Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Configure Link Protection

 

Purpose

Configuring link protection is a two-part process. The first part involves configuring link protection on the RSVP interface, and the second part sets link protection for any LSPs traversing the protected link that require use of the bypass path.

Action

To configure link protection, follow these steps:

  1. In configuration mode, go to the following hierarchy level:

    For example:

  2. Configure link protection for the interface:

  3. Verify the link protection configuration for the interface:

  4. Configure link protection for LSPs requiring use of the bypass path:

    For example:

  5. Configure link protection for the LSP:

  6. Verify and the link protection configuration for the LSP:

Sample Output

The following sample output illustrates the configuration of the link protection on ingress router R1 in the network shown in Many-to-One or Link Protection:

Meaning

The sample output shows link protection for a specific interface. After link protection is configured, a bypass path is signaled to avoid that link in case of a failure. Having a bypass path available does not in itself provide protection for LSPs that traverse the protected link. You must configure link protection on the ingress router for each LSP that will benefit from the bypass path.