MP l2 Vpns Xe 3s Asr920 Book
MP l2 Vpns Xe 3s Asr920 Book
MP l2 Vpns Xe 3s Asr920 Book
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com
go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any
other company. (1721R)
© 2014–2017 Cisco Systems, Inc. All rights reserved.
CONTENTS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
iii
Contents
Troubleshooting Tips using the commands associated with the L2VPN Protocol-Based CLIs feature
44
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
iv
Contents
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
v
Contents
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
vi
Contents
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
vii
Contents
How MAC Address Withdrawal Works with H-VPLS N-PE Redundancy with MPLS Access 153
How MAC Address Withdrawal Works with H-VPLS N-PE Redundancy with QinQ Access 153
Additional References for Any Transport over MPLS 153
Feature Information for VPLS MAC Address Withdrawal 154
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
viii
Contents
CHAPTER 8 EVPN Virtual Private Wire Service (VPWS) Single Homed 163
Information About EVPN-VPWS 163
Benefits of EVPN-VPWS Single Homed 164
Prerequisites for EVPN-VPWS 164
Restrictions for EVPN-VPWS 164
How to Configure EPVN-VPWS 165
Configuring BGP for EVPN-VPWS 165
Configuring EVPN-VPWS Instance 165
Rewrite for EVI Service Instance 165
Configuring EVPN-VPWS for Logging 165
Verfiying EVPN-VPWS Instance 166
Verifying EVPN-VPWS Configuration 166
Verifying EVPN-VPWS Configuration for Logging 168
Troubleshooting 168
Virtual Circuit (VC) is in Down state 168
VC FSM History 170
Remote-Wait State 170
Configuration Examples for EVPN-VPWS Instance 171
Additional References for EVPN-VPWS 173
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
ix
Contents
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
x
CHAPTER 1
L2VPN Protocol-Based CLIs
The L2VPN Protocol-Based CLIs feature provides a set of processes and an improved infrastructure for
developing and delivering Cisco IOS software on various Cisco platforms. This feature introduces new
commands and modifies or replaces existing commands to achieve a consistent functionality across Cisco
platforms and provide cross-Operating System (OS) support.
• Finding Feature Information, on page 1
• Information About L2VPN Protocol-Based CLIs, on page 1
• Additional References, on page 10
• Feature Information for L2VPN Protocol-Based CLI, on page 10
Note The new, updated, and replacement commands are available in Cisco IOS XE Release 3.7S and Cisco IOS
Release 15.3(1)S. However, the legacy commands that are being replaced will be deprecated in later releases.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
1
L2VPN Protocol-Based CLIs
Benefits of L2VPN Protocol-Based CLIs
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
2
L2VPN Protocol-Based CLIs
L2VPN Protocol-Based CLI Changes
The following commands are modified in Cisco IOS XE Release 3.7S and Cisco IOS Release 15.3(1)S:
• auto-route-target
• bridge-domain parameterized vlan
• debug condition xconnect fib
• debug condition xconnect interface
• debug condition xconnect peer
• debug condition xconnect segment
• description
• encapsulation (MPLS)
• forward permit l2protocol all
• interworking
• l2vpn subscriber authorization group
• l2vpn xconnect context
• load-balance flow
• monitor event-trace ac
• monitor event-trace atom
• monitor event-trace l2tp
• monitor peer bfd
• mtu
• preferred-path
• remote circuit id
• rd (VPLS)
• route-target (VPLS)
• sequencing
• status
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
3
L2VPN Protocol-Based CLIs
L2VPN Protocol-Based CLI Changes
The table below lists the legacy commands that will be replaced in future releases. From Cisco IOS XE Release
3.7S and Cisco IOS Release 15.3(1)S both new and legacy commands will coexist until the legacy commands
are deprecated in future releases.
Table 1: Replacement Commands Introduced in Cisco IOS XE Release 3.7S and Cisco IOS Release 15.3(1)S
clear mpls l2transport fsm state transition clear l2vpn atom fsm state transition
clear mpls l2transport fsm event clear l2vpn atom fsm event
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
4
L2VPN Protocol-Based CLIs
L2VPN Protocol-Based CLI Changes
debug mpls l2transport vc vccv bfd event debug l2vpn atom vc vccv
l2 router-id router-id
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
5
L2VPN Protocol-Based CLIs
MPLS L2VPN Protocol-Based CLI: Examples
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
6
L2VPN Protocol-Based CLIs
MPLS L2VPN Protocol-Based CLI: Examples
MPLS L2VPN Pseudowire Redundancy Configuration Using Replacement (or New) Commands
The following example shows the configuration for pseudowire redundancy. The new configuration shows
concise pseudowire redundancy with no submodes or separate groups. This configuration allows the addition
of redundant members to a service without service disruption. This configuration also allows modifying or
deleting redundant service configurations without service disruption.
l2vpn xconnect context sample-pw-redundancy
member GigabitEthernet2/1/1 service-instance 200
member 1.1.1.1 180 encap mpls group Denver
member 2.2.2.2 180180 encap mpls group Denver priority 1
member 3.3.3.3 180181 encap mpls group Denver priority 2
redundancy delay 1 20 group Denver
!
interface GigabitEthernet2/1/1
service instance 200 Ethernet
encapsulation dot1q 100
rewrite ingress tag pop 1 symmetric
MPLS L2VPN Static Pseudowire Configuration Using Replacement (or New) Commands
Note The following configuration is shown for the Provider Edge (PE) 1 router in a network scheme where Customer
Edge (CE) 1 and PE 1 and PE 2 and CE 2 traverse through a Provider core (P) router (CE 1—PE 1—P—PE
2—CE 2).
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
7
L2VPN Protocol-Based CLIs
MPLS L2VPN Protocol-Based CLI: Examples
interface g2/1/1
service instance 300 ethernet
encapsulation dot1q 300
no shutdown
!
interface pseudowire 100
neighbor 10.4.4.4 121
encapsulation mpls
label 200 300
signaling protocol none
no shutdown
!
l2vpn xconnect context foo
member GigabitEthernet2/1/1 service-instance 300
member pseudowire 100
MPLS L2VPN Static Pseudowire Template Configuration Using Replacement (or New) Commands
Note The following configuration is shown for the Provider Edge (PE) 1 router in a network scheme where Customer
Edge (CE) 1 and PE 1 and PE 2 and CE 2 traverse through a Provider core (P) router (CE 1—PE 1—P—PE
2—CE 2).
MPLS L2VPN Dynamic Pseudowire Template Configuration Using Replacement (or New) Commands
Note The following configuration is shown for the Provider Edge (PE) 1 router in a network scheme where Customer
Edge (CE) 1 and PE 1 and PE 2 and CE 2 traverse through a Provider core (P) router (CE 1—PE 1—P—PE
2—CE 2).
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
8
L2VPN Protocol-Based CLIs
MPLS L2VPN Protocol-Based CLI: Examples
Displaying MPLS L2VPN Pseudowire Template Configuration Using Replacement (or New) Commands
The following example displays output from the show interface pseudowire command:
PE1#show interface pseudowire 100
pseudowire100 is up
Description: Pseudowire Interface
MTU 1500 bytes, BW 10000000 Kbit
Encapsulation mpls
Peer IP 10.4.4.4, VC ID 121
RX
21 packets 2623 bytes 0 drops
TX
20 packets 2746 bytes 0 drops
The following example displays output from the show template command:
PE1#show template
Sourcing a Template Under an Interface Pseudowire Using Replacement (or New) Commands
The following example configures the interface pseudowire to inherit all attributes defined from a template
on the PE 2 router.
PE2(config-subif)#interface pseudowire 100
PE2(config-if)#source template type pseudowire test
PE2(config-if)#neighbor 10.4.4.4 121
PE2(config-if)#no shutdown
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
9
L2VPN Protocol-Based CLIs
Additional References
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Command List, All Releases
Technical Assistance
Description Link
L2VPN Protocol-Based Cisco IOS XE Release This feature was introduced on the Cisco ASR 920
CLIs 3.13.0S Routers (ASR-920-12CZ-A, ASR-920-12CZ-D,
ASR-920-4SZ-A, ASR-920-4SZ-D).
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
10
CHAPTER 2
Any Transport over MPLS
This module describes how to configure Any Transport over MPLS (AToM) transports data link layer (Layer
2) packets over a Multiprotocol Label Switching (MPLS) backbone. AToM enables service providers to
connect customer sites with existing Layer 2 networks by using a single, integrated, packet-based network
infrastructure--a Cisco MPLS network. Instead of using separate networks with network management
environments, service providers can deliver Layer 2 connections over an MPLS backbone. AToM provides
a common framework to encapsulate and transport supported Layer 2 traffic types over an MPLS network
core.
AToM supports the following like-to-like transport types:
• ATM Adaptation Layer Type-5 (AAL5) over MPLS
• ATM Cell Relay over MPLS
• Ethernet over MPLS (port modes)
• Circuit Emulation (CEM)
Note For information on ATM Cell relay and Circuit Emulation(CEM), see Configuring Pseudowire.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
11
Any Transport over MPLS
Finding Feature Information
General Restrictions
• Address format--Configure the Label Distribution Protocol (LDP) router ID on all PE routers to be a
loopback address with a /32 mask. Otherwise, some configurations might not function properly.
• For PTPoIP configuration with explicit Null MPLS encapsulation, when a Transparent Clock (TC) is
placed between a PTP master and a PTP slave, the TC does not update the correction field.
• TE-FRR with BGP labels for layer 2 and layer 3 VPNs must terminate on the BGP gateway because of
the four-label limitation.
• If an AToM tunnel spans different service providers that exchange MPLS labels using IPv4 Border
Gateway Protocol (BGP) (RFC 3107), you add a label to the stack. The maximum MPLS label stack is
four (FRR label, TE label, LDP label, VC label).
• Hot standby pseudowire (HSPW) convergence without pseudowire grouping increments linearly. For
example, for a thousand virtual circuits, it requires about 54 seconds of convergence time. This is applicable
only for the Cisco RSP3 Module.
Clear interface is not the recommended way to measure the convergence numbers.
• With two ECMP paths, load sharing on L2VPN traffic occurs based on odd or even MPLS VC labels.
If L2VPN circuits have either odd or even MPLS VC labels, load sharing is not performed. But if L2VPN
circuits have a combination of both odd and even MPLS VC labels, then the odd MPLS VC labels circuits
will select one link whereas the even MPLS VC labels circuits will select another link.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
12
Any Transport over MPLS
ATM AAL5 over MPLS Restrictions
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
13
Any Transport over MPLS
Information About Any Transport over MPLS
• Perform a shutdown or no shutdown of the Multilink PPP bundle to change the bundle fragmentation
mode between enabled and disabled.
• Link Fragmentation and Interleaving (LFI) is not supported. However, Multilink PPP fragmentation is
supported by default. To disable fragmentation, see Disabling PPP Multilink Fragmentation section.
• Multicast Multilink PPP is not supported.
• PPP compression is not supported.
• IPv6 is not supported for this feature.
• PPP half bridging is not supported.
• To enable an Address-and-Control-Field-Compression (ACFC) or Protocol-Field-Compression (PFC)
configuration, perform a shutdown or no shutdown on the serial interface.
• Fractional timeslots cannot be used as memberlink in a Multilink PPP bundle.
• Frame Relay (FR) and Multilink Frame Relay (MFR) are not supported.
• Compressing IP or UDP or RTP headers are not supported.
• PPP and Multilink PPP are supported on synchronous serial interfaces. Asynchronous serial interfaces,
High-Speed Serial Interfaces (HSSI), and ISDN interfaces are not supported.
• When you configure interfaces on each end of an Multilink PPP connection with different MTU values,
the link drops traffic at high traffic rates. The configuration of the same MTU is recommended.
The following example shows the basic configuration steps on a PE router that enable the transport of Layer
2 packets. Each transport type has slightly different steps.
Step 1 defines the interface or subinterface on the PE router:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
14
Any Transport over MPLS
How AToM Transports Layer 2 Packets Using Commands Associated with L2VPN Protocol-Based Feature
Router# interface
interface-type interface-number
Step 2 configures an ethernet service instance on an interface and enters service instance configuration mode:
Router(config-if)#service instance number ethernet WORD
Router(config-if)# service instance 393 ethernet ethernet1
Step 3 specifies the encapsulation type for the interface, such as dot1q:
Router(config-if-srv)# encapsulation
encapsulation-type
The combination of the peer router ID and the VC ID must be unique on the router. Two circuits cannot use
the same combination of peer router ID and VC ID.
• Specifies the tunneling method used to encapsulate data in the pseudowire. AToM uses MPLS as the
tunneling method.
Router(config-if-srv)# xconnect
peer-router-id vcid
encapsulation mpls
As an alternative, you can set up a pseudowire class to specify the tunneling method and other characteristics.
For more information, see the Configuring the Pseudowire Class, on page 25.
The following example shows the basic configuration steps on a PE router that enable the transport of Layer
2 packets. Each transport type has slightly different steps.
Step 1 defines the interface or subinterface on the PE router:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
15
Any Transport over MPLS
Benefits of AToM
Router# interface
interface-type interface-number
Router(config)# interface gi 0/1/0
Step 2 configures an ethernet service instance on an interface and enters service instance configuration mode:
Router(config-if)#service instance number ethernet WORD
Router(config-if)# service instance 393 ethernet ethernet1
Step 3 specifies the encapsulation type for the interface, such as dot1q:
Router(config-if)# encapsulation
encapsulation-type
Router(config-if-srv)# encapsulation dot1q 393
The combination of the peer router ID and the VC ID must be unique on the router. Two circuits cannot use
the same combination of peer router ID and VC ID.
• Specifies the tunneling method used to encapsulate data in the pseudowire. AToM uses MPLS as the
tunneling method.
Router(config-xconnect)# exit
As an alternative, you can set up a pseudowire class to specify the tunneling method and other characteristics.
For more information, see the Configuring the Pseudowire Class, on page 25.
Benefits of AToM
The following list explains some of the benefits of enabling Layer 2 packets to be sent in the MPLS network:
• The AToM product set accommodates many types of Layer 2 packets, including Ethernet and Frame
Relay, across multiple Cisco router platforms. This enables the service provider to transport all types of
traffic over the backbone and accommodate all types of customers.
• AToM adheres to the standards developed for transporting Layer 2 packets over MPLS. This benefits
the service provider that wants to incorporate industry-standard methodologies in the network. Other
Layer 2 solutions are proprietary, which can limit the service provider’s ability to expand the network
and can force the service provider to use only one vendor’s equipment.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
16
Any Transport over MPLS
MPLS Traffic Engineering Fast Reroute
• Upgrading to AToM is transparent to the customer. Because the service provider network is separate
from the customer network, the service provider can upgrade to AToM without disruption of service to
the customer. The customers assume that they are using a traditional Layer 2 backbone.
Core MTU >= (Edge MTU + Transport header + AToM header + (MPLS label stack * MPLS label
size))
Edge MTU
The edge MTU is the MTU for the customer-facing interfaces.
Transport Header
The Transport header depends on the transport type. The table below lists the specific sizes of the headers.
Frame Relay DLCI 2 bytes for Cisco encapsulation, 8 bytes for Internet Engineering Task Force (IETF)
encapsulation
HDLC 4 bytes
PPP 4 bytes
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
17
Any Transport over MPLS
Estimating Packet Size Example
AToM Header
The AToM header is 4 bytes (control word). The control word is optional for Ethernet, PPP, HDLC, and cell
relay transport types. The control word is required for Frame Relay and ATM AAL5 transport types.
Other circumstances can increase the MPLS label stack size. Therefore, analyze the complete data path between
the AToM tunnel endpoints and determine the maximum MPLS label stack size for your network. Then
multiply the label stack size by the size of the MPLS label.
Edge MTU + Transport header + AToM header + (MPLS label stack * MPLS label) = Core MTU
1500 + 18 + 0 + (2 * 4 ) = 1526
You must configure the P and PE routers in the core to accept packets of 1526 bytes.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
18
Any Transport over MPLS
QoS Features Supported with AToM
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
19
Any Transport over MPLS
QoS Features Supported with AToM
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
20
Any Transport over MPLS
QoS Features Supported with AToM
Table 6: QoS Features Supported with ATM Cell Relay and AAL5 over MPLS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
21
Any Transport over MPLS
Any Transport over MPLS (AToM) Remote Ethernet Port Shutdown
Previous to this feature, the Provider Edge 2 router could not detect a failed remote link. Traffic forwarded
from Customer Edge 2 to Customer Edge 1 would be lost until routing or spanning tree protocols detected
the down remote link. If the link was configured with static routing, the remote link outage would be even
more difficult to detect.
With this feature, the Provider Edge 2 router detects the remote link failure and causes a shutdown of the local
Customer Edge 2 Ethernet port. When the remote L2 tunnel link is restored, the local interface is automatically
restored as well. The possibility of data loss is thus diminished.
With reference to the figure above, the Remote Ethernet Shutdown sequence is generally described as follows:
1. The remote link between Customer Edge 1 and Provider Edge 1 fails.
2. Provider Edge 2 detects the remote link failure and disables the transmit laser on the line card interface
connected to Customer Edge 2.
3. An RX_LOS error alarm is received by Customer Edge 2 causing Customer Edge 2 to bring down the
interface.
4. Provider Edge 2 maintains its interface with Customer Edge 2 in an up state.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
22
Any Transport over MPLS
Any Transport over MPLS (AToM) Remote Ethernet Port Shutdown Using Commands Associated with L2VPN Protocol-Based Feature
5. When the remote link and EoMPLS connection is restored, the Provider Edge 2 router enables the transmit
laser.
6. The Customer Edge 2 router brings up its downed interface.
This feature is enabled by default for Ethernet over MPLS (EoMPLS). You can also enable this feature by
using the remote link failure notification command in xconnect configuration mode as shown in the following
example:
pseudowire-class eompls
encapsulation mpls
!
interface GigabitEthernet1/0/0
xconnect 10.13.13.13 1 pw-class eompls
remote link failure notification
!
This feature can be disabled using the no remote link failure notification command in xconnect configuration
mode. Use the show ip interface brief privileged EXEC command to display the status of all remote L2
tunnel links. Use the show interface privileged EXEC command to show the status of the L2 tunnel on a
specific interface.
Note The no remote link failure notification command will not give notification to clients for remote attachment
circuit status down.
Note Remote Ethernet Port Shutdown is supported only on EFP with encapsulation default.
Any Transport over MPLS (AToM) Remote Ethernet Port Shutdown Using
Commands Associated with L2VPN Protocol-Based Feature
This Cisco IOS XE feature allows a service provider edge (PE) router on the local end of an Ethernet over
MPLS (EoMPLS) pseudowire to detect a remote link failure and cause the shutdown of the Ethernet port on
the local customer edge (CE) router. Because the Ethernet port on the local CE router is shut down, the router
does not lose data by continuously sending traffic to the failed remote link. This is beneficial if the link is
configured as a static IP route.
The figure below illustrates a condition in an EoMPLS WAN, with a down Layer 2 tunnel link between a CE
router (Customer Edge 1) and the PE router (Provider Edge 1). A CE router on the far side of the Layer 2
tunnel (Customer Edge 2), continues to forward traffic to Customer Edge 1 through the L2 tunnel.
Figure 2: Remote Link Outage in EoMPLS WAN
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
23
Any Transport over MPLS
How to Configure Any Transport over MPLS
Previous to this feature, the Provider Edge 2 router could not detect a failed remote link. Traffic forwarded
from Customer Edge 2 to Customer Edge 1 would be lost until routing or spanning tree protocols detected
the down remote link. If the link was configured with static routing, the remote link outage would be even
more difficult to detect.
With this feature, the Provider Edge 2 router detects the remote link failure and causes a shutdown of the local
Customer Edge 2 Ethernet port. When the remote L2 tunnel link is restored, the local interface is automatically
restored as well. The possibility of data loss is thus diminished.
With reference to the figure above, the Remote Ethernet Shutdown sequence is generally described as follows:
1. The remote link between Customer Edge 1 and Provider Edge 1 fails.
2. Provider Edge 2 detects the remote link failure and disables the transmit laser on the line card interface
connected to Customer Edge 2.
3. An RX_LOS error alarm is received by Customer Edge 2 causing Customer Edge 2 to bring down the
interface.
4. Provider Edge 2 maintains its interface with Customer Edge 2 in an up state.
5. When the remote link and EoMPLS connection is restored, the Provider Edge 2 router enables the transmit
laser.
6. The Customer Edge 2 router brings up its downed interface.
This feature is enabled by default for Ethernet over MPLS (EoMPLS). You can also enable this feature by
using the remote link failure notification command in xconnect configuration mode as shown in the following
example:
l2vpn xconnect context con1
member GigabitEthernet1/0/0 service-instance 300
member Pseudowire 100
remote link failure notification
This feature can be disabled using the no remote link failure notification command in xconnect configuration
mode. Use the show ip interface brief privileged EXEC command to display the status of all remote L2
tunnel links. Use the show interface privileged EXEC command to show the status of the L2 tunnel on a
specific interface.
Note The no remote link failure notification command will not give notification to clients for remote attachment
circuit status down.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
24
Any Transport over MPLS
Configuring the Pseudowire Class
Note In simple configurations, this task is optional. You need not specify a pseudowire class if you specify the
tunneling method as part of the xconnect command.
• You must specify the encapsulation mpls command as part of the pseudowire class or as part of the
xconnect command for the AToM VCs to work properly. If you omit the encapsulation mpls command
as part of the xconnect command, you receive the following error:
% Incomplete command.
SUMMARY STEPS
1. enable
2. configure terminal
3. pseudowire-class name
4. encapsulation mpls
DETAILED STEPS
Router> enable
Step 3 pseudowire-class name Establishes a pseudowire class with a name that you specify
and enters pseudowire class configuration mode.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
25
Any Transport over MPLS
Configuring the Pseudowire Class Using Commands Associated with L2VPN Protocol-Based Feature
Note In simple configurations, this task is optional. You need not specify a pseudowire class if you specify the
tunneling method as part of the l2vpn xconnect context command.
• You must specify the encapsulation mpls command as part of the pseudowire class or as part of the
l2vpn xconnect context command for the AToM VCs to work properly. If you omit the encapsulation
mpls command as part of the l2vpn xconnect contextcommand, you receive the following error:
% Incomplete command.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface pseudowire name
4. encapsulation mpls
5. neighbor peer-address vcid-value
DETAILED STEPS
Router> enable
Step 3 interface pseudowire name Establishes an interface pseudowire with a name that you
specify and enters pseudowire class configuration mode.
Example:
Step 5 neighbor peer-address vcid-value Specifies the peer IP address and virtual circuit (VC) ID
value of a Layer 2 VPN (L2VPN) pseudowire.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
26
Any Transport over MPLS
Changing the Encapsulation Type and Removing a Pseudowire
To remove the encapsulation mpls command, you must delete the pseudowire with the no pseudowire-class
command.
To change the type of encapsulation, remove the pseudowire using the no pseudowire-class command and
reconfigure the pseudowire to specify the new encapsulation type.
To remove the encapsulation mpls command, you must delete the pseudowire with the no interface
pseudowire command.
To change the type of encapsulation, remove the pseudowire using the no template type pseudowire command
and reconfigure the pseudowire to specify the new encapsulation type.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot / subslot / port [. subinterface]
4. pvc [name] vpi / vci l2transport
5. encapsulation aal5
6. xconnect peer-router-id vcid encapsulation mpls
7. end
8. show mpls l2transport vc
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
27
Any Transport over MPLS
Configuring ATM AAL5 over MPLS on PVCs
DETAILED STEPS
Router> enable
Step 3 interface type slot / subslot / port [. subinterface] Specifies the interface type and enters interface
configuration mode.
Example:
Step 4 pvc [name] vpi / vci l2transport Creates or assigns a name to an ATM PVC and enters
L2transport PVC configuration mode.
Example:
• The l2transport keyword indicates that the PVC is a
Router(config-if)# pvc 1/200 l2transport switched PVC instead of a terminated PVC.
Step 5 encapsulation aal5 Specifies ATM AAL5 encapsulation for the PVC. Make
sure you specify the same encapsulation type on the PE and
Example:
customer edge (CE) routers.
Router(config-if-atm-l2trans-pvc)# encapsulation
aal5
Step 6 xconnect peer-router-id vcid encapsulation mpls Binds the attachment circuit to a pseudowire VC.
Example:
Router(config-if-atm-l2trans-pvc)# xconnect
10.13.13.13 100 encapsulation mpls
Router(config-if-atm-l2trans-pvc)# end
Step 8 show mpls l2transport vc Displays output that shows ATM AAL5 over MPLS is
configured on a PVC.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
28
Any Transport over MPLS
Configuring ATM AAL5 over MPLS on PVCs using the commands associated with the L2VPN Protocol-Based CLIs feature
Examples
The following is sample output from the show mpls l2transport vc command that shows that ATM
AAL5 over MPLS is configured on a PVC:
Configuring ATM AAL5 over MPLS on PVCs using the commands associated with the L2VPN
Protocol-Based CLIs feature
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot / subslot / port[. subinterface]
4. pvc [name] vpi / vci l2transport
5. encapsulation aal5
6. end
7. interface pseudowire number
8. encapsulation mpls
9. neighbor peer-address vcid-value
10. exit
11. l2vpn xconnect context context-name
12. member pseudowire interface-number
13. member atm interface-number pvc vpi / vci
14. end
15. show l2vpn atom vc
DETAILED STEPS
Device> enable
Step 3 interface type slot / subslot / port[. subinterface] Specifies the interface type and enters interface
configuration mode.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
29
Any Transport over MPLS
Configuring ATM AAL5 over MPLS on PVCs using the commands associated with the L2VPN Protocol-Based CLIs feature
Step 4 pvc [name] vpi / vci l2transport Creates or assigns a name to an ATM PVC and enters
L2transport PVC configuration mode.
Example:
• The l2transport keyword indicates that the PVC is
Device(config-if)# pvc 1/200 l2transport a switched PVC instead of a terminated PVC.
Step 5 encapsulation aal5 Specifies ATM AAL5 encapsulation for the PVC. Make
sure you specify the same encapsulation type on the PE
Example:
and customer edge (CE) routers.
Device(config-if-atm-l2trans-pvc)# encapsulation
aal5
Device(config-if-atm-l2trans-pvc)# end
Step 7 interface pseudowire number Specifies the pseudowire interface and enters interface
configuration mode.
Example:
Step 9 neighbor peer-address vcid-value Specifies the peer IP address and virtual circuit (VC) ID
value of the Layer 2 VPN (L2VPN) pseudowire.
Example:
Device(config-if)# exit
Step 11 l2vpn xconnect context context-name Creates a Layer 2 VPN (L2VPN) cross connect context
and enters xconnect configuration mode.
Example:
Step 12 member pseudowire interface-number Specifies a member pseudowire to form a Layer 2 VPN
(L2VPN) cross connect.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
30
Any Transport over MPLS
Configuring ATM AAL5 over MPLS in VC Class Configuration Mode
Device(config-xconnect)# end
Step 15 show l2vpn atom vc Displays output that shows ATM AAL5 over MPLS is
configured on a PVC.
Example:
Examples
The following is sample output from the show l2vpn atom vc command that shows that ATM AAL5
over MPLS is configured on a PVC:
SUMMARY STEPS
1. enable
2. configure terminal
3. vc-class atm vc-class-name
4. encapsulation layer-type
5. exit
6. interface type slot / subslot / port [. subinterface]
7. class-int vc-class-name
8. pvc [name] vpi / vci l2transport
9. xconnect peer-router-id vcid encapsulation mpls
10. end
11. show atm class-links
DETAILED STEPS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
31
Any Transport over MPLS
Configuring ATM AAL5 over MPLS in VC Class Configuration Mode
Router> enable
Step 3 vc-class atm vc-class-name Creates a VC class and enters VC class configuration
mode.
Example:
Router(config-vc-class)# exit
Step 6 interface type slot / subslot / port [. subinterface] Specifies the interface type enters interface configuration
mode.
Example:
Step 8 pvc [name] vpi / vci l2transport Creates or assigns a name to an ATM PVC and enters
L2transport PVC configuration mode.
Example:
• The l2transport keyword indicates that the PVC is
Router(config-if)# pvc 1/200 l2transport a switched PVC instead of a terminated PVC.
Step 9 xconnect peer-router-id vcid encapsulation mpls Binds the attachment circuit to a pseudowire VC.
Example:
Router(config-if-atm-l2trans-pvc)# xconnect
10.13.13.13 100 encapsulation mpls
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
32
Any Transport over MPLS
Configuring ATM AAL5 over MPLS in VC Class Configuration Mode using the commands associated with the L2VPN Protocol-Based CLIs feature
Router(config-if-atm-l2trans-pvc)# end
Step 11 show atm class-links Displays the type of encapsulation and that the VC class
was applied to an interface.
Example:
Examples
In the following example, the command output from the show atm class-links command verifies
that ATM AAL5 over MPLS is configured as part of a VC class. The command output shows the
type of encapsulation and that the VC class was applied to an interface.
Configuring ATM AAL5 over MPLS in VC Class Configuration Mode using the commands associated
with the L2VPN Protocol-Based CLIs feature
SUMMARY STEPS
1. enable
2. configure terminal
3. vc-class atm vc-class-name
4. encapsulation layer-type
5. exit
6. interface type slot / subslot / port [. subinterface]
7. class-int vc-class-name
8. pvc [name] vpi / vci l2transport
9. exit
10. interface pseudowire number
11. encapsulation mpls
12. neighbor peer-address vcid-value
13. exit
14. l2vpn xconnect context context-name
15. member pseudowire interface-number
16. member atm interface-number
17. end
18. show atm class-links
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
33
Any Transport over MPLS
Configuring ATM AAL5 over MPLS in VC Class Configuration Mode using the commands associated with the L2VPN Protocol-Based CLIs feature
DETAILED STEPS
Router> enable
Step 3 vc-class atm vc-class-name Creates a VC class and enters VC class configuration
mode.
Example:
Router(config-vc-class)# exit
Step 6 interface type slot / subslot / port [. subinterface] Specifies the interface type enters interface configuration
mode.
Example:
Step 8 pvc [name] vpi / vci l2transport Creates or assigns a name to an ATM PVC and enters
L2transport PVC configuration mode.
Example:
• The l2transport keyword indicates that the PVC is
Router(config-if)# pvc 1/200 l2transport a switched PVC instead of a terminated PVC.
Router(config-if)# exit
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
34
Any Transport over MPLS
Configuring ATM AAL5 over MPLS in VC Class Configuration Mode using the commands associated with the L2VPN Protocol-Based CLIs feature
Step 12 neighbor peer-address vcid-value Specifies the peer IP address and virtual circuit (VC) ID
value of the Layer 2 VPN (L2VPN) pseudowire.
Example:
Router(config-if)# exit
Step 14 l2vpn xconnect context context-name Creates a Layer 2 VPN (L2VPN) cross connect context
and enters xconnect configuration mode.
Example:
Step 15 member pseudowire interface-number Specifies a member pseudowire to form a Layer 2 VPN
(L2VPN) cross connect.
Example:
Step 16 member atm interface-number Specifies the location of the ATM member interface.
Example:
Router(config-if-atm-l2trans-pvc)# end
Step 18 show atm class-links Displays the type of encapsulation and that the VC class
was applied to an interface.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
35
Any Transport over MPLS
Configuring Ethernet over MPLS
Examples
In the following example, the command output from the show atm class-links command verifies
that ATM AAL5 over MPLS is configured as part of a VC class. The command output shows the
type of encapsulation and that the VC class was applied to an interface.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot / subslot / port
4. no ip address
5. negotiation auto
6. service instance id ethernet
7. xconnect peer-router-id vcid encapsulation mpls
8. end
9. show mpls l2transport vc
DETAILED STEPS
Router> enable
Step 3 interface gigabitethernet slot / subslot / port Specifies the Gigabit Ethernet interface and enters interface
configuration mode.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
36
Any Transport over MPLS
Configuring Ethernet over MPLS in Port Mode Using Commands Associated with the L2VPN Protocol-Based Feature
Router(config-if)# no ip address
Step 6 service instance id ethernet Configures an ethernet service instance on an interface and
enters service instance configuration mode.
Example:
Step 7 xconnect peer-router-id vcid encapsulation mpls Binds the attachment circuit to a pseudowire VC.
Example:
Router(config-if)# end
Step 9 show mpls l2transport vc Displays information about Ethernet over MPLS port mode.
Example:
Configuring Ethernet over MPLS in Port Mode Using Commands Associated with the L2VPN
Protocol-Based Feature
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot / subslot / port[. subinterface]
4. end
5. interface pseudowire number
6. encapsulation mpls
7. neighbor peer-address vcid-value
8. exit
9. l2vpn xconnect context context-name
10. member pseudowire interface-number
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
37
Any Transport over MPLS
Configuring Ethernet over MPLS in Port Mode Using Commands Associated with the L2VPN Protocol-Based Feature
DETAILED STEPS
Device> enable
Step 3 interface gigabitethernet slot / subslot / port[. Specifies the Gigabit Ethernet interface and enters interface
subinterface] configuration mode.
Example: • Make sure the interface on the adjoining CE router
is on the same VLAN as this PE router.
Device(config)# interface gigabitethernet4/0/0
Device(config-if)# end
Step 5 interface pseudowire number Specifies the pseudowire interface and enters interface
configuration mode.
Example:
Step 7 neighbor peer-address vcid-value Specifies the peer IP address and virtual circuit (VC) ID
value of the Layer 2 VPN (L2VPN) pseudowire.
Example:
Device(config-if)# exit
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
38
Any Transport over MPLS
Configuring Tunnel Selection
Step 10 member pseudowire interface-number Specifies a member pseudowire to form a Layer 2 VPN
(L2VPN) cross connect.
Example:
Step 11 member gigabitethernet interface-number Specifies the location of the Gigabit Ethernet member
interface.
Example:
Device(config-xconnect)# member
GigabitEthernet0/0/0.1
Device(config-xconnect)# end
Device(config-if)# end
Step 14 show l2vpn atom vc Displays information about Ethernet over MPLS port
mode.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
39
Any Transport over MPLS
Configuring Tunnel Selection
DETAILED STEPS
Router> enable
Step 3 pseudowire-class name Establishes a pseudowire class with a name that you specify
and enters pseudowire configuration mode.
Example:
Step 4 encapsulation mpls Specifies the tunneling encapsulation. For AToM, the
encapsulation type is mpls.
Example:
Step 5 preferred-path {interface tunnel tunnel-number | Specifies the MPLS traffic engineering tunnel or IP address
peer{ip-address | host-name}} [disable-fallback] or hostname to be used as the preferred path.
Example:
Step 6 exit Exits from pseudowire configuration mode and enables the
Tunnel Selection feature.
Example:
Router(config-pw)# exit
Step 7 interface type slot / subslot / port Specifies an interface type and enters interface configuration
mode.
Example:
Step 9 xconnect peer-router-id vcid pw-class name Binds the attachment circuit to a pseudowire VC.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
40
Any Transport over MPLS
Troubleshooting Tips
Examples
In the following sample output from the show mpls l2transport vc command includes the following
information about the VCs:
• VC 101 has been assigned a preferred path called Tunnel1. The default path is disabled, because
the preferred path specified that the default path should not be used if the preferred path fails.
• VC 150 has been assigned an IP address of a loopback address on PE2. The default path can
be used if the preferred path fails.
Command output that is in boldface font shows the preferred path information.
Troubleshooting Tips
To debug ATM cell packing, issue the debug atm cell-packing command.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
41
Any Transport over MPLS
Configuring Tunnel Selection Using Commands Associated with L2VPN Protocol-Based Feature
DETAILED STEPS
Router> enable
Step 3 template type pseudowire name Creates a template pseudowire with a name that you specify
and enters pseudowire configuration mode.
Example:
Step 4 encapsulation mpls Specifies the tunneling encapsulation. For AToM, the
encapsulation type is mpls.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
42
Any Transport over MPLS
Configuring Tunnel Selection Using Commands Associated with L2VPN Protocol-Based Feature
Router(config-pw)# exit
Step 7 interface type slot / subslot / port[. subinterface] Specifies an interface type and enters interface
configuration mode.
Example:
Router(config-if)# end
Step 10 interface pseudowire number Specifies the pseudowire interface and enters interface
configuration mode.
Example:
Step 11 source template type pseudowire name Configures the source template of type pseudowire named
ts1.
Example:
Step 12 neighbor peer-address vcid-value Specifies the peer IP address and virtual circuit (VC) ID
value of a Layer 2 VPN (L2VPN) pseudowire.
Example:
Router(config-if)# end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
43
Any Transport over MPLS
Troubleshooting Tips using the commands associated with the L2VPN Protocol-Based CLIs feature
Step 15 member pseudowire interface-number Specifies a member pseudowire to form a Layer 2 VPN
(L2VPN) cross connect.
Example:
Step 16 member ip-address vc-id encapsulation mpls Creates the VC to transport the Layer 2 packets.
Example:
Router(config-xconnect)# end
Troubleshooting Tips using the commands associated with the L2VPN Protocol-Based CLIs feature
You can use the debug l2vpn atom vc event command to troubleshoot tunnel selection. For example, if the
tunnel interface that is used for the preferred path is shut down, the default path is enabled. The debug l2vpn
atom vc event command provides the following output:
AToM SMGR [10.2.2.2, 101]: Processing imposition update, vc_handle 62091860, update_action
3, remote_vc_label 16
AToM SMGR [10.2.2.2, 101]: selected route no parent rewrite: tunnel not up
AToM SMGR [10.2.2.2, 101]: Imposition Programmed, Output Interface: Et3/2
SUMMARY STEPS
1. enable
2. configure terminal
3. class-map class-name
4. match any
5. policy-map policy-name
6. class class-name
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
44
Any Transport over MPLS
Setting Experimental Bits with AToM
DETAILED STEPS
Router> enable
Step 3 class-map class-name Specifies the user-defined name of the traffic class and
enters class map configuration mode.
Example:
Step 4 match any Specifies that all packets will be matched. Use only the
any keyword. Other keywords might cause unexpected
Example:
results.
Router(config-cmap)# match any
Step 5 policy-map policy-name Specifies the name of the traffic policy to configure and
enters policy-map configuration mode.
Example:
Step 6 class class-name Specifies the name of a predefined traffic class, which was
configured with the class-map command, used to classify
Example:
traffic to the traffic policy and enters policy-map class
configuration mode.
Router(config-pmap)# class class1
Step 7 set mpls experimental value Designates the value to which the MPLS bits are set if the
packets match the specified policy map.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
45
Any Transport over MPLS
Enabling the Control Word
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Step 10 interface type slot / subslot / port Specifies the interface type and enters interface
configuration mode.
Example:
Router(config-if)# end
Step 13 show policy-map interface interface-name [vc [vpi /] Displays the traffic policy attached to an interface.
vci] [dlci dlci] [input | output]
Example:
DETAILED STEPS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
46
Any Transport over MPLS
Enabling the Control Word using the commands associated with the L2VPN Protocol-Based CLIs feature
Router> enable
Router(config-pw-class)# control-word
Router(config-pw-class)# end
Enabling the Control Word using the commands associated with the L2VPN
Protocol-Based CLIs feature
SUMMARY STEPS
1. enable
2. configure terminal
3. interface pseudowire number
4. encapsulation mpls
5. control-word include
6. neighbor peer-address vcid-value
7. end
DETAILED STEPS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
47
Any Transport over MPLS
Configuring MPLS AToM Remote Ethernet Port Shutdown
Router> enable
Step 3 interface pseudowire number Creates an interface pseudowire with a value that you
specify and enters pseudowire configuration mode.
Example:
Step 6 neighbor peer-address vcid-value Specifies the peer IP address and virtual circuit (VC) ID
value of a Layer 2 VPN (L2VPN) pseudowire.
Example:
Router(config-pw)# end
Note The Any Transport over MPLS (AToM): Remote Ethernet Port Shutdown feature is automatically enabled
by default when an image with the feature supported is loaded on the router.
SUMMARY STEPS
1. enable
2. configure terminal
3. pseudowire-class [pw-class-name]
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
48
Any Transport over MPLS
Configuring MPLS AToM Remote Ethernet Port Shutdown
4. encapsulation mpls
5. exit
6. interface type slot / subslot / port
7. service instance number ethernet number
8. encapsulation default
9. xconnect peer-ip-address vc-id pw-class pw-class-name
10. no remote link failure notification
11. remote link failure notification
12. end
DETAILED STEPS
Router> enable
Step 3 pseudowire-class [pw-class-name] Specifies the name of a Layer 2 pseudowire class and
enters pseudowire class configuration mode.
Example:
Step 4 encapsulation mpls Specifies that MPLS is used as the data encapsulation
method for tunneling Layer 2 traffic over the pseudowire.
Example:
Router(config-pw)# exit
Step 6 interface type slot / subslot / port Configures an interface type and enters interface
configuration mode.
Example:
Step 7 service instance number ethernet number Configures an ethernet service instance on an interface
and enters service instance configuration mode.
Example:
Router(config-if)# service instance 393 ethernet
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
49
Any Transport over MPLS
Configuring MPLS AToM Remote Ethernet Port Shutdown using the commands associated with the L2VPN Protocol-Based CLIs feature
Step 9 xconnect peer-ip-address vc-id pw-class Binds an attachment circuit to a pseudowire, and configures
pw-class-name an Any Transport over MPLS (AToM) static pseudowire.
Example:
Step 10 no remote link failure notification Disables MPLS AToM remote link failure notification and
shutdown.
Example:
Step 11 remote link failure notification Enables MPLS AToM remote link failure notification and
shutdown.
Example:
Router(config-if-xconn)# end
Configuring MPLS AToM Remote Ethernet Port Shutdown using the commands
associated with the L2VPN Protocol-Based CLIs feature
Note The Any Transport over MPLS (AToM): Remote Ethernet Port Shutdown feature is automatically enabled
by default when an image with the feature supported is loaded on the router.
SUMMARY STEPS
1. enable
2. configure terminal
3. template type pseudowire [pseudowire-name]
4. encapsulation mpls
5. exit
6. interface type slot / subslot / port
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
50
Any Transport over MPLS
Configuring MPLS AToM Remote Ethernet Port Shutdown using the commands associated with the L2VPN Protocol-Based CLIs feature
DETAILED STEPS
Device> enable
Step 3 template type pseudowire [pseudowire-name] Specifies the name of a Layer 2 pseudowire class and
enters pseudowire class configuration mode.
Example:
Step 4 encapsulation mpls Specifies that MPLS is used as the data encapsulation
method for tunneling Layer 2 traffic over the pseudowire.
Example:
Device(config-pw)# exit
Step 6 interface type slot / subslot / port Configures an interface type and enters interface
configuration mode.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
51
Any Transport over MPLS
Configuration Examples for Any Transport over MPLS
Step 9 neighbor peer-address vcid-value Specifies the peer IP address and virtual circuit (VC) ID
value of a Layer 2 VPN (L2VPN) pseudowire.
Example:
Device(config-if)# end
Step 11 l2vpn xconnect context context-name Creates a Layer 2 VPN (L2VPN) cross connect context
and enters xconnect configuration mode.
Example:
Step 12 no remote link failure notification Disables MPLS AToM remote link failure notification and
shutdown.
Example:
Step 13 remote link failure notification Enables MPLS AToM remote link failure notification and
shutdown.
Example:
Device(config-xconnect)# end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
52
Any Transport over MPLS
Example: ATM over MPLS Using Commands Associated with L2VPN Protocol-Based Feature
PE1 PE2
mpls ldp router-id Loopback0 force mpls ldp router-id Loopback0 force
! !
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
53
Any Transport over MPLS
Example: ATM over MPLS Using Commands Associated with L2VPN Protocol-Based Feature
PE1 PE2
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
54
Any Transport over MPLS
Example: ATM over MPLS Using Commands Associated with L2VPN Protocol-Based Feature
PE1 PE2
mpls ldp router-id Loopback0 force mpls ldp router-id Loopback0 force
! !
! !
! !
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
55
Any Transport over MPLS
Example: Configuring ATM AAL5 over MPLS in VC Class Configuration Mode
PE1 PE2
enable
configure terminal
vc-class atm aal5class
encapsulation aal5
interface atm1/0/0
class-int aal5class
pvc 1/200 l2transport
xconnect 10.13.13.13 100 encapsulation mpls
The following example configures ATM AAL5 over MPLS in VC class configuration mode. The VC class
is then applied to a PVC.
enable
configure terminal
vc-class atm aal5class
encapsulation aal5
interface atm1/0/0
pvc 1/200 l2transport
class-vc aal5class
xconnect 10.13.13.13 100 encapsulation mpls
enable
configure terminal
vc-class atm aal5class
encapsulation aal5
interface atm1/0/0
class-int aal5class
pvc 1/200 l2transport
interface pseudowire 100
encapsulation mpls
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
56
Any Transport over MPLS
Example: Ethernet over MPLS with MPLS Traffic Engineering Fast Reroute
Example: Ethernet over MPLS with MPLS Traffic Engineering Fast Reroute
The following configuration example and the figure show the configuration of Ethernet over MPLS with fast
reroute on AToM PE routers.
Routers PE1 and PE2 have the following characteristics:
• A TE tunnel called Tunnel41 is configured between PE1and PE2, using an explicit path through a link
called L1. AToM VCs are configured to travel through the FRR-protected tunnel Tunnel41.
• The link L1 is protected by FRR, the backup tunnel is Tunnel1.
• PE2 is configured to forward the AToM traffic back to PE1 through the L2 link.
PE1 Configuration
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
57
Any Transport over MPLS
Example: Ethernet over MPLS with MPLS Traffic Engineering Fast Reroute
P Configuration
ip cef
mpls traffic-eng tunnels
!
interface Loopback1
ip address 10.0.0.1 255.255.255.255
!
interface FastEthernet1/0/0
ip address 10.4.1.2 255.255.255.0
mpls traffic-eng tunnels
ip rsvp bandwidth 10000 10000
!
interface POS8/0/0
description xxxx POS0/0
ip address 10.1.0.1 255.255.255.252
mpls traffic-eng tunnels
pos ais-shut
pos report lrdi
ip rsvp bandwidth 155000 155000
!
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
58
Any Transport over MPLS
Example: Ethernet over MPLS with MPLS Traffic Engineering Fast Reroute Using Commands Associated with L2VPN Protocol-Based Feature
interface POS10/1/0
description xxxx POS0/3
ip address 10.1.0.13 255.255.255.252
mpls traffic-eng tunnels
ip rsvp bandwidth 155000 155000
!
router ospf 1
network 10.0.0.0 0.255.255.255 area 0
mpls traffic-eng router-id Loopback1
mpls traffic-eng area 0
PE2 Configuration
ip cef
mpls label protocol ldp
mpls traffic-eng tunnels
mpls ldp router-id Loopback1 force
!
interface Loopback1
ip address 10.0.0.4 255.255.255.255
!
interface loopback 2
ip address 10.4.0.1 255.255.255.255
!
interface Tunnel27
ip unnumbered Loopback1
tunnel destination 10.0.0.27
tunnel mode mpls traffic-eng
tunnel mpls traffic-eng autoroute announce
tunnel mpls traffic-eng priority 1 1
tunnel mpls traffic-eng bandwidth 1000
tunnel mpls traffic-eng path-option 1 explicit name xxxx-1
!
interface FastEthernet0/0/0.2
encapsulation dot1Q 203
xconnect 10.0.0.27 2 encapsulation mpls
!
interface FastEthernet0/0/0.3
encapsulation dot1Q 204
xconnect 10.0.0.27 4 encapsulation mpls
!
interface FastEthernet1/1/0
ip address 10.4.1.1 255.255.255.0
mpls traffic-eng tunnels
ip rsvp bandwidth 10000 10000
!
router ospf 1
network 10.0.0.0 0.255.255.255 area 0
mpls traffic-eng router-id Loopback1
mpls traffic-eng area 0
!
ip explicit-path name xxxx-1 enable
next-address 10.4.1.2
next-address 10.1.0.10
Example: Ethernet over MPLS with MPLS Traffic Engineering Fast Reroute
Using Commands Associated with L2VPN Protocol-Based Feature
The following configuration example and the figure show the configuration of Ethernet over MPLS with fast
reroute on AToM PE routers.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
59
Any Transport over MPLS
Example: Ethernet over MPLS with MPLS Traffic Engineering Fast Reroute Using Commands Associated with L2VPN Protocol-Based Feature
PE1 Configuration
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
60
Any Transport over MPLS
Example: Ethernet over MPLS with MPLS Traffic Engineering Fast Reroute Using Commands Associated with L2VPN Protocol-Based Feature
!
interface POS0/3/0
description pe1name POS10/1/0
ip address 10.1.0.14 255.255.255.252
mpls traffic-eng tunnels
crc 16
clock source internal
ip rsvp bandwidth 155000 155000
!
interface gigabitethernet3/0/0.1
encapsulation dot1Q 203
interface pseudowire 100
source template type pseudowire T41
neighbor 10.0.0.4 2
!
l2vpn xconnect context con1
!
interface gigabitethernet3/0/0.2
encapsulation dot1Q 204
interface pseudowire 100
source template type pseudowire IP1
neighbor 10.0.0.4 4
!
l2vpn xconnect context con2
!
router ospf 1
network 10.0.0.0 0.255.255.255 area 0
mpls traffic-eng router-id Loopback1
mpls traffic-eng area 0
!
ip classless
ip route 10.4.0.1 255.255.255.255 Tunnel41
!
ip explicit-path name xxxx-1 enable
next-address 10.4.1.2
next-address 10.1.0.10
P Configuration
ip cef
mpls traffic-eng tunnels
!
interface Loopback1
ip address 10.0.0.1 255.255.255.255
!
interface FastEthernet1/0/0
ip address 10.4.1.2 255.255.255.0
mpls traffic-eng tunnels
ip rsvp bandwidth 10000 10000
!
interface POS8/0/0
description xxxx POS0/0
ip address 10.1.0.1 255.255.255.252
mpls traffic-eng tunnels
pos ais-shut
pos report lrdi
ip rsvp bandwidth 155000 155000
!
interface POS10/1/0
description xxxx POS0/3
ip address 10.1.0.13 255.255.255.252
mpls traffic-eng tunnels
ip rsvp bandwidth 155000 155000
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
61
Any Transport over MPLS
Example: Ethernet over MPLS with MPLS Traffic Engineering Fast Reroute Using Commands Associated with L2VPN Protocol-Based Feature
!
router ospf 1
network 10.0.0.0 0.255.255.255 area 0
mpls traffic-eng router-id Loopback1
mpls traffic-eng area 0
PE2 Configuration
ip cef
mpls label protocol ldp
mpls traffic-eng tunnels
mpls ldp router-id Loopback1 force
!
interface Loopback1
ip address 10.0.0.4 255.255.255.255
!
interface loopback 2
ip address 10.4.0.1 255.255.255.255
!
interface Tunnel27
ip unnumbered Loopback1
tunnel destination 10.0.0.27
tunnel mode mpls traffic-eng
tunnel mpls traffic-eng autoroute announce
tunnel mpls traffic-eng priority 1 1
tunnel mpls traffic-eng bandwidth 1000
tunnel mpls traffic-eng path-option 1 explicit name xxxx-1
!
interface FastEthernet0/0/0.2
encapsulation dot1Q 203
interface pseudowire 100
encapsulation mpls
neighbor 10.0.0.1 123
!
l2vpn xconnect context A
member pseudowire 100
member gigabitethernet 0/0/0.1
!
interface FastEthernet0/0/0.3
encapsulation dot1Q 204
interface pseudowire 100
encapsulation mpls
neighbor 10.0.0.1 123
!
l2vpn xconnect context A
member pseudowire 100
member gigabitethernet 0/0/0.1
!
interface FastEthernet1/1/0
ip address 10.4.1.1 255.255.255.0
mpls traffic-eng tunnels
ip rsvp bandwidth 10000 10000
!
router ospf 1
network 10.0.0.0 0.255.255.255 area 0
mpls traffic-eng router-id Loopback1
mpls traffic-eng area 0
!
ip explicit-path name xxxx-1 enable
next-address 10.4.1.2
next-address 10.1.0.10
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
62
Any Transport over MPLS
Example: Configuring Tunnel Selection
PE1 Configuration
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
63
Any Transport over MPLS
Example: Configuring Tunnel Selection
interface FastEthernet2/0/1
ip address 10.0.0.1 255.255.255.0
no ip directed-broadcast
tag-switching ip
mpls traffic-eng tunnels
ip rsvp bandwidth 15000 15000
!
router ospf 1
log-adjacency-changes
network 10.0.0.0 0.0.0.255 area 0
network 10.2.2.2 0.0.0.0 area 0
mpls traffic-eng router-id Loopback0
mpls traffic-eng area 0
!
ip route 10.18.18.18 255.255.255.255 Tunnel2
!
ip explicit-path name path-tu1 enable
next-address 10.0.0.1
index 3 next-address 10.0.0.1
PE2 Configuration
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
64
Any Transport over MPLS
Example: Configuring Tunnel Selection Using Commands Associated with L2VPN Protocol-Based Feature
log-adjacency-changes
network 10.0.0.0 0.0.0.255 area 0
network 10.16.16.16 0.0.0.0 area 0
mpls traffic-eng router-id Loopback0
mpls traffic-eng area 0
PE1 Configuration
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
65
Any Transport over MPLS
Example: Configuring Tunnel Selection Using Commands Associated with L2VPN Protocol-Based Feature
PE2 Configuration
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
66
Any Transport over MPLS
Example: Configuring MTU Values in xconnect Configuration Mode for L2VPN Interworking
!
interface FastEthernet1/1/1.1
encapsulation dot1Q 222
no ip directed-broadcast
no cdp enable
mpls l2transport route 10.2.2.2 101
!
interface ATM5/0/0
no ip address
no ip directed-broadcast
no atm enable-ilmi-trap
no atm ilmi-keepalive
pvc 0/50 l2transport
encapsulation aal5
interface pseudowire 100
encapsulation mpls
neighbor 10.2.2.2 150
!
l2vpn xconnect context A
member pseudowire 100
member GigabitEthernet0/0/0.1
!
router ospf 1
log-adjacency-changes
network 10.0.0.0 0.0.0.255 area 0
network 10.16.16.16 0.0.0.0 area 0
mpls traffic-eng router-id Loopback0
mpls traffic-eng area 0
Note L2VPN interworking is not supported on Cisco ASR 900 RSP3 Module.
PE1 Configuration
pseudowire-class atom-ipiw
encapsulation mpls
interworking ip
!
interface Loopback0
ip address 10.1.1.151 255.255.255.255
!
interface Serial2/0/0
mtu 1492
no ip address
encapsulation ppp
no fair-queue
serial restart-delay 0
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
67
Any Transport over MPLS
Example: Configuring MTU Values in xconnect Configuration Mode for L2VPN Interworking
PE2 Configuration
pseudowire-class atom-ipiw
encapsulation mpls
interworking ip
!
interface Loopback0
ip address 10.1.1.152 255.255.255.255
!
interface FastEthernet0/0/0
no ip address
xconnect 10.1.1.151 123 pw-class atom-ipiw
mtu 1492
!
interface Serial4/0/0
ip address 10.100.152.2 255.255.255.252
encapsulation ppp
mpls ip
serial restart-delay 0
!
router ospf 1
log-adjacency-changes
network 10.1.1.152 0.0.0.0 area 0
network 10.100.152.0 0.0.0.3 area 0
!
mpls ldp router-id Loopback0
The show mpls l2transport binding command shows that the MTU value for the local and remote routers
is 1492 bytes.
PE1
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
68
Any Transport over MPLS
Example: Configuring MTU Values in xconnect Configuration Mode for L2VPN Interworking
PE2
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
69
Any Transport over MPLS
Example: Configuring MTU Values in xconnect Configuration Mode for L2VPN Interworking Using Commands Associated with L2VPN Protocol-Based Feature
VC statistics:
packet totals: receive 29, send 30
byte totals: receive 2900, send 3426
packet drops: receive 0, send 0
PE1 Configuration
PE2 Configuration
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
70
Any Transport over MPLS
Example: Configuring MTU Values in xconnect Configuration Mode for L2VPN Interworking Using Commands Associated with L2VPN Protocol-Based Feature
!
interface FastEthernet0/0/0
no ip address
interface pseudowire 100
source template type pseudowire atom-ipiw
neighbor 10.1.1.151 123
!
l2vpn xconnect context con1
member <ac_int>
member pseudowire1
!
interface Serial4/0/0
ip address 10.100.152.2 255.255.255.252
encapsulation ppp
mpls ip
serial restart-delay 0
!
router ospf 1
log-adjacency-changes
network 10.1.1.152 0.0.0.0 area 0
network 10.100.152.0 0.0.0.3 area 0
!
mpls ldp router-id Loopback0
The show l2vpn atom binding command shows that the MTU value for the local and remote routers is 1492
bytes.
PE1
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
71
Any Transport over MPLS
Examples: Configuring Any Transport over MPLS (AToM) Remote Ethernet Port Shutdown
PE2
Examples: Configuring Any Transport over MPLS (AToM) Remote Ethernet Port
Shutdown
The following example shows how to enable remote Ethernet port shutdown:
configure terminal
!
pseudowire-class eompls
encapsulation mpls
!
interface GigabitEthernet1/0/0
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
72
Any Transport over MPLS
Examples: Configuring Any Transport over MPLS (AToM) Remote Ethernet Port Shutdown Using Commands Associated with L2VPN Protocol-Based Feature
The following example shows how to disable remote Ethernet port shutdown:
configure terminal
!
pseudowire-class eompls
encapsulation mpls
!
interface GigabitEthernet1/0/0
xconnect 10.1.1.1 1 pw-class eompls
no remote link failure notification
The related show command output reports operational status for all remote L2 Tunnels by interface.
Note Remote Ethernet port shutdown is enabled by default when EVC "default encapsulation" is configured.
Examples: Configuring Any Transport over MPLS (AToM) Remote Ethernet Port
Shutdown Using Commands Associated with L2VPN Protocol-Based Feature
The following example shows how to enable remote Ethernet port shutdown:
configure terminal
!
template type pseudowire eompls
encapsulation mpls
!
interface GigabitEthernet1/0/0
interface pseudowire 100
source template type pseudowire eompls
neighbor 10.1.1.1 1
!
l2vpn xconnect context con1
remote link failure notification
The following example shows how to disable remote Ethernet port shutdown:
configure terminal
!
template type pseudowire eompls
encapsulation mpls
!
interface GigabitEthernet1/0/0
interface pseudowire 100
source template type pseudowire eompls
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
73
Any Transport over MPLS
Additional References for Any Transport over MPLS
neighbor 10.1.1.1 1
!
l2vpn xconnect context con1
no remote link failure notification
The related show command output reports operational status for all remote L2 Tunnels by interface.
Cisco IOS commands Cisco IOS Master Command List, All Releases
Technical Assistance
Description Link
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
74
Any Transport over MPLS
Feature Information for Any Transport over MPLS
Any Transport over MPLS Cisco IOS XE Release This feature was introduced on the Cisco ASR 920
3.13.0S Routers (ASR-920-12CZ-A, ASR-920-12CZ-D,
ASR-920-4SZ-A, ASR-920-4SZ-D).
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
75
Any Transport over MPLS
Feature Information for Any Transport over MPLS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
76
CHAPTER 3
Loop-Free Alternate Fast Reroute
Loop-Free Alternate (LFA) Fast Reroute (FRR) is a mechanism that provides local protection for unicast
traffic in order to rapidly converge traffic flows around link and/or node failures.
• Prerequisites for Loop-Free Alternate Fast Reroute, on page 77
• Restrictions for Loop-Free Alternate Fast Reroute, on page 77
• Information About Loop-Free Alternate Fast Reroute, on page 78
• How to Configure Loop-Free Alternate Fast Reroute, on page 81
• Verifying Loop-Free Alternate Fast Reroute, on page 86
• Verifying Remote Loop-Free Alternate Fast Reroute with VPLS, on page 89
• Verifying Tunnel Interfaces Created by OSPF IPv4 Remote LFA IPFRR, on page 92
• Additional References, on page 92
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
77
Loop-Free Alternate Fast Reroute
Information About Loop-Free Alternate Fast Reroute
• Each bridge domain interface (BDI) protected by FRR can have only one EFP.
• Remote LFA FRR provides better convergence with SFP ports rather than copper ports. As a workaround
for copper ports, BFD triggered FRR can be used.
• FRR is not supported with POS and serial interfaces.
• Scale limit for FRR-protected global prefixes is 1500 and for layer 3 VPNs, scale limit is 4000.
Supported Information
• LFA FRR is supported with equal cost multipath (ECMP).
• Fast Reroute triggered by Bidirectional Forwarding (BFD) is supported.
• Remote LFA tunnels are High Availability aware; hence, Stateful Switchover (SSO) compliant.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
78
Loop-Free Alternate Fast Reroute
LFA FRR and Remote LFA FRR over Bridge Domains Interfaces
LFA FRR and Remote LFA FRR over Bridge Domains Interfaces
The router supports bridge domain interfaces (BDI). For information on configuring bridge domains, see
Configuring Ethernet Virtual Connections on the Cisco ASR 903 Router.
LFA FRR and remote LFA FRR is supported on bridge domain interfaces on the router. For information on
configuring Remote LFA FRR on BDI, see How to Configure Loop-Free Alternate Fast Reroute, on page 81.
Repair Paths
Repair paths forward traffic during a routing transition. When a link or a router fails, due to the loss of a
physical layer signal, initially, only the neighboring routers are aware of the failure. All other routers in the
network are unaware of the nature and location of this failure until information about this failure is propagated
through a routing protocol, which may take several hundred milliseconds. It is, therefore, necessary to arrange
for packets affected by the network failure to be steered to their destinations.
A router adjacent to the failed link employs a set of repair paths for packets that would have used the failed
link. These repair paths are used from the time the router detects the failure until the routing transition is
complete. By the time the routing transition is complete, all routers in the network revise their forwarding
data and the failed link is eliminated from the routing computation.
Repair paths are precomputed in anticipation of failures so that they can be activated the moment a failure is
detected.
The IPv4 LFA FRR feature uses the following repair paths:
• Equal Cost Multipath (ECMP) uses a link as a member of an equal cost path-split set for a destination.
The other members of the set can provide an alternative path when the link fails.
• LFA is a next-hop route that delivers a packet to its destination without looping back. Downstream paths
are a subset of LFAs.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
79
Loop-Free Alternate Fast Reroute
Remote LFA FRR
The red looping arrow represents traffic that is looping immediately after a failure between node A and C
(before network reconvergence). Device A tries to send traffic destined to F to next-hop B. Device B cannot
be used as an LFA for prefixes advertised by nodes C and F. The actual LFA is node D. However, node D is
not directly connected to the protecting node A. To protect prefixes advertised by C, node A must tunnel the
packet around the failed link A-C to node D, provided that the tunnel does not traverse the failing link.
Remote LFA FRR enables you to tunnel a packet around a failed link to a remote loop-free alternate that is
more than one hop away. In the figure above, the green arrow between A and D shows the tunnel that is
automatically created by the remote LFA feature to bypass looping.
Border Gateway Protocol (BGP) Prefix-Independent Convergence (PIC) and LFA FRR Integration
Both the Labeled Border Gateway Protocol (BGP) Prefix-Independent Convergence (PIC) feature and the
Loop-Free Alternate (LFA) Fast Reroute (FRR) feature can be configured together on the router.
BGP PIC is supported for bridge domain interfaces (BDI) with FRR.
Note Each bridge domain interface (BDI) protected by FRR can have only one EFP.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
80
Loop-Free Alternate Fast Reroute
Remote LFA FRR with VPLS
For information on configuring BGP PIC, see BGP PIC Edge for IP and MPLS-VPN.
SUMMARY STEPS
1. enable
2. configure terminal
3. router isis [area-tag]
4. fast-reroute per-prefix {level-1 | level-2} {all | route-map route-map-name}
5. fast-reroute remote-lfa {level-1 | level-2} mpls-ldp [maximum-metric metric-value]
6. end
DETAILED STEPS
Device> enable
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
81
Loop-Free Alternate Fast Reroute
Recommended Configurations ISIS
Step 3 router isis [area-tag] Enables the IS-IS routing protocol and specifies an IS-IS
process.
Example:
• Enters router configuration mode.
Device(config)# router isis ipfrr
Step 4 fast-reroute per-prefix {level-1 | level-2} {all | route-map Enables per-prefix FRR.
route-map-name}
• Configure the all keyword to protect all prefixes.
Example:
Step 5 fast-reroute remote-lfa {level-1 | level-2} mpls-ldp Configures an FRR path that redirects traffic to a remote
[maximum-metric metric-value] LFA tunnel for either level 1 or level 2 packets.
Example: • Use the maximum-metric metric-value
keyword-argument pair to specify the maximum metric
Device(config-router)# fast-reroute remote-lfa value required to reach the release node.
level-1 mpls-ldp
Step 6 end Exits router configuration mode and enters privileged EXEC
mode.
Example:
Device(config-router)# end
• Globally configure the MPLS IGP hold-down timer to avoid an indefinite wait by IGP for synchronization
using the mpls ldp igp sync holdown 2000 command.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
82
Loop-Free Alternate Fast Reroute
Example: Configuring Remote LFA FRR with VPLS
Example: Configuration of Remote LFA FRR with VPLS at the interface level.
!
interface GigabitEthernet0/3/3
ip address 198.51.100.1 255.255.255.0
ip router isis hp
logging event link-status
load-interval 30
negotiation auto
mpls ip
mpls traffic-eng tunnels
isis network point-to-point
end
!
Example: Configuration of remote LFA FRR with VPLS at the global level.
!
l2 vfi Test-2000 manual
vpn id 2010
bridge-domain 2010
neighbor 192.0.2.1 encapsulation mpls
!
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
83
Loop-Free Alternate Fast Reroute
How to Configure OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. fast-reroute per-prefix remote-lfa [area area-id] tunnel mpls-ldp
DETAILED STEPS
Device> enable
Step 3 router ospf process-id Enables OSPF routing and enters router configuration mode.
Example:
Step 4 fast-reroute per-prefix remote-lfa [area area-id] tunnel Configures a per-prefix LFA FRR path that redirects traffic
mpls-ldp to a remote LFA tunnel via MPLS-LDP.
Example: • Use the area area-id keyword and argument to specify
an area in which to enable LFA FRR.
Device(config-router)# fast-reroute per-prefix
remote-lfa area 2 tunnel mpls-ldp
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
84
Loop-Free Alternate Fast Reroute
Recommended Configurations OSPF
SUMMARY STEPS
1. enable
2. configure terminal
3. router ospf process-id
4. fast-reroute per-prefix remote-lfa [area area-id] maximum-cost distance
DETAILED STEPS
Device> enable
Step 3 router ospf process-id Enables OSPF routing and enters router configuration mode.
Example:
Step 4 fast-reroute per-prefix remote-lfa [area area-id] Configures the maximum distance to the tunnel endpoint
maximum-cost distance in a per-prefix LFA FRR path that redirects traffic to a
remote LFA tunnel.
Example:
• Use the area area-id keyword and variable to specify
an area in which to enable LFA FRR.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
85
Loop-Free Alternate Fast Reroute
Verifying Loop-Free Alternate Fast Reroute
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
86
Loop-Free Alternate Fast Reroute
Example: Verifying LFA FRR with L2VPN
HW Info:
TCAM handle: 0x0000023f TCAM index: 0x0000000d
FID index : 0x0000f804 EAID : 0x0000808a
MET : 0x0000400c FID Count : 0x00000000
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
87
Loop-Free Alternate Fast Reroute
Configuration Examples for OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
HW Info:
FID index: 0x0000f486 EL3 index: 0x00001003 EL2 index: 0x00000000
El2RW : 0x00000107 MET index: 0x0000400c EAID : 0x00008060
HW ADJ FLAGS: 0x40
Hardware MAC Rewrite Str: d0:c2:82:17:8a:82:08:00:40:00:0d:02
HW Info:
FID index: 0x0000f49d EL3 index: 0x00001008 EL2 index: 0x00000000
El2RW : 0x00000111 MET index: 0x00004017 EAID : 0x0000807d
HW ADJ FLAGS: 0x40
Hardware MAC Rewrite Str: d0:c2:82:17:c9:83:08:00:40:00:0d:07
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
88
Loop-Free Alternate Fast Reroute
Example: Verifying Tunnel Interfaces Created by OSPF IPv4 Remote LFA IPFRR
Example: Verifying Tunnel Interfaces Created by OSPF IPv4 Remote LFA IPFRR
The following example displays information about about tunnel interfaces created by OSPF IPv4
LFA IPFRR:
Router# show ip ospf fast-reroute remote-lfa tunnels
Interface MPLS-Remote-Lfa3
Tunnel type: MPLS-LDP
Tailend router ID: 192.168.3.3
Termination IP address: 192.168.3.3
Outgoing interface: Ethernet0/0
First hop gateway: 192.168.14.4
Tunnel metric: 20
Protects:
192.168.12.2 Ethernet0/1, total metric 30
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
89
Loop-Free Alternate Fast Reroute
Example: Verifying Remote LFA FRR with VPLS
198.51.100.2/32, epoch 2
local label info: global/2033
1 RR source [heavily shared]
nexthop 192.0.2.14 TenGigabitEthernet0/1/0 label [explicit-null|70]
repair: attached-nexthop 192.0.2.1 MPLS-Remote-Lfa2
nexthop 192.0.2.1 MPLS-Remote-Lfa2, repair
!
HW Info:
TCAM handle: 0x00000266 TCAM index: 0x00000015
FID index : 0x00008e7f EAID : 0x0001d7c4
MET : 0x0000401c FID Count : 0x00000000
=== Label OCE ===
Label flags: 4
Num Labels: 1
Num Bk Labels: 1
Out Labels: 0
Out Backup Labels: 70
=== FRR OCE ===
FRR type : IP FRR
FRR state : Primary
Primary IF's gid : 52
Primary FID : 0x00008cb6
FIFC entries : 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0
PPO handle : 0x00000000
Next OCE : Adjacency (0x130e0df0)
Bkup OCE : Adjacency (0x130de608)
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
90
Loop-Free Alternate Fast Reroute
Example: Verifying Remote LFA FRR with VPLS
HW Info:
FID index: 0x00008ca8 EL3 index: 0x0000101c EL2 index: 0x00000000
El2RW : 0x00000003 MET index: 0x00004024 EAID : 0x0001d7cb
HW ADJ FLAGS: 0x40
Hardware MAC Rewrite Str: 00:00:00:00:00:00:00:00:00:00:00:00
HW Info:
FID index: 0x00008c78 EL3 index: 0x0000101c EL2 index: 0x00000000
El2RW : 0x00000109 MET index: 0x0000400e EAID : 0x0001cf4b
HW ADJ FLAGS: 0x40
Hardware MAC Rewrite Str: c8:f9:f9:8d:01:b3:08:00:40:00:0d:33
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
91
Loop-Free Alternate Fast Reroute
Verifying Tunnel Interfaces Created by OSPF IPv4 Remote LFA IPFRR
DETAILED STEPS
Device> enable
Step 2 show ip ospf fast-reroute remote-lfa tunnels Displays information about the OSPF per-prefix LFA FRR
configuration.
Example:
Device# show ip ospf fast-reroute remote-lfa
tunnels
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Command List, All Releases
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
92
Loop-Free Alternate Fast Reroute
Additional References
Technical Assistance
Description Link
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
93
Loop-Free Alternate Fast Reroute
Additional References
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
94
CHAPTER 4
Configuring Virtual Private LAN Services
Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from
multiple sites via the infrastructure provided by their service provider.
This module explains VPLS and how to configure it.
• Finding Feature Information, on page 95
• Prerequisites for Virtual Private LAN Services, on page 95
• Restrictions for Virtual Private LAN Services, on page 96
• Information About Virtual Private LAN Services, on page 96
• How to Configure Virtual Private LAN Services, on page 99
• Configuration Examples for Virtual Private LAN Services, on page 130
• Feature Information for Configuring Virtual Private LAN Services, on page 140
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
95
Configuring Virtual Private LAN Services
Restrictions for Virtual Private LAN Services
• Identify peer PE devices and attach Layer 2 circuits to VPLS at each PE device.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
96
Configuring Virtual Private LAN Services
Full-Mesh Configuration
Full-Mesh Configuration
A full-mesh configuration requires a full mesh of tunnel label switched paths (LSPs) between all provider
edge (PE) devices that participate in Virtual Private LAN Services (VPLS). With a full mesh, signaling
overhead and packet replication requirements for each provisioned virtual circuit (VC) on a PE can be high.
You set up a VPLS by first creating a virtual forwarding instance (VFI) on each participating PE device. The
VFI specifies the VPN ID of a VPLS domain, the addresses of other PE devices in the domain, and the type
of tunnel signaling and encapsulation mechanism for each peer PE device.
The set of VFIs formed by the interconnection of the emulated VCs is called a VPLS instance; it is the VPLS
instance that forms the logic bridge over a packet switched network. After the VFI has been defined, it needs
to be bound to an attachment circuit to the CE device. The VPLS instance is assigned a unique VPN ID.
PE devices use the VFI to establish a full-mesh LSP of emulated VCs to all other PE devices in the VPLS
instance. PE devices obtain the membership of a VPLS instance through static configuration using the Cisco
IOS CLI.
A full-mesh configuration allows the PE device to maintain a single broadcast domain. When the PE device
receives a broadcast, multicast, or unknown unicast packet on an attachment circuit (AC), it sends the packet
out on all other ACs and emulated circuits to all other CE devices participating in that VPLS instance. The
CE devices see the VPLS instance as an emulated LAN.
To avoid the problem of a packet looping in the provider core, PE devices enforce a “split-horizon” principle
for emulated VCs. In a split horizon, if a packet is received on an emulated VC, it is not forwarded on any
other emulated VC.
The packet forwarding decision is made by looking up the Layer 2 VFI of a particular VPLS domain.
A VPLS instance on a particular PE device receives Ethernet frames that enter on specific physical or logical
ports and populates a MAC table similarly to how an Ethernet switch works. The PE device can use the MAC
address to switch these frames into the appropriate LSP for delivery to the another PE device at a remote site.
If the MAC address is not available in the MAC address table, the PE device replicates the Ethernet frame
and floods it to all logical ports associated with that VPLS instance, except the ingress port from which it just
entered. The PE device updates the MAC table as it receives packets on specific ports and removes addresses
not used for specific periods.
H-VPLS
Hierarchical VPLS (H-VPLS) reduces signaling and replication overhead by using full-mesh and hub-and-spoke
configurations. Hub-and-spoke configurations operate with split horizon to allow packets to be switched
between pseudowires (PWs), effectively reducing the number of PWs between provider edge (PE) devices.
Note Split horizon is the default configuration to avoid broadcast packet looping.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
97
Configuring Virtual Private LAN Services
Supported Features
Supported Features
Multipoint-to-Multipoint Support
In a multipoint-to-multipoint network, two or more devices are associated over the core network. No single
device is designated as the Root node; all devices are considered as Root nodes. All frames can be exchanged
directly between the nodes.
Non-Transparent Operation
A virtual Ethernet connection (VEC) can be transparent or non-transparent with respect to Ethernet protocol
data units (PDUs). The VEC non-transparency allows users to have a Frame Relay-type service between Layer
3 devices.
Circuit Multiplexing
Circuit multiplexing allows a node to participate in multiple services over a single Ethernet connection. By
participating in multiple services, the Ethernet connection is attached to multiple logical networks. Some
examples of possible service offerings are VPN services between sites, Internet services, and third-party
connectivity for intercompany communications.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
98
Configuring Virtual Private LAN Services
VPLS Services
VPLS Services
Transparent LAN Service
Transparent LAN Service (TLS) is an extension to the point-to-point port-based Ethernet over Multiprotocol
Label Switching (EoMPLS), which provides bridging protocol transparency (for example, bridge protocol
data units [BPDUs]) and VLAN values. Bridges see this service as an Ethernet segment. With TLS, the PE
device forwards all Ethernet packets received from the customer-facing interface (including tagged and
untagged packets, and BPDUs) as follows:
• To a local Ethernet interface or an emulated virtual circuit (VC) if the destination MAC address is found
in the Layer 2 forwarding table.
• To all other local Ethernet interfaces and emulated VCs belonging to the same VPLS domain if the
destination MAC address is a multicast or broadcast address or if the destination MAC address is not
found in the Layer 2 forwarding table.
Note You must enable Layer 2 protocol tunneling to run the Cisco Discovery Protocol (CDP), the VLAN Trunking
Protocol (VTP), and the Spanning-Tree Protocol (STP).
Note Because it has only local significance, the demultiplexing VLAN tag that identifies a VPLS domain is removed
before the packet is forwarded to the outgoing Ethernet interfaces or emulated VCs.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
99
Configuring Virtual Private LAN Services
Configuring PE Layer 2 Interfaces on CE Devices
This section consists of tasks that use the commands existing prior to Cisco IOS XE Release 3.7S and a
corresponding task that uses the commands introduced or modified by the L2VPN Protocol-Based CLIs
feature.
Note When Ethernet Virtual Connection Service (EVCS) is configured, a provider edge (PE) device forwards all
Ethernet packets with a particular VLAN tag to a local Ethernet interface or emulated virtual circuit (VC) if
the destination MAC address is found in the Layer 2 forwarding table.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no ip address [ip-address mask] [secondary]
5. negotiation auto
6. service instance si-id ethernet
7. encapsulation dot1q vlan-id
8. bridge-domain bd-id
9. end
DETAILED STEPS
Device> enable
Step 3 interface type number Specifies an interface and enters interface configuration
mode.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
100
Configuring Virtual Private LAN Services
Configuring 802.1Q Access Ports for Tagged Traffic from a CE Device: Alternate Configuration
Device(config-if)# no ip address
Step 5 negotiation auto Enables the autonegotiation protocol to configure the speed,
duplex, and automatic flow control of the Gigabit Ethernet
Example:
interface.
Device(config-if)# negotiation auto
Step 6 service instance si-id ethernet Specifies the service instance ID and enters service instance
configuration mode.
Example:
Step 7 encapsulation dot1q vlan-id Defines the matching criteria to map 802.1Q frames ingress
on an interface to the appropriate service instance.
Example:
Ensure that the interface on the adjoining customer edge
Device(config-if-srv)# encapsulation dot1q 200 (CE) device is on the same VLAN as this PE device.
Device(config-if-srv)# end
Configuring 802.1Q Access Ports for Tagged Traffic from a CE Device: Alternate Configuration
Note When Ethernet Virtual Connection Service (EVCS) is configured, the PE device forwards all Ethernet packets
with a particular VLAN tag to a local Ethernet interface or an emulated virtual circuit (VC) if the destination
MAC address is found in the Layer 2 forwarding table.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no ip address [ip-address mask] [secondary]
5. negotiation auto
6. service instance si-id ethernet
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
101
Configuring Virtual Private LAN Services
Configuring 802.1Q Access Ports for Tagged Traffic from a CE Device: Alternate Configuration
DETAILED STEPS
Device> enable
Step 3 interface type number Specifies an interface and enters interface configuration
mode.
Example:
Device(config-if)# no ip address
Step 6 service instance si-id ethernet Specifies a service instance ID and enters service instance
configuration mode.
Example:
Step 7 encapsulation dot1q vlan-id Defines the matching criteria to map 802.1Q frames ingress
on an interface to the appropriate service instance.
Example:
• Ensure that the interface on the adjoining customer
Device(config-if-srv)# encapsulation dot1q 200 edge (CE) device is on the same VLAN as this
provider edge (PE) device.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
102
Configuring Virtual Private LAN Services
Configuring Access Ports for Untagged Traffic from a CE Device
Device(config-if-srv)# exit
Device(config-if)# exit
Step 10 bridge-domain bd-id Specifies the bridge domain ID and enters bridge-domain
configuration mode.
Example:
Step 11 member interface-type-number service-instance service-id Binds a service instance to a bridge domain instance.
[split-horizon group group-id ]
Example:
Device(config-bdomain)# member
gigabitethernet0/0/1 service-instance 1000
Device(config-bdomain)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no ip address [ip-address mask] [secondary]
5. negotiation auto
6. service instance si-id ethernet
7. encapsulation untagged
8. bridge-domain bd-id
9. end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
103
Configuring Virtual Private LAN Services
Configuring Access Ports for Untagged Traffic from a CE Device
DETAILED STEPS
Device> enable
Step 3 interface type number Specifies an interface and enters interface configuration
mode.
Example:
Device(config-if)# no ip address
Step 5 negotiation auto Enables the autonegotiation protocol to configure the speed,
duplex, and automatic flow control of the Gigabit Ethernet
Example:
interface.
Device(config-if)# negotiation auto
Step 6 service instance si-id ethernet Specifies a service instance ID and enters service instance
configuration mode.
Example:
Step 7 encapsulation untagged Defines the matching criteria to map untagged ingress
Ethernet frames on an interface to the appropriate service
Example:
instance.
Device(config-if-srv)# encapsulation untagged • Ensure that the interface on the adjoining customer
edge (CE) device is on the same VLAN as this provider
edge (PE) device.
Step 8 bridge-domain bd-id Binds a service instance or MAC tunnel to a bridge domain
instance.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
104
Configuring Virtual Private LAN Services
Configuring Access Ports for Untagged Traffic from a CE Device: Alternate Configuration
Device(config-if-srv)# end
Configuring Access Ports for Untagged Traffic from a CE Device: Alternate Configuration
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no ip address [ip-address mask] [secondary]
5. negotiation auto
6. service instance si-id ethernet
7. encapsulation untagged
8. exit
9. exit
10. bridge-domain bd-id
11. member interface-type-number service-instance service-id [split-horizon group group-id]
12. end
DETAILED STEPS
Device> enable
Step 3 interface type number Specifies an interface and enters interface configuration
mode.
Example:
Device(config-if)# no ip address
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
105
Configuring Virtual Private LAN Services
Configuring Access Ports for Untagged Traffic from a CE Device: Alternate Configuration
Step 6 service instance si-id ethernet Specifies a service instance ID and enters service instance
configuration mode.
Example:
Step 7 encapsulation untagged Defines the matching criteria to map untagged ingress
Ethernet frames on an interface to the appropriate service
Example:
instance.
Device(config-if-srv)# encapsulation untagged • Ensure that the interface on the adjoining customer
edge (CE) device is on the same VLAN as this
provider edge (PE) device.
Device(config-if-srv)# exit
Device(config-if)# exit
Step 10 bridge-domain bd-id Specifies the bridge domain ID and enters bridge-domain
configuration mode.
Example:
Step 11 member interface-type-number service-instance service-id Binds a service instance to a bridge domain instance.
[split-horizon group group-id]
Example:
Device(config-bdomain)# member
gigabitethernet0/4/4 service-instance 1000
Device(config-bdomain)# end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
106
Configuring Virtual Private LAN Services
Configuring Q-in-Q EFP
Note When a thread-local storage (TLS) is configured, the provider edge (PE) device forwards all Ethernet packets
received from the customer edge (CE) device to all local Ethernet interfaces and emulated virtual circuits
(VCs) that belong to the same Virtual Private LAN Services (VPLS) domain if the MAC address is not found
in the Layer 2 forwarding table.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no ip address [ip-address mask] [secondary]
5. negotiation auto
6. service instance si-id ethernet
7. encapsulation dot1q vlan-id second-dot1q vlan-id
8. bridge-domain bd-id
9. end
DETAILED STEPS
Device> enable
Step 3 interface type number Specifies an interface and enters interface configuration
mode.
Example:
Device(config-if)# no ip address
Step 5 negotiation auto Enables the autonegotiation protocol to configure the speed,
duplex, and automatic flow control of the Gigabit Ethernet
Example:
interface.
Device(config-if)# negotiation auto
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
107
Configuring Virtual Private LAN Services
Configuring Q-in-Q EFP: Alternate Configuration
Step 7 encapsulation dot1q vlan-id second-dot1q vlan-id Defines the matching criteria to map Q-in-Q ingress frames
on an interface to the appropriate service instance.
Example:
• Ensure that the interface on the adjoining CE device
Device(config-if-srv)# encapsulation dot1q 200 is on the same VLAN as this PE device.
second-dot1q 400
Device(config-if-srv)# end
Note When a thread-local storage (TLS) is configured, the provider edge (PE) device forwards all Ethernet packets
received from the customer edge (CE) device to all local Ethernet interfaces and emulated virtual circuits
(VCs) belonging to the same Virtual Private LAN Services (VPLS) domain if the MAC address is not found
in the Layer 2 forwarding table.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no ip address [ip-address mask] [secondary]
5. negotiation auto
6. service instance si-id ethernet
7. encapsulation dot1q vlan-id second-dot1q vlan-id
8. exit
9. exit
10. bridge-domain bd-id
11. member interface-type-number service-instance service-id [split-horizon group group-id]
12. end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
108
Configuring Virtual Private LAN Services
Configuring Q-in-Q EFP: Alternate Configuration
DETAILED STEPS
Device> enable
Step 3 interface type number Specifies an interface and enters interface configuration
mode.
Example:
Device(config-if)# no ip address
Step 6 service instance si-id ethernet Specifies a service instance ID and enters service instance
configuration mode.
Example:
Step 7 encapsulation dot1q vlan-id second-dot1q vlan-id Defines the matching criteria to map Q-in-Q ingress frames
on an interface to the appropriate service instance.
Example:
• Ensure that the interface on the adjoining CE device
Device(config-if-srv)# encapsulation dot1q 200 is on the same VLAN as this PE device.
second-dot1q 400
Device(config-if-srv)# exit
Device(config-if)# exit
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
109
Configuring Virtual Private LAN Services
Configuring MPLS on a PE Device
Step 11 member interface-type-number service-instance service-id Binds a service instance to a bridge domain instance.
[split-horizon group group-id]
Example:
Device(config-bdomain)# member
gigabitethernet0/0/2 service-instance 1000
Device(config-bdomain)# end
Note Before configuring MPLS, ensure that IP connectivity exists between all PE devices by configuring Interior
Gateway Protocol (IGP), Open Shortest Path First (OSPF), or Intermediate System to Intermediate System
(IS-IS) between PE devices.
SUMMARY STEPS
1. enable
2. configure terminal
3. mpls label protocol {ldp | tdp}
4. mpls ldp logging neighbor-changes
5. mpls ldp discovery hello holdtime seconds
6. mpls ldp router-id interface-type-number [force]
7. end
DETAILED STEPS
Device> enable
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
110
Configuring Virtual Private LAN Services
Configuring a VFI on a PE Device
Step 3 mpls label protocol {ldp | tdp} Specifies the label distribution protocol for the platform.
Example:
Step 4 mpls ldp logging neighbor-changes (Optional) Generates system error logging (syslog)
messages when LDP sessions go down.
Example:
Step 5 mpls ldp discovery hello holdtime seconds Configures the interval between the transmission of
consecutive LDP discovery hello messages or the hold time
Example:
for an LDP transport connection.
Device(config)# mpls ldp discovery hello holdtime
5
Step 6 mpls ldp router-id interface-type-number [force] Specifies a preferred interface for the LDP router ID.
Example:
Device(config)# end
Note You must configure BDI on the bridge domain that has the association with the VFI.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
111
Configuring Virtual Private LAN Services
Configuring a VFI on a PE Device
SUMMARY STEPS
1. enable
2. configure terminal
3. l2 vfi name manual
4. vpn id vpn-id
5. neighbor remote-router-id vc-id {encapsulation encapsulation-type | pw-class pw-name}
[no-split-horizon]
6. bridge-domain bd-id
7. end
DETAILED STEPS
Device> enable
Step 3 l2 vfi name manual Establishes a Layer 2 VPN (L2VPN) virtual forwarding
interface (VFI) between two or more separate networks and
Example:
enters VFI configuration mode.
Device(config)# l2 vfi vfi110 manual
Step 5 neighbor remote-router-id vc-id {encapsulation Specifies the type of tunnel signaling and encapsulation
encapsulation-type | pw-class pw-name} [no-split-horizon] mechanism for each VPLS peer.
Example: Note Split horizon is the default configuration to avoid
broadcast packet looping and to isolate Layer 2
Device(config-vfi)# neighbor 172.16.10.2 4 traffic. Use the no-split-horizon keyword to
encapsulation mpls disable split horizon and to configure multiple
VCs per spoke into the same VFI.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
112
Configuring Virtual Private LAN Services
Configuring a VFI on a PE Device: Alternate Configuration
Device(config-vfi)# end
DETAILED STEPS
Device> enable
Step 3 l2vpn vfi context name Establishes a L2VPN VFI between two or more separate
networks, and enters VFI configuration mode.
Example:
Step 5 member ip-address [vc-id] encapsulation mpls Specifies the devices that form a point-to-point Layer 2
VPN (L2VPN) virtual forwarding interface (VFI)
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
113
Configuring Virtual Private LAN Services
Configuring Static Virtual Private LAN Services
Device(config-vfi)# exit
Step 8 member vfi vfi-name Binds a VFI instance to a bridge domain instance.
Example:
Device(config-bdomain)# end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
114
Configuring Virtual Private LAN Services
Configuring a Pseudowire for Static VPLS
The pseudowire template configuration specifies the characteristics of the tunneling mechanism that is used
by the pseudowires, which are:
• Encapsulation type
• Control protocol
• Payload-specific options
• Preferred path
Perform this task to configure a pseudowire template for static Virtual Private LAN Services (VPLS).
Note Ensure that you perform this task before configuring the virtual forwarding instance (VFI) peer. If the VFI
peer is configured before the pseudowire class, the configuration is incomplete until the pseudowire class is
configured. The show running-config command displays an error stating that configuration is incomplete.
Device# show running-config | sec vfi
SUMMARY STEPS
1. enable
2. configure terminal
3. template type pseudowire name
4. encapsulation mpls
5. signaling protocol none
6. preferred-path interface Tunnel-tp interface-number
7. exit
8. interface pseudowire number
9. source template type pseudowire name
10. neighbor peer-address vcid-value
11. label local-pseudowire-label remote-pseudowire-label
12. end
DETAILED STEPS
Device> enable
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
115
Configuring Virtual Private LAN Services
Configuring a Pseudowire for Static VPLS
Step 3 template type pseudowire name Specifies the template type as pseudowire and enters
template configuration mode.
Example:
Step 5 signaling protocol none Specifies that no signaling protocol is configured for the
pseudowire class.
Example:
Step 6 preferred-path interface Tunnel-tp interface-number (Optional) Specifies the path that traffic uses: an MPLS
Traffic Engineering (TE) tunnel or destination IP address
Example:
and Domain Name Server (DNS) name.
Device(config-template)# preferred-path interface
Tunnel-tp 1
Device(config-template)# exit
Step 8 interface pseudowire number Establishes a pseudowire interface and enters interface
configuration mode.
Example:
Step 9 source template type pseudowire name Configures the source template type of the configured
pseudowire.
Example:
Step 10 neighbor peer-address vcid-value Specifies the peer IP address and VC ID value of a Layer
2 VPN (L2VPN) pseudowire.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
116
Configuring Virtual Private LAN Services
Configuring VFI for Static VPLS
Device(config-if)# end
Note Ensure that you perform this task after configuring the pseudowire. If the VFI peer is configured before the
pseudowire, the configuration is incomplete until the pseudowire is configured. The output of the show
running-config command displays an error stating that configuration is incomplete.
Device# show running-config | sec vfi
SUMMARY STEPS
1. enable
2. configure terminal
3. mpls label range minimum-value maximum-value [static minimum-static-value maximum-static-value]
4. pseudowire-class [pw-class-name]
5. encapsulation mpls
6. protocol {l2tpv2 | l2tpv3 | none} [l2tp-class-name]
7. exit
8. l2 vfi vfi-name manual
9. vpn id vpn-id
10. neighbor ip-address pw-class pw-name
11. mpls label local-pseudowire-label remote-pseudowire-label
12. mpls control-word
13. neighbor ip-address pw-class pw-name
14. mpls label local-pseudowire-label remote-pseudowire-label
15. mpls control-word
16. end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
117
Configuring Virtual Private LAN Services
Configuring VFI for Static VPLS
DETAILED STEPS
Device> enable
Step 3 mpls label range minimum-value maximum-value [static Configures the range of local labels available for use with
minimum-static-value maximum-static-value] Multiprotocol Label Switching (MPLS) applications on
packet interfaces.
Example:
Step 4 pseudowire-class [pw-class-name] Specifies the name of a Layer 2 pseudowire class and
enters pseudowire class configuration mode.
Example:
Step 6 protocol {l2tpv2 | l2tpv3 | none} [l2tp-class-name] Specifies that no signaling protocol will be used in Layer
2 Tunneling Protocol Version 3 (L2TPv3) sessions.
Example:
Device(config-pw-class)# exit
Step 8 l2 vfi vfi-name manual Establishes a Layer 2 VPN (L2VPN) virtual forwarding
interface (VFI) between two or more separate networks,
Example:
and enters Layer 2 VFI manual configuration mode.
Device(config)# l2 vfi static-vfi manual
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
118
Configuring Virtual Private LAN Services
Configuring VFI for Static VPLS
Step 11 mpls label local-pseudowire-label Configures an Any Transport over MPLS (AToM) static
remote-pseudowire-label pseudowire connection by defining local and remote circuit
labels.
Example:
Step 12 mpls control-word (Optional) Enables the MPLS control word in an AToM
static pseudowire connection.
Example:
Step 13 neighbor ip-address pw-class pw-name Specifies the IP address of the peer and the pseudowire
class.
Example:
Step 15 mpls control-word (Optional) Enables the MPLS control word in an AToM
static pseudowire connection.
Example:
Step 16 end Exits Layer 2 VFI manual configuration mode and returns
to privileged EXEC mode.
Example:
Device(config-vfi)# end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
119
Configuring Virtual Private LAN Services
Configuring a VFI for Static VPLS: Alternate Configuration
Note Ensure that you perform this task after configuring the pseudowire. If the VFI peer is configured before the
pseudowire, the configuration is incomplete until the pseudowire is configured. The output of the show
running-config command displays an error stating that configuration is incomplete.
Device# show running-config | sec vfi
SUMMARY STEPS
1. enable
2. configure terminal
3. l2vpn vfi context vfi-name
4. vpn id vpn-id
5. exit
6. interface type number
7. encapsulation mpls
8. neighbor ip-address vc-id
9. label local-pseudowire-label remote-pseudowire-label
10. control-word {include | exclude}
11. exit
12. bridge-domain bd-id
13. member vfi vfi-name
14. end
DETAILED STEPS
Device> enable
Step 3 l2vpn vfi context vfi-name Establishes a Layer 2 VPN (L2VPN) virtual forwarding
interface (VFI) between two or more separate networks
Example:
and enters VFI configuration mode.
Device(config)# l2vpn vfi context vpls1
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
120
Configuring Virtual Private LAN Services
Configuring a VFI for Static VPLS: Alternate Configuration
Device(config-vfi)# exit
Step 6 interface type number Specifies an interface and enters interface configuration
mode.
Example:
Step 8 neighbor ip-address vc-id Specifies the peer IP address and virtual circuit (VC) ID
value of a Layer 2 VPN (L2VPN) pseudowire.
Example:
Step 9 label local-pseudowire-label remote-pseudowire-label Configures an Any Transport over MPLS (AToM) static
pseudowire connection by defining local and remote circuit
Example:
labels.
Device(config-if)# label 301 17
Step 10 control-word {include | exclude} (Optional) Enables the Multiprotocol Label Switching
(MPLS) control word in an AToM dynamic pseudowire
Example:
connection.
Device(config-if)# control-word include
Device(config-if)# exit
Step 12 bridge-domain bd-id Specifies the bridge domain ID and enters bridge-domain
configuration mode.
Example:
Device(config)# bridge-domain 24
Step 13 member vfi vfi-name Binds a service instance to a bridge domain instance.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
121
Configuring Virtual Private LAN Services
Configuring an Attachment Circuit for Static VPLS
Device(config-bdomain)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/interface
4. service instance si-id ethernet
5. encapsulation dot1q vlan-id
6. rewrite ingress tag pop number [symmetric]
7. bridge-domain bd-id
8. end
DETAILED STEPS
Device> enable
Step 3 interface gigabitethernet slot/interface Specifies an interface and enters interface configuration
mode.
Example:
• Ensure that the interfaces between the customer edge
Device(config)# interface gigabitethernet 0/0/1 (CE) and provider edge (PE) devices that run Ethernet
over MPLS (EoMPLS) are in the same subnet. All
other interfaces and backbone devices do not need to
be in the same subnet.
Step 4 service instance si-id ethernet Configures an Ethernet service instance on an interface and
enters service instance configuration mode.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
122
Configuring Virtual Private LAN Services
Configuring an Attachment Circuit for Static VPLS: Alternate Configuration
Step 6 rewrite ingress tag pop number [symmetric] (Optional) Specifies the encapsulation adjustment to be
performed on a frame ingressing a service instance and the
Example:
tag to be removed from a packet.
Device(config-if-srv)# rewrite ingress tag pop 1
symmetric
Device(config-if-srv)# bridge-domain 24
Device(config-if-srv)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/interface
4. service instance si-id ethernet
5. encapsulation dot1q vlan-id
6. rewrite ingress tag pop number [symmetric]
7. exit
8. exit
9. bridge-domain bd-id
10. member interface-type-number service-instance service-id [split-horizon group group-id]
11. end
DETAILED STEPS
Device> enable
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
123
Configuring Virtual Private LAN Services
Configuring an Attachment Circuit for Static VPLS: Alternate Configuration
Step 3 interface gigabitethernet slot/interface Specifies an interface and enters interface configuration
mode.
Example:
• Ensure that the interfaces between the customer edge
Device(config)# interface gigabitethernet 0/0/1 (CE) and provider edge (PE) devices that are running
Ethernet over MPLS (EoMPLS) are in the same
subnet. All other interfaces and backbone devices do
not need to be in the same subnet.
Step 4 service instance si-id ethernet Specifies a service instance ID and enters service instance
configuration mode.
Example:
Step 5 encapsulation dot1q vlan-id Defines the matching criteria to map 802.1Q frames ingress
on an interface to the appropriate service instance.
Example:
• Ensure that the interface on the adjoining CE device
Device(config-if-srv)# encapsulation dot1q 200 is on the same VLAN as this PE device.
Step 6 rewrite ingress tag pop number [symmetric] (Optional) Specifies the encapsulation adjustment to be
performed on a frame ingressing a service instance and
Example:
the tag to be removed from a packet.
Device(config-if-srv)# rewrite ingress tag pop 1
symmetric
Device(config-if-srv)# exit
Device(config-if)# exit
Step 9 bridge-domain bd-id Specifies the bridge domain ID and enters bridge-domain
configuration mode.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
124
Configuring Virtual Private LAN Services
Configuring an MPLS-TP Tunnel for Static VPLS with TP
Device(config-bdomain)# member
gigabitethernet0/0/1 service-instance 1000
Device(config-bdomain)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. interface Tunnel-tp number
4. no ip address
5. no keepalive
6. tp destination ip-address
7. bfd bfd-template
8. working-lsp
9. out-label number out-link number
10. lsp-number number
11. exit
12. protect-lsp
13. out-label number out-link number
14. in-label number
15. lsp-number number
16. exit
17. exit
18. interface type number
19. ip address ip-address ip-mask
20. mpls tp link link-num {ipv4 ip-address | tx-mac mac-address}
21. end
DETAILED STEPS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
125
Configuring Virtual Private LAN Services
Configuring an MPLS-TP Tunnel for Static VPLS with TP
Device> enable
Device(config-if)# no ip address
Device(config-if)# no keepalive
Device(config-if)# bfd tp
Step 8 working-lsp Configures the working label switched path (LSP) and
enters working interface configuration mode.
Example:
Device(config-if)# working-lsp
Step 9 out-label number out-link number Configures the out link and out label for the working LSP.
Example:
Step 10 lsp-number number Configures the ID number for the working LSP.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
126
Configuring Virtual Private LAN Services
Configuring an MPLS-TP Tunnel for Static VPLS with TP
Device(config-if-working)# lsp-number 0
Device(config-if-working)# exit
Step 12 protect-lsp Enters protection configuration mode for the label switched
path (LSP) and enters protect interface configuration mode.
Example:
Device(config-if)# protect-lsp
Step 13 out-label number out-link number Configures the out link and out label for the protect LSP.
Example:
Step 14 in-label number Configures the in label for the protect LSP.
Example:
Step 15 lsp-number number Configures the ID number for the working protect LSP.
Example:
Device(config-if-protect)# lsp-number 1
Device(config-if-protect)# exit
Device(config-if)# exit
Step 18 interface type number Configures a interface and enters interface configuration
mode.
Example:
Step 19 ip address ip-address ip-mask (Optional) Configures the IP address and mask if not using
an IP-less core.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
127
Configuring Virtual Private LAN Services
Configuring a VFI for Static VPLS: Alternate Configuration
Device(config-if)# end
Note Ensure that you perform this task after configuring the pseudowire. If the VFI peer is configured before the
pseudowire, the configuration is incomplete until the pseudowire is configured. The output of the show
running-config command displays an error stating that configuration is incomplete.
Device# show running-config | sec vfi
SUMMARY STEPS
1. enable
2. configure terminal
3. l2vpn vfi context vfi-name
4. vpn id vpn-id
5. exit
6. interface type number
7. encapsulation mpls
8. neighbor ip-address vc-id
9. label local-pseudowire-label remote-pseudowire-label
10. control-word {include | exclude}
11. exit
12. bridge-domain bd-id
13. member vfi vfi-name
14. end
DETAILED STEPS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
128
Configuring Virtual Private LAN Services
Configuring a VFI for Static VPLS: Alternate Configuration
Device> enable
Step 3 l2vpn vfi context vfi-name Establishes a Layer 2 VPN (L2VPN) virtual forwarding
interface (VFI) between two or more separate networks
Example:
and enters VFI configuration mode.
Device(config)# l2vpn vfi context vpls1
Device(config-vfi)# exit
Step 6 interface type number Specifies an interface and enters interface configuration
mode.
Example:
Step 8 neighbor ip-address vc-id Specifies the peer IP address and virtual circuit (VC) ID
value of a Layer 2 VPN (L2VPN) pseudowire.
Example:
Step 9 label local-pseudowire-label remote-pseudowire-label Configures an Any Transport over MPLS (AToM) static
pseudowire connection by defining local and remote circuit
Example:
labels.
Device(config-if)# label 301 17
Step 10 control-word {include | exclude} (Optional) Enables the Multiprotocol Label Switching
(MPLS) control word in an AToM dynamic pseudowire
Example:
connection.
Device(config-if)# control-word include
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
129
Configuring Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
Device(config-if)# exit
Step 12 bridge-domain bd-id Specifies the bridge domain ID and enters bridge-domain
configuration mode.
Example:
Device(config)# bridge-domain 24
Step 13 member vfi vfi-name Binds a service instance to a bridge domain instance.
Example:
Device(config-bdomain)# end
Example: Configuring 802.1Q Access Ports for Tagged Traffic from a CE Device:
Alternate Configuration
The following example shows how to configure the tagged traffic:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
130
Configuring Virtual Private LAN Services
Example: Configuring Access Ports for Untagged Traffic from a CE Device
Device(config-if)# exit
Device(config)# bridge-domain 100
Device(config-bdomain)# member gigabitethernet0/0/1 service-instance 1000
Device(config-bdomain)# end
The following example shows a VFI configuration for hub and spoke.
The output of the show mpls 12transport vc command displays various information related to a provide edge
(PE) device. The VC ID in the output represents the VPN ID; the VC is identified by the combination of the
destination address and the VC ID as shown in the command output. The output of the show mpls l2transport
vc detail command displays detailed information about virtual circuits (VCs) on a PE device.
The following sample output from the show vfi command displays the VFI status:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
131
Configuring Virtual Private LAN Services
Example: Configuring Access Ports for Untagged Traffic from a CE Device: Alternate Configuration
Use the show spanning-tree vlan command to verify that the ports are not in a blocked state. Use the show
vlan id command to verify that a specific port is configured to send and receive specific VLAN traffic.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
132
Configuring Virtual Private LAN Services
Example: Configuring Q-in-Q in EFP: Alternate Configuration
Use the show spanning-tree vlan command to verify that the port is not in a blocked state. Use the show
vlan id command to verify that a specific port is configured to send and receive a specific VLAN traffic.
The following sample output from the show ip cef command displays the Label Distribution Protocol (LDP)
label assigned:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
133
Configuring Virtual Private LAN Services
Example: VFI on a PE Device: Alternate Configuration
Device(config-vfi)# end
The show mpls 12transport vc command displays information about the provider edge (PE) device. The
show mpls l2transport vc detail command displays detailed information about the virtual circuits (VCs) on
a PE device.
The show vfi vfi-name command displays VFI status. The VC ID in the output represents the VPN ID; the
VC is identified by the combination of the destination address and the VC ID as in the example below.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
134
Configuring Virtual Private LAN Services
Example: Full-Mesh VPLS Configuration
The show l2vpn atom vc command displays information about the PE device. The command also displays
information about Any Transport over MPLS (AToM) virtual circuits (VCs) and static pseudowires that are
enabled to route Layer 2 packets on a device.
The show l2vpn vfi command displays the VFI status. The VC ID in the output represents the VPN ID; the
VC is identified by the combination of the destination address and the VC ID as in the example below.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
135
Configuring Virtual Private LAN Services
Example: Full-Mesh VPLS Configuration
PE 1 Configuration
The following examples shows how to create virtual switch instances (VSIs) and associated VCs:
The following example shows how to configure the customer edge (CE) device interface (there can be multiple
Layer 2 interfaces in a VLAN):
PE 2 Configuration
The following example shows how to create VSIs and associated VCs.
The following example shows how to configure the CE device interface (there can be multiple Layer 2
interfaces in a VLAN):
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
136
Configuring Virtual Private LAN Services
Example: Full-Mesh VPLS Configuration
PE 3 Configuration
The following example shows how to create VSIs and associated VCs:
The following example shows how to configure the CE device interface (there can be multiple Layer 2
interfaces in a VLAN).
The following sample output from the show mpls l2 vc command provides information about the status of
the VC:
The following sample output from the show vfi command provides information about the VFI:
The following sample output from the show mpls 12transport vc command provides information about
virtual circuits:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
137
Configuring Virtual Private LAN Services
Example: Full-Mesh Configuration : Alternate Configuration
PE 1 Configuration
The following example shows how to create virtual switch instances (VSIs) and associated VCs and to
configure the CE device interface (there can be multiple Layer 2 interfaces in a VLAN):
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
138
Configuring Virtual Private LAN Services
Example: Full-Mesh Configuration : Alternate Configuration
PE 2 Configuration
The following example shows how to create VSIs and associated VCs and to configure the CE device interface
(there can be multiple Layer 2 interfaces in a VLAN):
PE 3 Configuration
The following example shows how to create of the VSIs and associated VCs and to configure the CE device
interface (there can be multiple Layer 2 interfaces in a VLAN):
The following sample output from the show mpls l2 vc command provides information on the status of the
VC:
The following sample output from the show l2vpn vfi command provides information about the VFI:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
139
Configuring Virtual Private LAN Services
Feature Information for Configuring Virtual Private LAN Services
The following sample output from the show l2vpn atom vc command provides information on the virtual
circuits:
FeatureInformationforConfiguringVirtualPrivateLANServices
The following table provides release information about the feature or features described in this module. This
table lists only the software release that introduced support for a given feature in a given software release
train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 10: Feature Information for Configuring Virtual Private LAN Services
Configuring Virtual Private Cisco IOS XE Release This feature was introduced on the Cisco ASR 920
LAN Services 3.13.0S Routers (ASR-920-12CZ-A, ASR-920-12CZ-D,
ASR-920-4SZ-A, ASR-920-4SZ-D).
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
140
CHAPTER 5
H-VPLS N-PE Redundancy for MPLS Access
The H-VPLS N-PE Redundancy for MPLS Access feature enables two network provider edge (N-PE) devices
to provide failover services to a user provider edge (U-PE) device in a hierarchical virtual private LAN service
(H-VPLS). Having redundant N-PE devices provides improved stability and reliability against link and node
failures.
• Finding Feature Information, on page 141
• Prerequisites for H-VPLS N-PE Redundancy for MPLS Access, on page 141
• Restrictions for H-VPLS N-PE Redundancy for MPLS Access, on page 142
• Information About H-VPLS N-PE Redundancy for MPLS Access, on page 142
• How to Configure H-VPLS N-PE Redundancy for MPLS Access, on page 143
• Configuration Examples for H-VPLS N-PE Redundancy for MPLS Access, on page 146
• Additional References, on page 147
• Feature Information for H-VPLS N-PE Redundancy for MPLS Access, on page 148
• Glossary, on page 148
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
141
H-VPLS N-PE Redundancy for MPLS Access
Restrictions for H-VPLS N-PE Redundancy for MPLS Access
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
142
H-VPLS N-PE Redundancy for MPLS Access
How to Configure H-VPLS N-PE Redundancy for MPLS Access
Figure 9: H-VPLS N-PE Redundancy for MPLS Access Based on Pseudowire Redundancy
SUMMARY STEPS
1. enable
2. configure terminal
3. l2 vfi name manual
4. vpn id id-number
5. bridge-domain bridge-id
6. neighbor remote-router-id vc-id {encapsulation encapsulation-type | pw-class pw-name}
[no-split-horizon]
7. end
DETAILED STEPS
Device> enable
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
143
H-VPLS N-PE Redundancy for MPLS Access
Configuring the SVI for the Native VLAN
Step 3 l2 vfi name manual Creates a Layer 2 virtual forwarding interface (VFI) and
enters Layer 2 VFI manual configuration mode.
Example:
Device(config-vfi)# vpn id 10
Step 5 bridge-domain bridge-id Configures the router to derive bridge domains from the
encapsulation VLAN list.
Step 6 neighbor remote-router-id vc-id {encapsulation Specifies the peer IP address of the redundant N-PE device
encapsulation-type | pw-class pw-name} [no-split-horizon] and the type of tunnel signaling and encapsulation
mechanism.
Example:
Step 7 end Exits Layer 2 VFI manual configuration mode and returns
to privileged EXEC mode.
Example:
Device(config-vfi)# end
Example
You can also configure the VPLS pseudowire between the N-PE devices using this alternate method.
RoutDeviceer> enable
Device# configure terminal
Device(config)# l2vpn vfi context vfi110
Device(config-vfi)# vpn id 10
Device(config-vfi)# exit
Device(config)# bridge-domain 100
Device(config-bdomain)# member vfi vfi110
Device(config-vfi)# member 172.16.10.2 4 encapsulation mpls
Device(config-vfi)# end
SUMMARY STEPS
1. enable
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
144
H-VPLS N-PE Redundancy for MPLS Access
Configuring the SVI for the Native VLAN
2. configure terminal
3. interface vlan vlan-id
4. xconnect vfi vfi-name
5. end
6. show vfi vfi-name
7. end
DETAILED STEPS
Device> enable
Step 4 xconnect vfi vfi-name Specifies the Layer 2 virtual forwarding interface (VFI)
that you are binding to the VLAN port.
Example:
Device(config-vfi)# end
Step 6 show vfi vfi-name (Optional) Displays information about the pseudowire
between the two network provider edge (N-PE) devices so
Example:
that you can verify that the H-VPLS N-PE Redundancy
feature is correctly configured.
Device# show vfi VPLS-2
Step 7 end Exits privileged EXEC mode and returns to user EXEC
mode.
Example:
Device# end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
145
H-VPLS N-PE Redundancy for MPLS Access
Configuration Examples for H-VPLS N-PE Redundancy for MPLS Access
The table below shows the configuration of two network provider edge (N-PE) devices.
N-PE1 N-PE4
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
146
H-VPLS N-PE Redundancy for MPLS Access
Additional References
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Command List, All Releases
L2VPN pseudowire redundancy “L2VPN Pseudowire Redundancy” feature module in the MPLS Layer 2
VPNs Configuration Guide.
MPLS traffic engineering “MPLS Traffic Engineering Fast Reroute Link and Node Protection” feature
module in the MPLS Traffic Engineering: Path, Link, and Node Protection
Configuration Guide (part of the Multiprotocol Label Switching
Configuration Guide Library)
Standards
Standard Title
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
147
H-VPLS N-PE Redundancy for MPLS Access
Feature Information for H-VPLS N-PE Redundancy for MPLS Access
MIBs
Pseudowire Emulation Edge-to-Edge MIBs To locate and download MIBs for selected platforms, Cisco
for Ethernet, Frame Relay, and ATM software releases, and feature sets, use Cisco MIB Locator
Services found at the following URL:
http://www.cisco.com/go/mibs
Technical Assistance
Description Link
Table 12: Feature Information for H-VPLS N-PE Redundancy for MPLS Access
H-VPLS N-PE Redundancy for Cisco IOS XE Release This feature was introduced on the Cisco ASR
MPLS Access 3.13.0S 920 Routers (ASR-920-12CZ-A,
ASR-920-12CZ-D, ASR-920-4SZ-A,
ASR-920-4SZ-D).
Glossary
CE device—customer edge device. A device that belongs to a customer network, which connects to a PE
device to utilize MPLS VPN network services.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
148
H-VPLS N-PE Redundancy for MPLS Access
Glossary
LAN—local-area network. High-speed, low-error data network covering a relatively small geographic area.
LANs connect workstations, peripherals, terminals, and other devices in a single building or other geographically
limited areas.
MPLS—Multiprotocol Label Switching. A packet-forwarding technology, used in the network core, that
applies data link layer labels to tell switching nodes how to forward data, resulting in faster and more scalable
forwarding than network layer routing normally can do.
MSTP—Multiple Spanning Tree Protocol. MSTP enables multiple VLANs to be mapped to the same
spanning-tree instance, reducing the number of spanning-tree instances needed to support a large number of
VLANs.
N-PE—network provider edge device. This device acts as a gateway between the MPLS core and edge
domains.
PE device—provider edge device. The PE device is the entry point into the service provider network. The
PE device is typically deployed on the edge of the network and is administered by the service provider.
pseudowire—A pseudowire is a virtual connection that, in the context of VPLS, connects two SVIs. It is a
mechanism that carries the elements of an emulated service from one PE device to one or more PE devices
over a packet switched network (PSN). A pseudowire is bidirectional and consists of a pair of unidirectional
MPLS virtual circuits (VCs). A pseudowire can be used to connect a point-to-point circuit.
QinQ—An IEEE 802.1Q VLAN tunnel. A mechanism for constructing multipoint Layer 2 VPN using Ethernet
switches.
redundancy—The duplication of devices, services, or connections so that, in the event of a failure, they can
perform the work of those that failed.
router—A network layer device that uses one or more metrics to determine the optimal path along which
network traffic should be forwarded. Routers forward packets from one network to another based on network
layer information.
spanning tree—Loop-free subset of a network topology.
U-PE—user provider edge device. This device connects CE devices to the service.
VFI—virtual forwarding instance. A VFI is a collection of data structures used by the data plane, software-based
or hardware-based, to forward packets to one or more VCs.
VLAN—Virtual LAN. Group of devices on one or more LANs that are configured (using management
software) so that they can communicate as if they were attached to the same wire, when in fact they are located
on a number of different LAN segments.
VPLS—Virtual Private LAN Service. VPLS describes an architecture that delivers Layer 2 service that
emulates an Ethernet LAN across a wide-area network (WAN) and inherits the scaling characteristics of a
LAN.
VPLS redundancy—Also called N-PE redundancy. Allows U-PEs to be dual-honed (to their N-PEs) in a
loop-free topology with MPLS or QinQ as the access or aggregation domain.
VPN—Virtual Private Network. Allows IP traffic to travel securely over public TCP/IP networks and the
Internet by encapsulating and encrypting all IP packets. VPN uses a tunnel to encrypt all information at the
IP level.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
149
H-VPLS N-PE Redundancy for MPLS Access
Glossary
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
150
CHAPTER 6
VPLS MAC Address Withdrawal
The VPLS MAC Address Withdrawal feature provides faster convergence by removing (or unlearning) MAC
addresses that have been dynamically learned. A Label Distribution Protocol (LDP)-based MAC address
withdrawal message is used for this purpose. A MAC list Type Length Value (TLV) is part of the MAC
address withdrawal message. No configuration is needed.
• Finding Feature Information, on page 151
• Information About VPLS MAC Address Withdrawal, on page 151
• Additional References for Any Transport over MPLS, on page 153
• Feature Information for VPLS MAC Address Withdrawal, on page 154
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
151
VPLS MAC Address Withdrawal
VPLS MAC Address Withdrawal Using Commands Associated with L2VPN Protocol-Based Feature
PE devices learn the remote MAC addresses and directly attached MAC addresses on customer-facing ports
by deriving the topology and forwarding information from packets originating at customer sites. To display
the number of MAC address withdrawal messages, enter the show mpls l2transport vc detail command, as
shown in the following example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
152
VPLS MAC Address Withdrawal
How MAC Address Withdrawal Works with H-VPLS N-PE Redundancy with MPLS Access
How MAC Address Withdrawal Works with H-VPLS N-PE Redundancy with
MPLS Access
If the pseudowire between the user provider edge (U-PE) device and network provider edge (N-PE) device
fails, the L2VPN Pseudowire Redundancy feature on the U-PE device activates the standby pseudowire. In
addition, the U-PE device sends a Label Distribution Protocol (LDP) MAC address withdrawal request to the
new N-PE device, which forwards the message to all pseudowires in the virtual private LAN service (VPLS)
core and flushes its MAC address table.
If a bridge domain interface (BDI) on the N-PE device fails, the L2VPN Pseudowire Redundancy feature
activates the standby pseudowire and the U-PE device sends a MAC withdrawal message to the newly active
N-PE device.
How MAC Address Withdrawal Works with H-VPLS N-PE Redundancy with
QinQ Access
If a failure occurs in the customer-switched network, a spanning-tree Topology Change Notification (TCN)
is issued to the network provider edge (N-PE) device, which issues a Label Distribution Protocol (LDP)-based
MAC address withdrawal message to the peer N-PE devices and flushes its MAC address table.
Cisco IOS commands Cisco IOS Master Command List, All Releases
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
153
VPLS MAC Address Withdrawal
Feature Information for VPLS MAC Address Withdrawal
Technical Assistance
Description Link
VPLS MAC Address Cisco IOS XE Release This feature was introduced on the Cisco ASR 920
Withdrawal 3.13.0S Routers (ASR-920-12CZ-A, ASR-920-12CZ-D,
ASR-920-4SZ-A, ASR-920-4SZ-D).
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
154
CHAPTER 7
VPLS BGP Signaling
The two primary functions of the Virtual Private LAN Service (VPLS) control plane are autodiscovery and
signaling. The VPLS BGP Signaling feature enables you to use BGP as both an autodiscovery and a signaling
protocol for VPLS, in accordance with RFC 4761.
• Finding Feature Information, on page 155
• Prerequisites for VPLS BGP Signaling, on page 155
• Information About VPLS BGP Signaling, on page 156
• How to Configure VPLS BGP Signaling, on page 157
• Configuration Examples for VPLS BGP Signaling, on page 160
• Additional References for VPLS BGP Signaling, on page 160
• Feature Information for VPLS BGP Signaling, on page 161
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
155
VPLS BGP Signaling
Information About VPLS BGP Signaling
Additional information, such as next-hop, route target (specified for a VPLS instance), and other Layer 2 data
are carried in the BGP extended community attributes. A route target-based import/export mechanism similar
to L3VPN is performed by BGP to filter L2VPN NLRIs of a particular VPLS instance.
Whether you use BGP signaling (RFC 4761) or LDP signaling (RFC 6074) depends on the commands you
specify. To enable the VPLS BGP Signaling feature, use the autodiscovery bgp signaling bgp command in
L2 VFI configuration mode. This command is supported on a per VPLS instance basis.
If a BGP session receives an invalid (that is, not matching the configuration) BGP update advertisement
(update or withdraw), it is ignored.
BGP’s main task in supporting VPLS is route distribution via the L2VPN address family and interactions
with L2VPN. Interactions between BGP and other components remain the same. Basic BGP functionalities
like best-path selection, next-hop handling, and update generation, continue to operate in the same manner
with VPLS BGP signaling. BGP RT constraint works seamlessly with the BGP VPLS Signaling feature.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
156
VPLS BGP Signaling
How to Configure VPLS BGP Signaling
Note For more information, see Configuring Virtual Private Lan Services.
SUMMARY STEPS
1. enable
2. configure terminal
3. l2vpn vfi context name
4. vpn id vpn-id
5. autodiscovery bgp signaling {bgp | ldp} [template template-name]
6. ve id ve-id
7. ve range ve-range
8. exit
9. exit
10. router bgp autonomous-system-number
11. bgp graceful-restart
12. neighbor ip-address remote-as autonomous-system-number
13. address-family l2vpn [vpls]
14. neighbor ip-address activate
15. neighbor ip-address send-community [both | standard | extended]
16. neighbor ip-address suppress-signaling-protocol ldp
17. end
18. show bgp l2vpn vpls {all | rd route-distinguisher}
DETAILED STEPS
Device> enable
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
157
VPLS BGP Signaling
Configuring VPLS BGP Signaling
Step 5 autodiscovery bgp signaling {bgp | ldp} [template Enables BGP signaling and discovery or LDP signaling
template-name] and enters L2VPN VFI autodiscovery configuration mode.
Example: Note For the VPLS BGP Signaling feature use the
autodiscovery bgp signaling bgp command.
Device(config-vfi)# autodiscovery bgp signaling
bgp
Step 6 ve id ve-id Specifies the VPLS endpoint (VE) device ID value. The
VE ID identifies a VFI within a VPLS service. The VE
Example:
device ID value is from 1 to 16384.
Device(config-vfi-autodiscovery)# ve id 1001
Step 7 ve range ve-range Specifies the VE device ID range value. The VE range
overrides the minimum size of VE blocks. The default
Example:
minimum size is 10. Any configured VE range must be
higher than 10.
Device(config-vfi-autodiscovery)# ve range 12
Device(config-vfi-autodiscovery)# exit
Step 9 exit Exits L2VPN VFI configuration mode and enters global
configuration mode.
Example:
Device(config-vfi)# exit
Step 10 router bgp autonomous-system-number Enters router configuration mode to create or configure a
BGP routing process.
Example:
Step 11 bgp graceful-restart Enables the BGP graceful restart capability and BGP
nonstop forwarding (NSF) awareness.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
158
VPLS BGP Signaling
Configuring VPLS BGP Signaling
Step 13 address-family l2vpn [vpls] Specifies the L2VPN address family and enters address
family configuration mode.
Example:
• The optional vpls keyword specifies that VPLS
Device(config-router)# address-family l2vpn vpls endpoint provisioning information is to be distributed
to BGP peers.
Step 14 neighbor ip-address activate Enables the neighbor to exchange information for the
L2VPN VPLS address family with the local device.
Example:
Step 15 neighbor ip-address send-community [both | standard Specifies that a communities attribute should be sent to a
| extended] BGP neighbor.
Example: • In this example, an extended communities attribute
is sent to the neighbor at 10.10.10.1.
Device(config-router-af)# neighbor 10.10.10.1
send-community extended
Step 16 neighbor ip-address suppress-signaling-protocol ldp Suppresses LDP signaling and enables BGP signaling.
Example: • In this example LDP signaling is suppressed (and
BGP signaling enabled) for the neighbor at
Device(config-router-af)# neighbor 10.10.10.1 10.10.10.1.
suppress-signaling-protocol ldp
Device(config-router-af)# end
Step 18 show bgp l2vpn vpls {all | rd route-distinguisher} (Optional) Displays information about the L2VPN VPLS
address family.
Example:
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
159
VPLS BGP Signaling
Configuration Examples for VPLS BGP Signaling
BGP commands: complete command syntax, command mode, defaults, Cisco IOS IP Routing: BGP
command history, usage guidelines, and examples. Command Reference
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
160
VPLS BGP Signaling
Feature Information for VPLS BGP Signaling
Standard/RFC Title
RFC 4761 Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling
RFC 6074 Provisioning, Auto-Discovery, and Signaling in Layer 2 Virtual Private Networks (L2VPNs)
Technical Assistance
Description Link
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
161
VPLS BGP Signaling
Feature Information for VPLS BGP Signaling
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
162
CHAPTER 8
EVPN Virtual Private Wire Service (VPWS) Single
Homed
Effective Release Cisco IOS XE 3.18, this feature is now supported on Cisco ASR 920 Series Aggregation
Services Router, EVPN-VPWS single homed is a BGP control plane solution for point-to-point services. It
has the ability to forward traffic from or to one network to another using the Ethernet Segment without MAC
lookup.
EVPN VPWS single homed technology works on IP and MPLS core. IP core to support BGP and MPLS core
for switching packets between the endpoints.
• Information About EVPN-VPWS, on page 163
• Prerequisites for EVPN-VPWS, on page 164
• Restrictions for EVPN-VPWS, on page 164
• How to Configure EPVN-VPWS, on page 165
• Configuration Examples for EVPN-VPWS Instance, on page 171
• Additional References for EVPN-VPWS, on page 173
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
163
EVPN Virtual Private Wire Service (VPWS) Single Homed
Benefits of EVPN-VPWS Single Homed
Scaling Information
Number of pseudowires supported for EVPN-VPWS is 2000 on Cisco ASR 920 Series Aggregation Services
Router.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
164
EVPN Virtual Private Wire Service (VPWS) Single Homed
How to Configure EPVN-VPWS
Procedure
router bgp 1
address-family l2vpn evpn
neighbor 192.168.0.1 activate
exit-address-family
Procedure
enable
configure terminal
l2vpn evpn instance 11 point-to-point
vpws context test
service target 100 source 100
member GigabitEthernet0/0/0 service-instance 10
no shut
end
Procedure
interface GigabitEthernet0/0/1
service instance 2 ethernet
encapsulation dot1q 2
rewrite ingress tag pop 1 symmetric
end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
165
EVPN Virtual Private Wire Service (VPWS) Single Homed
Verfiying EVPN-VPWS Instance
Procedure
enable
configure terminal
l2vpn evpn logging vc-state
end
This command displays a summary of L2VPN EVPN with total number of EVIs, VCs and routes.
show l2vpn evpn summary
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
166
EVPN Virtual Private Wire Service (VPWS) Single Homed
Verifying EVPN-VPWS Configuration
v v
O B RD Ethernet Segment Id Eth Tag Next Hop
-+-+---------------------+------------------------+--------+---------------
i Y 192.168.0.3:100 0000.0000.0000.0000.0000 2 192.168.0.3
L - 192.168.0.2:100 0000.0000.0000.0000.0000 1
show l2vpn evpn rib ead evi
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
167
EVPN Virtual Private Wire Service (VPWS) Single Homed
Verifying EVPN-VPWS Configuration for Logging
Troubleshooting
Virtual Circuit (VC) is in Down state
EVPN VPWS protocol has no communication of VC state between endpoints. Furthemore LDP transport
LSP is unidirectional and there is no end-to-end checking for connectivity. VC can be up on one end and
down on the other end in the following cases:
• Core-facing mpls dataplane down on one side only. For example, if loopback configured with /24 on
one-end and configured correctly with /32 at other end.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
168
EVPN Virtual Private Wire Service (VPWS) Single Homed
Virtual Circuit (VC) is in Down state
• UUT has no remote EVPN EAD route from peer. Several variants:
• Peer never sent it.
• Peer sent it, but RT mismatch: No intersection between UUT Import-RT and peer Export-RT.
• Peer sent it, RT matches, but etag mismatch: For service etags tgt/src, UUT has x/y, peer has y/z.
Solution
Solution
show l2vpn evpn vc all detail
EVPN name: vc100, state: up, type: point-to-point
EVPN ID: 100
VPWS Service Instance ID: Source 1, Target 2
Labels: Local 16, Remote 16
// Must have valid Remote Label. If missing, then there is no matching remote route.
Cross-check with BGP: 'show bgp l2vpn evpn [...] detail'.
// Must have valid Next Hop Address. If missing, then there is no matching remote route.
Cross-check with BGP: 'show bgp l2vpn evpn [...] detail'.
Dataplane:
SSM segment/switch IDs: 4098/4097 (used), PWID: 1
Rx Counters
78 input transit packets, 26425 bytes
0 drops
Tx Counters
79 output transit packets, 28240 bytes
0 drops
5 VC FSM state transitions, Last 5 shown
Prov: Idle -> Prov, Tue Sep 29 13:15:37.848 (00:52:21 ago)
AdmUp: Prov -> LocWait, Tue Sep 29 13:15:40.287 (00:52:18 ago)
LocUp: LocWait -> RemWait, Tue Sep 29 13:15:40.287 (00:52:18 ago)
RemUp: RemWait -> Act, Tue Sep 29 13:17:19.368 (00:50:39 ago)
DpUp: Act -> Est, Tue Sep 29 13:17:19.371 (00:50:39 ago)
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
169
EVPN Virtual Private Wire Service (VPWS) Single Homed
VC FSM History
// Pay close attention to last line of VC FSM history. The format is:
// <Event>: <OldState> -> <NewState>
// Troubleshooting info appears below.
VC FSM History
Problem The state of the VC is Prov — Provisioned: VC is disabled.
Solution
Problem The state of the VC is Act — Activating: Control plane ok. Trying to activate dataplane.
Solution
Remote-Wait State
Problem The state of the VC is RemWait — Remote-Wait: Waiting for matching remote route.
Possible Cause This state occurs due to no matching remote route for the VC. A matching remote route
means all of the following are true:
• Route is present in BGP. Requires a local EVI to have route target in the route.
• Remote path is best path.
• Route is present in global EVPN route.
• Route is present in EVI route. Requires the EVI to have route target in the route.
• Route has ETag which matches the VC source identity. (service target <tgt-id> source <src-id>).
Solution Perform these steps to check whether the VC is in remote wait state:
Solution
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
170
EVPN Virtual Private Wire Service (VPWS) Single Homed
Configuration Examples for EVPN-VPWS Instance
• If a remote route is present in global EVPN then check if the remote route is present in EVI route.
• Solution Check for EVI or VC configuration mismatch.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
171
EVPN Virtual Private Wire Service (VPWS) Single Homed
Configuration Examples for EVPN-VPWS Instance
interface GigabitEthernet0/0/1
description Core facing
ip address 10.0.1.2 255.255.255.0
ip ospf 1 area 0
mpls ip
!
router ospf 1
router-id 2.2.2.2
!
router bgp 1
bgp router-id 2.2.2.2
neighbor 1.1.1.1 remote-as 1
neighbor 1.1.1.1 update-source Loopback0
!
address-family ipv4
neighbor 1.1.1.1 activate
exit-address-family
!
address-family l2vpn evpn
neighbor 1.1.1.1 activate
exit-address-family
!
l2vpn evpn instance 100 point-to-point
!
vpws context vc100
service target 1 source 2
member GigabitEthernet0/0/0
!
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
172
EVPN Virtual Private Wire Service (VPWS) Single Homed
Additional References for EVPN-VPWS
Cisco IOS commands Cisco IOS Master Commands List, All Releases
Standard/RFC Title
MIBs
•—
—
Technical Assistance
Description Link
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
173
EVPN Virtual Private Wire Service (VPWS) Single Homed
Additional References for EVPN-VPWS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
174
CHAPTER 9
N:1 PVC Mapping to PWE with Nonunique VPIs
The N:1 PVC Mapping to PseudoWire Emulation (PWE) with Nonunique virtual path identifiers (VPIs)
feature maps one or more ATM permanent virtual circuits (PVCs) to a single pseudowire (PW). There are
two modes of AAL0 encapsulation, N:1 and 1:1 mapping. In N:1 mapping, multiple unrelated virtual path
identifier/virtual channel identifier (VPI/VCI) are carried over a single Multiprotocol Label Switching (MPLS)
PW. This is an efficient mapping method because less resources are used from the MPLS network. In 1:1
mapping, a single VPI/VCI is carried over a single MPLS PW. Benefits of this feature include the following:
• Aggregate quality of service (QoS) can be applied to related PVCs.
• Bandwidth is conserved with the reduction in the number of pseudowires that are used.
• Restrictions for N:1 PVC Mapping to PWE with Nonunique VPIs, on page 175
• Information About N:1 PVC Mapping to PWE with Nonunique VPIs, on page 176
• How to Configure N:1 PVC Mapping to PWE with Nonunique VPIs, on page 176
• Configuration Examples for N:1 PVC Mapping to PWE with Nonunique VPIs, on page 178
• Verifying the N:1 PVC Mapping to PWE with Nonunique VPIs Configuration, on page 179
• Additional References, on page 179
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
175
N:1 PVC Mapping to PWE with Nonunique VPIs
Information About N:1 PVC Mapping to PWE with Nonunique VPIs
• Only ATM adaptation layer type 0 (AAL0) encapsulation is supported for N:1 PVCs.
• The service policy configuration can be configured only at the subinterface level for N:1 PVCs.
• ATM N:1 and PVP modes cannot be configured on different subinterfaces that belong to a physical
interface.
• You cannot change the ATM interface mode from point-to-point to multipoint or from multipoint to
point-to-point.
• If you change a layer 2 ATM interface to a layer 3 ATM interface, traffic will not flow.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
176
N:1 PVC Mapping to PWE with Nonunique VPIs
Configuring N:1 PVC Mapping to PWE with Nonunique VPIs
DETAILED STEPS
Step 3 interface atm slot/subslot/port Enables the ATM interface and enters interface
configuration mode.
Example:
Device(config)# interface atm 9/1/1
Step 4 atm mcpt-timers timer1 timer2 timer3 Sets the Maximum Cell Packing Timeout (MCPT) values
in microseconds.
Example:
Device(config-if)# atm mcpt-timers 100 200 300 • The MCPT timer sets the time for which the device
waits for the raw cells (AAL0 encapsulation) to be
packed into a single packet for punting to the
pseudowire.
Step 7 interface atm slot/subslot/port.subslot multipoint Enters subinterface configuration mode and creates a
multipoint subinterface on the given port on the specified
Example:
ATM Shared Port Adapter (SPA).
Device(config)# interface atm 9/1/1.1 multipoint
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
177
N:1 PVC Mapping to PWE with Nonunique VPIs
Configuration Examples for N:1 PVC Mapping to PWE with Nonunique VPIs
Step 10 cell-packing maxcells mcpt-timer timer-number Enables ATM over MPLS to pack multiple ATM cells into
each MPLS packet within the MCPT timing.
Example:
Device(config-subif)# cell-packing 20 mcpt-timer
2
Step 11 xconnect peer-ipaddress vc-id encapsulation (Optional) Enables the attachment circuit and specifies the
mpls IP address of the peer, a VC ID, and the data encapsulation
method.
Example:
Device(config-subif)# xconnect 10.1.1.1 100
encapsulation mpls
Step 12 pvc vpi/vci l2transport Assigns a VPI and virtual channel identifier (VCI).
Example:
Device(config-subif)# pvc 10/100 l2transport
Step 13 Repeat Step 12 for the number of PVCs that you want to —
configure.
Step 14 end Exits subinterface configuration mode and returns to
privileged EXEC mode.
Example:
Device(config-subif)# end
Device> enable
Device# configure terminal
Device(config)# interface atm 0/1/0
Device(config-if)# atm mcpt-timers 500 5000 50000
Device(config-if)# exit
Device# configure terminal
Device(config)# interface atm 0/1/0.1 multipoint
Device(config-subif)# no ip address
Device(config-subif)# atm enable-ilmi-trap
Device(config-subif)# cell packing 20 mcpt-timer 2
Device(config-subif)# xconnect 10.1.1.1 100 encapsulation mpls
Device(config-subif)# pvc 10/100 l2transport
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
178
N:1 PVC Mapping to PWE with Nonunique VPIs
Verifying the N:1 PVC Mapping to PWE with Nonunique VPIs Configuration
interface ATM0/0/0.1/1/1/1
atm mcpt-timers 20 30 40
Additional References
Related Documents
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
179
N:1 PVC Mapping to PWE with Nonunique VPIs
Additional References
Technical Assistance
Description Link
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
180
CHAPTER 10
Pseudowire Group Switchover
The Pseudowire Group Switchover feature allows all pseudowires in a group to be quickly switched over to
backup pseudowires. This group switchover is triggered by a single “group down” status message received
from a remote peer.
• Finding Feature Information, on page 181
• Prerequisites for Pseudowire Group Switchover , on page 181
• Restrictions for Pseudowire Group Switchover, on page 182
• Information About Pseudowire Group Switchover, on page 182
• How to Configure Predictive Switchover, on page 183
• Verifying a Pseudowire Group Switchover Configuration, on page 184
• Troubleshooting a Pseudowire Group Switchover Configuration, on page 186
• Configuration Examples for Predictive Switchover, on page 186
• Additional References, on page 187
• Feature Information for Pseudowire Group Switchover, on page 187
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
181
Pseudowire Group Switchover
Restrictions for Pseudowire Group Switchover
Note The Pseudowire Group Switchover feature is enabled by default and cannot be disabled.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
182
Pseudowire Group Switchover
How to Configure Predictive Switchover
DETAILED STEPS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
183
Pseudowire Group Switchover
Configuring Predictive Switchover (Xconnect Configuration Mode)
DETAILED STEPS
Step 3 l2vpn xconnect context context-name Creates an L2VPN cross-connect context and enters
xconnect configuration mode.
Example:
Device(config)# l2vpn xconnect context con1
Service
Interface Dest Address VC ID Type Name Status
--------- --------------- ---------- ------ ------------------------ ----------
pw100001 2.1.1.2 1234000 p2p Et1/0.1-1001 UP
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
184
Pseudowire Group Switchover
Verifying a Pseudowire Group Switchover Configuration
The following example shows how to display the status of the pseudowire switching point:
Device# show l2vpn atom vc destination 2.1.1.2 group remote 6 detail
The following example lists the active and standby segment pairs associated with each peer IP address and
group identifier:
Device# show ssm group
Active Standby
IP Address Group ID Segment/Switch Segment/Switch
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
185
Pseudowire Group Switchover
Troubleshooting a Pseudowire Group Switchover Configuration
=========================================================================
2.1.1.2 6 8215/4115 4116/8210
The following example displays the number of active and standby segment pairs associated with each peer
IP address and group identifier:
Device# show ssm group 2.1.1.2 6 summary
The following example displays the number of pseudowires programmed in the hardware, with grouping
information:
Device# show platform hardware pp active pw eompls group brief
TroubleshootingaPseudowireGroupSwitchoverConfiguration
Use the debug platform software atom brief command to view information about the following configurations:
• Add Group
• Delete From Group
• Group Switchovers
Note We recommend that you use the debug platform software atom brief command only under Cisco Technical
Assistance Center (TAC) supervision.
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
186
Pseudowire Group Switchover
Additional References
Additional References
Related Documents
Standard/RFC Title
RFC 4447 Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)
Technical Assistance
Description Link
The Cisco Support and Documentation website provides http://www.cisco.com/cisco/web/support/index.html
online resources to download documentation, software,
and tools. Use these resources to install and configure
the software and to troubleshoot and resolve technical
issues with Cisco products and technologies. Access to
most tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and password.
Pseudowire Group Cisco IOS XE Release This feature was introduced on the Cisco ASR 920
Switchover 3.13.0S Routers (ASR-920-12CZ-A, ASR-920-12CZ-D,
ASR-920-4SZ-A, ASR-920-4SZ-D).
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
187
Pseudowire Group Switchover
Feature Information for Pseudowire Group Switchover
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
188
CHAPTER 11
Configuring Routed Pseudowire and VPLS
Routed Pseudowire and VPLS feature routes Layer 3 traffic and Layer 2 frames for pseudowire connections
between provider edge (PE) devices using Virtual Private LAN Services (VPLS) multipoint PE.
• Prerequisites for Routed Pseudowire and VPLS, on page 189
• Restrictions for Routed Pseudowire and VPLS, on page 189
• Information About Routed Pseudowire and VPLS, on page 190
• How to Configure Routed Pseudowire and VPLS, on page 190
• Configuration Examples: Routed Pseudowire and VPLS, on page 193
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
189
Configuring Routed Pseudowire and VPLS
Information About Routed Pseudowire and VPLS
DETAILED STEPS
Device> enable
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
190
Configuring Routed Pseudowire and VPLS
Configuring a VFI on a PE Device
Step 4 ip address ip address subnet mask Specifies the IP address for the bridge domain.
Example:
Router(config-if)# ip address 24.24.24.24
255.255.255.0
Note You must configure BDI on the bridge domain that has the association with the VFI.
SUMMARY STEPS
1. enable
2. configure terminal
3. l2 vfi name manual
4. vpn id vpn-id
5. neighbor remote-router-id vc-id {encapsulation encapsulation-type | pw-class pw-name}
[no-split-horizon]
6. bridge-domain bd-id
7. end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
191
Configuring Routed Pseudowire and VPLS
Configuring a VFI on a PE Device
DETAILED STEPS
Device> enable
Step 3 l2 vfi name manual Establishes a Layer 2 VPN (L2VPN) virtual forwarding
interface (VFI) between two or more separate networks and
Example:
enters VFI configuration mode.
Device(config)# l2 vfi vfi110 manual
Step 5 neighbor remote-router-id vc-id {encapsulation Specifies the type of tunnel signaling and encapsulation
encapsulation-type | pw-class pw-name} [no-split-horizon] mechanism for each VPLS peer.
Example: Note Split horizon is the default configuration to avoid
broadcast packet looping and to isolate Layer 2
Device(config-vfi)# neighbor 172.16.10.2 4 traffic. Use the no-split-horizon keyword to
encapsulation mpls disable split horizon and to configure multiple
VCs per spoke into the same VFI.
Device(config-vfi)# end
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
192
Configuring Routed Pseudowire and VPLS
Configuration Examples: Routed Pseudowire and VPLS
!
interface GigabitEthernet0/0/0
service instance 3 ethernet
encapsulation dot1q 3000
rewrite ingress tag pop 1 symmetric
bridge-domain 100
!
interface BDI100
ip address 24.24.24.24 255.255.255.0
no shut
!
l2 vfi TEST manual
vpn id 100
bridge-domain 100
neighbor 9.9.9.9 encapsulation mpls
!
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
193
Configuring Routed Pseudowire and VPLS
Example: Configuring Routed Pseudowire and VPLS
MPLS Layer 2 VPNs Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
194