JUNOS 9.4 VPNs Configuration Guide
DVD Home
Techpubs Home
Report an Error
Collapse TOC
List of Figures
List of Tables
Index
Index of Statements and Commands
Entire manual as PDF
|  |
-
About This Guide
-
-
Objectives
-
Audience
-
Supported Routing Platforms
-
Using the Indexes
-
Using the Examples in This Manual
-
Documentation Conventions
-
-
List of Technical Publications
-
Documentation Feedback
-
Requesting
Technical Support
-
VPN Overview
-
-
VPN Standards
-
VPN Terminology
-
Types of VPNs
-
-
Layer 2 VPNs
-
Layer 3 VPNs
-
VPLS
-
Virtual-Router Routing Instances
-
VPNs and Class of Service
-
VPNs and Logical Systems
-
VPN Graceful Restart
-
Redundant Pseudowires for Layer 2 Circuits and VPLS
-
-
Types of Redundant Pseudowire Configurations
-
Pseudowire Failure Detection
-
Configuring VPNs
-
-
Enabling a Signaling Protocol on the PE Routers
-
-
Using LDP for VPN Signaling
-
Using RSVP for VPN Signaling
-
Configuring an IGP on the PE and P Routers
-
Configuring an IBGP Session Between PE Routers
-
Configuring a VPN Routing Instance on the PE Routers
-
-
Configuring the Description
-
Configuring the Instance Type
-
Configuring Interfaces for VPN Routing
-
-
General Configuration
for VPN Routing
-
Configuring
Interfaces for Layer 3 VPNs
-
Configuring Interfaces for Carrier-of-Carriers VPNs
-
Configuring
Unicast RPF on VPN Interfaces
-
Configuring the Route Distinguisher
-
Configuring Automatic Route Distinguishers
-
Configuring Policies for the PE Router’s VRF Table
-
-
Configuring
the Route Target
-
Configuring the Route Origin
-
Configuring
an Import Policy for the PE Router’s VRF Table
-
Configuring
an Export Policy for the PE Router’s VRF Table
-
Applying
Both the VRF Export and the BGP Export Policies
-
Configuring
a VRF Target
-
Configuring BGP Route Target Filtering
-
-
BGP Route Target
Filtering Overview
-
Configuring
BGP Route Target Filtering for VPNs
-
Configuring a Virtual-Router Routing Instance
-
-
Configuring a Routing Protocol Between the Service Provider
Routers
-
Configuring Logical Interfaces Between Participating Routers
-
Configuring Graceful Restart
-
Configuring Redundant Pseudowires for Layer 2 Circuits and
VPLS
-
-
Configuring Pseudowire Redundancy on the PE Router
-
Configuring the Switchover Delay for the Pseudowires
-
Configuring Aggregate Labels for VPNs
-
Rewriting Markers and VPNs
-
Transmitting Nonstandard BPDUs
-
Pinging VPNs and Layer 2 Circuits
-
-
Pinging a Layer 2 VPN
-
Pinging a Layer 3 VPN
-
Pinging a Layer 2 Circuit
-
Setting the Forwarding Class of the Ping Packets
-
Configuring a Path MTU Check for VPNs
-
-
Enabling Path MTU Checks for a VPN Routing Instance
-
Assigning an IP Address to the VPN Routing Instance
-
Enabling Unicast Reverse-Path Forwarding Check for VPNs
-
VPN Examples
-
-
BGP Route Target Filtering for VPNs Overview
-
BGP Route Target Filtering for VPNs
-
-
Configure BGP Route Target Filtering on Router PE1
-
Configure BGP Route Target Filtering on Router PE2
-
Configure BGP Route Target Filtering on the Route Reflector
-
Configure BGP Route Target Filtering on Router PE3
-
Route Origin for VPNs
-
-
Configuring the Site of Origin Community on CE Router A
-
Configuring the Community on CE Router A
-
Applying the Policy Statement on CE Router A
-
Configuring the Policy on PE Router D
-
Configuring the Community on PE Router D
-
Applying the Policy on PE Router D
-
Summary of VPN Configuration Statements
-
-
aggregate-label
-
backup-neighbor
-
description
-
family route-target
-
graceful-restart
-
instance-type
-
interface
-
no-forwarding
-
route-distinguisher
-
route-distinguisher-id
-
switchover-delay
-
unicast-reverse-path
-
vpn-apply-export
-
vrf-export
-
vrf-import
-
vrf-target
-
vrf-mtu-check
-
Layer 2 VPN Overview
-
-
Layer 2 VPN Overview
-
Layer 2 VPN Standards
-
Configuring Layer 2 VPNs
-
-
Configuring the Connections to the Local Site
-
-
Configuring a Layer 2 VPN Routing Instance
-
Configuring the Site
-
Configuring the Remote Site ID
-
Configuring the Encapsulation Type
-
Configuring a Site Preference and Layer 2 VPN Multihoming
-
Tracing Layer 2 VPN Traffic and Operations
-
-
Disabling
Normal TTL Decrementing for VPNs
-
Configuring CCC Encapsulation on Interfaces
-
Configuring TCC Encapsulation on Interfaces
-
Configuring Layer 2 VPN Policing on Interfaces
-
Disabling the Control Word for Layer 2 VPNs
-
Layer 2 VPN Configuration Example
-
-
Simple Full-Mesh Layer 2 VPN Overview
-
Enabling an IGP on the PE Routers
-
Configuring MPLS LSP Tunnels Between the PE Routers
-
Configuring IBGP on the PE Routers
-
Configuring Routing Instances for Layer 2 VPNs on the PE Routers
-
Configuring CCC Encapsulation on the Interfaces
-
Configuring VPN Policy on the PE Routers
-
Layer 2 VPN Configuration Summarized by Router
-
-
Summary for Router A (PE Router for Sunnyvale)
-
Summary for Router B (PE Router for Austin)
-
Summary for Router C (PE Router for Portland)
-
Summary of Layer 2 VPN Configuration Statements
-
-
control-word
-
description
-
encapsulation
-
-
encapsulation (Logical Interface)
-
encapsulation (Physical Interface)
-
encapsulation-type
-
interface
-
l2vpn
-
no-control-word
-
policer
-
proxy
-
remote
-
remote-site-id
-
site
-
site-identifier
-
site-preference
-
traceoptions
-
Layer 3 VPN Overview
-
-
Layer 3 VPN Introduction
-
Layer 3 VPN Standards
-
Layer 3 VPN Platform Support
-
Layer 3 VPN Attributes
-
VPN-IPv4 Addresses and Route Distinguishers
-
IPv6 Layer 3 VPNs
-
VPN Routing and Forwarding Tables
-
Route Distribution Within a Layer 3 VPN
-
-
Distribution of Routes from CE to PE Routers
-
Distribution of Routes Between PE Routers
-
Distribution of Routes from PE to CE Routers
-
Forwarding Across the Provider’s Core Network
-
Routing Instances for VPNs
-
Multicast over Layer 3 VPNs
-
-
Multicast over Layer 3 VPNs Overview
-
Sending PIM Hello Messages to the PE Routers
-
Sending PIM Join Messages to the PE Routers
-
Receiving the Multicast Transmission
-
Configuring Layer 3 VPNs
-
-
Configuring VPN Routing Between the PE and CE Routers
-
-
Configuring BGP Between the PE and CE Routers
-
Configuring OSPF Between the PE and CE Routers
-
-
Configuring
OSPF Version 2 Between the PE and CE Routers
-
Configuring OSPF Version 3 Between the PE and CE Routers
-
Configuring OSPF Sham Links for Layer 3 VPNs
-
-
OSPF Sham Links
Overview
-
Configuring
OSPF Sham Links
-
OSPF
Sham Links Example
-
Configuring an OSPF Domain ID
-
-
Hub-and-Spoke Layer 3 VPNs and
OSPF Domain ID
-
Configuring RIP Between the PE and CE Routers
-
Configuring Static Routes Between the PE and CE Routers
-
Limiting the Paths and Prefixes Accepted from a CE Router
-
Configuring IPv6 Between the PE and CE Routers
-
-
Configuring
IPv6 on the PE Router
-
Configuring the Connection Between the PE and CE Routers
-
-
Configuring
BGP on the PE Router to Handle IPv6 Routes
-
Configuring BGP on the PE Router for IPv4 and IPv6 Routes
-
Configuring OSPF Version 3 on the PE Router
-
Configuring
Static Routes on the PE Router
-
Configuring IPv6 on the Interfaces
-
Configuring EBGP or IBGP Multihop Between PE and CE Routers
-
Configuring Layer 3 VPNs to Carry IBGP Traffic
-
Filtering Traffic Based on the IP Header
-
-
Configuring Traffic Filtering Based on the IP Header
-
-
Egress Filtering Options
-
Support
for Ethernet, SONET/SDH, and T1/T3/E3 Interfaces
-
Support for Aggregated
and VLAN Interfaces
-
Support
for ATM and Frame Relay Interfaces
-
Support for Multilink
PPP and Multilink Frame Relay Interfaces
-
Support for Packets with
Null Top Labels
-
Other Limitations
-
Applying MPLS EXP Classifiers to Routing Instances
-
Configuring a VPN Tunnel for VRF Table Lookup
-
Configuring a Logical Unit on the Loopback Interface
-
Configuring Multicast over Layer 3 VPNs
-
Configuring Packet Forwarding for Layer 3 VPNs
-
Configuring GRE Tunnels for Layer 3 VPNs
-
-
Configuring GRE Tunnels Manually Between PE and CE Routers
-
-
Configuring
the GRE Tunnel Interface on the PE Router
-
Configuring the GRE Tunnel Interface on the CE Router
-
Configuring GRE Tunnels Dynamically
-
Configuring an ES Tunnel Interface for Layer 3 VPNs
-
-
Configuring the ES Tunnel Interface on the PE Router
-
Configuring the ES Tunnel Interface on the CE Router
-
Configuring IPSec Instead of MPLS Between PE Routers
-
Configuring SCU and DCU for Layer 3 VPNs
-
Protocol-Independent Load Balancing for Layer 3 VPNs
-
-
Configuring Load Balancing for Layer 3 VPNs
-
Configuring Load Balancing and Routing Policies
-
Configuring Layer 3 VPN Policing on Interfaces
-
Sending RADIUS Messages Through a Layer 3 VPN
-
Troubleshooting Layer 3 VPNs
-
-
Diagnosing Common Problems
-
Troubleshooting Layer 3 VPNs Using ping and traceroute
-
-
Pinging the CE Router from Another CE Router
-
-
Pinging Router
CE2 from Router CE1
-
Using
traceroute from Loopback to Loopback
-
Pinging
Router CE1 from Router CE2
-
Using
traceroute from Router CE2 to Router CE1
-
Pinging the Remote PE and CE Routers from the Local CE Router
-
-
Pinging Router
CE2 from Router CE1
-
Using
traceroute from Router CE1 to Router CE2
-
Pinging
Router PE2 from Router CE1
-
Using
traceroute from Router CE1 to Router PE2
-
Pinging
a CE Router from a Multiaccess Interface
-
Pinging the Directly Connected PE Routers from the CE Routers
-
-
Pinging Router
PE1 from the Loopback Interface on Router CE1
-
Using
traceroute from the Loopback Interface on Router CE1 to PE1
-
Pinging
Router PE2 from the Loopback Interface on Router CE2
-
Using
traceroute from the Loopback Interface on Router CE2 to PE2
-
Pinging the Directly Connected CE Routers from the PE Routers
-
-
Pinging the
VPN Interface on Router CE1 from Router PE1
-
Pinging
the Loopback Interface on Router CE1 from Router PE1
-
Using
traceroute from Router PE1 to Router CE1
-
Pinging
the VPN Interface on Router CE2 from Router PE2
-
Pinging
the Loopback Interface on Router CE2 from Router PE2
-
Using
traceroute from Router PE2 to Router CE2
-
Pinging the Remote CE Router from the Local PE Router
-
-
Limitation on Pinging
a Remote CE Router from a PE Router
-
Pinging a Layer 3 VPN
-
Disabling Normal TTL Decrementing for Layer 3 VPNs
-
Troubleshooting RSVP and LDP LSPs
-
Troubleshooting Inconsistently Advertised Routes from Gigabit
Ethernet Interfaces
-
Layer 3 VPN Configuration Examples
-
-
Configuring a Simple Full-Mesh VPN Topology
-
-
Enabling an IGP on the PE and P Routers
-
Enabling RSVP and MPLS on the P Router
-
Configuring the MPLS LSP Tunnel Between the PE Routers
-
Configuring IBGP on the PE Routers
-
Configuring Routing Instances for VPNs on the PE Routers
-
Configuring VPN Policy on the PE Routers
-
Simple VPN Configuration Summarized by Router
-
-
Router A (PE Router)
-
Router B (P Router)
-
Router C (PE Router)
-
Configuring a Full-Mesh VPN Topology with Route Reflectors
-
Configuring Hub-and-Spoke VPN Topologies: One Interface
-
-
Configuring Hub CE1
-
Configuring Hub PE1
-
Configuring the P Router
-
Configuring Spoke PE2
-
Configuring Spoke PE3
-
Configuring Spoke CE2
-
Configuring Spoke CE3
-
Enabling Egress Features on the Hub PE Router
-
-
Configuring Hub PE1
-
Configuring Hub-and-Spoke VPN Topologies: Two Interfaces
-
-
Enabling an IGP on the Hub-and-Spoke PE Routers
-
Configuring LDP on the Hub-and-Spoke PE Routers
-
Configuring IBGP on the PE Routers
-
Configuring VPN Routing Instances on the Hub-and-Spoke PE Routers
-
Configuring VPN Policy on the PE Routers
-
Hub-and-Spoke VPN Configuration Summarized by Router
-
-
Router D (Hub PE Router)
-
Router E (Spoke
PE Router)
-
Router F (Spoke
PE Router)
-
Configuring an LDP-over-RSVP VPN Topology
-
-
Enabling an IGP on the PE and P Routers
-
Enabling LDP on the PE and P Routers
-
Enabling RSVP and MPLS on the P Router
-
Configuring the MPLS LSP Tunnel Between the P Routers
-
Configuring IBGP on the PE Routers
-
Configuring Routing Instances for VPNs on the PE Routers
-
Configuring VPN Policy on the PE Routers
-
LDP-over-MPLS VPN Configuration Summarized by Router
-
-
Router PE1
-
Router P1
-
Router P2
-
Router P3
-
Router PE2
-
Configuring an Application-Based Layer 3 VPN Topology
-
-
Configuration on Router A
-
Configuration on Router E
-
Configuration on Router F
-
Configuring an OSPF Domain ID for a Layer 3 VPN
-
-
Configuring Interfaces on Router PE1
-
Configuring Routing Options on Router PE1
-
Configuring Protocols on Router PE1
-
Configuring Policy Options on Router PE1
-
Configuring the Routing Instance on Router PE1
-
Configuration Summary for Router PE1
-
Configuring Overlapping VPNs Using Routing Table Groups
-
-
Configuring Routing Table Groups
-
Configuring Static Routes Between the PE and CE Routers
-
-
Configuring
the Routing Instance for VPN A
-
Configuring
the Routing Instance for VPN AB
-
Configuring
the Routing Instance for VPN B
-
Configuring
VPN Policy
-
Configuring BGP Between the PE and CE Routers
-
Configuring OSPF Between the PE and CE Routers
-
Configuring Static, BGP, and OSPF Routes Between PE and CE
Routers
-
Configuring Overlapping VPNs Using Automatic Route Export
-
-
Configuring Overlapping VPNs with BGP and Automatic Route Export
-
Configuring Overlapping VPNs and Additional Tables
-
Configuring Automatic Route Export for All VRF Instances
-
Configuring a GRE Tunnel Interface Between PE Routers
-
-
Configuring the Routing Instance on Router A
-
Configuring the Routing Instance on Router D
-
Configuring MPLS, BGP, and OSPF on Router A
-
Configuring MPLS, BGP, and OSPF on Router D
-
Configuring the Tunnel Interface on Router A
-
Configuring the Tunnel Interface on Router D
-
Configuring the Routing Options on Router A
-
Configuring the Routing Options on Router D
-
Configuration Summary for Router A
-
Configuration Summary for Router D
-
Configuring a GRE Tunnel Interface Between a PE and CE Router
-
-
Configuring the Routing Instance Without the Encapsulating
Interface
-
-
Configuring
the Routing Instance on Router PE1
-
Configuring the GRE Tunnel Interface on Router PE1
-
Configuring
the Encapsulation Interface on Router PE1
-
Configuring the Routing Instance with the Encapsulating Interface
-
-
Configuring
the Routing Instance on Router PE1
-
Configuring the GRE Tunnel Interface on Router PE1
-
Configuring the Encapsulation Interface on Router PE1
-
Configuring the GRE Tunnel Interface on Router CE1
-
Configuring an ES Tunnel Interface Between a PE and CE Router
-
-
Configuring IPSec on Router PE1
-
Configuring the Routing Instance Without the Encapsulating
Interface
-
-
Configuring
the Routing Instance on Router PE1
-
Configuring the ES Tunnel Interface on Router PE1
-
Configuring the Encapsulating Interface for the ES Tunnel
-
Configuring the Routing Instance with the Encapsulating Interface
-
-
Configuring
the Routing Instance on Router PE1
-
Configuring the ES Tunnel Interface on Router PE1
-
Configuring the Encapsulating Interface on Router PE1
-
Configuring the ES Tunnel Interface on Router CE1
-
Configuring IPSec on Router CE1
-
Layer 3 VPN Internet Access Examples
-
-
Non-VRF Internet Access
-
-
CE Router Accesses Internet Independently of the PE Router
-
PE Router Provides Layer 2 Internet Service
-
Distributed Internet Access
-
-
Routing VPN and Internet Traffic Through Different Interfaces
-
-
Configuring
Interfaces on Router PE1
-
Configuring Routing Options on Router PE1
-
Configuring BGP, IS-IS, and LDP Protocols on Router PE1
-
Configuring a Routing Instance on Router PE1
-
Configuring Policy Options on Router PE1
-
Traffic Routed by Different Interfaces: Configuration Summarized
by Router
-
-
Router PE1
-
Routing VPN and Outgoing Internet Traffic Through the Same
Interface and Routing Return Internet Traffic Through a Different
Interface
-
-
Configuration for Router PE1
-
Routing VPN and Internet Traffic Through the Same Interface
Bidirectionally (VPN Has Public Addresses)
-
-
Configuring
Routing Options on Router PE1
-
Configuring Routing Protocols on Router PE1
-
Configuring the Routing Instance on Router PE1
-
Traffic
Routed Through the Same Interface Bidirectionally: Configuration Summarized
by Router
-
-
Router PE1
-
Routing VPN and Internet Traffic Through the Same Interface
Bidirectionally (VPN Has Private Addresses)
-
-
Configuring
Routing Options for Router PE1
-
Configuring a Routing Instance for Router PE1
-
Configuring Policy Options for Router PE1
-
Traffic Routed by the Same Interface Bidirectionally (VPN Has
Private Addresses): Configuration Summarized by Router
-
-
Router PE1
-
Routing Internet Traffic Through a Separate NAT Device
-
-
Configuring
Interfaces on Router PE1
-
Configuring Routing Options for Router PE1
-
Configuring Routing Protocols on Router PE1
-
Configuring a Routing Instance for Router PE1
-
Traffic Routed by Separate NAT Device: Configuration Summarized
by Router
-
-
Router PE1
-
Centralized Internet Access
-
-
Routing Internet Traffic Through a Hub CE Router
-
-
Configuring
a Routing Instance on Router PE1
-
Configuring Policy Options on Router PE1
-
Internet Traffic Routed by a Hub CE Router: Configuration Summarized
by Router
-
-
Router PE1
-
Routing Internet Traffic Through Multiple CE Routers
-
-
Configuring
a Routing Instance on Router PE1
-
Configuring Policy Options on Router PE1
-
Configuring
a Routing Instance on Router PE3
-
Configuring Policy Options on Router PE3
-
Routing Internet Traffic Through Multiple CE Routers: Configuration
Summarized by Router
-
-
Router PE1
-
Router PE2
-
Router PE3
-
Summary of Layer 3 VPN Configuration Statements
-
-
classifiers
-
domain-id
-
domain-vpn-tag
-
dynamic-tunnels
-
independent-domain
-
inet6-vpn
-
maximum-paths
-
maximum-prefixes
-
metric
-
multihop
-
multipath
-
routing-instances
-
sham-link
-
sham-link-remote
-
vpn-group-address
-
vpn-unequal-cost
-
vrf-table-label
-
Multicast VPNs Overview
-
-
BGP MPLS Multicast VPN Overview
-
Multicast VPN Terminology
-
Multicast VPN Standards
-
Multicast VPNs Configuration
-
-
Configuring the Multicast VPN Routing Instance
-
Configuring a Route Target for the Multicast VPN Routing Instance
-
-
Configuring the Export Target for the Multicast VPN
-
Configuring the Import Target for the Multicast VPN
-
-
Configuring
the Import Target Receiver and Sender
-
Configuring
the Import Target Unicast Parameters
-
Configuring NLRI Parameters for Multicast VPN
-
Configuring PIM Provider Tunnels for Multicast VPNs
-
Configuring Point-to-Multipoint LSPs for Multicast VPNs
-
-
Configuring Inclusive Point-to-Multipoint LSPs
-
Configuring Selective Point-to-Multipoint LSPs
-
-
Configuring the Multicast
Group Address
-
Configuring
the Multicast Source Address
-
Configuring
Static Selective Point-to-Multipoint LSPs
-
Configuring Dynamic Selective Point-to-Multipoint LSPs
-
Configuring the Threshold for Dynamic Selective Point-to-Multipoint
LSPs
-
Configuring
the Tunnel Limit for Dynamic Selective Point-to-Multipoint LSPs
-
Tracing Multicast VPN Traffic and Operations
-
Summary of Multicast VPN Configuration Statements
-
-
export-target
-
group
-
import-target
-
inet-mvpn
-
inet6-mvpn
-
label-switched-path-template
-
mvpn
-
pim-asm
-
provider-tunnel
-
route-target
-
rsvp-te
-
selective
-
source
-
static-lsp
-
target
-
threshold-rate
-
traceoptions
-
tunnel-limit
-
unicast
-
VPLS Overview
-
-
VPLS Overview
-
VPLS Standards
-
Supported Platforms and PICs
-
VPLS Routing and Virtual Ports
-
VPLS and Aggregated Ethernet Interfaces
-
VPLS Multihoming
-
Interoperability between BGP Signaling and LDP Signaling in
VPLS
-
-
LDP-Signaled and BGP-Signaled PE Router Topology
-
Flooding Unknown Packets Across Mesh Groups
-
Unicast Packet Forwarding
-
PE Router Mesh Groups for VPLS Routing Instances
-
Configuring VPLS
-
-
Configuring the VPLS Routing Instance
-
-
Configuring BGP Signaling for VPLS
-
-
Configuring
the VPLS Site Name and Site Identifier
-
Configuring Automatic Site Identifiers for VPLS
-
Configuring the Site Range
-
Configuring
the VPLS Site Interfaces
-
Configuring the VPLS Site Preference
-
Configuring LDP Signaling for VPLS
-
-
Configuring LDP Signaling for the VPLS Routing Instance
-
Configuring LDP Signaling on the
Router
-
Configuring VPLS Routing Instance and VPLS Interface Connectivity
-
Configuring the VPLS MAC Table Timeout Interval
-
Configuring the Size of the VPLS MAC Address Table
-
Limiting the Number of MAC Addresses Learned from an Interface
-
Removing Addresses from the MAC Address Database
-
Configuring EXP-Based Traffic Classification for VPLS
-
Configuring Interfaces for VPLS Routing
-
-
Configuring the Interface Name
-
Configuring the VPLS Interface Encapsulation
-
Enabling VLAN Tagging
-
Configuring Aggregated Ethernet Interfaces for VPLS
-
Configuring VPLS Load Balancing
-
Configuring VPLS Without a Tunnel Services PIC
-
Configuring an Ethernet Switch as the CE Device
-
Mapping VPLS Traffic to a Specific LSP
-
Configuring VPLS Filters and Policers
-
-
Configuring a VPLS Filter
-
-
Configuring
an Interface-Specific Counter for VPLS
-
Configuring
the VPLS Filter Match Conditions
-
Configuring
an Action for the VPLS Filter
-
Configuring
VPLS FTFs
-
Changing
Precedence for Spanning Tree BPDU Packets
-
Applying
a VPLS Filter to an Interface
-
Applying
a VPLS Filter to a VPLS Routing Instance
-
Configuring
a Filter for Flooded Traffic
-
Configuring a VPLS Policer
-
Specifying the VT Interfaces Used by VPLS Routing Instances
-
Configuring VPLS Multihoming
-
-
VPLS Multihomed Site Configuration
-
-
Specifying
an Interface as the Active Interface
-
Configuring Multihoming on the PE Router
-
VPLS Single-Homed Site Configuration
-
Flooding Unknown Traffic Using Point-to-Multipoint LSPs
-
-
Configuring Static Point-to-Multipoint Flooding LSPs
-
Configuring Dynamic Point-to-Multipoint Flooding LSPs
-
-
Configuring Dynamic Point-to-Multipoint Flooding LSPs
with the Default Template
-
Configuring Dynamic Point-to-Multipoint
Flooding LSPs with a Preconfigured Template
-
Configuring VPLS and Integrated Routing and Bridging
-
-
Configuring MAC Address Flooding and Learning for VPLS
-
Configuring MSTP for VPLS
-
Configuring Interoperability Between BGP Signaling and LDP
Signaling in VPLS
-
-
Configuring VPLS Mesh Groups for LDP BGP Interworking
-
Configuring Switching Between Pseudowires Using VPLS Mesh Groups
-
Configuring Integrated Routing and Bridging Support for LDP
BGP Interworking with VPLS
-
Configuring Inter-AS VPLS with MAC Processing at the ASBR
-
-
Inter-AS VPLS with MAC Operations Configuration Summary
-
Configuring the ASBRs for Inter-AS
VPLS
-
Tracing VPLS Traffic and Operations
-
Summary of VPLS Configuration Statements
-
-
active-interface
-
automatic-site-id
-
connectivity-type
-
encapsulation
-
family multiservice
-
interface
-
interface-mac-limit
-
label-switched-path-template
-
local-switching
-
mac-tlv-receive
-
mac-tlv-send
-
mac-table-aging-time
-
mac-table-size
-
mesh-group
-
multi-homing
-
neighbor
-
no-local-switching
-
no-tunnel-services
-
peer-as
-
rsvp-te
-
site
-
site-identifier
-
site-preference
-
site-range
-
template
-
traceoptions
-
tunnel-services
-
vlan-id
-
vlan-tagging
-
vpls
-
-
vpls (Interfaces)
-
vpls (Routing Instance)
-
vpls-id
-
Interprovider and Carrier-of-Carriers VPNs Overview
-
-
Interprovider and Carrier-of-Carriers VPN Standards
-
Traditional VPNs, Interprovider VPNs, and Carrier-of-Carriers
VPNs
-
-
Standard VPNs
-
Interprovider and Carrier-of-Carriers VPNs
-
Interprovider VPNs
-
-
Linking VRF Tables Between Autonomous Systems
-
Configuring MP-EBGP Between AS Border Routers
-
Configuring Multihop MP-EBGP Between AS Border Routers
-
Carrier-of-Carriers VPNs
-
-
Internet Service Provider as the Customer
-
VPN Service Provider as the Customer
-
Configuring Interprovider and Carrier-of-Carriers VPNs
-
-
Configuring Interprovider VPNs
-
-
Configuring Interprovider VPNs Using MP-EBGP
-
-
Configuring
RSVP
-
Configuring MPLS
-
Configuring BGP
-
Configuring OSPF
-
Configuring Interprovider VPNs Using Multihop MP-EBGP
-
-
Configuring
the AS Border Routers
-
-
Configuring
BGP
-
Configuring Policy Options
-
Configuring the PE Router
-
Configuring Carrier-of-Carriers VPNs
-
-
Configuring Carrier-of-Carriers VPN—Customer Provides
Internet Service
-
-
Configuring
the Carrier-of-Carriers VPN Service Customer’s CE Router
-
-
Configuring
MPLS
-
Configuring BGP
-
Configuring OSPF
-
Configuring Policy Options
-
Configuring the Carrier-of-Carriers VPN Service
Provider’s PE Routers
-
-
Configuring
MPLS
-
Configuring BGP
-
Configuring IS-IS
-
Configuring LDP
-
Configuring a Routing Instance
-
Configuring Policy Options
-
Configuring Carrier-of-Carriers VPN—Customer Provides
VPN Service
-
-
Configuring
the Carrier-of-Carriers Customer’s PE Router
-
-
Configuring
MPLS
-
Configuring BGP
-
Configuring OSPF
-
Configuring LDP
-
Configuring VPN Service in the Routing Instance
-
Configuring Policy Options
-
Configuring the Carrier-of-Carriers Customer’s
CE Router
-
-
Configuring
MPLS
-
Configuring BGP
-
Configuring OSPF and LDP
-
Configuring Policy Options
-
Configuring the Provider’s PE Router
-
-
Configuring
MPLS
-
Configuring a PE-Router-to-PE-Router BGP Session
-
Configuring IS-IS and LDP
-
Configuring Policy Options
-
Configuring a Routing Instance to Send Routes to the CE Router
-
Configuring BGP to Gather Interprovider and Carrier-of-Carriers
VPNs Statistics
-
Configuration Examples for Interprovider and Carrier-of-Carriers
VPNs
-
-
Example Terminology
-
Interprovider VPN Examples
-
-
Interprovider VPN Example—MP-EBGP Between ISP Peer Routers
-
-
Configuration for Router
A
-
Configuration
for Router B
-
Configuration
for Router C
-
Configuration
for Router D
-
Configuration
for Router E
-
Configuration for Router F
-
Interprovider VPN Example—Multihop MP-EBGP with P Routers
-
-
Configuration
for Router A
-
Configuration for
Router B
-
Configuration
for Router C
-
Configuration
for Router D
-
Configuration
for Router E
-
Configuration
for Router F
-
Carrier-of-Carriers VPN Examples
-
-
Carrier-of-Carriers VPN Example—Customer Provides Internet
Service
-
-
Configuration for Router A
-
Configuration
for Router B
-
Configuration
for Router C
-
Configuration
for Router D
-
Configuration
for Router E
-
Configuration
for Router F
-
Configuration
for Router G
-
Configuration
for Router H
-
Configuration
for Router I
-
Configuration
for Router J
-
Configuration
for Router K
-
Configuration
for Router L
-
Carrier-of-Carriers VPN Example—Customer Provides VPN
Service
-
-
Configuration
for Router A
-
Configuration
for Router B
-
Configuration
for Router C
-
Configuration
for Router D
-
Configuration
for Router E
-
Configuration
for Router F
-
Configuration
for Router G
-
Configuration
for Router H
-
Configuration
for Router I
-
Configuration
for Router J
-
Configuration
for Router K
-
Configuration
for Router L
-
Multiple Instances for LDP and Carrier-of-Carriers VPNs
-
Summary of the Interprovider and Carrier-of-Carriers VPNs
Configuration Statements
-
-
labeled-unicast
-
per-group-label
-
traffic-statistics
-
Layer 2 Circuit Overview
-
-
Layer 2 Circuit Overview
-
Layer 2 Circuit Standards
-
Layer 2 Circuit Policy
-
Layer 2 Circuit Bandwidth Accounting and Call Admission Control
-
-
Bandwidth Accounting and Call Admission Control Overview
-
Selecting an LSP Based on the Bandwidth Constraint
-
LSP Path Protection and CAC
-
-
Secondary Paths
and CAC
-
Fast Reroute and CAC
-
Link
and Node Protection and CAC
-
Layer 2 Circuits Trunk Mode
-
Layer 2 Circuit Configuration Guidelines
-
-
Configuring Interfaces for Layer 2 Circuits
-
-
Configuring the Address for the Neighbor of the Layer 2 Circuit
-
Configuring the Neighbor Interface for the Layer 2 Circuit
-
-
Configuring
a Community for the Layer 2 Circuit
-
Configuring
the Control Word for Layer 2 Circuits
-
-
Configuring
the Control Word for Frame Relay Interfaces
-
Disabling
the Control Word for Layer 2 Circuits
-
Configuring the MTU for the Layer
2 Circuit Neighbor Interface
-
-
Enabling
the Layer 2 Circuit When the Encapsulation Does Not Match
-
Enabling
the Layer 2 Circuit When the MTU Does Not Match
-
Configuring the MTU Advertised for a Layer 2 Circuit
-
Configuring Layer 2 Circuits over Both RSVP
and LDP LSPs
-
-
Example: PSN Tunnel Endpoint
-
Configuring the Protect Interface
-
Configuring
the Virtual Circuit ID
-
Configuring the Interface Encapsulation Type for Layer 2 Circuits
-
Configuring ATM2 IQ Interfaces for Layer 2 Circuits
-
Configuring Local Interface Switching
-
-
Configuring the Interfaces for the Local Interface Switch
-
Enabling Local Interface Switching When the MTU Does Not Match
-
Configuring LDP for Layer 2 Circuits
-
Configuring Layer 2 Circuit Policies
-
-
Configuring the Layer 2 Circuit Community
-
Configuring the Policy Statement for the Layer 2 Circuit Community
-
-
Example: Configuring a Policy
for a Layer 2 Circuit Community
-
Verifying the Layer 2 Circuit Policy Configuration
-
Configuring ATM Trunking on Layer 2 Circuits
-
Configuring Bandwidth Allocation and Call Admission Control
-
Tracing Layer 2 Circuit Creation and Changes
-
Layer 2 Circuits Example
-
-
Configuring Router PE1
-
Configuring Router PE2
-
Configuring Router CE1
-
Configuring Router CE2
-
Summary of Layer 2 Circuit Configuration Statements
-
-
bandwidth
-
community
-
control-word
-
description
-
end-interface
-
ignore-encapsulation-mismatch
-
ignore-mtu-mismatch
-
install-nexthop
-
interface
-
l2circuit
-
local-switching
-
mtu
-
neighbor
-
no-control-word
-
protect-interface
-
psn-tunnel-endpoint
-
traceoptions
-
virtual-circuit-id
-
Indexes
-
-
Index
-
Index of Statements and Commands
|