Label Distribution Protocol
Page 248 7210 SAS M, T, X, R6, Mxp MPLS Configu-
ration Guide
The path by way of R2 and R4 can be used to protect against the failure of router R3. However, 
with the link R2-R3 metric set to 5, R2 sees the same cost to forward a packet to R5 by way of R3 
and R4. Thus R1 cannot guarantee that enabling the LFA next-hop R2 will protect against R3 node 
failure. This means that the LFA next-hop R2 provides link-protection only for prefix R5. If the 
metric of link R2-R3 is changed to 8, then the LFA next-hop R2 provides node protection since a 
packet to R5 will always go over R4. In other words it is required that R2 becomes loop-free with 
respect to both the source node R1 and the protected node R3.
Consider the case where the primary next-hop uses a broadcast interface as illustrated in Figure 28
 
Figure 28: Example Topology with Broadcast Interfaces
In order for next-hop R2 to be a link-protect LFA for route R5 from R1, it must be loop-free with 
respect to the R1-R3 link’s Pseudo-Node (PN). However, since R2 has also a link to that PN, its 
cost to reach R5 by way of the PN or router R4 are the same. Thus R1 cannot guarantee that 
enabling the LFA next-hop R2 will protect against a failure impacting link R1-PN since this may 
cause the entire subnet represented by the PN to go down. If the metric of link R2-PN is changed 
to 8, then R2 next-hop will be an LFA providing link protection. 
 
R1 R2
R3 R4
R5
5
5
5
5 (8)
5
5
Primary Route
LFA Link-Protect Route
PN
5