mpls-7----Page:2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Limitations of the P2P Bypass approachnode protection
Using P2P bypass tunnels for P2MP LSP node protection leads to traffic duplication on some links during failure
Duplication
Protected P2MP TE-LSP
P2P Bypass tunnel
PPT Version