Configuration prerequisites – H3C Technologies H3C Intelligent Management Center User Manual
Page 195

You can define which type of LSP can use bypass LSPs, and whether a bypass LSP provides bandwidth
protection as well as the sum of protected bandwidth.
The bandwidth of a bypass LSP is to protect its primary LSPs. To guarantee that a primary LSP can always
bind with the bypass LSP successfully, make sure that the bandwidth assigned to the bypass LSP is not less
than the total bandwidth needed by all protected LSPs.
Normally, bypass tunnels only forward data traffic when protected primary tunnels fail. To allow a
bypass tunnel to forward data traffic while protecting the primary tunnel, you need to make sure that
bypass tunnels are available with adequate bandwidth.
A bypass tunnel cannot be used for services like VPN at the same time.
Configuration prerequisites
Before you configure FRR, complete the following tasks:
•
Configure IGP, ensuring that all LSRs are reachable.
•
Configure MPLS basic capabilities.
•
Configure MPLS TE basic capabilities.
•
Establish an MPLS TE tunnel with RSVP-TE.
•
Set up primary LSPs.
You need to make sure that MPLS and MPLS TE basic capabilities are enabled on your devices before
you can manage your TE networks using MPLS TE Manager. The configuration instructions for enabling
MPLS and MPLS TE basic capabilities may differ from device to device. For detailed configuration
instructions, see the configuration guide of your device.
To configure link protection:
1.
Click Service > MPLS TE Manager > Protection Mng from the tabular navigation system on the top
of the IMC main page.
2.
In the Protected Tunnel List section of the page, select a tunnel that you want to use as the bypass
tunnel, and then click FRR Protection.
3.
Select Link Protection from the Protection Type list.
4.
Click Next.
5.
In the Link List section of the page, select the primary tunnel that you want to protect.
6.
Click Next.
7.
In the Protected Tunnel List section of the page, select the bypass tunnel, and then click Bound >
Complete. The bypass tunnel is bound with the primary tunnel and disappears from the Protected
Tunnel List section.
8.
To view detailed information about the protection, click the Operation icon
.
To configure node protection:
185