No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE20E-S V800R010C10SPC500 Configuration Guide - MPLS 01

This is NE20E-S V800R010C10SPC500 Configuration Guide - MPLS
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
(Optional) Configuring the Egress Protection Function

(Optional) Configuring the Egress Protection Function

The egress protection function reduces E2E BFD sessions to be established, bandwidth resources to be consumed, and the burden on devices.

Context

In seamless MPLS scenarios, when an egress MASG fails, E2E BFD for BGP tunnel is used to instruct a CSG to perform VPN FRR switching. In this protection solution, both BGP LSPs and BFD sessions are in great numbers, which consumes a lot of bandwidth resources and burdens the device. To optimize the solution, the egress protection function can be configured on the master and backup MASGs. With this function enabled, both the master and backup MASGs assign the same private network label value to a core ASBR. If the master MASG fails, BFD for LDP LSP or BFD for TE can instruct a core ASBR to perform BGP FRR protection switching. After traffic is switched to the backup MASG, the MASG removes the BGP public network label and uses the private network label the same as that on the faulty master MASG to search for a matching VPN instance. Traffic can then be properly forwarded.

The egress protection function is configured on both the master and backup MASGs.

NOTE:

If the egress protection function is configured on egress MASGs between which a tunnel exists and a route imported by BGP on one of the MASGs is iterated to the tunnel, this MASG then iterates the route to another tunnel of a different type. In this case, traffic is directed to the other MASG, which slows down traffic switchover. As a result, the egress protection function does not take effect. To address this problem, specify non-relay-tunnel when running the import-route or network command to prevent the routes imported by BGP from being iterated to tunnels.

Prerequisites

Before configuring the egress protection function, complete the following tasks:

  • Configure a loopback interface on each of the master and backup MASGs. The IP address of each loopback interface on an MASG is used to establish a remote BGP peer relationship with a remote device.

  • Host routes to the loopback interfaces are imported into the BGP routing table, and both the master and backup MASGs assigns BGP labeled routes to a core ASBR. Therefore, the core ASBR has two BGP labeled routes destined for the same loopback interface. A routing policy is configured to enable the core ASBR to select one route to implement BGP FRR.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run ip vpn-instance vpn-instance-name

    The VPN instance view is displayed.

  3. Run ipv4-family

    The VPN instance IPv4 address family view is displayed.

  4. Run route-distinguisher route-distinguisher

    An RD is configured for the VPN instance IPv4 address family.

  5. Run apply-label per-instance static static-label-value

    A device is enabled to assign the same static label to all routes destined for a remote PE in a VPN instance IPv4 address family.

    The same static label value must be set on both the master and backup MASGs.

    NOTE:

    A change in the label allocation mode leads to re-advertising of IPv4 address family routes in a VPN instance. This step causes a temporary service interruption. Exercise caution when using this command.

  6. Run commit

    The configuration is committed.

Translation
Download
Updated: 2019-01-03

Document ID: EDOC1100055103

Views: 21805

Downloads: 37

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next