The BGP Diverse Path feature is configured on a Route Reflector (RR) and is commonly used with a Shadow RR. A Shadow RR is a backup RR that only advertises an alternative path to its RR clients. In other words, the Shadow RR does not advertise the BGP best path, but instead ...
To reduce the number of MPLS Traffic Engineering tunnels necessary between each Provider Edge router in a L3VPN architecture, the LDP over MPLS TE solution can be used. This means, the MPLS backbone network is divided into two functional areas, a Core Layer using MPLS TE and an Aggregation Layer using LDP only ...
Segment Routing Traffic Engineering (TE) enables steering MPLS traffic based on a defined path to optimize network performance. So far, MPLS TE required introducing an additional protocol (RSVP) into the core network. This is, however, no longer needed with SR TE ...
A Segment Routing Traffic Engineering policy provides options to steer traffic within an MPLS network based on a variety of constraints. A color value uniquely defines an SR TE policy on a local router. An SR TE policy may have multiple candidate paths with various methods of deciding ...
The OSPF stub router feature allows a device to be removed gracefully from the OSPF topology without causing packet loss for transiting traffic. This is achieved by informing OSPF neighbors in advance about a topology change. As a result, other OSPF routers can divert traffic to ...
An OSPF stub area optimizes the routing protocol operation by filtering external routes from the OSPF Link State Database (LSDB). Routers in a stub area can have a single default route pointing to the nearest Area Border Router (ABR), and do not need to ...
The OSPF options field is included in all LSA types, Hello packets, and Database Description packets. OSPF uses different options to signal capabilities and functions of an advertising router within the OSPF domain. For example, a stub router, an ABR or a ...
Dynamic VTI is a mechanism to automatically create on-demand Virtual-Access interfaces for network tunneling purposes. The configuration of a Virtual-Access interface is inherited (cloned) from a Virtual-Template interface. This means, it is only necessary to configure a single Virtual-Template ...