Understanding Basic 802.1ah Provider Backbone Bridge

Size: px
Start display at page:

Download "Understanding Basic 802.1ah Provider Backbone Bridge"

Transcription

1 Understanding Basic 802.1ah Provider Backbone Bridge Contents Introduction Prerequisites Requirements Components Used IEEE 802.1ah Provider Backbone Bridging Overview Terminologies Used PBB Components Layer 2 loop avoidance protocol 802.1ah encapsulation Configure Network Diagram Configurations How PBB works? Unicast Traffic Forwarding 802.1ah Encapsulated Packet View (Unicast traffic) Unknown unicast, multicast & broadcast Traffic Forwarding 802.1ah Encapsulated Packet View (Broadcast traffic) Verify Introduction This document describes functioning of basic Provider Backbone Bridge technology (PBB). It uses Multi Spanning Tree (MST) in the core network for loop avoidance. Prerequisites Requirements Cisco recommends that you have basic knowledge of MST and VPLS (Virtual Private Lan Service). Components Used This document is not restricted to specific software and hardware versions. The information in this document was created using Aggregation Services Router 9000 (ASR9K) devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. IEEE 802.1ah Provider Backbone Bridging Overview

2 The Institute of Electrical and Electronics Engineers (IEEE) 802.1ah PBB feature encapsulates or decapsulates end-user traffic on a Backbone Edge Bridge (BEB) at the edge of the Provider Backbone Bridged Network (PBBN). PBB provides scalability to configure higher number of service instances in network. PBB encapsulates customer's network into 802.1ah headers. These encapsulated packets are exchanged using unique and manually configured backbone address in core network. This obviates the need for backbone core bridges to learn all MAC addresses of every customer and hence adding to scalability. In order to understand technology behavior, it is important to understand meaning of some terminologies that will be frequently used in this document. Terminologies Used This document will be frequently using some terminologies associated with PBB. These are listed below with brief explanation. B-MAC : All the bridges(routers) in backbone network are manually configured with a unique MAC address. These MAC addresses are used in forwarding base to identify which remote BEB should customer traffic be forwarded to. B-SA : B-DA : Denotes backbone MAC address of source bridge. Denotes backbone MAC address of destination bridge. BEB : Backbone edge bridge is the router that faces customer edge node. BCB : Backbone core bridge is transit node in provider's core network that switches frame towards destination. B-VID : I-SID : B-Tag : Vlan that carries PBB encapsulated customer traffic within core. Represents a unique service identifier associated with service instances. Contains backbone vlan(b-vlan) id information. I-Tag : Contains I-SID value and helps destination BEB router to determine which I-Component or service instance should the traffic be forwarded to. S-VID : Vlan that receives customer traffic and is called Service Vlan identifier(s-vid). C-VID : Vlan tag received in customer's frame. This remains intact while it encapsulated and transported across provider network. C-SA : C-DA : Original source MAC address of customer's frame. Original destination MAC address of customer's frame. Note: C-VID, C-SA and C-DA and payload that constitute customer frame os never changed in PBB network. PBB Components The IEEE 802.1ah provides a framework to interconnect several provider bridged networks, often called as PBNs. It provides means to scale the service Vlans in provider s network. PBB network comprises of two main components called as I-Component & B-Component.

3 I-Component: This component resides on BEB (Backbone Edge Nodes) routers and faces customer network. It is responsible for handling customer traffic and adding a PBB header to it. I- Component maintains important mapping information: - It maintains mapping between S-VID and I-SID - It maintains customer mac (C-DA) to bridge backbone mac address (B-DA) mapping. I-Component Configuration: The two components are defined in the form of different bridge group and domain. B-MAC : All the bridges(routers) in backbone network are manually configured with a unique MAC address. These MAC addresses are used in forwarding base to identify which remote BEB should customer traffic be forwarded to. B-SA : B-DA : Denotes backbone MAC address of source bridge. Denotes backbone MAC address of destination bridge. BEB : Backbone edge bridge is the router that faces customer edge node. BCB : Backbone core bridge is transit node in provider's core network that switches frame towards destination. B-VID : I-SID : B-Tag : Vlan that carries PBB encapsulated customer traffic within core. Represents a unique service identifier associated with service instances. Contains backbone vlan(b-vlan) id information. I-Tag : Contains I-SID value and helps destination BEB router to determine which I-Component or service instance should the traffic be forwarded to. S-VID : Vlan that receives customer traffic and is called Service Vlan identifier(s-vid). C-VID : Vlan tag received in customer's frame. This remains intact while it encapsulated and transported across provider network. C-SA : C-DA : Original source MAC address of customer's frame. Original destination MAC address of customer's frame. B-Component: This component is responsible for forwarding traffic in the core network. It maintains a database of B-MACs and the interfaces they are learnt from. This information is used by forwarding engine to select an egress path for outgoing traffic to other remote BEBs. B-Component Configuration: B-MAC : All the bridges(routers) in backbone network are manually configured with a unique MAC address. These MAC addresses are used in forwarding base to identify which remote BEB should customer traffic be forwarded to. B-SA : B-DA : Denotes backbone MAC address of source bridge. Denotes backbone MAC address of destination bridge.

4 BEB : Backbone edge bridge is the router that faces customer edge node. BCB : Backbone core bridge is transit node in provider's core network that switches frame towards destination. B-VID : I-SID : B-Tag : Vlan that carries PBB encapsulated customer traffic within core. Represents a unique service identifier associated with service instances. Contains backbone vlan(b-vlan) id information. I-Tag : Contains I-SID value and helps destination BEB router to determine which I-Component or service instance should the traffic be forwarded to. S-VID : Vlan that receives customer traffic and is called Service Vlan identifier(s-vid). C-VID : Vlan tag received in customer's frame. This remains intact while it encapsulated and transported across provider network. C-SA : C-DA : Original source MAC address of customer's frame. Original destination MAC address of customer's frame. B-MAC configuration: Every router in PBB environment is identified by a unique MAC address. These backbone MAC addresses are used in 802.1ah encapsulations to forward traffic in B-VID. B-MAC : All the bridges(routers) in backbone network are manually configured with a unique MAC address. These MAC addresses are used in forwarding base to identify which remote BEB should customer traffic be forwarded to. B-SA : B-DA : Denotes backbone MAC address of source bridge. Denotes backbone MAC address of destination bridge. BEB : Backbone edge bridge is the router that faces customer edge node. BCB : Backbone core bridge is transit node in provider's core network that switches frame towards destination. B-VID : I-SID : B-Tag : Vlan that carries PBB encapsulated customer traffic within core. Represents a unique service identifier associated with service instances. Contains backbone vlan(b-vlan) id information. I-Tag : Contains I-SID value and helps destination BEB router to determine which I-Component or service instance should the traffic be forwarded to. S-VID : Vlan that receives customer traffic and is called Service Vlan identifier(s-vid). C-VID : Vlan tag received in customer's frame. This remains intact while it encapsulated and transported across provider network. C-SA : C-DA : Original source MAC address of customer's frame. Original destination MAC address of customer's frame.

5 Layer 2 loop avoidance protocol The two components of PBB receive customer traffic and encapsulate it in 802.1ah. This encapsulate frame uses backbone vlan to reach its destination. Which backbone vlan will be used to forward the traffic is decided by the B-VID value configured in B-Component bridge-domain. All layer 2 networks are prone to loops and hence provider s core requires loop avoidance protocols to check this. This scenario will utilize Multi Spanning Tree(MST) 802.1ah encapsulation The below picture describes the two components present on a BEB router. It shows the headers that are imposed on the customer traffic. Original customer traffic received with 802.1q tag is further imposed with 802.1ad and 802.1ah encapsulations before it is finally set into core network for forwarding. Configure Network Diagram Diag 1

6 Diag. 2 Configurations PBB requires both 'I' and 'B' component to be configured on BEB (customer facing) nodes. BCB (core router) that does not connect to any customer end router only requires B component. PBB Configuration // Below is BEB-1 configuration. Similar configuration applies to other BEBs. // B-MAC Configuration pbb backbone-source-mac 000a //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/ pbb edge i-sid 5554 core-bridge B-Comp-Dmn

7 //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether pbb core rewrite ingress tag push dot1ad 1506 symmetric Likewise BCB-1, BEB-2, BCB-2 also uses similar structure of configuration. MST Configuration: Below is a structure of MST configuration used on all BEBs & BCBs. In this test scenario, B-VID falls in instance 1 of all the four routers. MST provides a loop free layer 2 path between core and edge routers. Node required to be root bridge needs to be set with lower priority. // Below is BEB-1 configuration. Similar configuration applies to other BEBs. // B-MAC Configuration pbb backbone-source-mac 000a //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/ pbb edge i-sid 5554 core-bridge B-Comp-Dmn //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether2.1506

8 pbb core rewrite ingress tag push dot1ad 1506 symmetric How PBB works? Unicast Traffic Forwarding This scenario discusses the case where traffic received from customer is destined to a unicast destination MAC address. Below is the profile of traffic considered for this scenario. Encapsulation at source (BEB-1) Table 1 1. Customer Edge (CE) node forwards the traffic towards BEB-1. This traffic has source and destination MAC addresses as and respectively.

9 2. Traffic is received in Vlan ID 554 (S-VID) on interface GigabitEthernet0/0/0/ which is a part of I-Comp-Dmn. 3. The I-Component of PBB receives this traffic and looks up forwarding base mapping for customer's destination MAC address // Below is BEB-1 configuration. Similar configuration applies to other BEBs. // B-MAC Configuration pbb backbone-source-mac 000a //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/ pbb edge i-sid 5554 core-bridge B-Comp-Dmn //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether pbb core rewrite ingress tag push dot1ad 1506 symmetric 4. I-Component has an entry for destination MAC address and it is found to be mapped to ' backbone address a '. This lookup provides the necessary B-MAC (backbone MAC) needed to build the frame. 5. I-Component encapsulates customer frame with necessary fields like I-SID, B-SA, B-DA, S- VID etc. and passes it down to B-Component for forwarding. 6. B-Component performs a lookup for B-DA and determines the egress interface to forward traffic. // Below is BEB-1 configuration. Similar configuration applies to other BEBs.

10 // B-MAC Configuration pbb backbone-source-mac 000a //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/ pbb edge i-sid 5554 core-bridge B-Comp-Dmn //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether pbb core rewrite ingress tag push dot1ad 1506 symmetric 7. Destination B-MAC address 'a ' has a loop free path via BE which is used to set traffic into core network. Forwarding traffic in core (BCB-1) 1. Transit node BCB-1 receives 802.1ah encapsulated frame in its B-Component based on B- VID It performs the lookup and switches the traffic forward via interface BE // Below is BEB-1 configuration. Similar configuration applies to other BEBs. // B-MAC Configuration pbb backbone-source-mac 000a

11 //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/ pbb edge i-sid 5554 core-bridge B-Comp-Dmn //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether pbb core rewrite ingress tag push dot1ad 1506 symmetric Decapsulation at destination(beb-2) 1. Destination BEB-2 receives the traffic. It performs a lookup based on I-SID to determine associated I-Component/service instance. In this case, lookup provides with 'I-Comp-Dmn'. The 802.1ah header is then stripped and traffic is sent to associated service instance. 2. A MAC lookup for customer s destination address is done to determine the attachment circuit this frame needs to be sent out from. In this case, traffic is forward to customer CE via attachment circuit 'Gi0/0/0/12.554'. // Below is BEB-1 configuration. Similar configuration applies to other BEBs. // B-MAC Configuration pbb backbone-source-mac 000a //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/12.554

12 pbb edge i-sid 5554 core-bridge B-Comp-Dmn //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether pbb core rewrite ingress tag push dot1ad 1506 symmetric 802.1ah Encapsulated Packet View (Unicast traffic) Below is a packet level view of encapsulated customer frame. It has same values/profiles as listed above in Table 1. Every PBB packet is an encapsulated combination of 802.1q, 802.1ah and 802.1ad. These ether-types can be seen in packet HEX dump. 0x88a ad 0x88e ah 0x q Frame 1: 512 bytes on wire (4096 bits), 512 bytes captured (4096 bits) // Source and destination backbone MACs Ethernet II, Src: CeragonN_00:00:01 (00:0a:25:00:00:01), Dst: a0:00:75:00:00:01 (a0:00:75:00:00:01) // MAC addresses in original customer frame are intact in encapsulation. IEEE 802.1ah, B-VID: 1506, I-SID: 5554, C-Src: 00:00:00_00:11:11 (00:00:00:00:11:11), C-Dst: 00:00:00_00:22:22 (00:00:00:00:22:22) B-Tag, B-VID: = Priority: = DEI: = ID: 1506 I-Tag, I-SID: 5554 C-Destination: 00:00:00_00:22:22 (00:00:00:00:22:22) C-Source: 00:00:00_00:11:11 (00:00:00:00:11:11) Type: 802.1Q Virtual LAN (0x8100) // S-VID 802.1Q Virtual LAN, PRI: 0, CFI: 0, ID: = Priority: Best Effort (default) (0) = CFI: Canonical (0) = ID: 554

13 Type: IPv4 (0x0800) //Payload Internet Protocol Version 4, Src: , Dst: Internet Control Message Protocol Unknown unicast, multicast & broadcast Traffic Forwarding Above scenario described a case where I-Comp-Dmn bridge domain already had an S-DA to B- DA mapping. Therefore, router already knew which remote BEB to send next frame to before even it arrived. Mac Address Type Learned from/filtered on LC learned Resync Age/Last Change Mapped to dynamic Gi0/0/0/ /0/CPU0 29 Nov 11:16:11 N/A dynamic BD id: 24 0/0/CPU0 29 Nov 11:18:41 a Customer traffic can be multicast, broadcast or unknown unicast. Destination MAC address of such a traffic is not mapped to any particular remote BEB and hence sender/encapsulating BEB does not know which remote BEB to send this traffic to. This example uses broadcast traffic in the form of ARP to explain how PBB handles such traffic. For this case, two customer host machines are considered to have newly joined network in same broadcast domain on different BEBs. Before these two machines begin to send any packets, they need to send a broadcast ARP request at destination MAC address ffff.ffff.ffff to learn each other's MAC addresses. When source encapsulating BEB receives an ARP request, it determines by looking at the destination MAC address of received frame that it is broadcast traffic. A special group MAC is used for the backbone destination MAC (B-DA) when handling an unknown unicast, multicast or broadcast frame. This backbone group MAC is derived from the I- service instance identifier (ISID) using following rule.

14 The ARP request is received by ingress BEB, which encapsulates it in an 802.1ah frame with special B-DA derived as explained above. This frame is then received by core routers (BCBs). Core BCBs forward this frame to all BEBs using same B-VID (1506). When this encapsulated frame is received by remote BEBs, they check the I-SID to determine asociated service instance corresponding to it. Once I-Component (or bridge domain associated with I-SID) is identified, a look up is donw for customer's MAC address to determine the attachment circuit to forward the traffic out. In below scenario, host is behind BEB-4 and it responds with an ARP reply. Other network devices behind BEB-2 and BEB-3 receive ARP request and ignore.

15 802.1ah Encapsulated Packet View (Broadcast traffic) Below is a packet level view of broadcast traffic from CE getting encapsulated using special B-DA adress. Frame 1: 256 bytes on wire (2048 bits), 256 bytes captured (2048 bits) // Use of special derived B-DA Ethernet II, Src: CeragonN_00:00:01 (00:0a:25:00:00:01), Dst: Lan/ManS_00:15:b2 (01:1e:83:00:15:b2) Destination: Lan/ManS_00:15:b2 (01:1e:83:00:15:b2) Source: CeragonN_00:00:01 (00:0a:25:00:00:01) Type: 802.1ad Provider Bridge (Q-in-Q) (0x88a8) IEEE 802.1ah, B-VID: 1506, I-SID: 5554, C-Src: 00:00:00_00:11:11 (00:00:00:00:11:11), C-Dst: Broadcast (ff:ff:ff:ff:ff:ff) B-Tag, B-VID: = Priority: = DEI: = ID: 1506 I-Tag, I-SID: 5554 C-Destination: Broadcast (ff:ff:ff:ff:ff:ff) C-Source: 00:00:00_00:11:11 (00:00:00:00:11:11) Type: 802.1Q Virtual LAN (0x8100) 802.1Q Virtual LAN, PRI: 0, CFI: 0, ID: 554

16 Address Resolution Protocol (request) Hardware type: Ethernet (1) Protocol type: IPv4 (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (1) Sender MAC address: 00:00:00_00:11:11 (00:00:00:00:11:11) Sender IP address: Target MAC address: 00:00:00_00:12:34 (00:00:00:00:12:34) Target IP address: Verify To verify PBB, check participating components i.e. MST, I-Component & B-Component. 1. Status of bridge domains and attachment circuits can be determied using following commands on all the nodes in path. Below verification uses BEB-1 as an example. RP/0/RSP0/CPU0:BEB-1#show bridge group I-Comp-Grp bd-name I-Comp-Dmn Legend: pp = Partially Programmed. Bridge group: I-Comp-Grp, bridge-domain: I-Comp-Dmn, id: 17, state: up, ShgId: 0, MSTi: 0 Type: pbb-edge, I-SID: 5554 Aging: 300 s, MAC limit: 150, Action: limit, no-flood, Notification: syslog, trap Filter MAC addresses: 0 ACs: 1 (1 up), VFIs: 0, PWs: 0 (0 up), PBBs: 1 (1 up), VNIs: 0 (0 up) List of PBBs: PBB Edge, state: up, Static MAC addresses: 0 List of ACs: Gi0/0/0/12.554, state: up, Static MAC addresses: 0 List of Access PWs: List of VFIs: 2. Verify if the customer destination MAC address is learnt in I-Component (I-Comp-Dmn) using following command. RP/0/RSP0/CPU0:BEB-1#show bridge group I-Comp-Grp bd-name I-Comp-Dmn Legend: pp = Partially Programmed. Bridge group: I-Comp-Grp, bridge-domain: I-Comp-Dmn, id: 17, state: up, ShgId: 0, MSTi: 0 Type: pbb-edge, I-SID: 5554 Aging: 300 s, MAC limit: 150, Action: limit, no-flood, Notification: syslog, trap Filter MAC addresses: 0 ACs: 1 (1 up), VFIs: 0, PWs: 0 (0 up), PBBs: 1 (1 up), VNIs: 0 (0 up) List of PBBs: PBB Edge, state: up, Static MAC addresses: 0 List of ACs: Gi0/0/0/12.554, state: up, Static MAC addresses: 0 List of Access PWs: List of VFIs: 3. Verify if B-Component has forwarding information in its databse for B-DA. RP/0/RSP0/CPU0:BEB-1#show bridge group I-Comp-Grp bd-name I-Comp-Dmn Legend: pp = Partially Programmed.

17 Bridge group: I-Comp-Grp, bridge-domain: I-Comp-Dmn, id: 17, state: up, ShgId: 0, MSTi: 0 Type: pbb-edge, I-SID: 5554 Aging: 300 s, MAC limit: 150, Action: limit, no-flood, Notification: syslog, trap Filter MAC addresses: 0 ACs: 1 (1 up), VFIs: 0, PWs: 0 (0 up), PBBs: 1 (1 up), VNIs: 0 (0 up) List of PBBs: PBB Edge, state: up, Static MAC addresses: 0 List of ACs: Gi0/0/0/12.554, state: up, Static MAC addresses: 0 List of Access PWs: List of VFIs: 4. Verify if MST in the core layer 2 network is stable and confirm there is a loop free path to reach destination B-DA on nodes in path.

Implementing IEEE 802.1ah Provider Backbone Bridge

Implementing IEEE 802.1ah Provider Backbone Bridge Implementing IEEE 802.1ah Provider Backbone Bridge This module provides conceptual and configuration information for IEEE 802.1ah Provider Backbone Bridge on Cisco ASR 9000 Series Routers. The IEEE 802.1ah

More information

Configuration and Management of Networks. Pedro Amaral

Configuration and Management of Networks. Pedro Amaral Configuration and Management of Networks Pedro Amaral 2012 Service Provider Networks Carrier grade networks that carry customers traffic: Triple play residential customers Voice High Speed Internet Broadcast

More information

IEEE 802.1ah on Provider Backbone Bridges

IEEE 802.1ah on Provider Backbone Bridges IEEE 802.1ah on Provider Backbone Bridges First Published: November 25, 2009 Last Updated: February 8, 2011 The IEEE 802.1ah on Provider Backbone Bridges feature enables MAC-in-MAC tunneling on Ethernet

More information

Configure Virtual LANs in Layer 2 VPNs

Configure Virtual LANs in Layer 2 VPNs The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services to geographically disparate customer sites. A virtual local area network (VLAN) is a group of

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

Configure Multipoint Layer 2 Services

Configure Multipoint Layer 2 Services This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services, also called Virtual Private LAN Services (VPLS). Note VPLS supports Layer 2 VPN technology and

More information

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Ethernet virtual circuit (EVC) infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernet

More information

Ethernet Virtual Connections Configuration

Ethernet Virtual Connections Configuration An Ethernet Virtual Connection (EVC) is defined by the Metro-Ethernet Forum (MEF) as an association between two or more user network interfaces that identifies a point-to-point or multipoint-to-multipoint

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2

More information

Deploying Carrier Ethernet Features on Cisco ASR 9000

Deploying Carrier Ethernet Features on Cisco ASR 9000 Deploying Carrier Ethernet Features on Cisco ASR 9000 Vinod Kumar Balasubramanyam (vinbalas@cisco.com) Technical Marketing Engineer Agenda Carrier Ethernet Overview Cisco ASR 9000 Overview EFP Overview

More information

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information

Deploying Carrier Ethernet Features on Cisco ASR 9000 BRKSPG-2202

Deploying Carrier Ethernet Features on Cisco ASR 9000 BRKSPG-2202 Deploying Carrier Ethernet Features on Cisco ASR 9000 BRKSPG-2202 Agenda Carrier Ethernet Overview Cisco ASR 9000 Overview EFP Overview and Configurations Ethernet Services Overview, Configurations and

More information

Cisco CSR 1000V VxLAN Support 2

Cisco CSR 1000V VxLAN Support 2 Cisco CSR 1000V VxLAN Support Cisco CSR 1000V VxLAN Support 2 Finding Feature Information 2 Introduction 2 Prerequisites for Cisco CSR 1000V VxLAN Support 2 Configuring the Cisco CSR 1000V as a VxLAN Layer

More information

Lesson 9 OpenFlow. Objectives :

Lesson 9 OpenFlow. Objectives : 1 Lesson 9 Objectives : is new technology developed in 2004 which introduce Flow for D-plane. The Flow can be defined any combinations of Source/Destination MAC, VLAN Tag, IP address or port number etc.

More information

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.

Higher scalability to address more Layer 2 segments: up to 16 million VXLAN segments. This chapter tells how to configure Virtual extensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. About VXLAN Encapsulation

More information

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling

More information

Contents. EVPN overview 1

Contents. EVPN overview 1 Contents EVPN overview 1 EVPN network model 1 MP-BGP extension for EVPN 2 Configuration automation 3 Assignment of traffic to VXLANs 3 Traffic from the local site to a remote site 3 Traffic from a remote

More information

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling CHAPTER 14 Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling With Release 12.1(13)E and later, the Catalyst 6500 series switches support IEEE 802.1Q tunneling and Layer 2 protocol tunneling.

More information

Point-to-Multipoint and Multipoint-to-Multipoint Services on PBB-TE System

Point-to-Multipoint and Multipoint-to-Multipoint Services on PBB-TE System Point-to-Multipoint and Multipoint-to-Multipoint Services on PBB-TE System Wonkyoung Lee*, Chang-Ho Choi*, Sun-Me Kim* * Optical Internet Research Department, Electronics and Telecommunications Research

More information

H3C S10500 Attack Protection Configuration Examples

H3C S10500 Attack Protection Configuration Examples H3C S10500 Attack Protection Configuration Examples Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any

More information

Private Hosts (Using PACLs)

Private Hosts (Using PACLs) CHAPTER 35 This chapter describes the Private Hosts feature, which is being introduced for the Cisco 7600 series router in Cisco IOS Release 12.2SRB. This chapter contains the following sections: Overview,

More information

Configuring Private Hosts

Configuring Private Hosts CHAPTER 25 This chapter describes how to configure the private hosts feature in Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges

More information

Implementing VXLAN in DataCenter

Implementing VXLAN in DataCenter Implementing VXLAN in DataCenter LTRDCT-1223 Lilian Quan Technical Marketing Engineering, INSBU Erum Frahim Technical Leader, ecats John Weston Technical Leader, ecats Why Overlays? Robust Underlay/Fabric

More information

Configuring IEEE 802.3ad LACP EtherChannels on the Cisco MWR 2941

Configuring IEEE 802.3ad LACP EtherChannels on the Cisco MWR 2941 29 CHAPTER Configuring IEEE 802.3ad LACP EtherChannels on the Cisco MWR 2941 Cisco MWR 2941 Release 3.5.1 and later supports IEEE 802.3ad Link Aggregation Control Protocol (LACP) EtherChannels. Note The

More information

Carrier Ethernet Evolution

Carrier Ethernet Evolution Carrier Ethernet Evolution Next phase of carrier-class Ethernet services wave Levente Laposi, IP Division Regional Support Centre October 2008 Agenda 1. Introduction 2. Understanding P 3. P-VPLS The next

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Thursday, Nov 1 st Homework #4 Due Tuesday, Nov 6 th Project #2 Due 2 IPv4 addresses are usually displayed

More information

Configuring Routed Pseudowire and VPLS

Configuring Routed Pseudowire and VPLS Routed Pseudowire and VPLS feature routes Layer 3 traffic and Layer 2 frames for pseudowire connections between provider edge (PE) devices using Virtual Private LAN Services (VPLS) multipoint PE. Prerequisites

More information

IP SLA Service Performance Testing

IP SLA Service Performance Testing This module describes how to configure the ITU-T Y.1564 Ethernet service performance test methodology that measures the ability of a network device to enable movement of traffic at the configured data

More information

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note White Paper Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services Introduction and Application Note Last Updated: 5/2014 Ethernet VPN (EVPN)

More information

Internet Engineering Task Force (IETF) ISSN: N. Bitar, Ed. Verizon November 2013

Internet Engineering Task Force (IETF) ISSN: N. Bitar, Ed. Verizon November 2013 Internet Engineering Task Force (IETF) Request for Comments: 7041 Category: Informational ISSN: 2070-1721 F. Balus, Ed. Alcatel-Lucent A. Sajassi, Ed. Cisco N. Bitar, Ed. Verizon November 2013 Extensions

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling 9 CHAPTER Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the

More information

Understanding Issues Related to Inter VLAN Bridging

Understanding Issues Related to Inter VLAN Bridging Understanding Issues Related to Inter VLAN Bridging Document ID: 11072 Contents Introduction Prerequisites Requirements Components Used Conventions Spanning Tree Topology Concerns Recommended Use of Hierarchical

More information

Configuring BPDU tunneling

Configuring BPDU tunneling Contents Configuring BPDU tunneling 1 Introduction to BPDU tunneling 1 Background 1 BPDU Tunneling implementation 2 Configuring BPDU tunneling 3 Configuration prerequisites 3 Enabling BPDU tunneling for

More information

DD2490 p Bridging, spanning tree and related issues. Olof Hagsand KTH/CSC

DD2490 p Bridging, spanning tree and related issues. Olof Hagsand KTH/CSC DD490 p4 009 Bridging, spanning tree and related issues Olof Hagsand KTH/CSC Literature Radia Pearlman Interconnections Section 3 (Handouts) Building a network: routing or bridging? Scaling differences:

More information

Configuring Switched Port Analyzer

Configuring Switched Port Analyzer This document describes how to configure local Switched Port Analyzer (SPAN) and remote SPAN (RSPAN) on the router. Finding Feature Information, page 1 Prerequisites for Configuring Local Span and RSPAN,

More information

HPE FlexFabric 7900 Switch Series

HPE FlexFabric 7900 Switch Series HPE FlexFabric 7900 Switch Series VXLAN Configuration Guide Part number: 5998-8254R Software version: Release 213x Document version: 6W101-20151113 Copyright 2015 Hewlett Packard Enterprise Development

More information

Configuring SPAN. Finding Feature Information. About SPAN. SPAN Sources

Configuring SPAN. Finding Feature Information. About SPAN. SPAN Sources This chapter describes how to configure an Ethernet switched port analyzer (SPAN) to analyze traffic between ports on Cisco NX-OS devices. Finding Feature Information, on page 1 About SPAN, on page 1 Licensing

More information

Table of Contents 1 VLAN Configuration 1-1

Table of Contents 1 VLAN Configuration 1-1 Table of Contents 1 VLAN Configuration 1-1 Overview 1-1 Introduction to VLAN 1-1 VLAN Fundamentals 1-2 Types of VLAN 1-3 Introduction to Port-Based VLAN 1-3 Configuring a VLAN 1-4 Configuration Task List

More information

Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling

Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling CHAPTER 8 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the same security,

More information

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ECPE / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Course Organization Top-Down! Starting with Applications / App programming Then Transport Layer (TCP/UDP) Then

More information

Configuring SPAN. About SPAN. SPAN Sources

Configuring SPAN. About SPAN. SPAN Sources This chapter describes how to configure an Ethernet switched port analyzer (SPAN) to analyze traffic between ports on Cisco NX-OS devices. This chapter contains the following sections: About SPAN, page

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

Deploying Carrier Ethernet Services on Cisco ASR 9000 Vinod Kumar Balasubramanyam Technical Marketing Engineer BRKSPG-2202

Deploying Carrier Ethernet Services on Cisco ASR 9000 Vinod Kumar Balasubramanyam Technical Marketing Engineer BRKSPG-2202 Deploying Carrier Ethernet Services on Cisco ASR 9000 Vinod Kumar Balasubramanyam Technical Marketing Engineer BRKSPG-2202 Agenda Carrier Ethernet Overview Cisco ASR 9000 A Quick Overview EFP Overview

More information

Configuring Traffic Mirroring

Configuring Traffic Mirroring This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release

More information

Configuring Traffic Mirroring

Configuring Traffic Mirroring This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release

More information

Implementing Virtual Private LAN Services

Implementing Virtual Private LAN Services Implementing Virtual Private LAN Services This module provides the conceptual and configuration infmation f Virtual Private LAN Services (VPLS) on Cisco IOS XR software. VPLS suppts Layer 2 VPN technology

More information

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections:

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections: This chapter contains the following sections: Information About sflow, page 1 Licensing Requirements, page 2 Prerequisites, page 2 Guidelines and Limitations for sflow, page 2 Default Settings for sflow,

More information

VPLS, PPB, EVPN and VxLAN Diagrams

VPLS, PPB, EVPN and VxLAN Diagrams VLS, B, EVN and VxLAN Diagrams Contents 1. VLS Signalling: An overview of how VLS is signalled to create the pseudowires and how the different labels are chosen. This based on the following document: VLS

More information

Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0

Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0 Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0 First Published: 2017-06-22 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

HPE FlexFabric 5940 Switch Series

HPE FlexFabric 5940 Switch Series HPE FlexFabric 5940 Switch Series EVPN Configuration Guide Part number: 5200-2002b Software version: Release 25xx Document version: 6W102-20170830 Copyright 2017 Hewlett Packard Enterprise Development

More information

Intended status: Standards Track. Cisco Systems October 22, 2018

Intended status: Standards Track. Cisco Systems October 22, 2018 BESS WorkGroup Internet-Draft Intended status: Standards Track Expires: April 25, 2019 Ali. Sajassi Mankamana. Mishra Samir. Thoria Patrice. Brissette Cisco Systems October 22, 2018 AC-Aware Bundling Service

More information

Implementing IP in IP Tunnel

Implementing IP in IP Tunnel This chapter module provides conceptual and configuration information for IP in IP tunnels on Cisco ASR 9000 Series Router. Note For a complete description of the IP in IP tunnel commands listed in this

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 1 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Information About Protected Ports, page

More information

Configuring MLD Snooping

Configuring MLD Snooping This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 6 Displaying

More information

Chapter 4 Configuring Switching

Chapter 4 Configuring Switching Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under

More information

IEEE 802.1ah Provider Backbone Bridging

IEEE 802.1ah Provider Backbone Bridging IEEE 802.1ah Provider Backbone Bridging In This Chapter This chapter provides information about Provider Backbone Bridging (PBB), process overview, and implementation notes. Topics in this chapter include:

More information

Bridging and Switching. Karst Koymans. Monday, February 17, 2014

Bridging and Switching. Karst Koymans. Monday, February 17, 2014 .. Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 3.7, 2014/02/19 19:50:51) Monday, February 17, 2014 Karst Koymans (UvA) Layer 2 Monday, February 17,

More information

IP SLA Service Performance Testing

IP SLA Service Performance Testing This module describes how to configure the ITU-T Y.1564 Ethernet service performance test methodology that measures the ability of a network device to enable movement of traffic at the configured data

More information

Configuring MLD Snooping

Configuring MLD Snooping This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 5 Displaying

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN 41 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network

More information

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Finding Feature Information, page 1 Configuring VPLS, page 1 Configuring VPLS BGP-based Autodiscovery, page 17 Finding Feature

More information

Layer 2 Access Control Lists on EVCs

Layer 2 Access Control Lists on EVCs The ability to filter packets in a modular and scalable way is important for both network security and network management. Access Control Lists (ACLs) provide the capability to filter packets at a fine

More information

VXLAN Deployment Use Cases and Best Practices

VXLAN Deployment Use Cases and Best Practices VXLAN Deployment Use Cases and Best Practices Azeem Suleman Solutions Architect Cisco Advanced Services Contributions Thanks to the team: Abhishek Saxena Mehak Mahajan Lilian Quan Bradley Wong Mike Herbert

More information

Configuring EtherChannels

Configuring EtherChannels This chapter describes how to configure EtherChannels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of EtherChannels in Cisco NX-OS. It contains the following

More information

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+ Using NX-OS Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN 34 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network

More information

Configuring IEEE 802.1Q Tunneling

Configuring IEEE 802.1Q Tunneling CHAPTER 26 This chapter describes how to configure IEEE 802.1Q tunneling in Cisco IOS Release 12.2SX. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS

More information

Transparent CFM. Information About Transparent CFM. EFP (Q-in-Q interfaces with dot1q or dot1ad C-UNI)

Transparent CFM. Information About Transparent CFM. EFP (Q-in-Q interfaces with dot1q or dot1ad C-UNI) CFM support on a customer VLAN (C-VLAN) allows a customer to provision maintenance intermediate points (MIPs) and Up maintenance endpoints (MEPs) on a C-VLAN component for EFP (Q-in-Q interfaces with dot1q

More information

Layer 2. Bridging and Switching. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.4, 2017/02/15 12:07:08)

Layer 2. Bridging and Switching. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.4, 2017/02/15 12:07:08) Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 16.4, 2017/02/15 12:07:08) Friday, February 17, 2017 Karst Koymans (UvA) Layer 2 Friday, February 17,

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control CHAPTER 22 This chapter describes how to configure the port-based traffic control features on the Cisco ME 3400 Ethernet Access switch. For complete syntax and usage information for the commands used in

More information

EVPN Overview. Cloud and services virtualization. Remove protocols and network simplification. Integration of L2 and L3 services over the same VPN

EVPN Overview. Cloud and services virtualization. Remove protocols and network simplification. Integration of L2 and L3 services over the same VPN Ethernet VPN (EVPN) is a next generation solution that provides Ethernet multipoint services over MPLS networks. EVPN operates in contrast to the existing Virtual Private LAN Service (VPLS) by enabling

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN Finding Feature Information, page 1 Prerequisites for SPAN and RSPAN, page 1 Restrictions for SPAN and RSPAN, page 2 Information About SPAN and RSPAN, page 3 How to Configure SPAN and RSPAN, page 14 Monitoring

More information

Improving resource utilization in Carrier Ethernet technologies

Improving resource utilization in Carrier Ethernet technologies Improving resource utilization in Carrier Ethernet technologies Luis Fernando Caro Perez Advisor: PhD. José Marzo Doctorate Program in Tecnologías de la Información Doctoral Thesis Broadband Communications

More information

Catalyst Switches for Microsoft Network Load Balancing Configuration Example

Catalyst Switches for Microsoft Network Load Balancing Configuration Example Catalyst Switches for Microsoft Network Load Balancing Configuration Example Document ID: 107995 Contributed by Shashank Singh, Cisco TAC Engineer. Dec 19, 2013 Contents Introduction Prerequisites Requirements

More information

Configuring Port Channels

Configuring Port Channels This chapter contains the following sections: Information About Port Channels, page 1, page 11 Verifying Port Channel Configuration, page 19 Triggering the Port Channel Membership Consistency Checker,

More information

Implementing Multiple Spanning Tree Protocol

Implementing Multiple Spanning Tree Protocol Implementing Multiple Spanning Tree Protocol This module provides conceptual and configuration information for Multiple Spanning Tree Protocol on Cisco ASR 9000 Series Routers. Multiple Spanning Tree Protocol

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN CHAPTER 32 This chapter describes how to configure Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 3750-X or 3560-X switch. Unless otherwise noted, the term switch refers to a Catalyst

More information

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV. 2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are

More information

Configuring EtherChannels

Configuring EtherChannels Configuring EtherChannels This chapter describes how to configure EtherChannels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of EtherChannels in Cisco

More information

Network Virtualization. Duane de Witt

Network Virtualization. Duane de Witt Network Virtualization Duane de Witt nv Edge System Overview System Deep Dive nv System Overview System Deep Dive NV EDGE SYSTEM OVERVIEW SUPERIOR, SIMPLE NETWORK DUAL-HOMING SOLUTION L3 Router dualhoming

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

E-VPN & PBB-EVPN: the Next Generation of MPLS-based L2VPN

E-VPN & PBB-EVPN: the Next Generation of MPLS-based L2VPN E-VPN & PBB-EVPN: the Next Generation of -based L2VPN Samer Salam Agenda Introduction Concepts BGP Routes and Attributes E-VPN PBB-EVPN PBB-EVPN IOS-XR Implementation Summary 3 Introduction Overview Core

More information

CMPE 150 Winter 2009

CMPE 150 Winter 2009 CMPE 150 Winter 2009 Lecture 9 February 3, 2009 P.E. Mantey CMPE 150 -- Introduction to Computer Networks Instructor: Patrick Mantey mantey@soe.ucsc.edu http://www.soe.ucsc.edu/~mantey/ / t / Office: Engr.

More information

Improving Bandwidth Efficiency When Bridging on RPR. November 2001

Improving Bandwidth Efficiency When Bridging on RPR. November 2001 Improving Bandwidth Efficiency When Bridging on RPR November 2001, Nortel Networks Anoop Ghanwani, Lantern Communications Raj Sharma, Luminous Robin Olsson, Vitesse CP Fu, NEC 11/1/01 Page 1 Components

More information

FSOS. Ethernet Configuration Guide

FSOS. Ethernet Configuration Guide FSOS Ethernet Configuration Guide Contents 1 Configuring Interface... 1 1.1 Overview...1 1.2 Configuring Interface State...1 1.2.1 Configurations...1 1.2.2 Validation...1 1.3 Configuring Interface Speed...

More information

Configuring MAC Address Tables

Configuring MAC Address Tables This chapter contains the following sections: Information About MAC Addresses, page 1 Configuring MAC Addresses, page 2 Configuring MAC Move Loop Detection, page 4 Verifying the MAC Address Configuration,

More information

EVC Command Reference

EVC Command Reference EVC Command Reference This chapter describes commands used to configure an Ethernet Virtual Circuit (EVC). bridge-domain, page 2 clear ethernet service instance, page 3 encapsulation, page 5 l2protocol,

More information

Multiprotocol Label Switching (MPLS)

Multiprotocol Label Switching (MPLS) 36 CHAPTER Prerequisites for MPLS, page 36-1 Restrictions for MPLS, page 36-1 Information About MPLS, page 36-2 Default Settings for MPLS, page 36-7 How to Configure MPLS Features, page 36-7 Configuration

More information

Implementing the ERSPAN Analytics Feature on Cisco Nexus 6000 Series and 5600 Platform Switches

Implementing the ERSPAN Analytics Feature on Cisco Nexus 6000 Series and 5600 Platform Switches White Paper Implementing the ERSPAN Analytics Feature on Cisco Nexus 6000 Series and 5600 Platform Switches White Paper October 2014 2014 Cisco and/or its affiliates. All rights reserved. This document

More information

Routing Between VLANs Overview

Routing Between VLANs Overview Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 2 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Finding Feature Information, page 9 Information

More information

802.1ah in NetherLight: An application proposal

802.1ah in NetherLight: An application proposal System and Network Engineering Research Project 1 Master of Science Program Academic year 2008 2009 802.1ah in NetherLight: An application proposal by Sevickson KWIDAMA sevickson.kwidama os3.nl UvA Supervisor

More information

What LinkSec Should Know About Bridges Norman Finn

What LinkSec Should Know About Bridges Norman Finn What LinkSec Should Know About Bridges Norman Finn What LinkSec Should Know About Bridges Rev. 2 Norman Finn, Cisco Systems IEEE 802 LinkSec SG 1/20 What Do Bridges Do? (1) A network of bridges emulates

More information

Lab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3

Lab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3 Lab 1: Static MPLS First lab gives a basic understanding of MPLS label swapping No signaling manually assign labels like static routing Understand configuration, forwarding tables, and debugging of MPLS

More information

2D1490 p Bridging, spanning tree and related issues. Olof Hagsand KTHNOC/NADA

2D1490 p Bridging, spanning tree and related issues. Olof Hagsand KTHNOC/NADA D490 p4 007 Bridging, spanning tree and related issues Olof Hagsand KTHNOC/NADA Literature Radia Pearlman Interconnections Section 3 (Handouts) Building a network: routing or bridging? Scaling differences:

More information