mpls-7----Page:2
1  2  3  4  5  6  7  8  9  10  11  12  13  14 

Limitations of the P2P Bypass approach node protection

Using P2P bypass tunnels for P2MP LSP node protection leads to traffic duplication on some links during failure


Duplication
Protected P2MP TE-LSP
P2P Bypass tunnel
PPT Version