In SRv6 TE Policy scenarios, the forwarding path of data packets usually needs to be constrained by specifying the nodes or links they need to traverse. For example, on the network shown in Figure 1, node A is required to send a packet to node F over a forwarding path that passes through node D. Because the backup path also needs to pass through node D, TI-LFA FRR cannot provide protection if this node fails.
In an SRv6 TE Policy scenario, strict node constraints may result in a TI-LFA FRR protection failure. To resolve this issue, a proxy forwarding node (a node upstream to the failed midpoint) takes over from the failed midpoint to complete the forwarding. Specifically, after detecting that the next-hop interface of the packet fails, the next-hop address is the destination address of the packet, and the SL value is greater than 0, the proxy forwarding node performs the End behavior on behalf of the midpoint. The behavior involves decrementing the SL value by 1, copying the next SID to the DA field in the outer IPv6 header, and then forwarding the packet according to the instruction bound to the SID. In this way, the failed midpoint is bypassed, achieving SRv6 midpoint protection.
SRv6 midpoint protection uses the next SID to guide packet forwarding over the bypass path, thereby bypassing the failure point. This mechanism is similar to MPLS TE FRR, which enables traffic to bypass the failure point using a bypass LSP. SRv6 midpoint protection is therefore also called SRv6 TE FRR.
The difference between SRv6 TI-LFA FRR and midpoint protection lies in whether the next-hop node is a transit node or a midpoint that corresponds to a SID in the SRH.
On the network shown in Figure 3, node A sends a packet carrying the segment list <E, F>. Because SRv6 TI-LFA FRR computes a backup path based on the destination address of the packet, the backup path passes through node E. If node E fails, SRv6 TI-LFA FRR cannot provide protection. In contrast, in an SRv6 midpoint protection scenario, packet forwarding is implemented based on the next SID to be processed. This ensures that the failed midpoint node E is bypassed, thereby achieving SRv6 TE Policy midpoint protection.