Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Example: Configuring BGP-Based H-VPLS Using Different Mesh Groups for Each Spoke Router

This example shows how to configure the hierarchical virtual private LAN service (H-VPLS) using different mesh groups to provide H-VPLS functionality and provides steps for verifying the configuration. This is one type of H-VPLS configuration possible in the Juniper Networks implementation. For information about the alternate type of configuration see Example: Configuring LDP-Based H-VPLS Using a Single Mesh Group to Terminate the Layer 2 Circuits.

Using mesh groups improves LDP-based VPLS control plane scalability and avoids the requirement for a full mesh of LDP sessions. This example uses BGP-based VPLS.

This example is organized into the following sections:

Requirements

This example uses the following hardware components:

  • Four MX Series 5G Universal Routing Platforms for Router PE1, Router PE2, Router PE3, and Router PE4

  • One M Series Multiservice Edge Router for Router CE4

  • Two EX Series Ethernet Switches for Device CE1 and Device CE2

  • One J Series Services Router for Router CE3

Overview and Topology

Figure 1 shows the physical topology used in this example.

Figure 1: Physical Topology of H-VPLSPhysical Topology of H-VPLS

The following describes the base configuration used in this example:

  • Router PE1 and Router PE2 are configured as MTU devices.

  • Router PE3 and Router PE4 are configured as PE-r routers, each using an LDP-based VPLS routing instance.

  • The LDP and OSPF protocols are configured on all of the MTU devices and PE-r routers.

  • Core-facing interfaces are enabled with the MPLS address family.

  • Optionally, the VPLS routing instances can be configured on PE-r routers with the no-tunnel-interface statement. This allows the routers to use a label-switched interface (LSI), which is useful if your routers do not have Tunnel Services PICs or built-in support for tunnel services.

  • All of the routers are configured with loopback IP addresses.

  • BGP is configured on the PE-r routers. Optionally, you can configure route reflection. This is useful for scaling internal BGP (IBGP). The BGP configuration includes the signaling statement at the [edit protocols bgp group group-name family l2vpn] hierarchy level to support Layer 2 VPN signaling using BGP.

Figure 2 shows the logical topology used in this example.

Figure 2: Logical Topology of H-VPLSLogical Topology of H-VPLS

In Figure 2:

  • The MTU devices (Router PE1 and Router PE2) have Layer 2 circuit connections to the PE-r routers (Router PE3 and Router PE4). For redundancy, a backup neighbor is configured for the Layer 2 circuit connections to the PE-r routers.

  • The l2circuit statement in the [edit protocols] hierarchy is included on the MTU devices.

  • A VPLS routing instance is configured on the PE-r routers.

  • In the VPLS routing instance on the PE-r routers, mesh groups are created to terminate the Layer 2 circuit pseudowires that originate at the MTU devices.

  • Each MTU device is configured with a different virtual circuit ID.

  • Each PE-r router’s mesh groups configuration includes VPLS ID values that match the virtual circuit IDs used on the MTU devices.

Configuration

To configure H-VPLS with different mesh groups for each spoke PE-r router using BGP-based VPLS, perform the following tasks:

Configuring the Spoke MTU PE Routers

Step-by-Step Procedure

  1. On Router PE1, configure the Gigabit Ethernet interface connected to Router CE1. Include the encapsulation statement and specify the ethernet-ccc option. Also configure the logical interface by including the family statement and specifying the ccc option.

  2. On Router PE1, configure the Layer 2 circuit by including the neighbor statement and specifying the IP address of Router PE3 as the neighbor. Configure the Gigabit Ethernet logical interface by including the virtual-circuit-id statement and specifying 100 as the ID. Also configure a backup neighbor for the Layer 2 circuit by including the backup-neighbor statement, specifying the loopback interface IP address of Router PE4 as the backup neighbor, and including the standby statement.

  3. On Router PE2, configure the Gigabit Ethernet interface connected to Router CE2. Include the encapsulation statement and specify the ethernet-ccc option. Also configure the logical interface by including the family statement and specifying the ccc option.

  4. On Router PE2, configure the Layer 2 circuit by including the neighbor statement and specifying the IP address of Router PE3 as the neighbor. Configure the Gigabit Ethernet logical interface by including the virtual-circuit-id statement and specifying 200 as the ID. Configure the encapsulation by including the encapsulation-type statement and specifying the ethernet option. Also configure a backup neighbor for the Layer 2 circuit by including the backup-neighbor statement, specifying the loopback interface IP address of Router PE4 as the backup neighbor, and including the standby statement.

Configuring the Hub PE (PE-r)

Step-by-Step Procedure

  1. On Router PE3 (the primary hub), configure the Gigabit Ethernet interface connected to Router CE3. Include the encapsulation statement and specify the ethernet-vpls option. Also configure the logical interface by including the family vpls statement.

  2. On Router PE4 (the backup hub), configure the Gigabit Ethernet interface connected to Router CE4. Include the encapsulation statement and specify the ethernet-vpls option. Also configure the logical interface by including the family vpls statement.

  3. On PE-r Router PE3, configure the BGP-based VPLS routing instance by including the instance-type statement at the [edit routing-instances H-VPLS] hierarchy level and specifying the vpls option. Include the interface statement and specify the Gigabit Ethernet interface connected to Router CE3. Configure a route distinguisher to ensure that the route advertisement is unique by including the route-distinguisher statement and specifying 192.0.2.3:33 as the value. Also configure the VPN routing and forwarding (VRF) route target to be included in the route advertisements to the other routers participating in the VPLS. To configure the VRF route target, include the vrf-target statement and specify target:64510:2 as the value. Optionally, include the no-tunnel-services statement to enable the use of LSI interfaces, which is useful if the device does not have tunnel services. The no-tunnel-services statement is omitted in this example. Optionally, you can include the site-range statement to specify an upper limit on the maximum site identifier that can be accepted to allow a pseudowire to be brought up. The site-range statement is omitted in this example. We recommend using the default of 65,534.

    Configure the VPLS protocol and the mesh groups for each MTU PE device.

    To configure the VPLS protocol, include the vpls statement at the [edit routing-instances H-VPLS protocols] hierarchy level. Include the site statement and specify a name for the site. Include the interface statement and specify the Gigabit Ethernet interface connected to Device CE3.

    Configuring mesh groups under the VPLS instance terminates the Layer 2 circuit into the VPLS instance. To configure each mesh group, include the mesh-group statement and specify the mesh group name. In this example, the mesh group name is the name of the MTU device associated with each mesh group. Include the vpls-id statement and specify the ID that matches the virtual circuit ID configured in Configuring the Spoke MTU PE Routers. Also include the neighbor statement and specify the IP address of the spoke PE router associated with each mesh group. Optionally, include the local-switching statement if you are not using a full mesh of VPLS connections. The local-switching statement is useful if you are configuring a single mesh group and terminating multiple Layer 2 circuit pseudowires into it. The local-switching statement is omitted in this example.

  4. On PE-r Router PE4, configure a routing instance like the one on Router PE3.

Verifying the H-VPLS Operation

Step-by-Step Procedure

This section describes the operational commands that you can use to validate that the H-VPLS is working as expected.

  1. On Router PE1 and Router PE2, use the show l2circuit connections command to verify that the Layer 2 circuit to Router PE3 is Up and the Layer 2 circuit to Router PE4 is in standby mode.

    The output also shows the assigned label, virtual circuit ID, and the ETHERNET encapsulation type.

  2. On Router PE1 and Router PE2, use the show ldp neighbor command to verify that the targeted LDP sessions have been created between the loopback interface to the primary and backup H-VPLS hub neighbors.

  3. On Router PE3 and Router PE4, use the show vpls connections command to verify that the VPLS connection status is Up for both the LDP-based VPLS and the BGP-based VPLS Layer 2 circuits that are terminated.

  4. On Router PE3 and Router PE4, use the show vpls flood command to verify that the H-VPLS PE router created a flood group for each spoke PE site.

  5. On Router PE3 and Router PE4, use the show vpls mac-table command to verify that MAC addresses of the CE devices have been learned.

  6. Make sure that the CE devices can ping each other.

  7. Check the relevant routing tables.

Results

The configuration and verification parts of this example have been completed. The following section is for your reference.

The relevant sample configuration for Router PE1 follows.

Router PE1

The relevant sample configuration for Router PE2 follows.

Router PE2

The relevant sample configuration for Router PE3 follows.

Router PE3

The relevant sample configuration for Router PE4 follows.

Router PE4

The relevant sample configuration for Device CE1 follows.

Router CE1

The relevant sample configuration for Device CE2 follows.

Router CE2

The relevant sample configuration for Device CE3 follows.

Router CE3

The relevant sample configuration for Device CE4 follows.

Router CE4