List of Figures

Figure 1: Routers in a VPN
Figure 2: Logical Interface per Router in a Virtual-Router Routing Instance
Figure 3: BGP Route Target Filtering Enabled for a Group of VPNs
Figure 4: Network Topology of Site of Origin Example
Figure 5: Layer 2 VPN Connecting CE Routers
Figure 6: Relationship Between the Site Identifier and the Remote Site ID
Figure 7: Example of a Simple Full-Mesh Layer 2 VPN Topology
Figure 8: VPN Attributes and Route Distribution
Figure 9: Overlapping Addresses Among Different VPNs
Figure 10: Route Distinguishers
Figure 11: VRF Tables
Figure 12: Route Distribution Within a VPN
Figure 13: Distribution of Routes from CE Routers to PE Routers
Figure 14: Distribution of Routes Between PE Routers
Figure 15: Distribution of Routes from PE Routers to CE Routers
Figure 16: Using MPLS LSPs to Tunnel Between PE Routers
Figure 17: Label Stack
Figure 18: Multicast Topology Overview
Figure 19: OSPF Sham Link
Figure 20: GRE Tunnel Configured Between the Local CE Router and the PE Router
Figure 21: GRE Tunnel Configured Between the Remote CE Router and the PE Router
Figure 22: Layer 3 VPN Topology for ping and traceroute Examples
Figure 23: Example of a Simple VPN Topology
Figure 24: Example of a Hub-and-Spoke VPN Topology with One Interface
Figure 25: Example of a Hub-and-Spoke VPN Topology with Two Interfaces
Figure 26: Route Distribution Between Two Spoke Routers
Figure 27: Example of an LDP-over-RSVP VPN Topology
Figure 28: Label Pushing and Popping
Figure 29: Application-Based Layer 3 VPN Example Configuration
Figure 30: Example of a Configuration Using an OSPF Domain ID
Figure 31: Example of an Overlapping VPN Topology
Figure 32: PE Routers A and D Connected by a GRE Tunnel Interface
Figure 33: GRE Tunnel Between the CE Router and the PE Router
Figure 34: ES Tunnel Interface (IPsec Tunnel)
Figure 35: PE Router Does Not Provide Internet Access
Figure 36: PE Router Connects to a Router Connected to the Internet
Figure 37: Routing VPN and Internet Traffic Through Different Interfaces
Figure 38: Example of Internet Traffic Routed Through Separate Interfaces
Figure 39: VPN and Outgoing Internet Traffic Routed Through the Same Interface and Return Internet Traffic Routed Through a Different Interface
Figure 40: Interface Configured to Carry Both Internet and VPN Traffic
Figure 41: VPN and Internet Traffic Routed Through the Same Interface
Figure 42: Internet Traffic Routed Through a Separate NAT Device
Figure 43: Internet Traffic Routed Through a NAT Example Topology
Figure 44: Internet Access Through a Hub CE Router Performing NAT
Figure 45: Internet Access Provided Through a Hub CE Router
Figure 46: Two Hub CE Routers Handling Internet Traffic and NAT
Figure 47: Simple MVPN Topology
Figure 48: Flooding a Packet with an Unknown Destination to All PE Routers in the VPLS Instance
Figure 49: BGP and LDP Signaling for a VPLS Routing Instance
Figure 50: VPLS Label Block Structure
Figure 51: Label Mapping Example
Figure 52: Flooding Unknown VPLS Traffic Using Ingress Replication
Figure 53: Flooding Unknown VPLS Traffic Using a Point-to-Multipoint LSP
Figure 54: Router 1 to Router 3 Topology
Figure 55: Interprovider VPN Network Topology
Figure 56: Carrier-of-Carriers VPN Architecture
Figure 57: Network Topology for the Interprovider VPN Example
Figure 58: Network Topology of Interprovider VPN Example—Multihop MP-EBGP
Figure 59: Carrier-of-Carriers VPN Example Network Topology
Figure 60: Components of a Layer 2 Circuit
Figure 61: ATM Trunking on Layer 2 Circuits
Figure 62: Layer 2 Circuits Using Protect Interfaces