< Home

protected-instance

Function

The protected-instance command configures protected instances in a SEP segment.

The undo protected-instance command deletes the protected instances in a SEP segment.

By default, no protected instance is configured in a SEP segment.

Format

protected-instance { all | { instance-id1 [ to instance-id2 ] } &<1-10> }

undo protected-instance { all | { instance-id1 [ to instance-id2 ] } &<1-10> }

Parameters

Parameter Description Value
all

Indicates all protected instances in a SEP segment.

-
instance-id1 [ to instance-id2 ]

Specifies the IDs of protected instances in a SEP segment.

The keyword to connecting two instance IDs, indicating an ID range from instance-id1 to instance-id2. The value of instance-id2 must be greater than the value of instance-id1.

&<1-10> indicates that the parameter before the sign (&) can be repeated 1 to 10 times.

The value is an integer in the range 0 to 4094. Each device supports a maximum of 65 instances.

Views

SEP segment view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

In common SEP networking, a physical ring can be configured with only one SEP segment in which only one interface can be blocked. If an interface in a complete SEP segment is blocked, all service data is transmitted only along the path where the primary edge interface is located. The path where the secondary edge interface is located remains idle, wasting bandwidth.

SEP multi-instance is used to improve bandwidth efficiency, allowing each physical interface on a ring network to be added to two SEP segments. A physical ring can be configured with two logical rings, allowing packets carrying different VLAN IDs to pass through. Load balancing is then implemented between the two logical rings. This implementation requires logical rings to be configured with different protected instances and mappings between protected instances and VLANs to be configured. The protected-instance command can be used to configure protected instances for a SEP segment.

Prerequisites

The protected instance IDs configured for SEP segments do not overlap. If different SEP segments have duplicate protected instance IDs, replan protected instance IDs.

Follow-up Procedure

Complete the following tasks to configure mappings between protected instances and VLANs:
  1. Run the stp region-configuration command to enter the MST region view.
  2. Run the instance instance-id vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> command to configure mappings between protected instances and VLANs.

    The value of instance-id specified in this command must be the same as the value of instance-id specified in the protected-instance command.

  3. Run the active region-configuration command to activate the configured mappings between protected instances and VLANs.

Precautions

If you run the protected-instance command multiple times in the same SEP segment, multiple instances are configured.

After the protected-instance command is run to configure different protected instances for SEP segments and mappings between protected instances and VLANs are set, topology changes affect only corresponding VLANs. This ensures reliable data transmission.

Before adding an interface to a SEP segment, ensure that the SEP segment has been configured with protected instances; otherwise, the interface cannot be added to the SEP segment.

Example

# Configure protected instances for SEP segment 1.

<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] protected-instance all
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >