75
• Only MPLS TE tunnels established through RSVP-TE support FRR.
Enabling FRR
Perform this task on the ingress node of a primary CRLSP.
To enable FRR:
1. Enter system view.
system-view
N/A
2. Enter tunnel interface view of
the primary CRLSP.
interface tunnel
tunnel-number
[
mode
mpls-te
]
N/A
3. Enable FRR.
mpls te fast-reroute
[
bandwidth
]
By default, FRR is disabled.
If you specify the
bandwidth
keyword, the primary CRLSP
must have bandwidth protection.
Configuring a bypass tunnel on the PLR
Overview
To configure FRR, you must configure bypass tunnels for primary CRLSPs on the PLR.
To configure bypass tunnels on the PLR, you can use the following methods:
• Manually configuring a bypass tunnel on the PLR—Create an MPLS TE tunnel on the PLR,
and configure the tunnel as a bypass tunnel for a primary CRLSP. You need to specify the
bandwidth and CT that the bypass tunnel can protect, and bind the bypass tunnel to the egress
interface of the primary CRLSP.
You can configure up to three bypass tunnels for a primary CRLSP.
• Configuring the PLR to set up bypass tunnels automatically—Configure the automatic
bypass tunnel setup function (also referred to as the auto FRR function) on the PLR. The PLR
automatically sets up two bypass tunnels for each of its primary CRLSPs: one in link protection
mode and the other in node protection mode. Automatically created bypass tunnels can be
used to protect any type of CT, but they cannot provide bandwidth protection.
A primary tunnel can have both manually configured and automatically created bypass tunnels. The
PLR will select one bypass tunnel to protect the primary CRLSP. The selected bypass tunnel is
bound to the primary CRLSP.
Manually created bypass tunnels take precedence over automatically created bypass tunnels. An
automatically created bypass tunnel in node protection mode takes precedence over an
automatically created bypass tunnel in link protection mode. Among manually created bypass
tunnels, the PLR selects the bypass tunnel for protecting the primary CRLSP by following these
rules:
1. Selects a bypass tunnel according to the principles, as shown in Table 2.
2. Prefers the bypass tunnel in node protection mode over the one in link protection mode.
3. Prefers the bypass tunnel with a smaller ID over the one with a bigger tunnel ID.