HP MSR2000/3000/4000 Router Series MPLS Configuration Guide

64
To configure an associated bidirectional MPLS TE tunnel:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter MPLS TE tunnel interface
view.
interface tunnel tunnel-number
[ mode mpls-te ]
N/A
3. Configure an associated
bidirectional MPLS TE tunnel.
mpls te bidirectional associated
reverse-lsp { lsp-name lsp-name |
lsr-id ingress-lsr-id tunnel-id
tunnel-id } }
By default, no bidirectional tunnel
is configured, and tunnels
established on the tunnel interface
are unidirectional MPLS TE tunnels.
Configuring CRLSP backup
CRLSP backup provides end-to-end CRLSP protection. Only MPLS TE tunnels established through RSVP-TE
support CRLSP backup.
Perform this task on the ingress node of an MPLS TE tunnel.
To configure CRLSP backup:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter MPLS TE tunnel interface
view.
interface tunnel tunnel-number
[ mode mpls-te ]
N/A
3. Enable CRLSP backup and
specify the backup mode.
mpls te backup { hot-standby |
ordinary }
By default, tunnel backup is
disabled.
4. Specify a path for the primary
CRLSP and set the preference
of the path.
mpls te path preference value
{ dynamic | explicit-path
path-name }
By default, MPLS TE uses the
dynamically calculated path to set
up the primary CRLSP.
5. Specify a path for the backup
CRLSP and set the preference
of the path.
mpls te backup-path preference
value explicit-path path-name
N/A
Configuring MPLS TE FRR
MPLS TE FRR provides temporary link or node protection on a CRLSP. When you configure FRR, note the
following restrictions and guidelines:
Do not configure both FRR and RSVP authentication on the same interface.
Only MPLS TE tunnels established through RSVP-TE support FRR.
Use bypass tunnels to protect only crucial interfaces or links when bandwidth is insufficient because
bypass tunnels are pre-established and require extra bandwidth.
You can specify which type of CRLSPs can use a bypass tunnel, whether a bypass tunnel provides
bandwidth protection, and the sum of protected bandwidth. Make sure the bandwidth assigned to
the bypass tunnel is no less than the total bandwidth needed by all primary CRLSPs. Otherwise,
some primary CRLSPs might not be protected by the bypass tunnel.