JUNOS 9.4 VPNs Configuration Guide

DVD Home
Techpubs Home
Report an Error

Collapse TOC

List of Figures
List of Tables

Index
Index of Statements and Commands

Entire manual as PDF

 

About This Guide
Objectives
Audience
Supported Routing Platforms
Using the Indexes
Using the Examples in This Manual
Documentation Conventions
List of Technical Publications
Documentation Feedback
Requesting Technical Support
VPN Overview
VPN Standards
VPN Terminology
Types of VPNs
Layer 2 VPNs
Layer 3 VPNs
VPLS
Virtual-Router Routing Instances
VPNs and Class of Service
VPNs and Logical Systems
VPN Graceful Restart
Redundant Pseudowires for Layer 2 Circuits and VPLS
Types of Redundant Pseudowire Configurations
Pseudowire Failure Detection
Configuring VPNs
Enabling a Signaling Protocol on the PE Routers
Using LDP for VPN Signaling
Using RSVP for VPN Signaling
Configuring an IGP on the PE and P Routers
Configuring an IBGP Session Between PE Routers
Configuring a VPN Routing Instance on the PE Routers
Configuring the Description
Configuring the Instance Type
Configuring Interfaces for VPN Routing
General Configuration for VPN Routing
Configuring Interfaces for Layer 3 VPNs
Configuring Interfaces for Carrier-of-Carriers VPNs
Configuring Unicast RPF on VPN Interfaces
Configuring the Route Distinguisher
Configuring Automatic Route Distinguishers
Configuring Policies for the PE Router’s VRF Table
Configuring the Route Target
Configuring the Route Origin
Configuring an Import Policy for the PE Router’s VRF Table
Configuring an Export Policy for the PE Router’s VRF Table
Applying Both the VRF Export and the BGP Export Policies
Configuring a VRF Target
Configuring BGP Route Target Filtering
BGP Route Target Filtering Overview
Configuring BGP Route Target Filtering for VPNs
Configuring a Virtual-Router Routing Instance
Configuring a Routing Protocol Between the Service Provider Routers
Configuring Logical Interfaces Between Participating Routers
Configuring Graceful Restart
Configuring Redundant Pseudowires for Layer 2 Circuits and VPLS
Configuring Pseudowire Redundancy on the PE Router
Configuring the Switchover Delay for the Pseudowires
Configuring Aggregate Labels for VPNs
Rewriting Markers and VPNs
Transmitting Nonstandard BPDUs
Pinging VPNs and Layer 2 Circuits
Pinging a Layer 2 VPN
Pinging a Layer 3 VPN
Pinging a Layer 2 Circuit
Setting the Forwarding Class of the Ping Packets
Configuring a Path MTU Check for VPNs
Enabling Path MTU Checks for a VPN Routing Instance
Assigning an IP Address to the VPN Routing Instance
Enabling Unicast Reverse-Path Forwarding Check for VPNs
VPN Examples
BGP Route Target Filtering for VPNs Overview
BGP Route Target Filtering for VPNs
Configure BGP Route Target Filtering on Router PE1
Configure BGP Route Target Filtering on Router PE2
Configure BGP Route Target Filtering on the Route Reflector
Configure BGP Route Target Filtering on Router PE3
Route Origin for VPNs
Configuring the Site of Origin Community on CE Router A
Configuring the Community on CE Router A
Applying the Policy Statement on CE Router A
Configuring the Policy on PE Router D
Configuring the Community on PE Router D
Applying the Policy on PE Router D
Summary of VPN Configuration Statements
aggregate-label
backup-neighbor
description
family route-target
graceful-restart
instance-type
interface
no-forwarding
route-distinguisher
route-distinguisher-id
switchover-delay
unicast-reverse-path
vpn-apply-export
vrf-export
vrf-import
vrf-target
vrf-mtu-check
Layer 2 VPN Overview
Layer 2 VPN Overview
Layer 2 VPN Standards
Configuring Layer 2 VPNs
Configuring the Connections to the Local Site
Configuring a Layer 2 VPN Routing Instance
Configuring the Site
Configuring the Remote Site ID
Configuring the Encapsulation Type
Configuring a Site Preference and Layer 2 VPN Multihoming
Tracing Layer 2 VPN Traffic and Operations
Disabling Normal TTL Decrementing for VPNs
Configuring CCC Encapsulation on Interfaces
Configuring TCC Encapsulation on Interfaces
Configuring Layer 2 VPN Policing on Interfaces
Disabling the Control Word for Layer 2 VPNs
Layer 2 VPN Configuration Example
Simple Full-Mesh Layer 2 VPN Overview
Enabling an IGP on the PE Routers
Configuring MPLS LSP Tunnels Between the PE Routers
Configuring IBGP on the PE Routers
Configuring Routing Instances for Layer 2 VPNs on the PE Routers
Configuring CCC Encapsulation on the Interfaces
Configuring VPN Policy on the PE Routers
Layer 2 VPN Configuration Summarized by Router
Summary for Router A (PE Router for Sunnyvale)
Summary for Router B (PE Router for Austin)
Summary for Router C (PE Router for Portland)
Summary of Layer 2 VPN Configuration Statements
control-word
description
encapsulation
encapsulation (Logical Interface)
encapsulation (Physical Interface)
encapsulation-type
interface
l2vpn
no-control-word
policer
proxy
remote
remote-site-id
site
site-identifier
site-preference
traceoptions
Layer 3 VPN Overview
Layer 3 VPN Introduction
Layer 3 VPN Standards
Layer 3 VPN Platform Support
Layer 3 VPN Attributes
VPN-IPv4 Addresses and Route Distinguishers
IPv6 Layer 3 VPNs
VPN Routing and Forwarding Tables
Route Distribution Within a Layer 3 VPN
Distribution of Routes from CE to PE Routers
Distribution of Routes Between PE Routers
Distribution of Routes from PE to CE Routers
Forwarding Across the Provider’s Core Network
Routing Instances for VPNs
Multicast over Layer 3 VPNs
Multicast over Layer 3 VPNs Overview
Sending PIM Hello Messages to the PE Routers
Sending PIM Join Messages to the PE Routers
Receiving the Multicast Transmission
Configuring Layer 3 VPNs
Configuring VPN Routing Between the PE and CE Routers
Configuring BGP Between the PE and CE Routers
Configuring OSPF Between the PE and CE Routers
Configuring OSPF Version 2 Between the PE and CE Routers
Configuring OSPF Version 3 Between the PE and CE Routers
Configuring OSPF Sham Links for Layer 3 VPNs
OSPF Sham Links Overview
Configuring OSPF Sham Links
OSPF Sham Links Example
Configuring an OSPF Domain ID
Hub-and-Spoke Layer 3 VPNs and OSPF Domain ID
Configuring RIP Between the PE and CE Routers
Configuring Static Routes Between the PE and CE Routers
Limiting the Paths and Prefixes Accepted from a CE Router
Configuring IPv6 Between the PE and CE Routers
Configuring IPv6 on the PE Router
Configuring the Connection Between the PE and CE Routers
Configuring BGP on the PE Router to Handle IPv6 Routes
Configuring BGP on the PE Router for IPv4 and IPv6 Routes
Configuring OSPF Version 3 on the PE Router
Configuring Static Routes on the PE Router
Configuring IPv6 on the Interfaces
Configuring EBGP or IBGP Multihop Between PE and CE Routers
Configuring Layer 3 VPNs to Carry IBGP Traffic
Filtering Traffic Based on the IP Header
Configuring Traffic Filtering Based on the IP Header
Egress Filtering Options
Support for Ethernet, SONET/SDH, and T1/T3/E3 Interfaces
Support for Aggregated and VLAN Interfaces
Support for ATM and Frame Relay Interfaces
Support for Multilink PPP and Multilink Frame Relay Interfaces
Support for Packets with Null Top Labels
Other Limitations
Applying MPLS EXP Classifiers to Routing Instances
Configuring a VPN Tunnel for VRF Table Lookup
Configuring a Logical Unit on the Loopback Interface
Configuring Multicast over Layer 3 VPNs
Configuring Packet Forwarding for Layer 3 VPNs
Configuring GRE Tunnels for Layer 3 VPNs
Configuring GRE Tunnels Manually Between PE and CE Routers
Configuring the GRE Tunnel Interface on the PE Router
Configuring the GRE Tunnel Interface on the CE Router
Configuring GRE Tunnels Dynamically
Configuring an ES Tunnel Interface for Layer 3 VPNs
Configuring the ES Tunnel Interface on the PE Router
Configuring the ES Tunnel Interface on the CE Router
Configuring IPSec Instead of MPLS Between PE Routers
Configuring SCU and DCU for Layer 3 VPNs
Protocol-Independent Load Balancing for Layer 3 VPNs
Configuring Load Balancing for Layer 3 VPNs
Configuring Load Balancing and Routing Policies
Configuring Layer 3 VPN Policing on Interfaces
Sending RADIUS Messages Through a Layer 3 VPN
Troubleshooting Layer 3 VPNs
Diagnosing Common Problems
Troubleshooting Layer 3 VPNs Using ping and traceroute
Pinging the CE Router from Another CE Router
Pinging Router CE2 from Router CE1
Using traceroute from Loopback to Loopback
Pinging Router CE1 from Router CE2
Using traceroute from Router CE2 to Router CE1
Pinging the Remote PE and CE Routers from the Local CE Router
Pinging Router CE2 from Router CE1
Using traceroute from Router CE1 to Router CE2
Pinging Router PE2 from Router CE1
Using traceroute from Router CE1 to Router PE2
Pinging a CE Router from a Multiaccess Interface
Pinging the Directly Connected PE Routers from the CE Routers
Pinging Router PE1 from the Loopback Interface on Router CE1
Using traceroute from the Loopback Interface on Router CE1 to PE1
Pinging Router PE2 from the Loopback Interface on Router CE2
Using traceroute from the Loopback Interface on Router CE2 to PE2
Pinging the Directly Connected CE Routers from the PE Routers
Pinging the VPN Interface on Router CE1 from Router PE1
Pinging the Loopback Interface on Router CE1 from Router PE1
Using traceroute from Router PE1 to Router CE1
Pinging the VPN Interface on Router CE2 from Router PE2
Pinging the Loopback Interface on Router CE2 from Router PE2
Using traceroute from Router PE2 to Router CE2
Pinging the Remote CE Router from the Local PE Router
Limitation on Pinging a Remote CE Router from a PE Router
Pinging a Layer 3 VPN
Disabling Normal TTL Decrementing for Layer 3 VPNs
Troubleshooting RSVP and LDP LSPs
Troubleshooting Inconsistently Advertised Routes from Gigabit Ethernet Interfaces
Layer 3 VPN Configuration Examples
Configuring a Simple Full-Mesh VPN Topology
Enabling an IGP on the PE and P Routers
Enabling RSVP and MPLS on the P Router
Configuring the MPLS LSP Tunnel Between the PE Routers
Configuring IBGP on the PE Routers
Configuring Routing Instances for VPNs on the PE Routers
Configuring VPN Policy on the PE Routers
Simple VPN Configuration Summarized by Router
Router A (PE Router)
Router B (P Router)
Router C (PE Router)
Configuring a Full-Mesh VPN Topology with Route Reflectors
Configuring Hub-and-Spoke VPN Topologies: One Interface
Configuring Hub CE1
Configuring Hub PE1
Configuring the P Router
Configuring Spoke PE2
Configuring Spoke PE3
Configuring Spoke CE2
Configuring Spoke CE3
Enabling Egress Features on the Hub PE Router
Configuring Hub PE1
Configuring Hub-and-Spoke VPN Topologies: Two Interfaces
Enabling an IGP on the Hub-and-Spoke PE Routers
Configuring LDP on the Hub-and-Spoke PE Routers
Configuring IBGP on the PE Routers
Configuring VPN Routing Instances on the Hub-and-Spoke PE Routers
Configuring VPN Policy on the PE Routers
Hub-and-Spoke VPN Configuration Summarized by Router
Router D (Hub PE Router)
Router E (Spoke PE Router)
Router F (Spoke PE Router)
Configuring an LDP-over-RSVP VPN Topology
Enabling an IGP on the PE and P Routers
Enabling LDP on the PE and P Routers
Enabling RSVP and MPLS on the P Router
Configuring the MPLS LSP Tunnel Between the P Routers
Configuring IBGP on the PE Routers
Configuring Routing Instances for VPNs on the PE Routers
Configuring VPN Policy on the PE Routers
LDP-over-MPLS VPN Configuration Summarized by Router
Router PE1
Router P1
Router P2
Router P3
Router PE2
Configuring an Application-Based Layer 3 VPN Topology
Configuration on Router A
Configuration on Router E
Configuration on Router F
Configuring an OSPF Domain ID for a Layer 3 VPN
Configuring Interfaces on Router PE1
Configuring Routing Options on Router PE1
Configuring Protocols on Router PE1
Configuring Policy Options on Router PE1
Configuring the Routing Instance on Router PE1
Configuration Summary for Router PE1
Configuring Overlapping VPNs Using Routing Table Groups
Configuring Routing Table Groups
Configuring Static Routes Between the PE and CE Routers
Configuring the Routing Instance for VPN A
Configuring the Routing Instance for VPN AB
Configuring the Routing Instance for VPN B
Configuring VPN Policy
Configuring BGP Between the PE and CE Routers
Configuring OSPF Between the PE and CE Routers
Configuring Static, BGP, and OSPF Routes Between PE and CE Routers
Configuring Overlapping VPNs Using Automatic Route Export
Configuring Overlapping VPNs with BGP and Automatic Route Export
Configuring Overlapping VPNs and Additional Tables
Configuring Automatic Route Export for All VRF Instances
Configuring a GRE Tunnel Interface Between PE Routers
Configuring the Routing Instance on Router A
Configuring the Routing Instance on Router D
Configuring MPLS, BGP, and OSPF on Router A
Configuring MPLS, BGP, and OSPF on Router D
Configuring the Tunnel Interface on Router A
Configuring the Tunnel Interface on Router D
Configuring the Routing Options on Router A
Configuring the Routing Options on Router D
Configuration Summary for Router A
Configuration Summary for Router D
Configuring a GRE Tunnel Interface Between a PE and CE Router
Configuring the Routing Instance Without the Encapsulating Interface
Configuring the Routing Instance on Router PE1
Configuring the GRE Tunnel Interface on Router PE1
Configuring the Encapsulation Interface on Router PE1
Configuring the Routing Instance with the Encapsulating Interface
Configuring the Routing Instance on Router PE1
Configuring the GRE Tunnel Interface on Router PE1
Configuring the Encapsulation Interface on Router PE1
Configuring the GRE Tunnel Interface on Router CE1
Configuring an ES Tunnel Interface Between a PE and CE Router
Configuring IPSec on Router PE1
Configuring the Routing Instance Without the Encapsulating Interface
Configuring the Routing Instance on Router PE1
Configuring the ES Tunnel Interface on Router PE1
Configuring the Encapsulating Interface for the ES Tunnel
Configuring the Routing Instance with the Encapsulating Interface
Configuring the Routing Instance on Router PE1
Configuring the ES Tunnel Interface on Router PE1
Configuring the Encapsulating Interface on Router PE1
Configuring the ES Tunnel Interface on Router CE1
Configuring IPSec on Router CE1
Layer 3 VPN Internet Access Examples
Non-VRF Internet Access
CE Router Accesses Internet Independently of the PE Router
PE Router Provides Layer 2 Internet Service
Distributed Internet Access
Routing VPN and Internet Traffic Through Different Interfaces
Configuring Interfaces on Router PE1
Configuring Routing Options on Router PE1
Configuring BGP, IS-IS, and LDP Protocols on Router PE1
Configuring a Routing Instance on Router PE1
Configuring Policy Options on Router PE1
Traffic Routed by Different Interfaces: Configuration Summarized by Router
Router PE1
Routing VPN and Outgoing Internet Traffic Through the Same Interface and Routing Return Internet Traffic Through a Different Interface
Configuration for Router PE1
Routing VPN and Internet Traffic Through the Same Interface Bidirectionally (VPN Has Public Addresses)
Configuring Routing Options on Router PE1
Configuring Routing Protocols on Router PE1
Configuring the Routing Instance on Router PE1
Traffic Routed Through the Same Interface Bidirectionally: Configuration Summarized by Router
Router PE1
Routing VPN and Internet Traffic Through the Same Interface Bidirectionally (VPN Has Private Addresses)
Configuring Routing Options for Router PE1
Configuring a Routing Instance for Router PE1
Configuring Policy Options for Router PE1
Traffic Routed by the Same Interface Bidirectionally (VPN Has Private Addresses): Configuration Summarized by Router
Router PE1
Routing Internet Traffic Through a Separate NAT Device
Configuring Interfaces on Router PE1
Configuring Routing Options for Router PE1
Configuring Routing Protocols on Router PE1
Configuring a Routing Instance for Router PE1
Traffic Routed by Separate NAT Device: Configuration Summarized by Router
Router PE1
Centralized Internet Access
Routing Internet Traffic Through a Hub CE Router
Configuring a Routing Instance on Router PE1
Configuring Policy Options on Router PE1
Internet Traffic Routed by a Hub CE Router: Configuration Summarized by Router
Router PE1
Routing Internet Traffic Through Multiple CE Routers
Configuring a Routing Instance on Router PE1
Configuring Policy Options on Router PE1
Configuring a Routing Instance on Router PE3
Configuring Policy Options on Router PE3
Routing Internet Traffic Through Multiple CE Routers: Configuration Summarized by Router
Router PE1
Router PE2
Router PE3
Summary of Layer 3 VPN Configuration Statements
classifiers
domain-id
domain-vpn-tag
dynamic-tunnels
independent-domain
inet6-vpn
maximum-paths
maximum-prefixes
metric
multihop
multipath
routing-instances
sham-link
sham-link-remote
vpn-group-address
vpn-unequal-cost
vrf-table-label
Multicast VPNs Overview
BGP MPLS Multicast VPN Overview
Multicast VPN Terminology
Multicast VPN Standards
Multicast VPNs Configuration
Configuring the Multicast VPN Routing Instance
Configuring a Route Target for the Multicast VPN Routing Instance
Configuring the Export Target for the Multicast VPN
Configuring the Import Target for the Multicast VPN
Configuring the Import Target Receiver and Sender
Configuring the Import Target Unicast Parameters
Configuring NLRI Parameters for Multicast VPN
Configuring PIM Provider Tunnels for Multicast VPNs
Configuring Point-to-Multipoint LSPs for Multicast VPNs
Configuring Inclusive Point-to-Multipoint LSPs
Configuring Selective Point-to-Multipoint LSPs
Configuring the Multicast Group Address
Configuring the Multicast Source Address
Configuring Static Selective Point-to-Multipoint LSPs
Configuring Dynamic Selective Point-to-Multipoint LSPs
Configuring the Threshold for Dynamic Selective Point-to-Multipoint LSPs
Configuring the Tunnel Limit for Dynamic Selective Point-to-Multipoint LSPs
Tracing Multicast VPN Traffic and Operations
Summary of Multicast VPN Configuration Statements
export-target
group
import-target
inet-mvpn
inet6-mvpn
label-switched-path-template
mvpn
pim-asm
provider-tunnel
route-target
rsvp-te
selective
source
static-lsp
target
threshold-rate
traceoptions
tunnel-limit
unicast
VPLS Overview
VPLS Overview
VPLS Standards
Supported Platforms and PICs
VPLS Routing and Virtual Ports
VPLS and Aggregated Ethernet Interfaces
VPLS Multihoming
Interoperability between BGP Signaling and LDP Signaling in VPLS
LDP-Signaled and BGP-Signaled PE Router Topology
Flooding Unknown Packets Across Mesh Groups
Unicast Packet Forwarding
PE Router Mesh Groups for VPLS Routing Instances
Configuring VPLS
Configuring the VPLS Routing Instance
Configuring BGP Signaling for VPLS
Configuring the VPLS Site Name and Site Identifier
Configuring Automatic Site Identifiers for VPLS
Configuring the Site Range
Configuring the VPLS Site Interfaces
Configuring the VPLS Site Preference
Configuring LDP Signaling for VPLS
Configuring LDP Signaling for the VPLS Routing Instance
Configuring LDP Signaling on the Router
Configuring VPLS Routing Instance and VPLS Interface Connectivity
Configuring the VPLS MAC Table Timeout Interval
Configuring the Size of the VPLS MAC Address Table
Limiting the Number of MAC Addresses Learned from an Interface
Removing Addresses from the MAC Address Database
Configuring EXP-Based Traffic Classification for VPLS
Configuring Interfaces for VPLS Routing
Configuring the Interface Name
Configuring the VPLS Interface Encapsulation
Enabling VLAN Tagging
Configuring Aggregated Ethernet Interfaces for VPLS
Configuring VPLS Load Balancing
Configuring VPLS Without a Tunnel Services PIC
Configuring an Ethernet Switch as the CE Device
Mapping VPLS Traffic to a Specific LSP
Configuring VPLS Filters and Policers
Configuring a VPLS Filter
Configuring an Interface-Specific Counter for VPLS
Configuring the VPLS Filter Match Conditions
Configuring an Action for the VPLS Filter
Configuring VPLS FTFs
Changing Precedence for Spanning Tree BPDU Packets
Applying a VPLS Filter to an Interface
Applying a VPLS Filter to a VPLS Routing Instance
Configuring a Filter for Flooded Traffic
Configuring a VPLS Policer
Specifying the VT Interfaces Used by VPLS Routing Instances
Configuring VPLS Multihoming
VPLS Multihomed Site Configuration
Specifying an Interface as the Active Interface
Configuring Multihoming on the PE Router
VPLS Single-Homed Site Configuration
Flooding Unknown Traffic Using Point-to-Multipoint LSPs
Configuring Static Point-to-Multipoint Flooding LSPs
Configuring Dynamic Point-to-Multipoint Flooding LSPs
Configuring Dynamic Point-to-Multipoint Flooding LSPs with the Default Template
Configuring Dynamic Point-to-Multipoint Flooding LSPs with a Preconfigured Template
Configuring VPLS and Integrated Routing and Bridging
Configuring MAC Address Flooding and Learning for VPLS
Configuring MSTP for VPLS
Configuring Interoperability Between BGP Signaling and LDP Signaling in VPLS
Configuring VPLS Mesh Groups for LDP BGP Interworking
Configuring Switching Between Pseudowires Using VPLS Mesh Groups
Configuring Integrated Routing and Bridging Support for LDP BGP Interworking with VPLS
Configuring Inter-AS VPLS with MAC Processing at the ASBR
Inter-AS VPLS with MAC Operations Configuration Summary
Configuring the ASBRs for Inter-AS VPLS
Tracing VPLS Traffic and Operations
Summary of VPLS Configuration Statements
active-interface
automatic-site-id
connectivity-type
encapsulation
family multiservice
interface
interface-mac-limit
label-switched-path-template
local-switching
mac-tlv-receive
mac-tlv-send
mac-table-aging-time
mac-table-size
mesh-group
multi-homing
neighbor
no-local-switching
no-tunnel-services
peer-as
rsvp-te
site
site-identifier
site-preference
site-range
template
traceoptions
tunnel-services
vlan-id
vlan-tagging
vpls
vpls (Interfaces)
vpls (Routing Instance)
vpls-id
Interprovider and Carrier-of-Carriers VPNs Overview
Interprovider and Carrier-of-Carriers VPN Standards
Traditional VPNs, Interprovider VPNs, and Carrier-of-Carriers VPNs
Standard VPNs
Interprovider and Carrier-of-Carriers VPNs
Interprovider VPNs
Linking VRF Tables Between Autonomous Systems
Configuring MP-EBGP Between AS Border Routers
Configuring Multihop MP-EBGP Between AS Border Routers
Carrier-of-Carriers VPNs
Internet Service Provider as the Customer
VPN Service Provider as the Customer
Configuring Interprovider and Carrier-of-Carriers VPNs
Configuring Interprovider VPNs
Configuring Interprovider VPNs Using MP-EBGP
Configuring RSVP
Configuring MPLS
Configuring BGP
Configuring OSPF
Configuring Interprovider VPNs Using Multihop MP-EBGP
Configuring the AS Border Routers
Configuring BGP
Configuring Policy Options
Configuring the PE Router
Configuring Carrier-of-Carriers VPNs
Configuring Carrier-of-Carriers VPN—Customer Provides Internet Service
Configuring the Carrier-of-Carriers VPN Service Customer’s CE Router
Configuring MPLS
Configuring BGP
Configuring OSPF
Configuring Policy Options
Configuring the Carrier-of-Carriers VPN Service Provider’s PE Routers
Configuring MPLS
Configuring BGP
Configuring IS-IS
Configuring LDP
Configuring a Routing Instance
Configuring Policy Options
Configuring Carrier-of-Carriers VPN—Customer Provides VPN Service
Configuring the Carrier-of-Carriers Customer’s PE Router
Configuring MPLS
Configuring BGP
Configuring OSPF
Configuring LDP
Configuring VPN Service in the Routing Instance
Configuring Policy Options
Configuring the Carrier-of-Carriers Customer’s CE Router
Configuring MPLS
Configuring BGP
Configuring OSPF and LDP
Configuring Policy Options
Configuring the Provider’s PE Router
Configuring MPLS
Configuring a PE-Router-to-PE-Router BGP Session
Configuring IS-IS and LDP
Configuring Policy Options
Configuring a Routing Instance to Send Routes to the CE Router
Configuring BGP to Gather Interprovider and Carrier-of-Carriers VPNs Statistics
Configuration Examples for Interprovider and Carrier-of-Carriers VPNs
Example Terminology
Interprovider VPN Examples
Interprovider VPN Example—MP-EBGP Between ISP Peer Routers
Configuration for Router A
Configuration for Router B
Configuration for Router C
Configuration for Router D
Configuration for Router E
Configuration for Router F
Interprovider VPN Example—Multihop MP-EBGP with P Routers
Configuration for Router A
Configuration for Router B
Configuration for Router C
Configuration for Router D
Configuration for Router E
Configuration for Router F
Carrier-of-Carriers VPN Examples
Carrier-of-Carriers VPN Example—Customer Provides Internet Service
Configuration for Router A
Configuration for Router B
Configuration for Router C
Configuration for Router D
Configuration for Router E
Configuration for Router F
Configuration for Router G
Configuration for Router H
Configuration for Router I
Configuration for Router J
Configuration for Router K
Configuration for Router L
Carrier-of-Carriers VPN Example—Customer Provides VPN Service
Configuration for Router A
Configuration for Router B
Configuration for Router C
Configuration for Router D
Configuration for Router E
Configuration for Router F
Configuration for Router G
Configuration for Router H
Configuration for Router I
Configuration for Router J
Configuration for Router K
Configuration for Router L
Multiple Instances for LDP and Carrier-of-Carriers VPNs
Summary of the Interprovider and Carrier-of-Carriers VPNs Configuration Statements
labeled-unicast
per-group-label
traffic-statistics
Layer 2 Circuit Overview
Layer 2 Circuit Overview
Layer 2 Circuit Standards
Layer 2 Circuit Policy
Layer 2 Circuit Bandwidth Accounting and Call Admission Control
Bandwidth Accounting and Call Admission Control Overview
Selecting an LSP Based on the Bandwidth Constraint
LSP Path Protection and CAC
Secondary Paths and CAC
Fast Reroute and CAC
Link and Node Protection and CAC
Layer 2 Circuits Trunk Mode
Layer 2 Circuit Configuration Guidelines
Configuring Interfaces for Layer 2 Circuits
Configuring the Address for the Neighbor of the Layer 2 Circuit
Configuring the Neighbor Interface for the Layer 2 Circuit
Configuring a Community for the Layer 2 Circuit
Configuring the Control Word for Layer 2 Circuits
Configuring the Control Word for Frame Relay Interfaces
Disabling the Control Word for Layer 2 Circuits
Configuring the MTU for the Layer 2 Circuit Neighbor Interface
Enabling the Layer 2 Circuit When the Encapsulation Does Not Match
Enabling the Layer 2 Circuit When the MTU Does Not Match
Configuring the MTU Advertised for a Layer 2 Circuit
Configuring Layer 2 Circuits over Both RSVP and LDP LSPs
Example: PSN Tunnel Endpoint
Configuring the Protect Interface
Configuring the Virtual Circuit ID
Configuring the Interface Encapsulation Type for Layer 2 Circuits
Configuring ATM2 IQ Interfaces for Layer 2 Circuits
Configuring Local Interface Switching
Configuring the Interfaces for the Local Interface Switch
Enabling Local Interface Switching When the MTU Does Not Match
Configuring LDP for Layer 2 Circuits
Configuring Layer 2 Circuit Policies
Configuring the Layer 2 Circuit Community
Configuring the Policy Statement for the Layer 2 Circuit Community
Example: Configuring a Policy for a Layer 2 Circuit Community
Verifying the Layer 2 Circuit Policy Configuration
Configuring ATM Trunking on Layer 2 Circuits
Configuring Bandwidth Allocation and Call Admission Control
Tracing Layer 2 Circuit Creation and Changes
Layer 2 Circuits Example
Configuring Router PE1
Configuring Router PE2
Configuring Router CE1
Configuring Router CE2
Summary of Layer 2 Circuit Configuration Statements
bandwidth
community
control-word
description
end-interface
ignore-encapsulation-mismatch
ignore-mtu-mismatch
install-nexthop
interface
l2circuit
local-switching
mtu
neighbor
no-control-word
protect-interface
psn-tunnel-endpoint
traceoptions
virtual-circuit-id
Indexes
Index
Index of Statements and Commands