Post on 02-Mar-2016
description
Tellabs 8600 Managed Edge SystemMPLS Applications Configuration Guide
50123_0230.10.09
Document Information
Revision History
DocumentNo.
Date Description of Changes
50123_02 30.10.09 Added LSP affinity bits usage in 1.3 LSP Affinity Constraints.Added FRR in 1.7 Fast Reroute. One-to-one backup
Facility backup
FRR fault management
FRR CLI examples 2.5 FRR CLI Configuration Examples.
This manual documents the following network elements and the corresponding feature packs:
FP1.3 Tellabs 8605 access switch
FP1.0A Tellabs 8607 access switch
FP2.11 Tellabs 8620 access switch, Tellabs 8630 access switch, Tellabs 8660 edge switch
2009 Tellabs. All rights reserved.
This Tellabs manual is owned by Tellabs or its licensors and protected by U.S. and international copyright laws, conventions andtreaties. Your right to use this manual is subject to limitations and restrictions imposed by applicable licenses and copyright laws.Unauthorized reproduction, modification, distribution, display or other use of this manual may result in criminal and civil penalties.The following trademarks and service marks are owned by Tellabs Operations, Inc. or its affiliates in the United States and/or
other countries: TELLABS, TELLABS logo, TELLABS and T symbol, and T symbol.
Any other company or product names may be trademarks of their respective companies.
The specifications and information regarding the products in this manual are subject to change without notice. All statements,information, and recommendations in this manual are believed to be accurate but are presented without warranty of any kind,
express or implied. Users must take full responsibility for their application of any products.
Adobe Reader are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
2
Document Information
Terms and Abbreviations
Term Explanation
ATM Asynchronous Transfer Mode
BA Behavior Aggregate
BC Bandwidth Constraint
BD Business Data
BE Best Effort
BFD Bidirectional Forwarding Detection
BGP Border Gateway Protocol
CAC Connection Admission Control
CLI Command Line Interface
CS Class Selector
CSPF Constrained Shortest Path First
CT Class Type
DSCP DiffServ Code Point
DS-TE Differentiated Services-aware MPLS Traffic Engineering
E-LSP EXP-Inferred-PSC LSP
ERO Explicit Route Object
FFD Fast Failure Detection
FM Fault Management
FR Frame Relay
FRR Fast Reroute
HE Head-End
IETF Internet Engineering Task Force
IGP Interior Gateway Protocol
IP Internet Protocol
LDP Label Distribution Protocol (MPLS)
L-LSP Label-Only-Inferred-PSC LSP
LSP Label Switched Path
LSR Label Switch Router
MAM Maximum Allocation Model
MP Merging Point
MP-BGP Multiprotocol Border Gateway Protocol
MPLS Multiprotocol Label Switching
NE Network Element
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
3
Document Information
OA Ordered Aggregate
OAM Operation and Maintenance
OSPF Open Shortest Path First
PD Priority Data
PE Provider Edge
PHB Per Hop Behavior
PHP Penultimate Hop Popping
PLR Point of Local Repair
P-LSP Protected LSP
POS Packet over SDH/SONET
PSC PHB Scheduling Class
PSN Packet Switched Network
QoS Quality of Service
RDM Russian Dolls Model
RFC Request For Comments (IETF documents)
RRO Record Route Object
RSVP-TE Resource Reservation Protocol with Traffic Engineering Extensions
RT Real Time
SDH Synchronous Digital Hierarchy
SONET Synchronous Optical Network
TCP Transmission Control Protocol
TE Traffic Engineering
ToS Type of Service
UDP User Datagram Protocol
VC Virtual Circuit
VoIP Voice over Internet Protocol
VPN Virtual Private Network
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
4
Table of Contents
Table of Contents
About This Manual ............................................................................................................ 7
Objectives....................................................................................................................................................................... 7Audience......................................................................................................................................................................... 7Related Documentation .................................................................................................................................................. 8Interface Numbering Conventions ................................................................................................................................. 8Document Conventions .................................................................................................................................................. 8Documentation Feedback............................................................................................................................................... 9
1 MPLS Overview ........................................................................................................... 10
1.1 Label Distribution................................................................................................................................................ 111.1.1 LDP...................................................................................................................................................... 111.1.2 RSVP-TE............................................................................................................................................. 11
1.2 MPLS Support of Differentiated Services........................................................................................................... 121.2.1 EXP-Inferred-PSC LSPs (E-LSP) ...................................................................................................... 121.2.2 Label-Only-Inferred-PSC LSPs (L-LSP) ............................................................................................ 121.2.3 DiffServ Tunneling Models over MPLS ............................................................................................. 12
1.3 LSP Affinity Constraints ..................................................................................................................................... 161.4 MPLS Protection Switching ................................................................................................................................ 18
1.4.1 MPLS Local Protection ....................................................................................................................... 191.4.2 RSVP-TE based 1:1 Protection Switching .......................................................................................... 191.4.3 MPLS OAM based 1+1 Protection Switching ................................................................................... 19
1.5 MPLS Traffic Engineering................................................................................................................................... 201.6 DiffServ-Aware MPLS Traffic Engineering ........................................................................................................ 21
1.6.1 Maximum Allocation Model ............................................................................................................... 211.6.2 Russian Dolls Model ........................................................................................................................... 22
1.7 Fast Reroute......................................................................................................................................................... 221.7.1 Overview ............................................................................................................................................. 221.7.2 FRR Application.................................................................................................................................. 22
1.8 MPLS References ................................................................................................................................................ 30
2 MPLS Configuration Examples .................................................................................. 31
2.1 LDP Configuration .............................................................................................................................................. 312.2 Explicitly Routed RSVP-TE LSPs ...................................................................................................................... 31
2.2.1 RSVP-TE Configuration...................................................................................................................... 322.2.2 E-LSP Configuration ........................................................................................................................... 332.2.3 L-LSP Configuration ........................................................................................................................... 352.2.4 RSVP-TE Path Protection Configuration ............................................................................................ 372.2.5 DiffServ Tunneling Model Configuration ........................................................................................... 38
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
5
Table of Contents
2.3 DS-TE Network Example.................................................................................................................................... 382.4 LSP 1+1 Protection Configuration Example ....................................................................................................... 55
2.4.1 LSP 1+1 Protection with RSVP Tunnels............................................................................................. 552.4.2 LSP 1+1 Protection with Static Tunnels.............................................................................................. 58
2.5 FRR CLI Configuration Examples ...................................................................................................................... 592.5.1 FRR One-to-One.................................................................................................................................. 602.5.2 Facility Backup.................................................................................................................................... 66
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
6
About This Manual
About This Manual
This chapter discusses the objectives and intended audience of this manual, Tellabs 8600ManagedEdge System MPLS Applications Configuration Guide and consists of the following sections:
Objectives
Audience
Related Documentation
Conventions
Documentation Feedback
Objectives
This manual provides an overview of the Tellabs 8600 managed edge system MPLS applicationsand instructions on how to configure them with a Command-line Interface (CLI) using a routersconsole or remote terminal (telnet).
Audience
This manual is designed for administration personnel for configuring Tellabs 8600 managed edgesystem functions with CLI. On the other hand, Tellabs 8000 Network Manager provides access toequal functionality for administration personnel with a graphical user interface.
It is assumed that you have a basic understanding of Ethernet, POS, IP, MPLS, VPN andDifferentiated Services concepts. This manual also assumes that you are familiar with the followingprotocols:
IP routing
UDP
TCP
Differentiated Services
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
7
About This Manual
Related Documentation1
Tellabs 8600 Managed Edge System VPNsConfiguration Guide (50128_XX)
Provides an overview of Tellabs 8600 systemvirtual private network (VPN) functions andinstructions on how to configure them with CLI.
Tellabs 8600 Managed Edge System CLICommands Manual (50117_XX)
Provides commands available to configure,monitor and maintain Tellabs 8600 managed edgesystem products with CLI.
Tellabs 8600 Managed Edge System RoutingProtocols Configuration Guide (50121_XX)
Provides an overview of Tellabs 8600 systemrouting protocol functions and instructions on howto configure them with CLI.
Tellabs 8600 Managed Edge System Test andMeasurement Configuration Guide (50124_XX)
Provides an overview of Tellabs 8600 managededge system testing and measurement tools,connectivity verification and instructions forconfiguring them with CLI.
Interface Numbering Conventions
To be able to follow more easily the feature descriptions and configuration examples given in thisdocument, see also the Tellabs 8600 system interface numbering and related figures described inTellabs 8600 Managed Edge System CLI Commands Manual.
Document Conventions
This is a note symbol. It emphasizes or supplements information in the document.
This is a caution symbol. It indicates that damage to equipment is possible if the instructionsare not followed.
This is a warning symbol. It indicates that bodily injury is possible if the instructions are notfollowed.
1To make sure the references point to the latest available document versions, please refer to the Tellabs 8600 Document Set Description that can befound in Tellabs Portal www.portal.tellabs.com by navigating to Product Documentation -> Data Networking-> Tellabs 8600 Managed Edge System-> Technical Documentation-> Document Set Description.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
8
About This Manual
Documentation Feedback
Please contact us to suggest improvements or to report errors in our documentation:
Email: fi-documentation@tellabs.com
Fax: +358.9.4131.2430
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
9
1 MPLS Overview
1 MPLS Overview
The inherently connection-oriented nature of Multiprotocol Label Switching (MPLS)Label-Switched Paths (LSPs), allows several new networking applications to be introduced into theIP network infrastructure of the service provider. The ongoing MPLS deployments add value both interms of enabling state-of-the-art network engineering techniques, and also in terms of enabling theintroduction of new types of end-user service offerings. Most notably, the new network engineeringtechniques include MPLS Traffic Engineering (TE), Differentiated Services (DiffServ) aware MPLSTraffic Engineering, and different types of LSP-based network protection schemes.
In addition to aiding many network engineering tasks in operational Internet Protocol (IP) routinginfrastructure of the service provider, LSPs are also extremely useful on the network servicelayer, where they can be used as Virtual Private Network (VPN) tunnels through shared networkinfrastructure. The MPLS-based VPN applications supported by the Tellabs 8600 Network Elements(NE) are described in Tellabs 8600 Managed Edge System VPNs Configuration Guide.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
10
1 MPLS Overview
1.1 Label Distribution
In order to be able to perform label switching, the Label Switch Router (LSR) nodes in an MPLSnetwork have to first agree on the label values to be used for each label-switched path. Whenentering an MPLS domain, a short, fixed-length label is assigned to the packets at the ingress LSR,and removed at the egress LSR. The label values used in the network have only local significancealong each path, i.e. each label switching node swaps the incoming label value to an outgoing labelvalue, according to the contents of the label forwarding table of the node.
In the Tellabs 8600 system, the supported LSP signaling protocols are the following:
Label Distribution Protocol (LDP)
Resource Reservation Protocol with Traffic Engineering extensions (RSVP-TE).
In the [RFC4364] VPN application, also Multiprotocol Border Gateway Protocol (MP-BGP) is usedfor carrying labels between the ingress and egress Provider Edge (PE) nodes. This topic is detaileddiscussed in the Tellabs 8600 Managed Edge System VPNs Configuration Guide.
1.1.1 LDP
LDP is a session protocol that uses Transmission Control Protocol (TCP) as a transport layer. Adiscovery mechanism based on the User Datagram Protocol (UDP) automatically builds LDPsessions between directly connected LSRs. Once an LDP session is established, it distributeslabel information between the LSRs. This may be done either in Downstream on Demand mode,in which an LSR explicitly requests label information from its peer, or Downstream Unsolicitedmode, in which label information is sent without waiting for a request. Only one of these modes isused at a time.
1.1.2 RSVP-TE
RSVP-TE is a signaling protocol used for reserving labels and bandwidth across an explicitlyrouted network path. For accommodating LSP construction, MPLS traffic engineering extensionshave been added to the traditional RSVP protocol used in conjunction with the IntServ Quality ofService (QoS) model. These traffic engineering extensions are defined in [RFC3209]. To envisionan RSVP-TE LSP tunnel, remember that it is a virtual trunk that makes one Tellabs 8600 NEappear to be directly connected to another Tellabs 8600 NE. As with all LSPs, an RSVP-TE LSP isunidirectional. In order to get bidirectional data flow between two nodes A and B, an LSP must bebuilt first from A to B, and then from B to A.
In case the RSVP-TE tunnel LSPs are signalled with bandwidth reservations, each Tellabs 8600NE on the signaling path performs Connection Admission Control (CAC), in order to determinewhether the LSP path request can be accommodated or not. If bandwidth reservations are not made,the end result will be just an explicitly routed, point-to-point LSP tunnel between two Tellabs 8600NEs (typically the ones acting as edge LSRs at the edge of the MPLS network domain).
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
11
1 MPLS Overview
1.2 MPLS Support of Differentiated Services
[RFC3270] defines a solution for supporting DiffServ over MPLS networks. It defines two differenttypes of LSPs, which differ in the way the carried DiffServ Per Hop Behavior (PHB) SchedulingClass(es) (PSCs) are inferred:
EXP-Inferred-PSC LSPs (E-LSP)
Label-Only-Inferred-PSC LSPs (L-LSP)
1.2.1 EXP-Inferred-PSC LSPs (E-LSP)
E-LSPs support up to eight Behavior Aggregates (BAs), i.e. packets of up to 8 different PHBs. The3-bit EXP field of the MPLS shim header conveys to the LSRs the appropriate PHB (both dropprecedence and scheduling class) to be applied to the packet. The mappings between the EXP fieldvalues and the PHBs are either explicitly signalled, or rely on the preconfigured mapping tables.
1.2.2 Label-Only-Inferred-PSC LSPs (L-LSP)
L-LSPs transport only a single Ordered Aggregate (OA), i.e. a set of BAs sharing the same orderingconstraint. These include e.g. packets belonging to the AF11, AF12, and AF13 PHBs. This isimplemented so that the scheduling treatment of the packet (PSC) is determined from its label value,and the drop precedence is carried in the EXP bits of the MPLS shim header. The used PSC isexplicitly signalled at the time of establishing an L-LSP.
1.2.3 DiffServ Tunneling Models over MPLS
When traversing a label switched path, each labelled IP packet can carry at least two separateinstances of DiffServ PHB information, i.e. the DiffServ Code Point (DSCP) marking on the carrieddatagram itself, and the PHB information inferred from the MPLS shim header fields. In the case ofthe [RFC4364] VPN applications, there are two MPLS shim headers, and thus each VPN datagramcan carry even three different PHB markings. This inherent property of MPLS LSPs allows theinner PHB information to be transparently carried over the MPLS network, which can be very usefulwhen the MPLS network domain belongs to a different QoS policy domain than the one whose IPpackets the LSP is carrying.
Some MPLS networks may also make use of Penultimate Hop Popping (PHP), which means that theoutermost label is popped out already at the last hop before the egress LSR. If the outermost MPLSshim header does not contain any useful label switching or DiffServ information from the point ofview of the egress LSR, it may request the penultimate LSR to perform PHP. This can be done e.g.with LDP by advertising the implicit NULL label value to the penultimate LSR.
Exactly how the PHB markings on the different layers can be used and interpreted at each hop ofthe traversed LSP, depends on the chosen DiffServ Tunnelling Model. The three models defined in[RFC3270] and supported by the Tellabs 8600 system are called the Pipe Model, Short Pipe Model,and the Uniform Model, of which the Pipe Model is the Tellabs 8600 system default model.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
12
1 MPLS Overview
Example Networking Scenario
Some enterprise networks may still mark VoIP packets with the Class Selector 5 (CS5) codepoint,where only the 3 most significant bits of the DSCP field are used for selecting the forwardingtreatment. The reason for not using the standardized EF codepoint for VoIP is that some legacyVoIP terminals and/or networking equipment may not even support processing of the whole 6bitDSCP field, but can instead only process the 3 precedence bits specified in the original IP Type ofService (ToS) octet definition.
Thus, if the network of the service provider uses only the EF PHB and its standardized codepointfor VoIP, and therefore does not have any specific configurations for the Class Selector codepointsin each and every network node, the VoIP packets may end up in the Best Effort (BE) queue (i.e.receive the Default Forwarding treatment).
In order to avoid this, the ingress LSR can, of course, use e.g. QoS mapping tables or DiffServmulti-field classifiers for reclassifying the VoIP packets to the EF PHB. However, if the VoIP trafficwill re-enter the network of the enterprise after the LSP is terminated, the DSCP field of the VoIPpacket should preferably not be overwritten, but the chosen MPLS domain PHB should instead beindicated only in the MPLS shim header fields.
In this way, the LSRs can use the outermost, service provider controlled DiffServ informationfor their queuing decisions, while the innermost, enterprise-controlled DiffServ information getstransparently carried over the whole MPLS network domain. Thus, when the LSP is terminatedin the egress LSR and the VoIP packets are delivered back into the QoS policy domain of theenterprise, the delivered packets will still be marked with the original CS5 codepoints.
The following tunnelling model specific examples deal only with the basic case of encapsulatingIP packets inside single level label stacks. However, the very same techniques can also be appliedto multilevel label stacks, i.e. the DiffServ tunnelling actions are always applied to each label inthe stack at the ingress and egress points of the LSPs, i.e. the points of pushing and popping thelabel in question.
Pipe Model
The Pipe Model is the only mandatory tunneling model in [RFC3270] and is also the Tellabs 8600system default model. Since the egress LSR makes use of both the inner and the outer DiffServinformation, it can only be used without PHP, as illustrated below.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
13
1 MPLS Overview
Fig. 1 Pipe Model
In the above example with one level label stack, (M) denotes the outer MPLS shim header DiffServinformation and (D) the inner IP header DSCP field DiffServ information. All LSRs on the labelswitched path, including the egress LSR, use the outer MPLS header DiffServ information forselecting the appropriate PHB (e.g. the EF forwarding treatment typically used for VoIP). The innerDiffServ information (e.g. the CS5 codepoint markings still found on some enterprise VoIP packets)has simply been tunnelled through the MPLS network untouched.
Short Pipe Model
The Short Pipe Model is a slight variation of the Pipe Model. The only difference is that with theShort Pipe Model the DiffServ forwarding treatment at the egress LSR is chosen based on theinner DiffServ information.
The Short Pipe Model can be used with or without PHP, as illustrated below.
Fig. 2 Short Pipe Model
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
14
1 MPLS Overview
Fig. 3 Short Pipe with PHP
Uniform Model
In the Uniform Model, each packet carries only one piece of DiffServ information, which isalways encoded in the outer most label entry. Thus, in spite of being categorized as a DiffServtunnelling model, the Uniform Model effectively does not tunnel any DiffServ information throughthe MPLS network.
The Uniform Model can be used with or without PHP, as illustrated below.
Fig. 4 Uniform Model
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
15
1 MPLS Overview
Fig. 5 Uniform Model with PHP
1.3 LSP Affinity Constraints
This section describes how affinity constraints of MPLS LSPs are related to "include" and"exclude" attributes of VPN routes and pseudowires.
Although LSP affinity constraint bits are logically similar in function to MPLS administrativegroups (aka link colors, aka link affinities), they are not related and are completelyindependent of each other. For example include-any given for link color for RSVP trunk hasno effect on PWE3 association for RSVP trunk.
By default any inner LSP (L3VPN, PWE3) can use any outer LSP (LDP, RSVP, static) that is goingto a desired destination. The constraints are constructed from two parts:
Affinities and protocol limits on outer LSP
Include or exclude constraints on inner LSPs
It is important to understand that if outer LSP has no constraints, the inner LSP can use it even ifthe inner LSP has some include or exclude constraints. This rule makes LDP more flexible andeasy to use. Affinities and protocol limits on outer LSP take form "[IP] [MPLS 0xnnnnnnnn]". If[IP] is present, the LSP can be used for pure IP routed traffic. If [MPLS 0xnnnnnnnn] is present,the PWE3 can be used by inner LSPs that match the outer LSPs affinities. The outer LSP canhence have the following configuration options:
Both IP routed traffic and unlimited MPLS (PWE3, L3VPN) traffic can use the LSP, i.e. noconstraints
Both IP routed traffic and selected MPLS (PWE3, L3VPN) traffic can use the LSP
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
16
1 MPLS Overview
Only IP routed traffic can use the LSP, but no inner labels are associated with the LSP
Selected MPLS (PWE3, L3VPN) traffic can use the LSP. No IP traffic is directed to the LSP (itshould be noted that L3VPN traffic is MPLS, as it has inner-label)
The outer label affinities can be applied in:
RSVP by using the "map-route" command
LDP by using receive-labels route-map command. FTN constraints can be set here based onmany criteria, such as prefix and the neighbor who advertised the label
Static by using the "mpls static-ftn push" command
Affinity constraints are characterized by a mask value. The mask is usual expressed in hexadecimalformat, but it is interpreted as a string of a 32 bits. For example a mask "0x30A" is interpreted asfollowing:
00000000 00000000 00000011 00001010
Of the 32-bits in this example, four bits namely the second, fourth, ninth and tenth from right areused to constraint the given path. The meaning of these bits in the 32-bit vector is defined by the user.
For the example above, lets give some example of what meaning the user may assign to thesefour bits:
Second bit is set to one, if the tunnel goes through 1+1 protected long haul link, zero if otherwise
Fourth bit is set to one, if the tunnel uses low-delay path, zero if high-delay path
Ninth bit is set to one, if the tunnel can be used for "premium" customers, zero if otherwise
Tenth bit is set to one if the tunnel goes through at least one compressed link, zero otherwise
The inner label constraints can be expressed using the following three rules:
include-any, at least one of the specified bit must match the outer LSP affinity
include-all, all of the specified bits must match the outer LSP affinity
exclude-any, none of the specified bits may be present in outer LSP affinity
One rule of each type can be specified:
For any LDP PWE3 circuit in the "pwe3 circuit" command
For static PWE3 circuits in the "mpls static-ftn push-and-lookup-for-vc" command
For PWE3 circuits under "ip vrf NAME" mode
If no constraint is present, the inner label can use any outer label (to the suitable destinationwith suitable QoS class) that does not have IP only constraints. On the other hand, traffic thatuses LSPs, like VPN traffic or pseudowire traffic, can be configured so that affinity is taken intoaccount when deciding which traffic uses a given LSP. For VNP traffic, this is done with commands"exclude-any", "include-all" and "include-any". For other traffic types, e.g. pseudowires, thisis done with attributes exclude-any, include-all and include-any in the commands like "mplsstatic-ftn".
Example:
mpls static-ftn push-and-lookup-for-vc abc 313 1.2.3.4include-any 0x1f0 include-all 0xa exclude-any 0x1
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
17
1 MPLS Overview
This example is very complex, however is presented here to illustrate how the constraints work inmost general cases. When deciding which tunnel traffic can use (in the example above, VC named"abc"), the decision procedure is based on a bit-by-bit comparison of all four bits.
The tunnel affinity is configured as:
Tunnel affinity: 00000000 00000000 00000011 00001010
The following constraint masks are configured for the VC abc that is carried across the tunnel.The three values 0x1F0, 0xA and 0x1 are converted in binary format as shown below:
include-any for abc: 00000000 00000000 00000001 11110000
include-all for abc: 00000000 00000000 00000000 00001010
exclude-any for abc: 00000000 00000000 00000000 00000001
Any or all of the three masks, include-any, include-all and exclude-any could have been zero (andare in fact zero by default). Zero masks logically do not constraint the choice of LSP at all. But ifthe user has opted to use non-zero masks, their effect is as follows:
If include-any mask contains at least one non-zero bit, then the affinity mask must have at leastone corresponding bit set to non-zero. In the example above, the ninth bit from right fulfils thiscondition
Every bit that is set in include-all mask must also be set in affinity mask. In the example above,the second and fourth bits from right are required, and this requirement is fulfilled
Every bit that is set in exclude-any mask must be absent in affinity mask. In the example above,the right most bit is required to be absent in the affinity mask, and indeed it is absent
In this example, the affinity mask passes all three tests and VC "abc" can use the tunnel. If at leastone test had failed, the tunnel would not have been used for this particular VC.
MPLS constraints should only be used when the specified LSP is required for a given inner label. Agood reason would for example be to redirect some traffic to protected LSP while leaving the rest touse LDP. In that case one could indicate protected quality with single bit, and do include-any forthat bit for the traffic that desires protection, while doing exclude-any for the rest. Alternativelyunprotected LSPs could have another bit that is used for the rest of the LSPs. Affinities are notrequired for associating QoS of specific PWE3s to suitable L-LSPs (or E-LSPs that carry only fewQoS classes), because "map-route" does contain separate QoS specifier that is used for that purpose.
1.4 MPLS Protection Switching
The inherent connection oriented nature of MPLS LSPs makes them also a very good candidate forimplementing different types of protection schemes. As an example, different types of end-to-endpath protection techniques between the ingress and the egress edge LSRs can be accommodated bysignalling two explicitly routed point-to-point LSPs, traversing diverse physical routes. Since thetraffic rerouting decisions and protection LSP setup procedures have been done already before anyfailures occur, these techniques enable significantly faster network and traffic restoration times thannormal traffic rerouting functionality, and especially if the rerouting decisions also require initiationof subsequent signalling procedures for LSP reestablishment.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
18
1 MPLS Overview
Furthermore, the speed of the protection switching also depends both on the conceptual protectionmodel, and the used triggering mechanisms. In general, 1+1 type of protection schemes are usuallythe fastest, but also consume a double amount of capacity from the network. The speed of othertypes of protection models often depends on the mechanisms used for propagating the faultinformation along the LSPs route to the NEs doing the protection switching, which in end-to-endpath protection cases are the edge LSRs. Typically, such triggering mechanisms that reside asclose as possible to the protected networking layer function much faster than purely control planesoftware based mechanisms.
1.4.1 MPLS Local Protection
In an MPLS-based network local protection can be achieved by switching traffic onto a presetbackup path with a technique known as Fast Reroute (FRR). The main advantage of FRR as aprotection solution is its capability of using local repair methods to guarantee fast failure responseand recovery as close as possible to the point of failure. FRR is detailed covered in 1.7 Fast Reroute.
1.4.2 RSVP-TE based 1:1 Protection Switching
The 1:1 type of MPLS protection technique supported by the Tellabs 8620 access switch, Tellabs8630 access switch and Tellabs 8660 edge switch is RSVP-TE-based LSP path protection, wheretraffic is switched from a primary LSP to a pre-signalled secondary LSP in case the primary LSPgoes down. This protection mechanism uses a combination of L1 defect, RSVP-TE signalling, andL3 routing information as the possible triggers for determining that the primary LSP is down. Thefastest restoration times are typically achieved if the failure can be detected locally by the NE doingthe actual switching, but for pseudowire traffic the switchover time should always be below 50milliseconds regardless of the number of connections carried on the LSP.
1.4.3 MPLS OAM based 1+1 Protection Switching
The Tellabs 8620 access switch, Tellabs 8630 access switch and Tellabs 8660 edge switch alsosupport the ITU-T MPLS OAM [Y.1711] based unidirectional 1+1 path protection switchingmechanism described in [Y.1720]. In this mode, the ingress edge LSR forwards the traffic to theegress edge LSR over a protection group consisting of two diversely routed RSVP-TE (or static)tunnel LSPs. Along with both copies of the forwarded user plane traffic, Fast Failure Detection(FFD) OAM packets are also periodically sent. By default, the protection switching is non-revertive,but it is also possible to set a restoration timer for switching back to the primary LSP side 60...7200seconds after the LSP-connectivity has been restored.
In Tellabs 8630 access switch and Tellabs 8660 edge switch the primary and the protectingLSP must reside in different line cards, and the protection feature only works on Ethernetports and otherwise unprotected POS ports (i.e. ports not already protected by any L1 basedprotection schemes).
The sending frequency of the FFD packets has a strong affect on the speed of the protectionswitching, and is thus user configurable, with a default value of 1 packet in 50 milliseconds. Theprotection switching is initiated as soon as the egress edge LSR detects that 3 consecutive FFDpackets have been lost in the primary LSP tunnel. Thus, by using the fastest sending frequency of 1packet in 10 milliseconds, even restoration times well below 50 milliseconds are achievable.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
19
1 MPLS Overview
Please note that 1+1 protection is not supported for MPLS over VLAN based configurationswhen 2x1000BASE-X IFM is used.
1.5 MPLS Traffic Engineering
[RFC2702] specifies the requirements for Traffic Engineering over MPLS. Instead of the moretraditional TE methods, explicitly routed point-to-point LSPs offer a more efficient and controlledway to perform traffic engineering. In addition to [RFC2702], Internet Engineering Task Force(IETF) has also specified protocol-specific TE extensions for the most common Interior GatewayProtocols (IGPs) and label signaling protocols.
In the Tellabs 8600 system, all explicitly routed LSP tunnels are set up using the RSVP-TE protocol.They can be signalled either with or without bandwidth reservations, largely depending on theselected MPLS deployment model and network engineering applications.
There are traditional TE methods such as adjusting the IGP metrics on a congested link, or relyingon an L2 overlay network design. These include e.g. IP over Asynchronous Transfer Mode (ATM)or IP over Frame Relay (FR). Instead of the more traditional TE methods, manual MPLS TE can beperformed without making any bandwidth reservations in the network. This can be accomplishedsimply by diverting some of the traffic on a congested link to an explicitly routed point-to-point LSPthat bypasses it. As soon as the link congestion has been detected, a new TE tunnel can be set upbetween a selected pair of LSRs in the network (often a pair of edge LSRs), and simply signalledonto a different route than the shortest path that would be selected by the IP routing protocols.Next, some of the traffic traversing the congested link can be redirected to it, thus relieving thecongestion. In practise, these types of manual TE operations rely totally on online monitoring of thelink utilizations in the network, and require reactive deployment of MPLS TE tunnels (or their L2equivalents) only in the event of some link(s) getting congested.
In order to proactively prevent the congestion from happening in the first place, bandwidthreservations can be made for the traffic trunks with a controlled load (i.e. appropriately policed),traversing the MPLS network. In this MPLS deployment model, the RSVP-TE path requests aresubjected to Connection Admission Control (CAC) at each Tellabs 8600 NE. For performingautomated TE LSP routing, also the IGP TE extensions and the Constrained Shortest Path First(CSPF) algorithm must be enabled in the Tellabs 8600 NEs. In this case, the LSP routing decisionscan be made automatically by the head-end LSRs, since all nodes in the network use the TEextensions of the selected IGP for advertising the amount of available bandwidth on the directlyattached network links. When a new traffic trunk is to be set up in the network, the head-end LSRuses the CSPF algorithm for calculating the shortest possible path through the network that stillhas enough unreserved bandwidth left to accommodate the needs of the new tunnel LSP. In thisdeployment model, a full mesh of TE tunnels is often deployed between all of the edge LSRs in thenetwork, and most of the end user traffic is mapped on the resulting, logical TE topology.
Please refer to Tellabs 8600 Managed Edge System Routing Protocols Configuration Guide formore information on different types of routing protocols, and their configuration details.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
20
1 MPLS Overview
1.6 DiffServ-Aware MPLS Traffic Engineering
The requirements for DiffServ-aware MPLS Traffic Engineering (DS-TE) have been specified in[RFC3564]. Instead of setting up aggregate LSPs for carrying all traffic classes (as in the basic formof MPLS TE), the DS-TE approach performs MPLS traffic engineering at a per-class level. InDS-TE, the traffic from different DiffServ classes of service is mapped to separate LSPs. Also thenetwork resources have been divided among the different traffic classes, and the IGP TE extensionsadvertise the available bandwidth on the attached links on a per-class basis.
In DS-TE, a TE class is a combination of a Class Type (CT) and an LSP pre-emption priority.There are a maximum of eight CTs. The network resources are divided into per-CT pools, whichhas prompted the need for different types of Bandwidth Constraint (BC) models. The BC modelssupported by the Tellabs 8600 system are the Maximum Allocation Model (MAM), and the RussianDolls Model (RDM).
1.6.1 Maximum Allocation Model
MAM [RFC4125] is the most intuitive and the most simple BC model. It provides good isolationbetween the resources allocated to different CTs, but may in some cases not be the most efficientmodel in terms of achieved network utilization. MAM implements an individual BC for eachCT, and can also limit the aggregate of reserved bandwidth across all CTs, as illustrated in thefollowing figure.
Fig. 6 Maximum Allocation Model (MAM) by IETF
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
21
1 MPLS Overview
1.6.2 Russian Dolls Model
RDM [RFC4127] is the default BC model used in the Tellabs 8600 system. When used togetherwith LSP pre-emption, RDM can offer good isolation between CTs and also efficient utilization ofthe network resources. The CT and BC structure of RDM are illustrated in the following figure.
Fig. 7 Russian Dolls Model (RDM) by IETF
1.7 Fast Reroute
1.7.1 Overview
The continuous growing of real-time applications in the networks imposes a high demand on trafficprotection. This means that when a failure occurs, a fast response and timely switchover close aspossible to the point where a failure occurred are desirable to avoid signaling delays during recovery.A technique used to address these challenges is known as Fast Reroute (FRR).
FRR provides mechanisms for link or node protection by switching traffic on backup paths aroundthe point of failure. When a failure occurs the node immediately upstream of the point of failure willswitch traffic to a pre-signaled backup path in response to the failure.
FRR can be utilized as long as the network has enough connectivity for the creation of backuppaths. To protect downstream links or nodes, each node on the protected path can act as a Point ofLocal Repair (PLR).
1.7.2 FRR Application
In the Tellabs 8600 system FRR is implemented according to [RFC4090]. There are two differentvariants of FRR:
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
22
1 MPLS Overview
One-to-one backup
Facility backup
FRR is currently supported by the Tellabs 8620 access switch, Tellabs 8630 access switch andTellabs 8660 edge switch.
Both FRR variants can be configured to provide either link or node protection.
In link protection, if a link is faulted PLR will bypass that link by switching traffic to detour LSPor bypass tunnel.
In node protection, if a node is faulted PLR will bypass that node by switching traffic to a backuppath.
FRR defines the following terms, which are wide used in this document:
Backup path refers to either a detour LSP or a bypass tunnel and it is responsible for backingup protected LSP(s).
Bypass tunnel a tunnel that is used to protect a set of LSPs passing over a common facility.
Detour LSP the LSP that is used to re-route traffic around a failure in one-to-one backup.
Merge Point (MP) the LSR where one or more backup paths rejoin the path of the protectedLSP downstream of the potential failure. The same LSR may be acting as an MP and PLR si-multaneously.
PLR is any node performing repair, i.e. the head-end LSR of detour LSP or bypass tunnel.
One-to-one Backup
In one-to-one variant, a backup LSP known as detour is pre-signaled downstream for each protectedLSP at each PLR. Detour LSPs are signalled at each node along the path of the protected LSP, withexception of the egress node. These nodes are known as potential PLRs. The following is anexample topology of the one-to-one backup.
Fig. 8 FRR One-to-One Backup
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
23
1 MPLS Overview
The principle of one-to-one backup is illustrated in Fig. 8, where as an example four detour LSPs canbe created for the protected LSP. When a failure occurs along the protected LSP, the PLR detecting afailure switches traffic into the detour LSP. For example, if a fault condition occurs in node R3 orlink R2R3, node R2 will switch traffic sent by node R1 downstream on the detour R2 B-LSP.In this case R2 B-LSP can be used to protect link R2 R3, or node R3. The same is true for R1B-LSP and R3 B-LSP (node and link protection), while R4 B-LSP can perform only link protection.
In the downstream when a detour LSP intersects its protected LSP with the same outgoing interface,the merge will occur at MP.
In one-to-one backup there can be N-1 detour LSPs to fully protect a LSP of N hops, which canturn to a large number of LSPs in the network. If there are multiple protected LSPs, merging canhelp to reduce the amount of LSPs.
One-to-one backup configuration in the network:
Sufficient degree of connectivity available for backup paths
CSPF must be enabled in all nodes on the path
Global parameters are applied for detour LSPs created in transit nodes
CSPF takes into account detour specific bandwidth and link colors to influence the paths of pos-sible detour LSPs
Facility Backup
The facility backup works by creating single bypass tunnel for each protected link or node. Thebypass tunnel can also protect a set of LSPs if the following are fulfilled:
Bypass tunnel must intersect the path of the protected LSP downstream
Protected LSPs must pass through the PLR and common downstream node
When a failure occurs along the protected path, the PLR will reroute traffic onto the bypass tunnel.This implies that facility backup provides a scalability improvement compared to one-to-onebackup, by utilizing the same bypass tunnel to protect multiple LSPs when a failure occurs in a nodeor link, which the bypass tunnel is protecting.
Fig. 9 FRR Facility Backup
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
24
1 MPLS Overview
The principle of facility backup is illustrated in Fig. 9, where as an example created bypass tunnelprotects node R3 and three LSPs that pass through this node against failure in node R3 or link R2R3. When a failure occurs in node R3 or link R2R3, node R2 will switch all traffic sent fromR1, R8 and R2 itself into the bypass tunnel. In this example R4 serves as the MP.
In facility backup bypass tunnels are specifically created by configuring the protected link or node,and the desired MP for the bypass tunnel. In Tellabs 8600 system the PLR node supports LSPping and traceroute for bypass tunnel.
Facility backup configuration in the network:
Desired potential PLR nodes must have bypass paths
Protected path is strict configured
Each LSR acting as PLR must have a bypass tunnel pre-configured. All RSVP-TE trunk optionsare available
FRR attributes can be taken into account.
Head-End
The creation and establishment of the protected LSP session follows the same principle asconventional LSP in a RSV-TE. Please refer to Tellabs 8600 Managed Edge System MPLSApplications Configuration Guide for more details.
Depending on the network topology, the head-end makes decision on wether a protection path mustbe established and which protection variant (link or node) is required. For example, if at head-endthere are two provisioned paths, primary and secondary LSPs it is possible to create a detour LSP toprotect the primary LSP (primary detour LSP) and a second detour LSP to protect the secondaryLSP (secondary detour LSP). With such protection scenario there is a precedence order in theTellabs 8600 system to handle the protection when there is more than one protection path. Thefollowing table illustrates the order of the precedence, i.e. how data traffic is switched:
State Condition Description of Data Flow
No failure If all paths are available, traffic will be carried on the primary protectedLSP
Failure in protected LSP If protected LSP is not available (faulted) traffic will be switched tothe primary detour LSP, i.e. primary detour LSPs are preferred oversecondary LSPs
Primary detour LSP failure If primary detour LSP is not available traffic is switched to secondaryprotected LSP
Failure in secondary protectedLSP
If secondary protected LSP is not available and both primary protectedLSP and primary detour too, traffic will be switched to secondarydetour LSP
The above implies that only one active path can exist at the time and that detour is ahot-standby path, i.e. no traffic passes through before switchover.
In Tellabs 8600 system it is possible to prevent detour creation at Head-End when there is more thanone protection path. In such case detour can be created in the downstream. In the downstream ifthere is a path available a detour will be created automatically.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
25
1 MPLS Overview
When a failure occurs the head-end employes global revertive mode to re-optimize the LSPs thatused the failed path.
Path Identification
When FRR is enabled backup paths are signalled and the following conditions imply:
Backup paths must be uniquely identified
Protected paths must be associated with their backup paths
Global and non-global labels utilization
Backup paths must be merged downstream
RSVP-TE status maintenance during and after failure
One-to-One Backup
A detour LSP needs to be clearly identified with its protected session to allow correct merging andstate treatment. This implies that a detour LSP must inherit its LSP ID from the associated protectedLSP. To be able to uniquely identify a detour LSP, two approaches are defined:
Sender Template-Specific
Path-Specific
Sender Template-Specific - in this approach every PLR uses a local router address as the ingressaddress of detour LSP. Additionally detour LSP object may be added to the path message. DetourLSPs may be merged using this approach. A merge will occur if the outgoing interface, ExplicitRoute Object (ERO) and the next-hop LSR are the same.
Path-Specific - in this approach detour LSP uses the protected LSP ingress address and a detourLSP object is added to the path message. Detour LSPs can be merged using path-specific approach.A merge must occur only if the path messages share the same outgoing interface and next-hop LSR.In the Tellabs 8600 system Path-Specific is the default mode.
If strict path is used, traffic cuts may occur when detours LSPs are merged to detour LSP. It isrecommended not to use explicit path when FRR is used in global revertive mode.
There might be circumstances (though very unlikely, but possible depending on the networktopology) where merge must be done, but cannot be constructed. In such cases MP willtear down some of the detour LSPs. The head-end will see that the path is only partiallyprotected (fault indication will be raised).
Facility Backup
To allow correct merge bypass tunnels must also be uniquely identified. They are identified using thePath-Specific method and follows the same procedures as to those described in One-to-One Backup.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
26
1 MPLS Overview
Provisioning and BFD
When enabling FRR in one-to-one backup, the paths used for detour LSPs must meet the following:
Downstream interface cannot be shared
Protected LSP and its detour LSP must intersect downstream past the protected resource (link ornode)
Detour LSPs must have the same egress IP address as the LSP being protected
Detour LSPs might have different attributes than the protected LSP
Facility Backup:
Protection scenarios are laid out node per node against link or node protection
Only nodes having bypass tunnel configured, make paths computation
Bypass tunnel can have an ERO object (strict path with predetermined hops)
It is possible to specify how much bandwidth is reserved for detour LSPs, which of course mightaffect detour path selection. In Tellabs 8600 system by default no bandwidth is allocated for detourLSPs. However depending on the operators needs and the importance of traffic, the followingoptions are available:
Provision no bandwidth and rely on quick global recovery to reroute traffic quickly;
Overbook, i.e. configure detour LSPs to reserve less bandwidth than the protected LSP;
Reserve the same amount of bandwidth
FRR will be activated if a downstream link or node goes down. However when a failure occurs,RSVP status (error) messages are propagated upstream towards the head-end traversing nodes onthe path and these intermediate nodes also process these messages. There will be a significant delayuntil the head-end gets notified about the failure condition, or the error message might get lost due tothe nature of the RSVP protocol itself. This means that link down triggering mechanism might notbe reliable or in some cases even not available. Therefore Bidirectional Forwarding Detection (BFD)can be used for quick failure detection. Please refer to Tellabs 8600 Managed Edge System Test andMeasurement Configuration Guide BFD sections for more information and configuration details.
With SONET/SDH POS interfaces link failure detection time is almost 1 second, which exceedsignificantly the FRR requirement of
1 MPLS Overview
In facility backup CAC is not supported.
Attributes
The FRR attributes are:
Setup priority
Holding priority
Hop-limits
Flags
Bandwidth
Exclude-any
Include-any
Include-all
When configured, FRR attributes are signaled with the protected LSP Path message. When adownstream node creates a detour LSP, these attributes will be copied from the protected sessionsFRR attributes. If the FRR attributes are not configured by the head-end, the downstream LSRinherits the attributes of the protected LSP while signaling its detour LSP.
Network Topologies
In the Tellabs 8600 system FRR supports any network topology with sufficient degree ofconnectivity.
The following is an example of a ring topology using the one-to-one backup.
Fig. 10 FRR One-to-One Backup in Ring Topology
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
28
1 MPLS Overview
In Fig. 10 the protected LSP is established and connects via nodes R1, R2, R3, R4 to R5 and trafficflows in the same direction. In this example when protected LSP is established, every node in thering creates detour LSP in the reverse direction of the protected path (LSP). These detour LSPs aremerged in the downstream detour path. As an example, Fig. 10 shows detour LSP D2 being mergedin node R1 when protecting against a failure in link R2R3. The same merging mechanism isvalid for the rest of nodes in a ring topology.
The following is an example of a ring topology using facility backup method.
Fig. 11 FRR Facility Backup in Ring Topology
In Fig. 11 lets assume ingress node R1 and egress R5. In a protected ring topology using facilitybackup, bypass tunnel is established depending on the protection type used link or node.
If a failure occurs e.g. in link R2R3, bypass tunnel R2-R1-R6-R5-R4-R3 (node R3 is the MP)is used as the protecting path of link R2R3.
If a failure occurs e.g. in node R3, bypass tunnel (node R4 is the MP) R2-R1-R6-R5-R4 is usedas protecting path of node R3.
Bypass tunnel:
One bypass tunnel provides protection for each link or node in the ring (shared by all LSPs onthat link).
Switched traffic and RSVP signaling for the failing protected LSP are carried by the bypass tunnelin the reverse direction and rejoins at the MP into the original protected LSP. The protected LSPis intact around the ring except the fast rerouting in the reverse direction enabling the user toavoid the failed link / node.
Fault Management
The Tellabs 8600 system supports FRR Fault Management (FM) and the faults reported aresummarized in the following table.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
29
1 MPLS Overview
FRR Faults
Fault Description
mplsPrimaryLspFrrActive Some part of primary LSP uses detour or bypasstunnel
mplsPrimaryLspNotFullyProtected At least one hop is not protected or link protectionis used when node protection was desired
genTunnelBypassDown Whole bypass tunnel is down i.e. not operational(typically session is not properly established)
mplsSecondaryLspFrrActive Some part of secondary LSP uses detour or bypass
mplsSecondaryLspNotFullyProtected At least one hop is not protected or link protectionis used when node protection was desired
1.8 MPLS References
Feature Description
[RFC2702] RFC2702 (199909), Requirements for traffic engineering overMPLS
[RFC3209] RFC3209 (200112), RSVP-TE: Extensions to RSVP for LSP tunnels
[RFC3270] RFC3270 (200205), Multiprotocol label switching (MPLS) supportof differentiated services
[RFC3564] RFC3564 (200307), Requirements for support of differentiatedservices-aware MPLS traffic engineering
[RFC4090] RFC4090 (200605), RSVP-TE Fast Reroute
[RFC4125] RFC4125 (200506), Maximum allocation bandwidth constraintsmodel for DiffServ-aware MPLS traffic engineering
[RFC4127] RFC4127 (200506), Russian dolls bandwidth constraints model forDiffServ-aware MPLS traffic engineering
[RFC4364] RFC4364 (200602), BGP/MPLS IP Virtual Private Networks(VPNs)
[Y.1711] ITU-T Recommendation Y.1711 (200402), Operation &Maintenance mechanism for MPLS networks
[Y.1720] ITU-T Recommendation Y.1720 (200612), Protection switchingfor MPLS networks
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
30
2 MPLS Configuration Examples
2 MPLS Configuration Examples
The configuration examples in this chapter focus on the signalling of LSPs on a preconfiguredIP/MPLS routing infrastructure, which is already running the OSPF and OSPF-TE protocols. Thus,the detailed description for setting the OSPF routing parameters, and its TE extensions, can be foundin Tellabs 8600 Managed Edge System Routing Protocols Configuration Guide.
2.1 LDP Configuration
If neither explicit routing nor bandwidth reservations are needed, LDP can automatically create therequired E-LSPs between adjacent LSRs simply by enabling the protocol on each label-switchedinterface. Doing this on all of the label-switched interfaces in each router node, will result in anautomatically created multipoint-to-point LSP topology. It can in some cases be used for carrying allthe label-switched traffic within the whole IP/MPLS domain. This can take place e.g. when running[RFC4364] VPNs in a high capacity core network without any MPLS-based traffic engineering orLSP protection needs.
Command Description
router(config)# interface fe 3/0/0 Configures the Fast Ethernet port at slot #3 /module #0 / interface #0.
router(cfg-if[fe 3/0/0])# label-switching
Enables label switching on the interface.
router(cfg-if[fe 3/0/0])# no shutdown Turns the IP interface state up (default state isshutdown).
router(cfg-if[fe 3/0/0])# ip address10.0.10.1/24
Assigns an IP address to the interface.
router(cfg-if[fe 3/0/0])# mpls labelprotocol ldp
Enables automatic LDP label distribution withadjacent peers.
router(cfg-if[fe 3/0/0])# exit Exits from the Interface Configuration commandmode.
2.2 Explicitly Routed RSVP-TE LSPs
In the case of running MPLS-based traffic engineering and/or LSP protection applications in thenetwork, explicitly routed, point-to-point LSP tunnels are used for carrying at least some portion ofthe traffic within the IP/MPLS network domain. In the Tellabs 8600 system, all explicitly routedLSPs (with or without bandwidth reservations) are signalled using RSVP-TE.
The Explicit Route Object (ERO), which defines the LSP route to be signalled by RSVP-TE, caninclude both loose and strict hops:
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
31
2 MPLS Configuration Examples
For the loose hops, the route taken from the previous router to the current router does not need tobe a direct path, and the path message exchanged between the two routers can pass other routers.
For the strict hops, the route taken from the previous router to the current router must be a directlyconnected path, and the path message exchanged between the two routers should not pass anyintermediate routers. This ensures that the routing is enforced on the basis of each link.
The explicit LSP route can either be automatically calculated by the CSPF algorithm, as will bedemonstrated in the DS-TE network example, or manually specified by the network administrator,as in the following E-LSP and L-LSP configuration examples, which are based on the followingnetwork diagram (with label switching and LDP already enabled on all interfaces).
Fig. 12 A Simple RSVP-TE LSP Configuration Topology Example
2.2.1 RSVP-TE Configuration
Before starting to set up any explicitly routed LSPs, also the RSVP-TE protocol has to be enabledon all interfaces of the example network, as shown in the following example.
Command Description
R1(config)# interface fe 3/0/0R1(cfg-if[fe 3/0/0])# mpls labelprotocol rsvpR1(cfg-if[fe 3/0/0])# exit
Enables the RSVP-TE protocol on the Fast Ethernetport at slot #3 / module #0 / interface #0 of node R1.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
32
2 MPLS Configuration Examples
2.2.2 E-LSP Configuration
Explicitly routed E-LSPs can carry up to eight BAs (i.e. packets of up to 8 different PHBs), andsince they are not explicitly associated with any particular PSC during the setup signalling, E-LSPscan be signalled either with or without the optional RSVP-TE DiffServ object.
Tellabs 8605 access switch does not support prefix+QoS longest prefix match lookups in IProuting. Although the command map-route ignores QoS for IP traffic forwarding, these QoSqualifiers affect PWE3 traffic associations. Currently, IP lookups QoS qualifiers are ignoredin the Tellabs 8605 access switch.
Command Description
R1(config)# rsvp-path R1-R5_via_R3R1(cfg-rsvp-path[R1-R5_via_R3])#10.30.0.2 strictR1(cfg-rsvp-path[R1-R5_via_R3])#10.60.0.2 strictR1(cfg-rsvp-path[R1-R5_via_R3])# exit
Specifies an explicit route, with two strict hops, forthe new tunnel LSP.
R1(config)# rsvp-trunk R1-R5_data Sets up a new trunk for data traffic.
R1(cfg-rsvp-trunk[R1R5_data])# primarypath R1-R5_via_R3
The new trunk will be routed according to the LSPpath specified earlier.
R1(cfg-rsvp-trunk[R1R5_data])# primarysetup-priority 7
Sets the setup priority of the trunk to 7 (= lowestpossible preemption priority), so this trunk will notpreempt any other trunks. This is also the defaultsetup priority value.
R1(cfg-rsvp-trunk[R1R5_data])# primaryhold-priority 0
Sets the hold priority of the trunk to 0 (= highestpossible preemption priority), so this trunk willnever get preempted by any other trunk. This isalso the default hold priority value.
R1(cfg-rsvp-trunk[R1R5_data])# primarybandwidth 30M
The bandwidth to be reserved for the trunk is 30Mbps.
R1(cfg-rsvp-trunk[R1R5_data])# noprimary diffserv-object
The DiffServ object of RSVP-TE is not used (it ismandatory only when signalling L-LSPs).
R1(cfg-rsvp-trunk[R1R5_data])# primaryclass-type data
The DS-TE class type for the trunk is the data CT.This may be omitted if the network does not runDS-TE.
R1(cfg-rsvp-trunk[R1R5_data])# primaryelsp-preconfigured
The LSP tunnel will be of the preconfigured E-LSPtype, with default PHB EXP mapping tablesused at each router.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
33
2 MPLS Configuration Examples
R1(cfg-rsvp-trunk[R1R5_data])#map-route 10.10.0.5/32 qos af1R1(cfg-rsvp-trunk[R1R5_data])#map-route 10.10.0.5/32 qos af2R1(cfg-rsvp-trunk[R1R5_data])#map-route 10.10.0.5/32 qos af3
Maps an IP route to the current trunk, i.e. instead oftraversing the multipoint-to-point LDP LSPs usedfor the default forwarding treatment, those AF1,AF2 and AF3 PSC packets, whose next hop lookupresolves to the gateway address 10.10.0.5, will bedirected to the new point-to-point data trunk.
R1(cfg-rsvp-trunk[R1R5_data])# to10.10.0.5
Specifies the IP loopback address of the egress nodeof the new tunnel LSP, after which the protocolsession will be set up, and the LSP initializationcan begin.
R1(cfg-rsvp-trunk[R1R5_data])# exit Exits from the RSVP-TE Trunk Configurationcommand mode.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
34
2 MPLS Configuration Examples
2.2.3 L-LSP Configuration
Explicitly routed L-LSP tunnels are signalled in a very similar fashion as in the previous exampleof signaling explicitly routed E-LSPs. There is, however, a fundamental difference. As L-LSPsare always explicitly associated with a single PSC, the optional RSVP-TE DiffServ object has tobe used in the signaling. Thus, the traffic belonging to just that one single PSC can be directed tothe trunk, as shown in the following example.
Command Description
R1(config)# rsvp-path R1-R5_via_R4R1(cfg-rsvp-path[R1-R5_via_R4])#10.40.0.2 strictR1(cfg-rsvp-path[R1-R5_via_R4])#10.70.0.2 strictR1(cfg-rsvp-path[R1-R5_via_R4])# exit
Specifies an explicit route, with two strict hops,for the new tunnel LSP (this time via R4, insteadof R3).
R1(config)# rsvp-trunk R1-R5_real-time Sets up a new trunk for real-time traffic.
R1(cfg-rsvp-trunk[R1R5_real-time])#primary path R1-R5_via_R4
The new trunk will be routed according to the LSPpath specified earlier.
R1(cfg-rsvp-trunk[R1R5_real-time])#primary setup-priority 0
Sets the setup priority of the trunk to 0 (= highestpossible preemption priority), so this real-timetrunk may preempt other lower priority (e.g. data)trunks in order to get into the low latency (i.e.shortest) path.
R1(cfg-rsvp-trunk[R1R5_real-time])#primary hold-priority 0
Sets the hold priority of the trunk to 0 (= highestpossible preemption priority), so this trunk willnever get preempted by any other trunk.
R1(cfg-rsvp-trunk[R1R5_real-time])#primary bandwidth 10M
The bandwidth to be reserved for the trunk is 10Mbps.
R1(cfg-rsvp-trunk[R1R5_real-time])#primary class-type real-time
The DS-TE class type for the trunk is the real-timeCT. Again, this is not needed if the network doesnot run DS-TE.
R1(cfg-rsvp-trunk[R1R5_real-time])#primary llsp ef
The LSP tunnel will be of the L-LSP type, and willbe explicitly associated with the EF PSC duringthe set up signalling by including the RSVP-TEDiffServ object.
R1(cfg-rsvp-trunk[R1R5_real-time])#map-route 10.10.0.5/32 qos ef
Maps an IP route to the current trunk, i.e. insteadof traversing the multipoint-to-point LDP LSPsused for the default forwarding treatment, thoseEF packets, whose next hop lookup resolves to thegateway address 10.10.0.5, will be directed to thenew point-to-point real-time trunk.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
35
2 MPLS Configuration Examples
R1(cfg-rsvp-trunk[R1R5_real-time])# to10.10.0.5
Specifies the IP loopback address of the egress nodeof the new tunnel LSP, after which the protocolsession will be set up, and the LSP initializationcan begin.
R1(cfg-rsvp-trunk[R1R5_real-time])#exit
Exits from the RSVP-TE Trunk Configurationcommand mode.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
36
2 MPLS Configuration Examples
2.2.4 RSVP-TE Path Protection Configuration
In order to utilize RSVP-TE based path protection in the Tellabs 8600 system, two diversely routedLSPs can be signalled to set up both the primary path and the secondary path for the protectedtraffic trunk. In this example, two explicitly routed E-LSPs will be signalled without makingany bandwidth reservations, using the same explicit LSP routes which were already specified inthe two previous examples.
Command Description
R1(config)# rsvp-trunk R1-R5_protected Sets up a new trunk for protected traffic.
R1(cfg-rsvp-trunk[R1R5_protected])#primary path R1-R5_via_R3
The primary LSP of the new trunk will be routedon the path traversing R3.
R1(cfg-rsvp-trunk[R1R5_protected])#secondary path R1-R5_via_R4
The secondary LSP of the new trunk will be routedon the path traversing R4.
R1(cfg-rsvp-trunk[R1R5_protected])#map-route 10.10.0.5/32 qos af4
Maps an IP route to the current trunk, i.e. insteadof traversing the multipoint-to-point LDP LSPsused for the default forwarding treatment, thoseAF4 PSC packets, whose next hop lookup resolvesto the gateway address 10.10.0.5, will be directedto the new protected traffic trunk.
R1(cfg-rsvp-trunk[R1R5_protected])# to10.10.0.5
Specifies the IP loopback address of the egress nodeof the new tunnel LSPs, after which the protocolsession will be set up, and the LSP initializationcan begin.
R1(cfg-rsvp-trunk[R1R5_protected])#exit
Exits from the RSVP-TE Trunk Configurationcommand mode.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
37
2 MPLS Configuration Examples
2.2.5 DiffServ Tunneling Model Configuration
The DiffServ Tunneling Model selections are done on the network element level in the Tellabs8600 system as shown in the following example.
Command Description
router(config)# mpls tunnel-modeltunnel-label short-pipe
Sets the outer label tunneling model to Short Pipe.
router(config)# no mpls tunnel-modeltunnel-label short-pipe
Using the no option cancels the command andreturns to node defaults (i.e. Pipe Model).
Please note that if the Tellabs 8600 network element acts as the penultimate LSR andpenultimate hop popping is applied, the tunneling model behavior is uniform, even if thenode configuration is short pipe.
Exactly similar settings can be made also for the inner VPN labels, as follows.
Command Description
router(config)# mpls vpn-tunnel-modeltunnel-label uniform
Sets the VPN label tunneling model to Uniform.
router(config)# mpls vpn-tunnel-modeltunnel-label pipe
Sets the VPN label tunneling model back to Pipe,which is the node default setting.
2.3 DS-TE Network Example
The following DS-TE network example is based on RDM, which is also the default BC model in theTellabs 8600 system. In addition to RDM, also MAM is supported in the Tellabs 8600 system. Ifrequired, the BC model on each interface can be changed as follows.
Command Description
router(config)# interface fe 3/0/1router(cfg-if[fe 3/0/1])# bc-mode mam
Changes the BC model on the interface to MAM.
router(cfg-if[fe 3/0/1])# no bc-modemam
Using the no option cancels the command andreturns to node defaults (i.e. RDM).
router(cfg-if[fe 3/0/1])# bc-moderussian-doll
Alternatively, the BC model can also be explicitlyset to RDM.
In this particular RDM-based network example, the default BC model settings can be used, so noBC model configurations are needed in the network nodes. The example topology consists of sixTellabs 8600 NEs, which have been interconnected as shown in the following network diagram.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
38
2 MPLS Configuration Examples
Fig. 13 A DS-TE Network Topology Example with Six Nodes
All links in the network are 100 Mbps Fast Ethernet links. Under the chosen QoS policy, no resourcereservations are made for the BE/Default Forwarding traffic, which utilizes the basic LDP-basedmultipoint-to-point E-LSP transport. Also the DS-TE trunks will be of the E-LSP type, and thus theoptional DiffServ object will not be used in the RSVP-TE signalling.
Out of the maximum of eight possible DS-TE Class Types, only three CTs are taken into usein the network:
CT0 for AF1 based Business Data (BD) traffic
CT1 for AF4 based Priority Data (PD) traffic
CT2 for EF based Real Time (RT) traffic
The reservable link bandwidth will be allocated to the three chosen CTs according to the RDM BCsettings illustrated below, leaving a total of 40 Mbps of unreservable bandwidth for the BE/DefaultForwarding traffic.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
39
2 MPLS Configuration Examples
Fig. 14 RDM Bandwidth Allocations in the Network
LSP preemption is used in the network in the following fashion:
Only RT trunks can preempt other trunks and are never preempted by other trunks.
PD trunks never preempt other trunks and are never preempted by other trunks.
BD trunks never preempt other trunks but can become preempted by RT trunks.
To achieve this, the LSP setup and hold priorities can be set as follows (0 is the highest possiblepreemption priority level and 7 the lowest possible preemption priority level):
RT trunks will be configured with setup priority 0 and hold priority 0.
PD trunks will be configured with setup priority 1 and hold priority 0.
BD trunks will be configured with setup priority 1 and hold priority 1.
In order to be able to configure a new traffic trunk in DS-TE, the setup priority and the Class Typemust be such that, together, they form one of the (up to) eight TE Classes. Also the hold priority andthe Class Type of the trunk must, together, match one of the configured TE Classes.
Thus, the chosen preemption strategy then yields, e.g. the following TE Class mapping:
TE Class 0 = =
TE Class 1 = =
TE Class 2 = =
TE Class 3 = =
TE Classes 4...7 will be marked unused
Apart from the required Fast Ethernet interfaces and IP addresses indicated in the network diagram,the basic interface, OSPF, and DS-TE settings in each node are identical to the below exampleof node 1.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
40
2 MPLS Configuration Examples
Command Description
NODE1(config)# mpls class-type ct0 BDNODE1(config)# mpls class-type ct1 PDNODE1(config)# mpls class-type ct2 RT
Defines the DS-TE class types (CTs).
NODE1(config)# mpls te-class te0 BD 1NODE1(config)# mpls te-class te1 PD 1NODE1(config)# mpls te-class te2 PD 0NODE1(config)# mpls te-class te3 RT 0
Defines the required TE Classes with appropriatepreemption priorities.
NODE1(config)# interface lo 0NODE1(cfg-if[lo 0])# no shutdownNODE1(cfg-if[lo 0])# ip address10.123.100.41/32
Loopback interface is required in order to get theOSPF and RSVP-TE protocol sessions with thepeer nodes working.
NODE1(cfg-if[lo 0])# interface fe 3/0/0 Configures the Fast Ethernet port at slot #3 /module #0 / interface #0.
NODE1(cfg-if[fe 3/0/0])# label-switching
Enables label switching on the interface.
NODE1(cfg-if[fe 3/0/0])# reservable-bandwidth 60M
Sets the maximum reservable bandwidth to 60Mbps.
NODE1(cfg-if[fe 3/0/0])# bandwidth-constraint BD 60M
Sets BC0 of the Russian Dolls BC model; all LSPsfrom CT0, CT1, and CT2 (i.e. BD, PD, and RT)may use no more than 60 Mbps.
NODE1(cfg-if[fe 3/0/0])# bandwidth-constraint PD 40M
Sets BC1 of the Russian Dolls BC model; all LSPsfrom CT1 and CT2 (i.e. PD and RT) may use nomore than 40 Mbps.
NODE1(cfg-if[fe 3/0/0])# bandwidth-constraint RT 20M
Sets BC2 of the Russian Dolls BC model; all LSPsfrom CT1 (i.e. RT) may use no more than 20 Mbps.
NODE1(cfg-if[fe 3/0/0])# no shutdown Turns the IP interface state up (default state isshutdown).
NODE1(cfg-if[fe 3/0/0])# ip address10.0.10.1/24
Sets the interface IP host address according toaddressing plan indicated in the network diagram.
NODE1(cfg-if[fe 3/0/0])# mpls labelprotocol ldp
Enables automatic LDP label distribution forcarrying the BE/Default Forwarding traffic.
NODE1(cfg-if[fe 3/0/0])# mpls labelprotocol rsvp
Enables RSVP-TE signalling on the interface.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
41
2 MPLS Configuration Examples
NODE1(cfg-if[fe 3/0/0])# interface fe3/0/1NODE1(cfg-if[fe 3/0/1])# label-switchingNODE1(cfg-if[fe 3/0/1])# reservable-bandwidth 60MNODE1(cfg-if[fe 3/0/1])# bandwidth-constraint BD 60MNODE1(cfg-if[fe 3/0/1])# bandwidth-constraint PD 40MNODE1(cfg-if[fe 3/0/1])# bandwidth-constraint RT 20MNODE1(cfg-if[fe 3/0/1])# no shutdownNODE1(cfg-if[fe 3/0/1])# ip address10.0.20.1/24NODE1(cfg-if[fe 3/0/1])# mpls labelprotocol ldpNODE1(cfg-if[fe 3/0/1])# mpls labelprotocol rsvp
Makes equivalent settings to the Fast Ethernet portat slot #3 / module #0 / interface #1.
NODE1(cfg-if[fe 3/0/1])# router ospf 1NODE1(cfg-ospf[1])# ospf router-id10.123.100.41NODE1(cfg-ospf[1])# network10.0.10.0/24 area 0.0.0.0NODE1(cfg-ospf[1])# network10.123.100.41/32 area 0.0.0.0NODE1(cfg-ospf[1])# network10.0.20.0/24 area 0.0.0.0NODE1(cfg-ospf[1])# cspf tie-breakleast-fill
Configures the OSPF settings. In case there aremore than one route alternatives, requiring equalnumber of router hops for explicit LSP routing,preference for the least-filled path will be used asthe CSPF tie break method. Please refer to Tellabs8600 Managed Edge System Routing ProtocolsConfiguration Guide for more details on the otherOSPF settings.
After all of the nodes have been set up in a similar fashion to the above example of node 1, thesignalling of the required DS-TE traffic trunks can begin.
Please note in the following examples that only the point-to-point TE tunnel LSPs for thetraffic flowing towards node 6 are being signalled (i.e. node 1 > node 6 and node 2 > node6), leaving all of the traffic in the opposite direction to the multipoint-to-point LDP LSPs.However, since real service provider networks usually carry mostly bidirectional traffic, alsothe traffic trunks in the opposite directions would normally have to be set up.
When the Russian Dolls bandwidth constraint model is used, the temporal order of the signalledtraffic trunks has a strong effect on the resulting LSP routing. Those trunks that are signalled earlier,will normally have better chances of occupying the shortest path, unless preempted by higher prioritytrunks later on. This is also the case with the initially signalled RT and BD trunks in the followingexample, which will get to be routed on the shortest paths N1 > N4 > N6 and N2 > N5 > N6.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
42
2 MPLS Configuration Examples
Command Description
NODE1(config)# rsvp-trunktrunk1_RT10_N1-N6
Configures an RT trunk from node 1 to node 6.
NODE1(cfg-rsvp-trunk[trunk1_RT10_N1-N6])# primary setup-priority 0
Sets the setup priority of the trunk to 0 (= highestpossible preemption priority), so this trunk maypreempt other trunks having a hold priority of 1 (=the lowest priority level in use in this example).
NODE1(cfg-rsvp-trunk[trunk1_RT10_N1-N6])# primary hold-priority 0
Sets the hold priority of the trunk to 0 (= highestpossible preemption priority), so this trunk willnever get preempted by any other trunk.
NODE1(cfg-rsvp-trunk[trunk1_RT10_N1-N6])# primary bandwidth 10M
The bandwidth to be reserved for the trunk is 10Mbps.
NODE1(cfg-rsvp-trunk[trunk1_RT10_N1-N6])# no primary diffserv-object
The optional RSVP-TE DiffServ object will notbe used.
NODE1(cfg-rsvp-trunk[trunk1_RT10_N1-N6])# primary class-type RT
DS-TE class type for this session will be RT (i.e.CT2).
NODE1(cfg-rsvp-trunk[trunk1_RT10_N1-N6])# primary elsp-preconfigured
The LSP tunnel will be of the preconfigured E-LSPtype, with default PHB EXP mapping tablesused at each node.
NODE1(cfg-rsvp-trunk[trunk1_RT10_N1-N6])# update-type make-before-break
If the trunk parameters need to be changed later, anew LSP will be created for each attribute update.Once the new LSP becomes operational, theoriginal LSP will be torn down.
NODE1(cfg-rsvp-trunk[trunk1_RT10_N1-N6])# map-route 10.123.100.46/32 qos ef
Maps an IP route to the current trunk, i.e. insteadof traversing the multipoint-to-point LDP LSPsused for the default forwarding treatment, thoseEF packets, whose next hop lookup resolves to thegateway address 10.123.100.46, will be directed tothe new point-to-point RT trunk.
NODE1(cfg-rsvp-trunk[trunk1_RT10_N1-N6])# to 10.123.100.46
Specifies the IP loopback address of the egressnode (i.e. node 6) of the new tunnel LSP, afterwhich the protocol session will be set up, and theLSP initialization can begin.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
43
2 MPLS Configuration Examples
Command Description
NODE1(config)# rsvp-trunktrunk2_BD10_N1-N6NODE1(cfg-rsvp-trunk[trunk2_BD10_N1-N6])# primary setup-priority 1NODE1(cfg-rsvp-trunk[trunk2_BD10_N1-N6])# primary hold-priority 1NODE1(cfg-rsvp-trunk[trunk2_BD10_N1-N6])# primary bandwidth 10MNODE1(cfg-rsvp-trunk[trunk2_BD10_N1-N6])# no primary diffserv-objectNODE1(cfg-rsvp-trunk[trunk2_BD10_N1-N6])# primary class-type BDNODE1(cfg-rsvp-trunk[trunk2_BD10_N1-N6])# primary elsp-preconfiguredNODE1(cfg-rsvp-trunk[trunk2_BD10_N1-N6])# update-type make-before-breakNODE1(cfg-rsvp-trunk[trunk2_BD10_N1-N6])# map-route 10.123.100.46/32 qosaf1NODE1(cfg-rsvp-trunk[trunk2_BD10_N1-N6])# to 10.123.100.46
Configures a 10 Mbps BD trunk from node 1 tonode 6, and directs AF1 traffic to it. This timeboth the setup and hold priorities are set to 1 (= thelowest priority level in use in this example), so thistrunk will not preempt other trunks, but may getpreempted later by higher priority trunks.
Command Description
NODE2(config)# rsvp-trunktrunk3_RT15_N2-N6NODE2(cfg-rsvp-trunk[trunk3_RT15_N2-N6])# primary setup-priority 0NODE2(cfg-rsvp-trunk[trunk3_RT15_N2-N6])# primary hold-priority 0NODE2(cfg-rsvp-trunk[trunk3_RT15_N2-N6])# primary bandwidth 15MNODE2(cfg-rsvp-trunk[trunk3_RT15_N2-N6])# no primary diffserv-objectNODE2(cfg-rsvp-trunk[trunk3_RT15_N2-N6])# primary class-type RTNODE2(cfg-rsvp-trunk[trunk3_RT15_N2-N6])# primary elsp-preconfiguredNODE2(cfg-rsvp-trunk[trunk3_RT15_N2-N6])# update-type make-before-breakNODE2(cfg-rsvp-trunk[trunk3_RT15_N2-N6])# map-route 10.123.100.46/32 qos efNODE2(cfg-rsvp-trunk[trunk3_RT15_N2-N6])# to 10.123.100.46
Configures a 15 Mbps RT trunk from node 2 tonode 6, and directs EF traffic to it.
Tellabs 8600 Managed Edge System 50123_02MPLS Applications Configuration Guide 2009 Tellabs.
44
2 MPLS Configuration Examples
Command Description
NODE2(config)# rsvp-trunktrunk4_BD15_N2-N6NODE2(cfg-rsvp-trunk[trunk4_BD15_N2-N6])# primary setup-priority 1NODE2(cfg-rsvp-trunk[trunk4_BD15_N2-N6])# primary hold-priority 1NODE2(cfg-rsvp-trunk[trunk4_BD15_N2-N6])# primary bandwidth 15MNODE2(cfg-rsvp-trunk[trunk4_BD15_N2-N6])# no primary diffserv-objectNODE2(cfg-rsvp-trunk[trunk4_BD15_N2-N6])# primary class-type BDNODE2(cfg-rsvp-trunk[trunk4_BD15_N2-N6])# primary elsp-preconfiguredNODE2(cfg-rsvp-trunk[trunk4_BD15_N2-N6])# update-type make-before-breakNODE2(cfg-rsvp-trunk[trunk4_BD15_N2-N6])# map-route 10.123.100.46/32 qosaf1NODE2(cfg-rsvp-trunk[trunk4_BD15_N2-N6])# to 10.123.100.46
Configures a 15 Mbps BD trunk from node 2 tonode 6, and directs AF1 traffic to it.
Next an attempt is made to signal a PD trunk from node 2 to node 6 and from node 1 to node 6. Atthis phase, there are already existing LSPs on the shortest paths N1>N4>N6 and N2>N5>N6,so CSPF may have to calculate alternative routes for these trunks.
Command Description
NODE2(config)# rsvp-trunktrunk5_PD30_N2-N6
Establishes a new PD trunk from node 2 to node 6.
NODE2(cfg-rsvp-trunk[trunk5_PD30_N2-N6])# primary setup-priority 1NODE2(cfg-rsvp-trunk[trunk5_PD30_N2-N6])# primary hold-priority 0
This time the setup priority is 1 (i.e. the lowestpriority level in use in this example), and the holdpriority 0 (i.e. the highest possible priority level),so the new PD trunk will neither preempt othertrunks, nor will it be preempted by other trunks.
NODE2(cfg-rsvp-trunk[trunk5_PD30_N2-N6])# primary bandwidth 30MNODE2(cfg-rsvp-trunk[trunk5_PD30_N2-N6])# no primary diffserv-objectNODE2(cfg-rsvp-trunk[trunk5_PD30_N2-N6])# primary class-type PDNODE2(cfg-rsvp-trunk[trunk5_PD30_N2-N6])# primary elsp-preconfiguredNODE2(cfg-rsvp-trunk[trunk5_PD30_N2-N6])# update-type make-before-break
The desired trunk bandwidth is 30 Mbps. There isalready a 15 Mbps RT trunk on the shortest pathN2>N5>N6, and since BC1 (i.e. the maximumbandwidth consumed by all RT and PD trunks)has been configured to 40 Mbps, an alternativeroute has to be calculated. This will result ina tie between routes N2>N3>N4>N6 andN2>N1>N4>N6, out of which the least fillTie Break mode will select the N2>N3>N4>N6route.
NODE2(cfg-rsvp-trunk[trunk5_PD30_N2-N6])# map-route 10.123.100.46/32 qosaf4NODE2(cfg-rsvp-trunk[trunk5_PD30_N2-N6])# to 10.123.100.46
Finally, the LSP initialization can begin, and AF4traffic is directed to the new N2>N3>N4>N6PD trunk.
50123_02 Tellabs 8600 Managed Edge System 2009 Tellabs. MPLS Applications Configuration Guide
45
2 MPLS Configuration Examples
Command Description
NODE1(config)# rsvp-trunktrunk6_PD20_N1