Routers in a VPN
VPN Terminology
Types of VPNs
VPNs and Class of Service
VPNs and Logical Systems
VPN Graceful Restart
Redundant Pseudowires for Layer 2 Circuits and VPLS
VPN Standards
Configuring the Signaling Protocol on PE Routers in VPNs
Configuring an IGP on the PE and P Routers
Configuring IBGP Sessions Between PE Routers in VPNs
Configuring Routing Instances on PE Routers in VPNs
Configuring Policies for the VRF Table on PE Routers in VPNs
Configuring BGP Route Target Filtering in VPNs
Configuring Virtual-Router Routing Instances in VPNs
Configuring Graceful Restart for VPNs
Configuring Redundant Pseudowires for Layer 2 Circuits and VPLS
Configuring BFD for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS
Configuring Aggregate Labels for VPNs
Rewriting Markers and VPNs
Transmitting Nonstandard BPDUs
Pinging VPNs, VPLS, and Layer 2 Circuits
Pinging a Layer 2 VPN
Pinging a Layer 3 VPN
Pinging a Layer 2 Circuit
Setting the Forwarding Class of the Ping Packets
Pinging a VPLS Routing Instance
Configuring Path MTU Checks for VPNs
Enabling Unicast Reverse-Path Forwarding Check for VPNs
BGP Route Target Filtering for VPNs Overview
BGP Route Target Filtering for VPNs
Route Origin for VPNs
aggregate-label
backup-neighbor
description
family route-target
graceful-restart
instance-type
interface
no-forwarding
revert-time
route-distinguisher
route-distinguisher-id
switchover-delay
unicast-reverse-path
vpn-apply-export
vrf-export
vrf-import
vrf-mtu-check
vrf-target
Layer 2 VPN Overview
Layer 2 VPN Standards
Introduction to Configuring Layer 2 VPNs
Configuring the Local Site on PE Routers in Layer 2 VPNs
Configuring CCC Encapsulation for Layer 2 VPNs
Configuring TCC Encapsulation for Layer 2 VPNs and Layer 2 Circuits
Configuring Traffic Policing in Layer 2 VPNs
Disabling the Control Word for Layer 2 VPNs
Layer 2 VPN Configuration Example
control-channel
control-word
encapsulation
encapsulation-type
l2vpn
oam
policer
proxy
remote
remote-site-id
site
site-identifier
site-preference
traceoptions
Layer 3 VPN Introduction
Layer 3 VPN Platform Support
Layer 3 VPN Attributes
VPN-IPv4 Addresses and Route Distinguishers
IPv6 Layer 3 VPNs
VPN Routing and Forwarding Tables
Route Distribution Within a Layer 3 VPN
Forwarding Across the Provider’s Core Network
Routing Instances for VPNs
Multicast over Layer 3 VPNs
Layer 3 VPN Standards
Introduction to Configuring Layer 3 VPNs
Configuring Routing Between PE and CE Routers in Layer 3 VPNs
Limiting the Number of Paths and Prefixes Accepted from CE Routers in Layer 3 VPNs
Configuring Layer 3 VPNs to Carry IPv6 Traffic
Configuring EBGP Multihop Sessions Between PE and CE Routers in Layer 3 VPNs
Configuring Layer 3 VPNs to Carry IBGP Traffic
Filtering Packets in Layer 3 VPNs Based on IP Headers
Applying Custom MPLS EXP Classifiers to Routing Instances in Layer 3 VPNs
Load Balancing and IP Header Filtering for Layer 3 VPNs
Configuring a Label Allocation and Substitution Policy for VPNs
Configuring a VPN Tunnel for VRF Table Lookup
Configuring Logical Units on the Loopback Interface for Routing Instances in Layer 3 VPNs
Configuring Multicast Layer 3 VPNs
Configuring Packet Forwarding for Layer 3 VPNs
Configuring GRE Tunnels for Layer 3 VPNs
Configuring an ES Tunnel Interface for Layer 3 VPNs
Configuring IPsec Tunnels Instead of MPLS LSPs Between PE Routers in Layer 3 VPNs
Configuring Protocol-Independent Load Balancing in Layer 3 VPNs
Configuring the Algorithm That Determines the Active Route to Evaluate AS Numbers in AS Paths for VPN Routes
Configuring Traffic Policing in Layer 3 VPNs
Accepting BGP Updates with Unique Inner VPN Labels in Layer 3 VPNs
Diagnosing Common Problems
Troubleshooting Layer 3 VPNs Using ping and traceroute
Pinging the CE Router from Another CE Router
Pinging the Remote PE and CE Routers from the Local CE Router
Pinging the Directly Connected PE Routers from the CE Routers
Pinging the Directly Connected CE Routers from the PE Routers
Configuring a Simple Full-Mesh VPN Topology
Configuring a Full-Mesh VPN Topology with Route Reflectors
Configuring Hub-and-Spoke VPN Topologies: One Interface
Configuring Hub-and-Spoke VPN Topologies: Two Interfaces
Configuring an LDP-over-RSVP VPN Topology
Configuring an Application-Based Layer 3 VPN Topology
Configuring an OSPF Domain ID for a Layer 3 VPN
Configuring Overlapping VPNs Using Routing Table Groups
Configuring Overlapping VPNs Using Automatic Route Export
Configuring a GRE Tunnel Interface Between PE Routers
Configuring a GRE Tunnel Interface Between a PE and CE Router
Configuring an ES Tunnel Interface Between a PE and CE Router
Non-VRF Internet Access
Distributed Internet Access
Routing VPN and Internet Traffic Through Different Interfaces
Routing VPN and Outgoing Internet Traffic Through the Same Interface and Routing Return Internet Traffic Through a Different Interface
Routing VPN and Internet Traffic Through the Same Interface Bidirectionally (VPN Has Public Addresses)
Routing VPN and Internet Traffic Through the Same Interface Bidirectionally (VPN Has Private Addresses)
Routing Internet Traffic Through a Separate NAT Device
Centralized Internet Access
as-path-compare
classifiers
domain-id
domain-vpn-tag
dynamic-tunnels
independent-domain
inet6-vpn
l3vpn-composite-nexthop
label
maximum-paths
maximum-prefixes
metric
multihop
multipath
routing-instances
sham-link
sham-link-remote
vpn-group-address
vpn-unequal-cost
vrf-table-label
BGP MPLS Multicast VPN Overview
Multicast VPN Terminology
Multicast VPN Standards
PIM Sparse Mode, PIM Dense Mode, Auto-RP, and BSR for MBGP MVPNs
Introduction to Configuring MBGP MVPNs
Configuring Routing Instances for an MBGP MVPN
Configuring SPT-Only Mode for Multiprotocol BGP-Based Multicast VPNs
Configuring Shared-Tree Data Distribution Across Provider Cores for Providers of MBGP MVPNs
Limiting Routes to Be Advertised by an MVPN VRF Instance
Configuring VRF Route Targets for Routing Instances for an MBGP MVPN
Configuring NLRI Parameters for an MBGP MVPN
Configuring PIM Provider Tunnels for an MBGP MVPN
Configuring PIM-SSM GRE Selective Provider Tunnels
Configuring Point-to-Multipoint LSPs for an MBGP MVPN
Using Wildcards to Configure Selective Point-to-Multipoint LSPs for an MBGP MVPN
Configuring a Selective Provider Tunnel Using Wildcards
Example: Configuring Selective Provider Tunnels Using Wildcards
Tracing MBGP MVPN Traffic and Operations
export-target
family
group
group-range
import-target
inet-mvpn
inet6-mvpn
label-switched-path-template
mvpn
mvpn-mode
pim-asm
pim-ssm
provider-tunnel
route-target
rpt-spt
rsvp-te
selective
source
spt-only
static-lsp
target
threshold-rate
tunnel-limit
unicast
vrf-advertise-selective
wildcard-group-inet
wildcard-group-inet6
wildcard-source
Introduction to VPLS
Supported Platforms and PICs
VPLS Routing and Virtual Ports
VPLS and Aggregated Ethernet Interfaces
VPLS Multihoming
Interoperability between BGP Signaling and LDP Signaling in VPLS
VPLS Label Blocks Operation
PE Router Mesh Groups for VPLS Routing Instances
VPLS Standards
Introduction to Configuring VPLS
Configuring VPLS Routing Instances
Configuring Static Pseudowires for VPLS
Configuring EXP-Based Traffic Classification for VPLS
Configuring Interfaces for VPLS Routing
Configuring VPLS Load Balancing
Configuring VPLS Fast Reroute Priority
Configuring VPLS Without a Tunnel Services PIC
Configuring an Ethernet Switch as the CE Device
Mapping VPLS Traffic to Specific LSPs
Configuring Firewall Filters and Policers for VPLS
Specifying the VT Interfaces Used by VPLS Routing Instances
Configuring VPLS Multihoming
Flooding Unknown Traffic Using Point-to-Multipoint LSPs
Configuring VPLS and Integrated Routing and Bridging
Configuring Interoperability Between BGP Signaling and LDP Signaling in VPLS
Tracing VPLS Traffic and Operations
Configuring Port Mirroring for VPLS Traffic
Configuring the Label Block Size
Example: Building a VPLS From Router 1 to Router 3
active-interface
automatic-site-id
connectivity-type
family multiservice
fast-reroute-priority
interface-mac-limit
label-block-size
local-switching
mac-flush
mac-table-aging-time
mac-table-size
mesh-group
multi-homing
neighbor
no-local-switching
no-tunnel-services
peer-as
site-range
static
template
tunnel-services
vlan-id
vlan-id-list
vlan-tagging
vpls
vpls-id
Traditional VPNs, Interprovider VPNs, and Carrier-of-Carriers VPNs
Standard VPNs
Interprovider and Carrier-of-Carriers VPNs
Interprovider VPNs
Carrier-of-Carriers VPNs
Interprovider and Carrier-of-Carriers VPN Standards
Configuring Interprovider VPNs
Configuring Carrier-of-Carriers VPNs for Customers That Provide Internet Service
Configuring Carrier-of-Carriers VPNs for Customers That Provide VPN Service
Configuring BGP to Gather Interprovider and Carrier-of-Carriers VPNs Statistics
Example Terminology
Interprovider VPN Example—MP-EBGP Between ISP Peer Routers
Interprovider VPN Example—Multihop MP-EBGP with P Routers
Carrier-of-Carriers VPN Examples
Carrier-of-Carriers VPN Example—Customer Provides Internet Service
Carrier-of-Carriers VPN Example—Customer Provides VPN Service
Multiple Instances for LDP and Carrier-of-Carriers VPNs
labeled-unicast
per-group-label
traffic-statistics
Layer 2 Circuit Overview
Layer 2 Circuit Bandwidth Accounting and Call Admission Control
Layer 2 Circuit Standards
Introduction to Configuring Layer 2 Circuits
Configuring Interfaces for Layer 2 Circuits
Configuring LDP for Layer 2 Circuits
Configuring Static Layer 2 Circuits
Configuring Policies for Layer 2 Circuits
Configuring ATM Trunking on Layer 2 Circuits
Configuring Bandwidth Allocation and Call Admission Control in Layer 2 Circuits
Tracing Layer 2 Circuit Operations
Introduction to Layer 2 Circuit Protect Interfaces Example
bandwidth
community
end-interface
ignore-encapsulation-mismatch
ignore-mtu-mismatch
install-nexthop
l2circuit
mtu
protect-interface
pseudowire-status-tlv
psn-tunnel-endpoint
virtual-circuit-id