Implementing Virtual Private LAN Services

Size: px
Start display at page:

Download "Implementing Virtual Private LAN Services"

Transcription

1 Implementing Virtual Private LAN Services This module provides the conceptual and configuration infmation f Virtual Private LAN Services (VPLS) on Cisco IOS XR software. VPLS suppts Layer 2 VPN technology and provides transparent multipoint Layer 2 connectivity f customers. This approach enables service providers to host a multitude of new services such as broadcast TV, Layer 2 VPNs. F MPLS Layer 2 virtual private netwks (VPNs), see Implementing MPLS Layer 2 VPNs module. Note F me infmation about MPLS Layer 2 VPN on Cisco IOS XR software and f descriptions of the commands listed in this module, see the Related Documents section. To locate documentation f other commands that might appear while executing a configuration task, search online in the Cisco IOS XR software master command index. Feature Histy f Implementing Virtual Private LAN Services on Cisco IOS XR Configuration Module Release Release Release Release 4.0 Release Modification This feature was introduced. Suppt f the bridging funtionality feature (VPLS based) and pseudowire redundancy was added. The following features were added: Blocking unknown unicast flooding. Disabling MAC flush. The following features were added: H-VPLS with MPLS Access pseudowire H-VPLS with Ethernet Access MAC Address withdrawal Suppt f the BGP Autodiscovery with LDP Signaling feature was added. VPC-45

2 Contents Implementing Virtual Private LAN Services Contents Befe you configure VPLS, ensure that the netwk is configured as follows:, page VPC-46 Restrictions f Implementing Virtual Private LAN Services, page VPC-46 Infmation About Implementing Virtual Private LAN Services, page VPC-47 How to Implement Virtual Private LAN Services, page VPC-57 Configuration Examples f Virtual Private LAN Services, page VPC-106 Additional References, page VPC-116 Prerequisites f Implementing Virtual Private LAN Services Befe you configure VPLS, ensure that the netwk is configured as follows: To perfm these configuration tasks, your Cisco IOS XR software system administrat must assign you to a user group associated with a task group that includes the cresponding command task IDs. All command task IDs are listed in individual command references and in the Cisco IOS XR Task ID Reference Guide. If you need assistance with your task group assignment, contact your system administrat. Configure IP routing in the ce so that the provider edge (PE) routers can reach each other through IP. Configure MPLS and Label Distribution Protocol (LDP) in the ce so that a label switched path (LSP) exists between the PE routers. Configure a loopback interface to iginate and terminate Layer 2 traffic. Make sure that the PE routers can access the other router's loopback interface. Note The loopback interface is not needed in all cases. F example, tunnel selection does not need a loopback interface when VPLS is directly mapped to a TE tunnel. Restrictions f Implementing Virtual Private LAN Services The following restrictions are listed f implementing VPLS: All attachment circuits in a bridge domain on an Engine 3 line card must be the same type (f example, pt, dot1q, qinq, qinany), value (VLAN ID), and EtherType (f example, 0x8100, 0x9100, 0x9200). The Cisco CRS-1 router suppts multiple types of attachment circuits in a bridge domain. The line card requires ternary content addressable memy (TCAM) Carving configuration. The Cisco CRS-1 router however, does not require the TCAM Carving configuration. Virtual Fwarding Instance (VFI) names have to be unique, because a bridge domain can have only one VFI. A PW cannot belong to both a peer-to-peer (P2P) cross-connect group and a VPLS bridge-domain. This means that the neighbing IP address and the pseudowire ID have to be unique on the router, because the pseudowire ID is signaled to the remote provider edge. VPC-46

3 Implementing Virtual Private LAN Services Infmation About Implementing Virtual Private LAN Services F the Engine 5 line card, version 1 of the Ethernet SPA does not suppt QinQ mode and QinAny mode. Note F the Engine 5 line card, version 2 of the Ethernet SPA suppts all VLAN modes, such as VLAN mode, QinQ mode, QinAny mode. The Cisco CRS-1 router suppts only the Ethernet pt mode and the 802.1q VLAN mode. Infmation About Implementing Virtual Private LAN Services To implement Virtual Private LAN Services (VPLS), you should understand the following concepts: Virtual Private LAN Services Overview, page VPC-47 VPLS f an MPLS-based Provider Ce, page VPC-48 Hierarchical VPLS, page VPC-48 VPLS Discovery and Signaling, page VPC-50 Bridge Domain, page VPC-53 MAC Address-related Parameters, page VPC-53 LSP Ping over VPWS and VPLS, page VPC-55 Pseudowire Redundancy f P2P AToM Cross-Connects, page VPC-56 Virtual Private LAN Services Overview Virtual Private LAN Service (VPLS) enables geographically separated local-area netwk (LAN) segments to be interconnected as a single bridged domain over an MPLS netwk. The full functions of the traditional LAN such as MAC address learning, aging, and switching are emulated across all the remotely connected LAN segments that are part of a single bridged domain. A service provider can offer VPLS service to multiple customers over the MPLS netwk by defining different bridged domains f different customers. Packets from one bridged domain are never carried over delivered to another bridged domain, thus ensuring the privacy of the LAN service. VPLS transpts Ethernet 802.3, VLAN 802.1q, and VLAN-in-VLAN (Q-in-Q) traffic across multiple sites that belong to the same Layer 2 broadcast domain. VPLS offers simple Virtual LAN services that include flooding broadcast, multicast, and unknown unicast frames that are received on a bridge. The VPLS solution requires a full mesh of pseudowires that are established among provider edge (PE) routers. The VPLS implementation is based on Label Distribution Protocol (LDP)-based pseudowire signaling. A VFI is a virtual bridge pt that is capable of perfming native bridging functions, such as fwarding, based on the destination MAC address, source MAC address learning and aging. After provisioning attachment circuits, neighb relationships across the MPLS netwk f this specific instance are established through a set of manual commands identifying the end PEs. When the neighb association is complete, a full mesh of pseudowires is established among the netwk-facing provider edge devices, which is a gateway between the MPLS ce and the customer domain. The service provider netwk starts switching the packets within the bridged domain specific to the customer by looking at destination MAC addresses. All traffic with unknown, broadcast, and multicast destination MAC addresses is flooded to all the connected customer edge devices, which connect to the VPC-47

4 Infmation About Implementing Virtual Private LAN Services Implementing Virtual Private LAN Services service provider netwk. The netwk-facing provider edge devices learn the source MAC addresses as the packets are flooded. The traffic is unicasted to the customer edge device f all the learned MAC addresses. VPLS requires the provider edge device to be MPLS-capable. The VPLS provider edge device holds all the VPLS fwarding MAC tables and Bridge Domain infmation. In addition, it is responsible f all flooding broadcast frames and multicast replications. Note VPLS with Traffic Engineering Fast Reroute (TE FRR) is not suppted. VPLS f an MPLS-based Provider Ce VPLS is a multipoint Layer 2 VPN technology that connects two me customer devices using bridging techniques. The VPLS architecture allows f the end-to-end connection between the Provider Edge (PE) routers to provide Multipoint Ethernet Services. VPLS requires the creation of a bridge domain (Layer 2 broadcast domain) on each of the PE routers. The access connections to the bridge domain on a PE router are called attachment circuits (AC). The attachment circuits can be a set of physical pts, virtual pts, both that are connected to the bridge at each PE device in the netwk. The MPLS/IP provider ce simulates a virtual bridge that connects the multiple attachment circuits on each of the PE devices together to fm a single broadcast domain. A VFI is created on the PE router f each VPLS instance. The PE routers make packet-fwarding decisions by looking up the VFI of a particular VPLS instance. The VFI acts like a virtual bridge f a given VPLS instance. Me than one attachment circuit belonging to a given VPLS are connected to the VFI. The PE router establishes emulated VCs to all the other PE routers in that VPLS instance and attaches these emulated VCs to the VFI. Packet fwarding decisions are based on the data structures maintained in the VFI. Hierarchical VPLS Hierarchical VPLS (H-VPLS) is an extension of basic VPLS that provides scaling and operational benefits. H-VPLS provides a solution to deliver Ethernet multipoint services over MPLS. H-VPLS partitions a netwk into several edge domains that are interconnected using an MPLS ce. The use of Ethernet switches at the edge offers significant technical and economic advantages. H-VPLS also allows Ethernet point-to-point and multipoint Layer 2 VPN services, as well as Ethernet access to high-speed Internet and IP VPN services. Two flavs of H-VPLS are: Ethernet access in the edge domain MPLS access in the edge domain H-VPLS with Ethernet Access QinQ QinAny Figure 8 shows Ethernet access f H-VPLS. The edge domain can be built using Ethernet switches and techniques such as QinQ. Using Ethernet as the edge technology simplifies the operation of the edge domain and reduces the cost of the edge devices. VPC-48

5 Implementing Virtual Private LAN Services Infmation About Implementing Virtual Private LAN Services Figure 8 Ethernet Access f H-VPLS CE1 U-PE1 QinQ/QinAny ACs Ce PWs N-PE2 Ethernet Access Netwk N-PE1 VPLS Ce Netwk CE2 U-PE2 N-PE H-VPLS with PW-access Figure 9 shows pseudowire (PW) access f H-VPLS. The edge domain can be an MPLS access netwk. In this scenario, the U-PE device carries the customer traffic from attachment circuits (AC) over the point to point (p2p) pseudowires. The p2p pseudowires terminate in a bridge domain configured on the N-PE device. Access PW is configured as a member directly under a bridge domain. A bridge-domain in N-PE1 can have multiple ACs (physical/vlan Ethernet pts), multiple access PWs and one VFI (consisting of ce PWs) as members, is depicted in Figure 9. Figure 9 PW access f H-VPLS P2P AC1 CE1 U-PE1 N-PE2 Ethernet Access Netwk N-PE1 VPLS Ce Netwk CE2 U-PE2 P2P AC2 Ethernet AC N-PE3 CE Access PWs/P2P Ce PWs VPC-49

6 Infmation About Implementing Virtual Private LAN Services Implementing Virtual Private LAN Services VPLS Discovery and Signaling VPLS is a Layer 2 multipoint service and it emulates a LAN service across a WAN. VPLS enables service providers to interconnect several LAN segments over a packet-switched netwk and make them behave as a single LAN. Service providers can provide a native Ethernet access connection to customers using VPLS. The VPLS control plane consists of two imptant components, autodiscovery and signaling: VPLS Autodiscovery eliminates the need to manually provision VPLS neighbs. VPLS Autodiscovery enables each VPLS PE router to discover other provider edge (PE) routers that are part of the same VPLS domain. Once the PEs are discovered, pseudowires (PWs) are signaled and established across pairs of PE routers, fming a full mesh of PWs across PE routers in a VPLS domain. Figure 10 VPLS Autodiscovery and Signaling L2-VPN Discovery Multipoint BGP Signaling Protocol LDP BGP Tunneling Protocol MPLS BGP-based VPLS Autodiscovery An imptant aspect of VPN technologies, including VPLS, is the ability of netwk devices to automatically signal infmation to other devices, about any association with a particular VPN. Autodiscovery requires this infmation to be distributed to all members of a VPN. VPLS is a multipoint mechanism f which BGP is well-suited. BGP-based VPLS autodiscovery eliminates the need to manually provision VPLS neighbs. VPLS autodiscovery enables each VPLS PE router to discover other provider edge (PE) routers that are part of the same VPLS domain. VPLS Autodiscovery also tracks occurrences when PE routers are added to, removed from, the VPLS domain. When the discovery process is complete, each PE router has the infmation required to setup VPLS pseudowires (PWs). BGP Auto Discovery With BGP Signaling The implementation of VPLS in a netwk requires the establishment of a full mesh of PWs between the provider edge (PE) routers. The PWs can be signaled using BGP signaling. VPC-50

7 Implementing Virtual Private LAN Services Infmation About Implementing Virtual Private LAN Services Figure 11 Discovery and Signaling Attributes Label Signaling BGP CE1 PE1 PE2 CE2 MPLS Ce Tunnel LSP = LDP Payload BGP VC Label LDP IGP Label Traffic Flow The BGP signaling and autodiscovery scheme has these components: A means by which a PE can learn which remote PEs are members of a given VPLS. This process is known as autodiscovery. A means by which a PE can learn about the pseudowire label that is expected by a given remote PE f a given VPLS. This process is known as signaling. The BGP Netwk Layer Reachability Infmation (NLRI) takes care of both these components simultaneously. The NLRI generated by a given PE contains necessary infmation required by other PEs. These components enable the automatic setup of a full mesh of pseudowires f each VPLS, without having to manually configure those pseudowires on each PE. NLRI Fmat f VPLS with BGP AD and Signaling Figure 12 shows the NLRI fmat f VPLS with BGP AD and Signaling. Figure 12 NLRI Fmat Length (2 octets) Route Distinguisher (8 octets) VE ID (2 octets) VE Block Offset (2 octets) VE Block Size (2 octets) Label Base (3 octets) BGP Auto Discovery With LDP Signaling Signaling of pseudowires requires exchange of infmation between two endpoints. Label Distribution Protocol (LDP) is better suited f point-to-point signaling. The signaling of pseudowires, between provider edge devices, uses targeted LDP sessions to exchange label values and attributes, and configure the pseudowires. VPC-51

8 Infmation About Implementing Virtual Private LAN Services Implementing Virtual Private LAN Services Figure 13 Discovery and Signaling Attributes Label Signaling LDP CE1 PE1 PE2 CE2 MPLS Ce Tunnel LSP = LDP Payload LDP VC Label LDP IGP Label Traffic Flow A PE router advertises an identifier through BGP f each VPLS instance. This identifier is unique within the VPLS instance and acts like a VPLS ID. The identifier enables the PE router, receiving the BGP advertisement, to identify the VPLS associated with the advertisement, and impt it to the crect VPLS instance. In this manner, f each VPLS, a PE router learns which other PE routers are members of the VPLS. The LDP protocol is used to configure a pseudowire to all other PE routers. The FEC 129 standard is used f signaling. The infmation carried by FEC 129 includes the VPLS ID, the Target Attachment Individual Identifier (TAII) and the Source Attachment Individual Identifier (SAII). The LDP advertisement also contains the inner label VPLS label that is expected f incoming traffic over the pseudowire. This enables the LDP peer to identify the VPLS instance with which the pseudowire is to be associated, and the label value that it is expected to use when sending traffic on that pseudowire. NLRI and Extended Communities Figure 12 depicts NLRI and extended communities. Figure 14 NLRI and Extended Communities NLRI: Length (2 octets) Route Distinguisher (8 octets) L2VPN Router ID (4 octets) Ext Comms: VPLS-ID (8 octets) Route Target (8 octets) VPC-52

9 Implementing Virtual Private LAN Services Infmation About Implementing Virtual Private LAN Services Bridge Domain The native bridge domain refers to a Layer 2 broadcast domain consisting of a set of physical virtual pts (including VFI). Data frames are switched within a bridge domain based on the destination MAC address. Multicast, broadcast, and unknown destination unicast frames are flooded within the bridge domain. In addition, the source MAC address learning is perfmed on all incoming frames on a bridge domain. A learned address is aged out. Incoming frames are mapped to a bridge domain, based on either the ingress pt a combination of both an ingress pt and a MAC header field. By default, split hizon is enabled on a bridge domain. In other wds, any packets that are coming on either the attachment circuits pseudowires are not returned on the same attachment circuits pseudowires. In addition, the packets that are received on one pseudowire are not replicated on other pseudowires in the same VFI. MAC Address-related Parameters MAC Address Flooding The MAC address table contains a list of the known MAC addresses and their fwarding infmation. In the current VPLS design, the MAC address table and its management are distributed. In other wds, a copy of the MAC address table is maintained on the route process (RP) card and the line cards. These topics provide infmation about the MAC address-related parameters: MAC Address Flooding, page VPC-53 MAC Address-based Fwarding, page VPC-53 MAC Address Source-based Learning, page VPC-54 MAC Address Aging, page VPC-54 MAC Address Limit, page VPC-54 MAC Address Withdrawal, page VPC-55 Ethernet services require that frames that are sent to broadcast addresses and to unknown destination addresses be flooded to all pts. To obtain flooding within VPLS broadcast models, all unknown unicast, broadcast, and multicast frames are flooded over the cresponding pseudowires and to all attachment circuits. Therefe, a PE must replicate packets across both attachment circuits and pseudowires. MAC Address-based Fwarding To fward a frame, a PE must associate a destination MAC address with a pseudowire attachment circuit. This type of association is provided through a static configuration on each PE through dynamic learning, which is flooded to all bridge pts. Note In this case, split hizon fwarding applies; f example, frames that are coming in on an attachment circuit pseudowire are not sent out of the same attachment circuit pseudowire. The pseudowire frames, which are received on one pseudowire, are replicated on to other attachment circuits, VFI pseudowires and access pseudowires. VPC-53

10 Infmation About Implementing Virtual Private LAN Services Implementing Virtual Private LAN Services MAC Address Source-based Learning MAC Address Aging MAC Address Limit When a frame arrives on a bridge pt (f example, pseudowire attachment circuit) and the source MAC address is unknown to the receiving PE router, the source MAC address is associated with the pseudowire attachment circuit. Outbound frames to the MAC address are fwarded to the appropriate pseudowire attachment circuit. MAC address source-based learning uses the MAC address infmation that is learned in the hardware fwarding path. The updated MAC tables are sent to all line cards (LCs) and program the hardware f the router. The number of learned MAC addresses is limited through configurable per-pt and per-bridge domain MAC address limits. A MAC address in the MAC table is considered valid only f the duration of the MAC address aging time. When the time expires, the relevant MAC entries are repopulated. When the MAC aging time is configured only under a bridge domain, all the pseudowires and attachment circuits in the bridge domain use that configured MAC aging time. A bridge fwards, floods, drops packets based on the bridge table. The bridge table maintains both static entries and dynamic entries. Static entries are entered by the netwk manager by the bridge itself. Dynamic entries are entered by the bridge learning process. A dynamic entry is automatically removed after a specified length of time, known as aging time, from the time the entry was created last updated. If hosts on a bridged netwk are likely to move, decrease the aging-time to enable the bridge to adapt to the change quickly. If hosts do not transmit continuously, increase the aging time to recd the dynamic entries f a longer time, thus reducing the possibility of flooding when the hosts transmit again. The MAC address limit is used to limit the number of learned MAC addresses. The limit is set at the bridge domain level and the pt level. When the MAC address limit is violated, the system is configured to take one of the actions that are listed in Table 2. Table 2 Action Limit flood Limit no-flood Shutdown MAC Address Limit Actions Description Discards the new MAC addresses. Discards the new MAC addresses. Flooding of unknown unicast packets is disabled. Disables the bridge domain bridge pt. When the bridge domain is down, none of the bridging functions, such as learning, flooding, fwarding, and so fth take place f the bridge domain. If a bridge pt is down as a result of the action, the interface pseudowire representing the bridge pt remains up but the bridge pt is not participating in the bridge. When disabled, the pt bridge domain is manually brought up by using an EXEC CLI. When a limit is exceeded, the system is configured to perfm the following notifications: VPC-54

11 Implementing Virtual Private LAN Services Infmation About Implementing Virtual Private LAN Services Syslog (default) Simple Netwk Management Protocol (SNMP) trap Syslog and SNMP trap None (no notification) To clear the MAC limit condition, the number of MACs must go below 75 percent of the configured limit. Note On the Cisco CRS-1 router, MAC address limit action is suppted only on the ACs and not on ce pseudowires. MAC Address Withdrawal F faster VPLS convergence, you can remove unlearn the MAC addresses that are learned dynamically. The Label Distribution Protocol (LDP) Address Withdrawal message is sent with the list of MAC addresses, which need to be withdrawn to all other PEs that are participating in the cresponding VPLS service. F the Cisco IOS XR VPLS implementation, a ption of the dynamically learned MAC addresses are cleared by using the MAC addresses aging mechanism by default. The MAC address withdrawal feature is added through the LDP Address Withdrawal message. To enable the MAC address withdrawal feature, use the withdrawal command in bridge group bridge domain MAC configuration mode. To verify that the MAC address withdrawal is enabled, use the show bridge-domain command with the detail keywd. Note By default, the LDP MAC Withdrawal feature is enabled on Cisco IOS XR. The LDP MAC Withdrawal feature is generated due to the following events: Attachment circuit goes down. You can remove add the attachment circuit through the CLI. MAC withdrawal messages are received over a VFI pseudowire and are not propagated over access pseudowires. RFC 4762 specifies that both wildcards (by means of an empty Type, Length and Value [TLV]) and a specific MAC address withdrawal. Cisco IOS XR software suppts only a wildcard MAC address withdrawal. LSP Ping over VPWS and VPLS F Cisco IOS XR software, the existing suppt f the Label Switched Path (LSP) ping and traceroute verification mechanisms f point-to-point pseudowires (signaled using LDP FEC128) is extended to cover the pseudowires that are associated with the VFI (VPLS). Currently, the suppt f the LSP ping and traceroute is limited to manually configured VPLS and access pseudowires (signaled using LDP FEC128). Virtual Circuit Connection Verification (VCCV) is also suppted on access pseudowires. F infmation about VCCV suppt and the ping mpls pseudowire command, see Cisco IOS XR MPLS Command Reference f the Cisco CRS Router. VPC-55

12 Infmation About Implementing Virtual Private LAN Services Implementing Virtual Private LAN Services VPLS Scalability and Perfmance Targets The Cisco CRS-1router employs the ternary content addressable memy (TCAM) to meet the perfmance and scalable targets over VPLS. Table 3 describes the scalability and perfmance targets f the Cisco CRS-1 router. Table 3 VPLS Scalability and Perfmance Targets Perfmance Maximum bridge domains per Line Card Maximum bridge domains per system Maximum MACs per bridge domain Maximum MACs per Line Card Maximum MACs per system Maximum attachment circuits per bridge domain Maximum pseudowires per bridge domain Maximum pseudowires per system Scalability Target Pseudowire Redundancy f P2P AToM Cross-Connects Backup pseudowires (PW) are associated with the cresponding primary pseudowires. A backup PW is not programmed to fward data when inactive. It is activated only if a primary PW fails. This is known as pseudowire redundancy. The primary reason f backing up a PW is to reduce traffic loss when a primary PW fails. When the primary PW is active again, it resumes its activity. A primary PW can be associated with only one backup PW. Similarly, a backup PW can be associated with only one primary PW. It is recommended to enable pseudowire status time length value (TLV) f optimal switchover perfmance. Note This feature is suppted only f an AToM instance on the Cisco XR Series Router, and f an EoMPLS instance on the Cisco CRS-1 router. VPC-56

13 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services How to Implement Virtual Private LAN Services This section describes the tasks that are required to implement VPLS: Configuring a Bridge Domain, page VPC-57 Configuring a Layer 2 Virtual Fwarding Instance, page VPC-75 Configuring the MAC Address-related Parameters, page VPC-87 Configuring VPLS with BGP Autodiscovery and Signaling, page VPC-100 Configuring VPLS with BGP Autodiscovery and LDP Signaling, page VPC-102 Configuring a Bridge Domain Creating a Bridge Domain SUMMARY STEPS These topics describe how to configure a bridge domain: Creating a Bridge Domain, page VPC-57 Configuring a Pseudowire, page VPC-59 Configuring an Access Pseudowire, page VPC-61 Associating Members with a Bridge Domain, page VPC-70 Configuring Bridge Domain Parameters, page VPC-72 Disabling a Bridge Domain, page VPC-73 Configuring a Layer 2 Virtual Fwarding Instance, page VPC-75 Perfm this task to create a bridge domain. 1. configure bridge group bridge-group-name 4. bridge-domain bridge-domain-name 5. end VPC-57

14 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 Step 5 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge-group-name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain-name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# end RP/0/RP0/CPU0:router(config--bg-bd)# end RP/0/RP0/CPU0:router(config--bg-bd)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. VPC-58

15 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Configuring a Pseudowire SUMMARY STEPS DETAILED STEPS Perfm this task to configure a pseudowire under a bridge domain. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. vfi {vfi name} 6. exit 7. neighb {A.B.C.D} {pw-id value} 8. end Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. VPC-59

16 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Step 5 Step 6 Command Action vfi {vfi-name} RP/0/RP0/CPU0:router(config--bg-bd)# vfi v1 RP/0/RP0/CPU0:router(config--bg-bd-vfi)# exit Configures the virtual fwarding interface (VFI) parameters and enters L2VPN bridge group bridge domain VFI configuration mode. Use the vfi-name argument to configure the name of the specified virtual fwarding interface. Exits the current configuration mode. Step 7 Step 8 RP/0/RP0/CPU0:router(config--bg-bd-vfi)# exit RP/0/RP0/CPU0:router(config--bg-bd)# neighb {A.B.C.D} {pw-id value} RP/0/RP0/CPU0:router(config--bg-bd)# neighb pw-id 1000 RP/0/RP0/CPU0:router(config--bg-bd-pw)# end RP/0/RP0/CPU0:router(config--bg-bd-pw)# end RP/0/RP0/CPU0:router(config--bg-bd-pw)# Adds an access pseudowire pt to a bridge domain a pseudowire to a bridge virtual fwarding interface (VFI). Use the A.B.C.D argument to specify the IP address of the cross-connect peer. Use the pw-id keywd to configure the pseudowire ID. The range is 1 to Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. VPC-60

17 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Configuring an Access Pseudowire SUMMARY STEPS DETAILED STEPS Perfm this task to configure an access pseudowire under a bridge domain. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. interface type interface-path-id 6. neighb {A.B.C.D} {pw-id value} 7. end Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 Step 5 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# interface type interface-path-id RP/0/RP0/CPU0:router(config--bg-bd)# interface GigabitEthernet 0/4/0/0 RP/0/RP0/CPU0:router(config--bg-bd-ac)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Enters interface configuration mode and adds an interface to a bridge domain that allows packets to be fwarded and received from other interfaces that are part of the same bridge domain. VPC-61

18 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Step 6 Command Action exit Exits the current configuration mode. Step 7 Step 8 RP/0/RP0/CPU0:router(config--bg-bd-ac)# exit RP/0/RP0/CPU0:router(config--bg-bd)# neighb {A.B.C.D} {pw-id value} RP/0/RP0/CPU0:router(config--bg-bd)# neighb pw-id 1000 RP/0/RP0/CPU0:router(config--bg-bd-pw)# end RP/0/RP0/CPU0:router(config--bg-bd-pw)# end RP/0/RP0/CPU0:router(config--bg-bd-pw)# Adds an access pseudowire pt to a bridge domain a pseudowire to a bridge virtual fwarding interface (VFI). Use the A.B.C.D argument to specify the IP address of the cross-connect peer. Use the pw-id keywd to configure the pseudowire ID. The range is 1 to Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. VPC-62

19 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Enabling Pseudowire Status TLV When a pseudowire is setup, label distribution protocol (LDP) determines the method f signaling pseudowire status. Cisco IOS-XR provides a configuration option that allows you to enable pseudowire status type length value (TLV). Note Unless pseudowire status TLV is explicitly enabled under L2VPN configuration, the default signaling method is Label Withdrawal. Pseudowire status TLV must be enabled on both local and remote PEs. If only one provider edge router is configured with the pw-status tlv command, then label withdrawal method is used. Perfm this task to enable pseudowire status TLV. SUMMARY STEPS 1. configure pw-status tlv 4. end DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# VPC-63

20 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Step 3 Command Action pw-status tlv Enables pseudowire status TLV. Step 4 RP/0/RP0/CPU0:router(config-)# pw-status tlv end RP/0/RP0/CPU0:router(config-)#end RP/0/RP0/CPU0:router(config-)# Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. VPC-64

21 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Configuring a Backup Pseudowire Perfm this task to configure a backup pseudowire f a point-to-point neighb. SUMMARY STEPS 1. configure xconnect group group name 4. p2p xconnect name 5. neighb ip-address pw-id number 6. backup neighb ip-address pw-id number 7. end DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# xconnect group group name Enters the name of the cross-connect group. Step 4 RP/0/RP0/CPU0:router(config-)# xconnect group A RP/0/RP0/CPU0:router(config--xc)# p2p xconnect name Enters a name f the point-to-point cross-connect. Step 5 RP/0/RP0/CPU0:router(config--xc)# p2p rtrx_to_rtry RP/0/RP0/CPU0:router(config--xc-p2p)# neighb ip-address pw-id number RP/0/RP0/CPU0:router(config--xc-p2p)# neighb pw-id 2 RP/0/RP0/CPU0:router(config--xc-p2p-pw)# Configures the pseudowire segment f the cross-connect. VPC-65

22 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Step 6 Step 7 Command Action backup neighb ip-address pw-id number RP/0/RP0/CPU0:router(config--xc-p2p)# backup neighb pw-id 2 RP/0/RP0/CPU0:router(config--xc-p2p-pw-backup)# end RP/0/RP0/CPU0:router(config--xc-p2p-pw-backup)# end RP/0/RP0/CPU0:router(config--xc-p2p-pw-backup)# Configures the backup pseudowire f the point-to-point neighb. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. VPC-66

23 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Configuring Backup Disable Delay SUMMARY STEPS DETAILED STEPS The Backup Disable Delay function specifies the time f which the primary pseudowire in active state waits befe it takes over f the backup pseudowire. Perfm this task to configure a disable delay. 1. configure pw-class class name 4. backup disable delay seconds 5. exit 6. xconnect group group name 7. p2p xconnect name 8. neighb ip-address pw-id number 9. pw-class class name 10. backup neighb ip-address pw-id number 11. end Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# pw-class class_1 Configures the pseudowire class name. Step 4 RP/0/RP0/CPU0:router(config-)# pw-class class_1 RP/0/RP0/CPU0:router(config--pwc)# backup disable delay seconds RP/0/RP0/CPU0:router(config--pwc)# backup disable delay 20 RP/0/RP0/CPU0:router(config--pwc)# Specifies how long a backup pseudowire virtual circuit (VC) should wait befe resuming operation after the primary pseudowire VC becomes nonfunctional. VPC-67

24 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Step 5 Command Action exit Exits the pseudowire class submode. Step 6 RP/0/RP0/CPU0:router(config--pwc)# exit xconnect group group name Enters the name of the cross-connect group. Step 7 RP/0/RP0/CPU0:router(config-)# xconnect group A RP/0/RP0/CPU0:router(config--xc)# p2p xconnect name Enters a name f the point-to-point cross-connect. Step 8 Step 9 RP/0/RP0/CPU0:router(config--xc)# p2p rtrx_to_rtry RP/0/RP0/CPU0:router(config--xc-p2p)# neighb ip-address pw-id number RP/0/RP0/CPU0:router(config--xc-p2p)# neighb pw-id 2 RP/0/RP0/CPU0:router(config--xc-p2p-pw)# pw-class class_1 Configures the pseudowire segment f the cross-connect. Configures the pseudowire class name. RP/0/RP0/CPU0:router(config--xc-p2p-pw)# pw-class class_1 RP/0/RP0/CPU0:router(config--xc-p2p-pw)# VPC-68

25 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 10 Step 11 Command Action backup neighb ip-address pw-id number RP/0/RP0/CPU0:router(config--xc-p2p-pw)# backup neighb pw-id 2 RP/0/RP0/CPU0:router(config--xc-p2p-pw-backup)# end RP/0/RP0/CPU0:router(config--xc-p2p-pw-backup)# end RP/0/RP0/CPU0:router(config--xc-p2p-pw-backup)# Configures the backup pseudowire f the point-to-point neighb. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. VPC-69

26 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Associating Members with a Bridge Domain SUMMARY STEPS DETAILED STEPS After a bridge domain is created, perfm this task to assign interfaces to the bridge domain. The following types of bridge pts are associated with a bridge domain: Ethernet and VLAN VFI 1. configure bridge group bridge-group-name 4. bridge-domain bridge-domain-name 5. interface type interface-path-id 6. static-mac-address {MAC-address} 7. end Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge-group-name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain-name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. VPC-70

27 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 5 Step 6 Step 7 Command Action interface type interface-path-id RP/0/RP0/CPU0:router(config--bg-bd)# interface GigabitEthernet 0/4/0/0 RP/0/RP0/CPU0:router(config--bg-bd-ac)# static-mac-address {MAC-address} RP/0/RP0/CPU0:router(config--bg-bd-ac)# static-mac-address end RP/0/RP0/CPU0:router(config--bg-bd-ac)# end RP/0/RP0/CPU0:router(config--bg-bd-ac)# Enters interface configuration mode and adds an interface to a bridge domain that allows packets to be fwarded and received from other interfaces that are part of the same bridge domain. Configures the static MAC address to associate a remote MAC address with a pseudowire any other bridge interface. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. VPC-71

28 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Configuring Bridge Domain Parameters SUMMARY STEPS DETAILED STEPS To configure the bridge domain parameters, associate the following parameters with a bridge domain: Maximum transmission unit (MTU) Specifies that all members of a bridge domain have the same MTU. The bridge domain member with a different MTU size is not used by the bridge domain even though it is still associated with a bridge domain. Flooding Enables disables flooding on the bridge domain. By default, flooding is enabled. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. flooding disable 6. mtu bytes 7. end Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters configuration mode. Step 3 Step 4 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters bridge group bridge domain configuration mode. VPC-72

29 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 5 Step 6 Step 7 Command Action flooding disable RP/0/RP0/CPU0:router(config--bg-bd)# flooding disable mtu bytes RP/0/RP0/CPU0:router(config--bg-bd)# mtu 1000 end RP/0/RP0/CPU0:router(config--bg-bd)# end RP/0/RP0/CPU0:router(config--bg-bd)# Configures flooding f traffic at the bridge domain level at the bridge pt level. Adjusts the maximum packet size maximum transmission unit (MTU) size f the bridge domain. Use the bytes argument to specify the MTU size, in bytes. The range is from 64 to Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Disabling a Bridge Domain SUMMARY STEPS Perfm this task to disable a bridge domain. When a bridge domain is disabled, all VFIs that are associated with the bridge domain are disabled. You are still able to attach detach members to the bridge domain and the VFIs that are associated with the bridge domain. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. shutdown VPC-73

30 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services 6. end DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge-group-name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain-name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters bridge group bridge domain configuration mode. VPC-74

31 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 5 Step 6 Command Action shutdown RP/0/RP0/CPU0:router(config--bg-bd)# end RP/0/RP0/CPU0:router(config--bg-bd)# end RP/0/RP0/CPU0:router(config--bg-bd)# Shuts down a bridge domain to bring the bridge and all attachment circuits and pseudowires under it to admin down state. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Configuring a Layer 2 Virtual Fwarding Instance These topics describe how to configure a Layer 2 virtual fwarding instance (VFI): Adding the Virtual Fwarding Instance Under the Bridge Domain, page VPC-76 Associating Pseudowires with the Virtual Fwarding Instance, page VPC-77 Associating a Virtual Fwarding Instance to a Bridge Domain, page VPC-79 Attaching Pseudowire Classes to Pseudowires, page VPC-81 Configuring Any Transpt over Multiprotocol Pseudowires By Using Static Labels, page VPC-83 Disabling a Virtual Fwarding Instance, page VPC-85 VPC-75

32 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Adding the Virtual Fwarding Instance Under the Bridge Domain SUMMARY STEPS DETAILED STEPS Perfm this task to create a Layer 2 Virtual Fwarding Instance (VFI) on all provider edge devices under the bridge domain. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. vfi {vfi name} 6. end Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. VPC-76

33 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 5 Step 6 Command Action vfi {vfi name} RP/0/RP0/CPU0:router(config--bg-bd)# vfi v1 RP/0/RP0/CPU0:router(config--bg-bd-vfi)# end RP/0/RP0/CPU0:router(config--bg-bd-vfi-vpn)# end RP/0/RP0/CPU0:router(config--bg-bd-vfi-vpn)# Configures virtual fwarding interface (VFI) parameters and enters L2VPN bridge group bridge domain VFI configuration mode. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Associating Pseudowires with the Virtual Fwarding Instance SUMMARY STEPS After a VFI is created, perfm this task to associate one me pseudowires with the VFI. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. vfi {vfi name} 6. neighb A.B.C.D {pw-id value} 7. end VPC-77

34 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 Step 5 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# vfi {vfi name} RP/0/RP0/CPU0:router(config--bg-bd)# vfi v1 RP/0/RP0/CPU0:router(config--bg-bd-vfi)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Configures virtual fwarding interface (VFI) parameters and enters L2VPN bridge group bridge domain VFI configuration mode. VPC-78

35 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 6 Step 7 Command Action neighb A.B.C.D {pw-id value} RP/0/RP0/CPU0:router(config--bg-bd-vfi)# neighb pw-id 1000 RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# end RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# end RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# Adds an access pseudowire pt to a bridge domain a pseudowire to a bridge virtual fwarding interface (VFI). Use the A.B.C.D argument to specify the IP address of the cross-connect peer. Use the pw-id keywd to configure the pseudowire ID and ID value. The range is 1 to Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Associating a Virtual Fwarding Instance to a Bridge Domain Perfm this task to associate a VFI to be a member of a bridge domain. SUMMARY STEPS 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. vfi {vfi name} 6. neighb {A.B.C.D} {pw-id value} VPC-79

36 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services 7. static-mac-address {MAC address} 8. end DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 Step 5 Step 6 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# vfi vfi name RP/0/RP0/CPU0:router(config--bg-bd)# vfi v1 RP/0/RP0/CPU0:router(config--bg-bd-vfi)# neighb A.B.C.D {pw-id value} RP/0/RP0/CPU0:router(config--bg-bd-vfi)# neighb pw-id 1000 RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Configures virtual fwarding interface (VFI) parameters and enters L2VPN bridge group bridge domain VFI configuration mode. Adds an access pseudowire pt to a bridge domain a pseudowire to a bridge virtual fwarding interface (VFI). Use the A.B.C.D argument to specify the IP address of the cross-connect peer. Use the pw-id keywd to configure the pseudowire ID and ID value. The range is 1 to VPC-80

37 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 7 Step 8 Command Action static-mac-address {MAC address} RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# static-mac-address end RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# end RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# Configures the static MAC address to associate a remote MAC address with a pseudowire any other bridge interface. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Attaching Pseudowire Classes to Pseudowires SUMMARY STEPS Perfm this task to attach a pseudowire class to a pseudowire. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. vfi {vfi name} 6. neighb {A.B.C.D} {pw-id value} 7. pw-class {class name} 8. end VPC-81

38 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 Step 5 Step 6 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# vfi {vfi name} RP/0/RP0/CPU0:router(config--bg-bd)# vfi v1 RP/0/RP0/CPU0:router(config--bg-bd-vfi)# neighb {A.B.C.D} {pw-id value} RP/0/RP0/CPU0:router(config--bg-bd-vfi)# neighb pw-id 1000 RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Configures virtual fwarding interface (VFI) parameters and enters L2VPN bridge group bridge domain VFI configuration mode. Adds an access pseudowire pt to a bridge domain a pseudowire to a bridge virtual fwarding interface (VFI). Use the A.B.C.D argument to specify the IP address of the cross-connect peer. Use the pw-id keywd to configure the pseudowire ID and ID value. The range is 1 to VPC-82

39 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 7 Step 8 Command Action pw-class {class name} RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# pw-class canada end RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# end RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# Configures the pseudowire class template name to use f the pseudowire. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Configuring Any Transpt over Multiprotocol Pseudowires By Using Static Labels SUMMARY STEPS Perfm this task to configure the Any Transpt over Multiprotocol (AToM) pseudowires by using the static labels. A pseudowire becomes a static AToM pseudowire by setting the MPLS static labels to local and remote. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. vfi {vfi name} 6. neighb {A.B.C.D} {pw-id value} VPC-83

40 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services 7. mpls static label {local value} {remote value} 8. end DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 Step 5 Step 6 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# vfi {vfi name} RP/0/RP0/CPU0:router(config--bg-bd)# vfi v1 RP/0/RP0/CPU0:router(config--bg-bd-vfi)# neighb {A.B.C.D} {pw-id value} RP/0/RP0/CPU0:router(config--bg-bd-vfi)# neighb pw-id 1000 RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Configures virtual fwarding interface (VFI) parameters and enters L2VPN bridge group bridge domain VFI configuration mode. Adds an access pseudowire pt to a bridge domain a pseudowire to a bridge virtual fwarding interface (VFI). Use the A.B.C.D argument to specify the IP address of the cross-connect peer. Use the pw-id keywd to configure the pseudowire ID and ID value. The range is 1 to VPC-84

41 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 7 Step 8 Command Action mpls static label {local value} {remote value} RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# mpls static label local 800 remote 500 end RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# end RP/0/RP0/CPU0:router(config--bg-bd-vfi-pw)# Configures the MPLS static labels and the static labels f the access pseudowire configuration. You can set the local and remote pseudowire labels. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Disabling a Virtual Fwarding Instance SUMMARY STEPS Perfm this task to disable a VFI. When a VFI is disabled, all the previously established pseudowires that are associated with the VFI are disconnected. LDP advertisements are sent to withdraw the MAC addresses that are associated with the VFI. However, you can still attach detach attachment circuits with a VFI after a shutdown. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. vfi {vfi name} 6. shutdown VPC-85

42 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services 7. end 8. show bridge-domain [detail] DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 Step 5 Step 6 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# vfi {vfi name} RP/0/RP0/CPU0:router(config--bg-bd)# vfi v1 RP/0/RP0/CPU0:router(config--bg-bd-vfi)# shutdown Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Configures virtual fwarding interface (VFI) parameters and enters L2VPN bridge group bridge domain VFI configuration mode. Disables the virtual fwarding interface (VFI). RP/0/RP0/CPU0:router(config--bg-bd-vfi)# shutdown VPC-86

43 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 7 Step 8 Command Action end RP/0/RP0/CPU0:router(config--bg-bd-vfi)# end RP/0/RP0/CPU0:router(config--bg-bd-vfi)# show bridge-domain [detail] RP/0/RP0/CPU0:router# show bridge-domain detail Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Displays the state of the VFI. F example, if you shut down the VFI, the VFI is shown as shut down under the bridge domain. Configuring the MAC Address-related Parameters These topics describe how to configure the MAC address-related parameters: Configuring the MAC Address Source-based Learning, page VPC-88 Disabling the MAC Address Withdrawal, page VPC-90 Configuring the MAC Address Limit, page VPC-93 Configuring the MAC Address Aging, page VPC-95 Disabling MAC Flush at the Bridge Pt Level, page VPC-98 The MAC table attributes are set f the bridge domains. VPC-87

44 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Configuring the MAC Address Source-based Learning SUMMARY STEPS DETAILED STEPS Perfm this task to configure the MAC address source-based learning. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. mac 6. learning disable 7. end 8. show bridge-domain [detail] Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 Step 5 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# mac RP/0/RP0/CPU0:router(config--bg-bd)# mac RP/0/RP0/CPU0:router(config--bg-bd-mac)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Enters L2VPN bridge group bridge domain MAC configuration mode. VPC-88

45 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 6 Step 7 Step 8 Command Action learning disable RP/0/RP0/CPU0:router(config--bg-bd-mac)# learning disable end RP/0/RP0/CPU0:router(config--bg-bd-mac)# end RP/0/RP0/CPU0:router(config--bg-bd-mac)# show bridge-domain [detail] RP/0/RP0/CPU0:router# show bridge-domain detail Overrides the MAC learning configuration of a parent bridge sets the MAC learning configuration of a bridge. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Displays the details that the MAC address source-based learning is disabled on the bridge. VPC-89

46 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Disabling the MAC Address Withdrawal SUMMARY STEPS DETAILED STEPS Perfm this task to disable the MAC address withdrawal f a specified bridge domain. 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. mac 6. withdraw { access-pw disable disable } 7. end 8. show bridge-domain [detail] Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 Step 5 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# mac RP/0/RP0/CPU0:router(config--bg-bd)# mac RP/0/RP0/CPU0:router(config--bg-bd-mac)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Enters L2VPN bridge group bridge domain MAC configuration mode. VPC-90

47 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 6 withdraw { access-pw disable disable } Step 7 Step 8 Command Action RP/0/RP0/CPU0:router(config--bg-bd-mac)# withdraw access-pw disable end RP/0/RP0/CPU0:router(config--bg-bd-mac)# end RP/0/RP0/CPU0:router(config--bg-bd-mac)# show bridge-domain [detail] P/0/RP0/CPU0:router# show bridge-domain detail Disables the MAC address withdrawal f the specified bridge domain. Note Mac address withdrawal is generated when the access pseudowire is not operational. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Displays detailed sample output to specify that the MAC address withdrawal is enabled. In addition, the sample output displays the number of MAC withdrawal messages that are sent over received from the pseudowire. The following sample output shows the MAC address withdrawal fields: RP/0/0/CPU0:router# show bridge-domain detail Bridge group: siva_group, bridge-domain: siva_bd, id: 0, state: up, ShgId: 0, MSTi: 0 MAC Learning: enabled MAC withdraw: enabled Flooding: Broadcast & Multicast: enabled Unknown Unicast: enabled MAC address aging time: 300 s Type: inactivity MAC address limit: 4000, Action: none, Notification: syslog MAC limit reached: no Security: disabled DHCPv4 Snooping: disabled MTU: 1500 MAC Filter: Static MAC addresses: ACs: 1 (1 up), VFIs: 1, PWs: 2 (1 up) VPC-91

48 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services List of ACs: AC: GigabitEthernet0/4/0/1, state is up Type Ethernet MTU 1500; XC ID 0x ; interwking none; MSTi 0 (unprotected) MAC Learning: enabled MAC withdraw: disabled Flooding: Broadcast & Multicast: enabled Unknown Unicast: enabled MAC address aging time: 300 s Type: inactivity MAC address limit: 4000, Action: none, Notification: syslog MAC limit reached: no Security: disabled DHCPv4 Snooping: disabled Static MAC addresses: Statistics: packet totals: receive 6,send 0 byte totals: receive 360,send 4 List of Access PWs: List of VFIs: VFI siva_vfi PW: neighb , PW ID 1, state is down ( local ready ) PW class not set, XC ID 0xff Encapsulation MPLS, protocol LDP PW type Ethernet, control wd enabled, interwking none PW backup disable delay 0 sec Sequencing not set MPLS Local Remote Label unknown Group ID 0x0 0x0 Interface siva/vfi unknown MTU 1500 unknown Control wd enabled unknown PW type Ethernet unknown Create time: 19/11/ :20:14 (00:25:25 ago) Last time status changed: 19/11/ :44:00 (00:01:39 ago) MAC withdraw message: send 0 receive 0 VPC-92

49 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Configuring the MAC Address Limit Perfm this task to configure the parameters f the MAC address limit. Note MAC Address Limit action is suppted only on the ACs and not on the ce pseudowires. SUMMARY STEPS 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. mac 6. limit 7. maximum {value} 8. action {flood no-flood shutdown} 9. notification {both none trap} 10. end 11. show bridge-domain [detail] DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. VPC-93

50 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command Action bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# mac RP/0/RP0/CPU0:router(config--bg-bd)# mac RP/0/RP0/CPU0:router(config--bg-bd-mac)# limit RP/0/RP0/CPU0:router(config--bg-bd-mac)# limit RP/0/RP0/CPU0:router(config--bg-bd-mac-limit)# maximum {value} RP/0/RP0/CPU0:router(config--bg-bd-mac-limit)# maximum 5000 action {flood no-flood shutdown} RP/0/RP0/CPU0:router(config--bg-bd-mac-limit)# action flood notification {both none trap} RP/0/RP0/CPU0:router(config--bg-bd-mac-limit)# notification both Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Enters L2VPN bridge group bridge domain MAC configuration mode. Sets the MAC address limit f action, maximum, and notification and enters L2VPN bridge group bridge domain MAC limit configuration mode. Configures the specified action when the number of MAC addresses learned on a bridge is reached. Configures the bridge behavi when the number of learned MAC addresses exceed the MAC limit configured. Specifies the type of notification that is sent when the number of learned MAC addresses exceeds the configured limit. VPC-94

51 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 10 Step 11 Command Action end RP/0/RP0/CPU0:router(config--bg-bd-mac-limit)# end RP/0/RP0/CPU0:router(config--bg-bd-mac-limit)# show bridge-domain [detail] Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Displays the details about the MAC address limit. RP/0/RP0/CPU0:router# show bridge-domain detail Configuring the MAC Address Aging Perfm this task to configure the parameters f MAC address aging. SUMMARY STEPS 1. configure bridge group bridge group name 4. bridge-domain bridge-domain name 5. mac 6. aging 7. time {seconds} 8. type {absolute inactivity} VPC-95

52 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services 9. end 10. show bridge-domain [detail] DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 Step 5 Step 6 Step 7 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge group name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# mac RP/0/RP0/CPU0:router(config--bg-bd)# mac RP/0/RP0/CPU0:router(config--bg-bd-mac)# aging RP/0/RP0/CPU0:router(config--bg-bd-mac)# aging RP/0/RP0/CPU0:router(config--bg-bd-mac-aging)# time {seconds} RP/0/RP0/CPU0:router(config--bg-bd-mac-aging)# time 300 Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters L2VPN bridge group bridge domain configuration mode. Enters L2VPN bridge group bridge domain MAC configuration mode. Enters the MAC aging configuration submode to set the aging parameters such as time and type. Configures the maximum aging time. Use the seconds argument to specify the maximum age of the MAC address table entry. The range is from 300 to seconds. Aging time is counted from the last time that the switch saw the MAC address. The default value is 300 seconds. VPC-96

53 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 8 Step 9 Step 10 Command Action type {absolute inactivity} RP/0/RP0/CPU0:router(config--bg-bd-mac-aging)# type absolute end RP/0/RP0/CPU0:router(config--bg-bd-mac-aging)# end RP/0/RP0/CPU0:router(config--bg-bd-mac-aging)# show bridge-domain [detail] Configures the type f MAC address aging. Use the absolute keywd to configure the absolute aging type. Use the inactivity keywd to configure the inactivity aging type. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Displays the details about the aging fields. RP/0/RP0/CPU0:router# show bridge-domain detail VPC-97

54 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Disabling MAC Flush at the Bridge Pt Level SUMMARY STEPS DETAILED STEPS Perfm this task to disable the MAC flush at the bridge domain level. You can disable the MAC flush at the bridge domain, bridge pt access pseudowire levels. By default, the MACs learned on a specific pt are immediately flushed, when that pt becomes nonfunctional. 1. configure bridge group bridge-group name 4. bridge-domain bridge-domain name 5. mac 6. pt-down flush disable 7. end Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 RP/0/RP0/CPU0:router(config)# RP/0/RP0/CPU0:router(config-)# bridge group bridge-group-name RP/0/RP0/CPU0:router(config-)# bridge group csco RP/0/RP0/CPU0:router(config--bg)# bridge-domain bridge-domain-name RP/0/RP0/CPU0:router(config--bg)# bridge-domain abc RP/0/RP0/CPU0:router(config--bg-bd)# Creates a bridge group so that it can contain bridge domains and then assigns netwk interfaces to the bridge domain. Establishes a bridge domain and enters bridge group bridge domain configuration mode. VPC-98

55 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 5 Step 6 Step 7 Command Action mac RP/0/RP0/CPU0:router(config--bg-bd)# mac RP/0/RP0/CPU0:router(config--bg-bd-mac)# pt-down flush disable RP/0/RP0/CPU0:router(config--bg-bd-mac)# pt-down flush disable end RP/0/RP0/CPU0:router(config--bg-bd-mac)# end RP/0/RP0/CPU0:router(config--bg-bd-mac)# Enters bridge group bridge domain MAC configuration mode. Disables MAC flush when the bridge pt becomes nonfunctional. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. VPC-99

56 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Configuring VPLS with BGP Autodiscovery and Signaling SUMMARY STEPS DETAILED STEPS Perfm this task to configure BGP-based autodiscovery and signaling. 1. configure bridge group bridge-group-name 4. bridge-domain bridge-domain-name 5. vfi {vfi-name} 6. vpn-id vpn-id 7. autodiscovery bgp 8. rd {as-number:nn ip-address:nn auto} 9. route-target {as-number:nn ip-address:nn expt impt} 10. route-target impt {as-number:nn ip-address:nn} 11. route-target expt {as-number:nn ip-address:nn} 12. signaling-protocol bgp 13. ve-id {number} 14. ve-range {number} 15. end Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 RP/0/RP0/CPU0:router(config)# bridge group bridge-group-name Enters configuration mode f the named bridge group. RP/0/RP0/CPU0:router(config-)# bridge group metroa VPC-100

57 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 4 Command Action bridge-domain bridge-domain-name Enters configuration mode f the named bridge domain. Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 RP/0/RP0/CPU0:router(config--bg)# bridge-domain east vfi {vfi-name} RP/0/RP0/CPU0:router(config--bg-bd)# vfi vfi-east vpn-id vpn-id RP/0/RP0/CPU0:router(config--bg-bd-vfi)# vpn-id 100 autodiscovery bgp RP/0/RP0/CPU0:router(config--bg-bd-vfi)# autodiscovery bgp rd {as-number:nn ip-address:nn auto} RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad)# rd auto route-target {as-number:nn ip-address:nn} RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad)# route-target 500:99 route-target impt {as-number:nn ip-address:nn} RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad)# route-target impt 200:20 route-target expt {as-number:nn ip-address:nn} RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad)# route-target expt 100:10 Enters virtual fwarding instance (VFI) configuration mode. Specifies the identifier f the VPLS service. The VPN ID has to be globally unique within a PE router; that is the same VPN ID cannot exist in multiple VFIs on the same PE router. In addition, a VFI can have only one VPN ID. Enters BGP autodiscovery configuration mode where all BGP autodiscovery parameters are configured. This command is not provisioned to BGP until the VPN ID and the signaling protocol is configured. Specifies the route distinguisher (RD) under the VFI. The RD is used in the BGP NLRI to identify VFI. Only one RD can be configured f each VFI, and except f rd auto, the same RD cannot be configured in multiple VFIs on the same PE. When rd auto is configured, the RD value is: {BGP Router ID}:{16 bits auto-generated unique index}. Specifies the route target (RT) f the VFI. At least one impt and one expt route target ( just one route target with both roles) need to be configured in each PE in der to establish BGP autodiscovery between PEs. If no expt impt keywd is specified, it means that the RT is both impt and expt. A VFI can have multiple expt impt RTs. However, the same RT is not allowed in multiple VFIs in the same PE. Specifies the impt route target f the VFI. The PE compares impt route target with the RT in the received NLRI: the RT in the received NLRI must match the impt RT to determine that the RTs belong to the same VPLS service. Specifies the expt route target f the VFI. Expt route target is the RT that will be in the NLRI advertised to other PEs. VPC-101

58 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Step 12 Step 13 Step 14 Step 15 Command Action signaling-protocol bgp RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad)# signaling-protocol bgp ve-id {number} RP/0/RP0/CPU0:router(config--bg-bd-vfi-adsig)# ve-id 10 ve-range {number} RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad-si g)# ve-range 40 end RP0RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad - sig)# end RP0RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad - sig)# Specifies the signaling protocol to be used to manage the pseudowires. Specifies the local PE identifier f the VFI f VPLS configuration. The VE ID identifies a VFI within a VPLS service. This means that VFIs in the same VPLS service cannot share the same VE ID. The scope of the VE ID is only within a bridge domain. Therefe, VFIs in different bridge domains within a PE can still use the same VE ID. Overrides the minimum size of VPLS edge (VE) blocks. The default minimum size is 10. Any configured VE range must be higher than 10. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. Configuring VPLS with BGP Autodiscovery and LDP Signaling Perfm this task to configure BGP-based Autodiscovery and signaling. SUMMARY STEPS 1. configure 2. VPC-102

59 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services 3. route-id 4. bridge group bridge-group-name 5. bridge-domain bridge-domain-name 6. vfi {vfi-name} 7. autodiscovery bgp 8. vpn-id vpn-id 9. rd {as-number:nn ip-address:nn auto} 10. route-target {as-number:nn ip-address:nn expt impt} 11. route-target impt {as-number:nn ip-address:nn} 12. route-target expt {as-number:nn ip-address:nn} 13. signaling-protocol ldp 14. vpls-id {as-number:nn ip-address:nn} 15. end DETAILED STEPS Step 1 Command Action configure Enters global configuration mode. Step 2 RP/0/RP0/CPU0:router# configure Enters L2VPN configuration mode. Step 3 Step 4 RP/0/RP0/CPU0:router(config)# router-id ip-address RP/0/RP0/CPU0:router(config-)# router-id bridge group bridge-group-name Specifies a unique Layer 2 (L2) router ID f the provider edge (PE) router. The router ID must be configured f LDP signaling, and is used as the L2 router ID in the BGP NLRI, SAII (local L2 Router ID) and TAII (remote L2 Router ID). Any arbitrary value in the IPv4 address fmat is acceptable. Note Each PE must have a unique L2 router ID. This CLI is optional, because a PE automatically generates a L2 router ID using the LDP router ID. Enters configuration mode f the named bridge group. RP/0/RP0/CPU0:router(config-)# bridge group metroa VPC-103

60 How to Implement Virtual Private LAN Services Implementing Virtual Private LAN Services Step 5 Command Action bridge-domain bridge-domain-name Enters configuration mode f the named bridge domain. Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 RP/0/RP0/CPU0:router(config--bg)# bridge-domain east vfi {vfi-name} RP/0/RP0/CPU0:router(config--bg-bd)# vfi vfi-east vpn-id vpn-id RP/0/RP0/CPU0:router(config--bg-bd-vfi)# vpn-id 100 autodiscovery bgp RP/0/RP0/CPU0:router(config--bg-bd-vfi)# autodiscovery bgp rd {as-number:nn ip-address:nn auto} RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad)# rd auto route-target {as-number:nn ip-address:nn} RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad)# route-target 500:99 route-target impt {as-number:nn ip-address:nn} RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad)# route-target impt 200:20 route-target expt {as-number:nn ip-address:nn} RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad)# route-target expt 100:10 Enters virtual fwarding instance (VFI) configuration mode. Specifies the identifier f the VPLS service. The VPN ID has to be globally unique within a PE router; that is the same VPN ID cannot exist in multiple VFIs on the same PE router. In addition, a VFI can have only one VPN ID. Enters BGP autodiscovery configuration mode where all BGP autodiscovery parameters are configured. This command is not provisioned to BGP until the VPN ID and the signaling protocol is configured. Specifies the route distinguisher (RD) under the VFI. The RD is used in the BGP NLRI to identify VFI. Only one RD can be configured f each VFI, and except f rd auto, the same RD cannot be configured in multiple VFIs on the same PE. When rd auto is configured, the RD value is: {BGP Router ID}:{16 bits auto-generated unique index}. Specifies the route target (RT) f the VFI. At least one impt route target and one expt route target ( just one route target with both roles) need to be configured in each PE in der to establish BGP autodiscovery between PEs. If no expt impt keywd is specified, it means that the RT is both impt and expt. A VFI can have multiple expt impt RTs. However, the same RT is not allowed in multiple VFIs in the same PE. Specifies the impt route target f the VFI. The PE compares the impt route target with the RT in the received NLRI: the RT in the received NLRI must match the impt RT to determine that the RTs belong to the same VPLS service. Specifies the expt route target f the VFI. Expt route target is the RT that will be in the NLRI advertised to other PEs. VPC-104

61 Implementing Virtual Private LAN Services How to Implement Virtual Private LAN Services Step 13 Step 14 Step 15 Command Action signaling-protocol ldp RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad)# signaling-protocol ldp vpls-id {as-number:nn ip-address:nn} RP/0/RP0/CPU0:router(config--bg-bd-vfi-adsig)# vpls-id 10:20 end RP0RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad -sig)# end RP0RP/0/RP0/CPU0:router(config--bg-bd-vfi-ad -sig)# Enables LDP signaling, and enters the LDP signaling configuration submode where LDP signaling parameters are configured. Specifies VPLS ID which identifies the VPLS domain during signaling. This command is optional in all PEs that are in the same Autonomous System (that is, PEs that share the same ASN) because a default VPLS ID is automatically generated using BGP's ASN and the configured VPN ID (that is, the default VPLS ID equals ASN:VPN-ID). If an ASN of 4 bytes is used, the lower two bytes of the ASN are used to build the VPLS ID. In case of InterAS, the VPLS ID must be explicitly configured. Only one VPLS ID can be configured f each VFI, and the same VPLS ID cannot be used f multiple VFIs. Saves configuration When you issue the end command, the system prompts you to changes: Unted changes found, them befe exiting(yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without ting the configuration Entering cancel leaves the router in the current configuration session without exiting ting the configuration Use the command to save the configuration changes to the running configuration file and remain within the configuration session. VPC-105

62 Configuration Examples f Virtual Private LAN Services Implementing Virtual Private LAN Services Configuration Examples f Virtual Private LAN Services This section includes the following configuration examples: Configuing a Pseudowire: Example, page VPC-106 Configuring an Access Pseudowire: Example, page VPC-106 Virtual Private LAN Services Configuration f Provider Edge-to-Provider Edge: Example, page VPC-106 Virtual Private LAN Services Configuration f Provider Edge-to-Customer Edge: Example, page VPC-107 Configuring Backup Disable Delay: Example, page VPC-108 Disabling MAC Flush: Examples, page VPC-108 H-VPLS Configuration: Examples, page VPC-109 Configuring VPLS with BGP Autodiscovery and Signaling: Example, page VPC-111 Configuing a Pseudowire: Example This example shows how to configure a pseudowire: configure bridge group bridge group1 bridge-domain bridge-domain my_domain vfi vfi1 exit neighb pw-id 100! Configuring an Access Pseudowire: Example This example shows how to configure access pseudowire: configure bridge group bridge group1 bridge-domain bridge-domain domain1 interface GigabitEthernet 0/1/0/2 neighb pw-id 200! Virtual Private LAN Services Configuration f Provider Edge-to-Provider Edge: Example These configuration examples show how to create a Layer 2 VFI with a full-mesh of participating VPLS provider edge (PE) nodes. The following configuration example shows how to configure PE 1: configure bridge group 1 VPC-106

63 Implementing Virtual Private LAN Services Configuration Examples f Virtual Private LAN Services bridge-domain PE1-VPLS-A GigabitEthernet0/0---AC exit vfi 1 neighb pw-id 1---PW1 neighb pw-id 1---PW2!! interface loopback 0 ipv4 address The following configuration example shows how to configure PE 2: configure bridge group 1 bridge-domain PE2-VPLS-A interface GigabitEthernet0/0---AC exit vfi 1 neighb pw-id 1---PW1 neighb pw-id 1---PW2!! interface loopback 0 ipv4 address The following configuration example shows how to configure PE 3: configure bridge group 1 bridge-domain PE3-VPLS-A interface GigabitEthernet0/0---AC exit vfi 1 neighb pw-id 1---PW1 neighb pw-id 1---PW2!! interface loopback 0 ipv4 address Virtual Private LAN Services Configuration f Provider Edge-to-Customer Edge: Example The following configuration shows how to configure VPLS f a PE-to-CE nodes: configure interface GigabitEthernet0/0 l2transpt---ac interface exit no ipv4 address no ipv4 directed-broadcast negotiation auto no cdp enable end VPC-107

64 Configuration Examples f Virtual Private LAN Services Implementing Virtual Private LAN Services Configuring Backup Disable Delay: Example The following example shows how a backup delay is configured f point-to-point PW where the backup disable delay is 50 seconds: pw-class class_1 backup disable delay 20 exit xconnect group_a p2p rtrx_to_rtry neighb pw-id 2 pw-class class_1 backup neighb pw- id 5 The following example shows how a backup delay is configured f point-to-point PW where the backup disable delay is never: pw-class class_1 backup disable never exit xconnect group_a p2p rtrx_to_rtry neighb pw-id 2 pw-class class_1 backup neighb pw-id 5 Disabling MAC Flush: Examples You can disable the MAC flush at the following levels: bridge domain bridge pt (attachment circuit (AC)) access pseudowire (PW) The following example shows how to disable the MAC flush at the bridge domain level: configure bridge-group group1 bridge-domain domain1 mac pt-down flush disable end The following example shows how to disable the MAC flush at the bridge pt level: configure bridge-group group1 bridge-domain domain1 interface POS 0/1/0/1 mac pt-down flush disable end VPC-108

65 Implementing Virtual Private LAN Services Configuration Examples f Virtual Private LAN Services The following example shows how to disable the MAC flush at the access pseudowire level: configure bridge-group group1 bridge-domain domain1 neighb pw-id 1000 mac pt-down flush disable end H-VPLS Configuration: Examples This example shows how to configure hierarchical VPLS (H-VPLS). All examples in this section are based on the following topology where N-PE1 is the H-VPLS Node: VPLS with QinQ QinAny: Example Global Interface Configuration at N-PE1: interface GigabitEthernet0/0/0/0 dot1q tunneling ethertype 0x9200! interface GigabitEthernet0/0/0/1 dot1q tunneling ethertype 0x9100! interface GigabitEthernet0/0/0/0.1 l2transpt dot1q vlan 20 21! interface GigabitEthernet0/0/0/1.1 l2transpt dot1q vlan 10 any L2VPN Configuration at N-PE1: bridge group g1 bridge-domain d1 interface GigabitEthernet0/0/0/0.1! interface GigabitEthernet0/0/0/1.1 VPC-109

Configure Multipoint Layer 2 Services

Configure Multipoint Layer 2 Services This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services, also called Virtual Private LAN Services (VPLS). Note VPLS supports Layer 2 VPN technology and

More information

Configure L2VPN Autodiscovery and Signaling

Configure L2VPN Autodiscovery and Signaling This chapter describes the L2VPN Autodiscovery and Signaling feature which enables the discovery of remote Provider Edge (PE) routers and the associated signaling in order to provision the pseudowires.

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

Configuring Virtual Loopback and Null Interfaces on Cisco IOS XR Software

Configuring Virtual Loopback and Null Interfaces on Cisco IOS XR Software Configuring Virtual Loopback and Null Interfaces on Cisco IOS XR Software This module describes the configuration of loopback and null interfaces on routers suppting Cisco IOS XR software. Loopback and

More information

Configuring Bidirectional Forwarding Detection on Cisco IOS XR

Configuring Bidirectional Forwarding Detection on Cisco IOS XR Configuring Bidirectional Fwarding Detection on Cisco IOS XR Bidirectional fwarding detection (BFD) provides low-overhead, sht-duration detection of failures in the path between adjacent fwarding engines.

More information

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Finding Feature Information, page 1 Configuring VPLS, page 1 Configuring VPLS BGP-based Autodiscovery, page 17 Finding Feature

More information

Configuring Virtual Loopback and Null Interfaces on Cisco IOS XR Software

Configuring Virtual Loopback and Null Interfaces on Cisco IOS XR Software Configuring Virtual Loopback and Null Interfaces on Cisco IOS XR Software This module describes the configuration of loopback and null interfaces on the Cisco CRS Router. Loopback and null interfaces are

More information

Deploy VPLS. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by:

Deploy VPLS. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by: Deploy VPLS APNIC Technical Workshop October 23 to 25, 2017. Selangor, Malaysia Hosted by: Issue Date: [201609] Revision: [01] Acknowledgement Cisco Systems 2 VPLS Overview 3 Virtual Private LAN Service

More information

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling

More information

Configuring Routed Pseudowire and VPLS

Configuring Routed Pseudowire and VPLS Routed Pseudowire and VPLS feature routes Layer 3 traffic and Layer 2 frames for pseudowire connections between provider edge (PE) devices using Virtual Private LAN Services (VPLS) multipoint PE. Prerequisites

More information

Implementing MPLS Layer 3 VPNs

Implementing MPLS Layer 3 VPNs Implementing MPLS Layer 3 VPNs A Multiprotocol Label Switching (MPLS) Layer 3 Virtual Private Netwk (VPN) consists of a set of sites that are interconnected by means of an MPLS provider ce netwk. At each

More information

Implementing IEEE 802.1ah Provider Backbone Bridge

Implementing IEEE 802.1ah Provider Backbone Bridge Implementing IEEE 802.1ah Provider Backbone Bridge This module provides conceptual and configuration information for IEEE 802.1ah Provider Backbone Bridge on Cisco ASR 9000 Series Routers. The IEEE 802.1ah

More information

L2VPN Protocol-Based CLIs

L2VPN Protocol-Based CLIs The feature provides a set of processes and an improved infrastructure for developing and delivering Cisco IOS software on various Cisco platforms. This feature introduces new commands and modifies or

More information

H-VPLS N-PE Redundancy for MPLS Access

H-VPLS N-PE Redundancy for MPLS Access The feature enables two network provider edge (N-PE) devices to provide failover services to a user provider edge (U-PE) device in a hierarchical virtual private LAN service (H-VPLS). Having redundant

More information

Deploying MPLS L2VPN

Deploying MPLS L2VPN Deploying MPLS L2VPN Nurul Islam Roman (nurul@apnic.net) 1 Abstract This session covers the fundamental and advanced topics associated with the deployment of Layer 2 VPNs over an MPLS network. The material

More information

Configuring ARP on Cisco ASR 9000 Series Routers

Configuring ARP on Cisco ASR 9000 Series Routers Configuring ARP on Cisco ASR 9000 Series Routers Address resolution is the process of mapping netwk addresses to Media Access Control (MAC) addresses. This process is accomplished using the Address Resolution

More information

VPLS Autodiscovery: BGP Based

VPLS Autodiscovery: BGP Based First Published: February 19, 2007 Last Updated: February 19, 2007 VPLS Autodiscovery enables each Virtual Private LAN Service (VPLS) provider edge (PE) router to discover which other PE routers are part

More information

Implementing Layer 2 Access Lists

Implementing Layer 2 Access Lists Implementing Layer 2 Access Lists An Ethernet services access control list (ACL) consists of one me access control entries (ACE) that collectively define the Layer 2 netwk traffic profile. This profile

More information

Configure Virtual LANs in Layer 2 VPNs

Configure Virtual LANs in Layer 2 VPNs The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services to geographically disparate customer sites. A virtual local area network (VLAN) is a group of

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2

More information

Implementing Access Lists and Prefix Lists on Cisco ASR 9000 Series Routers

Implementing Access Lists and Prefix Lists on Cisco ASR 9000 Series Routers Implementing Access Lists and Prefix Lists on Cisco ASR 9000 Series Routers An access control list (ACL) consists of one me access control entries (ACE) that collectively define the netwk traffic profile.

More information

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN

Implementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing

More information

Configuring MPLS, MPLS VPN, MPLS OAM, and EoMPLS

Configuring MPLS, MPLS VPN, MPLS OAM, and EoMPLS CHAPTER 43 Configuring MPLS, MPLS VPN, MPLS OAM, and EoMPLS This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Cisco ME 3800X and ME 3600X

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring BGP Autodiscovery for LDP VPLS Release NCE0035 Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Implementing MPLS Forwarding

Implementing MPLS Forwarding All Multiprotocol Label Switching (MPLS) features require a core set of MPLS label management and forwarding services; the MPLS Forwarding Infrastructure (MFI) supplies these services. Feature History

More information

Cisco IOS XR MPLS Configuration Guide

Cisco IOS XR MPLS Configuration Guide Cisco IOS XR Software Release 3.7 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

Advanced Configuration and Modification of the Management Ethernet Interface on the Cisco ASR 9000 Series Router

Advanced Configuration and Modification of the Management Ethernet Interface on the Cisco ASR 9000 Series Router Advanced Configuration and Modification of the Management Ethernet Interface on the Cisco ASR 9000 Series Router This module describes the configuration of Management Ethernet interfaces on the Cisco ASR

More information

Operation Manual MPLS VLL. Table of Contents

Operation Manual MPLS VLL. Table of Contents Table of Contents Table of Contents... 1-1 1.1 MPLS VLL Overview... 1-2 1.1.1 Concepts in MPLS VLL... 1-2 1.1.2 Introduction to MPLS VLL... 1-2 1.1.3 Packet Forwarding... 1-3 1.1.4 Implementation... 1-4

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 About MPLS L2VPN 1 Comparison with traditional VPN 2 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration

More information

Free4Torrent. Free and valid exam torrent helps you to pass the exam with high score

Free4Torrent.   Free and valid exam torrent helps you to pass the exam with high score Free4Torrent http://www.free4torrent.com Free and valid exam torrent helps you to pass the exam with high score Exam : 642-889 Title : Implementing Cisco Service Provider Next-Generation Egde Network Services

More information

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note White Paper Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services Introduction and Application Note Last Updated: 5/2014 Ethernet VPN (EVPN)

More information

BGP Support for the L2VPN Address Family

BGP Support for the L2VPN Address Family BGP support for the Layer 2 Virtual Private Network (L2VPN) address family introduces a BGP-based autodiscovery mechanism to distribute L2VPN endpoint provisioning information. BGP uses a separate L2VPN

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 Overview 1 Comparison with traditional VPN 1 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration task list 4 Configuring

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring VPLS Multihoming Using Autodiscovery (FEC 129) Release NCE0072 Modified: 2016-10-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA

More information

Implementing BGP on Cisco ASR 9000 Series Routers

Implementing BGP on Cisco ASR 9000 Series Routers Implementing BGP on Cisco ASR 9000 Series Routers Bder Gateway Protocol (BGP) is an Exteri Gateway Protocol (EGP) that allows you to create loop-free interdomain routing between autonomous systems. This

More information

Cisco. Maintaining Cisco Service Provider VPNs and MPLS Networks (MSPVM)

Cisco. Maintaining Cisco Service Provider VPNs and MPLS Networks (MSPVM) Cisco 642-780 Maintaining Cisco Service Provider VPNs and MPLS Networks (MSPVM) Download Full Version : http://killexams.com/pass4sure/exam-detail/642-780 QUESTION: 56 Which command should be used to verify

More information

Configuring MPLS Transport Profile

Configuring MPLS Transport Profile CHAPTER 44 The Multiprotocol Label Switching (MPLS) Transport Profile (TP) enables you to create tunnels that provide the transport network service layer over which IP and MPLS traffic traverse. MPLS-TP

More information

Configuring 802.1Q VLAN Interfaces

Configuring 802.1Q VLAN Interfaces A VLAN is a group of devices on one or more LANs that are configured so that they can communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments.

More information

MPLS: Layer 2 VPNs, Configuration Guide, Cisco IOS Release 15S

MPLS: Layer 2 VPNs, Configuration Guide, Cisco IOS Release 15S First Published: November 08, 2011 Last Modified: March 29, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Introduction to Multi-Protocol Label

Introduction to Multi-Protocol Label Introduction to Multi-Protocol Label Switching (MPLS) Matthew Bocci, Alcatel-Lucent IP Division Agenda History of MPLS Standardisation MPLS Architecture Control Plane QoS and Traffic Engineering Protection

More information

Configuring ITU-T Y.1731 Fault Management Functions

Configuring ITU-T Y.1731 Fault Management Functions Configuring ITU-T Y.1731 Fault Management Functions First Published: October 20, 2008 Last Updated: February 5, 2011 The ITU-Y.1731 Fault Management Functions feature provides new functions f fault and

More information

MPLS Point-to-Multipoint Traffic Engineering Support for Static Pseudowires

MPLS Point-to-Multipoint Traffic Engineering Support for Static Pseudowires MPLS Point-to-Multipoint Traffic Engineering Support for Static Pseudowires The MPLS Point-to-Multipoint Traffic Engineering: Support for Static Pseudowires feature allows you to configure a point-to-multipoint

More information

Configuring Clear Channel SONET Controllers on the Cisco ASR 9000 Series Router

Configuring Clear Channel SONET Controllers on the Cisco ASR 9000 Series Router Configuring Clear Channel SONET Controllers on the Cisco ASR 9000 Series Router This module describes the configuration of clear channel SONET controllers on the Cisco ASR 9000 Series Router. SONET controller

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 Basic concepts of MPLS L2VPN 2 Implementation of MPLS L2VPN 2 MPLS L2VPN configuration task list 4 Configuring MPLS L2VPN 5 Configuring CCC MPLS

More information

ETHERNET Transport Service in Wide Area Network

ETHERNET Transport Service in Wide Area Network ETHERNET Transport Service in Wide Area Network Bertrand Duvivier 14 January 2005 1 Ethernet in WAN? Customer 1 Customer 2 Customer 2 Customer 3 Provider Customer 2 Customer 1 Customer 1 Customer 3 2 Why

More information

AToM (Any Transport over MPLS)

AToM (Any Transport over MPLS) I N D E X A AAL5 over MPLS operation, 459 460 configuration, 462 463 flowchart configuration, 461 PE router, 461 provider router, 461 verification, 463 465 AAL5 to VLAN Interworking, 515 517 AC (Attachment

More information

Configuring Serial Interfaces on the Cisco ASR 9000 Series Router

Configuring Serial Interfaces on the Cisco ASR 9000 Series Router Configuring Serial Interfaces on the Cisco ASR 9000 Series Router This module describes the configuration of serial interfaces on the Cisco ASR 9000 Series Router. Feature Histy f Configuring Serial Controller

More information

MC-LAG to VPLS Technology and Solution Overview

MC-LAG to VPLS Technology and Solution Overview CHAPTER 3 MC-LAG to VPLS Technology and Solution Overview Virtual Private LAN Service (VPLS) is an architecture that provides multipoint Ethernet LAN services, often referred to as Transparent LAN Services

More information

Module 11b MPLS VPLS Configuration Lab (LDP Manual)

Module 11b MPLS VPLS Configuration Lab (LDP Manual) APNIC MPLS Workshop Lab Module 11b MPLS VPLS Configuration Lab (LDP Manual) Objective: All the routers are pre-configured with basic interface, OSPF, BGP, MPLS Label Distribution Protocol (LDP) configuration

More information

VPLS configuration commands

VPLS configuration commands Contents VPLS configuration commands 1 car 1 description 1 display bgp vpls 2 display l2vpn fast-switch-group 7 display mac-address vsi 8 display mpls l2vpn fib ac vpls 9 display mpls l2vpn fib pw vpls

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information

L2 MPLS VPN (VPLS) Technology White Paper

L2 MPLS VPN (VPLS) Technology White Paper S9500 L2 MPLS VPN (VPLS) Technology White Paper L2 MPLS VPN (VPLS) Technology White Paper Keywords: MPLS, VPLS Abstract: MPLS technologies make it very easy to provide VPN services based on IP technologies

More information

Implementing MPLS VPNs over IP Tunnels

Implementing MPLS VPNs over IP Tunnels The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Network (L3VPN) services, over an IP core network, using L2TPv3 multipoint tunneling instead of MPLS. This allows L2TPv3 tunnels

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-780 Passing Score: 800 Time Limit: 120 min File Version: 9.6 http://www.gratisexam.com/ CertifyMe 642-780 Exam A QUESTION 1 The customer has an MPLS Layer 3 VPN service CE-A is not

More information

L2VPN Interworking. Finding Feature Information

L2VPN Interworking. Finding Feature Information Interworking is a transforming function that is required to interconnect two heterogeneous attachment circuits (ACs). Several types of interworking functions exist. The function that is used would depend

More information

Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0

Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0 Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0 First Published: 2017-06-22 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router

Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Ethernet virtual circuit (EVC) infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernet

More information

Carrier Ethernet Services

Carrier Ethernet Services CHAPTER 6 The following topics describe how you can use Cisco ANA to monitor Carrier Ethernet services. Supported Carrier Ethernet Technologies, page 6-1 VLANs, page 6-2 STP, page 6-5 Cisco REP, page 6-6

More information

BGP Support for the L2VPN Address Family

BGP Support for the L2VPN Address Family BGP Support for the L2VPN Address Family Last Updated: November 21, 2012 BGP support for the Layer 2 Virtual Private Network (L2VPN) address family introduces a BGP-based autodiscovery mechanism to distribute

More information

Module 11a MPLS VPWS Configuration Lab (LDP)

Module 11a MPLS VPWS Configuration Lab (LDP) APNIC MPLS Workshop Lab Module 11a MPLS VPWS Configuration Lab (LDP) Objective: All the routers are pre-configured with basic interface, OSPF, BGP, MPLS Label Distribution Protocol (LDP) configuration

More information

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution This feature lets you configure your carrier supporting carrier network to enable Border Gateway Protocol (BGP) to transport routes and Multiprotocol

More information

Ethernet Virtual Connections Configuration

Ethernet Virtual Connections Configuration An Ethernet Virtual Connection (EVC) is defined by the Metro-Ethernet Forum (MEF) as an association between two or more user network interfaces that identifies a point-to-point or multipoint-to-multipoint

More information

EVPN Virtual Private Wire Service (VPWS) Single Homed

EVPN Virtual Private Wire Service (VPWS) Single Homed EVPN Virtual Private Wire Service (VPWS) Single Homed EVPN-VPWS single homed is a BGP control plane solution for point-to-point services. It has the ability to forward traffic from or to one network to

More information

EVPN Virtual Private Wire Service (VPWS) Single Homed

EVPN Virtual Private Wire Service (VPWS) Single Homed EVPN Virtual Private Wire Service (VPWS) Single Homed Effective Release Cisco IOS XE 3.18, this feature is now supported on Cisco ASR 920 Series Aggregation Services Router, EVPN-VPWS single homed is a

More information

Configuring Pseudowire

Configuring Pseudowire This chapter provides information about configuring pseudowire features on the Cisco ASR 920 Series Router. Pseudowire Overview, on page 1 CEM Configuration, on page 2 CEM Configuration Guidelines and

More information

Ethernet Local Management Interface

Ethernet Local Management Interface This chapter provides conceptual and configuration information of the protocol., on page 1 E-LMI Communication, on page 1 E-LMI Operation, on page 2 Supported Functions, on page 3 Limitations, on page

More information

Configuring Traffic Mirroring

Configuring Traffic Mirroring This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release

More information

Configuring Traffic Mirroring

Configuring Traffic Mirroring This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release

More information

TRILL Transparent Transport over MPLS

TRILL Transparent Transport over MPLS TRILL Transparent Transport over MPLS draft-muks-trill-transport-over-mpls- 00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong Overview This draft covers two problems as follows. Providing

More information

Frame Relay over L2TPv3

Frame Relay over L2TPv3 The (FRoL2TPv3) feature enables Frame Relay switching over Layer 2 Tunnel Protocol Version 3 (L2TPv3). The feature works with like interfaces and disparate interfaces (L2VPN interworking). Finding Feature

More information

IPv6 Switching: Provider Edge Router over MPLS

IPv6 Switching: Provider Edge Router over MPLS Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4

More information

MPLS VPN Multipath Support for Inter-AS VPNs

MPLS VPN Multipath Support for Inter-AS VPNs The feature supports Virtual Private Network (VPN)v4 multipath for Autonomous System Boundary Routers (ASBRs) in the interautonomous system (Inter-AS) Multiprotocol Label Switching (MPLS) VPN environment.

More information

MPLS design. Massimiliano Sbaraglia

MPLS design. Massimiliano Sbaraglia MPLS design Massimiliano Sbaraglia - MPLS layer 2 VPN diagram flowchart - MPLS layer 2 VPN pseudowire VPWS diagram - MPLS layer 2 VPN VPLS diagram - MPLS layer 2 EVPN diagram - MPLS layer 3 VPN diagram

More information

MPLS VPN over mgre. Finding Feature Information. Last Updated: November 1, 2012

MPLS VPN over mgre. Finding Feature Information. Last Updated: November 1, 2012 MPLS VPN over mgre Last Updated: November 1, 2012 The MPLS VPN over mgre feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity

More information

Introduction to External Connectivity

Introduction to External Connectivity Before you begin Ensure you know about Programmable Fabric. Conceptual information is covered in the Introduction to Cisco Programmable Fabric and Introducing Cisco Programmable Fabric (VXLAN/EVPN) chapters.

More information

Configuring BGP: RT Constrained Route Distribution

Configuring BGP: RT Constrained Route Distribution Configuring BGP: RT Constrained Route Distribution BGP: RT Constrained Route Distribution is a feature that can be used by service providers in Multiprotocol Label Switching (MPLS) Layer 3 VPNs to reduce

More information

Contents. EVPN overview 1

Contents. EVPN overview 1 Contents EVPN overview 1 EVPN network model 1 MP-BGP extension for EVPN 2 Configuration automation 3 Assignment of traffic to VXLANs 3 Traffic from the local site to a remote site 3 Traffic from a remote

More information

Implementing Keychain Management oncisco IOS XR Software

Implementing Keychain Management oncisco IOS XR Software Implementing Keychain Management oncisco IOS XR Software This module describes how to implement keychain management on Cisco IOS XR software. Keychain management is a common method of authentication to

More information

Internet Engineering Task Force (IETF) Request for Comments: Alcatel-Lucent W. Luo January 2011

Internet Engineering Task Force (IETF) Request for Comments: Alcatel-Lucent W. Luo January 2011 Internet Engineering Task Force (IETF) Request for Comments: 6074 Category: Standards Track ISSN: 2070-1721 E. Rosen B. Davie Cisco Systems, Inc. V. Radoaca Alcatel-Lucent W. Luo January 2011 Provisioning,

More information

IEEE 802.1ah on Provider Backbone Bridges

IEEE 802.1ah on Provider Backbone Bridges IEEE 802.1ah on Provider Backbone Bridges First Published: November 25, 2009 Last Updated: February 8, 2011 The IEEE 802.1ah on Provider Backbone Bridges feature enables MAC-in-MAC tunneling on Ethernet

More information

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution This feature enables you to configure your carrier supporting carrier network to enable Border Gateway Protocol (BGP) to transport routes

More information

MPLS VPN Explicit Null Label Support with BGP. BGP IPv4 Label Session

MPLS VPN Explicit Null Label Support with BGP. BGP IPv4 Label Session MPLS VPN Explicit Null Label Support with BGP IPv4 Label Session The MPLS VPN Explicit Null Label Support with BGP IPv4 Label Session feature provides a method to advertise explicit null in a Border Gateway

More information

Internet Engineering Task Force (IETF) Request for Comments: F. Le Faucheur G. Heron Cisco Systems January 2015

Internet Engineering Task Force (IETF) Request for Comments: F. Le Faucheur G. Heron Cisco Systems January 2015 Internet Engineering Task Force (IETF) Request for Comments: 7436 Category: Historic ISSN: 2070-1721 H. Shah Cinea Corp. E. Rosen Juniper Networks F. Le Faucheur G. Heron Cisco Systems January 2015 IP-Only

More information

Configuring Point to Point Layer 2 Services

Configuring Point to Point Layer 2 Services This chapter provides conceptual and configuration information for point-to-point Layer 2 (L2) connectivity on Cisco NCS 4000 Series routers. Layer 2 Virtual Private Network Overview, page 2 Ethernet Virtual

More information

"Charting the Course...

Charting the Course... Description Course Summary This advanced bootcamp combines JMF, JL2V, and JL3V into five consecutive days of training. Students can choose to attend the individual classes (JMF, JL2V, or JL3V) or attend

More information

Implementing Management Plane Protection on Cisco IOS XR Software

Implementing Management Plane Protection on Cisco IOS XR Software Implementing Management Plane Protection on Cisco IOS XR Software The Management Plane Protection (MPP) feature in Cisco IOS XR software provides the capability to restrict the interfaces on which network

More information

Request for Comments: Cisco Systems, Inc. September Framework for Layer 2 Virtual Private Networks (L2VPNs)

Request for Comments: Cisco Systems, Inc. September Framework for Layer 2 Virtual Private Networks (L2VPNs) Network Working Group Request for Comments: 4664 Category: Informational L. Andersson, Ed. Acreo AB E. Rosen, Ed. Cisco Systems, Inc. September 2006 Framework for Layer 2 Virtual Private Networks (L2VPNs)

More information

L2 VPNs. Javed Asghar Muhammad Waris Sagheer 2005, Cisco Systems, Inc. All rights reserved.

L2 VPNs. Javed Asghar Muhammad Waris Sagheer 2005, Cisco Systems, Inc. All rights reserved. L2 VPNs Javed Asghar jasghar@cisco.com Muhammad Waris Sagheer waris@cisco.com 2005, Cisco Systems, Inc. All rights reserved. 1 Agenda! Topics:! L2VPN Introduction! L2VPN Models! Quality of Service! L2VPN

More information

Configuring LAN/WAN-PHY Controllers on Cisco IOS XR Software

Configuring LAN/WAN-PHY Controllers on Cisco IOS XR Software Configuring LAN/WAN-PHY Controllers on Cisco IOS XR Software This module describes the configuration of LAN/WAN-PHY controllers on the Cisco CRS Router. Feature Histy f Configuring LAN/WAN-PHY Controller

More information

VPLS configuration commands

VPLS configuration commands Contents VPLS configuration commands 1 car 1 description 1 display bgp vpls 2 display l2vpn fast-switch-group 7 display mac-address vsi 8 display mpls l2vpn fib ac vpls 10 display mpls l2vpn fib pw vpls

More information

Configuring Tunnel Interfaces on Cisco IOS XR Software

Configuring Tunnel Interfaces on Cisco IOS XR Software Configuring Tunnel Interfaces on Cisco IOS XR Software This module describes the configuration of Tunnel-IPSec interfaces on the Cisco CRS Router. Tunnel interfaces are virtual interfaces that provide

More information

MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV

MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV First Published: January 26, 2004 Last Updated: February 27, 2009 The MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV feature helps

More information

Pass4Sure.4A0-104,288.Questions

Pass4Sure.4A0-104,288.Questions Pass4Sure.4A0-104,288.Questions Number: 4A0-104 Passing Score: 800 Time Limit: 120 min File Version: 8.04 http://www.gratisexam.com/ 4A0-104 Alcatel-Lucent Services Architecture : Modified few questions,

More information

Virtual Subnet (VS): A Scalable Data Center Interconnection Solution

Virtual Subnet (VS): A Scalable Data Center Interconnection Solution Virtual Subnet (VS): A Scalable Data Center Interconnection Solution draft-xu-virtual-subnet-05 Xiaohu Xu (xuxh@huawei.com) NANOG52, Denver Requirements for Data Center Interconnection To interconnect

More information

IPv6 Switching: Provider Edge Router over MPLS

IPv6 Switching: Provider Edge Router over MPLS Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4

More information

Multiprotocol Label Switching (MPLS)

Multiprotocol Label Switching (MPLS) 36 CHAPTER Prerequisites for MPLS, page 36-1 Restrictions for MPLS, page 36-1 Information About MPLS, page 36-2 Default Settings for MPLS, page 36-7 How to Configure MPLS Features, page 36-7 Configuration

More information

Cisco CPT Packet Transport Module 4x10GE

Cisco CPT Packet Transport Module 4x10GE Data Sheet Cisco CPT Packet Transport Module 4x10GE The Cisco Carrier Packet Transport System (CPT) 200 and 600 sets the industry benchmark as a carrier-class converged access and aggregation platform

More information

MPLS LSP Ping Traceroute for LDP TE and LSP Ping for VCCV

MPLS LSP Ping Traceroute for LDP TE and LSP Ping for VCCV MPLS LSP Ping Traceroute for LDP TE and LSP Ping for VCCV The MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV feature helps service providers monitor label switched paths (LSPs) and quickly

More information

Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties

Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties CHAPTER 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties The following topics describe how you can use Cisco Prime Network Vision (Prime Network Vision) to monitor Ethernet

More information

Spirent TestCenter EVPN and PBB-EVPN AppNote

Spirent TestCenter EVPN and PBB-EVPN AppNote Spirent TestCenter EVPN and PBB-EVPN AppNote Executive summary 2 Overview of EVPN 2 Relevant standards 3 Test case: Single Home Test Scenario for EVPN 4 Overview 4 Objective 4 Topology 4 Step-by-step instructions

More information