Understanding Basic 802.1ah Provider Backbone Bridge
|
|
- Rudolf Farmer
- 5 years ago
- Views:
Transcription
1 Understanding Basic 802.1ah Provider Backbone Bridge Contents Introduction Prerequisites Requirements Components Used IEEE 802.1ah Provider Backbone Bridging Overview Terminologies Used PBB Components Layer 2 loop avoidance protocol 802.1ah encapsulation Configure Network Diagram Configurations How PBB works? Unicast Traffic Forwarding 802.1ah Encapsulated Packet View (Unicast traffic) Unknown unicast, multicast & broadcast Traffic Forwarding 802.1ah Encapsulated Packet View (Broadcast traffic) Verify Introduction This document describes functioning of basic Provider Backbone Bridge technology (PBB). It uses Multi Spanning Tree (MST) in the core network for loop avoidance. Prerequisites Requirements Cisco recommends that you have basic knowledge of MST and VPLS (Virtual Private Lan Service). Components Used This document is not restricted to specific software and hardware versions. The information in this document was created using Aggregation Services Router 9000 (ASR9K) devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. IEEE 802.1ah Provider Backbone Bridging Overview
2 The Institute of Electrical and Electronics Engineers (IEEE) 802.1ah PBB feature encapsulates or decapsulates end-user traffic on a Backbone Edge Bridge (BEB) at the edge of the Provider Backbone Bridged Network (PBBN). PBB provides scalability to configure higher number of service instances in network. PBB encapsulates customer's network into 802.1ah headers. These encapsulated packets are exchanged using unique and manually configured backbone address in core network. This obviates the need for backbone core bridges to learn all MAC addresses of every customer and hence adding to scalability. In order to understand technology behavior, it is important to understand meaning of some terminologies that will be frequently used in this document. Terminologies Used This document will be frequently using some terminologies associated with PBB. These are listed below with brief explanation. B-MAC : All the bridges(routers) in backbone network are manually configured with a unique MAC address. These MAC addresses are used in forwarding base to identify which remote BEB should customer traffic be forwarded to. B-SA : B-DA : Denotes backbone MAC address of source bridge. Denotes backbone MAC address of destination bridge. BEB : Backbone edge bridge is the router that faces customer edge node. BCB : Backbone core bridge is transit node in provider's core network that switches frame towards destination. B-VID : I-SID : B-Tag : Vlan that carries PBB encapsulated customer traffic within core. Represents a unique service identifier associated with service instances. Contains backbone vlan(b-vlan) id information. I-Tag : Contains I-SID value and helps destination BEB router to determine which I-Component or service instance should the traffic be forwarded to. S-VID : Vlan that receives customer traffic and is called Service Vlan identifier(s-vid). C-VID : Vlan tag received in customer's frame. This remains intact while it encapsulated and transported across provider network. C-SA : C-DA : Original source MAC address of customer's frame. Original destination MAC address of customer's frame. Note: C-VID, C-SA and C-DA and payload that constitute customer frame os never changed in PBB network. PBB Components The IEEE 802.1ah provides a framework to interconnect several provider bridged networks, often called as PBNs. It provides means to scale the service Vlans in provider s network. PBB network comprises of two main components called as I-Component & B-Component.
3 I-Component: This component resides on BEB (Backbone Edge Nodes) routers and faces customer network. It is responsible for handling customer traffic and adding a PBB header to it. I- Component maintains important mapping information: - It maintains mapping between S-VID and I-SID - It maintains customer mac (C-DA) to bridge backbone mac address (B-DA) mapping. I-Component Configuration: The two components are defined in the form of different bridge group and domain. B-MAC : All the bridges(routers) in backbone network are manually configured with a unique MAC address. These MAC addresses are used in forwarding base to identify which remote BEB should customer traffic be forwarded to. B-SA : B-DA : Denotes backbone MAC address of source bridge. Denotes backbone MAC address of destination bridge. BEB : Backbone edge bridge is the router that faces customer edge node. BCB : Backbone core bridge is transit node in provider's core network that switches frame towards destination. B-VID : I-SID : B-Tag : Vlan that carries PBB encapsulated customer traffic within core. Represents a unique service identifier associated with service instances. Contains backbone vlan(b-vlan) id information. I-Tag : Contains I-SID value and helps destination BEB router to determine which I-Component or service instance should the traffic be forwarded to. S-VID : Vlan that receives customer traffic and is called Service Vlan identifier(s-vid). C-VID : Vlan tag received in customer's frame. This remains intact while it encapsulated and transported across provider network. C-SA : C-DA : Original source MAC address of customer's frame. Original destination MAC address of customer's frame. B-Component: This component is responsible for forwarding traffic in the core network. It maintains a database of B-MACs and the interfaces they are learnt from. This information is used by forwarding engine to select an egress path for outgoing traffic to other remote BEBs. B-Component Configuration: B-MAC : All the bridges(routers) in backbone network are manually configured with a unique MAC address. These MAC addresses are used in forwarding base to identify which remote BEB should customer traffic be forwarded to. B-SA : B-DA : Denotes backbone MAC address of source bridge. Denotes backbone MAC address of destination bridge.
4 BEB : Backbone edge bridge is the router that faces customer edge node. BCB : Backbone core bridge is transit node in provider's core network that switches frame towards destination. B-VID : I-SID : B-Tag : Vlan that carries PBB encapsulated customer traffic within core. Represents a unique service identifier associated with service instances. Contains backbone vlan(b-vlan) id information. I-Tag : Contains I-SID value and helps destination BEB router to determine which I-Component or service instance should the traffic be forwarded to. S-VID : Vlan that receives customer traffic and is called Service Vlan identifier(s-vid). C-VID : Vlan tag received in customer's frame. This remains intact while it encapsulated and transported across provider network. C-SA : C-DA : Original source MAC address of customer's frame. Original destination MAC address of customer's frame. B-MAC configuration: Every router in PBB environment is identified by a unique MAC address. These backbone MAC addresses are used in 802.1ah encapsulations to forward traffic in B-VID. B-MAC : All the bridges(routers) in backbone network are manually configured with a unique MAC address. These MAC addresses are used in forwarding base to identify which remote BEB should customer traffic be forwarded to. B-SA : B-DA : Denotes backbone MAC address of source bridge. Denotes backbone MAC address of destination bridge. BEB : Backbone edge bridge is the router that faces customer edge node. BCB : Backbone core bridge is transit node in provider's core network that switches frame towards destination. B-VID : I-SID : B-Tag : Vlan that carries PBB encapsulated customer traffic within core. Represents a unique service identifier associated with service instances. Contains backbone vlan(b-vlan) id information. I-Tag : Contains I-SID value and helps destination BEB router to determine which I-Component or service instance should the traffic be forwarded to. S-VID : Vlan that receives customer traffic and is called Service Vlan identifier(s-vid). C-VID : Vlan tag received in customer's frame. This remains intact while it encapsulated and transported across provider network. C-SA : C-DA : Original source MAC address of customer's frame. Original destination MAC address of customer's frame.
5 Layer 2 loop avoidance protocol The two components of PBB receive customer traffic and encapsulate it in 802.1ah. This encapsulate frame uses backbone vlan to reach its destination. Which backbone vlan will be used to forward the traffic is decided by the B-VID value configured in B-Component bridge-domain. All layer 2 networks are prone to loops and hence provider s core requires loop avoidance protocols to check this. This scenario will utilize Multi Spanning Tree(MST) 802.1ah encapsulation The below picture describes the two components present on a BEB router. It shows the headers that are imposed on the customer traffic. Original customer traffic received with 802.1q tag is further imposed with 802.1ad and 802.1ah encapsulations before it is finally set into core network for forwarding. Configure Network Diagram Diag 1
6 Diag. 2 Configurations PBB requires both 'I' and 'B' component to be configured on BEB (customer facing) nodes. BCB (core router) that does not connect to any customer end router only requires B component. PBB Configuration // Below is BEB-1 configuration. Similar configuration applies to other BEBs. // B-MAC Configuration pbb backbone-source-mac 000a //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/ pbb edge i-sid 5554 core-bridge B-Comp-Dmn
7 //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether pbb core rewrite ingress tag push dot1ad 1506 symmetric Likewise BCB-1, BEB-2, BCB-2 also uses similar structure of configuration. MST Configuration: Below is a structure of MST configuration used on all BEBs & BCBs. In this test scenario, B-VID falls in instance 1 of all the four routers. MST provides a loop free layer 2 path between core and edge routers. Node required to be root bridge needs to be set with lower priority. // Below is BEB-1 configuration. Similar configuration applies to other BEBs. // B-MAC Configuration pbb backbone-source-mac 000a //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/ pbb edge i-sid 5554 core-bridge B-Comp-Dmn //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether2.1506
8 pbb core rewrite ingress tag push dot1ad 1506 symmetric How PBB works? Unicast Traffic Forwarding This scenario discusses the case where traffic received from customer is destined to a unicast destination MAC address. Below is the profile of traffic considered for this scenario. Encapsulation at source (BEB-1) Table 1 1. Customer Edge (CE) node forwards the traffic towards BEB-1. This traffic has source and destination MAC addresses as and respectively.
9 2. Traffic is received in Vlan ID 554 (S-VID) on interface GigabitEthernet0/0/0/ which is a part of I-Comp-Dmn. 3. The I-Component of PBB receives this traffic and looks up forwarding base mapping for customer's destination MAC address // Below is BEB-1 configuration. Similar configuration applies to other BEBs. // B-MAC Configuration pbb backbone-source-mac 000a //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/ pbb edge i-sid 5554 core-bridge B-Comp-Dmn //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether pbb core rewrite ingress tag push dot1ad 1506 symmetric 4. I-Component has an entry for destination MAC address and it is found to be mapped to ' backbone address a '. This lookup provides the necessary B-MAC (backbone MAC) needed to build the frame. 5. I-Component encapsulates customer frame with necessary fields like I-SID, B-SA, B-DA, S- VID etc. and passes it down to B-Component for forwarding. 6. B-Component performs a lookup for B-DA and determines the egress interface to forward traffic. // Below is BEB-1 configuration. Similar configuration applies to other BEBs.
10 // B-MAC Configuration pbb backbone-source-mac 000a //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/ pbb edge i-sid 5554 core-bridge B-Comp-Dmn //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether pbb core rewrite ingress tag push dot1ad 1506 symmetric 7. Destination B-MAC address 'a ' has a loop free path via BE which is used to set traffic into core network. Forwarding traffic in core (BCB-1) 1. Transit node BCB-1 receives 802.1ah encapsulated frame in its B-Component based on B- VID It performs the lookup and switches the traffic forward via interface BE // Below is BEB-1 configuration. Similar configuration applies to other BEBs. // B-MAC Configuration pbb backbone-source-mac 000a
11 //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/ pbb edge i-sid 5554 core-bridge B-Comp-Dmn //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether pbb core rewrite ingress tag push dot1ad 1506 symmetric Decapsulation at destination(beb-2) 1. Destination BEB-2 receives the traffic. It performs a lookup based on I-SID to determine associated I-Component/service instance. In this case, lookup provides with 'I-Comp-Dmn'. The 802.1ah header is then stripped and traffic is sent to associated service instance. 2. A MAC lookup for customer s destination address is done to determine the attachment circuit this frame needs to be sent out from. In this case, traffic is forward to customer CE via attachment circuit 'Gi0/0/0/12.554'. // Below is BEB-1 configuration. Similar configuration applies to other BEBs. // B-MAC Configuration pbb backbone-source-mac 000a //I-Component Configuration bridge group I-Comp-Grp bridge-domain I-Comp-Dmn interface GigabitEthernet0/0/0/12.554
12 pbb edge i-sid 5554 core-bridge B-Comp-Dmn //B-Component Configuration bridge group B-Comp-Grp bridge-domain B-Comp-Dmn interface Bundle-Ether pbb core rewrite ingress tag push dot1ad 1506 symmetric 802.1ah Encapsulated Packet View (Unicast traffic) Below is a packet level view of encapsulated customer frame. It has same values/profiles as listed above in Table 1. Every PBB packet is an encapsulated combination of 802.1q, 802.1ah and 802.1ad. These ether-types can be seen in packet HEX dump. 0x88a ad 0x88e ah 0x q Frame 1: 512 bytes on wire (4096 bits), 512 bytes captured (4096 bits) // Source and destination backbone MACs Ethernet II, Src: CeragonN_00:00:01 (00:0a:25:00:00:01), Dst: a0:00:75:00:00:01 (a0:00:75:00:00:01) // MAC addresses in original customer frame are intact in encapsulation. IEEE 802.1ah, B-VID: 1506, I-SID: 5554, C-Src: 00:00:00_00:11:11 (00:00:00:00:11:11), C-Dst: 00:00:00_00:22:22 (00:00:00:00:22:22) B-Tag, B-VID: = Priority: = DEI: = ID: 1506 I-Tag, I-SID: 5554 C-Destination: 00:00:00_00:22:22 (00:00:00:00:22:22) C-Source: 00:00:00_00:11:11 (00:00:00:00:11:11) Type: 802.1Q Virtual LAN (0x8100) // S-VID 802.1Q Virtual LAN, PRI: 0, CFI: 0, ID: = Priority: Best Effort (default) (0) = CFI: Canonical (0) = ID: 554
13 Type: IPv4 (0x0800) //Payload Internet Protocol Version 4, Src: , Dst: Internet Control Message Protocol Unknown unicast, multicast & broadcast Traffic Forwarding Above scenario described a case where I-Comp-Dmn bridge domain already had an S-DA to B- DA mapping. Therefore, router already knew which remote BEB to send next frame to before even it arrived. Mac Address Type Learned from/filtered on LC learned Resync Age/Last Change Mapped to dynamic Gi0/0/0/ /0/CPU0 29 Nov 11:16:11 N/A dynamic BD id: 24 0/0/CPU0 29 Nov 11:18:41 a Customer traffic can be multicast, broadcast or unknown unicast. Destination MAC address of such a traffic is not mapped to any particular remote BEB and hence sender/encapsulating BEB does not know which remote BEB to send this traffic to. This example uses broadcast traffic in the form of ARP to explain how PBB handles such traffic. For this case, two customer host machines are considered to have newly joined network in same broadcast domain on different BEBs. Before these two machines begin to send any packets, they need to send a broadcast ARP request at destination MAC address ffff.ffff.ffff to learn each other's MAC addresses. When source encapsulating BEB receives an ARP request, it determines by looking at the destination MAC address of received frame that it is broadcast traffic. A special group MAC is used for the backbone destination MAC (B-DA) when handling an unknown unicast, multicast or broadcast frame. This backbone group MAC is derived from the I- service instance identifier (ISID) using following rule.
14 The ARP request is received by ingress BEB, which encapsulates it in an 802.1ah frame with special B-DA derived as explained above. This frame is then received by core routers (BCBs). Core BCBs forward this frame to all BEBs using same B-VID (1506). When this encapsulated frame is received by remote BEBs, they check the I-SID to determine asociated service instance corresponding to it. Once I-Component (or bridge domain associated with I-SID) is identified, a look up is donw for customer's MAC address to determine the attachment circuit to forward the traffic out. In below scenario, host is behind BEB-4 and it responds with an ARP reply. Other network devices behind BEB-2 and BEB-3 receive ARP request and ignore.
15 802.1ah Encapsulated Packet View (Broadcast traffic) Below is a packet level view of broadcast traffic from CE getting encapsulated using special B-DA adress. Frame 1: 256 bytes on wire (2048 bits), 256 bytes captured (2048 bits) // Use of special derived B-DA Ethernet II, Src: CeragonN_00:00:01 (00:0a:25:00:00:01), Dst: Lan/ManS_00:15:b2 (01:1e:83:00:15:b2) Destination: Lan/ManS_00:15:b2 (01:1e:83:00:15:b2) Source: CeragonN_00:00:01 (00:0a:25:00:00:01) Type: 802.1ad Provider Bridge (Q-in-Q) (0x88a8) IEEE 802.1ah, B-VID: 1506, I-SID: 5554, C-Src: 00:00:00_00:11:11 (00:00:00:00:11:11), C-Dst: Broadcast (ff:ff:ff:ff:ff:ff) B-Tag, B-VID: = Priority: = DEI: = ID: 1506 I-Tag, I-SID: 5554 C-Destination: Broadcast (ff:ff:ff:ff:ff:ff) C-Source: 00:00:00_00:11:11 (00:00:00:00:11:11) Type: 802.1Q Virtual LAN (0x8100) 802.1Q Virtual LAN, PRI: 0, CFI: 0, ID: 554
16 Address Resolution Protocol (request) Hardware type: Ethernet (1) Protocol type: IPv4 (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (1) Sender MAC address: 00:00:00_00:11:11 (00:00:00:00:11:11) Sender IP address: Target MAC address: 00:00:00_00:12:34 (00:00:00:00:12:34) Target IP address: Verify To verify PBB, check participating components i.e. MST, I-Component & B-Component. 1. Status of bridge domains and attachment circuits can be determied using following commands on all the nodes in path. Below verification uses BEB-1 as an example. RP/0/RSP0/CPU0:BEB-1#show bridge group I-Comp-Grp bd-name I-Comp-Dmn Legend: pp = Partially Programmed. Bridge group: I-Comp-Grp, bridge-domain: I-Comp-Dmn, id: 17, state: up, ShgId: 0, MSTi: 0 Type: pbb-edge, I-SID: 5554 Aging: 300 s, MAC limit: 150, Action: limit, no-flood, Notification: syslog, trap Filter MAC addresses: 0 ACs: 1 (1 up), VFIs: 0, PWs: 0 (0 up), PBBs: 1 (1 up), VNIs: 0 (0 up) List of PBBs: PBB Edge, state: up, Static MAC addresses: 0 List of ACs: Gi0/0/0/12.554, state: up, Static MAC addresses: 0 List of Access PWs: List of VFIs: 2. Verify if the customer destination MAC address is learnt in I-Component (I-Comp-Dmn) using following command. RP/0/RSP0/CPU0:BEB-1#show bridge group I-Comp-Grp bd-name I-Comp-Dmn Legend: pp = Partially Programmed. Bridge group: I-Comp-Grp, bridge-domain: I-Comp-Dmn, id: 17, state: up, ShgId: 0, MSTi: 0 Type: pbb-edge, I-SID: 5554 Aging: 300 s, MAC limit: 150, Action: limit, no-flood, Notification: syslog, trap Filter MAC addresses: 0 ACs: 1 (1 up), VFIs: 0, PWs: 0 (0 up), PBBs: 1 (1 up), VNIs: 0 (0 up) List of PBBs: PBB Edge, state: up, Static MAC addresses: 0 List of ACs: Gi0/0/0/12.554, state: up, Static MAC addresses: 0 List of Access PWs: List of VFIs: 3. Verify if B-Component has forwarding information in its databse for B-DA. RP/0/RSP0/CPU0:BEB-1#show bridge group I-Comp-Grp bd-name I-Comp-Dmn Legend: pp = Partially Programmed.
17 Bridge group: I-Comp-Grp, bridge-domain: I-Comp-Dmn, id: 17, state: up, ShgId: 0, MSTi: 0 Type: pbb-edge, I-SID: 5554 Aging: 300 s, MAC limit: 150, Action: limit, no-flood, Notification: syslog, trap Filter MAC addresses: 0 ACs: 1 (1 up), VFIs: 0, PWs: 0 (0 up), PBBs: 1 (1 up), VNIs: 0 (0 up) List of PBBs: PBB Edge, state: up, Static MAC addresses: 0 List of ACs: Gi0/0/0/12.554, state: up, Static MAC addresses: 0 List of Access PWs: List of VFIs: 4. Verify if MST in the core layer 2 network is stable and confirm there is a loop free path to reach destination B-DA on nodes in path.
Implementing IEEE 802.1ah Provider Backbone Bridge
Implementing IEEE 802.1ah Provider Backbone Bridge This module provides conceptual and configuration information for IEEE 802.1ah Provider Backbone Bridge on Cisco ASR 9000 Series Routers. The IEEE 802.1ah
More informationConfiguration and Management of Networks. Pedro Amaral
Configuration and Management of Networks Pedro Amaral 2012 Service Provider Networks Carrier grade networks that carry customers traffic: Triple play residential customers Voice High Speed Internet Broadcast
More informationIEEE 802.1ah on Provider Backbone Bridges
IEEE 802.1ah on Provider Backbone Bridges First Published: November 25, 2009 Last Updated: February 8, 2011 The IEEE 802.1ah on Provider Backbone Bridges feature enables MAC-in-MAC tunneling on Ethernet
More informationConfigure Virtual LANs in Layer 2 VPNs
The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services to geographically disparate customer sites. A virtual local area network (VLAN) is a group of
More informationConfiguring Virtual Private LAN Services
Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS
More informationConfigure Multipoint Layer 2 Services
This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services, also called Virtual Private LAN Services (VPLS). Note VPLS supports Layer 2 VPN technology and
More informationConfiguring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router
Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Ethernet virtual circuit (EVC) infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernet
More informationEthernet Virtual Connections Configuration
An Ethernet Virtual Connection (EVC) is defined by the Metro-Ethernet Forum (MEF) as an association between two or more user network interfaces that identifies a point-to-point or multipoint-to-multipoint
More informationLARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF
LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2
More informationDeploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000 Vinod Kumar Balasubramanyam (vinbalas@cisco.com) Technical Marketing Engineer Agenda Carrier Ethernet Overview Cisco ASR 9000 Overview EFP Overview
More informationImplementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN
This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing
More informationOverview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.
This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across
More informationDeploying Carrier Ethernet Features on Cisco ASR 9000 BRKSPG-2202
Deploying Carrier Ethernet Features on Cisco ASR 9000 BRKSPG-2202 Agenda Carrier Ethernet Overview Cisco ASR 9000 Overview EFP Overview and Configurations Ethernet Services Overview, Configurations and
More informationCisco CSR 1000V VxLAN Support 2
Cisco CSR 1000V VxLAN Support Cisco CSR 1000V VxLAN Support 2 Finding Feature Information 2 Introduction 2 Prerequisites for Cisco CSR 1000V VxLAN Support 2 Configuring the Cisco CSR 1000V as a VxLAN Layer
More informationLesson 9 OpenFlow. Objectives :
1 Lesson 9 Objectives : is new technology developed in 2004 which introduce Flow for D-plane. The Flow can be defined any combinations of Source/Destination MAC, VLAN Tag, IP address or port number etc.
More informationHigher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.
This chapter tells how to configure Virtual extensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. About VXLAN Encapsulation
More informationConfiguring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts
Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling
More informationContents. EVPN overview 1
Contents EVPN overview 1 EVPN network model 1 MP-BGP extension for EVPN 2 Configuration automation 3 Assignment of traffic to VXLANs 3 Traffic from the local site to a remote site 3 Traffic from a remote
More informationConfiguring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling
CHAPTER 14 Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling With Release 12.1(13)E and later, the Catalyst 6500 series switches support IEEE 802.1Q tunneling and Layer 2 protocol tunneling.
More informationPoint-to-Multipoint and Multipoint-to-Multipoint Services on PBB-TE System
Point-to-Multipoint and Multipoint-to-Multipoint Services on PBB-TE System Wonkyoung Lee*, Chang-Ho Choi*, Sun-Me Kim* * Optical Internet Research Department, Electronics and Telecommunications Research
More informationH3C S10500 Attack Protection Configuration Examples
H3C S10500 Attack Protection Configuration Examples Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any
More informationPrivate Hosts (Using PACLs)
CHAPTER 35 This chapter describes the Private Hosts feature, which is being introduced for the Cisco 7600 series router in Cisco IOS Release 12.2SRB. This chapter contains the following sections: Overview,
More informationConfiguring Private Hosts
CHAPTER 25 This chapter describes how to configure the private hosts feature in Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco
More informationDD2490 p Layer 2 networking. Olof Hagsand KTH CSC
DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges
More informationImplementing VXLAN in DataCenter
Implementing VXLAN in DataCenter LTRDCT-1223 Lilian Quan Technical Marketing Engineering, INSBU Erum Frahim Technical Leader, ecats John Weston Technical Leader, ecats Why Overlays? Robust Underlay/Fabric
More informationConfiguring IEEE 802.3ad LACP EtherChannels on the Cisco MWR 2941
29 CHAPTER Configuring IEEE 802.3ad LACP EtherChannels on the Cisco MWR 2941 Cisco MWR 2941 Release 3.5.1 and later supports IEEE 802.3ad Link Aggregation Control Protocol (LACP) EtherChannels. Note The
More informationCarrier Ethernet Evolution
Carrier Ethernet Evolution Next phase of carrier-class Ethernet services wave Levente Laposi, IP Division Regional Support Centre October 2008 Agenda 1. Introduction 2. Understanding P 3. P-VPLS The next
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Thursday, Nov 1 st Homework #4 Due Tuesday, Nov 6 th Project #2 Due 2 IPv4 addresses are usually displayed
More informationConfiguring Routed Pseudowire and VPLS
Routed Pseudowire and VPLS feature routes Layer 3 traffic and Layer 2 frames for pseudowire connections between provider edge (PE) devices using Virtual Private LAN Services (VPLS) multipoint PE. Prerequisites
More informationIP SLA Service Performance Testing
This module describes how to configure the ITU-T Y.1564 Ethernet service performance test methodology that measures the ability of a network device to enable movement of traffic at the configured data
More informationEthernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note
White Paper Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services Introduction and Application Note Last Updated: 5/2014 Ethernet VPN (EVPN)
More informationInternet Engineering Task Force (IETF) ISSN: N. Bitar, Ed. Verizon November 2013
Internet Engineering Task Force (IETF) Request for Comments: 7041 Category: Informational ISSN: 2070-1721 F. Balus, Ed. Alcatel-Lucent A. Sajassi, Ed. Cisco N. Bitar, Ed. Verizon November 2013 Extensions
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationConfiguring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling
9 CHAPTER Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the
More informationUnderstanding Issues Related to Inter VLAN Bridging
Understanding Issues Related to Inter VLAN Bridging Document ID: 11072 Contents Introduction Prerequisites Requirements Components Used Conventions Spanning Tree Topology Concerns Recommended Use of Hierarchical
More informationConfiguring BPDU tunneling
Contents Configuring BPDU tunneling 1 Introduction to BPDU tunneling 1 Background 1 BPDU Tunneling implementation 2 Configuring BPDU tunneling 3 Configuration prerequisites 3 Enabling BPDU tunneling for
More informationDD2490 p Bridging, spanning tree and related issues. Olof Hagsand KTH/CSC
DD490 p4 009 Bridging, spanning tree and related issues Olof Hagsand KTH/CSC Literature Radia Pearlman Interconnections Section 3 (Handouts) Building a network: routing or bridging? Scaling differences:
More informationConfiguring Switched Port Analyzer
This document describes how to configure local Switched Port Analyzer (SPAN) and remote SPAN (RSPAN) on the router. Finding Feature Information, page 1 Prerequisites for Configuring Local Span and RSPAN,
More informationHPE FlexFabric 7900 Switch Series
HPE FlexFabric 7900 Switch Series VXLAN Configuration Guide Part number: 5998-8254R Software version: Release 213x Document version: 6W101-20151113 Copyright 2015 Hewlett Packard Enterprise Development
More informationConfiguring SPAN. Finding Feature Information. About SPAN. SPAN Sources
This chapter describes how to configure an Ethernet switched port analyzer (SPAN) to analyze traffic between ports on Cisco NX-OS devices. Finding Feature Information, on page 1 About SPAN, on page 1 Licensing
More informationTable of Contents 1 VLAN Configuration 1-1
Table of Contents 1 VLAN Configuration 1-1 Overview 1-1 Introduction to VLAN 1-1 VLAN Fundamentals 1-2 Types of VLAN 1-3 Introduction to Port-Based VLAN 1-3 Configuring a VLAN 1-4 Configuration Task List
More informationConfiguring IEEE 802.1Q and Layer 2 Protocol Tunneling
CHAPTER 8 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the same security,
More informationECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ECPE / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Course Organization Top-Down! Starting with Applications / App programming Then Transport Layer (TCP/UDP) Then
More informationConfiguring SPAN. About SPAN. SPAN Sources
This chapter describes how to configure an Ethernet switched port analyzer (SPAN) to analyze traffic between ports on Cisco NX-OS devices. This chapter contains the following sections: About SPAN, page
More informationData Center Configuration. 1. Configuring VXLAN
Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2
More informationDeploying Carrier Ethernet Services on Cisco ASR 9000 Vinod Kumar Balasubramanyam Technical Marketing Engineer BRKSPG-2202
Deploying Carrier Ethernet Services on Cisco ASR 9000 Vinod Kumar Balasubramanyam Technical Marketing Engineer BRKSPG-2202 Agenda Carrier Ethernet Overview Cisco ASR 9000 A Quick Overview EFP Overview
More informationConfiguring Traffic Mirroring
This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release
More informationConfiguring Traffic Mirroring
This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release
More informationImplementing Virtual Private LAN Services
Implementing Virtual Private LAN Services This module provides the conceptual and configuration infmation f Virtual Private LAN Services (VPLS) on Cisco IOS XR software. VPLS suppts Layer 2 VPN technology
More informationConfiguring sflow. Information About sflow. sflow Agent. This chapter contains the following sections:
This chapter contains the following sections: Information About sflow, page 1 Licensing Requirements, page 2 Prerequisites, page 2 Guidelines and Limitations for sflow, page 2 Default Settings for sflow,
More informationVPLS, PPB, EVPN and VxLAN Diagrams
VLS, B, EVN and VxLAN Diagrams Contents 1. VLS Signalling: An overview of how VLS is signalled to create the pseudowires and how the different labels are chosen. This based on the following document: VLS
More informationCisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0
Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0 First Published: 2017-06-22 Americas Headquarters Cisco Systems, Inc. 170 West Tasman
More informationHPE FlexFabric 5940 Switch Series
HPE FlexFabric 5940 Switch Series EVPN Configuration Guide Part number: 5200-2002b Software version: Release 25xx Document version: 6W102-20170830 Copyright 2017 Hewlett Packard Enterprise Development
More informationIntended status: Standards Track. Cisco Systems October 22, 2018
BESS WorkGroup Internet-Draft Intended status: Standards Track Expires: April 25, 2019 Ali. Sajassi Mankamana. Mishra Samir. Thoria Patrice. Brissette Cisco Systems October 22, 2018 AC-Aware Bundling Service
More informationImplementing IP in IP Tunnel
This chapter module provides conceptual and configuration information for IP in IP tunnels on Cisco ASR 9000 Series Router. Note For a complete description of the IP in IP tunnel commands listed in this
More informationConfiguring Port-Based Traffic Control
Overview of Port-Based Traffic Control, page 1 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Information About Protected Ports, page
More informationConfiguring MLD Snooping
This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 6 Displaying
More informationChapter 4 Configuring Switching
Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under
More informationIEEE 802.1ah Provider Backbone Bridging
IEEE 802.1ah Provider Backbone Bridging In This Chapter This chapter provides information about Provider Backbone Bridging (PBB), process overview, and implementation notes. Topics in this chapter include:
More informationBridging and Switching. Karst Koymans. Monday, February 17, 2014
.. Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 3.7, 2014/02/19 19:50:51) Monday, February 17, 2014 Karst Koymans (UvA) Layer 2 Monday, February 17,
More informationIP SLA Service Performance Testing
This module describes how to configure the ITU-T Y.1564 Ethernet service performance test methodology that measures the ability of a network device to enable movement of traffic at the configured data
More informationConfiguring MLD Snooping
This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 5 Displaying
More informationConfiguring SPAN and RSPAN
41 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network
More informationConfiguring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery
Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Finding Feature Information, page 1 Configuring VPLS, page 1 Configuring VPLS BGP-based Autodiscovery, page 17 Finding Feature
More informationLayer 2 Access Control Lists on EVCs
The ability to filter packets in a modular and scalable way is important for both network security and network management. Access Control Lists (ACLs) provide the capability to filter packets at a fine
More informationVXLAN Deployment Use Cases and Best Practices
VXLAN Deployment Use Cases and Best Practices Azeem Suleman Solutions Architect Cisco Advanced Services Contributions Thanks to the team: Abhishek Saxena Mehak Mahajan Lilian Quan Bradley Wong Mike Herbert
More informationConfiguring EtherChannels
This chapter describes how to configure EtherChannels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of EtherChannels in Cisco NX-OS. It contains the following
More informationConfiguring Rapid PVST+ Using NX-OS
Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:
More informationConfiguring SPAN and RSPAN
34 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network
More informationConfiguring IEEE 802.1Q Tunneling
CHAPTER 26 This chapter describes how to configure IEEE 802.1Q tunneling in Cisco IOS Release 12.2SX. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS
More informationTransparent CFM. Information About Transparent CFM. EFP (Q-in-Q interfaces with dot1q or dot1ad C-UNI)
CFM support on a customer VLAN (C-VLAN) allows a customer to provision maintenance intermediate points (MIPs) and Up maintenance endpoints (MEPs) on a C-VLAN component for EFP (Q-in-Q interfaces with dot1q
More informationLayer 2. Bridging and Switching. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.4, 2017/02/15 12:07:08)
Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 16.4, 2017/02/15 12:07:08) Friday, February 17, 2017 Karst Koymans (UvA) Layer 2 Friday, February 17,
More informationConfiguring Port-Based Traffic Control
CHAPTER 22 This chapter describes how to configure the port-based traffic control features on the Cisco ME 3400 Ethernet Access switch. For complete syntax and usage information for the commands used in
More informationEVPN Overview. Cloud and services virtualization. Remove protocols and network simplification. Integration of L2 and L3 services over the same VPN
Ethernet VPN (EVPN) is a next generation solution that provides Ethernet multipoint services over MPLS networks. EVPN operates in contrast to the existing Virtual Private LAN Service (VPLS) by enabling
More informationConfiguring SPAN and RSPAN
Finding Feature Information, page 1 Prerequisites for SPAN and RSPAN, page 1 Restrictions for SPAN and RSPAN, page 2 Information About SPAN and RSPAN, page 3 How to Configure SPAN and RSPAN, page 14 Monitoring
More informationImproving resource utilization in Carrier Ethernet technologies
Improving resource utilization in Carrier Ethernet technologies Luis Fernando Caro Perez Advisor: PhD. José Marzo Doctorate Program in Tecnologías de la Información Doctoral Thesis Broadband Communications
More informationCatalyst Switches for Microsoft Network Load Balancing Configuration Example
Catalyst Switches for Microsoft Network Load Balancing Configuration Example Document ID: 107995 Contributed by Shashank Singh, Cisco TAC Engineer. Dec 19, 2013 Contents Introduction Prerequisites Requirements
More informationConfiguring Port Channels
This chapter contains the following sections: Information About Port Channels, page 1, page 11 Verifying Port Channel Configuration, page 19 Triggering the Port Channel Membership Consistency Checker,
More informationImplementing Multiple Spanning Tree Protocol
Implementing Multiple Spanning Tree Protocol This module provides conceptual and configuration information for Multiple Spanning Tree Protocol on Cisco ASR 9000 Series Routers. Multiple Spanning Tree Protocol
More informationLab Using Wireshark to Examine Ethernet Frames
Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with
More informationConfiguring SPAN and RSPAN
CHAPTER 32 This chapter describes how to configure Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 3750-X or 3560-X switch. Unless otherwise noted, the term switch refers to a Catalyst
More informationEnterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.
2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are
More informationConfiguring EtherChannels
Configuring EtherChannels This chapter describes how to configure EtherChannels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of EtherChannels in Cisco
More informationNetwork Virtualization. Duane de Witt
Network Virtualization Duane de Witt nv Edge System Overview System Deep Dive nv System Overview System Deep Dive NV EDGE SYSTEM OVERVIEW SUPERIOR, SIMPLE NETWORK DUAL-HOMING SOLUTION L3 Router dualhoming
More informationConfiguring Rapid PVST+
This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco
More informationE-VPN & PBB-EVPN: the Next Generation of MPLS-based L2VPN
E-VPN & PBB-EVPN: the Next Generation of -based L2VPN Samer Salam Agenda Introduction Concepts BGP Routes and Attributes E-VPN PBB-EVPN PBB-EVPN IOS-XR Implementation Summary 3 Introduction Overview Core
More informationCMPE 150 Winter 2009
CMPE 150 Winter 2009 Lecture 9 February 3, 2009 P.E. Mantey CMPE 150 -- Introduction to Computer Networks Instructor: Patrick Mantey mantey@soe.ucsc.edu http://www.soe.ucsc.edu/~mantey/ / t / Office: Engr.
More informationImproving Bandwidth Efficiency When Bridging on RPR. November 2001
Improving Bandwidth Efficiency When Bridging on RPR November 2001, Nortel Networks Anoop Ghanwani, Lantern Communications Raj Sharma, Luminous Robin Olsson, Vitesse CP Fu, NEC 11/1/01 Page 1 Components
More informationFSOS. Ethernet Configuration Guide
FSOS Ethernet Configuration Guide Contents 1 Configuring Interface... 1 1.1 Overview...1 1.2 Configuring Interface State...1 1.2.1 Configurations...1 1.2.2 Validation...1 1.3 Configuring Interface Speed...
More informationConfiguring MAC Address Tables
This chapter contains the following sections: Information About MAC Addresses, page 1 Configuring MAC Addresses, page 2 Configuring MAC Move Loop Detection, page 4 Verifying the MAC Address Configuration,
More informationEVC Command Reference
EVC Command Reference This chapter describes commands used to configure an Ethernet Virtual Circuit (EVC). bridge-domain, page 2 clear ethernet service instance, page 3 encapsulation, page 5 l2protocol,
More informationMultiprotocol Label Switching (MPLS)
36 CHAPTER Prerequisites for MPLS, page 36-1 Restrictions for MPLS, page 36-1 Information About MPLS, page 36-2 Default Settings for MPLS, page 36-7 How to Configure MPLS Features, page 36-7 Configuration
More informationImplementing the ERSPAN Analytics Feature on Cisco Nexus 6000 Series and 5600 Platform Switches
White Paper Implementing the ERSPAN Analytics Feature on Cisco Nexus 6000 Series and 5600 Platform Switches White Paper October 2014 2014 Cisco and/or its affiliates. All rights reserved. This document
More informationRouting Between VLANs Overview
Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.
More informationIntroduction to Computer Networks. CS 166: Introduction to Computer Systems Security
Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet
More informationConfiguring Port-Based Traffic Control
Overview of Port-Based Traffic Control, page 2 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Finding Feature Information, page 9 Information
More information802.1ah in NetherLight: An application proposal
System and Network Engineering Research Project 1 Master of Science Program Academic year 2008 2009 802.1ah in NetherLight: An application proposal by Sevickson KWIDAMA sevickson.kwidama os3.nl UvA Supervisor
More informationWhat LinkSec Should Know About Bridges Norman Finn
What LinkSec Should Know About Bridges Norman Finn What LinkSec Should Know About Bridges Rev. 2 Norman Finn, Cisco Systems IEEE 802 LinkSec SG 1/20 What Do Bridges Do? (1) A network of bridges emulates
More informationLab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3
Lab 1: Static MPLS First lab gives a basic understanding of MPLS label swapping No signaling manually assign labels like static routing Understand configuration, forwarding tables, and debugging of MPLS
More information2D1490 p Bridging, spanning tree and related issues. Olof Hagsand KTHNOC/NADA
D490 p4 007 Bridging, spanning tree and related issues Olof Hagsand KTHNOC/NADA Literature Radia Pearlman Interconnections Section 3 (Handouts) Building a network: routing or bridging? Scaling differences:
More information