temporary traffic interruption.
RSVP GR resolves the preceding problem. The RSVP GR mechanism allows the adjacency
relationship to be reestablished between neighbors without tearing down RSVP sessions.
The NE80E/40E performs FRR switching during the RSVP GR process. FRR protects traffic if
a switchover is performed on the PLR node, PLR upstream node, MP, or MP downstream node
and if the outbound interface of the PLR primary tunnel fails. FRR helps reduce the fault period.
NOTE
When FRR is performed during the RSVP GR process, set the timeout multiplier in the PSB and RSB to
a value greater than or equal to five, which prevents PSB and RSB loss due to oversized data. For detailed
configurations, see (Optional) Modifying the PSB and RSB Timeout Multiplier.
Pre-configuration Tasks
Before configuring RSVP GR, complete the following tasks:
Data Preparation
To configure RSVP GR, you need the following data.
No. Data
1 IGP parameters:
l IS-IS: IS-IS process ID, Network Entity Title (NET), and IS-IS level of each node
l OSPF: OSPF process ID and AS number
Context
Perform the following steps on a GR node and its neighboring nodes:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls rsvp-te hello
Step 4 Run:
quit
Step 5 Run:
interface interface-type interface-number
Step 6 Run:
mpls rsvp-te hello
By default, although the RSVP Hello extension function has been enabled globally, this function
is disabled on RSVP-enabled interfaces.
----End
Context
Perform the following steps on a GR node:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls rsvp-te hello full-gr
The RSVP GR function and the function of supporting RSVP GR on a neighbor are enabled.
By default, the RSVP GR function and RSVP GR support function are disabled.
----End
Context
RSVP GR takes effect on the RSVP GR-enabled neighbor automatically after the neighbor is
enabled with RSVP full GR. If the GR node's neighbor is a GR node, do not perform the following
steps. If the GR node's neighbor is not a GR node, perform the following steps:
Procedure
Step 1 Run:
system-view
RSVP-TE is enabled.
Step 4 Run:
mpls rsvp-te hello
----End
Context
If TE FRR is deployed, a Hello session must be established between a PLR and an MP. Perform
the following steps on the PLR and MP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls rsvp-te
RSVP-TE is enabled.
Step 4 Run:
mpls rsvp-te hello
Step 5 Run:
mpls rsvp-te hello nodeid-session ip-address
----End
Context
After an active/standby switchover starts, an RSVP GR node starts an RSVP smoothing period,
during which the data plane continues forwarding data if the control plane is not restored. After
RSVP smoothing is completed, a restart timer is started.
In this formula, the default basic time is 90 seconds. The basic time can be set., and the number
of LSPs is the number of LSPs with the local node functioning as the ingress.
Perform the following steps on the GR node to modify the basic time:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls rsvp-te hello basic-restart-time basic-restart-time
----End
Procedure
l Run the display mpls rsvp-te graceful-restart command to check the local RSVP GR
status.
l Run the display mpls rsvp-te graceful-restart peer [ { interface interface-type interface-
number | node-id } [ ip-address ] ] command to check the RSVP GR status on a neighbor.
----End
Example
Run the display mpls rsvp-te graceful-restart command on a restarted node. If GR-Self GR-
Support is displayed in the Graceful-Restart Capability field, the local device has the RSVP
GR function. During the GR process, in the command output, Restart time going on or
Recovery time going on is displayed in the GR Status field.
<HUAWEI> display mpls rsvp-te graceful-restart
Display Mpls Rsvp te graceful restart information
LSR ID: 2.2.2.2 Graceful-Restart Capability: GR-Self GR-Support
Restart Time: 90060 Milli Second
Recovery Time: 0 Milli Second
GR Status: Gracefully Restart Not going on
Number of Restarting neighbors: 0
Number of LSPs recovered: 0
Received Gr Path message count: 0
Send Gr Path message count: 0
Received RecoveryPath message count: 0
Send RecoveryPath message count: 0
Run the display mpls rsvp-te graceful-restart peer command on the restarted node.
l Can Do Self GR: The neighbor node is enabled with the RSVP GR capability.
l Can Support GR: The neighbor node is enabled with the RSVP GR supporting capability.
l Both Can Do Self GR and Can Support GR: The neighbor node is enabled with the RSVP
GR function, and the RSVP GR support function.
<HUAWEI> display mpls rsvp-te graceful-restart peer
Neighbor on Interface GigabitEthernet1/0/0
Neighbor Addr: 10.1.1.1
SrcInstance: 47860 NbrSrcInstance: 49409
Neighbor Capability:
Can Do Self GR
Can Support GR
GR Status: Normal
Restart Time: 90060 Milli Second
Recovery Time: 0 Milli Second
Stored GR message number: 0
PSB Count: 0 RSB Count: 0
Total to be Recover PSB Count: 0 Recovered PSB Count: 0
Total to be Recover RSB Count: 0 Recovered RSB Count: 0
P2MP PSB Count: 0 P2MP RSB Count: 0
Total to be Recover P2MP PSB Count: 0 Recovered P2MP PSB Count: 0
Total to be Recover P2MP RSB Count: 0 Recovered P2MP RSB Count: 0
Run the ping lsp te tunnel command on the neighbor node and immediately run the slave
switchover command in the system view on the restarted node. Data forwarded along the TE
tunnel is not interrupted during GR.
Usage Scenario
BFD monitors static or RSVP CR-LSPs.
BFD for static CR-LSP and BFD for RSVP CR-LSP can be used to replace MPLS OAM to
monitor the MPLS TE tunnel protection groups and trigger primary/backup CR-LSP
switchovers. BFD for CR-LSP monitors primary and hot-standby CR-LSPs and triggers CR-
LSP switchovers.
For details about MPLS OAM configuration, see "MPLS OAM Configuration" in NE80E/40E
Configuration Guide - MPLS.
NOTE
For the same CR-LSP, MPLS OAM and BFD cannot be configured simultaneously.
BFD for LSP can function properly even though the forward path is an LSP and the reverse path is an IP
link. The forward path and the reverse path must be established over the same link. If the forward and its
reverse paths use different links, and a fault occurs, BFD cannot identify the faulty path. Before you deploy
BFD, ensure that the forward and reverse paths are over the same link so that BFD can correctly identify
the faulty path.
Pre-configuration Tasks
Before configuring static BFD for CR-LSP, complete one of the following tasks:
For details about the configuration of the MPLS TE tunnel protection group for the MPLS TE tunnel, see
"MPLS OAM Configuration" in HUAWEI NetEngine80E/40E Router Configuration Guide - MPLS.
Data Preparation
To configure static BFD for CR-LSP, you need the following data.
No. Data
2 Reverse channel (IP link, dynamic LSP, static LSP, or MPLS TE tunnel)
Context
Perform the following steps on the ingress and egress of a tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
----End
Context
Perform the following steps on the ingress of a tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd bfd-name bind mpls-te interface tunnel interface-number te-lsp [ backup ]
BFD is configured to monitor the primary or backup CR-LSP bound to a specified tunnel.
Step 3 Run:
discriminator local discr-value
Step 4 Run:
discriminator remote discr-value
The local minimum interval at which BFD packets are sent is set.
The local minimum interval at which BFD packets are received is set.
NOTE
Actual local sending interval = MAX { Configured local sending interval, Configured remote receiving
interval }
Actual local receiving interval = MAX { Configured remote sending interval, Configured local receiving
interval }
Actual local detection interval = Actual local receiving interval x Configured remote detection multiplier
For example:
l The local sending and receiving intervals are set to 200 ms and 300 ms respectively and the detection
multiplier is set to 4.
l The remote sending and receiving intervals are set to 100 ms and 600 ms respectively and the detection
multiplier is set to 5.
Then,
l Actual local sending interval = MAX {200 ms, 600 ms} = 600 ms; Actual local receiving interval =
MAX {100 ms, 300 ms} = 300 ms; Actual local detection interval is 300 ms x 5 = 1500 ms.
l Actual remote sending interval = MAX {100 ms, 300 ms} = 300 ms; Actual remote receiving interval
= MAX {200 ms, 600 ms} = 600 ms; Actual remote detection interval is 600 ms x 4 = 2400 ms.
Step 8 Run:
process-pst
The system is enabled to change the port status table (PST) when the BFD status changes.
When the BFD status changes, BFD notifies the application of the change, triggering a fast
switchover between the primary and bypass CR-LSPs.
Step 9 Run:
notify neighbor-down
A BFD session is configured to notify the upper layer protocol when the BFD session detects a
neighbor Down event.
In most cases, when you use a BFD session to detect link faults, the BFD session notifies the
upper layer protocol of a link fault in the following scenarios:
l When the BFD detection time expires, the BFD session notifies the upper layer protocol.
BFD sessions must be configured on both ends. If the BFD session on the local end does not
receive any BFD packets from the remote end within the detection time, the BFD session on
the local end concludes that the link fails and notifies the upper layer protocol of the link
fault.
l When a BFD session detects a neighbor Down event, the BFD session notifies the upper
layer protocol. If the BFD session on the local end detects a neighbor Down event within the
detection time, the BFD session on the local end directly notifies the upper layer protocol of
the neighbor Down event.
When you use a BFD session to detect faults on an LSP, you need only be concerned about
whether a fault occurs on the link from the local end to remote end. In this situation, run the
notify neighbor-down command to configure the BFD session to notify the upper layer protocol
only when the BFD session detects a neighbor Down event. This configuration prevents the BFD
session from notifying the upper layer protocol when the BFD detection time expires and ensures
that services are not interrupted.
Step 10 Run:
commit
----End
Context
Perform the following steps on the egress of a tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Configure a reverse tunnel to inform the ingress of a fault if the fault occurs. The reverse tunnel
can be the IP link, LSP, or TE tunnel. To ensure that the forward and reverse paths are over the
same link, a CR-LSP is preferentially selected to notify the ingress of an LSP fault. Choose one
of the following configurations as required:
l For an IP link, run:
bfd bfd-name bind peer-ip ip-address [ vpn-instance vpn-name ] [ interface
interface-type interface-number] [ source-ip ip-address ]
Step 3 Run:
discriminator local discr-value
Step 4 Run:
discriminator remote discr-value
The minimum interval at which the local end sends BFD packets is set.
The minimum interval at which the local end receives BFD packets is set.
The device is enabled to modify the PST if the BFD session status changes.
If an LSP or a TE tunnel is used as a reverse tunnel to notify the ingress of a fault, you can run
this command to allow the reverse tunnel to switch traffic if the BFD session goes Down. If a
single-hop IP link is used as a reverse tunnel, this command can be configured, because the
process-pst command can be only configured for BFD single-link detection.
Step 9 Run:
notify neighbor-down
A BFD session is configured to notify the upper layer protocol when the BFD session detects a
neighbor Down event.
In most cases, when you use a BFD session to detect link faults, the BFD session notifies the
upper layer protocol of a link fault in the following scenarios:
l When the BFD detection time expires, the BFD session notifies the upper layer protocol.
BFD sessions must be configured on both ends. If the BFD session on the local end does not
receive any BFD packets from the remote end within the detection time, the BFD session on
the local end concludes that the link fails and notifies the upper layer protocol of the link
fault.
l When a BFD session detects a neighbor Down event, the BFD session notifies the upper
layer protocol. If the BFD session on the local end detects a neighbor Down event within the
detection time, the BFD session on the local end directly notifies the upper layer protocol of
the neighbor Down event.
When you use a BFD session to detect faults on an LSP, you need only be concerned about
whether a fault occurs on the link from the local end to remote end. In this situation, run the
notify neighbor-down command to configure the BFD session to notify the upper layer protocol
only when the BFD session detects a neighbor Down event. This configuration prevents the BFD
session from notifying the upper layer protocol when the BFD detection time expires and ensures
that services are not interrupted.
Step 10 Run:
commit
----End
Procedure
l Run the display bfd configuration mpls-te interface tunnel interface-number te-lsp
[ verbose ] command to check BFD configurations on the ingress.
l Run the following commands to check BFD configurations on the egress:
– Run the display bfd configuration all [ for-ip | for-lsp | for-te ] [ verbose ] command
to check all BFD configurations.
– Run the display bfd configuration static [ for-ip | for-lsp | for-te | name bfd-name ]
[ verbose ] command to check the static BFD configurations.
– Run the display bfd configuration peer-ip peer-ip [ vpn-instance vpn-instance-
name ] [ verbose ] command to check the configurations of BFD with the reverse path
over an IP link.
– Run the display bfd configuration static-lsp lsp-name [ verbose ] command to check
the configurations of BFD with the reverse path over a static LSP.
– Run the display bfd configuration ldp-lsp peer-ip peer-ip nexthop nexthop [
interface interface-type interface-number ] [ verbose ] command to check the
configurations of BFD with the reverse path over an LDP LSP.
– Run the display bfd configuration mpls-te interface tunnel interface-number te-lsp
[ verbose ] command to check the configurations of BFD with the reverse path over a
CR-LSP.
– Run the display bfd configuration mpls-te interface tunnel interface-number
[ verbose ] command to check the configurations of BFD with the reverse path over a
TE tunnel.
l Run the display bfd session mpls-te interface tunnel interface-number te-lsp
[ verbose ] command to check BFD session configurations on the ingress.
l Run the following commands to check BFD session configurations on the egress:
– Run the display bfd session all [ for-ip | for-lsp | for-te ] [ slot slot-id | verbose ]
command to check all the BFD configurations.
– Run the display bfd session static [ for-ip | for-lsp | for-te ] [ slot slot-id | verbose ]
command to check the static BFD configurations.
– Run the display bfd session peer-ip peer-ip [ vpn-instance vpn-instance-name ]
[ slot slot-id | verbose ] command to check the configurations of BFD with the backward
channel being an IP link.
– Run the display bfd session static-lsp lsp-name [ verbose ] command to check the
configurations of BFD with the backward channel being a static LSP.
– Run the display bfd session ldp-lsp peer-ip peer-ip [ interface interface-type
interface-number ] [ verbose ] command to check the configurations of BFD with the
backward channel being an LDP LSP.
– Run the display bfd session mpls-te interface tunnel interface-number te-lsp
[ verbose ] command to check the configurations of BFD with the backward channel
being a CR-LSP.
– Run the display bfd session mpls-te interface tunnel interface-number [ verbose ]
command to check the configurations of BFD with the backward channel being a TE
tunnel.
l Run the following command to check BFD statistics:
– Run the display bfd statistics [ slot slot-id ] command to check all BFD statistics.
– Run the display bfd statistics session all [ for-ip | for-lsp | for-te ] [ slot slot-id ]
command to check all BFD session statistics.
– Run the display bfd statistics session peer-ip peer-ip [ vpn-instance vpn-instance-
name ] [ slot slot-id ] command to check statistics about the BFD session that detects
faults in the IP link.
– Run the display bfd statistics session static-lsp lsp-name command to check statistics
about the BFD session that detects faults in the static LSP.
– Run the display bfd statistics session ldp-lsp peer-ip peer-ip [ interface interface-
type interface-number ] command to check statistics of the BFD session that detects
faults in the LDP LSP.
– Run the display bfd statistics session mpls-te interface tunnel interface-number te-
lsp command to check statistics about the BFD session that detects faults in the CR-
LSP.
----End
Example
After completing the configuration, run the preceding commands to check BFD session status.
The BFD session is Up.
Usage Scenario
BFD for TE allows applications, such as VPN FRR or VLL FRR to fast switch traffic if the
primary tunnel fails, preventing service interruptions.
NOTE
Pre-configuration Tasks
Before configuring static BFD for TE, configure static CR-LSP or an MPLS TE tunnel.
Data Preparation
To configure static BFD for TE, you need the following data.
No. Data
2 Backward channel (IP link, dynamic LSP, static LSP, or MPLS TE tunnel)
Context
Perform the following steps on the ingress and egress of a tunnel:
Procedure
Step 1 Run:
system-view
----End
Context
Perform the following steps on the ingress of a tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd bfd-name bind mpls-te interface tunnel interface-number
Step 3 Run:
discriminator local discr-value
Step 4 Run:
discriminator remote discr-value
The local minimum interval at which BFD packets are sent is set.
The local minimum interval at which BFD packets are received is set.
Step 8 Run:
process-pst
Step 9 Run:
notify neighbor-down
A BFD session is configured to notify the upper layer protocol when the BFD session detects a
neighbor Down event.
In most cases, when you use a BFD session to detect link faults, the BFD session notifies the
upper layer protocol of a link fault in the following scenarios:
l When the BFD detection time expires, the BFD session notifies the upper layer protocol.
BFD sessions must be configured on both ends. If the BFD session on the local end does not
receive any BFD packets from the remote end within the detection time, the BFD session on
the local end concludes that the link fails and notifies the upper layer protocol of the link
fault.
l When a BFD session detects a neighbor Down event, the BFD session notifies the upper
layer protocol. If the BFD session on the local end detects a neighbor Down event within the
detection time, the BFD session on the local end directly notifies the upper layer protocol of
the neighbor Down event.
When you use a BFD session to detect faults on an LSP, you need only be concerned about
whether a fault occurs on the link from the local end to remote end. In this situation, run the
notify neighbor-down command to configure the BFD session to notify the upper layer protocol
only when the BFD session detects a neighbor Down event. This configuration prevents the BFD
session from notifying the upper layer protocol when the BFD detection time expires and ensures
that services are not interrupted.
Step 10 Run:
commit
NOTE
If the status of the tunnel to be checked is Down, the BFD session cannot be set up.
Actual local sending interval = MAX { Configured local sending interval, Configured remote receiving
interval }
Actual local receiving interval = MAX { Configured remote sending interval, Configured local receiving
interval }
Actual local detection interval = Actual local receiving interval x Configured remote detection multiplier.
For example:
l The local sending and receiving intervals are set to 200 ms and 300 ms respectively and the detection
multiplier is set to 4.
l The remote sending and receiving intervals are set to 100 ms and 600 ms respectively and the detection
multiplier is set to 5.
Then,
l Actual local sending interval = MAX {200 ms, 600 ms} = 600 ms; Actual local receiving interval =
MAX {100 ms, 300 ms} = 300 ms; actual local detection interval is 300 ms x 5 = 1500 ms.
l Actual remote sending interval = MAX {100 ms, 300 ms} = 300 ms; Actual remote receiving interval
= MAX {200 ms, 600 ms} = 600 ms; Actual remote detection interval is 600 ms x 4 = 2400 ms.
----End
Context
Perform the following steps on the egress node of a tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Configure a reverse tunnel to inform the ingress of a fault if the fault occurs. The reverse tunnel
can be the IP link, LSP, or TE tunnel. To ensure that the forward and reverse paths are over the
same link, a TE tunnel is preferentially selected to notify the ingress of an LSP fault. Choose
one of the following configurations as required:
l For an IP link, run:
bfd bfd-name bind peer-ip ip-address [ vpn-instance vpn-name ] [ interface
interface-type interface-number] [ source-ip ip-address ]
Step 3 Run:
discriminator local discr-value
Step 4 Run:
discriminator remote discr-value
The local minimum interval at which BFD packets are sent is set.
The local minimum interval at which BFD packets are received is set.
The device is enabled to modify the PST if the BFD session status changes.
If an LSP or a TE tunnel is used as a reverse tunnel to notify the ingress of a fault, you can run
this command to allow the reverse tunnel to switch traffic if the BFD session goes Down. If a
single-hop IP link is used as a reverse tunnel, this command can be configured. Because the
process-pst command can be only configured for BFD single-link detection.
Step 9 Run:
notify neighbor-down
A BFD session is configured to notify the upper layer protocol when the BFD session detects a
neighbor Down event.
In most cases, when you use a BFD session to detect link faults, the BFD session notifies the
upper layer protocol of a link fault in the following scenarios:
l When the BFD detection time expires, the BFD session notifies the upper layer protocol.
BFD sessions must be configured on both ends. If the BFD session on the local end does not
receive any BFD packets from the remote end within the detection time, the BFD session on
the local end concludes that the link fails and notifies the upper layer protocol of the link
fault.
l When a BFD session detects a neighbor Down event, the BFD session notifies the upper
layer protocol. If the BFD session on the local end detects a neighbor Down event within the
detection time, the BFD session on the local end directly notifies the upper layer protocol of
the neighbor Down event.
When you use a BFD session to detect faults on an LSP, you need only be concerned about
whether a fault occurs on the link from the local end to remote end. In this situation, run the
notify neighbor-down command to configure the BFD session to notify the upper layer protocol
only when the BFD session detects a neighbor Down event. This configuration prevents the BFD
session from notifying the upper layer protocol when the BFD detection time expires and ensures
that services are not interrupted.
Step 10 Run:
commit
----End
Procedure
l Run the display bfd configuration mpls-te interface tunnel interface-number
[ verbose ] command to check BFD configurations on the ingress.
l Run the following commands to check BFD configurations on the egress:
– Run the display bfd configuration all [ for-ip | for-lsp | for-te ] [ verbose ] command
to check all information about BFD.
– Run the display bfd configuration static [ for-ip | for-lsp | for-te | name bfd-name ]
[ verbose ] command to check the static BFD configurations.
– Run the display bfd configuration peer-ip peer-ip [ vpn-instance vpn-instance-
name ] [ verbose ] command to check the configurations of BFD with the backward
channel being an IP link.
– Run the display bfd configuration static-lsp lsp-name [ verbose ] command to check
the configurations of BFD with the backward channel being a static LSP.
– Run the display bfd configuration ldp-lsp peer-ip peer-ip nexthop nexthop [
interface interface-type interface-number ] [ verbose ] command to check the
configurations of BFD with the backward channel being an LDP LSP.
– Run the display bfd configuration mpls-te interface tunnel interface-number te-lsp
[ verbose ] command to check the configurations of BFD with the backward channel
being a CR-LSP.
– Run the display bfd configuration mpls-te interface tunnel interface-number
[ verbose ] command to check the configurations of BFD with the backward channel
being a TE tunnel.
l Run the display bfd session mpls-te interface tunnel interface-number [ verbose ]
command to check BFD session configurations on the ingress.
l Run the following commands to check BFD session configurations on the egress:
– Run the display bfd session all [ for-ip | for-lsp | for-te ] [ slot slot-id | verbose ]
command to check all BFD configurations.
– Run the display bfd session static [ for-ip | for-lsp | for-te ] [ slot slot-id | verbose ]
command to check the configurations of static BFD.
– Run the display bfd session peer-ip peer-ip [ vpn-instance vpn-instance-name ]
[ slot slot-id | verbose ] command to check the configurations of BFD with the backward
channel being an IP link.
– Run the display bfd session static-lsp lsp-name [ verbose ] command to check the
configurations of BFD with the backward channel being a static LSP.
– Run the display bfd session ldp-lsp peer-ip peer-ip [ interface interface-type
interface-number ] [ verbose ] command to check the configurations of BFD with the
backward channel being an LDP LSP.
– Run the display bfd session mpls-te interface tunnel interface-number te-lsp
[ verbose ] command to check the configurations of BFD with the backward channel
being a CR-LSP.
– Run the display bfd session mpls-te interface tunnel interface-number [ verbose ]
command to check the configurations of BFD with the backward channel being a TE
tunnel.
l Run the following command to check BFD statistics:
– Run the display bfd statistics [ slot slot-id ] command to check all BFD statistics.
– Run the display bfd statistics session all [ for-ip | for-lsp | for-te ] [ slot slot-id ]
command to check all BFD session statistics.
– Run the display bfd statistics session peer-ip peer-ip [ vpn-instance vpn-instance-
name ] [ slot slot-id ] command to check statistics of the BFD session that detects faults
in the IP link.
– Run the display bfd statistics session static-lsp lsp-name command to check statistics
about the BFD session that detects faults in the static LSP.
– Run the display bfd statistics session ldp-lsp peer-ip peer-ip [ interface interface-
type interface-number ] command to check statistics of the BFD session that detects
faults in the LDP LSP.
– Run the display bfd statistics session mpls-te interface tunnel interface-number te-
lsp command to check statistics of the BFD session that detects faults in the CR-LSP.
----End
Example
After completing the configuration, run the preceding commands to check BFD session status.
The BFD session is Up.
Usage Scenario
Compared with static BFD, dynamically creating BFD sessions simplifies configurations and
reduces configuration errors.
l Static CR-LSP
l RSVP CR-LSP
Currently, dynamic BFD for CR-LSP cannot detect faults in the entire TE tunnel.
NOTE
MPLS OAM and BFD cannot be configured together for one CR-LSP.
BFD for LSP can function properly though the forward path is an LSP and the backward path is an IP link.
The forward path and the backward path must be established over the same link; otherwise, if a fault occurs,
BFD cannot identify the faulty path. Before deploying BFD, ensure that the forward and backward paths
are over the same link so that BFD can correctly identify the faulty path.
Pre-configuration Tasks
Before configuring dynamic BFD for CR-LSP, configure a static CR-LSP or an MPLS TE
tunnel.
Data Preparation
To configure dynamic BFD for CR-LSP, you need the following data.
No. Data
No. Data
Context
Perform the following steps on the ingress and the egress of a TE tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
----End
Context
Enabling the capability of dynamically creating BFD sessions on a TE tunnel can be
implemented in either of the following methods:
l Enabling MPLS TE BFD Globally if most TE tunnels on the ingress need to dynamically
create BFD sessions
l Enabling MPLS TE BFD on the Tunnel Interface if certain TE tunnels on the ingress
need to dynamically create BFD sessions
Procedure
l Enable MPLS TE BFD globally.
1. Run:
system-view
Context
Perform the following steps on the egress:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
Step 3 Run:
mpls-passive
After this command is run, a BFD session can be created only after the egress receives an LSP
Ping request containing a BFD TLV from the ingress.
----End
Context
BFD parameters are adjusted on the ingress of a TE tunnel either of the following modes:
l Adjusting Global BFD Parameters if most TE tunnels on the ingress use the same BFD
parameters
l Adjusting BFD Parameters on an Interface if certain TE tunnels on the ingress need
BFD parameters different from global BFD parameters
NOTE
Actual local sending interval = MAX { Configured local sending interval, Configured remote receiving
interval }
Actual local receiving interval = MAX { Configured remote sending interval, Configured local receiving
interval }
Actual local detection interval = Actual local receiving interval x Configured remote detection multiplier
On the egress of the TE tunnel enabled with the capability of passively creating BFD sessions, the default
values of the receiving interval, sending interval and detection multiplier cannot be adjusted. The default
values of these three parameters are the minimum configurable values on the ingress. Therefore, the BFD
detection interval on the ingress and that on the egress of a TE tunnel are as follows:
l Actual detection interval on the ingress = Configured receiving interval on the ingress x 3
l Actual detection interval on the egress = Configured sending interval on the ingress x Configured
detection multiplier on the ingress
Procedure
l Adjust global BFD parameters.
1. Run:
system-view
----End
Procedure
l Run the display bfd configuration dynamic [ verbose ] command to check the
configuration of dynamic BFD on the ingress.
l Run the display bfd configuration passive-dynamic [ peer-ip peer-ip remote-
discriminator discriminator ] [ verbose ] command to check the configuration of dynamic
BFD on the egress.
l Run the display bfd session dynamic [slot slot-id ] [ verbose ] command to check
information about the BFD session on the ingress.
l Run the display bfd session passive-dynamic [ peer-ip peer-ip remote-discriminator
discriminator ] [slot slot-id ] [ verbose ] command to check information about the BFD
session passively created on the egress.
l Check the BFD statistics.
– Run the display bfd statistics [slot slot-id ] command to check statistics about all BFD
sessions.
– Run the display bfd statistics session dynamic [ slot slot-id ] command to check
statistics about dynamic BFD sessions.
l Run the display mpls bfd session [ statistics | [ protocol { ldp | cr-static | rsvp-te } ] |
[ outgoing-interface interface-type interface-number ] | [ nexthop ip-address ] | [ fec fec-
address ] | verbose | monitor ] command to check information about the MPLS BFD
session.
----End
Example
Run the display bfd session all verbose command on the ingress. The status of the BFD sessions
is Up and the links bound to the sessions are TE LSPs.
Run the display bfd session passive-dynamic verbose command on the egress. The BFD
session created on the egress is a multi-hop BFD session bound to the peer IP address.
Usage Scenario
BFD for RSVP is applied to a scenario where TE FRR is used and a Layer 2 device exists on
the primary LSP between a PLR and its downstream neighbors. On a network where GR is
enabled on the PLR and MP, BFD for RSVP is also recommended.
By default, the interval at which RSVP Hello messages are sent is 3 seconds. The interval at
which a neighbor is declared Down is three times the interval at which RSVP Hello messages
are sent. This allows devices to detect a fault in an RSVP neighbor at seconds level.
If a Layer 2 device exists on a link between RSVP neighboring nodes, the neighboring node
cannot rapidly detect the fault after the link fails, resulting in a great loss of data.
BFD detects faults at millisecond level in protected links or nodes. BFD for RSVP rapidly detects
faults in an RSVP neighbor, allowing packets to switch to a backup LSP rapidly.
NOTE
BFD for LSP can function properly though the forward path is an LSP and the backward path is an IP link.
The forward path and the backward path must be established over the same link; otherwise, if a fault occurs,
BFD cannot identify the faulty path. Before deploying BFD, ensure that the forward and backward paths
are over the same link so that BFD can correctly identify the faulty path.
Pre-configuration Tasks
Before configuring BFD for RSVP, configure an RSVP-TE tunnel.
Data Preparation
To configure BFD for RSVP, you need the following data.
No. Data
When modifying BFD session parameters, select the parameters for the BFD sessions shared by
different protocols as follows:
l If the interval at which BFD packets are sent, interval at which BFD packets are received,
and local detection multiplier are set globally and on the interfaces of a node, the parameters
configured on the interfaces are used by a local RSVP protocol.
l If BFD for RSVP and other protocols share a BFD session on a node, the node selects the
smallest time parameters among all protocols as the local parameters.
l The following formulas are applied:
– Actual local sending interval = MAX { Configured local sending interval, Configured
remote receiving interval }
– Actual local receiving interval = MAX { Configured remote sending interval,
Configured local receiving interval }
– Actual local detection interval = Actual local receiving interval x Configured remote
detection multiplier
Context
Perform the following steps on the two RSVP neighboring nodes between which a Layer 2 device
resides:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
----End
Context
Enabling BFD for RSVP in the following manners:
l Enabling BFD for RSVP Globally if most RSVP interfaces on a node need BFD for
RSVP.
l Enabling BFD for RSVP on the RSVP Interface if certain RSVP interfaces on a node
need BFD for RSVP.
Procedure
l Enable BFD for RSVP globally.
Perform the following steps on both RSVP neighboring nodes between which a Layer 2
device resides:
1. Run:
system-view
After this command is run in the MPLS view, BFD for RSVP is enabled on all RSVP
interfaces except the interfaces with BFD for RSVP that are blocked.
4. (Optional) Block BFD for RSVP on the RSVP interfaces that need not BFD for RSVP.
a. Run:
interface interface-type interface-number
Perform the following steps on the two RSVP neighboring nodes between which a Layer
2 device resides:
1. Run:
system-view
----End
Context
BFD for RSVP parameters are adjusted on the ingress of a TE tunnel either of the following
modes:
l Adjusting Global BFD Parameters if most RSVP interfaces on a node use the same BFD
parameters
l Adjusting BFD Parameters on an RSVP Interface if certain RSVP interfaces require
BFD parameters different from global BFD parameters
Procedure
l Adjust global BFD parameters globally.
Perform the following steps on the two RSVP neighboring nodes between which a Layer
2 device resides:
1. Run:
system-view
NOTE
Perform the following steps on the two RSVP neighboring nodes between which a Layer
2 device resides:
1. Run:
system-view
Procedure
l Run the display mpls rsvp-te bfd session { all | interface interface-type interface-
number | peer ip-address } [ verbose ] command to check information about the BFD for
RSVP session.
l Run the display mpls rsvp-te [ interface [ interface-type interface-number ] ] command
to check the configuration of RSVP-TE.
l Run the display mpls rsvp-te peer [ interface interface-type interface-number ] command
to check information about the RSVP neighbor.
l Run the display mpls rsvp-te statistics { global | interface [ interface-type interface-
number ] } command to check statistics about RSVP-TE.
----End
Example
If the configurations are successful, you can view that the status of the BFD session for RSVP
is Up.
NOTE
Information about the BFD session can be checked only after the BFD session parameters are configured
and the session is created successfully.
Usage Scenario
There is an increasing diversity of multicast services, such as IPTV, massively multiplayer online
role-playing games (MMORPGs), and multimedia conferences. These services are transmitted
over service bearer networks that must meet the following requirements:
l Forward multicast traffic even during traffic congestion.
l Rapidly detect network faults and switch traffic to standby links.
The multicast virtual private LAN service (VPLS) solution meets these requirements. In this
solution, when multicast VPLS traffic arrives, the IP/MPLS network enables nodes to
automatically establish a P2MP TE tunnel and direct multicast traffic to the tunnel. This solution
eliminates the need to deploy Protocol Independent Multicast (PIM) or hierarchical virtual
private LAN service (HVPLS) and fully uses MPLS advantages of TE, QoS, and reliability.
NOTE
After the configuration is complete, a P2MP TE tunnel can be established automatically when multicast
VPLS is being deployed.
Pre-configuration Tasks
Before configuring an automatic P2MP TE tunnel, complete the following tasks:
Data Preparation
Before configuring an automatic P2MP TE tunnel, you need the following data.
No. Data
Context
P2MP TE LSPs destined for leaf nodes can be established only after P2MP TE is globally enabled
on each node and P2MP forwarding is enabled on each outbound interface along the tunnel to
be established.
NOTE
The display mpls te p2mp-te interface [ interface-type interface-number ] command displays whether
P2MP forwarding is enabled or disabled on a specified or all interfaces.
Procedure
Step 1 Run:
system-view
----End
Context
By default, after P2MP TE is globally enabled, P2MP TE is automatically enabled on each MPLS
TE-enabled interface on a local node. To disable P2MP TE on a specific interface during network
planning or there is no need to have P2MP TE enabled on a specific interface because it does
not support P2MP forwarding, disable P2MP TE on the specific interface.
Procedure
Step 1 Run:
system-view
----End
Context
By default, an MPLS network that transmits multicast services dynamically selects leaf nodes
and uses Constrained Shortest Path First (CSPF) to calculate a path destined for each leaf node.
To control the leaf nodes of an automatic P2MP TE tunnel, configure a leaf list. If explicit paths
are specified for leaf nodes, a configured explicit path can be referenced in the view of a specific
leaf node in the leaf list.
NOTE
Plan explicit paths for leaf nodes, while preventing re-merge and crossover events:
l Re-merge: occurs when two sub-LSPs have different inbound interfaces but the same outbound
interface on a single transit node. Figure 3-2 illustrates a re-merge event.
l Crossover: occurs when two sub-LSPs have different inbound interfaces and outbound interfaces on
a single transit node. Figure 3-2 illustrates a crossover event.
Re-merge Cross-over
Sub-LSP1
Sub-LSP2
Procedure
Step 1 Run:
system-view
The address of a node is changed to allow another specified node to be used by the explicit
path.
NOTE
include means that a LSP must pass through a specified node; exclude means that a LSP cannot pass
through a specified node.
By default, the include strict parameters are configured, meaning that a hop and its next hop must
be directly connected. An explicit path can be configured to pass through a specified node or not to
pass through a specified node.
5. (Optional) Run:
delete hop ip-address
You can create explicit paths for some or all leaf nodes on a P2MP TE tunnel.
Step 3 Run:
mpls te leaf-list leaf-list-name
The leaf list is created, and the leaf list view is displayed.
Step 4 Run:
destination leaf-address
A leaf node is created in the leaf list, and the leaf node view is displayed.
The leaf-address value is equal to the MPLS LSR ID of the leaf node.
The path-name value is equal to the configured explicit path name. No explicit paths are specified
for a leaf node by default.
NOTE
Repeat Steps 3 and 4 to specify explicit paths for all leaf nodes on an automatic P2MP TE tunnel to be
established.
----End
Context
Attributes of an automatic P2MP TE tunnel can only be defined in a P2MP tunnel template, but
cannot be configured on a tunnel interface because the automatic P2MP TE tunnel has no tunnel
interface. Nodes that transmit multicast VPLS traffic can reference the template and use
attributes defined in the template to automatically establish P2MP TE tunnels.
Procedure
Step 1 Run:
system-view
A P2MP tunnel template is created, and the P2MP tunnel template view is displayed.
Step 3 Run either of the following commands:
l Run:
leaf-list leaf-list-name
Before running the leaf-list command, the task described in configuring a leaf list must be complete.
The leaf-list-name value in this step must specify an existing leaf list.
l Run:
record-route[ label ]
NOTE
For more information about administrative groups and affinities, see the section "Principles" in
NE80E/40E Feature Description - MPLS TE.
l Run:
hop-limit hop-limit-value
If the hop limit is not set, a P2MP LSP established using the P2MP tunnel template contains a
maximum of 64 hops.
----End
Prerequisites
An automatic P2MP TE tunnel has been configured so that the establishment of an automatic
P2MP TE tunnel can be triggered when multicast VPLS is deployed.
Procedure
l Run the display mpls multicast-lsp protocol p2mp-te [ lsp-id ingress-lsr-id session-id
p2mp-id lsp-id ] command on any node to check information about P2MP TE LSPs working
in the Up state.
l Run the display mpls te p2mp tunnel-interface [ auto-tunnel [ auto-tunnel-name ] ]
[ s2l-destination s2l-destination-address ] command on the ingress (root node) to check
information about tunnel interfaces of automatic P2MP TE tunnels.
l Run the display mpls te leaf-list [ [ name ] leaf-list-name ] [ verbose ] command on the
ingress (root node) to check information about a specific or all configured leaf lists.
l Run the display mpls te p2mp-template [ [ name ] template-name ] [ verbose ] command
on the ingress (root node) to check the configurations of a P2MP tunnel template used to
automatically establish P2MP TE tunnels.
----End
Example
Run the preceding commands to obtain the following results:
# Run the display mpls multicast-lsp protocol p2mp-te command to view information about
all P2MP TE LSPs working in the Up state on the ingress.
<HUAWEI> display mpls multicast-lsp protocol p2mp-te
-------------------------------------------------------------------------------
LSP Information: RSVP P2MP-LSP
-------------------------------------------------------------------------------
No : 1
# Run the display mpls te p2mp tunnel-interface command on the ingress to view information
about all tunnel interfaces of automatic P2MP TE tunnels.
<HUAWEI> display mpls te p2mp tunnel-interface
----------------------------------------------------------------
P2MPaa16002
----------------------------------------------------------------
P2MP Template : aa
Tunnel State : UP
Session ID : 16002
Ingress LSR ID : 1.1.1.1 P2MP ID : 0x1010101
Admin State : UP Oper State : UP
# Run the display mpls te leaf-list verbose command on the ingress to view detailed information
about all leaf lists.
<HUAWEI> display mpls te leaf-list verbose
------------------------------------------------------------
p2mp-leaf-list
------------------------------------------------------------
Name : list1 Status : Enabled
1 1.1.1.1
2 2.2.2.2 with path path_abc
List of p2mp tunnels using this leaflist:
Number of p2mp tunnels using this leaflist: 0
List of P2MP templates using this leaf-list:
aa
Number of P2MP templates using this leaf-list: 1
# Run the display mpls te p2mp-template verbose command on the ingress to view detailed
information about all P2MP tunnel templates.
<HUAWEI> display mpls te p2mp-template verbose
------------------------------------------------------------
P2MP-Template
------------------------------------------------------------
Name : aaa
Tie-breaking Policy : None Metric Type : None
Bfd Capability : None Resv Style : SE
Bfd Minimum Tx(ms) : 1000 Bfd Minimum Rx(ms): 1000
Bfd Detect Multiplier: 3
Prerequisites
The TE tunnel detection has been configured.
Procedure
l Run the ping lsp [ -a source-ip | -c count | -exp exp-value | -h ttl-value | -m interval | -r
reply-mode | -s packet-size | -t time-out | -v ] * te tunnel interface-number [ hot-
standby ] [ draft6 ] command to check the connectivity of the TE tunnel between the
ingress and egress.
----End
Example
After configuring MPLS TE, run the ping lsp command on the ingress of the TE tunnel to view
the ping result. If the ping fails, run the tracert lsp command to locate the fault.
Context
After configuring MPLS TE, you can use NQA to check the connectivity and jitter of the TE
tunnel. For detailed configurations, see the chapter "NQA Configuration" in HUAWEI
NetEngine80E/40E Router Configuration Guide - System Management.
Context
If an RSVP-TE tunnel interface goes Down, you can run the following command to view
information about tunnel faults.
Procedure
Step 1 Run display mpls te tunnel-interface last-error [ tunnel-name ] command to view information
about tunnel faults.
----End
Example
Run the display mpls te tunnel-interface last-error command on the ingress to view last errors
of a local node or last errors carried in a PathErr message received from the downstream node.
The errors can be as follows:
l CSPF computation failures
l Errors that occur during the RSVP GR process
l Errors that occur when the RSVP signaling is triggered
l Errors that are carried in the received RSVP PathErr messages
Context
Run the reset command in the user view to clear the operation information.
Procedure
Step 1 Run the reset mpls rsvp-te statistics { global | interface [ interface-type interface-number ] }
command in the user view to clear statistics about RSVP-TE.
Step 2 Run the reset mpls rsvp-te p2mp statistics command in the user view to delete RSVP-TE P2MP
service statistics.
----End
Context
To make the tunnel-related configuration take effect, you can run the mpls te commit command
in the tunnel interface view and run the reset command in the user view.
NOTE
If the configuration is modified in the interface view of the TE tunnel but the mpls te commit command
is not configured, the system cannot execute the reset mpls te tunnel-interface tunnel command to re-
establish the tunnel.
Procedure
Step 1 Run the reset mpls te tunnel-interface tunnel interface-number command to reset the tunnel
interface.
----End
Context
NOTICE
Resetting the RSVP process results in the release and reestablishment of all RSVP CR-LSPs.
To re-establish all RSVP CR-LSPs or verify the operation process of RSVP, run the following
reset command in the user view.
Procedure
l Run the reset mpls rsvp-te command to reset the RSVP process.
----End
Context
In a scenario where MPLS TE Auto FRR is used, you can run the following reset command to
release or re-establish bypass tunnels.
Procedure
l Run the reset mpls te auto-frr { lsp-id ingress-lsr-id tunnel-id | name bypass-tunnel-
name } command to delete or reset the Auto FRR bypass tunnel.
----End
Context
Run the following commands in the system view to notify the Network Management System
(NMS) of LSP status changes.
By default, the trap function is disabled during the setup of the TE LSP.
Procedure
l Run the snmp-agent trap suppress feature-name lsp trap-name { mplsxcup |
mplsxcdown } trap-interval trap-interval [ max-trap-number max-trap-number ]
command in the system view to enable the trap function for the LSP and enable the
debugging of excessive mplsxcup or mplsxcdown information.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls rsvp-lsp-number threshold-alarm upper-limit upper-limit-value lower-limit
lower-limit-value
The upper and lower thresholds of alarms for RSVP LSP usage are configured.
l upper-limit-value specifies the upper threshold of alarms for RSVP LSP usage. An alarm is
generated when the proportion of established RSVP LSPs to total supported RSVP LSPs
reaches the upper limit.
l lower-limit-value specifies the lower threshold of clear alarms for RSVP LSP usage. A clear
alarm is generated when the proportion of established RSVP LSPs to total supported RSVP
LSPs falls below the lower limit.
l The value of upper-limit-value must be greater than that of lower-limit-value.
The default upper limit of an alarm for RSVP LSP usage is 80%. The default lower limit of a
clear alarm for RSVP LSP usage is 75%. Using the default upper limit and lower limit is
recommended.
NOTE
l This command configures the alarm threshold for RSVP LSP usage. The alarm that the number of
RSVP LSPs reached the upper threshold is generated only when the command snmp-agent trap enable
feature-name mpls_lspm trap-name hwmplslspthresholdexceed is configured, and the actual RSVP
LSP usage reaches the upper limit of the alarm threshold. The alarm that the number of RSVP LSPs
fell below the lower threshold is generated only when the command snmp-agent trap enable feature-
name mpls_lspm trap-name hwmplslspthresholdexceedclear is configured, and the actual RSVP
LSP usage falls below the lower limit of the clear alarm threshold.
l After the snmp-agent trap enable feature-name mpls_lspm trap-name
{ hwmplslsptotalcountexceed | hwmplslsptotalcountexceedclear } command is run to enable LSP
limit-crossing alarm and LSP limit-crossing clear alarm, an alarm is generated in the following
situations:
l If the total number of RSVP LSPs reaches the upper limit, a limit-crossing alarm is generated.
l If the total number of RSVP LSPs falls below 95% of the upper limit, a limit-crossing clear alarm
is generated.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls total-crlsp-number threshold-alarm upper-limit upper-limit-value lower-limit
lower-limit-value
The upper and lower thresholds of alarms for total CR-LSP usage are configured.
l upper-limit-value specifies the upper threshold of alarms for total CR-LSP usage. An alarm
is generated when the proportion of established CR-LSPs to total supported CR-LSPs reaches
the upper limit.
l lower-limit-value specifies the lower threshold of clear alarms for total CR-LSP usage. A
clear alarm is generated when the proportion of established CR-LSPs to total supported CR-
LSPs falls below the lower limit.
l The value of upper-limit-value must be greater than that of lower-limit-value.
The default upper limit of an alarm for total CR-LSP usage is 80%. The default lower limit of
a clear alarm for total CR-LSP usage is 75%. Using the default upper limit and lower limit is
recommended.
NOTE
l This command configures the alarm threshold for total CR-LSP usage. The alarm that the number of
total CR-LSPs reached the upper threshold is generated only when the command snmp-agent trap
enable feature-name mpls_lspm trap-name hwmplslspthresholdexceed is configured, and the
actual total CR-LSP usage reaches the upper limit of the alarm threshold. The alarm that the number
of total CR-LSPs fell below the lower threshold is generated only when the command snmp-agent
trap enable feature-name mpls_lspm trap-name hwmplslspthresholdexceedclear is configured,
and the actual total CR-LSP usage falls below the lower limit of the clear alarm threshold.
l After the snmp-agent trap enable feature-name mpls_lspm trap-name
{ hwmplslsptotalcountexceed | hwmplslsptotalcountexceedclear } command is run to enable LSP
limit-crossing alarm and LSP limit-crossing clear alarm, an alarm is generated in the following
situations:
l If the total number of CR-LSPs reaches the upper limit, a limit-crossing alarm is generated.
l If the total number of CR-LSPs falls below 95% of the upper limit, a limit-crossing clear alarm is
generated.
----End
Networking Requirements
On the network shown in Figure 3-3, a static TE tunnel from LSRA to LSRC and a static TE
tunnel from LSRC to LSRA need to be set up. The bandwidth of both tunnels is 10 Mbit/s.
Configuration Roadmap
The configuration roadmap is as follows:
1. Assign an IP address to each interface on each LSR, configure the loopback address as the
MPLS LSR ID, and configure OSPF to advertise the route to the network segment
connecting to each interface and LSR ID.
2. Configure the LSR ID and globally enable MPLS and MPLS TE on each node and interface.
3. Configure the maximum reservable bandwidth and BC0 bandwidth for the link on each
outgoing interface of each LSR along the tunnel. (The tunnel obtains bandwidth from
BC0).
4. Create a tunnel interface on the ingress and specify the IP address of the tunnel, tunnel
protocol, destination address, tunnel ID, and the signaling protocol used to establish the
tunnel.
5. Configure a static LSP associated with the tunnel, and specify the outgoing label and next-
hop address on the ingress, the incoming interface, the next-hop address, and the outgoing
label on the transit node, and the incoming label and inbound interface on the egress to
establish the LSP.
NOTE
l The outgoing label of each node is the incoming label of the next node.
l When running the static-cr-lsp ingress { tunnel-interface tunnel interface-number | tunnel-name }
destination destination-address { nexthop next-hop-address | outgoing-interface interface-type
interface-number } out-label out-label-value [ bandwidth [ ct0 | ct1 ] bandwidth ] command to
configure the ingress of a CR-LSP, note that tunnel-name must be the same as the tunnel name created
by using the interface tunnel interface -number command. tunnel-name is a case-sensitive character
string with no spaces. For example, the name of the tunnel created by using the interface tunnel
2/0/0 command is Tunnel2/0/0. In this case, the parameter of the static CR-LSP on the ingress is
Tunnel2/0/0. This restriction does not apply to transit nodes or egresses.
Data Preparation
To complete the configuration, you need the following data:
l OSPF process ID and area ID of each LSR
l Tunnel interface names, tunnel interface IP addresses, destination addresses, tunnel IDs,
and tunnel signaling protocol (CR-Static) on LSRA and LSRC
l The maximum reservable bandwidth and BC bandwidth for links
l Next-hop address and outgoing label of the ingress on the static CR-LSP
l Incoming interface, next-hop address, and outgoing label of the transit node on the static
CR-LSP
l Incoming interface of the egress on the static CR-LSP
Procedure
Step 1 Assign the IP address to each interface and configure a routing protocol.
# Assign the IP address to each interface and configure the routing protocol using the information
in Figure 3-3 to implement reachability between LSRs.
Repeat this step for LSRB and LSRC. For configuration details, see Configuration Files in this
section.
Step 3 Configure MPLS-TE bandwidth attributes for links.
# Configure the maximum reservable link bandwidth and BC0 bandwidth on each outbound
interface of each LSR along the tunnel. The BC0 bandwidth for links must be greater than the
tunnel bandwidth (10 Mbit/s).
# Configure LSRA.
[LSRA] interface atm 1/0/0
[LSRA-Atm1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRA-Atm1/0/0] mpls te bandwidth bc0 100000
[LSRA-Atm1/0/0] quit
# Configure LSRB.
[LSRB] interface atm 1/0/0
[LSRB-Atm1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRB-Atm1/0/0] mpls te bandwidth bc0 100000
[LSRB-Atm1/0/0] quit
[LSRB] interface atm 2/0/0
[LSRB-Atm2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRB-Atm2/0/0] mpls te bandwidth bc0 100000
[LSRB-Atm2/0/0] quit
# Configure LSRC.
[LSRC] interface atm 2/0/0
[LSRC-Atm2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRC-Atm2/0/0] mpls te bandwidth bc0 100000
[LSRC-Atm2/0/0] quit
After completing the configuration, run the display interface tunnel command on LSRA. The
command output shows that the status of the tunnel interface is Up.
Run the display mpls te tunnel command on each LSR to view the establishment status of the
MPLS TE tunnel.
[LSRA] display mpls te tunnel
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
1.1.1.1 3.3.3.3 1 --/20 I Tunnel1/0/0
- - - 130/-- E Tunnel2/0/0
[LSRB] display mpls te tunnel
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
- - - 20/30 T Tunnel1/0/0
- - - 120/130 T Tunnel2/0/0
[LSRC] display mpls te tunnel
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
- - - 30/-- E Tunnel1/0/0
3.3.3.3 1.1.1.1 1 --/120 I Tunnel2/0/0
Run the display mpls lsp or display mpls static-cr-lsp command on each LSR to view the
establishment status of the static CR-LSP.
When the static CR-LSP is used to establish the MPLS TE tunnel, the packets on the transit node
and the egress are forwarded directly based on the specified incoming and outgoing labels.
Therefore, no FEC information is displayed on LSRB or LSRC.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
#
interface Atm1/0/0
ip address 2.1.1.1 255.255.255.0
pvc 1/100
map ip 2.1.1.2 broadcast
ospf network-type p2p
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 100
mpls te signal-protocol cr-static
mpls te commit
#
ospf 1
area 0.0.0.0
network 2.1.1.0 0.0.0.255
network 1.1.1.1 0.0.0.0
#
static-cr-lsp ingress tunnel-interface Tunnel1/0/0 destination 3.3.3.3 nexthop
2.1.1.2 out-label 20 bandwidth ct0 10000
static-cr-lsp egress tunnel2/0/0 incoming-interface Atm1/0/0 in-label 130
#
return
Context
MPLS-TP is widely used on transport networks. Although MPLS-TP supports OAM, OAM
itself only supports the network element-level management system, which cannot meet the
requirements for network management over public telecommunication networks. MPLS-TP
OAM supporting static bidirectional co-routed LSP is an effective operation and management
method and can detect, identify, and locate faults in the MPLS-TP user plane.
As shown in Figure 3-4, a static bidirectional co-routed LSP originates from LSRA and
terminates on LSRC. OAM PDUs travel through this LSP and any transit node can send a
response along the same path in the opposite direction. The links for the static bidirectional co-
routed LSP between LSRA and LSRC has the bandwidth of 10 Mbit/s.
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l Tunnel interface's name and IP address, destination address, tunnel ID, and static CR-LSP
signaling on LSRA and LSRC
l Maximum reservable bandwidth and BC bandwidth of each link
l Next-hop address and outgoing label on the ingress
l Inbound interface, next-hop address, and outgoing label on the transit node
l Inbound interface on the egress
Procedure
Step 1 Assign an IP address to each interface and configure a routing protocol.
# Configure an IP address and a mask for each interface and configure OSPF so that all LSRs
can interconnect with each other.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls te
[LSRA-Pos1/0/0] quit
The configurations on LSRB and LSRC are similar to the configuration on LSRA.
# Configure the maximum reservable bandwidth and BC0 bandwidth for the link on the outbound
interface of each LSR. The BC0 bandwidth of links must be greater than the tunnel bandwidth
(10 Mbit/s).
# Configure LSRA.
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRA-Pos1/0/0] mpls te bandwidth bc0 100000
[LSRA-Pos1/0/0] quit
# Configure LSRB.
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRB-Pos1/0/0] mpls te bandwidth bc0 100000
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRB-Pos2/0/0] mpls te bandwidth bc0 100000
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRC-Pos2/0/0] mpls te bandwidth bc0 100000
[LSRC-Pos2/0/0] quit
Step 5 Configure the ingress, a transit node, and the egress of the static bidirectional co-routed LSP.
# Configure LSRA as the ingress.
[LSRA] bidirectional static-cr-lsp ingress Tunnel1/0/0
[LSRA-bi-static-ingress-Tunnell/0/0] forward nexthop 2.1.1.2 out-label 20
bandwidth ct0 10000
[LSRA-bi-static-ingress-Tunnell/0/0] backward in-label 20
Step 6 Bind the tunnel interface on LSRC to the static bidirectional co-routed LSP.
[LSRC] interface Tunnel2/0/0
[LSRC-Tunnel2/0/0] mpls te passive-tunnel
[LSRC-Tunnel2/0/0] mpls te binding bidirectional static-cr-lsp egress lsp1
[LSRC-Tunnel2/0/0] mpls te commit
[LSRC-Tunnel2/0/0] quit
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
1.1.1.1 3.3.3.3 1 --/20 I Tunnel1/0/0
20/--
------------------------------------------------------------------------------
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
1.1.1.1 3.3.3.3 - 40/-- E lsp1
--/16
Run the display mpls te bidirectional static-cr-lsp command on each LSR. Information about
the static bidirectional co-routed LSP is displayed.
After completing the configurations, run the ping command on LSRA. The static bidirectional
co-routed LSP is reachable.
[LSRA] ping lsp te Tunnel 1/0/0
LSP PING FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 : 100 data bytes, pres
s CTRL_C to break
Reply from 3.3.3.3: bytes=100 Sequence=1 time = 110 ms
Reply from 3.3.3.3: bytes=100 Sequence=2 time = 70 ms
Reply from 3.3.3.3: bytes=100 Sequence=3 time = 60 ms
Reply from 3.3.3.3: bytes=100 Sequence=4 time = 80 ms
Reply from 3.3.3.3: bytes=100 Sequence=5 time = 60 ms
--- FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 60/76/110 ms
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
#
bidirectional static-cr-lsp ingress Tunnel1/0/0
forward nexthop 2.1.1.2 out-label 20 bandwidth ct0 10000
backward in-label 20
#
interface Pos1/0/0
undo shutdown
ip address 2.1.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te signal-protocol cr-static
mpls te tunnel-id 100
mpls te bidirectional
mpls te commit
#
ip route-static 2.2.2.2 255.255.255.255 2.1.1.2
ip route-static 3.3.3.3 255.255.255.255 2.1.1.2
#
return
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
#
ip route-static 1.1.1.1 255.255.255.255 2.1.1.1
ip route-static 3.3.3.3 255.255.255.255 3.2.1.2
#
return
Context
Figure 3-5 shows an MPLS network. APS is configured on PE1 and PE2. The working tunnel
is established along the path PE1 -> PE2 and the protection tunnel is established along the path
PE1 -> P -> PE2. When the MPLS network operates properly, the working tunnel transmits
MPLS traffic. If the working tunnel fails, MPLS traffic switches to the protection tunnel.
Figure 3-5 Networking diagram for a 1:1 bidirectional tunnel protection group
Loopback1
3.3.3.3/32
P
GE1/0/0 GE2/0/0
10.1.1.2/24 10.1.2.2/24
GE2/0/0 GE2/0/0
10.1.1.1/24 10.1.2.1/24
PE1 PE2
GE1/0/0 GE1/0/0
10.1.3.1/24 10.1.3.2/24
Loopback1 Loopback1
1.1.1.1/32 2.2.2.2/32
Primary path
Backup path
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l Tunnel interface's name and IP address, destination address, tunnel ID, and static CR-LSP
signaling on PE1 and PE2
l Maximum reservable bandwidth and BC bandwidth of each link
l Next-hop address and outgoing label on the ingress
l Inbound interface, next-hop address, and outgoing label on the transit node
l Inbound interface on the egress
Procedure
Step 1 Assign an IP address to each interface and configure a routing protocol.
Configure an IP address and a mask for each interface and configure OSPF to allow all LSRs to
interconnect with each other.
# Configure PE1.
[PE1] mpls lsr-id 1.1.1.1
[PE1] mpls
[PE1-mpls] mpls te
[PE1-mpls] quit
[PE1] interface GigabitEthernet 1/0/0
[PE1-GigabitEthernet1/0/0] mpls
[PE1-GigabitEthernet1/0/0] mpls te
[PE1-GigabitEthernet1/0/0] quit
[PE1] interface GigabitEthernet 2/0/0
[PE1-GigabitEthernet2/0/0] mpls
[PE1-GigabitEthernet2/0/0] mpls te
[PE1-GigabitEthernet2/0/0] quit
# Configure the maximum reservable bandwidth and BC0 bandwidth for the link on the outbound
interface of each node. The BC0 bandwidth of links must be greater than the tunnel bandwidth
(10 Mbit/s).
# Configure PE1.
[PE1] interface GigabitEthernet 1/0/0
[PE1-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[PE1-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000
[PE1-GigabitEthernet1/0/0] quit
[PE1] interface GigabitEthernet 2/0/0
[PE1-GigabitEthernet2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[PE1-GigabitEthernet2/0/0] mpls te bandwidth bc0 100000
[PE1-GigabitEthernet2/0/0] quit
# Configure P.
[P] interface GigabitEthernet 1/0/0
[P-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[P-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000
[P-GigabitEthernet1/0/0] quit
[P] interface GigabitEthernet 2/0/0
[P-GigabitEthernet2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[P-GigabitEthernet2/0/0] mpls te bandwidth bc0 100000
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] interface GigabitEthernet 1/0/0
[PE2-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[PE2-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000
[PE2-GigabitEthernet1/0/0] quit
[PE2] interface GigabitEthernet 2/0/0
[PE2-GigabitEthernet2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
Step 5 Configure the ingress and the egress for the static bidirectional co-routed LSP of primary tunnel.
# Configure PE1 as the ingress.
[PE1] bidirectional static-cr-lsp ingress Tunnel2/0/0
[PE1-bi-static-ingress-Tunnel2/0/0] forward nexthop 10.1.3.2 out-label 80
bandwidth ct0 10000
[PE1-bi-static-ingress-Tunnel2/0/0] backward in-label 90
[PE1-bi-static-ingress-Tunnel2/0/0] quit
# Bind the tunnel interface on PE2 to the static bidirectional co-routed LSP.
[PE2] interface tunnel 2/0/0
[PE2-Tunnel2/0/0] tunnel-protocol mpls te
[PE2-Tunnel2/0/0] mpls te signal-protocol cr-static
Step 6 Configure the ingress, a transit node, and the egress for the static bidirectional co-routed LSP
of protect tunnel.
# Bind the tunnel interface on PE2 to the static bidirectional co-routed LSP.
[PE2] interface tunnel 1/0/0
[PE2-Tunnel1/0/0] tunnel-protocol mpls te
[PE2-Tunnel1/0/0] mpls te signal-protocol cr-static
[PE2-Tunnel1/0/0] mpls te passive-tunnel
[PE2-Tunnel1/0/0] mpls te binding bidirectional static-cr-lsp egress Tunnel1/0/0
[PE2-Tunnel1/0/0] destination 1.1.1.1
[PE2-Tunnel1/0/0] mpls te tunnel-id 200
[PE2-Tunnel1/0/0] mpls te commit
[PE2-Tunnel1/0/0] quit
After completing the configuration, run the display mpls te protection tunnel all verbose
command on PE1. You can see that the tunnel interface is Up.
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
mpls lsr-id 1.1.1.1
mpls
mpls te
#
bidirectional static-cr-lsp ingress Tunnel2/0/0
forward nexthop 10.1.3.2 out-label 80 bandwidth ct0 10000
backward in-label 90
#
bidirectional static-cr-lsp ingress Tunnel1/0/0
forward nexthop 10.1.1.2 out-label 20 bandwidth ct0 10000
backward in-label 20
#
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.3.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel2/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 2.2.2.2
mpls te signal-protocol cr-static
mpls te tunnel-id 100
mpls te bidirectional
mpls te protection tunnel 200 mode revertive wtr 1
mpls te commit
#
interface Tunnel1/0/0
ip address 1.1.1.9 255.255.255.255
tunnel-protocol mpls te
destination 2.2.2.2
mpls te signal-protocol cr-static
mpls te tunnel-id 200
mpls te bidirectional
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
network 10.1.3.0 0.0.0.255
network 1.1.1.1 0.0.0.0
network 2.2.2.2 0.0.0.0
network 3.3.3.3 0.0.0.0
network 1.1.1.9 0.0.0.0
#
return
l P configuration file
#
sysname P
#
mpls lsr-id 3.3.3.3
mpls
mpls te
#
bidirectional static-cr-lsp transit lsp1
forward in-label 20 nexthop 10.1.2.1 out-label 40 bandwidth ct0 10000
backward in-label 16 nexthop 10.1.1.1 out-label 20 bandwidth ct0 10000
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 10.1.2.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
network 10.1.3.0 0.0.0.255
network 1.1.1.1 0.0.0.0
network 2.2.2.2 0.0.0.0
network 3.3.3.3 0.0.0.0
network 1.1.1.9 0.0.0.0
#
return
Networking Requirements
On the network shown in Figure 3-6, LSRA, LSRB, LSRC, and LSRD are Level 2 devices that
run IS-IS.
RSVP-TE is used to establish a TE tunnel from LSRA to LSRD. The bandwidth is 20 Mbit/s.
The maximum reservable bandwidth for links along the tunnel is 100 Mbit/s. The bandwidth
constraints model is the default RDM and the BC0 bandwidth is 100 Mbit/s.
LSRA LSRD
GE1/0/0 GE1/0/0
10.1.1.1/24 30.1.1.2/24
GE1/0/0 GE1/0/0
10.1.1.2/24 POS2/0/0 POS2/0/0 30.1.1.1/24
Loopback1 20.1.1.1/24 20.1.1.2/24 Loopback1
2.2.2.9/32 3.3.3.9/32
LSRB LSRC
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IP addresses for the interfaces on each LSR and configure a loopback address
as an LSR ID.
2. Enable IS-IS globally, configure the name of network entity, change cost type, enable IS-
IS TE and enable IS-IS on all interfaces, including loopback interfaces.
3. Configure LSR ID and enable MPLS, MPLS TE, MPLS RSVP-TE, and MPLS TE CSPF
globally.
4. Enable MPLS, MPLS TE, and MPLS RSVP-TE on each interface.
5. Configure the maximum reservable bandwidth and BC bandwidth for the links on each
LSR along the tunnel.
6. Create the tunnel interface on the ingress and specify the IP address, tunnel protocol,
destination address, tunnel ID, dynamic signaling protocol RSVP-TE, and tunnel
bandwidth.
Data Preparation
To complete the configuration, you need the following data:
l IS-IS area ID of each LSR, originating system ID, and IS-IS level
l Maximum reservable bandwidth and BC bandwidth for all links along the tunnel
l Tunnel interface name, IP address, destination address, tunnel ID, tunnel signaling protocol
(RSVP-TE), and tunnel bandwidth
Configuration Procedure
1. Assign IP addresses to interfaces.
Assign an IP address and mask to each interface according to Figure 3-6. For configuration
details, see Configuration Files in this section.
2. Configure the IS-IS protocol to advertise routes.
# Configure LSRA.
[LSRA] isis 1
[LSRA-isis-1] network-entity 00.0005.0000.0000.0001.00
[LSRA-isis-1] is-level level-2
[LSRA-isis-1] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] isis enable 1
[LSRA-GigabitEthernet1/0/0] quit
[LSRA] interface loopback 1
[LSRA-LoopBack1] isis enable 1
[LSRA-LoopBack1] quit
# Configure LSRB.
[LSRB] isis 1
[LSRB-isis-1] network-entity 00.0005.0000.0000.0002.00
[LSRB-isis-1] is-level level-2
[LSRB-isis-1] quit
[LSRB] interface gigabitethernet 1/0/0
[LSRB-GigabitEthernet1/0/0] isis enable 1
[LSRB-GigabitEthernet1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] isis enable 1
[LSRB-Pos2/0/0] quit
[LSRB] interface loopback 1
[LSRB-LoopBack1] isis enable 1
[LSRB-LoopBack1] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] network-entity 00.0005.0000.0000.0003.00
[LSRC-isis-1] is-level level-2
[LSRC-isis-1] quit
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] isis enable 1
[LSRC-GigabitEthernet1/0/0] quit
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] isis enable 1
[LSRC-Pos2/0/0] quit
[LSRC] interface loopback 1
[LSRC-LoopBack1] isis enable 1
[LSRC-LoopBack1] quit
# Configure LSRD.
[LSRD] isis 1
[LSRD-isis-1] network-entity 00.0005.0000.0000.0004.00
[LSRD-isis-1] is-level level-2
[LSRD-isis-1] quit
[LSRD] interface gigabitethernet 1/0/0
[LSRD-GigabitEthernet1/0/0] isis enable 1
[LSRD-GigabitEthernet1/0/0] quit
[LSRD] interface loopback 1
[LSRD-LoopBack1] isis enable 1
[LSRD-LoopBack1] quit
After completing the configuration, run the display ip routing-table command on each
LSR. LSRs have learned routes from each other.
The following example uses the command output on LSRA.
[LSRA] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 10 Routes : 10
Destination/Mask Proto Pre Cost Flags NextHop Interface
1.1.1.9/32 Direct 0 0 D 127.0.0.1 InLoopBack0
2.2.2.9/32 ISIS-L2 15 10 D 10.1.1.2 GigabitEthernet1/0/0
3.3.3.9/32 ISIS-L2 15 20 D 10.1.1.2 GigabitEthernet1/0/0
4.4.4.9/32 ISIS-L2 15 30 D 10.1.1.2 GigabitEthernet1/0/0
10.1.1.0/24 Direct 0 0 D 10.1.1.1 GigabitEthernet1/0/0
10.1.1.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
20.1.1.0/24 ISIS-L2 15 20 D 10.1.1.2 GigabitEthernet1/0/0
30.1.1.0/24 ISIS-L2 15 30 D 10.1.1.2 GigabitEthernet1/0/0
127.0.0.0/8 Direct 0 0 D 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
3. Configure the basic MPLS functions and enable MPLS TE, RSVP-TE, and CSPF.
# Enable MPLS, MPLS TE, and RSVP-TE globally on each LSR, enable MPLS, MPLS
TE, and RSVP-TE on all tunnel interfaces, and enable CSPF in the system view on the
ingress.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] mpls
[LSRA-GigabitEthernet1/0/0] mpls te
[LSRA-GigabitEthernet1/0/0] mpls rsvp-te
[LSRA-GigabitEthernet1/0/0] quit
# Configure LSRB.
[LSRB] mpls lsr-id 2.2.2.9
[LSRB] mpls
[LSRB-mpls] mpls te
[LSRB-mpls] mpls rsvp-te
[LSRB-mpls] quit
[LSRB] interface gigabitethernet 1/0/0
[LSRB-GigabitEthernet1/0/0] mpls
[LSRB-GigabitEthernet1/0/0] mpls te
[LSRB-GigabitEthernet1/0/0] mpls rsvp-te
[LSRB-GigabitEthernet1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls
[LSRB-Pos2/0/0] mpls te
[LSRB-Pos2/0/0] mpls rsvp-te
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] mpls lsr-id 3.3.3.9
[LSRC] mpls
[LSRC-mpls] mpls te
[LSRC-mpls] mpls rsvp-te
[LSRC-mpls] quit
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] mpls
[LSRC-GigabitEthernet1/0/0] mpls te
[LSRC-GigabitEthernet1/0/0] mpls rsvp-te
[LSRC-GigabitEthernet1/0/0] quit
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] mpls
[LSRC-Pos2/0/0] mpls te
[LSRC-Pos2/0/0] mpls rsvp-te
[LSRC-Pos2/0/0] quit
# Configure LSRD.
[LSRD] mpls lsr-id 4.4.4.9
[LSRD] mpls
[LSRD-mpls] mpls te
[LSRD-mpls] mpls rsvp-te
[LSRD-mpls] quit
[LSRD] interface gigabitethernet 1/0/0
[LSRD-GigabitEthernet1/0/0] mpls
[LSRD-GigabitEthernet1/0/0] mpls te
[LSRD-GigabitEthernet1/0/0] mpls rsvp-te
[LSRD-GigabitEthernet1/0/0] quit
# Configure LSRB.
[LSRB] isis 1
[LSRB-isis-1] cost-style wide
[LSRB-isis-1] traffic-eng level-2
[LSRB-isis-1] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] cost-style wide
[LSRC-isis-1] traffic-eng level-2
[LSRC-isis-1] quit
# Configure LSRD.
[LSRD] isis 1
[LSRD-isis-1] cost-style wide
[LSRD-isis-1] traffic-eng level-2
[LSRD-isis-1] quit
# Configure LSRB.
[LSRB] interface pos2/0/0
[LSRB-Pos2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
# Configure LSRC.
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRC-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000
[LSRC-GigabitEthernet1/0/0] quit
Run the display mpls te tunnel-interface command on LSRA to view tunnel information.
[LSRA] display mpls te tunnel-interface tunnel1/0/0
No : 1
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 0 LSP Index : 2048
Session ID : 100 LSP ID : 1
LSR Role : Ingress Lsp Type : Primary
Ingress LSR ID : 1.1.1.9
Egress LSR ID : 4.4.4.9
In-Interface : -
Out-Interface : GE1/0/0
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : -
ER-Hop Table Index : - AR-Hop Table Index: -
C-Hop Table Index : 0
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 1024
Created Time : 2010/06/07 16:01:18 UTC-08:00
RSVP LSP Type : -
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Reserved
CT0 Bandwidth(Kbit/sec) : 2000 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x3 Protected Flag : 0x0
Bypass In Use : Not Exists
Bypass Tunnel Id : -
BypassTunnel : -
Bypass LSP ID : - FrrNextHop : -
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
Run the display mpls te cspf tedb all command on LSRA to view TEDB link information.
[LSRA] display mpls te cspf tedb all
Maximum Node Supported: 128 Maximum Link Supported: 256
Current Total Node Number: 4 Current Total Link Number: 6
Id Router-Id IGP Process-Id Area Link-Count
1 3.3.3.9 ISIS 1 Level-2 2
2 2.2.2.9 ISIS 1 Level-2 2
3 4.4.4.9 ISIS 1 Level-2 1
4 1.1.1.9 ISIS 1 Level-2 1
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
interface GigabitEthernet1/0/0
ip address 30.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface Pos2/0/0
link-protocol ppp
ip address 20.1.1.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
isis enable 1
#
return
Networking Requirements
An MPLS TE tunnel does not automatically import traffic. To import traffic to an MPLS TE
tunnel, you can configure Interior Gateway Protocol (IGP) shortcut. IGP shortcut enables a
device to use a TE tunnel as a logical link for IGP route calculation. You can set a proper metric
for an MPLS TE tunnel so that the route passing through the MPLS TE tunnel is selected with
precedence, allowing traffic to be imported to the MPLS TE tunnel.
On the network shown in Figure 3-7, the label switching routers (LSRs) use Intermediate
System-Intermediate System (IS-IS) to communicate with each other. An MPLS TE tunnel is
established from LSRA and LSRD. The MPLS TE tunnel passes through LSRC. The number
marked on each link indicates the link cost. If LSRA has traffic destined for LSRE and LSRD,
LSRA uses GE 1/0/0 to send the traffic based on the IS-IS route selection result. If the bandwidth
of the link between LSRA and LSRB is 10 Mbit/s and LSRA requires 5 Mbit/s bandwidth to
send traffic to LSRD and 6 Mbit/s bandwidth to send traffic to LSRE, the link between LSRA
and LSRB is congested. As a result, traffic transmission is delayed or packet loss occurs.
To resolve this problem, configure IGP shortcut on the tunnel interface of LSRA to import traffic
destined for LSRD to the MPLS TE tunnel. Then some traffic destined for LSRD is forwarded
through GE 1/0/1. Therefore, network congestion is avoided.
NOTE
After IGP shortcut is configured on the tunnel interface of LSRA, LSRA does not advertise the MPLS TE
tunnel to its peers as a route. The MPLS TE tunnel is used only for local route calculation.
Loopback1
2.2.2.2/32
LSRE
LSRB
GE1/0/0
10.1.1.2/24
GE1/0/1
GE1/0/0 10.1.3.1/24
10.1.1.1/24 10
LSRA
Loopback1
10
1.1.1.1/32 TE Metric=10 GE1/0/0
GE1/0/1 10.1.3.2/24
10.1.2.1/24 15 LSRD
Loopback1
GE1/0/0 10 4.4.4.4/32
10.1.2.2/24 GE1/0/1
GE1/0/1
LSRC 10.1.4.2/24
10.1.4.1/24
Loopback1
3.3.3.3/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IP addresses for the LSR interfaces (including loopback interfaces), as shown
in Figure 3-7.
2. Enable IS-IS on the LSRs and interfaces, including loopback interfaces, and set a cost for
each IS-IS interface, as shown in Figure 3-7.
3. Establish a Resource Reservation Protocol (RSVP)-TE tunnel from LSRA to LSRD and
configure the RSVP-TE tunnel to pass through LSRC.
4. Enable IGP shortcut on the TE tunnel interface of LSRA and configure an IGP metric for
the TE tunnel, as shown in Figure 3-7.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address to each interface.
Configure an IP address for each interface, as shown in Figure 3-7, and create a loopback
interface on each LSR. For configuration details, see Configuration Files in this section.
Create an IS-IS process on each LSR, configure a network entity title (NET) name and an IS-IS
level for the IS-IS process, set the cost style to wide, enable IS-IS on each interface, and set a
cost for each interface.
# Configure LSRA.
<LSRA> system-view
[LSRA] isis 1
[LSRA-isis-1] network-entity 00.0005.0000.0000.0001.00
[LSRA-isis-1] is-level level-2
[LSRA-isis-1] cost-style wide
[LSRA-isis-1] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] isis enable 1
[LSRA-GigabitEthernet1/0/0] isis cost 10
[LSRA-GigabitEthernet1/0/0] quit
[LSRA] interface gigabitethernet 1/0/1
[LSRA-GigabitEthernet1/0/1] isis enable 1
[LSRA-GigabitEthernet1/0/1] isis cost 15
[LSRA-GigabitEthernet1/0/1] quit
[LSRA] interface loopback 1
[LSRA-LoopBack1] isis enable 1
[LSRA-LoopBack1] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] isis 1
# Configure LSRC.
<LSRC> system-view
[LSRC] isis 1
[LSRC-isis-1] network-entity 00.0005.0000.0000.0003.00
[LSRC-isis-1] is-level level-2
[LSRC-isis-1] cost-style wide
[LSRC-isis-1] quit
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] isis enable 1
[LSRC-GigabitEthernet1/0/0] isis cost 15
[LSRC-GigabitEthernet1/0/0] quit
[LSRC] interface gigabitethernet 1/0/1
[LSRC-GigabitEthernet1/0/1] isis enable 1
[LSRC-GigabitEthernet1/0/1] isis cost 10
[LSRC-GigabitEthernet1/0/1] quit
[LSRC] interface loopback 1
[LSRC-LoopBack1] isis enable 1
[LSRC-LoopBack1] quit
# Configure LSRD.
<LSRD> system-view
[LSRD] isis 1
[LSRD-isis-1] network-entity 00.0005.0000.0000.0004.00
[LSRD-isis-1] is-level level-2
[LSRD-isis-1] cost-style wide
[LSRD-isis-1] quit
[LSRD] interface gigabitethernet 1/0/0
[LSRD-GigabitEthernet1/0/0] isis enable 1
[LSRD-GigabitEthernet1/0/0] isis cost 10
[LSRD-GigabitEthernet1/0/0] quit
[LSRD] interface gigabitethernet 1/0/1
[LSRD-GigabitEthernet1/0/1] isis enable 1
[LSRD-GigabitEthernet1/0/1] isis cost 10
[LSRD-GigabitEthernet1/0/1] quit
[LSRD] interface loopback 1
[LSRD-LoopBack1] isis enable 1
[LSRD-LoopBack1] quit
After you complete the preceding configurations, run the display ip routing-table command
on LSRA. The command output shows that the next-hop address of the route destined for LSRD
is 10.1.1.2 and the outbound interface of this route is GE 1/0/0.
[LSRA] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 12 Routes : 12
Step 3 Configure basic MPLS functions and enable MPLS TE, RSVP-TE, and Constraint Shortest Path
First (CSPF).
Enable MPLS, MPLS TE, and RSVP-TE on each LSR and their interfaces along the tunnel, and
enable CSPF in the MPLS view of LSRA.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface gigabitethernet 1/0/1
[LSRA-GigabitEthernet1/0/1] mpls
[LSRA-GigabitEthernet1/0/1] mpls te
[LSRA-GigabitEthernet1/0/1] mpls rsvp-te
[LSRA-GigabitEthernet1/0/1] quit
# Configure LSRC.
[LSRC] mpls lsr-id 3.3.3.3
[LSRC] mpls
[LSRC-mpls] mpls te
[LSRC-mpls] mpls rsvp-te
[LSRC-mpls] quit
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] mpls
[LSRC-GigabitEthernet1/0/0] mpls te
[LSRC-GigabitEthernet1/0/0] mpls rsvp-te
[LSRC-GigabitEthernet1/0/0] quit
[LSRC] interface gigabitethernet 1/0/1
[LSRC-GigabitEthernet1/0/1] mpls
[LSRC-GigabitEthernet1/0/1] mpls te
[LSRC-GigabitEthernet1/0/1] mpls rsvp-te
[LSRC-GigabitEthernet1/0/1] quit
# Configure LSRD.
[LSRD] mpls lsr-id 4.4.4.4
[LSRD] mpls
[LSRD-mpls] mpls te
[LSRD-mpls] mpls rsvp-te
[LSRD-mpls] quit
[LSRD] interface gigabitethernet 1/0/1
[LSRD-GigabitEthernet1/0/1] mpls
[LSRD-GigabitEthernet1/0/1] mpls te
[LSRD-GigabitEthernet1/0/1] mpls rsvp-te
[LSRD-GigabitEthernet1/0/1] quit
# Configure LSRA.
[LSRA] isis 1
[LSRA-isis-1] traffic-eng level-2
[LSRA-isis-1] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] traffic-eng level-2
[LSRC-isis-1] quit
# Configure LSRD.
[LSRD] isis 1
[LSRD-isis-1] traffic-eng level-2
[LSRD-isis-1] quit
# Configure LSRA.
[LSRA] interface gigabitethernet 1/0/1
[LSRA-GigabitEthernet1/0/1] mpls te bandwidth max-reservable-bandwidth 100000
[LSRA-GigabitEthernet1/0/1] mpls te bandwidth bc0 80000
[LSRA-GigabitEthernet1/0/1] quit
# Configure LSRC.
[LSRC] interface gigabitethernet 1/0/1
[LSRC-GigabitEthernet1/0/1] mpls te bandwidth max-reservable-bandwidth 100000
[LSRC-GigabitEthernet1/0/1] mpls te bandwidth bc0 80000
[LSRC-GigabitEthernet1/0/1] quit
# Configure LSRA.
[LSRA] interface tunnel 1/0/0
[LSRA-Tunnel1/0/0] ip address unnumbered interface LoopBack1
[LSRA-Tunnel1/0/0] tunnel-protocol mpls te
[LSRA-Tunnel1/0/0] destination 4.4.4.4
[LSRA-Tunnel1/0/0] mpls te tunnel-id 100
[LSRA-Tunnel1/0/0] mpls te signal-protocol rsvp-te
[LSRA-Tunnel1/0/0] mpls te bandwidth ct0 50000
[LSRA-Tunnel1/0/0] mpls te commit
Enable IGP shortcut on a TE tunnel interface, set the absolute IGP metric to 10, and enable IS-
IS.
# Configure LSRA.
[LSRA-Tunnel1/0/0] mpls te igp shortcut isis
[LSRA-Tunnel1/0/0] mpls te igp metric absolute 10
[LSRA-Tunnel1/0/0] isis enable 1
[LSRA-Tunnel1/0/0] mpls te commit
[LSRA-Tunnel1/0/0] quit
# Run the display ip routing-table command on LSRA. The command output shows that the
next-hop address of the route destined for LSRD is 1.1.1.1 and the outbound interface of this
route is tunnel 1/0/0. The traffic destined for LSRD has been imported to the MPLS TE tunnel.
[LSRA] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 12 Routes : 13
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
isis enable 1
isis cost 10
#
interface GigabitEthernet1/0/1
undo shutdown
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.2.2 255.255.255.0
isis enable 1
isis cost 15
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.4.1 255.255.255.0
isis enable 1
isis cost 10
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 80000
mpls rsvp-te
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
isis enable 1
#
return
Networking Requirements
An MPLS TE tunnel does not automatically import traffic. To import traffic to an MPLS TE
tunnel, you can configure forwarding adjacency. Unlike Interior Gateway Protocol (IGP)
shortcut, forwarding adjacency enables a device to advertise a TE tunnel to its peers as an IGP
route. You can set a proper metric for an MPLS TE tunnel so that the route passing through the
MPLS TE tunnel is preferred, allowing traffic to be imported to the MPLS TE tunnel.
On the network shown in Figure 3-8, the label switching routers (LSRs) use Intermediate
System-Intermediate System (IS-IS) to communicate with each other. An MPLS TE tunnel is
established from LSRA and LSRD. The MPLS TE tunnel passes through LSRC. The number
marked on each link indicates the link cost. If LSRA and LSRE have traffic destined for LSRD,
the traffic passes through the link between LSRB and LSRD based on the IS-IS route selection
result. If the bandwidth of the link between LSRB and LSRD is 5 Mbit/s and both LSRA and
LSRE require 5 Mbit/s bandwidth to send traffic to LSRD, the link between LSRB and LSRD
is congested. As a result, traffic transmission is delayed or packet loss occurs.
To resolve this problem, configure forwarding adjacency on the MPLS TE tunnel interface of
LSRA. Then traffic from LSRA to LSRD is forwarded over the MPLS TE tunnel, whereas some
traffic from LSRE to LSRD is forwarded by LSRB and the other traffic is sent to the LSRA and
forwarded over the MPLS TE tunnel. Therefore, traffic congestion is prevented over the link
between LSRB and LSRD.
NOTE
After you configure forwarding adjacency, LSRA advertises the MPLS TE tunnel to its peer as an IS-IS
route. Because IS-IS requires bidirectional link detection, the MPLS TE tunnel from LSRD to LSRA must
be established and forwarding adjacency must be configured on the tunnel interface of LSRD.
Loopback1 Loopback1
10 GE1/0/2 LSRB
LSRE
GE1/0/1 GE1/0/1
GE1/0/0
GE1/0/0
10
10 10
GE1/0/2 GE1/0/0
GE1/0/0
TE Metric=10
Loopback1 Loopback1
LSRA GE1/0/1 LSRC GE1/0/1 LSRD
15 10
GE1/0/0 GE1/0/1
Loopback1
GE 1/0/0 10.1.5.2/24
GE 1/0/1 10.1.6.1/24
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IP addresses for the LSR interfaces (including loopback interfaces), as shown
in Figure 3-8.
2. Enable IS-IS on the LSRs and interfaces, including loopback interfaces, and set a cost for
each IS-IS interface, as shown in Figure 3-8.
3. Establish a Resource Reservation Protocol (RSVP)-TE tunnel from LSRA to LSRD and
an RSVP-TE tunnel from LSRD to LSRA, and configure the RSVP-TE tunnels to pass
through LSRC.
4. Enable forwarding adjacency on the TE tunnel interfaces of LSRA and LSRD, and
configure an IGP metric for each TE tunnel, as shown in Figure 3-8.
Data Preparation
To complete the configuration, you need the following data:
l IP address of each interface, as shown in Figure 3-8
l IS-IS area ID, originating system ID, and IS-IS level of each LSR
l Cost of each IS-IS interface, as shown in Figure 3-8
l ID of each LSR (the address of the loopback interface on each LSR is used as the LSR ID)
l Maximum reservable link bandwidth (100000 kbit/s) and BC0 bandwidth (80000 kbit/s)
of each outbound interface on each MPLS TE tunnel
l Number (tunnel 1/0/0) and IP address (borrowed from a loopback interface) of the MPLS
TE tunnel interface on LSRA, and ID (100), destination address (4.4.4.4), signaling
protocol (RSVP-TE), and bandwidth (50000 kbit/s) of an MPLS TE tunnel
l Number (tunnel 1/0/0) and IP address (borrowed from a loopback interface) of the MPLS
TE tunnel interface on LSRD, and ID (101), destination address (1.1.1.1), signaling
protocol (RSVP-TE), and bandwidth (50000 kbit/s) of an MPLS TE tunnel
l Absolute IGP metric (10) of each MPLS TE tunnel
Procedure
Step 1 Assign an IP address to each interface.
Configure an IP address for each interface, as shown in Figure 3-8, and create a loopback
interface on each LSR. For configuration details, see Configuration Files in this section
Step 2 Configure IS-IS to advertise routes.
Create an IS-IS process on each LSR, configure a network entity title (NET) name and an IS-IS
level for the IS-IS process, set the cost style to wide, enable IS-IS on each interface, and set a
cost for each interface.
# Configure LSRA.
<LSRA> system-view
[LSRA] isis 1
[LSRA-isis-1] network-entity 00.0005.0000.0000.0001.00
[LSRA-isis-1] is-level level-2
[LSRA-isis-1] cost-style wide
[LSRA-isis-1] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] isis enable 1
[LSRA-GigabitEthernet1/0/0] isis cost 10
[LSRA-GigabitEthernet1/0/0] quit
[LSRA] interface gigabitethernet 1/0/1
[LSRA-GigabitEthernet1/0/1] isis enable 1
[LSRA-GigabitEthernet1/0/1] isis cost 15
[LSRA-GigabitEthernet1/0/1] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] isis 1
[LSRB-isis-1] network-entity 00.0005.0000.0000.0002.00
[LSRB-isis-1] is-level level-2
[LSRB-isis-1] cost-style wide
[LSRB-isis-1] quit
[LSRB] interface gigabitethernet 1/0/0
[LSRB-GigabitEthernet1/0/0] isis enable 1
[LSRB-GigabitEthernet1/0/0] isis cost 10
[LSRB-GigabitEthernet1/0/0] quit
[LSRB] interface gigabitethernet 1/0/1
[LSRB-GigabitEthernet1/0/1] isis enable 1
[LSRB-GigabitEthernet1/0/1] isis cost 10
[LSRB-GigabitEthernet1/0/1] quit
[LSRB] interface gigabitethernet 1/0/2
[LSRB-GigabitEthernet1/0/2] isis enable 1
[LSRB-GigabitEthernet1/0/2] isis cost 10
[LSRB-GigabitEthernet1/0/2] quit
[LSRB] interface loopback 1
[LSRB-LoopBack1] isis enable 1
[LSRB-LoopBack1] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] isis 1
[LSRC-isis-1] network-entity 00.0005.0000.0000.0003.00
[LSRC-isis-1] is-level level-2
[LSRC-isis-1] cost-style wide
[LSRC-isis-1] quit
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] isis enable 1
[LSRC-GigabitEthernet1/0/0] isis cost 15
[LSRC-GigabitEthernet1/0/0] quit
[LSRC] interface gigabitethernet 1/0/1
[LSRC-GigabitEthernet1/0/1] isis enable 1
[LSRC-GigabitEthernet1/0/1] isis cost 10
[LSRC-GigabitEthernet1/0/1] quit
[LSRC] interface loopback 1
[LSRC-LoopBack1] isis enable 1
[LSRC-LoopBack1] quit
# Configure LSRD.
<LSRD> system-view
[LSRD] isis 1
[LSRD-isis-1] network-entity 00.0005.0000.0000.0004.00
[LSRD-isis-1] is-level level-2
[LSRD-isis-1] cost-style wide
[LSRD-isis-1] quit
[LSRD] interface gigabitethernet 1/0/0
[LSRD-GigabitEthernet1/0/0] isis enable 1
[LSRD-GigabitEthernet1/0/0] isis cost 10
[LSRD-GigabitEthernet1/0/0] quit
[LSRD] interface gigabitethernet 1/0/1
[LSRD-GigabitEthernet1/0/1] isis enable 1
[LSRD-GigabitEthernet1/0/1] isis cost 10
[LSRD-GigabitEthernet1/0/1] quit
# Configure LSRE.
<LSRE> system-view
[LSRE] isis 1
[LSRE-isis-1] network-entity 00.0005.0000.0000.0005.00
[LSRE-isis-1] is-level level-2
[LSRE-isis-1] cost-style wide
[LSRE-isis-1] quit
[LSRE] interface gigabitethernet 1/0/0
[LSRE-GigabitEthernet1/0/0] isis enable 1
[LSRE-GigabitEthernet1/0/0] isis cost 10
[LSRE-GigabitEthernet1/0/0] quit
[LSRE] interface gigabitethernet 1/0/1
[LSRE-GigabitEthernet1/0/1] isis enable 1
[LSRE-GigabitEthernet1/0/1] isis cost 10
[LSRE-GigabitEthernet1/0/1] quit
[LSRE] interface loopback 1
[LSRE-LoopBack1] isis enable 1
[LSRE-LoopBack1] quit
After you complete the preceding configurations, run the display ip routing-table command
on LSRA. The command output shows that the next-hop address of the route destined for LSRD
is 10.1.1.2 and the outbound interface of this route is GE 1/0/0.
[LSRA] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 16 Routes : 17
# Run the display ip routing-table command on LSRE. The command output shows that the
next-hop address of the route destined for LSRD is 10.1.6.2 and the outbound interface of this
route is GE 1/0/1.
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 15 Routes : 16
Step 3 Configure basic MPLS functions and enable MPLS TE, RSVP-TE, and Constraint Shortest Path
First (CSPF).
Enable MPLS, MPLS TE, and RSVP-TE on each LSR and their interfaces along each tunnel,
and enable CSPF in the MPLS view of LSRA and LSRD.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface gigabitethernet 1/0/1
[LSRA-GigabitEthernet1/0/1] mpls
[LSRA-GigabitEthernet1/0/1] mpls te
[LSRA-GigabitEthernet1/0/1] mpls rsvp-te
[LSRA-GigabitEthernet1/0/1] quit
# Configure LSRC.
[LSRC] mpls lsr-id 3.3.3.3
[LSRC] mpls
[LSRC-mpls] mpls te
# Configure LSRD.
[LSRD] mpls lsr-id 4.4.4.4
[LSRD] mpls
[LSRD-mpls] mpls te
[LSRD-mpls] mpls rsvp-te
[LSRD-mpls] quit
[LSRD] interface gigabitethernet 1/0/1
[LSRD-GigabitEthernet1/0/1] mpls
[LSRD-GigabitEthernet1/0/1] mpls te
[LSRD-GigabitEthernet1/0/1] mpls rsvp-te
[LSRD-GigabitEthernet1/0/1] mpls te cspf
[LSRD-GigabitEthernet1/0/1] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] traffic-eng level-2
[LSRC-isis-1] quit
# Configure LSRD.
[LSRD] isis 1
[LSRD-isis-1] traffic-eng level-2
[LSRD-isis-1] quit
# Configure LSRC.
[LSRC] interface gigabitethernet 1/0/1
[LSRC-GigabitEthernet1/0/1] mpls te bandwidth max-reservable-bandwidth 100000
[LSRC-GigabitEthernet1/0/1] mpls te bandwidth bc0 80000
[LSRC-GigabitEthernet1/0/1] quit
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRC-GigabitEthernet1/0/0] mpls te bandwidth bc0 80000
[LSRC-GigabitEthernet1/0/0] quit
# Configure LSRD.
# Configure LSRD.
[LSRD] interface tunnel 1/0/0
[LSRD-Tunnel1/0/0] ip address unnumbered interface LoopBack1
[LSRD-Tunnel1/0/0] tunnel-protocol mpls te
[LSRD-Tunnel1/0/0] destination 1.1.1.1
[LSRD-Tunnel1/0/0] mpls te tunnel-id 101
[LSRD-Tunnel1/0/0] mpls te signal-protocol rsvp-te
[LSRD-Tunnel1/0/0] mpls te bandwidth ct0 50000
[LSRD-Tunnel1/0/0] mpls te commit
# Configure LSRD.
[LSRD-Tunnel1/0/0] mpls te igp advertise
[LSRD-Tunnel1/0/0] mpls te igp metric absolute 10
[LSRD-Tunnel1/0/0] isis enable 1
[LSRD-Tunnel1/0/0] mpls te commit
[LSRD-Tunnel1/0/0] quit
# Run the display ip routing-table command on LSRE. The command output shows that there
are two equal-cost routes destined for LSRD. The next-hop address and outbound interface of
one route are 10.1.6.2 and GE 1/0/1, and the next-hop address and outbound interface of the
other route are 10.1.5.1 and GE 1/0/0. Traffic destined for LSRD is forwarded over two paths.
The traffic sent out from GE 1/0/0 is forwarded to LSRA and over the MPLS TE tunnel.
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 15 Routes : 18
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
isis enable 1
isis cost 10
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.2.1 255.255.255.0
isis enable 1
isis cost 15
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 80000
mpls rsvp-te
#
interface GigabitEthernet1/0/2
undo shutdown
ip address 10.1.5.1 255.255.255.0
isis enable 1
isis cost 10
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 4.4.4.4
mpls te tunnel-id 100
mpls te bandwidth ct0 50000
mpls te igp advertise
mpls te igp metric absolute 10
mpls te commit
isis enable 1
#
return
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 80000
mpls rsvp-te
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
isis enable 1
#
return
cost-style wide
network-entity 00.0005.0000.0000.0005.00
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.5.2 255.255.255.0
isis enable 1
isis cost 10
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.6.1 255.255.255.0
isis enable 1
isis cost 10
#
interface LoopBack1
ip address 5.5.5.5 255.255.255.255
isis enable 1
#
return
Networking Requirements
Two CR-LSPs are established between PE1 and PE2 on the network shown in Figure 3-9. One
CR-LSP is bound to a working tunnel configured on Tunnel 1/0/10, and the other CR-LSP is
bound to a protection tunnel configured on Tunnel 1/0/11.
These two tunnels can form a tunnel protection group to protect the working tunnel. This allows
MPLS TE to use its own detection mechanism to detect faults instead of other detection
mechanisms, such as BFD and OAM.
Loopback1
3.3.3.3/32
GE1/0/0 GE1/0/1
10.1.2.2/30 10.1.4.1/30
P2
GE1/0/1 Loopback1
2.2.2.2/32 GE1/0/1
10.1.2.1/30 10.1.4.2/30
GE1/0/0 GE1/0/0
Loopback1 10.1.1.1/30 10.1.3.2/30 Loopback1
1.1.1.1/32 GE1/0/0 GE1/0/1 4.4.4.4/32
PE1 10.1.1.2/30 P1 10.1.3.1/30 PE2
Working tunnel
Protection tunnel
Configuration Roadmap
The configuration roadmap is as follows:
1. Assign an IP address to each interface on every device shown in Figure 3-9 and set IS-IS
parameters to ensure network layer connectivity.
2. Configure RSVP-TE tunnels between PE1 and PE2 over separate explicit paths.
3. Bind the protection tunnel to the working tunnel to form a tunnel protection group.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address to each interface shown in Figure 3-9 and create a loopback interface on
each node. For configuration details, see Configuration Files in this section.
Step 2 Configure IS-IS to advertise the route to each network segment of each interface and to advertise
the host route to each loopback address (used as an LSR ID).
Configure IS-IS on each node to ensure device connectivity. For configuration details, see
Configuration Files in this section.
Step 3 Configure MPLS, MPLS TE, and RSVP-TE on each node and interface, and enable CSPF on
the ingress PE1.
# Configure PE1.
<PE1> system-view
[PE1] mpls lsr-id 1.1.1.1
[PE1] mpls
[PE1-mpls] mpls te
[PE1-mpls] mpls rsvp-te
[PE1-mpls] mpls te cspf
[PE1-mpls] quit
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] mpls
[PE1-GigabitEthernet1/0/0] mpls te
[PE1-GigabitEthernet1/0/0] mpls rsvp-te
[PE1-GigabitEthernet1/0/0] quit
[PE1] interface gigabitethernet 1/0/1
[PE1-GigabitEthernet1/0/1] mpls
[PE1-GigabitEthernet1/0/1] mpls te
[PE1-GigabitEthernet1/0/1] mpls rsvp-te
[PE1-GigabitEthernet1/0/1] quit
# Configure P1.
<P1> system-view
[P1] mpls lsr-id 2.2.2.2
[P1] mpls
[P1-mpls] mpls te
[P1-mpls] mpls rsvp-te
[P1-mpls] quit
[P1] interface gigabitethernet 1/0/0
[P1-GigabitEthernet1/0/0] mpls
[P1-GigabitEthernet1/0/0] mpls te
[P1-GigabitEthernet1/0/0] mpls rsvp-te
[P1-GigabitEthernet1/0/0] quit
[P1] interface gigabitethernet 1/0/1
[P1-GigabitEthernet1/0/1] mpls
[P1-GigabitEthernet1/0/1] mpls te
[P1-GigabitEthernet1/0/1] mpls rsvp-te
[P1-GigabitEthernet1/0/1] quit
# Configure P2.
<P2> system-view
[P2] mpls lsr-id 3.3.3.3
[P2] mpls
[P2-mpls] mpls te
[P2-mpls] mpls rsvp-te
[P2-mpls] quit
[P2] interface gigabitethernet 1/0/0
[P2-GigabitEthernet1/0/0] mpls
[P2-GigabitEthernet1/0/0] mpls te
[P2-GigabitEthernet1/0/0] mpls rsvp-te
[P2-GigabitEthernet1/0/0] quit
[P2] interface gigabitethernet 1/0/1
[P2-GigabitEthernet1/0/1] mpls
[P2-GigabitEthernet1/0/1] mpls te
[P2-GigabitEthernet1/0/1] mpls rsvp-te
[P2-GigabitEthernet1/0/1] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls lsr-id 4.4.4.4
[PE2] mpls
[PE2-mpls] mpls te
[PE2-mpls] mpls rsvp-te
[PE2-mpls] quit
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] mpls
[PE2-GigabitEthernet1/0/0] mpls te
[PE2-GigabitEthernet1/0/0] mpls rsvp-te
[PE2-GigabitEthernet1/0/0] quit
[PE2] interface gigabitethernet 1/0/1
[PE2-GigabitEthernet1/0/1] mpls
[PE2-GigabitEthernet1/0/1] mpls te
[PE2-GigabitEthernet1/0/1] mpls rsvp-te
[PE2-GigabitEthernet1/0/1] quit
# Configure P1.
[P1] isis 1
[P1-isis-1] cost-style wide
[P1-isis-1] traffic-eng level-2
[P1-isis-1] quit
# Configure P2.
[P2] isis 1
[P2-isis-1] cost-style wide
[P2-isis-1] traffic-eng level-2
[P2-isis-1] quit
# Configure PE2.
[PE2] isis 1
[PE2-isis-1] cost-style wide
[PE2-isis-1] traffic-eng level-2
[PE2-isis-1] quit
Step 5 Configure the maximum reservable bandwidth and BC0 bandwidth for a link connected to the
outbound interface of each node.
# Configure PE1.
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
# Configure P1.
[P1] interface gigabitethernet 1/0/1
[P1-GigabitEthernet1/0/1] mpls te bandwidth max-reservable-bandwidth 100000
[P1-GigabitEthernet1/0/1] mpls te bandwidth bc0 100000
[P1-GigabitEthernet1/0/1] quit
# Configure P2.
[P2] interface gigabitethernet 1/0/1
[P2-GigabitEthernet1/0/1] mpls te bandwidth max-reservable-bandwidth 100000
[P2-GigabitEthernet1/0/1] mpls te bandwidth bc0 100000
[P2-GigabitEthernet1/0/1] quit
# Configure PE1.
[PE1] explicit-path tope2-main
[PE1-explicit-path-tope2-main] next hop 10.1.1.2
[PE1-explicit-path-tope2-main] next hop 10.1.3.2
[PE1-explicit-path-tope2-main] quit
[PE1] explicit-path tope2-backup
[PE1-explicit-path-tope2-backup] next hop 10.1.2.2
[PE1-explicit-path-tope2-backup] next hop 10.1.4.2
[PE1-explicit-path-tope2-backup] quit
Create tunnel interfaces for the working and protection tunnels on PE1. Configure an IP address
of a tunnel interface, a tunnel protocol, a destination IP address, a tunnel ID, a dynamic signaling
protocol, and bandwidth for each tunnel. Bind each of the tunnels to an explicit path.
# Configure PE1.
[PE1] interface tunnel 1/0/10
[PE1-Tunnel1/0/10] ip address unnumbered interface loopback 1
[PE1-Tunnel1/0/10] tunnel-protocol mpls te
[PE1-Tunnel1/0/10] destination 4.4.4.4
[PE1-Tunnel1/0/10] mpls te tunnel-id 100
[PE1-Tunnel1/0/10] mpls te signal-protocol rsvp-te
[PE1-Tunnel1/0/10] mpls te bandwidth ct0 20000
[PE1-Tunnel1/0/10] mpls te path explicit-path tope2-main
[PE1-Tunnel1/0/10] mpls te commit
[PE1-Tunnel1/0/10] quit
[PE1] interface tunnel 1/0/11
[PE1-Tunnel1/0/11] ip address unnumbered interface loopback 1
[PE1-Tunnel1/0/11] tunnel-protocol mpls te
[PE1-Tunnel1/0/11] destination 4.4.4.4
[PE1-Tunnel1/0/11] mpls te tunnel-id 101
[PE1-Tunnel1/0/11] mpls te signal-protocol rsvp-te
[PE1-Tunnel1/0/11] mpls te bandwidth ct0 20000
[PE1-Tunnel1/0/11] mpls te path explicit-path tope2-backup
[PE1-Tunnel1/0/11] mpls te commit
[PE1-Tunnel1/0/11] quit
# Configure the tunnel on Tunnel 1/0/10 as a working tunnel and the tunnel on Tunnel 1/0/11
as a protection tunnel. Configure both of them to work in revertive mode. Set the WTR time to
120s.
[PE1] interface tunnel 1/0/10
[PE1-Tunnel1/0/10] mpls te protection tunnel 101 mode revertive wtr 4
[PE1-Tunnel1/0/10] mpls te commit
[PE1-Tunnel1/0/10] quit
# After completing the configuration, run the display mpls te protection tunnel tunnel-id
verbose command on PE1 to view details about the tunnel protection group.
[PE1] display mpls te protection tunnel 100 verbose
----------------------------------------------------------------
Verbose information about the No.1 protection-group
----------------------------------------------------------------
Work-tunnel id : 100
Protect-tunnel id : 101
Work-tunnel name : Tunnel1/0/10
Protect-tunnel name : Tunnel1/0/11
Work-tunnel reverse-lsp : --
Protect-tunnel reverse-lsp : --
Bridge type : 1:1
Switch type : unidirectional
Switch result : work-tunnel
Tunnel using Best-Effort : none
Tunnel using Ordinary : none
Work-tunnel frr in use : none
Work-tunnel defect state : non-defect
Protect-tunnel defect state : non-defect
Work-tunnel forward-lsp defect state : non-defect
Protect-tunnel forward-lsp defect state : non-defect
Work-tunnel reverse-lsp defect state : non-defect
Protect-tunnel reverse-lsp defect state : non-defect
HoldOff : 0ms
WTR : 120s
Mode : revertive
Using same path : --
Local state : no request
Far end request : no request
# Run the display interface tunnel interface-number command on PE1 to view information
about tunnel interfaces of the working and protection tunnels.
[PE1] display interface tunnel 1/0/10
Tunnel1/0/10 current state : UP
Line protocol current state : UP
Last line protocol up time : 2012-05-28 17:33:00 UTC-08:00
Description:HUAWEI, Tunnel1/0/10 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is unnumbered, using address of LoopBack1(1.1.1.1/32)
Encapsulation is TUNNEL, loopback not set
Tunnel destination 4.4.4.4
Tunnel up/down statistics 1
Tunnel protocol/transport MPLS/MPLS, ILM is available,
primary tunnel id is 0x800803, secondary tunnel id is 0x800802
Switch Result is working tunnel
Current system time: 2012-05-28 17:55:55-08:00
300 seconds output rate 0 bits/sec, 0 packets/sec
0 seconds output rate 0 bits/sec, 0 packets/sec
0 packets output, 0 bytes
0 output error
0 output drop
ct0:0 packets output, 0 bytes
0 output error
0 packets output drop
Input bandwidth utilization : --
Output bandwidth utilization : --
[PE1] display interface tunnel 1/0/11
Tunnel1/0/11 current state : UP
Line protocol current state : UP
Last line protocol up time : 2012-05-28 17:33:00 UTC-08:00
Description:HUAWEI, Tunnel1/0/11 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is unnumbered, using address of LoopBack1(1.1.1.1/32)
Encapsulation is TUNNEL, loopback not set
Tunnel destination 4.4.4.4
Tunnel up/down statistics 1
Tunnel protocol/transport MPLS/MPLS, ILM is available,
primary tunnel id is 0x800802, secondary tunnel id is 0x0
Current system time: 2012-05-28 17:56:20-08:00
300 seconds output rate 0 bits/sec, 0 packets/sec
0 seconds output rate 0 bits/sec, 0 packets/sec
0 packets output, 0 bytes
0 output error
0 output drop
ct0:0 packets output, 0 bytes
0 output error
0 packets output drop
Input bandwidth utilization : --
Output bandwidth utilization : --
# Run the tracert lsp te tunnel interface-number command on PE1 to view information about
the path of the working tunnel.
[PE1] tracert lsp te Tunnel 1/0/10
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/10 , press CTRL_C
to break.
TTL Replier Time Type Downstream
0 Ingress 10.1.1.2/[1026 ]
1 10.1.1.2 80 ms Transit 10.1.3.2/[3 ]
2 4.4.4.4 70 ms Egress
# Run the shutdown command on GE 1/0/0/ of PE1 to simulate a working tunnel failure.
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] shutdown
[PE1-GigabitEthernet1/0/0] quit
# Run the display interface tunnel interface-number command on PE1 to view information
about tunnel interfaces of the working and protection tunnels.
[PE1] display interface tunnel 1/0/10
Tunnel1/0/10 current state : UP
Line protocol current state : UP
Last line protocol up time : 2012-05-28 17:33:00 UTC-08:00
Description:HUAWEI, Tunnel1/0/10 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is unnumbered, using address of LoopBack1(1.1.1.1/32)
Encapsulation is TUNNEL, loopback not set
Tunnel destination 4.4.4.4
Tunnel up/down statistics 1
Tunnel protocol/transport MPLS/MPLS, ILM is available,
primary tunnel id is 0x0, secondary tunnel id is 0x800802
Switch Result is protection tunnel
Current system time: 2012-05-28 18:05:20-08:00
300 seconds output rate 0 bits/sec, 0 packets/sec
0 seconds output rate 0 bits/sec, 0 packets/sec
0 packets output, 0 bytes
0 output error
0 output drop
Run the tracert lsp te tunnel interface-number command on PE1. The command output shows
that traffic has switched to the protection tunnel.
[PE1] tracert lsp te Tunnel 1/0/10
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/10 , press CTRL_C
to break.
TTL Replier Time Type Downstream
0 Ingress 10.1.2.2/[1025 ]
1 10.1.2.2 90 ms Transit 10.1.4.2/[3 ]
2 4.4.4.4 80 ms Egress
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path tope2-backup
next hop 10.1.2.2
next hop 10.1.4.2
#
explicit-path tope2-main
next hop 10.1.1.2
next hop 10.1.3.2
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.2.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/10
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 4.4.4.4
mpls te tunnel-id 100
mpls te protection tunnel 101 mode revertive wtr 4
mpls te bandwidth ct0 20000
mpls te path explicit-path tope2-main
mpls te commit
#
interface Tunnel1/0/11
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 4.4.4.4
mpls te tunnel-id 101
mpls te bandwidth ct0 20000
mpls te path explicit-path tope2-backup
mpls te commit
#
return
l P1 configuration file
#
sysname P1
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls rsvp-te
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0002.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.3.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 3.3.3.3
mpls
mpls te
mpls rsvp-te
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0003.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.2.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.4.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
isis enable 1
#
return
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0004.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.3.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.4.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
isis enable 1
#
return
Networking Requirements
Two CR-LSPs are established between PE1 and PE2 on the network shown in Figure 3-10. One
CR-LSP is bound to a working tunnel configured on Tunnel 1/0/10, and the other CR-LSP is
bound to a protection tunnel configured on Tunnel 1/0/11.
These two tunnels can form a tunnel protection group to protect the working tunnel. This allows
MPLS TE to use dynamic BFD to detect faults.
Loopback1
3.3.3.3/32
GE1/0/0 GE1/0/1
10.1.2.2/30 10.1.4.1/30
P2
GE1/0/1 Loopback1
2.2.2.2/32 GE1/0/1
10.1.2.1/30 10.1.4.2/30
GE1/0/0 GE1/0/0
Loopback1 10.1.1.1/30 10.1.3.2/30 Loopback1
1.1.1.1/32 GE1/0/0 GE1/0/1 4.4.4.4/32
PE1 10.1.1.2/30 P1 10.1.3.1/30 PE2
Working tunnel
Protection tunnel
Configuration Roadmap
The configuration roadmap is as follows:
1. Assign an IP address to each interface on every device shown in Figure 3-10 and set IS-
IS parameters to ensure network layer connectivity.
2. Configure RSVP-TE tunnels between PE1 and PE2 over separate explicit paths.
3. Bind the protection tunnel to the working tunnel to form a tunnel protection group.
4. Enable the capability of dynamically creating BFD sessions on the ingress of working
tunnel, and enable the capability of passively creating BFD sessions on the egress of
working tunnel.
Data Preparation
To complete the configuration, you need the following data:
l Working tunnel's tunnel interface number (Tunnel 1/0/10) and tunnel ID (100) and
protection tunnel's tunnel interface number (Tunnel 1/0/11) and tunnel ID (101); tunnel IP
address (loopback interface address); tunnel bandwidth (20,000 kbit/s)
l Switchback mode (revertive) and WTR time (wtr-time is 4, which is multiplied by 30
seconds to obtain 120 seconds.)
l The minimum interval for sending packets of a BFD session on the ingress (100 ms), the
minimum interval for receiving packets of a BFD session (100 ms) and the local detection
multiplier value (3). (The default values are specified in the License.)
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address to each interface shown in Figure 3-10 and create a loopback interface on
each node. For configuration details, see Configuration Files in this section.
Step 2 Configure IS-IS to advertise the route to each network segment of each interface and to advertise
the host route to each loopback address (used as an LSR ID).
Configure IS-IS on each node to ensure device connectivity. For configuration details, see
Configuration Files in this section.
Step 3 Configure MPLS, MPLS TE, and RSVP-TE on each node and interface, and enable CSPF on
the ingress PE1.
# Configure PE1.
<PE1> system-view
[PE1] mpls lsr-id 1.1.1.1
[PE1] mpls
[PE1-mpls] mpls te
[PE1-mpls] mpls rsvp-te
[PE1-mpls] mpls te cspf
[PE1-mpls] quit
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] mpls
[PE1-GigabitEthernet1/0/0] mpls te
[PE1-GigabitEthernet1/0/0] mpls rsvp-te
[PE1-GigabitEthernet1/0/0] quit
[PE1] interface gigabitethernet 1/0/1
[PE1-GigabitEthernet1/0/1] mpls
[PE1-GigabitEthernet1/0/1] mpls te
[PE1-GigabitEthernet1/0/1] mpls rsvp-te
[PE1-GigabitEthernet1/0/1] quit
# Configure P1.
<P1> system-view
[P1] mpls lsr-id 2.2.2.2
[P1] mpls
[P1-mpls] mpls te
[P1-mpls] mpls rsvp-te
[P1-mpls] quit
[P1] interface gigabitethernet 1/0/0
[P1-GigabitEthernet1/0/0] mpls
[P1-GigabitEthernet1/0/0] mpls te
[P1-GigabitEthernet1/0/0] mpls rsvp-te
[P1-GigabitEthernet1/0/0] quit
[P1] interface gigabitethernet 1/0/1
[P1-GigabitEthernet1/0/1] mpls
[P1-GigabitEthernet1/0/1] mpls te
[P1-GigabitEthernet1/0/1] mpls rsvp-te
[P1-GigabitEthernet1/0/1] quit
# Configure P2.
<P2> system-view
[P2] mpls lsr-id 3.3.3.3
[P2] mpls
[P2-mpls] mpls te
[P2-mpls] mpls rsvp-te
[P2-mpls] quit
[P2] interface gigabitethernet 1/0/0
[P2-GigabitEthernet1/0/0] mpls
[P2-GigabitEthernet1/0/0] mpls te
[P2-GigabitEthernet1/0/0] mpls rsvp-te
[P2-GigabitEthernet1/0/0] quit
[P2] interface gigabitethernet 1/0/1
[P2-GigabitEthernet1/0/1] mpls
[P2-GigabitEthernet1/0/1] mpls te
[P2-GigabitEthernet1/0/1] mpls rsvp-te
[P2-GigabitEthernet1/0/1] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls lsr-id 4.4.4.4
[PE2] mpls
[PE2-mpls] mpls te
[PE2-mpls] mpls rsvp-te
[PE2-mpls] quit
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] mpls
[PE2-GigabitEthernet1/0/0] mpls te
[PE2-GigabitEthernet1/0/0] mpls rsvp-te
[PE2-GigabitEthernet1/0/0] quit
[PE2] interface gigabitethernet 1/0/1
[PE2-GigabitEthernet1/0/1] mpls
[PE2-GigabitEthernet1/0/1] mpls te
[PE2-GigabitEthernet1/0/1] mpls rsvp-te
[PE2-GigabitEthernet1/0/1] quit
# Configure PE1.
[PE1] isis 1
[PE1-isis-1] cost-style wide
[PE1-isis-1] traffic-eng level-2
[PE1-isis-1] quit
# Configure P1.
[P1] isis 1
[P1-isis-1] cost-style wide
[P1-isis-1] traffic-eng level-2
[P1-isis-1] quit
# Configure P2.
[P2] isis 1
[P2-isis-1] cost-style wide
[P2-isis-1] traffic-eng level-2
[P2-isis-1] quit
# Configure PE2.
[PE2] isis 1
[PE2-isis-1] cost-style wide
[PE2-isis-1] traffic-eng level-2
[PE2-isis-1] quit
Step 5 Configure the maximum reservable bandwidth and BC0 bandwidth for a link connected to the
outbound interface of each node.
# Configure PE1.
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[PE1-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000
[PE1-GigabitEthernet1/0/0] quit
[PE1] interface gigabitethernet 1/0/1
[PE1-GigabitEthernet1/0/1] mpls te bandwidth max-reservable-bandwidth 100000
[PE1-GigabitEthernet1/0/1] mpls te bandwidth bc0 100000
[PE1-GigabitEthernet1/0/1] quit
# Configure P1.
[P1] interface gigabitethernet 1/0/1
[P1-GigabitEthernet1/0/1] mpls te bandwidth max-reservable-bandwidth 100000
[P1-GigabitEthernet1/0/1] mpls te bandwidth bc0 100000
[P1-GigabitEthernet1/0/1] quit
# Configure P2.
[P2] interface gigabitethernet 1/0/1
[P2-GigabitEthernet1/0/1] mpls te bandwidth max-reservable-bandwidth 100000
[P2-GigabitEthernet1/0/1] mpls te bandwidth bc0 100000
[P2-GigabitEthernet1/0/1] quit
# Configure the tunnel on Tunnel 1/0/10 as a working tunnel and the tunnel on Tunnel 1/0/11
as a protection tunnel. Configure both of them to work in revertive mode. Set the WTR time to
120s.
[PE1] interface tunnel 1/0/10
[PE1-Tunnel1/0/10] mpls te protection tunnel 101 mode revertive wtr 4
[PE1-Tunnel1/0/10] mpls te commit
[PE1-Tunnel1/0/10] quit
# Enable BFD on the ingress of the tunnel (PE1) and configure MPLS TE BFD.
[PE1] bfd
[PE1-bfd] quit
[PE1] interface tunnel 1/0/10
[PE1-Tunnel1/0/10] mpls te bfd enable
[PE1-Tunnel1/0/10] mpls te bfd min-tx-interval 100 min-rx-interval 100 detect-
multiplier 3
[PE1-Tunnel1/0/10] mpls te commit
[PE1-Tunnel1/0/10] quit
# Enable the capability of passively creating BFD sessions on the egress of the tunnel (PE2).
[PE2] bfd
[PE2-bfd] mpls-passive
[PE2-bfd] quit
# After completing the configuration, run the display mpls te protection tunnel tunnel-id
verbose command on PE1 to view details about the tunnel protection group.
[PE1] display mpls te protection tunnel 100 verbose
----------------------------------------------------------------
Verbose information about the No.1 protection-group
----------------------------------------------------------------
Work-tunnel id : 100
Protect-tunnel id : 101
Work-tunnel name : Tunnel1/0/10
Protect-tunnel name : Tunnel1/0/11
Work-tunnel reverse-lsp : --
Protect-tunnel reverse-lsp : --
Bridge type : 1:1
Switch type : unidirectional
Switch result : work-tunnel
Tunnel using Best-Effort : none
Tunnel using Ordinary : none
Work-tunnel frr in use : none
Work-tunnel defect state : non-defect
Protect-tunnel defect state : non-defect
Work-tunnel forward-lsp defect state : non-defect
Protect-tunnel forward-lsp defect state : non-defect
Work-tunnel reverse-lsp defect state : non-defect
Protect-tunnel reverse-lsp defect state : non-defect
HoldOff : 0ms
WTR : 120s
Mode : revertive
Using same path : --
# Run the display bfd session all command on PE1. The status of the BFD sessions is Up.
[PE1] display bfd session all
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
8196 8197 4.4.4.4 Up D_TE_LSP Tunnel1/0/10
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
# Run the display interface tunnel interface-number command on PE1 to view information
about tunnel interfaces of the working and protection tunnels.
[PE1] display interface tunnel 1/0/10
Tunnel1/0/10 current state : UP
Line protocol current state : UP
Last line protocol up time : 2012-05-28 17:33:00 UTC-08:00
Description:HUAWEI, Tunnel1/0/10 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is unnumbered, using address of LoopBack1(1.1.1.1/32)
Encapsulation is TUNNEL, loopback not set
Tunnel destination 4.4.4.4
Tunnel up/down statistics 1
Tunnel protocol/transport MPLS/MPLS, ILM is available,
primary tunnel id is 0x800803, secondary tunnel id is 0x800802
Switch Result is working tunnel
Current system time: 2012-05-28 17:55:55-08:00
300 seconds output rate 0 bits/sec, 0 packets/sec
0 seconds output rate 0 bits/sec, 0 packets/sec
0 packets output, 0 bytes
0 output error
0 output drop
ct0:0 packets output, 0 bytes
0 output error
0 packets output drop
Input bandwidth utilization : --
Output bandwidth utilization : --
[PE1] display interface tunnel 1/0/11
Tunnel1/0/11 current state : UP
Line protocol current state : UP
Last line protocol up time : 2012-05-28 17:33:00 UTC-08:00
Description:HUAWEI, Tunnel1/0/11 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is unnumbered, using address of LoopBack1(1.1.1.1/32)
Encapsulation is TUNNEL, loopback not set
Tunnel destination 4.4.4.4
Tunnel up/down statistics 1
Tunnel protocol/transport MPLS/MPLS, ILM is available,
primary tunnel id is 0x800802, secondary tunnel id is 0x0
Current system time: 2012-05-28 17:56:20-08:00
300 seconds output rate 0 bits/sec, 0 packets/sec
0 seconds output rate 0 bits/sec, 0 packets/sec
0 packets output, 0 bytes
0 output error
0 output drop
ct0:0 packets output, 0 bytes
0 output error
0 packets output drop
Input bandwidth utilization : --
Output bandwidth utilization : --
# Run the tracert lsp te tunnel interface-number command on PE1 to view information about
the path of the working tunnel.
[PE1] tracert lsp te Tunnel 1/0/10
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/10 , press CTRL_C
to break.
TTL Replier Time Type Downstream
0 Ingress 10.1.1.2/[1026 ]
1 10.1.1.2 80 ms Transit 10.1.3.2/[3 ]
2 4.4.4.4 70 ms Egress
# Run the shutdown command on GE 1/0/0/ of PE1 to simulate a working tunnel failure.
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] shutdown
[PE1-GigabitEthernet1/0/0] quit
# Run the display interface tunnel interface-number command on PE1 to view information
about tunnel interfaces of the working and protection tunnels.
[PE1] display interface tunnel 1/0/10
Tunnel1/0/10 current state : UP
Line protocol current state : UP
Last line protocol up time : 2012-05-28 17:33:00 UTC-08:00
Description:HUAWEI, Tunnel1/0/10 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is unnumbered, using address of LoopBack1(1.1.1.1/32)
Encapsulation is TUNNEL, loopback not set
Tunnel destination 4.4.4.4
Tunnel up/down statistics 1
Tunnel protocol/transport MPLS/MPLS, ILM is available,
primary tunnel id is 0x0, secondary tunnel id is 0x800802
Switch Result is protection tunnel
Current system time: 2012-05-28 18:05:20-08:00
300 seconds output rate 0 bits/sec, 0 packets/sec
0 seconds output rate 0 bits/sec, 0 packets/sec
0 packets output, 0 bytes
0 output error
0 output drop
ct0:0 packets output, 0 bytes
0 output error
0 packets output drop
Input bandwidth utilization : --
Output bandwidth utilization : --
[PE1] display interface tunnel 1/0/11
Tunnel1/0/11 current state : UP
Line protocol current state : UP
Last line protocol up time : 2012-05-28 17:33:00 UTC-08:00
Description:HUAWEI, Tunnel1/0/11 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is unnumbered, using address of LoopBack1(1.1.1.1/32)
Encapsulation is TUNNEL, loopback not set
Tunnel destination 4.4.4.4
Tunnel up/down statistics 1
Tunnel protocol/transport MPLS/MPLS, ILM is available,
primary tunnel id is 0x800802, secondary tunnel id is 0x0
Current system time: 2012-05-28 18:05:27-08:00
300 seconds output rate 0 bits/sec, 0 packets/sec
0 seconds output rate 0 bits/sec, 0 packets/sec
0 packets output, 0 bytes
0 output error
0 output drop
ct0:0 packets output, 0 bytes
0 output error
0 packets output drop
Input bandwidth utilization : --
Output bandwidth utilization : --
Run the tracert lsp te tunnel interface-number command on PE1. The command output shows
that traffic has switched to the protection tunnel.
[PE1] tracert lsp te Tunnel 1/0/10
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/10 , press CTRL_C
to break.
TTL Replier Time Type Downstream
0 Ingress 10.1.2.2/[1025 ]
1 10.1.2.2 90 ms Transit 10.1.4.2/[3 ]
2 4.4.4.4 80 ms Egress
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
bfd
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path tope2-backup
next hop 10.1.2.2
next hop 10.1.4.2
#
explicit-path tope2-main
next hop 10.1.1.2
next hop 10.1.3.2
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.2.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/10
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 4.4.4.4
mpls te tunnel-id 100
l P1 configuration file
#
sysname P1
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls rsvp-te
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0002.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.3.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 3.3.3.3
mpls
mpls te
mpls rsvp-te
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0003.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.2.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.4.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
isis enable 1
#
return
#
return
Networking Requirements
On an MPLS network shown in Figure 3-11, two MPLS TE tunnels in opposite directions
(LSRA-LSRB-LSRC and LSRC-LSRB-LSRA) are established. To ensure that traffic switching
is performed at the same time on tunnels in opposite directions, perform the configuration related
to the associated bidirectional dynamic LSP in the interface view of each tunnel.
Figure 3-11 Networking diagram for configuring an associated bidirectional dynamic LSP
Loopback1
2.2.2.2/32
0 GE2
/0 /
Loopback1 GE1 /24 2 0 .1 /0 /0 Loopback1
1 . 2 . 1 . 1
1.1.1.1/32 0.1. /24 3.3.3.3/32
1
0 LSRB G
1 /0/ /24 20.1 E1/0/0
E
G .1.1 . 1 .1 .2
0 /24
1
LSRE LSRA LSRC LSRF
LSRD
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure an IP address for every interface and the loopback interface address used as an
LSR ID.
2. Enable IS-IS globally.
3. Enable MPLS TE, RSVP-TE, and CSPF globally.
4. Enable IS-IS TE.
5. Configure an MPLS TE explicit path.
6. Configure forward and backward TE tunnel interfaces.
7. Configure the egress to assign a non-null label to the penultimate hop, and configure a
reverse LSP so that the reverse LSP and the forward LSP can form an associated
bidirectional dynamic LSP.
Data Preparation
To complete the configuration, you need the following data:
l IS-IS area ID, initial system ID, IS-IS level of each node
l Interface number and IP address of each tunnel interface as well as destination address,
tunnel ID, and tunnel signaling protocol to be specified on each tunnel interface
Procedure
Step 1 Configure an IP address for every interface.
Configure an IP address and mask for each interface as shown in Figure 3-11. For configuration
details, see Configuration Files in this section.
# Configure LSRA.
[LSRA] isis 1
[LSRA-isis-1] network-entity 00.0005.0000.0000.0001.00
[LSRA-isis-1] is-level level-2
[LSRA-isis-1] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] isis enable 1
[LSRA-GigabitEthernet1/0/0] quit
[LSRA] interface loopback 1
[LSRA-LoopBack1] isis enable 1
[LSRA-LoopBack1] quit
# Configure LSRB.
[LSRB] isis 1
[LSRB-isis-1] network-entity 00.0005.0000.0000.0002.00
[LSRB-isis-1] is-level level-2
[LSRB-isis-1] quit
[LSRB] interface gigabitethernet 1/0/0
[LSRB-GigabitEthernet1/0/0] isis enable 1
[LSRB-GigabitEthernet1/0/0] quit
[LSRB] interface gigabitethernet 2/0/0
[LSRB-GigabitEthernet2/0/0] isis enable 1
[LSRB-GigabitEthernet2/0/0] quit
[LSRB] interface loopback 1
[LSRB-LoopBack1] isis enable 1
[LSRB-LoopBack1] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] network-entity 00.0005.0000.0000.0003.00
[LSRC-isis-1] is-level level-2
[LSRC-isis-1] quit
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] isis enable 1
[LSRC-GigabitEthernet1/0/0] quit
[LSRC] interface loopback 1
[LSRC-LoopBack1] isis enable 1
[LSRC-LoopBack1] quit
Step 3 Configure basic MPLS functions and enable MPLS TE, RSVP-TE, and CSPF.
# Enable MPLS, MPLS TE, and RSVP-TE globally and in the interface view on each node, and
enable CSPF on the ingress of the forward tunnel (LSRA) and the backward tunnel (LSRC).
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] mpls
[LSRA-GigabitEthernet1/0/0] mpls te
[LSRA-GigabitEthernet1/0/0] mpls rsvp-te
[LSRA-GigabitEthernet1/0/0] quit
# Configure LSRB.
[LSRB] mpls lsr-id 2.2.2.2
[LSRB] mpls
[LSRB-mpls] mpls te
[LSRB-mpls] mpls rsvp-te
[LSRB-mpls] quit
[LSRB] interface gigabitethernet 1/0/0
[LSRB-GigabitEthernet1/0/0] mpls
[LSRB-GigabitEthernet1/0/0] mpls te
[LSRB-GigabitEthernet1/0/0] mpls rsvp-te
[LSRB-GigabitEthernet1/0/0] quit
[LSRB] interface gigabitethernet 2/0/0
[LSRB-GigabitEthernet2/0/0] mpls
[LSRB-GigabitEthernet2/0/0] mpls te
[LSRB-GigabitEthernet2/0/0] mpls rsvp-te
[LSRB-GigabitEthernet2/0/0] quit
# Configure LSRC.
[LSRC] mpls lsr-id 3.3.3.3
[LSRC] mpls
[LSRC-mpls] mpls te
[LSRC-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRC-mpls] quit
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] mpls
[LSRC-GigabitEthernet1/0/0] mpls te
[LSRC-GigabitEthernet1/0/0] mpls rsvp-te
[LSRC-GigabitEthernet1/0/0] quit
# Configure LSRA.
[LSRA] isis 1
[LSRA-isis-1] cost-style wide
[LSRA-isis-1] traffic-eng level-2
[LSRA-isis-1] quit
# Configure LSRB.
[LSRB] isis 1
[LSRB-isis-1] cost-style wide
[LSRB-isis-1] traffic-eng level-2
[LSRB-isis-1] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] cost-style wide
[LSRC-isis-1] traffic-eng level-2
[LSRC-isis-1] quit
# Configure LSRA.
[LSRA] explicit-path a-b-c
[LSRA-explicit-path-a-b-c] next hop 10.1.1.2 include strict
[LSRA-explicit-path-a-b-c] next hop 20.1.1.1 include strict
[LSRA-explicit-path-a-b-c] next hop 20.1.1.2 include strict
[LSRA-explicit-path-a-b-c] quit
# Configure LSRC.
[LSRC] explicit-path c-b-a
[LSRC-explicit-path-c-b-a] next hop 20.1.1.1 include strict
[LSRC-explicit-path-c-b-a] next hop 10.1.1.2 include strict
[LSRC-explicit-path-c-b-a] next hop 10.1.1.1 include strict
[LSRC-explicit-path-c-b-a] quit
Step 7 Configure the egress to assign a non-null label to the penultimate hop, and configure a reverse
LSP so that the reverse LSP and the forward LSP can form an associated bidirectional dynamic
LSP.
# Configure LSRA.
[LSRA] mpls
[LSRA-mpls] label advertise non-null
[LSRA-mpls] quit
[LSRA] interface tunnel 1/0/0
[LSRA-Tunnel1/0/0] mpls te reverse-lsp protocol rsvp-te ingress-lsr-id 3.3.3.3
tunnel-id 100
[LSRA-Tunnel1/0/0] mpls te commit
[LSRA-Tunnel1/0/0] quit
# Configure LSRC.
[LSRC] mpls
[LSRC-mpls] label advertise non-null
[LSRC-mpls] quit
[LSRC] interface tunnel 1/0/0
[LSRC-Tunnel1/0/0] mpls te reverse-lsp protocol rsvp-te ingress-lsr-id 1.1.1.1
tunnel-id 100
Check information about the associated bidirectional dynamic LSP on LSRA. You can view that
the associated bidirectional dynamic LSP has been established and is in the Up state.
[LSRA] display mpls te reverse-lsp tunnel-interface tunnel 1/0/0
-------------------------------------------------------------------------------
LSP Information: RSVP LSP
-------------------------------------------------------------------------------
IngressLsrID SessionID InLabel State SignalledTunnelName ObverseTunnel
-------------------------------------------------------------------------------
3.3.3.3 1 3241 Up Tunnel1/0/0 Tunnel1/0/0
Check information about the associated bidirectional dynamic LSP on LSRC. You can view that
the associated bidirectional dynamic LSP has been established and is in the Up state.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
label advertise non-null
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
explicit-path backup a-b-c
next hop 10.1.1.2
next hop 20.1.1.1
next hop 20.1.1.2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 100
mpls te reverse-lsp protocol rsvp-te ingress-lsr-id 3.3.3.3 tunnel-id 100
mpls te path explicit-path a-b-c
mpls te commit
#
return
Networking Requirements
On the network shown in Figure 3-12, a primary CR-LSP is set up, with LSRA being the ingress
and LSRD being the egress. The primary CR-LSP needs to be configured with a hot-standby
CR-LSP and an ordinary backup CR-LSP. In this manner, when the primary CR-LSP fails, traffic
can be switched to the hot-standby CR-LSP or ordinary backup CR-LSP.
Figure 3-12 Networking diagram for setting up a CR-LSP by using a CR-LSP attribute template
LSRC
/0 PO
1 /0 4 1 S2
S 2 0 .1.4 /0/0
PO .1.2/ .1/2 PO
/0 .1 41 S
1.1.1.1/32 S1/0 4 10 0.1 1/0/0 4.4.4.4/32
/2 .
PO .1.1 4.2
0 .1 POS2/0/0 LSRE POS2/0/0 /24
1
10.1.3.1/24 10.1.6.2/24
PO POS1/0/0 POS2/0/0
/0
LSRA 10 S3/
.1. 0/0
10.1.3.2/24 10.1.6.1/24
S 3/0 /24 LSRD
2.1 PO .5.2
/24 PO 0 .1
10 S1/ / 0/ 10
.1. 0/0 S2 /24
2.2
/24 PO .5.1
.1
10
LSRB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure an IP address and a routing protocol for each interface so that they can
communicate with each other at the network layer.
2. Enable MPLS and MPLS TE in the system view and in each interface view.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure an IP address and an IGP for each interface so that they can communicate with each
other at the network layer.
For configuration details, see Configuration Files in this section.
Step 2 Configure the LSR ID for each device, and enable MPLS and MPLS TE in the system and
interface views on each device.
# Configure LSRA.
<LSRA> system-view
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] quit
[LSRA] interface pos1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls te
[LSRA-Pos1/0/0] mpls rsvp-te
[LSRA-Pos1/0/0] quit
[LSRA] interface pos2/0/0
[LSRA-Pos2/0/0] mpls
[LSRA-Pos2/0/0] mpls te
[LSRA-Pos2/0/0] mpls rsvp-te
[LSRA-Pos2/0/0] quit
[LSRA] interface pos3/0/0
[LSRA-Pos3/0/0] mpls
[LSRA-Pos3/0/0] mpls te
[LSRA-Pos3/0/0] mpls rsvp-te
[LSRA-Pos3/0/0] quit
NOTE
Repeat this step for LSRB, LSRC, LSRD, and LSRE. For configuration details, see Configuration Files
in this section.
# On LSRA, configure the path LSRA->LSRC->LSRD as the explicit path named up_path.
[LSRA] explicit-path up_path
[LSRA-explicit-path-up_path] next hop 10.1.1.2
[LSRA-explicit-path-up_path] next hop 10.1.4.2
[LSRA-explicit-path-up_path] quit
NOTE
The priorities of the CR-LSP attribute templates configured on the same tunnel interface must be the same.
Step 4 Set up a CR-LSP by using the CR-LSP attribute template, with LSRA being the ingress and
LSRD being the egress.
# Set up a CR-LSP, with LSRA being the ingress and LSRD being the egress.
[LSRA] interface tunnel1/0/0
[LSRA-Tunnel1/0/0] tunnel-protocol mpls te
[LSRA-Tunnel1/0/0] destination 4.4.4.4
[LSRA-Tunnel1/0/0] mpls te tunnel-id 100
[LSRA-Tunnel1/0/0] mpls te primary-lsp-constraint lsp-attribute lsp_attribute_1
[LSRA-Tunnel1/0/0] mpls te hotstandby-lsp-constraint 1 lsp-attribute
lsp_attribute_2
[LSRA-Tunnel1/0/0] mpls te ordinary-lsp-constraint 1 lsp-attribute lsp_attribute_3
[LSRA-Tunnel1/0/0] mpls te commit
# Run the display mpls te tunnel-interface lsp-constraint command on LSRA. You can view
the configurations of the LSP attribute template.
<LARA> display mpls te tunnel-interface lsp-constraint
Tunnel Name : Tunnel1/0/0
Primary-lsp-constraint Name : lsp_attribute_1
Hotstandby-lsp-constraint Number: 1
Hotstandby-lsp-constraint Name : lsp_attribute_2
Ordinary-lsp-constraint Number : 1
Ordinary-lsp-constraint Name : lsp_attribute_3
# Run the display mpls te tunnel verbose on LSRA. You can see that the LSP attribute template
is used to set up a CR-LSP.
<LSRA> display mpls te tunnel verbose
No : 1
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 0 LSP Index : 2048
Session ID : 100 LSP ID : 1
LSR Role : Ingress LSP Type : Primary
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 4.4.4.4
In-Interface : -
Out-Interface : Pos1/0/0
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : 1
ER-Hop Table Index : 0 AR-Hop Table Index: 0
C-Hop Table Index : -
PrevTunnelIndexInSession: 1 NextTunnelIndexInSession: -
PSB Handle : 1024
Created Time : 2010/07/01 17:40:35 UTC-08:00
RSVP LSP Type : Primary
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Unreserved
CT0 Bandwidth(Kbit/sec) : 0 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 5 Hold-Priority : 5
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x3 Protected Flag : 0x0
Bypass In Use : Not Exists
Bypass Tunnel Id : -
BypassTunnel : -
Bypass LSP ID : - FrrNextHop : -
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
No : 2
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 1 LSP Index : 2049
Session ID : 100 LSP ID : 32770
LSR Role : Ingress LSP Type : Hot-Standby
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 4.4.4.4
In-Interface : -
Out-Interface : Pos3/0/0
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : 1
ER-Hop Table Index : 1 AR-Hop Table Index: 1
C-Hop Table Index : -
PrevTunnelIndexInSession: - NextTunnelIndexInSession: 0
PSB Handle : 1025
Created Time : 2010/07/01 17:40:36 UTC-08:00
RSVP LSP Type : Hot-Standby
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Unreserved
CT0 Bandwidth(Kbit/sec) : 0 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 5 Hold-Priority : 5
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x3 Protected Flag : 0x0
Bypass In Use : Not Exists
Bypass Tunnel Id : -
BypassTunnel : -
Bypass LSP ID : - FrrNextHop : -
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
# After shutting down POS 1/0/0 on LSRC and POS 1/0/0 on LSRB, you can see that the LSP
attribute template is used to set up an ordinary CR-LSP.
<LSRA> display mpls te tunnel verbose
No : 1
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 0 LSP Index : 2048
Session ID : 100 LSP ID : 32771
LSR Role : Ingress LSP Type : Ordinary
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 4.4.4.4
In-Interface : -
Out-Interface : Pos2/0/0
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : 1
ER-Hop Table Index : 2 AR-Hop Table Index: 0
C-Hop Table Index : -
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 1212
Created Time : 2010/07/02 15:24:18 UTC-08:00
RSVP LSP Type : Ordinary
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Unreserved
CT0 Bandwidth(Kbit/sec) : 0 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 5 Hold-Priority : 5
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x3 Protected Flag : 0x0
Bypass In Use : Not Exists
Bypass Tunnel Id : -
BypassTunnel : -
Bypass LSP ID : - FrrNextHop : -
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
#
explicit-path middle_path
next hop 10.1.3.2
next hop 10.1.6.2
#
explicit-path up_path
next hop 10.1.1.2
next hop 10.1.4.2
#
explicit-path down_path
next hop 10.1.2.2
next hop 10.1.5.2
#
lsp-attribute lsp_attribute_1
explicit-path up_path
priority 5
hop-limit 12
commit
#
lsp-attribute lsp_attribute_2
explicit-path down_path
priority 5
hop-limit 15
commit
#
lsp-attribute lsp_attribute_3
explicit-path middle_path
priority 5
commit
#
interface Pos1/0/0
ip address 10.1.1.1 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface Pos2/0/0
ip address 10.1.3.1 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface Pos3/0/0
ip address 10.1.2.1 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel1/0/0
tunnel-protocol mpls te
destination 4.4.4.4
mpls te tunnel-id 100
mpls te primary-lsp-constraint lsp-attribute lsp_attribute_1
mpls te hotstandby-lsp-constraint 1 lsp-attribute lsp_attribute_2
mpls te ordinary-lsp-constraint 1 lsp-attribute lsp_attribute_3
mpls te commit
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
network 10.1.3.0 0.0.0.255
mpls-te enable
#
return
interface Pos1/0/0
ip address 10.1.2.2 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface Pos2/0/0
ip address 10.1.5.1 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 10.1.2.0 0.0.0.255
network 10.1.5.0 0.0.0.255
mpls-te enable
#
return
Networking Requirements
On the network shown in Figure 3-13, Eth-Trunk 1 member interfaces on LSRA and LSRB are
GE 1/0/0, GE 2/0/0, and GE 3/0/0. An MPLS TE tunnel using RSVP is established between
LSRA and LSRC.
The handshake function is required to implement RSVP key authentication between LSRA and
LSRB and prevent forged RSVP requests for reserving resources from exhausting resources. In
addition, the message window function is required to prevent RSVP message mis-sequence.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure an MPLS network and set up an MPLS TE tunnel.
2. Configure authentication on every interface to authenticate RSVP messages.
3. Configure the handshake on every interface.
4. Configure the window size on every interface to enable the interface to save 32 sequence
numbers.
NOTE
A sliding window greater than 32 is recommended. If the sliding window is too small, RSVP messages
with the sequence number out of the window size are discarded, resulting in the termination of an RSVP
neighbor relationship.
Data Preparation
To complete the configuration, you need the following data:
l OSPF process ID and area ID of the interface on each LSR
l RSVP authentication key
l Window size for RSVP authentication
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and mask to each interface according to Figure 3-13. For detailed
configuration, see Configuration Files in this example.
Step 2 Configure OSPF.
Configure OSPF on all LSRs to advertise the route to the network segment of each interface and
the host route of each LSR ID. For detailed configuration, see Configuration Files in this
example.
After completing the configuration, run the display ip routing-table command on each LSR.
The command output shows that the LSRs have learned routes from each other.
Step 3 Configure basic MPLS functions and enable MPLS TE, MPLS RSVP-TE, and CSPF.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface eth-trunk 1
[LSRA-Eth-Trunk1] mpls
[LSRA-Eth-Trunk1] mpls te
[LSRA-Eth-Trunk1] mpls rsvp-te
[LSRA-Eth-Trunk1] quit
NOTE
Repeat this step for LSRB and LSRC. For configuration details, see Configuration Files in this section.
# Configure LSRA.
[LSRA] ospf 1
[LSRA-ospf-1] opaque-capability enable
[LSRA-ospf-1] area 0
[LSRA-ospf-1-area-0.0.0.0] mpls-te enable
[LSRA-ospf-1-area-0.0.0.0] quit
# Configure LSRB.
[LSRB] ospf 1
[LSRB-ospf-1] opaque-capability enable
[LSRB-ospf-1] area 0
[LSRB-ospf-1-area-0.0.0.0] mpls-te enable
[LSRB-ospf-1-area-0.0.0.0] quit
# Configure LSRC.
[LSRC] ospf 1
[LSRC-ospf-1] opaque-capability enable
[LSRC-ospf-1] area 0
[LSRC-ospf-1-area-0.0.0.0] mpls-te enable
[LSRC-ospf-1-area-0.0.0.0] quit
After completing the configuration, run the display interface tunnel command on LSRA. The
command output shows that the tunnel interface is Up.
[LSRA] display interface tunnel 1/0/0
Tunnel1/0/0 current state : UP
Step 6 Configure the RSVP authentication on interfaces of the MPLS TE links on LSRA and LSRB.
# Configure LSRA.
[LSRA] interface eth-trunk 1
[LSRA-Eth-Trunk1] mpls rsvp-te authentication cipher Huawei_123456789
[LSRA-Eth-Trunk1] mpls rsvp-te authentication handshake
[LSRA-Eth-Trunk1] mpls rsvp-te authentication window-size 32
# Configure LSRB.
[LSRB] interface eth-trunk 1
[LSRB-Eth-Trunk1] mpls rsvp-te authentication cipher Huawei_123456789
[LSRB-Eth-Trunk1] mpls rsvp-te authentication handshake
[LSRB-Eth-Trunk1] mpls rsvp-te authentication window-size 32
Run the reset mpls rsvp-te command and then run the display interface tunnel command on
LSRA. The command output shows that the tunnel interface is Up.
Run the display mpls rsvp-te interface command on LSRA or LSRB to view information about
RSVP authentication.
[LSRA] display mpls rsvp-te interface eth-trunk 1
Interface: Eth-Trunk1
Interface Address: 10.1.1.1
Interface state: UP Interface Index: 0x406
Total-BW: 0 Used-BW: 0
Hello configured: NO Num of Neighbors: 1
SRefresh feature: DISABLE SRefresh Interval: 30 sec
Mpls Mtu: 1500 Retransmit Interval: 500 msec
Increment Value: 1
Authentication: ENABLE
Challenge: ENABLE WindowSize: 32
Next Seq # to be sent:3570642420 4 Key ID: d5d7adf41800
Bfd Enabled: DISABLE Bfd Min-Tx: 10
Bfd Min-Rx: 10 Bfd Detect-Multi: 3
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
interface Eth-Trunk1
ip address 10.1.1.1 255.255.255.0
mpls
mpls te
mpls rsvp-te
mpls rsvp-te authentication cipher @%@%^1%rCnn(+B'T-mX0oFQ/$~JL@%@%
mpls rsvp-te authentication handshake
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 20.1.1.0 0.0.0.255
network 2.2.2.2 0.0.0.0
mpls-te enable
#
return
Networking Requirements
On the network shown in Figure 3-14, the bandwidth of the link LSRA -> LSRB is 50 Mbit/s.
The maximum reservable bandwidth of other links is 100 Mbit/s and BC0 bandwidth is 100
Mbit/s.
LSRA has two tunnels to LSRC, Tunnel 1/0/0 and Tunnel 1/0/1, each of which requires 40 Mbit/
s bandwidth. These two tunnels provide the total bandwidth of 80 Mbit/s, greater than the
bandwidth (50 Mbit/s) of the link between LSRA and LSRB. In addition, Tunnel 1/0/1 has a
higher priority than Tunnel 1/0/0, and preemption is allowed.
It is required to use the tunnel affinity and mask based on the administrative group. Tunnel 1/0/0
on LSRA uses one physical link from LSRB to LSRC, and Tunnel 1/0/1 uses another physical
link from LSRB to LSRC.
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign IP addresses to interfaces.
Assign an IP address and mask to each interface, including the loopback interfaces, according
to Figure 3-14.
Configure OSPF on all LSRs to advertise the route to network segment of each interface and
LSR ID.
Step 3 Configure the basic MPLS functions, and enable MPLS TE, RSVP-TE, and OSPF TE. Enable
CSPF on the ingress.
# Configure the basic MPLS functions, and enable MPLS TE and RSVP-TE on LSRA, LSRB,
and LSRC.
The following example uses the command output on LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls te
[LSRA-Pos1/0/0] mpls rsvp-te
[LSRA-Pos1/0/0] quit
# Configure OSPF TE on LSRA, LSRB, and LSRC. The following example uses the command
output on LSRA.
[LSRA] ospf
[LSRA-ospf-1] opaque-capability enable
[LSRA-ospf-1] area 0
[LSRA-ospf-1-area-0.0.0.0] mpls-te enable
[LSRA-ospf-1-area-0.0.0.0] quit
[LSRA-ospf-1] quit
Repeat this step for LSRB and LSRC. For configuration details, see Configuration Files in this
section.
# Enable CSPF on LSRA, the ingress node.
[LSRA] mpls
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
# Set the administrative group property to 0x10001 for the link on LSRA.
[LSRA-Pos1/0/0] mpls te link administrative group 10001
[LSRA-Pos1/0/0] quit
After the configuration, check the TEDB on LSRA for the following properties:
l Maximum bandwidth
l Maximum reservable bandwidth
l Color field, that is, the administrative group property of the links
[LSRA] display mpls te cspf tedb node
Router ID: 1.1.1.1
IGP Type: OSPF Process Id: 1
MPLS-TE Link Count: 1
Link[1]:
Interface IP Address(es): 192.168.1.1
Peer IP Address: 192.168.1.2
Peer Router Id: 2.2.2.2
Peer OSPF Router Id: 2.2.2.2
IGP Area: 0
Link Type: point-to-point Link Status: Active
IGP Metric: 1 TE Metric: 1 Color: 0x10001
Bandwidth Allocation Model : Russian Doll Model
Maximum Link-Bandwidth: 50000 (kbps)
Maximum Reservable Bandwidth: 50000 (kbps)
Bandwidth Constraints: Local Overbooking Multiplier:
BC[0]: 50000 (kbps) LOM[0]: 1
BC[1]: 0 (kbps) LOM[1]: 1
BW Unreserved:
Class ID:
The tunnels use the default setup and holding priorities, which are the lowest priority with the
value being 7.
The affinity of the tunnel is 0x10101, and the mask is 0x11011, both of which match the
administrative group of the links along the tunnel.
Check the status of the tunnel on LSRA.
[LSRA] display mpls te tunnel-interface
----------------------------------------------------------------
Tunnel1/0/0
----------------------------------------------------------------
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 100
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 3.3.3.3
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 1
Check the TEDB. You can view the change in bandwidth used by the links.
[LSRA] display mpls te cspf tedb node
Router ID: 1.1.1.1
IGP Type: OSPF Process Id: 1
MPLS-TE Link Count: 1
Link[1]:
Interface IP Address(es): 192.168.1.1
Peer IP Address: 192.168.1.2
Peer Router Id: 2.2.2.2
Peer OSPF Router Id: 2.2.2.2
IGP Area: 0
Link Type: point-to-point Link Status: Active
IGP Metric: 1 TE Metric: 1 Color: 0x10001
Bandwidth Allocation Model : Russian Doll Model
Maximum Link-Bandwidth: 50000 (kbps)
Maximum Reservable Bandwidth: 50000 (kbps)
Bandwidth Constraints: Local Overbooking Multiplier:
BC[0]: 50000 (kbps) LOM[0]: 1
BC[1]: 0 (kbps) LOM[1]: 1
BW Unreserved:
Class ID:
[0]: 50000 (kbps), [1]: 50000 (kbps)
[2]: 50000 (kbps), [3]: 50000 (kbps)
[4]: 50000 (kbps), [5]: 50000 (kbps)
[6]: 50000 (kbps), [7]: 10000 (kbps)
[8]: 0 (kbps), [9]: 0 (kbps)
[10]: 0 (kbps), [11]: 0 (kbps)
[12]: 0 (kbps), [13]: 0 (kbps)
[14]: 0 (kbps), [15]: 0 (kbps)
BW Unreserved:
Class ID:
[0]: 0 (kbps), [1]: 0 (kbps)
[2]: 0 (kbps), [3]: 0 (kbps)
[4]: 0 (kbps), [5]: 0 (kbps)
[6]: 0 (kbps), [7]: 0 (kbps)
[8]: 0 (kbps), [9]: 0 (kbps)
[10]: 0 (kbps), [11]: 0 (kbps)
[12]: 0 (kbps), [13]: 0 (kbps)
[14]: 0 (kbps), [15]: 0 (kbps)
Router ID: 2.2.2.2
IGP Type: OSPF Process Id: 1
MPLS-TE Link Count: 3
Link[1]:
Interface IP Address(es): 192.168.2.1
Peer IP Address: 192.168.2.2
Peer Router Id: 3.3.3.3
Peer OSPF Router Id: 3.3.3.3
IGP Area: 0
Link Type: point-to-point Link Status: Active
IGP Metric: 1 TE Metric: 1 Color: 0x10101
Bandwidth Allocation Model : Russian Doll Model
Maximum Link-Bandwidth: 100000 (kbps)
Maximum Reservable Bandwidth: 100000 (kbps)
Bandwidth Constraints: Local Overbooking Multiplier:
BC[0]: 100000 (kbps) LOM[0]: 1
BC[1]: 0 (kbps) LOM[1]: 1
BW Unreserved:
Class ID:
[0]: 100000 (kbps), [1]: 100000 (kbps)
[2]: 100000 (kbps), [3]: 100000 (kbps)
[4]: 100000 (kbps), [5]: 100000 (kbps)
[6]: 100000 (kbps), [7]: 60000 (kbps)
[8]: 0 (kbps), [9]: 0 (kbps)
[10]: 0 (kbps), [11]: 0 (kbps)
[12]: 0 (kbps), [13]: 0 (kbps)
[14]: 0 (kbps), [15]: 0 (kbps)
BW Unreserved:
Class ID:
[0]: 0 (kbps), [1]: 0 (kbps)
[2]: 0 (kbps), [3]: 0 (kbps)
[4]: 0 (kbps), [5]: 0 (kbps)
[6]: 0 (kbps), [7]: 0 (kbps)
[8]: 0 (kbps), [9]: 0 (kbps)
[10]: 0 (kbps), [11]: 0 (kbps)
[12]: 0 (kbps), [13]: 0 (kbps)
[14]: 0 (kbps), [15]: 0 (kbps)
Link[2]:
BW Unreserved for Class type 0 indicates the available bandwidth from the maximum
reservable bandwidth for various priorities. The command output shows that the unreserved
bandwidth changes for CT7 on the outbound interfaces on each LSR along the tunnel. This
means that some tunnels successfully reserve 40 Mbit/s bandwidth with priority 7. The
bandwidth allocation also shows the path that the tunnel uses. This indicates that the affinity and
the mask of the tunnel must match the administrative group of the links.
Run the display mpls te tunnel command on LSRB to view the outbound interface of the tunnel.
[LSRB] display mpls te tunnel
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
1.1.1.1 3.3.3.3 1 3/-- I Tunnel1/0/0
After completing the configuration, run the display interface Tunnel or display mpls te tunnel-
interface command to check the status of the tunnel on LSRA. The command output shows that
the status of Tunnel 1/0/0 is Down. This is because the maximum reservable bandwidth of the
physical link (LSRA --> LSRB) is insufficient, and the bandwidth of Tunnel 1/0/0 is preempted
by Tunnel 1/0/1 with a higher priority.
Run the display mpls te cspf tedb node command to check the TEDB and the changes in
bandwidth used on the links. The command output proves that Tunnel 1/0/1 passes by POS 3/0/0
on LSRB.
Run the display mpls te tunnel command on LSRB. You can view the outbound interface of
the tunnel.
[LSRB] display mpls te tunnel
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
1.1.1.1 3.3.3.3 1 3/-- I Tunnel1/0/1
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
interface Pos1/0/0
link-protocol ppp
ip address 192.168.1.1 255.255.255.0
mpls
mpls te
mpls te link administrative group 10001
mpls te bandwidth max-reservable-bandwidth 50000
mpls te bandwidth bc0 50000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 100
mpls te bandwidth ct0 40000
mpls te affinity property 10101 mask 11011
mpls te commit
#
interface Tunnel1/0/1
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 101
mpls te bandwidth ct0 40000
mpls te priority 6
mpls te affinity property 10001 mask 11101
mpls te commit
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 192.168.1.0 0.0.0.255
mpls-te enable
#
return
Networking Requirements
Figure 3-15 shows a Networking diagram for an MPLS network. An RSVP-TE tunnel has been
set up between PE1 and PE2, the path of the tunnel is PE1 --> P1 --> PE2, and the outbound
interface of the tunnel on P1 is GE 2/0/0.
To enhance the reliability of the tunnel, it is required that TE Auto FRR be enabled on P1 and
that the auto bypass tunnel's path is preferred to avoid the links that have a member in the same
SRLG as the link of the primary tunnel. If no path is available, the path calculation is performed
regardless of the SRLG attribute.
G
P2 10 E2/0
.4. /0
1.1
/3 0
GE1/0/0
10.3.1.2/30
Loopback1 10 GE
4.4.4.4/32 GE4/0/0 .4 . 3 /0
1 .2 /0
10.3.1.1 /30 /30
GE2/0/0 GE1/0/0
PE1 P1 10.2.1.1/30 10.2.1.2/30 PE2
GE1/0/0 GE1/0/0 GE3/0/0 GE2/0/0
10.1.1.1/30 10.1.1.2/30 10.5.1.1/30 SRLG1 10.5.1.2/30
Loopback1 Loopback1
1.1.1.1/32 5.5.5.5/32
Path of the primary CR-LSP
Configuration Roadmap
The configuration roadmap is as follows:
5. Configure the SRLG path calculation mode in the system view on the PLR node.
6. Set up an RSVP-TE tunnel between PE1 and PE2, with the explicit path being PE1 --> P1
--> PE2.
7. Enable TE FRR in the tunnel interface view of the ingress and enable TE Auto FRR on the
outbound interface of the primary tunnel on PLR node.
Data Preparation
To complete the configuration, you need the following data:
l SRLG number
l SRLG path calculation mode (preferred or strict)
Procedure
Step 1 Assign an IP address to each interface.
As shown in Figure 3-15, configure an IP address for each interface, create loopback interface
on each node, and then configure the IP address of the loopback interface as the MPLS LSR ID.
For configuration details, see Configuration Files in this section.
Configure OSPF or IS-IS on each node to ensure that nodes can communicate with each other.
The example in this document use IS-IS. For configuration details, see Configuration Files in
this section.
On each node, configure an LSR ID and enable MPLS in the system view. Enable MPLS in the
interface view. For configuration details, see Configuration Files in this section.
On each node, enable MPLS-TE and MPLS RSVP-TE in the MPLS view and in the interface
view. Configure the maximum bandwidth and maximum reservable bandwidth for each
interface. For configuration details, see the configuration file of this example.
Configure IS-IS TE on each node and CSPF on PE1 and P1. For configuration details, see
Configuration Files in this section.
# Run the display mpls te srlg command on P1 to view information about the SRLG and the
interfaces that belong to the SRLG.
[P1] display mpls te srlg all
Total SRLG supported : 512
Total SRLG configured : 2
SRLG 1: GE2/0/0 GE3/0/0
# Run the display mpls te cspf tedb srlg command on P1 to view TEDB information of the
specified SRLG.
[P1] display mpls te cspf tedb srlg 1
Interface-Address IGP-Type Area
10.2.1.1 ISIS 1
10.5.1.1 ISIS 1
10.2.1.1 ISIS 2
10.5.1.1 ISIS 2
# Create a tunnel interface on PE1, specify an explicit path, and configure the tunnel bandwidth.
[PE1] interface tunnel 1/0/0
[PE1-Tunnel1/0/0] ip address unnumbered interface loopback 1
[PE1-Tunnel1/0/0] tunnel-protocol mpls te
[PE1-Tunnel1/0/0] destination 5.5.5.5
[PE1-Tunnel1/0/0] mpls te tunnel-id 100
[PE1-Tunnel1/0/0] mpls te path explicit-path main
[PE1-Tunnel1/0/0] mpls te bandwidth ct0 10000
[PE1-Tunnel1/0/0] mpls te commit
# Run the display interface tunnel 1/0/0 command on PE1. The status of the tunnel is Up.
[PE1] display interface tunnel 1/0/0
Tunnel1/0/0 current state : UP
Line protocol current state : UP
...
NOTE
Take note of the preceding items that appear in the display interface tunnel 1/0/0 command output.
Information in "..." can be ignored.
Run the display mpls te tunnel path Tunnel1/0/0 command on PE1. The local protection is
available on the outbound interface (10.2.1.1) of the primary tunnel on P1.
[PE1] display mpls te tunnel path Tunnel1/0/0
Tunnel Interface Name : Tunnel1/0/0
Lsp ID : 5.5.5.5 :1
Hop Information
Hop 0 10.1.1.1
Hop 1 10.1.1.2 Label 65536
Hop 2 1.1.1.1 Label 65536
Hop 3 10.2.1.1 Local-Protection available
Hop 4 10.2.1.2 Label 3
Hop 5 5.5.5.5 Label 3
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x63 Protected Flag : 0x1
Bypass In Use : Not Used
Bypass Tunnel Id : 67141670
BypassTunnel : Tunnel Index[Tunnel0/0/2048], InnerLabel[3]
Bypass LSP ID : - FrrNextHop : 10.4.1.2
ReferAutoBypassHandle : 2049
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
# Run the display mpls te tunnel path Tunnel0/0/2048 command on the P1 to check the path
of the bypass tunnel, you can see that the path of the bypass tunnel is P1-->P2-->PE2.
[P1] display mpls te tunnel path Tunnel0/0/2048
Tunnel Interface Name : Tunnel0/0/2048
Lsp ID : 1.1.1.1 :2049 :1
Hop Information
Hop 0 10.3.1.1
Hop 1 10.3.1.2
Hop 2 2.2.2.2
Hop 3 10.4.1.1
Hop 4 10.4.1.2
Hop 5 5.5.5.5
# Run the display interface tunnel 1/0/0 command on PE1. The status of the primary tunnel is
Up.
[PE1] display interface tunnel 1/0/0
Tunnel1/0/0 current state : UP
Line protocol current state : UP
...
NOTE
Take note of the preceding items that appear in the display interface tunnel 1/0/0 command output.
Information in "..." can be ignored.
# Run the display mpls te tunnel name Tunnel1/0/0 verbose command on P1. The primary
tunnel is still bound with the tunnel 0/0/2048 and the FRR next hop is 10.5.1.2.
<P1> display mpls te tunnel name Tunnel1/0/0 verbose
No : 1
Tunnel-Name : Tunnel1/0/0
# Run the display mpls te tunnel path Tunnel0/0/2048 command on P1, you can see the path
of the auto bypass tunnel.
[P1] display mpls te tunnel path Tunnel0/0/2048
Tunnel Interface Name : Tunnel0/0/2048
Lsp ID : 1.1.1.1 :2049 :2
Hop Information
Hop 0 10.5.1.1
Hop 1 10.5.1.2
Hop 2 5.5.5.5
# You can see that the path of the auto bypass tunnel is P1-->PE2 rather than P1-->P2-->PE2.
That is because that the SRLG path calculation mode is configured as preferred. Therefore,
CSPF tries to calculate the path of the bypass tunnel to avoid the links in the same SRLG as the
protected interface(s); if the calculation fails, CSPF does not take the SRLG as a constraint.
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
mpls lsr-id 4.4.4.4
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path main
next hop 10.1.1.2
next hop 10.2.1.2
next hop 5.5.5.5
#
isis 1
cost-style wide
network-entity 10.0000.0000.0004.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 50000
mpls rsvp-te
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 5.5.5.5
mpls te tunnel-id 100
mpls te record-route
mpls te bandwidth ct0 10000
mpls te path explicit-path main
mpls te fast-reroute
mpls te commit
#
return
l P1 configuration file
#
sysname P1
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te srlg path-calculation preferred
mpls te cspf
#
isis 1
cost-style wide
network-entity 10.0000.0000.0001.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 50000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.2.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te auto-frr link
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 50000
mpls te srlg 1
mpls rsvp-te
#
interface GigabitEthernet3/0/0
ip address 10.5.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 50000
mpls te srlg 1
mpls rsvp-te
#
interface GigabitEthernet4/0/0
ip address 10.3.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 50000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls rsvp-te
#
isis 1
cost-style wide
network-entity 10.0000.0000.0002.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.3.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 50000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.4.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 50000
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
Networking Requirements
Figure 3-16 shows a Networking diagram for an MPLS network. An RSVP-TE tunnel has been
set up between the PE1 and PE2 and the path of the tunnel is PE1 --> P1 --> PE2.
The link PE1 --> P1 and the link PE1 --> PE2 are in the same SRLG (SRLG1 for example).
To enhance the reliability of the tunnel, a hot standby CR-LSP is required and the backup tunnel's
path should avoid the links that have a member in the same SRLG as the link of the primary
tunnel.
GE1/0/4 GE1/0/0
10.1.3.2/24 10.1.5.1/24
P2
GE1/0/3 Loopback0 GE1/0/2
10.1.3.1/24 2.2.2.2/32 10.1.5.2/24
PE1 GE1/0/1 GE1/0/0 PE2
Loopback0 10.1.2.1/24 10.1.4.1/24 Loopback0
1.1.1.1/32 4.4.4.4/32
GE1/0/1 GE1/0/0
GE1/0/0 10.1.2.2/24 P1 10.1.4.2/24 GE1/0/1
10.1.1.1/24 SRLG 1 10.1.1.2/24
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IP address and enable IGP on each node.
2. Enable MPLS, MPLS TE and MPLS RSVP-TE globally and in the interface view on all
nodes.
3. Set up an RSVP-TE tunnel between PE1 and PE2, and the explicit path is PE1 --> P1 -->
PE2.
4. Configure SRLG number on the outbound interface of the link that is in the same SRLG
as the link of the primary tunnel.
5. Configure SRLG path calculation mode in the system view on the ingress.
6. Configure a hot-standby CR-LSP.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address to each interface.
As shown in Figure 3-16, configure an IP address for each interface, create the loopback
interface on each node, and then configure the IP addresses of the loopback interfaces as the
MPLS LSR ID. For configuration details, see Configuration Files in this section.
Step 2 Configure IGP.
Configure OSPF or IS-IS on each node to ensure that nodes can communicate with each other.
The example in this document use IS-IS. For configuration details, see Configuration Files in
this section.
Step 3 Configure basic MPLS functions.
On each node, configure an LSR ID and enable MPLS in the system view. Enable MPLS in the
interface view. For configuration details, see Configuration Files in this section.
Step 4 Configure basic MPLS TE functions and enable MPLS RSVP-TE.
On each node, enable MPLS-TE and MPLS RSVP-TE in the system view and in the interface
view. For configuration details, see Configuration Files in this section.
Step 5 Configure IS-IS TE and CSPF.
Configure IS-IS TE on each node and CSPF on PE1. For configuration details, see
Configuration Files in this section.
Step 6 Configure the explicit path of the primary CR-LSP.
# Configure the explicit path of the primary CR-LSP on PE1.
<PE1> system-view
[PE1] explicit-path main
[PE1-explicit-path-main] next hop 10.1.2.2
[PE1-explicit-path-main] next hop 10.1.4.2
[PE1-explicit-path-main] next hop 4.4.4.4
[PE1-explicit-path-main] quit
# Configure PE1.
[PE1] interface tunnel 1/0/0
[PE1-Tunnel1/0/0] mpls te backup hot-standby
[PE1-Tunnel1/0/0] mpls te commit
[PE1-Tunnel1/0/0] quit
Run the display mpls te tunnel-interface tunnel 1/0/0 command on PE1. You can see that the
primary and backup CR-LSPs have been established.
[PE1] display mpls te tunnel-interface tunnel 1/0/0
----------------------------------------------------------------
Tunnel1/0/0
----------------------------------------------------------------
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 100
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 4.4.4.4
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 2
Hot-Standby LSP State : UP
Main LSP State : READY LSP ID : 32771
Run the display mpls te tunnel path command on PE1 to view the information about path
attributes of MPLS TE tunnels. And you can see that the path of hot standby CR-LSP is PE1 --
> P1 --> PE2, which is not a member in the same SRLG as the link of the primary CR-LSP.
[PE1] display mpls te tunnel path
Tunnel Interface Name : Tunnel1/0/0
Lsp ID : 1.1.1.1 :100 :2
Hop Information
Hop 0 10.1.2.1
Hop 1 10.1.2.2
Hop 2 2.2.2.2
Hop 3 10.1.4.1
Hop 4 10.1.4.2
Hop 5 4.4.4.4
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls te srlg path-calculation strict
mpls rsvp-te
mpls te cspf
#
explicit-path main
next hop 10.1.2.2
next hop 10.1.4.2
next hop 4.4.4.4
#
isis 1
is-level level-2
cost-style wide
network-entity 10.0001.0010.0100.1001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te srlg 1
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.2.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te srlg 1
mpls rsvp-te
#
interface GigabitEthernet1/0/3
undo shutdown
ip address 10.1.3.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack0
tunnel-protocol mpls te
destination 4.4.4.4
mpls te tunnel-id 100
mpls te record-route
mpls te path explicit-path main
mpls te backup hot-standby
mpls te commit
#
return
l P1 configuration file
#
sysname P1
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls rsvp-te
#
isis 1
is-level level-2
cost-style wide
network-entity 10.0001.0020.0200.2002.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.4.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.2.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack0
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 3.3.3.3
mpls
mpls te
mpls rsvp-te
#
isis 1
is-level level-2
cost-style wide
network-entity 10.0001.0030.0300.3003.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.5.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/4
undo shutdown
ip address 10.1.3.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack0
ip address 3.3.3.3 255.255.255.255
isis enable 1
#
return
Networking Requirements
On the network shown in Figure 3-17, LSRA, LSRB, LSRC, and LSRD run IS-IS. An RSVP-
TE tunnel from LSRA to LSRD is established, and the BC0 bandwidth of the TE tunnel is 20
Mbit/s. The maximum reservable bandwidth of the link along the tunnel is 100 Mbit/s, and
the bandwidth constraints model is RDM, and BC0 bandwidth is 100 Mbit/s.
The rate at which TE traffic is transmitted needs to be limited at 20 Mbit/s or lower. TE traffic
at the rate greater than 20 Mbit/s is dropped.
LSRA LSRD
GE1/0/0 GE1/0/0
10.1.1.1/24 30.1.1.2/24
GE1/0/0 GE1/0/0
10.1.1.2/24 POS2/0/0 POS2/0/0 30.1.1.1/24
Loopback1 20.1.1.1/24 20.1.1.2/24 Loopback1
2.2.2.9/32 3.3.3.9/32
LSRB LSRC
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l IS-IS area IDs, original system IDs, and IS-IS levels of each LSR
l Maximum reservable bandwidth and BC0 bandwidth of the tunnel
l Interface number, IP address, destination IP address, tunnel ID, tunnel signaling protocol
(RSVP-TE), and bandwidth of the tunnel
Configuration Procedure
1. Configure an MPLS TE tunnel.
For configuration details, see Configuring an RSVP-TE Tunnel.
2. Configure TE traffic policing.
# Configure LSRA.
[LSRA] interface tunnel 1/0/0
[LSRA-Tunnel1/0/0] mpls te lsp-tp outbound
[LSRA-Tunnel1/0/0] mpls te commit
[LSRA-Tunnel1/0/0] quit
Configuration File
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 4.4.4.9
mpls te tunnel-id 100
mpls te bandwidth ct0 20000
mpls te lsp-tp outbound
mpls te commit
#
return
link-protocol ppp
clock master
ip address 20.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
isis enable 1
#
return
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0004.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
ip address 30.1.1.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls te mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.9
mpls te tunnel-id 100
mpls te bandwidth ct0 20000
mpls te lsp-tp outbound
mpls te commit
#
interface LoopBack1
ip address 4.4.4.9 255.255.255.255
isis enable 1
#
return
Networking Requirements
As shown in Figure 3-18, PEs and P on the MPLS backbone network are enabled with OSPF
to interwork with each other. PE1 accesses VPN-A and PE2 accesses VPN-B. VPN-A transmits
EF traffic and VPN-B transmits BE traffic. The QoS requirements of different types of traffic
are as follows:
A static DS-TE tunnel between PE1 and PE2 is required to be set up in non-IETF mode to
transmit the preceding traffic. The bandwidth constraints model is required to be MAM and the
bandwidth preemption is not allowed between CTs.
Loopback1
GE1/0/0 2.2.2.9/32 GE1/0/0
10.1.1.2/24 PE1 GE1/0/0 GE2/0/0 PE2 10.3.1.2/24
Loopback1 10.10.1.2/24 10.11.1.1/24 Loopback1
1.1.1.9/32 GE3/0/0 GE3/0/0 3.3.3.9/32
GE2/0/0 10.10.1.1/24 P 10.11.1.2/24 GE2/0/0
10.2.1.2/24 10.4.1.2/24
MPLS backbone
AS: 100
GE1/0/0 GE1/0/0
10.2.1.1/24 10.4.1.1/24
CE2 CE4
VPN-B VPN-B
AS: 65420 AS: 65440
Configuration Roadmap
The configuration roadmap is as follows:
1. A static CR-LSP is set up for each type of traffic on each VPN because the static TE tunnel
supports the single CT only.
2. Two static CR-LSPs are created in non-IETF mode, with tunnel interfaces of static CR-
LSPs being tunnel 3/0/0 and tunnel 3/0/1 and CTs being CT0 and CT1 separately.
3. Tunnel 3/0/0 is configured to transmit EF traffic of VPN-A and tunnel 3/0/1 is configured
to transmit BE traffic of VPN-B.
4. The reservable bandwidth of the link should be equal to or greater than the total bandwidth
of BCs. The reservable bandwidth of the link is equal to or greater than 300 Mbit/s.
Data Preparation
To configure DS-TE in MAM, you need the following data.
Procedure
Step 1 Configure IP addresses for interfaces on the PEs and P. Enable OSPF to ensure that the PEs and
P can communicate with each other.
For configuration details, see Configuration Files in this section.
After the configurations, OSPF adjacencies can be created between PE1, P, and PE2. By using
the display ospf peer command, you can see that the status of the adjacency is Full. By using
the display ip routing-table command, you can see that PEs can learn the route to Loopback1
from each other.
Step 2 Configure LSR ID and enable MPLS and MPLS-TE on each PE and P.
# Configuration PE1.
<PE1> system-view
[PE1] mpls lsr-id 1.1.1.9
[PE1] mpls
[PE1-mpls] mpls te
[PE1-mpls] quit
[PE1] interface gigabitethernet 3/0/0
[PE1-GigabitEthernet3/0/0] mpls
[PE1-GigabitEthernet3/0/0] mpls te
[PE1-GigabitEthernet3/0/0] quit
# Configure P.
<P> system-view
[P] mpls lsr-id 2.2.2.9
[P] mpls
[P-mpls] mpls te
[P-mpls] quit
[P] interface gigabitethernet 1/0/0
[P-GigabitEthernet1/0/0] mpls
[P-GigabitEthernet1/0/0] mpls te
[P-GigabitEthernet1/0/0] quit
[P] interface gigabitethernet 2/0/0
[P-GigabitEthernet2/0/0] mpls
[P-GigabitEthernet2/0/0] mpls te
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls lsr-id 3.3.3.9
[PE2] mpls
[PE2-mpls] mpls te
[PE2-mpls] quit
[PE2] interface gigabitethernet 3/0/0
[PE2-GigabitEthernet3/0/0] mpls
[PE2-GigabitEthernet3/0/0] mpls te
[PE2-GigabitEthernet3/0/0] quit
Step 3 Configure the DS-TE mode and the bandwidth constraints model on each PE and P.
# Configure PE1.
[PE1] mpls
[PE1-mpls] mpls te ds-te mode non-ietf
[PE1-mpls] mpls te ds-te bcm mam
[PE1-mpls] quit
# Configure P.
[P] mpls
# Configure PE2.
[PE2] mpls
[PE2-mpls] mpls te ds-te mode non-ietf
[PE2-mpls] mpls te ds-te bcm mam
[PE2-mpls] quit
After completing the configuration, run the display mpls te ds-te summary command on a PE
or P to view information about DS-TE configuration.
In the following example, the display on PE1 is used.
[PE1] display mpls te ds-te summary
DS-TE IETF Supported :YES
DS-TE MODE :NON-IETF
Bandwidth Constraint Model :MAM
# Configure P.
[P] interface gigabitethernet 1/0/0
[P-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 300000
[P-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000 bc1 200000
[P-GigabitEthernet1/0/0] quit
[P] interface gigabitethernet 2/0/0
[P-GigabitEthernet2/0/0] mpls te bandwidth max-reservable-bandwidth 300000
[P-GigabitEthernet2/0/0] mpls te bandwidth bc0 100000 bc1 200000
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] interface gigabitethernet 3/0/0
[PE2-GigabitEthernet3/0/0] mpls te bandwidth max-reservable-bandwidth 300000
[PE2-GigabitEthernet3/0/0] mpls te bandwidth bc0 100000 bc1 200000
[PE2-GigabitEthernet3/0/0] quit
After completing the configuration, run the display mpls te link-administration bandwidth-
allocation command on the PE to view information about BC bandwidth allocation for
interfaces.
In the following example, the display on PE1 is used.
[PE1] display mpls te link-administration bandwidth-allocation interface
gigabitethernet 3/0/0
Link ID: GigabitEthernet3/0/0
Bandwidth Constraint Model : Maximum Allocation Model (MAM)
Maximum Link Reservable Bandwidth(Kbit/sec): 300000
Reservable Bandwidth BC0(Kbit/sec) : 100000
Reservable Bandwidth BC1(Kbit/sec) : 200000
Downstream Bandwidth (Kbit/sec) : 0
IPUpdown Link Status : UP
PhysicalUpdown Link Status : UP
----------------------------------------------------------------------
TE-CLASS CT PRIORITY BW RESERVED BW AVAILABLE DOWNSTREAM
(Kbit/sec) (Kbit/sec) RSVPLSPNODE COUNT
----------------------------------------------------------------------
0 0 0 0 100000 0
1 0 1 0 100000 0
2 0 2 0 100000 0
3 0 3 0 100000 0
4 0 4 0 100000 0
5 0 5 0 100000 0
6 0 6 0 100000 0
7 0 7 0 100000 0
8 1 0 0 200000 0
9 1 1 0 200000 0
10 1 2 0 200000 0
11 1 3 0 200000 0
12 1 4 0 200000 0
13 1 5 0 200000 0
14 1 6 0 200000 0
15 1 7 0 200000 0
----------------------------------------------------------------------
# Configure PE2.
[PE2] interface tunnel3/0/0
[PE2-Tunnel3/0/0] description For VPN-A_EF
[PE2-Tunnel3/0/0] ip address unnumbered interface loopback 1
[PE2-Tunnel3/0/0] tunnel-protocol mpls te
[PE2-Tunnel3/0/0] destination 1.1.1.9
[PE2-Tunnel3/0/0] mpls te tunnel-id 300
[PE2-Tunnel3/0/0] mpls te signal-protocol cr-static
[PE2-Tunnel3/0/0] mpls te commit
[PE2-Tunnel3/0/0] quit
[PE2] interface tunnel3/0/1
[PE2-Tunnel3/0/1] description For VPN-B_BE
[PE2-Tunnel3/0/1] ip address unnumbered interface loopback 1
[PE2-Tunnel3/0/1] tunnel-protocol mpls te
[PE2-Tunnel3/0/1] destination 1.1.1.9
[PE2-Tunnel3/0/1] mpls te tunnel-id 301
[PE2-Tunnel3/0/1] mpls te signal-protocol cr-static
[PE2-Tunnel3/0/1] mpls te commit
# Configure P.
[P] static-cr-lsp transit VPN-A_EF-1to2 incoming-interface gigabitethernet1/0/0 in-
label 100 nexthop 10.11.1.2 out-label 100 bandwidth ct0 100000
[P] static-cr-lsp transit VPN-B_BE-1to2 incoming-interface gigabitethernet1/0/0 in-
label 200 nexthop 10.11.1.2 out-label 200 bandwidth ct1 200000
[P] static-cr-lsp transit VPN-A_EF-2to1 incoming-interface gigabitethernet2/0/0 in-
label 101 nexthop 10.10.1.1 out-label 101 bandwidth ct0 100000
[P] static-cr-lsp transit VPN-B_BE-2to1 incoming-interface gigabitethernet2/0/0 in-
label 201 nexthop 10.10.1.1 out-label 201 bandwidth ct1 200000
Configure PE2.
[PE2] static-cr-lsp egress VPN-A_EF incoming-interface gigabitethernet 3/0/0 in-
label 100
[PE2] static-cr-lsp egress VPN-B_BE incoming-interface gigabitethernet 3/0/0 in-
label 200
[PE2] static-cr-lsp ingress tunnel-interface tunnel 3/0/0 destination 1.1.1.9
nexthop 10.11.1.1 out-label 101 bandwidth ct0 100000
[PE2] static-cr-lsp ingress tunnel-interface tunnel 3/0/1 destination 1.1.1.9
nexthop 10.11.1.1 out-label 201 bandwidth ct1 200000
After completing the configuration, run the display mpls static-cr-lsp command on a PE. The
static CR-LSP goes Up.
In the following example, the display on 3/0/0 of PE1 is used.
[PE1] display mpls static-cr-lsp Tunnel3/0/0
TOTAL : 1 STATIC CRLSP(S)
UP : 1 STATIC CRLSP(S)
DOWN : 0 STATIC CRLSP(S)
Name FEC I/O Label I/O If Stat
Tunnel3/0/0 3.3.3.9/32 NULL/100 -/S1/0/1 Up
Run the display interface tunnel interface-number command on a PE. The tunnel interface goes
Up.
In the following example, the display on 3/0/0 of PE1 is used.
[PE1] display interface tunnel 3/0/0
Tunnel3/0/0 current state : UP
Line protocol current state : UP
Last up time: 2008-05-23, 10:03:07
Description :For VPN-A_EF
Route Port,The Maximum Transmit Unit is 1500
Internet Address is unnumbered, using address of LoopBack1(1.1.1.9/32)
Encapsulation is TUNNEL, loopback not set
Tunnel destination 3.3.3.9
Tunnel up/down statistics 1
Tunnel protocol/transport MPLS/MPLS, ILM is available,
primary tunnel id is 0x8201002c, secondary tunnel id is 0x0
...
# Configure PE1.
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] trust upstream default
[PE1-GigabitEthernet1/0/0] quit
[PE1] interface gigabitethernet 2/0/0
[PE1-GigabitEthernet2/0/0] trust upstream default
[PE1-GigabitEthernet2/0/0] quit
[PE1] interface gigabitethernet 3/0/0
[PE1-GigabitEthernet3/0/0] trust upstream default
[PE1-GigabitEthernet3/0/0] quit
# Configure P.
[P] interface gigabitethernet 1/0/0
[P-GigabitEthernet1/0/0] trust upstream default
[P-GigabitEthernet1/0/0] quit
[P] interface gigabitethernet 2/0/0
[P-GigabitEthernet2/0/0] trust upstream default
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] trust upstream default
[PE2-GigabitEthernet1/0/0] quit
[PE2] interface gigabitethernet 2/0/0
[PE2-GigabitEthernet2/0/0] trust upstream default
[PE2-GigabitEthernet2/0/0] quit
[PE2] interface gigabitethernet 3/0/0
[PE2-GigabitEthernet3/0/0] trust upstream default
[PE2-GigabitEthernet3/0/0] quit
After completing the configuration, run the display diffserv domain default command on a PE
to view information about the default traffic policy for traffic classification in a DS domain.
NOTE
Take note of the preceding items that appear in the display diffserv domain default command output.
Information in "..." can be ignored.
Step 8 Configure the mapping of the CT and service type on the PEs and P.
# Configure PE1.
[PE1] ct-flow-mapping mapping1
[PE1-ct-flow-mapping-mapping1] map ct 0 to ef pq
[PE1-ct-flow-mapping-mapping1] map ct 1 to be lpq
[PE1-ct-flow-mapping-mapping1] ct-flow-mapping commit
[PE1-ct-flow-mapping-mapping1] quit
[PE1] interface gigabitethernet 3/0/0
[PE1-GigabitEthernet3/0/0] mpls te ct-flow-mapping mapping1
[PE1-GigabitEthernet3/0/0] mpls te ct-bandwidth unshared
[PE1-GigabitEthernet3/0/0] quit
# Configure PE2.
[PE2] ct-flow-mapping mapping1
[PE2-ct-flow-mapping-mapping1] map ct 0 to ef pq
[PE2-ct-flow-mapping-mapping1] map ct 1 to be lpq
[PE2-ct-flow-mapping-mapping1] ct-flow-mapping commit
[PE2-ct-flow-mapping-mapping1] quit
[PE2] interface gigabitethernet 3/0/0
[PE2-GigabitEthernet3/0/0] mpls te ct-flow-mapping mapping1
[PE2-GigabitEthernet3/0/0] mpls te ct-bandwidth unshared
[PE2-GigabitEthernet3/0/0] quit
# After completing the configuration, run the display ct-flow-mapping command on PEs to
view the mapping relationship between CTs and flow queues.
template-name:default
map CT 0 to be lpq
map CT 1 to af1 wfq
map CT 2 to af2 wfq
map CT 3 to af3 wfq
map CT 4 to af4 wfq
map CT 5 to ef pq
map CT 6 to cs6 pq
map CT 7 to cs6 pq
template-name:mapping1
map CT 0 to ef pq
map CT 1 to be lpq
Step 9 Create the MP-IBGP peer relationship between PEs, and create the EBGP peer relationship
between PEs and CEs.
# Configure PE1.
[PE1] bgp 100
[PE1-bgp] peer 3.3.3.9 as-number 100
[PE1-bgp] peer 3.3.3.9 connect-interface loopback 1
[PE1-bgp] ipv4-family vpnv4
[PE1-bgp-af-vpnv4] peer 3.3.3.9 enable
[PE1-bgp-af-vpnv4] quit
[PE1-bgp] ipv4-family vpn-instance vpna
[PE1-bgp-vpna] peer 10.1.1.1 as-number 65410
[PE1-bgp-vpna] import-route direct
[PE1-bgp-vpna] quit
[PE1-bgp] ipv4-family vpn-instance vpnb
[PE1-bgp-vpnb] peer 10.2.1.1 as-number 65420
[PE1-bgp-vpnb] import-route direct
[PE1-bgp-vpnb] quit
NOTE
The configuration of PE2 is similar to that of PE1. The configuration detail is not provided here.
# Configure CE1.
[CE1] bgp 65410
[CE1-bgp] peer 10.1.1.2 as-number 100
[CE1-bgp] import-route direct
NOTE
The configuration of other CEs (CE2, CE3, and CE4) is similar to that of CE1. The configuration details
are not provided here.
After completing the configuration, run the display bgp vpnv4 all peer command on the PE.
The BGP peer relationship is created between PEs and its status is Established.
[PE1] display bgp vpnv4 all peer
BGP local router ID : 1.1.1.9
Local AS number : 100
Total number of peers : 3 Peers in established state : 3
Peer V AS MsgRcvd MsgSent OutQ Up/Down State PrefRcv
# Configure PE1.
# Configure PE2.
[PE2] tunnel-policy policya
[PE2-tunnel-policy-policya] tunnel binding destination 1.1.1.9 te tunnel 3/0/0
[PE2-tunnel-policy-policya] quit
[PE2] tunnel-policy policyb
[PE2-tunnel-policy-policyb] tunnel binding destination 1.1.1.9 te tunnel 3/0/1
[PE2-tunnel-policy-policyb] quit
[PE1-vpn-instance-vpna] ipv4-family
[PE1-vpn-instance-vpna-af-ipv4] route-distinguisher 100:1
[PE1-vpn-instance-vpna-af-ipv4] vpn-target 111:1 both
[PE1-vpn-instance-vpna-af-ipv4] tnl-policy policya
[PE1-vpn-instance-vpna-af-ipv] quit
[PE1-vpn-instance-vpna] quit
[PE1] ip vpn-instance vpnb
[PE1-vpn-instance-vpnb] ipv4-family
[PE1-vpn-instance-vpnb-af-ipv4] route-distinguisher 100:2
[PE1-vpn-instance-vpnb-af-ipv4] vpn-target 222:2 both
[PE1-vpn-instance-vpnb-af-ipv4] tnl-policy policyb
[PE1-vpn-instance-vpnb-af-ipv4] quit
[PE1-vpn-instance-vpnb] quit
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] ip binding vpn-instance vpna
[PE1-GigabitEthernet1/0/0] ip address 10.1.1.2 24
[PE1-GigabitEthernet1/0/0] quit
[PE1] interface gigabitethernet 2/0/0
[PE1-GigabitEthernet2/0/0] ip binding vpn-instance vpnb
[PE1-GigabitEthernet2/0/0] ip address 10.2.1.2 24
[PE1-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] ip vpn-instance vpna
[PE2-vpn-instance-vpna] ipv4-family
[PE2-vpn-instance-vpna-af-ipv4] route-distinguisher 200:1
[PE2-vpn-instance-vpna-af-ipv4] vpn-target 111:1 both
[PE2-vpn-instance-vpna-af-ipv4] tnl-policy policya
[PE2-vpn-instance-vpna-af-ipv4] quit
[PE2-vpn-instance-vpna] quit
[PE2] ip vpn-instance vpnb
[PE2-vpn-instance-vpnb] ipv4-family
[PE2-vpn-instance-vpnb-af-ipv4] route-distinguisher 200:2
[PE2-vpn-instance-vpnb-af-ipv4] vpn-target 222:2 both
[PE2-vpn-instance-vpnb-af-ipv4] tnl-policy policyb
[PE2-vpn-instance-vpnb-af-ipv4] quit
[PE2-vpn-instance-vpnb] quit
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] ip binding vpn-instance vpna
[PE2-GigabitEthernet1/0/0] ip address 10.3.1.2 24
[PE2-GigabitEthernet1/0/0] quit
[PE2] interface gigabitethernet 2/0/0
# Configure IP addresses for interfaces of CEs. The configuration details are not provided here.
After completing the configuration, run the display ipvpn-instance verbose command on the
PE to view the configuration of VPN instances. PEs can ping through the CEs connecting to the
PEs.
Step 12 Verify the configuration.
After the configuration, connect CE1, CE2, CE3, and CE4 to port 1, port 2, port 3, and port 4
of a tester. Inject EF traffic from port 1 and port 2 to port 2 and port 1 respectively, with the
bandwidth being 100 Mbit/s. Inject BE traffic from port 3 and port 4 to port 2 and port 1
respectively, with the bandwidth being 200 Mbit/s. All the packets are not discarded and the
jitter of EF traffic is shorter than 50 ms.
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
ip vpn-instance vpna
ipv4-family
route-distinguisher 100:1
tnl-policy policya
vpn-target 111:1 export-extcommunity
vpn-target 111:1 import-extcommunity
#
ip vpn-instance vpnb
ipv4-family
route-distinguisher 100:2
tnl-policy policyb
vpn-target 222:2 export-extcommunity
vpn-target 222:2 import-extcommunity
#
mpls lsr-id 1.1.1.9
mpls
mpls te
mpls te ds-te bcm mam
#
ct-flow-mapping mapping1
map ct 0 to ef pq
map ct 1 to be lpq
ct-flow-mapping commit
#
interface GigabitEthernet1/0/0
undo shutdown
ip binding vpn-instance vpna
ip address 10.1.1.2 255.255.255.0
trust upstream default
#
interface GigabitEthernet2/0/0
undo shutdown
ip binding vpn-instance vpnb
ip address 10.2.1.2 255.255.255.0
trust upstream default
#
interface GigabitEthernet3/0/0
undo shutdown
l P configuration file
#
sysname P
#
mpls lsr-id 2.2.2.9
mpls
mpls te
mpls te ds-te bcm mam
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.10.1.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 300000
mpls te bandwidth bc0 100000 bc1 200000
trust upstream default
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 10.11.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 300000
mpls te bandwidth bc0 100000 bc1 200000
trust upstream default
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 10.10.1.0 0.0.0.255
network 10.11.1.0 0.0.0.255
network 2.2.2.9 0.0.0.0
mpls-te enable
#
static-cr-lsp transit VPN-A_EF-1to2 incoming-interface gigabitethernet1/0/0
in-label 100 nexthop 10.11.1.2 out-label 100 bandwidth ct0 100000
static-cr-lsp transit VPN-B_BE-1to2 incoming-interface gigabitethernet1/0/0
in-label 200 nexthop 10.11.1.2 out-label 200 bandwidth ct1 200000
static-cr-lsp transit VPN-A_EF-2to1 incoming-interface gigabitethernet2/0/0
in-label 101 nexthop 10.10.1.1 out-label 101 bandwidth ct0 100000
static-cr-lsp transit VPN-B_BE-2to1 incoming-interface gigabitethernet2/0/0
in-label 201 nexthop 10.10.1.1 out-label 201 bandwidth ct1 200000
#
return
ip vpn-instance vpnb
ipv4-family
route-distinguisher 200:2
tnl-policy policyb
vpn-target 222:2 export-extcommunity
vpn-target 222:2 import-extcommunity
#
mpls lsr-id 3.3.3.9
mpls
mpls te
mpls te ds-te bcm mam
#
ct-flow-mapping mapping1
map ct 0 to ef pq
map ct 1 to be lpq
ct-flow-mapping commit
#
interface GigabitEthernet1/0/0
undo shutdown
ip binding vpn-instance vpna
ip address 10.3.1.2 255.255.255.0
trust upstream default
#
interface GigabitEthernet2/0/0
undo shutdown
ip binding vpn-instance vpnb
ip address 10.4.1.2 255.255.255.0
trust upstream default
#
interface GigabitEthernet3/0/0
undo shutdown
ip address 10.11.1.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 300000
mpls te bandwidth bc0 100000 bc1 200000
trust upstream default
mpls te ct-flow-mapping mapping1
mpls te ct-bandwidth unshared
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
#
interface Tunnel3/0/0
description For VPN-A_EF
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.9
mpls te tunnel-id 300
mpls te signal-protocol cr-static
mpls te commit
#
interface Tunnel3/0/1
description For VPN-B_BE
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.9
mpls te tunnel-id 301
mpls te signal-protocol cr-static
mpls te commit
#
bgp 100
peer 1.1.1.9 as-number 100
peer 1.1.1.9 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
ipv4-family unicast
undo synchronization
import-route direct
peer 10.2.1.2 enable
#
return
Networking Requirements
As shown in Figure 3-19, PEs and P on the MPLS backbone network are enabled with OSPF
to communicate with each other. The P, however, does not support MPLS LDP. PE1 accesses
VPN-A and PE2 accesses VPN-B. An LDP LSP needs to be set up along the path PE3 --> PE1
--> P --> PE2 --> PE4. As shown in Figure 3-19, VPN-A transmits EF and AF traffic; VPN-B
transmits EF, AF, and BE traffic; the LDP LSP transmits BE traffic. The QoS requirements of
different types of traffic are as follows:
The networking requires that a DS-TE tunnel be set up between PE1 and PE2 to transmit the
preceding traffic and meet different QoS requirements of different traffic types. The bandwidth
constraints model is RDM. CTi can preempt the bandwidth of CTj (0 <= i < j <= 7). This means
that bandwidths will first be allocated for CTs with higher priorities.
AS 65410 AS 65430
VPN-A VPN-A
CE1 CE3
GE1/0/0 GE1/0/0
10.1.1.1/24 10.3.1.1/24
GE1/0/0 GE1/0/0
10.2.1.1/24 10.4.1.1/24
CE2 CE4
VPN-B VPN-B
AS 65420 AS 65440
Configuration Roadmap
NOTE
l In this example, the bandwidth and delay time are guaranteed for all service traffic of each VPN in DS-
TE tunnels.
l If guarantee the bandwidth and delay time for all service traffic only in DS-TE tunnels irrespective of
VPNs, you can set up only one DS-TE tunnel to transmit all the traffic.
l You can limit the service traffic of different VPNs in DS-TE tunnels by limiting the ingress PE to
access VPNs and the service traffic of VPNs.
Data Preparation
To configure a DS-TE tunnel in IETF mode (RDM), you need the following data.
Procedure
Step 1 Configure IP addresses for interfaces on PEs and the P. Enable OSPF to ensure that PEs and the
P can communicate with each other.
For configuration details, see Configuration Files in this section.
After the configurations, OSPF adjacencies can be created between PE1, P, and PE2. By using
the display ospf peer command, you can view that the status of the adjacency is Full. By using
the display ip routing-table command, you can see that PEs can learn the Loopback1 route
from each other.
Step 2 Configure LSR ID and enable MPLS on each PE and P. Enable MPLS TE and RSVP-TE on
PE1, PE2, and the P. Enable MPLS LDP on all PEs.
# Configure PE3.
<PE3> system-view
[PE3] mpls lsr-id 4.4.4.9
[PE3] mpls
[PE3-mpls] quit
[PE3] mpls ldp
[PE3-mpls-ldp] quit
[PE3] interface gigabitethernet 1/0/0
[PE3-GigabitEthernet1/0/0] mpls
[PE3-GigabitEthernet1/0/0] mpls ldp
[PE3-GigabitEthernet1/0/0] quit
# Configure PE1.
<PE1> system-view
[PE1] mpls lsr-id 1.1.1.9
[PE1] mpls
[PE1-mpls] mpls te
[PE1-mpls] mpls rsvp-te
[PE1-mpls] quit
[PE1] mpls ldp
[PE1-mpls-ldp] quit
[PE1] interface gigabitethernet 3/0/0
[PE1-GigabitEthernet3/0/0] mpls
[PE1-GigabitEthernet3/0/0] mpls te
[PE1-GigabitEthernet3/0/0] mpls rsvp-te
[PE1-GigabitEthernet3/0/0] quit
[PE1] interface gigabitethernet 4/0/0
[PE1-GigabitEthernet4/0/0] mpls
[PE1-GigabitEthernet4/0/0] mpls ldp
[PE1-GigabitEthernet4/0/0] quit
# Configure the P.
<P> system-view
[P] mpls lsr-id 2.2.2.9
[P] mpls
[P-mpls] mpls te
[P-mpls] mpls rsvp-te
[P-mpls] quit
[P] interface gigabitethernet 1/0/0
[P-GigabitEthernet1/0/0] mpls
[P-GigabitEthernet1/0/0] mpls te
[P-GigabitEthernet1/0/0] mpls rsvp-te
[P-GigabitEthernet1/0/0] quit
[P] interface gigabitethernet 2/0/0
[P-GigabitEthernet2/0/0] mpls
[P-GigabitEthernet2/0/0] mpls te
[P-GigabitEthernet2/0/0] mpls rsvp-te
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
<PE2> system-view
[PE2] mpls lsr-id 3.3.3.9
[PE2] mpls
[PE2-mpls] mpls te
[PE2-mpls] mpls rsvp-te
[PE2-mpls] quit
[PE2] mpls ldp
[PE2-mpls] quit
[PE2] interface gigabitethernet 3/0/0
[PE2-GigabitEthernet3/0/0] mpls
[PE2-GigabitEthernet3/0/0] mpls te
[PE2-GigabitEthernet3/0/0] mpls rsvp-te
[PE2-GigabitEthernet3/0/0] quit
[PE2] interface gigabitethernet 4/0/0
[PE2-GigabitEthernet4/0/0] mpls
[PE2-GigabitEthernet4/0/0] mpls ldp
[PE2-GigabitEthernet4/0/0] quit
# Configure PE4.
<PE4> system-view
[PE4] mpls lsr-id 5.5.5.9
[PE4] mpls
[PE4-mpls] quit
[PE4] mpls ldp
[PE4-mpls-ldp] quit
[PE4] interface gigabitethernet 1/0/0
[PE4-GigabitEthernet1/0/0] mpls
[PE4-GigabitEthernet1/0/0] mpls ldp
[PE4-GigabitEthernet1/0/0] quit
After completing the configuration, run the display mpls rsvp-te interface command on PE1,
PE2, or the P to view interfaces enabled with RSVP and information about RSVP. Run the
display mpls ldp lsp command on PE1, PE2, PE3, or PE4. An LDP LSP exists between PE3
and PE1, and between PE2 and PE4.
Step 3 Configure OSPF TE on PE1, PE2, and the P and enable CSPF.
# Configure OSPF TE on PE1, PE2, and the P and enable CSPF on the ingress of the TE tunnel.
# Configure PE1.
[PE1] ospf 1
[PE1-ospf-1] opaque-capability enable
[PE1-ospf-1] area 0
[PE1-ospf-1-area-0.0.0.0] mpls-te enable
[PE1-ospf-1-area-0.0.0.0] quit
[PE1-ospf-1] quit
[PE1] mpls
[PE1-mpls] mpls te cspf
# Configure P.
[P] ospf 1
[P-ospf-1] opaque-capability enable
[P-ospf-1] area 0
[P-ospf-1-area-0.0.0.0] mpls-te enable
[P-ospf-1-area-0.0.0.0] quit
[P-ospf-1] quit
# Configure PE2.
[PE2] ospf 1
[PE2-ospf-1] opaque-capability enable
[PE2-ospf-1] area 0
After completing the configuration, run the display ospf mpls-te command to view the TE LSA
information in the OSPF Link State Database (LSDB).
Step 4 Configure the DS-TE mode and the bandwidth constraints model on PE1, PE2, and the P.
# Configure PE1.
[PE1] mpls
[PE1-mpls] mpls te ds-te mode ietf
[PE1-mpls] mpls te ds-te bcm rdm
[PE1-mpls] quit
# Configure P.
[P] mpls
[P-mpls] mpls te ds-te mode ietf
[P-mpls] mpls te ds-te bcm rdm
[P-mpls] quit
# Configure PE2.
[PE2] mpls
[PE2-mpls] mpls te ds-te mode ietf
[PE2-mpls] mpls te ds-te bcm rdm
[PE2-mpls] quit
After completing the configuration, run the display mpls te ds-te summary command on a PE
or P to view information about DS-TE configuration.
# Configure PE1.
[PE1] interface gigabitethernet 3/0/0
[PE1-GigabitEthernet3/0/0] mpls te bandwidth max-reservable-bandwidth 400000
[PE1-GigabitEthernet3/0/0] mpls te bandwidth bc0 400000 bc1 200000 bc2 100000
[PE1-GigabitEthernet3/0/0] quit
# Configure the P.
[P] interface gigabitethernet 1/0/0
[P-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 400000
[P-GigabitEthernet1/0/0] mpls te bandwidth bc0 400000 bc1 200000 bc2 100000
[P-GigabitEthernet1/0/0] quit
[P] interface gigabitethernet 2/0/0
[P-GigabitEthernet2/0/0] mpls te bandwidth max-reservable-bandwidth 400000
[P-GigabitEthernet2/0/0] mpls te bandwidth bc0 400000 bc1 200000 bc2 100000
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] interface gigabitethernet 3/0/0
[PE2-GigabitEthernet3/0/0] mpls te bandwidth max-reservable-bandwidth 400000
[PE2-GigabitEthernet3/0/0] mpls te bandwidth bc0 400000 bc1 200000 bc2 100000
[PE2-GigabitEthernet3/0/0] quit
After completing the configuration, run the display mpls te link-administration bandwidth-
allocation interface command on the PE and you can view information about BC bandwidth
allocation for interfaces.
# Configure PE1.
[PE1] te-class-mapping
[PE1-te-class-mapping] te-class0 class-type ct0 priority 0 description For-EF
[PE1-te-class-mapping] te-class1 class-type ct1 priority 0 description For-AF
[PE1-te-class-mapping] te-class2 class-type ct2 priority 0 description For-BE
[PE1-te-class-mapping] quit
[PE2] te-class-mapping
[PE2-te-class-mapping] te-class0 class-type ct0 priority 0 description For-EF
[PE2-te-class-mapping] te-class1 class-type ct1 priority 0 description For-AF
[PE2-te-class-mapping] te-class2 class-type ct2 priority 0 description For-BE
[PE2-te-class-mapping] quit
After completing the configuration, run the display mpls te ds-te te-class-mapping command
on a PE to view information about the TE-class mapping table.
The following example uses the command output on PE1.
[PE1] display mpls te ds-te te-class-mapping
TE-Class ID Class Type Priority Description
TE-Class0 0 0 For-EF
TE-Class1 1 0 For-AF
TE-Class2 2 0 For-BE
TE-Class3 - - -
TE-Class4 - - -
TE-Class5 - - -
TE-Class6 - - -
TE-Class7 - - -
# Configure PE2.
[PE2] explicit-path path1
[PE2-explicit-path-path1] next hop 10.11.1.1
[PE2-explicit-path-path1] next hop 10.10.1.1
[PE2-explicit-path-path1] next hop 1.1.1.9
[PE2-explicit-path-path1] quit
After completing the configuration, run the display explicit-path command on a PE to view
information about the explicit path.
The following example uses the command output on PE1.
[PE1] display explicit-path path1
Path Name : path1 Path Status : Enabled
1 10.10.1.2 Strict Include
2 10.11.1.2 Strict Include
3 3.3.3.9 Strict Include
# Configure PE2.
[PE2] interface tunnel3/0/0
[PE2-Tunnel3/0/0] description For VPN-A & Non-VPN
[PE2-Tunnel3/0/0] ip address unnumbered interface loopback 1
[PE2-Tunnel3/0/0] tunnel-protocol mpls te
[PE2-Tunnel3/0/0] destination 1.1.1.9
[PE2-Tunnel3/0/0] mpls te tunnel-id 300
[PE2-Tunnel3/0/0] mpls te signal-protocol rsvp-te
[PE2-Tunnel3/0/0] mpls te path explicit-path path1
[PE2-Tunnel3/0/0] mpls te priority 0
[PE2-Tunnel3/0/0] mpls te bandwidth ct0 100000 ct1 50000 ct2 50000
[PE2-Tunnel3/0/0] mpls te commit
[PE2] interface tunnel3/0/1
[PE2-Tunnel3/0/1] description For VPN-B
[PE2-Tunnel3/0/1] ip address unnumbered interface loopback 1
[PE2-Tunnel3/0/1] tunnel-protocol mpls te
[PE2-Tunnel3/0/1] destination 1.1.1.9
[PE2-Tunnel3/0/1] mpls te tunnel-id 301
[PE2-Tunnel3/0/1] mpls te signal-protocol rsvp-te
[PE2-Tunnel3/0/1] mpls te path explicit-path path1
[PE2-Tunnel3/0/1] mpls te priority 0
[PE2-Tunnel3/0/1] mpls te bandwidth ct0 100000 ct1 50000 ct2 50000
[PE2-Tunnel3/0/1] mpls te commit
Run the display interface tunnel interface-number command on a PE. The tunnel interface goes
Up.
The following example uses the command output on tunnel 3/0/0 of PE1.
[PE1] display interface tunnel3/0/0
Tunnel3/0/0 current state : UP
Line protocol current state : UP
Last up time: 2008-05-23, 11:15:01
Description :For VPN-A & Non-VPN
Route Port,The Maximum Transmit Unit is 1500
Internet Address is unnumbered, using address of LoopBack1(1.1.1.9/32)
Encapsulation is TUNNEL, loopback not set
Tunnel destination 3.3.3.9
Tunnel up/down statistics 1
Tunnel protocol/transport MPLS/MPLS, ILM is available,
primary tunnel id is 0x8201002c, secondary tunnel id is 0x0
...
Run the display mpls te te-class-tunnel command on a PE to view the TE tunnel associated
with the TE-class.
# Configure PE1.
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] trust upstream default
[PE1-GigabitEthernet1/0/0] quit
[PE1] interface gigabitethernet 2/0/0
[PE1-GigabitEthernet2/0/0] trust upstream default
[PE1-GigabitEthernet2/0/0] quit
[PE1] interface gigabitethernet 4/0/0
[PE1-GigabitEthernet4/0/0] trust upstream default
[PE1-GigabitEthernet4/0/0] quit
[PE1] interface gigabitethernet 3/0/0
[PE1-GigabitEthernet3/0/0] trust upstream default
[PE1-GigabitEthernet3/0/0] quit
# Configure P.
[P] interface gigabitethernet 1/0/0
[P-GigabitEthernet1/0/0] trust upstream default
[P-GigabitEthernet1/0/0] quit
[P] interface gigabitethernet 2/0/0
[P-GigabitEthernet2/0/0] trust upstream default
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] trust upstream default
[PE2-GigabitEthernet1/0/0] quit
[PE2] interface gigabitethernet 2/0/0
[PE2-GigabitEthernet2/0/0] trust upstream default
[PE2-GigabitEthernet2/0/0] quit
[PE2] interface gigabitethernet 4/0/0
[PE2-GigabitEthernet4/0/0] trust upstream default
[PE2-GigabitEthernet4/0/0] quit
[PE2] interface gigabitethernet 3/0/0
[PE2-GigabitEthernet3/0/0] trust upstream default
[PE2-GigabitEthernet3/0/0] quit
After completing the configuration, run the display diffserv domain default command on a PE
to view information about the default traffic policy for traffic classification in a DS domain.
NOTE
Take note of the preceding items that appear in the display diffserv domain default command output.
Information in "..." can be ignored.
Step 10 Configure the mapping of the CT and service type on the PEs and P.
# Bind the outbound interface of services with the DS domain on PEs for simple traffic
classification.
# Configure PE1.
[PE1] ct-flow-mapping mapping1
[PE1-ct-flow-mapping-mapping1] map ct 0 to ef pq
[PE1-ct-flow-mapping-mapping1] map ct 1 to af1 wfq
[PE1-ct-flow-mapping-mapping1] map ct 2 to be lpq
[PE1-ct-flow-mapping-mapping1] ct-flow-mapping commit
[PE1-ct-flow-mapping-mapping1] quit
[PE1] interface gigabitethernet 3/0/0
[PE1-GigabitEthernet3/0/0] mpls te ct-flow-mapping mapping1
[PE1-GigabitEthernet3/0/0] quit
# Configure PE2.
[PE2] ct-flow-mapping mapping1
[PE2-ct-flow-mapping-mapping1] map ct 0 to ef pq
[PE2-ct-flow-mapping-mapping1] map ct 1 to af1 wfq
[PE2-ct-flow-mapping-mapping1] map ct 2 to be lpq
[PE2-ct-flow-mapping-mapping1] ct-flow-mapping commit
[PE2-ct-flow-mapping-mapping1] quit
[PE2] interface gigabitethernet 3/0/0
[PE2-GigabitEthernet3/0/0] mpls te ct-flow-mapping mapping1
[PE2-GigabitEthernet3/0/0] quit
# After completing the configuration, run the display ct-flow-mapping command on PEs to
view the mapping relationship of CTs and traffic queues.
template-name:mapping1
map CT 0 to ef pq
# Configure PE1.
[PE1] interface gigabitethernet 3/0/0
[PE1-GigabitEthernet3/0/0] port-queue ef pq shaping 220000 outbound
[PE1-GigabitEthernet3/0/0] port-queue af1 wfq weight 15 shaping 120000 outbound
[PE1-GigabitEthernet3/0/0] port-queue be lpq shaping 150000 outbound
[PE1-GigabitEthernet3/0/0] quit
# Configure PE2.
[PE2] interface gigabitethernet 3/0/0
[PE2-GigabitEthernet3/0/0] port-queue ef pq shaping 220000 outbound
[PE2-GigabitEthernet3/0/0] port-queue af1 wfq weight 15 shaping 120000 outbound
[PE2-GigabitEthernet3/0/0] port-queue be lpq shaping 150000 outbound
[PE2-GigabitEthernet3/0/0] quit
# Configure the forwarding adjacency on the TE tunnel and create the MPLS LDP peer
relationship between both ends on the TE tunnel.
# Configure PE1.
[PE1] interface tunnel3/0/0
[PE1-Tunnel3/0/0] mpls te igp advertise
[PE1-Tunnel3/0/0] mpls te igp metric absolute 1
[PE1-Tunnel3/0/0] mpls te commit
[PE1-Tunnel3/0/0] mpls
[PE1-Tunnel3/0/0] quit
[PE1] ospf 1
[PE1-ospf-1] enable traffic-adjustment advertise
[PE1-ospf-1] quit
[PE1-] mpls ldp remote-peer pe1tope2
[PE1-mpls-ldp-remote-pe1tope2] remote-ip 3.3.3.9
# Configure PE2.
[PE2] interface tunnel3/0/0
[PE2-Tunnel3/0/0] mpls te igp advertise
[PE2-Tunnel3/0/0] mpls te igp metric absolute 1
[PE2-Tunnel3/0/0] mpls te commit
[PE2-Tunnel3/0/0] mpls
[PE2-Tunnel3/0/0] quit
[PE2] ospf 1
[PE2-ospf-1] enable traffic-adjustment advertise
[PE2-ospf-1] quit
[PE2-] mpls ldp remote-peer pe2tope1
[PE2-mpls-ldp-remote-pe2tope1] remote-ip 1.1.1.9
After completing the configuration, run the display ip routing-table command on PE1 or PE2
to view route information. The outbound interface destined for 5.5.5.9 is tunnel 3/0/0 on PE1
and the outbound interface destined for 4.4.4.9 is tunnel 3/0/0 on PE2.
Step 13 Create the MP-IBGP remote peer relationship between PEs, and create the EBGP peer
relationship between PEs and CEs.
# Configure PE1.
[PE1] bgp 100
[PE1-bgp] peer 3.3.3.9 as-number 100
[PE1-bgp] peer 3.3.3.9 connect-interface loopback 1
NOTE
Repeat this step for PE2. For configuration details, see Configuration Files in this section.
# Configure CE1.
[CE1] bgp 65410
[CE1-bgp] peer 10.1.1.2 as-number 100
[CE1-bgp] import-route direct
NOTE
Repeat this step for CE2, CE3, and CE4. For configuration details, see Configuration Files in this section.
After completing the configuration, run the display bgp vpnv4 all peer command on the PE.
The BGP peer relationship is created between PEs and its status is Established.
[PE1] display bgp vpnv4 all peer
BGP local router ID : 1.1.1.9
Local AS number : 100
Total number of peers : 3 Peers in established state : 3
Peer V AS MsgRcvd MsgSent OutQ Up/Down State PrefRcv
# Configure PE1.
[PE1] tunnel-policy policya
[PE1-tunnel-policy-policya] tunnel binding destination 3.3.3.9 te tunnel 3/0/0
[PE1-tunnel-policy-policya] quit
[PE1] tunnel-policy policyb
[PE1-tunnel-policy-policyb] tunnel binding destination 3.3.3.9 te tunnel 3/0/1
[PE1-tunnel-policy-policyb] quit
# Configure PE2.
[PE2] tunnel-policy policya
[PE2-tunnel-policy-policya] tunnel binding destination 1.1.1.9 te tunnel 3/0/0
[PE2-tunnel-policy-policya] quit
[PE2] tunnel-policy policyb
[PE2-tunnel-policy-policyb] tunnel binding destination 1.1.1.9 te tunnel 3/0/1
[PE2-tunnel-policy-policyb] quit
# Configure PE1.
[PE1] ip vpn-instance vpna
[PE1-vpn-instance-vpna] ipv4-family
[PE1-vpn-instance-vpna] ipv4-family
[PE1-vpn-instance-vpnb-af-ipv4] route-distinguisher 100:2
[PE1-vpn-instance-vpnb-af-ipv4] vpn-target 222:2 both
[PE1-vpn-instance-vpnb-af-ipv4] tnl-policy policyb
[PE1-vpn-instance-vpnb-af-ipv4] quit
[PE1-vpn-instance-vpnb] quit
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] ip binding vpn-instance vpna
[PE1-GigabitEthernet1/0/0] ip address 10.1.1.2 24
[PE1-GigabitEthernet1/0/0] quit
[PE1] interface gigabitethernet 2/0/0
[PE1-GigabitEthernet2/0/0] ip binding vpn-instance vpnb
[PE1-GigabitEthernet2/0/0] ip address 10.2.1.2 24
[PE1-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] ip vpn-instance vpna
[PE2-vpn-instance-vpna] ipv4-family
[PE2-vpn-instance-vpna-af-ipv4] route-distinguisher 200:1
[PE2-vpn-instance-vpna-af-ipv4] vpn-target 111:1 both
[PE2-vpn-instance-vpna-af-ipv4] tnl-policy policya
[PE2-vpn-instance-vpna-af-ipv4] quit
[PE2-vpn-instance-vpna] quit
[PE2] ip vpn-instance vpnb
[PE2-vpn-instance-vpnb] ipv4-family
[PE2-vpn-instance-vpnb-af-ipv4] route-distinguisher 200:2
[PE2-vpn-instance-vpnb-af-ipv4] vpn-target 222:2 both
[PE2-vpn-instance-vpnb-af-ipv4] tnl-policy policyb
[PE2-vpn-instance-vpnb-af-ipv4] quit
[PE2-vpn-instance-vpnb] quit
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] ip binding vpn-instance vpna
[PE2-GigabitEthernet1/0/0] ip address 10.3.1.2 24
[PE2-GigabitEthernet1/0/0] quit
[PE2] interface gigabitethernet 2/0/0
[PE2-GigabitEthernet2/0/0] ip binding vpn-instance vpnb
[PE2-GigabitEthernet2/0/0] ip address 10.4.1.2 24
[PE2-GigabitEthernet2/0/0] quit
# Configure IP addresses for interfaces of CEs. The configuration details are not provided here.
After completing the configuration, run the display ipvpn-instance verbose command on the
PE to view the configuration of VPN instances. PEs can ping CEs connecting to PEs.
After the configuration, connect the tester to PE3, PE4, and all CEs and inject the following
traffic to the connected interfaces.
AF 50 Mbit/s
AF 50 Mbit/s
BE 50 Mbit/s
You can see that all packets are not discarded. The jitter of EF traffic is shorter than 50 ms, and
the jitter of AF traffic is shorter than 200 ms.
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
ip vpn-instance vpna
ipv4-family
route-distinguisher 100:1
tnl-policy policya
vpn-target 111:1 export-extcommunity
vpn-target 111:1 import-extcommunity
#
ip vpn-instance vpnb
ipv4-family
route-distinguisher 100:2
tnl-policy policyb
vpn-target 222:2 export-extcommunity
vpn-target 222:2 import-extcommunity
#
mpls lsr-id 1.1.1.9
mpls
mpls te
mpls te ds-te mode ietf
mpls rsvp-te
#
mpls ldp
#
mpls ldp remote-peer pe1tope2
remote-ip 3.3.3.9
#
explicit-path path1
next hop 10.10.1.2
next hop 10.11.1.2
next hop 3.3.3.9
#
ct-flow-mapping mapping1
map ct 0 to be lpq
map ct 1 to af1 wfq
map ct 2 to ef pq
ct-flow-mapping commit
#
te-class-mapping
te-class0 class-type ct0 priority 0 description For-BE
te-class1 class-type ct1 priority 0 description For-AF
te-class2 class-type ct2 priority 0 description For-EF
#
interface GigabitEthernet1/0/0
undo shutdown
ip binding vpn-instance vpna
ip address 10.1.1.2 255.255.255.0
trust upstream default
#
interface GigabitEthernet2/0/0
undo shutdown
ip binding vpn-instance vpnb
ip address 10.2.1.2 255.255.255.0
trust upstream default
#
interface GigabitEthernet3/0/0
undo shutdown
ip address 10.10.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 4000000
mpls te bandwidth bc0 400000 bc1 300000 bc2 200000
mpls rsvp-te
trust upstream default
mpls te ct-flow-mapping mapping1
port-queue ef pq shaping 220000 outbound
port-queue af1 wfq weight 15 shaping 120000 outbound
port-queue be lpq shaping 150000 outbound
#
interface GigabitEthernet4/0/0
undo shutdown
ip address 10.5.1.1 255.255.255.0
mpls
mpls ldp
trust upstream default
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
interface Tunnel3/0/0
description For VPN-A & Non-VPN
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.9
mpls te tunnel-id 300
mpls te priority 0
mpls te bandwidth ct0 50000 ct1 50000 ct2 100000
mpls te path explicit-path path1
mpls te igp advertise
mpls te igp metric absolute 1
mpls te commit
mpls
#
interface Tunnel3/0/1
description For VPN-B
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.9
mpls te tunnel-id 301
mpls te priority 0
mpls te bandwidth ct0 50000 ct1 50000 ct2 100000
mpls te path explicit-path path1
mpls te commit
#
bgp 100
peer 3.3.3.9 as-number 100
peer 3.3.3.9 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
peer 3.3.3.9 enable
#
ipv4-family vpnv4
policy vpn-target
peer 3.3.3.9 enable
#
ipv4-family vpn-instance vpna
peer 10.1.1.1 as-number 65410
import-route direct
#
ipv4-family vpn-instance vpnb
peer 10.2.1.1 as-number 65420
import-route direct
#
ospf 1
opaque-capability enable
enable traffic-adjustment advertise
area 0.0.0.0
network 10.10.1.0 0.0.0.255
network 10.5.1.0 0.0.0.255
network 1.1.1.9 0.0.0.0
mpls-te enable
#
tunnel-policy policya
tunnel binding destination 3.3.3.9 te Tunnel3/0/0
#
tunnel-policy policyb
tunnel binding destination 3.3.3.9 te Tunnel3/0/1
#
return
l P configuration file
#
sysname P
#
mpls lsr-id 2.2.2.9
mpls
mpls te
mpls te ds-te mode ietf
mpls rsvp-te
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.10.1.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 400000
mpls te bandwidth bc0 400000 bc1 200000 bc2 100000
mpls rsvp-te
trust upstream default
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 10.11.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 400000
mpls te bandwidth bc0 400000 bc1 200000 bc2 100000
mpls rsvp-te
trust upstream default
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
#
ospf 1
area 0.0.0.0
opaque-capability enable
network 10.10.1.0 0.0.0.255
network 10.11.1.0 0.0.0.255
network 2.2.2.9 0.0.0.0
mpls-te enable
#
return
area 0.0.0.0
network 10.11.1.0 0.0.0.255
network 10.6.1.0 0.0.0.255
network 3.3.3.9 0.0.0.0
mpls-te enable
#
tunnel-policy policya
tunnel binding destination 1.1.1.9 te Tunnel3/0/0
#
tunnel-policy policyb
tunnel binding destination 1.1.1.9 te Tunnel3/0/1
#
return
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
#
bgp 65410
peer 10.1.1.2 as-number 100
#
ipv4-family unicast
undo synchronization
import-route direct
peer 10.1.1.2 enable
#
return
Networking Requirements
On the network shown in the following figure, two static DS-TE tunnels between PE1 and PE2
are set up in non-IETF mode for transmitting EF traffic of VPN-A and BE traffic of VPN-B.
The DS-TE tunnel set up in non-IETF mode supports only the single CT, namely, CT0 or CT1.
In the case of network expansion, it is required that the non-IETF mode be switched to the IETF
mode supporting eight CTs.
Figure 3-20 Networking diagram for switching the non-IETF mode to the IETF mode
Loopback1
GE1/0/0 2.2.2.9/32 GE1/0/0
10.1.1.2/24 PE1 GE1/0/0 GE2/0/0 PE2 10.3.1.2/24
Loopback1 10.10.1.2/24 10.11.1.1/24 Loopback1
1.1.1.9/32 GE3/0/0 GE3/0/0 3.3.3.9/32
GE2/0/0 10.10.1.1/24 P 10.11.1.2/24 GE2/0/0
10.2.1.2/24 10.4.1.2/24
MPLS backbone
AS: 100
GE1/0/0 GE1/0/0
10.2.1.1/24 10.4.1.1/24
CE2 CE4
VPN-B VPN-B
AS: 65420 AS: 65440
Configuration Roadmap
The configuration roadmap is as follows:
NOTE
l In this example, the bandwidth and delay time are guaranteed for all service traffic of each VPN in DS-
TE tunnels.
l If guarantee the bandwidth and delay time for all service traffic only in DS-TE tunnels irrespective of
VPNs, you can set up only one DS-TE tunnel to transmit all the traffic.
l You can limit the service traffic of different VPNs in DS-TE tunnels by limiting the ingress PE to
access VPNs and the service traffic of VPNs.
1. When the non-IETF mode is switched to the IETF mode, the system automatically deletes
the CR-LSPs whose combination of <CT, set-priority> or combination of <CT, hold-
priority> does not exist in the TE-class mapping table. If the TE-class mapping table is
improperly configured, the CR-LSP that transmits traffic may be deleted incorrectly,
resulting in service interruption. Therefore, before switching the DS-TE mode, check the
CTs, setup priority, and holding priority of the ingress and transit CR-LSPs, and the
configuration of TE-class mapping table.
2. For certain CR-LSPs, if the combination of the CT and setup priority or the combination
of the CT and holding priority does not exist in the TE-class mapping table, configure or
modify the TE-class mapping table.
3. Switch the DS-TE mode.
4. Configure related DS-TE items or related services.
Data Preparation
None
Procedure
Step 1 Run the display current-configuration | include static-cr-lsp ingress and display current-
configuration | include static-cr-lsp transit commands on PE1, P, and PE2 to view the CTs of
the static ingress and transit CR-LSPs, and the TE-class mapping table.
NOTE
l For static CR-LSPs, both the setup priority and the holding priority are 0 and the two priorities need
not to be checked.
l For RSVP CR-LSPs, run the display current-configuration interface tunnel command to view the
configured mpls te bandwidth and mpls te priority commands, CTs, setup priority, and holding
priority on each tunnel interface.
# Run the display current-configuration | include static-cr-lsp ingress and display current-
configuration | include static-cr-lsp transit commands on the PE and P to view CTs, setup and
holding priorities of the static ingress and transit CR-LSPs. Then, run the display mpls te ds-
te te-class-mapping config command to view the configuration of the TE-class mapping table.
# In the following example, the display on PE1 is used. Repeat this step for other nodes. For
configuration details, see Configuration Files in this section.
<PE1> display current-configuration | include static-cr-lsp ingress
static-cr-lsp ingress tunnel-interface Tunnel 3/0/0 destination 3.3.3.9 nexthop
10.10.1.2 out-label 100 bandwidth ct0 100000
static-cr-lsp ingress tunnel-interface tunnel 3/0/1 destination 3.3.3.9 nexthop
10.10.1.2 out-label 200 bandwidth ct1 200000
<PE1> display current-configuration | include static-cr-lsp transit
<PE1> display mpls te ds-te te-class-mapping config Info: Configure TE-Class first.
NOTE
The display current-configuration | include static-cr-lsp transit command output is null, indicating that
no static transit CR-LSP is set up on PE1.
The display mpls te ds-te te-class-mapping config command output shows "Info: Configure TE-Class
first.", indicating that no TE-class mapping table is configured on PE1.
# The command output indicates that the static CR-LSPs of CT0 and CT1 are set up on PE1. In
addition, because the setup and holding priorities of the static CR-LSPs are 0, the following TE-
classes must exist in the TE-class mapping table:
l <CT = CT0, Priority = 0>
l <CT = CT1, Priority = 0>
In this example, the TE-classes of <CT = CT0, Priority = 0> and <CT = CT1, Priority = 0> need
to be configured. Because the two TE-classes already exist in the default TE-class mapping table,
no other TE-class mapping table needs to be configured in this example. After the non-IETF
mode is switched to the IETF mode, the system uses the default TE-class mapping table.
NOTE
For information about the default TE-class mapping table, see Table 3-3.
# Configure PE1.
[PE1] mpls
[PE1-mpls] mpls te ds-te mode ietf
[PE1-mpls] quit
# Configure P.
[P] mpls
[P-mpls] mpls te ds-te mode ietf
[P-mpls] quit
# Configure PE2.
[PE2] mpls
[PE2-mpls] mpls te ds-te mode ietf
[PE2-mpls] quit
NOTE
After the non-IETF mode is switched to the IETF mode, the bandwidth constraints model remains
unchanged and does not need to be configured again.
In addition, related configurations of DS-TE and services accesses are required according to the service.
The configurations are not provided in this example.
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
ip vpn-instance vpna
ipv4-family
route-distinguisher 100:1
tnl-policy policya
vpn-target 111:1 export-extcommunity
vpn-target 111:1 import-extcommunity
#
ip vpn-instance vpnb
ipv4-family
route-distinguisher 100:2
tnl-policy policyb
vpn-target 222:2 export-extcommunity
vpn-target 222:2 import-extcommunity
#
mpls lsr-id 1.1.1.9
mpls
mpls te ds-te mode ietf
mpls te ds-te bcm mam
#
ct-flow-mapping mapping1
map ct 0 to ef pq
map ct 1 to be lpq
ct-flow-mapping commit
#
interface GigabitEthernet1/0/0
undo shutdown
ip binding vpn-instance vpna
ip address 10.1.1.2 255.255.255.0
trust upstream default
#
interface GigabitEthernet2/0/0
undo shutdown
ip binding vpn-instance vpnb
ip address 10.2.1.2 255.255.255.0
trust upstream default
#
interface GigabitEthernet3/0/0
undo shutdown
ip address 10.10.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 300000
mpls te bandwidth bc0 100000 bc1 200000
trust upstream default
mpls te ct-flow-mapping mapping1
mpls te ct-bandwidth unshared
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
interface Tunnel3/0/0
description For VPN-A_EF
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.9
mpls te tunnel-id 300
mpls te signal-protocol cr-static
mpls te commit
#
interface Tunnel3/0/1
description For VPN-B_BE
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.9
mpls te tunnel-id 301
mpls te signal-protocol cr-static
mpls te commit
#
bgp 100
peer 3.3.3.9 as-number 100
l P configuration file
#
sysname P
#
mpls lsr-id 2.2.2.9
mpls
mpls te
mpls te ds-te mode ietf
mpls te ds-te bcm mam
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.10.1.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 300000
mpls te bandwidth bc0 100000 bc1 200000
trust upstream default
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 10.11.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 300000
undo shutdown
ip address 10.11.1.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 300000
mpls te bandwidth bc0 100000 bc1 200000
trust upstream default
mpls te ct-flow-mapping mapping1
mpls te ct-bandwidth unshared
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
#
interface Tunnel3/0/0
description For VPN-A_EF
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.9
mpls te tunnel-id 300
mpls te signal-protocol cr-static
mpls te commit
#
interface Tunnel3/0/1
description For VPN-B_BE
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.9
mpls te tunnel-id 301
mpls te signal-protocol cr-static
mpls te commit
#
bgp 100
peer 1.1.1.9 as-number 100
peer 1.1.1.9 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
peer 1.1.1.9 enable
#
ipv4-family vpnv4
policy vpn-target
peer 1.1.1.9 enable
#
ipv4-family vpn-instance vpna
peer 10.3.1.1 as-number 65430
import-route direct
#
ipv4-family vpn-instance vpnb
peer 10.4.1.1 as-number 65440
import-route direct
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 10.11.1.0 0.0.0.255
network 3.3.3.9 0.0.0.0
mpls-te enable
#
static-cr-lsp egress VPN-A_EF incoming-interface gigabitethernet 3/0/0 in-
label 100
static-cr-lsp egress VPN-B_BE incoming-interface gigabitethernet 3/0/0 in-
label 200
static-cr-lsp ingress tunnel-interface tunnel 3/0/0 destination 1.1.1.9
nexthop 10.11.1.1 out-label 101 bandwidth ct0 100000
static-cr-lsp ingress tunnel-interface tunnel 3/0/1 destination 1.1.1.9
nexthop 10.11.1.1 out-label 201 bandwidth ct1 200000
#
tunnel-policy policya
tunnel binding destination 1.1.1.9 te Tunnel3/0/0
#
tunnel-policy policyb
tunnel binding destination 1.1.1.9 te Tunnel3/0/1
#
return
Networking Requirements
On the network shown in Figure 3-21, the primary LSP is along the path LSRA --> LSRB -->
LSRC --> LSRD, and the link from LSRB to LSRC requires FRR link protection.
A bypass LSP is set up over the path LSRB --> LSRE --> LSRC. LSRB is a PLR, and LSRC is
an MP.
An explicit path is used to protect traffic on the MPLS TE primary and the bypass tunnels. The
RSVP-TE signaling protocol is used.
LSRD
GE1/0/0
4.1.1.2/24
Loopback1 Loopback1
1.1.1.1/32 2.2.2.2/32 Loopback1
3.3.3.3/32 GE1/0/0
LSRA LSRB 4.1.1.1/24
LSRE
Configuration Roadmap
The configuration roadmap is as follows:
1. Establish the primary tunnel and enable TE FRR in the tunnel interface view.
2. Configure the bypass tunnel on the PLR (LSRB) and specify the protectable bandwidth
and the interface to be protected.
Data Preparation
To complete the configuration, you need the following data:
l IS-IS area ID on each LSR, original system ID, and IS-IS level
l Maximum reservable bandwidth and BC bandwidth for the link along the tunnel
l Explicit paths of the primary and the bypass tunnels
l Interface names, IP addresses, destination addresses, tunnel IDs, tunnel signaling protocol
(RSVP-TE) of the primary and bypass tunnels
l Bandwidth that the bypass tunnel can protect and the protected link interface
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and mask to each interface, including the loopback interface, according to
Figure 3-21. For configuration details, see Configuration Files in this section.
Step 2 Configure an IGP.
The IS-IS protocol is configured on all LSRs to advertise routes of LSR IDs. For configuration
details, see Configuration Files in this section.
After completing the configuration, run the display ip routing-table command on each LSR.
The command output shows that the LSRs learned routes from one another.
Step 3 Configure the basic MPLS functions and enable MPLS TE, CSPF, RSVP-TE, and IS-IS TE.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] mpls
[LSRA-GigabitEthernet1/0/0] mpls te
[LSRA-GigabitEthernet1/0/0] mpls rsvp-te
[LSRA-GigabitEthernet1/0/0] quit
[LSRA] isis
[LSRA-isis-1] cost-style wide
[LSRA-isis-1] traffic-eng level-2
NOTE
Repeat this step for LSRB, LSRC, LSRD, and LSRE. For configuration details, see Configuration Files
in this section.
CSPF is enabled only on LSRA and LSRB.
# Configure LSRA.
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRA-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000
[LSRA-GigabitEthernet1/0/0] quit
# Configure LSRB.
[LSRB] interface gigabitethernet 2/0/0
[LSRB-GigabitEthernet2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRB-GigabitEthernet2/0/0] mpls te bandwidth bc0 100000
[LSRB-GigabitEthernet2/0/0] quit
[LSRB] interface pos 3/0/0
[LSRB-Pos3/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRB-Pos3/0/0] mpls te bandwidth bc0 100000
[LSRB-Pos3/0/0] quit
# Configure LSRC.
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRC-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000
[LSRC-GigabitEthernet1/0/0] quit
# Configure LSRE.
[LSRE] interface pos 2/0/0
[LSRE-Pos2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRE-Pos2/0/0] mpls te bandwidth bc0 100000
[LSRE-Pos2/0/0] quit
# Enable FRR.
[LSRA-Tunnel1/0/0] mpls te fast-reroute
[LSRA-Tunnel1/0/0] mpls te commit
[LSRA-Tunnel1/0/0] quit
After completing the configuration, run the display interface tunnel command on LSRA. The
status of Tunnel 1/0/0 is Up.
[LSRA] display interface tunnel 1/0/0
Tunnel1/0/0 current state : UP
Line protocol current state : UP
Last up time: 2009-01-12, 09:35:10
Description : Tunnel1/0/0 Interface, Route Port
...
Run the display mpls te tunnel verbose command on LSRA to view information about the
tunnel interface.
[LSRA] display mpls te tunnel verbose
No : 1
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 0 LSP Index : 2048
Session ID : 100 LSP ID : 1
LSR Role : Ingress Lsp Type : Primary
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 4.4.4.4
In-Interface : -
Out-Interface : GE1/0/0
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : -
ER-Hop Table Index : 0 AR-Hop Table Index: 0
C-Hop Table Index : 0
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 1081
Created Time : 2010/07/01 15:02:57 UTC-08:00
RSVP LSP Type : -
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Reserved
CT0 Bandwidth(Kbit/sec) : 50000 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x63 Protected Flag : 0x0
Bypass In Use : Not Exists
Bypass Tunnel Id : -
BypassTunnel : -
Bypass LSP ID : - FrrNextHop : -
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
After completing the configuration, run the display interface tunnel command on LSRB. The
command output shows that the status of the Tunnel 3/0/0 interface is Up.
Run the display mpls lsp command on all LSRs to check LSP entries. The command output
shows that LSPs pass through LSRB and LSRC.
[LSRA] display mpls lsp
------------------------------------------------------------------
LSP Information: RSVP LSP
------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
4.4.4.4/32 NULL/1024 -/GE1/0/0
[LSRB] display mpls lsp
------------------------------------------------------------------
LSP Information: RSVP LSP
------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
4.4.4.4/32 1024/1024 GE1/0/0/GE2/0/0
3.3.3.3/32 NULL/1024 -/Pos3/0/0
[LSRC] display mpls lsp
------------------------------------------------------------------
LSP Information: RSVP LSP
------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
4.4.4.4/32 1024/3 GE2/0/0/GE1/0/0
3.3.3.3/32 3/NULL Pos3/0/0/-
[LSRD] display mpls lsp
------------------------------------------------------------------
LSP Information: RSVP LSP
------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
4.4.4.4/32 3/NULL GE1/0/0/-
[LSRE] display mpls lsp
------------------------------------------------------------------
LSP Information: RSVP LSP
------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
3.3.3.3/32 1024/3 Pos1/0/0/Pos2/0/0
Run the display mpls te tunnel command on all the LSRs to check the establishment status of
the tunnel. The command output shows that two tunnels pass through LSRB and LSRC.
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
1.1.1.1 4.4.4.4 1 --/3 I Tunnel1/0/0
[LSRB] display mpls te tunnel
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
1.1.1.1 4.4.4.4 1 1026/3 T Tunnel1/0/0
2.2.2.2 3.3.3.3 1 --/3 I Tunnel3/0/0
[LSRC] display mpls te tunnel
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
1.1.1.1 4.4.4.4 1 1024/3 T Tunnel1/0/0
2.2.2.2 3.3.3.3 1 3/-- E Tunnel3/0/0
[LSRE] display mpls te tunnel
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
2.2.2.2 3.3.3.3 1 1025/3 T Tunnel3/0/0
Run the display mpls te tunnel name Tunnel1/0/0 verbose command on LSRB. The command
output shows that the bypass tunnel is bound to GE 2/0/0 and remains unused.
[LSRB] display mpls te tunnel name Tunnel1/0/0 verbose
No : 1
Tunnel-Name : Tunnel1/0/0
Tunnel Interface Name : Tunnel1/0/0
TunnelIndex : 1 LSP Index : 4098
Session ID : 100 LSP ID : 1
LSR Role : Transit LSP Type : Primary
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 4.4.4.4
In-Interface : GE1/0/0
Out-Interface : GE2/0/0
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : -
ER-Hop Table Index : - AR-Hop Table Index: 2
C-Hop Table Index : 1
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 65546
Created Time : 2009/01/12 09:42:04
RSVP LSP Type : -
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Reserved
CT0 Bandwidth(Kbit/sec) : 100000 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x63 Protected Flag : 0x1
Bypass In Use : Not Used
Bypass Tunnel Id : 67141670
Run the display interface tunnel 1/0/0 command on LSRA to view the status of the primary
LSP. The status of the tunnel interface is still Up.
Run the tracert lsp te tunnel 1/0/0 command on LSRA to view the path over which the tunnel
is established.
[LSRA] tracert lsp te tunnel 1/0/0
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 , press CTRL_C to
break.
TTL Replier Time Type Downstream
0 Ingress 2.1.1.2/[13312 ]
1 2.1.1.2 1 ms Transit
2 3.2.1.2 16 ms Transit
3 3.3.1.2 1 ms Transit
4 4.1.1.2 1 ms Egress
The preceding information shows that the link is already switched to the bypass tunnel.
NOTE
After FRR switching, run the display mpls te tunnel-interface command immediately. Two CR-LSPs are
in the Up state because FRR establishes a new LSP using make-before-break. The previous LSP is torn
down only after the new LSP has been established successfully.
Run the display mpls te tunnel name Tunnel1/0/0 verbose command on LSRB. The command
output shows that the bypass tunnel is used.
[LSRB] display mpls te tunnel name Tunnel1/0/0 verbose
No : 1
Tunnel-Name : Tunnel1/0/0
Tunnel Interface Name : Tunnel1/0/0
TunnelIndex : 1 LSP Index : 4098
Session ID : 100 LSP ID : 1
LSR Role : Transit
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 4.4.4.4
In-Interface : GE1/0/0
Out-Interface : GE2/0/0
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
ER-Hop Table Index : 3 AR-Hop Table Index: 12
C-Hop Table Index : 50
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 66000
Created Time : 2009/01/12 10:09:10
RSVP LSP Type : -
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Unreserved
CT0 Bandwidth(Kbit/sec) : 100000 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x63 Protected Flag : 0x1
Bypass In Use : In Use
Bypass Tunnel Id : 300
BypassTunnel : Tunnel Index[Tunnel3/0/0], InnerLabel[1024]
Bypass LSP ID : 9 FrrNextHop : 3.2.1.2
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
Run the display interface tunnel 1/0/0 command to view the status of the primary LSP on
LSRA. The tunnel interface is in Up state.
After a while, run the display mpls te tunnel name Tunnel1/0/0 verbose command on LSRB.
The command output shows that Tunnel 3/0/0 is bound to GE 2/0/0 and is unused.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path pri-path
next hop 2.1.1.2
next hop 3.1.1.2
next hop 4.1.1.2
next hop 4.4.4.4
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
ip address 2.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 4.4.4.4
mpls te record-route label
mpls te path explicit-path pri-path
mpls te tunnel-id 100
mpls te bandwidth ct0 50000
mpls te fast-reroute
mpls te commit
#
return
network-entity 00.0005.0000.0000.0002.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
ip address 2.1.1.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 3.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface Pos3/0/0
link-protocol ppp
ip address 3.2.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
interface Tunnel3/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 300
mpls te record-route
mpls te path explicit-path by-path
mpls te bandwidth ct0 100000
mpls te bypass-tunnel
mpls te protected-interface GigabitEthernet 2/0/0
mpls te commit
#
return
#
interface Pos1/0/0
link-protocol ppp
clock master
ip address 3.2.1.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface Pos2/0/0
link-protocol ppp
clock master
ip address 3.3.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 5.5.5.5 255.255.255.255
isis enable 1
#
return
Networking Requirements
On the network shown in Figure 3-22, a primary tunnel is set up over the explicit path LSRA
--> LSRB --> LSRC. A bypass tunnel is set up on the headend LSRA for node protection, and
a bypass tunnel is set up on the transit LSRB for link protection, and both of them provide
bandwidth protection.
GE3/0/0 GE2/0/0
3.2.1.2/24 4.1.1.1/24
LSRD
Configuration Roadmap
The configuration roadmap is as follows:
1. Establish a primary tunnel, enable TE FRR in the tunnel interface view, and enable TE
Auto FRR in the MPLS view.
Data Preparation
To complete the configuration, you need the following data.
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and mask to each interface, including Loopback interfaces, according to
Figure 3-22. For configuration details, see Configuration Files in this section.
Step 2 Configure OSPF on all LSRs to advertise the routes of each network segment and the host route
of each LSR ID.
Configure OSPF on all LSRs to advertise the host route of each LSR ID. For configuration
details, see Configuration Files in this section.
After completing the configuration, run the display ip routing-table command on each LSR.
The command output shows that the LSRs have learned the host routes of LSR IDs from each
other.
Step 3 Configure the basic MPLS functions and enable MPLS TE, RSVP-TE, and CSPF.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface gigabitethernet 2/0/0
[LSRA-GigabitEthernet2/0/0] mpls
[LSRA-GigabitEthernet2/0/0] mpls te
[LSRA-GigabitEthernet2/0/0] mpls rsvp-te
[LSRA-GigabitEthernet2/0/0] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] mpls
[LSRA-GigabitEthernet1/0/0] mpls te
[LSRA-GigabitEthernet1/0/0] mpls rsvp-te
[LSRA-GigabitEthernet1/0/0] quit
NOTE
Repeat this step for LSRB, LSRC, and LSRD. For configuration details, see Configuration Files in this
section.
# Configure LSRB.
[LSRB] ospf
[LSRB-ospf-1] opaque-capability enable
[LSRB-ospf-1] area 0
[LSRB-ospf-1-area-0.0.0.0] mpls-te enable
[LSRB-ospf-1-area-0.0.0.0] quit
[LSRB-ospf-1] quit
# Configure LSRC.
[LSRC] ospf
[LSRC-ospf-1] opaque-capability enable
[LSRC-ospf-1] area 0
[LSRC-ospf-1-area-0.0.0.0] mpls-te enable
[LSRC-ospf-1-area-0.0.0.0] quit
[LSRC-ospf-1] quit
# Configure LSRD.
[LSRD] ospf
[LSRD-ospf-1] opaque-capability enable
[LSRD-ospf-1] area 0
[LSRD-ospf-1-area-0.0.0.0] mpls-te enable
[LSRD-ospf-1-area-0.0.0.0] quit
[LSRD-ospf-1] quit
The outbound interfaces on the link through which the primary have similar configurations. For
configuration details, see Configuration Files in this section.
Step 6 Configure the explicit path for the primary tunnel.
[LSRA] explicit-path master
[LSRA-explicit-path-master] next hop 2.1.1.2
[LSRA-explicit-path-master] next hop 3.1.1.2
# Configure LSRB.
[LSRB] mpls
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
The command output shows that the primary tunnel is bound to the Auto bypass tunnel, that is,
Tunnel 0/0/2048.
Run the display mpls te tunnel path command on LSRA. You can view information about the
primary tunnel and the Auto bypass tunnel, and node and bandwidth protection provided for the
outbound interface of the primary tunnel.
[LSRA] display mpls te tunnel path
Tunnel Interface Name : Tunnel2/0/0
Lsp ID : 1.1.1.1 :200:1
Hop Information
Hop 1 2.1.1.2 Label 106497
Hop 2 2.2.2.2
Hop 4 3.1.1.2 Label 3
Hop 5 3.3.3.3
Tunnel Interface Name : Tunnel0/0/2048
Lsp ID : 1.1.1.1 :2049:3
Hop Information
Hop 0 10.1.1.2
Hop 1 10.1.1.1
Hop 2 3.3.3.3
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls te auto-frr
mpls rsvp-te
mpls te cspf
#
explicit-path master
next hop 2.1.1.2
next hop 3.1.1.2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 10000
mpls te bandwidth bc0 10000 bc1 3000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 2.1.1.1 255.255.255.0
mpls
mpls te
opaque-capability enable
area 0.0.0.0
network 3.1.1.0 0.0.0.255
network 3.2.1.0 0.0.0.255
network 2.1.1.0 0.0.0.255
network 2.2.2.2 0.0.0.0
mpls-te enable
#
return
Networking Requirements
On the network shown in Figure 3-23, the primary tunnel is along the path LSRA -> LSRB ->
LSRC -> LSRD, and FRR is required on the link between LSRB and LSRC for protection.
A bypass tunnel is set up along the path LSRB -> LSRE -> LSRC. LSRB functions as the PLR
and LSRC functions as the MP.
The primary and bypass MPLS TE tunnels are set up by using explicit paths. RSVP-TE is used
as the signaling protocol.
The RSVP authentication needs to be configured on LSRB and LSRC. In this example, LSRB
and LSRC are configured as neighboring nodes by using their LSR IDs, and RSVP key
authentication is enabled to achieve higher reliability.
Figure 3-23 Networking diagram for the MPLS TE FRR-based RSVP key authentication
Loopback1
4.4.4.4/32
LSRD
GE1/0/0
4.1.1.2/24
Loopback1 Loopback1
1.1.1.1/32 2.2.2.2/32 Loopback1
3.3.3.3/32 GE1/0/0
LSRA LSRB 4.1.1.1/24
LSRE
Loopback1
5.5.5.5/32
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure MPLS TE FRR.
Configure the primary tunnel and bypass tunnel based on Example for Configuring MPLS TE
FRR and then bind the two tunnels.
Step 2 Configure RSVP key authentication on LSRB and LSRC to enhance security of packet
transmission. In addition, check whether the RSVP key authentication is successfully
configured, configure the RSVP-TE handshake function.
# Run the display mpls rsvp-te statistics global command on LSRB. You can view the status
of the RSVP key authentication. If the command output shows that the values of the
SendChallengeMsgCounter field, RecChallengeMsgCounter field, SendResponseMsgCounter
field, and RecResponseMsgCounter field are not zero, it indicates that the PLR and the MP
successfully shake hands with each other and RSVP key authentication is configured
successfully.
<LSRB> display mpls rsvp-te statistics global
LSR ID: 2.2.2.2 LSP Count: 2
PSB Count: 1 RSB Count: 1
RFSB Count: 0
# Run the display interface tunnel 1/0/0 command on LSRA to view the status of the primary
tunnel. You can see that the tunnel interface is Up.
# Run the tracert lsp te tunnel 1/0/0 command on LSRA. You can view the path by which the
tunnel passes.
[LSRA] tracert lsp te tunnel 1/0/0
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 , press CTRL_C to
break.
TTL Replier Time Type Downstream
0 Ingress 2.1.1.2/[13312 ]
1 2.1.1.2 1 ms Transit 3.2.1.2/[13312 13312 ]
2 3.2.1.2 16 ms Transit 3.3.1.2/[3 ]
3 3.3.1.2 1 ms Transit 4.1.1.2/[3 ]
4 4.1.1.2 1 ms Egress
The command output shows that traffic is switched to the bypass tunnel.
# Run the display mpls te tunnel name tunnel1/0/0 verbose command on LSRB. You can see
that the bypass tunnel is working.
[LSRB] display mpls te tunnel name tunnel1/0/0 verbose
No : 1
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 1 LSP Index : 4098
Session ID : 100 LSP ID : 1
LSR Role : Transit LSP Type : Primary
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 4.4.4.4
In-Interface : GE1/0/0
Out-Interface : GE2/0/0
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
ER-Hop Table Index : 3 AR-Hop Table Index: 12
C-Hop Table Index : 50
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 66000
Created Time : 2009/01/12 10:09:10
RSVP LSP Type : -
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Unreserved
CT0 Bandwidth(Kbit/sec) : 50000 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x63 Protected Flag : 0x1
Bypass In Use : In Use
Bypass Tunnel Id : 67141670
BypassTunnel : Tunnel Index[Tunnel3/0/0], InnerLabel[1024]
Bypass LSP ID : 9 FrrNextHop : 3.3.1.2
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
# Run the display mpls rsvp-te peer command. You can see whether the bypass tunnel is
successfully set up.
[LSRB] display mpls rsvp-te peer
Remote Node id Neighbor
Neighbor Addr: -----
SrcInstance: 0xDAC29CB4 NbrSrcInstance: 0x0
PSB Count: 1 RSB Count: 0
Hello Type Sent: NONE
SRefresh Enable: NO
Last valid seq # rcvd: NULL
Interface: gigabitethernet1/0/0
Neighbor Addr: 2.1.1.1
SrcInstance: 0xDAC29CB4 NbrSrcInstance: 0x0
PSB Count: 1 RSB Count: 0
Hello Type Sent: NONE
SRefresh Enable: NO
Last valid seq # rcvd: NULL
Interface: gigabitethernet2/0/0
Neighbor Addr: 3.1.1.2
SrcInstance: 0xDAC29CB4 NbrSrcInstance: 0x0
PSB Count: 0 RSB Count: 0
Hello Type Sent: NONE
SRefresh Enable: NO
Last valid seq # rcvd: NULL
Interface: POS1/0/0
Neighbor Addr: 3.2.1.2
SrcInstance: 0xDAC29CB4 NbrSrcInstance: 0x0
PSB Count: 0 RSB Count: 1
Hello Type Sent: NONE
SRefresh Enable: NO
Last valid seq # rcvd: NULL
The command output shows that the number of RSBs on POS 1/0/0 of LSRB is not zero. This
indicates that RSVP key authentication is successfully configured on LSRB and its neighbor
LSRE, and the resources are successfully reserved.
----End
Configuration Files
l Configuration file of LSRA
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path pri-path
next hop 2.1.1.2
next hop 3.1.1.2
next hop 4.1.1.2
next hop 4.4.4.4
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
ip address 2.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 4.4.4.4
mpls te record-route label
mpls te path explicit-path pri-path
mpls te tunnel-id 100
mpls te bandwidth ct0 50000
mpls te fast-reroute
mpls te commit
#
return
link-protocol ppp
ip address 3.2.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
interface Tunnel3/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 300
mpls te record-route
mpls te path explicit-path by-path
mpls te bandwidth ct0 100000
mpls te bypass-tunnel
mpls te protected-interface GigabitEthernet 2/0/0
mpls te commit
mpls rsvp-te peer 3.3.3.3
mpls rsvp-te authentication plain huaweiHW
mpls rsvp-te authentication handshake
#
return
mpls rsvp-te
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
isis enable 1
mpls rsvp-te peer 2.2.2.2
mpls rsvp-te authentication plain huaweiHW
mpls rsvp-te authentication handshake
#
return
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 5.5.5.5 255.255.255.255
isis enable 1
#
return
Networking Requirements
As shown in Figure 3-24, the primary tunnel is along the path LSRA -> LSRB -> LSRC ->
LSRD, and the link between LSRB and LSRC requires FRR for protection. In addition, the
summary refresh (Srefresh) function needs to be configured on LSRB and LSRC.
A bypass tunnel is set up along the path LSRB -> LSRE -> LSRC. LSRB functions as the PLR
and LSRC functions as the MP.
The primary and bypass MPLS TE tunnels are set up by using explicit paths. RSVP-TE is used
as the signaling protocol.
The Srefresh function needs to be configured on LSRB and LSRC. In addition, RSVP key
authentication is configured in the MPLS view. This helps the Srefresh function to achieve higher
reliability.
Figure 3-24 Networking diagram for the MPLS TE FRR-based Srefresh function
Loopback1
4.4.4.4/32
LSRD
GE1/0/0
4.1.1.2/24
Loopback1 Loopback1
1.1.1.1/32 2.2.2.2/32 Loopback1
3.3.3.3/32 GE1/0/0
LSRA LSRB 4.1.1.1/24
LSRE
Loopback1
5.5.5.5/32
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure MPLS TE FRR.
You can configure the primary and bypass MPLS TE tunnels based on Example for
Configuring MPLS TE FRR, and then bind the two tunnels.
Step 2 Configure the Srefresh function on LSRB functioning as the PLR and LSRC functioning as the
MP.
# Run the display interface tunnel 1/0/0 command on LSRA to view the status of the primary
tunnel. You can view that the tunnel interface is Up.
# Run the tracert lsp te tunnel 1/0/0 command on LSRA. You can view the path by which the
tunnel passes.
[LSRA] tracert lsp te tunnel 1/0/0
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 , press CTRL_C to
break.
TTL Replier Time Type Downstream
0 Ingress 2.1.1.2/[13312 ]
1 2.1.1.2 1 ms Transit 3.2.1.2/[13312 13312 ]
2 3.2.1.2 16 ms Transit 3.3.1.2/[3 ]
3 3.3.1.2 1 ms Transit 4.1.1.2/[3 ]
4 4.1.1.2 1 ms Egress
# The command output shows that traffic is switched to the bypass tunnel.
# Run the display mpls te tunnel name tunnel1/0/0 verbose command on LSRB. You can view
that the bypass tunnel is working.
[LSRB] display mpls te tunnel name tunnel1/0/0 verbose
No : 1
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 1 LSP Index : 4098
Session ID : 100 LSP ID : 1
LSR Role : Transit LSP Type : Primary
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 4.4.4.4
In-Interface : GE1/0/0
Out-Interface : GE2/0/0
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
ER-Hop Table Index : 3 AR-Hop Table Index: 12
C-Hop Table Index : 50
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 66000
Created Time : 2009/01/12 10:09:10
RSVP LSP Type : -
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Unreserved
CT0 Bandwidth(Kbit/sec) : 50000 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x63 Protected Flag : 0x1
Bypass In Use : In Use
Bypass Tunnel Id : 67141670
BypassTunnel : Tunnel Index[Tunnel3/0/0], InnerLabel[1024]
Bypass LSP ID : 9 FrrNextHop : 3.3.1.2
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
# Run the display mpls rsvp-te statistics global command. You can view the statistics about
the Srefresh function.
[LSRB]display mpls rsvp-te statistics global
LSR ID: 2.2.2.2 LSP Count: 2
After the Srefresh function is configured on LSRB and LSRC globally, the Srefresh function on
LSRB and LSRC takes effect when the primary tunnel fails.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path pri-path
next hop 2.1.1.2
next hop 3.1.1.2
next hop 4.1.1.2
next hop 4.4.4.4
#
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
ip address 2.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 4.4.4.4
mpls te record-route label
mpls te path explicit-path pri-path
mpls te tunnel-id 100
mpls te bandwidth ct0 50000
mpls te fast-reroute
mpls te commit
#
return
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 300
mpls te record-route
mpls te path explicit-path by-path
mpls te bandwidth ct0 100000
mpls te bypass-tunnel
mpls te protected-interface GigabitEthernet 2/0/0
mpls te commit
#
return
isis 1
is-level level-2
cost-style wide
network-entity 00.0005.0000.0000.0004.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
ip address 4.1.1.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
isis enable 1
#
return
Networking Requirements
Figure 3-25 illustrates the MPLS TE FRR networking. The primary tunnel is along the path
PLR → LSR1→ MP → LSR3, and its bypass tunnel is along the path PLR → LSR2 → MP.
After the interface board on which POS 1/0/0 of the PLR resides is removed, TE traffic of the
primary tunnel needs to switch to the bypass tunnel. After the interface board is installed back,
traffic switches back to the primary tunnel.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure the tunnel interfaces of the primary and bypass tunnels on the master control
board.
2. Specify the explicit paths of the primary tunnel and the bypass tunnel when configuring
MPLS TE FRR. Note that the explicit paths of the primary tunnel and the bypass tunnel
must pass through different interface boards of the PLR, and the primary tunnel cannot be
on the board to be removed; otherwise, board removal protection cannot be implemented.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and mask to each interface, including the loopback interface, according to
Figure 3-25. For configuration details, see Configuration Files in this section.
Step 2 Configure OSPF on all LSRs to advertise the routes of each network segment and the host route
of each LSR ID.
Configure OSPF on all LSRs to advertise the host route of each LSR ID. For configuration
details, see Configuration Files in this section.
After completing the configuration, run the display ip routing-table command on each LSR.
The command output shows that the LSRs learn the host route of the LSR ID from each other.
Step 3 Configure the basic MPLS functions and enable MPLS TE and RSVP-TE.
# Configure a PLR.
[PLR] mpls lsr-id 1.1.1.1
[PLR] mpls
[PLR-mpls] mpls te
[PLR-mpls] mpls rsvp-te
[PLR-mpls] quit
[PLR] interface pos 1/0/0
[PLR-Pos1/0/0] mpls
[PLR-Pos1/0/0] mpls te
[PLR-Pos1/0/0] mpls rsvp-te
[PLR-Pos1/0/0] quit
[PLR] interface pos2/0/0
[PLR-Pos2/0/0] mpls
[PLR-Pos2/0/0] mpls te
[PLR-Pos2/0/0] mpls rsvp-te
[PLR-Pos2/0/0] quit
NOTE
Repeat this step for LSR1, LSR2, the MP, and LSR3. For configuration details, see Configuration Files
in this section.
Step 4 Configure OSPF TE on all LSRs and enable CSPF on the ingress of the primary tunnel.
# Configure OSPF TE.
[PLR] ospf
[PLR-ospf-1] opaque-capability enable
[PLR-ospf-1] area 0
[PLR-ospf-1-area-0.0.0.0] mpls-te enable
[PLR-ospf-1-area-0.0.0.0] quit
[PLR-ospf-1] quit
NOTE
Repeat this step for LSR1, LSR2, the MP, and LSR3. For configuration details, see Configuration Files
in this section.
Step 5 Configure the reservable bandwidth for the interfaces on each link.
Set the maximum reservable bandwidth of the link to 10 Mbit/s, the BC0 bandwidth to 10 Mbit/
s, and the BC1 bandwidth to 3 Mbit/s.
# Configure link bandwidth on all the outbound interfaces of the link along the primary and
bypass tunnels. For configuration details, see Configuration Files in this section.
# Configure the explicit path for the primary tunnel on the PLR.
[PLR] explicit-path master
[PLR-explicit-path-master] next hop 10.1.1.2
[PLR-explicit-path-master] next hop 30.1.1.2
[PLR-explicit-path-master] next hop 50.1.1.2
[PLR-explicit-path-master] next hop 5.5.5.5
[PLR-explicit-path-master] quit
# Run the display interface tunnel command on PLR. The command output shows that the
status of Tunnel 0/0/1 of the primary tunnel is Up.
[PLR] display interface tunnel 0/0/1
Tunnel0/0/1 current state : UP
Line protocol current state : UP
Last up time: 2009-03-29, 16:35:10
Description : Tunnel0/0/1 Interface, Route Port
...
# Configure the explicit path for the bypass tunnel on the PLR.
[PLR] explicit-path by-path
[PLR-explicit-path-by-path] next hop 20.1.1.2
[PLR-explicit-path-by-path] next hop 40.1.1.2
[PLR-explicit-path-by-path] next hop 4.4.4.4
# Run the display interface tunnel command on PLR. The command output shows that the
status of Tunnel 0/0/2 of the bypass tunnel is Up.
<PLR> display interface tunnel 0/0/2
Tunnel0/0/2 current state : UP
Line protocol current state : UP
Last up time: 2009-03-29, 16:43:34
Description : Tunnel0/0/2 Interface, Route Port
...
# After removing the interface board where the outbound interface of the primary tunnel (POS
1/0/0) resides, run the display interface tunnel and display mpls te tunnel stale-interface
interface-index verbose commands. The command output shows that the tunnel interface of the
primary tunnel remains Up.
# Run the display mpls te tunnel stale-interface command on the PLR. The command output
shows that the outbound interface of the primary tunnel is in the Stale state.
<PLR> display mpls stale-interface
Stale-interface Status TE Attri LSP Count CRLSP Count Effective MTU
0x018000106 Up Dis 0 1 -
<PLR> display mpls te tunnel stale-interface 18000106 verbose
No : 1
Tunnel-Name : Tunnel0/0/1
TunnelIndex : 0 LSP Index : 2048
Session ID : 100 LSP ID : 1
LSR Role : Ingress LSP Type : -
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 5.5.5.5
In-Interface : -
Out-Interface : 0x800086
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : -
ER-Hop Table Index : 0 AR-Hop Table Index: 5
C-Hop Table Index : 0
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 1024
Created Time : 2009-03-29, 16:43:34
RSVP LSP Type : -
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Unreserved
CT0 Bandwidth(Kbit/sec) : 0 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x63 Protected Flag : 0x1
Bypass In Use : In Use
Bypass Tunnel Id : 8396808
BypassTunnel : Tunnel Index[Tunnel0/0/2], InnerLabel[65536]
Bypass LSP ID : 1 FrrNextHop : 40.1.1.2
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
# Run the display mpls te tunnel path command on the PLR to view the path information of
the primary tunnel.
<PLR> display mpls te tunnel path Tunnel0/0/1
Tunnel Interface Name : Tunnel0/0/1
Lsp ID : 1.1.1.1 :100 :1
Hop Information
Hop 0 20.1.1.1 Local-Protection in use
Hop 1 20.1.1.2 Label 65536
Hop 2 3.3.3.3 Label 65536
Hop 3 40.1.1.1
Hop 4 40.1.1.2 Label 131072
Hop 5 4.4.4.4 Label 131072
Hop 6 50.1.1.1
Hop 7 50.1.1.2 Label 3
Hop 8 5.5.5.5 Label 3
# Run the tracert lsp te tunnel command. The command output shows that TE traffic is
transmitted through the bypass tunnel.
<PLR> tracert lsp te tunnel 0/0/1
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel0/0/1 , press CTRL_C to
break.
TTL Replier Time Type Downstream
0 Ingress 20.1.1.2/[65536 15360 ]
1 20.1.1.2 50 ms Transit 40.1.1.2/[131073 ]
2 40.1.1.2 50 ms Transit 30.1.1.1/[3 ]
3 30.1.1.1 4 ms Transit
4 30.1.1.2 15 ms Transit 50.1.1.2/[3 ]
5 11.1.1.1 6 ms Egress
# After you re-install the interface board where the outbound interface of the primary tunnel
resides, run the tracert lsp te tunnel command. The command output shows that traffic switches
back to the primary tunnel.
<PLR> tracert lsp te tunnel 0/0/1
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel6/0/0 , press CTRL_C to
break.
TTL Replier Time Type Downstream
0 Ingress 10.1.1.2/[65537 ]
1 10.1.1.2 40 ms Transit 30.1.1.2/[131074 ]
2 30.1.1.2 50 ms Transit 50.1.1.2/[3 ]
3 5.5.5.5 60 ms Egress
----End
Configuration Files
l PLR configuration file
#
sysname PLR
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path master
next hop 10.1.1.2
next hop 30.1.1.2
next hop 50.1.1.2
next hop 5.5.5.5
#
explicit-path by-path
next hop 20.1.1.2
next hop 40.1.1.2
next hop 4.4.4.4
#
interface Pos1/0/0
link-protocol ppp
ip address 10.1.1.1 255.255.255.252
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 10000
mpls te bandwidth bc0 10000 bc1 3000
mpls rsvp-te
#
interface Pos2/0/0
link-protocol ppp
ip address 20.1.1.1 255.255.255.252
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 10000
mpls te bandwidth bc0 10000 bc1 3000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel0/0/1
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 5.5.5.5
mpls te tunnel-id 100
mpls te bandwidth ct0 400
l MP configuration file
#
sysname MP
#
mpls lsr-id 4.4.4.4
mpls
mpls te
mpls rsvp-te
#
interface Pos1/0/0
link-protocol ppp
ip address 30.1.1.2 255.255.255.252
mpls
mpls te
mpls rsvp-te
#
interface Pos2/0/0
link-protocol ppp
ip address 40.1.1.2 255.255.255.252
mpls
mpls te
mpls rsvp-te
#
interface Pos3/0/0
link-protocol ppp
ip address 50.1.1.1 255.255.255.252
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 10000
mpls te bandwidth bc0 10000 bc1 3000
mpls rsvp-te
#
interface LoopBack1
Networking Requirements
Figure 3-26 illustrates an MPLS VPN. A TE tunnel originates from the ingress PE1 and
terminates at the egress PE2. CR-LSP hot backup and best-effort LSPs need to be configured.
The following LSPs need to be established:
l Primary CR-LSP along the path PE1 --> P1 --> PE2
l Backup CR-LSP along the path PE1 --> P2 --> PE2
If the primary CR-LSP fails, traffic switches to the backup CR-LSP. After the primary CR-LSP
recovers from the fault, traffic switches back to the primary CR-LSP in 15 seconds. If both the
primary and backup CR-LSPs fail, traffic switches to the best-effort LSP. If both the primary
and backup CR-LSPs fail, traffic switches to the best-effort path. Explicit paths can be configured
for the primary and backup CR-LSPs. A best-effort path can be generated automatically. In this
example, the best-effort path is PE1 -> P2 -> P1 -> PE2. The calculated best-effort path varies
according to the faulty node.
GE2/0/0 GE2/0/0
10.4.1.1/30 10.5.1.2 /30
GE1/0/0 GE1/0/0
PE1 PE2
10.3.1.1/30 10.2.1.2/30
Loopback1 Loopback1
4.4.4.4/32 3.3.3.3/32
: Primary path
: Backup path
: Best-effort path
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address to each interface.
Assigne an IP address and mask to each interface, create loopback interfaces on LSRs, and
configure the IP addresses of loopback interfaces as MPLS LSR IDs, according to Figure
3-26. For configuration details, see Configuration Files in this section.
Configure OSPF or IS-IS on each LSR to enable communication between LSRs. In this example,
IS-IS is configured. For configuration details, see Configuration Files in this section.
On each LSR, configure an LSR ID and enable MPLS in the system view and in the interface
view. For configuration details, see Configuration Files in this section.
Enable MPLS-TE and MPLS RSVP-TE in the MPLS view and the interface view on each LSR.
Set the maximum reservable bandwidth of links to 100 Mbit/s and the bandwidth of BC0 to 100
Mbit/s. For configuration details, see Configuration Files in this section.
Configure IS-IS TE on each LSR and CSPF on PE1. For detailed configuration, see Configuring
an RSVP-TE Tunnel.
Step 6 Configure the explicit paths for the primary and backup CR-LSPs respectively.
# Configure a tunnel interface on PE1; specify the explicit path; set the tunnel bandwidth to 10
Mbit/s.
[PE1] interface tunnel 1/0/0
[PE1-Tunnel1/0/0] ip address unnumbered interface loopback 1
[PE1-Tunnel1/0/0] tunnel-protocol mpls te
[PE1-Tunnel1/0/0] destination 3.3.3.3
[PE1-Tunnel1/0/0] mpls te tunnel-id 100
[PE1-Tunnel1/0/0] mpls te path explicit-path main
[PE1-Tunnel1/0/0] mpls te bandwidth ct0 10000
# Configure hot standby on the tunnel interface, set the switch delay time to 15 seconds, specify
the explicit path, and configure the best-effort LSP.
[PE1-Tunnel1/0/0] mpls te backup hot-standby wtr 15
[PE1-Tunnel1/0/0] mpls te path explicit-path backup secondary
[PE1-Tunnel1/0/0] mpls te backup ordinary best-effort
[PE1-Tunnel1/0/0] mpls te commit
[PE1-Tunnel1/0/0] quit
Run the display mpls te tunnel-interface tunnel 1/0/0 command on PE1. The command output
shows that the primary and backup CR-LSPs have been established.
[PE1] display mpls te tunnel-interface tunnel 1/0/0
----------------------------------------------------------------
Tunnel1/0/0
----------------------------------------------------------------
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 100
Ingress LSR ID : 4.4.4.4 Egress LSR ID: 3.3.3.3
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 1
Hot-Standby LSP State : UP
Main LSP State : READY LSP ID : 32770
# Run the ping lsp te command to check the connection of the backup CR-LSP.
[PE1] ping lsp te tunnel 1/0/0 hot-standby
LSP PING FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 : 100 data bytes, press
CTRL_C to break
Reply from 3.3.3.3: bytes=100 Sequence=1 time = 380 ms
Reply from 3.3.3.3: bytes=100 Sequence=2 time = 130 ms
Reply from 3.3.3.3: bytes=100 Sequence=3 time = 70 ms
Reply from 3.3.3.3: bytes=100 Sequence=4 time = 120 ms
Reply from 3.3.3.3: bytes=100 Sequence=5 time = 120 ms
--- FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 70/164/380 ms
# Run the tracert lsp te command to trace the path of the backup CR-LSP.
Connect port 1 and port 2 on a tester to PE1 and PE2, respectively. Inject MPLS traffic destined
for Port 2 into Port 1. After the cable attached to GE 2/0/0 on PE1 or P1 is removed, the fault
rectified within milliseconds. Run the display mpls te hot-standby state interface tunnel
1/0/0 command on PE1. The command output shows that traffic has switched to the backup CR-
LSP.
[PE1] display mpls te hot-standby state interface tunnel 1/0/0
----------------------------------------------------------------
Verbose information about the Tunnel1/0/0 hot-standby state
----------------------------------------------------------------
session id : 100
main LSP token : 0x0
hot-standby LSP token : 0x100201b
HSB switch result : Hot-standby LSP
WTR : 15s
using same path : no
After the cable is reconnected to GE 2/0/0, traffic switches back to the primary CR-LSP after a
15–second delay.
After you remove the cable from GE 2/0/0 on PE1 or P1 and the cable from GE 2/0/0 on PE2
or P2, the tunnel interface goes Down and then Up. This means that the best-effort path has been
established, and traffic has switched to the best-effort path.
[PE1] display mpls te tunnel-interface tunnel 1/0/0
----------------------------------------------------------------
Tunnel1/0/0
----------------------------------------------------------------
Tunnel State Desc : UP
Active LSP : Best-Effort LSP
Session ID : 100
Ingress LSR ID : 4.4.4.4 Egress LSR ID: 3.3.3.3
Admin State : UP Oper State : UP
Primary LSP State : DOWN
Main LSP State : SETTING UP
Hot-Standby LSP State : DOWN
Main LSP State : SETTING UP
Best-Effort LSP State : UP
Main LSP State : READY LSP ID : 32773
[PE1] display mpls te tunnel path
Tunnel Interface Name : Tunnel1/0/0
Lsp ID : 4.4.4.4 :100 :32776
Hop Information
Hop 0 10.3.1.1
Hop 1 10.3.1.2
Hop 2 2.2.2.2
Hop 3 10.1.1.2
Hop 4 10.1.1.1
Hop 5 1.1.1.1
Hop 6 10.2.1.1
Hop 7 10.2.1.2
Hop 8 3.3.3.3
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
mpls lsr-id 4.4.4.4
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path backup
next hop 10.3.1.2
next hop 10.5.1.2
next hop 3.3.3.3
#
explicit-path main
next hop 10.4.1.2
next hop 10.2.1.2
next hop 3.3.3.3
#
isis 1
cost-style wide
network-entity 10.0000.0000.0004.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.3.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000 bc1 50000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.4.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000 bc1 50000
mpls rsvp-te
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 100
mpls te record-route
mpls te bandwidth ct0 10000
mpls te path explicit-path main
mpls te path explicit-path backup secondary
mpls te backup hot-standby wtr 15
mpls te backup ordinary best-effort
mpls te commit
#
return
l P1 configuration file
#
sysname P1
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
#
isis 1
cost-style wide
network-entity 10.0000.0000.0001.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.4.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet3/0/0
ip address 10.2.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000 bc1 50000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls rsvp-te
#
isis 1
cost-style wide
network-entity 10.0000.0000.0002.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000 bc1 50000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.5.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000 bc1 50000
mpls rsvp-te
#
interface GigabitEthernet3/0/0
ip address 10.3.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
Networking Requirements
Isolated primary and hot-standby LSPs are necessary to improve the LSP reliability on IP radio
access networks (IP RANs) that use Multiprotocol Label Switching (MPLS) Traffic Engineering
(TE). The constrained shortest path first (CSPF) algorithm does not meet this reliability
requirement because CSPF may compute two LSPs that intersect at aggregation nodes.
Specifying explicit paths for LSPs can improve reliability but this method does not adapt to
topology changes. Each time a node is added to or deleted from the IP RAN, operators must
configure new explicit paths, which is time-consuming and laborious. Isolated LSP computation
is another method to improve reliability. After this feature is configured, the device uses both
the disjoint and CSPF algorithms to compute isolated primary and hot-standby LSPs.
Figure 3-27 shows the topology of an IP RAN that uses a Resource Reservation Protocol -
Traffic Engineering (RSVP-TE) tunnel. Devices on this network use the Open Shortest Path
First (OSPF) protocol for communication. The numeral on each link represents the link's TE
metric. An RSVP-TE tunnel needs to be established between LSRA and LSRF. The constraint-
based routed label switched path (CR-LSP) hot standby feature needs to be enabled.
Two isolated LSPs exist on this topology: LSRA -> LSRC -> LSRE -> LSRF and LSRA ->
LSRB -> LSRD -> LSRF. However, if the disjoint algorithm is not enabled, CSPF computes
LSRA -> LSRC-> LSRD-> LSRF as the primary LSP and cannot compute an isolated hot-
standby LSP. To improve LSP reliability, configure isolated LSP computation.
LSRC
GE1/0/0 GE1/0/2
1 5
LSRA GE1/0/0 GE1/0/0
GE1/0/1
1
GE1/0/1 RSV G
NodeB P-TE
10 tu nnel 1
GE1/0/0 G
LSRB 10 GE1/0/1
GE1/0/1 1 GE1/0/0
GE1/0/0 GE1/0/2
LSRD
Configuration Roadmap
The configuration roadmap is as follows:
1. Set addresses for all physical and loopback interfaces listed in Table 3-6.
2. Globally enable OSPF on each device, so that OSPF advertises segment routes of each
physical and loopback interface. Enable OSPF TE in the area where the devices reside.
3. Set MPLS label switching router (LSR) IDs for all the devices and globally enable MPLS,
TE, RSVP-TE, and CSPF.
4. Enable MPLS, TE, and RSVP-TE on the outbound interfaces of all links along the TE
tunnel. Set a TE metric for each link, as specified in Figure 3-27.
5. Create a tunnel interface on LSRA and specify the IP address, tunnel protocol, destination
address, tunnel ID, and signaling protocol for the tunnel interface.
6. Enable the CR-LSP hot standby feature and then the disjoint algorithm on the tunnel
interface.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Set an IP address for each interface.
Set an IP address for each interface and create a loopback interface on each device. For
configuration details, see interfaces and IP addresses in this section.
The configurations of LSRB, LSRC, LSRD, LSRE, and LSRF are similar to the configuration
of LSRA. For configuration details, see Configuration Files in this section.
Step 3 Configure basic MPLS functions and enable MPLS TE, RSVP-TE, and CSPF.
Enable MPLS, MPLS TE, RSVP-TE, and CSPF on each device. Enable MPLS, TE, and RSVP-
TE on the outbound interface of each link. Set a TE metric for each link.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] mpls
[LSRA-GigabitEthernet1/0/0] mpls te
[LSRA-GigabitEthernet1/0/0] mpls rsvp-te
[LSRA-GigabitEthernet1/0/0] mpls te metric 1
[LSRA-GigabitEthernet1/0/0] quit
[LSRA] interface gigabitethernet 1/0/1
[LSRA-GigabitEthernet1/0/1] mpls
[LSRA-GigabitEthernet1/0/1] mpls te
[LSRA-GigabitEthernet1/0/1] mpls rsvp-te
[LSRA-GigabitEthernet1/0/1] mpls te metric 10
[LSRA-GigabitEthernet1/0/1] quit
The configurations of LSRB, LSRC, LSRD, LSRE, and LSRF are similar to the configuration
of LSRA. For configuration details, see Configuration Files in this section.
Step 4 Configure an MPLS TE tunnel interface.
# Configure LSRA.
[LSRA] interface tunnel 0/0/1
[LSRA-Tunnel0/0/1] ip address unnumbered interface LoopBack1
[LSRA-Tunnel0/0/1] tunnel-protocol mpls te
[LSRA-Tunnel0/0/1] destination 6.6.6.6
[LSRA-Tunnel0/0/1] mpls te tunnel-id 1
[LSRA-Tunnel0/0/1] mpls te signal-protocol rsvp-te
[LSRA-Tunnel0/0/1] mpls te commit
# Run the display mpls te tunnel-interface Tunnel 0/0/1 and display mpls te tunnel path
Tunnel0/0/1 commands on LSRA to view information about the primary and hot-standby LSPs.
[LSRA] display mpls te tunnel-interface Tunnel 0/0/1
----------------------------------------------------------------
Tunnel0/0/1
----------------------------------------------------------------
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 1
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 6.6.6.6
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 2
Hot-Standby LSP State : UP
Main LSP State : READY LSP ID : 32773
[LSRA] display mpls te tunnel path Tunnel0/0/1
Tunnel Interface Name : Tunnel0/0/1
Lsp ID : 1.1.1.1 :1 :32773
Hop Information
Hop 0 1.2.0.1
Hop 1 1.2.0.2 Label 1025
Hop 2 2.2.2.2 Label 1025
Hop 3 2.4.0.2
Hop 4 2.4.0.4 Label 1025
Hop 5 4.4.4.4 Label 1025
Hop 6 4.6.0.4
Hop 7 4.6.0.6 Label 3
The command outputs show that the computed primary and hot-standby LSPs are the same as
the actual primary and hot-standby LSPs, indicating that the device has computed two isolated
LSPs.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 1.3.0.1 255.255.255.0
mpls
mpls te
mpls te metric 1
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 1.2.0.1 255.255.255.0
mpls
mpls te
mpls metric 10
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface
Tunnel0/0/1
tunnel-protocol mpls
te
destination
6.6.6.6
mpls te tunnel-id
1
mpls te record-route
label
mpls te backup hot-
standby
mpls te cspf
disjoint
mpls te commit
#
ospf
1
opaque-capability
enable
area
0.0.0.0
network 1.1.1.1
0.0.0.0
network 1.2.0.0
0.0.0.255
network 1.3.0.0
0.0.0.255
mpls-te enable
#
return
interface GigabitEthernet1/0/1
undo shutdown
ip address 3.4.0.4 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/2
undo shutdown
ip address 4.6.0.4 255.255.255.0
mpls
mpls te
mpls te metric 1
mpls rsvp-te
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
#
ospf
1
opaque-capability
enable
area
0.0.0.0
network 2.4.0.0
0.0.0.255
network 3.4.0.0
0.0.0.255
network 4.4.4.4
0.0.0.0
network 4.6.0.0
0.0.0.255
mpls-te enable
#
return
enable
area
0.0.0.0
network 3.5.0.0
0.0.0.255
network 5.5.5.5
0.0.0.0
network 5.6.0.0
0.0.0.255
mpls-te enable
#
return
Networking Requirements
On a network as shown in Figure 3-28, a primary CR-LSP needs to be set up from LSRA to
LSRD, and a hot-standby CR-LSP needs to be set up for the primary CR-LSP.
A maximum of three attribute templates can be created for a backup CR-LSP. In the event that
a CR-LSP established using any of the three templates is stable, you can lock a CR-LSP attribute
template, avoiding unnecessary traffic switchover and reducing consumption of system
resources.
When an attribute template for hot-standby CR-LSPs is locked, the following effects can be
achieved:
Figure 3-28 Networking diagram for locking an attribute template of hot-standby CR-LSPs
LSRC
/0 PO
S 1/0 24 10. S2/0
PO .1.2/ 1.4 /0
1 .1/2 PO
/0 0 . 41 S
1.1.1.1/32 S1/0 4 1 0.1 1/0/0 4.4.4.4/32
O /2 .4
P .1.1 .2/2
1 POS2/0/0 LSRE POS2/0/0 4
10.
10.1.3.1/24 10.1.6.2/24
PO POS1/0/0 POS2/0/0
0
LSRA 10 S3/ 10.1.3.2/24 10.1.6.1/24 3/0/ 4 LSRD
.1. 0
2.1 /0
S /2
PO .5.2
/24 PO .1
10 S1/ /0 10
.1. 0/0 S 2/0 /24
2.2
/24 PO .5.1
.1
10
LSRB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IP addresses and a routing protocol for interfaces to ensure the connectivity on
the network layer.
2. Enable MPLS, MPLS TE, RSVP-TE, and CSPF in the system view and the interface view.
3. Configure CR-LSP attribute templates on the ingress of a primary CR-LSP.
4. Use CR-LSP attribute templates to establish CR-LSPs on a tunnel interface, and lock a CR-
LSP attribute template of hot-standby CR-LSPs.
Data Preparation
To complete the configuration, you need the following data:
l LSR ID of each device
l Name of each CR-LSP attribute template and attributes of each template
l IP address of the tunnel interface, destination address of the tunnel, and tunnel ID
Procedure
Step 1 Configure IP addresses and an IGP (OSPF, in this example) for interfaces to ensure connectivity
at the network layer.
For configuration details, see Configuration Files in this section.
Step 2 Configure the MPLS LSR ID for each device, and enable MPLS and MPLS TE in the system
view and in each interface view of each device.
# Configure LSRA.
<LSRA> system-view
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface pos1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls te
[LSRA-Pos1/0/0] mpls rsvp-te
[LSRA-Pos1/0/0] quit
[LSRA] interface pos2/0/0
[LSRA-Pos2/0/0] mpls
[LSRA-Pos2/0/0] mpls te
[LSRA-Pos2/0/0] mpls rsvp-te
[LSRA-Pos2/0/0] quit
[LSRA] interface pos3/0/0
[LSRA-Pos3/0/0] mpls
[LSRA-Pos3/0/0] mpls te
[LSRA-Pos3/0/0] mpls rsvp-te
[LSRA-Pos3/0/0] quit
NOTE
Repeat this step for LSRB, LSRC, LSRD, and LSRE. For configuration details, see Configuration Files
in this section.
# On LSRA, configure the explicit path named down_path as LSRA → LSRB → LSRD.
[LSRA] explicit-path down_path
[LSRA-explicit-path-down_path] next hop 10.1.2.2
[LSRA-explicit-path-down_path] next hop 10.1.5.2
[LSRA-explicit-path-down_path] quit
# On LSRA, configure the explicit path named middle_path as LSRA → LSRE → LSRD.
NOTE
The priorities of the CR-LSP attribute templates configured on the same tunnel interface must be the same.
Step 4 Use a CR-LSP attribute template to set up a CR-LSP with LSRA being the ingress and LSRD
being the egress.
# Set up a CR-LSP from LSRA to LSRD, and lock an attribute template for hot-standby CR-
LSPs.
[LSRA] interface tunnel1/0/0
[LSRA-Tunnel1/0/0] tunnel-protocol mpls te
[LSRA-Tunnel1/0/0] destination 4.4.4.4
[LSRA-Tunnel1/0/0] mpls te tunnel-id 100
[LSRA-Tunnel1/0/0] mpls te primary-lsp-constraint lsp-attribute lsp_attribute_1
[LSRA-Tunnel1/0/0] mpls te hotstandby-lsp-constraint 1 lsp-attribute
lsp_attribute_3
[LSRA-Tunnel1/0/0] mpls te hotstandby-lsp-constraint 2 lsp-attribute
lsp_attribute_2
[LSRA-Tunnel1/0/0] mpls te backup hotstandby-lsp-constraint lock
[LSRA-Tunnel1/0/0] mpls te commit
[LSRA-Tunnel1/0/0] quit
# On LSRA, run the undo shutdown command on POS 3/0/0 to reenable the explicit path named
down_path and make the attribute template named lsp_attribute_3 effective.
[LSRA] interface pos3/0/0
[LSRA-Pos3/0/0] undo shutdown
[LSRA-Pos3/0/0] quit
# After the traffic switchover, run the tracert lsp te tunnel command on LSRA. You can view
that the hot-standby CR-LSP is set up by using the explicit path configured in the attribute
template named lsp_attribute_2.
<LSRA> tracert lsp te tunnel
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 , press CTRL_C to
break.
TTL Replier Time Type Downstream
0 Ingress 10.1.3.2/[1024 ]
1 10.1.3.2 120 ms Transit 10.1.6.2/[3 ]
2 4.4.4.4 100 ms Egress
# Run the display mpls te tunnel verbose command on LSRA. You can view that the hot-
standby CR-LSP is set up by using the attribute template named lsp_attribute_2 that is not
upgraded.
<LSRA> display mpls te tunnel verbose
No : 1
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 1 LSP Index : 2049
Session ID : 100 LSP ID : 32770
LSR Role : Ingress LSP Type : Hot-Standby
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 4.4.4.4
In-Interface : -
Out-Interface : Pos1/0/1
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : 2
ER-Hop Table Index : 2 AR-Hop Table Index: 1
C-Hop Table Index : -
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 1026
Created Time : 2010/02/21 12:00:50
RSVP LSP Type : Hot-Standby
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Unreserved
CT0 Bandwidth(Kbit/sec) : 0 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 5 Hold-Priority : 5
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x3 Protected Flag : 0x0
Bypass In Use : Not Exists
Bypass Tunnel Id : -
BypassTunnel : -
Bypass LSP ID : - FrrNextHop : -
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
# Run the undo mpls te backup hotstandby-lsp-constraint lock command on LSRA to unlock
the attribute template of hot-standby CR-LSPs.
[LSRA] interface tunnel 1/0/0
[LSRA-Tunnel1/0/0] undo mpls te backup hotstandby-lsp-constraint lock
[LSRA-Tunnel1/0/0] mpls te commit
[LSRA-Tunnel1/0/0] quit
# Run the tracert lsp te tunnel1/0/0 command on LSRA. You can view that the hot-standby
CR-LSP is set up by using the explicit path configured in the attribute template named
lsp_attribute_3.
<LSRA> tracert lsp te tunnel1/0/0
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 , press CTRL_C t
o break.
TTL Replier Time Type Downstream
0 Ingress 10.1.2.2/[1024 ]
1 10.1.2.2 90 ms Transit 10.1.5.2/[3 ]
2 4.4.4.4 100 ms Egress
# Run the display mpls te tunnel verbose command on LSRA. You can view that the hot-
standby CR-LSP is set up by using the attribute template named lsp_attribute_1 that is not
upgraded. This indicates that the system automatically upgrades the attribute template after the
attribute template of hot-standby CR-LSPs is unlocked.
<LSRA> display mpls te tunnel verbose
No : 1
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 0 LSP Index : 2048
Session ID : 100 LSP ID : 32929
LSR Role : Ingress LSP Type : Hot-Standby
Ingress LSR ID : 1.1.1.1
Egress LSR ID : 4.4.4.4
In-Interface : -
Out-Interface : Pos1/0/2
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : 1
ER-Hop Table Index : 1 AR-Hop Table Index: 0
C-Hop Table Index : 0
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 1182
Created Time : 2010/02/21 18:14:23
RSVP LSP Type : Hot-Standby
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Unreserved
CT0 Bandwidth(Kbit/sec) : 0 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path middle_path
next hop 10.1.3.2
next hop 10.1.6.2
#
explicit-path up_path
next hop 10.1.1.2
next hop 10.1.4.2
#
explicit-path down_path
next hop 10.1.2.2
next hop 10.1.5.2
#
lsp-attribute lsp_attribute_1
explicit-path up_path
priority 5 5
hop-limit 12
commit
#
lsp-attribute lsp_attribute_2
explicit-path down_path
priority 5 5
commit
#
lsp-attribute lsp_attribute_3
explicit-path middle_path
priority 5 5
commit
#
interface Pos1/0/0
ip address 10.1.1.1 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface Pos2/0/0
ip address 10.1.3.1 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface Pos3/0/0
ip address 10.1.2.1 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel1/0/0
tunnel-protocol mpls te
destination 4.4.4.4
mpls te tunnel-id 100
mpls te primary-lsp-constraint lsp-attribute lsp_attribute_1
mpls te hotstandby-lsp-constraint 2 lsp-attribute lsp_attribute_2
mpls te ordinary-lsp-constraint 1 lsp-attribute lsp_attribute_3
mpls te backup hotstandby-lsp-constraint lock
mpls te commit
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
network 10.1.3.0 0.0.0.255
mpls-te enable
#
return
mpls te
mpls rsvp-te
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 10.1.2.0 0.0.0.255
network 10.1.5.0 0.0.0.255
mpls-te enable
#
return
mpls rsvp-te
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 4.4.4.4 0.0.0.0
network 10.1.4.0 0.0.0.255
network 10.1.5.0 0.0.0.255
network 10.1.6.0 0.0.0.255
mpls-te enable
#
return
Networking Requirements
Figure 3-29 is a Networking diagram for CR-LSP hot standby. A TE tunnel is established from
PE1 to PE2. The tunnel is enabled with hot standby and configured with the best-effort path. In
this manner, traffic is switched to the backup CR-LSP when the primary CR-LSP fails. If the
backup CR-LSP also fails, this triggers the establishment of a best-effort path, and then the traffic
switches to the best-effort path.
It is required that the dynamic bandwidth function for a hot-standby CR-LSP be configured on
the tunnel interface. This can achieve the following effects:
l When the primary CR-LSP works properly, the hot-standby CR-LSP does not occupy
bandwidth, saving bandwidth resources.
l If the primary tunnel fails, traffic switches to the hot-standby CR-LSP and then forwarded
in a best-effort manner. The system then sets up a new CR-LSP with user-requested
bandwidth according to the make-before-break mechanism. After the new hot-standby CR-
LSP is set up, the system switches traffic to this CR-LSP and deletes the hot-standby CR-
LSP with bandwidth at 0 bit/s.
Figure 3-29 Networking diagram for the dynamic bandwidth function of a hot-standby CR-LSP
Loopback1 Loopback1
1.1.1.1/32 2.2.2.2/32
GE1/0/0 GE1/0/0
P1 10.1.1.1/30 10.1.1.2/30 P2
GE3/0/0 GE3/0/0
GE2/0/0 10.2.1.1/30 10.3.1.2/30 GE2/0/0
10.4.1.2/30 10.5.1.1/30
GE2/0/0 GE2/0/0
10.4.1.1/30 10.5.1.2 /30
GE1/0/0 GE1/0/0
PE1 PE2
10.3.1.1/30 10.2.1.2/30
Loopback1 Loopback1
4.4.4.4/32 3.3.3.3/32
: Primary path
: Backup path
: Best-effort path
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure CR-LSP hot standby according to Example for Configuring CR-LSP Hot
Standby.
2. Enable the dynamic bandwidth function for a hot-standby CR-LSP on PE1.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure CR-LSP hot standby.
Configure a primary CR-LSP, a backup CR-LSP, and a best-effort path according to Example
for Configuring CR-LSP Hot Standby.
Step 2 Configure the dynamic bandwidth function for a hot-standby CR-LSP.
# Configure PE1.
[PE1] interface tunnel 1/0/0
[PE1-Tunnel1/0/0] tunnel-protocol mpls te
[PE1-Tunnel1/0/0] mpls te backup hot-standby dynamic-bandwidth
[PE1-Tunnel1/0/0] mpls te commit
[PE1-Tunnel1/0/0] quit
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
No : 2
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 1 LSP Index : 2049
Session ID : 100 LSP ID : 32769
LSR Role : Ingress LSP Type : Hot-Standby
Ingress LSR ID : 4.4.4.4
Egress LSR ID : 3.3.3.3
In-Interface : -
Out-Interface : GE1/0/1
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : -
ER-Hop Table Index : 1 AR-Hop Table Index: 1
C-Hop Table Index : 1
PrevTunnelIndexInSession: - NextTunnelIndexInSession: 0
PSB Handle : 1025
Created Time : 2010/02/22 11:29:15
RSVP LSP Type : Hot-Standby
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Unreserved
CT0 Bandwidth(Kbit/sec) : 0 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x3 Protected Flag : 0x0
Bypass In Use : Not Exists
Bypass Tunnel Id : -
BypassTunnel : -
Bypass LSP ID : - FrrNextHop : -
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
Bypass Unbound Bandwidth Info(Kbit/sec)
CT0 Unbound Bandwidth : - CT1 Unbound Bandwidth: -
CT2 Unbound Bandwidth : - CT3 Unbound Bandwidth: -
CT4 Unbound Bandwidth : - CT5 Unbound Bandwidth: -
CT6 Unbound Bandwidth : - CT7 Unbound Bandwidth: -
--------------------------------
BFD Information
--------------------------------
NextSessionTunnelIndex : - PrevSessionTunnelIndex: -
NextLspId : - PrevLspId : -
[PE1] display mpls te link-administration bandwidth-allocation
Link ID: GigabitEthernet1/0/0
Bandwidth Constraint Model : Russian Dolls Model (RDM)
Maximum Link Reservable Bandwidth(Kbits/sec): 0
Reservable Bandwidth BC0(Kbits/sec) : 0
Reservable Bandwidth BC1(Kbits/sec) : 0
Downstream Bandwidth (Kbits/sec) : 0
IPUpdown Link Status : UP
PhysicalUpdown Link Status : UP
----------------------------------------------------------------------
TE-CLASS CT PRIORITY BW RESERVED BW AVAILABLE DOWNSTREAM
(Kbit/sec) (Kbit/sec) RSVPLSPNODE COUNT
----------------------------------------------------------------------
0 0 0 0 0 0
1 0 1 0 0 0
2 0 2 0 0 0
3 0 3 0 0 0
4 0 4 0 0 0
5 0 5 0 0 0
6 0 6 0 0 0
7 0 7 0 0 0
8 1 0 0 0 0
9 1 1 0 0 0
10 1 2 0 0 0
11 1 3 0 0 0
12 1 4 0 0 0
13 1 5 0 0 0
14 1 6 0 0 0
15 1 7 0 0 0
----------------------------------------------------------------------
# Run the shutdown command on PE1 to shut down the primary CR-LSP.
[PE1] interface gigabitethernet2/0/0
[PE1-GigabitEthernet1/0/0] shutdown
[PE1-GigabitEthernet1/0/0] quit
# Run the display mpls te tunnel-interface command on PE1. You can view that the hot-standby
CR-LSP goes Up and is being reestablished after the primary CR-LSP fails.
[PE1-GigabitEthernet1/0/0] display mpls te tunnel-interface
----------------------------------------------------------------
Tunnel1/0/0
----------------------------------------------------------------
Tunnel State Desc : UP
Active LSP : Hot-Standby LSP
Session ID : 100
Ingress LSR ID : 4.4.4.4 Egress LSR ID: 3.3.3.3
Admin State : UP Oper State : UP
Primary LSP State : DOWN
Main LSP State : SETTING UP
Hot-Standby LSP State : UP
Main LSP State : READY LSP ID : 32769
Modify LSP State : SETTING UP
# After the successful reestablishment, run the display mpls te tunnel verbose command and
the display mpls te link-administration bandwidth-allocation command on PE1. You can
view that the hot-standby CR-LSP occupies the bandwidth.
[PE1] display mpls te tunnel verbose
No : 1
Tunnel-Name : Tunnel1/0/0
TunnelIndex : 0 LSP Index : 2048
Session ID : 100 LSP ID : 32773
LSR Role : Ingress LSP Type : Hot-Standby
Ingress LSR ID : 4.4.4.4
Egress LSR ID : 3.3.3.3
In-Interface : -
Out-Interface : GE1/0/1
Sign-Protocol : RSVP TE Resv Style : SE
IncludeAnyAff : 0x0 ExcludeAnyAff : 0x0
IncludeAllAff : 0x0
LspConstraint : -
ER-Hop Table Index : 1 AR-Hop Table Index: 0
C-Hop Table Index : 0
PrevTunnelIndexInSession: - NextTunnelIndexInSession: -
PSB Handle : 1026
Created Time : 2010/02/22 14:22:36
RSVP LSP Type : Hot-Standby
--------------------------------
DS-TE Information
--------------------------------
Bandwidth Reserved Flag : Reserved
CT0 Bandwidth(Kbit/sec) : 10000 CT1 Bandwidth(Kbit/sec): 0
CT2 Bandwidth(Kbit/sec) : 0 CT3 Bandwidth(Kbit/sec): 0
CT4 Bandwidth(Kbit/sec) : 0 CT5 Bandwidth(Kbit/sec): 0
CT6 Bandwidth(Kbit/sec) : 0 CT7 Bandwidth(Kbit/sec): 0
Setup-Priority : 7 Hold-Priority : 7
--------------------------------
FRR Information
--------------------------------
Primary LSP Info
TE Attribute Flag : 0x3 Protected Flag : 0x0
Bypass In Use : Not Exists
Bypass Tunnel Id : -
BypassTunnel : -
Bypass LSP ID : - FrrNextHop : -
ReferAutoBypassHandle : -
FrrPrevTunnelTableIndex : - FrrNextTunnelTableIndex: -
Bypass Attribute(Not configured)
Setup Priority : - Hold Priority : -
HopLimit : - Bandwidth : -
IncludeAnyGroup : - ExcludeAnyGroup : -
IncludeAllGroup : -
14 1 6 0 50000 0
15 1 7 0 50000 0
----------------------------------------------------------------------
----End
Configuration Files
l Configuration file of PE1
#
sysname PE1
#
bfd
#
mpls lsr-id 4.4.4.4
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path backup
next hop 10.3.1.2
next hop 10.5.1.2
next hop 3.3.3.3
#
explicit-path main
next hop 10.4.1.2
next hop 10.2.1.2
next hop 3.3.3.3
#
isis 1
cost-style wide
network-entity 10.0000.0000.0004.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.3.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 50000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.4.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000 bc1 50000
mpls rsvp-te
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 100
mpls te record-route
mpls te bandwidth ct0 10000
mpls te path explicit-path main
mpls te path explicit-path backup secondary
l Configuration file of P1
#
sysname P1
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
#
isis 1
cost-style wide
network-entity 10.0000.0000.0001.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.4.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet3/0/0
ip address 10.2.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000 bc1 50000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
return
l Configuration file of P2
#
sysname P2
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls rsvp-te
#
isis 1
cost-style wide
network-entity 10.0000.0000.0002.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000 bc1 50000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.5.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000 bc1 50000
mpls rsvp-te
#
interface GigabitEthernet3/0/0
ip address 10.3.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
Background Information
To protect specific links and nodes on an RSVP-TE tunnel, TE FRR can be configured to provide
local traffic protection, and CR-LSP backup can be established to provide E2E traffic protection.
The following combinations of TE FRR and CR-LSP backup are supported:
l Ordinary combined protection
If a primary CR-LSP's link or node that TE FRR protects fails, the PLR rapidly switches
traffic to a TE FRR bypass CR-LSP and notifies the ingress on the primary CR-LSP of the
fault. In this situation, either CR-LSP hot backup or ordinary CR-LSP backup is used:
– TE FRR and CR-LSP hot standby: After the ingress detects the preceding fault, the
ingress switches the traffic from the TE FRR bypass CR-LSP to the hot-standby CR-
LSP.
– TE FRR and ordinary CR-LSP backup: Only if the primary CR-LSP and TE FRR bypass
CR-LSP both fail, the ingress attempts to establish an ordinary backup CR-LSP and
switches traffic to the ordinary backup CR-LSP.
NOTE
If the primary CR-LSP's node or link that TE FRR does not protect fails, the ingress only establishes
a backup CR-LSP and switches traffic to this CR-LSP.
l Association protection
If a primary CR-LSP fails (that is, a primary CR-LSP is in the FRR-in-use state), the ingress
switches traffic to a TE FRR bypass CR-LSP. The ingress attempts to restore the primary
CR-LSP, while establishing a backup CR-LSP.
For information about how to configure the association of TE FRR and ordinary CR-LSP
backup to protect traffic, see Example for Configuring Synchronization of the Bypass
Tunnel and the Backup CR-LSP. The configuration of the association of TE FRR and
CR-LSP hot standby is the same as that of TE FRR and ordinary CR-LSP backup, except
that a hot-standby CR-LSP must be specified when CR-LSP hot standby is used.
The combined protection of TE FRR and CR-LSP hot standby provides high traffic reliability.
The combined protection of TE FRR and ordinary CR-LSP backup helps efficiently use
bandwidth resources.
The following example describes how to configure TE FRR and CR-LSP hot standby to
implement ordinary combined protection. The configuration of the combined protection of TE
FRR and CR-LSP hot-standby is the same as that of TE FRR and ordinary CR-LSP backup,
except that an ordinary backup mode must be specified when ordinary CR-LSP backup is used.
Networking Description
On the network shown in Figure 3-30, an RSVP-TE tunnel originates from PE1 and is destined
for PE2. To improve traffic reliability, TE FRR can be configured to provide local protection,
and CR-LSP hot standby can be configured to provide E2E traffic protection. The primary CR-
LSP is established over the path PE1 -> P1 -> PE2, a TE FRR bypass CR-LSP is established
over the path P1 -> P2 -> PE2, and a hot-standby CR-LSP is established over the path PE1 ->
P2 -> PE2. To rapidly detect faults, dynamic BFD for CR-LSP is configured to monitor the CR-
LSP that is transmitting traffic.
Figure 3-30 Network diagram for configuring TE FRR and CR-LSP hot standby to implement
ordinary combined protection
GE1/0/1 P1
GE1/0/1 10.2.2.1/24 GE1/0/3
10.1.2.1/24 10.2.3.2/24
GE1/0/0
10.2.2.2/24
GE1/0/3
GE1/0/1 10.2.3.1/24
10.1.2.2/24
P2
Loopback0
Primary CR-LSP
4.4.4.4/32
Bypass CR-LSP
Hot-standby CR-LSP
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l IP address of each interface, including each loopback interface, as shown in Figure 3-30
l IS-IS process ID (1), area ID (10.0001), system ID converted using the loopback address
of each node, IS-IS level (Level-2)
l MPLS LSR ID equal to the loopback address of each node
l Name (main-path) of an explicit path over which the primary CR-LSP is established on
PE1.
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and mask to each interface, including each loopback interface, according
to Figure 3-30. For configuration details, see Configuration Files in this section.
Configure IS-IS to advertise the route to each network segment to which each interface is
connected and to advertise the host route to each loopback address which is used as an LSR ID.
For configuration details, see Configuration Files in this section.
# Configure PE1.
<PE1> system-view
[PE1] mpls lsr-id 1.1.1.1
[PE1] mpls
[PE1-mpls] mpls te
[PE1-mpls] mpls rsvp-te
[PE1-mpls] mpls te cspf
[PE1-mpls] quit
[PE1] interface GigabitEthernet 1/0/0
[PE1-GigabitEthernet1/0/0] mpls
[PE1-GigabitEthernet1/0/0] mpls te
[PE1-GigabitEthernet1/0/0] mpls rsvp-te
[PE1-GigabitEthernet1/0/0] quit
[PE1] interface GigabitEthernet 1/0/1
[PE1-GigabitEthernet1/0/1] mpls
[PE1-GigabitEthernet1/0/1] mpls te
[PE1-GigabitEthernet1/0/1] mpls rsvp-te
[PE1-GigabitEthernet1/0/1] quit
Repeat this step for PE2, P1, and P2. For configuration details, see Configuration Files in this
section.
# Configure PE1.
# Configure PE1.
[PE1] bfd
[PE1-bfd] quit
[PE1] interface Tunnel1/0/0
[PE1-Tunnel1/0/0] mpls te bfd enable
[PE1-Tunnel1/0/0] mpls te commit
[PE1-Tunnel1/0/0] quit
# Configure PE2.
<PE2> system-view
[PE2] bfd
[PE2-bfd] mpls-passive
[PE2-bfd] quit
# After completing the configuration, run the display mpls te tunnel-interface Tunnel1/0/0
command on PE1. The command output shows that the primary and hot-standby CR-LSPs in
the RSVP-TE tunnel have been established.
[PE1] display mpls te tunnel-interface Tunnel1/0/0
----------------------------------------------------------------
Tunnel1/0/0
----------------------------------------------------------------
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 100
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 3.3.3.3
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 3
Hot-Standby LSP State : UP
Main LSP State : READY LSP ID : 32775
# Run the display mpls te tunnel path command on PE1 to view information about the primary
and hot-standby CR-LSPs. The Local-Protection available field in the command output shows
that TE FRR has been enabled for the outbound interface on P1 on the primary CR-LSP.
[PE1] display mpls te tunnel path
Tunnel Interface Name : Tunnel1/0/0
Lsp ID : 1.1.1.1 :100 :3
Hop Information
Hop 0 10.1.1.1
Hop 1 10.1.1.2 Label 900007
Hop 2 2.2.2.2 Label 900007
Hop 3 10.2.1.1 Local-Protection available
Hop 4 10.2.1.2 Label 3
Hop 5 3.3.3.3 Label 3
# Run the display mpls te auto-tunnel auto-bypass-tunnel command on P1. A TE Auto FRR
bypass CR-LSP has been established on P1.
[P1] display mpls te auto-tunnel auto-bypass-tunnel
List of auto-bypass-tunnels:
Tunnel0/0/4097
Total Num: 1
# Run the display mpls bfd session command on PE1 to view information about the BFD session
that monitors the RSVP-TE tunnel.
[PE1] display mpls bfd session
-------------------------------------------------------------------------------
BFD Information: TE TUNNEL
-------------------------------------------------------------------------------
FEC DISC OUT-IF NEXTHOP TUNNEL STATE
3.3.3.3 8196 GE1/0/0 10.1.1.2 Tun1/0/0 Up
# When the primary CR-LSP is working properly, run the tracert lsp te Tunnel 1/0/0 command
on PE1. The command output shows that traffic is transmitting along the primary CR-LSP.
[PE1] tracert lsp te Tunnel 1/0/0
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 , press CTRL_C to
break.
TTL Replier Time Type Downstream
0 Ingress 10.1.1.2/[900007 ]
1 10.1.1.2 100 ms Transit 10.2.1.2/[3 ]
2 3.3.3.3 120 ms Egress
If a link between P1 and PE2 fails, run the tracert lsp te Tunnel 1/0/0 command on PE1. The
command output shows that P1 forwards traffic to the bypass CR-LSP.
[PE1] tracert lsp te Tunnel 1/0/0
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 , press CTRL_C to
break.
TTL Replier Time Type Downstream
0 Ingress 10.1.1.2/[900007 ]
1 10.1.1.2 100 ms Transit 10.2.2.2/[3 1029 ]
2 10.2.2.2 80 ms Transit 10.2.3.2/[3 ]
3 3.3.3.3 110 ms Egress
A few seconds later, run the tracert lsp te Tunnel 1/0/0 command on PE1. The command output
shows that P1 has switched traffic to the hot-standby CR-LSP.
[PE1] tracert lsp te Tunnel 1/0/0
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 , press CTRL_C to
break.
TTL Replier Time Type Downstream
0 Ingress 10.1.2.2/[1031 ]
1 10.1.2.2 110 ms Transit 10.2.3.2/[3 ]
2 3.3.3.3 80 ms Egress
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
bfd
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path main-path
next hop 10.1.1.2
next hop 10.2.1.2
#
isis 1
is-level level-2
cost-style wide
network-entity 10.0001.0010.0100.1001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.2.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack0
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 100
mpls te bfd enable
mpls te record-route label
mpls te path explicit-path main-path
mpls te fast-reroute
mpls te backup hot-standby
mpls te commit
#
return
l P1 configuration file
#
sysname P1
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls te auto-frr
mpls rsvp-te
mpls te cspf
#
isis 1
is-level level-2
cost-style wide
network-entity 10.0001.0020.0200.2002.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.2.2.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/2
undo shutdown
ip address 10.2.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack0
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 4.4.4.4
mpls
mpls te
mpls rsvp-te
#
isis 1
is-level level-2
cost-style wide
network-entity 10.0001.0040.0400.4004.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.2.2.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/1
undo shutdown
ip address 10.1.2.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/3
undo shutdown
ip address 10.2.3.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack0
ip address 4.4.4.4 255.255.255.255
isis enable 1
#
return
Networking Requirements
On the network shown in Figure 3-31, a primary tunnel is set up by using the explicit path LSRA
--> LSRB --> LSRC. A TE FRR bypass tunnel is set up on the transit LSRB along the path
LSRB --> LSRE --> LSRC; an ordinary CR-LSP is set up on the ingress LSRA along the path
LSRA --> LSRC.
After the link between LSRB and LSRC is faulty, the system starts the TE FRR bypass tunnel
(the primary CR-LSP is in FRR-in-use state) and tries to restore the primary CR-LSP. At the
same time, the system tries to set up the backup CR-LSP.
Figure 3-31 Networking diagram for configuring synchronization of the bypass tunnel and the
backup CR-LSP
GE3/0/0 GE2/0/0
3.2.1.2/24 4.1.1.1/24
LSRD
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure the IP address for each interface.
Configure the IP address and mask for each interface including each Loopback interface as
shown in Figure 3-31. For configuration details, see Configuration Files in this section.
Enable OSPF or IS-IS on each LSR to ensure connectivity between devices. The example in this
document uses OSPF as IGP. For configuration details, see Configuration Files in this section.
On each LSR, configure an LSR ID and enable MPLS in the system and interface views. For
configuration details, see Configuration Files in this section.
On each LSR, enable MPLS-TE and MPLS RSVP-TE in the MPLS view and interface views
of the link. Set the maximum reservable bandwidth of the link to 100 Mbit/s and the bandwidth
of BC0 to 100 Mbit/s. For configuration details, see Configuration Files in this section.
Enable OSPF TE on each LSR and configure the CSPF on LSRA and LSRB. For configuration
details, see Configuring the RSVP-TE Tunnel.
Step 6 Configure the explicit paths of the primary and backup CR-LSPs.
# Create a tunnel interface on LSRA, specify an explicit path for the primary tunnel, and set the
tunnel bandwidth to 20 Mbit/s.
[LSRA] interface tunnel2/0/0
[LSRA-Tunnel2/0/0] ip address unnumbered interface loopback1
# Configure LSRB.
[LSRB] interface gigabitethernet2/0/0
[LSRB-GigabitEthernet2/0/0] mpls te auto-frr link
[LSRB-GigabitEthernet2/0/0] quit
After the configurations, run the display mpls te tunnel path lsp-id 1.1.1.1 1 1 command on
LSRA. The bypass tunnel is set up successfully.
[LSRA] display mpls te tunnel path lsp-id 1.1.1.1 1 1
Tunnel Interface Name : Tunnel2/0/0
Lsp ID : 1.1.1.1 :1 :1
Hop Information
Hop 0 2.1.1.1
Hop 1 2.1.1.2 Label 11264
Hop 2 2.2.2.2 Label 11264
Hop 3 3.1.1.1 Local-Protection available
Hop 4 3.1.1.2 Label 3
Hop 5 3.3.3.3 Label 3
Step 10 Configure synchronization of the bypass tunnel and the backup CR-LSP on the ingress LSRA
of the primary CR-LSP.
# Configure LSRA.
[LSRA] interface tunnel2/0/0
[LSRA-Tunnel2/0/0] mpls te backup frr-in-use
[LSRA-Tunnel2/0/0] mpls te commit
[LSRA-Tunnel2/0/0] quit
Run the display mpls te tunnel-interface tunnel2/0/0 command on the ingress LSRA to view
information about the primary CR-LSP.
[LSRA] display mpls te tunnel-interface tunnel2/0/0
----------------------------------------------------------------
Tunnel2/0/0
----------------------------------------------------------------
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 1
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 3.3.3.3
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 2
Run the display mpls te tunnel-interface command on LSRA. The tunnel status is Up. The
primary tunnel is in FRR-in-use state; the ordinary CR-LSP is being set up; the primary CR-
LSP is being restored.
[LSRA] display mpls te tunnel-interface
----------------------------------------------------------------
Tunnel2/0/0
----------------------------------------------------------------
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 1
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 3.3.3.3
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 5
Modify LSP State : SETTING UP LSP ID : 6
Ordinary LSP State : DOWN
Main LSP State : SETTING UP
When the primary CR-LSP is faulty (the primary CR-LSP is in FRR-in-use state), the system
starts the TE FRR bypass tunnel and tries to restore the primary CR-LSP. At the same time, the
system tries to set up a backup CR-LSP.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path master
next hop 2.1.1.2
next hop 3.1.1.2
#
explicit-path backup
next hop 10.1.1.2
interface GigabitEthernet2/0/0
undo shutdown
ip address 2.1.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 1000
mpls te bandwidth bc0 1000
mpls rsvp-te
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 1000
mpls te bandwidth bc0 1000
mpls rsvp-te
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel2/0/0
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 1
mpls te record-route label
mpls te path explicit-path master
mpls te path explicit-path backup secondary
mpls te affinity property f0 mask ff secondary
mpls te fast-reroute
mpls te backup ordinary
mpls te backup frr-in-use
mpls te commit
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 10.1.1.0 0.0.0.255
network 2.1.1.0 0.0.0.255
mpls-te enable
#
return
mpls te
mpls te bandwidth max-reservable-bandwidth 1000
mpls te bandwidth bc0 1000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 3.1.1.1 255.255.255.0
mpls
mpls te
mpls te auto-frr link
mpls te bandwidth max-reservable-bandwidth 1000
mpls te bandwidth bc0 1000
mpls rsvp-te
#
interface LoopBack0
ip address 2.2.2.2 255.255.255.255
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 2.2.2.2 0.0.0.0
network 2.1.1.0 0.0.0.255
network 3.1.1.0 0.0.0.255
network 3.2.1.0 0.0.0.255
mpls-te enable
#
return
Networking Requirements
On the network shown in Figure 3-32, LSRA, LSRB, and LSRC are equipped with dual main
control boards. Three LSRs learn routes from one another using the IS-IS protocol and then use
the RSVP protocol to establish a TE tunnel from LSRA to LSRC.
RSVP GR is required to ensure that MPLS forwarding is not interrupted when ae master/slave
switchover of main control boards occurs on LSRA, LSRB, or LSRC.
Configuration Roadmap
The configuration roadmap is as follows:
1. Assign IP addresses to interfaces on each LSR and loopback addresses that function as the
LSR IDs.
2. Configure the IS-IS protocol and enable IS-IS TE.
3. Configure LSR IDs.
4. Enable MPLS, MPLS TE, and MPLS RSVP-TE globally.
5. Enable MPLS, MPLS TE, and MPLS RSVP-TE on each interface, and configure bandwidth
attributes of the MPLS TE link.
6. Enable MPLS CSPF on the ingress node. Create the tunnel interface at the ingress node.
Specify the tunnel IP address, tunnel protocol, destination address, tunnel ID, and signaling
protocol.
7. Enable IS-IS GR on each node.
8. Enable RSVP GR on all RSVP enabled interfaces of each node.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign IP addresses to interfaces on each LSR. For configuration details, see Configuration
Files in this section.
# Configure LSRA.
[LSRA] isis 1
[LSRA-isis-1] network-entity 00.0005.0000.0000.0001.00
[LSRA-isis-1] is-level level-2
[LSRA-isis-1] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] isis enable 1
[LSRA-GigabitEthernet1/0/0] quit
[LSRA] interface loopback 1
[LSRA-LoopBack1] isis enable 1
[LSRA-LoopBack1] quit
# Configure LSRB.
[LSRB] isis 1
[LSRB-isis-1] network-entity 00.0005.0000.0000.0002.00
[LSRB-isis-1] is-level level-2
[LSRB-isis-1] quit
[LSRB] interface gigabitethernet 1/0/0
[LSRB-GigabitEthernet1/0/0] isis enable 1
[LSRB-GigabitEthernet1/0/0] quit
[LSRB] interface gigabitethernet 2/0/0
[LSRB-GigabitEthernet2/0/0] isis enable 1
[LSRB-GigabitEthernet2/0/0] quit
[LSRB] interface loopback 1
[LSRB-LoopBack1] isis enable 1
[LSRB-LoopBack1] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] network-entity 00.0005.0000.0000.0003.00
[LSRC-isis-1] is-level level-2
[LSRC-isis-1] quit
[LSRC] interface gigabitethernet 2/0/0
[LSRC-GigabitEthernet2/0/0] isis enable 1
[LSRC-GigabitEthernet2/0/0] quit
[LSRC] interface loopback 1
[LSRC-LoopBack1] isis enable 1
[LSRC-LoopBack1] quit
After completing the configuration, run the display ip routing-table command on each LSR.
LSRs have learned routes from each other.
Step 3 Configure basic MPLS capability and enable MPLS TE, RSVP-TE, and CSPF. Configure
maximum bandwidth and maximum reservable bandwidth of interfaces.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] mpls
[LSRA-GigabitEthernet1/0/0] mpls te
[LSRA-GigabitEthernet1/0/0] mpls rsvp-te
[LSRA-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRA-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000
[LSRA-GigabitEthernet1/0/0] quit
# Configure LSRB.
[LSRB] mpls lsr-id 2.2.2.2
[LSRB] mpls
[LSRB-mpls] mpls te
# Configure LSRC.
[LSRC] mpls lsr-id 3.3.3.3
[LSRC] mpls
[LSRC-mpls] mpls te
[LSRC-mpls] mpls rsvp-te
[LSRC-mpls] quit
[LSRC] interface gigabitethernet 2/0/0
[LSRC-GigabitEthernet2/0/0] mpls
[LSRC-GigabitEthernet2/0/0] mpls te
[LSRC-GigabitEthernet2/0/0] mpls rsvp-te
[LSRC-GigabitEthernet2/0/0] quit
# Configure LSRB.
[LSRB] isis 1
[LSRB-isis-1] cost-style wide
[LSRB-isis-1] is-name LSRB
[LSRB-isis-1] traffic-eng level-2
[LSRB-isis-1] graceful-restart
[LSRB-isis-1] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] cost-style wide
[LSRC-isis-1] is-name LSRC
[LSRC-isis-1] traffic-eng level-2
[LSRC-isis-1] graceful-restart
[LSRC-isis-1] quit
After completing the configuration, run the display interface tunnel command on LSRA. The
interface status of the MPLS TE tunnel is Up.
[LSRA] display interface tunnel
Tunnel1/0/0 current state : UP
Line protocol current state : UP
Last up time: 2007-10-29, 16:35:10
Description : Tunnel1/0/0 Interface
...
# Configure LSRB.
[LSRB] mpls
[LSRB-mpls] mpls rsvp-te hello
[LSRB-mpls] mpls rsvp-te hello full-gr
[LSRB-mpls] quit
[LSRB] interface gigabitethernet 1/0/0
[LSRB-GigabitEthernet1/0/0] mpls rsvp-te hello
[LSRB] interface gigabitethernet 2/0/0
[LSRB-GigabitEthernet2/0/0] mpls rsvp-te hello
# Configure LSRC.
[LSRC] mpls
[LSRC-mpls] mpls rsvp-te hello
[LSRC-mpls] mpls rsvp-te hello full-gr
[LSRC-mpls] quit
[LSRC] interface gigabitethernet 2/0/0
[LSRC-GigabitEthernet2/0/0] mpls rsvp-te hello
Run the display mpls rsvp-te graceful-restart peer command on LSRB to view the GR status
of the neighboring LSR.
[LSRB] display mpls rsvp-te graceful-restart peer
If a master/slave switchover is performed, during the graceful restart, Tunnel 1/0/0 keeps up.
Run the display this interface command on LSRA. The Tunnel up/down statistics value is 0,
indicating that the tunnel has never flapped.
[LSRA] interface tunnel 1/0/0
[LSRA-Tunnel1/0/0] display this interface
Tunnel1/0/0 current state : UP
Line protocol current state : UP
Last line protocol up time : 2010-07-13 16:10:09
Description: Tunnel1/0/0 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet protocol processing : disabled
Encapsulation is TUNNEL, loopback not set
Tunnel destination 3.3.3.3
Tunnel up/down statistics 0
Tunnel protocol/transport MPLS/MPLS, ILM is available,
...
# Run the slave switchover command on LSRB to forcibly perform a master/slave switchover
of main control boards.
[LSRB] slave switchover enable
[LSRB] slave switchover
Caution!!! Confirm switch slave to master[Y/N] ?
[LSRB] y
Run the display this interface command on LSRA again to view that the value of Tunnel up/
down statistics is still 0, indicating that the tunnel did not flap after the master/slave switchover
of main control boards on LSRB. This means that RSVP GR has been configured successfully.
[LSRA] interface tunnel 1/0/0
[LSRA-Tunnel1/0/0] display this interface
Tunnel1/0/0 current state : UP
Line protocol current state : UP
Last line protocol up time : 2010-07-13 16:13:53
Description: Tunnel1/0/0 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet protocol processing : disabled
Encapsulation is TUNNEL, loopback not set
Tunnel destination 3.3.3.3
Tunnel up/down statistics 0
Tunnel protocol/transport MPLS/MPLS, ILM is available,
...
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
mpls rsvp-te hello
mpls rsvp-te hello full-gr
#
isis 1
graceful-restart
is-level level-2
cost-style wide
is-name LSRA
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
mpls rsvp-te hello
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 100
mpls te bandwidth ct0 20000
mpls te commit
#
return
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
#
interface GigabitEthernet2/0/0
ip address 20.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
mpls rsvp-te hello
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
Networking Requirements
Figure 3-33 illustrates the CR-LSP hot standby networking. A TE tunnel with the ingress PE1
and egress PE2 is established on PE1. Hot standby and a best-effort LSP are configured for the
tunnel. If the primary CR-LSP fails, traffic switches to the backup CR-LSP. After the primary
CR-LSP recovers, traffic switches back to the primary CR-LSP after a 15–second delay. If both
the primary and the backup CR-LSPs fail, traffic switches to the best-effort LSP.
Two static BFD sessions must be set up to monitor the primary and backup CR-LSPs. After
static BFD is configured for CR-LSPs, the following objectives are achieved:
l If the primary CR-LSP fails, traffic switches to the backup CR-LSP within milliseconds.
l If the backup CR-SLP fails within 15 seconds after the primary CR-LSP recovers, traffic
switches back to the primary CR-LSP.
GE2/0/0 GE2/0/0
10.4.1.1/30 10.5.1.2 /30
GE1/0/0 GE1/0/0
PE1 PE2
10.3.1.1/30 10.2.1.2/30
Loopback1 Loopback1
4.4.4.4/32 3.3.3.3/32
: Primary path
: Backup path
: Best-effort path
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure CR-LSP hot standby based on Example for Configuring CR-LSP Hot.
2. On PE1, create two BFD sessions and bind one to the primary CR-LSP and the other to
backup CR-LSP; on PE2, create two BFD sessions and bind both sessions to the IP link
(PE2 --> PE1).
Data Preparation
To complete the configuration, you need the following data:
l BFD session name, local discriminator, and remote discriminator
l Minimum intervals at which BFD packets are sent and received
l Local BFD detection multiplier
l For other data, see Example for Configuring CR-LSP Hot Standby.
Procedure
Step 1 Configure CR-LSP hot standby.
Configure the primary CR-LSP, backup CR-LSP, and best-effort path according to Example
for Configuring CR-LSP Hot Standby.
Step 2 Configuring BFD for CR-LSP.
# Create BFD sessions on PE1 and PE2 to monitor the primary and backup CR-LSPs. Bind one
BFD session on PE1 to the primary CR-LSP and the other to the backup CR-LSP; bind the BFD
session on PE2 to the IP link. Set the minimum intervals at which BFD packets are sent and
received to 100 milliseconds and the local BFD detection multiplier to 3.
# Configure PE1.
[PE1] bfd
[PE1-bfd] quit
[PE1] bfd mainlsptope2 bind mpls-te interface tunnel1/0/0 te-lsp
[PE1-bfd-lsp-session-mainlsptope2] discriminator local 413
[PE1-bfd-lsp-session-mainlsptope2] discriminator remote 314
[PE1-bfd-lsp-session-mainlsptope2] min-tx-interval 100
[PE1-bfd-lsp-session-mainlsptope2] min-rx-interval 100
[PE1-bfd-lsp-session-mainlsptope2] detect-multiplier 3
[PE1-bfd-lsp-session-mainlsptope2] process-pst
[PE1-bfd-lsp-session-mainlsptope2] commit
[PE1-bfd-lsp-session-mainlsptope2] quit
[PE1] bfd backuplsptope2 bind mpls-te interface tunnel1/0/0 te-lsp backup
[PE1-bfd-lsp-session-backuplsptope2] discriminator local 423
[PE1-bfd-lsp-session-backuplsptope2] discriminator remote 324
[PE1-bfd-lsp-session-backuplsptope2] min-tx-interval 100
[PE1-bfd-lsp-session-backuplsptope2] min-rx-interval 100
[PE1-bfd-lsp-session-backuplsptope2] detect-multiplier 3
[PE1-bfd-lsp-session-backuplsptope2] process-pst
[PE1-bfd-lsp-session-backuplsptope2] commit
[PE1-bfd-lsp-session-backuplsptope2] quit
# Configure PE2.
[PE2] bfd
[PE2-bfd] quit
[PE2] bfd mainlsptope2 bind peer-ip 4.4.4.4
[PE2-bfd-lsp-session-mainlsptope2] discriminator local 314
[PE2-bfd-lsp-session-mainlsptope2] discriminator remote 413
[PE2-bfd-lsp-session-mainlsptope2] min-tx-interval 100
[PE2-bfd-lsp-session-mainlsptope2] min-rx-interval 100
[PE2-bfd-lsp-session-mainlsptope2] detect-multiplier 3
[PE2-bfd-lsp-session-mainlsptope2] commit
[PE2-bfd-lsp-session-mainlsptope2] quit
[PE2] bfd backuplsptope2 bind peer-ip 4.4.4.4
[PE2-bfd-lsp-session-backuplsptope2] discriminator local 324
[PE2-bfd-lsp-session-backuplsptope2] discriminator remote 423
[PE2-bfd-lsp-session-backuplsptope2] min-tx-interval 100
# Run the display bfd session discriminator local-discriminator-value command on PE1 and
PE2. The command output shows that the status of BFD sessions is Up.
The following example uses the command output on PE1.
[PE1] display bfd session discriminator 413
--------------------------------------------------------------------------------
Local Remote PeerIpAddr InterfaceName State Type
--------------------------------------------------------------------------------
413 314 3.3.3.3 Tunnel1/0/0 Up S_TE_LSP
--------------------------------------------------------------------------------
[PE1] display bfd session discriminator 423
--------------------------------------------------------------------------------
Local Remote PeerIpAddr InterfaceName State Type
--------------------------------------------------------------------------------
423 324 3.3.3.3 Tunnel1/0/0 Up S_TE_LSP
--------------------------------------------------------------------------------
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
bfd
#
mpls lsr-id 4.4.4.4
mpls
lsp-trigger all
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path backup
next hop 10.3.1.2
next hop 10.5.1.2
next hop 3.3.3.3
#
explicit-path main
next hop 10.4.1.2
next hop 10.2.1.2
next hop 3.3.3.3
#
isis 1
cost-style wide
network-entity 10.0000.0000.0004.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
l P1 configuration file
#
sysname P1
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
#
isis 1
cost-style wide
network-entity 10.0000.0000.0001.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
l P2 configuration file
#
sysname P2
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls rsvp-te
#
isis 1
cost-style wide
network-entity 10.0000.0000.0002.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.5.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface GigabitEthernet3/0/0
ip address 10.3.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
Networking Requirements
Figure 3-34 illustrates an MPLS network, on which a switch (a Layer 2 device) exists between
PE1 and PE2. PVPN FRR and an MPLS TE tunnel are configured on PE1. The primary path of
VPN FRR is PE1 → Switch → PE2, and the backup path of VPN FRR is PE1 → PE3. If the
primary path fails, VPN traffic switches to the backup path. BFD for TE is configured monitor
the TE tunnel over the primary path and enable VPN to rapidly detect tunnel faults. Traffic can
rapidly switch between the primary and backup paths when necessary, and the fault recovery
time is shortened.
NOTE
For simplicity, the IP addresses of interfaces connecting PEs to CEs are not shown in Figure 3-34.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure basic MPLS functions, and establish bidirectional TE tunnels between PE1 and
PE2, and between PE1 and PE3.
2. Configure VPN FRR.
3. Enable global BFD on PE1, PE2, and PE3.
4. Configure a BFD session on PE1 to detect the TE tunnel over the primary path.
5. Configure one BFD session each on PE2 and PE3 and specify the TE tunnel as the BFD
backward channel.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and mask to each interface according to Figure 3-34, create loopback
interfaces on LSRs, and configure IP addresses of the loopback interfaces as MPLS LSR IDs.
For configuration details, see Configuration Files in this section.
Step 2 Configure the switch.
Configure the switch so that PE1 and PE2 can communicate with each other. For configuration
details, see Configuration Files in this section.
Step 3 Configure an IGP.
Configure OSPF or IS-IS on each LSR so that PE1 and PE2, and PE1 and PE3 can communicate.
In this example, OSPF is used. For configuration details, see Configuration Files in this section.
Step 4 Configure basic MPLS functions.
Configure the LSR ID and enable MPLS in the system view on each LSR and enable MPLS in
the interface view. For configuration details, see Configuration Files in this section.
Step 5 Configure basic MPLS TE functions.
Enable MPLS-TE and MPLS RSVP-TE in the MPLS and interface views on each LSR. Set the
maximum reservable bandwidth for the MPLS TE on the outbound interfaces of links along the
tunnel to 100 Mbit/s and the BC bandwidth to 100 Mbit/s. For configuration details, see
Configuration Files in this section.
Step 6 Configure OSPF TE and CSPF.
Configure OSPF TE on each LSR and CSPF on PE1. For configuration details, see Configuring
the RSVP-TE Tunnel.
Step 7 Configure the tunnel interface.
# Specify two explicit paths on PE1 and one each on PE2 and PE3.
# Configure PE1.
<PE1> system-view
[PE1] explicit-path tope2
[PE1-explicit-path-tope2] next hop 10.2.1.2
[PE1-explicit-path-tope2] next hop 3.3.3.3
[PE1-explicit-path-tope2] quit
[PE1] explicit-path tope3
[PE1-explicit-path-tope3] next hop 10.1.1.2
[PE1-explicit-path-tope3] next hop 2.2.2.2
[PE1-explicit-path-tope3] quit
# Configure PE2.
<PE2> system-view
[PE2] explicit-path tope1
[PE2-explicit-path-tope1] next hop 10.2.1.1
[PE2-explicit-path-tope1] next hop 1.1.1.1
[PE2-explicit-path-tope1] quit
# Configure PE3.
<PE3> system-view
[PE3] explicit-path tope1
[PE3-explicit-path-tope1] next hop 10.1.1.1
[PE3-explicit-path-tope1] next hop 1.1.1.1
[PE3-explicit-path-tope1] quit
# Create two tunnel interfaces on PE1 and one each on PE2 and PE3, specify explicit paths and
set the tunnel bandwidth to 10 Mbit/s. Bind the tunnel to the specified VPN.
# Configure PE1.
[PE1] interface tunnel 2/0/0
[PE1-Tunnel2/0/0] ip address unnumbered interface loopback 1
[PE1-Tunnel2/0/0] tunnel-protocol mpls te
[PE1-Tunnel2/0/0] destination 3.3.3.3
[PE1-Tunnel2/0/0] mpls te tunnel-id 200
[PE1-Tunnel2/0/0] mpls te path explicit-path tope2
[PE1-Tunnel2/0/0] mpls te bandwidth ct0 10000
[PE1-Tunnel2/0/0] mpls te reserved-for-binding
[PE1-Tunnel2/0/0] mpls te commit
[PE1-Tunnel2/0/0] quit
[PE1] interface tunnel 1/0/0
[PE1-Tunnel1/0/0] ip address unnumbered interface loopback 1
[PE1-Tunnel1/0/0] tunnel-protocol mpls te
[PE1-Tunnel1/0/0] destination 2.2.2.2
[PE1-Tunnel1/0/0] mpls te tunnel-id 100
[PE1-Tunnel1/0/0] mpls te path explicit-path tope3
[PE1-Tunnel1/0/0] mpls te bandwidth ct0 10000
[PE1-Tunnel1/0/0] mpls te reserved-for-binding
[PE1-Tunnel1/0/0] mpls te commit
[PE1-Tunnel1/0/0] quit
# Configure PE2.
[PE2] interface tunnel 2/0/0
[PE2-Tunnel2/0/0] ip address unnumbered interface loopback 1
[PE2-Tunnel2/0/0] tunnel-protocol mpls te
[PE2-Tunnel2/0/0] destination 1.1.1.1
[PE2-Tunnel2/0/0] mpls te tunnel-id 200
[PE2-Tunnel2/0/0] mpls te path explicit-path tope1
[PE2-Tunnel2/0/0] mpls te bandwidth ct0 10000
[PE2-Tunnel2/0/0] mpls te reserved-for-binding
[PE2-Tunnel2/0/0] mpls te commit
[PE2-Tunnel2/0/0] quit
# Configure PE3.
[PE3] interface tunnel 1/0/0
[PE3-Tunnel1/0/0] ip address unnumbered interface loopback 1
[PE3-Tunnel1/0/0] tunnel-protocol mpls te
[PE3-Tunnel1/0/0] destination 1.1.1.1
[PE3-Tunnel1/0/0] mpls te tunnel-id 100
# Run the display mpls te tunnel-interface tunnel interface-number command on PEs The
status of Tunnel 1/0/0 and Tunnel 2/0/0 on PE1, Tunnel 2/0/0 on PE2, and Tunnel 1/0/0 on PE3
is Up.
# Create one VPN instance each on PE1, PE2, and PE3. Set all VPN instance names to vpn1;
set the RDs to 100:1, 100:2, and 100:3, separately, and set all RTs to 100:1. Configure CEs to
access PEs. The configuration details are not provided here.
# Establish an MP IBGP peer relationship between PE1 and PE2, and between PE1 and PE3.
The BGP AS number for all of the PEs is 100. The loopback interface Loopback1 is used to set
up BGP sessions. For configuration details, see Configuration Files in this section.
# Configure tunnel policies for PE1, PE2, and PE3 and apply the policies to the VPN instances.
# Configure PE1.
[PE1] tunnel-policy policy1
[PE1-tunnel-policy-policy1] tunnel binding destination 3.3.3.3 te tunnel 2/0/0
[PE1-tunnel-policy-policy1] tunnel binding destination 2.2.2.2 te tunnel 1/0/0
[PE1-tunnel-policy-policy1] quit
[PE1] ip vpn-instance vpn1
[PE1-ip-vpn-instance-vpn1] ipv4-family
[PE1-ip-vpn-instance-vpn1-af-ipv4] tnl-policy policy1
[PE1-ip-vpn-instance-vpn1-af-ipv4] quit
[PE1-ip-vpn-instance-vpn1] quit
# Configure PE2.
[PE2] tunnel-policy policy1
[PE2-tunnel-policy-policy1] tunnel binding destination 1.1.1.1 te tunnel 2/0/0
[PE2-tunnel-policy-policy1] quit
[PE2] ip vpn-instance vpn1
[PE2-ip-vpn-instance-vpn1] ipv4-family
[PE2-ip-vpn-instance-vpn1-af-ipv4] tnl-policy policy1
[PE2-ip-vpn-instance-vpn1-af-ipv4] quit
[PE2-ip-vpn-instance-vpn1] quit
# Configure PE3.
[PE3] tunnel-policy policy1
[PE3-tunnel-policy-policy1] tunnel binding destination 1.1.1.1 te tunnel 1/0/0
[PE3-tunnel-policy-policy1] quit
[PE3] ip vpn-instance vpn1
[PE3-ip-vpn-instance-vpn1] ipv4-family
[PE3-ip-vpn-instance-vpn1-af-ipv4] tnl-policy policy1
[PE3-ip-vpn-instance-vpn1-af-ipv4] quit
[PE3-ip-vpn-instance-vpn1] quit
# With these configurations, CEs can communicate with each other, and traffic passes through
PE1, switch, and PE2. After the cable of any interface connecting PE1 and PE2 is removed, or
the switch or PE2 fails, VPN traffic switches to the backup path PE1 → PE3. Fault recovery
takes about as long as IGP convergence.
# Configure a BFD session on PE1 to monitor the TE tunnel of the primary path. Set the minimum
interval at which BFD packets are sent and received to 100 milliseconds and the local BFD
detection multiplier to 3.
[PE1] bfd
[PE1-bfd] quit
[PE1] bfd test bind mpls-te interface tunnel2/0/0
[PE1-bfd-lsp-session-test] discriminator local 12
[PE1-bfd-lsp-session-test] discriminator remote 21
[PE1-bfd-lsp-session-test] min-tx-interval 100
[PE1-bfd-lsp-session-test] min-rx-interval 100
[PE1-bfd-lsp-session-test] detect-multiplier 3
[PE1-bfd-lsp-session-test] process-pst
[PE1-bfd-lsp-session-test] commit
# Configure a BFD session on PE2 and specify the TE tunnel as the BFD revese channel. Set
the minimum interval at which BFD packets are sent and received to 100 milliseconds and the
local BFD detection multiplier to 3.
[PE2] bfd
[PE2-bfd] quit
[PE2] bfd test bind mpls-te interface tunnel2/0/0
[PE2-bfd-lsp-session-test] discriminator local 21
[PE2-bfd-lsp-session-test] discriminator remote 12
[PE2-bfd-lsp-session-test] min-tx-interval 100
[PE2-bfd-lsp-session-test] min-rx-interval 100
[PE2-bfd-lsp-session-test] detect-multiplier 3
[PE2-bfd-lsp-session-test] commit
# Run the display bfd session { all | discriminator discr-value | mpls-te | [ slot slot-id ]
[ verbose ] command on PE1 and PE2. The status of the BFD sessions is Up.
Connect port 1 and port 2 on a tester to CE1 and CE2, respectively. Inject MPLS traffic destined
for port 2 into port 1. After a cable is removed, fault is rectified within milliseconds.
----End
Configuration Files
NOTE
Configuration files for CE1, CE2, and switch are not listed here. Configurations related to CEs accessing
PEs are also not listed.
l PE1 configuration file
#
sysname PE1
#
ip vpn-instance vpn1
ipv4-family
route-distinguisher 100:1
vpn frr route-policy vpn_frr_rp
tnl-policy policy1
vpn-target 100:1 export-extcommunity
vpn-target 100:1 import-extcommunity
#
bfd
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path tope2
next hop 10.2.1.2
next hop 3.3.3.3
#
explicit-path tope3
next hop 10.1.1.2
next hop 2.2.2.2
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 10.2.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.1.1 255.255.255.252
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 2.2.2.2
mpls te tunnel-id 100
mpls te bandwidth ct0 10000
mpls te path explicit-path tope3
mpls te reserved-for-binding
mpls te commit
#
interface Tunnel2/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 200
mpls te bandwidth ct0 10000
mpls te path explicit-path tope2
mpls te reserved-for-binding
mpls te commit
#
bgp 100
peer 2.2.2.2 as-number 100
peer 2.2.2.2 connect-interface LoopBack1
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 10.2.1.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
#
interface Tunnel2/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.1
mpls te tunnel-id 200
mpls te bandwidth ct0 10000
mpls te path explicit-path tope1
mpls te reserved-for-binding
mpls te commit
#
bgp 100
peer 1.1.1.1 as-number 100
peer 1.1.1.1 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
peer 1.1.1.1 enable
#
ipv4-family vpnv4
policy vpn-target
peer 1.1.1.1 enable
#
ipv4-family vpn-instance vpn1
import-route direct
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 10.2.1.0 0.0.0.255
network 3.3.3.3 0.0.0.0
mpls-te enable
#
tunnel-policy policy1
tunnel binding destination 1.1.1.1 te Tunnel2/0/0
#
bfd test bind mpls-te interface Tunnel2/0/0
discriminator local 21
discriminator remote 12
min-tx-interval 100
min-rx-interval 100
commit
#
return
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path tope1
next hop 10.1.1.1
next hop 1.1.1.1
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.1.2 255.255.255.252
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.1
mpls te tunnel-id 100
mpls te bandwidth ct0 10000
mpls te path explicit-path tope1
mpls te reserved-for-binding
mpls te commit
#
bgp 100
peer 1.1.1.1 as-number 100
peer 1.1.1.1 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
peer 1.1.1.1 enable
#
ipv4-family vpnv4
policy vpn-target
peer 1.1.1.1 enable
#
ipv4-family vpn-instance vpn1
import-route direct
#
ospf 1
opaque-capability enable
area 0.0.0.0
network 10.1.1.0 0.0.0.3
network 2.2.2.2 0.0.0.0
mpls-te enable
#
tunnel-policy policy1
tunnel binding destination 1.1.1.1 te Tunnel1/0/0
#
return
Networking Requirements
Figure 3-35 illustrates the CR-LSP hot standby networking. A TE tunnel is established between
PE1 and PE2. Hot standby and a best-effort LSP is configured for the tunnel. If the primary CR-
LSP fails, traffic can be switched to the backup CR-LSP. After the primary CR-LSP recovers,
traffic can be switched back to the primary CR-LSP in 15 seconds. If both the primary and
backup CR-LSPs fail, traffic can be switched to the best-effort LSP.
Dynamic BFD for CR-LSP is required to detect the primary and backup CR-LSPs. After the
configuration, the following objects should be achieved:
l If the primary CR-LSP fails, traffic can be switched to the backup CR-LSP at the
millisecond level.
l If the backup CR-LSP fails within 15 seconds after the primary CR-LSP recovers, traffic
is switched back to the primary CR-LSP.
NOTE
Compared with static BFD, dynamic BFD is simpler in terms of configurations. In addition, dynamic BFD
can reduce the number of BFD sessions, and use less network resources because only one BFD session can
be created on a tunnel interface.
GE2/0/0 GE2/0/0
10.4.1.1/30 10.5.1.2 /30
GE1/0/0 GE1/0/0
PE1 PE2
10.3.1.1/30 10.2.1.2/30
Loopback1 Loopback1
4.4.4.4/32 3.3.3.3/32
: Primary path
: Backup path
: Best-effort path
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure CR-LSP hot standby based on Example for Configuring CR-LSP Hot.
2. Enable BFD on the ingress of the tunnel. Configure MPLS TE BFD. Set the minimum
interval at which BFD packets are sent and received, and the local BFD detection multiplier.
3. Enable the capability of passively creating BFD sessions on the egress.
Data Preparation
To complete the configuration, you need the following data:
l Minimum intervals at which BFD packets are sent and received on the ingress (The default
values are specified in the License.)
l Local BFD detection multiplier (The default values are specified in the License.)
l For other data, see Example for Configuring CR-LSP Hot Standby
Procedure
Step 1 Configure CR-LSP hot standby.
Configure the primary CR-LSP, backup CR-LSP, and best-effort LSP based on Example for
Configuring CR-LSP Standby.
Step 2 Enable BFD on the ingress of the tunnel and configure MPLS TE BFD.
# Enable MPLS TE BFD on the tunnel interface of PE1. Set the minimum intervals at which
BFD packets are sent and received to 100 milliseconds and the local BFD detection multiplier
to 3.
<PE1> system-view
[PE1] bfd
[PE1-bfd] quit
[PE1] interface tunnel 1/0/0
[PE1-Tunnel1/0/0] mpls te bfd enable
[PE1-Tunenl1/0/0] mpls te bfd min-tx-interval 100 min-rx-interval 100 detect-
multiplier 3
[PE1-Tunenl1/0/0] mpls te commit
Step 3 Enable the capability of passively creating BFD sessions on the egress of the tunnel.
<PE2> system-view
[PE2] bfd
[PE2-bfd] mpls-passive
[PE2-bfd] quit
# Run the display bfd session discriminator local-discriminator-value command on PE1 and
PE2. The status of BFD sessions is Up.
[PE1] display bfd session mpls-te interface Tunnel 1/0/0 te-lsp
--------------------------------------------------------------------------------
Local Remote PeerIpAddr InterfaceName State Type
--------------------------------------------------------------------------------
8208 8217 3.3.3.3 Tunnel1/0/0 Up D_TE_LSP
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
Connect port 1 and port 2 on a tester to PE1 and PE2, respectively. Inject MPLS traffic destined
for port 2 into port 1. After the cable is removed from GE 2/0/0 on PE1 or P1, the fault is rectified
within milliseconds.
After the cable is reconnected to GE 2/0/0 and the cable is removed from GE 1/0/0 on PE1 in
15 seconds, the fault is rectified within milliseconds.
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
bfd
#
mpls lsr-id 4.4.4.4
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path backup
next hop 10.3.1.2
next hop 10.5.1.2
next hop 3.3.3.3
#
explicit-path main
next hop 10.4.1.2
next hop 10.2.1.2
next hop 3.3.3.3
#
isis 1
cost-style wide
network-entity 10.0000.0000.0004.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.3.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.4.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te tunnel-id 100
mpls te bfd enable
mpls te record-route
mpls te bandwidth ct0 10000
mpls te path explicit-path main
mpls te path explicit-path backup secondary
l P1 configuration file
#
sysname P1
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
#
isis 1
cost-style wide
network-entity 10.0000.0000.0001.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.4.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet3/0/0
ip address 10.2.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls rsvp-te
#
isis 1
cost-style wide
network-entity 10.0000.0000.0002.00
traffic-eng level-1-2
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.5.1.1 255.255.255.252
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface GigabitEthernet3/0/0
ip address 10.3.1.2 255.255.255.252
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
Networking Requirements
Figure 3-36 illustrates an MPLS network with a switch (a Layer 2 device) between P1 and P2.
An MPLS TE tunnel between PE1 and PE2 is established. TE FRR is configured on P1
functioning as a PLR and PE2 functioning as an MP. The primary CR-LSP is PE1 --> P1 -->
Switch --> P2 --> PE2; the bypass CR-LSP is P1 --> P3 --> PE2. In addition, RSVP GR is
configured on each device.
GE 2/0/0 on P1 cannot receive RSVP Hello messages from its neighbors if either of the following
conditions are met:
l P2 is performing RSVP GR.
l The link or the switch between P1 and P2 fails.
In these situations, P1 cannot identify whether the failure to receive RSVP Hello messages is
because a fault on the link or switch or because its neighbor is performing RSVP GR; therefore,
P1 cannot determine whether to perform the TE FRR switchover.
The default interval at which RSVP Hello messages are sent is 3 seconds. The interval at which
a neighbor is declared Down is three times longer than the interval at which Hello messages are
sent. Therefore, an LSR can sense a fault on an RSVP neighbor within seconds. BFD, however,
can detect a fault within milliseconds.
If BFD for RSVP is configured on the preceding network, P1 can rapidly detect the fault in the
link or switch between P1 and P2 and then perform a TE FRR switchover.
/0 PO
S1/0 0 10. S2/0
PO 1.2/3 5.1 /0
3. .1/3
10. 0 PO
Loopback1 /0/0 P3 10. S2/0
O S3 1/30 5.1 /0
1.1.1.1/32 P 3.1. .2/3
10. 0
POS1/0/0
10.1.1.1/30 P1 PE2
GE2 Switch
/0
PE1 POS1/0/0 10.2 /0/0 P2 S 1/0 0
10.1.1.2/30 .1.1 PO 1.2/3
/24 G .4.
Loopback1 10.2 E2/0/0 1/0/0 010 Loopback1
S 3
2.2.2.2/32 .1.2
/24 PO 4.1.1/ 5.5.5.5/32
10 .
Loopback1
3.3.3.3/32
: Primary CR-LSP
: Bypass CR-LSP
Configuration Roadmap
The configuration roadmap is as follows:
1. Assign an IP address to each interface and enable IGP on each LSR so that LSRs can
communicate. Enable IGP GR to support RSVP GR.
2. Configure the MPLS network and basic MPLS TE functions.
3. Configure explicit paths for the primary and bypass tunnels.
4. Create a TE primary tunnel interface and enable TE FRR on PE1. Configure the bypass
tunnel on P1.
5. Configure RSVP GR on all LSRs and establish a Hello session between P1 and PE2.
NOTE
On a network with TE FRR configured, a Hello session is required between a PLR and an MP of the
bypass tunnel if you want to configure RSVP GR. If the Hello session is not configured, when traffic
switches to the bypass tunnel because the primary tunnel fails, the primary tunnel goes Down if the
PLR or MP performs RSVP GR.
6. Configure BFD for RSVP on P1 and P2.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and mask to each interface according to Figure 3-36, create loopback
interfaces on LSRs, and then configure the IP addresses of the loopback interfaces as MPLS
LSR IDs. For configuration details, see Configuration Files in this section.
Configure the switch so that P1 and P2 can communicate. For configuration details, see
Configuration Files in this section.
Configure OSPF or IS-IS on each LSR so that LSRs can communicate. Configure IGP GR to
support RSVP GR. In this example, OSPF is used. For configuration details, see Configuration
Files in this section.
Step 4 Configuring basic MPLS functions.
Configure the LSR ID and enable MPLS in the system view on each LSR and enable MPLS in
the interface view. For configuration details, see Configuration Files in this section.
Step 5 Configure basic MPLS TE functions.
Enable MPLS-TE and MPLS RSVP-TE in the MPLS and interface views on each LSR. Set the
maximum reservable bandwidth for the outbound interfaces of links along the tunnel to 100
Mbit/s and the BC0 bandwidth to 100 Mbit/s. For configuration details, see Configuration
Files in this section.
Step 6 Configure OSPF TE and CSPF.
Enable OSPF TE on each node and configure CSPF on PE1 and PE2. For configuration details,
see Configuring the RSVP-TE Tunnel.
Step 7 Configure the primary tunnel.
# Specify an explicit path for the primary tunnel on PE1.
<PE1> system-view
[PE1] explicit-path tope2
[PE1-explicit-path-tope2] next hop 10.1.1.2
[PE1-explicit-path-tope2] next hop 10.2.1.2
[PE1-explicit-path-tope2] next hop 10.4.1.2
[PE1-explicit-path-tope2] next hop 5.5.5.5
[PE1-explicit-path-tope2] quit
# Create a tunnel interface on PE1, specify an explicit path, set the tunnel bandwidth to 10 Mbit/
s, and enable TE FRR.
[PE1] interface tunnel 1/0/0
[PE1-Tunnel1/0/0] ip address unnumbered interface loopback 1
[PE1-Tunnel1/0/0] tunnel-protocol mpls te
[PE1-Tunnel1/0/0] destination 5.5.5.5
[PE1-Tunnel1/0/0] mpls te tunnel-id 100
[PE1-Tunnel1/0/0] mpls te path explicit-path tope2
[PE1-Tunnel1/0/0] mpls te bandwidth ct0 10000
[PE1-Tunnel1/0/0] mpls te fast-reroute
[PE1-Tunnel1/0/0] mpls te commit
[PE1-Tunnel1/0/0] quit
# Run the display mpls te tunnel-interface tunnel interface-number command on PE1. The
status of tunnel 1/0/0 on PE1 is Up.
Step 8 Configure the bypass tunnel.
# Specify the explicit path for the bypass tunnel on P1.
<P1> system-view
[P1] explicit-path tope2
[P1-explicit-path-tope2] next hop 10.3.1.2
[P1-explicit-path-tope2] next hop 10.5.1.2
[P1-explicit-path-tope2] next hop 5.5.5.5
[P1-explicit-path-tope2] quit
# Configure a bypass tunnel interface and specify an explicit path for the bypass tunnel. Set the
tunnel bandwidth to 20 Mbit/s and the protected bandwidth to 10 Mbit/s. Specify the physical
interface to be protected by the bypass tunnel.
# Configure RSVP GR on all LSRs and establish Hello sessions between P1 and PE2.
# Configure PE1.
[PE1] mpls
[PE1-mpls] mpls rsvp-te hello
[PE1-mpls] mpls rsvp-te hello full-gr
[PE1-mpls] quit
[PE1] interface pos1/0/0
[PE1-Pos1/0/0] mpls rsvp-te hello
# Configure P1.
[P1] mpls
[P1-mpls] mpls rsvp-te hello
[P1-mpls] mpls rsvp-te hello full-gr
[P1-mpls] mpls rsvp-te hello nodeid-session 5.5.5.5
[P1-mpls] quit
[P1] interface pos1/0/0
[P1-Pos1/0/0] mpls rsvp-te hello
[P1-Pos1/0/0] quit
[P1] interface gigabitethernet 2/0/0
[P1-GigabitEthernet2/0/0] mpls rsvp-te hello
[P1-GigabitEthernet2/0/0] quit
[P1] interface pos 3/0/0
[P1-Pos3/0/0] mpls rsvp-te hello
[P1-Pos3/0/0] quit
# Configure P2.
[P2] mpls
[P2-mpls] mpls rsvp-te hello
[P2-mpls] mpls rsvp-te hello full-gr
[P2-mpls] quit
[P2] interface pos1/0/0
[P2-Pos1/0/0] mpls rsvp-te hello
[P2-Pos1/0/0] quit
[P2] interface gigabitethernet 2/0/0
[P2-GigabitEthernet2/0/0] mpls rsvp-te hello
[P2-GigabitEthernet2/0/0] quit
# Configure P3.
[P3] mpls
[P3-mpls] mpls rsvp-te hello
[P3-mpls] mpls rsvp-te hello full-gr
[P3-mpls] quit
[P3] interface pos1/0/0
[P3-Pos1/0/0] mpls rsvp-te hello
[P3-Pos1/0/0] quit
[P3] interface pos 2/0/0
[P3-Pos2/0/0] mpls rsvp-te hello
[P3-Pos2/0/0] quit
# Configure PE2.
[PE2] mpls
[PE2-mpls] mpls rsvp-te hello
[PE2-mpls] mpls rsvp-te hello full-gr
[PE2-mpls] mpls rsvp-te hello nodeid-session 2.2.2.2
[PE2-mpls] quit
[PE2] interface pos1/0/0
[PE2-Pos1/0/0] mpls rsvp-te hello
[PE2-Pos1/0/0] quit
[PE2] interface pos 2/0/0
[PE2-Pos2/0/0] mpls rsvp-te hello
[PE2-Pos2/0/0] quit
# Configure P2.
[P2] bfd
[P2-bfd] quit
[P2] interface gigabitethernet 2/0/0
[P2-GigabitEthernet2/0/0] mpls rsvp-te bfd enable
[P2-GigabitEthernet2/0/0] mpls rsvp-te bfd min-tx-interval 100 min-rx-interval 100
detect-multiplier 3
[P2-GigabitEthernet2/0/0] quit
# Run the display mpls rsvp-te bfd session { all | interface interface-name | peer ip-addr }
command on PE1 and PE2. The status of the BFD sessions is Up.
Step 11 Verify the configuration.
Connect port 1 and port 2 on a tester to PE1 and PE2, respectively. Inject MPLS traffic destined
for port 2 into port 1. (Write down the label value). After the cable is removed from any interface
on P1 and P2, the fault is rectified within milliseconds.
----End
Configuration Files
NOTE
l P1 configuration file
#
sysname P1
#
mpls lsr-id 2.2.2.2
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te hello full-gr
mpls rsvp-te hello nodeid-session 5.5.5.5
mpls te cspf
#
explicit-path tope2
next hop 10.3.1.2
next hop 10.5.1.2
next hop 5.5.5.5
#
bfd
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.1.2 255.255.255.252
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 10.2.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
mpls rsvp-te bfd enable
mpls rsvp-te bfd min-tx-interval 100 min-rx-interval 100
mpls rsvp-te hello
#
interface Pos3/0/0
undo shutdown
link-protocol ppp
ip address 10.3.1.1 255.255.255.252
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
mpls rsvp-te hello
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
#
interface Tunnel3/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 5.5.5.5
mpls te tunnel-id 300
mpls te bandwidth ct0 20000
mpls te path explicit-path tope2
mpls te bypass-tunnel
mpls te protected-interface GigabitEthernet 2/0/0
mpls te commit
#
ospf 1
opaque-capability enable
graceful-restart
area 0.0.0.0
network 10.1.1.0 0.0.0.3
network 10.2.1.0 0.0.0.255
network 10.3.1.0 0.0.0.3
network 2.2.2.2 0.0.0.0
mpls-te enable
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 3.3.3.3
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te hello full-gr
#
bfd
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.4.1.1 255.255.255.252
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
mpls rsvp-te hello
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 10.2.1.2 255.255.255.0
mpls
mpls te
mpls rsvp-te
mpls rsvp-te bfd enable
mpls rsvp-te bfd min-tx-interval 100 min-rx-interval 100
mpls rsvp-te hello
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
#
ospf 1
opaque-capability enable
graceful-restart
area 0.0.0.0
network 10.2.1.0 0.0.0.255
network 10.4.1.0 0.0.0.3
network 3.3.3.3 0.0.0.0
mpls-te enable
#
return
l P3 configuration file
#
sysname P3
#
mpls lsr-id 4.4.4.4
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te hello full-gr
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.3.1.2 255.255.255.252
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
#
interface Pos2/0/0
undo shutdown
link-protocol ppp
ip address 10.5.1.1 255.255.255.252
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
mpls rsvp-te hello
#
interface LoopBack1
Networking Requirements
On the network shown in Figure 3-37, OSPF runs on LSRA, LSRB, and LSRC. LSRA and
LSRB reside in Area 0; LSRB and LSRC reside in Area 1; LSRB is an ABR. It is required that
a tunnel be set up on LSRA and LSRC separately destined for LSRB and that IGP shortcut be
enabled on LSRA and LSRC so that routes on LSRA and LSRC to LSRB use the tunnel interfaces
as the outbound interfaces.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure an IP address for each interface on the LSRs and the loopback interface address
used as the LSR ID, and configure OSPF to advertise the network segments connected to
the interfaces on the LSRs and host routes of LSR IDs.
2. Configure the LSR ID of each LSR and enable MPLS, MPLS TE, and MPLS RSVP-TE
on each LSR and interface.
3. Set up a tunnel destined to LSRB on LSRA and LSRC separately and enable IGP shortcut
on LSRA and LSRC.
4. Run the advertise mpls-lsr-id command on LSRB so that the host route 2.2.2.2, an inter-
area route, is advertised to both Area 0 and Area 1.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure an IP address for each interface on the LSRs and configure OSPF.
Configure an IP address and a mask for each interface and configure OSPF so that all LSRs can
communicate with each other.
Step 2 Configure basic MPLS functions and enable MPLS TE and MPLS RSVP-TE.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
Repeat this step for LSRB and LSRC. For configuration details, see Configuration Files in this
section.
# Set up an MPLS TE tunnel from LSRA to LSRB and configure IGP shortcut. The OSPF cost
of the tunnel is smaller than that of the physical link.
[LSRA] interface tunnel 1/0/0
[LSRA-Tunnel1/0/0] ip address unnumbered interface loopback 1
[LSRA-Tunnel1/0/0] tunnel-protocol mpls te
[LSRA-Tunnel1/0/0] destination 2.2.2.2
[LSRA-Tunnel1/0/0] mpls te tunnel-id 100
[LSRA-Tunnel1/0/0] mpls te igp shortcut ospf
[LSRA-Tunnel1/0/0] mpls te igp metric absolute 1
[LSRA-Tunnel1/0/0] mpls te commit
[LSRA-Tunnel1/0/0] quit
# Set up an MPLS TE tunnel from LSRC to LSRB and configure IGP shortcut. The OSPF cost
of the tunnel is smaller than that of the physical link.
[LSRC] interface tunnel 2/0/0
[LSRC-Tunnel2/0/0] ip address unnumbered interface loopback 1
[LSRC-Tunnel2/0/0] tunnel-protocol mpls te
[LSRC-Tunnel2/0/0] destination 2.2.2.2
[LSRC-Tunnel2/0/0] mpls te tunnel-id 200
[LSRC-Tunnel2/0/0] mpls te igp shortcut ospf
[LSRC-Tunnel2/0/0] mpls te igp metric absolute 1
[LSRC-Tunnel2/0/0] mpls te commit
[LSRC-Tunnel2/0/0] quit
After the configurations are complete, run the display interface tunnel command on LSRA.
You can see that the tunnel interface is Up.
# Run the display mpls te tunnel command on LSRA and LSRC. You can view information
about each MPLS TE tunnel.
<LSRA> display mpls te tunnel
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
1.1.1.1 2.2.2.2 1 --/3 I Tunnel1/0/0
<LSRC> display mpls te tunnel
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
3.3.3.3 2.2.2.2 1 --/3 I Tunnel2/0/0
Step 4 Configure the ABR so that LSRB can advertise MPLS LSR IDs to multiple OSPF areas.
[LSRB] ospf 1
[LSRB-ospf-1] advertise mpls-lsr-id
# Run the display ospf peer brief command on LSRB. You can see that each Area 0 and Area
1 has a neighbor in the Full state.
[LSRB] display ospf peer brief
# Run the display ip routing-table 2.2.2.2 command on LSRA. You can see that in the routing
table, the outbound interface of the route to 2.2.2.2 is a tunnel interface.
<LSRA> display ip routing-table 2.2.2.2
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Table : Public
Summary Count : 1
Destination/Mask Proto Pre Cost Flags NextHop Interface
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.0.0.1 255.255.255.0
ospf cost 10
mpls
mpls te
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 2.2.2.2
mpls te tunnel-id 100
mpls te igp shortcut ospf
mpls rsvp-te
#
interface NULL0
#
interface LoopBack0
ip address 3.3.3.3 255.255.255.255
#
interface Tunnel2/0/0
ip address unnumbered interface LoopBack0
tunnel-protocol mpls te
destination 2.2.2.2
mpls te tunnel-id 200
mpls te igp shortcut ospf
mpls te igp metric absolute 1
mpls te commit
#
ospf 1 router-id 3.3.3.3
opaque-capability enable
enable traffic-adjustment
area 0.0.0.1
network 20.0.0.0 0.0.0.255
network 3.3.3.3 0.0.0.0
mpls-te enable
#
return
Networking Requirements
On the network shown in Figure 3-38,
Configuration Roadmap
The configuration roadmap is as follows:
1. Assign IP addresses to interfaces on each LSR, configure loopback address as LSR IDs.
2. Enable the IS-IS protocol globally and enable IS-IS TE.
3. Configure the loose explicit path, including ABR (LSRB, LSRC, and LSRD).
4. Enable MPLS RSVP-TE.
5. Configure the bandwidth attributes for the outbound interfaces of links along the TE tunnel.
6. Establish the tunnel interface on the ingress, specify the IP address of the tunnel, the tunnel
protocol, the destination address, the tunnel ID, the RSVP-TE protocol, and the tunnel
bandwidth.
Data Preparation
To complete the configuration, you need the following data.
l IS-IS area ID of each LSR, originating system ID, and IS-IS level
l Maximum reservable bandwidth and BC bandwidth for outbound interfaces of links along
the tunnel
l Name of the tunnel interface, IP address, destination address, tunnel ID, tunnel signaling
protocol (RSVP-TE), and tunnel bandwidth
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and mask to each interface, including the loopback interface according to
Figure 3-38.
# Configure LSRB.
[LSRB] isis 1
[LSRB-isis-1] network-entity 00.0005.0000.0000.0002.00
[LSRB-isis-1] is-level level-1-2
[LSRB-isis-1] import-route isis level-2 into level-1
[LSRB-isis-1] quit
[LSRB] interface gigabitethernet 1/0/0
[LSRB-GigabitEthernet1/0/0] isis enable 1
[LSRB-GigabitEthernet1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] isis enable 1
[LSRB-Pos2/0/0] quit
[LSRB] interface loopback 1
[LSRB-LoopBack1] isis enable 1
[LSRB-LoopBack1] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] network-entity 00.0006.0000.0000.0003.00
[LSRC-isis-1] is-level level-2
[LSRC-isis-1] quit
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] isis enable 1
[LSRC-GigabitEthernet1/0/0] quit
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] isis enable 1
[LSRC-Pos2/0/0] quit
[LSRC] interface loopback 1
[LSRC-LoopBack1] isis enable 1
[LSRC-LoopBack1] quit
# Configure LSRD.
[LSRD] isis 1
[LSRD-isis-1] network-entity 00.0007.0000.0000.0004.00
[LSRD-isis-1] is-level level-1-2
[LSRD-isis-1] import-route isis level-2 into level-1
[LSRD-isis-1] quit
[LSRD] interface gigabitethernet 1/0/0
[LSRD-GigabitEthernet1/0/0] isis enable 1
[LSRD-GigabitEthernet1/0/0] quit
[LSRD] interface gigabitethernet 2/0/0
[LSRD-GigabitEthernet2/0/0] isis enable 1
[LSRD-GigabitEthernet2/0/0] quit
[LSRD] interface loopback 1
[LSRD-LoopBack1] isis enable 1
[LSRD-LoopBack1] quit
# Configure LSRE.
[LSRE] isis 1
[LSRE-isis-1] network-entity 00.0007.0000.0000.0005.00
[LSRE-isis-1] is-level level-1
[LSRE-isis-1] quit
[LSRE] interface gigabitethernet 1/0/0
[LSRE-GigabitEthernet1/0/0] isis enable 1
[LSRE-GigabitEthernet1/0/0] quit
[LSRE] interface loopback 1
[LSRE-LoopBack1] isis enable 1
[LSRE-LoopBack1] quit
Step 3 Configure basic MPLS functions, enable MPLS TE, RSVP-TE, and enable CSPF on the ingress
of the tunnel.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] mpls rsvp-te
[LSRA-mpls] mpls te cspf
[LSRA-mpls] quit
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] mpls
[LSRA-GigabitEthernet1/0/0] mpls te
[LSRA-GigabitEthernet1/0/0] mpls rsvp-te
[LSRA-GigabitEthernet1/0/0] quit
# Configure LSRB.
[LSRB] mpls lsr-id 2.2.2.2
[LSRB] mpls
[LSRB-mpls] mpls te
[LSRB-mpls] mpls rsvp-te
[LSRB-mpls] quit
[LSRB] interface gigabitethernet 1/0/0
[LSRB-GigabitEthernet1/0/0] mpls
[LSRB-GigabitEthernet1/0/0] mpls te
[LSRB-GigabitEthernet1/0/0] mpls rsvp-te
[LSRB-GigabitEthernet1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls
[LSRB-Pos2/0/0] mpls te
[LSRB-Pos2/0/0] mpls rsvp-te
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] mpls lsr-id 3.3.3.3
[LSRC] mpls
[LSRC-mpls] mpls te
[LSRC-mpls] mpls rsvp-te
[LSRC-mpls] quit
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] mpls
[LSRC-GigabitEthernet1/0/0] mpls te
[LSRC-GigabitEthernet1/0/0] mpls rsvp-te
[LSRC-GigabitEthernet1/0/0] quit
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] mpls
[LSRC-Pos2/0/0] mpls te
[LSRC-Pos2/0/0] mpls rsvp-te
[LSRC-Pos2/0/0] quit
# Configure LSRD.
[LSRD] mpls lsr-id 4.4.4.4
[LSRD] mpls
[LSRD-mpls] mpls te
[LSRD-mpls] mpls rsvp-te
[LSRD-mpls] quit
[LSRD] interface gigabitethernet 1/0/0
[LSRD-GigabitEthernet1/0/0] mpls
[LSRD-GigabitEthernet1/0/0] mpls te
[LSRD-GigabitEthernet1/0/0] mpls rsvp-te
[LSRD-GigabitEthernet1/0/0] quit
[LSRD] interface gigabitethernet 2/0/0
[LSRD-GigabitEthernet2/0/0] mpls
[LSRD-GigabitEthernet2/0/0] mpls te
[LSRD-GigabitEthernet2/0/0] mpls rsvp-te
[LSRD-GigabitEthernet2/0/0] quit
# Configure LSRE.
[LSRE] mpls lsr-id 5.5.5.5
[LSRE] mpls
[LSRE-mpls] mpls te
[LSRE-mpls] mpls rsvp-te
[LSRE-mpls] quit
[LSRE] interface gigabitethernet 1/0/0
[LSRE-GigabitEthernet1/0/0] mpls
[LSRE-GigabitEthernet1/0/0] mpls te
[LSRE-GigabitEthernet1/0/0] mpls rsvp-te
[LSRE-GigabitEthernet1/0/0] quit
# Configure LSRB.
[LSRB] isis 1
[LSRB-isis-1] cost-style wide
[LSRB-isis-1] traffic-eng level-1-2
[LSRB-isis-1] quit
# Configure LSRC.
[LSRC] isis 1
[LSRC-isis-1] cost-style wide
[LSRC-isis-1] traffic-eng level-2
[LSRC-isis-1] quit
# Configure LSRD.
[LSRD] isis 1
[LSRD-isis-1] cost-style wide
[LSRD-isis-1] traffic-eng level-1-2
[LSRD-isis-1] quit
# Configure LSRE.
[LSRE] isis 1
[LSRE-isis-1] cost-style wide
[LSRE-isis-1] traffic-eng level-1
[LSRE-isis-1] quit
# Configure the maximum reservable bandwidth and the BC0 bandwidth for the link on LSRA.
[LSRA] interface gigabitethernet 1/0/0
[LSRA-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRA-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000
[LSRA-GigabitEthernet1/0/0] quit
# Configure the maximum bandwidth and the maximum reservable bandwidth for the link on
LSRB.
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRB-Pos2/0/0] mpls te bandwidth bc0 100000
[LSRB-Pos2/0/0] quit
# Configure the maximum bandwidth and the maximum reservable bandwidth for the link on
LSRC.
[LSRC] interface gigabitethernet 1/0/0
[LSRC-GigabitEthernet1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRC-GigabitEthernet1/0/0] mpls te bandwidth bc0 100000
[LSRC-GigabitEthernet1/0/0] quit
# Configure the maximum bandwidth and the maximum reservable bandwidth for the link on
LSRD.
[LSRD] interface gigabitethernet 2/0/0
[LSRD-GigabitEthernet2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRD-GigabitEthernet2/0/0] mpls te bandwidth bc0 100000
[LSRD-GigabitEthernet2/0/0] quit
After completing the configuration, run the display interface tunnel command on LSRA. The
status of the tunnel interface is Up.
[LSRA] display interface Tunnel
Tunnel1/0/0 current state : UP
Line protocol current state : UP
Last up time: 2009-01-16, 10:36:20
Description : Tunnel1/0/0 Interface, Route Port
...
# Run the display mpls te tunnel verbose command on LSRA to display information about the
tunnel.
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
explicit-path atoe
next hop 10.1.1.2 include loose
next hop 20.1.1.2 include loose
next hop 30.1.1.2 include loose
next hop 40.1.1.2 include loose
#
isis 1
is-level level-1
cost-style wide
network-entity 00.0005.0000.0000.0001.00
traffic-eng level-1
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
isis enable 1
#
interface Tunnel1/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 5.5.5.5
mpls te tunnel-id 100
mpls te bandwidth ct0 20000
mpls te path explicit-path atoe
mpls te commit
#
return
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
return
interface GigabitEthernet1/0/0
ip address 30.1.1.2 255.255.255.0
isis enable 1
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 40.1.1.1 255.255.255.0
isis enable 1
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
mpls rsvp-te
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
isis enable 1
#
return
MPLS common configurations include the MPLS TTL handling mode, Layer 3 MPLS load
balancing, PBR to the LSP on the public network, and MPLS optimization.
4.1 Introduction
MPLS supports multiple labels, and the MPLS forwarding plane is connection-oriented, which
enables MPLS to be of well expansibility. With these features, MPLS provides various services
based on the MPLS and IP-integrated network architecture.
4.1 Introduction
MPLS supports multiple labels, and the MPLS forwarding plane is connection-oriented, which
enables MPLS to be of well expansibility. With these features, MPLS provides various services
based on the MPLS and IP-integrated network architecture.
4.1.1 Overview
MPLS speeds up the forwarding of networks and can provide various new services.
Originally, MPLS is set forth for improving the forwarding rate of the device, but this means
little now with the improvement of hardware technology. After all, MPLS is connection-oriented
with well expansibility and supports multiple-layer label. With these features, MPLS can provide
various services based on fundamental MPLS and IP-integrated network architecture. MPLS
gradually becomes a basic technology applicable to large-scale networks.
MPLS VPN is highly evaluated by the IP network carrier in providing value-added services.
With MPLS VPN technology, the current IP network is divided into logically-isolated networks.
This technology is applicable to interconnection among companies and various new services.
For example, despite of lacking IP network addresses, a VPN can be established especially for
IP telephone services to provide QoS and new services.
MPLS Ping/Traceroute
The MPLS ping and traceroute help to detect LSP faults and locate faulty nodes.
Similar to IP ping and traceroute, MPLS ping and traceroute use the echo request and echo reply
messages to check the availability of the LSP. Echo request and echo reply messages are
transferred in User Datagram Protocol (UDP) datagrams using port 3503.
Usage Scenario
On a network where penultimate hop popping (PHP) is enabled, a P at the penultimate hop copies
the EXP value of the outer label to that of the inner label, pops out the outer label, retains the
inner label, and forwards the inner label to the last hop. The provider edge (PE) at the last hop
uses the modified EXP value of the inner label to provide quality of service (QoS) guarantee.
Whether the modified EXP value is used depends on the following parameters in the mpls lsp
exp-mode command executed on the P:
l pipe : prevents the P from using the modified EXP value of the inner label for QoS
scheduling.
l uniform: allows the P to use the modified EXP value of the inner label for QoS scheduling.
Procedure
Step 1 Run:
system-view
NOTE
If an MPLS label switched path (LSP) has been established, you must run the refresh fib slot slot-id
command before running the mpls lsp exp-mode command. Otherwise, the mpls lsp exp-mode command
does not take effect.
----End
#
mpls lsp exp-mode pipe
#
return
The command output in bold indicates that MPLS processes the EXP field in Pipe mode.
Usage Scenario
MPLS TTL process is related to the following aspects:
For detailed information about HoVPN and SPE, see the HUAWEI NetEngine80E/40E Router
Configuration Guide - VPN.
Pre-configuration Tasks
Before configuring the MPLS TTL process mode, enable MPLS or MPLS VPN.
Data Preparation
To configure the MPLS TTL process mode, you need the following data.
No. Data
Context
In an MPLS domain, virtual circuit connectivity verification (VCCV) monitors the connectivity
of a multi-segment pseudo wire (MS-PW) based on TTLs. If PEs along an LSP over which the
MS-PW is established use different TTL processing modes, the inconsistency causes a VCCV
failure. Therefore, the TTL processing modes on PEs within the MPLS domain must be the
same.
On the network shown in Figure 4-1, the same TTL processing mode needs to be configured
on T-PE1, S-PE1, S-PE2, and T-PE2 before VCCV monitors the connectivity of an MS-PW
between T-PE1 and T-PE2. Similarly, the same TTL processing mode needs to be configured
on T-PE1 and S-PE1 before VCCV monitors the connectivity of a PW segment between T-PE1
and S-PE1.
T-PE1 T-PE2
CE S-PE1 S-PE2 CE
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls ldp ttl-mode { pipe | uniform }
A mode for processing TTLs in packets transmitted over an MPLS LDP LSP is specified.
The egress is configured to assign labels to the LSR at the penultimate hop of the LSP.
NOTE
This command must be run on the egress if the pipe mode is used.
----End
Context
In an MPLS domain, virtual circuit connectivity verification (VCCV) monitors the connectivity
of a multi-segment pseudo wire (MS-PW) based on TTLs. If PEs along an LSP over which the
MS-PW is established use different TTL processing modes, the inconsistency causes a VCCV
failure. Therefore, the TTL processing modes on PEs within the MPLS domain must be the
same.
On the network shown in Figure 4-2, the same TTL processing mode needs to be configured
on T-PE1, S-PE1, S-PE2, and T-PE2 before VCCV monitors the connectivity of an MS-PW
between T-PE1 and T-PE2. Similarly, the same TTL processing mode needs to be configured
on T-PE1 and S-PE1 before VCCV monitors the connectivity of a PW segment between T-PE1
and S-PE1.
T-PE1 T-PE2
CE S-PE1 S-PE2 CE
Procedure
Step 1 Run:
system-view
A mode for processing TTLs in packets transmitted over an MPLS TE LSP is specified.
By default, the uniform mode is used.
Step 4 (Optional) Run:
label advertise non-null
The egress is configured to assign labels to the LSR at the penultimate hop of the LSP.
NOTE
This command must be run on the egress if the pipe mode is used.
----End
Context
The effect of configuring the MPLS uniform mode and that of configuring the IP TTL copy
function are the same. The TTL of a packet transmitted in an MPLS network decreases by one
at each hop.
The effect of configuring the MPLS Pipe mode and that of disabling the MPLS IP TTL
propagation function are the same. That is, when packets pass through an MPLS network, the
ingress and egress are perceived as directly connected. The IP TTL decreases by one only on
the ingress and the egress respectively.
Procedure
l Configuring MPLS Uniform mode
1. Run:
system-view
1. Run:
system-view
----End
Context
Perform the following steps on the ingress and egress PEs:
Procedure
Step 1 Run:
system-view
For the MPLS packet with one layer of a label, ICMP Reply messages are sent back along the
local IP route by default.
----End
Usage Scenario
On an existing MPLS network, devices in the core area support TE, and devices in other areas
use LDP. LDP over TE is used to allow a TE tunnel to function as a hop of an entire LDP LSP.
On MPLS VPNs where LDP is widely used, LDP over TE is used to prevent VPN traffic
congestions on some nodes. If multiple tunnels on a transit node have the same downstream
node, load balancing can be configured on the transit node. This allows each link to carry traffic
based on the proportion of the specific weight to the total weight.
Pre-configuration Tasks
Before configuring load balancing of MPLS Layer 3 forwarding, complete the following tasks:
l Configure LSR IDs.
l Enable MPLS.
Data Preparation
None.
Context
Perform the following steps on each transit node:
Procedure
Step 1 Run:
system-view
Step 2 Run:
load-balance unequal-cost enable
If multiple equal-cost links of different bandwidths exist, traffic can be proportionally balanced
over these links. All links can transmit traffic in proportion to their bandwidths.
Step 3 Run:
load-balance unequal-cost weight
----End
Context
Perform the following steps on transit nodes:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface 100ge interface-number.subinterface-number
Step 3 Run:
mpls load-sharing payload-header inbound
Step 4 Run:
mpls load-sharing per-label outbound
----End
Context
The ingress node on an MPLS network supports ECMP or UCMP, in either per-flow or per-
packet mode.
Transit nodes also support ECMP or UCMP, however, they do not support per-flow or per-
packet mode. UCMP takes effect only for LDP LSPs.
Procedure
l Perform the following steps on the ingress node:
1. Run:
system-view
UCMP is enabled.
----End
Usage Scenario
On an IP/MPLS network transmitting VPN services, PEs establish a multi-segment MPLS tunnel
between each other. Therefore VPN services are sent to multiple PEs. In this case, VPN service
provision on PEs becomes complex, and the VPN service scalability decreases. As PEs establish
BGP peer relationships, a routing policy can be used to assign MPLS labels for BGP routes so
that an E2E BGP tunnel can be established. The BGP tunnel consists of a primary BGP LSP and
a backup BGP LSP. VPN services can travel along the E2E BGP tunnel, which simplifies service
provision and improves VPN service scalability.
To rapidly detect faults in an E2E BGP tunnel, BFD for BGP tunnel is used. BFD for BGP tunnel
establish a dynamic BFD session, also called a BGP BFD session, which is bound to both the
primary and backup BGP LSPs. If both BGP LSPs fail, the BGP BFD session detects the faults
and triggers VPN FRR switching.
Pre-configuration Tasks
Before configuring dynamic BFD to monitor a BGP tunnel, configure basic MPLS functions.
Data Preparation
To configure dynamic BFD to monitor a BGP tunnel, you need the following data.
No. Data
Procedure
l Perform the following steps on the ingress of an E2E BGP tunnel:
1. Run:
system-view
The ability to dynamically establish BGP BFD sessions is enabled on the ingress.
The mpls bgp bfd enable command does not create a BFD session. A BGP BFD
session can only be dynamically established only after a policy for dynamically
establish BGP BFD session is configured.
l Perform the following steps on the egress of an E2E BGP tunnel:
1. Run:
system-view
2. Run:
bfd
The mpls-passive command does not create a BFD session. The egress has to receive
an LSP ping request carrying a BFD TLV before creating a BFD session with the
ingress.
----End
Context
The policies for dynamically establishing BGP BFD sessions are as follows:
l Host address-based policy: used when all host addresses are available to trigger the creation
of BGP BFD sessions.
l IP address prefix list-based policy: used when only some host addresses can be used to
establish BFD sessions.
Procedure
Step 1 Run:
system-view
An IPv4 address prefix list is configured, and list entries are configured.
You can perform this step when you want to use an IP address prefix list to dynamically establish
BGP BFD sessions. For configuration details about how to configure an IP address prefix list,
see Configuring an IPv4 Address Prefix List.
Step 3 Run:
mpls
Step 4 Run:
mpls bgp bfd-trigger-tunnel { host | ip-prefix ip-prefix-name }
After a policy is configured, the device starts to dynamically establish a BFD session.
----End
Context
Perform the following steps on the ingress of an E2E BGP tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
bfd
Step 3 Run:
mpls ping interval interval
Step 4 Run:
quit
Step 5 Run:
mpls
Step 6 Run:
mpls bgp bfd { min-tx-interval interval | min-rx-interval interval | detect-
multiplier multiplier }*
Effective BFD time parameters are calculated using the following formulas:
l Effective local interval at which BFD packets are sent = MAX { Locally configured minimum
interval at which BFD packets are sent, Remotely configured minimum interval at which
BFD packets are received }
l Effective local interval at which BFD packets are received = MAX { Remotely configured
minimum interval at which BFD packets are sent, Locally configured minimum interval at
which BFD packets are received }
l Local BFD detection period = Effective local interval at which BFD packets are received x
Remotely configured BFD detection multiplier
By default, the minimum interval at which BFD packets are sent and the minimum interval at
which BFD packets are received are 1000 ms, and the detection multiplier is 3 on the ingress.
By default, the minimum interval at which BFD packets are sent and the minimum interval at
which BFD packets are received are 100 ms, and the detection multiplier is 3 on the egress.
Therefore, you can adjust the minimum interval at which BFD packets are sent, the minimum
interval at which BFD packets are received, and the detection multiplier only on the ingress to
update BFD detection time parameters on both the ingress and egress.
----End
Prerequisites
The dynamic BFD for BGP tunnel function has been configured.
Procedure
l Run the display mpls bfd session protocol bgp [ fec fec-address [ verbose ] ] command
to check information about a BFD session with the protocol type of BGP on the ingress on
an E2E BGP tunnel.
l Run the display mpls lsp protocol bgp verbose command to check the BFD session status
of BGP LSPs.
----End
Example
# Run the display mpls bfd session protocol bgp command on the ingress of an E2E BGP
tunnel. The command output shows information about a BFD session that monitors the BGP
tunnel.
<HUAWEI> display mpls bfd session protocol bgp
-------------------------------------------------------------------------------
BFD Information: BGP Tunnel
-------------------------------------------------------------------------------
FEC DISC OUT-IF NEXTHOP TUNNEL STATE
5.5.5.5 8192 - 2.2.2.2 - Up
# Run the display mpls lsp protocol bgp verbose command on the ingress of an E2E BGP
tunnel to view detailed information about all BGP LSPs. The command output shows that the
BFD session is Up.
No : 1
VrfIndex :
RD Value : 0:0
Fec : 5.5.5.5/32
Nexthop : 2.2.2.2
In-Label : NULL
Out-Label : 900004
In-Interface : ----------
Out-Interface : ----------
LspIndex : 22528
Token : 0x800804
LsrType : Ingress
Outgoing token : 0x800802
Label Operation : PUSH
Mpls-Mtu : ------
TimeStamp : 238059sec
FrrToken : 0x0
FrrOutgoingToken : 0x0
BGPKey : -------
BackupBGPKey : -------
FrrOutLabel : -------
Bfd-State : Up
Exp-Mode : Uniform
Usage Scenario
MPLS has many basic parameters that can be adjusted in different environments:
l PHP
The penultimate hop popping (PHP) is configured on the egress. The label is distributed
based on the PHP functions that a PHP node supports.
l MPLS MTU of the interface
Before sending the packet along the LSP, the MPLS interface checks the packet size and
determines whether to fragment the packet based on its MPLS MTU. Generally, the MPLS
MTU of the interface is the default MTU in the IP packet.
Pre-configuration Tasks
Before adjusting the MPLS parameters, configure MPLS functions.
Data Preparation
To adjust the MPLS parameters, you need the following data.
No. Data
Context
Perform the following steps on the egress:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
label advertise { explicit-null | implicit-null | non-null }
l By default, implicit-null is set for supporting PHP. The egress assigns a label with value 3
to the PHP node. The value of the label is 3.
l If explicit-null is specified, the PHP is not supported. The egress assigns a label with value
0 to the PHP node.
l If non-null is specified, the PHP is not supported. The egress allocates a normal label to PHP
node. The value of a normal label is not less than 16.
NOTE
The modification of the PHP feature takes effect only on the LSP that is set up later than the modification.
----End
Context
The relationship between the MPLS MTU and the MTU of an interface is as follows:
l By default, if the MPLS MTU value is not set, the value of the MPLS MTU is equal to that
of the interface MTU.
l If the MPLS MTU value is set, the smaller one between the MPLS MTU value and the
interface MTU value is used. If the MPLS MTU value is not set, the interface MTU value
is used.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls mtu mtu
The MPLS MTU configured for the interface takes effect without the interface restarted.
----End
Prerequisites
The MPLS function has been optimized.
Procedure
Step 1 Run the display mpls interface [ interface-type interface-number ] [ verbose ] command to
check information about the interface enabled with MPLS.
----End
Example
If the configurations are successful, you can view the following information:
<HUAWEI> display mpls interface
Interface Status TE Attr LSP Count CRLSP Count Effective MTU
GE1/0/0 Up Dis 0 0 1500
Context
You can run the following commands in any view to perform MPLS ping and MPLS tracert.
Procedure
l Run the ping lsp [ -a source-ip | -c count | -exp exp-value | -h ttl-value | -m interval | -r
reply-mode | -s packet-size | -t time-out | -v ] * ip destination-address mask-length [ ip-
address ] [ nexthop nexthop-address | draft6 ] command to perform MPLS ping.
----End
Context
If dynamic labels run out but the system receives new dynamic label requests, the system fails
to satisfy the requests because the dynamic labels are insufficient. The module that fails to be
assigned labels works abnormally. The modules that apply for labels include MPLS TE, MPLS
LDP, BGP, L3VPN and L2VPN.
To help facilitate operation and maintenance, you can set dynamic label thresholds for triggering
alarms to alert users.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls dynamic-label-number threshold-alarm upper-limit upper-limit-value lower-
limit lower-limit-value
l upper-limit-value: a percent indicating the upper limit of dynamic labels. If dynamic label
usage reaches the upper limit, an alarm is generated. An upper limit less than or equal to 95%
is recommended.
l lower-limit-value: a percent indicating the lower limit of dynamic labels. If dynamic label
usage falls below the lower limit, an alarm is generated.
l The upper limit must be greater than the lower limit.
By default, the upper limit is 80%, and the lower limit is 70%, which are recommended.
NOTE
l Each command only configures the trigger conditions for an alarm and its clear alarm. Although trigger
conditions are met, the alarm and its clear alarm can be generated only after the snmp-agent trap
enable feature-name mpls_lspm trap-name { hwMplsDynamicLabelThresholdExceed |
hwMplsDynamicLabelThresholdExceedClear } command is run to enable the device to generate a
dynamic label insufficiency alarm and its clear alarm.
l After the snmp-agent trap enable feature-name mpls_lspm trap-name
{ hwMplsDynamicLabelTotalCountExceed | hwMplsDynamicLabelTotalCountExceedClear }
command is run to enable the device to generate limit-reaching alarms and their clear alarms, the
following situations occur:
l If the number of dynamic labels reaches the maximum number of dynamic labels supported by a
device, a limit-reaching alarm is generated.
l If the number of dynamic labels falls below 95% of the maximum number of dynamic labels
supported by the device, a clear alarm is generated.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls bgp-lsp-number threshold-alarm upper-limit upper-limit-value lower-limit
lower-limit-value
The upper and lower thresholds of alarms for BGP LSP usage are configured.
l upper-limit-value specifies the upper threshold of alarms for BGP LSP usage. An alarm is
generated when the proportion of established BGP LSPs to total supported BGP LSPs reaches
the upper limit.
l lower-limit-value specifies the lower threshold of clear alarms for BGP LSP usage. A clear
alarm is generated when the proportion of established BGP LSPs to total supported BGP
LSPs falls below the lower limit.
l The value of upper-limit-value must be greater than that of lower-limit-value.
The default upper limit of an alarm for BGP LSP usage is 80%. The default lower limit of a clear
alarm for BGP LSP usage is 75%. Using the default upper limit and lower limit is recommended.
NOTE
l This command configures the alarm threshold for BGP LSP usage. The alarm that the number of LSPs
reached the upper threshold is generated only when the command snmp-agent trap enable feature-
name mpls_lspm trap-name hwmplslspthresholdexceed is configured, and the actual BGP LSP
usage reaches the upper limit of the alarm threshold. The alarm that the number of LSPs fell below the
lower threshold is generated only when the command snmp-agent trap enable feature-name
mpls_lspm trap-name hwmplslspthresholdexceedclear is configured, and the actual BGP LSP usage
falls below the lower limit of the clear alarm threshold.
l After the snmp-agent trap enable feature-name mpls_lspm trap-name
{ hwmplslsptotalcountexceed | hwmplslsptotalcountexceedclear } command is run to enable LSP
limit-crossing alarm and LSP limit-crossing clear alarm, an alarm is generated in the following
situations:
l If the total number of BGP LSPs reaches the upper limit, a limit-crossing alarm is generated.
l If the total number of BGP LSPs falls below 95% of the upper limit, a limit-crossing clear alarm
is generated.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls bgpv6-lsp-number threshold-alarm upper-limit upper-limit-value lower-limit
lower-limit-value
The upper and lower thresholds of alarms for BGP IPv6 LSP usage are configured.
l upper-limit-value specifies the upper threshold of alarms for BGP IPv6 LSP usage. An alarm
is generated when the proportion of established BGP IPv6 LSPs to total supported BGP IPv6
LSPs reaches the upper limit.
l lower-limit-value specifies the lower threshold of clear alarms for BGP IPv6 LSP usage. A
clear alarm is generated when the proportion of established BGP IPv6 LSPs to total supported
BGP IPv6 LSPs falls below the lower limit.
l The value of upper-limit-value must be greater than that of lower-limit-value.
The default upper limit of an alarm for BGP IPv6 LSP usage is 80%. The default lower limit of
a clear alarm for BGP IPv6 LSP usage is 75%. Using the default upper limit and lower limit is
recommended.
NOTE
l This command configures the alarm threshold for BGP IPv6 LSP usage. The alarm that the number of
LSPs reached the upper threshold is generated only when the command snmp-agent trap enable
feature-name mpls_lspm trap-name hwmplslspthresholdexceed is configured, and the actual BGP
IPv6 LSP usage reaches the upper limit of the alarm threshold. The alarm that the number of LSPs fell
below the lower threshold is generated only when the command snmp-agent trap enable feature-
name mpls_lspm trap-name hwmplslspthresholdexceedclear is configured, and the actual BGP
IPv6 LSP usage falls below the lower limit of the clear alarm threshold.
l After the snmp-agent trap enable feature-name mpls_lspm trap-name
{ hwmplslsptotalcountexceed | hwmplslsptotalcountexceedclear } command is run to enable LSP
limit-crossing alarm and LSP limit-crossing clear alarm, an alarm is generated in the following
situations:
l If the total number of BGP IPv6 LSPs reaches the upper limit, a limit-crossing alarm is generated.
l If the total number of BGP IPv6 LSPs falls below 95% of the upper limit, a limit-crossing clear
alarm is generated.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
The upper and lower thresholds of alarms for total LSP usage are configured.
The parameters in this command are described as follows:
l upper-limit-value specifies the upper threshold of alarms for total LSP usage. An alarm is
generated when the proportion of established LSPs to total supported LSPs reaches the upper
limit.
l lower-limit-value specifies the lower threshold of clear alarms for total LSP usage. A clear
alarm is generated when the proportion of established LSPs to total supported LSPs falls
below the lower limit.
l The value of upper-limit-value must be greater than that of lower-limit-value.
The default upper limit of an alarm for total LSP usage is 80%. The default lower limit of a clear
alarm for total LSP usage is 75%. Using the default upper limit and lower limit is recommended.
NOTE
l This command configures the alarm threshold for total LSP usage. The alarm that the number of LSPs
reached the upper threshold is generated only when the command snmp-agent trap enable feature-
name mpls_lspm trap-name hwmplslspthresholdexceed is configured, and the actual total LSP
usage reaches the upper limit of the alarm threshold. The alarm that the number of LSPs fell below the
lower threshold is generated only when the command snmp-agent trap enable feature-name
mpls_lspm trap-name hwmplslspthresholdexceedclear is configured, and the actual total LSP usage
falls below the lower limit of the clear alarm threshold.
l After the snmp-agent trap enable feature-name mpls_lspm trap-name
{ hwmplslsptotalcountexceed | hwmplslsptotalcountexceedclear } command is run to enable LSP
limit-crossing alarm and LSP limit-crossing clear alarm, an alarm is generated in the following
situations:
l If the total number of LSPs reaches the upper limit, a limit-crossing alarm is generated.
l If the total number of LSPs falls below 95% of the upper limit, a limit-crossing clear alarm is
generated.
----End
Networking Requirements
On the network shown in Figure 4-3, each node supports MPLS, and devices on the MPLS
backbone network runs OSPF. There are two LSPs from LSRA to LSRD are established over
the path LSRA → LSRB → LSRD and the path LSRA → LSRC → LSRD. Load balancing
needs to be configured on LSRA to implement packet-by-packet load balancing between the
two LSPs.
P
LSRA 1 OS 0
0.3 2/0 2/0/ 30 LSRD
.1. /0 S 2/
1/3 LSRC PO 4.1.
0 POS .
10 /0 10
.3. 1/0/
1.2 0 S 2/0 /30
/30 PO 4.1.1
.
10
Loopback1
3.3.3.9/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Set up LDP LSPs between LSRA and LSRD.
2. Configure packet-by-packet load balancing only on the LSP on LSRA.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of all interfaces, as shown in Figure 4-3, OSPF process number, and area IDs.
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and mask to each interface, including loopback interfaces according to
Figure 4-3. For configuration details, see Configuration Files in this section.
Step 2 Configure OSPF to advertise routes.
After completing the preceding configurations, run the display ip routing-table command on
each LSR. LSRs learn routes from each other.
The following example uses the command output on LSRA.
[LSRA] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Step 3 Enable MPLS and MPLS LDP on each node and each interface.
# Configure LSRA.
<LSRA> system-view
[LSRA] mpls lsr-id 1.1.1.9
[LSRA] mpls
[LSRA-mpls] quit
[LSRA] mpls ldp
[LSRA-mpls-ldp] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls ldp
[LSRA-Pos1/0/0] quit
[LSRA] interface pos 2/0/0
[LSRA-Pos2/0/0] mpls
[LSRA-Pos2/0/0] mpls ldp
[LSRA-Pos2/0/0] quit
# Configure LSRB.
<LSRB> system-view
[LSRB] mpls lsr-id 2.2.2.9
[LSRB] mpls
[LSRB-mpls] quit
[LSRB] mpls ldp
[LSRB-mpls-ldp] quit
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls
[LSRB-Pos1/0/0] mpls ldp
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls
[LSRB-Pos2/0/0] mpls ldp
[LSRB-Pos2/0/0] quit
# Configure LSRC.
<LSRC> system-view
[LSRC] mpls lsr-id 3.3.3.9
[LSRC] mpls
[LSRC-mpls] quit
[LSRC] mpls ldp
[LSRC-mpls-ldp] quit
[LSRC] interface pos 1/0/0
[LSRC-Pos1/0/0] mpls
[LSRC-Pos1/0/0] mpls ldp
[LSRC-Pos1/0/0] quit
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] mpls
[LSRC-Pos2/0/0] mpls ldp
[LSRC-Pos2/0/0] quit
# Configure LSRD.
<LSRD> system-view
[LSRD] mpls lsr-id 4.4.4.9
[LSRD] mpls
[LSRD-mpls] quit
[LSRD] mpls ldp
[LSRD-mpls-ldp] quit
[LSRD] interface pos 1/0/0
[LSRD-Pos1/0/0] mpls
[LSRD-Pos1/0/0] mpls ldp
[LSRD-Pos1/0/0] quit
[LSRD] interface pos 2/0/0
[LSRD-Pos2/0/0] mpls
[LSRD-Pos2/0/0] mpls ldp
[LSRD-Pos2/0/0] quit
After completing the preceding configurations, run the display mpls lsp protocol ldp command
on LSRA and LSRD. Two LDP LSPs are set up between LSRA and LSRD.
After completing the configurations, run the tracert lsp command on LSRA to check the path
to destination address 4.4.4.9.
<LSRA> tracert lsp ip 4.4.4.9 32
LSP Trace Route FEC: IPV4 PREFIX 4.4.4.9/32 , press CTRL_C to break.
TTL Replier Time Type Downstream
0 Ingress 10.1.1.2/[1025 ]
1 10.1.1.2 140 ms Transit 10.2.1.2/[3 ]
2 4.4.4.9 40 ms Egress
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.1.1 255.255.255.252
mpls
mpls ldp
#
interface Pos2/0/0
undo shutdown
link-protocol ppp
ip address 10.3.1.1 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 10.1.1.0 0.0.0.3
network 10.3.1.0 0.0.0.3
#
load-balance packet lsp slot 6
#
return
#
sysname LSRC
#
mpls lsr-id 3.3.3.9
mpls
#
mpls ldp
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.3.1.2 255.255.255.252
mpls
mpls ldp
#
interface Pos2/0/0
undo shutdown
link-protocol ppp
ip address 10.4.1.1 255.255.255.252
mpls
mpls ldp
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 3.3.3.9 0.0.0.0
network 10.3.1.0 0.0.0.3
network 10.4.1.0 0.0.0.3
#
return
Networking Requirements
On the MPLS backbone network shown in Figure 4-4, PE1, PE2, P1, and P2 are LSRs. The
primary LSP is established along the path PE1 → P1 → PE2, and the bypass LSP is along the
patch PE1 → P2 → PE2.
The LDP FRR and PBR are configured for the packets sent from PE1 to PE2. The packets are
forwarded through the bypass LSP that is generated by LDP FRR.
Figure 4-4 Networking diagram for PBR to an LSP for public network packets
Loopback1
2.2.2.9/32
0 P
/0/ /24 17 OS2
1
S .2 2.2. /0/0
PO .1.1 1.1
/24 P
7 2
Loopback1
/ 0 0
/ 41 P1 17 OS Loopback1
1.1.1.9/32 S .11 / 2 2.2 1/0 3.3.3.9/32
PO .1.1 .1. /0
2/2
7 2 4
1
MPLS backbone
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Configuration Procedure
1. Configure the basic MPLS function to set up LSPs.
For details about configuration, see "Basic MPLS Configuration" in this manual.
In this instance, both RBP to LSP and LDP FRR are used. For detailed information about
LDP FRR configuration, see "Basic MPLS Configuration" in this manual.
In this example, the default policy of triggering LSP establishment. Run the display mpls
lsp command on PE1 to view the two LSPs to PE2 and the bypass LSP passing through
P2.
[PE1] display mpls lsp
----------------------------------------------------------------------
LSP Information: LDP LSP
----------------------------------------------------------------------
FEC In/Out Label In/Out IF Vrf Name
2.2.2.9/32 NULL/3 -/Pos1/0/0
2.2.2.9/32 1024/3 -/Pos1/0/0
3.3.3.9/32 NULL/1025 -/Pos1/0/0
**LDP FRR** /1025 /Pos2/0/0
4.4.4.9/32 NULL/1026 -/Pos1/0/0
**LDP FRR** /3 /Pos2/0/0
4.4.4.9/32 1025/1026 -/Pos1/0/0
**LDP FRR** /3 /Pos2/0/0
3.3.3.9/32 1026/1025 -/Pos1/0/0
**LDP FRR** /1025 /Pos2/0/0
The preceding information shows that the packet travel over routes based on the routing
table.
2. Configure an ACL on PE1 to permit the packets destined for POS 1/0/0 on PE2 to pass.
[PE1] acl 3000
[PE-acl-adv-3000] rule permit ip destination 172.2.1.2 0.0.0.0
[PE-acl-adv-3000] quit
Configuration Files
l PE1 configuration file
#
sysname PE1
#
ip local policy-based-route policy1
#
mpls lsr-id 1.1.1.9
mpls
#
mpls ldp
#
acl number 3000
rule 5 permit ip destination 172.2.1.2 0
#
interface Pos1/0/0
link-protocol ppp
ip address 172.1.1.1 255.255.255.0
mpls
mpls ldp
mpls ldp frr nexthop 172.3.1.2
#
interface Pos2/0/0
link-protocol ppp
ip address 172.3.1.1 255.255.255.0
ospf cost 2500
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 172.3.1.0 0.0.0.255
network 172.1.1.0 0.0.0.255
#
policy-based-route policy1 permit node 10
if-match acl 3000
apply lsp public 3.3.3.9 secondary
#
return
l P1 configuration file
#
sysname P1
#
mpls lsr-id 2.2.2.9
mpls
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
ip address 172.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface Pos2/0/0
link-protocol ppp
ip address 172.2.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 2.2.2.9 0.0.0.0
network 172.1.1.0 0.0.0.255
network 172.2.1.0 0.0.0.255
#
return
l P2 configuration file
#
sysname P2
#
mpls lsr-id 4.4.4.9
mpls
#
mpls ldp
#
interface Pos1/0/0
link-protocol ppp
ip address 172.3.1.2 255.255.255.0
mpls
mpls ldp
#
interface Pos2/0/0
link-protocol ppp
ip address 172.4.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 4.4.4.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 4.4.4.9 0.0.0.0
network 172.3.1.0 0.0.0.255
network 172.4.1.0 0.0.0.255
#
return
Networking Requirements
Seamless MPLS integrates the access, aggregation, and core layers on the same MPLS network
to transmit VPN services. Seamless MPLS establishes an E2E BGP tunnel to provide E2E access
services. To rapidly detect faults in BGP tunnels, BFD for BGP tunnel needs to be configured.
In Figure 4-5, the access and aggregation layers belong to one AS, and the core layer belongs
to another AS. NodeBs need to communicate with an MME or SGW over a VPN. To meet this
requirement, inter-AS seamless MPLS can be configured between the CSG and MASG. To
monitor the connectivity of the BGP tunnel, BFD for BGP tunnel needs to be configured.
NodeB MME/SGW
GE 1/0/2 10.2.1.1/24
GE 1/0/1 10.3.1.1/24
GE 1/0/2 10.4.1.1/24
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l OSPF process ID (1) at the access layer, IS-IS process ID (1) at the aggregation layer, and
OSPF process ID (2) at the core layer
l IS-IS area number (10.0001) and IS-IS system IDs (which are obtained based on loopback0
addresses)
l MPLS LSR IDs: 1.1.1.1 for the CSG, 2.2.2.2 for the AGG, 3.3.3.3 for the AGG ASBR,
4.4.4.4 for the core ASBR, and 5.5.5.5 for the MASG
l Name of a routing policy (policy1)
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and mask to each interface, including each loopback interface, according
to Figure 4-5. For configuration details, see Configuration Files in this section.
Configure OSPF with process ID 1 at the access layer, IS-IS with process ID 1 at the aggregation
layer, and OSPF with process ID 2 at the core layer. Configure IGP protocols to advertise the
route to each network segment to which each interface is connected and to advertise the host
route to each loopback address which is used as an LSR ID. For configuration details, see
Configuration Files in this section.
Enable MPLS and MPLS LDP globally on each device and on interfaces in each AS. For
configuration details, see Configuration Files in this section.
Step 4 Establish IBGP peer relationships at each layer and enable devices to exchange labeled routes.
# Configure CSG.
[CSG] bgp 100
[CSG-bgp] peer 2.2.2.2 as-number 100
[CSG-bgp] peer 2.2.2.2 connect-interface LoopBack 0
[CSG-bgp] peer 2.2.2.2 label-route-capability
[CSG-bgp] network 1.1.1.1 32
[CSG-bgp] quit
Step 5 Establish an EBGP peer relationship between the AGG ASBR and core ASBR and enable these
devices to exchange labeled routes.
Step 6 Configure each AGG as an RR to help the CSG and MASG obtain the route destined for each
other's loopback interface.
Step 7 Configure a routing policy on each device to establish a BGP LSP in a BGP tunnel.
# Configure a routing policy for advertising routes matching Route-Policy conditions to the
CSG's BGP peer.
[CSG] route-policy policy1 permit node 1
[CSG-route-policy] apply mpls-label
[CSG-route-policy] quit
[CSG] bgp 100
[CSG-bgp] peer 2.2.2.2 route-policy policy1 export
[CSG-bgp] quit
Repeat this step for the MASG. For configuration details, see Configuration Files in this section.
# Configure a routing policy for advertising routes matching Route-Policy conditions to the
AGG's BGP peer.
[AGG] route-policy policy1 permit node 1
[AGG-route-policy] if-match mpls-label
[AGG-route-policy] apply mpls-label
[AGG-route-policy] quit
[AGG] bgp 100
[AGG-bgp] peer 1.1.1.1 route-policy policy1 export
[AGG-bgp] peer 3.3.3.3 route-policy policy1 export
[AGG-bgp] quit
Repeat this step for the AGG ASBR and core ASBR. For configuration details, see
Configuration Files in this section.
# On the CSG, enable the MPLS capability to dynamically establish BGP BFD sessions based
on host addresses.
[CSG] bfd
[CSG-bfd] quit
[CSG] mpls
[CSG-mpls] mpls bgp bfd enable
[CSG-mpls] mpls bgp bfd-trigger-tunnel host
[CSG-mpls] quit
# On the MASG, enable the MPLS capability of passively creating a BFD session.
[MASG] bfd
[MASG-bfd] mpls-passive
[MASG-bfd] quit
After completing the preceding configurations, run the display mpls bfd session command on
the CSG to view information about the BFD session that monitors a BGP tunnel.
[CSG] display mpls bfd session protocol bgp
-------------------------------------------------------------------------------
BFD Information: BGP Tunnel
-------------------------------------------------------------------------------
FEC DISC OUT-IF NEXTHOP TUNNEL STATE
5.5.5.5 8192 - 2.2.2.2 - Up
Run the display mpls lsp protocol bgp verbose command on the CSG to view detailed
information about all BGP LSPs. The command output shows that the BFD session is Up.
[CSG] display mpls lsp protocol bgp verbose
-------------------------------------------------------------------------------
LSP Information: BGP LSP
-------------------------------------------------------------------------------
No : 1
VrfIndex :
RD Value : 0:0
Fec : 5.5.5.5/32
Nexthop : 2.2.2.2
In-Label : NULL
Out-Label : 900004
In-Interface : ----------
Out-Interface : ----------
LspIndex : 22528
Token : 0x800804
LsrType : Ingress
Outgoing token : 0x800802
Label Operation : PUSH
Mpls-Mtu : ------
TimeStamp : 245125sec
FrrToken : 0x0
FrrOutgoingToken : 0x0
BGPKey : -------
BackupBGPKey : -------
FrrOutLabel : -------
Bfd-State : Up
Exp-Mode : ----
No : 2
VrfIndex :
RD Value : 0:0
Fec : 1.1.1.1/32
Nexthop : -------
In-Label : 900003
Out-Label : NULL
In-Interface : ----------
Out-Interface : ----------
LspIndex : 22529
Token : 0x0
LsrType : Egress
Outgoing token : 0x0
Label Operation : POP
Mpls-Mtu : ------
TimeStamp : 245096sec
FrrToken : 0x0
FrrOutgoingToken : 0x0
BGPKey : -------
BackupBGPKey : -------
FrrOutLabel : -------
Bfd-State : ---
Exp-Mode : ----
----End
Configuration Files
l CSG configuration file
#
sysname CSG
#
bfd
#
mpls lsr-id 1.1.1.1
mpls
mpls bgp bfd enable
mpls bgp bfd-trigger-Tunnel host
#
mpls ldp
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
#
bgp 100
peer 2.2.2.2 as-number 100
peer 2.2.2.2 connect-interface LoopBack0
#
ipv4-family unicast
undo synchronization
network 1.1.1.1 255.255.255.255
peer 2.2.2.2 enable
peer 2.2.2.2 route-policy policy1 export
peer 2.2.2.2 label-route-capability
#
ospf 1
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 10.1.1.0 0.0.0.255
#
route-policy policy1 permit node 1
apply mpls-label
#
return
mpls ldp
#
interface GigabitEthernet1/0/2
undo shutdown
ip address 10.2.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
bgp 100
peer 1.1.1.1 as-number 100
peer 1.1.1.1 connect-interface LoopBack0
peer 3.3.3.3 as-number 100
peer 3.3.3.3 connect-interface LoopBack0
#
ipv4-family unicast
undo synchronization
peer 1.1.1.1 enable
peer 1.1.1.1 route-policy policy1 export
peer 1.1.1.1 reflect-client
peer 1.1.1.1 next-hop-local
peer 1.1.1.1 label-route-capability
peer 3.3.3.3 enable
peer 3.3.3.3 route-policy policy1 export
peer 3.3.3.3 reflect-client
peer 3.3.3.3 next-hop-local
peer 3.3.3.3 label-route-capability
#
ospf 1
area 0.0.0.0
network 2.2.2.2 0.0.0.0
network 10.1.1.0 0.0.0.255
#
route-policy policy1 permit node 1
if-match mpls-label
apply mpls-label
#
return
interface LoopBack0
ip address 3.3.3.3 255.255.255.255
isis enable 1
#
bgp 100
peer 2.2.2.2 as-number 100
peer 2.2.2.2 connect-interface LoopBack0
peer 10.3.1.2 as-number 200
#
ipv4-family unicast
undo synchronization
peer 2.2.2.2 enable
peer 2.2.2.2 route-policy policy1 export
peer 2.2.2.2 label-route-capability
peer 10.3.1.2 enable
peer 10.3.1.2 route-policy policy1 export
peer 10.3.1.2 label-route-capability check-tunnel-reachable
#
route-policy policy1 permit node 1
if-match mpls-label
apply mpls-label
#
return
if-match mpls-label
apply mpls-label
#
return
5.5 Setting the Trap Threshold for Bandwidth Consumption in the Fast Packet Transmission
Channel
You can set the trap threshold for the bandwidth consumption in the fast packet transmission
channel on the LPU to control the bandwidth consumption.
The following sections provide several examples for configuring MPLS OAM to detect LSPs
and configuring the association between MPLS OAM and a protection group for performing
protection switching.
The operation, administration and maintenance (OAM) is an effective method of reducing the
cost of network maintenance. The MPLS OAM mechanism is used on the MPLS layer.
MPLS OAM mechanism is independent of the upper and lower layers and provides the following
functions:
For details about requirements for OAM functionality for MPLS networks, refer to the ITU-T
Recommendation Y.1710. For details about the OAM mechanism for MPLS networks, see ITU-
T Recommendation Y.1711.
CV
F D /F
/F F D
C V
Ingress Egress
BD I
I BD
As shown in Figure 5-1, procedures of MPLS OAM connectivity detection are as follows:
Backward Tunnel
When configuring the basic OAM detection function, bind a backward tunnel to the detected
LSP.
A backward tunnel is an LSP with its ingress and egress being converse to the ingress and egress
of the detected LSP. It also can be a non-MPLS path connected to the ingress and egress of the
detected LSP.
l If the OAM function on the LSP ingress starts later than that on the LSP egress, or the
egress is enabled with the OAM function but the ingress is not, the egress generates a Loss
of Connectivity Verification defect (dLOCV) alarm.
l If the OAM function is disabled on the ingress whereas is enabled on the egress, the egress
generates a dLOCV alarm .
l To modify the type of the detection packet or the frequency at which detection packets are
sent, you must disable the OAM function on the egress and the ingress separately.
l OAM parameters need to be configured separately on the ingress and egress. This may
cause the detection packet type and the frequency at which detection packets are sent to be
different on the ingress and egress.
The NE80E/40E uses the OAM auto-protocol to solve problems existing in the ITU-T Y.1710.
The OAM auto-protocol is configured on the egress. It provides functions of initial packet
triggering and dynamic enabling or disabling.
Protection Switching
In protection switching, a protection tunnel (backup tunnel) is set up for the working tunnel
(primary tunnel). A working tunnel and a protection tunnel compose a protection group. When
the working tunnel fails, the data flow switches to the protection tunnel; improving the network
reliability.
The difference between protection switching and CR-LSP backup are as follows:
l Protection switching uses one tunnel to protect another tunnel. Attributes of every tunnel
in the tunnel protection group are independent. For example, the protection tunnel with the
bandwidth being 10 Mbit/s can protect the working tunnel that requires 100 Mbit/s
bandwidth protection.
l CR-LSP backup has the primary and backup CR-LSPs in the same tunnel group. The
backup CR-LSP protects the primary CR-LSP. Except for TE FRR, attributes of the primary
and backup CR-LSPs, such as the bandwidth, setup priority, and holding priority, are
identical.
Protection Mode
The NE80E/40E supports the following protection switching modes:
l 1:1 protection
One working tunnel and one protection tunnel exist between the ingress and the egress.
– Data is generally forwarded through the working tunnel.
– When the working tunnel fails, the ingress performs protection switching and switches
the data flow to the protection tunnel for transmission.
l N:1 protection
As shown in Figure 5-2, one tunnel provides protection for several working tunnels.
This mode is applicable to a mesh network for saving bandwidth.
Working tunnel-1
Protection tunnel
Backward tunnel
As shown in Figure 5-3, when one of the working tunnels fails, its traffic switches to the
shared protection tunnel.
Working tunnel-1
Reverse tunnel
Usage Scenario
The NE80E/40E provides MPLS OAM to detect the connectivity of an RSVP-TE LSP, a static
CR-LSP, and a static LSP.
To implement MPLS OAM functions, create a backward LSP for bearing BDI packets. The type
of the backward LSP can be different from that of the tested LSP, but the backward LSP must
be bound to a TE tunnel.
Pre-configuration Tasks
Before configuring basic MPLS OAM functions, complete the following tasks:
NOTE
If the forward LSP is static and the backward LSP is dynamic, and the backward LSP is in the shared mode,
you must specify lsrid ingress-lsr-id and tunnel-id tunnel-id when running the static-lsp egress command
or the static-cr-lsp egress command to create a forward LSP. For creating the LSP bound to a TE tunnel,
refer to the chapter "MPLS TE Configuration."
Data Preparation
To configure basic MPLS OAM functions, you need the following data.
No. Data
3 Egress: Number of the tunnel interface that is bound to the backward LSP and the
protection mode
NOTE
l The backward LSP must be specified on the egress; otherwise, BDI packets cannot be correctly sent
to the source end.
l If a shared backward LSP is used, you do not need to specify the backward LSP on the ingress.
Context
Perform the following steps on the ingress of the LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls oam
Step 4 Run:
quit
If the PHP function is not configured when a backward LSP is set up, you must specify the
backward LSP when configuring parameters for the MPLS OAM ingress.
NOTE
If the backward LSP is a static LSP or a static CR-LSP, you cannot configure it in private
mode.
If lsrid ingress-lsr-id and tunnel-id tunnel-id are specified when you run the static-lsp
egress lsp-name incoming-interface interface-type interface-number in-label in-label
[ lsrid ingress-lsr-id tunnel-id tunnel-id ] command or the static-cr-lsp egress lsp-name
incoming-interface interface-type interface-number in-label in-label [ lsrid ingress-lsr-id
tunnel-id tunnel-id ] command to create a backward LSP, you can use these two parameters
specify parameters in this step; otherwise, you can specify only the parameter lsp-name lsp-
name.
NOTE
l Different types of devices to be connected must be configured with the same compatible mode,
either PTN or router model. Inconsistent compatible mode settings lead to a connection failure.
l If automatic OAM is configured on two devices, its parameters must be modified when both the
devices work in the same mode, either PTN or router mode. Inconsistent compatible mode settings
lead to a connection failure.
By default, the type of the detection packet is CV. The frequency at which CV packets are
sent is one second.
Step 6 Run:
mpls oam ingress enable { all | tunnel interface-number }
----End
Context
Perform the following steps on the egress of the LSP:
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls
Step 3 Run:
mpls oam
Step 4 Run:
quit
OAM parameters are configured for the egress when the auto-protocol extension of OAM is
disabled.
If lsrid ingress-lsr-id and tunnel-id tunnel-id are specified when you run the static-lsp egress
lsp-name incoming-interface interface-type interface-number in-label in-label [ lsrid ingress-
lsr-id tunnel-id tunnel-id ] command or the static-cr-lsp egress lsp-name incoming-
interface interface-type interface-number in-label in-label [ lsrid ingress-lsr-id tunnel-id
tunnel-id ] command to create a forward tunnel, you can use these two parameters in this step;
otherwise, you can specify only the parameter lsp-name lsp-name.
By default, the auto-protocol function of OAM is enabled. The timeout period for the first packet
to wait for response is five minutes.
By default, the backward LSP is in the shared mode. When the backward LSP is a static LSP or
a CR-LSP, it is in the private mode.
By default, the frequency at which BDI packets are sent through the backward LSP is detect-
freq.
NOTE
If a shared backward LSP is used to enable the OAM auto-protocol extension in Step 5, Step 6 is not
necessary. When the egress receives the first CV/FFD packet, it automatically records the packet type and
the frequency at which CV/FFD packets are sent, and starts to detect the connectivity.
Step 6 Run:
mpls oam egress enable { all | lsp-name lsp-name | lsr-id ingress-lsr-id tunnel-id
tunnel-id }
----End
Prerequisites
The basic MPLS OAM functions have been configured.
Procedure
l Run display mpls oam ingress { all | tunnel interface-number } [ slot slot-id | verbose ]
command to view MPLS OAM information on the ingress.
l Run display mpls oam egress { all | lsp-name lsp-name | lsr-id ingress-lsr-id tunnel-id
tunnel-id } [ slot slot-id | verbose ] command to view MPLS OAM information on the
egress.
----End
Example
If the configurations succeed, run the commands mentioned above and you can view the
following results:
l Basic information about the LSP, including the tunnel name, LSP type, LSP ingress LSR
ID, and LSP tunnel ID
l Basic information about OAM, including the tunnel name, TTSI, packet type, and
frequency
l OAM detection information, including the packet type, frequency at which detection
packets are sent, detection status, and defect status. If the link works properly, the detection
status is Start and the defect status is non-defect
l Information about backward LSP, including the sharing mode and configurations of the
backward LSP
Usage Scenario
If the tunnel requires high availability, you can configure the MPLS OAM protection switching
to protect the tunnel.
MPLS OAM protection switching enables one tunnel to protect one or multiple tunnels. The
tunnel under protection is a working tunnel, and the tunnel providing protection is a protection
tunnel. A working tunnel and a protection tunnel compose a protection group.
One protection tunnel can protect one or more working tunnels. The protection mechanism in
which one protection tunnel protects only one working tunnel is called 1:1 protection; one
protection tunnel protects two or more working tunnel is called N:1 protection. "N" indicates
the number of the working tunnels in the same protection group. Working tunnels in the same
protection group use the same ingress and egress.
The NE80E/40E supports 1:1 protection and N:1 protection.
l Working tunnel and protection tunnel
Attributes of every tunnel in the tunnel protection group are not related. For example, the
protection tunnel with the bandwidth being 50 Mbit/s can protect the working tunnel with
the bandwidth being 100 Mbit/s.
You can configure TE FRR on the working tunnel in the protection group to provide dual
protection for the working tunnel. The protection tunnel cannot serve as the TE FRR
primary tunnel to be protected by other tunnels. In addition, the protection tunnel cannot
be enabled with TE FRR.
l Protection switching trigger mechanism
The NE80E/40E complies the following switch request criteria to initiate (or prevent) a
protection switching.
Pre-configuration Tasks
Before configuring MPLS OAM protection switching, complete the following tasks:
Data Preparation
To configure MPLS OAM protection switching, you need the following data.
No. Data
3 Parameters for the protection group, such as the hold off time, revertive mode, and
WTR time
Context
Perform the following steps on the ingress of the tunnel:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Run:
mpls te protection tunnel tunnel-id [ holdoff holdoff-time ] [ mode { non-
revertive | revertive [ wtr wtr-time ] } ]
Multiplying 100 milliseconds by holdoff-time, you can get the hold-off time.
l Non-revertive mode indicates that traffic does not switch back to the working tunnel even
though the working tunnel recovers.
l Revertive mode indicates that traffic switches back to the working tunnel when the working
tunnel recovers.
By default, the protection group is in revertive mode.
l Wait to Restore time (WTR time) indicates the time to be waited before traffic switching.
The parameter wtr-time indicates the number of steps, ranging from 0 to 60. The default value
is 24. The value of each step is 30, in seconds.
NOTE
Multiplying 30 seconds by wtr-time, you can get the value of WTR time.
NOTE
If the number of the working tunnels in the same protection group is N, perform Step 2 and Step 3 for N
times by using different interface-number.
Step 4 Run:
mpls te commit
----End
Follow-up Procedure
Configurations described in this section are also applicable in modifying the configuration of
the tunnel protection group.
Besides configuring a tunnel protection group to protect the working tunnel, you can configure
TE FRR on the working tunnel in the protection group to provide dual protection for the working
tunnel. The protection tunnel cannot serve as the working tunnel to be protected by other tunnels.
In addition, the protection tunnel cannot be enabled with TE FRR.
Context
Pay attention to the switch request criteria before configuring the protection switching trigger
mechanism.
Perform the following steps on the ingress of the tunnel protection group as required:
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface tunnel interface-number
Step 3 Select one of the following protection switching trigger methods as required:
l To switch traffic to the protection tunnel, run:
mpls te protect-switch manual
Step 4 Run:
mpls te commit
----End
Context
Before performing the following configurations, configure backward LSPs for the working and
protection tunnels. The working LSP and protection LSP, and their reverse LSPs compose
bidirectional LSPs.
NOTE
The backward LSP must be a static LSP or static CR-LSP. The working LSP and protection LSP can be a
static LSP, static CR-LSP, or RSVP LSP.
It is recommended that the LSP and the backward LSP of a bidirectional LSP be both static LSPs or both
static CR-LSPs; the protection LSP and the backward LSP are all static LSPs or all static CR-LSPs.
On the ingress, the inbound interface of the backward LSP and the outbound interface of the working LSP
or the protection LSP must be the same.
Procedure
l Enable MPLS OAM to detect the bidirectional LSP of the working tunnel.
1. Run:
system-view
1. Run:
system-view
----End
Prerequisites
The MPLS OAM protection switching function has been configured.
Procedure
l Run display mpls te protection tunnel { all | tunnel-id | interface tunnel interface-
number } [ verbose ] command to check information about a tunnel protection group.
l Run display mpls te protection binding protect-tunnel { tunnel-id | interface tunnel
interface-number } command to check the protection relationship of the tunnel.
----End
Example
After the configuration succeeds, run the preceding commands to view information about the
protection group.
Usage Scenario
The bidirectional co-routed LSP technique constitutes the fundamentals of the next-generation
packet-switching transport networks. Carriers combine MPLS-based packet switching
techniques with their experience of operating conventional transport networks, such as
Synchronous Digital Hierarchy (SDH) networks and optical transport networks (OTNs). The
combination enables the next-generation transport network to support the same services and
operation and management (O&M) methods that optical transport networks support. To measure
up the O&M and reliability benchmarks set by optical transport networks, the next-generation
transport networks provide comprehensive OAM capabilities for bidirectional co-routed LSPs.
MPLS OAM monitors the connectivity of bidirectional co-routed LSPs and can trigger a traffic
switchover after detecting a fault, minimizing traffic loss. MPLS OAM also supports flexible
detection frequency settings.
Pre-configuration Tasks
Before configuring MPLS OAM to monitor a static bidirectional co-routed LSP, complete the
following task:
Data Preparation
To configure MPLS OAM to monitor a static bidirectional co-routed LSP, you need the
following data.
No. Data
1 Tunnel numbers of a static bidirectional co-routed LSP and MPLS OAM parameters,
including:
l Detection type
l Interval at which connectivity verification (CV) or fast failure detection (FFD)
packets and the interval at which backward defect indication (BDI) packets are
sent
l OAM auto protocol extension
l Timeout period of the OAM auto protocol
Context
Perform the following steps on both ends of a static bidirectional co-routed LSP:
Procedure
Step 1 Run:
system-view
NOTE
The same compatibility mode must be configured on the two ends of a static bidirectional co-routed LSP.
A compatibility mode inconsistency causes a communication failure in the following situations:
l Two devices of different types communicate with each other.
l The OAM auto protocol is used on the two ends of a static bidirectional co-routed LSP.
----End
Context
MPLS OAM does not start automatically if the mpls oam bidirectional-tunnel command
without the auto-protocol parameter is configured. To manually enable MPLS OAM, run the
mpls oam bidirectional-tunnel enable command.
Perform the following steps on both ends of a static bidirectional co-routed LSP:
Procedure
Step 1 Run:
system-view
NOTE
Run the mpls oam bidirectional-tunnel enable send command and mpls oam bidirectional-tunnel
enable receive command to enable MPLS OAM on a node. Run the undo mpls oam bidirectional-tunnel
enable receive command and undo mpls oam bidirectional-tunnel enable send command to disable
MPLS OAM on a node. Running commands in reverse order causes a detection error.
----End
Prerequisites
MPLS OAM that monitors a static bidirectional co-routed LSP has been configured.
Procedure
l Run the display mpls oam bidirectional-tunnel { all | tunnel tunnel-number }
{ verbose | slot slot-id } command to check MPLS OAM parameters and the MPS OAM
status.
----End
Example
Run the display mpls oam bidirectional-tunnel command to view MPLS OAM parameters
and the MPLS OAM status.
<HUAWEI> display mpls oam bidirectional-tunnel tunnel1/0/0 verbose
--------------------------------------------------------------------
Verbose information about NO.1 OAM
--------------------------------------------------------------------
bidirectional Tunnel basic information:
-------------------------------------------------
Tunnel-name : Tunnel1/0/0
Lsp signal status : Up
Lsp establish type : Rsvp lsp
Lsp ingress lsr-id : 1.1.1.1
Lsp tnl-id : 1
Lsp-id : 1
-------------------------------------------------
OAM basic information:
-------------------------------------------------
OAM Index : 256
OAM Select Board : --
OAM Enable Direction : Send & Receive
Auto Protocol : Disable
Auto Overtime (s) : --
Compatibility Mode : PTN Mode
-------------------------------------------------
OAM detect information:
-------------------------------------------------
Send Type : FFD
Send Frequency (ms) : 500
Receive Type : FFD
Receive Frequency (ms) : 500
Detect State : Stop
Defect State : Non-defect
BDI Defect State : --
Bdi-frequency : Detect frequency
Available State : Available
Unavailable Time (s) : 0
Applicable Environment
If ETH-OAM 802.1ag(CFM), BFD, MPLS OAM, or MQEis configured on the router, protocol
packets of these services are frequently transmitted. For example, ETH-OAM 802.1ag packets
are transmitted at an interval of 3.3 ms. Therefore, a large number of sessions are created, causing
great bandwidth consumption in the fast packet transmission channel on the LPU. If the
bandwidth consumption reaches the trap threshold, service packets may be randomly dropped;
the sessions may frequently alternate between Up and Down; MQE data may be inaccurate.
You can set the trap threshold for the bandwidth that is consumed by each service that runs in
the fast packet transmission channel, in percentage. If the bandwidth consumed by a service
session exceeds the set threshold, the device reports a trap to the NMS.
Procedure
Step 1 Run:
system-view
The trap threshold is set for the bandwidth consumption in the fast packet transmission channel.
alarm-threshold is an integer ranging from 70 to 99. The default value is 80.
----End
Usage Scenario
On a Layer 2 Virtual Private Network ( L2VPN ) MPLS network, traditional detection techniques
can monitor the Pseudo-Wire ( PW ) status but cannot send defect packets or report a defect
type. The shortcoming delays fault detection and link switchover performed by an upper-layer
application. To address this problem, MPLS OAM can be configured to monitor the PW.
MPLS OAM is a detection mechanism for the user plane separated from the network plane and
is able to notify users of the PW status. A network administrator or maintenance engineer uses
the information to evaluate the network performance and maintain the network.
MPLS OAM is able to monitor the status of all PWs between two nodes or use a peer IP address,
virtual circuit ( VC ) encapsulation type, and VC ID to identify a PW and obtain detailed
information including basic PW and OAM information and OAM detection information. The
information can be used to maintain the network.
On the network shown in Figure 5-4, PE1 and PE2 are configured with OAM parameters and
enabled to send and receive OAM detection packets, which allows OAM to monitor the PW
between PE1 and PE2. OAM can obtain basic PW information, and send a BDI packet over a
reverse PW if OAM detects a default. Users can use the information provided by OAM to
maintain the network. CE1 is connected to PE1 over a VLAN and CE2 is connected to PE2 over
the same VLAN. PE1 and PE2 are connected over an MPLS backbone network.
Figure 5-4 Networking diagram for configuring MPLS OAM to monitor PW connectivity
MPLS network
PE1 P PE2
PW
CE1
Pre-configuration Tasks
Before configuring MPLS OAM to monitor PW connectivity, complete the following tasks:
Procedure
Step 1 Run:
system-view
MPLS OAM parameters are configured on nodes at both ends of the PW.
NOTE
l If auto-protocol is configured in the mpls oam l2vc command, an MPLS OAM-enabled device
automatically sends and receives OAM detection packets. There is no need to run the mpls oam l2vc
enable command.
l If auto-protocol is not configured, the mpls oam l2vc enable command can be run to enable the MPLS
OAM-enabled device to send, receive, or both send and receive OAM detection packets.
l Different types of devices to be connected must be configured with the same compatible mode, either
PTN or router model. Inconsistent compatible mode settings lead to a connection failure.
l If automatic OAM is configured on two devices, its parameters must be modified when both the devices
work in the same mode, either PTN or router mode. Inconsistent compatible mode settings lead to a
connection failure.
----End
----------------------------------------------------------------------
Run the display mpls oam l2vc peer-ip peer-ip vc-id vc-id vc-type vc-type verbose command
to view information about a specified PW, OAM configurations, and OAM status on the main
control board. For example:
<HUAWEI> display mpls oam l2vc peer-ip 2.2.2.2 vc-id 100 vc-type vlan verbose
--------------------------------------------------------------------
--------------------------------------------------------------------
PW basic information:
-------------------------------------------------
PW Status : Down
Peer IP : 2.2.2.2
VC Type : vlan
VC ID : 100
-------------------------------------------------
-------------------------------------------------
Remote Peer IP : --
-------------------------------------------------
-------------------------------------------------
Run the display mpls oam l2vc peer-ip peer-ip vc-id vc-id vc-type vc-type slot slot-id command
to view information about a specified PW, OAM configurations, and OAM status on a specified
interface board. For example:
<HUAWEI> display mpls oam l2vc peer-ip 2.2.2.2 vc-id 100 vc-type vlan slot 1
----------------------------------------------------------------------
-------------------------------------------------
Send Type : FFD
Send Frequency : 500 ms
Receive Type : FFD
Receive Frequency : 500 ms
Detect State : Stop
Defect State : Non-defect
BDI Defect State : --
Available State : Available
Unavailable Time (s) : 0
Context
In routine maintenance, you can run the following commands in any view to check the MPLS
OAM operating status.
Procedure
l Run the display mpls oam egress { all | lsp-name lsp-name | lsr-id ingress-lsr-id tunnel-
id tunnel-id } [ slot slot-id | verbose ] command to view information about the status and
configuration of the OAM-enabled LSP on the egress.
l Run the display mpls oam ingress { all | tunnel interface-number } [ slot slot-id |
verbose ] command to view information about the MPLS OAM parameters and status of
the LSP on the ingress.
l Run the display mpls oam oam-index index-value [ slot slot-id ] command to view
information about parameters and status of MPLS OAM.
----End
Context
In routine maintenance, you can run the following commands in any view to check the operating
status of the protection group.
Procedure
l Run the display mpls te protection tunnel { all | tunnel-id | interface tunnel interface-
number } [ verbose ] command to view information about the tunnel protection group.
----End
Networking Requirements
As shown in Figure 5-5, on an MPLS network, a static LSP along LSRA -> LSRB -> LSRC is
set up.
MPLS OAM is configured to detect the static LSP so that when a connectivity fault occurs, the
egress LSRC can notify the ingress LSRA of the fault.
Loopback1
4.4.4.4/32
T
P Tu unn
/0 10 OS nn el
1/0 /24 el- 1/0
S .2 .1. 2/0 id /0
PO .1.1 LSRD 4. /0
1/ 10
0 24 0
/0 1 P
1/0 /24 10 OS
S .1 .1 1/0
.4
Loopback1 PO .1.1 Loopback1 .2 /0 Loopback1
/2
1.1.1.1/32 10 2.2.2.2/32 4 3.3.3.3/32
POS1/0/0 POS2/0/0
10.1.2.2/24 10.1.3.1/24
POS2/0/0 POS2/0/0
LSRA 10.1.2.1/24 LSRB 10.1.3.2/24 LSRC
Tunnel 2/0/0
Tunnel-id 200
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l IP addresses for interfaces on each LSR, the tunnel interface name, and the tunnel ID
l Types of the detection packets to be sent
l Mode of the backward tunnel (share or private)
Procedure
Step 1 Configure IP addresses and the routing protocols for interfaces.
According to Figure 5-5, configure IP addresses and masks for interfaces including the loopback
interfaces.
Configure OSPF on all LSRs to advertise routes of their loopback interfaces. For configuration
details, see Configuration Files in this section.
After the configuration, LSRs can ping each other. Run the display ip routing-table command
on each LSR to display routes to each LSR-ID.
The following example uses the command output on LSRA.
<LSRA> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 14 Routes : 15
Destination/Mask Proto Pre Cost Flags NextHop Interface
1.1.1.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
2.2.2.2/32 OSPF 10 2 D 10.1.2.2 Pos2/0/0
3.3.3.3/32 OSPF 10 3 D 10.1.1.2 Pos1/0/0
OSPF 10 3 D 10.1.2.2 Pos2/0/0
4.4.4.4/32 OSPF 10 2 D 10.1.1.2 Pos1/0/0
10.1.1.0/24 Direct 0 0 D 10.1.1.1 Pos1/0/0
10.1.1.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
10.1.1.2/32 Direct 0 0 D 10.1.1.2 Pos1/0/0
10.1.2.0/24 Direct 0 0 D 10.1.2.1 Pos2/0/0
10.1.2.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
10.1.2.2/32 Direct 0 0 D 10.1.2.2 Pos2/0/0
10.1.3.0/24 OSPF 10 2 D 10.1.2.2 Pos2/0/0
10.1.4.0/24 OSPF 10 2 D 10.1.1.2 Pos1/0/0
127.0.0.0/8 Direct 0 0 D 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 D 127.0.0.1 InLoopBack0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls te
[LSRA-Pos1/0/0] quit
[LSRA] interface pos 2/0/0
[LSRA-Pos2/0/0] mpls
[LSRA-Pos2/0/0] mpls te
[LSRA-Pos2/0/0] quit
# Configure LSRA to be the ingress of the static LSP and enable the TE tunnel.
[LSRA] static-lsp ingress tunnel-interface tunnel 2/0/0 destination 3.3.3.3 nexthop
10.1.2.2 out-label 20
# Configure LSRC to be the egress of the static LSP and specify lsr-id and tunnel-id.
<LSRC> system-view
[LSRC] static-lsp egress oamlsp incoming-interface pos 2/0/0 in-label 30 lsrid
1.1.1.1 tunnel-id 200
After completing the configuration, run the display mpls te tunnel-interface command on
LSRA. The TE tunnel is UP.
[LSRA] display mpls te tunnel-interface
================================================================
Tunnel2/0/0
================================================================
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 200
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 3.3.3.3
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 1
Run the display mpls static-lsp command on LSRA. The static LSP corresponding to Tunnel
2/0/0 is Up.
[LSRA] display mpls static-lsp
TOTAL : 1 STATIC LSP(S)
UP : 1 STATIC LSP(S)
DOWN : 0 STATIC LSP(S)
Name FEC I/O Label I/O If Stat
Tunnel2/0/0 3.3.3.3/32 NULL/20 -/Pos2/0/0 Up
# Configure LSRA to be the egress of the static CR-LSP and specify lsr-id and tunnel-id.
[LSRA] static-cr-lsp egress Tunnel1/0/0 incoming-interface pos 1/0/0 in-label 80
lsrid 3.3.3.3 tunnel-id 100
After completing the configuration, run the display mpls te tunnel-interface command on
LSRC. The backward tunnel is UP.
[LSRC] display mpls te tunnel-interface
================================================================
Tunnel1/0/0
================================================================
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 100
Ingress LSR ID : 3.3.3.3 Egress LSR ID: 1.1.1.1
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 1
Run the display mpls static-cr-lsp command on LSRC. The static CR-LSP is Up.
[LSRC] display mpls static-cr-lsp
TOTAL : 1 STATIC CRLSP(S)
UP : 1 STATIC CRLSP(S)
DOWN : 0 STATIC CRLSP(S)
Name FEC I/O Label I/O If Stat
Tunnel1/0/0 1.1.1.1/32 NULL/70 -/Pos1/0/0 Up
# Configure MPLS OAM for the ingress on LSRA. By default, sending CV packets is enabled.
Parameters for the backward tunnel depend on the configuration of the egress.
[LSRA] mpls
[LSRA-mpls] mpls oam
[LSRA-mpls] quit
[LSRA] mpls oam ingress Tunnel 2/0/0 backward-lsp lsp-name Tunnel1/0/0
[LSRA] mpls oam ingress enable all
# Configure the OAM auto-protocol on LSRC to detect the LSP named oamlsp. The backward
tunnel is the LSP bound to tunnel 1/0/0. It is in the private mode.
[LSRC] mpls oam egress lsp-name oamlsp auto-protocol backward-lsp tunnel 1/0/0
private
After the OAM auto-protocol is configured on the egress, OAM is enabled automatically when
the egress receives the first correct detention packet.
After the configuration, check the MPLS OAM parameters and status of LSPs on LSRA and
LSRC. You can view that both ingress and egress are active in normal detection status.
[LSRA] display mpls oam ingress all verbose
-------------------------------------------------------------------------
Verbose information about the 1th oam at the ingress
-------------------------------------------------------------------------
lsp basic information: oam basic information:
----------------------------------- -----------------------------------
Tunnel-name : Tunnel2/0/0 Oam-Index : 256
Lsp signal status : Up Oam select board : 1
Lsp establish type : Static lsp Enable-state : Manual enable
Lsp ingress lsr-id : 1.1.1.1 Ttsi/lsr-id : 1.1.1.1
Lsp tnl-id/Lsp-id : 200/1 Ttsi/tunnel-id : 200
oam detect information: oam backward information:
----------------------------------- -----------------------------------
Type : CV Share attribute : Private
Frequency : 1 s Lsp-name : Tunnel1/0/0
Detect-state : Start Lsp ingress lsr-id : 3.3.3.3
Defect-state : Non-defect Lsp tnl-id/lsp id : 100/1
Available-state : available Lsp-inLabel : 80
Unavailable time (s): 0 Lsp signal status : Up
-------------------------------------------------------------------------
Total Oam Num: 1
Total Start Oam Num: 1
Total Defect Oam Num: 0
Total Unavaliable Oam Num: 0
[LSRC] display mpls oam egress all verbose
-------------------------------------------------------------------------
Verbose information about the 1th oam at the egress
-------------------------------------------------------------------------
lsp basic information: oam basic information:
----------------------------------- -----------------------------------
Lsp name : oamlsp Oam-Index : 256
Lsp signal status : Up Oam select board : 1
Lsp establish type : Static lsp Enable-state : --
Lsp incoming Label : 30 Auto-protocol : Enable
Lsp ingress lsr-id : 1.1.1.1 Auto-overtime (s) : 300
Lsp tnl-id/lsp-id : 200/1 Ttsi/lsr-id : 1.1.1.1
Lsp Incoming-int Pos 2/0/0 Ttsi/tunnel-id : 200
oam detect information: oam backward information:
----------------------------------- -----------------------------------
Type : CV Tunnel name : Tunnel1/0/0
Frequency : 1 s Share attribute : Private
Detect-state : Start Lsp signal status : Up
Defect-state : Non-defect Bdi-frequency : Detect-freq
Available state : Available
Unavailable time (s): 0
-------------------------------------------------------------------------
Total Oam Num: 1
Total Start Oam Num: 1
Total Defect Oam Num: 0
Total Unavaliable Oam Num: 0
# Run the shutdown command on POS 2/0/0 of LSRB to simulate a link fault.
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] shutdown
# Run the display mpls oam egress all verbose command on LSRC. LSRC has detected the
link fault and changed its status to In-defect.
<LSRC> display mpls oam egress all verbose
-------------------------------------------------------------------------
Verbose information about the 1th oam at the egress
-------------------------------------------------------------------------
lsp basic information: oam basic information:
---------------------------------- ------------------------------------
Lsp name : oamlsp Oam-Index : 256
Lsp signal status : Up Oam select board : 1
Lsp establish type : Static lsp Enable-state : --
Lsp incoming Label : 30 Auto-protocol : Enable
Lsp ingress lsr-id : 1.1.1.1 Auto-overtime (s) : 300
Lsp tnl-id/lsp-id : 200/1 Ttsi/lsr-id : 1.1.1.1
Lsp Incoming-int Pos 2/0/0 Ttsi/tunnel-id : 200
oam detect information: oam backward information:
---------------------------------- -----------------------------------
Type : CV Tunnel name : Tunnel1/0/0
Frequency : 1 s Share attribute : Private
Detect-state : Start Lsp signal status : Up
Defect-type : dLocv Bdi-frequency : Detect-freq
Available state : Unavailable
Unavailable time (s): 0
-------------------------------------------------------------------------
Total Oam Num: 1
Total Start Oam Num: 1
Total Defect Oam Num: 1
Total Unavaliable Oam Num: 1
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls oam
#
interface Pos1/0/0
link-protocol ppp
ip address 10.1.1.1 255.255.255.0
mpls
mpls te
#
interface Pos2/0/0
link-protocol ppp
ip address 10.1.2.1 255.255.255.0
mpls
mpls te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel2/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 3.3.3.3
mpls te signal-protocol static
mpls te tunnel-id 200
mpls te commit
#
ospf 1
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.2.0 0.0.0.255
#
static-lsp ingress tunnel-interface Tunnel2/0/0 destination 3.3.3.3 nexthop
10.1.2.2 out-label 20
static-cr-lsp egress tunnel1/0/0 incoming-interface Pos1/0/0 in-label 80
lsrid 3.3.3.3 tunnel-id 1
#
mpls oam ingress Tunnel 2/0/0 backward-lsp lsp-name Tunnel1/0/0
mpls oam ingress enable Tunnel2/0/0
#
return
Context
Bidirectional co-routed LSPs are widely used on a transport network. Their own O&M
capabilities, however, cannot meet telecom network requirements. MPLS OAM is an effective
O&M method that can detect faults in static bidirectional co-routed LSPs.
A static bidirectional co-routed LSP is established between LSRA and LSRC and transmits OAM
packets on the MPLS-TP network shown in Figure 5-6. If any transit node on the LSP receives
an OAM packet, the node replies with a response over the same path. The bandwidth of the LSP
between LSRA and LSRC is 10 Mbit/s.
Figure 5-6 MPLS OAM for monitoring a static bidirectional co-routed LSP
Loopback1 Loopback1 Loopback1
1.1.1.1/32 2.2.2.2/32 3.3.3.3/32
POS1/0/0 POS1/0/0 POS2/0/0 POS1/0/0
2.1.1.1/24 2.1.1.2/24 3.2.1.1/24 3.2.1.2/24
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l Tunnel interface's name and IP address, destination address, tunnel ID, and tunnel signaling
protocol (CR-Static) on LSRA and LSRC
l Maximum reservable bandwidth and BC bandwidth of each link
Procedure
Step 1 Assign an IP address to each interface and configure a routing protocol.
Assign an IP address and a mask to each interface and configure a routing protocol on each LSR
to ensure network layer connectivity.
# Configure LSRA.
[LSRA] mpls lsr-id 1.1.1.1
[LSRA] mpls
[LSRA-mpls] mpls te
[LSRA-mpls] quit
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls
[LSRA-Pos1/0/0] mpls te
[LSRA-Pos1/0/0] quit
Repeat this step for LSRB and LSRC. For configuration details, see Configuration Files in this
section.
# Configure the maximum reservable bandwidth and BC0 bandwidth for a link on the outbound
interface of each LSR. Ensure that the BC0 bandwidth of links is higher than the tunnel
bandwidth (10 Mbit/s).
# Configure LSRA.
[LSRA] interface pos 1/0/0
[LSRA-Pos1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRA-Pos1/0/0] mpls te bandwidth bc0 100000
[LSRA-Pos1/0/0] quit
# Configure LSRB.
[LSRB] interface pos 1/0/0
[LSRB-Pos1/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRB-Pos1/0/0] mpls te bandwidth bc0 100000
[LSRB-Pos1/0/0] quit
[LSRB] interface pos 2/0/0
[LSRB-Pos2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRB-Pos2/0/0] mpls te bandwidth bc0 100000
[LSRB-Pos2/0/0] quit
# Configure LSRC.
[LSRC] interface pos 2/0/0
[LSRC-Pos2/0/0] mpls te bandwidth max-reservable-bandwidth 100000
[LSRC-Pos2/0/0] mpls te bandwidth bc0 100000
[LSRC-Pos2/0/0] quit
# Create an MPLS TE tunnel interface for an LSP that originates from LSRA and is destined
for LSRC.
[LSRA] interface tunnel 1/0/0
[LSRA-Tunnel1/0/0] ip address unnumbered interface loopback 1
[LSRA-Tunnel1/0/0] tunnel-protocol mpls te
[LSRA-Tunnel1/0/0] destination 3.3.3.3
[LSRA-Tunnel1/0/0] mpls te tunnel-id 100
[LSRA-Tunnel1/0/0] mpls te signal-protocol cr-static
[LSRA-Tunnel1/0/0] mpls te bidirectional
[LSRA-Tunnel1/0/0] mpls te commit
[LSRA-Tunnel1/0/0] quit
# Create an MPLS TE tunnel interface for an LSP that originates from LSRC and is destined for
LSRA.
[LSRC] interface tunnel 2/0/0
[LSRC-Tunnel2/0/0] ip address unnumbered interface loopback 1
[LSRC-Tunnel2/0/0] tunnel-protocol mpls te
[LSRC-Tunnel2/0/0] destination 1.1.1.1
[LSRC-Tunnel2/0/0] mpls te tunnel-id 200
[LSRC-Tunnel2/0/0] mpls te signal-protocol cr-static
[LSRC-Tunnel2/0/0] mpls te commit
[LSRC-Tunnel2/0/0] quit
Step 5 Configure the ingress, transit node, and egress for a static bidirectional co-routed LSP.
# Configure LSRA as the ingress.
[LSRA] bidirectional static-cr-lsp ingress Tunnel/0/0
[LSRA-bi-static-ingress-Tunnell/0/0] forward nexthop 2.1.1.2 out-label 20
bandwidth ct0 10000
[LSRA-bi-static-ingress-Tunnell/0/0] backward in-label 20
Step 6 Configure a reverse tunnel attribute on the tunnel interface of LSRC and bind the tunnel interface
to the static bidirectional co-routed LSP.
[LSRC] interface Tunnel2/0/0
[LSRC-Tunnel2/0/0] mpls te passive-tunnel
[LSRC-Tunnel2/0/0] mpls te binding bidirectional static-cr-lsp egress lsp1
[LSRC-Tunnel2/0/0] mpls te commit
[LSRC-Tunnel2/0/0] quit
# Configure LSRC.
[LSRC] mpls-oam
[LSRC-mpls-oam] mpls oam bidirectional-tunnel tunnel 2/0/0 type cv auto-protocol
overtime 30
[LSRC-mpls-oam] mpls oam bidirectional-tunnel enable send all
[LSRC-mpls-oam] mpls oam bidirectional-tunnel enable receive all
[LSRC-mpls-oam] quit
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
1.1.1.1 3.3.3.3 1 NULL/20 I Tunnel1/0/0
- - - 20/NULL E Tunnel2/0/0
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
- - - 20/40 T Tunnel1/0/0
- - - 16/20 T Tunnel2/0/0
------------------------------------------------------------------------------
Ingress LsrId Destination LSPID In/Out Label R Tunnel-name
------------------------------------------------------------------------------
3.3.3.3 1.1.1.1 1 NULL/16 I Tunnel2/0/0
- - - 40/NULL E Tunnel1/0/0
Run the display mpls te bidirectional static-cr-lsp command on each LSR to view information
about the static bidirectional co-routed LSP.
# Check the configuration results on LSRA.
[LSRA] display mpls te bidirectional static-cr-lsp
TOTAL : 1 STATIC CRLSP(S)
UP : 1 STATIC CRLSP(S)
DOWN : 0 STATIC CRLSP(S)
Name FEC I/O Label I/O If Stat
Tunnel1/0/0 3.3.3.3/32 NULL/20 -/Pos1/0/0
20/NULL Pos1/0/0- Up
Run the ping command on LSRA. The ping succeeds, which means that the static bidirectional
co-routed LSP is reachable.
[LSRA] ping lsp te Tunnel 1/0/0
LSP PING FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 : 100 data bytes, pres
s CTRL_C to break
Reply from 3.3.3.3: bytes=100 Sequence=1 time = 110 ms
Reply from 3.3.3.3: bytes=100 Sequence=2 time = 70 ms
Reply from 3.3.3.3: bytes=100 Sequence=3 time = 60 ms
Reply from 3.3.3.3: bytes=100 Sequence=4 time = 80 ms
Reply from 3.3.3.3: bytes=100 Sequence=5 time = 60 ms
--- FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel1/0/0 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 60/76/110 ms
Run the display mpls oam bidirectional-tunnel all command on LSRA. The command output
shows the configuration about OAM.
[LSRA] display mpls oam bidirectional-tunnel all
----------------------------------------------------------------------
Total Oam Num: 1
Total Start Oam Num: 0
Total Defect Oam Num: 0
----------------------------------------------------------------------
No. Tunnel-name Ttsi Status
----------------------------------------------------------------------
----------------------------------------------------------------------
----End
Configuration Files
l LSRA configuration file
#
sysname LSRA
#
mpls lsr-id 1.1.1.1
mpls
mpls te
#
bidirectional static-cr-lsp ingress Tunnel1/0/0
forward nexthop 2.1.1.2 out-label 20 bandwidth ct0 10000
backward in-label 20
#
interface Pos1/0/0
undo shutdown
ip address 2.1.1.1 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
#
bidirectional static-cr-lsp egress lsp1
forward in-label 40 lsrid 1.1.1.1 tunnel-id 100
backward nexthop 3.2.1.1 out-label 16 bandwidth ct0 10000
#
interface Pos1/0/0
undo shutdown
ip address 3.2.1.2 255.255.255.0
mpls
mpls te
mpls te bandwidth max-reservable-bandwidth 100000
mpls te bandwidth bc0 100000
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
#
interface Tunnel2/0/0
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.1
mpls te signal-protocol cr-static
mpls te tunnel-id 200
mpls te passive-tunnel
mpls te binding bidirectional static-cr-lsp egress lsp1
mpls te commit
#
ip route-static 1.1.1.1 255.255.255.255 3.2.1.1
ip route-static 2.2.2.2 255.255.255.255 3.2.1.1
#
mpls-oam
mpls oam bidirectional-tunnel tunnel 2/0/0 type cv auto-protocol overtime 30
mpls oam bidirectional-tunnel enable send all
mpls oam bidirectional-tunnel enable receive all
#
return
Networking Requirements
As shown in Figure 5-7, on an MPLS network, there are three bidirectional static CR-LSPs
between PE1 and PE2. These bidirectional static CR-LSPs are bound to tunnel 1/0/10, tunnel
1/0/11, and tunnel 1/0/12 respectively. Tunnel 1/0/10 and tunnel 1/0/11 serve as working tunnels.
Tunnel 1/0/12 serves as a protection tunnel.
MPLS OAM protection switching is enabled on the MPLS network. Tunnel 1/0/12 protects
tunnel 1/0/10 and tunnel 1/0/11 simultaneously. When either of the working tunnels (tunnel
1/0/10 and tunnel 1/0/11) fails, traffic on the failed working tunnel switches to the protection
tunnel (tunnel 1/0/12).
Figure 5-7 Networking diagram for configuring an MPLS OAM protection group
Loopback1 Loopback1
2.2.2.2 GE2/0/0 GE1/0/0 5.5.5.5
10.1.5.2/30 10.1.5.1/30
P2 /0 PE2
E 2/0
1 G
GE1/0/0 ack GE4/0/0
10.1.1.2/30 o
b
op 3.3 0 3 / 0/0 /30 10.1.6.1/30
L .3. /
3 4/ 0 / 30 GE 1.8.1
GE 1.7.2 10
.
.
10 0 / 0
3 /0 30
/ 0 . 7 .1/ GE1 .8.2/
2/ 0 30 .1 .1
GE .2.2/ 10 10
.1
0 10 /0 P1
/
E 2/0 /30 E 3/0 .2/30
G 2.1 G 1.3
GE1/0/0 .1. . GE2/0/0
1 0 0 /0 10
10.1.1.1/30 3 / /3 0 10.1.6.2/30
GE 1.3.1
.
10
PE1 GE4/0/0 GE1/0/0 P3
Loopback1 10.1.4.1/30 10.1.4.2/30 Loopback1
1.1.1.1/32 4.4.4.4/32
Working tunnel-1
Reverse working tunnel-1
Working tunnel-2
Reverse working tunnel-2
Protection tunnel
Reverse protection tunnel
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure IP addresses and routing protocols on interfaces.
As shown in Figure 5-7, configure IP addresses and masks for interfaces, including loopback
interfaces.
Configure the OSPF protocol on all LSRs to advertise host routes of their loopback interfaces.
For configuration details, see Configuration Files in this section.
After the configuration, LSRs can ping the LSR ID of each other.
Step 2 Enable MPLS and MPLS TE globally and on the physical interfaces.
# On PE1 and PE2, configure tunnel 1/0/10 and tunnel 1/0/11 as working tunnels and tunnel
1/0/12 as a protection tunnel. Tunnel 1/0/12 protects tunnel 1/0/10 and tunnel 1/0/11
simultaneously. The signaling protocol of tunnel 1/0/11 is RSVP-TE and the signaling protocol
of tunnel 1/0/10 and tunnel 1/0/12 is CR-Static.
# Configure PE1.
<PE1> system-view
[PE1] interface tunnel1/0/10
[PE1-Tunnel1/0/10] description Working tunnel-1 to PE2
[PE1-Tunnel1/0/10] ip address unnumbered interface loopback 1
[PE1-Tunnel1/0/10] tunnel-protocol mpls te
[PE1-Tunnel1/0/10] destination 5.5.5.5
[PE1-Tunnel1/0/10] mpls te signal-protocol cr-static
[PE1-Tunnel1/0/10] mpls te tunnel-id 1010
[PE1-Tunnel1/0/10] mpls te commit
[PE1-Tunnel1/0/10] quit
[PE1] interface tunnel1/0/11
[PE1-Tunnel1/0/11] description Working tunnel-2 to PE2
[PE1-Tunnel1/0/11] ip address unnumbered interface loopback 1
[PE1-Tunnel1/0/11] tunnel-protocol mpls te
[PE1-Tunnel1/0/11] destination 5.5.5.5
[PE1-Tunnel1/0/11] mpls te signal-protocol rsvp-te
[PE1-Tunnel1/0/11] mpls te tunnel-id 1011
[PE1-Tunnel1/0/11] mpls te commit
[PE1-Tunnel1/0/11] quit
[PE1] interface tunnel1/0/12
[PE1-Tunnel1/0/12] description Protection tunnel to PE2
[PE1-Tunnel1/0/12] ip address unnumbered interface loopback 1
[PE1-Tunnel1/0/12] tunnel-protocol mpls te
[PE1-Tunnel1/0/12] destination 5.5.5.5
[PE1-Tunnel1/0/12] mpls te signal-protocol cr-static
[PE1-Tunnel1/0/12] mpls te tunnel-id 1012
[PE1-Tunnel1/0/12] mpls te commit
[PE1-Tunnel1/0/12] quit
# Configure PE2.
<PE2> system-view
Step 4 Configure three static CR-LSPs from PE1 to PE2, and bind them to the tunnel interfaces on PE1.
# Configure PE1.
[PE1] static-cr-lsp ingress tunnel-interface Tunnel1/0/10 destination 5.5.5.5
nexthop 10.1.2.2 out-label 16
[PE1] static-cr-lsp ingress tunnel-interface Tunnel1/0/12 destination 5.5.5.5
nexthop 10.1.4.2 out-label 30
# Configure P1.
<P1> system-view
[P1] static-cr-lsp transit PE1toPE2-2 incoming-interface gigabitethernet2/0/0 in-
label 16 nexthop 10.1.7.1 out-label 17
# Configure P3.
<P3> system-view
[P3] static-cr-lsp transit PE1toPE2-3 incoming-interface gigabitethernet1/0/0 in-
label 30 nexthop 10.1.6.1 out-label 31
# Configure PE2.
[PE2] static-cr-lsp egress PE1toPE2-2 incoming-interface gigabitethernet2/0/0 in-
label 17 lsrid 1.1.1.1 tunnel-id 1010
[PE2] static-cr-lsp egress PE1toPE2-3 incoming-interface gigabitethernet4/0/0 in-
label 31 lsrid 1.1.1.1 tunnel-id 1012
After completing the configuration, run the display mpls te tunnel command on PE1 and PE2
to view the created TE tunnel.
# Configure PE1.
[PE1] mpls
[PE1-mpls] mpls rsvp-te
[PE1-mpls] mpls te cspf
[PE1-mpls] quit
[PE1] interface gigabitethernet3/0/0
[PE1-GigabitEthernet3/0/0] mpls rsvp-te
[PE1-GigabitEthernet3/0/0] quit
[PE1] ospf 1
[PE1-ospf-1] opaque-capability enable
[PE1-ospf-1] area 0
[PE1-ospf-1-area-0.0.0.0] mpls-te enable
[PE1-ospf-1-area-0.0.0.0] quit
[PE1-ospf-1] quit
# Configure P1.
[P1] mpls
[P1-mpls] mpls rsvp-te
[P1-mpls] mpls te cspf
[P1-mpls] quit
[P1] interface gigabitethernet3/0/0
[P1-GigabitEthernet3/0/0] mpls rsvp-te
[P1-GigabitEthernet3/0/0] quit
[P1] interface gigabitethernet1/0/0
[P1-GigabitEthernet1/0/0] mpls rsvp-te
[P1-GigabitEthernet1/0/0] quit
[P1] ospf 1
[P1-ospf-1] opaque-capability enable
[P1-ospf-1] area 0
[P1-ospf-1-area-0.0.0.0] mpls-te enable
[P1-ospf-1-area-0.0.0.0] quit
[P1-ospf-1] quit
# Configure PE2.
[PE2] mpls
[PE2-mpls] mpls rsvp-te
[PE2-mpls] mpls te cspf
[PE2-mpls] quit
[PE2] interface gigabitethernet3/0/0
[PE2-GigabitEthernet3/0/0] mpls rsvp-te
[PE2-GigabitEthernet3/0/0] quit
[PE2] ospf 1
[PE2-ospf-1] opaque-capability enable
[PE2-ospf-1] area 0
[PE2-ospf-1-area-0.0.0.0] mpls-te enable
[PE2-ospf-1-area-0.0.0.0] quit
[PE2-ospf-1] quit
Run the display mpls te tunnel-interface command to view information oabout tunnel 1/0/11.
[PE1] display mpls te tunnel-interface tunnel1/0/11
================================================================
Tunnel1/0/11
================================================================
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 1011
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 5.5.5.5
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 1
Step 6 Configure three static CR-LSPs from PE2 to PE1, and bind them to the tunnel interfaces on PE2.
# Configure PE2.
[PE2] static-cr-lsp ingress tunnel-interface Tunnel1/0/10 destination 1.1.1.1
nexthop 10.1.7.2 out-label 17
[PE2] static-cr-lsp ingress tunnel-interface Tunnel1/0/11 destination 1.1.1.1
nexthop 10.1.8.2 out-label 21
[PE2] static-cr-lsp ingress tunnel-interface Tunnel1/0/12 destination 1.1.1.1
nexthop 10.1.5.2 out-label 31
# Configure P1.
[P1] static-cr-lsp transit PE2toPE1-2 incoming-interface gigabitethernet4/0/0 in-
label 17 nexthop 10.1.2.1 out-label 16
[P1] static-cr-lsp transit PE2toPE1-1 incoming-interface gigabitethernet1/0/0 in-
label 21 nexthop 10.1.3.1 out-label 20
# Configure P2.
<P2> system-view
[P2] static-cr-lsp transit PE2toPE1-3 incoming-interface gigabitethernet2/0/0 in-
label 31 nexthop 10.1.1.1 out-label 30
# Configure PE1.
[PE1] static-cr-lsp egress PE2toPE1-2 incoming-interface gigabitethernet2/0/0 in-
label 16 lsrid 1.1.1.1 tunnel-id 1010
[PE1] static-cr-lsp egress PE2toPE1-1 incoming-interface gigabitethernet3/0/0 in-
label 20 lsrid 1.1.1.1 tunnel-id 1011
[PE1] static-cr-lsp egress PE2toPE1-3 incoming-interface gigabitethernet1/0/0 in-
label 30 lsrid 1.1.1.1 tunnel-id 1012
# Configure PE2.
[PE2] interface tunnel1/0/10
[PE2-Tunnel1/0/10] mpls te reverse-lsp lsp-name PE1toPE2-1
[PE2-Tunnel1/0/10] mpls te commit
[PE2-Tunnel1/0/10] quit
[PE2] interface tunnel1/0/11
[PE2-Tunnel1/0/11] mpls te reverse-lsp lsp-name PE1toPE2-2
[PE2-Tunnel1/0/11] mpls te commit
[PE2-Tunnel1/0/11] quit
[PE2] interface tunnel1/0/12
[PE2-Tunnel1/0/12] mpls te reverse-lsp lsp-name PE1toPE2-3
[PE2-Tunnel1/0/12] mpls te commit
[PE2-Tunnel1/0/12] quit
[PE1] mpls
[PE1-mpls] mpls oam
[PE1-mpls] quit
[PE1] mpls oam ingress Tunnel1/0/10
[PE1] mpls oam ingress Tunnel1/0/11
[PE1] mpls oam ingress Tunnel1/0/12
[PE1] mpls oam ingress enable all
[PE1] mpls oam egress lsp-name PE2toPE1-1
[PE1] mpls oam egress lsp-name PE2toPE1-2
[PE1] mpls oam egress lsp-name PE2toPE1-3
[PE1] mpls oam egress enable all
# Configure PE2.
[PE2] mpls
[PE2-mpls] mpls oam
[PE2-mpls] quit
[PE2] mpls oam ingress Tunnel1/0/10
[PE2] mpls oam ingress Tunnel1/0/11
[PE2] mpls oam ingress Tunnel1/0/12
[PE2] mpls oam ingress enable all
[PE2] mpls oam egress lsp-name PE1toPE2-1
[PE2] mpls oam egress lsp-name PE1toPE2-2
[PE2] mpls oam egress lsp-name PE1toPE2-3
[PE2] mpls oam egress enable all
After completing the configuration, run the display mpls oam ingress all verbose command to
view the MPLS OAM parameters and status of LSPs on PE1 and PE2. You can view that the
LSP to be detected is in the "Non-Defect" state.
--------------------------------------------------------------------------------
# After completing the configuration, run the display mpls te protection tunnel all command
on PEs. Interfaces of all tunnels are in the Non-defect state and traffic is forwarded through the
working tunnel.
The following example uses the command output on PE1.
[PE1] display mpls te protection tunnel all
------------------------------------------------------------------------
No. Work-tunnel status /id Protect-tunnel status /id Switch-Result
------------------------------------------------------------------------
1 non-defect /1010 non-defect /1012 work-tunnel
2 non-defect /1011 non-defect /1012 work-tunnel
# Run the display mpls te protection binding protect-tunnel command on PEs. Tunnel 1/0/12
protects tunnel 1/0/10 and tunnel 1/0/11 simultaneously.
Run the display mpls te protection tunnel interface tunnel interface-number verbose
command on PEs to view details about the specified tunnel protection group. The following
example uses the command output on tunnel 1/0/10 of PE1.
[PE1] display mpls te protection tunnel interface tunnel 1010 verbose
----------------------------------------------------------------
Verbose information about the 1th proteciton-group
----------------------------------------------------------------
Work-tunnel id : 1010
Protect-tunnel id : 1012
Work-tunnel name : Tunnel1/0/10
Protect-tunnel name : Tunnel1/0/12
Work-tunnel reverse-lsp name : PE2toPE1-1
Protect-tunnel reverse-lsp name : PE2toPE1-3
switch result : work-tunnel
Tunnel using Best-Effort : none
Tunnel using Ordinary : none
work-tunnel defect state : non-defect
protect-tunnel defect state : non-defect
work-tunnel reverse-lsp defect state : non-defect
protect-tunnel reverse-lsp defect state : non-defect
HoldOff : 0ms
WTR : 120s
Mode : revertive
Using same path : --
# Run the mpls te protect-switch manual work-lsp command on tunnel 1/0/10 of PE1 to
perform traffic switching.
[PE1] interface tunnel1/0/10
[PE1-Tunnel1/0/10] mpls te protect-switch manual work-lsp
# Run the display mpls te protection tunnel all command on PE1. The Switch-Result of tunnel
1/0/10 is protect-tunnel.
[PE1] display mpls te protection tunnel all
------------------------------------------------------------------------
No. Work-tunnel status /id Protect-tunnel status /id Switch-Result
------------------------------------------------------------------------
1 non-defect /1010 non-defect /1012 protect-tunnel
2 non-defect /1011 non-defect /1012 work-tunnel
# Run the shutdown command on the GE 4/0/0 on PE1 to simulate the physical link failure on
the protection tunnel.
[PE1] interface gigabitethernet4/0/0
[PE1-GigabitEthernet4/0/0] shutdown
[PE1-GigabitEthernet4/0/0] quit
# Run the display mpls te protection tunnel all command on PE1. The Protect-tunnel
status of tunnel 1/0/10 is in-defect, and the Switch-Result is work-tunnel.
[PE1] display mpls te protection tunnel all
------------------------------------------------------------------------
No. Work-tunnel status /id Protect-tunnel status /id Switch-Result
------------------------------------------------------------------------
1 non-defect /1010 in-defect /1012 work-tunnel
2 non-defect /1011 non-defect /1012 work-tunnel
NOTE
When all tunnels work properly, and the mpls te protect-switch manual work-lsp command is configured
on the tunnel interface view of the working tunnel, traffic switches to the protection tunnel. In this case, if
the link of the protection tunnel fails, traffic switches back to the working tunnel and the mpls te protect-
switch manual work-lsp command on the tunnel interface view of the working tunnel is deleted. That is
because the link failure belongs to signaling failure and the priority of signaling failure is higher than that
of manual switching.
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
mpls lsr-id 1.1.1.1
mpls
mpls te
mpls rsvp-te
mpls te cspf
mpls oam
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.0
mpls
mpls te
#
interface GigabitEthernet2/0/0
ip address 10.1.2.1 255.255.255.0
mpls
mpls te
#
interface GigabitEthernet3/0/0
ip address 10.1.3.1 255.255.255.0
mpls
mpls te
mpls te rsvp-te
#
interface GigabitEthernet4/0/0
ip address 10.1.4.1 255.255.255.0
mpls
mpls te
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
interface Tunnel1/0/10
l P3 configuration file
#
sysname P2
#
mpls lsr-id 2.2.2.2
mpls
mpls te
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.0
mpls
mpls te
#
interface GigabitEthernet2/0/0
ip address 10.1.5.2 255.255.255.0
mpls
mpls te
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
#
ospf 100
area 0.0.0.0
network 2.2.2.2 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.1.5.0 0.0.0.255
#
static-cr-lsp transit PE2toPE1-3 incoming-interface gigabitethernet2/0/0 in-
label 31 nexthop 10.1.1.1 out-label 30
#
return
l Configuration file of P1
#
sysname P1
#
mpls lsr-id 3.3.3.3
mpls
mpls te
mpls rsvp-te
mpls te cspf
#
interface GigabitEthernet1/0/0
ip address 10.1.8.2 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet2/0/0
ip address 10.1.2.2 255.255.255.0
mpls
mpls te
#
interface GigabitEthernet3/0/0
ip address 10.1.3.2 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet4/0/0
ip address 10.1.7.2 255.255.255.0
mpls
mpls te
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
#
ospf 100
opaque-capability enable
area 0.0.0.0
network 3.3.3.3 0.0.0.0
network 10.1.1.0 0.0.0.255
l P3 configuration file
#
sysname P3
#
mpls lsr-id 4.4.4.4
mpls
mpls te
#
interface GigabitEthernet1/0/0
ip address 10.1.4.2 255.255.255.0
mpls
mpls te
#
interface GigabitEthernet2/0/0
ip address 10.1.6.2 255.255.255.0
mpls
mpls te
#
interface LoopBack1
ip address 4.4.4.4 255.255.255.255
#
ospf 100
area 0.0.0.0
network 4.4.4.4 0.0.0.0
network 10.1.4.0 0.0.0.255
network 10.1.6.0 0.0.0.255
#
static-cr-lsp transit PE1toPE2-3 incoming-interface gigabitethernet1/0/0 in-
label 30 nexthop 10.1.6.1 out-label 31
#
return
interface GigabitEthernet3/0/0
ip address 10.1.8.1 255.255.255.0
mpls
mpls te
mpls rsvp-te
#
interface GigabitEthernet4/0/0
ip address 10.1.6.1 255.255.255.0
mpls
mpls te
#
interface LoopBack1
ip address 5.5.5.5 255.255.255.255
#
interface Tunnel1/0/10
description Working tunnel-1 to PE1
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.1
mpls te signal-protocol cr-static
mpls te tunnel-id 1010
mpls te protection tunnel 1/0/12 mode revertive wtr 4
mpls te commit
#
interface Tunnel1/0/11
description Working tunnel-2 to PE1
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.1
mpls te signal-protocol cr-static
mpls te tunnel-id 1011
mpls te protection tunnel 1/0/12 mode revertive wtr 4
mpls te commit
#
interface Tunnel1/0/12
description Protection tunnel to PE1
ip address unnumbered interface LoopBack1
tunnel-protocol mpls te
destination 1.1.1.1
mpls te signal-protocol cr-static
mpls te tunnel-id 1012
mpls te reverse-lsp lsp-name PE1toPE2-3
mpls te commit
#
ospf 100
opaque-capability enable
area 0.0.0.0
network 5.5.5.5 0.0.0.0
network 10.1.5.0 0.0.0.255
network 10.1.6.0 0.0.0.255
network 10.1.7.0 0.0.0.255
network 10.1.8.0 0.0.0.255
mpls-te enable
#
static-cr-lsp ingress tunnel-interface Tunnel1/0/10 destination 1.1.1.1
nexthop 10.1.7.2 out-label 17
static-cr-lsp ingress tunnel-interface Tunnel1/0/11 destination 1.1.1.1
nexthop 10.1.8.2 out-label 21
static-cr-lsp ingress tunnel-interface Tunnel1/0/12 destination 1.1.1.1
nexthop 10.1.5.2 out-label 31
static-cr-lsp egress PE1toPE2-2 incoming-interface gigabitethernet2/0/0 in-
label 17 lsrid 1.1.1.1 tunnel-id 1010
static-cr-lsp egress PE1toPE2-3 incoming-interface gigabitethernet4/0/0 in-
label 31 lsrid 1.1.1.1 tunnel-id 1012
#
mpls oam ingress Tunnel1/0/10
mpls oam ingress Tunnel1/0/11
This section describes how to configure seamless Multiprotocol Label Switching (MPLS) in
various usage scenarios.
6.1 Introduction
Seamless Multiprotocol Label Switching (MPLS) can establish a label switched path (LSP)
across the access, aggregation, and core layers to implement E2E service connectivity.
6.1 Introduction
Seamless Multiprotocol Label Switching (MPLS) can establish a label switched path (LSP)
across the access, aggregation, and core layers to implement E2E service connectivity.
6.1.1 Overview
Seamless MPLS is a bearer technique that extends MPLS techniques to access networks.
Seamless MPLS establishes an E2E LSP across the access, aggregation, and core layers. All
services can be encapsulated using MPLS at the access layer and transmitted along the E2E LSP
across the three layers.
With current trends moving towards a flat network structure, metropolitan area networks
(MANs) are steadily evolving into the Ethernet architecture, which calls for the application of
MPLS on the MAN and access networks. To meet this requirement, seamless MPLS was
developed. Seamless MPLS uses existing BGP, IGP, and MPLS techniques to establish an E2E
LSP across the access, aggregation, and core layers, allowing end-to-end traffic to be
encapsulated and forwarded using MPLS.
Intra-Seamless MPLS
Figure 6-1 illustrates the intra-AS seamless MPLS networking. The access, aggregation, and
core layers are within a single AS. Intra-AS seamless MPLS applies to mobile bearer networks.
Usage Scenario
As shown in Figure 6-4, the access, aggregation, and core layers belong to the same AS. Intra-
AS seamless MPLS can be configured to transmit services between NodeBs (Ethernet stations)
and a mobility management entity (MME) or serving gateway (SGW). Intra-AS seamless MPLS
applies to mobile bearer networks.
Single AS
NodeB/
eNodeB Aggregation
Access Core
MME/
SGW
CSG2 AGG2 Core ABR2 MASG2
NodeB/
eNodeB MPLS LDP/ MPLS LDP/ MPLS LDP/
MPLS TE MPLS TE MPLS TE
Pre-configuration Tasks
Before configuring intra-AS seamless MPLS, complete the following tasks:
l Configure IGP protocols to implement connectivity at the access, aggregation, and core
layers and enable MPLS LDP or MPLS TE to implement MPLS forwarding on a public
network.
l Configure IBGP peer relationships between each Cell Site Gateway (CSG) and
Aggregation (AGG), between each AGG and Core ABR, and between each Core ABR and
Mobile Aggregate Service Gateway (MASG).
NOTE
If MPLS TE tunnels are used across the three layers, a tunnel policy or tunnel selector must be configured.
For configuration details, see Tunnel Management Configuration.
Data Preparation
To configure intra-AS seamless MPLS, you need the following data.
No. Data
Procedure
Step 1 Run:
system-view
Step 2 Run:
bgp { as-number-plain | as-number-dot }
Step 3 Run:
ipv4-family unicast
Step 4 Run:
peer { ipv4-address | group-name } reflect-client
The AGG's clients are its connected CSG and core ABR. The core ABR's clients are its connected
AGG and MASG.
Step 5 Run:
peer { ipv4-address | group-name } next-hop-local
The device is configured to use its own IP address as the next-hop address of routes when
advertising these routes.
To enable the AGG or core ABR to advertise routes with the next-hop address set to a local
address, run the peer next-hop-local command on the AGG or core ABR.
----End
Procedure
Step 1 Run:
system-view
Step 2 Run:
bgp { as-number-plain | as-number-dot }
Step 3 Run:
peer { ipv4-address | group-name } label-route-capability [ check-tunnel-
reachable ]
The ability to exchange labeled IPv4 routes with a BGP peer is enabled.
----End
Procedure
l Perform the following steps on each CSG and MASG:
1. Run:
system-view
NOTE
This route is labeled and advertised along a path over which a BGP LSP is established.
8. (Optional) Configure the load balancing for BGP labeled routes.
a. To configure the maximum number of BGP labeled routes to balance traffic, run:
maximum load-balancing
ingress-lsp number
By default, the maximum number of labeled BGP routes for load balancing is 1.
After the maximum load-balancing ingress-lsp command is run on the ingress
of a BGP LSP, labeled BGP routes can load-balance traffic as long as equal-cost
labeled BGP routes exist, which improves network bandwidth utilization.
b. (Optional) To ignore IGP metric during BGP routing, run:
bestroute igp-metric-ignore
By default, BGP labeled routes with the same destination but different next-hop
metric values cannot balance traffic. To enable these routes to balance traffic,
run the bestroute igp-metric-ignore command. After this command is run,
routes can be selected to balance traffic, regardless of their IGP metric values.
Exercise caution when using this command.
l Perform the following steps on each AGG and core ABR:
1. Run:
system-view
NOTE
----End
Context
On an intra-AS seamless MPLS network that has protection switching enabled, if a link or node
fails, traffic switches to a backup path, which implements uninterrupted traffic transmission.
NOTE
If both LDP FRR and BGP Auto FRR functions are configured, only BGP Auto FRR takes effect.
Procedure
l Use an LSP attribute template to configure CR-LSP hot standby.
1. Run:
system-view
The hot-standby CR-LSP is established using the specified CR-LSP attribute template.
4. (Optional) Run:
mpls te backup hotstandby-lsp-constraint lock
NOTE
On the same interface, a maximum of 10 LDP FRR bypass tunnels with different priorities can
be configured, and only one LDP FRR bypass tunnel can be established. The smaller the priority
value, the higher the priority. The default priority value is 50.
l Configure LDP Auto FRR.
1. Run:
system-view
NOTE
LDP Auto FRR depends on IGP Auto FRR. After the frr (IS-IS view) or frr (OSPF view)
command is used to enable IGP Auto FRR, LDP Auto FRR will be automatically enabled. To
change a policy for triggering backup LDP LSP establishment, run the auto-frr lsp-trigger
command.
The auto-frr lsp-trigger command is affected by the lsp-trigger command. If both the auto-
frr lsp-trigger command and the lsp-trigger command are run, the established backup LSPs
satisfy both the policy for triggering LDP LSP establishment and the policy for triggering
backup LDP LSP establishment.
During the LDP GR process, changing a policy for triggering the backup LDP LSP
establishment is not allowed.
l Configure BGP Auto FRR.
1. Run:
system-view
Labeled BGP IPv4 unicast routes can participate in route selection only when their
next hops are iterated to tunnels.
6. (Optional) Run:
ingress-lsp protect-mode bgp-frr
NOTE
Perform this step on each CSG and MASG to enable the protection switching function for the
whole BGP LSP.
l Configure VPN manual FRR.
1. Run:
system-view
A VPN route is configured to participate in route selection only when its next hop is
iterated to a tunnel. This configuration ensures that packets are not lost during a traffic
switchback.
l Configure VPN Auto FRR.
1. Run:
system-view
A VPN route is configured to participate in route selection only when its next hop is
iterated to a tunnel. This configuration ensures that packets are not lost during a traffic
switchback.
----End
Prerequisites
Intra-AS seamless MPLS has been configured.
Procedure
l Run the display ip routing-table command on the CSG and MASG to check the route to
each other.
l Run the display mpls lsp command to check LSP information.
l Run the ping lsp [ -a source-ip | -c count | -exp exp-value | -h ttl-value | -m interval | -r
reply-mode | -s packet-size | -t time-out | -v ] * bgp destination-address mask-length [ ip-
address ] command on a CSG or MASG to check BGP LSP connectivity.
l Run the tracert lsp [ -a source-ip | -exp exp-value | -h ttl-value | -r reply-mode | -t time-
out | -v ] * bgp destination-address mask-length [ ip-address ] command to perform an LSP
tracert operation on a BGP LSP.
----End
Example
Run the display ip routing-table command on a CSG or MASG to view information about a
route to a BGP peer.
<CSG> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 7 Routes : 7
Run the ping lsp command on a CSG or MASG to check BGP LSP connectivity.
<CSG> ping lsp bgp 4.4.4.4 32
LSP PING FEC: BGP LABLED IPV4 PREFIX 4.4.4.4/32/ : 100 data bytes, press CTRL_C
to break
Reply from 4.4.4.4: bytes=100 Sequence=1 time=120 ms
Reply from 4.4.4.4: bytes=100 Sequence=2 time=110 ms
Reply from 4.4.4.4: bytes=100 Sequence=3 time=130 ms
Reply from 4.4.4.4: bytes=100 Sequence=4 time=70 ms
Reply from 4.4.4.4: bytes=100 Sequence=5 time=130 ms
--- FEC: BGP LABLED IPV4 PREFIX 4.4.4.4/32 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 70/112/130 ms
Run the tracert lsp command on a CSG or MASG to perform an LSP tracert operation on a
BGP LSP.
<CSG> tracert lsp bgp 4.4.4.4 32
LSP Trace Route FEC: BGP LABLED IPV4 PREFIX 4.4.4.4/32 , press CTRL_C to break.
TTL Replier Time Type Downstream
0 Ingress 10.1.1.2/[1027 3 ]
1 10.1.1.2 310 ms Transit 10.2.1.2/[1027 3 ]
2 10.2.1.2 190 ms Transit 10.3.1.2/[1025 3 ]
3 4.4.4.4 120 ms Egress
Usage Scenario
In Figure 6-5, the access and aggregation layers belong to one AS, and the core layer belongs
to another AS. Inter-AS seamless MPLS can be configured to transmit services between NodeBs
that are Ethernet stations and an Mobility Management Entity (MME) or Serving Gateway
(SGW).
AS x AS y
NodeB/
eNodeB Access Aggregation Core
MME/
SGW
CSG2 AGG2 AGG ASBR2 Core ASBR2 MASG2
NodeB/
eNodeB MPLS LDP/ MPLS LDP/ MPLS LDP/
MPLS TE MPLS TE MPLS TE
Pre-configuration Tasks
Before configuring inter-AS seamless MPLS, complete the following tasks:
l Configure IGP protocols to implement connectivity at the access, aggregation, and core
layers and enable MPLS LDP or MPLS TE to implement MPLS forwarding on a public
network.
l Configure an EBGP peer relationship between each pair of an AGG ASBR and core ASBR
and an IBGP peer relationship between each pair of the following nodes:
– Cell Site Gateway (CSG) and Aggregation (AGG)
– AGG and AGG ASBR
– Core ASBR and Mobile Aggregate Service Gateway (MASG)
NOTE
If MPLS TE tunnels are used across the three layers, a tunnel policy or tunnel selector must be configured.
For configuration details, see Tunnel Management Configuration.
Data Preparation
To configure inter-AS seamless MPLS, you need the following data.
No. Data
2 Number of an AS to which the access and aggregation belongs and number of another
AS to which the core layer belongs
Procedure
Step 1 Run:
system-view
Step 2 Run:
bgp { as-number-plain | as-number-dot }
Step 3 Run:
ipv4-family unicast
Step 4 Run:
peer { ipv4-address | group-name } reflect-client
An RR is configured, and the CSG and core ASBR are specified as clients.
Step 5 Run:
peer { ipv4-address | group-name } next-hop-local
The device is configured to use its own IP address as the next-hop address of routes when
advertising these routes.
To enable the AGG to advertise routes with the next-hop address set to a local address, run the
peer next-hop-local command on the AGG.
----End
Procedure
l Perform the following steps on each CSG, AGG, and MASG:
1. Run:
system-view
The ability to exchange labeled IPv4 routes between devices in the local AS is enabled.
2. Run:
interface interface-type interface-number
MPLS is enabled.
5. Run:
quit
The ability to exchange labeled IPv4 routes between BGP peers, including the peer
ASBR and the devices in the local AS, is enabled.
----End
Procedure
l Perform the following steps on each CSG and MASG:
1. Run:
system-view
NOTE
This route is labeled and advertised along a path over which a BGP LSP is established.
8. (Optional) Configure the load balancing for BGP labeled routes.
a. To configure the maximum number of BGP labeled routes to balance traffic, run:
maximum load-balancing
ingress-lsp number
By default, the maximum number of labeled BGP routes for load balancing is 1.
After the maximum load-balancing ingress-lsp command is run on the ingress
of a BGP LSP, labeled BGP routes can load-balance traffic as long as equal-cost
labeled BGP routes exist, which improves network bandwidth utilization.
b. (Optional) To ignore IGP metric during BGP routing, run:
bestroute igp-metric-ignore
By default, BGP labeled routes with the same destination but different next-hop
metric values cannot balance traffic. To enable these routes to balance traffic,
run the bestroute igp-metric-ignore command. After this command is run,
routes can be selected to balance traffic, regardless of their IGP metric values.
Exercise caution when using this command.
l Perform the following steps on each AGG, AGG ASBR, and core ASBR:
1. Run:
system-view
NOTE
----End
Context
In the inter-AS seamless MPLS or inter-AS seamless MPLS+HVPN networking, each packet
arriving at a core ASBR or AGG ASBR carries an inner private label, a BGP LSP label, and an
outer MPLS tunnel label. The core ASBR and AGG ASBR remove outer MPLS tunnel labels
from packets before sending the packets to each other. If a BGP LSP label in a packet carries a
QoS priority different from that in the outer MPLS tunnel label in the packet, you can configure
the core ASBR or AGG ASBR to determine whether the BGP LSP label inherits the QoS priority
carried in the outer MPLS tunnel label to be removed.
Procedure
Step 1 Run:
system-view
Step 2 Run:
bgp { as-number-plain | as-number-dot }
Step 4 Run:
peer { group-name | ipv4-address } exp-mode { pipe | uniform }
The mode in which a BGP label inherits the QoS priority in the outer tunnel label is specified.
The default QoS priority inheriting mode varies according to the outer MPLS tunnel type:
l LDP: By default, the BGP label inherits the QoS priority carried in the outer MPLS tunnel
label.
l TE: By default, the BGP label does not inherit the QoS priority carried in the outer MPLS
tunnel label.
----End
Context
On an inter-AS seamless MPLS network that has protection switching enabled, if a link or node
fails, traffic switches to a backup path, which implements uninterrupted traffic transmission.
NOTE
If both LDP FRR and BGP Auto FRR functions are configured, only BGP Auto FRR takes effect.
Procedure
l Use an LSP attribute template to configure CR-LSP hot standby.
1. Run:
system-view
The hot-standby CR-LSP is established using the specified CR-LSP attribute template.
bandwidth. If the bandwidth resources are insufficient, traffic switches from the
primary CR-LSP to the hot-standby CR-LSP without bandwidth assigned.
4. Run:
mpls te commit
NOTE
On the same interface, a maximum of 10 LDP FRR bypass tunnels with different priorities can
be configured, and only one LDP FRR bypass tunnel can be established. The smaller the priority
value, the higher the priority. The default priority value is 50.
l Configure LDP Auto FRR.
1. Run:
system-view
NOTE
LDP Auto FRR depends on IGP Auto FRR. After the frr (IS-IS view) or frr (OSPF view)
command is used to enable IGP Auto FRR, LDP Auto FRR will be automatically enabled. To
change a policy for triggering backup LDP LSP establishment, run the auto-frr lsp-trigger
command.
The auto-frr lsp-trigger command is affected by the lsp-trigger command. If both the auto-
frr lsp-trigger command and the lsp-trigger command are run, the established backup LSPs
satisfy both the policy for triggering LDP LSP establishment and the policy for triggering
backup LDP LSP establishment.
During the LDP GR process, changing a policy for triggering the backup LDP LSP
establishment is not allowed.
l Configure BGP Auto FRR.
1. Run:
system-view
Labeled BGP IPv4 unicast routes can participate in route selection only when their
next hops are iterated to tunnels.
l Configure VPN manual FRR.
1. Run:
system-view
A VPN route is configured to participate in route selection only when its next hop is
iterated to a tunnel. This configuration ensures that packets are not lost during a traffic
switchback.
l Configure VPN Auto FRR.
1. Run:
system-view
A VPN route is configured to participate in route selection only when its next hop is
iterated to a tunnel. This configuration ensures that packets are not lost during a traffic
switchback.
----End
Prerequisites
Inter-AS seamless MPLS has been configured.
Procedure
l Run the display ip routing-table command on the CSG and MASG to check the route to
each other.
l Run the display mpls lsp command to check LSP information.
l Run the ping lsp [ -a source-ip | -c count | -exp exp-value | -h ttl-value | -m interval | -r
reply-mode | -s packet-size | -t time-out | -v ] * bgp destination-address mask-length [ ip-
address ] command on a CSG or MASG to check BGP LSP connectivity.
l Run the tracert lsp [ -a source-ip | -exp exp-value | -h ttl-value | -r reply-mode | -t time-
out | -v ] * bgp destination-address mask-length [ ip-address ] command to perform an LSP
tracert operation on a BGP LSP.
----End
Example
Run the display ip routing-table command on a CSG or MASG to view information about a
route to a BGP peer.
<CSG> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 7 Routes : 7
Run the ping lsp command on a CSG or MASG to check BGP LSP connectivity.
<CSG> ping lsp bgp 5.5.5.5 32
LSP PING FEC: BGP LABLED IPV4 PREFIX 5.5.5.5/32/ : 100 data bytes, press CTRL_C
to break
Reply from 5.5.5.5: bytes=100 Sequence=1 time=130 ms
--- FEC: BGP LABLED IPV4 PREFIX 5.5.5.5/32 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 90/116/130 ms
Run the tracert lsp command on a CSG or MASG to perform an LSP tracert operation on a
BGP LSP.
<CSG> tracert lsp bgp 5.5.5.5 32
LSP Trace Route FEC: BGP LABLED IPV4 PREFIX 5.5.5.5/32 , press CTRL_C to break.
TTL Replier Time Type Downstream
0 Ingress 10.1.1.2/[1029 3 ]
1 10.1.1.2 30 ms Transit 10.2.1.2/[1030 3 ]
2 10.2.1.2 60 ms Transit 10.3.1.2/[1027 3 ]
3 10.3.1.2 160 ms Transit 10.4.1.2/[1025 3 ]
4 5.5.5.5 110 ms Egress
Usage Scenario
Figure 6-6 illustrates the inter-AS seamless MPLS+HVPN networking. A Cell Site Gateway
(CSG) and an Aggregation (AGG) establish an HVPN connection, and the AGG and an Mobile
Aggregate Service Gateway (MASG) establish a seamless MPLS LSP. The AGG hierarchically
provides L3VPN access services and routing management services. Seamless MPLS+HVPN
combines the advantages of both MPLS and HVPN. Seamless MPLS allows any two nodes on
an inter-AS LSP to transmit services at the access, aggregation, and core layers, providing high
service scalability. HVPN enables carriers to cut down network deployment costs by deploying
devices with layer-specific capacities to meet service requirements.
AS x AS y
NodeB/
eNodeB Access Aggregation Core
MME/
SGW
CSG2 AGG2 AGG ASBR2 Core ASBR2 MASG2
NodeB/
eNodeB MPLS LDP/ MPLS LDP/ MPLS LDP/
MPLS TE MPLS TE MPLS TE
Pre-configuration Tasks
Before configuring inter-AS seamless MPLS+HVPN, complete the following tasks:
l Configure IGP protocols to implement connectivity at the access, aggregation, and core
layers and enable MPLS LDP or MPLS TE to implement MPLS forwarding on a public
network.
l Configure an EBGP peer relationship between each pair of an AGG ASBR and core ASBR
and an IBGP peer relationship between each pair of the following nodes:
– CSG and AGG
– AGG and AGG ASBR
– Core ASBR and MASG
l Configure an HVPN between each pair of a CSG and AGG.
NOTE
If MPLS TE tunnels are used across the three layers, a tunnel policy or tunnel selector must be configured.
For configuration details, see Tunnel Management Configuration.
Data Preparation
To configure inter-AS seamless MPLS+HVPN, you need the following data.
No. Data
2 Number of an AS to which the access and aggregation belongs and number of another
AS to which the core layer belongs
No. Data
Procedure
Step 1 Run:
system-view
The interface on which a TCP connection to the specified BGP peer is established is specified.
NOTE
The AGG and MASG must use loopback interface addresses with 32-bit masks to establish an MP-EBGP
peer relationship so that the MP-EBGP connection can be iterated to a tunnel.
Step 5 Run:
peer ipv4-address ebgp-max-hop [ hop-count ]
The ability to exchange BGP-VPNv4 routes with the specified BGP peer is enabled.
Step 8 (Optional) Run:
ipv4-family unicast
The ability to exchange BGP-VPNv4 unicast routes between BGP peers is disabled.
If multiple links between two ASs exist, the ability to exchange BGP-VPNv4 unicast routes
between BGP peers must be disabled to prevent route loops between BGP peers that establish
MP-EBGP peer relationships.
----End
Procedure
l Perform the following steps on each AGG and MASG:
1. Run:
system-view
The ability to exchange labeled IPv4 routes between devices in the local AS is enabled.
l Perform the following steps on each AGG ASBR and core ASBR:
1. Run:
system-view
MPLS is enabled.
5. Run:
quit
The ability to exchange labeled IPv4 routes between BGP peers, including the peer
ASBR and the devices in the local AS, is enabled.
Procedure
l Perform the following steps on each AGG and MASG:
1. Run:
system-view
NOTE
This route is labeled and advertised along a path over which a BGP LSP is established.
8. (Optional) Configure the load balancing for BGP labeled routes.
a. To configure the maximum number of BGP labeled routes to balance traffic, run:
maximum load-balancing
ingress-lsp number
By default, the maximum number of labeled BGP routes for load balancing is 1.
After the maximum load-balancing ingress-lsp command is run on the ingress
of a BGP LSP, labeled BGP routes can load-balance traffic as long as equal-cost
labeled BGP routes exist, which improves network bandwidth utilization.
b. (Optional) To ignore IGP metric during BGP routing, run:
bestroute igp-metric-ignore
By default, BGP labeled routes with the same destination but different next-hop
metric values cannot balance traffic. To enable these routes to balance traffic,
run the bestroute igp-metric-ignore command. After this command is run,
routes can be selected to balance traffic, regardless of their IGP metric values.
Exercise caution when using this command.
l Perform the following steps on each AGG ASBR and core ASBR:
1. Run:
system-view
NOTE
----End
Context
In the inter-AS seamless MPLS or inter-AS seamless MPLS+HVPN networking, each packet
arriving at a core ASBR or AGG ASBR carries an inner private label, a BGP LSP label, and an
outer MPLS tunnel label. The core ASBR and AGG ASBR remove outer MPLS tunnel labels
from packets before sending the packets to each other. If a BGP LSP label in a packet carries a
QoS priority different from that in the outer MPLS tunnel label in the packet, you can configure
the core ASBR or AGG ASBR to determine whether the BGP LSP label inherits the QoS priority
carried in the outer MPLS tunnel label to be removed.
Procedure
Step 1 Run:
system-view
The mode in which a BGP label inherits the QoS priority in the outer tunnel label is specified.
You can configure either of the following parameters:
l uniform: The BGP label inherits the QoS priority carried in the outer MPLS tunnel label.
l pipe: The QoS priority carried in the BGP label does not change, and the BGP label does
not inherit the QoS priority carried in the outer MPLS tunnel label.
The default QoS priority inheriting mode varies according to the outer MPLS tunnel type:
l LDP: By default, the BGP label inherits the QoS priority carried in the outer MPLS tunnel
label.
l TE: By default, the BGP label does not inherit the QoS priority carried in the outer MPLS
tunnel label.
----End
Context
On an inter-AS seamless MPLS+HVPN network that has protection switching enabled, if a link
or node fails, traffic switches to a backup path, which implements uninterrupted traffic
transmission.
NOTE
If both LDP FRR and BGP Auto FRR functions are configured, only BGP Auto FRR takes effect.
Procedure
l Use an LSP attribute template to configure CR-LSP hot standby.
1. Run:
system-view
The hot-standby CR-LSP is established using the specified CR-LSP attribute template.
NOTE
On the same interface, a maximum of 10 LDP FRR bypass tunnels with different priorities can
be configured, and only one LDP FRR bypass tunnel can be established. The smaller the priority
value, the higher the priority. The default priority value is 50.
l Configure LDP Auto FRR.
1. Run:
system-view
NOTE
LDP Auto FRR depends on IGP Auto FRR. After the frr (IS-IS view) or frr (OSPF view)
command is used to enable IGP Auto FRR, LDP Auto FRR will be automatically enabled. To
change a policy for triggering backup LDP LSP establishment, run the auto-frr lsp-trigger
command.
The auto-frr lsp-trigger command is affected by the lsp-trigger command. If both the auto-
frr lsp-trigger command and the lsp-trigger command are run, the established backup LSPs
satisfy both the policy for triggering LDP LSP establishment and the policy for triggering
backup LDP LSP establishment.
During the LDP GR process, changing a policy for triggering the backup LDP LSP
establishment is not allowed.
l Configure BGP Auto FRR.
1. Run:
system-view
Labeled BGP IPv4 unicast routes can participate in route selection only when their
next hops are iterated to tunnels.
l Configure VPN manual FRR.
1. Run:
system-view
A VPN route is configured to participate in route selection only when its next hop is
iterated to a tunnel. This configuration ensures that packets are not lost during a traffic
switchback.
l Configure VPN Auto FRR.
1. Run:
system-view
A VPN route is configured to participate in route selection only when its next hop is
iterated to a tunnel. This configuration ensures that packets are not lost during a traffic
switchback.
----End
Prerequisites
Inter-AS seamless MPLS+HVPN has been configured.
Procedure
l Run the display bgp vpnv4 all peer command on an AGG or MASG to check BGP peer
relationship information.
l Run the display bgp vpnv4 all routing-table command to check the VPNv4 routing table
on an AGG or MASG.
l Run the display bgp routing-table label command on an AGG, AGG ASBR, core ASBR,
or MASG to check label information of IPv4 routes.
Example
# Run the display bgp vpnv4 all peer command on an AGG or MASG. The command output
shows that an EBGP peer relationship between two PEs is Established.
Run the display bgp vpnv4 all routing-table command on an AGG or MASG. The command
output shows that BGP VPNv4 routes and BGP VPN instance routes are reachable on the PE,
not on the ASBR.
<HUAWEI> display bgp vpnv4 all routing-table
Run the display bgp routing-table label command on an AGG, AGG ASBR, core ASBR, or
MASG to view information about labels of IPv4 routes.
<HUAWEI> display bgp routing-table label
Total Number of Routes: 2
BGP Local router ID is 2.2.2.9
Status codes: * - valid, > - best, d - damped,
h - history, i - internal, s - suppressed, S - Stale
Origin : i - IGP, e - EGP, ? - incomplete
Network NextHop In/Out Label
*> 1.1.1.9 172.1.1.2 15360/NULL
*> 4.4.4.9 192.1.1.2 15361/15361
Run the display ip routing-table vpn-instance command on an AGG or MASG. The command
output shows that the VRF table has reachable VPN routes.
Context
Run the following commands in any view of a BGP LSP endpoint node to check the connectivity
and reachability of a BGP LSP.
Procedure
l Run the ping lsp [ -a source-ip | -c count | -exp exp-value | -h ttl-value | -m interval | -r
reply-mode | -s packet-size | -t time-out | -v ] * bgp destination-address mask-length [ ip-
address ] command to check BGP LSP connectivity.
l Run the tracert lsp [ -a source-ip | -exp exp-value | -h ttl-value | -r reply-mode | -t time-
out | -v ] * bgp destination-address mask-length [ ip-address ] [ nexthop nexthop-
address | draft6 ] command to perform an LSP tracert operation on a BGP LSP.
----End
Networking Requirements
In Figure 6-7, the access, aggregation, and core layers belong to the same AS. NodeBs need to
communicate with an MME or SGW over a VPN. To meet this requirement, intra-AS seamless
MPLS can be configured.
NodeB
MME/
SGW
Addresses of interfaces are planned for CSGs, AGGs, core ABRs, and MASGs shown in Figure
6-8.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IGP protocols at the access, aggregation, and core layers to implement network
connectivity at each layer.
2. Configure MPLS and MPLS LDP and establish MPLS LSPs on devices.
3. Establish IBGP peer relationships at each layer and enable devices to exchange labeled
routes.
4. Configure each AGG and core ABR as RRs to help a CSG and MASG obtain the route
destined for each other's loopback interface.
5. Configure a routing policy to control label distribution for a BGP LSP to be established on
each device. The egress of the BGP LSP to be established needs to assign an MPLS label
to the route advertised to an upstream node. If a transit node receives a labeled IPv4 route
from downstream, the downstream node must re-assign an MPLS label to the transit node.
Data Preparation
To complete the configuration, you need the following data:
l OSPF process ID (1) at the access layer, IS-IS process ID (1) at the aggregation layer, and
OSPF process ID (2) at the core layer
l MPLS LSR IDs: 1.1.1.1 for the CSG, 2.2.2.2 for the AGG, 3.3.3.3 for the core ABR, and
4.4.4.4 for the MASG
l Name of a routing policy (policy1)
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and its mask to every physical interface; configure a loopback interface
address as an LSR ID on every device shown in Figure 6-8; configure OSPF and IS-IS to
advertise the route to the network segment of each interface and a host route to each loopback
interface address (LSR ID). For configuration details, see Configuration Files in this section.
Step 2 Enable MPLS and LDP globally on each device.
# Configure the CSG.
[CSG] mpls lsr-id 1.1.1.1
[CSG] mpls
[CSG-mpls] quit
[CSG] mpls ldp
[CSG-mpls-ldp] quit
[CSG] interface GigabitEthernet 1/0/0
[CSG-GigabitEthernet1/0/0] mpls
[CSG-GigabitEthernet1/0/0] mpls ldp
[CSG-GigabitEthernet1/0/0] quit
Step 3 Establish IBGP peer relationships at each layer and enable devices to exchange labeled routes.
# Configure the CSG.
[CSG] bgp 100
[CSG-bgp] peer 2.2.2.2 as-number 100
[CSG-bgp] peer 2.2.2.2 connect-interface LoopBack 1
[CSG-bgp] peer 2.2.2.2 label-route-capability
[CSG-bgp] network 1.1.1.1 32
[CSG-bgp] quit
Step 4 Configure each AGG and core ABR as RRs to help a CSG and MASG obtain the route destined
for each other's loopback interface.
# Configure a routing policy for advertising routes matching Route-Policy conditions to the
CSG's BGP peer.
[CSG] route-policy policy1 permit node 1
[CSG-route-policy] apply mpls-label
[CSG-route-policy] quit
[CSG] bgp 100
[CSG-bgp] peer 2.2.2.2 route-policy policy1 export
[CSG-bgp] quit
[CSG] quit
Repeat this step for the MASG. For configuration details, see Configuration Files in this section.
# Configure a routing policy for advertising routes matching Route-Policy conditions to the
AGG's BGP peer.
[AGG] route-policy policy1 permit node 1
[AGG-route-policy] if-match mpls-label
[AGG-route-policy] apply mpls-label
[AGG-route-policy] quit
[AGG] bgp 100
[AGG-bgp] peer 1.1.1.1 route-policy policy1 export
[AGG-bgp] peer 3.3.3.3 route-policy policy1 export
[AGG-bgp] quit
Repeat this step for the core ABR. For configuration details, see Configuration Files in this
section.
After completing the configuration, run the display ip routing-table command on a CSG or
MASG to view information about a route to the BGP peer's loopback interface.
Run the display mpls lsp command on the CSG or MASG to view LSP information.
Run the ping lsp command on the CSG or MASG to check BGP LSP connectivity.
--- FEC: BGP LABLED IPV4 PREFIX 4.4.4.4/32 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 70/112/130 ms
----End
Configuration Files
l CSG configuration file
#
sysname CSG
#
mpls lsr-id 1.1.1.1
mpls
#
mpls ldp
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 20.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
bgp 100
peer 2.2.2.2 as-number 100
peer 2.2.2.2 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
network 1.1.1.1 255.255.255.255
peer 2.2.2.2 enable
peer 2.2.2.2 route-policy policy1 export
peer 2.2.2.2 label-route-capability
#
ospf 1
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 20.1.1.0 0.0.0.255
#
route-policy policy1 permit node 1
apply mpls-label
#
return
Networking Requirements
In Figure 6-9, the access and aggregation layers belong to one AS, and the core layer belongs
to another AS. NodeBs need to communicate with an MME or SGW over a VPN. To meet this
requirement, inter-AS seamless MPLS can be configured.
AS 100 AS 200
AGG Core
CSG1 AGG1 ASBR1 ASBR1 MASG1
NodeB
MME/
SGW
Addresses of interfaces are planned for the CSGs, AGGs, AGG ASBRs, core ASBRs, and
MASGs shown in Figure 6-10.
AS 100 AS 200
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IGP protocols at the access, aggregation, and core layers to implement network
connectivity at each layer.
2. Configure MPLS and MPLS LDP and establish MPLS LSPs at the access, aggregation,
and core layers.
3. Establish IBGP peer relationships at each layer and enable devices to exchange labeled
routes.
4. Configure an EBGP peer relationship between each pair of an AGG ASBR and core ASBR
and enable these devices to exchange labeled routes across ASs.
5. Configure each AGG as an RR to help the CSG and MASG obtain the route destined for
each other's loopback interface.
6. Configure a routing policy to control label distribution for a BGP LSP to be established on
each device. The egress of the BGP LSP to be established needs to assign an MPLS label
to the route advertised to an upstream node. If a transit node receives a labeled IPv4 route
from downstream, the downstream node must re-assign an MPLS label to the transit node.
Data Preparation
To complete the configuration, you need the following data:
l OSPF process ID (1) at the access layer, IS-IS process ID (1) at the aggregation layer, and
OSPF process ID (2) at the core layer
l MPLS LSR IDs: 1.1.1.1 for the CSG, 2.2.2.2 for the AGG, 3.3.3.3 for the AGG ASBR,
4.4.4.4 for the core ASBR, and 5.5.5.5 for the MASG.
l Name of a routing policy (policy1)
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and its mask to every physical interface; configure a loopback interface
address as an LSR ID on every device shown in Figure 6-10; configure OSPF and IS-IS to
advertise the route to the network segment of each interface and a host route to each loopback
interface address (LSR ID). For configuration details, see Configuration Files in this section.
Step 3 Establish IBGP peer relationships at each layer and enable devices to exchange labeled routes.
# Configure the CSG.
[CSG] bgp 100
[CSG-bgp] peer 2.2.2.2 as-number 100
[CSG-bgp] peer 2.2.2.2 connect-interface LoopBack 1
[CSG-bgp] peer 2.2.2.2 label-route-capability
[CSG-bgp] network 1.1.1.1 32
[CSG-bgp] quit
Step 4 Establish an EBGP peer relationship between each pair of an AGG ASBR and core ASBR and
enable these devices to exchange labeled routes.
# Configure the AGG ASBR.
[AGG ASBR] interface GigabitEthernet 2/0/0
[AGG ASBR-GigabitEthernet2/0/0] ip address 20.3.1.1 24
[AGG ASBR-GigabitEthernet2/0/0] mpls
[AGG ASBR-GigabitEthernet2/0/0] quit
[AGG ASBR] bgp 100
[AGG ASBR-bgp] peer 20.3.1.2 as-number 200
[AGG ASBR-bgp] peer 20.3.1.2 label-route-capability check-tunnel-reachable
[AGG ASBR-bgp] quit
Step 5 Configure each AGG as an RR to help the CSG and MASG obtain the route destined for each
other's loopback interface.
# Configure the AGG.
[AGG] bgp 100
[AGG-bgp] peer 1.1.1.1 reflect-client
[AGG-bgp] peer 1.1.1.1 next-hop-local
[AGG-bgp] peer 3.3.3.3 reflect-client
[AGG-bgp] peer 3.3.3.3 next-hop-local
[AGG-bgp] quit
Repeat this step for the MASG. For configuration details, see Configuration Files in this section.
# Configure a routing policy for advertising routes matching Route-Policy conditions to the
AGG's BGP peer.
[AGG] route-policy policy1 permit node 1
[AGG-route-policy] if-match mpls-label
[AGG-route-policy] apply mpls-label
[AGG-route-policy] quit
[AGG] bgp 100
[AGG-bgp] peer 1.1.1.1 route-policy policy1 export
[AGG-bgp] peer 3.3.3.3 route-policy policy1 export
[AGG-bgp] quit
Repeat this step for the AGG ASBR and core ASBR. For configuration details, see
Configuration Files in this section.
After completing the configuration, run the display ip routing-table command on a CSG or
MASG to view information about a route to the BGP peer's loopback interface.
Run the display mpls lsp command on the CSG or MASG to view LSP information.
Run the ping lsp command on the CSG or MASG to check BGP LSP connectivity.
LSP PING FEC: BGP LABLED IPV4 PREFIX 5.5.5.5/32/ : 100 data bytes, press CTRL_C
to break
Reply from 5.5.5.5: bytes=100 Sequence=1 time=130 ms
Reply from 5.5.5.5: bytes=100 Sequence=2 time=90 ms
Reply from 5.5.5.5: bytes=100 Sequence=3 time=110 ms
Reply from 5.5.5.5: bytes=100 Sequence=4 time=120 ms
Reply from 5.5.5.5: bytes=100 Sequence=5 time=130 ms
--- FEC: BGP LABLED IPV4 PREFIX 5.5.5.5/32 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 90/116/130 ms
----End
Configuration Files
l CSG configuration file
#
sysname CSG
#
mpls lsr-id 1.1.1.1
mpls
#
mpls ldp
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 20.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
bgp 100
peer 2.2.2.2 as-number 100
peer 2.2.2.2 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
network 1.1.1.1 255.255.255.255
peer 2.2.2.2 enable
peer 2.2.2.2 route-policy policy1 export
peer 2.2.2.2 label-route-capability
#
ospf 1
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 20.1.1.0 0.0.0.255
#
route-policy policy1 permit node 1
apply mpls-label
#
return
isis 1
network-entity 10.0000.0000.0000.0010.00
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 20.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 20.2.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
bgp 100
peer 1.1.1.1 as-number 100
peer 1.1.1.1 connect-interface LoopBack1
peer 3.3.3.3 as-number 100
peer 3.3.3.3 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
peer 1.1.1.1 enable
peer 1.1.1.1 route-policy policy1 export
peer 1.1.1.1 reflect-client
peer 1.1.1.1 next-hop-local
peer 1.1.1.1 label-route-capability
peer 3.3.3.3 enable
peer 3.3.3.3 route-policy policy1 export
peer 3.3.3.3 reflect-client
peer 3.3.3.3 next-hop-local
peer 3.3.3.3 label-route-capability
#
ospf 1
area 0.0.0.0
network 2.2.2.2 0.0.0.0
network 20.1.1.0 0.0.0.255
#
route-policy policy1 permit node 1
if-match mpls-label
apply mpls-label
#
return
mpls ldp
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 20.3.1.1 255.255.255.0
mpls
#
interface LoopBack1
ip address 3.3.3.3 255.255.255.255
isis enable 1
#
bgp 100
peer 2.2.2.2 as-number 100
peer 2.2.2.2 connect-interface LoopBack1
peer 20.3.1.2 as-number 200
#
ipv4-family unicast
undo synchronization
peer 2.2.2.2 enable
peer 2.2.2.2 route-policy policy1 export
peer 2.2.2.2 label-route-capability
peer 20.3.1.2 enable
peer 20.3.1.2 route-policy policy1 export
peer 20.3.1.2 label-route-capability check-tunnel-reachable
#
route-policy policy1 permit node 1
if-match mpls-label
apply mpls-label
#
return
#
ospf 2
area 0.0.0.0
network 4.4.4.4 0.0.0.0
network 20.4.1.0 0.0.0.255
#
route-policy policy1 permit node 1
if-match mpls-label
apply mpls-label
#
return
Networking Requirements
In Figure 6-11, the access and aggregation layers belong to one AS, and the core layer belongs
to another AS. Before VPN services is provisioned, the inter-AS seamless MPLS+HVPN
networking can be deployed. This networking allows NodeBs and the RNC to communicate and
has low networking construction costs because of HVPN techniques. An HVPN connection
between each pair of a CSG and AGG is established, and an inter-AS seamless MPLS LSP
between each pair of an AGG and MASG is established.
AS 100 AS 200
AGG Core
CSG1 AGG1 ASBR1 ASBR1 MASG1
NodeB
MME/
SGW
Access
Aggregation Core
HVPN
Addresses of interfaces are planned for the CSGs, AGGs, AGG ASBRs, core ASBRs, and
MASGs shown in Figure 6-12.
AS 100 AS 200
GE2/0/0
10.2.1.1/24
MME/
SGW
NodeB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IGP protocols at the access, aggregation, and core layers to implement network
connectivity at each layer.
2. Configure MPLS and MPLS LDP and establish MPLS LSPs at the access, aggregation,
and core layers.
3. Establish IBGP peer relationships at the aggregation and core layers and enable devices to
exchange labeled routes.
4. Configure an EBGP peer relationship between each pair of an AGG ASBR and core ASBR
and enable these devices to exchange labeled routes across ASs.
5. Configure a routing policy to control label distribution for a BGP LSP to be established on
each device, except CGSs. The egress of the BGP LSP to be established needs to assign an
MPLS label to the route advertised to an upstream node. If a transit node receives a labeled
IPv4 route from downstream, the downstream node must re-assign an MPLS label to the
transit node.
6. Configure an MP-EBGP peer relationship between an AGG and MASG to allow these
devices to exchange VPNv4 route information.
7. Configure an MP-IBGP peer relationship between an CSG and AGG to allow these devices
to exchange VPNv4 route information.
8. Configure VPN instances on each CSG, AGG, and MASG.
9. Configure a default route and an IP address prefix list on each AGG so that the AGG only
advertises the default route to its directly connected CSG.
Data Preparation
To complete the configuration, you need the following data:
l OSPF process ID (1) at the access layer, IS-IS process ID (1) at the aggregation layer, and
OSPF process ID (2) at the core layer
l MPLS LSR IDs: 1.1.1.1 for the CSG, 2.2.2.2 for the AGG, 3.3.3.3 for the AGG ASBR,
4.4.4.4 for the core ASBR, and 5.5.5.5 for the MASG.
l Name of a routing policy (policy1)
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and its mask to every physical interface; configure a loopback interface
address as an LSR ID on every device shown in Figure 6-12; configure OSPF and IS-IS to
advertise the route to the network segment of each interface and a host route to each loopback
interface address (LSR ID). For configuration details, see Configuration Files in this section.
Step 2 Enable MPLS and LDP globally on each device.
# Configure the CSG.
[CSG] mpls lsr-id 1.1.1.1
[CSG] mpls
[CSG-mpls] quit
[CSG] mpls ldp
[CSG-mpls-ldp] quit
[CSG] interface GigabitEthernet 1/0/0
[CSG-GigabitEthernet1/0/0] mpls
[CSG-GigabitEthernet1/0/0] mpls ldp
[CSG-GigabitEthernet1/0/0] quit
Step 3 Establish IBGP peer relationships at the aggregation and core layers and enable devices to
exchange labeled routes.
# Configure the AGG.
[AGG] bgp 100
[AGG-bgp] peer 3.3.3.3 as-number 100
[AGG-bgp] peer 3.3.3.3 connect-interface LoopBack 1
[AGG-bgp] peer 3.3.3.3 label-route-capability
[AGG-bgp] network 2.2.2.2 32
[AGG-bgp] quit
Step 4 Establish an EBGP peer relationship between each pair of an AGG ASBR and core ASBR and
enable these devices to exchange labeled routes.
# Configure the AGG ASBR.
[AGG ASBR] interface GigabitEthernet 2/0/0
[AGG ASBR-GigabitEthernet2/0/0] ip address 20.3.1.1 24
[AGG ASBR-GigabitEthernet2/0/0] mpls
[AGG ASBR-GigabitEthernet2/0/0] quit
[AGG ASBR] bgp 100
[AGG ASBR-bgp] peer 20.3.1.2 as-number 200
[AGG ASBR-bgp] peer 20.3.1.2 label-route-capability check-tunnel-reachable
[AGG ASBR-bgp] quit
Step 5 Configure an MP-EBGP peer relationship between each pair of an AGG and MASG.
# Configure the AGG.
[AGG] bgp 100
[AGG-bgp] peer 5.5.5.5 as-number 200
[AGG-bgp] peer 5.5.5.5 connect-interface LoopBack 1
[AGG-bgp] peer 5.5.5.5 ebgp-max-hop 10
[AGG-bgp] ipv4-family vpnv4
[AGG-bgp-af-vpnv4] peer 5.5.5.5 enable
[AGG-bgp-af-vpnv4] quit
[AGG-bgp] quit
Repeat this step for the MASG. For configuration details, see Configuration Files in this section.
# Configure a routing policy for advertising routes matching Route-Policy conditions to the
AGG ASBR's BGP peer.
[AGG ASBR] route-policy policy1 permit node 1
[AGG ASBR-route-policy] if-match mpls-label
[AGG ASBR-route-policy] apply mpls-label
[AGG ASBR-route-policy] quit
[AGG ASBR] bgp 100
[AGG ASBR-bgp] peer 2.2.2.2 route-policy policy1 export
[AGG ASBR-bgp] peer 20.3.1.2 route-policy policy1 export
[AGG ASBR-bgp] quit
Repeat this step for the core ASBR. For configuration details, see Configuration Files in this
section.
After completing the preceding configurations, run the ping lsp command on an AGG or MASG.
The command output shows that the AGG and MASG can ping each other. This indicates that
the BGP LSP between the ASS and MASG has been established.
The following example uses the command output on the AGG.
<AGG> ping lsp bgp 5.5.5.5 32
LSP PING FEC: BGP LABLED IPV4 PREFIX 5.5.5.5/32/ : 100 data bytes, press CTRL_C
to break
Reply from 5.5.5.5: bytes=100 Sequence=1 time=870 ms
Reply from 5.5.5.5: bytes=100 Sequence=2 time=40 ms
Reply from 5.5.5.5: bytes=100 Sequence=3 time=110 ms
Reply from 5.5.5.5: bytes=100 Sequence=4 time=80 ms
Reply from 5.5.5.5: bytes=100 Sequence=5 time=110 ms
--- FEC: BGP LABLED IPV4 PREFIX 5.5.5.5/32 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 40/242/870 ms
Step 7 Configure an MP-EBGP peer relationship between each pair of a CSG and MASG.
# Configure the CSG.
[CSG] bgp 100
[CSG-bgp] peer 2.2.2.2 as-number 100
[CSG-bgp] peer 2.2.2.2 connect-interface LoopBack 1
Step 8 Configure a VPN instance and bind an interface of each device to the VPN instance.
# Configure the CSG.
[CSG] ip vpn-instance vpn1
[CSG-vpn-instance-vpn1] ipv4-family
[CSG-vpn-instance-vpn1-af-ipv4] route-distinguisher 100:1
[CSG-vpn-instance-vpn1-af-ipv4] vpn-target 1:1
[CSG-vpn-instance-vpn1-af-ipv4] quit
[CSG-vpn-instance-vpn1] quit
[CSG] interface GigabitEthernet 2/0/0
[CSG-GigabitEthernet2/0/0] ip binding vpn-instance vpn1
[CSG-GigabitEthernet2/0/0] ip address 10.1.1.1 255.255.255.0
[CSG-GigabitEthernet2/0/0] quit
[CSG] bgp 100
[CSG-bgp] ipv4-family vpn-instance vpn1
[CSG-bgp-vpn1] import-route direct
[CSG-bgp-vpn1] quit
[CSG-bgp] quit
[CSG] quit
Repeat this step for the MASG. For configuration details, see Configuration Files in this section.
# Configure the AGG.
[AGG] ip vpn-instance vpn1
[AGG-vpn-instance-vpn1] ipv4-family
[AGG-vpn-instance-vpn1-af-ipv4] route-distinguisher 100:1
[AGG-vpn-instance-vpn1-af-ipv4] vpn-target 1:1
[AGG-vpn-instance-vpn1-af-ipv4] quit
[AGG-vpn-instance-vpn1] quit
Step 9 Configure a default route and an IP address prefix list on each AGG so that the AGG only
advertises the default route to its directly connected CSG.
[AGG] ip route-static vpn-instance vpn1 0.0.0.0 0.0.0.0 NULL0
[AGG] ip ip-prefix default index 10 permit 0.0.0.0 0
[AGG] bgp 100
[AGG-bgp] ipv4-family vpnv4
[AGG-bgp-af-vpnv4] peer 1.1.1.1 ip-prefix default export
[AGG-bgp-af-vpnv4] quit
[AGG-bgp] ipv4-family vpn-instance vpn1
[AGG-bgp-vpn1] network 0.0.0.0 0
[AGG-bgp-vpn1] quit
[AGG-bgp] quit
----End
Configuration Files
l CSG configuration file
#
sysname CSG
#
ip vpn-instance vpn1
ipv4-family
route-distinguisher 100:1
vpn-target 1:1 export-extcommunity
vpn-target 1:1 import-extcommunity
#
mpls lsr-id 1.1.1.1
mpls
#
mpls ldp
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 20.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
undo shutdown
ip binding vpn-instance vpn1
ip address 10.1.1.1 255.255.255.0
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
bgp 100
peer 2.2.2.2 as-number 100
peer 2.2.2.2 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
peer 2.2.2.2 enable
#
ipv4-family vpnv4
policy vpn-target
peer 2.2.2.2 enable
#
ipv4-family vpn-instance vpn1
import-route direct
#
ospf 1
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 20.1.1.0 0.0.0.255
#
route-policy policy1 permit node 1
apply mpls-label
#
return
Networking Requirements
Figure 6-13 illustrates the P2MP L2VPN enterprise service networking. The access,
aggregation, and core layers belong to the same AS. NodeBs need to communicate over a VPN.
To meet this requirement, intra-AS seamless MPLS can be configured. Seamless MPLS can
transmit L2VPN services, including VLL, PWE3, and VPLS. In this example, HVPLS is
configured at the access layer, and an intra-seamless MPLS LSP is established across the
aggregation and core layers to transmit the L2VPN service.
Core
GE2/0/0
0/0 3
Core Core GE
GE ABR2 ABR4
3/ /0
0/ 3 /0
0
GE2/0/0 GE1/0/0 GE
Aggregation Aggregation
GE1/0/0 GE2/0/0
GE2/0/0
GE1/0/0
GE2/0/0 GE1/0/0
GE3/0/0 GE3/0/0
AGG2 AGG4
GE3/0/0 GE3/0/0
GE1/0/0 GE1/0/0 GE2/0/0 GE2/0/0
AGG1 se AGG3
PW dary
Access Access
PW ary
co W
pr
n
im
nd
m
P
co
PW
pri
a ry
a ry
se
GE1/0/0 GE1/0/0
NodeB1 NodeB2
GE3/0/0 - GE3/0/0 -
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IGP protocols at the access, aggregation, and core layers to implement network
connectivity at each layer.
2. Configure MPLS and MPLS LDP and establish MPLS LSPs on devices.
3. Establish IBGP peer relationships at the aggregation and core layers and enable devices to
exchange labeled routes.
4. Configure each core ABR as an RR to help an AGG obtain the route destined for the remote
AGG's loopback interface.
5. Configure a routing policy to control label distribution for a BGP LSP to be established on
each core ABR and AGG. The egress of the BGP LSP to be established needs to assign an
MPLS label to the route advertised to an upstream node. If a transit node receives a labeled
IPv4 route from downstream, the downstream node must re-assign an MPLS label to the
transit node.
6. Configure HVPLS at the access layer.
Data Preparation
To complete the configuration, you need the following data:
l OSPF process IDs (1 and 2) at the access layer, IS-IS process IDs (1 and 2) at the aggregation
layer, and OSPF process ID (3) at the core layer
l MPLS LSR IDs: 1.1.1.1 for CSG1, 2.2.2.2 for AGG1, 3.3.3.3 for AGG2, 4.4.4.4 for core
ABR1, 5.5.5.5 for core ABR2, 6.6.6.6 for core ABR3, 7.7.7.7 for core ABR4, 8.8.8.8 for
AGG3, 9.9.9.9 for AGG4, and 10.10.10.10 for CSG2
l Name of a routing policy (policy1)
l VSI name (1) and VSI IDs (100 and 200)
Procedure
Step 1 Assign an IP address to each interface.
Assign an IP address and its mask to every physical interface; configure a loopback interface
address as an LSR ID on every device shown in Figure 6-13; configure OSPF and IS-IS to
advertise the route to the network segment of each interface and a host route to each loopback
interface address (LSR ID). For configuration details, see Configuration Files in this section.
Step 3 Establish IBGP peer relationships at the aggregation and core layers and enable devices to
exchange labeled routes.
# Configure AGG1.
[AGG1] bgp 100
[AGG1-bgp] peer 4.4.4.4 as-number 100
[AGG1-bgp] peer 4.4.4.4 connect-interface LoopBack 1
[AGG1-bgp] peer 4.4.4.4 label-route-capability
[AGG1-bgp] peer 5.5.5.5 as-number 100
[AGG1-bgp] peer 5.5.5.5 connect-interface LoopBack 1
[AGG1-bgp] peer 5.5.5.5 label-route-capability
[AGG1-bgp] quit
Repeat this step on AGG2, AGG3, and AGG4. For configuration details, see Configuration
Files in this section.
Repeat this step on core ABR2, core ABR3, and core ABR4. For configuration details, see
Configuration Files in this section.
Step 4 Configure each core ABR as an RR to help an AGG obtain the route destined for the remote
AGG's loopback interface. In the following example, the configuration on core ABR1 is used.
[Core ABR1] bgp 100
[Core ABR1-bgp] peer 2.2.2.2 reflect-client
[Core ABR1-bgp] peer 2.2.2.2 next-hop-local
[Core ABR1-bgp] peer 3.3.3.3 reflect-client
[Core ABR1-bgp] peer 3.3.3.3 next-hop-local
[Core ABR1-bgp] peer 6.6.6.6 reflect-client
[Core ABR1-bgp] peer 6.6.6.6 next-hop-local
[Core ABR1-bgp] peer 7.7.7.7 reflect-client
[Core ABR1-bgp] peer 7.7.7.7 next-hop-local
[Core ABR1-bgp] quit
# Configure a routing policy for advertising routes matching Route-Policy conditions to the core
AGG's BGP peer. In the following example, the configuration on core ABR1 is used.
[Core ABR1] route-policy policy1 permit node 1
[Core ABR1-route-policy] if-match mpls-label
[Core ABR1-route-policy] apply mpls-label
[Core ABR1-route-policy] quit
[Core ABR1] bgp 100
[Core ABR1-bgp] peer 2.2.2.2 route-policy policy1 export
[Core ABR1-bgp] peer 3.3.3.3 route-policy policy1 export
[Core ABR1-bgp] peer 6.6.6.6 route-policy policy1 export
[Core ABR1-bgp] peer 7.7.7.7 route-policy policy1 export
[Core ABR1-bgp] quit
Run the ping lsp command on an AGG to check BGP LSP connectivity.
The following example uses the command output on AGG1.
<AGG1> ping lsp bgp 8.8.8.8 32
LSP PING FEC: BGP LABLED IPV4 PREFIX 8.8.8.8/32/ : 100 data bytes, press CTRL_C
to break
Reply from 8.8.8.8: bytes=100 Sequence=1 time=500 ms
Reply from 8.8.8.8: bytes=100 Sequence=2 time=50 ms
Reply from 8.8.8.8: bytes=100 Sequence=3 time=60 ms
Reply from 8.8.8.8: bytes=100 Sequence=4 time=60 ms
Reply from 8.8.8.8: bytes=100 Sequence=5 time=50 ms
--- FEC: BGP LABLED IPV4 PREFIX 8.8.8.8/32 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 50/144/500 ms
Repeat this step for CSG2. For configuration details, see Configuration Files in this
section.
# Configure AGG1.
[AGG1] mpls ldp remote-peer 1.1.1.1
[AGG1-mpls-ldp-remote-1.1.1.1] remote-ip 1.1.1.1
[AGG1-mpls-ldp-remote-1.1.1.1] quit
Repeat this step on AGG2, AGG3, and AGG4. For configuration details, see
Configuration Files in this section.
2. Configure a remote MPLS LDP session between each AGG and its remote AGG.
# Configure AGG1.
[AGG1] mpls ldp remote-peer 8.8.8.8
[AGG1-mpls-ldp-remote-1.1.1.1] remote-ip 8.8.8.8
[AGG1-mpls-ldp-remote-1.1.1.1] quit
[AGG1] mpls ldp remote-peer 9.9.9.9
[AGG1-mpls-ldp-remote-1.1.1.1] remote-ip 9.9.9.9
[AGG1-mpls-ldp-remote-1.1.1.1] quit
Repeat this step on AGG2, AGG3, and AGG4. For configuration details, see
Configuration Files in this section.
3. Configure PW redundancy and a spoke PW.
# Configure CSG1.
[CSG1] mpls l2vpn
[CSG1-l2vpn] quit
[CSG1] interface gigabitethernet 3/0/0
[CSG1-GigabitEthernet3/0/0] undo shutdown
[CSG1-GigabitEthernet3/0/0] quit
[CSG1] interface gigabitethernet 3/0/0.10
[CSG1-GigabitEthernet3/0/0.10] vlan-type dot1q 10
[CSG1-GigabitEthernet3/0/0.10] mpls l2vc 2.2.2.2 100
[CSG1-GigabitEthernet3/0/0.10] mpls l2vc 3.3.3.3 200 secondary
[CSG1-GigabitEthernet3/0/0.10] mpls l2vpn redundancy master
[CSG1-GigabitEthernet3/0/0.10] quit
[CSG1] quit
Repeat this step for CSG2. For configuration details, see Configuration Files in this
section.
# Configure AGG1.
[AGG1] mpls l2vpn
[AGG1-l2vpn] quit
[AGG1] vsi 1 static
[AGG1-vsi-1] pwsignal ldp
Repeat this step on AGG2, AGG3, and AGG4. For configuration details, see
Configuration Files in this section.
Step 7 Verify the configuration.
# After completing the preceding configurations, run the display mpls l2vc brief command on
a CSG or AGG. The command output shows that VC state is up.
The following example uses the command output on CSG1.
<CSG1> display mpls l2vc brief
Total LDP VC : 2 2 up 0 down
Run the display vsi name command on an AGG. The command output shows that the VSI
named 1 status is up.
The following example uses the command output on AGG1.
<AGG1> display vsi name 1
Vsi Mem PW Mac Encap Mtu Vsi
Name Disc Type Learn Type Value State
--------------------------------------------------------------------------
1 static ldp unqualify vlan 1500 up
Assign IP address to NodeBs and run the ping command to check the connectivity of the link
between the NodeBs.
<NodeB1> ping 100.1.1.2
PING 100.1.1.2: 56 data bytes, press CTRL_C to break
Reply from 100.1.1.2: bytes=56 Sequence=1 ttl=255 time=190 ms
Reply from 100.1.1.2: bytes=56 Sequence=2 ttl=255 time=170 ms
Reply from 100.1.1.2: bytes=56 Sequence=3 ttl=255 time=160 ms
Reply from 100.1.1.2: bytes=56 Sequence=4 ttl=255 time=160 ms
Reply from 100.1.1.2: bytes=56 Sequence=5 ttl=255 time=160 ms
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 160/168/190 ms
----End
Configuration Files
l CSG1 configuration file
#
sysname CSG1
#
mpls lsr-id 1.1.1.1
mpls
#
mpls l2vpn
#
mpls ldp
#
mpls ldp remote-peer 2.2.2.2
remote-ip 2.2.2.2
#
mpls ldp remote-peer 3.3.3.3
remote-ip 3.3.3.3
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 172.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 172.2.1.1 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet3/0/0
undo shutdown
#
interface GigabitEthernet3/0/0.10
vlan-type dot1q 10
mpls l2vc 2.2.2.2 100
mpls l2vc 3.3.3.3 200 secondary
mpls l2vpn redundancy master
#
interface LoopBack1
ip address 1.1.1.1 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.1 0.0.0.0
network 172.1.1.0 0.0.0.255
network 172.2.1.0 0.0.0.255
#
return
#
vsi 1 static
pwsignal ldp
vsi-id 100
peer 8.8.8.8 negotiation-vc-id 8000
peer 9.9.9.9 negotiation-vc-id 8000
peer 1.1.1.1 upe
#
mpls ldp
#
mpls ldp remote-peer 1.1.1.1
remote-ip 1.1.1.1
#
mpls ldp remote-peer 8.8.8.8
remote-ip 8.8.8.8
#
mpls ldp remote-peer 9.9.9.9
remote-ip 9.9.9.9
#
isis 1
network-entity 10.0000.0000.0001.00
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 172.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface GigabitEthernet3/0/0
undo shutdown
ip address 172.3.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack1
ip address 2.2.2.2 255.255.255.255
isis enable 1
#
bgp 100
peer 4.4.4.4 as-number 100
peer 4.4.4.4 connect-interface LoopBack1
peer 5.5.5.5 as-number 100
peer 5.5.5.5 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
network 2.2.2.2 255.255.255.255
peer 4.4.4.4 enable
peer 4.4.4.4 route-policy policy1 export
peer 4.4.4.4 label-route-capability
peer 5.5.5.5 enable
peer 5.5.5.5 route-policy policy1 export
peer 5.5.5.5 label-route-capability
#
ospf 1
area 0.0.0.0
network 2.2.2.2 0.0.0.0
network 172.1.1.0 0.0.0.255
network 172.3.1.0 0.0.0.255
#
route-policy policy1 permit node 1
apply mpls-label
#
return
isis enable 1
#
bgp 100
peer 2.2.2.2 as-number 100
peer 2.2.2.2 connect-interface LoopBack1
peer 3.3.3.3 as-number 100
peer 3.3.3.3 connect-interface LoopBack1
peer 6.6.6.6 as-number 100
peer 6.6.6.6 connect-interface LoopBack1
peer 7.7.7.7 as-number 100
peer 7.7.7.7 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
peer 2.2.2.2 enable
peer 2.2.2.2 route-policy policy1 export
peer 2.2.2.2 reflect-client
peer 2.2.2.2 next-hop-local
peer 2.2.2.2 label-route-capability
peer 3.3.3.3 enable
peer 3.3.3.3 route-policy policy1 export
peer 3.3.3.3 reflect-client
peer 3.3.3.3 next-hop-local
peer 3.3.3.3 label-route-capability
peer 6.6.6.6 enable
peer 6.6.6.6 route-policy policy1 export
peer 6.6.6.6 reflect-client
peer 6.6.6.6 next-hop-local
peer 6.6.6.6 label-route-capability
peer 7.7.7.7 enable
peer 7.7.7.7 route-policy policy1 export
peer 7.7.7.7 reflect-client
peer 7.7.7.7 next-hop-local
peer 7.7.7.7 label-route-capability
#
ospf 3
area 0.0.0.0
network 5.5.5.5 0.0.0.0
network 10.3.1.0 0.0.0.255
network 20.2.1.0 0.0.0.255
#
route-policy policy1 permit node 1
if-match mpls-label
apply mpls-label
#
return
#
mpls ldp
#
isis 2
network-entity 10.0000.0000.0007.00
#
interface GigabitEthernet1/0/0
undo shutdown
ip address 20.2.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
undo shutdown
ip address 30.2.1.1 255.255.255.0
isis enable 2
mpls
mpls ldp
#
interface GigabitEthernet3/0/0
undo shutdown
ip address 30.3.1.2 255.255.255.0
isis enable 2
mpls
mpls ldp
#
interface LoopBack1
ip address 7.7.7.7 255.255.255.255
isis enable 2
#
bgp 100
peer 4.4.4.4 as-number 100
peer 4.4.4.4 connect-interface LoopBack1
peer 5.5.5.5 as-number 100
peer 5.5.5.5 connect-interface LoopBack1
peer 8.8.8.8 as-number 100
peer 8.8.8.8 connect-interface LoopBack1
peer 9.9.9.9 as-number 100
peer 9.9.9.9 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
peer 4.4.4.4 enable
peer 4.4.4.4 route-policy policy1 export
peer 4.4.4.4 reflect-client
peer 4.4.4.4 next-hop-local
peer 4.4.4.4 label-route-capability
peer 5.5.5.5 enable
peer 5.5.5.5 route-policy policy1 export
peer 5.5.5.5 reflect-client
peer 5.5.5.5 next-hop-local
peer 5.5.5.5 label-route-capability
peer 8.8.8.8 enable
peer 8.8.8.8 route-policy policy1 export
peer 8.8.8.8 reflect-client
peer 8.8.8.8 next-hop-local
peer 8.8.8.8 label-route-capability
peer 9.9.9.9 enable
peer 9.9.9.9 route-policy policy1 export
peer 9.9.9.9 reflect-client
peer 9.9.9.9 next-hop-local
peer 9.9.9.9 label-route-capability
#
ospf 3
area 0.0.0.0
network 7.7.7.7 0.0.0.0
network 20.2.1.0 0.0.0.255
#
ipv4-family unicast
undo synchronization
network 8.0.0.0
network 8.8.8.8 255.255.255.255
peer 6.6.6.6 enable
peer 6.6.6.6 route-policy policy1 export
peer 6.6.6.6 label-route-capability
peer 7.7.7.7 enable
peer 7.7.7.7 route-policy policy1 export
peer 7.7.7.7 label-route-capability
#
ospf 2
area 0.0.0.0
network 8.8.8.8 0.0.0.0
network 192.1.1.0 0.0.0.255
network 192.3.1.0 0.0.0.255
#
route-policy policy1 permit node 1
apply mpls-label
#
return
undo shutdown
ip address 192.3.1.2 255.255.255.0
isis enable 2
mpls
mpls ldp
#
interface LoopBack1
ip address 9.9.9.9 255.255.255.255
isis enable 2
#
bgp 100
peer 6.6.6.6 as-number 100
peer 6.6.6.6 connect-interface LoopBack1
peer 7.7.7.7 as-number 100
peer 7.7.7.7 connect-interface LoopBack1
#
ipv4-family unicast
undo synchronization
network 9.9.9.9 255.255.255.255
peer 6.6.6.6 enable
peer 6.6.6.6 route-policy policy1 export
peer 6.6.6.6 label-route-capability
peer 7.7.7.7 enable
peer 7.7.7.7 route-policy policy1 export
peer 7.7.7.7 label-route-capability
#
ospf 2
area 0.0.0.0
network 9.9.9.9 0.0.0.0
network 192.2.1.0 0.0.0.255
network 192.3.1.0 0.0.0.255
#
route-policy policy1 permit node 1
apply mpls-label
#
return
undo shutdown
#
interface GigabitEthernet3/0/0.10
vlan-type dot1q 10
mpls l2vc 8.8.8.8 100
mpls l2vc 9.9.9.9 200 secondary
mpls l2vpn redundancy master
#
interface LoopBack1
ip address 10.10.10.10 255.255.255.255
#
ospf 2
area 0.0.0.0
network 10.10.10.10 0.0.0.0
network 192.1.1.0 0.0.0.255
network 192.2.1.0 0.0.0.255
#
return
A Glossary
administrative group A 32-bit vector representing a set of link attributes. In RFC 3209,
administrative groups are called link-attributes.
bandwidth protection Bandwidth protection indicates that the bypass tunnel reserves
sufficient bandwidth to protect the traffic of the protected tunnel.
best-effort path When both primary and backup CR-LSPs fail, a temporary CR-
LSP, also called a best-effort path, is set up to protect the traffic.
dynamic label switched A label switched path set up by a signaling protocol automatically.
path
facility backup Protects one or more label switched paths using one bypass
tunnel.
Graceful Restart restarter A node enabled Graceful Restart. The GR Restarter has dual main
control boards and is capable of notifying the neighbor to
maintain the adjacency during an active/standby switchover.
Graceful Restart helper Neighbor of the Graceful Restart Restarter. The GR Helper should
be able to identify the GR signaling, maintain the adjacency with
the GR Restarter during an active/standby switchover, and help
the GR Restarter restore the network topology.
Incoming Label Map Mapping between an incoming label and a set of NHLFEs.
ingress The beginning of a label switched path. The ingress pushes a label
to a packet, encapsulates the packet as an MPLS packet, and
forward it.
label distribution Packets with the same destination address belong to a FEC. A
label out of an MPLS label resource pool is allocated to the FEC.
LSRs record the relationship of the label and the FEC. Then, LSRs
send a message and advertises to upstream LSRs about the label
and FEC relationship.
label edge router An LSR that resides on the edge of an MPLS domain. When an
LSR connects to one node that runs MPLS, the LSR acts as the
LSR.
label switched path A path through which a FEC passes on an MPLS network.
label switching router routers that can swap and forward MPLS labels. An LSR is also
called an MPLS node.
LDP peer Two LSRs that use LDP to exchange labels or FEC mappings.
LDP sessions exist between them.
link color An administrative group property of the link that is used to select
a link. A link can support up to 32 colors. When specifying a CR-
LSP, you can add constraints to the color field to require that the
passed path be of a specified color.
link protection Link protection indicates that there is a direct link between the
PLR and the MP.
loose explicit path An explicit path in which the LSRs on the LSP are specified.
Other routers can exist between an LSR and the last hop.
NHLFE Next hop label forwarding entry (NHLFE) is used to guide the
MPLS packet forwarding. An NHLFE contains information about
the tunnel ID, outgoing interface, next hop, outgoing label, and
label operation.
node protection Node protection indicates that there is an LSR between the PLR
and the MP and the protected LSP passes through this LSR.
N:1 protection mode In N:1 protection mode, a tunnel serves as a protection tunnel for
several primary tunnels. When one of the primary tunnels fails,
its traffic is switched to the shared protection tunnel.
ordinary backup Established by an ingress only after the primary LSP fails.
protection switching Flow switching or copy between the primary tunnel and the
backup tunnel in MPLS OAM.
Route pinning An attribute of the link. When the network topology changes, the
established CR-LSP does not vary with the change of routes. This
attribute is used to ensure that the traffic is not broken and improve
the security.
static bidirectional Local and remote discriminators are configured manually and
forwarding detection bidirectional forwarding detection (BFD) sessions are set up
through the BFD negotiation mechanism.
strict explicit path An explicit path in which the last hop and the next hop are directly
connected. It can precisely specify the LSRs on the LSP.
Summary Refresh The summary refresh enables the refreshing of RSVP state
without the transmission of standard Path or Resv messages. The
benefits of the summary refresh are that it reduces the amount of
information that must be transmitted.
tie-breaking During the CSPF path computation, if there are several paths with
the same metric, CSPF selects one of them. This process is called
tie-breaking.
traffic trunk A collection of traffic that belongs to the same service type and
uses the same LSP.
This appendix collates frequently used acronyms and abbreviations in this document.
AF assured forwarding
AS autonomous system
BC bandwidth constraint
CE customer edge
CR Constraint-based Routing
CT class type
CV Connectivity Verification
DoD Downstream-on-Demand
DU Downstream Unsolicited
EF expedited forwarding
ER explicit route
FF fixed-filter
FR Frame Relay
FS forced switch
GR Graceful Restart
HA high availability
MA management area
MP merge point
MS manual switch
PE provider edge
RM resource management
SE shared-explicit
SF signal fail
TE traffic engineering
TLV type-length-value