Verification
The following output indicates that the node protection mechanism actively calculates backup paths to bypass the entire router, not just the link.
Backup path in the RIB
On the P2
router, if there was a failure in the P2–P3
link or a failure of the P3
node, the backup path would circumvent the P3
node entirely.
The P7
router has a more optimal path to PE5
through P3
, but it hasn’t been used due to the presence of a node protection request.
Instead, P7
is instructed to utilize the adjacency toward P4
to meet the node protection request:
RP/0/RP0/CPU0:P2#show isis fast-reroute detail 5.5.5.5/32 L2 5.5.5.5/32 [30/115] Label: 16005, medium priority Installed Jan 01 07:39:23.614 for 00:00:06 via 23.0.0.3, GigabitEthernet0/0/0/0, Label: 16005, P3, SRGB Base: 16000, Weight: 0 Backup path: TI-LFA (node), via 27.0.0.7, GigabitEthernet0/0/0/3 P7, SRGB Base: 16000...