Information About MPLS TE Fast Reroute Link and Node Protection
Fast reroute link and node protection provides link protection (backup tunnels that bypass only a single link of the label switched path [LSP]), node protection (backup tunnels that bypass next-hop nodes along LSPs), and the following fast reroute (FRR) features:
- Backup tunnel support
- Backup bandwidth protection
- Bidirectional Forwarding Detection (BFD)
This section includes the following topics:
Fast Reroute
Fast Reroute (FRR) is a mechanism for protecting MPLS TE LSPs from link and node failures by locally repairing the LSPs at the point of failure, allowing data to continue to flow on them while their headend routers try to establish new end-to-end LSPs to replace them. FRR locally repairs the protected LSPs by rerouting them over backup tunnels that bypass failed links or node.
Link Protection
Backup tunnels that bypass only a single link of the LSP’s path provide link protection. They protect LSPs if a link along their path fails by rerouting the LSP’s traffic to the next hop (bypassing the failed link). These tunnels are referred to as next-hop (NHOP) backup tunnels because they terminate at the LSP’s next hop beyond the point of failure. Figure 18-1 shows an NHOP backup tunnel.
Figure 18-1 NHOP Backup Tunnel
Node Protection
FRR provides node protection for LSPs. Backup tunnels that bypass next-hop nodes along LSP paths are called next-next-hop (NNHOP) backup tunnels because they terminate at the node following the next-hop node of the LSP paths, bypassing the next-hop node. They protect LSPs if a node along their path fails by enabling the node upstream of the failure to reroute the LSPs and their traffic around the failed node to the next-next hop. FRR supports the use of BFD to accelerate the detection of node failures. NNHOP backup tunnels also provide protection from link failures, because they bypass the failed link and the node.
Figure 18-2 shows an NNHOP backup tunnel.
Figure 18-2 NNHOP Backup Tunnel
If an LSP is using a backup tunnel and something changes so that the LSP is no longer appropriate for the backup tunnel, the LSP is torn down. Such changes are the following:
- The backup bandwidth of the backup tunnel is reduced.
- The backup bandwidth type of the backup tunnel is changed to a type that is incompatible with the primary LSP.
- The primary LSP is modified so that FRR is disabled. (The no fast-reroute command is entered.)
Bandwidth Protection
NHOP and NNHOP backup tunnels can be used to provide bandwidth protection for rerouted LSPs, which is referred to as backup bandwidth. You can associate backup bandwidth with NHOP or NNHOP backup tunnels to inform the router of the amount of backup bandwidth a particular backup tunnel can protect. When a router maps LSPs to backup tunnels, bandwidth protection ensures that an LSP uses a given backup tunnel only if there is sufficient backup bandwidth. The router selects which LSPs use which backup tunnels in order to provide maximum bandwidth protection. The router determines the best way to map LSPs onto backup tunnels in order to maximize the number of LSPs that can be protected. For information about mapping tunnels and assigning backup bandwidth, see the “Backup Tunnel Selection Procedure”.
LSPs that have the bandwidth protection desired bit set have a higher right to select backup tunnels that provide bandwidth protection; that is, those LSPs can preempt other LSPs that do not have that bit set. For more information, see the “Prioritizing Which LSPs Obtain Backup Tunnels with Bandwidth Protection”.
Features of Fast Reroute Link and Node Protection
Fast reroute link and node protection has the following features:
Backup Tunnel Support
This section includes the following topics:
Backup Tunnels Can Terminate at the Next-Next Hop to Support FRR
Backup tunnels that terminate at the next-next hop protect both the downstream link and node, which provides protection for link and node failures. For more detailed information, see the “Node Protection”.
Multiple Backup Tunnels Can Protect the Same Interface
There is no limit (except memory limitations) to the number of backup tunnels that can protect a given interface. In many topologies, support for node protection requires supporting multiple backup tunnels per protected interface. These backup tunnels can terminate at the same destination or at different destinations. For a given protected interface, you can configure multiple NHOP or NNHOP backup tunnels, which allow redundancy and load balancing.
In addition to being required for node protection, the protection of an interface by multiple backup tunnels provides the following benefits:
- Redundancy—If one backup tunnel is down, other backup tunnels protect LSPs.
- Increased backup capacity—If the protected interface is a high-capacity link and no single backup path exists with an equal capacity, multiple backup tunnels can protect that one high-capacity link. The LSPs using this link fails over to different backup tunnels, allowing all of the LSPs to have adequate bandwidth protection during the failure (rerouting). If bandwidth protection is not desired, the router spreads LSPs across all available backup tunnels (that is, there is load balancing across backup tunnels). For more details, see the “Backup Tunnel Selection Procedure”.
Examples are shown in the “Backup Tunnels Terminating at Different Destinations” and the “Backup Tunnels Terminating at the Same Destination”.
Backup Tunnels Provide Scalability
A backup tunnel can protect multiple LSPs and multiple interfaces. This feature is called many-to-one (N:1) protection. An example of N:1 protection is when one backup tunnel protects 5000 LSPs, where each router along the backup path maintains one additional tunnel.
One-to-one protection is when a separate backup tunnel must be used for each LSP that needs protection. N:1 protection has significant scalability advantages over one-to-one (1:1) protection. An example of 1:1 protection is when 5000 backup tunnels protect 5000 LSPs, where each router along the backup path must maintain the state for an additional 5000 tunnels.
Backup Bandwidth Protection
Backup bandwidth protection allows you to give LSPs that carry certain kinds of data (such as voice) priority for using backup tunnels. Backup bandwidth protection has the following capabilities:
Bandwidth Protection on Backup Tunnels
Rerouted LSPs not only have their packets delivered during a failure, but the quality of service can also be maintained.
Bandwidth Pool Specifications for Backup Tunnels
You can restrict the types of LSPs that can use a given backup tunnel. Backup tunnels can be restricted so that only LSPs that use global-pool bandwidth can use them. This feature allows different backup tunnels to be used for voice and data. Example: The backup tunnel used for voice could provide bandwidth protection, and the backup tunnel used for data could not provide bandwidth protection.
Semidynamic Backup Tunnel Paths
The path of a backup tunnel can be configured to be determined dynamically, which can be done by using the IP explicit address exclusion feature. If you use this feature, semidynamic NHOP backup tunnel paths can be specified simply by excluding the protected link; semidynamic NNHOP backup tunnel paths can be configured simply by excluding the protected node.
Prioritizing Which LSPs Obtain Backup Tunnels with Bandwidth Protection
In case there are not enough NHOP or NNHOP backup tunnels or they do not have enough backup bandwidth to protect all LSPs, you can give an LSP priority in obtaining backup tunnels with bandwidth protection. This feature is especially useful if you want to give LSPs that carry voice a higher priority than those LSPs that carry data.
To activate this feature, enter the tunnel mpls traffic-eng fast-reroute bw-protect command to set the bandwidth protection desired bit. See the “Enabling Fast Reroute on LSPs”.
The LSPs do not necessarily receive bandwidth protection. They have a higher chance of receiving bandwidth protection if they need it.
LSPs that do not have the bandwidth protection bit set can be demoted. Demotion is when one or more LSPs are removed from their assigned backup tunnel to provide backup to an LSP that has its bandwidth protection bit set. Demotion occurs only when there is a scarcity of backup bandwidth.
When an LSP is demoted, it becomes unprotected (that is, it no longer has a backup tunnel). During the next periodic promotion cycle, an attempt is made to find the best possible backup tunnels for all LSPs that do not currently have protection, including the LSP that was demoted. The LSP may get protection at the same level or a lower level, or it may get no protection.
For information about how routers determine which LSPs to demote, see the “Backup Protection Preemption Algorithms”.
Bidirectional Forwarding Detection
The Bidirectional Forwarding Detection (BFD) triggered fast reroute feature enables you to obtain link and node protection by using the BFD protocol to provide fast forwarding path failure detection times for all media types, encapsulations, topologies, and routing protocols. In addition to fast forwarding path failure detection, BFD provides a consistent failure detection method for network administrators.
BFD for MPLS TE fast reroute is enabled as soon as fast reroute is enabled on a tunnel interface.
Fast Reroute Operation
This section includes the following topics:
- Fast Reroute Activation, page 18-277
- Backup Tunnels Terminating at Different Destinations, page 18-277
- Backup Tunnels Terminating at the Same Destination, page 18-278
- Backup Tunnel Selection Procedure, page 18-279
- Bandwidth Protection, page 18-279
- Load Balancing on Limited-Bandwidth Backup Tunnels, page 18-279
- Load Balancing on Unlimited-Bandwidth Backup Tunnels, page 18-280
- Pool Type and Backup Tunnels, page 18-281
- Tunnel Selection Priorities, page 18-281
- Bandwidth Protection Considerations, page 18-283
Fast Reroute Activation
Two mechanisms cause routers to switch LSPs onto their backup tunnels:
- Interface down notification
- BFD neighbor down notification
When a router’s link or neighboring node fails, the router often detects this failure by an interface down notification. When a router notices that an interface has gone down, it switches LSPs going out that interface onto their respective backup tunnels (if any).
Backup Tunnels Terminating at Different Destinations
Figure 18-3 shows an interface that has multiple backup tunnels that terminate at different destinations and demonstrates why, in many topologies, support for node protection requires supporting multiple backup tunnels per protected interface.
Figure 18-3 Backup Tunnels that Terminate at Different Destinations
In this figure, a single interface on R1 requires multiple backup tunnels. LSPs traverse the following routes:
To provide protection if node R2 fails, two NNHOP backup tunnels are required: one terminating at R3 and one terminating at R4.
Backup Tunnels Terminating at the Same Destination
Figure 18-4 shows how backup tunnels that terminate at the same location can be used for redundancy and load balancing. Redundancy and load balancing work for both NHOP and NNHOP backup tunnels.
Figure 18-4 Backup Tunnels that Terminate at the Same Destination
In this figure, there are three routers: R1, R2, and R3. At R1, two NNHOP backup tunnels (T1 and T2) go from R1 to R3 without traversing R2.
Redundancy—If R2 fails or the link from R1 to R2 fails, either backup tunnel can be used. If one backup tunnel is down, the other can be used. LSPs are assigned to backup tunnels when the LSPs are first established before a failure occurs.
Load balancing—If neither backup tunnel has enough bandwidth to back up all LSPs, both tunnels can be used. Some LSPs use one backup tunnel, while other LSPs use the other backup tunnel. The router decides the best way to fit the LSPs onto the backup tunnels.
Backup Tunnel Selection Procedure
When an LSP is signaled, each node along the LSP path that provides FRR protection for the LSP selects a backup tunnel for the LSP to use if either of the following events occurs:
- The link to the next hop fails.
- The next hop fails.
By having the node select the backup tunnel for an LSP before a failure occurs, the LSP can be rerouted onto the backup tunnel quickly if there is a failure.
For an LSP to be mapped to a backup tunnel, all of the following conditions must exist:
- The LSP is protected by FRR; that is, the LSP is configured with the fast-reroute command.
- The backup tunnel is up.
- The backup tunnel is configured to have an IP address which is typically a loopback address.
- The backup tunnel is configured to protect this LSP’s outgoing interface; that is, the interface is configured with the mpls traffic-eng backup-path command.
- The backup tunnel does not traverse the LSP’s protected interface.
- The backup tunnel terminates at the LSP’s NHOP or NNHOP. If it is an NNHOP tunnel, it does not traverse the LSP’s NHOP.
- The bandwidth protection requirements and constraints, if any, for the LSP and backup tunnel are met. For information about bandwidth protection considerations, see the “Bandwidth Protection”.
Bandwidth Protection
A backup tunnel can be configured to protect two types of backup bandwidth:
- Limited backup bandwidth—A backup tunnel provides bandwidth protection. The sum of the bandwidth of all LSPs using this backup tunnel cannot exceed the backup tunnel’s backup bandwidth. When you assign LSPs to this type of backup tunnel, sufficient backup bandwidth must exist.
- Unlimited backup bandwidth—The backup tunnel does not provide any bandwidth protection (that is, best-effort protection exists). There is no limit to the amount of bandwidth used by the LSPs that are mapped to this backup tunnel. LSPs that allocate zero bandwidth can use only backup tunnels that have unlimited backup bandwidth.
Load Balancing on Limited-Bandwidth Backup Tunnels
There may be more than one backup tunnel that has sufficient backup bandwidth to protect a given LSP. In this case, the router chooses the one that has the least amount of backup bandwidth available. This algorithm limits fragmentation, maintaining the largest amount of backup bandwidth available.
Specifying limited backup bandwidth does not guarantee bandwidth protection if there is a link or node failure. For example, the set of NHOP and NNHOP backup tunnels that gets triggered when an interface fails may all share some link on the network topology, and this link may not have sufficient bandwidth to support all LSPs using this set of backup tunnels.
In Figure 18-5, both backup tunnels traverse the same links and hop. When the link between routers R1 and R4 fails, backup tunnels for primary tunnel 1 and primary tunnel 2 are triggered simultaneously. The two backup tunnels may share a link in the network.
Figure 18-5 Backup Tunnels Share a Link
In Figure 18-6, the backup tunnel for primary tunnel 1 may traverse routers R1-R2-R3-R4, and the backup tunnel for primary tunnel 2 might traverse routers R4-R2-R3-R1. In this case, the link R2-R3 might get overloaded if R1-R4 fails.
Figure 18-6 Overloaded Link
Load Balancing on Unlimited-Bandwidth Backup Tunnels
More than one backup tunnel, each having unlimited backup bandwidth, can protect a given interface. In this case, when choosing a backup tunnel for a given LSP, the router chooses the backup tunnel that has the least amount of backup bandwidth in use. This algorithm evenly distributes the LSPs across backup tunnels based on an LSP’s bandwidth. If an LSP is requesting zero bandwidth, the router chooses the backup tunnel that is protecting the fewest LSPs.
Pool Type and Backup Tunnels
By default, a backup tunnel provides protection for LSPs that allocate from any global pool. However, a backup tunnel can be configured to protect only LSPs that use global-pool bandwidth.
Tunnel Selection Priorities
This section includes the following topics:
NHOP Versus NNHOP Backup Tunnels
More than one backup tunnel can protect a given LSP, where one backup tunnel terminates at the LSP’s NNHOP, and the other terminates at the LSP’s NHOP. In this case, the router chooses the backup tunnel that terminates at the NNHOP (FRR prefers NNHOP over NHOP backup tunnels).
Table 18-1 lists the tunnel selection priorities. The first choice is an NNHOP backup tunnel that acquires its bandwidth from a global pool and has limited bandwidth. If there is no such backup tunnel, the next choice (2) is a next-next hop backup tunnel that acquires a limited amount of bandwidth from any pool. The preferences go from 1 (best) to 8 (worst), where choice 3 is for an NNHOP backup tunnel with an unlimited amount of global-pool bandwidth.
Table 18-1 Tunnel Selection Priorities
|
Backup Tunnel Destination
|
|
|
1 (Best) |
NNHOP |
Global pool |
Limited |
2 |
NNHOP |
Any |
Limited |
3 |
NNHOP |
Global pool |
Unlimited |
4 |
NNHOP |
Any |
Unlimited |
5 |
NHOP |
Global pool |
Limited |
6 |
NHOP |
Any |
Limited |
7 |
NHOP |
Global pool |
Unlimited |
8 (Worst) |
NHOP |
Any |
Unlimited |
Figure 18-7 shows an example of the backup tunnel selection procedure based on the designated amount of global pool bandwidth currently available.
Note
If NHOP and NNHOP backup tunnels do not have sufficient backup bandwidth, no consideration is given to the type of data that the LSP is carrying. For example, a voice LSP may not be protected unless it is signaled before a data LSP. To prioritize the backup tunnel usage, see the “Backup Protection Preemption Algorithms”.
Figure 18-7 Choosing from Among Multiple Backup Tunnels
In this example, an LSP requires 20 units (kilobits per second) of global pool backup bandwidth. The best backup tunnel is selected as follows:
1.
Backup tunnels T1 is considered first because it terminates at the NNHOP.
2.
Tunnel T1 is chosen because it protects LSPs using global pool bandwidth.
3.
Tunnels T5 is not considered because it terminates at an NHOP, and therefore is less desirable than T1, which terminates at an NNHOP.
Promotion
After a backup tunnel has been chosen for an LSP, conditions may change that will cause you to reevaluate this choice. This reevaluation, if successful, is called promotion. Such conditions are as follows:
1.
A new backup tunnel comes up.
2.
The currently chosen backup tunnel for this LSP goes down.
3.
A backup tunnel’s available backup bandwidth increases. For example, an LSP protected by the tunnel has been reoptimized by the headend to use another path.
For cases 1 and 2, the LSP’s backup tunnel is evaluated immediately. Case 3 is addressed by periodically reevaluating LSP-to-backup tunnel mappings. By default, background reevaluation is performed every 5 minutes. You can configure this interval with the fast-reroute timers command.
Backup Protection Preemption Algorithms
When you set the bandwidth protection desired bit for an LSP, the LSP has a higher right to select backup tunnels that provide bandwidth protection and it can preempt other LSPs that do not have that bit set.
If there is insufficient backup bandwidth on NNHOP backup tunnels but not on NHOP backup tunnels, the bandwidth-protected LSP does not preempt NNHOP LSPs; it uses NHOP protection.
If multiple LSPs are using a given backup tunnel and one or more must be demoted to provide bandwidth, there are two user-configurable methods (algorithms) that the router can use to determine which LSPs are demoted:
- Minimize amount of bandwidth that is wasted.
- Minimize the number of LSPs that are demoted.
For example, if you need ten units of backup bandwidth on a backup tunnel, you can demote one of the following:
- A single LSP using 100 units of bandwidth—Makes available more bandwidth than needed but results in wasted bandwidth.
- Ten LSPs, each using one unit of bandwidth—Results in no wasted bandwidth but affects more LSPs.
The default algorithm is to minimize the number of LSPs that are demoted. To change the algorithm to minimize the amount of bandwidth that is wasted, enter the fast-reroute backup-prot-preemption optimize-bw command.
Bandwidth Protection Considerations
Bandwidth protection can be ensured in many ways. Table 18-2 describes the advantages and disadvantages of three methods.
Table 18-2 Bandwidth Protection Methods
|
|
|
Reserve bandwidth for backup tunnels explicitly. |
It is simple. |
It is a challenge to allow bandwidth sharing of backup tunnels protecting against independent failures. |
Use backup tunnels that are signaled with zero bandwidth. |
It provides a way to share bandwidth used for protection against independent failures, so it ensures more economical bandwidth usage. |
It may be complicated to determine the proper placement of zero bandwidth tunnels. |
Backup bandwidth protection. |
It ensures bandwidth protection for voice traffic. |
An LSP that does not have backup bandwidth protection can be demoted at any time if there is not enough backup bandwidth and an LSP that has backup bandwidth protection needs bandwidth. |
Cisco implementation of FRR does not mandate a particular approach, and it provides the flexibility to use any of the above approaches. However, given a range of configuration choices, be sure that the choices are constant with a particular bandwidth protection strategy.
This section includes the following topics:
Using Backup Tunnels with Explicitly Signaled Bandwidth
Two bandwidth parameters must be set for a backup tunnel:
- Actual signaled bandwidth
- Backup bandwidth
To signal bandwidth requirements of a backup tunnel, configure the bandwidth of the backup tunnel by using the bandwidth command.
To configure the backup bandwidth of the backup tunnel, use the backup-bw command.
The signaled bandwidth is used by the LSRs on the path of the backup tunnel to perform admission control and do appropriate bandwidth accounting.
The backup bandwidth is used by the point of local repair (PLR) (the headend of the backup tunnel) to decide how much primary traffic can be rerouted to this backup tunnel if there is a failure.
Both parameters need to be set to ensure proper operation. The numerical value of the signaled bandwidth and the backup bandwidth should be the same.
Protected Bandwidth Pools and the Bandwidth Pool from Which the Backup Tunnel Reserves Its Bandwidth
The bandwidth command allows you to configure the following:
- Amount of bandwidth that a backup tunnel reserves
- The DS-TE bandwidth pool from which the bandwidth needs to be reserved
Note
Only one pool can be selected. The backup tunnel can explicitly reserve bandwidth from the global pool.
The backup-bw command allows you to specify the bandwidth pool to which the traffic must belong for the traffic to use this backup tunnel. Multiple pools are allowed.
There is no direct correspondence between the bandwidth pool that is protected and the bandwidth pool from which the bandwidth of the backup tunnel draws its bandwidth.
Bandwidth protection for 10 Kbps of subpool traffic on a given link can be achieved by configuring any of the following command combinations:
backup-bw sub-pool 10
backup-bw sub-pool 10 global-pool unlimited
backup-bw sub-pool 10 global-pool 30
Using Backup Tunnels Signaled with Zero Bandwidth
You might use backup tunnels with zero signaled bandwidth, even when bandwidth protection is required. It might seem that if no bandwidth is explicitly reserved, no bandwidth guarantees can be provided. However, that is not necessarily true, because in the following situation, only link protection is desired and bandwidth protection is desired only for subpool traffic.
For each protected link AB with a maximum reservable subpool value of n, there might be a path from node A to node B where the difference between the maximum reservable global and the maximum reservable subpool is at least the value of n. If it is possible to find such paths for each link in the network, you can establish all the backup tunnels along such paths without any bandwidth reservations. If there is a single link failure, only one backup tunnel uses any link on its path. Because that path has at least n available bandwidth (in the global pool), assuming that marking and scheduling is configured to classify the subpool traffic into a priority queue, the subpool bandwidth is guaranteed.
This approach allows sharing of the global pool bandwidth between backup tunnels that protect independent link failures. The backup tunnels are expected to be used for only a short period of time after a failure (until the headends of affected LSPs reroute those LSPs to other paths with available subpool bandwidth). The probability of multiple unrelated link failures is very small (in the absence of node failures, which result in multiple link failures). Therefore, you can assume that link failures are in practice independent with high probability. This independent failure assumption in combination with backup tunnels signaled without explicit bandwidth reservation enables efficient bandwidth sharing that yields substantial bandwidth savings.
Backup tunnels that protect the subpool traffic do not draw bandwidth from any pool. Primary traffic that uses the global pool can use the entire global pool, and primary traffic that uses the subpool can use the entire subpool. Yet, subpool traffic has a complete bandwidth guarantee if there is a single link failure.
A similar approach can be used for node protection. However, the decision of where to put the backup tunnels is more complicated because node failures effectively result in the simultaneous failure of several links. Therefore, the backup tunnels that protect traffic traversing all affected links cannot be computed independently of each other. The backup tunnels that protect groups of links corresponding to different failures can still be computed independently of each other, which results in similar bandwidth savings.
Signaled Bandwidth Versus Backup Bandwidth
Backup bandwidth is used locally (by the router that is the headend of the backup tunnel) to determine which, and how many, primary LSPs can be rerouted on a particular backup tunnel. The router ensures that the combined bandwidth requirement of these LSPs does not exceed the backup bandwidth.
Therefore, even when the backup tunnel is signaled with zero bandwidth, you must configure the backup bandwidth with the value corresponding to the actual bandwidth requirement of the traffic protected by this backup tunnel. Unlike the case when bandwidth requirements of the backup tunnels are explicitly signaled, the value of the signaled bandwidth (which is zero) is not the same value as the backup bandwidth.
Configuring MPLS TE Fast Reroute Link and Node Protection
This section includes the following topics:
Enabling Fast Reroute on LSPs
LSPs can use backup tunnels only if they have been configured as fast reroutable. You can enable fast reroute on LSPs by entering commands at the headend of each LSP.
Note
This procedure is required for configuring fast reroute link and node protection.
Prerequisites
You must have the MPLS TE feature enabled (see the “Configuring MPLS TE”).
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1.
configure terminal
2.
interface tunnel-te number
3.
fast-reroute [ bw-protect ]
DETAILED STEPS
|
|
|
Step 1 |
configure terminal Example: switch# configure terminal switch(config)# |
Enters global configuration mode. |
Step 2 |
interface tunnel-te number Example: switch(config)# interface tunnel-te 1000 switch(config-if-te)# |
Enters interface configuration mode for the specified tunnel. |
Step 3 |
fast-reroute [ bw-protect ] Example: switch(config-if-te)# fast-reroute bw-protect |
Enables an MPLS TE tunnel to use an established backup tunnel if there is a link or node failure. |
Creating a Backup Tunnel to the Next Hop or to the Next-Next Hop
Creating a backup tunnel is basically no different from creating any other tunnel. To create a backup tunnel to the next hop or to the next-next hop, enter commands on the node that will be the headend of the backup tunnel (the node whose downstream link or the node might fail). The node on which you enter these commands must be a supported platform.
Note
This procedure is required for configuring fast reroute link and node protection.
Prerequisites
You must have the MPLS TE feature enabled (see the “Configuring MPLS TE”).
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1.
configure terminal
2.
mpls traffic-eng configuration
3.
explicit-path { identifier id | name name }
4.
exclude-address ip-address
5.
exit
6.
interface tunnel-te number
7.
ip unnumbered interface-type interface-number
8.
destination ip-address
9.
path-option [ protect ] preference-number { dynamic | explicit { identifier id | name name} [ verbatim ]} [ lockdown ] [ bandwidth kbps] [ attributes listname]
DETAILED STEPS
|
|
|
Step 1 |
configure terminal Example: switch# configure terminal switch(config)# |
Enters global configuration mode. |
Step 2 |
mpls traffic-eng configuration Example: switch(config)# mpls traffic-eng configuration switch(config-te)# |
Enters MPLS TE configuration mode. |
Step 3 |
explicit-path [identifier id | name name ] Example: switch(config-te)# explicit-path name avoid-protected-link |
Enters the command mode for IP explicit paths and creates the specified path. This command allows you to enter explicit path command mode. |
Step 4 |
exclude-address ip-address Example: switch(config-ip-expl-path)# exclude-address 3.3.3.3 |
For link protection, specify the IP address of the link to be protected. For node protection, specify the router ID of the node to be protected. Note Backup tunnel paths can be dynamic or explicit and they do not have to use exclude-address. Because backup tunnels must avoid the protected link or node, it is convenient to use the exclude-address command. Note When using the exclude-address command to specify the path for a backup tunnel, you must exclude an interface IP address to avoid a link (for creating an NHOP backup tunnel), or a router ID address to avoid a node (for creating an NNHOP backup tunnel). |
Step 5 |
exit Example: switch(config-te-expl-path)# exit switch(config-if)# |
Exits explicit path command mode. |
Step 6 |
interface tunnel-te number Example: switch(config-if)# interface tunnel-te 1 switch(config-if-te)# |
Creates a new tunnel interface and enters interface configuration mode. |
Step 7 |
ip unnumbered interface-type interface-number Example: switch(config-if-te)# ip unnumbered loopback 0 |
Gives the tunnel interface an IP address that is the same as that of interface Loopback0. Note This command is not effective until Lookback0 has been configured with an IP address. |
Step 8 |
destination ip-address Example: switch(config-if-te)# destination 10.3.3.3 |
Specifies the IP address of the device where the tunnel will terminate. This address should be the router ID of the device that is the NHOP or NNHOP of LSPs to be protected. |
Step 9 |
path-option [protect] preference-number {dynamic | explicit { identifier id | name name } [ verbatim ]} [lockdown] [ bandwidth kbps ] [ attributes listname ] Example: switch(config-if-te)# path-option 10 explicit avoid-protected-link |
Configures a path option for an MPLS TE tunnel. |
Assigning Backup Tunnels to a Protected Interface
You can assign one or more backup tunnels to a protected interface by entering the commands on the node that will be the headend of the backup tunnel (the node whose downstream link or node might fail). The node on which you enter these commands must be a supported platform.
Note
This procedure is required for configuring fast reroute link and node protection.
Note
You must configure the interface to have an IP address and enable the MPLS TE tunnel feature.
Prerequisites
You must have the MPLS TE feature enabled (see the “Configuring MPLS TE”).
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1.
configure terminal
2.
interface type slot / port
3.
mpls traffic-eng backup-path tunnel-te interface
DETAILED STEPS
|
|
|
Step 1 |
configure terminal Example: switch# configure terminal switch(config)# |
Enters global configuration mode. |
Step 2 |
interface type slot / port Example: switch(config)# interface Ethernet 5/0 switch(config-if)# |
Moves configuration to the physical interface level, directing subsequent configuration commands to the specific physical interface identified by the type value. The slot and port identify the slot and port being configured. The interface must be a supported interface. |
Step 3 |
mpls traffic-eng backup-path tunnel-te interface Example: switch(config-if)# mpls traffic-eng backup-path tunnel-te 2 |
Allows LSPs going out this interface to use this backup tunnel if there is a link or node failure. Note You can enter this command multiple times to associate multiple backup tunnels with the same protected interface. |
Associating Backup Bandwidth and Pool Type with a Backup Tunnel
You can associate the backup bandwidth with a backup tunnel and designate the type of LSP that can use a backup tunnel.
Note
You can use this optional procedure to configure fast reroute link and node protection.
Prerequisites
You must have the MPLS TE feature enabled (see the “Configuring MPLS TE”).
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1.
configure terminal
2.
interface tunnel-te number
3.
backup-bw bandwidth
DETAILED STEPS
|
|
|
Step 1 |
configure terminal Example: switch# configure terminal switch(config)# |
Enters global configuration mode. |
Step 2 |
interface tunnel-te number Example: switch(config)# interface tunnel-te 2 switch(config-if-te)# |
Enters interface configuration mode for the specified tunnel. |
Step 3 |
backup-bw bandwidth Example: switch(config-if-te)# backup-bw sub-pool 1000 |
Associates bandwidth with a backup tunnel. |
Configuring Backup Bandwidth Protection
You can configure backup bandwidth protection.
Note
You can use this optional procedure to configure fast reroute link and node protection.
Prerequisites
You must have the MPLS TE feature enabled (see the “Configuring MPLS TE”).
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1.
configure terminal
2.
mpls traffic-eng configuration
3.
fast-reroute [ bw-protect ]
4.
fast-reroute backup-prot-preemption [ optimize-bw ]
DETAILED STEPS
|
|
|
Step 1 |
configure terminal Example: switch# configure terminal switch(config)# |
Enters global configuration mode. |
Step 2 |
mpls traffic-eng configuration Example: switch(config)# mpls traffic-eng configuration switch(config-te) |
Enters MPLS TE configuration mode. |
Step 3 |
fast-reroute [ bw-protect ] Example: switch(config-te)# fast-reroute bw-protect |
Enables an MPLS TE tunnel to use an established backup tunnel in the event of a link or node failure. The bw-protect keyword gives an LSP priority for using backup tunnels with bandwidth protection. |
Step 4 |
fast-reroute backup-prot-preempt [ optimize-bw ] Example: switch(config-te)# fast-reroute backup-prot-preempt optimize-bw |
Changes the backup protection preemption algorithm from minimizing the number of LSPs that are demoted to minimizing the amount of bandwidth that is wasted. |
Verifying the MPLS TE Fast Reroute Link and Node Protection Configuration
To determine if FRR has been configured correctly, enter the show mpls traffic-eng tunnels brief command and the show ip rsvp sender detail command. If you created LSPs and performed the required configuration tasks but do not have operational backup tunnels (that is, the backup tunnels are not up or the LSPs are not associated with those backup tunnels), enter the show mpls traffic-eng tunnel fast-reroute command.
|
|
|
|
show mpls traffic-eng tunnels brief |
Displays backup tunnel status. |
|
show ip rsvp sender detail |
Displays LSPs protection from the appropriate backup tunnels. |
|
show mpls traffic-eng tunnel fast-reroute |
Displays whether MPLS TE FRR node protection has been enabled and that a certain type of LSP can use a backup tunnel. |
|
show mpls traffic-eng tunnels backup |
Displays whether fast reroute backup is configured. Enter the command on the router where the backup tunnels originate. |
|
show mpls traffic-eng tunnel fast-reroute |
Displays the LSPs that are protected. |
|
show ip rsvp reservation |
When entered at the headend of the primary LSP, this command displays the status of FRR (local protection) at each hop this LSP traverses. The per-hop information is collected in the Record Route Object (RRO) that travels with the Resv message from the tail to the head. |
The following example shows how to verify that the backup tunnels are up:
switch# show mpls traffic-eng tunnels brief
LSP Tunnels Process: running
Passive LSP Listener: running
Periodic reoptimization: every 3600 seconds, next in 2822 seconds
Periodic FRR Promotion: Not Running
Periodic auto-bw collection: every 300 seconds, next in 206 seconds
TUNNEL NAME DESTINATION UP IF DOWN IF STATE/PROT
nxti-rt-1_t1 10.0.0.32 - Eth2/2 up/up
nxti-rt-1_t5 0.0.0.0 - unknown admin-down
nxti-rt-1_t123 192.168.20.123 - unknown admin-down
nxti-rt-1_t12345 192.168.20.1 - unknown admin-down
nxti-rt-1_t12345_12346 192.168.20.1 - unknown admin-down
nxti-rt-1_t12345_12346 192.168.20.1 - unknown admin-down
Displayed 6 (of 5) heads, 0 (of 0) midpoints, 0 (of 0) tails
The following example shows how to verify that the LSPs are protected by the appropriate backup tunnels. The output was when the command was entered at the PLR before a failure.
switch# show ip rsvp sender detail
Tun Dest: 10.0.0.32 Tun ID: 1 Ext Tun ID: 10.0.0.30
Tun Sender: 10.0.0.30 LSP ID: 850
Last Refresh Send: Nrefresh [18 seconds ago, status ok]
Setup Prio: 7, Holding Prio: 7
SE style Session Name:nxti-rt-1_t1
60.0.0.2 (Strict IPv4 Prefix, 8 bytes, prefix /32)
61.0.0.1 (Strict IPv4 Prefix, 8 bytes, prefix /32)
61.0.0.2 (Strict IPv4 Prefix, 8 bytes, prefix /32)
10.0.0.32 (Strict IPv4 Prefix, 8 bytes, prefix /32)
60.0.0.2 (Strict IPv4 Prefix, 8 bytes, prefix /32)
61.0.0.1 (Strict IPv4 Prefix, 8 bytes, prefix /32)
61.0.0.2 (Strict IPv4 Prefix, 8 bytes, prefix /32)
10.0.0.32 (Strict IPv4 Prefix, 8 bytes, prefix /32)
TSPEC: T=2, L=36: Version=0, 7 words
Token bucket frag (service_id=1, 6 words)
param id=127, flags=0, 5 words
avg rate=12500 bytes/sec, depth=1000 bytes
peak rate=12500 bytes/sec
min unit=40 bytes, max unit=500 bytes
Outbound FRR: No backup tunnel selected
Path ID handle: 0x98f00352.
Incoming policy: Accepted. Policy source(s): Default
Policy status: Forwarding. Policy Handle: 0x98f00353
The following example shows how to verify that MPLS TE FRR node protection has been enabled and that a certain type of LSP can use a backup tunnel.
Note
Enter the clear ip rsvp hello instance counters command to verify the following:
- MPLS TE FRR node protection has been enabled.
- A certain type of LSP can use a backup tunnel.
switch# show mpls traffic-eng tunnel fast-reroute
If LDP is not enabled, separate prefix items are not shown because all prefixes then use a single rewrite. To confirm that a particular IP prefix is FRR protected, even though it is not shown in this display, enter it within the show mpls forwarding-table ip-address detail command. The final line of the display will tell whether that prefix is protected:
switch# show mpls forwarding-table 10.0.0.11 detail
Local Outgoing Prefix Bytes tag Outgoing Next Hop
tag tag or VC or Tunnel Id switched interface
Tun hd Untagged 10.0.0.11/32 48 Eth5/0 point2point
MAC/Encaps=4/8, MTU=1520, Tag Stack{22}
No output feature configured
Fast Reroute Protection via (Tu0, outgoing label 12304)
The following example shows how to verify that the fast reroute backup is configured.
Enter the command on the router where the backup tunnels originate.
switch# show mpls traffic-eng tunnels backup
LSP Head, Tunnel578, Admin: up, Oper: up
Src 10.55.55.55, Dest 10.88.88.88, Instance 1
Fast Reroute Backup Provided:
Protected i/fs: PO1/0, PO1/1, PO3/3
Backup BW: any pool unlimited; inuse: 100 kbps
LSP Head, Tunnel5710, Admin: admin-down, Oper: down
Src 10.55.55.55, Dest 10.7.7.7, Instance 0
Fast Reroute Backup Provided:
Backup BW: any pool unlimited; inuse: 0 kbps
LSP Head, Tunnel5711, Admin up, Oper: up
Src 10.55.55.55,, Dest 10.7.7.7, Instance 1
Fast Reroute Backup Provided:
Backup BW: any pool unlimited; inuse: 6010 kbps
The following example shows how to display the LSPs that are protected.
Note
Enter the clear ip rsvp hello instance counters command to verify the following:
- MPLS TE FRR node protection has been enabled.
- A certain type of LSP can use a backup tunnel.
The output was entered at the headend of a primary LSP. Entering the command at the headend of the primary LSP shows the status of FRR (local protection) at each hop that this LSP traverses. The per-hop information is collected in the Record Route Object (RRO) that travels with the Resv message from the tail to the head.
Note the following about the primary LSP:
- It has protection that uses a NHOP backup tunnel at its first hop.
- It has protection and is actively using an NHOP backup tunnel at its second hop.
- It has no local protection at its third hop.
The RRO display shows the following information for each hop:
- Whether local protection is available (that is, whether the LSP has selected a backup tunnel).
- Whether local protection is in use (that is, whether the LSP is currently using its selected backup tunnel).
- Whether the selected backup tunnel is an NHOP or NNHOP backup tunnel.
- Whether the backup tunnel used at this hop provides bandwidth protection.
switch# show ip rsvp reservation detail
Tun Dest: 10.1.1.1 Tun ID: 1 Ext Tun ID: 172.16.1.1
Tun Sender: 172.16.1.1 LSP ID: 104
Next Hop: 172.17.1.2 on Eth1/0
Reservation Style is Shared-Explicit, QoS Service is Controlled-Load
Average Bitrate is 0 bits/sec, Maximum Burst is 1K bytes
Min Policed Unit: 0 bytes, Max Pkt Size: 0 bytes
172.18.1.1/32, Flags:0x1 (Local Prot Avail/to NHOP)
Label subobject: Flags 0x1, C-Type 1, Label 18
172.19.1.1/32, Flags:0x0 (Local Prot Avail/In Use/Has BW/to NHOP)
Label subobject: Flags 0x1, C-Type 1, Label 16
172.19.1.2/32, Flags:0x0 (No Local Protection)
Label subobject: Flags 0x1, C-Type 1, Label 0
Resv ID handle: CD000404.
Policy: Accepted. Policy source(s): MPLS/TE