beautypg.com

Deploying frr, Configuring frr – H3C Technologies H3C Intelligent Management Center User Manual

Page 194

background image

the primary LSP is Router A —> Router B —> Router C —> Router D, and the bypass LSP is Router
B —> Router F —> Router C.

Figure 57 FRR link protection

Node protection, where the PLR and the MP are connected through a router and the primary LSP
traverses this router. When the router fails, traffic is switched to the bypass LSP. As shown in

Figure

58

, the primary LSP is Router A —> Router B —> Router C —> Router D —> Router E, and the

bypass LSP is Router B —> Router F —> Router D. Router C is the protected router.

Figure 58 FRR node protection

Deploying FRR

When configuring the bypass LSP, make sure that the protected link or node is not on the bypass LSP.

Because bypass LSPs are pre-established, FRR requires extra bandwidth. When network bandwidth is
insufficient, use FRR for crucial interfaces or links only.

Configuring FRR

Fast Reroute (FRR) provides quick but temporary per-link or per-node local protection on an LSP.

FRR uses bypass tunnels to protect primary tunnels. As bypass tunnels are pre-established, they require
extra bandwidth and are usually used to protect crucial interfaces or links only.

184