Blog

HomeBlogPage 34
Packet Tracer BGP Configuration Example To understand BGP (Border Gateway Protocol) better, we will make a basic Packet Tracer BGP...
Ping Command and Ping Command Options Whenever other engineers see network engineers during troubleshooting, they think that, network engineers only...
Both One-to-One and Facility Backup can protect different network elements. And these can be achieved by two ways: – Node...
The goal of the protection is minimizing the down time. To do this, protection must be done near to the...
As we say in the following articles, while using Secondary LSP-Paths, sharing links between Primary and Secondary LSP-Paths must be...
There are some different types traffic protections. In general we can divide these types into two groups. End-to-end Protection and...
As you know, we can prioritize some of the traffic with MPLS-TE because of their nature. The high priority can...
After the link failure in MPLS network, there are some actions need to be done orderly for MPLS recovery. This...
What Happens After the Failure Recovered By Fast Reroute (FRR) ? After detecting the failure in an MPLS network, in...
In the Alcatel-Lucent 7750 Service Routers, we can verify the Secondary LSP-Path configuration with the following commands. Verifying secondary LSPs...