Table of Contents

About This Guide
JUNOS Documentation and Release Notes
Objectives
Audience
Supported Platforms
Using the Indexes
Using the Examples in This Manual
Documentation Conventions
Documentation Feedback
Requesting Technical Support
VPN Overview
VPN Overview
Routers in a VPN
VPN Terminology
Types of VPNs
Layer 2 VPNs
Layer 3 VPNs
VPLS
Virtual-Router Routing Instances
VPNs and Class of Service
VPNs and Logical Systems
VPN Graceful Restart
Redundant Pseudowires for Layer 2 Circuits and VPLS
Types of Redundant Pseudowire Configurations
Pseudowire Failure Detection
VPN Standards
Configuring VPNs
Configuring the Signaling Protocol on PE Routers in VPNs
Using LDP for VPN Signaling
Using RSVP for VPN Signaling
Configuring an IGP on the PE and P Routers
Configuring IBGP Sessions Between PE Routers in VPNs
Configuring Routing Instances on PE Routers in VPNs
Configuring the Routing Instance Name for a VPN
Configuring the Description
Configuring the Instance Type
Configuring Interfaces for VPN Routing
General Configuration for VPN Routing
Configuring Interfaces for Layer 3 VPNs
Configuring Interfaces for Carrier-of-Carriers VPNs
Configuring Unicast RPF on VPN Interfaces
Configuring the Route Distinguisher
Configuring Automatic Route Distinguishers
Configuring Policies for the VRF Table on PE Routers in VPNs
Configuring the Route Target
Configuring the Route Origin
Configuring an Import Policy for the PE Router’s VRF Table
Configuring an Export Policy for the PE Router’s VRF Table
Applying Both the VRF Export and the BGP Export Policies
Configuring a VRF Target
Configuring BGP Route Target Filtering in VPNs
BGP Route Target Filtering Overview
Configuring BGP Route Target Filtering for VPNs
Configuring Virtual-Router Routing Instances in VPNs
Configuring a Routing Protocol Between the Service Provider Routers
Configuring Logical Interfaces Between Participating Routers
Configuring Graceful Restart for VPNs
Configuring Redundant Pseudowires for Layer 2 Circuits and VPLS
Configuring Pseudowire Redundancy on the PE Router
Configuring the Switchover Delay for the Pseudowires
Configuring a Revert Time for the Redundant Pseudowire
Configuring BFD for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS
Configuring Aggregate Labels for VPNs
Rewriting Markers and VPNs
Transmitting Nonstandard BPDUs
Pinging VPNs, VPLS, and Layer 2 Circuits
Pinging a Layer 2 VPN
Pinging a Layer 3 VPN
Pinging a Layer 2 Circuit
Setting the Forwarding Class of the Ping Packets
Pinging a VPLS Routing Instance
Configuring Path MTU Checks for VPNs
Enabling Path MTU Checks for a VPN Routing Instance
Assigning an IP Address to the VPN Routing Instance
Enabling Unicast Reverse-Path Forwarding Check for VPNs
VPN Examples
BGP Route Target Filtering for VPNs Overview
BGP Route Target Filtering for VPNs
Configure BGP Route Target Filtering on Router PE1
Configure BGP Route Target Filtering on Router PE2
Configure BGP Route Target Filtering on the Route Reflector
Configure BGP Route Target Filtering on Router PE3
Route Origin for VPNs
Configuring the Site of Origin Community on CE Router A
Configuring the Community on CE Router A
Applying the Policy Statement on CE Router A
Configuring the Policy on PE Router D
Configuring the Community on PE Router D
Applying the Policy on PE Router D
Summary of VPN Configuration Statements
aggregate-label
backup-neighbor
description
family route-target
graceful-restart
instance-type
interface
no-forwarding
revert-time
route-distinguisher
route-distinguisher-id
switchover-delay
unicast-reverse-path
vpn-apply-export
vrf-export
vrf-import
vrf-mtu-check
vrf-target
Layer 2 VPNs
Layer 2 VPN Overview
Layer 2 VPN Overview
Layer 2 VPN Standards
Configuring Layer 2 VPNs
Introduction to Configuring Layer 2 VPNs
Configuring the Local Site on PE Routers in Layer 2 VPNs
Configuring a Layer 2 VPN Routing Instance
Configuring the Site
Configuring the Remote Site ID
Configuring the Encapsulation Type
Configuring a Site Preference and Layer 2 VPN Multihoming
Tracing Layer 2 VPN Traffic and Operations
Disabling Normal TTL Decrementing for VPNs
Configuring CCC Encapsulation for Layer 2 VPNs
Configuring TCC Encapsulation for Layer 2 VPNs and Layer 2 Circuits
Configuring Traffic Policing in Layer 2 VPNs
Disabling the Control Word for Layer 2 VPNs
Introduction to Layer 2 VPN Configuration Example
Layer 2 VPN Configuration Example
Simple Full-Mesh Layer 2 VPN Overview
Enabling an IGP on the PE Routers
Configuring MPLS LSP Tunnels Between the PE Routers
Configuring IBGP on the PE Routers
Configuring Routing Instances for Layer 2 VPNs on the PE Routers
Configuring CCC Encapsulation on the Interfaces
Configuring VPN Policy on the PE Routers
Layer 2 VPN Configuration Summarized by Router
Summary for Router A (PE Router for Sunnyvale)
Summary for Router B (PE Router for Austin)
Summary for Router C (PE Router for Portland)
Summary of Layer 2 VPN Configuration Statements
control-channel
control-word
description
encapsulation
encapsulation (Logical Interface)
encapsulation (Physical Interface)
encapsulation-type
interface
l2vpn
no-control-word
oam
policer
proxy
remote
remote-site-id
site
site-identifier
site-preference
traceoptions
Layer 3 VPNs
Layer 3 VPN Overview
Layer 3 VPN Introduction
Layer 3 VPN Platform Support
Layer 3 VPN Attributes
VPN-IPv4 Addresses and Route Distinguishers
IPv6 Layer 3 VPNs
VPN Routing and Forwarding Tables
Route Distribution Within a Layer 3 VPN
Distribution of Routes from CE to PE Routers
Distribution of Routes Between PE Routers
Distribution of Routes from PE to CE Routers
Forwarding Across the Provider’s Core Network
Routing Instances for VPNs
Multicast over Layer 3 VPNs
Multicast over Layer 3 VPNs Overview
Sending PIM Hello Messages to the PE Routers
Sending PIM Join Messages to the PE Routers
Receiving the Multicast Transmission
Layer 3 VPN Standards
Configuring Layer 3 VPNs
Introduction to Configuring Layer 3 VPNs
Configuring Routing Between PE and CE Routers in Layer 3 VPNs
Configuring BGP Between the PE and CE Routers
Configuring OSPF Between the PE and CE Routers
Configuring OSPF Version 2 Between the PE and CE Routers
Configuring OSPF Version 3 Between the PE and CE Routers
Configuring OSPF Sham Links for Layer 3 VPNs
OSPF Sham Links Overview
Configuring OSPF Sham Links
OSPF Sham Links Example
Configuring an OSPF Domain ID
Hub-and-Spoke Layer 3 VPNs and OSPF Domain IDs
Configuring RIP Between the PE and CE Routers
Configuring Static Routes Between the PE and CE Routers
Limiting the Number of Paths and Prefixes Accepted from CE Routers in Layer 3 VPNs
Configuring Layer 3 VPNs to Carry IPv6 Traffic
Configuring IPv6 on the PE Router
Configuring the Connection Between the PE and CE Routers
Configuring BGP on the PE Router to Handle IPv6 Routes
Configuring BGP on the PE Router for IPv4 and IPv6 Routes
Configuring OSPF Version 3 on the PE Router
Configuring Static Routes on the PE Router
Configuring IPv6 on the Interfaces
Configuring EBGP Multihop Sessions Between PE and CE Routers in Layer 3 VPNs
Configuring Layer 3 VPNs to Carry IBGP Traffic
Filtering Packets in Layer 3 VPNs Based on IP Headers
Egress Filtering Options
Support on Aggregated and VLAN Interfaces for IP-Based Filtering
Support on ATM and Frame Relay Interfaces for IP-Based Filtering
Support on Ethernet, SONET/SDH, and T1/T3/E3 Interfaces for IP-Based Filtering
Support on SONET/SDH and DS3/E3 Channelized Enhanced Intelligent Queuing Interfaces for IP-Based Filtering
Support on Multilink PPP and Multilink Frame Relay Interfaces for IP-Based Filtering
Support for IP-Based Filtering of Packets with Null Top Labels
General Limitations on IP-Based Filtering
Applying Custom MPLS EXP Classifiers to Routing Instances in Layer 3 VPNs
Load Balancing and IP Header Filtering for Layer 3 VPNs
Configuring a Label Allocation and Substitution Policy for VPNs
Configuring a VPN Tunnel for VRF Table Lookup
Configuring Logical Units on the Loopback Interface for Routing Instances in Layer 3 VPNs
Configuring Multicast Layer 3 VPNs
Configuring Packet Forwarding for Layer 3 VPNs
Configuring GRE Tunnels for Layer 3 VPNs
Configuring GRE Tunnels Manually Between PE and CE Routers
Configuring the GRE Tunnel Interface on the PE Router
Configuring the GRE Tunnel Interface on the CE Router
Configuring GRE Tunnels Dynamically
Configuring an ES Tunnel Interface for Layer 3 VPNs
Configuring the ES Tunnel Interface on the PE Router
Configuring the ES Tunnel Interface on the CE Router
Configuring IPsec Tunnels Instead of MPLS LSPs Between PE Routers in Layer 3 VPNs
Configuring Protocol-Independent Load Balancing in Layer 3 VPNs
Configuring Load Balancing for Layer 3 VPNs
Configuring Load Balancing and Routing Policies
Configuring the Algorithm That Determines the Active Route to Evaluate AS Numbers in AS Paths for VPN Routes
Configuring Traffic Policing in Layer 3 VPNs
Accepting BGP Updates with Unique Inner VPN Labels in Layer 3 VPNs
Troubleshooting Layer 3 VPNs
Diagnosing Common Problems
Troubleshooting Layer 3 VPNs Using ping and traceroute
Pinging the CE Router from Another CE Router
Pinging Router CE2 from Router CE1
Using traceroute from Loopback to Loopback
Pinging Router CE1 from Router CE2
Using traceroute from Router CE2 to Router CE1
Pinging the Remote PE and CE Routers from the Local CE Router
Pinging Router CE2 from Router CE1
Using traceroute from Router CE1 to Router CE2
Pinging Router PE2 from Router CE1
Using traceroute from Router CE1 to Router PE2
Pinging a CE Router from a Multiaccess Interface
Pinging the Directly Connected PE Routers from the CE Routers
Pinging Router PE1 from the Loopback Interface on Router CE1
Using traceroute from the Loopback Interface on Router CE1 to PE1
Pinging Router PE2 from the Loopback Interface on Router CE2
Using traceroute from the Loopback Interface on Router CE2 to PE2
Pinging the Directly Connected CE Routers from the PE Routers
Pinging the VPN Interface on Router CE1 from Router PE1
Pinging the Loopback Interface on Router CE1 from Router PE1
Using traceroute from Router PE1 to Router CE1
Pinging the VPN Interface on Router CE2 from Router PE2
Pinging the Loopback Interface on Router CE2 from Router PE2
Using traceroute from Router PE2 to Router CE2
Pinging the Remote CE Router from the Local PE Router
Limitation on Pinging a Remote CE Router from a PE Router
Troubleshooting Inconsistently Advertised Routes from Gigabit Ethernet Interfaces
Layer 3 VPN Configuration Examples
Configuring a Simple Full-Mesh VPN Topology
Enabling an IGP on the PE and P Routers
Enabling RSVP and MPLS on the P Router
Configuring the MPLS LSP Tunnel Between the PE Routers
Configuring IBGP on the PE Routers
Configuring Routing Instances for VPNs on the PE Routers
Configuring VPN Policy on the PE Routers
Simple VPN Configuration Summarized by Router
Router A (PE Router)
Router B (P Router)
Router C (PE Router)
Configuring a Full-Mesh VPN Topology with Route Reflectors
Configuring Hub-and-Spoke VPN Topologies: One Interface
Configuring Hub CE1
Configuring Hub PE1
Configuring the P Router
Configuring Spoke PE2
Configuring Spoke PE3
Configuring Spoke CE2
Configuring Spoke CE3
Enabling Egress Features on the Hub PE Router
Configuring Hub PE1
Configuring Hub-and-Spoke VPN Topologies: Two Interfaces
Enabling an IGP on the Hub-and-Spoke PE Routers
Configuring LDP on the Hub-and-Spoke PE Routers
Configuring IBGP on the PE Routers
Configuring VPN Routing Instances on the Hub-and-Spoke PE Routers
Configuring VPN Policy on the PE Routers
Hub-and-Spoke VPN Configuration Summarized by Router
Router D (Hub PE Router)
Router E (Spoke PE Router)
Router F (Spoke PE Router)
Configuring an LDP-over-RSVP VPN Topology
Enabling an IGP on the PE and P Routers
Enabling LDP on the PE and P Routers
Enabling RSVP and MPLS on the P Router
Configuring the MPLS LSP Tunnel Between the P Routers
Configuring IBGP on the PE Routers
Configuring Routing Instances for VPNs on the PE Routers
Configuring VPN Policy on the PE Routers
LDP-over-RSVP VPN Configuration Summarized by Router
Router PE1
Router P1
Router P2
Router P3
Router PE2
Configuring an Application-Based Layer 3 VPN Topology
Configuration on Router A
Configuration on Router E
Configuration on Router F
Configuring an OSPF Domain ID for a Layer 3 VPN
Configuring Interfaces on Router PE1
Configuring Routing Options on Router PE1
Configuring Protocols on Router PE1
Configuring Policy Options on Router PE1
Configuring the Routing Instance on Router PE1
Configuration Summary for Router PE1
Configuring Overlapping VPNs Using Routing Table Groups
Configuring Routing Table Groups
Configuring Static Routes Between the PE and CE Routers
Configuring the Routing Instance for VPN A
Configuring the Routing Instance for VPN AB
Configuring the Routing Instance for VPN B
Configuring VPN Policy
Configuring BGP Between the PE and CE Routers
Configuring OSPF Between the PE and CE Routers
Configuring Static, BGP, and OSPF Routes Between PE and CE Routers
Configuring Overlapping VPNs Using Automatic Route Export
Configuring Overlapping VPNs with BGP and Automatic Route Export
Configuring Overlapping VPNs and Additional Tables
Configuring Automatic Route Export for All VRF Instances
Configuring a GRE Tunnel Interface Between PE Routers
Configuring the Routing Instance on Router A
Configuring the Routing Instance on Router D
Configuring MPLS, BGP, and OSPF on Router A
Configuring MPLS, BGP, and OSPF on Router D
Configuring the Tunnel Interface on Router A
Configuring the Tunnel Interface on Router D
Configuring the Routing Options on Router A
Configuring the Routing Options on Router D
Configuration Summary for Router A
Configuration Summary for Router D
Configuring a GRE Tunnel Interface Between a PE and CE Router
Configuring the Routing Instance Without the Encapsulating Interface
Configuring the Routing Instance on Router PE1
Configuring the GRE Tunnel Interface on Router PE1
Configuring the Encapsulation Interface on Router PE1
Configuring the Routing Instance with the Encapsulating Interface
Configuring the Routing Instance on Router PE1
Configuring the GRE Tunnel Interface on Router PE1
Configuring the Encapsulation Interface on Router PE1
Configuring the GRE Tunnel Interface on Router CE1
Configuring an ES Tunnel Interface Between a PE and CE Router
Configuring IPsec on Router PE1
Configuring the Routing Instance Without the Encapsulating Interface
Configuring the Routing Instance on Router PE1
Configuring the ES Tunnel Interface on Router PE1
Configuring the Encapsulating Interface for the ES Tunnel
Configuring the Routing Instance with the Encapsulating Interface
Configuring the Routing Instance on Router PE1
Configuring the ES Tunnel Interface on Router PE1
Configuring the Encapsulating Interface on Router PE1
Configuring the ES Tunnel Interface on Router CE1
Configuring IPsec on Router CE1
Layer 3 VPN Internet Access Examples
Non-VRF Internet Access
CE Router Accesses Internet Independently of the PE Router
PE Router Provides Layer 2 Internet Service
Distributed Internet Access
Routing VPN and Internet Traffic Through Different Interfaces
Configuring Interfaces on Router PE1
Configuring Routing Options on Router PE1
Configuring BGP, IS-IS, and LDP Protocols on Router PE1
Configuring a Routing Instance on Router PE1
Configuring Policy Options on Router PE1
Traffic Routed by Different Interfaces: Configuration Summarized by Router
Router PE1
Routing VPN and Outgoing Internet Traffic Through the Same Interface and Routing Return Internet Traffic Through a Different Interface
Configuration for Router PE1
Routing VPN and Internet Traffic Through the Same Interface Bidirectionally (VPN Has Public Addresses)
Configuring Routing Options on Router PE1
Configuring Routing Protocols on Router PE1
Configuring the Routing Instance on Router PE1
Traffic Routed Through the Same Interface Bidirectionally: Configuration Summarized by Router
Router PE1
Routing VPN and Internet Traffic Through the Same Interface Bidirectionally (VPN Has Private Addresses)
Configuring Routing Options for Router PE1
Configuring a Routing Instance for Router PE1
Configuring Policy Options for Router PE1
Traffic Routed by the Same Interface Bidirectionally (VPN Has Private Addresses): Configuration Summarized by Router
Router PE1
Routing Internet Traffic Through a Separate NAT Device
Configuring Interfaces on Router PE1
Configuring Routing Options for Router PE1
Configuring Routing Protocols on Router PE1
Configuring a Routing Instance for Router PE1
Traffic Routed by Separate NAT Device: Configuration Summarized by Router
Router PE1
Centralized Internet Access
Routing Internet Traffic Through a Hub CE Router
Configuring a Routing Instance on Router PE1
Configuring Policy Options on Router PE1
Internet Traffic Routed by a Hub CE Router: Configuration Summarized by Router
Router PE1
Routing Internet Traffic Through Multiple CE Routers
Configuring a Routing Instance on Router PE1
Configuring Policy Options on Router PE1
Configuring a Routing Instance on Router PE3
Configuring Policy Options on Router PE3
Routing Internet Traffic Through Multiple CE Routers: Configuration Summarized by Router
Router PE1
Router PE2
Router PE3
Summary of Layer 3 VPN Configuration Statements
as-path-compare
classifiers
domain-id
domain-vpn-tag
dynamic-tunnels
independent-domain
inet6-vpn
l3vpn-composite-nexthop
label
maximum-paths
maximum-prefixes
metric
multihop
multipath
routing-instances
sham-link
sham-link-remote
vpn-group-address
vpn-unequal-cost
vrf-table-label
Multicast VPNs
Multicast VPNs Overview
MBGP MPLS Multicast VPN Sites
Multicast VPN Terminology
Multicast VPN Standards
PIM Sparse Mode, PIM Dense Mode, Auto-RP, and BSR for MBGP MVPNs
Configuring Multicast VPNs
Introduction to Configuring MBGP MVPNs
Configuring Routing Instances for an MBGP MVPN
Configuring SPT-Only Mode for Multiprotocol BGP-Based Multicast VPNs
Configuring Shared-Tree Data Distribution Across Provider Cores for Providers of MBGP MVPNs
Configuring VRF Route Targets for Routing Instances for an MBGP MVPN
Configuring the Export Target for an MBGP MVPN
Configuring the Import Target for an MBGP MVPN
Configuring the Import Target Receiver and Sender for an MBGP MVPN
Configuring the Import Target Unicast Parameters for an MBGP MVPN
Limiting Routes to Be Advertised by an MVPN VRF Instance
Configuring NLRI Parameters for an MBGP MVPN
Configuring PIM Provider Tunnels for an MBGP MVPN
Configuring PIM-SSM GRE Selective Provider Tunnels
Configuring Point-to-Multipoint LSPs for an MBGP MVPN
Configuring Inclusive Point-to-Multipoint LSPs for an MBGP MVPN
Configuring Selective Provider Tunnels for an MBGP MVPN
Configuring the Multicast Group Address for an MBGP MVPN
Configuring the Multicast Source Address for an MBGP MVPN
Configuring Static Selective Point-to-Multipoint LSPs for an MBGP MVPN
Configuring Dynamic Selective Point-to-Multipoint LSPs for an MBGP MVPN
Configuring the Threshold for Dynamic Selective Point-to-Multipoint LSPs for an MBGP MVPN
Configuring the Tunnel Limit for Dynamic Selective Point-to-Multipoint LSPs for an MBGP MVPN
Using Wildcards to Configure Selective Point-to-Multipoint LSPs for an MBGP MVPN
About S-PMSI
Scenarios for Using Wildcard S-PMSI
Types of Wildcard S-PMSI
Differences Between Wildcard S-PMSI and (S,G) S-PMSI
Wildcard (*,*) S-PMSI and PIM Dense Mode
Wildcard (*,*) S-PMSI and PIM-BSR
Wildcard Source and the 0.0.0.0/0 Source Prefix
Configuring a Selective Provider Tunnel Using Wildcards
Example: Configuring Selective Provider Tunnels Using Wildcards
Tracing MBGP MVPN Traffic and Operations
Summary of Multicast VPN Configuration Statements
export-target
family (VRF Advertisement)
group
group-range (MBGP MVPN Tunnel)
import-target
inet-mvpn (BGP)
inet-mvpn (VRF Advertisement)
inet6-mvpn (BGP)
inet6-mvpn (VRF Advertisement)
label-switched-path-template
mvpn
mvpn-mode
pim-asm
pim-ssm (Selective Tunnel)
provider-tunnel
route-target
rpt-spt
rsvp-te
selective
source
spt-only
static-lsp
target
threshold-rate
traceoptions
tunnel-limit
unicast
vrf-advertise-selective
wildcard-group-inet
wildcard-group-inet6
wildcard-source
VPLS
VPLS Overview
Introduction to VPLS
Supported Platforms and PICs
VPLS Routing and Virtual Ports
VPLS and Aggregated Ethernet Interfaces
VPLS Multihoming
Interoperability between BGP Signaling and LDP Signaling in VPLS
LDP-Signaled and BGP-Signaled PE Router Topology
Flooding Unknown Packets Across Mesh Groups
Unicast Packet Forwarding
VPLS Label Blocks Operation
Elements of Network Layer Reachability Information
Requirements for NLRI Elements
How Labels are Used in Label Blocks
Label Block Composition
Label Blocks in Junos OS
VPLS Label Block Structure
PE Router Mesh Groups for VPLS Routing Instances
VPLS Standards
Configuring VPLS
Introduction to Configuring VPLS
Configuring VPLS Routing Instances
Configuring BGP Signaling for VPLS
Configuring the VPLS Site Name and Site Identifier
Configuring Automatic Site Identifiers for VPLS
Configuring the Site Range
Configuring the VPLS Site Interfaces
Configuring the VPLS Site Preference
Configuring LDP Signaling for VPLS
Configuring LDP Signaling for the VPLS Routing Instance
Configuring LDP Signaling on the Router
Configuring VPLS Routing Instance and VPLS Interface Connectivity
Configuring the VPLS MAC Table Timeout Interval
Configuring the Size of the VPLS MAC Address Table
Limiting the Number of MAC Addresses Learned from an Interface
Removing Addresses from the MAC Address Database
Configuring Static Pseudowires for VPLS
Configuring EXP-Based Traffic Classification for VPLS
Configuring Interfaces for VPLS Routing
Configuring the Interface Name
Configuring the VPLS Interface Encapsulation
Enabling VLAN Tagging
Configuring VLAN IDs for Logical Interfaces
Configuring Aggregated Ethernet Interfaces for VPLS
Configuring VPLS Load Balancing
Configuring VPLS Fast Reroute Priority
Configuring VPLS Without a Tunnel Services PIC
Configuring an Ethernet Switch as the CE Device
Mapping VPLS Traffic to Specific LSPs
Configuring Firewall Filters and Policers for VPLS
Configuring a VPLS Filter
Configuring an Interface-Specific Counter for VPLS
Configuring an Action for the VPLS Filter
Configuring VPLS FTFs
Changing Precedence for Spanning-Tree BPDU Packets
Applying a VPLS Filter to an Interface
Applying a VPLS Filter to a VPLS Routing Instance
Configuring a Filter for Flooded Traffic
Configuring a VPLS Policer
Configuring VPLS Match Conditions
Specifying the VT Interfaces Used by VPLS Routing Instances
Configuring VPLS Multihoming
VPLS Multihomed Site Configuration
Specifying an Interface as the Active Interface
Configuring Multihoming on the PE Router
VPLS Single-Homed Site Configuration
Flooding Unknown Traffic Using Point-to-Multipoint LSPs
Configuring Static Point-to-Multipoint Flooding LSPs
Configuring Dynamic Point-to-Multipoint Flooding LSPs
Configuring Dynamic Point-to-Multipoint Flooding LSPs with the Default Template
Configuring Dynamic Point-to-Multipoint Flooding LSPs with a Preconfigured Template
Configuring VPLS and Integrated Routing and Bridging
Configuring MAC Address Flooding and Learning for VPLS
Configuring MSTP for VPLS
Configuring Interoperability Between BGP Signaling and LDP Signaling in VPLS
LDP BGP Interworking Platform Support
Configuring VPLS Mesh Groups for LDP BGP Interworking
Configuring Switching Between Pseudowires Using VPLS Mesh Groups
Configuring Integrated Routing and Bridging Support for LDP BGP Interworking with VPLS
Configuring Inter-AS VPLS with MAC Processing at the ASBR
Inter-AS VPLS with MAC Operations Configuration Summary
Configuring the ASBRs for Inter-AS VPLS
Tracing VPLS Traffic and Operations
Configuring Port Mirroring for VPLS Traffic
Configuring the Label Block Size
VPLS Example
Example: Building a VPLS From Router 1 to Router 3
Summary of VPLS Configuration Statements
active-interface
automatic-site-id
connectivity-type
encapsulation
family multiservice
fast-reroute-priority
interface
interface-mac-limit
label-block-size
label-switched-path-template
local-switching
mac-flush
mac-table-aging-time
mac-table-size
mesh-group
multi-homing
neighbor
no-local-switching
no-tunnel-services
peer-as
rsvp-te
site
site-identifier
site-preference
site-range
static
template
traceoptions
tunnel-services
vlan-id
vlan-id-list (Interface in VPLS)
vlan-tagging
vpls
vpls (Interfaces)
vpls (Routing Instance)
vpls-id
Interprovider and Carrier-of-Carriers
Introduction to Interprovider and Carrier-of-Carriers VPNs
Traditional VPNs, Interprovider VPNs, and Carrier-of-Carriers VPNs
Standard VPNs
Interprovider and Carrier-of-Carriers VPNs
Interprovider VPNs
Linking VRF Tables Between Autonomous Systems
Configuring MP-EBGP Between AS Border Routers
Configuring Multihop MP-EBGP Between AS Border Routers
Carrier-of-Carriers VPNs
Internet Service Provider as the Customer
VPN Service Provider as the Customer
Interprovider and Carrier-of-Carriers VPN Standards
Configuring Interprovider and Carrier-of-Carriers VPNs
Configuring Interprovider VPNs
Configuring Interprovider VPNs Using MP-EBGP
Configuring RSVP
Configuring MPLS
Configuring BGP
Configuring OSPF
Configuring Interprovider VPNs Using Multihop MP-EBGP
Configuring the AS Border Routers
Configuring BGP
Configuring Policy Options
Configuring the PE Router
Configuring Carrier-of-Carriers VPNs for Customers That Provide Internet Service
Configuring the Carrier-of-Carriers VPN Service Customer’s CE Router
Configuring MPLS
Configuring BGP
Configuring OSPF
Configuring Policy Options
Configuring the Carrier-of-Carriers VPN Service Provider’s PE Routers
Configuring MPLS
Configuring BGP
Configuring IS-IS
Configuring LDP
Configuring a Routing Instance
Configuring Policy Options
Configuring Carrier-of-Carriers VPNs for Customers That Provide VPN Service
Configuring the Carrier-of-Carriers Customer’s PE Router
Configuring MPLS
Configuring BGP
Configuring OSPF
Configuring LDP
Configuring VPN Service in the Routing Instance
Configuring Policy Options
Configuring the Carrier-of-Carriers Customer’s CE Router
Configuring MPLS
Configuring BGP
Configuring OSPF and LDP
Configuring Policy Options
Configuring the Provider’s PE Router
Configuring MPLS
Configuring a PE-Router-to-PE-Router BGP Session
Configuring IS-IS and LDP
Configuring Policy Options
Configuring a Routing Instance to Send Routes to the CE Router
Configuring BGP to Gather Interprovider and Carrier-of-Carriers VPNs Statistics
Configuration Examples for Interprovider and Carrier-of-Carriers VPNs
Example Terminology
Interprovider VPN Example—MP-EBGP Between ISP Peer Routers
Configuration for Router A
Configuration for Router B
Configuration for Router C
Configuration for Router D
Configuration for Router E
Configuration for Router F
Interprovider VPN Example—Multihop MP-EBGP with P Routers
Configuration for Router A
Configuration for Router B
Configuration for Router C
Configuration for Router D
Configuration for Router E
Configuration for Router F
Carrier-of-Carriers VPN Examples
Carrier-of-Carriers VPN Example—Customer Provides Internet Service
Configuration for Router A
Configuration for Router B
Configuration for Router C
Configuration for Router D
Configuration for Router E
Configuration for Router F
Configuration for Router G
Configuration for Router H
Configuration for Router I
Configuration for Router J
Configuration for Router K
Configuration for Router L
Carrier-of-Carriers VPN Example—Customer Provides VPN Service
Configuration for Router A
Configuration for Router B
Configuration for Router C
Configuration for Router D
Configuration for Router E
Configuration for Router F
Configuration for Router G
Configuration for Router H
Configuration for Router I
Configuration for Router J
Configuration for Router K
Configuration for Router L
Multiple Instances for LDP and Carrier-of-Carriers VPNs
Summary of Interprovider and Carrier-of-Carriers VPNs Configuration Statements
labeled-unicast
per-group-label
traffic-statistics
Layer 2 Circuits
Layer 2 Circuit Overview
Layer 2 Circuit Overview
Layer 2 Circuit Bandwidth Accounting and Call Admission Control
Bandwidth Accounting and Call Admission Control Overview
Selecting an LSP Based on the Bandwidth Constraint
LSP Path Protection and CAC
Secondary Paths and CAC
Fast Reroute and CAC
Link and Node Protection and CAC
Layer 2 Circuits Trunk Mode
Layer 2 Circuit Standards
Configuring Layer 2 Circuits
Introduction to Configuring Layer 2 Circuits
Configuring Interfaces for Layer 2 Circuits
Configuring the Address for the Neighbor of the Layer 2 Circuit
Configuring the Neighbor Interface for the Layer 2 Circuit
Configuring a Community for the Layer 2 Circuit
Configuring the Control Word for Layer 2 Circuits
Configuring the Control Word for Frame Relay Interfaces
Disabling the Control Word for Layer 2 Circuits
Configuring the Encapsulation Type for the Layer 2 Circuit Neighbor Interface
Configuring the MTU for the Layer 2 Circuit Neighbor Interface
Enabling the Layer 2 Circuit When the Encapsulation Does Not Match
Enabling the Layer 2 Circuit When the MTU Does Not Match
Configuring the MTU Advertised for a Layer 2 Circuit
Configuring the Protect Interface
Configuring the Pseudowire Status TLV
Configuring Layer 2 Circuits over Both RSVP and LDP LSPs
Example: PSN Tunnel Endpoint
Configuring the Virtual Circuit ID
Configuring the Interface Encapsulation Type for Layer 2 Circuits
Configuring ATM2 IQ Interfaces for Layer 2 Circuits
Configuring Local Interface Switching in Layer 2 Circuits
Configuring the Interfaces for the Local Interface Switch
Enabling Local Interface Switching When the MTU Does Not Match
Configuring LDP for Layer 2 Circuits
Configuring Static Layer 2 Circuits
Configuring Policies for Layer 2 Circuits
Configuring the Layer 2 Circuit Community
Configuring the Policy Statement for the Layer 2 Circuit Community
Example: Configuring a Policy for a Layer 2 Circuit Community
Verifying the Layer 2 Circuit Policy Configuration
Configuring ATM Trunking on Layer 2 Circuits
Configuring Bandwidth Allocation and Call Admission Control in Layer 2 Circuits
Tracing Layer 2 Circuit Operations
Layer 2 Circuits Example
Introduction to Layer 2 Circuit Protect Interfaces Example
Configuring Router PE1
Configuring Router PE2
Configuring Router CE1
Configuring Router CE2
Summary of Layer 2 Circuit Configuration Statements
bandwidth
community
control-word
description
encapsulation-type
end-interface
ignore-encapsulation-mismatch
ignore-mtu-mismatch
install-nexthop
interface
l2circuit
local-switching
mtu
neighbor
no-control-word
protect-interface
pseudowire-status-tlv
psn-tunnel-endpoint
static
traceoptions
virtual-circuit-id
Indexes
Index
Index of Statements and Commands