No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

CLI-based Configuration Guide - IP Unicast Routing

AR100, AR120, AR150, AR160, AR200, AR1200, AR2200, AR3200, and AR3600 V200R010

This document describes the concepts and configuration procedures of IP Service features on the device, and provides the configuration examples.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
IS-IS Auto FRR

IS-IS Auto FRR

With the development of networks, the services such as Voice over IP (VoIP) and online video services require high-quality real-time transmission. Nevertheless, if an IS-IS link fault occurs, traffic can be switched to a new link only after the processes, including fault detection, LSP update, LSP flooding, route calculation, and FIB entry delivery, are complete. As a result, it takes much more than 50 ms to rectify the fault, which cannot meet the requirement for real-time transmission services on the network.

IP Fast Reroute Loop-Free Alternates), IS-IS Auto FRR protects traffic when links or nodes become faulty. IS-IS Auto FRR allows the forwarding system to rapidly detect such faults and take measures to restore services as soon as possible.

In most cases, you can bind BFD to IS-IS Auto FRR to ensure that the fault recovery time is within 50 ms. When BFD detects a link fault on an interface, the BFD session goes Down, triggering FRR on the interface. Subsequently, traffic is switched from the faulty link to the backup link, which protects services.

NOTE:

AR100&AR120&AR150&AR160&AR200 series do not support IS-IS Auto FRR.

Principles

IS-IS Auto FRR pre-computes a backup link by using the Loop-Free Alternate (LFA) algorithm, and then adds the backup link and the primary link to the forwarding table. In the case of an IS-IS network failure, IS-IS Auto FRR can fast switch traffic to the backup link before routes on the control plane converge. This ensures normal transmission of traffic and improves the reliability of the IS-IS network.

The backup link is calculated through the LFA algorithm. With the neighbor that can provide the backup link being the root, the shortest path to the destination node is calculated by a device through the SPF algorithm.

IS-IS Auto FRR can filter backup routes that need to be added to the IP routing table. Only the backup routes matching the filtering policy are added to the IP routing table. In this manner, users can flexibly control the addition of IS-IS backup routes to the IP routing table.

Applications

IS-IS Auto FRR support traffic engineering (TE) links, including the following types:

  • IP protecting TE

    As shown in Figure 7-18, the TE tunnel has the smallest IS-IS cost among the paths from RouterS to RouterD. Therefore, RouterS selects the TE tunnel as the primary path to RouterD. The path RouterS->RouterN->RouterD has the second smallest cost. According to the LFA algorithm, RouterS selects the path RouterS->RouterN->RouterD as the backup path. The outbound interface of the backup path is the interface that connects RouterS to RouterN.

    NOTE:

    If the outbound interface of the backup link is the actual outbound interface of the TE tunnel, IP protecting TE fails.

    Figure 7-18 IP protecting TE

  • TE protecting IP

    As shown in Figure 7-19, the physical path RouterS-->RouterN-->RouterD has the smallest IS-IS metric among the paths from RouterS to RouterD. Therefore, RouterS prefers the path RouterS-->RouterN-->RouterD as the primary path from RouterS to RouterD. The IS-IS cost of the TE tunnel is 12, and the explicit path of the TE tunnel is the direct link from RouterS to RouterD. The IS-IS metric of the direct link from RouterS to RouterD is 13, which is greater than the IS-IS metric of the TE tunnel. Therefore, IS-IS selects the TE tunnel as the backup path. TE protecting IP is implemented.

    Figure 7-19 TE protecting IP

IS-IS Auto FRR traffic protection is classified into link protection and link-node dual protection.

Figure 7-20 IS-IS Auto FRR link protection

Figure 7-21 IS-IS Auto FRR link-node dual protection

Table 7-5 IS-IS Auto FRR traffic protection
Traffic Protection Type Object Protected Condition Application Example
Link protection Traffic passing through a specific link

The link cost must satisfy the following inequality:

Distance_opt(N,D) < Distance_opt(N,S) + Distance_opt(S,D)

In Figure 7-20, traffic is transmitted from RouterS to RouterD. The link cost satisfies the link protection inequality. When the primary link fails, RouterS switches the traffic to the backup link RouterS->RouterN so that the traffic can be further transmitted along downstream paths. This ensures that the traffic interruption time is within 50 ms.

Link-node dual protection Next-hop node or link from the local node to the next-hop node. Node protection takes precedence over link protection.
Link-node dual protection must satisfy the following conditions:
  • The link cost must satisfy the following inequality:

    Distance_opt(N,D) < Distance_opt(N,S) + Distance_opt(S,D)

  • The interface cost of the router must satisfy the following inequality:

    Distance_opt(N,D) < Distance_opt(N,E) + Distance_opt(E,D)

In Figure 7-21, traffic is transmitted along the path RouterS->RouterE->RouterD. The link cost satisfies the link protection inequality. When RouterE or the link between RouterS and RouterE fails, RouterS switches the traffic to the backup link RouterS->RouterN so that the traffic can be further transmitted along downstream paths. This ensures that the traffic interruption time is within 50 ms.

NOTE:

In Table 7-5, Distance_opt(X,Y) indicates the cost of the optimal path between node X and node Y. S indicates the source node of traffic; E indicates the faulty node; N indicates the node on the backup link; D indicates the destination node of traffic.

Translation
Download
Updated: 2019-08-12

Document ID: EDOC1100034072

Views: 114584

Downloads: 168

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next