Deploying frr, Configuring frr – H3C Technologies H3C Intelligent Management Center User Manual
Page 194

the primary LSP is Router A —> Router B —> Router C —> Router D, and the bypass LSP is Router
B —> Router F —> Router C.
Figure 57 FRR link protection
•
Node protection, where the PLR and the MP are connected through a router and the primary LSP
traverses this router. When the router fails, traffic is switched to the bypass LSP. As shown in
, the primary LSP is Router A —> Router B —> Router C —> Router D —> Router E, and the
bypass LSP is Router B —> Router F —> Router D. Router C is the protected router.
Figure 58 FRR node protection
Deploying FRR
When configuring the bypass LSP, make sure that the protected link or node is not on the bypass LSP.
Because bypass LSPs are pre-established, FRR requires extra bandwidth. When network bandwidth is
insufficient, use FRR for crucial interfaces or links only.
Configuring FRR
Fast Reroute (FRR) provides quick but temporary per-link or per-node local protection on an LSP.
FRR uses bypass tunnels to protect primary tunnels. As bypass tunnels are pre-established, they require
extra bandwidth and are usually used to protect crucial interfaces or links only.
184