SR-TE PCC Features
Load isis.sr.vpnv4.and.te.enabled.cfg
Configure R10 as a PCE and R1 as a PCC. Use the password PASSWORD for the PCEP session.
Configure a locally-calculated policy on R1 with R7 as the endpoint using an IGP metric. Configure R1 to report this policy to R10.
Answer
Explanation
Similar to BGP and LDP, you can use TCP option 19 (MD5 Signature) for authentication with PCEP sessions. You simply specify a password for the pce server:
You can verify that the MD5 flag is on in the TCP details:
By default, the PCC does not report its locally-calculated policies to the PCE. You might want even locally-calculated policies to be reported to the PCE so that it can use that information itself, or provide all path information to applications through the PCE’s own northbound interface. At this moment, I’ve configured the policy on R1 but I am not reporting all policies to the PCE yet. Notice that R10 does not know of any LSPs yet:
We’ll now configure R1 to report all LSPs:
Immediately, R1 reports its single LSP to the PCE.
Above, we can tell that this policy was only reported to the PCE because the computed path section is “None.”
Last updated