MPLS Configuration on Cisco IOS Software (paperback)
- By Umesh Lakshman, Lancy Lobo
- Published Oct 17, 2005 by Cisco Press. Part of the Networking Technology series.
Alternate Binding
- Sorry, this book is no longer in print.
- Copyright 2006
- Dimensions: 7-3/8" x 9-1/8"
- Pages: 720
- Edition: 1st
- Alternate Binding
- ISBN-10: 1-58714-250-3
- ISBN-13: 978-1-58714-250-5
A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS
- Understand the crucial Cisco commands for various MPLS scenarios
- Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments
- Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network
- Understand and configure various PE-CE routing protocols in MPLS VPN networks
- Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment
- Learn MPLS TE and its advanced features
- Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies
- Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes
MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you’ll become familiar with MPLS technologies and their configurations using Cisco IOS® Software.
MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you’ll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You’ll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book.
You’ll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You’ll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You’ll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you’ll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support.
“I highly recommend MPLS Configuration on Cisco IOS Software as required reading for those in search of practical guidance of the technology and nuances of configuring MPLS for next-generation networks for voice, video, data, and application service offerings across a wide variety of deployment scenarios.”
—Carlos Dominguez, Senior Vice President, Worldwide Service Provider Operations, Cisco Systems®
This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Table of Contents
Chapter 1 MPLS Overview
Unicast IP Forwarding in Traditional IP Networks
Overview of MPLS Forwarding
Architectural Blocks of MPLS
MPLS Terminology
MPLS Control and Data Plane Components
MPLS Operation
MPLS Label Assignment
LDP Session Establishment
MPLS Label Distribution with LDP
MPLS Label Retention
Special Outgoing Label Types
Penultimate Hop Popping
Frame-Mode MPLS
Frame-Mode MPLS Operation
Loop Prevention in Frame-Mode MPLS
Cell-Mode MPLS
Cell-Mode MPLS Operation
Loop Detection in Cell-Mode MPLS
ATM VC-Merge
Cell Interleave with VC-Merge Implementation
Chapter 2 Basic MPLS Configuration
Frame-Mode MPLS Configuration and Verification
Basic Frame-Mode MPLS Overview, Configuration, and Verification
Frame-Mode MPLS over RFC 2684 Routed PVC
Cell-Mode MPLS over ATM Overview, Configuration, and Verification
Basic Cell-Mode MPLS Configuration and Verification
Configuring Cell-Mode MPLS with VC-Merge
Configuring MPLS Over ATM Without VC-Merge
MPLS Over VP Tunnels Configuration and Verification
Implementing Cell-Mode MPLS with BPX8600 and 7200 as Label Switch Controller
Command Reference
Chapter 3 Basic MPLS VPN Overview and Configuration
VPN Categories
MPLS VPN Architecture and Terminology
MPLS VPN Routing Model
VRF: Virtual Routing and Forwarding Table
Route Distinguisher, Route Targets, MP-BGP, and Address Families
MPLS VPN Control Plane Operation
MPLS VPN Data Plane Operation
MPLS VPN Basic Configuration
Configuration of CE Routers
Configuring MPLS Forwarding and VRF Definition on PE Routers
Final VRF Configuration on PE1-AS1 Router
Verification of VRF Configuration on PE routers
Configuration of BGP PE-PE Routing on PE Routers
BGP PE-PE Routing Final Configuration on PE1-AS1 and PE2-AS1 Router
Verification and Monitoring of BGP PE-PE Routing on PE Routers
Configuration of P Router
Label Verification and Control and Data Plane Operation
Outbound Route Filters
Command Reference
Chapter 4 PE-CE Routing Protocol—Static and RIP
Static PE-CE Routing Overview, Configuration, and Verification
Configuration Flowchart to Implement Static PE-CE Routing
Configuring Static PE-CE Routing
Static PE-CE Routing—Final Device Configurations for CE Routers (CE1-A and CE2-A)
Static PE-CE Routing—Final Device Configuration for Provider Routers (P1-AS1 and P2-AS1)
Static PE-CE Routing—Final Device Configurations for PE Routers (PE1-AS1 and PE2-AS1)
Verification of Static PE-CE Routing
Static PE-CE Routing Command Reference
RIPv2 PE-CE Routing Overview, Configuration, and Verification
Configuration Flowchart to Implement RIPv2 PE-CE Routing
Configuring RIPv2 PE-CE Routing
RIPv2 PE-CE Routing—Customer Edge CE1-A and CE2-A Configuration
RIPv2 PE-CE Routing—Provider Edge (PE1-AS1 and PE2-AS1) Configuration
Verification of RIPv2 PE-CE Routing
Control Plane Forwarding Operation
Data Forwarding Operation
RIPv1 PE-CE Routing Configuration and Verification
RIPv1 PE-CE Routing—PE1-AS1 and CE1-A Final Configuration
Verification of RIPv1 PE-CE Routing
RIP PE-CE Routing Command Reference
Chapter 5 PE-CE Routing Protocol—OSPF and EIGRP
OSPF PE-CE Routing Protocol Overview, Configuration and Verification
Traditional OSPF Routing Model
MPLS VPN or OSPF Superbackbone Concept
OSPF Route-Propagation Using MPLS VPN Superbackbone Concept
OSPF Down Bit and Domain Tag
Configuring and Verifying OSPF PE-CE Routing
OSPF Sham-Links
OSPF PE-CE Routing Command Summary
EIGRP PE-CE Routing Protocol Overview, Configuration, and Verification
EIGRP Route Propagation
Configuration Flowchart for EIGRP PE-CE Routing
Routing Loops and Suboptimal Routing
BGP Cost Community Feature and EIGRP Site of Origin
EIGRP PE-CE Routing Command Summary
Chapter 6 Implementing BGP in MPLS VPNs
BGP PE-CE Routing Protocol Overview, Configuration and Verification
Configuration Flowchart to Implement BGP PE-CE Routing for VPN Sites with Unique and Same AS Numbers
Implementing BGP PE-CE Routing for VPN Sites with Unique and Same AS Numbers
Implementing Route-Reflectors in MPLS VPN Networks
RR Deployment Methods
Configuring P Router as RR Only for VPNv4 Prefixes (Option 3)
Partitioned RRs
RRs and Peer Groups
BGP Confederations
Case Study—Hub and Spoke MPLS VPN Network Using BGP PE-CE Routing for Sites Using Unique AS Numbers
Base MPLS VPN Configuration
Hub and Spoke MPLS VPN Configuration for Sites Using Unique AS Numbers
Verifying MPLS VPN Hub and Spoke Routing for Sites Using Unique AS Numbers
Case Study—Hub and Spoke MPLS VPN Network with Sites Using Same AS Numbers
Verifying MPLS VPN Hub and Spoke Routing for Spoke Sites Using Same AS Numbers
Command Reference
Chapter 7 Inter-Provider VPNs
Overview of Inter-Provider VPNs
Option 1: Inter-Provider VPN Using Back-to-Back VRF Method
Control Plane Forwarding in Option 1
Data Forwarding in Option 1
Configuring Back-to-Back VRF Method
Option 2: Inter-Provider VPNs Using ASBR-to-ASBR Approach
Option 2a: ASBR-ASBR Approach Using Next-Hop-Self Method
Option 2b: ASBR-to-ASBR Approach Using Redistribute Connected
Option 2c: Multi-Hop MP-eBGP Between ASBRs
Option 3: Multi-Hop MP-eBGP Between RR and eBGP Between ASBRs
Control Plane Forwarding in Option 3
Data Forwarding in Option 3
Configuration Flowchart to Implement Option 3
Configuration and Verification of Option 3
Option 4: Non-VPN Transit Provider
Control Plane Forwarding in Option 4
Data Forwarding in Option 4
Configuration Flowchart in Option 4
Configuration and Verification of Option 4
Case Study—Inter-AS Implementing Route-Reflector and BGP Confederation in Provider Networks
Case Study—Multi-Homed Inter-AS Provider Network
Command Reference
Chapter 8 Carrier Supporting Carriers
Carrier Supporting Carriers Overview
Label Exchange Methods in CSC Architecture
Deployment Scenarios with CSC Architecture
CSC Network—Customer Carrier Not Running MPLS
CSC Network—Customer Carrier Running MPLS
CSC Network—Customer Carrier Providing MPLS VPN Service
CSC Architecture Benefits
Command Reference
Chapter 9 MPLS Traffic Engineering
TE Basics
MPLS TE Theory
MPLS TE Overview
RSVP with TE Extensions: Signaling
RSVP Operation in MPLS TE
Constraint-Based Routing and Operation in MPLS TE
Maximum Versus Available Bandwidth
Constraint-Based SPF
OSPF Extension for MPLS TE
IS-IS Extensions for MPLS TE
Configuring MPLS TE
MPLS TE Configuration Flowchart
Configuring Dynamic Paths and Explicit Paths with MPLS TE
Verification of MPLS TE Tunnel Creation
Final Configurations for Dynamic and Explicit Tunnels with MPLS TE
Unequal Cost Load Balancing Across Multiple TE Tunnels
MPLS TE Fast ReRoute Link Protection
Implementing MPLS VPNs over MPLS TE
Verification of MPLS VPN over TE with PE to PE Tunnels
Configuration of MPLS VPN over TE with PE to P Tunnels
Command Reference
Chapter 10 Implementing VPNs with Layer 2 Tunneling Protocol Version 3
L2TPv3 Overview
Operation of L2TPv3
L2TPv3 Modes of Operation
L2TPv3 Prerequisites
Tunnel Server Card Operation on GSR 12000 Series Routers When Implementing L2TPv3
L2TPv3 Header Format
Configuring L2TPv3 Tunnels for Layer 2 VPN
Configuring L2TPv3 Static Tunnels
Verification of Static L2TPv3 Tunnel Operation
Final Device Configuration for L2TPv3 Static Tunnels
Configuring L2TPv3 Dynamic Tunnels
Verification of Dynamic L2TPv3 Tunnel Operation
Final Device Configurations for L2TPv3 Dynamic Tunnels
Implementing Layer 3 VPNs over L2TPv3 Tunnels
Configuring L3VPN over L2TPv3 Tunnels
Verification for L3VPN over L2TPv3 Tunnels
Final Configurations for L3VPN over L2TPv3 Tunnels for PE Routers
Command Reference
Chapter 11 Any Transport over MPLS (AToM)
Introduction to Layer 2 VPNs
VPWS and VPLS
Pseudo Wire Reference Model
AToM Terminology
How AToM Works
Implementing AToM for Like to Like Circuits
ATM over MPLS
Ethernet over MPLS
PPP over MPLS
HDLC over MPLS
Frame Relay over MPLS
L2 VPN—Any to Any Interworking
Bridged Interworking Mode
Routed Interworking Mode
L2 VPN Interworking Limitations
Configuring Layer 2 VPN Interworking
Ethernet to VLAN Interworking
Frame Relay to AAL5 Interworking
Frame Relay to PPP Interworking
Final Configurations for Devices to Implement Frame Relay to PPP Interworking
Frame Relay to VLAN Interworking
AAL5 to VLAN Interworking
Local Switching
Configuration Flowchart for Local Switching Among Like Circuits
Local Switching—Frame Relay to Frame Relay
Local Switching—Ethernet to Ethernet
Local Switching—ATM to ATM
Local Switching—Ethernet to Frame Relay
Configuring Ethernet to Frame Relay Local Switching
Command Reference
Chapter 12 Virtual Private LAN Service (VPLS)
VPLS Overview
VPLS Components
VPLS Operation
VPLS Topology—Single PE or Direct Attachment
Configuration Flowchart for Direct Attachment VPLS
Direct Attachment VPLS Configuration Scenario 1—Using Port and 802.1Q VLAN Modes
Direct Attachment VPLS Configuration Scenario 2—Using Dot1q Tunnel Mode and Layer 2 Protocol Tunneling
Hierarchical VPLS—Distributed PE Architecture
Configuration Flowchart for Hierarchical VPLS Using Q-in-Q Mode
Hierarchical VPLS Configuration Scenario 1—802.1Q Tunneling (Q-in-Q)
Verification of VPLS Service
PE Configurations
u-PE Configurations
CE Configurations for Customer A and Customer B
Command Reference
Chapter 13 Implementing Quality of Service in MPLS Networks
Introduction to Quality of Service—Classification and Marking
Classification and Marking
Congestion Management, Congestion Avoidance, Traffic Shaping, and Policing
MPLS QoS Implementation
MPLS QoS Operating Modes
Uniform Mode
Pipe Mode
Short Pipe Mode
Long Pipe Mode
Summary of MPLS QoS Modes
Modular QoS CLI: Configuration of QoS on Cisco Routers
Configuration and Implementation of MPLS QoS in Uniform Mode and Short Pipe Mode Operation
Implementing Uniform Mode
Implementing Short Pipe Mode
Implementing MPLS QoS for Layer 2 VPN Implementations
Implementing QoS with AToM
Implementing QoS with VPLS
Implementing QoS with L2TPv3
Command Reference
Chapter 14 MPLS Features and Case Studies
Case Study 1: Implementing Multicast Support for MPLS VPNs
Operation of Multicast MPLS VPN
Configuration of Multicast Support for MPLS VPN
Implementing Multicast Support for MPLS VPNs
Verifications for Case Study 1
Case Study 2: Implementing Multi-VRF CE, VRF Selection Using Source IP Address, VRF Selection Using Policy-Based Routing, NAT
and HSRP Support in MPLS VPN, and Multicast VPN Support over Multi-VRF CE
Configuration of Core Devices in Case Study 2
Theory and Configuration of Features in Case Study 2
Verifications for Case Study 2
Final Configurations for Case Study 2
Case Study 3: Implementing Layer 2 VPNs over Inter-AS Topologies Using Layer 2 VPN Pseudo-Wire Switching
Layer 2 VPN Pseudo-Wire Switching Theory and Configuration
Verifications for Case Study 3
Final Configurations for Case Study 3
Case Study 4: Implementing Layer 3 VPNs Over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
Layer 3 VPN over L2 VPN Configuration
Implementing L2 VPN Redundancy
L2 VPN Pseudo-Wire Redundancy Configuration for Customer A Traffic from PE1-A to PE2-A
Verifications for Case Study 4
Final Configurations for Case Study 4
Case Study 5: Implementing Dynamic Layer 3 VPNs Using mGRE Tunnels
Configuring Layer 3 VPN Over mGRE Tunnels
Verifications for Case Study 5
Final configurations for Layer 3 VPN over mGRE Tunnels for PE Routers
Case Study 6: Implementing Class-Based Tunnel Selection with MPLS Traffic Engineering
Implementing Class-Based Tunnel Selection
Configuring CBTS
Verification of Class-Based Tunnel Selection
Final Configurations for Case Study 6
Case Study 7: Implementing Hub and Spoke Topologies with OSPF
Hub and Spoke with OSPFv2: Configuration of CE Routers and Spoke PE Routers
Configuration of Hub-PE Router and Verification of OSPF Hub and Spoke Operation
Case Study 8: Implementing Hub and Spoke Topologies with EIGRP
Configurations for the CE and Spoke PE Routers
Configurations for the Hub PE Router and Verification of EIGRP Hub and Spoke Operation
Case Study 9: Implementing VPLS Services with the GSR 12000 Series
Theory and Operation of VPLS on a GSR 12000 Series
GSR VPLS Packet Forwarding
GSR VPLS Requirements and Configuration
Case Study 10: BGP Site of Origin
Command Reference
1587051990TOC092305
Other Things You Might Like
- Securing Enterprise Networks with Cisco Meraki
- eBook $55.99
- Securing Enterprise Networks with Cisco Meraki
- Book $55.99