Version: 3.00.10
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright 2014 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided as is, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
II
III
Figures............................................................................................................. I
Tables .............................................................................................................V
Glossary .......................................................................................................VII
IV
Intended Audience
This manual is intended for:
l Network planning engineers
l Commissioning engineers
l Maintaining engineers
Chapter Summary
1, VPN Overview Describes the background, basic feature and advantage of VPN.
2, MPLS L2VPN Configuration Describes the MPLS L2VPN principle, configuration commands and
configuration instances.
3, MPLS L3VPN Configuration Describes the MPLS L3VPN principle, configuration commands and
configuration instances.
4, Multicast VPN Describes the Multicast VPN principle, configuration commands and
Configuration configuration instances.
Conventions
This manual uses the following typographical conventions:
Typeface Meaning
Italics Variables in commands. It may also refers to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters and commands.
Constant Text that you type, program codes, filenames, directory names, function names.
width
[] Optional parameters.
{} Mandatory parameters.
II
Introduction of VPN
Although traditional dedicated networks have brought more benefits to businesses, they
still cannot satisfy the requirements of businesses for network flexibility, security, economy,
1-1
and scalability. A new alternative is urgently demanded, which can simulate a traditional
dedicated network over the existing IP network. This new solution is called VPN.
Depending on Internet Service Providers (ISPs) and Network Service Providers (NSPs),
VPN can build a virtually dedicated communication network over public networks.
VPN Features
VPN has two basic features:
l Private: For a VPN subscriber, using VPN is not different from using a traditional
dedicated network. On one hand, VPN and the bottom-layer bearer network have
separate resources. That is, the resources of a VPN generally are not used by other
VPNs or non-VPN users. On the other hand, VPN provides sufficient security to
ensure that the internal information of VPN will not be affected by the outside.
l Virtual: The internal communications of VPN users are implemented through a public
network, which is shared by non-VPN users at the same time. That is, VPN users are
using a logically dedicated network. The public network is called VPN Backbone.
Due to the private and virtual features of VPN, the current IP network can be divided into
many logically separate networks. The logically separate networks can be used in a variety
of scenarios: They can be used to solve the interconnections within an enterprise, within
a government sector, or among different government sectors. They can also be used
to provide new services. For example, create a VPN particularly for the IP telephony
service, so as to solve the problem of IP address shortage, guarantee QoS, and launch
new services.
VPN, especially Multi-protocol Label Switching (MPLS) VPN, is increasingly valued by
carriers in solving enterprise interconnection problems and providing various new services.
VPN is becoming an important means of providing value-added services in the IP network.
VPN Advantages
Compared with traditional dedicated data networks, VPN has the following advantages
from the perspective of customers:
l Safe: VPN establishes reliable connections between a company's headquarter and
remote users, overseas institutions, partners, or suppliers, and ensures the security of
data transmission. This is very important for realizing the convergence of e-commerce
or financial networks and communication networks.
l Cheap: By using public networks, enterprises can connect remote offices, institutions,
employees, and business partners at a lower cost.
l Supporting mobile services: VPN users can get access to the VPN at any time, any
place, which can fully satisfy the growing demand for mobile services.
l QoS assurance: VPN (such as MPLS VPN) can provide QoS assurance at different
levels for VPN users.
From the perspective of carriers, VPN has the following advantages:
l Operable: VPN can improve the usage ratio of network resources and increase the
profits of ISPs.
1-2
l Flexible: VPN users can be added or deleted through software configuration, without
any change of hardware. Therefore, VPN is very flexible in practice.
l Multi-service: While providing the VPN interconnection service, SPs can also oper-
ate multiple services including network outsourcing, service outsourcing, and custom-
er-oriented professional services.
For its special features, VPN is gaining the favor of more and more enterprises. It allows the
enterprise to care less about network operation and maintenance and be more committed
to achieving business goals. In addition, a carrier can manage and operate only one
network and provide various services on this network, such as Best-effort IP service, VPN,
traffic engineering, and Differentiated Services (Diffserv). As a result, the carrier invests
less in building, operating and maintaining the network.
While ensuring the security, reliability, and manageability of the network, VPN provides
greater scalability and flexibility. As long as the Internet is accessible, VPN can be
deployed anywhere in the world.
1-3
1-4
2-1
2-2
Users can realize LANs of their own through Metropolitan Area Network (MAN) or Wide
Area Network (WAN).
2-3
2-4
2. Assume that a host connecting to CE1 sends a Medium Access Control (MAC) frame
containing source MAC address X and destination MAC address Y through PE1. If
PE1 does not know the destination PE, it encapsulates a tag 201 to the MAC frame
and then sends the MAC frame to PE2, and it encapsulates a tag 301 to the MAC
frame and then sends the MAC frame to PE3.
3. After PE2 receiving the MAC frame, it judges that the host connecting to PE1 according
to the tag 201, thus it can learn the MAC address X and bind the X to tag 102 (allocated
by PE1).
VPLS Features
There are two modes for PW emulating Ethernet, Raw and Tagged modes.
l In Raw mode, the type of PW is Ethernet. The packets are transmitted in PW without
PTAG. PTAG will be removed if an AC packet containing PTAG is transmitted in PW.
The information of VLAN tag will not be changed in PW transmission if the AC packet
is transmitted without PTAG.
l In Tag mode, the type of PW is Ethernet-VLAN. The packets are transmitted in PW
with PTAG. PTAG will be kept with the AC packet to transmit to the peer PE if the AC
packet contains PTAG. A PTAG or a special PTAG-Vlan 0tag is encapsulated into the
AC packet if the AC packet is transmitted in PW without PTAG.
Caution!
In both of RAW and Tag modes, the user VLAN tags locating at frame headers are
transmitted transparently without any changing.
There are two modes for MAC address learning, qualified and unqualified modes.
l Qualified mode
PE learns MAC address according to the MAC address and VLAN tag containing in
user Ethernet packet. In qualified mode, every user VLAN has its own broadcast
domain and independent MAC address space.
l Unqualified mode
PE learns MAC address according to the MAC address containing in user Ethernet
packet. In unqualified mode, all user VLANs share a broadcast domain and a MAC
address space. The MAC address of user VLAN has to be unique. The MAC
addresses cannot be repeated.
PW has two transmission modes, Spoke and Hub modes. To solve the full-connection
broadcast loop and realize the hierarchical accessing, people define PW transmission
attributes Spoke and Hub modes and AC Server/Client mode. In VPLS working
mechanism, PE router broadcasts (flooding) broadcast, multicast and unknow frames to
other network members. The broadcast rules of different modes are described as follows:
2-5
l Broadcast the broadcast packets received from a Spoke mode PW to all ACs (Client
and Server), Hub mode PWs and other Spoke mode PWs.
l Broadcast the broadcast packets received from a Server (Server-AC) to other ACs
(Client and Server), all Spoke mode PWs and Hub mode PWs.
l Broadcast the broadcast packets received from a Hub mode PW to all Server-ACs
and Spoke mode PWs, but not broadcast to other Hub mode PWs and all Client-ACs.
l Broadcast the broadcast packets received from a Client (Client-AC) to all Server-ACs
and Spoke mode PWs, but not broadcast to Hub mode PWs and other Client-ACs.
Steps
1. Enable L2VPN.
Command Function
2-6
2-7
5. (Optional) Configure the attributes of the AC interface for the VPLS instance.
6. (Optional) Configure the attributes of the PW instance for the VPLS instance.
2-8
2-9
2-10
Command Function
2-11
Command Function
ZXCTN#show l2vpn forwardinfo [vpnname Shows the valid PW list according to the
<vpn-name>| peer <A.B.C.D>][detail] instance name or peer ID.
ZXCTN#show pwe3 signal fec129 [{used-only | unuse-only Queries signaling status of the PW of
[{no-remote | no-config}] | local-label <local-label>| FEC129 type.
remote-label <remote-label>| id <instance-id> | name
<instance-name> | pw-name auto_pw<number>}]
ZXCTN#show pwe3 signal fec129 detail [{used-only Queries detailed information of the PW
| unuse-only [{no-remote | no-config}] | local-label of FEC128 type.
<local-label>| remote-label <remote-label>| id
<instance-id> | name <instance-name> | pw-name
auto_pw<number>}]
End of Steps
2-12
Configuration Flow
1. Configure information on the interfaces of PE1 and PE2 connected to CEs. If the
sub-interfaces are used as ACs, it is necessary to configure VLAN/QinQ encapsulation
on the sub-interfaces.
2. Configure information on the interconnected interfaces between PE1 and PE2 to make
PE1 interconnect to PE2.
3. Configure loopback interfaces on PE1 and PE2 and use them as LDP router-IDs.
4. Configure routing information to advertise the loopback interface addresses. Make
sure that the next hop/egress of the routes are the LDP public network interfaces in
the next step.
5. Configure an LDP instance. Enable MPLS LDP function on the interconnected
interfaces between PE1 and PE2. Use the interfaces as LDP public network
interfaces. PE1 and PE2 are directly connected, so it is unnecessary to establish a
target-session.
6. Configure a VPLS instance. Make sure that the VPLS neighbors are consistent with
LDP neighbors.
Configuration Command
Configuration on PE1:
Configure addresses on the direct-connected interface between PEs, loopback interface,
and AC sub-interface.
PE1(config)#interface gei-0/1/0/2
PE1(config-if-gei-0/1/0/2)#no shutdown
PE1(config-if-gei-0/1/0/2)#ip address 100.10.1.1 255.255.255.0
PE1(config-if-gei-0/1/0/2)#no shutdown
PE1(config-if-gei-0/1/0/2)#exit
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 1.1.1.1 255.255.255.255
PE1(config-if-loopback1)#exit
PE1(config)#interface gei-0/1/0/1.1
PE1(config-gei-0/1/0/1.1)#exit
PE1(config)#vlan-configuration
PE1(config-vlan)#interface gei-0/1/0/1.1
PE1(config-vlan-if-gei-0/1/0/1.1)#encapsulation-dot1q 100
PE1(config-vlan-if-gei-0/1/0/1.1)#exit
PE1(config-vlan)#exit
2-13
Configure LDP:
PE1(config)#mpls ldp instance 1
PE1(config-ldp-1)#router-id loopback1
PE1(config-ldp-1)#interface gei-0/1/0/2
PE1(config-ldp-1-if-gei-0/1/0/2)#exit
PE1(config-ldp-1)#exit
Configuration on PE2:
Configure addresses on the direct-connected interface between PEs, loopback interface,
and AC sub-interface.
PE2(config)#interface gei-0/1/0/2
PE2(config-if-gei-0/1/0/2)#ip address 100.10.1.2 255.255.255.0
PE2(config-if-gei-0/1/0/2)#no shutdown
PE2(config-if-gei-0/1/0/2)#exit
PE2(config)#interface loopback1
PE2(config-if-loopback1)#ip address 1.1.1.2 255.255.255.255
PE2(config-if-loopback1)#exit
PE2(config)#interface gei-0/1/0/1.1
PE2(config-gei-0/1/0/1.1)#exit
PE2(config)#vlan-configuration
PE2(config-vlan)#interface gei-0/1/0/1.1
PE2(config-vlan-if-gei-0/1/0/1.1)#encapsulation-dot1q 100
PE2(config-vlan-if-gei-0/1/0/1.1)#exit
2-14
PE2(config-vlan)#exit
Configure LDP:
PE2(config)#mpls ldp instance 1
PE2(config-ldp-1)#router-id loopback1
PE2(config-ldp-1)#interface gei-0/1/0/2
PE2(config-ldp-1-if-gei-0/1/0/2)#exit
PE2(config-ldp-1)#exit
Configuration Verification
Check the configuration results. Take PE1 as an example. The procedure to check the
configurations on PE2 is the same as that to check the configurations on PE1.
1. Run the show running-config ospf command to check whether the route configuration
is correct, and run the show ip forwarding route command to view the configuration
result, as shown in the following:
PE1#show running-config ospfv2
! <OSPF>
router ospf 1
network 1.1.1.1 0.0.0.0 area 0.0.0.0
/*Advertise the address that will be used as the address of a PW neighbor in VPLS.
When configuring LDP, make sure that this address is used as the LDP router-id,
and use this address to establish an LDP session.*/
network 100.10.1.0 0.0.0.255 area 0.0.0.0
/*Advertise the address on the interface directly connected to the peer PE.
Use this address to establish a connection with the OSPF neighbor.*/
router-id 1.1.1.1
2-15
!
! /<OSPF>
After the route configuration, the route to the router-id of the VPLS PW neighbor and
also the LDP peer is generated. The local egress interface is gei-0/1/0/2, and the next
hop address is 100.10.1.2.
2. Run the show running-config ldp command to check whether the LDP configuration
is correct, and run the show mpls ldp neighbor instance command to check the
configuration result of LDP neighbor establishment, as shown in the following:
PE1#show running-config ldp
! <LDP>
mpls ldp instance 1
router-id loopback1
interface gei-0/1/0/2
/*The egress interface of the route to the LDP neighbor (see step 1) must be
enabled under the mpls ldp.*/
$
! </LDP>
2-16
/*LDP discovery messages are sent through the gei-0/1/0/2 interface which maintains
the session between 100.10.1.2:0 and 100.10.1.1:0. If the interface is closed,
the session is closed.*/
Addresses bound to peer LDP Ident:
100.10.1.2 100.10.1.2 /*An LSP public network interface address can
be bound to the peer LDP.*/
Note:
To establish a VPLS PW, it is necessary to check wether the LDP session to the
specified neighbor exists. This the session does not exist, signalling to establish PW
will not be sent, and the PW cannot be established.
3. Run the show mpls ldp bindings command on PE2 to check whether LDP distributes
the local label of public network for the PW neighbor. After the label is mapped to PE1,
check whether it is marked inuse as a remote label.
PE2#show mpls ldp bindings 1.1.1.2 32 detail instance 1
1.1.1.2/32
local binding: label: imp-null
advertised to:
1.1.1.1:0
remote binding: lsr: 1.1.1.1:0, label: 16484
PE2 distributes an explicit null label {3} for the local loopback address 1.1.1.2. PE1
learns the label 3 distributed for 1.1.1.2 by PE2. The label is marked inuse.
4. Run the show mpls forwarding command to check whether the label distributed to
the PW neighbor is written to the label forwarding table, and run the ping mpls ipv4
command to check whether the public network tunnel to the specified PW neighbor is
established successfully.
PE1#show mpls forwarding-table
Local Outgoing Prefix or Outgoing Next Hop M/S
2-17
2-18
2-19
!!!!!
Success rate is 100 percent(5/5),round-trip min/avg/max= 5/5/6 ms
After the VPLS application, the two CE devices can ping each successfully.
CE1#ping 10.1.1.2
sending 5,100-byte ICMP echoes to 10.1.1.2,timeout is 2 seconds.
!!!!!
Success rate is 100 percent(5/5),round-trip min/avg/max= 1/1/2 ms.
CE2#ping 10.1.1.1
sending 5,100-byte ICMP echoes to 10.1.1.1,timeout is 2 seconds.
!!!!!
Success rate is 100 percent(5/5),round-trip min/avg/max= 1/1/2 ms.
2-20
Configuration on PE2:
PE2(config)#mpls l2vpn enable
PE2(config)#pw pw1
PE2(config)#vpls zte1 multi-mac-spaces
PE2(config-vpls-zte1)#pseudo-wire pw1
PE2(config-vpls-zte1-pw-pw1)#neighbour 1.1.1.1 vcid 10
PE2(config-vpls-zte1-pw-pw1-neighbour-1.1.1.1)#exit
PE2(config-vpls-zte1-pw-pw1)#exit
PE2(config-vpls-zte1)#access-point gei-0/1/0/1.1
PE2(config-vpls-zte1-ac-gei-0/1/0/1.1)#access-params ethernet
The configuration verification procedure for a VPLS qualified instance is the same as that
for a VPLS un-qualified instance.
1. When MAC filtering rule is applied in the VPLS instance, all MAC addresses of this
rule will be synchronized to forwarding table and set drop tag.
2. Bottom layer forwarding module searches forwarding table to find these MAC
addresses and drop according to the tag.
In this way, the route entries which contain the source and destination MAC addresses
defining by VPLS instance are filtered, thus to, the hosts to be filtered are shielded in
network.
Steps
1. Creates L2VPN VPLS service instance.
2-21
Command Function
[multi-mac-spaces] means that the instance space can be divided into multiple MAC
address space based on the Tag information.
2.
Command Function
ZXCTN(config)#show mac vpls instance <vpls-name> Shows the configured MAC address
entries in VPLS instance.
End of Steps
2-22
Configuration Flow
1. Establish VPLS connection between PE1 and PE2, configure VPLS instance.
2. Enter VPLS MAC configuration mode on PE, configure MAC filter rule.
Configuration Command
Configuration on PE1:
PE1(config)#mpls l2vpn enable
PE1(config)#pw pw1
PE1(config)#vpls vpls_a
PE1(config-vpls-vpls_a)#pseudo-wire pw1
PE1(config-vpls-vpls_a-pw-pw1)#neighbour 1.1.1.2 vcid 100
PE1(config-vpls-vpls_a-pw-pw1-neighbour-1.1.1.2)#exit
PE1(config-vpls-vpls_a-pw-pw1)#exit
PE1(config-vpls-vpls_a)#access-point gei-0/1/0/2
PE1(config-vpls-vpls_a-ac-gei-0/1/0/2)#access-params ethernet
PE1(config-vpls-vpls_a-ac-gei-0/1/0/2-eth)#exit
PE1(config-vpls-vpls_a-ac-gei-0/1/0/2)#exit
PE1(config-vpls-vpls_a)#exit
PE1(config)#interface loopback10
PE1(config-if-loopback10)#ip address 1.1.1.1 255.255.255.255
PE1(config-if-loopback10)#exit
PE1(config)#interface gei-0/1/0/1
PE1(config-if-gei-0/1/0/1)#no shutdown
PE1(config-if-gei-0/1/0/1)#ip address 2.2.2.1 255.255.255.0
PE1(config-if-gei-0/1/0/1)#exit
PE1(config)#router ospf 1
PE1(config-ospf-1)#network 1.1.1.1 0.0.0.0 area 0.0.0.0
PE1(config-ospf-1)#network 2.2.2.0 0.0.0.255 area 0.0.0.0
PE1(config-ospf-1)#router-id 1.1.1.1
2-23
PE1(config-ospf-1)#exit
Configuration on PE2:
PE2(config)#mpls l2vpn enable
PE2(config)#pw pw1
PE2(config)#vpls vpls_a
PE2(config-vpls-vpls_a)#pseudo-wire pw1
PE2(config-vpls-vpls_a-pw-pw1)#neighbour 1.1.1.1 vcid 100
PE2(config-vpls-vpls_a-pw-pw1-neighbour-1.1.1.1)#exit
PE2(config-vpls-vpls_a-pw-pw1)#exit
PE2(config-vpls-vpls_a)#access-point gei-0/3/0/3
PE2(config-vpls-vpls_a-ac-gei-0/1/0/2)#access-params ethernet
PE2(config-vpls-vpls_a-ac-gei-0/1/0/2-eth)#exit
PE2(config-vpls-vpls_a-ac-gei-0/1/0/2)#exit
PE2(config-vpls-vpls_a)#exit
PE2(config)#interface loopback10
PE2(config-if-loopback10)#ip address 1.1.1.2 255.255.255.255
PE2(config-if-loopback10)#exit
PE2(config)#interface gei-0/2/0/1
PE2(config-if-gei-0/2/0/1)#no shutdown
PE2(config-if-gei-0/2/0/1)#ip address 2.2.2.2 255.255.255.0
PE2(config-if-gei-0/2/0/1)#exit
PE2(config)#router ospf 1
PE2(config-ospf-1)#network 1.1.1.2 0.0.0.0 area 0.0.0.0
PE2(config-ospf-1)#network 2.2.2.0 0.0.0.255 area 0.0.0.0
PE2(config-ospf-1)#router-id 1.1.1.2
PE2(config-ospf-1)#exit
Configuration Verification
Check the configuration on PE1, as shown in the following:
2-24
Check the MAC filtering configuration: /*No MAC filtering policy is configured, so
no MAC address is displayed in the L2VPN MAC filtering section.*/
PE1(config)#show running-config l2vpn
!<pss-l2vpn>
mpls l2vpn enable
vpls vpls_a
access-point gei-0/1/0/2
access-params ethernet
pseudo-wire pw1
neighbour 1.1.1.2 vcid 100
$
$
$
!</pss-l2vpn>
CE1 and CE2 send streams whose source MAC addresses are 0000.0000.1111 and
0000.0000.2222 respectively. Check the MAC learning as follows:
2-25
PE1(config-vpls-vpls_a-mac)#exit
PE1(config-vpls-vpls_a)#exit
CE1 and CE2 sends streams whose source MAC addresses are 0000.0000.1111 and
0000.0000.2222 respectively. Check the MAC learning as follows:
PE1(config)#show mac vpls instance vpls_a
Total MAC Entries: 2
2-26
between clients and network providers maintain constant, but services encapsulated are
transmitted over IP backbone network of the network provider.
LSP tunnel through MPLS net should be defined between two PE routers, and it should
provide tunnel label transparently transmitting data between two PE routers. At the same
time, direct process of LDP label distribution protocol is also defined between two PE
routers to transmit virtual link information. Among them, distributing VC Label through
matching VCID is critical.
When data packet enters PE router at the port of Layer 2 transparent transmission, PE
router finds the corresponding Tunnel Label and VC Label through matching VCID. PE
router will put two layers labels on the data packet. External layer is Tunnel Label indicating
the route from this PE router to destination PE router. Internal layer is VC Label indicating
which corresponding router port of VCID belongs to on destination PE router.
PE router should monitor Layer 2 protocol state at each port, such as FR Local
Management Interface (LMI) and ATM Interim Local Management Interface (ILMI). When
a fault occurs, users can cancel VC Label through LDP label distribution protocol process
so that Layer 2 transparent transmission is shut off avoiding producing unidirectional
unwanted data stream.
Such Layer 2 transparent transmission based on MPLS changes traditional confinement
that Layer 2 link should be implemented through network switch. It essentially forms a
pattern of One Net Multi-Service pattern and makes the operator provide Layer 2 and Layer
3 Services simultaneously in a MPLS net.
Steps
1. Enable L2VPN.
Command Function
2-27
Command Function
5. (Optional) Configure the attributes of the AC interface for the VPWS instance.
2-28
6. (Optional) Configures the attributes of the PW instance for the VPWS instance.
2-29
2-30
2-31
2-32
Command Function
ZXCTN#show pwe3 signal fec128 detail [[peer <A.B.C.D>][vcid Indicates the PW information in
<value>][pw-type <pw-type>]}| used-only |unused-only detail, and lists the reason that
[no-remote | no-config]| service-type vpws [id <value>| name PW is down.
<name>]|local-label <value>}|remote-label <value>]
2-33
Command Function
End of Steps
Configuration Description
The network topology of an L2VPN VPWS ethernet PW configuration instances is shown
in Figure 2-6.
Configuration Flow
1. Configure interface addresses so that PE1 interconnects to PE2.
2. Configure loopback interfaces as the LDP Router-IDs.
3. Configure OSPF to advertise the loopback interface addresses.
4. Configure an LDP instance. It is unnecessary to establish a target-session on the
direct-connected link.
5. Configure an L2VPN instance.
Configuration Command
Configuration on PE1:
PE1(config)#interface gei-0/1/0/1
PE1(config-if-gei-0/1/0/1)#ip address 1.1.1.1 255.255.255.0
PE1(config-if-gei-0/1/0/1)#no shutdown
PE1(config-if-gei-0/1/0/1)#exit
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 100.100.1.1 255.255.255.255
PE1(config-if-loopback1)#exit
2-34
Configuration on PE2:
PE2(config)#interface gei-0/1/0/1
PE2(config-if-gei-0/1/0/1)#ip address 1.1.1.2 255.255.255.0
PE2(config-if-gei-0/1/0/1)#no shutdown
PE2(config-if-gei-0/1/0/1)#exit
PE2(config)#interface loopback1
PE2(config-if-loopback1)#ip address 100.100.1.2 255.255.255.255
PE2(config-if-loopback1)#exit
2-35
PE2(config)#pw pw1
PE2(config)#vpws vpws_zte1
PE2(config-vpws-vpws_zte1)#pseudo-wire pw1
PE2(config-vpws-vpws_zte1-pw-pw1)#neighbour 100.100.1.1 vcid 20
PE2(config-vpws-vpws_zte1-pw-pw1-neighbour-100.100.1.1)#control-word preferred
PE2(config-vpws-vpws_zte1-pw-pw1-neighbour-100.100.1.1)#signal dynamic
PE2(config-vpws-vpws_zte1-pw-pw1-neighbour-100.100.1.1)#encapsulation raw
PE2(config-vpws-vpws_zte1-pw-pw1-neighbour-100.100.1.1)#exit
PE2(config-vpws-vpws_zte1-pw-pw1)#exit
PE2(config-vpws-vpws_zte1)#access-point gei-0/1/0/2
PE2(config-vpws-vpws_zte1-ac-gei-0/1/0/2)#access-params ethernet
PE2(config-vpws-vpws_zte1-ac-gei-0/1/0/2-eth)#exit
PE2(config-vpws-vpws_zte1-ac-gei-0/1/0/2)#exit
PE2(config-vpws-vpws_zte1)#exit
Configuration Verification
After the configuration, a VPWS PW can be established successfully. The following
information shows the result of configuration verification.
PE1#show l2vpn forwardinfo vpnname vpws_zte1
Headers: PWType - Pseudo Wire type and Pseudo Wire connection mode
Llabel - Local label, Rlabel - Remote label
VPNowner - Owner type and instance name
Codes : H - HUB mode, S - SPOKE mode, L - VPLS, W - VPWS, M - MSPW, MO - MONITOR
$pw - auto_pw
2-36
VC status : UP
Remote status : ALLOK
VCCV CC type : CWORD
VCCV CV type : LSP
Tunnel label : { 3 }
Output interface : gei-0/1/0/1
Imposed label stack : { 81921 3 }
Configuration Description
VPWS instances need to be configured on R1 and R2, and BFD can be configured under
the VPWS instances. The network structure is shown in Figure 2-7.
Configuration Flow
1. Configure VPWS instances on R1 and R2.
2. Configure BFD under the VPWS instances of R1 and R2.
Configuration Commands
Configure R1 as follows:
R1(config)#interface xgei-0/5/0/3
R1(config-if-xgei-0/5/0/3)#ip address 201.2.3.2 255.255.255.0
R1(config-if-xgei-0/5/0/3)#exit
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 100.1.1.2 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#router ospf 1
R1(config-ospf-1)#network 201.2.3.0 0.0.0.255 area 0
R1(config-ospf-1)#network 100.1.1.2 0.0.0.0 area 0
R1(config-ospf-1)#exit
2-37
R1(config)# pw pw1
R1(config)#vpws vpws-bfd
R1(config-vpws-vpws-bfd)# access-point xgei-0/5/0/4
R1(config-vpws-vpws-bfd-ac-xgei-0/5/0/4)# access-params ethernet
R1(config-vpws-vpws-bfd-ac-xgei-0/5/0/4-eth)#exit
R1(config-vpws-vpws-bfd-ac-xgei-0/5/0/4)#exit
R1(config-vpws-vpws-bfd)# pseudo-wire pw1
R1(config-vpws-vpws-bfd-pw-pw1)#neighbour 100.1.1.3 vcid 1
R1(config-vpws-vpws-bfd-pw-pw1-neighbour-100.1.1.3)# vccv bfd capability basic
encapsulation ip
R1(config-vpws-vpws-bfd-pw-pw1-neighbour-100.1.1.3)#exit
R1(config-vpws-vpws-bfd-pw-pw1)#exit
R1(config-vpws-vpws-bfd)#exit
R1(config)#bfd
R1(config-bfd)# session pw-bfd pw-bfd pw-name pw1
R1(config-bfd-pw-pw-bfd)#exit
R1(config-bfd)#exit
Configure R2 as follows:
R2(config)#interface xgei-0/0/0/3
R2(config-if-xgei-0/0/0/3)#ip address 201.2.3.3 255.255.255.0
R2(config-if-xgei-0/0/0/3)#exit
R2(config)#interface loopback1
R2(config-if-loopback1)#ip address 100.1.1.3 255.255.255.255
R2(config-if-loopback1)#exit
R2(config)#router ospf 1
R2(config-ospf-1)#network 201.2.3.0 0.0.0.255 area 0
R2(config-ospf-1)#network 100.1.1.3 0.0.0.0 area 0
R2(config-ospf-1)#exit
R2(config)#pw pw1
2-38
R2(config)#vpws vpws-bfd
R2(config-vpws-vpws-bfd)# access-point xgei-0/0/0/4
R2(config-vpws-vpws-bfd-ac-xgei-0/0/0/4)# access-params ethernet
R2(config-vpws-vpws-bfd-ac-xgei-0/0/0/4-eth)#exit
R2(config-vpws-vpws-bfd-ac-xgei-0/0/0/4)#exit
R2(config-vpws-vpws-bfd)# pseudo-wire pw1
R2(config-vpws-vpws-bfd-pw-pw1)#neighbour 100.1.1.2 vcid 1
R2(config-vpws-vpws-bfd-pw-pw1-neighbour-100.1.1.2)# vccv bfd capability basic
encapsulation ip
R2(config-vpws-vpws-bfd-pw-pw1-neighbour-100.1.1.2)#exit
R2(config-vpws-vpws-bfd-pw-pw1)#exit
R2(config-vpws-vpws-bfd)#exit
R2(config)#bfd
R2(config-bfd)# session pw-bfd pw-bfd pw-name pw1
R2(config-bfd-pw-pw-bfd)#exit
R2(config-bfd)#exit
Configuration Verification
After the configurations, you can run the show l2vpn forwardinfo vpnname command to
check the VPWS instances and the show bfd neighbors pw brief command to check the
VPWS BFD configuration.
2-39
$pw - auto_pw
Steps
1. Create a VPWS instance and bind an interface to an AC.
2-40
Command Function
ZXCTN#show l2vpn forwordinfo vpnname Displays a list of valid PWs under the
<vpn-name>[detail] specified instance.
End of Steps
Configuration Flow
1. Configure routes between PE1 and PE2.
2. Establish LDP neighbor relationship between PE1 and PE2.
2-41
3. Enable MPLS L2 VPN on PE1 and PE2. Create a PW. Configure a VPWS instance
and configure the related remote member.
4. On PE1, the POS interface works as an AC to connect to the VPWS instance. The
GE interface on the PE is connected to a VPWS instance.
Configuration Command
The configuration of PE1:
ZXCTN(config)#interface loopback1
ZXCTN(config-if-loopback1)#ip address 1.1.1.46 255.255.255.255
ZXCTN(config-if-loopback1)#exit
ZXCTN(config)#interface gei-0/5/0/3
ZXCTN(config-if-gei-0/5/0/3)#no shutdown
ZXCTN(config-if-gei-0/5/0/3)#ip address 172.20.130.213 255.255.255.252
ZXCTN(config-if-gei-0/5/0/3)#exit
ZXCTN(config)#router isis 10
ZXCTN(config-isis-10)#area 49.0172
ZXCTN(config-isis-10)#system-id 0020.0096.0001
ZXCTN(config-isis-10)#interface gei-0/5/0/3
ZXCTN(config-isis-10-if-gei-0/5/0/3)#ip router isis
ZXCTN(config-isis-10-if-gei-0/5/0/3)#exit
ZXCTN(config-isis-10)#interface loopback1
ZXCTN(config-isis-10-if-loopback1)#ip router isis
ZXCTN(config-isis-10-if-loopback1)#exit
ZXCTN(config-isis-10)#exit
2-42
ZXCTN(config-vpws-yigou)#exit
ZXCTN(config)#interface pos3-0/3/0/1
ZXCTN(config-if-pos3-0/3/0/1)#no shutdown
ZXCTN(config-if-pos3-0/3/0/1)#exit
ZXCTN(config)#ppp
ZXCTN(config-ppp)#interface pos3-0/3/0/1
/*Configure PPP proxy so that PPP routes will be generated on CE1*/
ZXCTN(config-ppp-if)#end
ZXCTN(config)#router isis 10
ZXCTN(config-isis-10)#area 49.0172
ZXCTN(config-isis-10)#system-id 0020.0096.0002
ZXCTN(config-isis-10)#interface gei-0/5/0/3
ZXCTN(config-isis-10-if-gei-0/5/0/3)#ip router isis
ZXCTN(config-isis-10-if-gei-0/5/0/3)#exit
ZXCTN(config-isis-10)#interface loopback1
ZXCTN(config-isis-10-if-loopback1)#ip router isis
ZXCTN(config-isis-10-if-loopback1)#exit
ZXCTN(config-isis-10)#exit
2-43
Configuration Verification
After the configuration, the VPWS PW is Up. CE1 can ping CE2 (100.1.1.2) successfully.
CE1#show ip for rout ppp
IPv4 Routing Table:
status codes: *valid, >best
Dest Gw Interface Owner Pri Metric
*> 100.1.1.2/32 100.1.1.1 pos3-0/5/0/1 ppp 0 0
2-44
CE1#ping 100.1.1.2
sending 5,100-byte ICMP echoes to 100.1.1.2,timeout is 2 seconds.
!!!!!
Figure 2-9 Typical Network Structure of Connecting Two CEs to Two PEs
When AC1 has a fault, NPE2 can be aware of the fault quickly and starts to negotiate with
CE1 to make AC2 be active. So the traffic from CE1 to CE2 is changed over from AC1 to
AC2 directly. Meanwhile, NPE1 or NPE2 needs to send MAC WITHDRAW messages to
other NPE devices in the same Virtual Forwarding Instance (VFI) on the VPLS network to
inform other PEs to age the invalid MAC addresses. In this way, the traffic from CE2 to
CE1 can be learnt through broadcast and be forwarded through NPE2 correctly.
2-45
In the same way, when NPE1 has a fault, NPE2 can detect the fault through other
detection mechanisms and trigger AC link negotiation, and then it sends MAC WITHDRAW
messages to other NPE devices in the same VFI.
Steps
1. Create an MC-ELAM instance.
2-46
2-47
Command Function
End of Steps
2-48
Configuration Flow
1. Configure an MC-ELAM instance.
2. Configure the source and the destination IP addresses of the MC-ELAM instance.
3. Configure the MC-ELAM instance to bind to a smmartgroup interface in automatic
mode.
4. Configure the reverting mode of the MC-ELAM instance
Configuration Command
The configuration of the CE:
CE(config)#interface smartgroup1
CE(config-if-smartgroup1)#exit
CE(config)#lacp
CE(config-lacp)#interface smartgroup1
CE(config-lacp-sg-if-smartgroup1)#lacp mode 802.3ad
CE(config-lacp-sg-if-smartgroup1)#exit
CE(config-lacp)#interface gei-0/3/0/1
CE(config-lacp-member-if-gei-0/3/0/1)#smartgroup 1 mode active
CE(config-lacp-member-if-gei-0/3/0/1)#exit
CE(config-lacp)#interface gei-0/3/0/3
CE(config-lacp-member-if-gei-0/3/0/3)#smartgroup 1 mode active
CE(config-lacp-member-if-gei-0/3/0/3)#exit
CE(config-lacp)#exit
2-49
PE1(config)#interface smartgroup1
PE1(config-if-smartgroup1)#exit
PE1(config)#lacp
PE1(config-lacp)#interface smartgroup1
PE1(config-lacp-sg-if-smartgroup1)#lacp mode 802.3ad
PE1(config-lacp-sg-if-smartgroup1)#exit
PE1(config-lacp)#interface gei-0/3/0/1
PE1(config-lacp-member-if-gei-0/3/0/1)#smartgroup 1 mode active
PE1(config-lacp-member-if-gei-0/3/0/1)#exit
PE1(config-lacp)#exit
PE1(config)#interface gei-0/3/0/2
PE1(config-if-gei-0/3/0/2)#no shutdown
PE1(config-if-gei-0/3/0/2)#ip address 1.1.1.1 255.255.255.0
PE1(config-if-gei-0/3/0/2)#exit
PE1(config)#mc-elam-configuration
PE1(config-mc-elam-configuration)#mc-elam 1
PE1(config-mc-elam-configuration-mc-elam-instance)#bind smartgroup 1 mode auto
PE1(config-mc-elam-configuration-mc-elam-instance)#source 1.1.1.1
PE1(config-mc-elam-configuration-mc-elam-instance)#destination 1.1.1.2
PE1(config-mc-elam-configuration-mc-elam-instance)#restore immediately
PE1(config-mc-elam-configuration-mc-elam-instance)#system-priority 30000
PE1(config-mc-elam-configuration-mc-elam-instance)#end
PE2(config)#mc-elam-configuration
PE2(config-mc-elam-configuration)#mc-elam 1
PE2(config-mc-elam-configuration-mc-elam-instance)#bind smartgroup 1 mode auto
PE2(config-mc-elam-configuration-mc-elam-instance)#source 1.1.1.2
PE2(config-mc-elam-configuration-mc-elam-instance)#destination 1.1.1.1
2-50
PE2(config-mc-elam-configuration-mc-elam-instance)#restore immediately
PE2(config-mc-elam-configuration-mc-elam-instance)#system-priority 40000
PE2(config-mc-elam-configuration-mc-elam-instance)#end
Configuration Verification
Check the configurations before switchover as follows:
Execute the show mc-elam 1 command to check the configuration result on PE1, as follows:
PE1#show mc-elam 1
-----------------------------------------------------
mcelam-instance-id :1
destination_ip :1.1.1.2
source_ip :1.1.1.1
system_priority :30000
system_mac :0022.4432.edac
virtual_mcelam_priority :30000
virtual_mcelam_smac :0022.4432.edac
sm_state :MCELAM_LINK_MS
smartgroup_id :1
bind_mode :MCELAM_AUTO_MODE
actor_mcelam_role :MASTER
actor_lacp_role :MASTER
actor_sg_admin_state :UP
actor_sg_protocol_state :UP
actor_revertive_mode :MCELAM_IMMEDIATELY_MODE
revertive_time :0
actor_adver_int :10
actor_detect_multiplier :5
actor_pwfault :0
partner_mcelam_role :SLAVE
partner_lacp_role :SLAVE
partner_sg_protocol_state:DOWN
partner_adver_int :10
partner_detect_multiplier:5
partner_pwfault :0
Execute the show mc-elam 1 command to check the configuration result on PE2, as follows:
2-51
PE2#show mc-elam 1
------------------------------------------------------
mcelam-instance-id :1
destination_ip :1.1.1.1
source_ip :1.1.1.2
system_priority :40000
system_mac :001e.739a.b21f
virtual_mcelam_priority :30000
virtual_mcelam_smac :0022.4432.edac
sm_state :MCELAM_LINK_MS
smartgroup_id :1
bind_mode :MCELAM_AUTO_MODE
actor_mcelam_role :SLAVE
actor_lacp_role :SLAVE
actor_sg_admin_state :UP
actor_sg_protocol_state :DOWN
actor_revertive_mode :MCELAM_IMMEDIATELY_MODE
revertive_time :0
actor_adver_int :10
actor_detect_multiplier :5
actor_pwfault :0
partner_mcelam_role :MASTER
partner_lacp_role :MASTER
partner_sg_protocol_state:UP
partner_adver_int :10
partner_detect_multiplier:5
partner_pwfault :0
/*Check the smartgroup interface (which should be in down status before switchover).*/
PE2(config)#show ip int brief smartgroup1
Interface IP-Address Mask Admin Phy Prot
Smartgroup1 unassigned unassigned up up down
2-52
PE1#show mc-elam 1
------------------------------------------------------
mcelam-instance-id :1
destination_ip :1.1.1.2
source_ip :1.1.1.1
system_priority :30000
system_mac :00d0.1234.561f
virtual_mcelam_priority :30000
virtual_mcelam_smac :00d0.1234.561f
sm_state :MCELAM_LINK_MS
smartgroup_id :1
bind_mode :MCELAM_AUTO_MODE
actor_mcelam_role :MASTER
actor_lacp_role :SLAVE
actor_sg_admin_state :UP
actor_sg_protocol_state :DOWN
actor_revertive_mode :MCELAM_IMMEDIATELY_MODE
revertive_time :0
actor_adver_int :10
actor_detect_multiplier :5
actor_pwfault :0
partner_mcelam_role :SLAVE
partner_lacp_role :MASTER
partner_sg_protocol_state:UP
partner_adver_int :10
partner_detect_multiplier:5
partner_pwfault :0
2-53
On PE2, run the show mc-elam 1 command to check the PE2 configuration.
PE2#show mc-elam 1
------------------------------------------------------
mcelam-instance-id :1
destination_ip :1.1.1.1
source_ip :1.1.1.2
system_priority :40000
system_mac :0023.e422.1134
virtual_mcelam_priority :30000
virtual_mcelam_smac :00d0.1234.561f
sm_state :MCELAM_LINK_MS
smartgroup_id :1
bind_mode :MCELAM_AUTO_MODE
actor_mcelam_role :SLAVE
actor_lacp_role :MASTER
actor_sg_admin_state :UP
actor_sg_protocol_state :UP
actor_revertive_mode :MCELAM_IMMEDIATELY_MODE
revertive_time :0
actor_adver_int :10
actor_detect_multiplier :5
actor_pwfault :0
partner_mcelam_role :MASTER
partner_lacp_role :SLAVE
partner_sg_protocol_state:DOWN
partner_adver_int :10
partner_detect_multiplier:5
partner_pwfault :0
2-54
The common encapsulation for the TDM circuit emulation includes the SAToP protocol and
the CESoPSN protocol.
l The SAToP protocol is defined in RFC. It provides the emulation function for the PDH
circuit service with a lower rate, such as E1, T1, and T3. The SAToP protocol is used
to transfer unstructured or non-frame E1/T1/E3/T3 services.
l The biggest difference between the CESoPSN protocol and the SAToP protocol is
as follows: The CESoPSN protocol provides structured TDM service transmission
function. That is to say, it can identify and transmit frame structure and TDM
intra-frame signaling.
Steps
1. Configure the CES service.
2-55
Command Function
End of Steps
2-56
Configuration Flow
1. Create the TDM tunnel on the AC side of router CE and router PE.
2. Create the L2VPN example on router PE1 and router PE2 seperately.
3. Configure the TDM pseudo wire.
4. Bind the CE1 interface to the VPWS service.
5. Configure the type and parameters for the TDM service.
6. Test the configuration results. Each status of CES is normal.
Configuration Steps
The ZSR configuration on router CE is omitted. The following only descries the ZXCTN
9000-E configuration on router PE.
PE1(config)#controller cpos3-0/2/3/5
PE1(config-ctrl-cpos3-0/2/3/5)# framing sdh
PE1(config)#interface cpos3_e1-0/2/3/5.1/1/1:1
PE1(config-if-cpos3_e1-0/2/3/5.1/1/1:1)#no shutdown
2-57
PE1(config-vpws-lqs1-ac-cpos3_e1-0/2/3/5.1/1/1:1-tdm)#jitter-buffer 20
PE1(config-vpws-lqs1-ac-cpos3_e1-0/2/3/5.1/1/1:1-tdm)#idle-code 0x7e
PE1(config-vpws-lqs1-ac-cpos3_e1-0/2/3/5.1/1/1:1-tdm)#end
For the L2VPN instance configuration, refer to section "VPWS configuration instances in
ZXCTN 9000-EConfiguration Guide (VPN).
The configuration on PE2 is just similar to that on PE1.
Configuration Verification
The verification results on router PE1 are as follows:
PE1#show l2vpn instance-name lqs1
Name:lqs1
Type:VPWS Default-VCID:- PW count:1 AC count:1
Kompella PW count:0
Activation Status:ENABLE
Default Cword:DISABLE
Headers: M - mode
Description:
Pseudo Wire(PW):
Codes : H - HUB mode, S - SPOKE mode, $pw - auto_pw
Attachment Circuit(AC):
InterfaceName Client/Server
cpos3_e1-0/2/3/5.1/1/1:1 -
2-58
-------------------------------------------------------------------------------
Neighbourhood AGI/VC-ID Service AIIs/Descriptions Labels Status
--------------- ---------- ---------- -------------------------- ------- ------
2.2.2.2 1 SAToP_E1 cpos3_e1-0/1/1/1.1/1/1:1 83929 up
Ready pw1 ^^^^^^^^^^ VPWS:3 cpos3_e1-0/2/3/5.1/1/1:1 81922 LMNSAC
2-59
There are two types of interfaces used for L2VPN and L3VPN bridge function, ulei interface
and bvi interface. For a loopback service, configure the ulei interface. For a non-loopback
service, configure the bvi interface.
Context
L2 VPN and L3 VPN bridge configuration on ZXCTN 9000-E includes the following steps.
1. Configure L2 VPN and L3 VPN on PEs. For details, please refer to VPLS configuration
and MPLS VPN configuration.
2. Create an L2 VPN or an L3 VPN bridge interface.
3. Add an L2 VPN or an L3 VPN bridge interface to the L2 VPN and L3 VPN instance.
Steps
l For a loopback service, configure the ulei interface.
1. Create the interface for the L2 and L3 bridge function, that is the ulei interface.
Command Function
2-60
Command Function
1. Create the interface for the L2 and L3 bridge function, that is the bvi interface.
Command Function
2-61
Command Function
End of Steps
2-62
Configuration Flow
1. Configure IGP route between PE1 and PE2, PE2 and PE3 to make them
interconnected.
2. Establish LDP neighbor relationship between loopback interfaces of PE1 and PE2,
and between loopback interfaces of PE2 and PE3.
3. Create a VPLS instance zte1 between PE1 and PE2, meanwhile CE1 is taken as an
AC accessing PE1.
4. Configure L3 VPN on PE2 and PE3. The Virtual Route Forwarding (VRF) instance
name is zte2.
5. Establish and configure L2 and L3 bridge interfaces on PE2: access vrf zte2, access
VPLS instance zte1, configure IP address.
Configuration Command
The configuration of PE1:
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 1.1.1.1 255.255.255.255
PE1(config-if-loopback1)#no shutdown
PE1(config-if-loopback1)#exit
PE1(config)#interface gei-0/1/0/1
PE1(config-if-gei-0/1/0/1)#ip address 104.110.111.1 255.255.255.0
PE1(config-if-gei-0/1/0/1)#no shutdown
PE1(config-if-gei-0/1/0/1)#exit
PE1(config)#router ospf 1
PE1(config-ospf-1)#router-id 1.1.1.1
PE1(config-ospf-1)#network 1.1.1.1 0.0.0.0 area 0.0.0.0
PE1(config-ospf-1)#network 104.110.111.0 0.0.0.255 area 0.0.0.0
PE1(config-ospf-1)#exit
2-63
PE1(config-vpls-zte1-ac-gei-0/1/0/2-eth)#end
PE2(config)#router ospf 1
PE2(config-ospf-1)#router-id 1.1.1.2
PE2(config-ospf-1)#network 1.1.1.2 0.0.0.0 area 0.0.0.0
PE2(config-ospf-1)#network 104.110.111.0 0.0.0.255 area 0.0.0.0
PE2(config-ospf-1)#network 104.130.131.0 0.0.0.255 area 0.0.0.0
PE2(config-ospf-1)#exit
2-64
PE2(config-vrf-zte2)#exit
PE2(config)#vpls zte1
PE2(config-vpls-zte1)#access-point ulei-0/1/0/1
PE2(config-vpls-zte1-ac-ulei-0/1/0/1)#access-params ethernet
PE2(config-vpls-zte1-ac-ulei-0/1/0/1-eth)#exit
PE2(config-vpls-zte1-ac-ulei-0/1/0/1)#exit
PE2(config-vpls-zte1)#exit
PE2(config)#interface ulei-0/1/0/2
PE2(config-if-ulei-0/1/0/2)#ip address 10.10.10.1 255.255.255.0
PE2(config-if-ulei-0/1/0/2)#exit
2-65
PE2(config)#vpls zte1
PE2(config-vpls-zte1)#access-point bvi1
PE2(config-vpls-zte1-ac-bvi1)#access-params ethernet
PE2(config-vpls-zte1-ac-bvi1-eth)#exit
PE2(config-vpls-zte1-ac-bvi1)#exit
PE2(config-vpls-zte1)#exit
PE2(config)#interface bvi2
PE2(config-if-bvi2)#ip address 10.10.10.1 255.255.255.0
PE2(config-if-bvi2)#exit
PE3(config)#router ospf 1
PE3(config-ospf-1)#router-id 1.1.1.3
PE3(config-ospf-1)#network 1.1.1.3 0.0.0.0 area 0.0.0.0
PE3(config-ospf-1)#network 104.130.131.0 0.0.0.255 area 0.0.0.0
PE3(config-ospf-1)#exit
2-66
PE3(config-vrf-zte2)#rd 100:100
PE3(config-vrf-zte2)#route-target 100:100
PE3(config-vrf-zte2)#address-family ipv4
PE3(config-vrf-zte2-af-ipv4)#exit
PE3(config-vrf-zte2)#exit
PE3(config)#interface gei-0/1/0/1
PE3(config-if-gei-0/1/0/1)#ip vrf forwarding zte2
PE3(config-if-gei-0/1/0/1)#ip address 20.20.20.1 255.255.255.0
PE3(config-if-gei-0/1/0/1)#exit
Configuration Verification
If the loopback service (ulei interface) is configured, check the configuration result on PE2.
ZXCTN(config)#show running-config-interface ulei-0/1/0/2
!<if-intf>
request interface ulei-0/1/0/2
interface ulei-0/1/0/2
ip vrf forwarding zte2
ip address 10.10.10.1 255.255.255.0
!
$
!</if-intf>
!<bridge>
service-bridging virtual-links
virtual-link ulei-0/1/0/1 ulei-0/1/0/2
$
!</bridge>
2-67
no shutdown
!
$
!</if-intf>
!<bridge>
service-bridging virtual-links
virtual-link ulei-0/1/0/1 ulei-0/1/0/2
$
!</bridge>
!<l2vpn>
mpls l2vpn enable
vpls zte1
access-point ulei-0/1/0/1
access-params ethernet
$
$
$
!</l2vpn>
If the non-loopback service (bvi interface) is configured, check the configuration result on
PE2.
ZXCTN(config)#show running-config-interface bvi1
!<if-intf>
interface bvi1
$
!</if-intf>
!<bridge>
service-bridging virtual-links
virtual-link bvi1 bvi2
$
!</bridge>
2-68
interface bvi2
ip vrf forwarding zte2
ip address 10.10.10.1 255.255.255.0
$
!</if-intf>
!<pss-L2VPN>
mpls l2vpn enable
vpls zte1
access-point bvi1
access-params ethernet
$
$
$
!</pss-L2VPN>
ZXCTN(config)#show arp interface bvi2
Arp protect interface is disabled
The count is 2
IP Hardware Exter Inter Sub
Address Age Address Interface VlanID VlanID Interface
--------------------------------------------------------------------------------
10.10.10.1 - 1010.1111.1135 bvi2 0 N/A N/A
10.10.10.2 01:31:09 00e0.e1d0.5533 bvi2 0 N/A N/A
2-69
protection between PEs on the user side and network side. Through PW-BFD or vccv
detection, quick switchover of layer-2 VPN FRR can be implemented. In addition, MAC
update of VPLS throughout the network can be realized by the mac-withdraw signaling.
1. Active and standby PWs are established respectively between UPE1 and NPE1 and
between UPE1 and NPE2, so that the active PW forwarding path of VPLS can be
protected.
2. After the active and standby PWs are established, the active/standby FRR table is
created for MAC forwarding. In addition, the standby PW is forbidden to learn MAC.
3. The active PW uses PW-BFD for detection. When detecting a BFD failure of the active
PW,
l The driver switches the FRR table of the active PW to realize rapid switching of
MAC forwarding.
l The driver notifies the related protocol of the active PW's failure. Then the protocol
performs mac-withdraw of VC, updates MAC throughout the network.
l Removes the restriction of MAC learning from the standby PW, so that the standby
PW can learn MAC again and the switchover between active and standby PWs
can be completed.
Here, it should be noticed that the establishment of PW-BFD is triggered by PW, and the
driver associates the FRR table with BFD detection.
2-70
Steps
1. Enable L2VPN.
Command Function
Command Function
Command Function
4. Bind the VPLS instance to the active PW, set the operating mode to spoke, enter spoke
PW configuration mode, and configure the neighbor of the active PW.
2-71
selective | both: Sets whether to use selective receipt or double receipt for APS.
{independent|master|slave}: Sets the PW redundancy negotiation mode. The
independent parameter indicates independent negotiation. The master parameter
indicates master/slave negotiation, and the local end is the master. The slave
parameter indicates master/slave negotiation, and the local end is the slave.
2-72
Command Function
Configuration Description
The main function of VPLS FRR is to ensure that L2 VPN traffic can be handed over to
the standby link by establishing an active PW and a standby PW when the active link has
a fault. This ensures the reliability of L2 VPN communication. It is mainly applied to the
Spoke-PW protection between the UPEs at the user side and the NPEs at the network
side. The detection of PW ensures the fast handover of L2 VPN FRR. Meanwhile, the
MAC withdraw signalling completes the update of VPLS MACs on the entire network. A
typical VPLS FRR network topology is shown in Figure 2-15.
Configuration Flow
1. Configure IGP routes on UPE1, NPE2, NPE3 and NPE4 to make them ping each other
successfully. The router-ids are listed as follows:
2-73
Device Router-ID
UPE1 1.1.1.1
NPE2 2.2.2.2
NPE3 3.3.3.3
NPE4 4.4.4.4
2. Establish LDP neighbour relationship between the four devices (UPE1, NPE2, NPE3
and NPE4).
3. Create a VPLS instance named zte among NPE2, NPE3 and NPE4. The VCID is 100,
and the PW type is ethernet-vlan. The access mode among them is hub. Meanwhile,
CE2 connects to NPE4 as an AC.
4. Associate the VPLS FRR function. Enter VPLS instance configuration mode on
UPE1 to configure the information related to the VPLS instance zte, and configure
the addresses of the active PW and the standby PW. The link between UPE1 and
NPE2 is the active PW. The link between UPE1 and NPE3 is the standby PW. CE1
connects to UPE1 as an AC.
Configuration Command
The IGP and LDP configuration on each router are omitted.
The VPLS FRR configuration on UPE1 is as follows:
UPE1(config)#mpls l2vpn enable
UPE1(config)#pw pw1
UPE1(config)#pw pw2
UPE1(config)#vpls zte
UPE1(config-vpls-zte)#pseudo-wire pw1 spoke
UPE1(config-vpls-zte-spoke-pw-pw1)#neighbour 2.2.2.2 vcid 100
UPE1(config-vpls-zte-spoke-pw-pw1-neighbour-2.2.2.2)#exit
UPE1(config-vpls-zte-spoke-pw-pw1)#redundancy-manager
UPE1(config-vpls-zte-spoke-pw-pw1-rm)#protect-type 1:1 unidirectional
protect-strategy aps
UPE1(config-vpls-zte-spoke-pw-pw1-rm)#exit
UPE1(config-vpls-zte-spoke-pw-pw1)#exit
2-74
UPE1(config-vpls-zte)#exit
Configuration Verification
Check the result of the configuration on UPE1, as shown in the following:
UPE1#show running-config l2vpn
!<pss-l2vpn>
mpls l2vpn enable
vpls zte
access-point gei-0/3/0/9
access-params ethernet
$
$
pseudo-wire pw1 spoke
neighbour 2.2.2.2 vcid 100
control-word preferred
$
redundancy-manager
protect-type 1:1 unidirectional protect-strategy aps
$
$
backup-pw pw2 protect pw1
neighbour 3.3.3.3 vcid 100
control-word preferred
$
$
2-75
$
!</pss-l2vpn>
Configuration Description
The main function of VPWS FRR is to ensure that L2 VPN traffic can be handed over to
the standby link by establishing an active PW and a standby PW when the active link has
a fault. This ensures the reliability of L2 VPN communication. It is mainly applied to the
PW protection between PEs. The PW detection ensures the fast L2 VPN FRR handover.
A typical VPWS FRR network topology is shown in Figure 2-16.
Configuration Flow
1. Configure IGP routes on PE1, PE2, and PE3 so that the devices can ping each other
successfully. The router-ids are listed as follows:
2-76
Device Route-ID
PE1 1.1.1.1
PE2 2.2.2.2
PE3 3.3.3.3
Configuration Command
The IGP and LDP configuration on each device is omitted.
The VPWS FRR configuration on PE1 is as follows:
PE1(config)#mpls l2vpn enable
PE1(config)#pw pw1
PE1(config)#pw pw2
PE1(config)#vpws zte
PE1(config-vpws-zte)#pseudo-wire pw1
PE1(config-vpws-zte-pw-pw1)#neighbour 2.2.2.2 vcid 100
PE1(config-vpws-zte-pw-pw1-neighbour)#track 1
PE1(config-vpws-zte-pw-pw1-neighbour)#exit
PE1(config-vpws-zte-pw-pw1)#redundancy-manager
PE1(config-vpws-zte-pw-pw1-rm)#pfs-bits negotiate independent
PE1(config-vpws-zte-pw-pw1-rm)#protect-type 1:1 unidirectional protect-strategy aps
PE1(config-vpws-zte-pw-pw1-rm)#exit
PE1(config-vpws-zte-pw-pw1)#exit
PE1(config-vpws-zte)#backup-pw pw2 protect pw1
PE1(config-vpws-zte-protect-pw2)#neighbour 3.3.3.3 vcid 100
PE1(config-vpws-zte-protect-pw2-neighbour)#control-word preferred
PE1(config-vpws-zte-protect-pw2-neighbour)#signal dynamic
PE1(config-vpws-zte-protect-pw2-neighbour)#exit
PE1(config-vpws-zte-protect-pw2)#exit
PE1(config-vpws-zte)#access-point smartgroup1
PE1(config-vpws-zte-ac-smartgroup1)#access-params ethernet
PE1(config-vpws-zte-ac-smartgroup1-eth)#exit
PE1(config-vpws-zte-ac-smartgroup1)#exit
PE1(config-vpws-zte)#exit
2-77
Configuration Verification
Check the configuration result on PE1.
PE1#show running-config l2vpn
!<l2vpn>
mpls l2vpn enable
vpws zte
access-point smartgroup1
access-params ethernet
$
$
pseudo-wire pw1
neighbour 2.2.2.2 vcid 100
track 1
$
redundancy-manager
pfs-bits negotiate independent
protect-type 1:1 unidirectional protect-strategy aps
2-78
$
$
backup-pw pw2 protect pw1
neighbour 3.3.3.3 vcid 100
control-word preferred
$
$
$
!</l2vpn>
In the network application of MSPW, there are two related devices: T-PE and S-PE.
l T-PE: Terminate PE. The function is basically the same as a regular PE.
l S-PE: Switching PE. It is a key device of MSPW. It is mainly used to receive and
process the mapping messages sent by T-PE.
MAC address learning is not required in the traffic forwarding on S-PE. Instead, the
forwarding is directly implemented according to labels. Thus, the load of S-PE is
dramatically minimized.
The emergence of MSPW reduces the number of LDP sessions that need to be established
in a VPLS network, and the number of TPC connections also decreases accordingly.
2-79
In a simple traffic forwarding model, the flow of sending traffic from CE1 to CE2 is as
follows:
Upon receiving a packet from CE1, T-PE1 attaches an inner layer label and an outer layer
label to the packet. These two labels are both assigned by S-PE (If S-PE is replaced by
P, the outer layer label is assigned by P, while the inner layer label is assigned by T-PE2.)
According to the outer layer label, T-PE1 forwards the packet to S-PE. Upon receiving
the packet, S-PE swaps the inner layer label and outer layer label. That is, S-PE replaces
them respectively with the inner layer label and outer layer label assigned by T-PE2. Then,
finding that it is the penultimate hop, S-PE forwards the packet to T-PE2 according to the
outer layer label. T-PE2 then forwards the packet to CE2 according to the inner layer label.
As shown in Figure 2-18, when T-PE1 configures one VPLS instance and specifies
S-PE as its peer, the establishment flow is as follows:
2-80
2. Upon receiving the Mapping message, S-PE checks whether the corresponding
VPLS instance of MSPW has been configured locally (that is, the VCID of the peer
pointing to T-PE1 must be consistent with the VCID of VFI on T-PE1, and the VCID
of the peer pointing to T-PE2 may not be the same as the VCID of the peer pointing
to T-PE1.) If yes, S-PE forwards the Mapping message to T-PE2 (Here, S-PE
does not simply forwards the Mapping message received from T-PE1. Instead,
before forwarding the Mapping message, S-PE performs VC label swapping by
replacing the Remote VC label sent from T-PE1 with the Local VC label assigned
by T-PE2.)
3. Upon receiving the Mapping message, T-PE2 also checks whether the same
VPLS instance has been configured locally (that is, the VCID is the same as that
of S-PE pointing to T-PE2). If yes, T-PE2 negotiates all the parameters. If the
parameters are all consistent and the negotiation succeeds, PW is established
on T-PE2.
Similarly, upon receiving the Mapping message from S-PE, T-PE1 performs the same
steps as mentioned above.
l Release of MSPW
As shown in Figure 2-18, if T-PE1 does not want to forward the packets of T-PE2 any
more, for example, when the user cancels the peer role of the specified S-PE, the
release flow is as follows:
1. T-PE1 releases the VC label that was bound locally, and then sends a Withdraw
message to S-PE.
2. Upon receiving the Withdraw message, S-PE sends a label release message
(Release) to T-PE1, saying that it has already released the VC label. In addition,
S-PE sends a Withdraw message to T-PE2.
3. Upon receiving the Withdraw message from S-PE, T-PE2 returns a Release
message to S-PE.
4. After the involved devices complete sending and receiving related messages, VC
is cancelled, and PW is released.
Steps
1. Create an MSPW instance.
2-81
2-82
2-83
2-84
l tdm ts-count <1-1000>: This command can be configured when the MSPW type
is tdm, including tdm { aal1 | aal2 | satop { e1 | t1 | e3 | t3 }| cesopsn { basic | cas }|
sonet-sdh {cesom | ceop}}.
l tdm distribute-period <2-64>:This command can be configured when the MSPW
type is tdm, including tdm { aal1 | aal2 | satop { e1 | t1 | e3 | t3 } | cesopsn { basic
| cas } | sonet-sdh {cesom | ceop} }. When a PWE3 is encapsulating signaling
packets, this parameter is ignored for the aal1 and all2 types. This parameter
needs to be extracted for other tdm types, including tdm { satop { e1 | t1 | e3 | t3
} | cesopsn { basic | cas } | sonet-sdh {cesom | ceop} }.
l tdm rtp header: This command can be configured when the MSPW type is tdm.
l tdm rtp timestamp differential ssrc-id <1-4294967295>: This command can be
configured when the MSPW type is tdm. When a PWE3 is encapsulating
signaling packets, this parameter is ignored if the tdm rtp header is not configured.
l tdm rtp frequency <1-65535>: This command can be configured when the MSPW
type is tdm. When a PWE3 is encapsulating signaling packets, this parameter is
ignored if the tdm rtp header is not configured.
l tdm rtp payload-type <1-127>: This command can be configured when the MSPW
type is tdm. When a PWE3 is encapsulating signaling packets, this parameter is
ignored if the tdm rtp header is not configured.
l tdm cas-trunk { e1 | t1-esf | t1-sf }: This command can be configured when the
MSPW type is tdm. When a PWE3 is encapsulating signaling packets, this
parameter is extracted based on the specified type.
l tdm signaling-packets { non-transmitted | together-with-data | apart-from-data[just
-here|over-there]}: This command can be configured when the MSPW type is tdm.
When a PWE3 is encapsulating signaling packets, this parameter is extracted for
CES PWs of the following type: tdm {satop {e1 | t1 | e3 | t3}| cesopsn {basic | cas}}.
l tdm sonet-sdh dba-trigger-event {[ais],[une]}: This command can be configured
when the MSPW type is tdm cep, including tdm sonet-sdh {cesom | ceop}.
l tdm sonet-sdh ebm-extension: This command can be configured when the MSPW
type is tdm cep, including tdm sonet-sdh {cesom | ceop}.
l tdm sonet-sdh async-type { e3 | t3 }: This command can be configured when the
MSPW type is tdm cep, including tdm sonet-sdh {cesom | ceop}.
l tdm sonet-sdh connection-type { spe | vt | fractional-spe }: This command can be
configured when the MSPW type is tdm cep, including tdm sonet-sdh {cesom |
ceop}.
l tdm aal1 cells-per-packet <1-100>: This command can be configured when the
MSPW type is tdm all1.
l tdm aal1 mode {unstructured | structured | structured-with-cas}: This command
can be configured when the MSPW type is tdm all1.
l tdm aal2 max-duration <1-64>: This command can be configured when the MSPW
type is tdm all2.
l tdm aal2 vad-mode {signal-indicated | by-dectection | always-active}: This command
can be configured when the MSPW type istdm all2.
2-85
If any interface parameter configuration conflicts with the MSPW type, the system
displays the following error code: "This type MSPW instance does not support this
parameter! ". For a description of the MSPW types that support the parameter, refer
to CLI command descriptions.
4. (Optional) Configure PW redundancy in an MSPW instance.
2-86
Configuration Flow
1. Establish LDP session between T-PE1 and S-PE, and between T-PE2 and S-PE. For
details, refer to ZXCTN 9000-E Carrier-level Router Configuration Guide (MPLS).
2. Configure MSPW on the S-PE router and configure a normal VPLS instance on the
T-PE router.
Configuration Command
The configuration on the T-PE1 router is as follows:
T-PE1(config)#pw pw1
T-PE1(config)#vpls zte
T-PE1(config-vpls-zte)#pseudo-wire pw1
T-PE1(config-vpls-zte-pw-pw1)#neighbour 133.133.5.1 vcid 1
T-PE1(config-vpls-zte-pw-pw1-neighbour)#exit
2-87
T-PE1(config-vpls-zte)#exit
S-PE(config-mspw-zte)#pseudo-wire pw2
S-PE(config-mspw-zte-seg-pw2)#neighbour 133.133.11.1 vcid 1
S-PE(config-mspw-zte-seg-pw2-neighbour)#signal dynam
S-PE(config-mspw-zte-seg-pw2-neighbour)#exit
S-PE(config-mspw-zte-seg-pw2)#exit
Configuration Verification
On the S-PE router, execute the show pwe3 signal fec128 detail command to check the
information related to PWE3.
S-PE#show pwe3 signal fec128 detail
The detailed signal information of dynamic PWs or PW-segments:
2-88
On the S-PE, execute the show l2vpn forwardinfo vpnname command to check whether
PW is established successfully. Use the detail option to check the detailed information,
such as the internal label of the PW.
2-89
2-90
PE2 and ASBR2 are in the same AS. ASBR2 uses the IGP protocol to obtain the routing
information of PE2. Through the LDP protocol, ASBR2 and PE2 establish an LSP tunnel.
ASBR1 and PE2 are not in the same AS, and ASBR1 has no routing information of PE2.
In that case, the routing information of PE2 can be transferred to ASBR1 through the
EBGP protocol. In addition, the BGP protocol can be extended in such a way that BGP
2-91
can assign labels (such as IPv4-Label as shown in the above figure) while transferring
routing information. Hence, an LSP is established between ASBR1 and ASBR2, and label
swapping is performed on ASBR2.
Similarly, between ASBR1 and PE1, the routing information of PE2 is also transferred
through extended IBGP, labels are assigned, and label swapping is performed on ASBR1.
However, the establishment of the LSP is different from that of the LSP between two
ASBRs. Two ASBRs are directly connected, and the next hop is directly reachable. PE1
and ASBR1 are not directly connected, but an LSP tunnel can be established between
them through LDP, as they are in the same AS.
Thus, the LSP tunnel between PE1 and ASBR1 finally has three layers of labels: the
bottom-layer VPN label (assigned by PE2), the middle-layer to-PE2 label (assigned
by ASBR1 through extended BGP), and the outer-layer to-ASBR1 label (assigned by
LDP). Between ASBRs, a double-layer LSP tunnel is established with two labels: the
bottom-layer VPN label (assigned by PE2) and the outer-layer to-PE2 label (assigned by
ASBR2 through extended BGP). Between ASBR2 and PE2, a double-layer LSP tunnel
is established with two labels: the inner-layer VPN label (assigned by PE2) and the
outer-layer to-PE2 label (assigned by LDP). These three tunnels are bonded together by
label swapping on ASBRs to form an end-to-end LSP tunnel.
Steps
1. Configure VPLS Crossing Several ASs (Option C).
For details about the VPLS configuration crossing several ASs (option C), refer to the
Configuring VPLS.
2. Verify the configurations.
For details about the VPLS maintenance crossing several ASs (Option C), refer to
section Configuring VPLS.
End of Steps
2-92
Configuration Flow
1. Build the network according to Figure 2-21. Configure the following interface
addresses:
left interface of PE1: gei-0/2/0/1, right interface of PE1: gei-0/1/0/1 100.1.12.1/24;
left interface of ASBR1: gei-0/1/0/2 100.1.12.2/24, right interface of ASBR1:
gei-0/1/0/3 100.1.23.2/24;
left interface of ASBR2: gei-0/1/0/4 100.1.23.3/24, right interface of ASBR2:
gei-0/1/0/5 100.1.34.3/24;
left interface of PE2: gei-0/1/0/6 100.1.34.4/24, right interface of PE2: ei-0/2/0/2;
CE1: gei-0/2/0/1 191.1.1.1/24, CE3: gei-0/2/0/2 191.1.1.2/24.
2. Configure a loopback interface for each router. From left to right, the loopback
addresses are: 100.1.5.1/32, 100.1.5.2/32, 100.1.5.3/32, and 100.1.5.4/32.
3. PE1 and PE2 are in the same VPN. PE1 and ASBR1 are in AS100. PE2 and ASBR2
are in AS200.
4. Establish an IBGP neighbor between PE and ASBR, and configure the send-lable
capability for each other. Establish an IGP+LDP label distribution tunnel between PE
and ASBR.
5. Establish a normal EBGP neighbor between ASBRs by using a directly-connected
interface, and use network to notify each other of the loopback address of the
corresponding PE. Under BGP, configure the send-lable capability for reaching the
neighbor, and configure route-map by setting set mpls lable and prefix-matching route
filtering. Establish ldp target-session between PE1 and PE2.
6. Configure a vpls zte instance respectively on PE1 and PE2.
7. Ping CE3 from CE1.
Configuration Command
The configuration on PE1 is as follows:
PE1(config)#router ospf 10
PE1(config-ospf-10)#router-id 100.1.5.1
2-93
ASBR1(config)#ipv4-access-list zte
ASBR1(config-ipv4-acl)#rule 1 permit 100.1.5.1 0.0.0.0
ASBR1(config-ipv4-acl)#exit
ASBR1(config)#route-map zte
2-94
ASBR1(config)#router bgp100
ASBR1(config-bgp)#no synchronization
ASBR1(config-bgp)#neighbor 100.1.23.3 remote-as 200
ASBR1(config-bgp)#neighbor 100.1.23.3 route-map zte out
ASBR1(config-bgp)#neighbor 100.1.23.3 send-label
ASBR1(config-bgp)#neighbor 100.1.5.1 remote-as 100
ASBR1(config-bgp)#neighbor 100.1.5.1 update-source loopback10
ASBR1(config-bgp)#neighbor 100.1.5.1 next-hop-self
ASBR1(config-bgp)#neighbor 100.1.5.1 send-label
ASBR1(config-bgp)#network 100.1.5.1 255.255.255.255
ASBR1(config-bgp)#exit
ASBR2(config)#router ospf 10
ASBR2(config-ospf-10)#router-id 100.1.5.3
ASBR2(config-ospf-10)#network 100.1.0.0 0.0.255.255 area 0
ASBR2(config-ospf-10)#exit
ASBR2(config)#ipv4-access-list zte
ASBR2(config-ipv4-acl)#rule 1 permit 100.1.5.4 0.0.0.0
ASBR2(config-ipv4-acl)#exit
ASBR2(config)#route-map zte
ASBR2(config-route-map)#match ip address zte
ASBR2(config-route-map)#set mpls-label
ASBR2(config-route-map)#exit
2-95
Configuration Verification
On PE1 or PE2, run the show l2vpn forwardinfo vpnname command to check whether the
PW is established successfully. In the "details" option, you can see the detailed information
about the PW, such as inner-layer and outer-layer labels.
2-96
2-97
Steps
1. Configure VLSS.
ethernet | fr | hdlc | ppp | tdm: Encapsulation types of the AC interface in the VLSS
instance.
2. Verify the configurations.
Command Function
End of Steps
Configuration Flow
1. Enable L2VPN.
2. Create a VLSS instance and bind the local connections.
Configuration Commands
Run the following commands to configure the VLSS on the ZXCTN 9000-E:
ZXCTN(config)#mpls l2vpn enable
ZXCTN(config)#vlss zte
ZXCTN(config-vlss-zte)#description l2vpn-zte
ZXCTN(config-vlss-zte)#access-point gei-0/1/0/3
ZXCTN(config-vlss-zte-ac-gei-0/1/0/3)#access-params ethernet
2-99
ZXCTN(config-vlss-zte-ac-gei-0/1/0/3-eth)#exit
ZXCTN(config-vlss-zte-ac-gei-0/1/0/3)#exit
ZXCTN(config-vlss-zte)#access-point gei-0/1/0/4
ZXCTN(config-vlss-zte-ac-gei-0/1/0/4)#access-params ethernet
ZXCTN(config-vlss-zte-ac-gei-gei-0/1/0/4-eth)#exit
ZXCTN(config-vlss-zte-ac-gei-gei-0/1/0/4)#exit
Configuration Verification
Run the show command to check the VLSS instance configuration.
ZXCTN(config)#show l2vpn brief
VPLS count:0 VPWS count:0 VLSS count:1 MSPW count:0 MONITOR count:0
name type Default-VCID PW AC description
zte VLSS - 0 2 l2vpn-zte
Attachment Circuit(AC):
InterfaceName Client/Server
gei-0/1/0/3 -
gei-0/1/0/4 -
2-100
MSP Protection
Multiplex Section Protection (MSP) is a dedicated or shared protection mechanism. MSP
provides protections for the multiplex section layer, and is applicable for point-to-point
physical network. It implements the protection for the service channel, and used for the
STM-N port network or connection with the client device (such as BSC/RNC).
MSP includes two protection types: 1+1 and 1:1. The UNI side should support the 1+1
and 1:1 MSP protections
As shown in Figure 2-22, PW1 is created between P1 to P2, and PW2 is created between
P1 and P3. The two PWs are related through the PW redundancy group created on P1.
PW1 is the working path, and PW2 is the protection path.
The MSP is run on the UNI side. LINK1 is the working link, and LINK2 is the protection link.
When the SDH OAM detects that the link has faults, it notifies to the MSP. The MSP selects
LINK1 or LINK2 as the new working link, and reports the result to the PW redundancy
group on P1 through the PW OAM. Then, the redundancy group selects the PW same as
that on the UNI side as the new working path.
MC-APS Protection
Multi-Chassis Automatic Protection Switching (MC-APS) is the extension of the MSP
protection.
2-101
The current MSP is run on the same rack, and the head and tail nodes of the working and
protection links are on the same device. In this case, the MSP status machines of both
ends are run on the same device.
If the head and tail nodes of the working and protection links are on different devices,
the information obtained from the single device is not complete. The status machine
calculation must be performed with information on the other device. Therefore, the MSP
should be extended to make it receive information of other devices and synchronize the
information with other devices to implement the MC-APS protection.
As shown in Figure 2-22, the MSP information should be synchronized between P2 and
P3 reliably and in order, which requires to be guaranteed by a set of mechanisms. IEFT
releases ICCP based on LDP, which guarantees that reliable information transmission
between racks through the channels created between devices.
ICCP provides a series of management mechanisms, which requires to put the devices
whose information needs to be synchronized to a Redundancy Group (RG). The
information transmitted between devices are encapsulated into the messages in the TLV
format. Then, the information is sent to the peer through channels. The ICCP messages
must be born through the extended LDP TLV field, which means that the LDP must be
deployed on PE nodes of both ends.
Steps
1. Configure a port protection group.
2-102
force-switch: Compulsively selects proper traffic signals from the backup transport
entity when the backup transport entity has no fault.
manual-switch: Compulsively selects proper traffic signals from the backup transport
entity when the operating transport or backup transport entity has no fault.
manual-switch-work: Compulsively selects proper traffic signals from the operating
transport entity when the operating transport or backup transport entity has no fault.
2-103
Command Function
Configuration Flow
1. Configure the port protection groups.
2. Configure APS parameters.
Configuration Command
The configuration for PE1 as follows. The configuration for PE2 is the same as that for
PE1.
PE1(config)#port-group 1
PE1(config-port-group-1)#group-type msp
PE1(config-port-group-1)#protect-type 1+1 bidirectional receiving selective
PE1(config-port-group-1)#working-port cpos3-1/3/0/1
PE1(config-port-group-1)#protect-port cpos3-0/2/2/1
PE1(config-port-group-1)#protect-strategy aps
PE1(config-port-group-1)#exit
PE1(config)#aps
PE1(config-aps)#linear-protect
PE1(config-aps-linear-protect)#port-group 1
PE1(config-aps-linear-protect-portgroup1)#revertive-mode revertive wtr 5
Configuration Verification
View the port protection group on PE1.
ZXCTN#show aps linear-protect port-group 1
2-104
PE1 is connected to PE2 through PW1 (the active PW), and PE1 is connected to PE3
through PW2 (the standby PW). CE1 is connected to PE2 and PE3 in dual-homed mode.
l If AC1 fails, CE1 performs access switchover, and traffic is rerouted to AC2. PE1 is
notified of the failure through mapping. PE1 switches the PW and drects traffic to
PW2.
2-105
l If PW1 fails, PE1 switches the PW after detecting the failure, and directs traffic to
PW2. PE1 notifies the AC side of the failure through mapping, so that CE1 performs
access switchover, and traffic is rerouted to AC2.
If an AC or a PW fails, traffic is rerouted at both the PW side and AC side.
To perform switchover without the OAM mapping function, and to separate the switchover
at the PW side from the switchover at the AC side so that network stability can be improved,
the Dual Node Interconnection-Pseudo Wire (DNI-PW) function must be used. Figure 2-25
shows a DNI-PW network topology.
The VPWS supports DNI-PW redundancy protection. Different from common VPWS
instances, each VPWS instance on PE2 and PE3 includes three PWs. One (PW1 or
PW2) is a common PW, and the other two PWs (PW3 and PW4) are DNI-PWs. The
two DNI-PWs are configured and used on both PE2 and PE3. One NDI-PW is used for
PW protection and remote uplink traffic bridging, and the other DNI-PW is used for AC
traffic protection and remote downlink traffic bridging. The DNI-PWs (PW3 and PW4) are
deployed for outer protection, and all DNI-PWs between PE2 and PE3 are deployed in
the same outer protection range.
2-106
PE3) and CE1. CE1 performs load sharing through SmargGroup. The dual-homed
nodes use 1:1 single-transmit, dual-receive mode. The blue arrows indicate uplink
traffic, and the red arrows indicate downlink traffic.
1. When all links are operating properly, the operational procedure is as shown in
Figure 2-26.
2-107
3. If PW1 fails, and if PW2 also fails during PW1 recovery or the WTR, the operational
procedure is as shown in Figure 2-28.
2-108
4. If PW2 fails, and if PW1 also fails during PW2 recovery or the WTR, the operational
procedure is as shown in Figure 2-29.
6. If AC1 and PW1 fail, the operational procedure is as shown in Figure 2-31.
2-109
7. If the PE2 node fails, the operational procedure is as shown in Figure 2-32.
2-110
the AC side, MC-LAG/MSP 1:1 mode is used between the dual-homed nodes (PE2
and PE3) and CE1. CE1 uses single-transmit, dual-receive mode or single-transmit,
single-receive mode. The dual-homed nodes use single-transmit, dual-receive mode.
The blue arrows indicate uplink traffic, and the red arrows indicate downlink traffic.
1. When all links are operating properly, the operational procedure is as shown in
Figure 2-33.
2-111
4. If AC1 and PW1 fail, the operational procedure is as shown in Figure 2-36 and
Figure 2-37.
2-112
Figure 2-36 DNI-PW Operating StateAC1 and PW1 Fail (Transient State)
Figure 2-37 DNI-PW Operating StateAC1 and PW1 Fail (Steady State)
5. If the PE2 node fails, the operational procedure is as shown in Figure 2-38.
2-113
Steps
l Configure an inter-chassis coworker PW protection group.
1. Configure an inter-chassis coworker PW protection group in independent mode.
2-114
2-115
Command Function
2-116
Command Function
End of Steps
2-117
Configuration Flow
1. Configure an ICCP protection group on PE2 and PE3.
2. Configure DNI-PW in 1:1 mode on PE2 and PE3.
3. Configure active/standby MC-LAG on PE2 and PE3.
The LDP neighbor configuration, route configuration and PW FRR configuration for
the header node are omitted.
Configuration Commands
Run the following commands on PE2:
PE2(config)#redundancy interchassis group 1
PE2(config-rg-1)#apply mc-pw
PE2(config-rg-1)#apply mlacp
PE2(config-rg-1)#peer 52.52.52.52
PE2(config-rg-1)#exit
2-118
PE2(config)#interface smartgroup1.1
PE2(config-if-smartgroup1.1)#exit
PE2(config)#vlan-configuration
PE2(config-vlan)#interface smartgroup1.1
PE2(config-vlan-if-smartgroup1.1)#encapsulation-dot1q 1
PE2(config-vlan-if-smartgroup1.1)#exit
PE2(config-vlan)#exit
PE2(config)#vpws zlj10001
PE2(config-vpws-zlj10001)#access-point smartgroup1.1
PE2(config-vpws-zlj10001-ac-smartgroup1.1)#access-params ethernet
PE2(config-vpws-zlj10001-ac-smartgroup1.1-eth)#exit
PE2(config-vpws-zlj10001-ac-smartgroup1.1)#traffic-behavior
PE2(config-vpws-zlj10001-ac-smartgroup1.1-behavior)#ce-side 1:1
PE2(config-vpws-zlj10001-ac-smartgroup1.1-behavior)#exit
PE2(config-vpws-zlj10001-ac-smartgroup1.1)#exit
PE2(config-vpws-zlj10001)#pseudo-wire pw10001
PE2(config-vpws-zlj10001-pw-pw10001)#neighbour 66.66.66.66 vcid 10001
PE2(config-vpws-zlj10001-pw-pw10001-neighbour)#exit
PE2(config-vpws-zlj10001-pw-pw10001)#redundancy-manager mc-master
PE2(config-vpws-zlj10001-pw-pw10001-rm)#mc-protect-type coworker-proxy
PE2(config-vpws-zlj10001-pw-pw10001-rm)#mc-protect-type mc-selection
PE2(config-vpws-zlj10001-pw-pw10001-rm)#communicate-unit iccp 1 roid 10001
PE2(config-vpws-zlj10001-pw-pw10001-rm)#exit
PE2(config-vpws-zlj10001-pw-pw10001)#exit
PE2(config-vpws-zlj10001)#coworker-proxy-pw pw40001 as-remote-ac protect smartgroup1.1
PE2(config-vpws-zlj10001-protect-pw40001)#neighbour 52.52.52.52 vcid 40001
PE2(config-vpws-zlj10001-protect-pw40001-neighbour)#exit
PE2(config-vpws-zlj10001-protect-pw40001)#exit
PE2(config-vpws-zlj10001)#coworker-proxy-pw pw30001 as-remote-pw protect pw10001
PE2(config-vpws-zlj10001-protect-pw30001)#neighbour 52.52.52.52 vcid 30001
PE2(config-vpws-zlj10001-protect-pw30001-neighbour)#exit
PE2(config-vpws-zlj10001-protect-pw30001)#exit
PE2(config-vpws-zlj10001)#exit
PE2(config)#lacp
PE2(config-lacp)#interface smartgroup1
PE2(config-lacp-sg-if-smartgroup1)#lacp mode 802.3ad
PE2(config-lacp-sg-if-smartgroup1)#lacp fast respond
PE2(config-lacp-sg-if-smartgroup1)#mc-lag iccp 1
PE2(config-lacp-sg-if-smartgroup1)#mc-lag priority 100
PE2(config-lacp-sg-if-smartgroup1)#mc-lag roid 1 node-id 1
PE2(config-lacp-sg-if-smartgroup1)#mc-lag sys-id 0000.5152.0000 sys-priority 1
PE2(config-lacp-sg-if-smartgroup1)#exit
2-119
PE2(config-lacp)#interface xgei-0/2/0/1
PE2(config-lacp-member-if-xgei-0/2/0/1)#smartgroup 1 mode active
PE2(config-lacp-member-if-xgei-0/2/0/1)#exit
PE2(config-lacp)#exit
PE2(config)#interface xgei-0/2/0/1
PE2(config-if-xgei-0/2/0/1)#holdtime 300
PE3(config)#interface smartgroup1.1
PE3(config-if-smartgroup1.1)#exit
PE3(config)#vlan-configuration
PE3(config-vlan)#interface smartgroup1.1
PE3(config-vlan-if-smartgroup1.1)#encapsulation-dot1q 1
PE3(config-vlan-if-smartgroup1.1)#exit
PE3(config-vlan)#exit
PE3(config)#vpws zlj10001
PE3(config-vpws-zlj10001)#access-point smartgroup1.1
PE3(config-vpws-zlj10001-ac-smartgroup1.1)#access-params ethernet
PE3(config-vpws-zlj10001-ac-smartgroup1.1-eth)#exit
PE3(config-vpws-zlj10001-ac-smartgroup1.1)#traffic-behavior
PE3(config-vpws-zlj10001-ac-smartgroup1.1-behavior)#ce-side 1:1
PE3(config-vpws-zlj10001-ac-smartgroup1.1-behavior)#exit
PE3(config-vpws-zlj10001-ac-smartgroup1.1)#exit
PE3(config-vpws-zlj10001)#pseudo-wire pw20001
PE3(config-vpws-zlj10001-pw-pw20001)#neighbour 66.66.66.66 vcid 20001
PE3(config-vpws-zlj10001-pw-pw20001-neighbour)#exit
PE3(config-vpws-zlj10001-pw-pw20001)#redundancy-manager mc-slave
PE3(config-vpws-zlj10001-pw-pw20001-rm)#mc-protect-type coworker-proxy
PE3(config-vpws-zlj10001-pw-pw20001-rm)#mc-protect-type mc-selection
PE3(config-vpws-zlj10001-pw-pw20001-rm)#communicate-unit iccp 1 roid 10001
PE3(config-vpws-zlj10001-pw-pw20001-rm)#exit
PE3(config-vpws-zlj10001-pw-pw20001)#exit
PE3(config-vpws-zlj10001)#coworker-proxy-pw pw30001 as-remote-ac protect smartgroup1.1
PE3(config-vpws-zlj10001-protect-pw30001)#neighbour 51.51.51.51 vcid 30001
PE3(config-vpws-zlj10001-protect-pw30001-neighbour)#exit
PE3(config-vpws-zlj10001-protect-pw30001)#exit
PE3(config-vpws-zlj10001)#coworker-proxy-pw pw40001 as-remote-pw protect pw20001
2-120
PE3(config)#lacp
PE3(config-lacp)#interface smartgroup1
PE3(config-lacp-sg-if-smartgroup1)#lacp mode 802.3ad
PE3(config-lacp-sg-if-smartgroup1)#lacp fast respond
PE3(config-lacp-sg-if-smartgroup1)#mc-lag iccp 1
PE3(config-lacp-sg-if-smartgroup1)#mc-lag priority 200
PE3(config-lacp-sg-if-smartgroup1)#mc-lag roid 1 node-id 2
PE3(config-lacp-sg-if-smartgroup1)#mc-lag sys-id 0000.5152.0000 sys-priority 1
PE3(config-lacp-sg-if-smartgroup1)#exit
PE3(config-lacp)#interface xgei-0/3/0/1
PE3(config-lacp-member-if-xgei-0/3/0/1)#smartgroup 1 mode active
PE3(config-lacp-member-if-xgei-0/3/0/1)#exit
Configuration Verification
View the DNI-PW state on PE2.
PE2(config)#show aps linear-protect pw-protector pw10001
----------[APS Linear Instance]----------
Protection group type: pw
Protection group id: 253
Protection group name: pw10001
Protection type: 1:1 unidirectional receiving both
APS is enabled
APS state: NO_REQUEST_NULL
Protection mode: remote
Active-state: restore-run
Revertive mode: revertive, WTR time: 5min
Hold-off time: 0ms,valid hold-off time: 0ms
Switch command: nul
PE2(config)#show aps linear-protect pw-protector smartgroup1.1
----------[APS Linear Instance]----------
Protection group type: pw
Protection group id: 252
Protection group name: smartgroup1.1
Protection type: 1:1 unidirectional receiving both
APS is enabled
APS state: NO_REQUEST_NULL
Protection mode: remote
Active-state: restore-run
2-121
2-122
2-123
Steps
1. Configure a PW list.
l Method 1: Configure a PW entity in the L2VPN service, and then configure a PW
list.
2-124
2-125
Command Function
End of Steps
2-126
Configuration Flow
1. Configure FRR for multiple PWs on PE1. (The configuration is omitted.)
2. Set one of the PWs to the master PW in the PW list, and set other PWs to slave PWs.
3. Enable BFD for the master PW in the PW list.
Configuration Commands
Run the following commands on PE1:
PE1(config)#pw-list 1
PE1(config-pw-list-1)#master pw pw1
PE1(config-pw-list-1)#slave pw pw2
PE1(config-pw-list-1)#slave pw pw3
PE1(config-pw-list-1)#slave pw pw4
PE1(config-pw-list-1)#slave pw pw5
PE1(config-pw-list-1)#slave pw pw6
PE1(config-pw-list-1)#slave pw pw7
PE1(config-pw-list-1)#slave pw pw8
PE1(config-pw-list-1)#slave pw pw9
PE1(config-pw-list-1)#slave pw pw10
PE1(config-pw-list-1)#slave pw pw11
PE1(config-pw-list-1)#exit
PE1(config)#bfd
PE1(config-bfd)#session 1 pw-bfd pw-name pw1
PE1(config-bfd-pw-1)#time-negotiation interval 10 min-rx 10 multiplier 3
2-127
PE2(config)#bfd
PE2(config-bfd)#session 1 pw-bfd pw-name pw1
PE2(config-bfd-pw-1)#time-negotiation interval 10 min-rx 10 multiplier 3
Configuration Verification
View the state of the PW list on PE1.
PE1(config)#show pw-list 1
pw-list: 1 status: UP
Master PW: pw1
When BFD detects a down event, BFD triggers the master PW (pw1) to be down, and then
all slave PWs in the PW list are triggered. View the PW BFD state on PE1 and PE2.
PE1(config)#show bfd neighbors pw brief
Pwname LD RD Hold State
pw1 2051 0 0 DOWN
2-128
Steps
l Configure an independent PW.
2-129
2-130
2-131
< 8-20000000 >, < 1-5120000 >: range of the parameters related to the rate limit.
3. Verify the configurations.
Command Function
4 ZXCTN(config-pw-pw-number-neighbour)#exit Configures a PW
ZXCTN(config-pw)#redundancy-manager redundancy group.
pw<1-115968>{mc-master|mc-slave} To configure a common
PW protection group, the
mc-master and mc-slave
parameters do not need to
be set.
2-132
Command Function
End of Steps
Steps
1. Enables the PWE3 event debugging function.
Command Function
ZXCTN#debug pwe3 event [{fec128 peer <ip-address> Enables PWE3 event debugging
vcid <vcid> pw-type {ethernet {raw|tagged}|ip|ppp|hdlc|fr function and monitors the AC
{port|dlci|dlci-old}|tdm {aal1|aal2|satop {e1|t1|e3|t3}|cesopsn state and session state.
{basic|cas}|sonet-sdh {cesom|ceop}}|atm {port|vpc|vcc|vcc-gr
oup|vpc-group|sdu|pdu}}|fec129 peer <ip-address> vpls-id
{<0-65535>:<0-4294967295>|A.B.C.D:<0-65535>} pw-type
ethernet {raw|tagged}}]
Parameter descriptions:
Parameter Description
<vcid> ID of a PW.
2-133
Parameter Description
2-134
Parameter Description
Command Function
Parameter descriptions:
Parameter Description
<vcid> ID of a PW.
2-135
Parameter Description
Command Function
End of Steps
2-136
MPLS VPN can utilize the powerful transmission capability of a public backbone network
to reduce the construction costs of the Intranet, and greatly improve the operation and
management flexibility of user networks. Meanwhile, it meets the user requirements for
data transmission security, real time and broad band, convenience.
l Reduce cost
3-1
MPLS simplifies the integration technology of ATM and IP. It efficiently combines the
L2 and L3 technologies. Therefore, the cost is reduced and the investment is saved
at earlier stages.
l Improve resource utilization rate
Since label switching is used in network, the IP addresses used by users in their LAN
can be repeated. In this way, IP resource utilization rate is improved.
l Improve network speed
Since label switching is used, the time for address search in each hop process is
shortened. In this way, the time of data transmission time is reduced in network, and
the network speed is improved.
l Improve flexibility and expansibility
Since MPLS uses AnyToAny connection, the network flexibility and expansibility are
improved. With respect to the flexibility, special control policy can be customized to
meet special requirements of different users to realize value-added services. The
expansibility covers the following two points:
On one hand, more VPNs are contained by a network. On the other hand, easy user
expansion in the same VPN.
l Convenience
MPLS is widely used in operator networks. It bring more convenience to enterprise
users establish global VPN.
l Improve transmission security
MPLS serves as a channel mechanism to implement transparent packet transmission.
MPLS Link State Packets (LSP)s have high reliability and security, similar to frame
relay and ATM Virtual Channel Connection (VCC).
l Enhance service integration capability
A network can support the services integrating data, audio and video.
l MPLS QoS guarantee
The related standards and drafts drawn by Internet Engineering Task Force (IETF) for
Border Gateway Protocol (BGP)/MPLS VPN are provided in the RFC.
3-2
The new address is a part of VPN-IPv4 address family, and it also is a BGP address family
of the MP-BGP protocol. In a VPN-IPv4 address, there is a value used to differentiate
different VPNs, called Route Distinguisher (RD).
The format of a VPN-IPv4 address is an eight-byte RD plus a four-byte IP address. RD is
the eight-byte value used for VPN differentiation. An RD consists of the following fields:
l Type field (two bytes): It determines the length of the other fields.
If the value of the type field is 0, Administrator (ADM) field covers two bytes and
the Assignment Number (AN) domain covers four bytes.
If the value of the type field is 1, ADM field covers four bytes and the Assignment
Number (AN) field covers two bytes.
If the value of the type field is 2, ADM field covers four bytes and the Assignment
Number (AN) field covers two bytes.
The RD is only used between PEs and CEs to differentiate IPv4 addresses of different
VPNs. The ingress generates an RD and converts the received IPv4 route of the CE into
a VPN-IPv4 address. Before advertising the route to the CE, the egress PE converts the
VPN-IPv4 route into an IPv4 route.
3-3
3-4
read the inner label, find the next-hop CE in the corresponding VPN routing table and
send the packet to the related interface, and then transmit the packet to the CE network
of the VPN.
Context
A VRF table is created for each VPN on a PE. VRF only saves the route information related
to this VPN. VPN is independent, which has its own interface, routing and label tables,
route protocol and so on.
Steps
1. Create a VPN instance.
Command Function
3-5
Command Function
End of Steps
Context
In order to run static route protocol between a CE and a PE, a static route pointing to a CE
needs to be configured on a PE, and the static route needs to be distributed to BGP.
Steps
1. Configure a static route pointing to CE on PE.
3-6
Command Function
2. Redistribute the static route in BGP VRF address family configuration mode.
Command Function
ZXCTN#show ip protocol routing vrf <vrf-name>[ migp]{[n Indicates VRF protocol routing table.
etwork <ipv4-address>|[mask <ipv4-address-mask>]]|[
all]|[<protocol>]}
End of Steps
Example
As shown in Figure 3-1, static routes are established between CE1 and PE1.
3-7
Configure addresses in the same segment on the direct-connected interfaces of CE1 and
PE1. Configure a static route on PE1.
Configuration on CE1:
CE1(config)#interface gei-0/1/0/1
CE1(config-if-gei-0/1/0/1)#ip address 10.1.0.1 255.255.255.252
CE1(config-if-gei-0/1/0/1)#exit
CE1(config)#interface gei-0/1/0/2
CE1(config-if-gei-0/1/0/2)#ip address 10.1.1.254 255.255.255.0
CE1(config-if-gei-0/1/0/2)#exit
CE1(config)#ip route 10.2.0.0 255.255.0.0 10.1.0.2
Configuration on PE1:
PE1(config)#ip route vrf vpn_a 10.1.0.0 255.255.0.0 10.1.0.1
PE1(config)#router bgp 100
PE1(config-bgp)#address-family ipv4 vrf vpn_a
PE1(config-bgp-af-ipv4-vrf)#redistribute static
PE1(config-bgp-af-ipv4-vrf)#end
Steps
1. Enable RIP.
3-8
3. Redistribute the RIP route in BGP VRF address family configuration mode.
2 ZXCTN(config)#address-family ipv4 vrf < vrf- name> This enters VRF address
family configuration mode.
Command Function
ZXCTN#show ip protocol routing vrf <vrf-name>[ migp]{[n Indicates VRF protocol routing table.
etwork <ipv4-address>|[mask <ipv4-address-mask>]]|[
all]|[<protocol>]}
End of Steps
3-9
Example
As shown in Figure 3-2, RIP runs between CE1 and PE1.
Run RIP protocol on CE1 and PE1 respectively. Distribute routing information to each
other in rip vrf and bgp vrfon PE1.
Configuration on CE1:
CE1(config)#router rip
CE1(config)#no auto-summary
CE1(config-rip)#version 2
CE1(config-rip)#network 10.1.0.0 0.0.0.3
CE1(config-rip)#redistribute connected
CE1(config-rip)#exit
Configuration on PE1:
PE1(config)#router rip
PE1(config-rip)#version 2
PE1(config-rip)#address-family ipv4 vrf vpn_a
PE1(config-rip-af)#no auto-summary
PE1(config-rip-af)#version 2
PE1(config-rip-af)#network 10.1.0.0 0.0.0.3
PE1(config-rip-af)#redistribute bgp-int
PE1(config-rip-af)#exit
PE1(config-rip)#exit
3-10
PE1(config-bgp-af-ipv4-vrf)#redistribute rip
PE1(config-bgp-af-ipv4-vrf)#redistribute connected
PE1(config-bgp-af-ipv4-vrf)#exit
Steps
1. Enable and configure the OSPF protocol.
1 ZXCTN(config)#router ospf < process-id>[ vrf < Enable and enters the OSPF vrf
vrf-name>] configuration mode.
2. Redistribute the OSPF route in BGP VRF address family configuration mode.
Command Function
ZXCTN#show ip protocol routing vrf <vrf-name>[ migp]{[n Indicates VRF protocol routing table.
etwork <ipv4-address>|[mask <ipv4-address-mask>]]|[
all]|[<protocol>]}
End of Steps
3-11
Example
As shown in Figure 3-3, enable the OSPF protocol on both CE1 and PE1, and distribute
the routing information mutually.
Configuration on CE1:
CE1(config)#router ospf 1
CE1(config-ospf-1)#network 10.1.0.0 0.0.0.3 area 0.0.0.0
CE1(config-ospf-1)#network 10.1.1.0 0.0.0.255 area 0.0.0.0
CE1(config-ospf-1)#exit
Configuration on PE1:
3-12
Steps
1. Enable and configure IS-IS.
1 ZXCTN(config)#router isis< process-id>[ vrf < vrf-name>] Enables IS-IS and enters IS-IS
VRF configuration mode.
Command Function
ZXCTN#show ip protocol routing vrf <vrf-name>[network Shows the VRF protocol routing
<ip-address>[mask <net-mask>]] table.
End of Steps
Example
As shown in Figure 3-4, IS-IS is enabled on CE1 and PE1. CE1 and PE2 distribute routes
to each other.
3-13
Configuration on CE1:
CE1(config)#router isis 1
CE1(config-isis-1)#area 01
CE1(config-isis-1)#system-id 0121.4567.8956
CE1(config-isis-1)#exit
CE1(config)#interface gei-0/1/0/1
CE1(config-if-gei-0/1/0/1)#no shutdown
CE1(config-if-gei-0/1/0/1)#ip address 10.1.0.1/30
CE1(config-if-gei-0/1/0/1)#exit
CE1(config)#router isis 1
CE1(config-isis-1)#interface gei-0/1/0/1
CE1(config-isis-1-if-gei-0/1/0/1)ip router isis
CE1(config-isis-1-if-gei-0/1/0/1)#end
Configuration on PE1:
PE1(config)#router isis 2 vrf vpn_a
PE1(config-isis-2)#area 02
PE1(config-isis-2)#system-id0181.4857.8969
PE1(config-isis-2)#redistribute bgp
PE1(config-isis-2)#exit
PE1(config)#interface gei-0/1/0/1
PE1(config-if-gei-0/1/0/1)#no shutdown
PE1(config-if-gei-0/1/0/1)#ip address 10.1.0.2/30
PE1(config-if-gei-0/1/0/1)#exit
PE1(config)#router isis 2
PE1(config-isis-2)#interface gei-0/1/0/1
3-14
Steps
1. Configure EBGP between a CE and a PE.
Command Function
ZXCTN#show ip protocol routing vrf <vrf-name>[ migp]{[n Indicates VRF protocol routing table.
etwork <ipv4-address>|[mask <ipv4-address-mask>]]|[
all]|[<protocol>]}
ZXCTN#show ip forwarding route vrf <vrf-name>{[{<Network Indicates the VRF forwarding table.
to display informatio>}[<Network mask>{weak-match|exact-
match}]]|[<Protocol name>]}
End of Steps
3-15
Example
As shown in Figure 3-5, EBGP runs between CE1 and PE1.
Configure BGP on CE1 and PE1 respectively. Make sure that CE1 and PE1 can distribute
routes to each other.
Configuration on CE1:
CE1(config)#router bgp 65001
CE1(config-bgp)#neighbor 10.1.0.2 remote-as 100
CE1(config-bgp)#neighbor 10.1.0.2 activate
CE1(config-bgp)#redistribute connected
CE1(config-bgp)#exit
Configuration on PE1:
PE1(config)#router bgp 100
PE1(config-bgp)#address-family ipv4 vrf vpn_a
PE1(config-bgp-af-ipv4-vrf)#neighbor 10.1.0.1 remote-as 65001
PE1(config-bgp-af-ipv4-vrf)#neighbor 10.1.0.1 activate
PE1(config-bgp-af-ipv4-vrf)#redistribute connected
PE1(config-bgp-af-ipv4-vrf)#end
Steps
1. Configure BGP neighbor.
3-16
Command Function
ZXCTN#show ip protocol routing vrf <vrf-name>[ migp]{[n Indicates VRF protocol routing table.
etwork <ipv4-address>|[mask <ipv4-address-mask>]]|[
all]|[<protocol>]
ZXCTN#show ip forwarding route vrf <vrf-name>{[{<Network Indicates the VRF forwarding table.
to display informatio>}[<Network mask>{weak-match|exact-
match}]]|[<Protocol name>]}
End of Steps
Example
As shown in Figure 3-6, MPBGP runs between PE1 and PE2.
3-17
Note:
Before perform the following configurations, make sure that PE1 and PE2 can ping each
other by using their loopback addresses.
Configuration on PE1:
PE1(config)#router bgp 100
PE1(config-bgp)#neighbor 1.1.1.3 remote-as 100
PE1(config-bgp)#neighbor 1.1.1.3 update-source loopback1
PE1(config-bgp)#address-family vpnv4
PE1(config-bgp-af-vpnv4)#neighbor 1.1.1.3 activate
PE1(config-bgp-af-vpnv4)#end
Configuration on PE2:
Configuring AS Override
When BGP runs between PE and CE, users want to reuse AS number in different sites. To
provide the connective between CE1 and CE2, a new method called AS override is used.
3-18
After AS override is configured on PE, but before PE sends route update packets to CE,
PE will replace the AS number of each direct-connectd CE device in the entity AS_PATH
by its own AS number. The length of AS_PATH is still kept when AS override is configured.
To configure AS override on ZXCTN 9000-E, perform the following steps:
Example
As shown in Figure 3-7, P acts as a Router Reflector (RR), the loopback1 address of PE1
is 61.139.36.34/32, the loopback1 address of PE2 is 61.139.36.35/32, and the loopback1
address of P is 61.139.36.31/32.
3-19
Configuration Requirements
l Make sure that PE1 and PE2 can learn loopback addresses between each other. PE1
and PE2 establish LDP neighborhood with RR respectively.
l RR establishes MP-Interior Border Gateway Protocol (IBGP) neighborhood with PE1
and PE2 respectively. PE1 and PE2 are RR clients, their Loopback addresses are
used to set up BGP connection.
l A VRF called ok is configured on PE1 and PE2. Configure the same RDs and RTs.
RR establishes MP-IBGP neighborhood with PE1 and PE2 respectively. PE1 and PE2 are
RR clients. PE1 and PE2 advertise a direct-connected route formed by loopback interface
on the private network respectively. As a result, the local PE can learn the private network
loopback route from the peer PE. The next hop of the this route is the direct-connected
address that is used to establish IGP neighborhood with the RR by the peer PE.
Configuration on RR (P):
P(config)#router bgp 65190
P(config-bgp)#no bgp default route-target filter
P(config-bgp)#neighbor 61.139.36.34 remote-as 65190
P(config-bgp)#neighbor 61.139.36.34 update-source loopback1
P(config-bgp)#neighbor 61.139.36.35 remote-as 65190
P(config-bgp)#neighbor 61.139.36.35 update-source loopback1
P(config-bgp)#address-family vpnv4
P(config-bgp-af-vpnv4)#neighbor 61.139.36.34 active
P(config-bgp-af-vpnv4)#neighbor 61.139.36.35 active
P(config-bgp-af-vpnv4)#neighbor 61.139.36.34 route-reflector-client
P(config-bgp-af-vpnv4)#neighbor 61.139.36.35 route-reflector-client
P(config-bgp-af-vpnv4)#end
Configuration on PE1:
PE1(config)#ip vrf ok
PE1(config-vrf-ok)#rd 1:1
PE1(config-vrf-ok)#address-family ipv4
PE1(config-vrf-ok-af-ipv4)#route-target 1:1
PE1(config-vrf-ok-af-ipv4)#exit
PE1(config-vrf-ok)#exit
3-20
PE1(config)#interface loopback10
PE1(config-if-loopback10)#ip vrf forwarding ok
PE1(config-if-loopback10)#ip address 10.10.10.10 255.255.0.0
PE1(config-if)#exit
Configuration on PE2:
PE2(config)#ip vrf ok
PE2(config-vrf-ok)#rd 1:1
PE2(config-vrf-ok)#address-family ipv4
PE2(config-vrf-ok-af-ipv4)#route-target 1:1
PE2(config-vrf-ok-af-ipv4)#exit
PE2(config-vrf-ok)#exit
PE2(config)#interface loopback20
PE2(config-if-loopback20)#ip vrf forwarding ok
PE2(config-if-loopback20)#ip address 20.20.20.20 255.255.0.0
PE2(config-if-loopback20)#exit
3-21
Configuration Description
As shown in Figure 3-8, CE1 and CE2 belong to the same VPN. The loopback address of
CE1 is 100.1.1.1/24, and that of CE2 is 200.1.1.1/24.
Make sure that CE1 and CE2 can learn the loopback routes between each other by using
OSPF. The BGP runs between CE1 and PE1, while the OSPF runs between CE2 and PE2.
CE1 and CE2 can learn the routes from each other, and the ping is successful between
them.
3-22
gei-0/1/0/3 10.10.12.1/24
P gei-0/1/0/4 10.10.12.2/24
gei-0/1/0/5 10.10.23.2/24
gei-0/1/0/7.10 10.10.10.1/24
Configuration Flow
1. Configure the IP addresses of loopback1 and physical interface on CE1. Establish
EBGP neighborhood between CE1 and PE1. Advertise the loopback address in BGP.
2. Configure the IP addresses of loopback1 and gei-0/1/0/3 on PE1. Configure a VRF
called test1. Bind the interface gei-0/1/0/2 to the test 1 and configure IP address.
Configure OSPF and advertise the network segment 10.0.0.0/8 in OSPF. Establish
MPBGP neighborhood between PE1 and PE2, and enable VPNv4. Establish EBGP
neighborhood between PE1 and CE1. Enable LDP on the interface gei-0/1/0/3.
Specify the loopback1 address as the LDP router ID.
3. Configure the IP addresses of gei-0/1/0/4 and gei-0/1/0/5 on P. Configure OSPF and
advertise the network segment 10.0.0.0/8 in OSPF. Enable LDP on the interfaces
gei-0/1/0/4 and gei-0/1/0/5. Configure loopback1 and specify the loopback1 address
as the LDP router ID.
4. Configure the IP addresses of loopback1 and gei-0/1/0/6. Configure a VRF called
test1. Bind the sub-interface gei-0/1/0/7.10 to the test1 and configure IP address.
Configure OSPF and advertise the network segment 10.0.0.0/8 in OSPF. Establish
MPBGP neighborhood between PE1 and PE2, and enable VPNv4. Establish OSPF
neighborhood between CE2 and PE2. Enable LDP on the interface gei-0/1/0/6.
5. Configure the IP addresses of loopback1 and gei-0/1/0/8.10. Configure OSPF and
advertise the network segments 10.10.10.2 and loopback 200.1.1.1 in OSPF.
Configuration Command
Configuration on CE1:
CE1(config)#interface loopback1
CE1(config-if-loopback1)#ip address 100.1.1.1 255.255.255.0
CE1(config-if-loopback1)#exit
CE1(config)#interface gei-0/1/1/1
CE1(config-if-gei-0/1/1/1)#no shutdown
CE1(config-if-gei-0/1/1/1)#ip address 10.1.1.2 255.255.255.0
CE1(config-if-gei-0/1/1/1)#exit
3-23
Configuration on PE1:
PE1(config)#ip vrf test1
PE1(config-vrf-test1)#rd 100:1
PE1(config-vrf-test1)#address-family ipv4
PE1(config-vrf-test1-af-ipv4)#route-target import 100:1
PE1(config-vrf-test1-af-ipv4)#route-target export 100:1
PE1(config-vrf-test1-af-ipv4)#exit
PE1(config-vrf-test1)#exit
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 10.10.1.1 255.255.255.255
PE1(config-if-loopback1)#exit
PE1(config)#interface gei-0/1/0/3
PE1(config-if-gei-0/1/0/3)#no shutdown
PE1(config-if-gei-0/1/0/3)#ip address 10.10.12.1 255.255.255.0
PE1(config-if-gei-0/1/0/3)#exit
PE1(config)#interface gei-0/1/0/2
PE1(config-if-gei-0/1/0/2)#ip vrf forwarding test1
PE1(config-if-gei-0/1/0/2)#ip address 10.1.1.1 255.255.255.0
PE1(config-if-gei-0/1/0/2)#exit
PE1(config)#router ospf 1
PE1(config-ospf-1)#router-id 10.10.1.1
PE1(config-ospf-1)#network 10.0.0.0 0.255.255.255 area 0.0.0.0
PE1(config-ospf-1)#exit
3-24
PE1(config-bgp-af-ipv4-vrf)#exit
PE1(config-bgp)#address-family vpnv4
PE1(config-bgp-af-vpnv4)#neighbor 10.10.3.3 activate
PE1(config-bgp-af-vpnv4)#exit
PE1(config-bgp)#exit
Configuration on P:
P(config)#interface gei-0/1/0/4
P(config-if-gei-0/1/0/4)#no shutdown
P(config-if-gei-0/1/0/4)#ip address 10.10.12.2 255.255.255.0
P(config-if-gei-0/1/0/4)#exit
P(config)#interface gei-0/1/0/5
P(config-if-gei-0/1/0/5)#no shutdown
P(config-if-gei-0/1/0/5)#ip address 10.10.23.2 255.255.255.0
P(config-if-gei-0/1/0/5)#exit
P(config)#interface loopback1
P(config-if-loopback1)#ip address 10.10.2.2 255.255.255.255
P(config-if-loopback1)#exit
P(config)#router ospf 1
P(config-ospf-1)#router-id 10.10.2.2
P(config-ospf-1)#network 10.0.0.0 0.255.255.255 area 0.0.0.0
P(config-ospf-1)#exit
PE2(config)#interface loopback1
PE2(config-if-loopback1)#ip address 10.10.3.3 255.255.255.255
3-25
PE2(config-if-loopback1)#exit
PE2(config)#interface gei-0/1/0/6
PE2(config-if-gei-0/1/0/6)#no shutdown
PE2(config-if-gei-0/1/0/6)#ip address 10.10.23.3 255.255.255.0
PE2(config-if-gei-0/1/0/6)#exit
PE2(config)#interface gei-0/1/0/7.10
PE2(config-if-gei-0/1/0/7.10)#exit
PE2(config)#vlan-configuration
PE2(config-vlan)#interface gei-0/1/0/7.10
PE2(config-vlan-if-gei-0/1/0/7.10)#encapsulation-dot1q 10
PE2(config-vlan-if-gei-0/1/0/7.10)#exit
PE2(config-vlan)#exit
PE2(config)#interface gei-0/1/0/7.10
PE2(config-if-gei-0/1/0/7.10)#ip vrf forwarding test1
PE2(config-if-gei-0/1/0/7.10)#ip address 10.10.10.1 255.255.255.0
PE2(config-if-gei-0/1/0/7.10)#exit
PE2(config)#router ospf 1
PE2(config-ospf-1)# router-id 10.10.3.3
PE2(config-ospf-1)#network 10.0.0.0 0.255.255.255 area 0.0.0.0
PE2(config-ospf-1)#exit
3-26
PE2(config-bgp-af-vpnv4)#exit
PE2(config-bgp)#exit
Configuration on CE2:
CE2(config)#interface loopback1
CE2(config-if-loopback1)#ip address 200.1.1.1 255.255.255.0
CE2(config-if-loopback1)#exit
CE2(config)#interface gei-0/1/0/8.10
CE2(config-if-gei-0/1/0/8.10)#exit
CE2(config)#vlan-configuration
CE2(config-vlan)#interface gei-0/1/0/8.10
CE2(config-vlan-if-gei-0/1/0/8.10)#encapsulation-dot1q 10
CE2(config-vlan-if-gei-0/1/0/8.10)#exit
CE2(config-vlan)#exit
CE2(config)#interface gei-0/1/0/8.10
CE2(config-if-gei-0/1/0/8.10)#ip address 10.10.10.2 255.255.255.0
CE2(config-if-gei-0/1/0/8.10)#exit
CE2(config)#router ospf 1
CE2(config-ospf-1)#network 10.10.10.2 0.0.0.255 area 0
CE2(config-ospf-1)#network 200.1.1.1 0.0.0.255 area 0
CE2(config-ospf-1)#exit
Configuration Verification
View the EBGP connection running between CE1 and PE1, as shown in the following:
PE1#show bgp vpnv4 unicast vrf-summary test1
View the routing table of CE1. Here, the BGP route is the VPN route learnt by CE1.
CE1#show ip forwarding route
IPv4 Routing Table:
Headers: Dest: Destination, Gw: Gateway, Pri: Priority;
Codes : BROADC: Broadcast, USER-I: User-ipaddr, USER-S: User-special,
MULTIC: Multicast, USER-N: User-network, DHCP-D: DHCP-DFT,
ASBR-V: ASBR-VPN, STAT-V: Static-VRF, DHCP-S: DHCP-static,
GW-FWD: PS-BUSI, NAT64: Stateless-NAT64, LDP-A: LDP-area,
GW-UE: PS-USER, P-VRF: Per-VRF-label, TE: RSVP-TE;
Status codes: *valid, >best;
Dest Gw Interface Owner Pri Metric
10.1.1.0/24 10.1.1.2 gei-0/1/0/1 Direct 0 0
10.1.1.2/32 10.1.1.2 gei-0/1/0/1 Address 0 0
3-27
Configuration Description
As shown in Figure 3-9, CE1 and CE2 belong to the same VPN. The loopback address of
CE1 is 100.1.1.1/24, and that of CE2 is 200.1.1.1/24.
Make sure that CE1 and CE2 can learn the loopback routes from each other through the
sham-link running between PE1 and PE2. CE1 and PE1 run OSPF VRF. CE2 and PE2
run OSPF VRF.
gei-0/1/0/9 20.1.1.2/24
gei-0/1/0/3 10.10.12.1/24
P gei-0/1/0/4 10.10.12.2/24
gei-0/1/0/5 10.10.23.2/24
gei-0/1/0/7.10 10.10.10.1/24
gei-0/1/0/10 20.1.1.1/24
3-28
Configuration Flow
1. Configure the IP addresses of loopback and physical interfaces on CE1. Configure
OSPF route.
2. Advertise the loopback interface IP address and the direct-connected network
segment in OSPF.
3. Set up SHAM-LINK.
Configuration Command
Configuration on CE1:
CE1(config)#interface loopback1
CE1(config-if-loopback1)#ip address 100.1.1.1 255.255.255.0
CE1(config-if-loopback1)#exit
CE1(config)#interface gei-0/1/0/1
CE1(config-if-gei-0/1/0/1)#no shutdown
CE1(config-if-gei-0/1/0/1)#ip address 10.1.1.2 255.255.255.0
CE1(config-if-gei-0/1/0/1)#exit
CE1(config)#interface gei-0/1/0/9
CE1(config-if-gei-0/1/0/9)#no shutdown
CE1(config-if-gei-0/1/0/9)#ip address 20.1.1.2 255.255.255.0
CE1(config-if-gei-0/1/0/9)#exit
CE1(config)#router ospf 1
CE1(config-ospf-1)#network 10.1.1.0 0.0.0.255 area 0
CE1(config-ospf-1)#network 20.1.1.0 0.0.0.255 area 0
CE1(config-ospf-1)#network 100.1.1.1 0.0.0.0 area 0
CE1(config-ospf-1)#exit
Configuration on PE1:
PE1(config)#ip vrf test1
PE1(config-vrf-test1)#rd 100:1
PE1(config-vrf-test1)#address-family ipv4
PE1(config-vrf-test1-af-ipv4)#route-target import 100:1
PE1(config-vrf-test1-af-ipv4)#route-target export 100:1
PE1(config-vrf-test1-af-ipv4)#exit
PE1(config-vrf-test1)#exit
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 10.10.1.1 255.255.255.255
PE1(config-if-loopback1)#exit
PE1(config)#interface gei-0/1/0/3
PE1(config-if-gei-0/1/0/3)#no shutdown
PE1(config-if-gei-0/1/0/3)#ip address 10.10.12.1 255.255.255.0
PE1(config-if-gei-0/1/0/3)#exit
PE1(config)#interface loopback64
3-29
PE1(config)#interface gei-0/1/0/2
PE1(config-if-gei-0/1/0/2)#no shutdown
PE1(config-if-gei-0/1/0/2)#ip vrf forwarding test1
PE1(config-if-gei-0/1/0/2)#ip address 10.1.1.1 255.255.255.0
PE1(config-if-gei-0/1/0/2)#exit
PE1(config)#router ospf 1
PE1(config-ospf-1)#router-id 10.10.1.1
PE1(config-ospf-1)#network 10.0.0.0 0.255.255.255 area 0.0.0.0
PE1(config-ospf-1)#exit
Configuration on P:
P(config)#interface gei-0/1/0/4
P(config-if-gei-0/1/0/4)#no shutdown
P(config-if-gei-0/1/0/4)#ip address 10.10.12.2 255.255.255.0
P(config-if-gei-0/1/0/4)#exit
3-30
P(config)#interface gei-0/1/0/5
P(config-if-gei-0/1/0/5)#no shutdown
P(config-if-gei-0/1/0/5)#ip address 10.10.23.2 255.255.255.0
P(config-if-gei-0/1/0/5)#exit
P(config)#interface loopback1
P(config-if-loopback1)#ip address 10.10.2.2 255.255.255.255
P(config-if-loopback1)#exit
P(config)#router ospf 1
P(config-ospf-1)#router-id 10.10.2.2
P(config-ospf-1)#network 10.0.0.0 0.255.255.255 area 0.0.0.0
P(config-ospf-1)#exit
PE2(config)#interface loopback1
PE2(config-if-loopback1)#ip address 10.10.3.3 255.255.255.255
PE2(config-if-loopback1)#exit
PE2(config)#interface gei-0/1/0/6
PE2(config-if-gei-0/1/0/6)#no shutdown
PE2(config-if-gei-0/1/0/6)#ip address 10.10.23.3 255.255.255.0
PE2(config-if-gei-0/1/0/6)#exit
PE2(config)#interface loopback64
PE2(config-if-loopback64)#ip vrf forwarding test1
PE2(config-if-loopback64)#ip address 64.64.64.2 255.255.255.255
PE2(config-if-loopback64)#exit
3-31
PE2(config-ldp-1)#interface gei-0/1/0/6
PE2(config-ldp-1-if-gei-0/1/0/6)#exit
PE2(config-ldp-1)#exit
PE2(config)#interface gei-0/1/0/7.10
PE2(config-if-gei-0/1/0/7.10)#exit
PE2(config)#vlan-configuration
PE2(config-vlan)#interface gei-0/1/0/7.10
PE2(config-vlan-if-gei-0/1/0/7.10)#encapsulation-dot1q 10
PE2(config-vlan-if-gei-0/1/0/7.10)#exit
PE2(config-vlan)#exit
PE2(config)#interface gei-0/1/0/7.10
PE2(config-if-gei-0/1/0/7.10)#ip vrf forwarding test1
PE2(config-if-gei-0/1/0/7.10)#ip address 10.10.10.1 255.255.255.0
PE2(config-if-gei-0/1/0/7.10)#exit
PE2(config)#router ospf 1
PE2(config-ospf-1)#router-id 10.10.3.3
PE2(config-ospf-1)#network 10.0.0.0 0.255.255.255 area 0.0.0.0
PE2(config-ospf-1)#exit
Configuration on CE2:
CE2(config)#interface loopback1
CE2(config-if-loopback1)#ip address 200.1.1.1 255.255.255.0
CE2(config-if-loopback1)#exit
3-32
CE2(config)#interface gei-0/1/0/8.10
CE2(config-if-gei-0/1/0/8.10)#exit
CE2(config)#vlan-configuration
CE2(config-vlan)#interface gei-0/1/0/8.10
CE2(config-vlan-if-gei-0/1/0/8.10)#encapsulation-dot1q 10
CE2(config-vlan-if-gei-0/1/0/8.10)#exit
CE2(config-vlan)#exit
CE2(config)#interface gei-0/1/0/8.10
CE2(config-if-gei-0/1/0/8.10)#ip address 10.10.10.2 255.255.255.0
CE2(config-if-gei-0/1/0/8.10)#exit
CE2(config)#interface gei-0/1/0/10
CE2(config-if-gei-0/1/0/10)#ip address 20.1.1.1 255.255.255.0
CE2(config-if-gei-0/1/0/10)#exit
CE2(config)#router ospf 1
CE2(config-ospf-1)#network 10.10.10.0 0.0.0.255 area 0
CE2(config-ospf-1)#network 200.1.1.0 0.0.0.255 area 0
CE2(config-ospf-1)#network 20.1.1.0 0.0.0.255 area 0
CE2(config-ospf-1)#exit
Configuration Verification
Displays shamlink neighbor information on PE1.
ZXCTN(config)#show ip ospf neighbor detail process 100
OSPF Router with ID (64.64.64.1) (Process ID 100)
Neighbor 0.0.0.0
In the area 0.0.0.0
Via interface sl(To 64.64.64.2) 64.64.64.2
State DOWN, Priority 0, Cost 1
Queue count : Retransmit 0, DD 0, LS Req 0
Dead time : 00:00:40 Options : 0x0
In Full State for 00:00:09
3-33
Then displays the routes information to CE2 on CE1. The route is forwarding through PE1.
ZXCTN#show ip forwarding route 200.1.1.1
IPv4 Routing Table:
Headers: Dest: Destination, Gw: Gateway, Pri: Priority;
Codes : BROADC: Broadcast, USER-I: User-ipaddr, USER-S: User-special,
MULTIC: Multicast, USER-N: User-network, DHCP-D: DHCP-DFT,
ASBR-V: ASBR-VPN, STAT-V: Static-VRF, DHCP-S: DHCP-static,
GW-FWD: PS-BUSI, NAT64: Stateless-NAT64, LDP-A: LDP-area,
GW-UE: PS-USER, P-VRF: Per-VRF-label, TE: RSVP-TE;
Status codes: *valid, >best;
Dest Gw Interface Owner Pri Metric
*> 200.1.1.1/32 104.1.1.1 gei-0/1/0/1 OSPF 110 4
3-34
l Combined with routing policies, route aggregation can realize link backup and load
sharing, and thus can fully satisfy various networking requirements.
l If VPN route aggregation can be applied in L3VPN, the number of route entries
transferred and stored by BGP can also be decreased.
However, as route aggregation hides some specific routes, there is a risk of routing loop.
Therefore, network designers should evaluate the risk before using route aggregation.
Combining route aggregation with a static route is the simplest method for realizing
aggregation. However, as this method is less flexible and maintainable, it cannot meet
the advanced requirements of MPLS L3VPN route aggregation.
l Manual aggregation
Steps
1. Configure MPLS L3VPN route aggregation.
2 ZXCTN(config-bgp)#address-family ipv4 vrf < vrf-name> Enters the IPv4 VRF address
cluster configuration mode.
3-35
Command Function
End of Steps
Figure 3-10 Network Structure of MPLS VPN Route Aggregation Configuration Example
3-36
gei-0/1/0/2 20.0.0.1/24
gei-0/1/0/5 10.0.0.1/24
Configuration Flow
1. Establish MP-BGP neighborhood between PE1 and PE2. The loopback address of
PE1 is 1.1.1.1/32, and that of PE2 is 1.1.1.2/32.
2. Configure the same vpn1 on PE1 and PE2. Bind gei-0/1/0/2 and gei-0/1/0/4 to VPN1.
3. Establish EBGP neighborhood between CE2 and PE1, CE1 and PE1 respectively.
Configuration Command
Configuration on CE1:
CE1(config)#interface gei-0/1/0/1
CE1(config-if-gei-0/1/0/1)#no shutdown
CE1(config-if-gei-0/1/0/1)#ip address 20.0.0.2 255.255.255.0
CE1(config-if-gei-0/1/0/1)#exit
Configuration on CE2:
CE2(config)#interface gei-0/1/0/3
CE2(config-if-gei-0/1/0/3)#no shutdown
CE2(config-if-gei-0/1/0/3)#ip address 30.0.0.2 255.255.255.0
CE2(config-if-gei-0/1/0/3)#exit
Configuration on PE1:
PE1(config)#ip vrf test1
PE1(config-vrf-test1)#rd 100:1
PE1(config-vrf-test1)#address-family ipv4
PE1(config-vrf-test1-af-ipv4)#route-target import 100:1
PE1(config-vrf-test1-af-ipv4)#route-target export 100:1
PE1(config-vrf-test1-af-ipv4)#exit
3-37
PE1(config-vrf-test1)#exit
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 1.1.1.1 255.255.255.255
PE1(config-if-loopback1)#exit
PE1(config)#interface gei-0/1/0/5
PE1(config-if-gei-0/1/0/5)#no shutdown
PE1(config-if-gei-0/1/0/5)#ip address 10.0.0.1 255.255.255.0
PE1(config-if-gei-0/1/0/5)#exit
PE1(config)#interface gei-0/1/0/2
PE1(config-if-gei-0/1/0/2)#no shutdown
PE1(config-if-gei-0/1/0/2)#ip vrf forwarding test1
PE1(config-if-gei-0/1/0/2)#ip address 20.0.0.1 255.255.255.0
PE1(config-if-gei-0/1/0/2)#exit
PE1(config)#interface gei-0/1/0/4
PE1(config-if-gei-0/1/0/4)#no shutdown
PE1(config-if-gei-0/1/0/4)#ip vrf forwarding test1
PE1(config-if-gei-0/1/0/4)#ip address 30.0.0.1 255.255.255.0
PE1(config-if-gei-0/1/0/4)#exit
PE1(config)#router ospf 1
PE1(config-ospf-1)#router-id 1.1.1.1
PE1(config-ospf-1)#network 1.1.1.1 0.0.0.0 area 0.0.0.0
PE1(config-ospf-1)#network 10.0.0.0 0.0.0.255 area 0.0.0.0
PE1(config-ospf-1)#exit
3-38
Configuration on PE2:
PE2(config)#ip vrf test1
PE2(config-vrf-test1)#rd 100:1
PE2(config-vrf-test1)#address-family ipv4
PE2(config-vrf-test1-af-ipv4)#route-target import 100:1
PE2(config-vrf-test1-af-ipv4)#route-target export 100:1
PE2(config-vrf-test1-af-ipv4)#exit
PE2(config-vrf-test1)#exit
PE2(config)#interface loopback1
PE2(config-if-loopback1)#ip address 1.1.1.2 255.255.255.255
PE2(config-if-loopback1)#exit
PE2(config)#interface gei-0/1/0/6
PE2(config-if-gei-0/1/0/6)#no shutdown
PE2(config-if-gei-0/1/0/6)#ip address 10.0.0.2 255.255.255.0
PE2(config-if-gei-0/1/0/6)#exit
PE2(config)#router ospf 1
PE2(config-ospf-1)#router-id 1.1.1.2
PE2(config-ospf-1)#network 1.1.1.2 0.0.0.0 area 0.0.0.0
PE2(config-ospf-1)#network 10.0.0.0 0.0.0.255 area 0.0.0.0
PE2(config-ospf-1)#exit
Configuration Verification
View VRF routing table on PE1. Here, both the sub-routes and the aggregated route can
be viewed.
PE1(config)#show ip protocol routing vrf test1
Codes: OSPF-3D = ospf-type3-discard, OSPF-5D = ospf-type5-discard, TE = rsvpte,
OSPF-7D = ospf-type7-discard, USER-I = user-ipaddr, RIP-D = rip-discard,
OSPF-E = ospf-ext, ASBR-V = asbr-vpn, GW-FWD = ps-busi, GW-UE = ps-user,
3-39
View PE2 routing table. Here, only the aggregated route can be viewed.
PE2(config)#show ip protocol routing vrf test1
Codes: OSPF-3D = ospf-type3-discard, OSPF-5D = ospf-type5-discard, TE = rsvpte,
OSPF-7D = ospf-type7-discard, USER-I = user-ipaddr, RIP-D = rip-discard,
OSPF-E = ospf-ext, ASBR-V = asbr-vpn, GW-FWD = ps-busi, GW-UE = ps-user,
BGP-AD = bgp-aggr-discard, BGP-CE = bgp-confed-ext, NAT64 = sl-nat64-v4,
USER-N = user-network, USER-S = user-special, DHCP-S = dhcp-static,
DHCP-D = dhcp-dft
Marks: *valid, >best, s-stale
l Direct connection
l Static
l Dynamic unicast route protocol
The function of L3VPN Route Limit controls the routes to access to PE from CE through
many methods.
3-40
Figure 3-12 shows the flow of adding a dynamic route learned by a dynamic routing protocol
to the VRF routing table.
3-41
The function of L3VPN route restriction and alarm can improve the performance of PE,
enhance network security, and avoid network attacks caused by mass routes poured into
the network.
Steps
1. Set the maximum number of routes in a VRF and configure the alarm function.
3-42
Command Function
By showing VRF configuration in detail, the information of route restriction and alarm
can be viewed.
End of Steps
Configuration Command
1. To establish EBGP neighborhood between PE1 and CE1, configure PE1 as follows,
PE1(config)#router bgp 100
3-43
Run the show ip vrf detail zte to view the configuration result of maximum routes.
Enable alarm and terminal monitor functions on PE1 to view the alarm if the number
of routes exceeds the threshold.
PE1#terminal monitor
PE1#configure terminal
PE1#(config)#logging on
3. CE1 advertises 50 EBGP route entries to PE1 (it does not exceed the 60% of alarm
threshold value). Run the show ip protocol routing vrf zte command to view the 50
VRF EBGP route entries on PE1. PE1 does not give any alarm.
4. CE1 continues to advertise 20 EBGP route entries to PE1. There are 70 EBGP route
entries now (It exceeds 60% of alarm threshold value). Run the show ip protocol rout
ing vrf-summary zte command on PE1 to view the 70 VRF EBGP route entries. PE1
gives an alarm.
PE1(config)#show ip protocol routing vrf-summary zte
VRF Source Count
connected: 2
static: 0
ospf: 0
rip: 0
bgp: 70
isis: 0
icmp: 0
snmp: 0
nat: 0
natpt: 0
vrrp: 0
ppp: 0
asbr_vpn: 0
3-44
rsvpte: 0
usr-ipaddr: 0
usr-net: 0
ipsec: 0
ps-user: 0
ps-busi: 0
ves: 0
ldp: 0
user-special: 0
dhcp-dft: 0
dhcp-static: 0
sl_nat64_v4: 0
Total: 72
3-45
ves: 0
ldp: 0
user-special: 0
dhcp-dft: 0
dhcp-static: 0
sl_nat64_v4: 0
Total: 103
The alarm that the number of VRF routes exceeds the threshold value is displayed by
PE1.
An alarm 200310 ID 3441 level 3 occurred at 10:16:59 05-06-2013
sent by PE1 MC-0/11/0 %L3VPN% Routes limit is exceeded.
Error data:The routes limit of zte is exceeded
6. CE1 cancels the route entries that it advertised to PE1 before, and it advertises another
50 EBGP route entries to PE1. Run the show ip protocol routing vrf-summary zte
command on PE1 to view the 50 VRF EBGP routes. PE1 does not give any alarm.
7. Modify the route alarm threshold of VRF zte to 40% on PE1. The upper limitation of
route is still 100 entries.
PE1(config)#ip vrf zte
PE1(config-vrf-zte)#address-family ipv4
PE1(config-vrf-zte-af-ipv4)#maximum routes 100 40
PE1(config-vrf-zte-af-ipv4)#exit
PE1(config-vrf-zte)#exit
Run the show ip vrf detail zte command to view the configuration result of the maximum
routes command. It shows that there are 50 route entries and PE1 does not give any
alarm.
8. CE1 cancels the 50 EBGP route entries that it advertised to PE1 before, and it
advertises to PE1 again. PE1 gives an alarm to prompt that the route alarm threshold
is exceeded.
An alarm 200311 ID 3442 level 5 occurred at 10:16:59 05-06-2013
sent by PE1 MC-0/11/0 %L3VPN% Routes warning limit is exceeded.
Warning data:The routes warning limit of zte is exceeded
9. Configure warning-only function of VPN route restriction alarm on vrf zte on PE1.
PE1(config)#ip vrf zte
PE1(config-vrf-zte)#address-family ipv4
PE1(config-vrf-zte-af-ipv4)#maximum routes 100 warning-only
PE1(config-vrf-zte-af-ipv4)#exit
PE1(config-vrf-zte)#exit
10. View the current route number, route restriction value and alarm threshold value of vrf
zte on PE1. The route number is 50, the route threshold value is not exceeded. There
is no alarm appears.
PE1(config)#show ip vrf detail zte
VRF zte (VRF Id = 1); default RD 1:1
3-46
Ttl-mode: pipe
Ds-mode: pipe
3-47
No export route-map
Route warning limit 100
priority: 2
No import multicast-route
No static outlabel configed
No static tunnel configed
Address family ipv6:
No Export VPN route-target communities
No Import VPN route-target communities
No import route-map
No export route-map
Mpls label mode:
ipv4 VRF label allocation mode: per-prefix
ipv6 VRF label allocation mode: per-prefix
per-vrf inlabel: 213009
Interfaces:
gei-0/1/0/1.1
gei-0/1/0/5
3-48
sl_nat64_v4: 0
Total: 113
Steps
1. On the ZXCTN 9000-E, run the following commands to configure a global static route.
<vrf-name>: specifies a VRF where the static route is configured, range: 132
characters.
3-49
Command Function
ZXCTN#show ip protocol routing vrf < vrf-name> Shows the global routing table of
the router.
ZXCTN#show ip forwarding route vrf < vrf-name> Shows the forwarding table of
the router.
End of Steps
3-50
Configuration Flow
1. Configures a global static route, with the destination address being a private network
address, and the next hop of the destination address being a public network address.
2. Redistribute the static route.
3. Establish a BGP neighbor between a CE and a PE.
Configuration Command
Configuration on CE1:
CE1(config)#interface gei-0/1/0/3
CE1(config-if-gei-0/1/0/3)#no shutdown
CE1(config-if-gei-0/1/0/3)#ip address 33.24.1.5 255.255.255.0
CE1(config-if-gei-0/1/0/3)#exit
CE1(config)#router bgp 1
CE1(config-bgp)#neighbor 33.24.1.6 remote-as 2
CE1(config-bgp)#exit
Configuration on PE1:
PE1(config)#tunnel-policy 11
PE1(config-tunnel-policy-11)#tunnel select-seq ldp-lsp te-lsp
PE1(config-tunnel-policy-11)#exit
PE1(config)#ip vrf wy
PE1(config-vrf-wy)#rd 1:100
PE1(config-vrf-wy)#route-target both 1:100
PE1(config-vrf-wy)#address-family ipv4
PE1(config-vrf-wy-af-ipv4)#peer 64.1.1.4 tunnel-policy 11
PE1(config-vrf-wy-af-ipv4)#static-outlabel 64.1.1.4 31
PE1(config-vrf-wy-af-ipv4)#exit
PE1(config-vrf-wy)#static-inlabel 21
PE1(config-vrf-wy)#exit
PE1(config)#interface gei-0/1/0/1
PE1(config-if-gei-0/1/0/1)#no shutdown
PE1(config-if-gei-0/1/0/1)#ip vrf forwarding wy
PE1(config-if-gei-0/1/0/1)#ip address 33.24.1.6 255.255.255.0
PE1(config-if-gei-0/1/0/1)#exit
PE1(config)#interface gei-0/1/0/2
PE1(config-if-gei-0/1/0/2)#no shutdown
PE1(config-if-gei-0/1/0/2)#ip address 21.33.1.6 255.255.255.0
PE1(config-if-gei-0/1/0/2)#exit
PE1(config)#interface loopback64
PE1(config-if-loopback64)#ip address 64.1.1.6 255.255.255.0
PE1(config-if-loopback64)#exit
3-51
PE1(config)#router ospf 1
PE1(config-ospf-1)#network 21.33.1.0 0.0.0.255 area 0
PE1(config-ospf-1)#network 64.1.1.6 0.0.0.0 area 0
PE1(config-ospf-1)#exit
PE1(config)#router bgp 2
PE1(config-bgp)#address-family ipv4 vrf wy
PE1(config-bgp-af-ipv4-vrf)#neighbor 33.24.1.5 remote-as 1
PE1(config-bgp-af-ipv4-vrf)#redistribute static
PE1(config-bgp-af-ipv4-vrf)#end
Configuration on PE2:
PE2(config)#tunnel-policy 11
PE2(config-tunnel-policy-11)#tunnel select-seq ldp-lsp te-lsp
PE2(config-tunnel-policy-11)#exit
PE2(config)#ip vrf wy
PE2(config-vrf-wy)#rd 1:100
PE2(config-vrf-wy)#route-target both 1:100
PE2(config-vrf-wy)#address-family ipv4
PE2(config-vrf-wy-af-ipv4)#peer 64.1.1.6 tunnel-policy 11
PE2(config-vrf-wy-af-ipv4)#static-outlabel 64.1.1.6 21
PE2(config-vrf-wy-af-ipv4)#exit
PE2(config-vrf-wy)#static-inlabel 31
PE2(config-vrf-wy)#exit
PE2(config)#interface gei-0/1/0/1
PE2(config-if-gei-0/1/0/1)#no shutdown
PE2(config-if-gei-0/1/0/1)#ip vrf forwarding wy
PE2(config-if-gei-0/1/0/1)#ip address 20.1.1.4 255.255.255.0
PE2(config-if-gei-0/1/0/1)#exit
PE2(config)#interface gei-0/1/0/2
PE2(config-if-gei-0/1/0/2)#no shutdown
PE2(config-if-gei-0/1/0/2)#ip address 21.33.1.4 255.255.255.0
PE2(config-if-gei-0/1/0/2)#exit
PE2(config)#interface loopback64
PE2(config-if-loopback64)#ip address 64.1.1.4 255.255.255.0
3-52
PE2(config-if-loopback64)#exit
PE2(config)#router ospf 1
PE2(config-ospf-1)#network 20.1.1.0 0.0.0.255 area 0
PE2(config-ospf-1)#network 64.1.1.4 0.0.0.0 area 0
PE2(config-ospf-1)#exit
PE2(config)#router bgp 2
PE2(config-bgp)#address-family ipv4 vrf wy
PE2(config-bgp-af-ipv4-vrf)#neighbor 20.1.1.3 remote-as 1
PE2(config-bgp-af-ipv4-vrf)#redistribute static
PE2(config-bgp-af-ipv4-vrf)#end
Configuration on CE2:
CE2(config)#interface gei-0/1/0/3
CE2(config-if-gei-0/1/0/3)#no shutdown
CE2(config-if-gei-0/1/0/3)#ip address 20.1.1.3 255.255.255.0
CE2(config-if-gei-0/1/0/3)#exit
CE2(config)#router bgp 1
CE2(config-bgp)#neighbor 20.1.1.4 remote-as 2
CE2(config-bgp)#exit
Configuration Verification
Check the configuration on PE1:
PE1(config)#show ip protocol routing vrf wy
Codes: OSPF-3D = ospf-type3-discard, OSPF-5D = ospf-type5-discard, TE = rsvpte,
OSPF-7D = ospf-type7-discard, USER-I = user-ipaddr, RIP-D = rip-discard,
OSPF-E = ospf-ext, ASBR-V = asbr-vpn, GW-FWD = ps-busi, GW-UE = ps-user,
BGP-AD = bgp-aggr-discard, BGP-CE = bgp-confed-ext, NAT64 = sl-nat64-v4,
USER-N = user-network, USER-S = user-special, DHCP-S = dhcp-static,
DHCP-D = dhcp-dft
Marks: *valid, >best, s-stale
3-53
3-54
VPN FRR uses the VPN-based quick private network route switching technology. It sets
active/standby forwarding entries pointing to the active and standby PEs on the remote PE
in advanced. According to these forwarding entries, together with quick PE fault detection,
3-55
VPN FRR can switch VPN traffic to the standby path before VPN route convergence is
completed. The detailed process is as follows:
1. Detect a fault quickly. The technologies usually used include BFD and physical signal
detection.
2. Modify the forwarding plane and change the traffic over to the standby path that has
been calculated out.
3. Perform route re-convergence.
4. After route re-convergence, change the traffic over to the optimal path.
Steps
1. Configure L3VPN FRR.
Command Function
ZXCTN#show ip forwarding backup route vrf< Shows the standby private network
vpn-name> route.
End of Steps
Configuration Description
As shown in Figure 3-16on an L3 VPN, CE1 is directly connected to VRF 1 on PE1. CE2
establishes OSPF neighbor relationship with the VRF access interfaces on PE2 and PE3.
CE2 and R1 establish OSPF neighbor relationship. Redistribute OSPF in VRF address
family configuration on PE2 and PE3. On PE1, there are VRF 1 routes that are learnt from
PE2 and PE3. PE1 establish LDP/MP-BGP neighbor relationship with PE2 and PE3.
3-56
Configuration Flow
1. According to the network topology, construct an MP-BGP network for PE1, PE2 and
PE3.
2. Establish OSPF neighbor relationship with the VRF access interfaces of PE2 and PE3
on CE2. Establish OSPF neighbor relationship between CE2 and R1.
3. Redistribute OSPF in VRF address family configuration mode on PE2 and PE3.
4. Configure FRR in the VRF instance on PE1.
Configuration Command
The configuration of PE1:
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 172.20.96.2 255.255.255.255
PE1(config-if-loopback1)#exit
PE1(config)#interface xgei-0/2/0/3
PE1(config-if-xgei-0/2/0/3)#no shutdown
PE1(config-if-xgei-0/2/0/3)#ip address 172.20.130.18 255.255.255.0
PE1(config-if-xgei-0/2/0/3)#exit
PE1(config)#interface xgei-0/2/0/2
PE1(config-if-xgei-0/2/0/2)#no shutdown
PE1(config-if-xgei-0/2/0/2)#ip address 172.20.130.221 255.255.255.0
PE1(config-if-xgei-0/2/0/2)#exit
PE1(config)#router ospf 1
PE1(config-ospf-1)#router-id 172.20.96.2
PE1(config-ospf-1)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
PE1(config-ospf-1)#network 172.20.96.2 0.0.0.0 area 0.0.0.0
PE1(config-ospf-1)#exit
3-57
PE1(config-ldp-1)#interface xgei-0/2/0/3
PE1(config-ldp-1-if-xgei-0/2/0/3)#exit
PE1(config-ldp-1)#interface xgei-0/2/0/2
PE1(config-ldp-1-if-xgei-0/2/0/2)#exit
PE1(config-ldp-1)#exit
PE1(config)#interface gei-0/5/1/10
PE1(config-if-gei-0/5/1/10)#no shutdown
PE1(config-if-gei-0/5/1/10)#ip vrf forwarding zte
PE1(config-if-gei-0/5/1/10)#ip address 202.10.10.61 255.255.255.0
PE1(config-if-gei-0/5/1/10)#exit
3-58
PE2(config-vrf-zte-af-ipv4)#exit
PE2(config-vrf-zte)#exit
PE2(config)#interface xgei-0/5/0/1
PE2(config-if-xgei-0/5/0/1)#no shutdown
PE2(config-if-xgei-0/5/0/1)#ip address 172.20.130.17 255.255.255.0
PE2(config-if-xgei-0/5/0/1)#exit
PE2(config)#interface xgei-0/5/0/3
PE2(config-if-xgei-0/5/0/3)#no shutdown
PE2(config-if-xgei-0/5/0/3)#ip vrf for zte
PE2(config-if-xgei-0/5/0/3)#ip address 200.1.1.60 255.255.255.0
PE2(config-if-xgei-0/5/0/3)#exit
PE2(config)#router ospf 1
PE2(config-ospf-1)#router-id 172.20.96.1
PE2(config-ospf-1)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
PE2(config-ospf-1)#network 172.20.96.1 0.0.0.0 area 0.0.0.0
PE2(config-ospf-1)#exit
PE3(config)#interface loopback1
PE3(config-if-loopback1)#ip address 172.20.108.2 255.255.255.255
PE3(config-if-loopback1)#exit
3-59
PE3(config)#interface xgei-0/0/0/4
PE3(config-if-xgei-0/0/0/4)#no shutdown
PE3(config-if-xgei-0/0/0/4)#ip address 172.20.130.222 255.255.255.0
PE3(config-if-xgei-0/0/0/4)#exit
PE3(config)#interface xgei-0/0/0/1
PE3(config-if-xgei-0/0/0/1)#no shutdown
PE3(config-if-xgei-0/0/0/1)#ip vrf forwarding zte
PE3(config-if-xgei-0/0/0/1)#ip address 100.1.1.63 255.255.255.0
PE3(config-if-xgei-0/0/0/1)#exit
PE3(config)#router ospf 1
PE3(config-ospf-1)#router-id 172.20.108.2
PE3(config-ospf-1)#network 172.20.130.0 0.0.0.255 area 0.0.0.0
PE3(config-ospf-1)#network 172.20.108.2 0.0.0.0 area 0.0.0.0
PE3(config-ospf-1)#exit
3-60
CE2(config)#interface gei-0/5/1/10
CE2(config-if-gei-0/5/1/10)#no shutdown
CE2(config-if-gei-0/5/1/10)#ip address 192.1.1.64 255.255.255.0
CE2(config-if-gei-0/5/1/10)#exit
CE2(config)#interface xgei-0/0/0/3
CE2(config-if-xgei-0/0/0/3)#no shutdown
CE2(config-if-xgei-0/0/0/3)#ip address 200.1.1.2 255.255.255.0
CE2(config-if-xgei-0/0/0/3)#exit
CE2(config)#interface xgei-0/0/0/1
CE2(config-if-xgei-0/0/0/1)#no shutdown
CE2(config-if-xgei-0/0/0/1)#ip address 100.1.1.2 255.255.255.0
CE2(config-if-xgei-0/0/0/1)#exit
CE2(config)#router ospf 1
CE2(config-ospf-1)#network 100.1.1.0 0.0.0.255 area 0.0.0.0
CE2(config-ospf-1)#network 200.1.1.0 0.0.0.255 area 0.0.0.0
CE2(config-ospf-1)#network 192.1.1.0 0.0.0.255 area 0.0.0.0
CE2(config-ospf-1)#exit
Configuration Verification
Verify the configuration on PE1.
PE1#show ip protocol routing vrf zte
network 192.1.1.0 mask 255.255.255.0
Codes: OSPF-3D = ospf-type3-discard, OSPF-5D = ospf-type5-discard, TE = rsvpte,
OSPF-7D = ospf-type7-discard, USER-I = user-ipaddr, RIP-D = rip-discard,
OSPF-E = ospf-ext, ASBR-V = asbr-vpn, GW-FWD = ps-busi, GW-UE = ps-user,
BGP-AD = bgp-aggr-discard, BGP-CE = bgp-confed-ext, NAT64 = sl-nat64-v4,
USER-N = user-network, USER-S = user-special, DHCP-S = dhcp-static,
DHCP-D = dhcp-dft
Marks: *valid, >best, s-stale
Dest NextHop Intag Outtag RtPrf Protocol
*> 192.1.1.0/24 172.20.108.2 213015 213400 200 BGP-INT
*> 192.1.1.0/24 172.20.96.1 213015 213008 200 BGP-INT
PE1(config)#show ip forwarding route vrf zte 192.1.1.0
IPv4 Routing Table:
Headers: Dest: Destination, Gw: Gateway, Pri: Priority;
Codes : BROADC: Broadcast, USER-I: User-ipaddr, USER-S: User-special,
MULTIC: Multicast, USER-N: User-network, DHCP-D: DHCP-DFT,
ASBR-V: ASBR-VPN, STAT-V: Static-VRF, DHCP-S: DHCP-static,
GW-FWD: PS-BUSI, NAT64: Stateless-NAT64, LDP-A: LDP-area,
GW-UE: PS-USER, P-VRF: Per-VRF-label, TE: RSVP-TE;
Status codes: *valid, >best;
Dest Gw Interface Owner Pri Metric
192.1.1.0/24 172.20.108.2 xgei-0/2/0/2 BGP 200 3
3-61
According to the information, VPN FRR relationship is formed on PE1. When the active
link between PE1 and PE2 is down, VPN FRR on PE1 will change the traffic over to the
standby link from the active link, thus accomplishing fast changeover.
Configuration Description
Figure 3-17 shows the network structure. CE1 accesses VRF zte on PE1 through IS-IS,
CE2 accesses VRF zte on PE2 through IS-IS. The two IS-IS links are redistributed
under the VRF address families of PE1 and PE2 respectively. An LDP/MPBGP neighbor
relationship is established between PE1 and PE2.
3-62
Figure 3-17 Network Structure for L3VPN Access Side FRR Configuration
Configuration Flow
1. Establish an MP-IBGP environment between PE1 and PE2.
2. Create IS-IS neighbor relationships between CE1 and PE1s VRF interface and be-
tween CE2 and PE2s VRF interface respectively.
3. Redistribute IS-IS links under the VRF address families of PE1 and PE2 respectively.
4. Configure FRR under the VRF of PE1.
Configuration Commands
Configure CE1 as follows:
/*Configure IP addresses of interfaces as follows:*/
CE1(config)#interface gei-0/1/0/1
CE1(config-if-gei-0/1/0/1)#no shutdown
CE1(config-if-gei-0/1/0/1)#ip address 100.101.1.11 255.255.255.0
CE1(config-if-gei-0/1/0/1)#exit
CE1(config)#interface gei-0/1/0/2
CE1(config-if-gei-0/1/0/2)#no shutdown
CE1(config-if-gei-0/1/0/2)#ip address 100.101.2.11 255.255.255.0
CE1(config-if-gei-0/1/0/2)#exit
3-63
CE1(config-isis-2)#exit
3-64
PE1(config-isis-1)#system-id 1001.1234.1PE1
PE1(config-isis-1)#interface gei-0/1/0/3
PE1(config-isis-1-if-gei-0/1/0/3)#ip router isis
PE1(config-isis-1-if-gei-0/1/0/3)#exit
PE1(config-isis-1)#interface loopback1
PE1(config-isis-1-if-loopback1)#ip router isis
PE1(config-isis-1-if-loopback1)#exit
PE1(config-isis-1)#exit
3-65
3-66
By means of the three configurations above, the multiple routes formed load balancing in
MPLS VPN outer layer, inner layer and CE side to perform the load balancing of multiple
links in private and public networks.
According to the two policies, flow-based and destination-based, load equation, directional
and link backup.
3-67
There are two possible transmission paths between PE1 and PE2.
l LSP1: PE1 > P1 > PE2
l LSP2: PE1 > P2 > PE2
Usually, the data is only transmitted along one LSP, supposing it is LSP1. However, in
some special cases, such as bandwidth restriction, congestion and so on, LDP equates
the data traffic according to the rules, allocates the data to LSP2 for forwarding, thus to
realize LDP load balancing.
To realize LDP load sharing, it is not necessary to configure LDP, but related routing
protocols must support LDP load sharing. For details, refer to ZXCTN 9000-E
Configuration Guide (MPLS).
Normally, the system load is shared among two or more resources. When some resource
fails, the remaining resources can take over the work of this resource, without interrupting
the communications.
3-68
Load sharing needs some conditions: CE2 respectively notifies PE2 and PE3 of the same
route. PE2 and PE3 forward the route to PE1 and connect the VRF bound with R1 on
PE1. Load sharing is configured under the VRF cluster of the corresponding BGP. On PE1,
load-shared routes also need some conditions: The routes are received from neighbors of
the same AS. The routes have the same origin attribute, local priority attribute, and as-path
attribute.
Steps
1. Configure the load sharing mode.
3-69
Command Function
Command Function
Command Function
3-70
Command Function
ZXCTN#show ip forwarding route vrf <vrf-nam Indicates the route of specified VPN.
e>{[{<Network to display informatio>}[<Network
mask>{weak-match|exact-match}]]|[<Protocol name>]}
End of Steps
Steps
1. Configure the load sharing mode.
Command Function
ZXCTN#show bgp vpnv4 unicast detail <VPN Route Displays the detailed information about
Distinguisher><ip-address><mask> a specified VPN route.
End of Steps
3-71
Configuration Description
Figure 3-20 shows an example of LDP load sharing configuration. There are two links
between R1 and R2.
Figure 3-20 Configuration Instance of MPLS L3VPN Public Network LDP Load Sharing
Take OSPF route load sharing as an example. The configuration on two routers is as
follows:
Configuration Flow
1. Configure the interface addresses on each LSR.
2. Configure the local OSPF rule on two LSRs.
3. Configure the MPLS LDP function, and add related interfaces to LDP.
Configuration Command
The configuration on R1 is as follows:
R1(config)#interface gei-0/1/0/1
R1(config-if-gei-0/1/0/1)#no shutdown
R1(config-if-gei-0/1/0/1)#ip address 1.1.1.1 255.255.255.0
R1(config-if-gei-0/1/0/1)#exit
R1(config)#interface gei-0/1/0/3
R1(config-if-gei-0/1/0/3)#no shutdown
R1(config-if-gei-0/1/0/3)#ip address 2.2.2.2 255.255.255.0
R1(config-if-gei-0/1/0/3)#exit
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 4.4.4.4 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#router ospf 1
R1(config-ospf-1)#router-id 4.4.4.4
R1(config-ospf-1)#network 4.4.4.4 0.0.0.0 area 0
3-72
R2(config)#router ospf 1
R2(config-ospf-1)#router-id 5.5.5.5
R2(config-ospf-1)#network 1.1.1.0 0.0.0.255 area 0
R2(config-ospf-1)#network 2.2.2.0 0.0.0.255 area 0
R2(config-ospf-1)#network 5.5.5.5 0.0.0.0 area 0
R2(config-ospf-1)#exit
Now, route load balancing has been realized. Next, create evenly loaded LSP links for
LDP load balancing.
3-73
Configuration Verification
Check the route forwarding table on R1:
R1(config)#show ip forwarding route 5.5.5.5
IPv4 Routing Table:
Headers: Dest: Destination, Gw: Gateway, Pri: Priority;
Codes : BROADC: Broadcast, USER-I: User-ipaddr, USER-S: User-special,
MULTIC: Multicast, USER-N: User-network, DHCP-D: DHCP-DFT,
ASBR-V: ASBR-VPN, STAT-V: Static-VRF, DHCP-S: DHCP-static,
GW-FWD: PS-BUSI, NAT64: Stateless-NAT64, LDP-A: LDP-area,
GW-UE: PS-USER, P-VRF: Per-VRF-label, TE: RSVP-TE;
status codes: *valid, >best
Dest Gw Interface Owner Pri Metric
*>5.5.5.5/32 2.2.2.3 gei-0/1/0/3 OSPF 110 2
*>5.5.5.5/32 1.1.1.2 gei-0/1/0/1 OSPF 110 2
At the end of the route forwarding table, it can be seen that there are two next hops for the
destination (destination address: 5.5.5.5, mask: 255.255.255.255):
l Through interface gei-0/1/0/3 to 2.2.2.3
l Through interface gei-0/1/0/1 to 1.1.1.2
It can be seen that there are two next hops in the label forwarding table for the network
segment of the destination (destination address: 5.5.5.5, mask: 255.255.255.255). This
means that there are two sessions between the local and remote ends for the FEC of this
network segment. That is, there are two LSPs. These two LSPs are the two next hops
displayed with the show ip forwarding route command.
Now, load balancing has been realized. You can view the MPLS load sharing information
through interface traffic statistics.
Configuration Description
Establish the L3VPN environment as shown in Figure 3-21.
3-74
The VRF named "zte" exists on PE1 and PE2. RD is 1:1, and RT is 1:1. The interfaces
gei-/1/0/2, gei-/1/0/4, and gei-/1/0/5 are all bound with VRF zte. The interface addresses
are configured as follows:
gei-0/1/0/4 10.1.2.2/24
gei-0/1/0/3 10.1.2.1/24
Configuration Flow
1. Bound the interfaces gei-0/1/0/2, gei-0/1/0/4, and gei-0/1/0/5 to VRF zte.
2. Establish IGP neighbor and LDP neighbor respectively between PE1 and P and
between P and PE2. Notify each other of the loopback address.
3. Establish MPBGP neighbor between PE1 and PE2 by using the loopback address.
4. Configure VRF load sharing on the interfaces gei-0/1/0/1, gei-0/1/0/2, gei-0/1/0/3, and
gei-0/1/0/4. Configure the load sharing commands in VRF mode.
Configuration Command
1. Establish OSPF neighbor between CE1 and PE1.
The configuration on CE1 is as follows:
CE1(config)#interface loopback1
CE1(config-if-loopback1)#ip address 20.1.1.1 255.255.255.255
CE1(config-if-loopback1)#exit
CE1(config)#router ospf 10
CE1(config-ospf-10)#network 10.1.1.0 0.0.0.255 area 0
CE1(config-ospf-10)#network 10.1.2.0 0.0.0.255 area 0
3-75
Re-allocate OSPF routes and directly-connected routes in IPv4 vrf mode of BGP on
PE1:
PE1(config)#router bgp 100
PE1(config-bgp)#address-family ipv4 vrf zte
PE1(config-bgp-af-ipv4-vrf)#redistribute ospf-int 10
PE1(config-bgp-af-ipv4-vrf)#redistribute connect
PE1(config-bgp-af-ipv4-vrf)#exit
PE1(config-bgp)#exit
3-76
CE1(config-if-gei-0/1/0/1)#no shutdown
CE1(config-if-gei-0/1/0/1)#ip load-sharing per-packet
CE1(config-if-gei-0/1/0/1)#exit
CE1(config)#interface gei-0/1/0/3
CE1(config-if-gei-0/1/0/3)#no shutdown
CE1(config-if-gei-0/1/0/3)#ip load-sharing per-packet
CE1(config-if-gei-0/1/0/3)#exit
Configuration Verification
On PE1, run the show ip protocol routing vrf zte command to view the related information.
You can see two routes (IP address: 20.1.1.1; subnet mask: 255.255.255.255), of which
CE1 notifies PE1. Both routes are assigned with labels:
PE1#show ip protocol routing vrf zte
Codes: OSPF-3D = ospf-type3-discard, OSPF-5D = ospf-type5-discard, TE = rsvpte,
OSPF-7D = ospf-type7-discard, USER-I = user-ipaddr, RIP-D = rip-discard,
OSPF-E = ospf-ext, ASBR-V = asbr-vpn, GW-FWD = ps-busi, GW-UE = ps-user,
BGP-AD = bgp-aggr-discard, BGP-CE = bgp-confed-ext, NAT64 = sl-nat64-v4,
USER-N = user-network, USER-S = user-special, DHCP-S = dhcp-static,
DHCP-D = dhcp-dft
Marks: *valid, >best, s-stale
Dest NextHop Intag Outtag RtPrf Protocol
*> 20.1.1.1/32 10.1.1.1 163840 notag 110 OSPF
*> 20.1.1.1/32 10.1.2.1 163840 notag 110 OSPF
Configuration Description
As shown in Figure 3-22, PE1 establishes L3VPN respectively with PE2 and PE3.
3-77
Figure 3-22 Network Structure of MPLS L3VPN MPBGP Load Sharing Configuration
Example
Configuration Flow
1. PE1 establishes L3VPN respectively with PE2 and PE3.
2. CE2 establishes OSPF neighbour respectively with the VRF access interfaces of PE2
and PE3. CE2 establishes OSPF neighbour with R2.
3. Re-distribute OSPF respectively under the VRF address clusters of PE2 and PE3.
4. Configure IBGP load sharing in the VRF of PE1.
Configuration Command
For the configuration of OSPF and LDP between PEs, refer to the following commands.
3-78
PE1(config)#interface gei-0/5/1/10
PE1(config-if-gei-0/5/1/10)#no shutdown
PE1(config-if-gei-0/5/1/10)#ip vrf forwarding zte
PE1(config-if-gei-0/5/1/10)#ip address 202.10.10.61 255.255.255.0
PE1(config-if-gei-0/5/1/10)#exit
PE2(config)#interface gei-0/5/0/3
PE2(config-if-gei-0/5/0/3)#no shutdown
PE2(config-if-gei-0/5/0/3)#ip vrf forwarding zte
PE2(config-if-gei-0/5/0/3)#ip address 200.1.1.60 255.255.255.0
PE2(config-if-gei-0/5/0/3)#exit
3-79
PE3(config)#interface gei-0/0/0/1
PE3(config-if-gei-0/0/0/1)#no shutdown
PE3(config-if-gei-0/0/0/1)#ip vrf forwarding zte
PE3(config-if-gei-0/0/0/1)#ip address 100.1.1.63 255.255.255.0
PE3(config-if-gei-0/0/0/1)#exit
CE2(config)#interface gei-0/5/0/10
CE2(config-if-gei-0/5/0/10)#no shutdown
CE2(config-if-gei-0/5/0/10)#ip address 192.1.1.64 255.255.255.0
CE2(config-if-gei-0/5/0/10)#exit
CE2(config)#interface gei-0/0/0/1
CE2(config-if-gei-0/0/0/1)#no shutdown
CE2(config-if-gei-0/0/0/1)#ip address 100.1.1.64 255.255.255.0
CE2(config-if-gei-0/0/0/1)#exit
3-80
CE2(config)#interface gei-0/0/0/3
CE2(config-if-gei-0/0/0/3)#no shutdown
CE2(config-if-gei-0/0/0/3)#ip address 200.1.1.64 255.255.255.0
CE2(config-if-gei-0/0/0/3)#exit
CE2(config)#router ospf 1
CE2(config-ospf-1)#network 100.1.1.0 0.0.0.255 area 0.0.0.0
CE2(config-ospf-1)#network 200.1.1.0 0.0.0.255 area 0.0.0.0
CE2(config-ospf-1)#network 192.1.1.0 0.0.0.255 area 0.0.0.0
CE2(config-ospf-1)#exit
Configuration Verification
On PE1, Run the show ip protocol routing vrf command to view the related information:
PE1(config)#show ip protocol routing vrf zte network 192.1.1.0
Codes: OSPF-3D = ospf-type3-discard, OSPF-5D = ospf-type5-discard, TE = rsvpte,
OSPF-7D = ospf-type7-discard, USER-I = user-ipaddr, RIP-D = rip-discard,
OSPF-E = ospf-ext, ASBR-V = asbr-vpn, GW-FWD = ps-busi, GW-UE = ps-user,
BGP-AD = bgp-aggr-discard, BGP-CE = bgp-confed-ext, NAT64 = sl-nat64-v4,
USER-N = user-network, USER-S = user-special, DHCP-S = dhcp-static,
DHCP-D = dhcp-dft
Marks: *valid, >best, s-stale
Dest NextHop Intag Outtag RtPrf Protocol
*> 192.1.1.0/24 172.20.108.2 213003 229125 200 BGP-INT
*> 192.1.1.0/24 172.20.96.1 213003 212998 200 BGP-INT
3-81
MPBGP have learned the VPN routes to the two remote PEs. If the following attributes
are the same, an load-shared equivalent routes can be created:
l AS ID
l origin
l local-pref
l AS-path
PE1(config)#show bgp vpnv4 unicast detail 1:50 192.1.1.0 255.255.255.0
BGP routing table entry for 1:50:192.1.1.0/24
01:38:07 received from 172.20.108.2 (172.20.108.2)
origin ?,nexthop 172.20.108.2,metric 3,localpref 100, rtpref 200,best,
as path
as4 path
extended Community:RT:1:50
received label
220712
01:38:06 received from 172.20.96.1 (172.20.96.1)
origin ?,nexthop 172.20.96.1,metric 3,localpref 100, rtpref 200,best,
as path
as4 path
extended Community:RT:1:50
received label
212998
3-82
l Inter-AS VPN (Option A): The VPN crossing different ASs manages its own
VPN routes between ASBRs through a dedicated interface. This is also called
"VRF-to-VRF".
l Inter-AS VPN (Option B): Label VPN-IPv4 routes are distributed between ASBRs
through MP-EBGP.
l Inter-AS VPN (Option C): VPN-IPv4 routes are distributed between PEs through Mul-
ti-hop MP-EBGP.
Introduction
In BGP MPLS L3VPN, Option A's features are as follows:
l LSPs of both public and private networks are broken.
l ASBR treats the remote AS as CE.
l Data packets encapsulated and transferred between ASBRs are IP packets.
Option A uses the VRF-to-VRF mode. There is no label encapsulation between CE and
PE, and only IP packets are transferred between them. Similar to the interface between a
regular PE and CE, the interconnection interface between ASBR and PE should be bound
to VRF.
Label Distribution
As shown in Figure 3-23, the upper part shows the route and label distribution flow, and
the lower part illustrates the data packet forwarding and encapsulating flow.
PE1 100.100.100.1/32
3-83
P1 100.100.100.2/32
ASBR-PE1 100.100.100.3/32
ASBR-PE2 200.200.200.3/32
P2 200.200.200.2/32
PE2 200.200.200.1/32
Data Forwarding
According to the label distribution flow as shown in Figure 3-23, the data packet
encapsulating and forwarding flow from CE2 to CE1 is as follows:
3-84
network label is popped on the penultimate hop of P1, and the private network label
is terminated on PE1.
l From PE1 to CE1, the private network label is popped, and the IP packet is forwarded
to CE1.
Introduction
In BGP MPLS L3VPN, Option B's features are as follows:
l LSP of the public network is broken, but LSP of the private network is connected.
l As private network LSP changes next hops, private network label swapping is
required.
l Data packets encapsulated and transferred between ASBRs are "private network
labels + IP packets".
Obviously, to distribute private network labels, MP-BGP must be enabled between
ASBR-PE routers, and a complete private network label forwarding table (including
incoming labels and outgoing labels) must be created on ASBR-PE routers.
Label Distribution
As shown in Figure 3-24, the upper part shows the route and label distribution flow, and
the lower part illustrates the data packet forwarding and encapsulating flow.
PE1 100.100.100.1/32
P1 100.100.100.2/32
3-85
ASBR-PE1 100.100.100.3/32
ASBR-PE2 200.200.200.3/32
P2 200.200.200.2/32
PE2 200.200.200.1/32
Data Forwarding
According to the label distribution flow as shown in Figure 3-24, the data packet
encapsulating and forwarding flow from CE2 to CE1 is as follows:
3-86
l From PE2 to ASBR-PE2, the destination address 1.1.1.1 is looked up against the
private network label forwarding table of AS2, and it is found that the next hop is the
loopback address of ASBR-PE2. Therefore, a layer-2 label is encapsulated. The
public network label is popped on the penultimate hop of P2, and the private network
label assigned by ASBR-PE2 is terminated on ASBR-PE2.
l From ASBR-PE2 to ASBR-PE1, ASBR-PE2 looks up the label forwarding table, and
then swaps private network labels according to the incoming and outgoing labels.
Therefore, on ASBR-PE2, the private network label assigned by ASBR-PE2 is popped
and the private network label assigned by ASBR-PE1 is pushed. The next hop is the
directly-connected ASBR-PE1, so there is no need to push any public network lable.
The IP packet with a layer-1 private network label is forwarded.
l From ASBR-PE1 to PE1, the destination address 1.1.1.1 is looked up against
the private network label forwarding table of AS1, and then private network label
swapping is performed according to the incoming and outgoing labels. Therefore,
on ASBR-PE1, the private network label assigned by ASBR-PE1 is popped and
the private network label assigned by PE1 is pushed. Now, the next hop obtained
from the private network label forwarding table is the loopback address of PE1.
Therefore, a layer-2 label is encapsulated. The public network label is popped on the
penultimate hop of P1, and the private network label is terminated on PE1.
l From PE1 to CE1, the private network label is popped. Then the IP packete is
forwarded to CE1.
Introduction
In BGP MPLS L3VPN, Option C's features are as follows:
l LSPs of the public network are connected, and LSPs of the private network are also
connected. The private network transfers private network routes and labels through
MP-EBGP.
l Due to end-to-end transfer, the next hop of a private network route does not change.
Therefore, private network labels are not swapped.
l In the AS of the peer side, public network route information needs to be transferred
"between PEs that only transfers public network host route information".
l Data packets encapsulated and transferred between ASBRs are "public network
labels + private network labels + IP packets".
Label Iteration
To transfer desired public network route information between specified routers, BGP4+ is
used. In addition, extended BGP is used to assign public network labels for this route, so
as to ensure the continuity of the public network LSP.
As shown in Figure 3-25, the next hop of the private network route within AS2 is PE1, which
is generated by BGP LSP. The next hop of BGP LSP is ASBR-PE2, which is considered
by PE2 as a non-directly connected route of BGP. Therefore, although ASBR-PE2 assigns
3-87
BGP LSP public network labels for the loopback address of PE1, route iteration is needed
for the non-directly connected route to find the reachable IGP route to the next hop. In
addition, label forwarding is needed throughout the network, so IGP routes also use LDP
label forwarding. As a result, an LDP LSP label is pushed outside the BGP LSP label. This
is label iteration caused by route iteration.
Figure 3-25 Label Iteration Principles of MPLS L3VPN Crossing Several ASs (Option C)
Label Distribution
As shown in Figure 3-26, the upper part shows the route and label distribution flow, and
the lower part illustrates the data packet forwarding and encapsulating flow.
Figure 3-26 Label Distribution Principles of MPLS L3VPN Crossing Several ASs
(Option C)
The private network label distribution flow is the same as the regular L3VPN label
distribution flow. The public network label distribution flow is as follows:
3-88
l From CE1 to ASBR-PE1 along the private network route to the destination address
1.1.1.1, the private network route is pushed to MPLS L3VPN of AS1.
l The private network route is announced by PE1 to PE2. The next hop is PE1, and the
label distribution protocol is MP-EBGP. PE1 transfers the private network route and
private network label to PE2. It is required to establish a public network LSP for the
loopback address of PE1 throughout the network.
l For the loopback address of PE1, public network labels on the path from PE1 to
ASBR-PE1 are assigned for each hop through LDP.
l From ASBR-PE1 to ASBR-PE2, ASBR-PE1 announces the loopback address of
PE1 in Network mode through EBGP, and the next hop is changed to ASBR-PE1.
As extended BGP is used, public network labels are assigned when the route
information is announced. MP-EBGP assigns "public network route + label", and
the label is distributed to the MPLS label forwarding table. On ASBR-PE1, for the
loopback address of PE1, the outgoing label is the lDP label assigned by P1, and the
incoming label is the BGP LSP label assigned by ASBR-PE1. Hence, LDP LSP and
BGP LSP are connected on ASBR-PE1.
l From ASBR to PE2, ASBR-PE2 needs to change the next hop of the loopback
address of PE1 to this router. Then, ASBR-PE2 distributes the route information to
PE2 through IBGP. Meanwhile, ASBR-PE2 assigns a BGP LSP label "inter-AS to-PE
public network route + label".
l The loopback address of ASBR-PE2 is in AS2. Therefore, a label is assigned to the
loopback address of ASBR-PE2 through LDP, using the IGP route.
Data Forwarding
As shown in Figure 3-26, the data forwarding flow is as follows:
l From CE2 to PE2, an IP packet is transferred.
l From PE2 to ASBR-PE2: When the IP packet whose destination is CE1 arrives on
PE2, private network route lookup is performed, and it is found that the next hop is the
loopback address of ASBR-PE2 within the same AS. This address is distributed with
labels by ASBR-PE2 through IBGP. So, PE2 pushes a private network label assigned
by PE1 first, and then pushes a BGP public network label for ASBR-PE2. As the
next hop ASBR-PE2 of IBGP is not directly connected, a public network IGP route to
ASBR-PE2 is found based on BGP iteration. The label of this IGP route is assigned
by LDP. So, it is needed to push an LDP public network label to the packet.
l From ASBR-PE2 to ASBR-PE1: When the packet arrives on ASBR-PE2, the external
LDP public network label is popped due to penultimate hop popping. According to the
previously established label forwarding route, the next hop to the loopback address
of PE1 is changed to ASBR-PE1. According to the label forwarding routing table,
public network label swapping is performed. That is, the BGP LSP label assigned by
ASBR-PE2 is popped, and the BGP LSP label assigned by ASBR-PE1 is pushed.
l When the packet arrives on ASBR-PE1, the next hop to the loopback address of PE1
is changed to PE1. According to the label forwarding routing table, public network
label swapping is performed again. On ASBR-PE1, the label assigned by BGP is
popped, and the label assigned by LDP is pushed.
3-89
l The subsequent forwarding process is the same as the regular L3VPN forwarding
process.
Steps
1. Configure MPLS L3VPN Crossing Several ASs.
For details, refer to the "Configuring MPLS L3VPN" section.
Configuration Description
As shown in Figure 3-27, a customer has two sites: site 1 and site 2. They need to be
connected through VPN. However, site 1 connects AS100, and site 2 connects AS200.
Both sites provide MPLS VPN. To realize the MPLS VPN connectivity between the two
sites, we can use MPLS L3VPN crossing several ASs (Option A). This is the simplest way
to realize inter-AS VPN.
Figure 3-27 Configuration Instance MPLS L3VPN Crossing Several ASs (Option A)
Configuration Flow
1. PE1, PE2, PE3, and PE4 all have VPN1. Set RD and RT both to 1:1.
2. Establish LDP, IGP, and MP-IBGP neighbors between PE1 and PE2 and between PE3
and PE4. Announce loopback addresses through the IGP protocol.
3-90
3. There is a back-to-back vrf between two ASBRs. The EBGP is established through
the vrf interface.
Configuration Command
1. Add the interconnection interface between PE1 and CE1 into VPN1. Between PE1
and CE1, EBGP is used.
PE1(config)#router bgp 100
PE1(config-bgp)#address-family ipv4 vrf vpn1
PE1(config-bgp-af-ipv4-vrf)#neighbor 100.1.1.2 remote-as 65000
PE1(config-bgp-af-ipv4-vrf)#exit
PE1(config-bgp)#exit
2. Between PE1 and PE2, establish MP-IBGP respectively with Loopback1 addresses
1.2.3.4 and 2.3.4.5.
PE1(config)#router bgp 100
PE1(config-bgp)#neighbor 2.3.4.5 remote-as 100
PE1(config-bgp)#neighbor 2.3.4.5 update-source loopback1
PE1(config-bgp)#address-family vpnv4
PE1(config-bgp-af-vpnv4)#neighbor 2.3.4.5 activate
PE1(config-bgp-af-vpnv4)#exit
PE1(config-bgp)#exit
3-91
PE3(config-bgp)#exit
3-92
PE4(config-bgp-af-ipv4-vrf)#exit
PE4(config-bgp)#exit
11. Between PE1 and PE2, enable LDP to establish LSP. Here, the interface on PE1 used
for connecting PE2 is gei-0/1/0/1:
PE1(config)#mpls ldp instance 1
PE1(config-ldp-1)#interface gei-0/1/0/1
PE1(config-ldp-1-if-gei-0/1/0/1)#exit
PE1(config-ldp-1)#exit
Between PE3 and PE4, enable LDP to establish LSP. The configuration is the same
as above.
Configuration Verification
On PE1, run the show bgp vpnv4 unicast vrf-summary vpn1 command to view the
establishment of EBGP neighbor with 100.1.1.2:
PE1#show bgp vpnv4 unicast vrf-summary vpn1
Neighbor Ver As MsgRcvd MsgSend Up/Down State/PfxRcd
Show the protocol route table for a private network vrf on router PE1. The results are as
follows:
On PE2, run the show bgp vpnv4 unicast neighbor 1.2.3.4 command to view the following
information:
PE2#show bgp vpnv4 unicast neighbor 1.2.3.4
BGP neighbor is 1.2.3.4, remote AS 100, internal link
BGP version 4, remote router ID 1.2.3.4
BGP state = Established, up for 22:27:17
Last read update 00:18:51, hold time is 90 seconds, keepalive interval is 30 seconds
Neighbor capabilities:
Route refresh: advertised and received
New ASN capability: advertised and received
Address family IPv4 Unicast: advertised and received
3-93
Show the protocol route table and forwarding table of a vrf private network on router PE2.
PE2#show ip protocol routing vrf vpn1 network 200.1.1.0
Codes: OSPF-3D = ospf-type3-discard, OSPF-5D = ospf-type5-discard, TE = rsvpte,
OSPF-7D = ospf-type7-discard, USER-I = user-ipaddr, RIP-D = rip-discard,
OSPF-E = ospf-ext, ASBR-V = asbr-vpn, GW-FWD = ps-busi, GW-UE = ps-user,
BGP-AD = bgp-aggr-discard, BGP-CE = bgp-confed-ext, NAT64 = sl-nat64-v4,
USER-N = user-network, USER-S = user-special, DHCP-S = dhcp-static,
DHCP-D = dhcp-dft
Marks: *valid, >best, s-stale
On PE4, run the show bgp vpnv4 unicast vrf-summary vpn1 command to view the
establishment of EBGP neighbor with 200.1.1.2:
PE4#show ip bgp summary
Neighbor Ver As MsgRcvd MsgSend Up/Down State/PfxRcd
On PE2, run the show bgp vpnv4 unicast neighbor 4.5.6.7 command to view the following
information:
PE2#show bgp vpnv4 unicast neighbor 4.5.6.7
BGP version 4, remote router ID 4.5.6.7
BGP state = Established, up for 22:27:17
Last read update 00:18:51, hold time is 90 seconds, keepalive interval is 30 seconds
capabilities:
Route refresh: advertised and received
Address family IPv4 Unicast: advertised and received
Address family VPNv4 Unicast: advertised and received
Restart Capability: advertised and received
3-94
On PE2, run the show bgp vpnv4 unicast vrf-summary vpn1 command to view the
establishment of neighbor with 150.3.2.3 (PE3):
PE2#show ip bgp summary
Neighbor Ver As MsgRcvd MsgSend Up/Down State/PfxRcd
150.3.2.3 4 200 0 0 00:22:35 2
Configuration Description
As shown in Figure 3-28, a customer has two sites: site 1 and site 2. They need to be
connected through VPN. However, site 1 connects AS100, and site 2 connects AS200.
Both sites provide MPLS VPN. To realize the MPLS VPN connectivity between the two
sites, we can use VPLS crossing several domains (Option B).
Figure 3-28 Configuration Instance MPLS L3VPN Crossing Several ASs (Option B)
Configuration Flow
1. Configure IP addresses for the following interfaces:
l PE1 left interface: gei-0/3/0/2, PE1 right interface: gei-0/1/0/1
l PE2 left interface: gei-0/6/1/4, PE2 right interface: gei-0/1/0/1
l PE3 left interface: gei-0/1/0/2, PE3 right interface: gei-0/6/1/3
l PE4 left interface: gei-0/4/0/4, PE4 right interface: gei-0/4/0/9
2. PE1, PE2, PE3, and PE4 all have VPN1. Set RD and RT both to 1:10.
3. Establish LDP, IGP, and MP-IBGP neighbors between PE1 and PE2 and between PE3
and PE4. Announce loopback addresses the IGP protocol.
4. Establish MP-EBGP neighbor between PE2 and PE3.
Configuration Command
1. Add the interconnection interface between PE1 and CE1 into VPN1. Between PE1
and CE1, directly-connected re-distribution is used.
2. Between PE1 and PE2, establish MP-IBGP respectively with Loopback1 addresses
1.2.3.1 and 1.2.3.2.
3-95
PE1(config)#interface gei-0/3/0/2
PE1(config-if-gei-0/3/0/2)#no shutdown
PE1(config-if-gei-0/3/0/2)#ip vrf forwarding vpn1
PE1(config-if-gei-0/3/0/2)#ip address 32.1.1.1 255.255.255.0
PE1(config-if-gei-0/3/0/2)#exit
PE1(config)#interface gei-0/1/0/1
PE1(config-if-gei-0/1/0/1)#no shutdown
PE1(config-if-gei-0/1/0/1)#ip address 37.64.1.1 255.255.255.0
PE1(config-if-gei-0/1/0/1)#exit
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 1.2.3.1 255.255.255.255
PE1(config-if-loopback1)#exit
PE1(config)#router ospf 1
PE1(config-ospf-1)#router-id 1.2.3.1
PE1(config-ospf-1)#network 37.64.1.0 0.0.0.255 area 0
PE1(config-ospf-1)#network 1.2.3.1 0.0.0.0 area 0
PE1(config-ospf-1)#exit
Configure LDP:
PE1(config)#mpls ldp instance 1
PE1(config-ldp-1)#router-id loopback1
PE1(config-ldp-1)#interface gei-0/1/0/1
PE1(config-ldp-1-if-gei-0/1/0/1)#exit
PE1(config-ldp-1)#exit
3-96
PE1(config-bgp-af-ipv4-vrf)#exit
PE1(config-bgp)#exit
PE2(config)#router ospf 1
PE2(config-ospf-1)#router-id 1.2.3.2
PE2(config-ospf-1)#network 37.64.1.0 0.0.0.255 area 0
PE2(config-ospf-1)#network 1.2.3.2 0.0.0.0 area 0
PE2(config-ospf-1)#exit
Configure LDP:
PE2(config)#mpls ldp instance 1
PE2(config-ldp-1)#router-id loopback1
PE2(config-ldp-1)#interface gei-0/6/1/4
PE2(config-ldp-1-if-gei-0/6/1/4)#exit
PE2(config-ldp-1)#exit
3-97
PE2(config-bgp)#address-family vpnv4
PE2(config-bgp-af-vpnv4)#neighbor 109.65.1.2 activate
PE2(config-bgp-af-vpnv4)#exit
PE2(config-bgp)#exit
PE3(config)#router ospf 1
PE3(config-ospf-1)#router-id 1.2.3.3
PE3(config-ospf-1)#network 63.44.1.0 0.0.0.255 area 0
PE3(config-ospf-1)#network 1.2.3.3 0.0.0.0 area 0
PE3(config-ospf-1)#exit
3-98
PE4(config)#interface gei-0/4/0/9
PE4(config-if-gei-0/4/0/9)#no shutdown
PE4(config-if-gei-0/4/0/9)#ip vrf forwarding vpn1
PE4(config-if-gei-0/4/0/9)#ip address 44.1.1.1 255.255.255.0
PE4(config-if-gei-0/4/0/9)#exit
PE4(config)#interface gei-0/4/0/4
PE4(config-if-gei-0/4/0/4)#no shutdown
PE4(config-if-gei-0/4/0/4)#ip address 63.44. 1.2 255.255.255.0
PE4(config-if-gei-0/4/0/4)#exit
PE4(config)#interface loopback1
PE4(config-if-loopack1)#ip address 1.2.3.4 255.255.255.255
PE4(config-if-loopback1)#exit
3-99
PE4(config-bgp-af-vpnv4)#exit
PE4(config-bgp)#address-family ipv4 vrf vpn1
PE4(config-bgp-af-ipv4-vrf)#redistribute connected
/*Re-distribute direct connections. If a dynamic routing protocol is used
between PE and CE, you need also re-distribute the dynamic routing protocol.*/
PE4(config-bgp-af-ipv4-vrf)#exit
PE4(config-bgp)#exit
Configuration Verification
Check the protocol route table of a private network and the label information of a public
network on PE1:
PE1(config)#show ip protocol routing vrf vpn1
Codes: OSPF-3D = ospf-type3-discard, OSPF-5D = ospf-type5-discard, TE = rsvpte,
OSPF-7D = ospf-type7-discard, USER-I = user-ipaddr, RIP-D = rip-discard,
OSPF-E = ospf-ext, ASBR-V = asbr-vpn, GW-FWD = ps-busi, GW-UE = ps-user,
BGP-AD = bgp-aggr-discard, BGP-CE = bgp-confed-ext, NAT64 = sl-nat64-v4,
USER-N = user-network, USER-S = user-special, DHCP-S = dhcp-static,
DHCP-D = dhcp-dft
Marks: *valid, >best, s-stale
Dest NextHop Intag Outtag RtPrf Protocol
*> 32.1.1.0/24 32.1.1.1 213002 notag 0 Direct
*> 32.1.1.1/32 32.1.1.1 213001 notag 0 Address
*> 44.1.1 .0/24 1.2.3.2 213003 213019 200 BGP-INT
On PE1, run the show bgp vpnv4 unicast neighbor 1.2.3.2 command to view the following
information:
PE1#show bgp vpnv4 unicast neighbor 1.2.3.2
BGP neighbor is 1.2.3.2, remote AS 100, internal link
BGP version 4, remote router ID 1.2.3.2
BGP state = Established, up for 22:27:17
Last read update 00:18:51, hold time is 90 seconds, keepalive interval
is 30 seconds
Neighbor capabilities:
Route refresh: advertised and received
New ASN capability: advertised and received
Address family IPv4 Unicast: advertised and received
Address family VPNv4 Unicast: advertised and receivedRestart Capability:
advertised and received
3-100
On PE2, run the show bgp vpnv4 unicast neighbor 1.2.3.1 command to view the following
information:
PE2#show bgp vpnv4 unicast neighbor 1.2.3.1
BGP neighbor is 1.2.3.1, remote AS 100, internal link
BGP version 4, remote router ID 1.2.3.1
BGP state = Established, up for 22:27:17
Last read update 00:18:51, hold time is 90 seconds, keepalive interval
is 30 seconds
capabilities:
Route refresh: advertised and received
New ASN capability: advertised and received
Address family IPv4 Unicast: advertised and received
Address family VPNv4 Unicast: advertised and receivedRestart Capability:
advertised and received
On PE3, run the show bgp vpnv4 unicast neighbor 1.2.3.4 command to view the following
information:
PE3#show bgp vpnv4 unicast neighbor 1.2.3.4
BGP neighbor is 1.2.3.4, remote AS 200, internal link
3-101
On PE1, use the show bgp vpnv4 unicast label command to view the prefix 44.1.1.0 and
VPN outgoing label.
On PE4, run the show bgp vpnv4 unicast label command to view the prefix 44.1.1.0 and
VPN incoming label.
3.7.3.3 Configuration Instance of MPLS L3VPN Crossing Several ASs (Option C, Using
IBGP Between PE and ASBR)
Configuration Description
As shown in Figure 3-29, a customer has two sites: site 1 and site 2. They need to be
connected through VPN. However, site 1 connects AS100, and site 2 connects AS200.
Both sites provide MPLS VPN. To realize the MPLS VPN connectivity between the two
sites, we can use VPLS crossing several domains (Option C, using IBGP between PE and
ASBR).
Figure 3-29 Configuration Instance MPLS L3VPN Crossing Several ASs (Option C,
Using IBGP Between PE and ASBR)
Configuration Flow
1. Build the network according to Figure 3-29. Configure the following interface
addresses:
left interface of PE1: gei-0/2/0/1 20.1.1.1/24, right interface of PE1: gei-0/1/0/1
100.1.12.1/24;
3-102
Configuration Command
The configuration on PE1 is as follows:
PE1(config)#ip vrf vpn1
PE1(config-vrf-vpn1)#rd 100:1
PE1(config-vrf-vpn1)address-family ipv4
PE1(config-vrf-vpn1-af-ipv4)#route-target 100:1
PE1(config-vrf-vpn1-af-ipv4)#exit
PE1(config-vrf-vpn1)#exit
PE1(config)#interface gei-0/2/0/1
PE1(config-if-gei-0/2/0/1)#no shutdown
PE1(config-if-gei-0/2/0/1)#ip vrf forwarding vpn1
PE1(config-if-gei-0/2/0/1)#ip address 20.1.1.1 255.255.255.0
PE1(config-if-gei-0/2/0/1)#exit
PE1(config)#interface loopback10
PE1(config-if-loopback10)#ip address 100.1.5.1 255.255.255.255
PE1(config-if-loopback10)#exit
PE1(config)#router ospf 10
PE1(config-ospf-10)#router-id 100.1.5.1
PE1(config-ospf-10)#network 100.1.0.0 0.0.255.255 area 0
PE1(config-ospf-10)#exit
3-103
PE2(config)#router ospf 10
PE2(config-ospf-10)#router-id 100.1.5.2
PE2(config-ospf-10)#network 100.1.0.0 0.0.255.255 area 0
PE2(config-ospf-10)#exit
PE2(config)#ipv4-access-list zte
PE2(config-ipv4-acl)#rule 1 permit 100.1.5.1 0.0.0.0
PE2(config-ipv4-acl)#exit
PE2(config)#route-map zte
3-104
PE3(config)#interface loopback10
PE3(config-if-loopback10)#ip address 100.1.5.3 255.255.255.255
PE3(config-if-loopback10)#exit
PE3(config)#router ospf 10
PE3(config-ospf-10)#router-id 100.1.5.3
PE3(config-ospf-10)#network 100.1.0.0 0.0.255.255 area 0
PE3(config-ospf-10)#exit
PE3(config)#ipv4-access-list zte
PE3(config-ipv4-acl)#rule 1 permit 100.1.5.4 0.0.0.0
PE3(config-ipv4-acl)#exit
PE3(config)#route-map zte
PE3(config-route-map)#match ip address zte
PE3(config-route-map)#set mpls-label
PE3(config-route-map)#exit
3-105
PE4(config)#interface gei-0/2/0/2
PE4(config-if-gei-0/2/0/2)#no shutdown
PE4(config-if-gei-0/2/0/2)#ip vrf forwarding vpn1
PE4(config-if-gei-0/2/0/2)#ip address 30.1.1.1 255.255.255.0
PE4(config-if-gei-0/2/0/2)#exit
PE4(config)#interface loopback10
PE4(config-if-loopback10)#ip address 100.1.5.4 255.255.255.255
PE4(config-if-loopback10)#exit
PE4(config)#router ospf 10
PE4(config-ospf-10)#router-id 100.1.5.4
PE4(config-ospf-10)#network 100.1.0.0 0.0.255.255 area 0
PE4(config-ospf-10)#exit
3-106
Configuration Verifications
On PE1, run the show bgp vpnv4 unicast summary command to check the VPNv4 neighbour
between router PE1 and router PE4.
PE1(config)#show bgp vpnv4 unicast summary
Neighbor Ver As MsgRcvd MsgSend Up/Down State/PfxRcd
100.1.5.4 4 200 48 47 00:23:27 2
On PE1, run the show bgp vpnv4 unicast label command to check the information with the
prefix 20.1.1.0/30.1.1.0.
PE1(config)#show bgp vpnv4 unicast labels
Network Next Hop In Label/Out Label
On PE4, run the show bgp vpnv4 unicast label command to check the information with the
prefix 20.1.1.0/30.1.1.0.
3-107
3.7.3.4 Configuration Instance of MPLS L3VPN Crossing Several ASs (Option C, Using
IGP Between PE and ASBR)
Configuration Description
As shown in Figure 3-30, a customer has two sites: site 1 and site 2. They need to be
connected through VPN. However, site 1 connects AS100, and site 2 connects AS200.
Both sites provide MPLS VPN. To realize the MPLS VPN connectivity between the two
sites, we can use MPLS L3VPN crossing several ASs (Option C, using IGP between PE
and ASBR). This is the simplest way to realize inter-AS VPN.
Figure 3-30 Configuration Instance MPLS L3VPN Crossing Several ASs (Option C,
Using IGP Between PE and ASBR)
Configuration Flow
1. Build the network according to Figure 3-30. Configure the following interface
addresses:
left interface of PE1: gei-0/2/0/1 20.1.1.1/24, right interface of PE1: gei-0/1/0/1
100.1.12.1/24;
left interface of ASBR1: gei-0/1/0/2 100.1.12.2/24, right interface of ASBR1:
gei-0/1/0/3 100.1.23.2/24;
left interface of ASBR2: gei-0/1/0/4 100.1.23.3/24, right interface of ASBR2:
gei-0/1/0/5 100.1.34.3/24;
left interface of PE4: gei-0/1/0/6 100.1.34.4/24, right interface of PE4: gei-0/2/0/2
30.1.1.4/24;
2. Configure a loopback interface for each router. From left to right, the loopback
addresses are: 100.1.5.1/32, 100.1.5.2/32, 100.1.5.3/32, and 100.1.5.4/32.
3. PE1 and ASBR1 are in AS100. PE4 and ASBR2 are in AS200.
4. Establish MPEBGP neighbor between PE1 and PE4 to announce the VPNv4 route.
In addition, do not activate the IPv4 neighbor.
3-108
Configuration Command
For the configuration of OSPF and LDP between PEs, refer to section "Configuring MPLS
L3VPN Public Network LDP Load Sharing".
PE1(config)#interface gei-0/2/0/1
PE1(config-if-gei-0/2/0/1)#no shutdown
PE1(config-if-gei-0/2/0/1)#ip vrf forwarding vpn1
PE1(config-if-gei-0/2/0/1)#ip address 20.1.1.1 255.255.255.0
PE1(config-if-gei-0/2/0/1)#exit
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 100.1.5.1 255.255.255.255
PE1(config-if-loopback1)#exit
PE1(config)#router ospf 10
PE1(config-ospf-10)#router-id 100.1.5.1
PE1(config-ospf-10)#network 100.1.0.0 0.0.255.255 area 0
PE1(config-ospf-10)#exit
Establish MPEBGP neighbor between PE1 and PE4 to announce the VPNv4 route. In
addition, do not activate the IPv4 neighbor.
3-109
PE2(config)#interface loopback1
PE2(config-if-loopback1)#ip address 100.1.5.2 255.255.255.255
PE2(config-if-loopback1)#exit
PE2(config)#router ospf 10
PE2(config-ospf-10)#router-id 100.1.5.2
PE2(config-ospf-10)#network 100.1.0.0 0.0.255.255 area 0
PE2(config-ospf-10)#redistribute bgp-ext
PE2(config-ospf-10)#exit
3-110
PE3(config)#interface loopback1
PE3(config-if-loopback1)#ip address 100.1.5.3 255.255.255.255
PE3(config-if-loopback1)#exit
PE3(config)#router ospf 10
PE3(config-ospf-10)#router-id 100.1.5.3
PE3(config-ospf-10)#network 100.1.0.0 0.0.255.255 area 0
PE3(config-ospf-10)#redistribute bgp-ext
PE3(config-ospf-10)#exit
PE3(config)#ipv4-access-list zte
PE3(config-ipv4-acl)#rule 1 permit 100.1.5.4 0.0.0.0
PE3(config-ipv4-acl)#exit
PE3(config)#route-map zte
PE3(config-route-map)#match ip address zte
PE3(config-route-map)#set mpls-label
PE3(config-route-map)#exit
PE4(config)#interface loopback1
PE4(config-if-loopback1)#ip address 100.1.5.4 255.255.255.255
PE4(config-if-loopback1)#exit
3-111
PE4(config)#router ospf 10
PE4(config-ospf-10)#router-id 100.1.5.4
PE4(config-ospf-10)#network 100.1.0.0 0.0.255.255 area 0
PE4(config-ospf-10)#exit
Configuration Verification
On PE1, run the show bgp vpnv4 unicast summary command to check the VPNv4 neighbor
between router PE1 and router PE4.
PE1#show bgp vpnv4 unicast summary
Neighbor Ver As MsgRcvd MsgSend Up/Down State/PfxRcd
100.1.5.4 4 200 18 7 00:03:24 2
3-112
A PE router saves all VPN routes, including local VPN routes and those received from
remote devices. In addition, each route's prefix carries a private network label, which
consumes some memory. If labels are assigned in per-prefix mode, a lot memory may be
consumed by the prefixes when there are numerous VRFs and routes on PE.
To solve this problem, the per-VRF label feature is introduced. The per-VRF label feature
allows all the local routes under the same VRF to use the same private network label. This
new label is used to decide to which interface of PE or CE a packet is to be forwarded.
3-113
It should be noted that the carrier supporting carrier (CSC) feature must be enabled before
using the per-VRF label feature.
Steps
1. Configure label distribution per VRF for MPLS L3VPN.
Command Function
Command Function
ZXCTN(config)#show ip vrf detail Shows the detailed information about the VRF
[<vrf-name>] instance.
ZXCTN(config)#show ip protocol routing Shows the detailed information about the VRF
vrf <vrf-name> routing table.
End of Steps
3-114
Figure 3-31 Network Structure of VPN Per Label for MPLS L3VPN Configuration
Example
Configuration Flow
1. As shown in Figure 3-31, establish L3VPN for PE1 and PE2.
2. On the access interface between CE1 and PE1, create IS-IS neighbor, and announce
1000 IS-IS routes.
3. Under vrf zte of PE1, configure the VPN per label feature.
Configuration Command
For the configuration of IS-IS and LDP between PEs, refer to section "Configuring MPLS
L3VPN Public Network LDP Load Sharing".
The configuration on PE1 is as follows:
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 100.1.1.2 255.255.255.255
PE1(config-if-loopback1)#exit
3-115
PE1(config-bgp)#exit
PE1(config)#interface gei-0/3/0/4
PE1(config-if-gei-0/3/0/4)#no shutdown
PE1(config-if-gei-0/3/0/4)#ip vrf forwarding zte
PE1(config-if-gei-0/3/0/4)#ip address 192.1.1.1 255.255.255.0
PE1(config-if-gei-0/3/0/4)#exit
PE2(config)#interface gei-0/5/0/3
3-116
PE2(config-if-gei-0/5/0/3)#no shutdown
PE2(config-if-gei-0/5/0/3)#ip vrf forwarding zte
PE2(config-if-gei-0/5/0/3)#ip address 193.1.1.1 255.255.255.0
PE2(config-if-gei-0/5/0/3)#exit
Configuration Verification
The verification on PE1 is as follows:
PE1(config)#show ip protocol routing vrf zte
/*PE1 assigns a label "212994" only for these 1000 private network routes*/
3-117
l Enabling the GR function and LDP-GR function on the routing protocol used for an
LDP Router-ID
l Enabling the GR function and BGP-GR function on the routing protocol used for an
MPBGP link address
An LDP Router-ID can use IS-IS or OSPF for advertisement, so the GR function must be
enabled for the IS-IS or OSPF protocol. It must also be enabled for the LDP protocol.
MPBGP uses an LDP Router-ID as the link address, so its GR function is enabled during
the LDP-GR configuration. In addition, the BGP-GR function needs to be configured.
Steps
1. Configure IS-IS GR.
a. Enable the IS-IS GR function.
Command Function
3-118
Command Function
Command Function
3-119
Command Function
Command Function
Command Function
ZXCTN#show mpls ldp graceful-restart instance <instance-id> Displays the LDP GR configuration.
ZXCTN#show mpls ldp neighbor graceful-restart instance Displays the LDP GR neighbor
<instance-id> information.
3-120
Command Function
End of Steps
Configuration Flow
1. Establish an L3VPN environment between PE1 and PE2 through OSPF.
2. Establish OSPF neighbor relationships between CE1 and PE1, and between CE2 and
PE2.
3. Enable OSPF GR on CE1 and CE2, enable OSPF GR, LDP GR, and BGP GR on PE1
and PE2, and enable OSPF GR and LDP GR on P.
Configuration Commands
For the OSPF, LDP, and BGP configurations between PEs, refer to the MPLS L3VPN
Basic Function Configuration section.
Configure GR on CE1 as follows:
CE1(config)#router ospf 2
CE1(config-ospf-2)#nsf
3-121
CE1(config-ospf-2)#exit
PE1(config)#router bgp 1
PE1(config-bgp)#bgp graceful-restart
PE1(config-bgp)#exit
Configure GR on P as follows:
P(config)#router ospf 1
P(config-ospf-1)#nsf
P(config-ospf-1)#exit
PE2(config)#router bgp 1
PE2(config-bgp)#bgp graceful-restart
PE2(config-bgp)#exit
3-122
CE2(config)#router ospf 2
CE2(config-ospf-2)#nsf
CE2(config-ospf-2)#exit
Configuration Verification
Check the PE1 configuration as follows:
R1(config-ldp)#show bgp all summary
Neighbor Ver As MsgRcvd MsgSend Up/Down State
1.1.1.2 4 1 681 680 05:40:18 Established
3-123
3-124
l The PE devices that are directly connected to CE devices are called Underlayer PE
or User-end PE (UPE).
l The PE devices that are connected to UPE are called Superstratum PE or Service
provider-end PE (SPE).
Multiple UPE devices and one SPE device make up the layered PE architecture and
provide the functions of one traditional PE device. For the HoPE architecture, see Figure
3-33.
3-125
l UPE is used for user access to the MPLS network. It maintains only the routes of the
VPN sites that are directly connected to it, and does not maintain the specific routes of
remote VPN sites. UPE distributes VPN labels to the routes of the directly-connected
VPN sites, and advertises the VPN labels to SPE together with the VPN routes through
MPBGP.
l SPE maintains and spreads VPN routes. It maintains the routes of all the VPNs
attached to the SPE or the UPEs connected to the SPE, including the routes of local
and remote sites. SPE advertises the default routes to UPE together with MPLS
labels.
The functions of SPE and UPE depend on their features. SPE has a large routing table
(thus providing a high forwarding capability) but with a small number of interfaces. UPE
has a low routing and forwarding capability, but provides a high access capability through
a large number of UPE devices. HoPE leverages the high forwarding capability of SPE
and high access capability of UPE.
UPE and SPE are relative terms. In a multilevel HoPE architecture, a higher-layer PE can
be defined as an SPE, and a lower-layer PE can be defined as a UPE.
The MPBGP protocol used between SPE and UPE can be MPIBGP or MPEBGP,
depending on whether SPE and UPE are in the same AS.
3-126
In Figure 3-34, the left part shows a traditional flat network structure, where an MPLS
backbone network is used to provide the MPLS L3VPN service. PE of a backbone
network is located in a central city, and CE devices converge at the PE node. The right
part shows a HoPE architecture, where UPE nodes are deployed in common cities
to make up a layered structure. Nearby VPN users can access an MPLS backbone
network through UPE easily, and thus the network coverage is expanded.
l Multilevel HoPE
Figure 3-35 shows a typical network architecture of a multilevel HoPE application.
In Figure 3-35, an MPE is the SPE for the county-level UPE, and is also the UPE for the
province-level SPE. SPE advertises default routes to MPE, and MPE advertises the
3-127
default routes to UPE. UPE maintains only the local routes and default routes, and
MPE maintains only the specific routes, local routes, and default routes of multiple
UPE devices attached to the MPE.
Prerequisite
VRF instances are configured.
Steps
1. Configure MPLS L3VPN HoPE.
After a neighbor or neighbor peer group is set to UPE (spoke-PE), VPN routes from
the UPE will be automatically reflected to non-UPE devices.
2. Verify the configurations.
Command Function
ZXCTN#show bgp vpnv4 unicast summary Displays all the BGP vpnv4
neighbors.
ZXCTN#show ip forwarding route vrf <vrf-name>{[{<Network to Displays the VPN routing and
display informatio>}[<Network mask>{weak-match|exact-matc forwarding table of a VRF.
h}]]|[<Protocol name>]}
3-128
Command Function
ZXCTN#show bgp vpnv4 unicast detail {<0-65535 Displays the information about
>:<0-4294967295>|<1-65535>.<0-65535>:<0-65535>| VPNv4 route unicast.
A.B.C.D:<0-65535>}<ipv4-address><ipv4-mask>
End of Steps
Configuration Description
Figure 3-36 shows the network structure for single-level HoPE configuration.
Configuration Flow
1. Configure OSPF globally to establish OSPF neighbor relationships.
2. Configure LDP globally to establish LDP neighbor relationships.
3. Configure a VRF instance with the same RT attributes on each device.
4. Establish MPBGP neighbor relationships between UPE1 and SPE1, SPE1 and SPE2,
and SPE2 and UPE2.
5. On SPE1, set UPE1 as its UPE device. On SPE2, set UPE2 as its UPE device.
6. Configure the VRFs for the access of each CE to the corresponding PE.
Configuration Commands
For the OSPF and LDP configurations between PEs, refer to the MPLS L3VPN Basic
Function Configuration section.
Configure UPE1 as follows:
UPE1(config)#ip vrf hpe
UPE1(config-vrf-hpe)#rd 4:4
UPE1(config-vrf-hpe)#address-family ipv4
UPE1(config-vrf-hpe-af-ipv4)#route-target 4:4
UPE1(config-vrf-hpe-af-ipv4)#exit
3-129
UPE1(config-vrf-hpe)#exit
UPE1(config)#interface gei-0/0/1/3.1
UPE1(config-if-gei-0/0/1/3.1)#ip vrf forwarding hpe
UPE1(config-if-gei-0/0/1/3.1)#ip address 37.0.1.1 255.255.255.0
UPE1(config-if-gei-0/0/1/3.1)#exit
UPE1(config)#vlan-configuration
UPE1(config-vlan)#interface gei-0/0/1/3.1
UPE1(config-vlan-if-gei-0/0/1/3.1)#encapsulation-dot1q 1
UPE1(config-vlan-if-gei-0/0/1/3.1)#exit
UPE1(config-vlan)#exit
SPE1(config)#interface gei-0/0/1/1.100
SPE1(config-if-gei-0/0/1/1.100)#ip vrf forwarding hpe
SPE1(config-if-gei-0/0/1/1.100)#ip address 51.0.1.1 255.255.255.0
SPE1(config-if-gei-0/0/1/1.100)#exit
SPE1(config)#vlan-configuration
SPE1(config-vlan)#interface gei-0/0/1/1.100
SPE1(config-vlan-if-gei-0/0/1/1.100)#encapsulation-dot1q 100
SPE1(config-vlan-if-gei-0/0/1/1.100)#exit
SPE1(config-vlan)#exit
3-130
SPE1(config-bgp)#no synchronization
SPE1(config-bgp)#neighbor 11.11.11.37 remote-as 200
SPE1(config-bgp)#neighbor 11.11.11.37 update-source loopback11
SPE1(config-bgp)#no neighbor 11.11.11.37 activate
SPE1(config-bgp)#neighbor 11.11.11.52 remote-as 200
SPE1(config-bgp)#neighbor 11.11.11.52 update-source loopback11
SPE1(config-bgp)#no neighbor 11.11.11.52 activate
SPE1(config-bgp)#address-family vpnv4
SPE1(config-bgp-af-vpnv4)#neighbor 11.11.11.37 activate
SPE1(config-bgp-af-vpnv4)#neighbor 11.11.11.37 default-originate vrf hpe
SPE1(config-bgp-af-vpnv4)#neighbor 11.11.11.37 virtual-spoke reflect-next-hop-self
SPE1(config-bgp-af-vpnv4)#neighbor 11.11.11.52 activate
SPE1(config-bgp-af-vpnv4)#exit
SPE1(config-bgp)#address-family ipv4 vrf hpe
SPE1(config-bgp-af-ipv4-vrf)#redistribute connected
SPE1(config-bgp-af-ipv4-vrf)#exit
SPE1(config-bgp)#exit
SPE2(config)#interface gei-0/4/0/7.1
SPE2(config-if-gei-0/4/0/7.1)#ip vrf forwarding hpe
SPE2(config-if-gei-0/4/0/7.1)#ip address 52.0.1.1 255.255.255.0
SPE2(config-if-gei-0/4/0/7.1)#exit
SPE2(config)#vlan-configuration
SPE2(config-vlan)#interface gei-0/4/0/7.1
SPE2(config-vlan-if-gei-0/4/0/7.1)#encapsulation-dot1q 1
SPE2(config-vlan-if-gei-0/4/0/7.1)#exit
SPE2(config-vlan)#exit
3-131
SPE2(config-bgp)#address-family vpnv4
SPE2(config-bgp-af-vpnv4)#neighbor 11.11.11.53 activate
SPE2(config-bgp-af-vpnv4)#neighbor 11.11.11.53 default-originate vrf hpe
SPE2(config-bgp-af-vpnv4)#neighbor 11.11.11.53 virtual-spoke reflect-next-hop-self
SPE2(config-bgp-af-vpnv4)#neighbor 11.11.11.51 activate
SPE2(config-bgp-af-vpnv4)#exit
SPE2(config-bgp)#address-family ipv4 vrf hpe
SPE2(config-bgp-af-ipv4-vrf)#redistribute connected
SPE2(config-bgp-af-ipv4-vrf)#exit
SPE2(config-bgp)#exit
UPE2(config)#interface gei-0/2/0/11.1
UPE2(config-if-gei-0/2/0/11.1)#ip vrf forwarding hpe
UPE2(config-if-gei-0/2/0/11.1)#ip address 53.0.1.1 255.255.255.0
UPE2(config-if-gei-0/2/0/11.1)#exit
UPE2(config)#vlan-configuration
UPE2(config-vlan)#interface gei-0/2/0/11.1
UPE2(config-vlan-if-gei-0/2/0/11.1)#encapsulation-dot1q 1
UPE2(config-vlan-if-gei-0/2/0/11.1)#exit
UPE2(config-vlan)#exit
Configuration Verification
Check the UPE1 configuration result as follows:
3-132
3-133
as path
as4 path
extended Community:RT:4:4
sent label 213005
3-134
3-135
as4 path
extended Community:RT:4:4
received label notag
02:34:05 advertised to 11.11.11.52 (1.1.1.52)
origin ?,nexthop 11.11.11.51,
as path [200]
as4 path
extended Community:RT:4:4
sent label 157528
3-136
3-137
3-138
3-139
3-140
Configuration Description
Figure 3-37 shows the network structure for multilevel HoPE configuration.
Configuration Flow
1. Configure OSPF gobally to establish OSPF neighbor relationships.
2. Configure LDP gobally to establish LDP neighbor relationships.
3. Configure VRF instances with the same RT attributes on each device.
4. Establish MPBGP neighbor relationships between UPE1 and MPE, MPE and SPE2,
and SPE2 and PE3.
5. On SPE2, set MPE as its UPE. On MPE, set UPE1 as its UPE.
6. On SPE2, advertise the default routes to MPE. After receiving the default routes
(IBGP), MPE does not advertise the routes to UPE1. Thus it is required to set (on
MPE) MPE as RR and UPE1 as the RRC of MPE.
7. Configure the VRFs for the access of each CE to the corresponding PE.
3-141
Configuration Commands
For the OSPF, LDP, and VRF configurations between PEs, refer to the MPLS L3VPN
Basic Function Configuration section.
Configure MPE in BGP vpnv4 address family configuration mode as follows:
MPE(config-bgp-af)#neighbor 11.11.11.37 active
MPE(config-bgp-af)#neighbor 11.11.11.37 default-originate vrf hpe
MPE(config-bgp-af)#neighbor 11.11.11.37 virtual-spoke reflect-next-hop-self
MPE(config-bgp-af)#neighbor 11.11.11.37 route-reflector-client
MPE(config-bgp-af)#neighbor 11.11.11.47 active
Configuration Verification
Check the UPE1 configuration result as follows:
3-142
3-143
3-144
3-145
3-146
as path
as4 path
extended Community:RT:4:4
received label 157621
1d1h advertised to 11.11.11.32 (0.0.0.1)
origin ?,nexthop 11.11.11.47,
as path [200]
as4 path
extended Community:RT:4:4
sent label 951026
3-147
3-148
3-149
l Accelerating the route advertisement to neighbors while reducing the CPU usage
If the BGP update group function is not used, a route update packet needs to
be constructed for each neighbor, which consumes much time during the packet
forwarding process.
3-150
If the BGP update group function is used, a route update packet needs to be
constructed for each update group instead of each neighbor. The same route update
packet can be used for neighbors in an update group. If an update group has a large
number of neighbors, the packet forwarding performance would be largely improved.
Context
The BGP update group function is enabled by default.
Steps
1. Configure BGP update group.
Command Function
ZXCTN#show bgp vpnv4 mcast update-group [<ipv4-address>|<i Displays the mcast update group
pv6-address>|<index>] information in VPN address
family configuration mode.
ZXCTN#show bgp vpnv4 multicast [vrf <vrf-name>] Displays the multicast update
update-group [<ipv4-address>|<ipv6-address>|<index>] group information in VPN
address family configuration
mode.
ZXCTN#show bgp vpnv4 unicast update-group [vrf Displays the unicast update
<vrf-name>][<ipv4-address>|<ipv6-address>|<index>] group information in VPN
address family configuration
mode.
3-151
Command Function
ZXCTN#show bgp vpnv6 unicast update-group [vrf Displays the unicast update
<vrf-name>][<ipv4-address>|<ipv6-address>|<index>] group information in VPNv6
address family configuration
mode.
ZXCTN#show bgp {ipv4 | ipv6} multicast update-group Displays the multicast update
[<ipv4-address>|<ipv6-address>|<index>] group information in IPv4 or IPv6
address family configuration
mode.
ZXCTN#show bgp {ipv4 | ipv6} unicast update-group Displays the unicast update
[<ipv4-address>|<ipv6-address>|<index>] group information in IPv4 or IPv6
address family configuration
mode.
Command Function
ZXCTN#clear ip bgp ipv4 [vrf <vrf-name>] multicast Deletes the multicast update
update-group [<ipv4-address>|<ipv6-address>|<index>] group information in IPv4
address family configuration
mode.
ZXCTN#clear ip bgp ipv4 [vrf <vrf-name>] unicast update-group Deletes the unicast update group
[<ipv4-address>|<ipv6-address>|<index>] information in IPv4 address
family configuration mode.
ZXCTN#clear ip bgp ipv6 [vrf <vrf-name>] unicast update-group Deletes the unicast update group
[<ipv4-address>|<ipv6-address>|<index>] information in IPv6 address
family configuration mode.
ZXCTN#clear ip bgp vpnv4 mcast update-group Deletes the mcast update group
[<ipv4-address>|<ipv6-address>|<index>] information in VPN address
family configuration mode.
3-152
Command Function
ZXCTN#clear ip bgp vpnv4 unicast update-group Deletes the unicast update group
[<ipv4-address>|<ipv6-address>|<index>] information in VPN address
family configuration mode.
ZXCTN#clear ip bgp vpnv6 unicast update-group Deletes the unicast update group
[<ipv4-address>|<ipv6-address>|<index>] information in VPNv6 address
family configuration mode.
End of Steps
Configuration Flow
1. Establish a BGP neighbor relationship between R1 and R2 through the gei-0/1/0/1
interfaces.
2. Establish new neighbor relationships through the gei-0/1/0/1 and gei-0/1/0/2 interfaces
of R1 and R2.
3. To enable a new neighbor relationship to be in an exclusive update group, run the
split-update-group command.
Configuration Commands
1. Establish a BGP neighbor relationship between R1 and R2 through the gei-0/1/0/1
interfaces.
Configure R1 as follows:
R1(config)#router bgp 65530
R1(config-bgp)#neighbor 10.1.1.3 remote-as 1
R1(config-bgp)#exit
Configure R2 as follows:
R2(config)#router bgp 1
R2(config-bgp)#neighbor 10.1.1.1 remote-as 65530
3-153
R2(config-bgp)#exit
Run the show ip bgp summary command on R1. The BGP neighbor relationship is
established.
R1(config-bgp)#show ip bgp summary
Neighbor Ver As MsgRcvd MsgSend Up/Down State/PfxRcd
10.1.1.3 4 1 3 0 00:08:22 1
Run the show ip bgp update-group command on R1. An update group is established,
and the neighbor is added into the BGP update group.
R1(config-bgp)#show ip bgp update-group
Index: 1
Number of static caches: 10 use 0
Has 1 members:
Normal peer:
10.1.1.3
2. Establish a BGP neighbor relationship between R1 and R2 through the gei-0/1/0/1 and
gei-0/1/0/2 interfaces.
Configure R1 as follows:
R1(config)#router bgp 65530
R1(config-bgp)#neighbor 10.1.1.3 remote-as 1
R1(config-bgp)#neighbor 20.1.1.3 remote-as 1
R1(config-bgp)#exit
Configure R2 as follows:
R2(config)#router bgp 1
R2(config-bgp)#neighbor 10.1.1.1 remote-as 65530
R2(config-bgp)#neighbor 20.1.1.1 remote-as 65530
R2(config-bgp)#exit
Run the show ip bgp summary command on R1. The BGP neighbor relationship is
established.
R1(config-bgp)#show ip bgp summary
Neighbor Ver As MsgRcvd MsgSend Up/Down State/PfxRcd
10.1.1.3 4 1 3 1 00:04:55 1
20.1.1.3 4 1 3 1 00:01:59 1
Run the show ip bgp update-group command on R1. The neighbor 20.1.1.3 is added
into the BGP update group.
3-154
Configure R2 as follows:
R2(config)#router bgp 1
R2(config-bgp)#neighbor 10.1.1.1 remote-as 65530
R2(config-bgp)#neighbor 20.1.1.1 remote-as 65530
R2(config-bgp)#neighbor 10.1.1.1 activate
R2(config-bgp)#neighbor 20.1.1.1 activate
R2(config-bgp)#exit
After the neighbor relationship output policies are modified, verify on R1 that the BGP
neighbor relationships are normal.
R1(config-bgp)#show ip bgp summary
Neighbor Ver As MsgRcvd MsgSend Up/Down State/PfxRcd
10.1.1.3 4 1 3 2 00:28:45 1
20.1.1.3 4 1 3 3 00:25:49 1
Run the show ip bgp update-group command on R1. The devices with the IP addresses
10.1.1.3 and 20.1.1.3 are in different BGP update groups.
R1(config-bgp)#show ip bgp update-group
Index: 1
Number of static caches: 10 use 0
Has 1 members:
Normal peer: 20.1.1.3
Index: 2
Number of static caches: 10 use 0
Has 1 members:
Normal peer:
10.1.1.3
Run the no neighbor 20.1.1.3 split-update-group command on R1, and then run the
show ip bgp update-group command. The devices with the IP addresses 10.1.1.3 and
20.1.1.3 are in the same BGP update group.
3-155
Steps
1. Create a tunnel policy.
Command Function
3-156
Command Function
End of Steps
Example
Run the following commands to create the tunnel policy zte_1:
ZXCTN(config)#tunnel-policy zte_1
ZXCTN(config-tunnel-policy-zte_1)#exit
Run the following commands to set the type of the tunnel policy zte_1 to tunnel preferring,
set the egress interface of the preferred tunnel to te_tunnel1, and disable the fallback
function:
3-157
ZXCTN(config)#tunnel-policy zte_1
ZXCTN(config-tunnel-policy-zte_1)#tunnel preferring mpls-te te_tunnel1 disable-fallback
ZXCTN(config-tunnel-policy-zte_1)#exit
Run the following commands to set the type of the tunnel policy zte_2 to tunnel preferring,
and set the egress interface of the preferred tunnel to te_tunnel1 (the fallback function is
enabled by default):
ZXCTN(config)#tunnel-policy zte_2
ZXCTN(config-tunnel-policy-zte_2)#tunnel preferring mpls-te te_tunnel1
ZXCTN(config-tunnel-policy-zte_2)#exit
Run the following commands to set the type of the tunnel policy zte_4 to automatic:
ZXCTN(config)#tunnel-policy zte_4
ZXCTN(config-tunnel-policy-zte_4)#tunnel selecting auto
ZXCTN(config-tunnel-policy-zte_4)#exit
Run the following commands to set the type of the tunnel policy zte_5 to tunnel specifying,
and set the tunnel egress interface to te_tunnel1:
ZXCTN(config)#tunnel-policy zte_5
ZXCTN(config-tunnel-policy-zte_5)#tunnel selecting mpls-te te_tunnel1
ZXCTN(config-tunnel-policy-zte_5)#exit
Run the following commands to set the LSP selecting sequence of the tunnel policy zte_1
to LDP preferred:
ZXCTN(config)#tunnel-policy zte_1
ZXCTN(config-tunnel-policy-zte_1)#tunnel select-seq ldp-lsp te-lsp
ZXCTN(config-tunnel-policy-zte_1)#exit
3-158
Configuration Flow
1. Configure IP addresses and loopback addresses of interfaces. Establish an OSPF
neighbor relationship between PE1 and PE2 through the gei-0/0/1/9 interfaces, and
establish an LDP neighbor relationship through the directly connected interfaces.
2. Configure a BGP VPNv4 neighbor relationship between PE1 and PE2.
3. Bind the loopback interfaces of PE1 and PE2 to a VRF respectively, and redistributes
the directly connected routes to the VRF to BGP.
4. Set the tunnel policy so that LDP tunnels are preferred. Set exterior tunnels as static
TE tunnels.
Configuration Commands
Configure PE1 as follows:
PE1(config)#interface gei-0/0/1/9
PE1(config-if-gei-0/0/1/9)#ip address 190.1.1.1 255.255.255.0
PE1(config-if-gei-0/0/1/9)#no shutdown
PE1(config-if-gei-0/0/1/9)#exit
PE1(config)#interface loopback11
PE1(config-if-loopback11)#ip address 1.1.1.1 255.255.255.255
PE1(config-if-loopback11)#exit
PE1(config)#router ospf 11
PE1(config-ospf-11)#network 190.1.1.0 0.0.0.255 area 0.0.0.0
PE1(config-ospf-11)#network 1.1.1.1 0.0.0.0 area 0.0.0.0
PE1(config-ospf-11)#router-id 190.1.1.1
PE1(config-ospf-11)#exit
PE1(config)#tunnel-policy abc
PE1(config-tunnel-policy-abc)#tunnel select-seq ldp-lsp te-lsp
PE1(config-tunnel-policy-abc)#exit
3-159
PE1(config)#interface Loopback1
PE1(config-if-loopback1)#ip vrf forwarding test
PE1(config-if-loopback1)#ip address 11.1.1.1 255.255.255.255
PE1(config-if-loopback1)exit
PE1(config)#interface te_tunnel1
PE1(config-if-te_tunnel1)#exit
PE1(config)#mpls traffic-eng
PE1(config-mpls-te)#router-id 1.1.1.1
PE1(config-mpls-te)#interface loopback11
PE1(config-mpls-te-if-loopback11)#exit
PE1(config-mpls-te)#interface gei-0/0/1/9
PE1(config-mpls-te-if-gei-0/0/1/9)#exit
PE1(config-mpls-te)#static te_tunnel1
PE1(config-mpls-te-static-te_tunnel1)#role ingress type unidirectional
PE1(config-mpls-te-static-te_tunnel1)#ingress-tunnel-id 1 ingress 1.1.1.1
egress 2.2.2.2
PE1(config-mpls-te-static-te_tunnel1)#lsp 1
PE1(config-mpls-te-static-te_tunnel1-lsp)#out-seg-info out-port gei-0/0/1/9
out-label 3 next-hop 190.1.1.2
PE1(config-mpls-te-static-te_tunnel1-lsp)#exit
PE1(config-mpls-te-static-te_tunnel1)#exit
PE1(config-mpls-te)#exit
PE2(config)#interface gei-0/0/1/9
PE2(config-if-gei-0/0/1/9)#ip address 190.1.1.2 255.255.255.0
PE2(config-if-gei-0/0/1/9)#no shutdown
PE2(config-if-gei-0/0/1/9)#exit
3-160
PE2(config)#interface loopback12
PE2(config-if-loopback11)#ip address 2.2.2.2 255.255.255.255
PE2(config-if-loopback11)#exit
PE2(config)#router ospf 11
PE2(config-ospf-11)#network 190.1.1.0 0.0.0.255 area 0.0.0.0
PE2(config-ospf-11)#network 2.2.2.2 0.0.0.0 area 0.0.0.0
PE2(config-ospf-11)#router-id 190.1.1.2
PE2(config-ospf-11)#exit
PE2(config)#interface Loopback1
PE2(config-if-loopback1)#ip vrf forwarding test
PE2(config-if-loopback1)#ip address 22.1.1.1 255.255.255.255
PE2(config-if-loopback1)#exit
PE2(config)#interface te_tunnel32775
PE2(config-if-te_tunnel32775)#exit
3-161
PE2(config)#mpls traffic-eng
PE2(config-mpls-te)#router-id 2.2.2.2
PE2(config-mpls-te)#interface loopback12
PE2(config-mpls-te-if-loopback12)#exit
PE2(config-mpls-te)#interface gei-0/0/1/9
PE2(config-mpls-te-if-gei-0/0/1/9)#exit
PE2(config-mpls-te)#static te_tunnel32775
PE2(config-mpls-te-static-te_tunnel32775)#role egress type unidirectional
PE2(config-mpls-te-static-te_tunnel32775)#ingress-tunnel-id 1 ingress 1.1.1.1
egress 2.2.2.2
PE2(config-mpls-te-static-te_tunnel32775)#lsp 1
PE2(config-mpls-te-static-te_tunnel32775-lsp)#in-seg-info in-port gei-0/0/1/9
in-label 3
PE2(config-mpls-te-static-te_tunnel32775-lsp)#exit
PE2(config-mpls-te-static-te_tunnel32775)#exit
PE2(config-mpls-te)#exit
Configuration Verification
Check the TE tunnel as follows:
PE1(config-mpls-te)#show mpls traffic-eng static
Name: tunnel_1
Status:
Admin Status: up Protocol Status: up
Actual Bandwidth: N/A
Basic Config Parameters:
Ingress-TnnlID:1 IngressID:1.1.1.1 EgressID:2.2.2.2
Tunnel Type: Unidirect Role: Ingress
Policy Class:
Perf Switch: off
Binded LSP 1
Positive Forward Info:
in-port:
in-label:
out-port: gei-0/0/1/9
out-label:3
next-hop: 190.1.1.2
bandwidth: 0
burst: 0
peak: 0
excess-burst: 0
3-162
3-163
Therefore, the BGP RT constrained route distribution is introduced in RFC to solve this
problem. The main idea of the BGP RT constrained route distribution is that the route
distribution is constrained on the outbound direction, thus saving the router resources of
PE-3 and PE-4.
3-164
Operation Procedure
l VPN operation procedure in an AS
Figure 3-41 shows the operation procedure.
Routers C and J, as non-transition and border ASs, do not need to know VPNv4
routing information. Routers G and H are not on the shortest path between routers A
and I, which are also excluded from the advertised path of the VPNv4 route. To arrive
at this destination, assume that an RTC route is started from router I. There are two
paths from router E to router I: (I, F, E) and (I, H, G, E). Router E selects the path (I, F,
E) with a shorter AS_PATH, and forwards this path to routers B and D, which forward
this path to router A. Assume that path (E, B, A) is selected on router A. The path that
the VPN route is advertised from router A to router I is (A, B, E, F, I), but routers D,
G, and H on the suboptimal paths (E, D, A) and (I, H, G, E) will not receive the VPN
route.
3-165
Steps
1. Configure a BGP route-target route.
Command Function
3-166
Command Function
<wait-time>: maximum duration of the local router waiting for a neighbor to send
an end-of-rib packet under the Route-Target address family before the local router
advertises the VPNv4 route, after establishment of a BGP Route-Target link. Unit:
seconds, default: 60 seconds.
disable: After the RT filter is disabled, the VPNv4 and VPNv6 routes will not be filtered
based on the import RT of the peer end. By default, the RT filter is enabled.
<path-number>: maximum number of external paths. Default: 1.
Command Function
ZXCTN#show bgp ipv4 route-target detail <as-number Shows the detailed information
>{<0-65535>:<0-4294967295>|<1-65535>.<0-65535>:<0-65535 about a BGP Route-Target route.
>|A.B.C.D:<0-65535>}
ZXCTN#show bgp ipv4 route-target neighbor [in | Shows the Route-Target routing
out]<ip-address> information received from or
advertised to neighbors.
End of Steps
3-167
Configuration Flow
1. Establish the IBGP neighbor relationship between R1 and R2.
2. Activate the neighbor relationship in the Route-Target address family of R1 and R2
separately.
Configuration Commands
Configuration on R1:
R1(config)#interface gei-0/1/0/1
R1(config-if-gei-0/1/0/1)#no shutdown
R1(config-if-gei-0/1/0/1)#ip address 1.1.1.1 255.255.255.0
R1(config-if-gei-0/1/0/1)#exit
R1(config)#interface loopback1
R1(config-if-loopback1)#ip address 4.4.4.4 255.255.255.255
R1(config-if-loopback1)#exit
R1(config)#router ospf 1
R1(config-ospf-1)#router-id 4.4.4.4
R1(config-ospf-1)#network 4.4.4.4 0.0.0.0 area 0
R1(config-ospf-1)#network 1.1.1.0 0.0.0.255 area 0
R1(config-ospf-1)#exit
R1(config)#router bgp 2
R1(config-bgp)#neighbor 5.5.5.5 remote-as 2
R1(config-bgp)#neighbor 5.5.5.5 update-source loopback1
R1(config-bgp)#address-family route-target
3-168
Configuration on R2:
R2(config)#interface gei-0/1/0/1
R2(config-if-gei-0/1/0/1)#no shutdown
R2(config-if-gei-0/1/0/1)#ip address 1.1.1.2 255.255.255.0
R2(config-if-gei-0/1/0/1)#exit
R2(config)#interface loopback1
R2(config-if-loopback1)#ip address 5.5.5.5 255.255.255.255
R2(config-if-loopback1)#exit
R2(config)#router ospf 1
R2(config-ospf-1)#router-id 5.5.5.5
R2(config-ospf-1)#network 1.1.1.0 0.0.0.255 area 0
R2(config-ospf-1)#network 5.5.5.5 0.0.0.0 area 0
R2(config-ospf-1)#exit
R2(config)#mpls ldp instance 1
R2(config-ldp-1)#interface gei-0/1/0/1
R2(config-ldp-1-if-gei-0/1/0/1)#exit
R2(config-ldp-1)#router-id loopback1
R2(config-ldp-1)#exit
R2(config)#router bgp 2
R2(config-bgp)#neighbor 4.4.4.4 remote-as 2
R2(config-bgp)#neighbor 4.4.4.4 update-source loopback1
R2(config-bgp)#address-family route-target
R2(config-bgp-af-rt)#neighbor 4.4.4.4 activate
R2(config-bgp-af-rt)#exit
R2(config-bgp)#exit
R2(config)#interface loopback21
R2(config-if-loopback21)#ip vrf forwarding vrf1
R2(config-if-loopback21)#ip address 21.1.1.5 255.255.255.0
R2(config-if-loopback21)#exit
Configuration Verification
Check information about the BGP route-target routes on R1:
3-169
3-170
3-171
Connections established 1
Last error code is 6, last error subcode is 5
Local host: 4.4.4.4, Local port: 179
Foreign host: 5.5.5.5, Foreign port: 20427
3-172
3-173
3-174
Steps
1. Enable pimsm mode.
4-1
4-2
Command Function
Command Function
ZXCTN#show ip pim nexthop [vrf <vrf-name>][dest-add Shows the route from PIM-SM to RP
ress <dest-address>] or to the multicast source.
4-3
Command Function
End of Steps
Configuration Flow
1. Configure MPLS VPN enviroment.
2. Configure public network multicast and private network multicast on PE1.
3. Configure public network multicast on P.
4. Configure public network multicast and private network multicast on PE2.
Configuration Command
1. Configure MPLS VPN enviroment.
Configuration on PE1:
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip address 1.1.1.17 255.255.255.255
PE1(config-if-loopback1)#exit
PE1(config)#interface gei-0/1/0/1
PE1(config-if-gei-0/1/0/1)#no shutdown
PE1(config-if-gei-0/1/0/1)#ip address 100.101.102.17 255.255.255.0
PE1(config-if-gei-0/1/0/1)#exit
4-4
PE1(config)#router ospf 1
PE1(config-ospf-1)#router-id 1.1.1.17
PE1(config-ospf-1)#network 1.1.1.17 0.0.0.0 area 0
PE1(config-ospf-1)#network 100.101.102.0 0.0.0.255 area 0
PE1(config-ospf-1)#exit
PE1(config)#interface gei-0/1/0/3
PE1(config-if-gei-0/1/0/3)#no shutdown
PE1(config-if-gei-0/1/0/3)#ip vrf forwarding test
PE1(config-if-gei-0/1/0/3)#ip address 100.105.102.17 255.255.255.0
PE1(config-if-gei-0/1/0/3)#exit
PE1(config)#router bgp 1
/*Note: The loopback interface must be used to establish a BGP neighbor
relationship.*/
PE1(config-bgp)#neighbor 1.1.1.19 remote-as 1
PE1(config-bgp)#neighbor 1.1.1.19 activate
PE1(config-bgp)#neighbor 1.1.1.19 update-source loopback1
PE1(config-bgp)#address-family ipv4 vrf test
PE1(config-bgp-af-ipv4-vrf)#redistribute connected
PE1(config-bgp-af-ipv4-vrf)#exit
PE1(config-bgp)#address-family vpnv4
PE1(config-bgp-af-vpnv4)#neighbor 1.1.1.19 activate
PE1(config-bgp-af-vpnv4)#exit
Configuration on P:
P(config)#interface loopback1
P(config-if-loopback1)#ip address 1.1.1.18 255.255.255.255
P(config-if-loopback1)#exit
P(config)#interface gei-0/1/0/1
P(config-if-gei-0/1/0/1)#no shutdown
P(config-if-gei-0/1/0/1)#ip address 100.101.102.18 255.255.255.0
4-5
P(config-if-gei-0/1/0/1)#exit
P(config)#interface gei-0/1/0/2
P(config-if-gei-0/1/0/2)#no shutdown
P(config-if-gei-0/1/0/2)#ip address 100.103.102.18 255.255.255.0
P(config-if-gei-0/1/0/2)#exit
P(config)#router ospf 1
P(config-ospf-1)#router-id 1.1.1.18
P(config-ospf-1)#network 1.1.1.18 0.0.0.0 area 0
P(config-ospf-1)#network 100.101.102.0 0.0.0.255 area 0
P(config-ospf-1)#network 100.103.102.0 0.0.0.255 area 0
P(config-ospf-1)#exit
PE2(config)#router ospf 1
PE2(config-ospf-1)#router-id 1.1.1.19
PE2(config-ospf-1)#network 1.1.1.19 0.0.0.0 area 0
PE2(config-ospf-1)#network 100.103.102.0 0.0.0.255 area 0
PE2(config-ospf-1)#exit
4-6
PE2(config-vrf-test)#address-family ipv4
PE2(config-vrf-test-af-ipv4)#exit
PE2(config-vrf-test)#!
PE2(config)#interface gei-0/1/0/3
PE2(config-if-gei-0/1/0/3)#no shutdown
PE2(config-if-gei-0/1/0/3)#ip vrf forwarding test
PE2(config-if-gei-0/1/0/3)#ip address 100.106.102.19 255.255.255.0
PE2(config-if-gei-0/1/0/3)#exit
PE2(config)#router bgp 1
PE2(config-bgp)#neighbor 1.1.1.17 remote-as 1
PE2(config-bgp)#neighbor 1.1.1.17 activate
PE2(config-bgp)#neighbor 1.1.1.17 update-source loopback1
PE2(config-bgp)#address-family ipv4 vrf test
PE2(config-bgp-af-ipv4-vrf)#redistribute connected
PE2(config-bgp-af-ipv4-vrf)#exit
PE2(config-bgp)#address-family vpnv4
PE2(config-bgp-af-vpnv4)#neighbor 1.1.1.17 activate
PE2(config-bgp-af-vpnv4)#exit
PE2(config-bgp)#exit
2. Configure multicast on PE1.
Configure public network multicast.
PE1(config)#ip multicast-routing
PE1(config-mcast)#router pim
PE1(config-mcast-pim)#interface loopback1
PE1(config-mcast-pim-if-loopback1)#pimsm
PE1(config-mcast-pim-if-loopback1)#exit
PE1(config-mcast-pim)#interface gei-0/1/0/1
PE1(config-mcast-pim-if-gei-0/1/0/1)#pimsm
PE1(config-mcast-pim-if-gei-0/1/0/1)#exit
PE1(config-mcast-pim)#rp-candidate loopback1
/*The public network must have one or more RP.*/
PE1(config-mcast-pim)#bsr-candidate loopback1
PE1(config-mcast-pim)#exit
PE1(config-mcast)#exit
PE1(config-mcast)#vrf test
PE1(config-mcast-vrf-test)#router pim
PE1(config-mcast-vrf-test-pim)#interface gei-0/1/0/3
PE1(config-mcast-vrf-test-pim-if-gei-0/1/0/3)#pimsm
PE1(config-mcast-vrf-test-pim-if-gei-0/1/0/3)#exit
PE1(config-mcast-vrf-test-pim)#rp-candidate gei-0/1/0/3
4-7
4-8
PE2(config-mcast)#exit
Configuration Verification
When MPLS VPN is established, execute the show ip forwarding route vrf test command
on PE1 and PE2, as shown in the following:
PE1(config)#show ip forwarding route vrf test
IPv4 Routing Table:
Headers: Dest: Destination, Gw: Gateway, Pri: Priority;
Codes : BROADC: Broadcast, USER-I: User-ipaddr, USER-S: User-special,
MULTIC: Multicast, USER-N: User-network, DHCP-D: DHCP-DFT,
ASBR-V: ASBR-VPN, STAT-V: Static-VRF, DHCP-S: DHCP-static,
GW-FWD: PS-BUSI, NAT64: Stateless-NAT64, LDP-A: LDP-area,
GW-UE: PS-USER, P-VRF: Per-VRF-label, TE: RSVP-TE;
status codes: *valid, >bes
Dest Gw Interface Owner Pri Metric
100.106.102.0/24 1.1.1.19 gei-0/1/0/1 BGP 200 0
100.105.102.0/24 100.105.102.17 gei-0/1/0/1 DIRECT 0 0
100.105.102.17/32 100.105.102.17 gei-0/1/0/1 ADDRESS 0 0
4-9
4-10
4-11
4-12
In general, system has a data packet which needs to be encapsulated and transmitted to
some destination. We calls this data packet as payload packet. Payload packet is firstly
encapsulated into a GRE data packet. The GRE data packet can be encapsulated into
another kind of protocol and then forwarded. The outer protocol is named as delivery
protocol. The format of a GRE data packet after encapsulation is shown as Figure 5-1.
5-1
GRE tunnels can be divided into GRE over IPv4 tunnels and GRE over IPv6 tunnels. The
source and destination addresses of the two types of GRE tunnels are obtained through
GRE tunnel configurations.
GRE tunnels can also be divided into DS-Lite static tunnels and DS-Lite dynamic tunnels,
which are deployed in CGN. For a DS-Lite static tunnel, the source IP address and
destination IP address need to be manually configured, and for a DS-Lite dynamic tunnel,
only the source IP address needs to be configured.
GRE tunnel can be established on host-host, host-device, device-host and device-device.
The terminal of tunnel is the final destination of message or the message needs to be
forwarded.
GRE over IPv4 Tunnel mainly includes tunnel encapsulation and de-encapsulation.
l Encapsulation procedure
1. When host or router is sending IPv4 flow, if message outgoing interface is tunnel
interface, verify tunnel type first. If it is GRE tunnel, do the encapsulation of IPv4
header, of which IPv4 header source address and destination address are got by
user manual configuration.
2. After encapsulation, the message will be sent by the IPv4 message sending flow.
l De-encapsulation procedure
1. It is the reversed process of encapsulation. Router receives IPv4 data packet.
If IPv4 header protocol number is 47, apply process function of each protocol
of IPv4 registration, enter into GRE de-encapsulation flow, search for matched
tunnel entry according to source address and destination address of message. If
it is found the IPv4 header and GRE header encapsulated by tunnel are removed.
2. The remaining message is handled by IPv4 packet receiving flow.
5-2
Steps
1. Create GRE tunnel interface.
5-3
<key-value>: It means key value used for tunnel security. The range of the key is
0-4294967295.
4. Verify the configurations.
Command Function
5-4
Command Function
Command Function
End of Steps
Steps
1. Create GRE tunnel interface.
5-5
Command Function
Command Function
5-6
Command Function
End of Steps
Steps
1. Create GRE tunnel interface.
Command Function
5-7
Command Function
Command Function
End of Steps
Steps
1. Create GRE tunnel interface.
5-8
Command Function
Command Function
End of Steps
Steps
1. Create a GRE tunnel interface.
5-9
5-10
Command Function
Command Function
End of Steps
5-11
Configuration Flow
1. Configure the interface IP addresses on R1 and R2, create route to make the two
routers interconnected.
2. Create gre_tunnel interface on global mode and allocate the corresponding IP address.
3. Enter into GRE configuration mode at global configuration mode and enter into the
GRE interface to be configured.
4. Configure GRE on R1 and R2 respectively. Set GRE working mode and bound source
and destination interface addresses.
Configuration Command
Configuration on R1:
R1(config)#interface gei-0/1/0/1
R1(config-if-gei-0/1/0/1)#no shutdown
R1(config-if-gei-0/1/0/1)#ip adderss 100.0.0.1 255.255.255.0
R1(config-if-gei-0/1/0/1)#exit
R1(config)#interface gre_tunnel1
R1(config-if-gre_tunnel1)#ip address 11.0.0.1 255.255.255.0
R1(config-if-gre_tunnel1)#exit
R1(config)#gre-config
R1(config-gre)#interface gre_tunnel1
R1(config-gre-if-gre_tunnel1)#tunnel mode ip
R1(config-gre-if-gre_tunnel1)#tunnel source ipv4 100.0.0.1
R1(config-gre-if-gre_tunnel1)#tunnel destination ipv4 200.0.0.1
R1(config-gre-if-gre_tunnel1)#exit
R1(config-gre)#exit
Configuration on R2:
R2(config)#interface gei-0/2/0/1
R2(config-if-gei-0/2/0/1)#no shutdown
R2(config-if-gei-0/2/0/1)#ip address 200.0.0.1 255.255.255.0
R2(config-if-gei-0/2/0/1)#exit
R2(config)#interface gre_tunnel1
R2(config-if-gre_tunnel1)#ip address 11.0.0.2 255.255.255.0
R2(config-if-gre_tunnel1)#exit
R2(config)#gre-config
R2(config-gre)#interface gre_tunnel1
R2(config-gre-if-gre_tunnel1)#tunnel mode ip
R2(config-gre-if-gre_tunnel1)#tunnel source ipv4 200.0.0.1
R2(config-gre-if-gre_tunnel1)#tunnel destination ipv4 100.0.0.1
R2(config-gre-if-gre_tunnel1)#exit
R2(config-gre)#exit
5-12
Configuration Verification
Check the GRE configuration on R1 and R2, as shown in the following:
R1(config)#show running-config-interface gre_tunnel1
!<if-intf>
interface gre_tunnel1
ip address 11.0.0.1 255.255.255.0
!</if-intf>
!<gre-tunnel >
gre-config
interface gre_tunnel1
tunnel mode ip
tunnel source ipv4 100.0.0.1
tunnel destination ipv4 200.0.0.1
$
$
!</gre-tunnel >
5-13
IPv4 protocol is up
Internet address is 11.0.0.2/24 /*all are up, tunnel is valid.*/
Broadcast address is 255.255.255.255
Address determined by setup command
Load-sharing bandwidth 1000000 Kbps
IP MTU is 1476 bytes
Configuration Flow
1. Configure the interface IP addresses on R1 and R2, create route to make the two
routers interconnected.
2. Create gre_tunnel interface on global mode and allocate the corresponding IPv6
address.
3. Enter into GRE configuration mode at global configuration mode and enter into the
GRE interface to be configured.
4. Configure GRE on R1 and R2 respectively. Set GRE working mode and bound source
and destination interface addresses.
Configuration Command
Configuration on R1:
R1(config)#interface gei-0/1/0/1
R1(config-if-gei-0/1/0/1)#no shutdown
R1(config-if-gei-0/1/0/1)#ip adderss 100.0.0.1 255.255.255.0
R1(config-if-gei-0/1/0/1)#exit
R1(config)#interface gre_tunnel1
5-14
R1(config-if-gre_tunnel1)#ipv6 enable
R1(config-if-gre_tunnel1)#ipv6 address 2010::11/64
R1(config-if-gre_tunnel1)#exit
R1(config)#gre-config
R1(config-gre)#interface gre_tunnel1
R1(config-gre-if-gre_tunnel1)#tunnel mode ip
R1(config-gre-if-gre_tunnel1)#tunnel source ipv4 100.0.0.1
R1(config-gre-if-gre_tunnel1)#tunnel destination ipv4 200.0.0.1
R1(config-gre-if-gre_tunnel1)#tunnel key 1
R1(config-gre-if-gre_tunnel1)#exit
R1(config-gre)#exit
Configuration on R2:
R2(config)#interface gei-0/2/0/1
R2(config-if-gei-0/2/0/1)#no shutdown
R2(config-if-gei-0/2/0/1)#ip address 200.0.0.1 255.255.255.0
R2(config-if-gei-0/2/0/1)#exit
R2(config)#interface gre_tunnel1
R2(config-if-gre_tunnel1)#ipv6 enable
R2(config-if-gre_tunnel1)#ipv6 address 2010::22/64
R2(config-if-gre_tunnel1)#exit
R2(config)#gre-config
R2(config-gre)#interface gre_tunnel1
R2(config-gre-if-gre_tunnel1)#tunnel mode ip
R2(config-gre-if-gre_tunnel1)#tunnel source ipv4 200.0.0.1
R2(config-gre-if-gre_tunnel1)#tunnel destination ipv4 100.0.0.1
R2(config-gre-if-gre_tunnel1)#tunnel key 1
R2(config-gre-if-gre_tunnel1)#exit
R2(config-gre)#exit
Configuration Verification
Check the GRE configuration on R1 and R2, as shown in the following:
5-15
tunnel mode ip
tunnel source ipv4 100.0.0.1
tunnel destination ipv4 200.0.0.1
tunnel key 1
$
$
! </gre-tunnel>
Index 17
Bandwidth 100000 Kbps
IPv6 MTU is 1452 bytes
5-16
inet6 fe80::277:abff:fe13:3301/10
inet6 2010::22/64 /*if invalid, there is [tentative]*/
ND DAD is enabled, number of DAD attemps:3
ND reachable time is 30000 milliseconds
Configuration Flow
1. Configure IPv6 interface addresses of R1 and R2 and save the addresses in the routes
to make them accessible.
2. In global configuration mode, create the gre_tunnel interface and distribute an IPv6
address to the interface.
3. In global configuration mode, enter GRE configuration mode and the GRE interface to
be configured.
4. Configure GRE tunnels for R1 and R2, set the GRE tunnel mode, and set the source
and destination addresses.
Configuration Commands
Configure R1 as follows:
R1(config)#interface gei-0/1/0/1
R1(config-if-gei-0/1/0/1)#no shutdown
R1(config-if-gei-0/1/0/1)#ipv6 enable
R1(config-if-gei-0/1/0/1)# ipv6 address 100::1/64
R1(config-if-gei-0/1/0/1)#exit
R1(config)#interface gre_tunnel1
5-17
R1(config-if-gre_tunnel1)#ipv6 enable
R1(config-if-gre_tunnel1)# ipv6 address 11::1/64
R1(config-if-gre_tunnel1)#exit
R1(config)#gre-config
R1(config-gre)#interface gre_tunnel1
R1(config-gre-if-gre_tunnel1)#tunnel mode ipv6
R1(config-gre-if-gre_tunnel1)#tunnel source ipv6 100::1
R1(config-gre-if-gre_tunnel1)#tunnel destination ipv6 200::1
R1(config-gre-if-gre_tunnel1)#exit
R1(config-gre)#exit
Configure R2 as follows:
R2(config)#interface gei-0/2/0/1
R2(config-if-gei-0/2/0/1)#no shutdown
R2(config-if-gei-0/2/0/1)# ipv6 enable
R2(config-if-gei-0/2/0/1)# ipv6 address 200::1/64
R2(config-if-gei-0/2/0/1)#exit
R2(config)#interface gre_tunnel1
R2(config-if-gre_tunnel1)#ipv6 enable
R2(config-if-gre_tunnel1)# ipv6 address 11::2/64
R2(config-if-gre_tunnel1)#exit
R2(config)#gre-config
R2(config-gre)#interface gre_tunnel1
R2(config-gre-if-gre_tunnel1)#tunnel mode ipv6
R2(config-gre-if-gre_tunnel1)#tunnel source ipv6 200::1
R2(config-gre-if-gre_tunnel1)#tunnel destination ipv6 100::1
R2(config-gre-if-gre_tunnel1)#exit
R2(config-gre)#exit
Configuration Verification
Check the GRE tunnel configurations on R1 and R2 as follows:
R1(config)#show running-config-interface gre_tunnel1
!<if-intf>
interface gre_tunnel1
ipv6 enable
ipv6 address 11::1/64
$
!</if-intf>
!<gre-tunnel>
gre-config
interface gre_tunnel1
tunnel mode ipv6
5-18
5-19
5-20
II
Figure 3-20 Configuration Instance of MPLS L3VPN Public Network LDP Load
Sharing ................................................................................................. 3-72
Figure 3-21 Configuration Instance of MPLS L3VPN VRF Load Sharing ................. 3-75
Figure 3-22 Network Structure of MPLS L3VPN MPBGP Load Sharing
Configuration Example.......................................................................... 3-78
Figure 3-23 Principles of MPLS L3VPN Crossing Several ASs (Option A)............... 3-83
Figure 3-24 Principles of MPLS L3VPN Crossing Several ASs (Option B)............... 3-85
Figure 3-25 Label Iteration Principles of MPLS L3VPN Crossing Several ASs
(Option C) ............................................................................................. 3-88
Figure 3-26 Label Distribution Principles of MPLS L3VPN Crossing Several ASs
(Option C) ............................................................................................. 3-88
Figure 3-27 Configuration Instance MPLS L3VPN Crossing Several ASs (Option
A).......................................................................................................... 3-90
Figure 3-28 Configuration Instance MPLS L3VPN Crossing Several ASs (Option
B).......................................................................................................... 3-95
Figure 3-29 Configuration Instance MPLS L3VPN Crossing Several ASs (Option
C, Using IBGP Between PE and ASBR).............................................. 3-102
Figure 3-30 Configuration Instance MPLS L3VPN Crossing Several ASs (Option
C, Using IGP Between PE and ASBR) ................................................ 3-108
Figure 3-31 Network Structure of VPN Per Label for MPLS L3VPN Configuration
Example ............................................................................................. 3-115
Figure 3-32 MPLS L3VPN GR Network Structure ................................................. 3-121
Figure 3-33 HoPE Architecture ............................................................................. 3-126
Figure 3-34 Network Architecture of a Single-Level HoPE Application .................. 3-127
Figure 3-35 Network Architecture of a Multilevel HoPE Application ....................... 3-127
Figure 3-36 Single-Level HoPE Network Structure................................................ 3-129
Figure 3-37 Multilevel HoPE Configuration Example ............................................. 3-141
Figure 3-38 Network Structure for BGP Update Group Configuration .................... 3-153
Figure 3-39 Network Structure for L3VPN Tunnel Policy Configuration ................. 3-158
Figure 3-40 Route Redistribution in a Network ...................................................... 3-164
Figure 3-41 VPN Operation Procedure in an AS ................................................... 3-165
Figure 3-42 VPN Operation Procedure Among ASs .............................................. 3-166
Figure 3-43 BGP Route-Target Route Configuration Example............................... 3-168
Figure 4-1 Multicast VPN Configuration Instance ...................................................... 4-4
Figure 5-1 GRE Encapsulation.................................................................................. 5-2
Figure 5-2 Basic IPv4 GRE Configuration Instance ................................................. 5-11
Figure 5-3 GRE 6in4 Configuration Instance ........................................................... 5-14
III
Figure 5-4 Network Structure for Basic IPv6 GRE Configuration ............................. 5-17
IV
VI
CPU
- Central Processing Unit
FR
- Frame Relay
FRR
- Fast Reroute
FTN
- Forwarded-To Number
GR
- Graceful Restart
GRE
- General Routing Encapsulation
HDLC
- High-level Data Link Control
IBGP
- Interior Border Gateway Protocol
ICCP
- Inter-Control Center Communications Protocol
VII
ILMI
- Interim Local Management Interface
IP
- Internet Protocol
IS-IS
- Intermediate System-to-Intermediate System
ISP
- Internet Service Provider
IT
- Information Technology
LAN
- Local Area Network
LDP
- Label Distribution Protocol
LMI
- Local Management Interface
LSP
- Label Switched Path
LSP
- Link State Packet
LSR
- Label Switch Router
MAC
- Media Access Control
MAN
- Metropolitan Area Network
MC-APS
- Multi-Chassis Automatic Protection Switching
MC-ELAM
- Multi-Chassis Ethernet Link Aggregation Manager
MPBGP
- Multi-Protocol Border Gateway Protocol
MPLS
- Multiprotocol Label Switching
MTU
- Maximum Transmission Unit
NSP
- Network Service Provider
VIII
OAM
- Operation, Administration and Maintenance
OSPF
- Open Shortest Path First
PDU
- Protocol Data Unit
PE
- Provider Edge
PIM-SM
- Protocol Independent Multicast - Sparse Mode
PPP
- Point to Point Protocol
PW
- Pseudo Wire
PWE3
- Pseudo Wire Emulation Edge-to-Edge
RAN
- Radio Access Network
RD
- Route Distinguisher
RP
- Rendezvous Point
RR
- Router Reflector
SDH
- Synchronous Digital Hierarchy
TDM
- Time Division Multiplexing
TLV
- Type/Length/Value
UNI
- User Network Interface
VC
- Virtual Connection
VC
- Virtual Circuit
VCC
- Virtual Channel Connection
IX
VCCV
- Virtual Circuit Connectivity Verification
VFI
- Virtual Forwarding Instance
VLAN
- Virtual Local Area Network
VPLS
- Virtual Private LAN Service
VPN
- Virtual Private Network
VPWS
- Virtual Private Wire Service
WAN
- Wide Area Network