In the network shown in Figure 1, both types of bypass paths are preestablished around the protected node (R2). A next-hop bypass path avoids interface fe-0/1/0 ...
確定! 回上一頁