Atnaujinkite slapukų nuostatas

MPLS Configuration on Cisco IOS Software (paperback) [Minkštas viršelis]

4.00/5 (18 ratings by Goodreads)
  • Formatas: Paperback / softback, 720 pages, aukštis x plotis x storis: 231x190x36 mm, weight: 1100 g
  • Išleidimo metai: 10-Aug-2010
  • Leidėjas: Cisco Press
  • ISBN-10: 1587142503
  • ISBN-13: 9781587142505
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 720 pages, aukštis x plotis x storis: 231x190x36 mm, weight: 1100 g
  • Išleidimo metai: 10-Aug-2010
  • Leidėjas: Cisco Press
  • ISBN-10: 1587142503
  • ISBN-13: 9781587142505
Kitos knygos pagal šią temą:

A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS

  • Understand the crucial Cisco commands for various MPLS scenarios
  • Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments
  • Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network
  • Understand and configure various PE-CE routing protocols in MPLS VPN networks
  • Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment
  • Learn MPLS TE and its advanced features
  • Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies
  • Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes

MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you’ll become familiar with MPLS technologies and their configurations using Cisco IOS® Software.

MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you’ll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You’ll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book.

You’ll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You’ll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You’ll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you’ll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support.

“I highly recommend MPLS Configuration on Cisco IOS Software as required reading for those in search of practical guidance of the technology and nuances of configuring MPLS for next-generation networks for voice, video, data, and application service offerings across a wide variety of deployment scenarios.”

—Carlos Dominguez, Senior Vice President, Worldwide Service Provider Operations, Cisco Systems®

This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Foreword xxv
Introduction xxvii
Chapter 1 MPLS Overview
3(30)
Unicast IP Forwarding in Traditional IP Networks
3(1)
Overview of MPLS Forwarding
4(2)
Architectural Blocks of MPLS
6(1)
MPLS Terminology
6(5)
MPLS Control and Data Plane Components
11(1)
MPLS Operation
12(4)
MPLS Label Assignment
13(1)
LDP Session Establishment
13(1)
MPLS Label Distribution with LDP
14(2)
MPLS Label Retention
16(1)
Special Outgoing Label Types
16(1)
Penultimate Hop Popping
17(1)
Frame-Mode MPLS
18(4)
Frame-Mode MPLS Operation
18(2)
Loop Prevention in Frame-Mode MPLS
20(2)
Cell-Mode MPLS
22(11)
Cell-Mode MPLS Operation
24(2)
Loop Detection in Cell-Mode MPLS
26(3)
ATM VC-Merge
29(1)
Cell Interleave with VC-Merge Implementation
30(3)
Chapter 2 Basic MPLS Configuration
33(46)
Frame-Mode MPLS Configuration and Verification
33(13)
Basic Frame-Mode MPLS Overview, Configuration, and Verification
33(2)
Basic Frame-Mode MPLS Configuration Steps
35(1)
Verification of Basic Frame-Mode MPLS Operation
36(2)
Control and Data Plane Forwarding in Basic Frame-Mode MPLS
38(2)
Final Device Configurations for Basic Frame-Mode MPLS
40(1)
Frame-Mode MPLS over RFC 2684 Routed PVC
41(2)
Configuration Steps for Frame-Mode MPLS Over RFC 2684 Routed PVC
43(1)
Configuration of the LS1010 ATM Switch
43(1)
Verification Steps for Frame-Mode MPLS Over RFC 2684 Routed PVC
44(1)
Final Device Configuration for Frame-Mode MPLS Over RFC 2684 Routed PVC
45(1)
Cell-Mode MPLS over ATM Overview, Configuration, and Verification
46(30)
Basic Cell-Mode MPLS Configuration and Verification
47(1)
Basic Cell-Mode MPLS Configuration Flowchart for Edge LSRs
47(1)
Basic Cell-Mode MPLS Configuration Flowchart for LSRs
48(1)
Basic Cell-Mode MPLS Configuration Steps
48(3)
Verification of Basic Cell-Mode MPLS Configuration
51(2)
Control and Data Forwarding Operation in Basic Cell-Mode MPLS Configuration
53(4)
Final Device Configurations for Basic Cell-Mode MPLS
57(1)
Configuring Cell-Mode MPLS with VC-Merge
58(1)
Configuration Flowchart for Cell-Mode MPLS with VC-Merge
59(1)
Configuration Steps for Cell-Mode MPLS with VC Merge on Edge ATM LSR
59(1)
Configuration Steps for Cell-Mode MPLS with VC-Merge on ATM LSR
59(1)
Final Configuration for Devices in Cell-Mode MPLS with VC-Merge
60(1)
Verification Steps for Cell-Mode MPLS with VC-Merge on ATM LSR
61(1)
Configuring MPLS Over ATM Without VC-Merge
61(1)
Verify MPLS Over ATM Without VC-Merge
62(1)
MPLS Over VP Tunnels Configuration and Verification
62(1)
Configuration Flowchart for MPLS over VP Tunnels on Edge ATM LSR
63(1)
Configuration Flowchart for Creating an ATM PVP on ATM Switch
63(1)
Configuration Steps for MPLS over VP Tunnels
63(1)
Verification Steps for MPLS over VP Tunnels
64(1)
Final Device Configurations for MPLS over VP Tunnels
65(1)
Implementing Cell-Mode MPLS with BPX8600 and 7200 as Label Switch Controller
66(1)
Configuring BPX+LSC as ATM LSR
67(6)
Verification of Cell-Mode MPLS with BPX+LSC Operation
73(3)
Command Reference
76(3)
Chapter 3 Basic MPLS VPN Overview and Configuration
79(32)
VPN Categories
79(4)
MPLS VPN Architecture and Terminology
83(1)
MPLS VPN Routing Model
84(11)
VRF: Virtual Routing and Forwarding Table
85(1)
Route Distinguisher, Route Targets, MP-BGP, and Address Families
86(5)
MPLS VPN Control Plane Operation
91(2)
MPLS VPN Data Plane Operation
93(2)
MPLS VPN Basic Configuration
95(10)
Configuration of CE Routers
95(1)
Configuring MPLS Forwarding and VRF Definition on PE Routers
96(2)
Final VRF Configuration on PE1-AS1 Router
98(1)
Verification of VRF Configuration on PE routers
99(1)
Configuration of BGP PE-PE Routing on PE Routers
99(3)
BGP PE-PE Routing Final Configuration on PE1-AS1 and PE2-AS1 Router
102(1)
Verification and Monitoring of BGP PE-PE Routing on PE Routers
103(1)
Configuration of P Router
103(1)
Label Verification and Control and Data Plane Operation
104(1)
Outbound Route Filters
105(2)
Command Reference
107(4)
Chapter 4 PE-CE Routing Protocol---Static and RIP
111(30)
Static PE-CE Routing Overview, Configuration, and Verification
111(9)
Configuration Flowchart to Implement Static PE-CE Routing
112(1)
Configuring Static PE-CE Routing
113(2)
Static PE-CE Routing---Final Device Configurations for CE Routers (CE1-A and CE2-A)
115(1)
Static PE-CE Routing---Final Device Configuration for Provider Routers (P1-AS1 and P2-AS1)
115(1)
Static PE-CE Routing---Final Device Configurations for PE Routers (PE1-AS1 and PE2-AS1)
116(2)
Verification of Static PE-CE Routing
118(2)
Static PE-CE Routing Command Reference
120(1)
RIPv2 PE-CE Routing Overview, Configuration, and Verification
121(12)
Configuration Flowchart to Implement RIPv2 PE-CE Routing
122(1)
Configuring RIPv2 PE-CE Routing
122(2)
RIPv2 PE-CE Routing---Customer Edge CE1-A and CE2-A Configuration
124(1)
RIPv2 PE-CE Routing---Provider Edge (PE1-AS1 and PE2-AS1) Configuration
125(3)
Verification of RIPv2 PE-CE Routing
128(1)
Control Plane Forwarding Operation
129(3)
Data Forwarding Operation
132(1)
RIPv1 PE-CE Routing Configuration and Verification
133(5)
RIPv1 PE-CE Routing---PE1-AS1 and CE1-A Final Configuration
135(1)
Verification of RIPv1 PE-CE Routing
136(2)
RIP PE-CE Routing Command Reference
138(3)
Chapter 5 PE-CE Routing Protoco---OSPF and EIGRP
141(72)
OSPF PE-CE Routing Protocol Overview, Configuration and Verification
141(39)
Traditional OSPF Routing Model
142(2)
MPLS VPN or OSPF Superbackbone Concept
144(1)
BGP Extended Communities for OSPF PE-CE Routing
144(2)
OSPF Route-Propagation Using MPLS VPN Superbackbone Concept
146(1)
OSPF Domain ID Is Same on All PE Routers
147(1)
OSPF Domain ID Is Different on All PE Routers
148(1)
Impact of Configuring OSPF Domain ID on PE Routers
149(1)
OSPF Down Bit and Domain Tag
150(1)
OSPF Down Bit
151(1)
OSPF Route Tag or VPN Route Tag
152(2)
Configuring and Verifying OSPF PE-CE Routing
154(1)
Configuration Scenario 1-OSPF Process ID Is Same for Customer A and Different for Customer B VPNs
155(11)
Configuration Scenario 2---Using OSPF Domain ID Support for LSA Type 5/Type 3 Translation
166(2)
OSPF Sham-Links
168(3)
Configuration Flowchart for OSPF Sham-Links
171(1)
Configuration Scenario 3---OSPF Sham-Links
172(8)
OSPF PE-CE Routing Command Summary
180(1)
EIGRP PE-CE Routing Protocol Overview, Configuration, and Verification
180(33)
EIGRP Route Propagation
182(1)
Route Propagation When EIGRP AS Is Same on All PE Routers
182(1)
Route Propagation When EIGRP AS Is Different on All PE Routers
183(1)
Configuration Flowchart for EIGRP PE-CE Routing
184(1)
Configuration Scenario 1: Basic EIGRP PE-CE Routing Configuration
185(10)
Routing Loops and Suboptimal Routing
195(1)
Routing Loops
195(3)
Suboptimal Routing
198(1)
BGP Cost Community Feature and EIGRP Site of Origin
198(1)
BGP Cost Community Feature
199(1)
EIGRP Site of Origin (SoO) Attribute
200(2)
EIGRP PE-CE Configuration Scenario 2---BGP Cost Community Feature and EIGRP SoO in MPLS VPN Network with Backdoor Link
202(9)
EIGRP PE-CE Routing Command Summary
211(2)
Chapter 6 Implementing BGP in MPLS VPNs
213(58)
BGP PE-CE Routing Protocol Overview, Configuration and Verification
213(12)
Configuration Flowchart to Implement BGP PE-CE Routing for VPN Sites with Unique and Same AS Numbers
216(1)
Implementing BGP PE-CE Routing for VPN Sites with Unique and Same AS Numbers
217(1)
CE Router Configuration
218(1)
Final Configuration for BGP PE-CE VPN Sites Implementing Unique and Same BGP AS Numbers
219(3)
Verifying BGP PE-CE Routing for VPN Sites Implementing Unique and Different BGP AS Numbers
222(3)
Implementing Route-Reflectors in MPLS VPN Networks
225(35)
RR Deployment Methods
225(1)
Option 1 Using Provider Edge Router as VPNv4 RR
225(2)
Option 2 Using P Router as IPv4 and VPNv4 RR
227(1)
Option 3 Using P Router as RR Only for VPNv4
228(1)
Option 4 Dedicated Router as RR for IPv4 and VPNv4
229(1)
Option 5 Dedicated Router as RR for Only VPNv4
229(1)
Option 6 Partitioned RRs
230(2)
Configuring P Router as RR Only for VPNv4 Prefixes (Option 3)
232(1)
Configuration Flowchart for P Router as RR for Only VPNv4 Prefixes
232(1)
Configuration Step for PE Routers PE1-AS1 and PE2-AS1
232(1)
Configuration Step for P as RR for Only VPNv4 Prefixes
233(1)
CE Configurations
233(1)
P1-AS1-RR, PE1-AS1, and PE2-AS1 Final Configuration for MPLS VPN Using RRs
233(2)
Verifying MPLS VPNs Using RRs
235(1)
Partitioned RRs
236(1)
RR Partitioning Using BGP Inbound Route-Target Filters
237(5)
RR Partitioning Using Standard BGP Communities
242(6)
RRs and Peer Groups
248(1)
Configuring Peer Groups on P Routers P1-AS1-RR1 and P2-AS1-RR2
249(1)
P1-AS1-RR1 and P2-AS1-RR2 Final RR Configurations with Peer Groups
250(1)
Verifying Peer Groups and RRs
251(2)
BGP Confederations
253(1)
Configuration Flowchart to Implement BGP Confederations
254(2)
Configuring BGP Confederation for P Routers PE1-AS1, PE2-AS1, and P1-AS1
256(1)
Final BGP Confederation Configuration on PE1-AS1, P1-AS1, and PE2-AS1
257(2)
Verifying BGP Confederations
259(1)
Case Study---Hub and Spoke MPLS VPN Network Using BGP PE-CE Routing for Sites Using Unique AS Numbers
260(6)
Base MPLS VPN Configuration
261(2)
Hub and Spoke MPLS VPN Configuration for Sites Using Unique AS Numbers
263(1)
Verifying MPLS VPN Hub and Spoke Routing for Sites Using Unique AS Numbers
264(2)
Case Study---Hub and Spoke MPLS VPN Network with Sites Using Same AS Numbers
266(3)
Verifying MPLS VPN Hub and Spoke Routing for Spoke Sites Using Same AS Numbers
267(2)
Command Reference
269(2)
Chapter 7 Inter-Provider VPNs
271(74)
Overview of Inter-Provider VPNs
271(2)
Option 1 Inter-Provider VPN Using Back-to-Back VRF Method
273(14)
Control Plane Forwarding in Option 1
274(1)
Data Forwarding in Option 1
275(1)
Configuring Back-to-Back VRF Method
276(1)
CE CE1-A and CE2-A Configuration for Option 1
277(1)
Provider Router, PE, and PE ASBR Router Configurations for Option 1
278(7)
Verifying Option 1
285(2)
Option 2 Inter-Provider VPNs Using ASBR-to-ASBR Approach
287(20)
Option 2a ASBR-ASBR Approach Using Next-Hop-Self Method
288(1)
Control Plane Forwarding in Option 2a
289(1)
Data forwarding in Option 2a
289(1)
Configuration Flowchart to Implement Inter-Provider VPN Operation Using Option 2a
290(1)
Configuration Step to Implement Inter-Provider VPN Operation Using Option 2a
291(3)
Option 2b ASBR-to-ASBR Approach Using Redistribute Connected
294(1)
Control Plane Forwarding in Option 2b
295(1)
Data Forwarding in Option 2b
295(1)
Configuration Flowchart for Implementing Option 2b
296(1)
Configuring Inter-Provider VPNs Using Option 2b
297(4)
Option 2c Multi-Hop MP-eBGP Between ASBRs
301(1)
Control Plane Forwarding in Option 2c
301(1)
Data Plane Forwarding in Option 2c
301(1)
Configuring Multi-Hop MP-eBGP between ASBRs
302(5)
Option 3 Multi-Hop MP-eBGP Between RR and eBGP Between ASBRs
307(8)
Control Plane Forwarding in Option 3
308(1)
Data Forwarding in Option 3
308(1)
Configuration Flowchart to Implement Option 3
309(1)
Configuration and Verification of Option 3
309(2)
ASBR and RR Configurations in Option 3
311(3)
Verifying Inter-Provider VPN Operation Using Option 3
314(1)
Option 4 Non-VPN Transit Provider
315(13)
Control Plane Forwarding in Option 4
316(1)
Data Forwarding in Option 4
316(2)
Configuration Flowchart in Option 4
318(1)
Configuration and Verification of Option 4
318(4)
ASBR and RR Configurations in Option 4
322(4)
Verifying Inter-Provider VPN Operation Using Option 4
326(2)
Case Study---Inter-AS Implementing Route-Reflector and BGP Confederation in Provider Networks
328(7)
Case Study---Multi-Homed Inter-AS Provider Network
335(8)
Command Reference
343(2)
Chapter 8 Carrier Supporting Carriers
345(30)
Carrier Supporting Carriers Overview
345(3)
Label Exchange Methods in CSC Architecture
346(1)
Using IGP for Label Exchange
346(1)
Using BGP for Label Exchange
347(1)
Deployment Scenarios with CSC Architecture
348(11)
CSC Network---Customer Carrier Not Running MPLS
348(2)
Control Plane Forwarding Operation---Customer Carrier Not Running MPLS
350(1)
Data Forwarding Operation---Customer Carrier Not Running MPLS
350(1)
Configuring the CSC Model---Customer Carrier Not Running MPLS
351(6)
Verify CSC Model---Customer Carrier Not Running MPLS
357(2)
CSC Network---Customer Carrier Running MPLS
359(6)
Control Plane Forwarding Operation---Customer Carrier Running MPLS
359(1)
Data Forwarding Operation---Customer Carrier Running MPLS
360(1)
Configuring the CSC Model---Customer Carrier Running MPLS
360(3)
Verify CSC Model---Customer Carrier Running MPLS
363(2)
CSC Network---Customer Carrier Providing MPLS VPN Service
365(7)
Control Plane Forwarding Operation---Customer Carrier Providing MPLS VPN Service
366(1)
Data Forwarding Operation---Customer Carrier Providing MPLS VPN Service
367(1)
Configuring the CSC Model---Customer Carrier Providing MPLS VPN Service
367(3)
Verify CSC Model---Customer Carrier Providing MPLS VPN Service
370(2)
CSC Architecture Benefits
372(1)
Command Reference
373(2)
Chapter 9 MPLS Traffic Engineering
375(44)
TE Basics
375(2)
MPLS TE Theory
377(8)
MPLS TE Overview
377(3)
RSVP with TE Extensions: Signaling
380(2)
RSVP Operation in MPLS TE
382(3)
Constraint-Based Routing and Operation in MPLS TE
385(8)
Maximum Versus Available Bandwidth
386(2)
Constraint-Based SPF
388(2)
OSPF Extension for MPLS TE
390(1)
IS-IS Extensions for MPLS TE
391(2)
Configuring MPLS TE
393(23)
MPLS TE Configuration Flowchart
393(4)
Configuring Dynamic Paths and Explicit Paths with MPLS TE
397(3)
Verification of MPLS TE Tunnel Creation
400(4)
Final Configurations for Dynamic and Explicit Tunnels with MPLS TE
404(4)
Unequal Cost Load Balancing Across Multiple TE Tunnels
408(1)
MPLS TE Fast ReRoute Link Protection
409(2)
Implementing MPLS VPNs over MPLS TE
411(3)
Verification of MPLS VPN over TE with PE to PE Tunnels
414(1)
Configuration of MPLS VPN over TE with PE to P Tunnels
415(1)
Command Reference
416(3)
Chapter 10 Implementing VPNs with Layer 2 Tunneling Protocol Version 3
419(30)
L2TPv3 Overview
419(5)
Operation of L2TPv3
419(2)
L2TPv3 Modes of Operation
421(1)
L2TPv3 Prerequisites
422(1)
Tunnel Server Card Operation on GSR 12000 Series Routers When Implementing L2TPv3
422(2)
L2TPv3 Header Format
424(1)
Configuring L2TPv3 Tunnels for Layer 2 VPN
424(2)
Configuring L2TPv3 Static Tunnels
426(5)
Verification of Static L2TPv3 Tunnel Operation
429(1)
Final Device Configuration for L2TPv3 Static Tunnels
430(1)
Configuring L2TPv3 Dynamic Tunnels
431(5)
Verification of Dynamic L2TPv3 Tunnel Operation
432(3)
Final Device Configurations for L2TPv3 Dynamic Tunnels
435(1)
Implementing Layer 3 VPNs over L2TPv3 Tunnels
436(10)
Configuring L3VPN over L2TPv3 Tunnels
437(3)
Verification for L3VPN over L2TPv3 Tunnels
440(2)
Final Configurations for L3VPN over L2TPv3 Tunnels for PE Routers
442(4)
Command Reference
446(3)
Chapter 11 Any Transport over MPLS (A To M)
449(80)
Introduction to Layer 2 VPNs
449(10)
VPWS and VPLS
450(1)
Pseudo Wire Reference Model
450(2)
A To M Terminology
452(1)
How A To M Works
453(1)
LDP Label Mapping Procedure
454(2)
PSN Tunnel and VC Label Distribution
456(1)
VC Label Withdrawal Procedure
457(1)
Control Word
457(2)
Implementing A To M for Like to Like Circuits
459(40)
ATM over MPLS
459(1)
AAL5 over MPLS
459(6)
ATM Cell Relay over MPLS
465(3)
OAM in ATM AAL5 and ATM Cell Relay over MPLS
468(1)
Ethernet over MPLS
469(1)
Router-Based Ethernet over MPLS---Port Mode
469(3)
Router-Based Ethernet over MPLS---VLAN Mode
472(4)
Router-Based EoMPLS---VLAN Rewrite
476(1)
Switch-Based Ethernet over MPLS---Port Mode
476(5)
Switch-Based Ethernet over MPLS---VLAN Mode
481(3)
Switch-Based Ethernet over MPLS---dotlq Tunnel Mode
484(4)
PPP over MPLS
488(1)
Configuration Flowchart for PPP over MPLS
489(1)
Configuring PPP over MPLS
490(1)
Device Configuration for PPP over MPLS
490(1)
Verification of PPP over MPLS
490(2)
Data Plane Forwarding for PPP over MPLS
492(1)
HDLC over MPLS
492(2)
Configuration Flowchart for HDLC over MPLS
494(1)
Configuring HDLC over MPLS
494(1)
Verify HDLC over MPLS
495(1)
Final Configuration for HDLC over MPLS
495(1)
Frame Relay over MPLS
496(1)
Configuration Steps for Frame Relay over MPLS---DLCI Mode
496(1)
Configuring Frame Relay over MPLS---DLCI Mode
496(1)
Verification of Frame Relay over MPLS---DLCI Mode
497(1)
Final Configuration for Frame Relay over MPLS (DLCI Mode)
498(1)
L2 VPN---Any to Any Interworking
499(18)
Bridged Interworking Mode
499(1)
Routed Interworking Mode
500(1)
L2 VPN Interworking Limitations
501(1)
L2 VPN Interworking Limitations for Ethernet/VLAN
502(1)
L2 VPN Interworking Limitations for Frame Relay
502(1)
L2 VPN Interworking Limitations for AAL5
502(1)
Configuring Layer 2 VPN Interworking
502(1)
Ethernet to VLAN Interworking
502(1)
Configuration Steps---Ethernet to VLAN Interworking
503(1)
Final Configuration for Ethernet to VLAN Interworking
504(1)
Verification of Ethernet to VLAN Interworking over MPLS
505(1)
Control Plane and Data Forwarding Operation
505(1)
Frame Relay to AAL5 Interworking
506(1)
Configuration Steps---Frame Relay to AAL5 Interworking
506(1)
Verification of Frame Relay to AAL5 Interworking over MPLS
507(2)
Frame Relay to PPP Interworking
509(1)
Configuration Steps---Ethernet to VLAN Interworking
510(1)
Verification of Frame Relay to PPP Interworking
510(2)
Final Configurations for Devices to Implement Frame Relay to PPP Interworking
512(1)
Frame Relay to VLAN Interworking
512(1)
Configuration Steps for Frame Relay to VLAN Interworking
513(1)
Verification of Frame Relay to VLAN Interworking over MPLS
513(1)
Final Configuration for Frame Relay to VLAN Interworking
514(1)
AAL5 to VLAN Interworking
515(1)
Configuration Steps---VLAN to AAL5 Interworking
516(1)
Verification of AAL5 to VLAN Interworking over MPLS
516(1)
Final Device Configurations to Implement ATM to Ethernet VLAN Interworking
517(1)
Local Switching
517(9)
Configuration Flowchart for Local Switching Among Like Circuits
518(1)
Local Switching---Frame Relay to Frame Relay
519(1)
Configuring Frame Relay to Frame Relay Local Switching
519(1)
Frame Relay to Frame Relay Local Switching Configuration
519(1)
Verify Frame Relay to Frame Relay Local Switching
520(1)
Local Switching---Ethernet to Ethernet
521(1)
Configuring Ethernet to Ethernet Local Switching
521(1)
Ethernet to Ethernet Switching Configuration
521(1)
Verification of Ethernet to Ethernet Local Switching
522(1)
Local Switching---ATM to ATM
522(1)
Configuring ATM to ATM Local Switching
523(1)
Final Configurations for ATM to ATM Local Switching
523(1)
Verify ATM to ATM Local Switching
524(1)
Local Switching---Ethernet to Frame Relay
524(1)
Configuring Ethernet to Frame Relay Local Switching
524(2)
Command Reference
526(3)
Chapter 12 Virtual Private LAN Service (VPLS)
529(40)
VPLS Overview
529(6)
VPLS Components
529(2)
VPLS Operation
531(1)
MAC Address Learning
531(2)
MAC Address Withdrawal
533(2)
VPLS Topology---Single PE or Direct Attachment
535(23)
Configuration Flowchart for Direct Attachment VPLS
537(1)
Direct Attachment VPLS Configuration Scenario 1--- Using Port and 802.1Q VLAN Modes
538(3)
Verification of VPLS Connectivity
541(2)
VPLS Configurations on PE Router
543(2)
CE Router Configurations for Customer A and Customer B
545(1)
Direct Attachment VPLS Configuration Scenario 2---Using Dot1q Tunnel Mode and Layer 2 Protocol Tunneling
546(4)
Verify Layer 2 Protocol Tunneling for CDP and MSTP
550(1)
PE Configurations
551(4)
CE Configurations for Customers A and B
555(1)
Hierarchical VPLS---Distributed PE Architecture
555(2)
Configuration Flowchart for Hierarchical VPLS Using Q-in-Q Mode
557(1)
Hierarchical VPLS Configuration Scenario 1---802.1Q Tunneling (Q-in-Q)
558(8)
Verification of VPLS Service
559(2)
PE Configurations
561(2)
u-PE Configurations
563(2)
CE Configurations for Customer A and Customer B
565(1)
Command Reference
566(3)
Chapter 13 Implementing Quality of Service in MPLS Networks
569(40)
Introduction to Quality of Service---Classification and Marking
569(6)
Classification and Marking
570(1)
IP Precedence, DSCP, and ToS Relationships
570(3)
MPLS EXP Bit Marking
573(1)
Congestion Management, Congestion Avoidance, Traffic Shaping, and Policing
573(2)
MPLS QoS Implementation
575(1)
MPLS QoS Operating Modes
576(5)
Uniform Mode
577(1)
Pipe Mode
578(1)
Short Pipe Mode
579(1)
Long Pipe Mode
579(1)
Summary of MPLS QoS Modes
580(1)
Modular QoS CLI: Configuration of QoS on Cisco Routers
581(4)
Configuration and Implementation of MPLS QoS in Uniform Mode and Short Pipe Mode Operation
585(14)
Implementing Uniform Mode
586(10)
Implementing Short Pipe Mode
596(3)
Implementing MPLS QoS for Layer 2 VPN Implementations
599(6)
Implementing QoS with AToM
599(3)
Implementing QoS with VPLS
602(2)
Implementing QoS with L2TPv3
604(1)
Command Reference
605(4)
Chapter 14 MPLS Features and Case Studies
609(66)
Case Study 1 Implementing Multicast Support for MPLS VPNs
609(7)
Operation of Multicast MPLS VPN
610(1)
Configuration of Multicast Support for MPLS VPN
611(2)
Implementing Multicast Support for MPLS VPNs
613(2)
Verifications for Case Study 1
615(1)
Case Study 2 Implementing Multi-VRF CE, VRF Selection Using Source IP Address, VRF Selection Using Policy-Based Routing, NAT and HSRP Support in MPLS VPN, and Multicast VPN Support over Multi-VRF CE
616(17)
Configuration of Core Devices in Case Study 2
617(2)
Theory and Configuration of Features in Case Study 2
619(1)
Multi-VRF CE
619(1)
VRF Selection Based on Source. IP Address and Policy-Based Routing
620(4)
HSRP Integration with MPLS VPN
624(1)
NAT Integration to MPLS VPN
625(2)
Multicast VPN Support over Multi-VRF CE
627(2)
Verifications for Case Study 2
629(1)
Final Configurations for Case Study 2
630(3)
Case Study 3 Implementing Layer 2 VPNs over Inter-AS Topologies Using Layer 2 VPN Pseudo-Wire Switching
633(4)
Layer 2 VPN Pseudo-Wire Switching Theory and Configuration
634(1)
Verifications for Case Study 3
634(2)
Final Configurations for Case Study 3
636(1)
Case Study 4 Implementing Layer 3 VPNs Over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
637(5)
Layer 3 VPN over L2 VPN Configuration
637(1)
Implementing L2 VPN Redundancy
638(2)
L2 VPN Pseudo-Wire Redundancy Configuration for Customer A Traffic from PE1-A to PE2-A
640(1)
Verifications for Case Study 4
640(2)
Final Configurations for Case Study 4
642(1)
Case Study 5 Implementing Dynamic Layer 3 VPNs Using mGRE Tunnels
642(7)
Configuring Layer 3 VPN Over mGRE Tunnels
644(3)
Verifications for Case Study 5
647(1)
Final configurations for Layer 3 VPN over mGRE Tunnels for PE Routers
647(2)
Case Study 6 Implementing Class-Based Tunnel Selection with MPLS Traffic Engineering
649(5)
Implementing Class-Based Tunnel Selection
649(2)
Configuring CBTS
651(1)
Verification of Class-Based Tunnel Selection
652(1)
Final Configurations for Case Study 6
653(1)
Case Study 7 Implementing Hub and Spoke Topologies with OSPF
654(5)
Hub and Spoke with OSPFv2: Configuration of CE Routers and Spoke PE Routers
656(1)
Configuration of Hub-PE Router and Verification of OSPF Hub and Spoke Operation
656(3)
Case Study 8 Implementing Hub and Spoke Topologies with EIGRP
659(3)
Configurations for the CE and Spoke PE Routers
660(1)
Configurations for the Hub PE Router and Verification of EIGRP Hub and Spoke Operation
661(1)
Case Study 9 Implementing VPLS Services with the GSR 12000 Series
662(8)
Theory and Operation of VPLS on a GSR 12000 Series
663(1)
GSR VPLS Packet Forwarding
664(3)
GSR VPLS Requirements and Configuration
667(3)
Case Study 10 BGP Site of Origin
670(1)
Command Reference
671(4)
Index 675
Lancy Lobo, CCIE® No. 4690 (Routing/Switching and Service Provider), is a network consulting engineer in Cisco Systems Advanced Services group, supporting Cisco strategic service provider and enterprise customers. He has more than 10 years of experience with data communication technologies and has supported Cisco strategic service provider customers to design and implement large-scale routed networks.

 

Umesh Lakshman is a technical project systems engineer with the Service Provider Field Labs at Cisco. He supports Cisco sales teams by demonstrating and testing technologies such as MPLS to customers in a presales environment. Umesh has conducted several customer training classes on MPLS, MPLS VPNs, and QoS implementations in MPLS networks.