Layer 2 Tunnel. xconnect performance test
|
|
- Myles Short
- 5 years ago
- Views:
Transcription
1 Layer 2 Tunnel xconnect performance test 1
2 About test The main purpose of this examination was to find out the router performance in Layer 2 tunnel mode during transmission of packets with different length. Some background information is present in document also for better understanding. During the test were used: Cisco 892/K9, C890 Software (C890-UNIVERSALK9-M), Version 15.1(2)T2, RELEASE SOFTWARE (fc1) JDSU SmartClass Ethernet Testers. Measured L1 Rate [Mbps] results in tables are rounded. However, it is sufficient for the review. A more accurate value you can get out from Frame Measured Rate. For example: for 64-Byte frames L1 Rate is 14,9 Mbps and frame rate is frames per seconds, In this case 14,9Mbps is rounded. A more accurate value is [frames/s] x 84 [bytes on wire] x 8 [bits in byte] = Mbps. Background Each layer have own unit of measure. PDU Protocol Data Unit Layer 1 Physical Layer - Bit Layer 2 Data Link Layer - Frame Layer 3 Network Layer - Packet Ethernet frame Ethernet II / DIX Figure 1 shows fields and lengths of Ethernet II/DIX frame. Preamble Destination MAC Source MAC 8 Bytes 6 Bytes 6 Bytes Ethertype 2 Bytes Payload Bytes CRC-32 4 Bytes Interframe gap 12 Byte times This is Layer 1 part. not included in the Ethernet frame length Included in the Ethernet frame length This is Layer 1 part. not included in the Ethernet frame length Figure 1. Untagged Ethernet frame 2
3 Maximum throughput The inter frame gap is inserted between frames during transmitting (Figure 2) #4 #3 #2 #1 Frames Interframe gap 12 Byte times Figure 2 Ethernet interframe gap Preamble 8 Bytes + Destination MAC 6 Bytes + Source MAC 6 Bytes + Ethertype 2Bytes + Payload 1500 bytes + FCS 4 Bytes + Inter frame Gap 12 Bytes = 1538 Bytes. In this way 1538 bytes are needed to transmit 1518 bytes untagged frame. Layer 3 maximum throughput can t reach 100% wire speed and depends from packet length Bytes are needed for transmitting 1500 bytes of L3 data -> 1500/1538*100% = untagged frame. 84 Bytes are needed for transmitting 46 bytes of L3 data -> 64/84*100% = untagged frame. L2TP encapsulation L2TP overhead is 38 bytes (Figure 3). Figure 3 L2TP Encapsulation 3
4 Performance test L2 Tunnel topology Topology: L2 Tunnel with redundant paths (Figure 4). Routing protocol: BGP protocol is used, but routing protocol selection is not important in this test. Test type: Layer 2 RFC2544. Two variants were tested: 1 st variant: Tunnel via Gi0 port 2 nd variant: Tunnel via Fa7 port (interface SVI VLAN 100) Figure 4 Schematic diagram Cisco 892 router has 2 routed ports and 8-port LAN switch. SVI is configured for creation of 3rd routed port. Connections Fa7-Fa7 and Gi0-Gi0 are tunnels and must have Layer 3 MTU 1538 bytes ( bytes L2TP overhead). SVI MTU by default is 1514 bytes. It included L3 packet 1500 bytes + L2 MAC header 14 bytes and without CRC. Because SVI involved in tunneling, then MTU must be 1552 bytes ( ). NB! Bug with MTU was found during SVI testing. It described below. Initial router configurations: Router R1 interface FastEthernet8 no ip address xconnect encapsulation l2tpv3 manual pw-class L2_TUNNEL l2tp id <- define xconnect <- define tunnel session ID interface Loopback0 ip address interface GigabitEthernet0 mtu 1538 ip address interface FastEthernet7 switchport access vlan 100 mtu 1538 interface Vlan100 mtu 1552 ip address pseudowire-class L2_TUNNEL encapsulation l2tpv3 protocol none ip local interface Loopback0 <- tunnel MTU <- tunnel MTU <- tunnel MTU <- define pseudo wire class <- define encapsulation <- manual mode <- use Loopback 0 interface 4
5 router bgp 10 bgp router-id bgp log-neighbor-changes redistribute connected neighbor remote-as 20 neighbor remote-as 20 neighbor weight 10 no auto-summary <- BGP configuration <- path via Gi0 is preferred (primary) Router R2 interface FastEthernet8 no ip address xconnect encapsulation l2tpv3 manual pw-class L2_TUNNEL l2tp id <- define xconnect <- define tunnel session ID interface Loopback0 ip address interface GigabitEthernet0 mtu 1538 ip address interface FastEthernet7 switchport access vlan 100 mtu 1538 interface Vlan100 mtu 1552 ip address pseudowire-class L2_TUNNEL encapsulation l2tpv3 protocol none ip local interface Loopback0 router bgp 20 bgp router-id bgp log-neighbor-changes redistribute connected neighbor remote-as 10 neighbor remote-as 10 neighbor weight 10 no auto-summary <- tunnel MTU <- tunnel MTU <- tunnel MTU <- define pseudo wire class <- define encapsulation <- manual mode <- use Loopback 0 interface <- BGP configuration <- path via Gi0 is preferred (primary) The #sh processes cpu sorted 1min and #sh processes cpu history were used for CPU statistics gathering. Please see the example below: R1#sh processes cpu sorted 1min i CPU utilization CPU utilization for five seconds: 57%/55%; one minute: 38%; five minutes: 17% R1#sh proc cpu hist R1 07:02:20 AM Wednesday Jan UTC ******************************************** 50 ******************************************** 40 ******************************************** 30 ******************************************** ****** 20 ************************************************* ****** 10 ************************************************* ****** CPU% per second (last 60 seconds) The CPU utilization for five seconds: 57%/55%; should be read as "Total CPU usage"/"cpu Usage Caused by traffic". 5
6 Test results Original L2 Frame Length [Bytes] L2 Tunnel Frame Length [Bytes] Measured L1 Rate [Mbps] Test results. Tunnel via Gi0 port CPU total usage [%] CPU usage caused by traffic [%] Measured Rate frame/sec random avg Table 1 Throughput of L2 Tunnel via Gi0 and CPU utilization Original L2 Frame Length [Bytes] L2 Tunnel Frame Length [Bytes] Measured L1 Rate [Mbps] Test results. Tunnel via SVI port CPU total usage [%] CPU usage caused by traffic [%] Measured Rate frame/sec Table 2 Throughput of L2 Tunnel via Fa7 and CPU utilization You can see that performance fell fast for 1518-byte frames. It was strange. I began to look for the cause and saw some interesting information. R2(config)#do sh buffer leak i Fa8 Header Header DataArea Pool Size Link Enc Flags Input Output User 85B EC01544 DMA Fa8 None L2X Data 85B45BB4 1EC0A944 DMA Fa8 None L2X Data 85B4892C 1EC21B44 DMA Fa8 None L2X Data 85B496D0 1EC28A44 DMA Fa8 None L2X Data 85B4B6A4 1EC38D44 DMA Fa8 None L2X Data 85B4DB04 1EC4B544 DMA Fa8 None L2X Data 85B4F1C0 1EC56E44 DMA Fa8 None L2X Data... L2 tunnel data does not fit to the MTU size of tunnel. 6
7 I began to capture traffic with Wireshark. For start, frames are captured for the path through the Gi0 interfaces. 1. Source frame (Figure 5). Length 1518 bytes. Figure 5. Source frame 1518 bytes Frame size 1518 bytes. Wireshark shows 1514 bytes without CRC. Payload pattern is 0xAA. Each frame contains 4 bytes (red selection) in the end of DATA. 2. Frame from R1 to R2 through interface Gi0 (Figure 6). MTU 1552 bytes. Figure 6. L2TP frame. Path via Gi0 7
8 MTU is correct. New MAC header 14bytes + New IP header 20 bytes + L2TP header 4 bytes + Original frame without CRC 1514 bytes = 1552 bytes (without CRC). Each frame contains 4 bytes (red selection) in the end of DATA. 3. Frames from R2 to tester 2, from Tester 2 to R2, from R2 to R1 and from R1 to Tester 1. Frames are correct and have right MTU. In general, changing the frame size is shown in Figure 7. Figure 7. Frame length change during transmission thru tunnel (via Gi0) Next step, frames are captured for the path through the Fa7 interfaces. 4. Source frames with length 1518 bytes Frames are same like in Figure Frame from R1 to R2 through interface Fa7. MTU 1552 bytes. Router R1 encapsulates frames into L2TP packets and sends to the router R2 via SVI and Fa7 ports. This step is correct. Frames have correctly MTU (Figure 8). 8
9 Figure 8. L2TP frame. Path through Fa7 NB! But further steps are an anomaly. In general, changing the frame size is shown in Figure 9. Figure 9. Frame length change during transmission through tunnel (via Fa7) 6. Frames from R2 to Tester 2 Router R2 adds 4 bytes to end of original frame DATA for frames which de-encapsulates from Tunnel to output port. Please see Figure 10. 9
10 NB! This anomaly starts only from frame length 1493 bytes with CRC (1489 without CRC). Frames with length up to 1492 bytes are forwarded correctly. Figure 10. Frame from R2 to Tester 2. 4 Bytes are added. Added DATA is shown in yellow frame in Figure 10. These 4 bytes are outside of the Layer 3 packet length. Please note, my NIC card sends frames without CRC to Windows and Wireshark also. Wireshark shows a value bytes on wire without 4 bytes of CRC. Wireshark decodes frame and sees that length of Layer 3 payload is 1500 bytes. But additional bytes are present after End of packet. Wireshark thinks that they are CRC and starts check it. Check fails, because these bytes are not Layer 2 CRC. Warning message is shown [Ethernet Frame Check Sequence Incorrect]. 7. Frames from R2 to R1 Next step. Tester 2 receives frames with inserted 4 bytes from R2, and sends them back toward Tester1. Because incoming port Fa8 is tunnel port, Router 2 does not check any Layer 3 payload. Router encapsulates all incoming bytes into L2TP packet and forward to Router R1 via tunnel. This procedure does not add additional bytes (Figure 11). 10
11 Figure 11. L2TP frame. Direction from R2 to R1. Tunnel through Fa7. 8. Frames from R1 to Tester 1 Final step. Router R1 also adds 4 bytes to end of original frame DATA for frames which de-encapsulates from Tunnel to output port. Original frame from tunnel has 4 additional bytes and router R1 adds next 4 bytes. Frames with length 1522 bytes (without CRC) are returned to Tester 1. Please see Figure
12 Figure 12. Frame with additional 8 bytes. Tester receives long frames but ignores any data after End of Packet. This is same situation as padding is ignored for short packets. In this case tester does not show error or lost packets. Only can be seen in the tester that the received frames are recognized as >1518/1526, but must be as /1526. MTU tuning MTU are increased for Fa7 and VLAN 100 interfaces bytes for Fa7 and 1556 for VLAN 100. Throughput test was repeated after MTU increasing. Now performance is much better (Table 3). However anomaly with additional bytes is remained. Router still adds 4 bytes during de-encapsulation from Tunnel to output port for frames with length bytes. 12
13 Throughput [Mbps] CPU Utilization [%] Original L2 Frame Length [Bytes] L2 Tunnel Frame Length [Bytes] Measured L1 Rate [Mbps] Test results. Tunnel via SVI port CPU total usage [%] CPU usage caused by traffic [%] Measured Rate frame/sec random avg Table 3. L2 Tunnel throughput and CPU utilization Summary The Graph 1 is summary graph for RFC2544 tests. This graph shows a maximum throughput. The Graph 2 shows a router performance for random frames, this gives more close result to a real throughput /97% 92/91% 99/97% 99/97% 96,5 Mbps 97,1 Mbps 97,6 Mbps 96,5 Mbps 97,1Mbps 97,3 Mbps 99/96% 99/96% 99/96% 99/96% 89,2 Mbps 98/95% 93/92% 84/83% 72/71% 49,9 Mbps 59,5 Mbps 57/55% 52/50% 26,3 Mbps 30,0 Mbps 14,9 Mbps 17,0 Mbps 10,0 Mbps Packet Length [Bytes] L1 Throughput. Tunnel via Fa7 CPU untilization. Tunnel via Fa7 L1 Throughput. Tunnel via Gi0 CPU total usadge. Tunnel via Gi0 Graph 1 Throughput and CPU utilization. 13
14 L1 Rate [Mbps] Mbps Mbps CPU utilization 60% CPU utilization 64% Tunnel via Gi0 Tunnel via Fa7 Graph 2. Throughput and CPU utilization for random frames Juri Jestin
Cisco 1921 router performance test
Cisco 1921 router performance test Juri Jestin 16.12.214 1 About test Test was carried out for clarify the performance characteristics of the router with different configurations during transmission of
More informationL2 Bridging Across an L3 Network Configuration Example
L2 Bridging Across an L3 Network Configuration Example Document ID: 116266 Contributed by Atri Basu, Jay Young Taylor, and Mani Ganesan, Cisco TAC Engineers. Jul 09, 2013 Contents Introduction Prerequisites
More informationConfiguring Virtual Private LAN Services
Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS
More informationCCENT Study Guide. Chapter 11 VLANs and Inter-VLAN Routing
CCENT Study Guide Chapter 11 VLANs and Inter-VLAN Routing Chapter 11 Objectives The CCENT Topics Covered in this chapter include: 2.0 LAN Switching Technologies 2.4 Configure, verify, and troubleshoot
More informationConfigure Multipoint Layer 2 Services
This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services, also called Virtual Private LAN Services (VPLS). Note VPLS supports Layer 2 VPN technology and
More informationImplementing SES Network Duplication A Best Practices Guide.
Implementing SES Network Duplication A Best Practices Guide. SIP Enablement Services 5.1 Avaya ABSTRACT This application note is a tutorial on Avaya SIP Enablement Services Network Duplication from an
More informationDeploying MPLS L2VPN
Deploying MPLS L2VPN Nurul Islam Roman (nurul@apnic.net) 1 Abstract This session covers the fundamental and advanced topics associated with the deployment of Layer 2 VPNs over an MPLS network. The material
More informationCCNA 1 Chapter 5 v5.0 Exam Answers 2013
CCNA 1 Chapter 5 v5.0 Exam Answers 2013 1 2 A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination
More information2. What is a characteristic of a contention-based access method?
CCNA 1 Chapter 5 v5.0 Exam Answers 2015 (100%) 1. Which statement is true about MAC addresses? MAC addresses are implemented by software. A NIC only needs a MAC address if connected to a WAN. The first
More informationConfiguring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling
CHAPTER 14 Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling With Release 12.1(13)E and later, the Catalyst 6500 series switches support IEEE 802.1Q tunneling and Layer 2 protocol tunneling.
More informationConfiguring IEEE 802.1Q and Layer 2 Protocol Tunneling
CHAPTER 8 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the same security,
More informationLab Using Wireshark to Examine Ethernet Frames
Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with
More informationConfiguring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling
9 CHAPTER Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the
More informationLab Using Wireshark to Examine Ethernet Frames
Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with
More informationModule 11a MPLS VPWS Configuration Lab (LDP)
APNIC MPLS Workshop Lab Module 11a MPLS VPWS Configuration Lab (LDP) Objective: All the routers are pre-configured with basic interface, OSPF, BGP, MPLS Label Distribution Protocol (LDP) configuration
More informationChapter 5: Inter-VLAN Routing. Routing & Switching
Chapter 5: Inter-VLAN Routing Routing & Switching What is Inter-VLAN routing? Layer 2 switches cannot forward traffic between VLANs without the assistance of a router. Inter-VLAN routing is a process for
More informationPOS on ONS Ethernet Cards
20 CHAPTER This chapter describes packet-over-sonet/sdh (POS) and its implementation on ONS Ethernet cards. This chapter contains the following major sections: POS Overview, page 20-1 POS Interoperability,
More informationConfiguring Pseudowire
This chapter provides information about configuring pseudowire features on the Cisco ASR 920 Series Router. Pseudowire Overview, on page 1 CEM Configuration, on page 2 CEM Configuration Guidelines and
More informationIEEE 802.1Q Tunneling (QnQ) and L2PT on L2 Ports
Revised: November 11, 2011, OL-20468-01 First Published: November 11, 2011 Last Updated: November 11, 2011 This feature provides Layer 2 Tunneling support for QnQ and Layer 2 Protocol Tunneling (L2PT)
More informationImplementing MPLS VPNs over IP Tunnels
The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Network (L3VPN) services, over an IP core network, using L2TPv3 multipoint tunneling instead of MPLS. This allows L2TPv3 tunnels
More informationChapter 5 Reading Organizer After completion of this chapter, you should be able to:
Chapter 5 Reading Organizer After completion of this chapter, you should be able to: Describe the operation of the Ethernet sublayers. Identify the major fields of the Ethernet frame. Describe the purpose
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationConfiguring Interfaces
CHAPTER 9 This chapter defines the types of interfaces on the Cisco ME 3400 Ethernet Access switch and describes how to configure them. The chapter consists of these sections: Understanding Interface Types,
More informationConfiguring IEEE 802.1Q Tunneling
CHAPTER 26 This chapter describes how to configure IEEE 802.1Q tunneling in Cisco IOS Release 12.2SX. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS
More informationCCNA Cisco Certified Network Associate CCNA (v3.0)
200-125 - CCNA Cisco Certified Network Associate CCNA (v3.0) 1.What is one benefit of PVST+? A. PVST+ supports Layer 3 load balancing without loops. B. PVST+ reduces the CPU cycles for all the switches
More informationIntroduction to Routers and LAN Switches
Introduction to Routers and LAN Switches Session 3048_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Prerequisites OSI Model Networking Fundamentals 3048_05_2001_c1 2001, Cisco Systems, Inc.
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 9 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN membership modes, VLAN configuration
More informationL2VPN Protocol-Based CLIs
The feature provides a set of processes and an improved infrastructure for developing and delivering Cisco IOS software on various Cisco platforms. This feature introduces new commands and modifies or
More informationConfiguring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery
Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Finding Feature Information, page 1 Configuring VPLS, page 1 Configuring VPLS BGP-based Autodiscovery, page 17 Finding Feature
More informationComputer Networks Principles LAN - Ethernet
Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2
More informationSections Describing Standard Software Features
30 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to
More informationConfiguring VLANs. Understanding VLANs CHAPTER
7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN
More informationImi :... Data:... Nazwisko:... Stron:...
Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information
More informationAToM Graceful Restart
AToM Graceful Restart Last Updated: November 29, 2011 The AToM Graceful Restart feature assists neighboring routers that have nonstop forwarding (NSF), stateful switchover (SSO) and graceful restart (GR)
More informationConfiguring PPP over Ethernet with NAT
CHAPTER 3 The Cisco Secure Router 520 Ethernet-to-Ethernet routers support Point-to-Point Protocol over Ethernet (PPPoE) clients and network address translation (NAT). Multiple PCs can be connected to
More informationConfigure L2VPN Autodiscovery and Signaling
This chapter describes the L2VPN Autodiscovery and Signaling feature which enables the discovery of remote Provider Edge (PE) routers and the associated signaling in order to provision the pseudowires.
More informationConfiguring Link Aggregation on the ML-MR-10 card
CHAPTER 34 Configuring Link Aggregation on the ML-MR-10 card This chapter applies to the ML-MR-10 card and describes how to configure link aggregation for the ML-Series cards, both EtherChannel and packet-over-sonet/sdh
More informationConfiguring PPP over Ethernet with NAT
This chapter provides an overview of Point-to-Point Protocol over Ethernet (PPPoE) clients and network address translation (NAT) that can be configured on the Cisco 819, Cisco 860, Cisco 880, and Cisco
More informationEnhanced RFC 2544 Test
1 Enhanced RFC 2544 Report - Port 2: 10/100/1000 Eth Layer 2 Traffic Term Generated by JDSU 5800 MSAM Enhanced RFC 2544 Test Overall Test Result: Pass Mode Tests to Run Customer Name Technician ID Test
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationConfiguring MPLS and EoMPLS
37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates
More informationL2VPN Interworking. Finding Feature Information
Interworking is a transforming function that is required to interconnect two heterogeneous attachment circuits (ACs). Several types of interworking functions exist. The function that is used would depend
More informationLab Configuring 802.1Q Trunk-Based Inter-VLAN Routing (Instructor Version Optional Lab)
(Instructor Version Optional Lab) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or
More informationPASS4TEST IT 인증시험덤프전문사이트
PASS4TEST IT 인증시험덤프전문사이트 http://www.pass4test.net 일년동안무료업데이트 Exam : 640-802 Title : Cisco Certified Network Associate(CCNA) Vendors : Cisco Version : DEMO 1 / 10 Get Latest & Valid 640-802 Exam's Question
More informationFrame Relay over L2TPv3
The (FRoL2TPv3) feature enables Frame Relay switching over Layer 2 Tunnel Protocol Version 3 (L2TPv3). The feature works with like interfaces and disparate interfaces (L2VPN interworking). Finding Feature
More informationConfiguring Interfaces
CHAPTER 9 This chapter defines the types of interfaces on the Cisco ME 3400 Ethernet Access switch and describes how to configure them. Understanding Interface Types, page 9-1 Using Interface Configuration
More informationVLAN Configuration. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership
More informationBehavior of Cisco Discovery Protocol between Routers and Switches
Behavior of Cisco Discovery Protocol between Routers and Switches Document ID: 118736 Contributed by Meghana Tandon, Sumanth Srinath, and Vishnu Asok, Cisco TAC Engineers. May 06, 2015 Contents Introduction
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More informationGRE Tunnel with VRF Configuration Example
GRE Tunnel with VRF Configuration Example Document ID: 46252 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot Caveats
More informationConfigure Link Layer Discovery Protocol
This chapter describes the procedures to configure Link Layer Discovery Protocol on Cisco NCS 4000 Series routers. Link Layer Discovery Protocol (LLDP) - Overview, on page 1 LLDP Frame Format, on page
More informationSybex CCENT Chapter 11: VLANs and Inter-VLAN Routing. Instructor & Todd Lammle
Sybex CCENT 100-101 Chapter 11: VLANs and Inter-VLAN Routing Instructor & Todd Lammle Chapter 11 Objectives The CCENT Topics Covered in this chapter include: LAN Switching Technologies Describe how VLANs
More informationConfiguring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts
Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling
More informationConfiguring MPLS Transport Profile
CHAPTER 44 The Multiprotocol Label Switching (MPLS) Transport Profile (TP) enables you to create tunnels that provide the transport network service layer over which IP and MPLS traffic traverse. MPLS-TP
More informationImplementing Inter-VLAN Routing. 2003, Cisco Systems, Inc. All rights reserved. 2-1
Implementing Inter-VLAN Routing 2003, Cisco Systems, Inc. All rights reserved. 2-1 Internetwork Communications C:>ping 172.16.30.100 Can two hosts on different subnets communicate without a router? No
More informationConfiguring EtherChannels and Link-State Tracking
30 CHAPTER Configuring EtherChannels and Link-State Tracking This chapter describes how to configure EtherChannels on Layer 2 ports on the Catalyst 2960 switch. EtherChannel provides fault-tolerant high-speed
More informationProtocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS
Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS Mail seban649@student.liu.se Protocol Hi Hi Got the time? 2:00 time TCP connection request TCP connection response Whats
More informationTable of Contents Chapter 1 Tunneling Configuration
Table of Contents Table of Contents... 1-1 1.1 Introduction to Tunneling... 1-1 1.1.1 IPv6 over IPv4 Tunnel... 1-2 1.1.2 IPv4 over IPv4 Tunnel... 1-7 1.2 Tunneling Configuration Task List... 1-8 1.3 Configuring
More informationVLANs. Traditional Campus Networks. Performance Issues. Broadcast Issues. Bridges terminate collision domains
Traditional Campus Networks Broadcast Domain VLANs Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc.
More informationConfiguring Interface Characteristics
CHAPTER 11 This chapter defines the types of interfaces on the Catalyst 3750 switch and describes how to configure them. Unless otherwise noted, the term switch refers to a standalone switch and a switch
More informationMPLS VPN--Inter-AS Option AB
The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) service provider
More informationImplementing IP in IP Tunnel
This chapter module provides conceptual and configuration information for IP in IP tunnels on Cisco ASR 9000 Series Router. Note For a complete description of the IP in IP tunnel commands listed in this
More informationPOS on ONS Ethernet Cards
CHAPTER 23 This chapter describes packet-over-sonet/sdh (POS) and its implementation on ONS Ethernet cards. This chapter contains the following major sections: POS Overview, page 23-1 POS Interoperability,
More informationLARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF
LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2
More informationVLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1
VLANs 2003, Cisco Systems, Inc. All rights reserved. 2-1 Traditional Campus Networks Broadcast Domain Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc.
More informationVLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1
VLANs 2003, Cisco Systems, Inc. All rights reserved. 2-1 Traditional Campus Networks Broadcast Domain Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc.
More informationLab 7.5.3: Troubleshooting the Wireless WRT300N
Lab 7.5.3: Troubleshooting the Wireless WRT300N Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/1.5 5.5.5.10 255.255.255.0 N/A Fa0/1.10 192.168.10.1 255.255.255.0
More informationChapter 3. Virtual Local Area Networks (VLANs) Part II
Chapter 3 Virtual Local Area Networks (VLANs) Part II CCNA3-1 Chapter 3-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,
More informationSections Describing Standard Software Features
27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to
More informationIP SLA Service Performance Testing
This module describes how to configure the ITU-T Y.1564 Ethernet service performance test methodology that measures the ability of a network device to enable movement of traffic at the configured data
More informationCisco Exam Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ]
s@lm@n Cisco Exam 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ] Topic break down Topic No. of Questions Topic 1: Mix Questions 26 Topic 2: Troubleshooting
More informationTS Open Day Data Center Fibre Channel over IP
TS Open Day Data Center Fibre Channel over IP Presented by: Rong Cheng- TAC LAN & DCN China Jan 30 th, 2015 2013 Cisco and/or its affiliates. All rights reserved. 1 FCIP Introduction FCIP Configuration
More informationLab Configuring Basic Switch Settings (Solution)
(Solution) Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.1.2 255.255.255.0 192.168.1.1 PC-A NIC 192.168.1.10 255.255.255.0 192.168.1.1
More informationLARGE SCALE DYNAMIC MULTIPOINT VPN
LARGE SCALE DYNAMIC MULTIPOINT VPN NOVEMBER 2004 1 INTRODUCTION Presentation_ID 2004, Cisco Systems, Inc. All rights reserved. 2 Dynamic Multipoint VPN Facts Dynamic Multipoint VPN (DMVPN) can work with
More informationIEEE 802.1Q-in-Q VLAN Tag Termination
IEEE 802.1Q-in-Q VLAN Tag Termination Encapsulating IEEE 802.1Q VLAN tags within 802.1Q enables service providers to use a single VLAN to support customers who have multiple VLANs. The IEEE 802.1Q-in-Q
More informationChapter 6: Network Layer
Chapter 6: Network Layer Introduction to Networks Intro to Networks v5 Network Layer Intro to Networks v5 2 The Network Layer End to End Transport processes Addressing end devices Encapsulation of Packets
More informationChapter 2. Switch Concepts and Configuration. Part I
Chapter 2 Switch Concepts and Configuration Part I CCNA3-1 Chapter 2-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,
More informationConfiguring EtherChannels and Layer 2 Trunk Failover
28 CHAPTER Configuring EtherChannels and Layer 2 Trunk Failover This chapter describes how to configure EtherChannels on Layer 2 ports on the switch. EtherChannel provides fault-tolerant high-speed links
More informationImplementing Inter-VLAN Routing
Internetwork Communications C:>ping 72.6.30.00 Implementing Inter-VLN Routing Can two hosts on different subnets communicate without a router? No What would happen if a host tried to ping another host?
More informationIEEE 802.1ah on Provider Backbone Bridges
IEEE 802.1ah on Provider Backbone Bridges First Published: November 25, 2009 Last Updated: February 8, 2011 The IEEE 802.1ah on Provider Backbone Bridges feature enables MAC-in-MAC tunneling on Ethernet
More informationImplementing Virtual Private LAN Services
Implementing Virtual Private LAN Services This module provides the conceptual and configuration infmation f Virtual Private LAN Services (VPLS) on Cisco IOS XR software. VPLS suppts Layer 2 VPN technology
More informationImplementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN
This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing
More informationCS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017
CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology
More informationDeploy VPLS. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by:
Deploy VPLS APNIC Technical Workshop October 23 to 25, 2017. Selangor, Malaysia Hosted by: Issue Date: [201609] Revision: [01] Acknowledgement Cisco Systems 2 VPLS Overview 3 Virtual Private LAN Service
More informationConfigure Virtual LANs in Layer 2 VPNs
The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services to geographically disparate customer sites. A virtual local area network (VLAN) is a group of
More informationConfiguring Interface Characteristics
CHAPTER 10 This chapter defines the types of interfaces on the switch and describes how to configure them. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. The
More informationCCNA Semester 3 labs. Labs for chapters 2 10
CCNA Semester 3 labs Labs for chapters 2 10 2.1.4.5 Lab - Configure Extended VLANs, VTP, and DTP 2.2.2.5 Lab - Troubleshooting Inter-VLAN Routing 3.1.2.12 Lab - Building a Switched Network with Redundant
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 3750 switch. It includes information about VLAN
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 3550 switch. It includes information about VLAN
More informationLab - Troubleshooting VLAN Configurations (Instructor Version Optional Lab)
(Instructor Version Optional Lab) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or
More informationAntonio Cianfrani. Virtual LAN (VLAN)
Antonio Cianfrani Virtual LAN (VLAN) Ethernet Ethernet standard (IEEE 802.3) for Local Area Network (LAN). CSMA/CD (Carrier Sense Multiple Access/Collision Detection) Carrier Sense: all devices have to
More informationTRILL Transparent Transport over MPLS
TRILL Transparent Transport over MPLS draft-muks-trill-transport-over-mpls- 00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong Overview This draft covers two problems as follows. Providing
More informationRoute between VLANs using a 3560 switch with an internal route processor using Cisco Express Forwarding (CEF).
Lab 3- Part I Inter-VLAN routing with a Multilayer Switch Configuration and Management of Networks - 2014 Topology Objective Route between VLANs using a 3560 switch with an internal route processor using
More informationH-VPLS N-PE Redundancy for MPLS Access
The feature enables two network provider edge (N-PE) devices to provide failover services to a user provider edge (U-PE) device in a hierarchical virtual private LAN service (H-VPLS). Having redundant
More informationData Center Configuration. 1. Configuring VXLAN
Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2
More informationConfiguring Web Cache Services By Using WCCP
CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine
More informationConfiguring EtherChannels and Layer 2 Trunk Failover
35 CHAPTER Configuring EtherChannels and Layer 2 Trunk Failover This chapter describes how to configure EtherChannels on Layer 2 and Layer 3 ports on the switch. EtherChannel provides fault-tolerant high-speed
More informationATM in TCP/IP environment: Adaptations and Effectiveness
Bremen Institute of Industrial Technology and Applied Work Science ATM in TCP/IP environment: Adaptations and Effectiveness Dipl.-Ing. Kai-Oliver Detken, BIBA ATM Traffic Symposium, Mykonos, Greece, September
More information