to provide a better help some information is needed: what type of platform are you connecting to the MetroE service?
You have spoken of interface fas0/0 and fas0/1 so my guess is that this is a router.
Another important aspect is there is any STP information carried over the links and who is the possible STP partner (the local provider switch or your remote site) for your device.
However, if you get a layer2 service over the metro ethernet you should be free to use a second /30 private ip address (RFC 1918) over the second link and you can use a routing protocol to detect when the primary link fails
This is probably the best way to deal with your two metroethernet links.
To use both with a single /30 you could:
a) make a port-channel but requires cooperation of provider and if the two links are terminated on a different SP node this is not feasible
b) use integrated routing and bridging (IRB) but this requires that the service is able and willing to transport BPDU frames over the two links between your two remote ends. However the root bridge side cannot detect the failure of the remote end
So I think using a second /30 private ip address is the best solution and gives you the capability to detect when the links are up and operational on both ends
the following document design for enterprise and metro ethernet may help
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...