Loop Free Alternate and Remote Loop Free PDF
Loop Free Alternate and Remote Loop Free PDF
Introduction
This document describes how the IP Fast Reroute (FRR) provides fast recovery methods in Label
Distribution Protocol (LDP) based networks.This is a lot simpler to implement. Loop Free Alternate
(LFA) is similar to Multiprotocol Label Switching (MPLS) FRR i.e. it pre-installs the backup next-
hop into the forwarding plane. LFA’s don't introduce any protocol extensions and can be
implemented on a per router basis, which makes it a very attractive option.
Prerequisites
Requirements
Components Used
The information in this document was created from the devices in a specific lab environment. All of
the devices used in this document started with a cleared (default) configuration. If your network is
live, make sure that you understand the potential impact of any command.
Background Information
Understand MPLS
FRR Options:
Loop Free Alternate (LFA) FRR pre-computes a loop-free alternate path and installs into the
forwarding place. LFA is calculated based on route in equality.
LFA:
Path is loop-free because N’s best path is not through local router. Traffic sent to backup next hop
is not sent back to S.
Downstream Path:
Neighbor router is closer to the destination than local router. Loop-free is guaranteed even with
multiple failures (if all repair-paths are downstream path).
Node Protection:
Inequality 3: D(N,D) < D(N,E) + D(E,D) N's path to D must not go through E.
The distance from the node N to the prefix via the primary next-hop is strictly greater than the
optimum distance from the node N to the prefix.
The link from S to N should not be the same as the protected link.
The link from N to D should not be the same as the protected link.
● Simplified Configuration
● Link and Node Protection
● Link and Path Protection
● LFA paths
● Support for both IP and LDP
● LFA FRR is supported with Equal Cost Multipath (ECMO)
Disadvantages of LFA and rLFA:
LFA does not provide full coverage and it is very topology dependent. Reason is simple i.e. in
many cases, in order to backup next-hop, the best path goes through the router and calculates the
backup next-hop.
This problem can be solved if you can find a router which is more than one hop away from
the router that calculates, from which the traffic is forwarded to the destination without traversing
the failed link and then you can tunnel the packet to that router.
These kinds of multi-hop repair paths are more complicated than single hop repair paths as
computations are needed to determine if a path exits (to begin with) and then a mechanism to
send the packet to that hop.
Let's look at a Point of Presence (POP) with aring topology as per the mentioned ring structure.
If you find a node from which traffic is forwarded to the destination without traversing the failed link
and it sends it to that node, then you can achieve FRR without causing a loop.
P-Space:
The P-Space of a router with respect to a protected link is the set of routers reachable from that
specific router with the use of the pre-convergence shortest paths, without any of those paths, that
transits that protected link.
P-Space is a set of routers that R2 (source) can reach without the use of the R2 (S) - R1 link
which is R3 (P-Space) and R4 (P-Space) nodes.
Extended P-Space:
The extended P-Space of the protecting router with respect to the protected link is the union of the
P-Space of the neighbours in that set of neighbor, with respect to the protected link, which makes
it the union of the P-Spaces of the neighbours in that set of neighbours with respect to the
protected link.
Extended P-Space contains the routers that are R2 - direct neighbor, R3 - can reach without the
use of the R2 - R1 link which is R4 and R5 node. Point behind Extended P-Space is that it helps to
increase the coverage.
Q-Space:
Q-Space of a router with respect to a protected link is the set of routers from which that specific
router that can be reached without any path (that includes ECMP splits) and transits that protected
link.
Q-Space contains the routers that normally reach R6 without the use of the R2 (S) R1 link which is
R1, R5 and R4 nodes.
PQ Node:
Any router which is a PQ node can be a remote LFA candidate. The candidate router to whom R2
(S) can send the packet, will forward the packet to the destination without traversing through R2(S)
R1 link. In this case, R4 and R5 are the PQ nodes and are considered remote LFA candidates for
R2 (S).
There are various ways to tunnel the traffic like IPinIP, GRE and LDP etc. However, the most
common form of implementation is LDP tunnel.
If you protect IP traffic, then R2 (s) pushes an LDP label on top of IP packet to reach R4 (assume
R2 (S) picket R4) as a Remote LFA node. When R3 receives the packet, it forwards the packet to
R4 as a plain IP packet because of normal PHP behaviour. When R4 receives the packet destined
to R6 (D), it forwards the packet upstream towards R5 node.
In Case of Protecting LDP Traffic:
In this case a stack that consists of two LDP labels is used by R2(S).
Outer LDP label x, is the label to reach R4 and inner LDP label Y, is label to reach R6 (D) from R4.
Now the question is, how will R2 (S) know that R4 uses LDP label Y in order to send traffic
towards R6(D). In order for the protecting node-to-node to know what label a PQ node uses to
forward the destination (D), it has to establish Targeted LDP session with a PQ node to get the
FEC to label mapping. Therefore, you know that TLDP sessions should be enabled on the all the
nodes for Remote LFA.
Benefits of rLFA over LFA:
● RLFA improves the LFA coverage in ring and poorly meshed topology
● It improves the consistency when the remote tunnel endpoint is selected
● Might work with RSVP with very little operational and computational overhead
● RSVP can be used to complement LFA/eLFA and vice versa
● When used in conjunction with MPLS LDP, there is no need of additional protocol in the
control plane
● The data plane for MPLS makes use of label stacking to tunnel the packets to the PQ node
from there
● Traffic flows to the destination and does not return to the source or traverses the protected link
Configure
Network Diagram
Configurations
ISIS Configuration:
router isis 20
net 20.0000.0000.0005.00
is-type level-1
Verify
Use this section in order to confirm that your configuration works properly.
Load for five secs: 0%/0%; one minute: 0%; five minutes: 0%
Load for five secs: 0%/0%; one minute: 0%; five minutes: 0%
10.0.0.4/32
Load for five secs: 1%/0%; one minute: 0%; five minutes: 0%
Troubleshoot
There is currently no specific troubleshooting information available for this configuration.