Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
IS-IS User Guide
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configuring Topology-Independent Loop-Free Alternate with Segment Routing for IS-IS

date_range 24-Nov-23

Loop-free alternate (LFA) and remote LFA have been used to provide fast-reroute protection for several years. With LFA, a point of local repair (PLR) determines whether or not a packet sent to one of its direct neighbors will reach its destination without looping back through the PLR. In a typical network topology, perhaps 40-60 percent of destinations can be protected by LFA. Remote LFA expands on the concept of LFA by allowing the PLR to impose a single label to tunnel the packet to a repair tunnel endpoint from which the packet can reach its destination without looping back through the PLR. Using remote LFA, more destinations can be protected by the PLR compared to LFA. However, depending on the network topology, the percentage of destinations protected by remote LFA usually less than 100 percent.

Topology-independent loop-free alternate (TI-LFA) extends the concept of LFA and remote LFA by allowing the PLR to use deeper label stacks to construct backup paths. In addition, TI-LFA imposes the constraint that the backup path used by the PLR be the same path that a packet takes once the IGP converges for a given failure scenario. This path is referred to as the post-convergence path.

Using the post-convergence path as the backup path has some desirable characteristics. For some topologies, a network operator only needs to make sure that the network has enough capacity to carry the traffic along the post-convergence path after a failure. In these cases, a network operator does not need to allocate additional capacity to deal with the traffic pattern immediately after the failure while the backup path is active, because the backup path follows the post-convergence path.

Before you configure TI-LFA for IS-IS, be sure you configure SPRING or segment routing.

To configure TI-LFA using SPRING for IS-IS, you must do the following:

  1. Enable TI-LFA for IS-IS protocol.
    content_copy zoom_out_map
    [edit protocols isis backup-spf-options]
    user@R1# set use-post-convergence-lfa
    
  2. (Optional) Configure backup shortest path first (SPF) attributes such as maximum equal-cost multipath (ECMP) backup paths and maximum labels for TI-LFA for the IS-IS protocol.
    content_copy zoom_out_map
    [edit protocols isis backup-spf-options use-post-convergence-lfa]
    user@R1# set maximum-backup-paths maximum-backup-paths
    user@R1# set maximum-labels maximum-labels
    
  3. Configure the computation and installation of a backup path that follows the post-convergence path on the given interface and level for the IS-IS protocol.
    content_copy zoom_out_map
    [edit protocols isis interface interface-name level level 
    user@R1# set post-convergence-lfa
    
  4. (Optional) Enable fate-sharing protection for a given interface and level. Specify the fate-sharing group to use as a constraint for the post-convergence path.
    Note:

    You do not have to configure the use-for-post-convergence-lfa statement and the fate-sharing-protection statement for basic link protection for the backup path.

    content_copy zoom_out_map
    [edit routing-options fate-sharing group group-name]
    user@R1# set use-for-post-convergence-lfa
    
    content_copy zoom_out_map
    [edit protocols isis interface interface-name level level post-convergence-lfa]
    user@R1# set fate-sharing-protection
    
  5. (Optional) Enable node protection for a given interface and level.
    content_copy zoom_out_map
    [edit protocols isis interface interface-name level level post-convergence-lfa]
    user@R1# set node-protection 
    
footer-navigation