05 Segment Routing
05 Segment Routing
Foreword
Segment Routing (SR) is designed to forward data packets on a
network using the source routing model.
This document describes the source routing model of SR, segment
definition, differences between SR-MPLS and SRv6, and scenario-
specific SR-MPLS applications for Huawei NetEngine series routers.
3 Huawei Confidential
Objectives
Upon completion of this course, you will be able to:
Describe the background of SR.
Describe the technical advantages of SR.
Describe the basic concepts involved in SR.
Describe the forwarding fundamentals of SR.
Master basic SR-MPLS configurations.
4 Huawei Confidential
Contents
5 Huawei Confidential
Problems in MPLS LDP and RSVP-TE
MPLS LDP RSVP-TE
VP R
RS o n s res SVP
p po
P IG res e e
ns
IG P
R R
LD
L DP 2 P 2 R
VP req SVP
R R RS e s t ue
u
1 1 req st
LD
P P R R
R LD R
IG P 3 3
P 4 4
IG
• LDP itself does not have the path computation capability and • RSVP-TE configuration is complex and load balancing is not
requires an IGP for path computation. supported.
• Both the IGP and LDP need to be deployed for the control • To implement TE, devices need to exchange a large number
plane, and devices need to exchange a large number of of RSVP packets to maintain neighbor relationships and path
packets to maintain neighbor relationships and path states, states, wasting link bandwidth and device resources.
wasting link bandwidth and device resources. • RSVP-TE uses a distributed architecture, so that each device
• If LDP-IGP synchronization is not achieved, data forwarding only knows its own state and needs to exchange signaling
may fail. packets with other devices.
6 Huawei Confidential
Service-Driven Network: Services Define the Network
Architecture
The development of 5G and cloud services has changed the attributes and scope of network connections.
More requirements are raised on connections, such as requiring better SLA guarantee, deterministic
latency, or more information to be carried in packets.
In this situation, the model that requires networks to adapt to services cannot keep up with rapid service
development and even complicates network deployment and maintenance.
To address this issue, the service-driven network model can be used, so that the network architecture is
defined by services. Specifically, after an application raises requirements (e.g. latency, bandwidth, and
packet loss rate), a controller is used to collect information (e.g. network topology, bandwidth usage, and
latency) and compute an explicit path according to the requirements.
High bandwidth
Download
service
Low latency Service-
Video service driven
Low packet loss
Voice service rate network
7 Huawei Confidential
SR Roadmap
Simplifies protocols and extends existing
Service-defined protocols.
Controll network
er
The extended IGP/BGP supports label distribution.
Therefore, LDP is not required on the network,
achieving protocol simplification. In addition,
devices require only software upgrades instead of
hardware replacement, protecting the investment
on the live network.
R
The source routing mechanism is introduced.
2
The specific forwarding policy is instantiated as a
IGP/BGP label list on the ingress to control the traffic
R R forwarding path.
1 3
R
Enables networks to be defined by services.
4
After an application raises requirements (e.g.
latency, bandwidth, and packet loss rate), a
controller is used to collect information (e.g.
8 Huawei Confidential
network topology, bandwidth usage, and latency)
SR Solution
After services raise network requirements (e.g. latency, bandwidth, and packet loss rate), a
controller computes an explicit path in a centralized manner and delivers an SR path to carry
Service
the services. Controll requireme
Explicit
er path
nt
rate
PCEP/NETCONF/
BGP High-bandwidth path
l o ss
gh th
Hi w i d
y
nc
nd
ket
ba te
la
pac
w
Lo
Video
Voice
Low-packet-loss-rate path
9 Huawei Confidential
SR Overview
SR is designed to forward data packets on a network using the source routing model.
SR divides a network path into several segments and assigns a segment ID (SID) to each segment and
forwarding node. The segments and nodes are sequentially arranged into segment lists to form a
forwarding path.
SR encapsulates segment list information that identifies a forwarding path into the packet header for
transmission. After a node receives the packet, it parses the segment list information. If the top SID in the
segment list identifies the local node, the node removes the SID and executes the follow-up procedure.
Otherwise, the node forwards the packet to the next hop in equal cost multiple path (ECMP) mode.
SR has the following characteristics:
Extends existing protocols (e.g. IGP) to facilitate network evolution.
Supports both controller-based centralized control and forwarder-based distributed control, providing a balance
between the two control modes.
Enables networks to quickly interact with upper-layer applications through the source routing technology.
10 Huawei Confidential
SR Advantages
Simplified • SR uses a controller or IGP to uniformly compute paths and allocate labels, without the need to
control plane of use tunneling protocols such as RSVP-TE and LDP.
the MPLS • SR can be directly used in the MPLS architecture, without requiring changes to the forwarding
network plane.
Efficient TI-LFA • SR works with remote loop-free alternate (RLFA) FRR to provide efficient topology-independent
FRR protection loop-free alternate (TI-LFA) FRR.
against path • TI-LFA FRR offers node and link protection for all topologies, addressing the weakness in
failures traditional tunnel protection technologies.
12 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
13 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
R R
Instruction 1 (400): Forward the packet to R4
1
1 8
80 over the shortest path (ECMP supported).
0
Instruction 2 (1046): Forward the packet
R R R through GE0/0/2 of R4.
3 5 7
Instruction 3 (800): Forward the packet to R8
over the shortest path (ECMP supported).
14 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
40
400 R 0R R
1046 2 4 2 6
Source routing: The source node selects
800 GE0/0/
2 a forwarding path and encapsulates an
104
1
6 3 ordered segment list into a packet. After
receiving the packet, other nodes
forward it based on the segment list
R 1 R
1 8 information.
80
0
R R R
3 5 7
15 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
Adjacency
Prefix SID Node SID Note: SIDs are identified in the same way in the following
SID
parts.
16 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
10.1.1.0/ 10.2.2.0/
1600
24 1600
24
1 R R R 2
1 2 3
Prefix Segment
• Identifies the prefix of a destination address on a network. Prefix segments are propagated to other devices
through an IGP. They are visible to and effective on all the devices.
• Node segments are special prefix segments used to identify specific nodes.
• When an IP address is configured as a prefix for a node's loopback interface, the prefix SID of the node is the
node SID.
17 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
R R R
In actual deployment, it is recommended that
1 2 3 devices use the same SRGB.
12030 Swap 20030
Payloa Payloa
Why is SRGB required?
d d
SR requires prefix SIDs to be globally valid.
In MPLS, some label space of a device may be
occupied by other protocols, such as LDP.
Similar to the
100 200 outbound 300
Loopback Loopback interface Loopback
1 1 information in 1
1.1.1.1/3 2.2.2.2/3 an IP route 3.3.3.3/3
2 2 2
10.1.1.0/ 10.2.2.0/
1600
24 1600
24
1 100 100 2
R R R
1 2
1 2 3
Adjacency Segment
Identifies an adjacency on a network. Adjacency segments are propagated to other
devices through an IGP. They are visible to all the devices but effective only on the
local device.
19 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
20 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
Advertises SR-MPLS SIDs or MPLS OSPFv2 Extended Prefix TLV and OSPF Extended Prefix
SID/Label Sub-TLV Range TLV in OSPFv2 Extended Prefix Opaque LSA
labels.
OSPFv2 Extended Link TLV in OSPFv2 Extended Link
Opaque LSA
OSPFv2 Extended Prefix TLV and OSPF Extended Prefix
Prefix SID Sub-TLV Advertises SR-MPLS prefix SIDs.
Range TLV in OSPFv2 Extended Prefix Opaque LSA
Advertises SR-MPLS adjacency SIDs OSPFv2 Extended Link TLV in OSPFv2 Extended Link
Adj-SID Sub-TLV
on a P2P network. Opaque LSA
Advertises SR-MPLS adjacency SIDs OSPFv2 Extended Link TLV in OSPFv2 Extended Link
LAN Adj-SID Sub-TLV
on a LAN. Opaque LSA
21 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
SID/Label Sub-TLV Advertises SR-MPLS SIDs or MPLS labels. SR-Capabilities Sub-TLV and SR Local Block Sub-TLV
Advertises the mapping between prefixes and
SID/Label Binding TLV IS-IS LSP
SIDs.
SR-Capabilities Sub-TLV Advertises SR-MPLS capabilities. IS-IS Router Capability TLV-242
Advertises the range of labels reserved for local
SR Local Block Sub-TLV IS-IS Router Capability TLV-242
SIDs.
22 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
23 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
SR Policy Example
24 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
M
LS pa PLS v6
IP
MP ket ck IP ket p a v6
ck
c et c
pa pa et
IP MP IPv6 IPv
LS R LS 6 R 6
packe MP packet IPv
t 2 2
R R
1 1
MP R IPv R
LS R LS 6 R 6
MP 3 IPv 3
2 2
• Data forwarding plane: based on MPLS • Data forwarding plane: based on IPv6
• MPLS labels are used as SIDs. • IPv6 addresses are used as SIDs.
• Segment list information is encoded as a label stack. The • Segment list information is encoded as a label stack and carried
segment to be processed is at the stack top. Once a using the IPv6 Segment Routing header (SRH).
segment is processed, the corresponding label is removed
from the label stack.
25 Huawei Confidential
Basic
Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Concept
1013 1024
R R 100 1045 Stitching
1032 label
1024 2 4 10 1013 1056
1046 6 4 1032 R R
102 100 2 4
4
R R 102
1 6 4
10 103 104
3 1 2
R
5 R
1 6
10 103
R R 3 1 2
5
3 5 10
R R 6
• A label stack is an ordered set of labels used to identify a
3 5
complete LSP.
• Each adjacency label in the label stack identifies an adjacency, • If the label stack depth exceeds the maximum depth supported
and the entire label stack identifies all adjacencies along the by forwarders, the controller needs to allocate multiple label
LSP. stacks to the forwarders and a special label to an appropriate
• During packet forwarding, a node searches for the node to stitch these label stacks, thereby implementing
corresponding adjacency according to each adjacency label in segment-by-segment forwarding.
the label stack, removes the label, and then forwards the • This special label is called a stitching label, and this appropriate
packet. After all the adjacency labels in the label stack are node is called a stitching node. The controller allocates a
removed, the packet traverses the entire LSP and reaches the stitching label to the stitching node and pushes it to the bottom
26
tunnel destination.
Huawei Confidential of the label stack.
Fundamental
Basic Concept SR-MPLS BE SR-MPLS TE SR-MPLS Policy
s
27 Huawei Confidential
Fundamental
Basic Concept SR-MPLS BE SR-MPLS TE SR-MPLS Policy
s
A prefix segment-based forwarding path is computed by an IGP using the SPF algorithm.
1. After the prefix SID (100) of R2 is propagated using an IGP, all devices in the IGP domain learn the
SID.
2. R1 is used as an example (the implementation for other devices is similar to this). It runs SPF to
compute the shortest path to R2.
Prefix segment-based forwarding paths are not fixed, and the ingress cannot control the entire packet
forwarding path.
28 Huawei Confidential
Fundamental
Basic Concept SR-MPLS BE SR-MPLS TE SR-MPLS Policy
s
1056 Loopback
R 103
1078 1
1 4
R 2.2.2.2/3
7 2 2
1078
10
8
105
6
This method can be used to specify any strict explicit path, facilitating SDN implementation.
29 Huawei Confidential
Fundamental
Basic Concept SR-MPLS BE SR-MPLS TE SR-MPLS Policy
s
Loopback1
R 103 2.2.2.2/32
100
1 4 Prefix
R SID=100
100 2
Adjacency and node segments can be used together. An adjacency segment can be specified
to force a path to traverse an adjacency. The node corresponding to a node segment can run
SPF to compute the shortest path that supports ECMP.
Paths established in this mode are not strictly fixed, and therefore, they are also called loose explicit
paths.
30 Huawei Confidential
Fundamental
Basic Concept SR-MPLS BE SR-MPLS TE SR-MPLS Policy
s
SR-MPLS BE
606
Packe
t
R R R SR-MPLS BE
1 2 3
SR-MPLS TE
202
1025
606
Packe 20
t 2R
R R SR-MPLS TE
1 2 3
In SR-MPLS TE mode, multiple SIDs are combined
to guide data forwarding based on constraints,
102
thereby meeting traffic engineering
5
requirements.
Methods of combining SIDs:
Combine multiple node SIDs.
Combine multiple adjacency SIDs.
R
Combine node and adjacency SIDs, as shown in the
6
60 figure.
R R 6
4 5
6.6.6.0/2
4
1600
2
32 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS TE SR-MPLS Policy
BE
SR-MPLS BE LSP
An SR-MPLS BE LSP is a label forwarding path established using the SR technology. It
uses a prefix or node segment to guide packet forwarding.
An SR-MPLS BE LSP is the optimal SR LSP computed by an IGP using the SPF
algorithm.
The creation and data forwarding of SR-MPLS BE LSPs are similar to those of LDP
LSPs. SR-MPLSSRGB
BE LSPs do not have tunnel SRGB
SRGB interfaces. SRGB
20000- 30000- 40000- 50000-
65535 65535 65535 65535 Loopback1
4.4.4.4/32
Prefix index 100
R R R R
1 2 3 4
Advertise Advertise Advertise
the prefix the prefix the prefix
SID and SID and SID and
Incoming label SRGB
Incoming label SRGB
Incoming label SRGB
20100 30100 40100 Incoming label
Outgoing label Outgoing label Outgoing label 50100
30100 40100 50100
33 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS TE SR-MPLS Policy
BE
34 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS TE SR-MPLS Policy
BE
35 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS Policy
TE
Traffic Engineering
Traffic engineering (TE) is one of the most important network services. The traditionally
popular TE technology is based on MPLS and therefore is called MPLS TE. It can accurately
control the path through which traffic passes, maximizing bandwidth utilization.
Path Planning Traffic Optimization Fault Protection
36 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS Policy
TE
38 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS Policy
TE
Controller Controller
BGP-
LS
R R R R R R
1 2 3 1 2 3
IG IG IG IG
P P P P
R R R R R R
4 5 6 4 5 6
The IGP configured on forwarders is used to collect BGP-LS is used to report TE information and network
network topology information, SR adjacency labels, topology information with SR labels to the controller.
and node labels.
40 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS Policy
TE
Controller
BGP-
LS
In SR-MPLS TE, labels are allocated through the IGP
R R R
1 2 3 configured on forwarders and reported to a
controller through BGP-LS.
SR-MPLS TE mainly uses adjacency labels and
IG IG can also use node labels.
P P
Adjacency labels are allocated by the ingress,
104 and are valid locally and unidirectional.
GE0/0/
5
1
GE0/0/
105 2
R R R
4
4 5 6
41 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS Policy
TE
R SR-MPLS TE tunnel
1
R
2
Path 2: backup path
SR-MPLS TE tunnel creation involves tunnel attribute configuration and tunnel establishment.
43 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS Policy
TE
SR-MPLS TE tunnels are established and managed using tunnel interfaces. As such, you need to
configure a tunnel interface on the ingress of each SR-MPLS TE tunnel.
44 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS Policy
TE
45 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS Policy
TE
PC
P
E
F
NETCON
High-bandwidth path
gh th
y
Hi wi d
P
PCE
nc
te
nd
la
ba
w
Lo
Data
downloa Low-latency
d path
Video
46 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS Policy
TE
Forwarding based on a combination of node and adjacency labels
Forwarding based on a combination of node and adjacency labels is also called loose-path forwarding.
When processing node labels, a device can forward packets along the shortest path or perform load
balancing because the path is not strictly fixed in this case.
47 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS Policy
TE
SR-MPLS TE (with tunnel interfaces) traffic steering
Tunnel policy: Use a tunnel type prioritizing policy to select an SR-TE tunnel.
Static route: When configuring a static route, specify the outbound interface of the route as an SR-TE tunnel
interface.
Auto route: Use an SR-TE tunnel as a logical link in IGP route calculation.
Policy-based routing (PBR): Specify an SR-TE tunnel interface as an outbound interface in the involved clause.
48 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE
Policy
SR Policy Overview
An SR Policy uses a segment list to specify a forwarding path, without the need to use tunnel
interfaces.
SR Policies are classified into SR-MPLS Policies and SRv6 Policies based on segments. This
document focuses on SR-MPLS Policies.
The controller computes paths based on the color attribute that represents SLAs and delivers
the computation results to forwarders to form SR-MPLS Policies. (In this example, the
forwarder's tunnel information is different from SR-TE tunnel information.) According to the
color attribute and next hop of the involved service route, the headend recurses the route to
the corresponding SR-MPLS Policy for service forwarding.
<PE1>display tunnel-info all
Tunnel ID Type Destination Status
----------------------------------------------------------------------------------------
0x0000000001004c4c04 ldp 1.0.0.12 UP
51 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE
Policy
BGP-LS/BGP SR
The controller uses BGP to deliver a
Policy combination of SR SIDs to the
ingress. A TE tunnel carrying the
policy color and destined for the
egress is then created on the
ingress.
Colo
r
If the tunnel needs to be referenced,
you can locate the tunnel based on
the policy color.
Ingres Egres
s s
52 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE
Policy
53 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE
Policy
54 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE
Policy
Binding SID
To achieve better scalability, network opacity, and service independence, the binding SID (BSID)
mechanism is introduced to SR. (RFC 8402-5.Binding Segment) A BSID can be defined for each candidate
path.
Similar to RSVP-TE tunnels, SR-MPLS TE tunnels can also function as forwarding adjacencies. If an SR-MPLS
TE tunnel is used as a forwarding adjacency and an adjacency SID is allocated to it, this SID is called a
BSID. A BSID identifies an SR-MPLS TE tunnel.
sr-te policy P1
Only one BSID can be configured for an SR-MPLS Policy. It
binding-sid 200
can be used for SR-MPLS TE path computation as other
endpoint 5.5.5.5 color 100
types of SIDs.
55 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE
Policy
Controller
Background: R3 functions as the egress
and advertises the route 5.5.5.5/32 to the
BGP- ingress R1. Finally, an SR Policy is
LS
2.2.2. 3.3.3. Prefix: established between R1 and R3. The figure
2 3 5.5.5.5/32
shows the associated path. The specified
2000 2000
2 3 color is green.
1. BGP-LS collects information (e.g. topology,
1.1.1.
1 R3: bandwidth, and link latency) and reports it to
2000 Egres
Gree the controller, which then computes SR Policy
1 s
n paths and displays tunnel status based on the
R1:
information.
Ingres
s
4.4.4.4
20004
56 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE
Policy
Controll
Background: R3 functions as the egress
er
and advertises the route 5.5.5.5/32 to the
NETCON
F ingress R1. Finally, an SR Policy is
Prefix:
2.2.2. 3.3.3. 5.5.5.5/32 established between R1 and R3. The
2 3 Color: Green
2000 2000 NHP: 3.3.3.3 figure shows the associated path. The
2 3 specified color isuses
green.
2. The controller NETCONF to deliver a
1.1.1.
1 R3: VPN or BGP export route-policy to the
2000 Egres
Gree s egress. The color attribute (green) is set
1 n
for the route prefix 5.5.5.5/32, and the
R1:
Ingres next hop of the route is R3 address
s 3.3.3.3.
4.4.4.4
20004
57 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE
Policy
Controll
Background: R3 functions as the egress
er
and advertises the route 5.5.5.5/32 to
MP-BGP the ingress R1. Finally, an SR Policy is
Prefix:
2.2.2. 3.3.3. 5.5.5.5/32
2 3 Color: Green established between R1 and R3. The
2000 2000 NHP: 3.3.3.3
figure shows the associated path. The
2 3
1.1.1. specified color is green.
1 R3:
2000 Egres 3. The egress advertises the colored route
Gree s
1 n 5.5.5.5/32 to the ingress through MP-
R1: BGP.
Ingres
s
4.4.4.4
20004
58 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE
Policy
4.4.4.4
20004
60 Huawei Confidential
SR-MPLS
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE
Policy
61 Huawei Confidential
Contents
62 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
Egres
Local
s TI-LFA FRR
protection
Fast switching Anycast
Only links and Ingres FRR
nodes s
protected
E2E
protection Egres
Detection- s
dependent fast
Hot
switching
Standby
E2E paths protected Ingres
s
63 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
TI-LFA FRR
Topology-independent loop-free alternate (TI-LFA) FRR provides link and node protection for SR tunnels. If
a link or node fails, traffic is rapidly switched to the backup path.
Cost
Cost Cost
=100 Cost
DIP: =10 DIP: =100
4.4.4.4 =10
4.4.4.4
Cost=1
R R Cost=1
0 R R
3 4 0
3 4
64 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
Protectio Protectio
SIP: R R SIP: R R
n path n path
1.1.1.1 1 2 1.1.1.1 1 2
Original Original
path path
DIP: DIP:
4.4.4.4 4.4.4.4
R R R R
3 4 3 4
65 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
[Router] isis 1
[Router-isis-1] frr
[Router-isis-1-frr] loop-free-alternate level-2
[Router-isis-1-frr] ti-lfa level-2
IS-IS 1 Level-
2
66 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
Packe
TI-LFA cannot protect
t
1600 services against explicit
6 node failures.
1600
4 1600 1600 1600
2 4 6
1600 R2 R4 R6
1
R1 1600 1600
3 5
R3 R5
67 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
Anycast FRR
Anycast FRR can protect services against failures of specified nodes.
Assume that R4 and R5 advertise the same SID. This SID is called an anycast SID. The anycast SID is
advertised in the IGP, with the next hop pointing to the nearest node on the path, such as R4. In this case,
R4 is the optimal node of the anycast SID, and R5 is the backup node.
Set the same SID (anycast
SID) for different devices.
1600 R4 Optima R6
R2
1 l node
R1 1600
3
Backup
R3 R5 node
68 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
16001
R2 1610 R4 R6
0
R1 16003
Virtual
node
Backup
R3 R5 path
69 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
Hot Standby
SR hot standby enables the controller to compute a backup path that is different from the
primary path to implement E2E path protection.
For SR-MPLS Policies, the primary and backup candidate paths implement hot standby
protection. The primary and backup candidate paths belong to the same SR-MPLS Policy.
Candidate path
SR-MPLS 1 Primary
Policy Candidate path candidate
2 16002 path 16004 16006
16001 P1 P2 PE2
P3 Backup P4 PE3
candidate
path
70 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
Backup
candidate
path
Multiple candidate paths of an SR-MPLS Policy
SR policy P1 <headend, color, endpoint>
Candidate-path CP1 <Protocol-Origin, Originator,
implement hot standby protection. If a segment
Discriminator> list fails, a failover is triggered.
Preference 200
SID-List <SID11...SID1i>
SR-MPLS Policy fault detection depends on
Candidate-path CP2 Protocol-Origin, Originator,
Discriminator> detection mechanisms such as BFD or SBFD.
Preference 100
SID-List <SID21...SID2i>
71 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
16001 P1 P2 PE2
Backup
candidate
CE1 PE1 16003 path 16005 16007 CE2
P3 P4 PE3
72 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
VPN FRR
VPN FRR uses the VPN route-based fast switching technology. It presets primary and backup forwarding
paths pointing to the master and backup PEs, respectively, on the ingress PE and implements fast PE
failure detection to reduce E2E service convergence time when a PE failure occurs in an MPLS VPN
scenario where a CE is dual-homed to two PEs.
Candidate path
SR-MPLS Policy 1
1 Candidate path Primary candidate
2 path of SR-MPLS
SR-MPLS Policy 2 -Candidate path Policy 1
1 1600 1600 1600
2 4 6
1600 P1 P2 PE2
1 Backup candidate
path of SR-MPLS
1600 Policy 1600
1 1600
CE1 PE1 CE2
3 5 7
P3 P4 PE3
VPN FRR backup path (SR-MPLS
Policy 2)
73 Huawei Confidential
Anycast Hot- VPN
TI-LFA FRR Microloop Avoidance SBFD BFD
FRR Standby FRR
16003 VPN
FRR Policy 1 becomes
If PE2 fails, SR-MPLS
SR-MPLS Policy 2 Candidate
-- path 1 16005
unavailable, triggering VPN FRR switching to
16007 SR-MPLS Policy 2.
Note: Candidate path 1 of SR-MPLS Policy 1 is the primary
path.
74 Huawei Confidential
Anycast Hot- VPN Microloop
TI-LFA FRR SBFD BFD
FRR Standby FRR Avoidance
1600 P1 P2 PE2
1
75 Huawei Confidential
Anycast Hot- VPN Microloop
TI-LFA FRR SBFD BFD
FRR Standby FRR Avoidance
76 Huawei Confidential
Anycast Hot- VPN Microloop
TI-LFA FRR SBFD BFD
FRR Standby FRR Avoidance
P3 P4 PE3
77 Huawei Confidential
Anycast Hot- VPN Microloop
TI-LFA FRR SBFD BFD
FRR Standby FRR Avoidance
1600
P1 P2 PE2
1
1600 1600
PE1
3 7
1603
7
P3 PE3
78 Huawei Confidential
Anycast Hot- VPN Microloop
TI-LFA FRR SBFD BFD
FRR Standby FRR Avoidance
Purpose: to locally compute a
Purpose: to prevent temporary loops
backup path for the destination during the update of the primary
address path
Trigger condition: link or node
Trigger condition: primary path
failure on the primary path update
79 Huawei Confidential
Anycast Hot- VPN SBF
TI-LFA FRR Microloop Avoidance BFD
FRR Standby FRR D
SBFD Overview
If BFD detects a large number of links, the negotiation time of the state machine is prolonged, which is not suitable for
SR. To address this issue, seamless bidirectional forwarding detection (SBFD), which is a simplified BFD mechanism, is
introduced to detect SR tunnels. With a simplified BFD state machine, SBFD shortens the negotiation time and improves
network-wide flexibility.
BFD SBFD
Initiato negotiation Initiato Initiato negotiation Reflecto
r r r r
BFD D
Down own Down
n
Do w
BF D BFD
Down Reflection
Down -> BFD I Down -> Down
ni t only
Init Init BFD
Init
BF D Down
Down -> Multiple
Down -> BFD U Down -> Up initiators
p
Up Up share one
Up reflector.
BF D
80 Huawei Confidential
Anycast Hot- VPN SBF
TI-LFA FRR Microloop Avoidance BFD
FRR Standby FRR D
SBFD Implementation
Initiator Reflecto
r
SBFD state
Admin machine of the
Down Up
SBFD Control Packet initiator
(Timer)
One-Arm BFD
BFD/SBFD requires that devices at both ends support this function. If a Huawei device needs to communicate with a
BFD-incapable device, you can configure one-arm BFD (also called one-arm BFD echo) for the Huawei device. A one-arm
BFD Echo session can be established on the BFD-capable device. After receiving a BFD Echo packet, the BFD-incapable
device immediately loops back the packet for quick link detection.
One-arm BFD Echo does not require Echo negotiation capabilities at both ends; that is, BFD can be configured on only
one end. The device with one-arm Echo enabled sends special BFD packets (source and destination IP addresses in the
IP header are the IP address of the local device, and the local and remote discriminators in the BFD packet are the
same). After receiving the packets, the peer device directly loops them back to the local device to check whether the
link is normal. This function equips Huawei devices with a stronger adaptability to low-end devices.
BFD-capable BFD-
incapable
Router Router
A B
BFD SIP=A, DIP=A, MD=A,
YD=A
Forwarding to the source
SIP: source IP address device according to
DIP: destination IP BFD SIP=A, DIP=A, MD=A, DIP=A
address YD=A
MD: my discriminator
YD: your discriminator
82 Huawei Confidential
Contents
83 Huawei Confidential
Intra-AS SR-MPLS BE
MP-
SR-MPLS BE applies to services that do
IBGP
not have strict SLA requirements or
require path planning.
Downstream routers allocate SIDs to
IGP (OSPF or IS-
IS) upstream routers to form SR-MPLS
PE SR PE
1
MPLS MPLS MPLS
2 forwarding paths.
P P
MP-BGP is used on the control plane to
1 2
advertise VPN labels.
SID SID SID
advertiseme advertiseme advertisemen
SR-MPLS BE can be used as a backup
nt nt t
CE CE solution for SR-MPLS TE services on a
1 2
production network.
84 Huawei Confidential
Intra-AS SR-MPLS TE
SR-MPLS TE applies to scenarios that have strict SLA requirements and require path planning, such as DCI scenarios.
SR labels are advertised by an IGP. The controller uses BGP-LS to collect information (e.g. network topology, bandwidth,
latency, and label information).
The controller computes qualified forwarding paths based on constraints and delivers path computation results to
forwarders through PCEP or NETCONF. Engineers can also manually configure strict forwarding paths and delegate the
paths to the controller through PCEP.
Controll
er
BGP-LS, NETCONF, and PCEP
85 Huawei Confidential
Intra-AS SR-MPLS Policy
SR-MPLS Policy applies to scenarios that have strict SLA requirements and require path planning.
SR labels are advertised by an IGP. The controller uses BGP-LS to collect information (e.g. network topology, bandwidth,
latency, and label information).
The controller computes qualified forwarding paths based on constraints and delivers path computation results to
forwarders through BGP SR Policy or PCEP. Engineers can also manually configure strict forwarding paths and delegate
the paths to the controller through PCEP.
Controll
er
BGP-LS, NETCONF,
and BGP SR Policy/PCEP
IGP
86 Huawei Confidential
Inter-AS E2E SR-MPLS TE (1)
In inter-AS access scenarios, it is recommended that the controller perform centralized computation and
deliver E2E SR-MPLS TE paths.
BGP egress peer engineering (EPE) is configured on ASBRs for them to allocate a BGP peer SID to each
other.
The ASBRs then use BGP-LS to report the BGP EPE-generated labels and network topology information.
Controll
er
BGP peer SID
reporting through
BGP-LS BGP EPE
SID SID
304 403
87 Huawei Confidential
Inter-AS E2E SR-MPLS TE (2)
Before an E2E SR-MPLS TE tunnel is created, the controller needs to create intra-AS SR-MPLS
TE tunnels.
To reduce the label stack depth, you can configure a BSID for each intra-AS tunnel.
In this example, BSID 1000 is configured for the tunnel from PE1 to one ASBR, and BSID 2000
for the tunnel from PE2 to the other ASBR. Controll
BSID 1000 er BSID 2000
BGP EPE
SID SID
304 403
88 Huawei Confidential
Inter-AS E2E SR-MPLS TE (3)
The controller performs global computation, integrates path labels into a label stack, and
then delivers it to forwarders.
In this example, the label stack for the path from PE1 to PE2 is <1000, 304, 2000>.
In the label stack, 1000 and 2000 are BSIDs, which will be replaced with corresponding SR
label stacks during intra-AS forwarding. Controll
BSID 1000 er BSID 2000
SID SID
304 403
89 Huawei Confidential
Contents
▫ SR-MPLS Policy
90 Huawei Confidential
L3VPN over SR-MPLS BE (1)
AS 100
Loopback Loopback Loopback
0 0 0
10.0.1.1/ VPN: 10.0.2.2/ VPN: 10.0.3.3/
PE
32 vpna P
32 vpna PE
32
1 10.0.12.0/24 10.0.23.0/24 2 Configuration roadmap:
. . . .
1 2 2 3 1.Configure interface IP addresses and OSPF.
10.0.14.0/ 10.0.35.0/ (Configuration details are not provided.)
24 24
Loopback Loopback 2.Enable MPLS, configure SR, and establish SR LSPs on
1 1
10.1.4.4/3 10.1.5.5/3 the backbone network.
CE AS AS CE
2 2
1 65000 65001 2 3.Establish an MP-BGP peer relationship between PE1 and
Networking requirements: PE2.
4.Enable the VPN instance IPv4 address family on each
1.Connect PE1 and PE2 to different CEs that belong to
PE.
VPN instance vpna.
5.Configure a tunnel policy for the PEs to preferentially
2.Deploy L3VPN service recursion to SR-MPLS BE
select SR LSPs.
tunnel on the backbone network so that CE1 and
6.Verify the configuration.
CE2 can communicate through Loopback1.
91 Huawei Confidential
L3VPN over SR-MPLS BE (2)
AS
100
Loopback Loopback Loopback
0 0 0
10.0.1.1/ VPN: 10.0.2.2/ VPN: 10.0.3.3/ PE1 configurations are as follows: (P and PE2
PE vpna P vpna PE
32
10.0.12.0/24
32
10.0.23.0/24 .
32 configurations are not provided.)
1 . . . 2
1 2 2 3 [~PE1] ospf 1
10.0.14.0/ 10.0.35.0/ [*PE1-ospf-1] opaque-capability enable
[*PE1-ospf-1] quit
24 24
Loopback Loopback [~PE1] mpls lsr-id 10.0.1.1
1 1 [*PE1] mpls
10.1.4.4/3 10.1.5.5/3 [~PE1-mpls] quit
CE AS
2
AS
2
CE [~PE1] segment-routing
1 65000 65001 2 [*PE1-segment-routing] quit
Configuration roadmap: [*PE1] ospf 1
1.Configure interface IP addresses and OSPF. (Configuration [*PE1-ospf-1] segment-routing mpls
details are not provided.) [*PE1-ospf-1] segment-routing global-block 16000
2.Enable MPLS, configure SR, and establish SR LSPs on 23999
[*PE1-ospf-1] quit
the backbone network. [*PE1] interface loopback 0
Configure
3.Establish an MP-BGP peer relationship between PE1 and PE2. the same
[*PE1-LoopBack1] ospf prefix-sid index 1
4.Enable the VPN instance IPv4 address family on each PE. SRGB.
[*PE1-LoopBack1] quit
5.Configure a tunnel policy for the PEs to preferentially select [*PE1] commit
SR LSPs. P: index 2
6.Verify the configuration. PE2: index 3
92 Huawei Confidential
L3VPN over SR-MPLS BE (3)
AS PE1 configurations are as follows: (PE2 configurations
100
Loopback
Loopback
Loopback are not provided.)
0 0
VPN: 0 VPN: [~PE1] bgp 100
10.0.1.1/
PE P 10.0.3.3/
PE
vpna 10.0.2.2/ vpna [~PE1-bgp] peer 10.0.3.3 as-number 100
32 32
1 . 10.0.12.0/24 . 32 . 10.0.23.0/24 . 2 [*PE1-bgp] peer 10.0.3.3 connect-interface
1 2 2 3 loopback 0
10.0.14.0/ 10.0.35.0/ [*PE1-bgp] ipv4-family vpnv4
[*PE1-bgp-af-vpnv4] peer 10.0.3.3 enable
24 24 [*PE1-bgp-af-vpnv4] commit
Loopback Loopback
1 1 [~PE1-bgp-af-vpnv4] quit
10.1.4.4/3 10.1.5.5/3 [~PE1-bgp] quit
CE AS AS CE
2 2 PE1 configurations are as follows: (PE2 configurations
1 65000 65001 2
Configuration roadmap: are not provided.)
1.Configure interface IP addresses and OSPF. (Configuration [~PE1] ip vpn-instance vpna
details are not provided.) [*PE1-vpn-instance-vpna] ipv4-family
2.Enable MPLS, configure SR, and establish SR LSPs on the [*PE1-vpn-instance-vpna-af-ipv4] route-distinguisher
backbone network. 100:1
3.Establish an MP-BGP peer relationship between PE1 [*PE1-vpn-instance-vpna-af-ipv4] vpn-target 111:1
both
and PE2.
[*PE1-vpn-instance-vpna-af-ipv4] quit
4.Enable the VPN instance IPv4 address family on each [*PE1-vpn-instance-vpna] quit
PE. [*PE1]bgp 100
5.Configure a tunnel policy for the PEs to preferentially select [*PE1-bgp]ipv4-family vpn-instance vpna
SR LSPs. [*PE1-bgp-vpna]peer 10.0.14.4 as-number 65000
6.Verify the configuration.
94 Huawei Confidential
L3VPN over SR-MPLS BE (4)
PE1 configurations are as follows: (PE2 configurations
AS are not provided.)
Loopback
100 Loopback Loopback
[~PE1] tunnel-policy p1
0 0 0
VPN: VPN: [*PE1-tunnel-policy-p1] tunnel select-seq sr-lsp load-balance-
10.0.1.1/
PE 10.0.2.2/
P 10.0.3.3/
PE
vpna vpna number 2
32 32 32
1 . 10.0.12.0/24 . . 10.0.23.0/24 . 2 [*PE1-tunnel-policy-p1] quit
1 2 2 3 [*PE1] commit
[~PE1] ip vpn-instance vpna
10.0.14.0/ 10.0.35.0/ [*PE1-vpn-instance-vpna] ipv4-family
24 24 [*PE1-vpn-instance-vpna-af-ipv4] tnl-policy p1
Loopback Loopback
[*PE1-vpn-instance-vpna-af-ipv4] quit
1 1
[*PE1-vpn-instance-vpna] quit
10.1.4.4/3 10.1.5.5/3
CE AS
2
AS
2
CE [*PE1] commit
1 65000 65001 2
Run the display tunnel-info all command on PE1 to
Configuration roadmap:
check SR LSP information.
1.Configure interface IP addresses and OSPF.
(Configuration details are not provided.) <PE1>display tunnel-info all
2.Enable MPLS, configure SR, and establish SR LSPs on Tunnel ID Type Destination
Status
the backbone network. -------------------------------------------------------------------------------
3.Establish an MP-BGP peer relationship between PE1 and 0x000000002900000042 srbe-lsp 10.0.3.3
PE2. UP
4.Enable the VPN instance IPv4 address family on each 0x000000002900000043 srbe-lsp 10.0.2.2
PE. ID of the tunnel to PE2
UP
5.Configure a tunnel policy for the PEs to
preferentially select SR LSPs.
6.Verify
95
the configuration.
Huawei Confidential
L3VPN over SR-MPLS BE (5)
AS
Loopback
100 Loopback Loopback Check VPNv4 routing information on PE1.
Loopback
0 0 0
0 <PE1>display bgp vpnv4 all routing-table 10.1.5.5
VPN: VPN:
10.0.1.1/
PE 10.0.2.2/
P 10.0.3.3/
PE
10.0.3.3/
vpna vpna
32 32 32 BGP local router ID : 10.0.1.1
1 . 10.0.12.0/24 . . 10.0.23.0/24 . 2
32
Local AS number : 100
1 2 2 3
10.0.14.0/ 10.0.35.0/ Total routes of Route Distinguisher(100:1): 1
24 24 BGP routing table entry information of 10.1.5.5/32:
Loopback Loopback Label information (Received/Applied): 48122/NULL
1 1 From: 10.0.3.3 (10.0.3.3)
10.1.4.4/3 10.1.5.5/3 Route Duration: 0d00h39m18s
CE AS
2
AS CE
2
65000 65001 Relay IP Nexthop: 10.0.12.2
1 2
Configuration roadmap: Relay IP Out-Interface: GigabitEthernet0/3/1
1.Configure interface IP addresses and OSPF. Relay Tunnel Out-Interface: GigabitEthernet0/3/1
Original nexthop: 10.0.3.3
(Configuration details are not provided.)
Qos information : 0x0
2.Enable MPLS, configure SR, and establish SR LSPs on Ext-Community: RT <111 : 1>
the backbone network. AS-path 65001, origin incomplete, MED 0, localpref 100, pref-val
3.Establish an MP-BGP peer relationship between PE1 and 0, valid, internal, best, select, pre 255, IGP cost 2
PE2. Not advertised to any peer yet
4.Enable the VPN instance IPv4 address family on each
PE. Label allocated by PE2 to 10.1.5.5/32
5.Configure a tunnel policy for the PEs to
preferentially select SR LSPs.
6.Verify the configuration.
96 Huawei Confidential
L3VPN over SR-MPLS BE (6)
97 Huawei Confidential
L3VPN over SR-MPLS BE (7)
AS
Loopback Loopback Loopback Tracert the SR LSP on
100
0 0 0 PE1.
<PE1>tracert lsp segment-routing ip 10.0.3.3 32
VPN: VPN:
10.0.1.1/
PE 10.0.2.2/
P 10.0.3.3/
PE LSP Trace Route FEC: SEGMENT ROUTING IPV4 PREFIX
vpna vpna
32 32 32 10.0.3.3/32 , press CTRL_C to break.
1 . 10.0.12.0/24 . . 10.0.23.0/24 . 2
TTL Replier Time Type Downstream
1 2 2 3 0 Ingress 10.0.12.2/[16003 ]
10.0.14.0/ 10.0.35.0/ 1 10.0.12.2 8 ms Transit 10.0.23.3/[3 ]
24 24 2 10.0.3.3 9 ms Egress
Loopback Loopback
1 1
CE
10.1.4.4/3
AS
10.1.5.5/3
AS CE Question: How are the labels
2 2 computed?
1 65000 650012
Configuration roadmap:
1.Configure interface IP addresses and OSPF. Verify the configuration on CE1.
(Configuration details are not provided.)
<CE1>ping -a 10.1.4.4 10.1.5.5
2.Enable MPLS, configure SR, and establish SR LSPs on the PING 10.1.5.5: 56 data bytes, press CTRL_C to break
backbone network. Reply from 10.1.5.5: bytes=56 Sequence=1 ttl=254 time=1
3.Establish an MP-BGP peer relationship between PE1 and ms
PE2. Reply from 10.1.5.5: bytes=56 Sequence=2 ttl=254 time=1
4.Enable the VPN instance IPv4 address family on each PE. ms
Reply from 10.1.5.5: bytes=56 Sequence=3 ttl=254 time=1
5.Configure a tunnel policy for the PEs to
ms
preferentially select SR LSPs. Reply from 10.1.5.5: bytes=56 Sequence=4 ttl=254 time=1
6.Verify the configuration. ms
Reply from 10.1.5.5: bytes=56 Sequence=5 ttl=254 time=1
98 Huawei Confidential ms
Contents
AS
Loopback
100 Loopback Loopback
0 0 0
10.0.1.1/ VPN: 10.0.2.2/ VPN: 10.0.3.3/
PE vpna P vpna PE Configuration roadmap:
32 32 32
1 . 10.0.12.0/24 . . 10.0.23.0/24 . 2
1 2 2 3 1.Configure interface IP addresses and OSPF.
10.0.14.0/ 10.0.35.0/ (Configuration details are not provided.)
24 24
Loopback Loopback 2.Enable MPLS, configure SR, and establish SR-MPLS TE
1 1
10.1.4.4/3 10.1.5.5/3 LSPs on the backbone network.
CE AS
2
AS
2
CE
1 65000 65001 2 3.Establish an MP-BGP peer relationship between PE1 and
Networking requirements: PE2.
1.Connect PE1 and PE2 to different CEs that belong to 4.Enable the VPN instance IPv4 address family on each
AS
Loopback Loopback Loopback
Check vpna's routing information on PE1.
100
0 0 0 [~PE1]display ip routing-table vpn-instance vpna 10.1.5.5
10.0.1.1/ VPN: 10.0.2.2/ VPN: 10.0.3.3/
PE vpna P vpna PE verbose
32 32 32 Route Flags: R - relay, D - download to fib, T - to vpn-instance, B -
1 . 10.0.12.0/24 . . 10.0.23.0/24 . 2
black hole route
1 2 2 3
------------------------------------------------------------------------------
10.0.14.0/ 10.0.35.0/ Routing Table : vpna
24 24 Summary Count : 1
Loopback Loopback
1 1 Destination: 10.1.5.5/32
10.1.4.4/3 10.1.5.5/3
CE AS
2
AS
2
CE Protocol: IBGP Process ID: 0
1 65000 65001 2 Preference: 255 Cost: 0
Configuration roadmap: NextHop: 10.0.3.3 Neighbour: 10.0.3.3
1.Configure interface IP addresses and OSPF. State: Active Adv Relied Age: 00h04m18s
(Configuration details are not provided.) Tag: 0 Priority: low
2.Enable MPLS, configure SR, and establish SR-MPLS TE Label: 48122 QoSInfo: 0x0
LSPs on the backbone network. IndirectID: 0x100013D Instance:
RelayNextHop: 0.0.0.0 Interface: Tunnel1
3.Establish an MP-BGP peer relationship between PE1 and
TunnelID: 0x000000000300000001 Flags: RD
PE2.
4.Enable the VPN instance IPv4 address family on each The VPNv4 label and SR TE LSP are combined to
PE. guide packet forwarding.
5.Establish an MP-IBGP peer relationship between the
PEs.
6.Configure a tunnel policy for the PEs to preferentially
select
107 SR-MPLS
Huawei TE LSPs.
Confidential
7.Verify the configuration.
L3VPN over SR-MPLS TE (7)
AS
Loopback
100 Loopback Loopback Tracert the SR LSP on
0 0 0 PE1.
<PE1>tracert lsp segment-routing te Tunnel 1
10.0.1.1/ VPN: 10.0.2.2/ VPN: 10.0.3.3/
PE P PE LSP Trace Route FEC: SEGMENT ROUTING TE TUNNEL IPV4
32 vpna 32 vpna 32 SESSION QUERY Tunnel1 , press CTRL_C to break.
1 . 10.0.12.0/24 . . 10.0.23.0/24 . 2
TTL Replier Time Type Downstream
1 2 2 3 0 Ingress 10.0.12.2/[16003 ]
10.0.14.0/ 10.0.35.0/ 1 10.0.12.2 21 ms Transit 10.0.23.3/[3 ]
24 24 2 10.0.3.3 9 ms Egress
Loopback Loopback
1 1
CE
10.1.4.4/3
AS
10.1.5.5/3
AS CE Question: How are the labels
2 2 computed?
1 65000 65001 2
Configuration roadmap:
1.Configure interface IP addresses and OSPF. Verify the configuration on CE1.
(Configuration details are not provided.)
2.Enable MPLS, configure SR, and establish SR-MPLS TE <CE1>ping -a 10.1.4.4 10.1.5.5
PING 10.1.5.5: 56 data bytes, press CTRL_C to break
LSPs on the backbone network. Reply from 10.1.5.5: bytes=56 Sequence=1 ttl=254 time=1
3.Establish an MP-BGP peer relationship between PE1 and ms
PE2. Reply from 10.1.5.5: bytes=56 Sequence=2 ttl=254 time=1
4.Enable the VPN instance IPv4 address family on each ms
PE. Reply from 10.1.5.5: bytes=56 Sequence=3 ttl=254 time=1
ms
5.Establish an MP-IBGP peer relationship between the
Reply from 10.1.5.5: bytes=56 Sequence=4 ttl=254 time=1
PEs. ms
6.Configure a tunnel policy for the PEs to preferentially Reply from 10.1.5.5: bytes=56 Sequence=5 ttl=254 time=1
select
108 SR-MPLS
Huawei TE LSPs.
Confidential ms
7.Verify the configuration.
Contents
▫ SR-MPLS TE
SR-MPLS Policy
109 Huawei Confidential
L3VPN over Static SR-MPLS Policy (1)
AS
Loopback
100 Loopback Loopback
0 0 0
10.0.1.1/ VPN: 10.0.2.2/ VPN: 10.0.3.3/
PE vpna P vpna PE
32 32 32 Configuration roadmap:
1 . 10.0.12.0/24 . . 10.0.23.0/24 . 2
1 2 2 3 1.Configure interface IP addresses and OSPF.
10.0.14.0/ 10.0.35.0/ (Configuration details are not provided.)
24 24
Loopback Loopback 2.Enable MPLS and configure an SR-MPLS Policy on the
1 1
10.1.4.4/3 10.1.5.5/3 backbone network.
CE AS
2
AS
2
CE
1 65000 65001 2 3.Establish an MP-BGP peer relationship between PE1 and
Networking requirements: PE2.
1.Connect PE1 and PE2 to different CEs that belong to 4.Enable the VPN instance IPv4 address family on each
B. Type 2
C. Type 7
D. Type 10
2. (Multiple-answer question) Which of the following ports are used by SBFD packets by default? ( )
A. 4784
B. 3784
C. 6784
D. 7784