Configure node protection for tunnels – HP Intelligent Management Center Licenses User Manual

Page 105

Advertising
background image

Router D: LSR ID address is 4.4.4.4/32; address of Ethernet 1/0 is 4.2.1.2/24.

Router E: LSR ID address is 5.5.5.5/32; address of POS 5/0 is 5.2.1.2/24; address of POS
5/1 is 6.2.1.2/24.

Scenario Analysis

Create tunnel A through a dynamic signaling protocol. The tunnel path is Router A -> Router B ->
Router C -> Router D. In this tunnel, the link between Router B and Router C is to transmit important
service data, therefore required to be protected. Create tunnel B through a dynamic signaling
protocol. The tunnel path is Router B -> Router E -> Router C. Tunnel B can well protect tunnel A.
Once the link between Router B and Router C fails, tunnel A's path will change to Router A ->
Router B -> Router E -> Router C -> Router D.

Operation Procedure

1.

Import devices to the MPLS TE manager.
a.

Select the Service tab, and then select ResourceDevice from the navigation tree to enter
the MPLS TE device management page.

b.

Click Import Device to import devices. For details, refer to Resource Management.

2.

Configure dynamic MPLS TE tunnels.
a.

Select the Service tab, and then click MPLS TE Tunnel Management in the navigation tree
to enter the MPLS TE tunnel list page.

b.

Click Add to perform dynamic tunnel configuration. For details, refer to MPLS TE Tunnel
Management.

3.

Configure FRR link protection.
a.

Select the Service tab, and then click Protection Management in the navigation tree to
enter the protection management page.

b.

Select a tunnel record, click the FRR Protection button to enter the FRR protection type
selection page.

c.

Select Link Protection from the Protection Type drop-down list. Click Next to enter the
tunnel's link list page.

d.

Select the link you want to protect, and then click Next to enter the backup tunnel list
page.

e.

Select an unbound backup tunnel, and then click Bind.

Configure node protection for tunnels

Application Scenario

A company has five offices, office A through office E, which are connected with one another
through networks. It is required to protect the link between office B and office D. Once the link
fails (for example, the device in office C fails), data packets can be forwarded quickly through
another path, and, after the link resumes, data packets can be forwarded through the link again.

Typical applications 105

Advertising