Implementing SES Network Duplication A Best Practices Guide.
|
|
- Pearl May
- 5 years ago
- Views:
Transcription
1 Implementing SES Network Duplication A Best Practices Guide. SIP Enablement Services 5.1 Avaya ABSTRACT This application note is a tutorial on Avaya SIP Enablement Services Network Duplication from an implementation focus. SES Network Duplication basics, protocol examples and rationale are discussed as a Best Practice. The customer is always free to implement SES Network Duplication in any other method they choose for any reasons. The intent of this document is to provide guidelines on implementing Avaya s SES Network Duplication from a best practices data network view. External posting: Application Note Issue 2.0 Issue 1.0 Initial Release Issue Added Bandwidth Requirements December 2008 COMPAS ID BH and MJK 1
2 All information in this document is subject to change without notice. Although the information is believed to be accurate, it is provided without guarantee of complete accuracy and without warranty of any kind. It is the user s responsibility to verify and test all information in this document. Avaya shall not be liable for any adverse outcomes resulting from the application of this document; the user accepts full responsibility Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avaya Inc. or Avaya ECS Ltd., a wholly owned subsidiary of Avaya Inc. and may be registered in the US and other jurisdictions. All trademarks identified by and are registered trademarks or trademarks, respectively, of Avaya Inc. All other registered trademarks or trademarks are property of their respective owners. Questions and comments should be directed to: bhoward@avaya.com or afunguy@avaya.com Table of Contents 1) Introduction...3 2) SES Network Duplication Basics...3 3) L2TPv3 Protocol Rationale...3 4) Physical vs. Logical WAN Views...4 5) L2TPv3 Header...5 6) Traffic Pattern Considerations...6 7) Bandwidth Considerations...7 8) Configuration and Verification...8 9) Best Practice Checklist ) Related Documents...11 BH and MJK 2
3 1) Introduction This application note is a tutorial covering the Avaya SIP Enablement Services (SES) Network Duplication from a network implementation focus. SES Network Duplication basics, protocol rationale, configuration and verification are discussed and summarized as a Best Practice checklist. Customer s may implement SES Network Duplication using other methods but these notes only document the method we believe is a best practice. However, Avaya will diagnose and fix any customer s network for a fee through Avaya s Global Services. The intent of this document is to provide guidelines on implementing Avaya s SES Network Duplication from a best practices data network view. Network Duplex configuration (Geo-Redundancy) provides mission critical duplication similar to the cabled duplex configuration. With SES Network Duplication, whether edge, home or home/edge combo, the two SES servers can be physically separated via WAN routing. This allows the SES servers to be placed anywhere in the world. 2) SES Network Duplication Basics When using SES Network Duplication mode, the two SES servers must be on the same LAN network or subnet. SES Network Duplication is an OSI model layer-2 solution. SES Network Duplication servers, whether edge, home or edge/home combo, share a virtual IP address. L2TPv3 is used to connect the two SES servers over a WAN and is essentially a pseudo-wire across that WAN. L2TPv3 was intended to bridge a WAN to connect two halves of the same network or subnet. Redundancy options include: Redundant edges with single home Redundant homes with single edge Redundant homes and redundant edges (whether combo and separate servers) 3) L2TPv3 Protocol Rationale There are several choices when selecting a bridging protocol to tunnel layer-2 traffic across a WAN. L2TPv3 was selected as a best practice because: It is easy to configure Point-to-Point only connectivity is needed It supports modern L2 WAN protocols including: o Ethernet o Frame Relay o ATM o MPLS o PPP Current vendor support (Cisco and others) RFCs are available L2TPv3 is not a proprietary protocol Tunnel endpoints do not have to be on the WAN edge routers Provides security guarantees against spoofing BH and MJK 3
4 4) Physical vs. Logical WAN Views Effectively, the WAN transport and perhaps some LAN network devices become transparent from a logical view as shown by the two diagrams below. BH and MJK 4
5 5) L2TPv3 Header The L2TPv3 header is a shim consisting of two parts and is 8 to 16 bytes depending on automatic or manual implementation modes. Below is a view of automatic L2TPv3 frames as shown by Wireshark a freeware protocol analyzer. This means anyone can easily identify and troubleshoot L2TPv3. As you can see, between the IP and Application layer resides the L2TP and the Default sub-layers. This capture was taken from an Ethernet segment, but a WAN capture would look the same except for the layer-2 protocol. An expanded view (below) shows the details of the L2TPv3 and Sub-layer contents. Each L2TPv3 frame has a session ID and a magic cookie. The sub-layer contains the s bit and a sequence number. The session ID will remain the same during the life of the session. The sequence number will remain the same during the session unless there is a server interchange. Details about L2TPv3 can be found in many places on the Internet. Two good information sources are: RFC BH and MJK 5
6 6) Traffic Pattern Considerations Most implementations will have phones located at both the Primary (active) and Stand-by SES servers. If the number of phones is relatively balanced at both locations, the bandwidth needed before and after an SES server interchange will remain about the same. This is important for sizing the WAN bandwidth needs with the Service Provider. Conversely, placing most or all of the phones at one site will have a dramatic effect on WAN bandwidth. Consider the diagram below: BH and MJK 6
7 7) Bandwidth Considerations Bandwidth is measured in Busy Hour Call Completions (BHCC). BHCC represents the number of calls initiated and completed in the busiest hour of a company s phone traffic. The chart below shows bandwidth needed for 1,000 to 15,000 BHCC. The bandwidth needs are very linear and represent call signaling only. Bearer traffic, as a best practice, should not be on the same network as the SES servers. If you chose to include bearer traffic, you must increase the bandwidth significantly. Server interchange events take very minimal bandwidth and do not need any additional bandwidth consideration. Finally, when a new or replaced SES network duplication server is added, the entire database contents of the active server are sent to the stand-by server. This is best done out of business hours. The time and bandwidth needed depend on the number of SIP phones on the system. 800 SIP phones will take about 2-minutes at 1200Kbps bandwidth. SES database transfer is TCP based which will adapt to your available bandwidth. A pair of DS-1 circuits may provide enough bandwidth for most customers. The other benefit of using at least one pair of DS-1 circuits is that it eliminates a single point of failure in the WAN. More than two DS-1 circuits may be desirable to provide redundancy and enough bandwidth in the event of a WAN outage. BH and MJK 7
8 8) Configuration and Verification BH and MJK 8
9 Configuration Steps Enable IP CEF Step #1: Each router needs to have IP CEF enabled. This is a layer 3 switching technique that speeds processing of packets from the ingress to egress interfaces. Interface Loopback 0 Step #2: The Loopback interface is the terminating point for the L2TP traffic. Each router Loopback must be reachable from the other router. This can be accomplished with static routes or routing protocols. Configure L2TP Control Channel Step #3: This creates the L2TP Class which is a template that is inherited by the different pseudowire classes. The class includes parameters such as authentication, keepalive timers, and retransmission timeouts. In this example, only authentication is configured, the other parameter default values are acceptable. Configure L2TP Pseudowire Step #4: The pseudowire is a template that defines the data encapsulation type, control protocol, signaling, and sequencing. My example configures the encapsulation type as L2TPv3, and assigns interface loopback 0 as the source IP address for tunneled packets. Authentication is configured by assigning the geo-class Control Channel template. IP ToS Reflect assigns the inner IP packet ToS setting to the tunneled packet. Configure Xconnect Circuit Step #5: This binds the interface G0/1.16 (VLAN 16) to the L2TPv# pseudowire. The command is broken down and explained: xconnect keyword to assign binding remote end loopback IP 10 virtual circuit ID used between the near end and far end routers. The value must match on each router. pw-class geo-pseudowire template used to assign pseudowire template. BH and MJK 9
10 Verification Steps Displays detailed information about all current L2TP sessions configured on the router. Displays information about all current L2TPv3 sessions, including peer router IP address, and circuit status. Displays information about all current L2TPv3 sessions and their protocol state, including remote virtual circuit identifiers. *Note: Circuit ID must match on the near and far end router. BH and MJK 10
11 9) Best Practice Checklist Place SES servers on their own network (subnet) to avoid transporting needless broadcast traffic across the WAN. Use L2TPv3 as the preferred bridging protocol. See section 3 for the rationale list. Distribute the number of phones registered to SES between SES locations to balance the WAN traffic regardless of which server Provide routing at both SES locations to provide normal operations during WAN outages. Cisco L2TP support began in IOS 12.0(23) T, but the goal is use an IOS level that supports the features of the standard defined in RFC IOS levels are highly dependent on the platform being used. Be sure to use an IOS that supports L2TPv3 and not L2TP. Router redundancy such as VRRP, HSRP or other is desirable but optional. The goal is to provide routing off the SES subnet during a WAN failure. See diagram on section 7. This is optional. Trunks between the L2 switch and the un-numbered router interface may be desirable to pass non-ses data through the Pseudowire. Broadcasts from these non-ses VLANs will be filtered allowing only unicast data to flow. See diagram on section 7. This is optional. 10) Related Documents Installing, Administering, Maintaining, and Troubleshooting SIP Enablement Services, Doc ID: 03_ BH and MJK 11
L2 Bridging Across an L3 Network Configuration Example
L2 Bridging Across an L3 Network Configuration Example Document ID: 116266 Contributed by Atri Basu, Jay Young Taylor, and Mani Ganesan, Cisco TAC Engineers. Jul 09, 2013 Contents Introduction Prerequisites
More informationThe router sends hello keepalive packets at 60 second intervals.
hello hello To configure the interval used to exchange hello keepalive packets in a Layer 2 control channel, use the hello command in L2TP class configuration mode. To disable the sending of hello keepalive
More informationWiNG 5.x How-To Guide
WiNG 5.x How-To Guide Tunneling Remote Traffic using L2TPv3 Part No. TME-08-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola
More informationConfiguring Virtual Private LAN Services
Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS
More informationL2VPN Interworking. Finding Feature Information
Interworking is a transforming function that is required to interconnect two heterogeneous attachment circuits (ACs). Several types of interworking functions exist. The function that is used would depend
More informationConfigure Virtual LANs in Layer 2 VPNs
The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services to geographically disparate customer sites. A virtual local area network (VLAN) is a group of
More informationAToM Graceful Restart
AToM Graceful Restart Last Updated: November 29, 2011 The AToM Graceful Restart feature assists neighboring routers that have nonstop forwarding (NSF), stateful switchover (SSO) and graceful restart (GR)
More informationAToM Static Pseudowire Provisioning
AToM Static Pseudowire Provisioning First Published: February 19, 2007 Last Updated: February 19, 2007 The AToM Static Pseudowire Provisioning feature allows provisioning an Any Transport over Multiprotocol
More informationMPLS Point-to-Multipoint Traffic Engineering Support for Static Pseudowires
MPLS Point-to-Multipoint Traffic Engineering Support for Static Pseudowires The MPLS Point-to-Multipoint Traffic Engineering: Support for Static Pseudowires feature allows you to configure a point-to-multipoint
More informationFrame Relay over L2TPv3
The (FRoL2TPv3) feature enables Frame Relay switching over Layer 2 Tunnel Protocol Version 3 (L2TPv3). The feature works with like interfaces and disparate interfaces (L2VPN interworking). Finding Feature
More informationIP Tunneling. GRE Tunnel IP Source and Destination VRF Membership. Tunnel VRF CHAPTER
CHAPTER 27 This chapter describes IP tunneling features implemented on the Cisco 10000 series routers and includes the following topics: GRE Tunnel IP Source and Destination VRF Membership, page 27-1 Restrictions
More informationMay 24, Avaya Labs, Westminster CO. ABSTRACT
Application Note Avaya MultiVantage Software on an Avaya S8700 Media Server and an Avaya G600 Media Gateway (S8700/G600) Network Requirements and Configuration Guidelines Issue 1.1 COMPAS ID: 89542 May
More informationCisco CCNA (ICND1, ICND2) Bootcamp
Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills
More informationConfiguring PPP over Ethernet with NAT
CHAPTER 3 The Cisco Secure Router 520 Ethernet-to-Ethernet routers support Point-to-Point Protocol over Ethernet (PPPoE) clients and network address translation (NAT). Multiple PCs can be connected to
More informationConfiguring PPP over Ethernet with NAT
This chapter provides an overview of Point-to-Point Protocol over Ethernet (PPPoE) clients and network address translation (NAT) that can be configured on the Cisco 819, Cisco 860, Cisco 880, and Cisco
More information3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?
Nguyen The Nhat - Take Exam Exam questions Time remaining: 00: 00: 51 1. Which command will give the user TECH privileged-mode access after authentication with the server? username name privilege level
More informationFirst Hop Redundancy Protocols Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
First Hop Redundancy Protocols Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationImplementing MPLS VPNs over IP Tunnels
The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Network (L3VPN) services, over an IP core network, using L2TPv3 multipoint tunneling instead of MPLS. This allows L2TPv3 tunnels
More informationL2VPN Protocol-Based CLIs
The feature provides a set of processes and an improved infrastructure for developing and delivering Cisco IOS software on various Cisco platforms. This feature introduces new commands and modifies or
More informationConfiguring MPLS Transport Profile
CHAPTER 44 The Multiprotocol Label Switching (MPLS) Transport Profile (TP) enables you to create tunnels that provide the transport network service layer over which IP and MPLS traffic traverse. MPLS-TP
More informationInterconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview
Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,
More informationConfiguring Traffic Mirroring
This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release
More informationConfiguring MPLS L2VPN
Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 About MPLS L2VPN 1 Comparison with traditional VPN 2 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration
More informationConfiguring Traffic Mirroring
This module describes the configuration of the traffic mirroring feature. Traffic mirroring is sometimes called port mirroring, or switched port analyzer (SPAN). Feature History for Traffic Mirroring Release
More informationConfiguring MPLS L2VPN
Contents Configuring MPLS L2VPN 1 Overview 1 Comparison with traditional VPN 1 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration task list 4 Configuring
More informationConfiguring Devices for Flow Collection
This PDF is no longer being maintained. See the SolarWinds Success Center for more information. SolarWinds Technical Reference Configuring Devices for Flow Collection Introduction... 3 Cisco... 3 Cisco
More informationLayer 2 Tunnel. xconnect performance test
Layer 2 Tunnel xconnect performance test 1 About test The main purpose of this examination was to find out the router performance in Layer 2 tunnel mode during transmission of packets with different length.
More informationTRILL Transparent Transport over MPLS
TRILL Transparent Transport over MPLS draft-muks-trill-transport-over-mpls- 00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong Overview This draft covers two problems as follows. Providing
More informationConfiguring G350 dynamic-cac for branch offices with a Cisco WAN router
Configuring G350 dynamic-cac for branch offices with a Cisco WAN router Abstract Call Admission Control (CAC) is the capability to avoid QoS degradation due to VoIP congestion on low bandwidth WAN links
More informationLayer 2 Tunnel Protocol Version 3
Layer 2 Tunnel Protocol Version 3 Feature History Release Modification 12.0(21)S Initial data plane support for the Layer 2 Tunnel Protocol Version 3 (L2TPv3) was introduced on the Cisco 7200 series, Cisco
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Configuring Session Initiated Protocol over Port Network Address Translation for Avaya 4602 SIP IP Telephones using the Kagoor VoiceFlow 200 Application Layer
More informationConfiguring MPLS and EoMPLS
37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates
More informationConfiguring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns
The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a
More informationICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch
ICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview Interconnecting Cisco
More informationAN INTRODUCTION TO PPPOE
Nokia Internet Communications AN INTRODUCTION TO PPPOE Version 1.0 07-Mar-2001 DOCUMENT OWNER: Dave Lipowsky PHONE: (847) 867-8163 EMAIL: david.lipowsky@nokia.com Revision History Version Date Author Description
More informationWide-Area Networking Overview
Cisco IOS software provides a range of wide-area networking capabilities to fit almost every network environment need. Cisco offers cell relay via the Switched Multimegabit Data Service (SMDS), circuit
More informationCase Study. Routing & Switching. Cisco Networking Academy Routing and Switching: Scaling Network Case Study
Case Study Routing & Switching Cisco Networking Academy Routing and Switching: Scaling Network Case Study Overview and Objectives This case study allows students to build and configure a complex network
More informationUsing Cisco Discovery Protocol
Using Cisco Discovery Protocol First Published: February 1, 1995 Last Updated: August 12, 2010 Cisco Discovery Protocol (CDP) is a Layer 2 media-independent and network-independent protocol that runs on
More informationRequest for Comments: Cisco Systems, Inc. September Framework for Layer 2 Virtual Private Networks (L2VPNs)
Network Working Group Request for Comments: 4664 Category: Informational L. Andersson, Ed. Acreo AB E. Rosen, Ed. Cisco Systems, Inc. September 2006 Framework for Layer 2 Virtual Private Networks (L2VPNs)
More informationMPLS VPN Carrier Supporting Carrier Using LDP and an IGP
MPLS VPN Carrier Supporting Carrier Using LDP and an IGP Last Updated: December 14, 2011 Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) Carrier Supporting Carrier (CSC) enables one
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get
More informationNumerics I N D E X. AAL (ATM Adaptation Layer), AAL5 CPCS-SDU mode,
I N D E X Numerics A 802.1p tagging, 63, 65 802.1q tagging, 63, 65 802.1q tunneling, 62 63 asymmetrical links, 65 restrictions, 67 68 tagging process, 66 AAL (ATM Adaptation Layer), 94 95 AAL5 CPCS-SDU
More informationMPLS VPN Carrier Supporting Carrier Using LDP and an IGP
MPLS VPN Carrier Supporting Carrier Using LDP and an IGP Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) Carrier Supporting Carrier (CSC) enables one MPLS VPN-based service provider
More informationIEEE 802.1ah on Provider Backbone Bridges
IEEE 802.1ah on Provider Backbone Bridges First Published: November 25, 2009 Last Updated: February 8, 2011 The IEEE 802.1ah on Provider Backbone Bridges feature enables MAC-in-MAC tunneling on Ethernet
More informationVendor: Cisco. Exam Code: Exam Name: Implementing Cisco IP Routing (ROUTE v2.0) Version: Demo
Vendor: Cisco Exam Code: 300-101 Exam Name: Implementing Cisco IP Routing (ROUTE v2.0) Version: Demo DEMO QUESTION 1 Refer to the exhibit. The DHCP client is unable to receive a DHCP address from the DHCP
More informationHigher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.
This chapter tells how to configure Virtual extensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. About VXLAN Encapsulation
More informationCase Study. Routing & Switching. Cisco Networking Academy Routing and Switching: Scaling Network Case Study
Case Study Routing & Switching Cisco Networking Academy Routing and Switching: Scaling Network Case Study Overview and Objectives This case study allows students to build and configure a complex network
More informationConfiguring Quality of Service
CHAPTER 25 QoS refers to the ability of a network to provide improved service to selected network traffic over various underlying technologies including Frame Relay, ATM, Ethernet and 802.1 networks, SONET,
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring the Expand Networks Accelerator 4820 with Avaya IP Telephony through Avaya SG203 and SG208 Security Gateways - Issue 1.0 Abstract
More informationVPLS Autodiscovery: BGP Based
First Published: February 19, 2007 Last Updated: February 19, 2007 VPLS Autodiscovery enables each Virtual Private LAN Service (VPLS) provider edge (PE) router to discover which other PE routers are part
More informationConfiguring Client-Initiated Dial-In VPDN Tunneling
Configuring Client-Initiated Dial-In VPDN Tunneling Client-initiated dial-in virtual private dialup networking (VPDN) tunneling deployments allow remote users to access a private network over a shared
More informationLab 8.5.2: Troubleshooting Enterprise Networks 2
Lab 8.5.2: Troubleshooting Enterprise Networks 2 Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 192.168.10.1 255.255.255.0 N/A R1 Fa0/1 192.168.11.1 255.255.255.0
More informationUnderstanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy
Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy Document ID: 18664 Contents Introduction Prerequisites Requirements Components Used Conventions
More informationIPv6 Switching: Provider Edge Router over MPLS
Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4
More informationVendor: Cisco. Exam Code: Exam Name: CCIE Routing and Switching Written v5.0. Version: Demo
Vendor: Cisco Exam Code: 400-101 Exam Name: CCIE Routing and Switching Written v5.0 Version: Demo DEMO QUESTION 1 Which two options are effects of the given configuration? (Choose two) A. It enables Cisco
More informationRADIUS Tunnel Preference for Load Balancing
RADIUS Tunnel Preference for Load Balancing and Fail-Over Finding Feature Information RADIUS Tunnel Preference for Load Balancing and Fail-Over Last Updated: July 18, 2011 The RADIUS Tunnel Preference
More informationMPLS VPN over mgre. Finding Feature Information. Last Updated: November 1, 2012
MPLS VPN over mgre Last Updated: November 1, 2012 The MPLS VPN over mgre feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity
More informationLARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF
LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2
More informationApplication Notes for Mirage Networks Endpoint Controller in an Avaya IP Telephony Infrastructure Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Mirage Networks Endpoint Controller in an Avaya IP Telephony Infrastructure Issue 1.0 Abstract These Application Notes describe a configuration
More informationConfiguring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts
Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling
More informationTestsDumps. Latest Test Dumps for IT Exam Certification
TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : 200-105 Title : Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) Vendor : Cisco Version : DEMO Get Latest
More informationContents. EVPN overview 1
Contents EVPN overview 1 EVPN network model 1 MP-BGP extension for EVPN 2 Configuration automation 3 Assignment of traffic to VXLANs 3 Traffic from the local site to a remote site 3 Traffic from a remote
More informationThe following steps should be used when configuring a VLAN on the EdgeXOS platform:
EdgeXOS VLANs VLAN Overview This document provides an overview of what a VLAN is and how it is configured on the EdgeXOS platform. Use the step-by-step guide below to configure a VLAN on the Edge appliance
More informationCisco Discovery Protocol Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
Cisco Discovery Protocol Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series) Cisco Discovery Protocol Version 2 2 Finding Feature Information 2 Prerequisites for Using Cisco Discovery Protocol
More informationLayer 2 Tunneling Protocol Version 3
Layer 2 Tunneling Protocol Version 3 First Published: May 6, 2010 Last Updated: September 02, 2010 The Layer 2 Tunneling Protocol Version 3 (L2TPv3) feature expands Cisco support of Layer 2 Virtual Private
More informationConfiguring MPLS L2VPN
Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 Basic concepts of MPLS L2VPN 2 Implementation of MPLS L2VPN 2 MPLS L2VPN configuration task list 4 Configuring MPLS L2VPN 5 Configuring CCC MPLS
More informationCourse Outline. CCNA Cisco Certified Network Associate Routing and Switching Study Guide.
Course Outline CCNA Cisco Certified Network Associate Routing and Switching Study Guide 11 Mar 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of
More informationCourse Outline. CCNA Cisco Certified Network Associate Routing and Switching Study Guide.
Course Outline CCNA Cisco Certified Network Associate Routing and Switching Study Guide 04 Jul 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of
More informationHPE FlexFabric 5940 Switch Series
HPE FlexFabric 5940 Switch Series EVPN Configuration Guide Part number: 5200-2002b Software version: Release 25xx Document version: 6W102-20170830 Copyright 2017 Hewlett Packard Enterprise Development
More informationOperation Manual MPLS VLL. Table of Contents
Table of Contents Table of Contents... 1-1 1.1 MPLS VLL Overview... 1-2 1.1.1 Concepts in MPLS VLL... 1-2 1.1.2 Introduction to MPLS VLL... 1-2 1.1.3 Packet Forwarding... 1-3 1.1.4 Implementation... 1-4
More informationAToM (Any Transport over MPLS)
I N D E X A AAL5 over MPLS operation, 459 460 configuration, 462 463 flowchart configuration, 461 PE router, 461 provider router, 461 verification, 463 465 AAL5 to VLAN Interworking, 515 517 AC (Attachment
More informationMultiprotocol Label Switching (MPLS)
36 CHAPTER Prerequisites for MPLS, page 36-1 Restrictions for MPLS, page 36-1 Information About MPLS, page 36-2 Default Settings for MPLS, page 36-7 How to Configure MPLS Features, page 36-7 Configuration
More informationshow tag-switching tdp discovery
show tag-switching tdp discovery show tag-switching tdp discovery To display the status of the LDP discovery process, use the show tag-switching tdp discovery command in privileged EXEC mode. This command
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SonicWALL VPN for Supporting H.323 Trunk and Station Traffic to Avaya Communication Manager and Avaya IP Office - Issue 1.0
More informationN:1 PVC Mapping to PWE with Nonunique VPIs
The N:1 PVC Mapping to PseudoWire Emulation (PWE) with Nonunique virtual path identifiers (VPIs) feature maps one or more ATM permanent virtual circuits (PVCs) to a single pseudowire (PW). There are two
More informationMPLS AToM Overview. Documentation Specifics. Feature Overview
MPLS AToM Overview This document provides an introduction to MPLS AToM and includes the following sections: Documentation Specifics, page 14 Feature Overview, page 14 Benefits, page 26 What To Do Next,
More informationFinding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images
First Published: March 20, 2006 Last Updated: March 22, 2011 The feature is one of two features bundled with the QoS: Broadband Aggregation Enhancements Phase 1 feature. The feature provides the ability
More informationConfiguring TCP Header Compression
Configuring TCP Header Compression First Published: January 30, 2006 Last Updated: May 5, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.
More informationLayer 2 Tunnel Protocol Version 3
Layer 2 Tunnel Protocol Version 3 The Layer 2 Tunnel Protocol Version 3 feature expands on Cisco support of the Layer 2 Tunnel Protocol Version 3 (L2TPv3). L2TPv3 is an Internet Engineering Task Force
More informationCh. 5 - ISDN - Integrated Services Digital Network
Ch. 5 - ISDN - Integrated Services Digital Network 1 Overview 2 Basic elements in ISDN 3 ISDN - access 4 ISDN - the bus 5 ISDN - examples 6 ISDN - between LAN s 7 ISDN - access to Internet 8 ISDN - small
More informationEnterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.
2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are
More informationConfiguring a Cisco 827 Router to Support PPPoE Clients, Terminating on a Cisco 6400 UAC
Configuring a Cisco 827 Router to Support PPPoE Clients, Terminating on a Cisco 6400 UAC Document ID: 12889 Contents Introduction Before You Begin Conventions Prerequisites Components Used Configure Network
More informationMonitoring Ethernet Operations, Administration, and Maintenance Tool Properties
CHAPTER 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties The following topics describe how you can use Cisco Prime Network Vision (Prime Network Vision) to monitor Ethernet
More informationContents. Configuring GRE 1
Contents Configuring GRE 1 Overview 1 GRE encapsulation format 1 GRE tunnel operating principle 1 GRE application scenarios 2 Protocols and standards 4 Configuring a GRE/IPv4 tunnel 4 Configuration guidelines
More informationL2 VPNs. Javed Asghar Muhammad Waris Sagheer 2005, Cisco Systems, Inc. All rights reserved.
L2 VPNs Javed Asghar jasghar@cisco.com Muhammad Waris Sagheer waris@cisco.com 2005, Cisco Systems, Inc. All rights reserved. 1 Agenda! Topics:! L2VPN Introduction! L2VPN Models! Quality of Service! L2VPN
More informationMPLS VPN Inter-AS IPv4 BGP Label Distribution
MPLS VPN Inter-AS IPv4 BGP Label Distribution This feature enables you to set up a Virtual Private Network (VPN) service provider network so that the autonomous system boundary routers (ASBRs) exchange
More informationCISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)
Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours
More informationTestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified
TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE Modified 2017-07-10 TestOut Routing and Switching Pro Outline- English 6.0.x Videos: 133 (15:42:34) Demonstrations: 78 (7:22:19) Simulations:
More informationConfiguring Layer 3 Interfaces
This chapter contains the following sections: Information About Layer 3 Interfaces, page 1 Licensing Requirements for Layer 3 Interfaces, page 4 Guidelines and Limitations for Layer 3 Interfaces, page
More informationH-VPLS N-PE Redundancy for MPLS Access
The feature enables two network provider edge (N-PE) devices to provide failover services to a user provider edge (U-PE) device in a hierarchical virtual private LAN service (H-VPLS). Having redundant
More informationHPE FlexFabric 7900 Switch Series
HPE FlexFabric 7900 Switch Series VXLAN Configuration Guide Part number: 5998-8254R Software version: Release 213x Document version: 6W101-20151113 Copyright 2015 Hewlett Packard Enterprise Development
More informationIntroduction p. 1 Self-Assessment p. 9 Networking Fundamentals p. 17 Introduction p. 18 Components and Terms p. 18 Topologies p. 18 LAN Technologies
Introduction p. 1 Self-Assessment p. 9 Networking Fundamentals p. 17 Introduction p. 18 Components and Terms p. 18 Topologies p. 18 LAN Technologies p. 19 Ethernet p. 19 WAN Technologies p. 21 Dedicated
More informationSD-WAN Deployment Guide (CVD)
SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces
More informationCCNP SWITCH (22 Hours)
CCNP SWITCH 642-813 (22 Hours) Chapter-1 Enterprise Campus Network Design 1.1 IIN & SONA 1.2 Campus Network 1.3 Enterprise Model 1.4 Nonhierarchical Network Devices Layer-2 Switching, Layer-3 Routing Multilayer
More informationConfiguring Layer 3 Interfaces
This chapter contains the following sections: Information About Layer 3 Interfaces, page 1 Licensing Requirements for Layer 3 Interfaces, page 4 Guidelines and Limitations for Layer 3 Interfaces, page
More informationMPLS LDP Graceful Restart
MPLS LDP Graceful Restart Last Updated: November 23, 2011 When a router is configured with Multiprotocol Label Switching (MPLS) Label Distribution Protocol (LDP) Graceful Restart (GR), it assists a neighboring
More informationInterconnecting Cisco Networking Devices Part1 ( ICND1) Exam.
Cisco 640-822 Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam TYPE: DEMO http://www.examskey.com/640-822.html Examskey Cisco 640-822 exam demo product is here for you to test quality of the
More informationUniversal Transport Interface (UTI)
Universal Transport Interface (UTI) Feature History Release 12.0(18)S 12.0(19)S 12.0(19)SP 12.0(20)SP 12.0(21)S 12.0(21)SP Modification This feature was introduced. Support was added for Frame Relay point-to-point
More informationModule 11a MPLS VPWS Configuration Lab (LDP)
APNIC MPLS Workshop Lab Module 11a MPLS VPWS Configuration Lab (LDP) Objective: All the routers are pre-configured with basic interface, OSPF, BGP, MPLS Label Distribution Protocol (LDP) configuration
More informationLayer 2 Tunneling Protocol Version 3
Layer 2 Tunneling Protocol Version 3 Last Updated: October 7, 2011 The Layer 2 Tunneling Protocol Version 3 feature expands Cisco's support of Layer 2 VPNs. Layer 2 Tunneling Protocol Version 3 (L2TPv3)
More information