Table of Contents
- About This Guide
- JUNOS Documentation and Release Notes
- Objectives
- Audience
- Supported Platforms
- Using the Indexes
- Using the Examples in This Manual
- Documentation Conventions
- Documentation Feedback
- Requesting
Technical Support
- VPN Overview
- VPN Overview
- Routers in a VPN
- VPN Terminology
- Types of VPNs
- Layer 2 VPNs
- Layer 3 VPNs
- VPLS
- Virtual-Router Routing Instances
- VPNs and Class of Service
- VPNs and Logical Systems
- VPN Graceful Restart
- Redundant Pseudowires for Layer 2 Circuits and VPLS
- Types of Redundant Pseudowire Configurations
- Pseudowire Failure Detection
- VPN Standards
- Configuring VPNs
- Configuring the Signaling Protocol on PE Routers in VPNs
- Using LDP for VPN Signaling
- Using RSVP for VPN Signaling
- Configuring an IGP on the PE and P Routers
- Configuring IBGP Sessions Between PE Routers in VPNs
- Configuring Routing Instances on PE Routers in VPNs
- Configuring the Routing Instance Name for a VPN
- Configuring the Description
- Configuring the Instance Type
- Configuring Interfaces for VPN Routing
- General Configuration for VPN Routing
- Configuring Interfaces for Layer 3 VPNs
- Configuring Interfaces for Carrier-of-Carriers VPNs
- Configuring Unicast RPF on VPN Interfaces
- Configuring the Route Distinguisher
- Configuring Automatic Route Distinguishers
- Configuring Policies for the VRF Table on PE Routers in VPNs
- Configuring the Route Target
- Configuring the Route Origin
- Configuring an Import Policy for the PE Router’s VRF
Table
- Configuring an Export Policy for the PE Router’s VRF
Table
- Applying Both the VRF Export and the BGP Export Policies
- Configuring a VRF Target
- Configuring BGP Route Target Filtering in VPNs
- BGP Route Target Filtering Overview
- Configuring BGP Route Target Filtering for VPNs
- Configuring Virtual-Router Routing Instances in VPNs
- Configuring a Routing Protocol Between the Service Provider
Routers
- Configuring Logical Interfaces Between Participating Routers
- Configuring Graceful Restart for VPNs
- Configuring Redundant Pseudowires for Layer 2 Circuits
and VPLS
- Configuring Pseudowire Redundancy on the PE Router
- Configuring the Switchover Delay for the Pseudowires
- Configuring a Revert Time for the Redundant Pseudowire
- Configuring BFD for VCCV for Layer 2 VPNs, Layer 2 Circuits,
and VPLS
- Configuring Aggregate Labels for VPNs
- Rewriting Markers and VPNs
- Transmitting Nonstandard BPDUs
- Pinging VPNs, VPLS, and Layer 2 Circuits
- Pinging a Layer 2 VPN
- Pinging a Layer 3 VPN
- Pinging a Layer 2 Circuit
- Setting the Forwarding Class of the Ping Packets
- Pinging a VPLS Routing Instance
- Configuring Path MTU Checks for VPNs
- Enabling Path MTU Checks for a VPN Routing Instance
- Assigning an IP Address to the VPN Routing Instance
- Enabling Unicast Reverse-Path Forwarding Check for VPNs
- VPN Examples
- BGP Route Target Filtering for VPNs Overview
- BGP Route Target Filtering for VPNs
- Configure BGP Route Target Filtering on Router PE1
- Configure BGP Route Target Filtering on Router PE2
- Configure BGP Route Target Filtering on the Route Reflector
- Configure BGP Route Target Filtering on Router PE3
- Route Origin for VPNs
- Configuring the Site of Origin Community on CE Router A
- Configuring the Community on CE Router A
- Applying the Policy Statement on CE Router A
- Configuring the Policy on PE Router D
- Configuring the Community on PE Router D
- Applying the Policy on PE Router D
- Summary of VPN Configuration Statements
- aggregate-label
- backup-neighbor
- description
- family route-target
- graceful-restart
- instance-type
- interface
- no-forwarding
- revert-time
- route-distinguisher
- route-distinguisher-id
- switchover-delay
- unicast-reverse-path
- vpn-apply-export
- vrf-export
- vrf-import
- vrf-mtu-check
- vrf-target
- Layer 2 VPNs
- Layer 2 VPN Overview
- Layer 2 VPN Overview
- Layer 2 VPN Standards
- Configuring Layer 2 VPNs
- Introduction to Configuring Layer 2 VPNs
- Configuring the Local Site on PE Routers in Layer 2 VPNs
- Configuring a Layer 2 VPN Routing Instance
- Configuring the Site
- Configuring the Remote Site ID
- Configuring the Encapsulation Type
- Configuring a Site Preference and Layer 2 VPN Multihoming
- Tracing Layer 2 VPN Traffic and Operations
- Disabling Normal TTL Decrementing for VPNs
- Configuring CCC Encapsulation for Layer 2 VPNs
- Configuring TCC Encapsulation for Layer 2 VPNs and Layer 2
Circuits
- Configuring Traffic Policing in Layer 2 VPNs
- Disabling the Control Word for Layer 2 VPNs
- Introduction to Layer 2 VPN Configuration Example
- Layer 2 VPN Configuration Example
- Simple Full-Mesh Layer 2 VPN Overview
- Enabling an IGP on the PE Routers
- Configuring MPLS LSP Tunnels Between the PE Routers
- Configuring IBGP on the PE Routers
- Configuring Routing Instances for Layer 2 VPNs on the
PE Routers
- Configuring CCC Encapsulation on the Interfaces
- Configuring VPN Policy on the PE Routers
- Layer 2 VPN Configuration Summarized by Router
- Summary for Router A (PE Router for Sunnyvale)
- Summary for Router B (PE Router for Austin)
- Summary for Router C (PE Router for Portland)
- Summary of Layer 2 VPN Configuration Statements
- control-channel
- control-word
- description
- encapsulation
- encapsulation (Logical Interface)
- encapsulation (Physical Interface)
- encapsulation-type
- interface
- l2vpn
- no-control-word
- oam
- policer
- proxy
- remote
- remote-site-id
- site
- site-identifier
- site-preference
- traceoptions
- Layer 3 VPNs
- Layer 3 VPN Overview
- Layer 3 VPN Introduction
- Layer 3 VPN Platform Support
- Layer 3 VPN Attributes
- VPN-IPv4 Addresses and Route Distinguishers
- IPv6 Layer 3 VPNs
- VPN Routing and Forwarding Tables
- Route Distribution Within a Layer 3 VPN
- Distribution of Routes from CE to PE Routers
- Distribution of Routes Between PE Routers
- Distribution of Routes from PE to CE Routers
- Forwarding Across the Provider’s Core Network
- Routing Instances for VPNs
- Multicast over Layer 3 VPNs
- Multicast over Layer 3 VPNs Overview
- Sending PIM Hello Messages to the PE Routers
- Sending PIM Join Messages to the PE Routers
- Receiving the Multicast Transmission
- Layer 3 VPN Standards
- Configuring Layer 3 VPNs
- Introduction to Configuring Layer 3 VPNs
- Configuring Routing Between PE and CE Routers in Layer 3
VPNs
- Configuring BGP Between the PE and CE Routers
- Configuring OSPF Between the PE and CE Routers
- Configuring OSPF Version 2 Between the PE and CE Routers
- Configuring OSPF Version 3 Between the PE and CE Routers
- Configuring OSPF Sham Links for Layer 3 VPNs
- OSPF Sham Links Overview
- Configuring OSPF Sham Links
- OSPF Sham Links Example
- Configuring an OSPF Domain ID
- Hub-and-Spoke Layer 3 VPNs and OSPF Domain IDs
- Configuring RIP Between the PE and CE Routers
- Configuring Static Routes Between the PE and CE Routers
- Limiting the Number of Paths and Prefixes Accepted from CE
Routers in Layer 3 VPNs
- Configuring Layer 3 VPNs to Carry IPv6 Traffic
- Configuring IPv6 on the PE Router
- Configuring the Connection Between the PE and CE Routers
- Configuring BGP on the PE Router to Handle IPv6 Routes
- Configuring BGP on the PE Router for IPv4 and IPv6 Routes
- Configuring OSPF Version 3 on the PE Router
- Configuring Static Routes on the PE Router
- Configuring IPv6 on the Interfaces
- Configuring EBGP Multihop Sessions Between PE and CE Routers
in Layer 3 VPNs
- Configuring Layer 3 VPNs to Carry IBGP Traffic
- Filtering Packets in Layer 3 VPNs Based on IP Headers
- Egress Filtering Options
- Support on Aggregated and VLAN Interfaces for IP-Based Filtering
- Support on ATM and Frame Relay Interfaces for IP-Based Filtering
- Support on Ethernet, SONET/SDH, and T1/T3/E3 Interfaces for
IP-Based Filtering
- Support on SONET/SDH and DS3/E3 Channelized Enhanced Intelligent
Queuing Interfaces for IP-Based Filtering
- Support on Multilink PPP and Multilink Frame Relay Interfaces
for IP-Based Filtering
- Support for IP-Based Filtering of Packets with Null Top Labels
- General Limitations on IP-Based Filtering
- Applying Custom MPLS EXP Classifiers to Routing Instances in
Layer 3 VPNs
- Load Balancing and IP Header Filtering for Layer 3 VPNs
- Configuring a Label Allocation and Substitution Policy for
VPNs
- Configuring a VPN Tunnel for VRF Table Lookup
- Configuring Logical Units on the Loopback Interface for Routing
Instances in Layer 3 VPNs
- Configuring Multicast Layer 3 VPNs
- Configuring Packet Forwarding for Layer 3 VPNs
- Configuring GRE Tunnels for Layer 3 VPNs
- Configuring GRE Tunnels Manually Between PE and CE Routers
- Configuring the GRE Tunnel Interface on the PE Router
- Configuring the GRE Tunnel Interface on the CE Router
- Configuring GRE Tunnels Dynamically
- Configuring an ES Tunnel Interface for Layer 3 VPNs
- Configuring the ES Tunnel Interface on the PE Router
- Configuring the ES Tunnel Interface on the CE Router
- Configuring IPsec Tunnels Instead of MPLS LSPs Between PE Routers
in Layer 3 VPNs
- Configuring Protocol-Independent Load Balancing in Layer 3
VPNs
- Configuring Load Balancing for Layer 3 VPNs
- Configuring Load Balancing and Routing Policies
- Configuring the Algorithm That Determines the Active Route
to Evaluate AS Numbers in AS Paths for VPN Routes
- Configuring Traffic Policing in Layer 3 VPNs
- Accepting BGP Updates with Unique Inner VPN Labels in Layer 3
VPNs
- Troubleshooting Layer 3 VPNs
- Diagnosing Common Problems
- Troubleshooting Layer 3 VPNs Using ping and traceroute
- Pinging the CE Router from Another CE Router
- Pinging Router CE2 from Router CE1
- Using traceroute from Loopback to Loopback
- Pinging Router CE1 from Router CE2
- Using traceroute from Router CE2 to Router CE1
- Pinging the Remote PE and CE Routers from the Local CE Router
- Pinging Router CE2 from Router CE1
- Using traceroute from Router CE1 to Router CE2
- Pinging Router PE2 from Router CE1
- Using traceroute from Router CE1 to Router PE2
- Pinging a CE Router from a Multiaccess Interface
- Pinging the Directly Connected PE Routers from the CE Routers
- Pinging Router PE1 from the Loopback Interface on Router CE1
- Using traceroute from the Loopback Interface on Router CE1
to PE1
- Pinging Router PE2 from the Loopback Interface on Router CE2
- Using traceroute from the Loopback Interface on Router CE2
to PE2
- Pinging the Directly Connected CE Routers from the PE Routers
- Pinging the VPN Interface on Router CE1 from Router PE1
- Pinging the Loopback Interface on Router CE1 from Router PE1
- Using traceroute from Router PE1 to Router CE1
- Pinging the VPN Interface on Router CE2 from Router PE2
- Pinging the Loopback Interface on Router CE2 from Router PE2
- Using traceroute from Router PE2 to Router CE2
- Pinging the Remote CE Router from the Local PE Router
- Limitation on Pinging a Remote CE Router from a PE Router
- Troubleshooting Inconsistently Advertised Routes from Gigabit
Ethernet Interfaces
- Layer 3 VPN Configuration Examples
- Configuring a Simple Full-Mesh VPN Topology
- Enabling an IGP on the PE and P Routers
- Enabling RSVP and MPLS on the P Router
- Configuring the MPLS LSP Tunnel Between the PE Routers
- Configuring IBGP on the PE Routers
- Configuring Routing Instances for VPNs on the PE Routers
- Configuring VPN Policy on the PE Routers
- Simple VPN Configuration Summarized by Router
- Router A (PE Router)
- Router B (P Router)
- Router C (PE Router)
- Configuring a Full-Mesh VPN Topology with Route Reflectors
- Configuring Hub-and-Spoke VPN Topologies: One Interface
- Configuring Hub CE1
- Configuring Hub PE1
- Configuring the P Router
- Configuring Spoke PE2
- Configuring Spoke PE3
- Configuring Spoke CE2
- Configuring Spoke CE3
- Enabling Egress Features on the Hub PE Router
- Configuring Hub PE1
- Configuring Hub-and-Spoke VPN Topologies: Two Interfaces
- Enabling an IGP on the Hub-and-Spoke PE Routers
- Configuring LDP on the Hub-and-Spoke PE Routers
- Configuring IBGP on the PE Routers
- Configuring VPN Routing Instances on the Hub-and-Spoke PE Routers
- Configuring VPN Policy on the PE Routers
- Hub-and-Spoke VPN Configuration Summarized by Router
- Router D (Hub PE Router)
- Router E (Spoke PE Router)
- Router F (Spoke PE Router)
- Configuring an LDP-over-RSVP VPN Topology
- Enabling an IGP on the PE and P Routers
- Enabling LDP on the PE and P Routers
- Enabling RSVP and MPLS on the P Router
- Configuring the MPLS LSP Tunnel Between the P Routers
- Configuring IBGP on the PE Routers
- Configuring Routing Instances for VPNs on the PE Routers
- Configuring VPN Policy on the PE Routers
- LDP-over-RSVP VPN Configuration Summarized by Router
- Router PE1
- Router P1
- Router P2
- Router P3
- Router PE2
- Configuring an Application-Based Layer 3 VPN Topology
- Configuration on Router A
- Configuration on Router E
- Configuration on Router F
- Configuring an OSPF Domain ID for a Layer 3 VPN
- Configuring Interfaces on Router PE1
- Configuring Routing Options on Router PE1
- Configuring Protocols on Router PE1
- Configuring Policy Options on Router PE1
- Configuring the Routing Instance on Router PE1
- Configuration Summary for Router PE1
- Configuring Overlapping VPNs Using Routing Table Groups
- Configuring Routing Table Groups
- Configuring Static Routes Between the PE and CE Routers
- Configuring the Routing Instance for VPN A
- Configuring the Routing Instance for VPN AB
- Configuring the Routing Instance for VPN B
- Configuring VPN Policy
- Configuring BGP Between the PE and CE Routers
- Configuring OSPF Between the PE and CE Routers
- Configuring Static, BGP, and OSPF Routes Between PE and CE
Routers
- Configuring Overlapping VPNs Using Automatic Route Export
- Configuring Overlapping VPNs with BGP and Automatic Route Export
- Configuring Overlapping VPNs and Additional Tables
- Configuring Automatic Route Export for All VRF Instances
- Configuring a GRE Tunnel Interface Between PE Routers
- Configuring the Routing Instance on Router A
- Configuring the Routing Instance on Router D
- Configuring MPLS, BGP, and OSPF on Router A
- Configuring MPLS, BGP, and OSPF on Router D
- Configuring the Tunnel Interface on Router A
- Configuring the Tunnel Interface on Router D
- Configuring the Routing Options on Router A
- Configuring the Routing Options on Router D
- Configuration Summary for Router A
- Configuration Summary for Router D
- Configuring a GRE Tunnel Interface Between a PE and CE Router
- Configuring the Routing Instance Without the Encapsulating
Interface
- Configuring the Routing Instance on Router PE1
- Configuring the GRE Tunnel Interface on Router PE1
- Configuring the Encapsulation Interface on Router PE1
- Configuring the Routing Instance with the Encapsulating Interface
- Configuring the Routing Instance on Router PE1
- Configuring the GRE Tunnel Interface on Router PE1
- Configuring the Encapsulation Interface on Router PE1
- Configuring the GRE Tunnel Interface on Router CE1
- Configuring an ES Tunnel Interface Between a PE and CE Router
- Configuring IPsec on Router PE1
- Configuring the Routing Instance Without the Encapsulating
Interface
- Configuring the Routing Instance on Router PE1
- Configuring the ES Tunnel Interface on Router PE1
- Configuring the Encapsulating Interface for the ES Tunnel
- Configuring the Routing Instance with the Encapsulating Interface
- Configuring the Routing Instance on Router PE1
- Configuring the ES Tunnel Interface on Router PE1
- Configuring the Encapsulating Interface on Router PE1
- Configuring the ES Tunnel Interface on Router CE1
- Configuring IPsec on Router CE1
- Layer 3 VPN Internet Access Examples
- Non-VRF Internet Access
- CE Router Accesses Internet Independently of the PE Router
- PE Router Provides Layer 2 Internet Service
- Distributed Internet Access
- Routing VPN and Internet Traffic Through Different Interfaces
- Configuring Interfaces on Router PE1
- Configuring Routing Options on Router PE1
- Configuring BGP, IS-IS, and LDP Protocols on Router PE1
- Configuring a Routing Instance on Router PE1
- Configuring Policy Options on Router PE1
- Traffic Routed by Different Interfaces: Configuration Summarized
by Router
- Router PE1
- Routing VPN and Outgoing Internet Traffic Through the Same
Interface and Routing Return Internet Traffic Through a Different
Interface
- Configuration for Router PE1
- Routing VPN and Internet Traffic Through the Same Interface
Bidirectionally (VPN Has Public Addresses)
- Configuring Routing Options on Router PE1
- Configuring Routing Protocols on Router PE1
- Configuring the Routing Instance on Router PE1
- Traffic Routed Through the Same Interface Bidirectionally:
Configuration Summarized by Router
- Router PE1
- Routing VPN and Internet Traffic Through the Same Interface
Bidirectionally (VPN Has Private Addresses)
- Configuring Routing Options for Router PE1
- Configuring a Routing Instance for Router PE1
- Configuring Policy Options for Router PE1
- Traffic Routed by the Same Interface Bidirectionally (VPN Has
Private Addresses): Configuration Summarized by Router
- Router PE1
- Routing Internet Traffic Through a Separate NAT Device
- Configuring Interfaces on Router PE1
- Configuring Routing Options for Router PE1
- Configuring Routing Protocols on Router PE1
- Configuring a Routing Instance for Router PE1
- Traffic Routed by Separate NAT Device: Configuration Summarized
by Router
- Router PE1
- Centralized Internet Access
- Routing Internet Traffic Through a Hub CE Router
- Configuring a Routing Instance on Router PE1
- Configuring Policy Options on Router PE1
- Internet Traffic Routed by a Hub CE Router: Configuration Summarized
by Router
- Router PE1
- Routing Internet Traffic Through Multiple CE Routers
- Configuring a Routing Instance on Router PE1
- Configuring Policy Options on Router PE1
- Configuring a Routing Instance on Router PE3
- Configuring Policy Options on Router PE3
- Routing Internet Traffic Through Multiple CE Routers: Configuration
Summarized by Router
- Router PE1
- Router PE2
- Router PE3
- Summary of Layer 3 VPN Configuration Statements
- as-path-compare
- classifiers
- domain-id
- domain-vpn-tag
- dynamic-tunnels
- independent-domain
- inet6-vpn
- l3vpn-composite-nexthop
- label
- maximum-paths
- maximum-prefixes
- metric
- multihop
- multipath
- routing-instances
- sham-link
- sham-link-remote
- vpn-group-address
- vpn-unequal-cost
- vrf-table-label
- Multicast VPNs
- Multicast VPNs Overview
- MBGP MPLS Multicast VPN Sites
- Multicast VPN Terminology
- Multicast VPN Standards
- PIM Sparse Mode, PIM Dense Mode, Auto-RP, and BSR for MBGP
MVPNs
- Configuring Multicast VPNs
- Introduction to Configuring MBGP MVPNs
- Configuring Routing Instances for an MBGP MVPN
- Configuring SPT-Only Mode for Multiprotocol BGP-Based Multicast
VPNs
- Configuring Shared-Tree Data Distribution Across Provider Cores
for Providers of MBGP MVPNs
- Configuring VRF Route Targets for Routing Instances for an
MBGP MVPN
- Configuring the Export Target for an MBGP MVPN
- Configuring the Import Target for an MBGP MVPN
- Configuring the Import Target Receiver and Sender for an MBGP
MVPN
- Configuring the Import Target Unicast Parameters for an MBGP
MVPN
- Limiting Routes to Be Advertised by an MVPN VRF Instance
- Configuring NLRI Parameters for an MBGP MVPN
- Configuring PIM Provider Tunnels for an MBGP MVPN
- Configuring PIM-SSM GRE Selective Provider Tunnels
- Configuring Point-to-Multipoint LSPs for an MBGP MVPN
- Configuring Inclusive Point-to-Multipoint LSPs for an MBGP
MVPN
- Configuring Selective Provider Tunnels for an MBGP MVPN
- Configuring the Multicast Group Address for an MBGP MVPN
- Configuring the Multicast Source Address for an MBGP MVPN
- Configuring Static Selective Point-to-Multipoint LSPs for an
MBGP MVPN
- Configuring Dynamic Selective Point-to-Multipoint LSPs for
an MBGP MVPN
- Configuring the Threshold for Dynamic Selective Point-to-Multipoint
LSPs for an MBGP MVPN
- Configuring the Tunnel Limit for Dynamic Selective Point-to-Multipoint
LSPs for an MBGP MVPN
- Using Wildcards to Configure Selective Point-to-Multipoint
LSPs for an MBGP MVPN
- About S-PMSI
- Scenarios for Using Wildcard S-PMSI
- Types of Wildcard S-PMSI
- Differences Between Wildcard S-PMSI and (S,G) S-PMSI
- Wildcard (*,*) S-PMSI and PIM Dense Mode
- Wildcard (*,*) S-PMSI and PIM-BSR
- Wildcard Source and the 0.0.0.0/0 Source Prefix
- Configuring a Selective Provider Tunnel Using Wildcards
- Example: Configuring Selective Provider Tunnels Using Wildcards
- Tracing MBGP MVPN Traffic and Operations
- Summary of Multicast VPN Configuration Statements
- export-target
- family (VRF Advertisement)
- group
- group-range (MBGP MVPN Tunnel)
- import-target
- inet-mvpn (BGP)
- inet-mvpn (VRF Advertisement)
- inet6-mvpn (BGP)
- inet6-mvpn (VRF Advertisement)
- label-switched-path-template
- mvpn
- mvpn-mode
- pim-asm
- pim-ssm (Selective Tunnel)
- provider-tunnel
- route-target
- rpt-spt
- rsvp-te
- selective
- source
- spt-only
- static-lsp
- target
- threshold-rate
- traceoptions
- tunnel-limit
- unicast
- vrf-advertise-selective
- wildcard-group-inet
- wildcard-group-inet6
- wildcard-source
- VPLS
- VPLS Overview
- Introduction to VPLS
- Supported Platforms and PICs
- VPLS Routing and Virtual Ports
- VPLS and Aggregated Ethernet Interfaces
- VPLS Multihoming
- Interoperability between BGP Signaling and LDP Signaling in
VPLS
- LDP-Signaled and BGP-Signaled PE Router Topology
- Flooding Unknown Packets Across Mesh Groups
- Unicast Packet Forwarding
- VPLS Label Blocks Operation
- Elements of Network Layer Reachability Information
- Requirements for NLRI Elements
- How Labels are Used in Label Blocks
- Label Block Composition
- Label Blocks in Junos OS
- VPLS Label Block Structure
- PE Router Mesh Groups for VPLS Routing Instances
- VPLS Standards
- Configuring VPLS
- Introduction to Configuring VPLS
- Configuring VPLS Routing Instances
- Configuring BGP Signaling for VPLS
- Configuring the VPLS Site Name and Site Identifier
- Configuring Automatic Site Identifiers for VPLS
- Configuring the Site Range
- Configuring the VPLS Site Interfaces
- Configuring the VPLS Site Preference
- Configuring LDP Signaling for VPLS
- Configuring LDP Signaling for the VPLS Routing Instance
- Configuring LDP Signaling on the Router
- Configuring VPLS Routing Instance and VPLS Interface Connectivity
- Configuring the VPLS MAC Table Timeout Interval
- Configuring the Size of the VPLS MAC Address Table
- Limiting the Number of MAC Addresses Learned from an Interface
- Removing Addresses from the MAC Address Database
- Configuring Static Pseudowires for VPLS
- Configuring EXP-Based Traffic Classification for VPLS
- Configuring Interfaces for VPLS Routing
- Configuring the Interface Name
- Configuring the VPLS Interface Encapsulation
- Enabling VLAN Tagging
- Configuring VLAN IDs for Logical Interfaces
- Configuring Aggregated Ethernet Interfaces for VPLS
- Configuring VPLS Load Balancing
- Configuring VPLS Fast Reroute Priority
- Configuring VPLS Without a Tunnel Services PIC
- Configuring an Ethernet Switch as the CE Device
- Mapping VPLS Traffic to Specific LSPs
- Configuring Firewall Filters and Policers for VPLS
- Configuring a VPLS Filter
- Configuring an Interface-Specific Counter for VPLS
- Configuring an Action for the VPLS Filter
- Configuring VPLS FTFs
- Changing Precedence for Spanning-Tree BPDU Packets
- Applying a VPLS Filter to an Interface
- Applying a VPLS Filter to a VPLS Routing Instance
- Configuring a Filter for Flooded Traffic
- Configuring a VPLS Policer
- Configuring VPLS Match Conditions
- Specifying the VT Interfaces Used by VPLS Routing Instances
- Configuring VPLS Multihoming
- VPLS Multihomed Site Configuration
- Specifying an Interface as the Active Interface
- Configuring Multihoming on the PE Router
- VPLS Single-Homed Site Configuration
- Flooding Unknown Traffic Using Point-to-Multipoint LSPs
- Configuring Static Point-to-Multipoint Flooding LSPs
- Configuring Dynamic Point-to-Multipoint Flooding LSPs
- Configuring Dynamic Point-to-Multipoint Flooding LSPs with
the Default Template
- Configuring Dynamic Point-to-Multipoint Flooding LSPs with
a Preconfigured Template
- Configuring VPLS and Integrated Routing and Bridging
- Configuring MAC Address Flooding and Learning for VPLS
- Configuring MSTP for VPLS
- Configuring Interoperability Between BGP Signaling and LDP
Signaling in VPLS
- LDP BGP Interworking Platform Support
- Configuring VPLS Mesh Groups for LDP BGP Interworking
- Configuring Switching Between Pseudowires Using VPLS Mesh Groups
- Configuring Integrated Routing and Bridging Support for LDP
BGP Interworking with VPLS
- Configuring Inter-AS VPLS with MAC Processing at the ASBR
- Inter-AS VPLS with MAC Operations Configuration Summary
- Configuring the ASBRs for Inter-AS VPLS
- Tracing VPLS Traffic and Operations
- Configuring Port Mirroring for VPLS Traffic
- Configuring the Label Block Size
- VPLS Example
- Example: Building a VPLS From Router 1 to Router 3
- Summary of VPLS Configuration Statements
- active-interface
- automatic-site-id
- connectivity-type
- encapsulation
- family multiservice
- fast-reroute-priority
- interface
- interface-mac-limit
- label-block-size
- label-switched-path-template
- local-switching
- mac-flush
- mac-table-aging-time
- mac-table-size
- mesh-group
- multi-homing
- neighbor
- no-local-switching
- no-tunnel-services
- peer-as
- rsvp-te
- site
- site-identifier
- site-preference
- site-range
- static
- template
- traceoptions
- tunnel-services
- vlan-id
- vlan-id-list (Interface in VPLS)
- vlan-tagging
- vpls
- vpls (Interfaces)
- vpls (Routing Instance)
- vpls-id
- Interprovider and Carrier-of-Carriers
- Introduction to Interprovider and Carrier-of-Carriers VPNs
- Traditional VPNs, Interprovider VPNs, and Carrier-of-Carriers
VPNs
- Standard VPNs
- Interprovider and Carrier-of-Carriers VPNs
- Interprovider VPNs
- Linking VRF Tables Between Autonomous Systems
- Configuring MP-EBGP Between AS Border Routers
- Configuring Multihop MP-EBGP Between AS Border Routers
- Carrier-of-Carriers VPNs
- Internet Service Provider as the Customer
- VPN Service Provider as the Customer
- Interprovider and Carrier-of-Carriers VPN Standards
- Configuring Interprovider and Carrier-of-Carriers VPNs
- Configuring Interprovider VPNs
- Configuring Interprovider VPNs Using MP-EBGP
- Configuring RSVP
- Configuring MPLS
- Configuring BGP
- Configuring OSPF
- Configuring Interprovider VPNs Using Multihop MP-EBGP
- Configuring the AS Border Routers
- Configuring BGP
- Configuring Policy
Options
- Configuring the PE Router
- Configuring Carrier-of-Carriers VPNs for Customers That Provide
Internet Service
- Configuring the Carrier-of-Carriers VPN Service Customer’s
CE Router
- Configuring MPLS
- Configuring BGP
- Configuring OSPF
- Configuring Policy Options
- Configuring the Carrier-of-Carriers VPN Service Provider’s
PE Routers
- Configuring MPLS
- Configuring BGP
- Configuring IS-IS
- Configuring LDP
- Configuring a Routing Instance
- Configuring Policy Options
- Configuring Carrier-of-Carriers VPNs for Customers That Provide
VPN Service
- Configuring the Carrier-of-Carriers Customer’s PE Router
- Configuring MPLS
- Configuring BGP
- Configuring OSPF
- Configuring LDP
- Configuring VPN Service in the Routing Instance
- Configuring Policy Options
- Configuring the Carrier-of-Carriers Customer’s CE Router
- Configuring MPLS
- Configuring BGP
- Configuring OSPF and LDP
- Configuring Policy Options
- Configuring the Provider’s PE Router
- Configuring MPLS
- Configuring a PE-Router-to-PE-Router BGP Session
- Configuring IS-IS and LDP
- Configuring Policy Options
- Configuring a Routing Instance to Send Routes to the CE Router
- Configuring BGP to Gather Interprovider and Carrier-of-Carriers
VPNs Statistics
- Configuration Examples for Interprovider and Carrier-of-Carriers
VPNs
- Example Terminology
- Interprovider VPN Example—MP-EBGP Between ISP Peer Routers
- Configuration for Router A
- Configuration for Router B
- Configuration for Router C
- Configuration for Router D
- Configuration for Router E
- Configuration for Router F
- Interprovider VPN Example—Multihop MP-EBGP with P Routers
- Configuration for Router A
- Configuration for Router B
- Configuration for Router C
- Configuration for Router D
- Configuration for Router E
- Configuration for Router F
- Carrier-of-Carriers VPN Examples
- Carrier-of-Carriers VPN Example—Customer Provides Internet
Service
- Configuration for Router A
- Configuration for Router B
- Configuration for Router C
- Configuration for Router D
- Configuration for Router E
- Configuration for Router F
- Configuration for Router G
- Configuration for Router H
- Configuration for Router I
- Configuration for Router J
- Configuration for Router K
- Configuration for Router L
- Carrier-of-Carriers VPN Example—Customer Provides VPN
Service
- Configuration for Router A
- Configuration for Router B
- Configuration for Router C
- Configuration for Router D
- Configuration for Router E
- Configuration for Router F
- Configuration for Router G
- Configuration for Router H
- Configuration for Router I
- Configuration for Router J
- Configuration for Router K
- Configuration for Router L
- Multiple Instances for LDP and Carrier-of-Carriers VPNs
- Summary of Interprovider and Carrier-of-Carriers VPNs
Configuration Statements
- labeled-unicast
- per-group-label
- traffic-statistics
- Layer 2 Circuits
- Layer 2 Circuit Overview
- Layer 2 Circuit Overview
- Layer 2 Circuit Bandwidth Accounting and Call Admission
Control
- Bandwidth Accounting and Call Admission Control Overview
- Selecting an LSP Based on the Bandwidth Constraint
- LSP Path Protection and CAC
- Secondary Paths and CAC
- Fast Reroute and CAC
- Link and Node Protection and CAC
- Layer 2 Circuits Trunk Mode
- Layer 2 Circuit Standards
- Configuring Layer 2 Circuits
- Introduction to Configuring Layer 2 Circuits
- Configuring Interfaces for Layer 2 Circuits
- Configuring the Address for the Neighbor of the Layer 2
Circuit
- Configuring the Neighbor Interface for the Layer 2 Circuit
- Configuring a Community for the Layer 2 Circuit
- Configuring the Control Word for Layer 2 Circuits
- Configuring the Control Word for
Frame Relay Interfaces
- Disabling the Control Word
for Layer 2 Circuits
- Configuring the Encapsulation Type for the Layer 2 Circuit
Neighbor Interface
- Configuring the MTU for the Layer 2 Circuit Neighbor Interface
- Enabling
the Layer 2 Circuit When the Encapsulation Does Not Match
- Enabling
the Layer 2 Circuit When the MTU Does Not Match
- Configuring the
MTU Advertised for a Layer 2 Circuit
- Configuring the Protect Interface
- Configuring the Pseudowire Status TLV
- Configuring Layer 2 Circuits over Both RSVP and LDP LSPs
- Example: PSN Tunnel Endpoint
- Configuring the Virtual Circuit ID
- Configuring the Interface Encapsulation Type for Layer 2
Circuits
- Configuring ATM2 IQ Interfaces for Layer 2 Circuits
- Configuring Local Interface Switching in Layer 2 Circuits
- Configuring the Interfaces for the Local Interface Switch
- Enabling Local Interface Switching When the MTU Does Not Match
- Configuring LDP for Layer 2 Circuits
- Configuring Static Layer 2 Circuits
- Configuring Policies for Layer 2 Circuits
- Configuring the Layer 2 Circuit Community
- Configuring the Policy Statement for the Layer 2 Circuit
Community
- Example: Configuring a Policy for a Layer 2 Circuit Community
- Verifying the Layer 2 Circuit Policy Configuration
- Configuring ATM Trunking on Layer 2 Circuits
- Configuring Bandwidth Allocation and Call Admission Control
in Layer 2 Circuits
- Tracing Layer 2 Circuit Operations
- Layer 2 Circuits Example
- Introduction to Layer 2 Circuit Protect Interfaces Example
- Configuring Router PE1
- Configuring Router PE2
- Configuring Router CE1
- Configuring Router CE2
- Summary of Layer 2 Circuit Configuration Statements
- bandwidth
- community
- control-word
- description
- encapsulation-type
- end-interface
- ignore-encapsulation-mismatch
- ignore-mtu-mismatch
- install-nexthop
- interface
- l2circuit
- local-switching
- mtu
- neighbor
- no-control-word
- protect-interface
- pseudowire-status-tlv
- psn-tunnel-endpoint
- static
- traceoptions
- virtual-circuit-id
- Indexes
- Index
- Index of Statements and Commands