EasyManuals Logo
Home>Juniper>Software>JUNOSE 11.2.X BGP AND MPLS

Juniper JUNOSE 11.2.X BGP AND MPLS User Manual

Juniper JUNOSE 11.2.X BGP AND MPLS
742 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #332 background imageLoading...
Page #332 background image
Suppose you have configured both LER 1 and LER 2 to request bypass protection, and
have configured the following two bypass tunnels:
LSR 5 –> LSR 8 –> LSR 6
LSR 6 –> LSR 9 –> LSR 7
If link LSR 5 –> LSR 6 fails, RSVP-TE redirects traffic through LSR 5 –> LSR 8 –> LSR 6.
If link LSR 6 –> LSR 7 fails, RSVP-TE redirects traffic through LSR 6 –> LSR 9 –> LSR 7.
These two bypass tunnels therefore protect all LSPs routed from LER 1 or LER 2 through
LSRs 5, 6, and 7. Notice in Figure 63 on page 295 that if both protected links fail, traffic is
still safely redirected through LSR 5 –> LSR 8 –> LSR 6 –> LSR 9 –> LSR 7.
If you want to protect an LSP that traverses N nodes against a failure in any link, then
you must configure N-1 bypass tunnels. As shown in Figure 63 on page 295, each of those
bypass tunnels in turn can protect multiple tunnels.
On detecting the link failure, the PLR redirects traffic arriving on all of the protected
primary tunnels to the bypass tunnel that protects the failed link. An additional label
representing the bypass tunnel is stacked on the redirected packets. This label is popped
either at the router that is the remote end of the protected link or at the penultimate hop.
The merge point therefore sees traffic with the original label representing the primary
tunnel.
When the ingress router learns by RSVP-TE signaling that local protection (a bypass
tunnel) is in use, it attempts to find a new optimal path for the tunnel, based on the
configured path options. The ingress router sets up the new tunnel before it tears down
the old tunnel with the failed link, and switches its traffic to the new tunnel.
You can use the tunnel mpls path-option command to configure path options on the
bypass tunnel. However, the link being protected by the bypass tunnel must not be in
the path if you specify an explicit path.
Configuration Example
The following steps show a partial configuration using the topology in Figure 63 on
page 295:
1. On LSR 5, create a bypass tunnel to protect the link between LSR 5 and LSR 6. If
you configure path options, you can specify the explicit path for the bypass tunnel
either statically or to be dynamically calculated by the IGP traffic engineering
mechanism.
host1(config)#interface tunnel mpls:bypass56
host1(config-if)#tunnel mpls path-option 1 explicit name bypass
host1(config-if)#tunnel destination 172.20.1.1
host1(config-if)#exit
2. On LSR 5, enable the explicit path, if configured.
host1(config)#mpls explicit-path name bypass enable
host1(config-expl-path)#next-address 10.10.9.2
host1(config-expl-path)#exit
3. On LSR 5, assign the bypass tunnel to the interface being protected.
Copyright © 2010, Juniper Networks, Inc.296
JunosE 11.2.x BGP and MPLS Configuration Guide

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Juniper JUNOSE 11.2.X BGP AND MPLS and is the answer not in the manual?

Juniper JUNOSE 11.2.X BGP AND MPLS Specifications

General IconGeneral
BrandJuniper
ModelJUNOSE 11.2.X BGP AND MPLS
CategorySoftware
LanguageEnglish

Related product manuals