MPLS L2VPN
MPLS L2VPN
MPLS L2VPN
Contents
Introduction
Overview of L2VPN
Why is L2VPN needed?
MPLS L2 VPN Models
Technology Options
1. VPWS Services
2. VPLS Services
3. EVPN
4. PBB-EVPN
VPWS - Pseudo Wire Reference Model
Layer 2 VPN Enabler: The Pseudowire
AToM Architecture
L2 Transport over MPLS
VPWS Traffic Encapsulation
Signalling the Pseudowire
Control-Word
Forwarding Plane Processing
Operation
Signalling the Status of PW
Basic AToM configuration
PseudowirePacket Analysis
Topology
L2VPN Interworking
Interworking Possibilities
Related Information
Introduction
This document describes the Multiprotocol Label Switching (MPLS) based L2 Virtual Private
Network (L2VPN) pseudowires. It discusses the signalling of the pseudowire and packet analysis
in Cisco IOS®, IOS®-XE in order to illustrate the behaviour.
Overview of L2VPN
Layer 2 (L2) transport over MPLS and IP already exists for like-to-like attachment circuits, such as
Ethernet-to-Ethernet, PPP-to-PPP, High-Level Data Link Control (HDLC), etc.
L2VPNs employ L2 services over MPLS in order to build a topology of point-to-point connections
that connect end customer sites in a VPN. These L2VPNs provide an alternative to private
networks that have been provisioned by means of dedicated leased lines or by means of L2 virtual
circuits that employ ATM or Frame Relay. The service provisioned with these L2VPNs is known as
Virtual Private Wire Service (VPWS).
2. VPLS Services
• Multipoint
3. EVPN
a. BGP control-plane for Ethernet Segment and MAC distribution and learning over MPLS core
• No use of Pseudowires
b. Multi-destination frame delivery via ingress replication (via MP2P tunnels) or LSM
• Combines scale tools from PBB (aka MAC-in-MAC) with BGP-based MAC learning from EVPN
EVPN and Provider Backbone Bridging EVPN (PBB-EVPN) are next-generation L2VPN solutions
based on BGP control plane for MAC distribution/learning over the core, designed to address
these requirements:
● PWs provide a common intermediate format to transport multiple types of network services
over a Packet Switched Network (PSN) – a network that forwards packets – IPv4, IPv6,
MPLS, Ethernet
● PW technology provides Like-to-Like transport and also Interworking (IW)
● Frames that are received at the PE router on the AC are encapsulated and sent across the
PSW to the remote PE router.
● The egress PE router receives the packet from the Pseudowire and removed their
encapsulation.
● The egress PE extracts and forwards the frame to the AC.
AToM Architecture
● In AToM network, all the routers in the SP run MPLS and the PE router have an AC towards
the CE router.
● In the case of AToM, the PSN tunnel is nothing other than a label switched path LSP between
the two PE routers.
● As such the label that is associated with that LSP is called tunnel label in context to the AToM.
● First, the LDP signals hop by hop between the PE.
● Second, the LSP can be an MPLS TE tunnel that the RSVP signals with the extensions
needed for TE.
● With this tunnel label, you can identify to which PSN tunnel the carried customer frame
belongs.
● This tunnel label also gets the frames from the local or ingress PE to the remote or egress PE
across the MPLS backbone.
● To multiplex several Pseudowire onto one PSN tunnel the PE router uses another label to
identify the Pseudowire.
● This label is called the VC or PW label because it identifies the VC or PW that the frame is
multiplexed into.
The label mapping message that is advertised on the TLDP session contains some TLV :
Pseudowire identifier (PW ID) FEC TLV: Identifies the Pseudowire that the label is bound to
3. Group ID: Identifies the group of the pseudowire. Same group ID to all AC on the same
interface. The PE can use the group ID to withdraw all the VC labels that are associated with that
Group ID in one LDP label withdrawal message. This is referred to wildcard label withdrawal.
4. PW ID: PW ID is VC ID
5. Interface Parameters: Identifies the MTU of the interface towards the CE router, requested
VLAN ID.
If MTU parameter does not match, then PW does not signal. Because LSP is unidirectional, a PW
can be formed only if another LSP exists in the opposite direction between the same pair of PE
routers.
The PW ID FEC TLV is used to identify and match the two opp LSP between a pair of PE routers,
Control-Word
The control word has the following five functions:
1. Pad Small packets: If the AToM packet does not meet this min lengthen the frame is padded
to meet the min length on the ethernet link.
Because the MPLS header has no length that indicates the length of the frames, the control word
holds a length field indicating the length of the frame.
If the received AToM packet in the egress PE router has a control word with a length that is not 0,
the router knows that padding was added and can correctly remove the padding before forwarding
the frames.
2. Preserved the sequence of the transported frames: With this sequence number receiver can
detect the packets:
The first packet sent onto the PW has a sequencenumber of 1 and increments for each
subsequent packet by 1 until it reaches 65535
If such out of seq detected they are dropped, re-ordering for out of sequence AToM packet is not
done.
3. Load balancing:
Routers perform MPLS payload inspection. Based on that router decides how to LB the traffic.
The router looks at the firstnibble,if the first nibble = 4 then its an IPV4 packet. The generic control
word starts with a nibble with vale 0, and the control word used the OAM data starts with value 1.
https://tools.ietf.org/html/rfc4385
00 = unfragmented
01 = 1st fragment
10 = last fragment
11 = intermediate fragment
Forwarding Plane Processing
As the ingress PE received the frame from the CE, it forwards the frame across the MPLS
backbone to the egress LSR with two labels:
1. Tunnel label (top label) – It tells all LSR and Egress PE to where the Frame must be forwarded.
In an AToM network, each pair of PE router must run a targeted LDP session between them.
The TLDP session signals chart of the pseudowire and most importantly advertises the VC label.
Operation
Step 1: Ingress PE router first pushes the VC label onto the frame. And then pushes the tunnel
label.
Step 2: The tunnel label is the label that is associated with the IGP prefix identifying the remote
PE. The prefix is a specified bit the configuration AToM.
Step 3: The MPLS packet is then forwarded according to the tunnel label, hop by hop until the
packet reaches the egress PE2.
Step 4: When the packet reached to the egress PE the tunnel label has already been removed.
This is because of the PHP behaviour between the last P router and the egress PE.
Step 5: The egress PE then looks up the VC label in the forwarding information base strip off the
VC label, and forwards the frame onto the correct AC.
● A PE router can withdraw the label mapping either by sending the Label withdrawal message
or by sending the Label mapping release messages.
● If the AC is down, the PE router signals this by sending a Label Withdraw message to the
remote PE
● If a physical interface goes down, the label withdraws message contains the group id to signal
all AC of the interface is down
2. PW status TLV
● The PW status TLV follows the LDP label mapping TLV when the pseudowire is singled. This
indicates that the PE router wants to use the second method.
● If the other PE router does not support the PW status TLV method, both PE routers revert
back to label withdraw method.
● After the pseudowire is singled, the PW status TLV is carried in an LDP notification message.
The PW status TLV contains the 32-bit status code field.
Step 3. As soon as xconnect in both the PE router configured, the targeted LDP session is
established between the PE router.
PseudowirePacket Analysis
MPLS Echo Request and Reply packets sent over point-to-point Pseudowire.
Topology
Let's ping from PE1 to PE2:
!!!!!
1. ECHO Request:
Sent as Labeled Packet carrying PW LABEL. This will be label switched (with Transport Label)
LABELS : 2
SRC IP : LOOPBACK IP (USED IN TARGETED LDP NEIGHBORSHIP)
DST IP : 127.0.0.1
L4 TYPE : UDP
SRC PORT : 3503
DST PORT : 3505
TOS BYTE : OFF
MPLS EXP : OFF
DF BIT : ON
IPv4 OPTIONS Field is in USE: ROUTER ALERT OPTIONS FIELD ( Punt to CPU)
Overview:
Layer 2/Labels:
L3/L4:
The actual MPLS payload:
2. Echo Reply:
Sent as UNICAST PACKET. This will be label switched (with Transport Label) because of LDP in
a core.
LABELS:1
SRC IP: EXIT INTERFACE IP ADDRESS (10.1.6.2 in our case)
DST IP: SOURCE IP SEEN IN ECHO REQUEST - LOOPBACK OF SOURCE ROUTER
L4 TYPE: UDP
SRC PORT:3503
DST PORT:3505
TOS BYTE: OFF
MPLS EXP: OFF
DF BIT: ON
DF BIT is ON
Dataplane:
SSM segment/switch IDs: 4097/4096 (used), PWID: 1
VC statistics:
L2VPN Interworking
L2VPN Interworking builds on this functionality by allowing disparate attachment circuits to be
connected. An interworking function facilitates the translation between different Layer 2
encapsulations. In earlier releases, the Cisco series router supported only bridged interworking,
which is also known as Ethernet interworking.
Up to this point in this, the AC on both the sides has been the same encapsulation type, which is
also referred to as like-to-like functionality.
L2VPN interworking is AToM feature allows different encapsulation type at both sides of the AToM
network
2. Ethernet/Bridged: MAC header is not removed at all. The MPLS labels are imposed on top of
the MAC header and the MAC header is delivered as is to the other end of the MPLS cloud.
Interworking Possibilities
a. FR to Ethernet
b. FR to PPP
c. FR to ATM
d. Ethernet to VLAN
e. Ethernet to PPP
Related Information
● https://tools.ietf.org/html/rfc3985
● https://tools.ietf.org/html/rfc4664
● https://tools.ietf.org/html/rfc4667
● Technical Support & Documentation - Cisco Systems