Routehub TUNNEL L2VPN PDF
Routehub TUNNEL L2VPN PDF
Routehub TUNNEL L2VPN PDF
Tunneling: L2VPN
Practical Cisco Training for Network Engineers & Consultants!
Preface i
ROUTEHUB GROUP END-USER LICENSE AGREEMENT
IMPORTANT! BE SURE TO CAREFULLY READ AND UNDERSTAND ALL OF THE RIGHTS AND RESTRICTIONS
SET FORTH IN THIS END-USER LICENSE AGREEMENT ("EULA"). YOU ARE NOT AUTHORIZED TO USE THIS
NETWORK CONFIGURATION GUIDE/TRAINING UNLESS AND UNTIL YOU ACCEPT THE TERMS OF THIS EULA.
This EULA is a binding legal agreement between you and ROUTEHUB GROUP, LLC (hereinafter "Licensor") for the
materials accompanying this EULA, including the accompanying computer Network Configuration Guide/Training, associated
media, printed materials and any "online" or electronic documentation (hereinafter the "Network Configuration Guide/Training").
By using the Network Configuration Guide/Training, you agree to be bound by the terms of this EULA. If you do not agree to
the terms of this EULA, do not install or attempt to use the Network Configuration Guide/Training.
The Guide & Training Materials shall be used by only ONE (1) INDIVIDUAL who shall be the sole individual authorized
to use the Guide & Training Materials throughout the term of this License.
1. Grant of License
The Network Configuration Guide/Training is protected by copyright laws and international copyright treaties, as well as
other intellectual property laws and treaties. The Network Configuration Guide/Training is licensed, not sold. This EULA grants
you the following rights:
A. You may use, access, display and run only one copy of the Network Configuration Guide/Training, on a single
computer, workstation or terminal ("Computer"). The primary user of the Computer on which the Network Configuration
Guide/Training is installed may make a second copy for his or her exclusive use for archival purposes only.
B. You may store or install a copy of the Network Configuration Guide/Training on a storage device, such as a
network server, used only to run the Network Configuration Guide/Training on your other Computers over an internal network.
You must, however, acquire a license for each separate Computer on which the Network Configuration Guide/Training is run,
displayed or utilized from the server or similar device. A license for the Network Configuration Guide/Training may not be
shared or used concurrently on different Computers.
C. Your license rights under this EULA are non-exclusive. All rights not expressly granted herein are reserved by
Licensor.
D. You may not sell, transfer or convey the Network Configuration Guide/Training to any third party without
Licensor's prior express written consent.
If you have not previously paid the license fee for the Network Configuration Guide/Training, then you must pay the
license fee within the period indicated in the applicable invoice sent to you by Licensor.
3. Support Services
This EULA is a license of the Network Configuration Guide/Training only, and Licensor does not assume any obligation
to provide maintenance, patches or fixes to the Network Configuration Guide/Training. Licensor further disclaims any obligation
to provide support or to prepare and distribute modifications, enhancements, updates and new releases of the Network
Configuration Guide/Training.
Licensor may, from time to time, and for a fee, replace, modify or upgrade the Network Configuration Guide/Training.
When accepted by you, any such replacement or modified Network Configuration Guide/Training code or upgrade to the
Network Configuration Guide/Training will be considered part of the Network Configuration Guide/Training and subject to the
terms of this EULA (unless this EULA is superceded by a further EULA accompanying such replacement or modified version of
or upgrade to the Network Configuration Guide/Training).
ii
Preface
5. Termination
You may terminate this EULA at any time by destroying all your copies of the Network Configuration Guide/Training.
Your license to the Network Configuration Guide/Training automatically terminates if you fail to comply with the terms of this
agreement. Upon termination, you are required to remove the Network Configuration Guide/Training from your computer and
destroy any copies of the Network Configuration Guide/Training in your possession. No refund with the product will be
granted.
6. Copyright
A. All title and copyrights in and to the Network Configuration Guide/Training (including but not limited to any
images, photographs, animations, video, audio, music and text incorporated into the Network Configuration Guide/Training),
the accompanying printed materials, and any copies of the Network Configuration Guide/Training, are owned by Licensor or its
suppliers. This EULA grants you no rights to use such content. If this Network Configuration Guide/Training contains
documentation that is provided only in electronic form, you may print one copy of such electronic documentation. Except for
any copies of this EULA, you may not copy the printed materials accompanying the Network Configuration Guide/Training.
B. You may not reverse engineer, de-compile, disassemble, alter, duplicate, modify, rent, lease, loan, sublicense,
make copies of, create derivative works from, distribute or provide others with the Network Configuration Guide/Training in
whole or part, transmit or communicate the application over a network.
7. Export Restrictions
You may not export, ship, transmit or re-export Network Configuration Guide/Training in violation of any applicable law
or regulation including but not limited to Export Administration Regulations issued by the U. S. Department of Commerce.
8. Disclaimer of Warranties
LICENSOR AND ITS SUPPLIERS PROVIDE THE NETWORK CONFIGURATION GUIDE/TRAINING "AS IS" AND
WITH ALL FAULTS, AND HEREBY DISCLAIM ALL OTHER WARRANTIES AND CONDITIONS, EITHER EXPRESS,
IMPLIED OR STATUTORY, INCLUDING BUT NOT LIMITED TO ANY (IF ANY) IMPLIED WARRANTIES OR CONDITIONS
OF MERCHANTABILITY, OF FITNESS FOR A PARTICULAR PURPOSE, OF LACK OF VIRUSES, AND OF LACK OF
NEGLIGENCE OR LACK OF WORKMANLIKE EFFORT. ALSO, THERE IS NO WARRANTY OR CONDITION OF TITLE, OF
QUIET ENJOYMENT, OR OF NONINFRINGEMENT. THE ENTIRE RISK ARISING OUT OF THE USE OR PERFORMANCE
OF THE NETWORK CONFIGURATION GUIDE/TRAINING IS WITH YOU.
9. Limitation of Damages
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT WILL LICENSOR OR ITS
SUPPLIERS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL, DIRECT, INDIRECT, SPECIAL, PUNITIVE OR OTHER
DAMAGES WHATSOEVER ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE
NETWORK CONFIGURATION GUIDE/TRAINING AND WHETHER BASED ON CONTRACT, TORT, NEGLIGENCE, STRICT
LIABILITY OR OTHERWISE, EVEN IF LICENSOR OR ANY SUPPLIER HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. THIS EXCLUSION OF DAMAGES WILL BE EFFECTIVE EVEN IF ANY REMEDY FAILS OF ITS
ESSENTIAL PURPOSE.
10. Arbitration
Any dispute arising under this EULA will be subject to binding arbitration by a single Arbitrator with the American
Arbitration Association (AAA), in accordance with its relevant industry rules, if any. The parties agree that this EULA will be
governed by and construed and interpreted in accordance with the laws of the State of California. The arbitration will be held in
California. The Arbitrator will have the authority to grant injunctive relief and specific performance to enforce the terms of this
EULA. Judgment on any award rendered by the Arbitrator may be entered in any Court of competent jurisdiction.
11. Severability
If any term of this EULA is found to be unenforceable or contrary to law, it will be modified to the least extent necessary
to make it enforceable, and the remaining portions of this Agreement will remain in full force and effect.
12. No Waiver
Preface iii
No waiver of any right under this EULA will be deemed effective unless contained in writing signed by a duly authorized
representative of the party against whom the waiver is to be asserted, and no waiver of any past or present right arising from
any breach or failure to perform will be deemed to be a waiver of any future rights arising out of this EULA.
This EULA constitutes the entire agreement between the parties with respect to its subject matter, and supersedes all
prior agreements, proposals, negotiations, representations or communications relating to the subject matter. Both parties
acknowledge that they have not been induced to enter into this EULA by any representations or promises not specifically
stated herein.
iv
Preface
Table of Contents
1 Introduction 6
2 Configuration 7
2.1 L2TPv3 7
2.1.1 Concepts 7
2.1.2 L2TPv3 using Static Tunnels 9
2.2 EoMPLS 18
2.2.1 Concepts 18
2.2.2 EoMPLS for Hub-and-Spoke WAN 19
2.3 VPLS 29
2.3.1 Concepts 29
2.3.2 VPLS (VLAN-Based) 30
2.3.3 VPLS (QinQ or Port-Based) 43
3 Monitor 54
3.1 Troubleshooting Tips 54
3.1.1 Root Causes 54
3.1.2 Initial questions to ask 54
3.1.3 Typical fixes 55
4 Full Configuration 56
4.1 L2TPv3 56
4.1.1 L2TPv3 using Static Tunnels 56
4.2 EoMPLS 63
4.2.1 EoMPLS for Hub-and-Spoke WAN 63
Preface v
1 Introduction
Many sites focus on providing training towards certifications or exams. These are important
for career development as we possess the CCIE, CCNP, and CCNA certifications. So we
know that they are very valuable to your network engineering career, however, they do not
teach practical network training relevant for network engineers and consultants in the real
world.
This is what our training format is based upon providing practical solutions and technologies
that are deployed in real working environment. Our training workbooks provide four major
components for learning.
Concepts
Design
Configuration
Monitor
Learn the concepts that matter in terms of the components and protocols involved for a
technology's operation.
Learn how to design a network solution with practical steps, considerations, and tools for
your company or clients.
Learn how to configure a network with best practices and get operational step-by-step. We
also include full working configuration files of the network design.
Learn how to monitor, troubleshoot, and confirm the operational state of your configured
network.
All four are important for network engineers and consultants to know how to manage a
network in real time.
2.1 L2TPv3
2.1.1 Concepts
L2TPv3 (Layer 2 Tunneling Protocol Version 3) is a Layer 2 VPN (L2VPN) Tunneling
technology that operates differently than MPLS VPN.
MPLS VPN is an example of a Layer 3 VPN (L3VPN) Tunneling technology where isolated
routing domains for multiple clients on the same Service Provider network exist using VRF
technology. MPLS provides the ability to scale large number of VRF domains and has
mechanisms for forwarding MPLS packets throughout an MPLS infrastructure.
A L2VPN tunnel is basically a virtual connection between two sites that is seen as if the two
sites are directly connected together.
Unlike L3VPN tunnels like MPLS, CE sites may have multiple IP next-hops to reach their
destinations. For dynamic routing CE devices would peer with its locally connected PE
router.
L2VPN configuration is only needed on our PE or Aggregation routers, where our provider
core is acting as a transit area for high-speed switching for the network. Similar to MPLS
where VRF and MP-BGP are configured on the PE routers.
MODE
CLASSES
XCONNECT
VC ID
MODE
When a L2VPN tunnel like a L2TPv3 tunnel is built it can be configured in one of three
available modes:
(1) Manual
(2) Manual with Keepalives
(3) Dynamic
CLASSES
Two classes are configured with L2TP. A L2TP class is configured for the control channel
parameters. Treat the L2TP class similar to other control sessions like Voice Call Signaling
or even the D channel with a BRI or PRI connection. The L2TP class is responsible for
controlling and managing the L2TPv3 tunnel that is built from point A to point B. L2TP class
configuration requires configuring a cookie value represented in Bytes.
The second class is the pseudo-wire class that defines the details of the L2VPN tunnel that is
being built such as the MODE, the encapsulation type, and the interface that would be used
for establishing and terminating the L2TPv3 tunnel.
XCONNECT
This is the configuration needed for building or attaching the Layer 2 tunnel between two PE
or Aggregation points within an ISP network. The configuration associates the two classes
that are pre-configured including the unique local and remote VC IDs. The cookie value that
is configured within the L2TP class is also included.
VC ID
This is the unique identifier that is labeled for the L2VPN tunnel for what the local ID will be
and what the remote ID is. It's good to keep the numbers consistent and standardized.
Requirements:
Create a point-to-point connection between two client sites for routing and switching
services.
The two sites should be able to communicate with one another (routing and traffic).
Technical Objectives:
Performance: the bandwidth services utilized within our network will be FastEthernet
since traffic usage will be minimal and this is a test setup. No voice or video traffic
will exist across our network.
Reliability: hardware redundancy is not included in this design since the SLA
requirements are low and it is a test setup for our L2TPv3 design. If any component
within our ISP fails then our entire network will be inaccessible for our two sites.
Scalability: no requirements for scalability are outlined and we are glad because we
would encounter some scalability issues.
Security: L2VPN like L3VPN tunnels provides a lot of security within its technology
preventing the other traffic to be injected within this virtual connection.
Flexibility: Additional services that may be included at this time.
Network Management: No initial monitoring is needed today, but the network will be
managed by a consulting group.
Topology:
Solutions used in our design: WAN/MAN. From the two, we would be a MAN
solution since Ethernet will be our technology used across our ISP network and the
distances are shorter.
Topology: our WAN/MAN topology will be a 2Tier model with a Core and 2
Aggregation routers. Our MAN Core will be our MPLS P router and our MAN AGG
will be our MPLS PE1 and PE2 routers. Each PE router will connect to one of the
CE sites.
ROUTEHUB-PE1
interface Loopback0
ip address 2.2.2.2 255.255.255.255
interface FastEthernet0/1
ip address 10.1.2.2 255.255.255.0
no shutdown
ROUTEHUB-PE2
interface Loopback0
ip address 3.3.3.3 255.255.255.255
interface FastEthernet0/1
ip address 10.1.3.3 255.255.255.0
no shutdown
Below is the basic configuration for our Service Provider Core router connecting the two
Aggregation routers together.
ROUTEHUB-P
interface Loopback0
ip address 1.1.1.1 255.255.255.255
interface FastEthernet0/0
ip address 10.1.2.1 255.255.255.0
no shutdown
Issuing router ospf followed by a process ID will enable OSPF routing on our device. The
Process ID or PID will be a unique ID that we have assigned to each device on our network.
Next we will enable logging for all OSPF neighbor events for useful troubleshooting when
needed. Next we will add the subnets for all the IP addresses we added for that specific
router. This configuration is important to allow our MPLS devices to form OSPF neighbors in
order to exchange routing information. ALL interfaces among our MPLS devices will exist
within the OSPF backbone network or AREA 0. The loopback interfaces will be added to
their own area unique again to their device ID.
Below is the basic configuration for our two PE routers on our network.
router ospf 2
log-adjacency-changes
network 2.2.2.2 0.0.0.0 area 2
network 10.1.2.0 0.0.0.255 area 0
router ospf 3
log-adjacency-changes
network 3.3.3.3 0.0.0.0 area 3
network 10.1.3.0 0.0.0.255 area 0
And below is the OSPF configuration for our Service Provider Core router.
router ospf 1
log-adjacency-changes
network 1.1.1.1 0.0.0.0 area 1
network 10.1.2.0 0.0.0.255 area 0
network 10.1.3.0 0.0.0.255 area 0
Unlike L3VPN tunnels like MPLS, CE devices have many IP next-hops to reach their
destinations. L2VPN tunnels allow us to provide a direct point-to-point connection between
devices as if they are directly connected with only one hop. This configuration can provide a
good perspective of what the configuration is for other point-to-point connections with T1s or
other dedicated connections between sites.
L2TPv3 configuration only exist on our PE or Aggregation routers, where our provider core is
acting as a transit area for high-speed switching between our Aggregation routers.
The configuration for L2TPv3 will look different from L3VPN configuration, but they are
necessary for creating a unique L2VPN tunnel between only two participants or clients in our
case.
Let's first do the configuration for PE1 which is directly connected to client site, ROUTEHUB-
CE2. First we need to configure a L2TP class. Under this class we will use a cookie size of
4 bytes. Other values can be 4 or 8, the default is zero. 4 bytes tends to be a common value
for most small configuration for controlling the tunnel parameters and it's negotiation with the
other end.
l2tp-class manual
cookie size 4
Next, we will configure our pseudo-wire class that will specify the L2VPN protocol or
encapsulation we will use including other session details. In our case we will configure
L2TPv3.
Next we need to configure our L2VPN tunnel to act in manual mode. The other modes we
could use are manual, manual with keepalive, and dynamic. We will choose manual because
we will manually specify the details of our L2Tv3 tunnel on both ends.
The syntax field "protocol" can be l2tpv3 or none. We would use "none" which will specify
use of the manual mode for our tunnel. We will also specify that our L2VPN tunnel between
our CE sites will be established using the loopback interface IP for better reliability and
management of our tunnel.
pseudowire-class manual
encapsulation l2tpv3
protocol none
ip local interface Loopback0
Next, we will configure our L2TPv3 tunnel to PE2, which is directly connected to CE1. Here,
on our PE1 router CE2 is connected to FastEthernet0/0, but no IP address is configured.
That's right because this is a L2 interface with no L3 presence needed on this interface. That
will be handled by the client. We are only building or extending the LAN for CE2 across our
ISP network to CE1.
The "xconnect" is the actual configuration that builds our L2VPN tunnel to the other side. It
tells us to build the tunnel to 3.3.3.3, which is the loopback interface IP address for PE2. The
configuration for xconnect will use the two pre-configured classes we just completed and the
remote VC ID of 1.
interface FastEthernet0/0
no ip address
duplex auto
speed auto
xconnect 3.3.3.3 1 encapsulation l2tpv3 manual pw-class manual
l2tp id 1 1
l2tp cookie local 4 1
l2tp cookie remote 4 1
l2tp hello manual
Next, we would configure the other end of our L2TPv3 tunnel on PE2, which would be
identical to our configuration from PE1. However, this time our L2VPN tunnel would be
established to PE1 using loopback interface IP 2.2.2.2.
To be consistent we will keep all of our IDs the same for better results and management.
l2tp-class manual
cookie size 4
pseudowire-class manual
encapsulation l2tpv3
protocol none
ip local interface Loopback0
interface FastEthernet0/0
no ip address
duplex auto
speed auto
xconnect 2.2.2.2 1 encapsulation l2tpv3 manual pw-class manual
l2tp id 1 1
l2tp cookie local 4 1
l2tp cookie remote 4 1
l2tp hello manual
For verification, there are many commands to confirm if the L2TPv3 tunnel is up. Two of
them are the following:
These commands will show that we have our L2VPN tunnel up and running on both ends.
Do this first before continuing with the configuration of our CE devices.
This is essentially what the configuration looks like from the client side (on their Client Edge
or CE device). The configuration enables all IP addressing based on the network diagram.
For both CE devices, the FA0/0 interface will be part of the same IP subnet, 10.4.5.0 /24 just
like any other point-to-point subnet.
ROUTEHUB-CE1
interface Loopback0
ip address 4.4.4.4 255.255.255.255
interface FastEthernet0/0
ip address 10.4.5.4 255.255.255.0
ROUTEHUB-CE2
interface Loopback0
ip address 5.5.5.5 255.255.255.255
interface FastEthernet0/0
ip address 10.4.5.5 255.255.255.0
Before continuing confirm that CE1 and CE2 can ping there virtually directly connected IP
address. For example, from CE1 confirm we can ping 10.4.5.5. And versa for CE2 before
we enable IP routing between our two sites.
Doing this configuration will create an EIGRP peer between the two CE routers. We will add
its local LAN subnet and loopback interface subnet for route advertisement and neighbor
establishment.
ROUTEHUB-CE1
router eigrp 1
network 4.4.4.4 0.0.0.0
network 10.4.5.0 0.0.0.255
no auto-summary
no eigrp log-neighbor-changes
ROUTEHUB-CE2
router eigrp 1
network 5.5.5.5 0.0.0.0
network 10.4.5.0 0.0.0.255
no auto-summary
no eigrp log-neighbor-changes
To confirm that the operation is working, we can issue the command "show ip eigrp neighbor"
first to confirm if we have an EIGRP neighbor established.
Second, we can issue the command "show ip route" to view all routes learned (or configured)
in our global routing table.
The command will also show that our L2VPN tunnel is really composed of two segments,
which makes sense for a point-to-point connection. Where Segment 1 is our local end of the
tunnel being built out of interface FA0/0, which is the interface directly to connected to one of
our CE devices. Our end shows an UP status listed under S1.
For the second Segment or Segment 2, that is the tunnel built via L2TP to device 2.2.2.2
(loopback IP for PE1). That segment shows that the tunnel is UP listed under S2.
Therefore, under "XC ST" it will show that our L2VPN tunnel from end-to-end is UP, so we
have a functional L2VPN tunnel configured.
You can also use this command to confirm that our tunnel is being established to the correct
interfaces, protocols, and destination IP addresses especially if issues occur where the
tunnel is not coming up or not built correctly between two sites.
This command shows that our L2VPN tunnel is established successfully listed under "State"
as "est" for Established. We see that the mode used is "manual" including the device name
and IP address of the destination device on the other side of the tunnel. In our case it would
be PE2 (using the loopback IP address).
Also when the L2VPN tunnel is being established a Tunnel ID is generated and would be
reflected here if needed for reference.
We also see the L2TP VC ID information that we configured under xconnect listed here also
for reference.
2.2.1 Concepts
Ethernet over MPLS (EoMPLS) is another L2VPN technology that allows client networks to
extend Layer 2 services (VLANs) across a Layer 3 network (running MPLS VPN).
EoMPLS creates a point-to-point L2VPN tunnel between two sites created from two PE
routers on the MPLS network. It establishes targeted LDP sessions between the two PE.
LDP neighbors are built between directly connected MPLS devices on the same broadcast
domain.
The configuration for implementing EoMPLS is very straight-forward and is supported on a lot
more hardware such as the Cisco 7200 series compared to VPLS which is limited and
requires high-end devices such as the Cisco 7600 router.
Using either EoMPLS, VPLS, or VPWS our CE device can simply be a Layer 2 or Layer 3
switch enabled for 802.1Q up to the MPLS provider to extend VLANs between the sites.
With the L2VPN tunnel built the CE will be able to exchange VTP and BPDU messages
between the sites as if there is a directly connected.
Like L2TPv3, we would use the "xconnect" command for building these point-to-point L2VPN
tunnels using EoMPLS.
For the WAN, we will use Layer 2 over an existing Layer 3 network (using MPLS on the
Service Provider). To overlay layer 2 across the L3 network our Provider will use Ethernet
over MPLS (EoMPLS) to carry VLANs, BPDUs, and VTP messages between our client
locations.
Our client will extend three VLANs across the WAN. One will be for Internal Users (VLAN10,
on the 10.1.1.0 /24 subnet) and the other will be for Guest Users (VLAN100, 192.168.1.0 /24
subnet). We will also extend a third VLAN used for Network Management (VLAN199,
10.254.1.0 /24 subnet). This VLAN used between the two sites is used for management and
device access (telnet, ssh) to the network devices.
EoMPLS is an alternative over using VPLS, though, VPLS allows for better scalability and
allows for point-to-multipoint L2 services compared to EoMPLS which only supports point-to-
point L2 services.
Our CE-H site will use a Cisco Catalyst 3750 L3-switch and our CE-S site will use a Cisco
Catalyst 2960 L2-switch. We will have one computer from each network (Internal User VLAN
and the Guest User VLAN) connected to the CE-S switch shown in the network diagram
below. The computers default gateway will be the IP address that will be configured on
VLAN Layer 3 interface on our CE-H L3-switch.
Our MPLS routers (PE and P) will be Cisco 7206VXR routers running 12.4 (Service Provider
feature set) to support the feature EoMPLS).
ROUTEHUB-P
hostname ROUTEHUB-P1
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface Loopback0
ip address 1.1.1.1 255.255.255.255
interface p1/0
ip address 10.1.2.1 255.255.255.0
mpls ip
no shutdown
interface p2/0
ip address 10.1.3.1 255.255.255.0
mpls ip
no shutdown
router ospf 1
log-adjacency-changes
network 1.1.1.1 0.0.0.0 area 1
network 10.1.2.0 0.0.0.255 area 0
network 10.1.3.0 0.0.0.255 area 0
ROUTEHUB-PE1
hostname ROUTEHUB-PE1
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface Loopback0
ip address 2.2.2.2 255.255.255.255
interface p1/0
ip address 10.1.2.2 255.255.255.0
mpls ip
router ospf 2
log-adjacency-changes
network 2.2.2.2 0.0.0.0 area 2
network 10.1.2.0 0.0.0.255 area 0
ROUTEHUB-PE2
hostname ROUTEHUB-PE2
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface Loopback0
ip address 3.3.3.3 255.255.255.255
interface p1/0
ip address 10.1.3.3 255.255.255.0
mpls ip
no shutdown
router ospf 3
log-adjacency-changes
network 3.3.3.3 0.0.0.0 area 3
network 10.1.3.0 0.0.0.255 area 0
This configuration happens on the directly connected interface (or downlink interface) to our
CE devices. PE1 is connecting to CE-H and PE2 is connecting to CE-S.
1. For the downlink interface we will configure it to be a sub-interface for each VLAN
that will be used for our client network. Therefore, in our case we will have three
sub-interfaces (Internal, Guest, Management).
2. We will enable 802.1Q under that sub-interface matching the VLAN tag that is used
on the client end.
3. We will configure our EoMPLS tunnel between the two PE routers using the loopback
interface IP for that router that is learned via OSPF. This is essentially building a
direct LDP tunnel between our two PE routers (because of the syntax "encapsulation
mpls").
4. In the "xconnect" configuration we will specify a unique ID or VC ID for the EOMPLS
tunnel created for each sub-interface. The VC ID we will use will match our the
VLAN ID, but it doesn't have to be. If we have another client and they are using
ROUTEHUB-PE1
interface FastEthernet0/0
no ip address
no shutdown
interface FastEthernet0/0.10
description S1 CEA VLAN 10
encapsulation dot1Q 10
xconnect 3.3.3.3 10 encapsulation mpls
interface FastEthernet0/0.100
description S1 CEA VLAN 100
encapsulation dot1Q 100
xconnect 3.3.3.3 100 encapsulation mpls
interface FastEthernet0/0.199
description S1 CEA VLAN 199
encapsulation dot1Q 199
xconnect 3.3.3.3 199 encapsulation mpls
ROUTEHUB-PE2
interface FastEthernet2/0
no ip address
no shutdown
interface FastEthernet2/0.10
description S2 CEA VLAN 10
encapsulation dot1Q 10
xconnect 2.2.2.2 10 encapsulation mpls
interface FastEthernet2/0.100
description S2 CEA VLAN 100
encapsulation dot1Q 100
xconnect 2.2.2.2 100 encapsulation mpls
interface FastEthernet2/0.199
description S2 CEA VLAN 199
encapsulation dot1Q 199
xconnect 2.2.2.2 199 encapsulation mpls
1. Configure the three VLANs for Internal Users, Guest users, and our Management
VLAN.
2. We will use VTP Transparent mode to prevent unauthorized VLAN additions or
changes on the network including specifying the name for our VTP domain (called
ROUTEHUB).
3. We will configure Layer 3 interfaces for our VLANs called SVI interfaces, which
allows our VLANs to be routable. The IP address configured on these SVI interfaces
will be the default gateway for our two computers at the remote site respectively to
access other network resources.
4. We will configure 802.1Q on our uplink interface to the MPLS network to carry the
VLAN tags for the three VLANs created on our network.
ROUTEHUB-CE-H
hostname ROUTEHUB-CE-H
ip routing
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
interface FastEthernet1/0/1
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 10,100,199
switchport nonegotiate
spanning-tree portfast trunk
no shutdown
interface Vlan 10
description RHG VLAN SVI INTERNAL
ip address 10.1.1.1 255.255.255.0
no shutdown
1. Configure the three VLANs for Internal Users, Guest users, and our Management
VLAN.
2. We will use VTP Transparent mode to prevent unauthorized VLAN additions or
changes on the network including specifying the name for our VTP domain (called
ROUTEHUB).
3. We will assign one port into the Internet User VLAN (VLAN 10) and another port into
the Guest User VLAN (VLAN100).
4. We will configure the interface for VLAN199 to allow us to manage the CE-S router
from the HQ site. It's default gateway would be the IP configured for the VLAN199
SVI interface on the CE-H router.
5. We will configure 802.1Q on our uplink interface to the MPLS network to carry the
VLAN tags for the three VLANs created on our network.
ROUTEHUB-CE-S
hostname ROUTEHUB-CE-S
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
interface FastEthernet0/1
description TO: RHG EOMPLS PE2
switchport trunk allowed vlan 10,100,199
switchport mode trunk
switchport nonegotiate
spanning-tree portfast trunk
no shutdown
interface FastEthernet0/2
description RHG INTERNAL USER PORT
switchport access vlan 10
interface FastEthernet0/3
description RHG GUEST USER PORT
switchport access vlan 100
switchport mode access
spanning-tree portfast
no shutdown
ip default-gateway 10.254.1.1
This command shows all LDP neighbors from our MPLS router. Since we configured
EoMPLS between our two PE routers a targeted (or direct) LDP session will be established
between the PEs.
This is important to ensure that this LDP neighbor is established and below we can see that
for both PE routers:
There are numerous "xconnect" show commands we can use to confirm if the EoMPLS
tunnels are up and running between two CE sites.
This command executed from PE1 shows that our L2VPN tunnel is up and running extending
our three VLANs across.
We can also view the specific L2VPN tunnels based on the sub-interface:
We can also view L2VPN tunnels based on the VC ID that was configured:
2.2.2.5.6 ping
The best way to confirm that the operations and traffic flow is working is to test from one of
our user computers.
From the Guest computer let's confirm if we can ping our default gateway (192.168.1.1).
C:\Users\Guest>ping 192.168.1.1
Great! So we know that the L2VPN is working correctly since we can ping the IP address
that is located at the CE-H site.
Next we can see if we can ping the other computer (Internal user) located at the same
remote site:
C:\Users\Guest>ping 10.1.1.10
Again we are successful, so we know that our routing operations is correct, but how do we
know if the traffic flow is correct.
Based on our configuration, traffic from our Guest computer should be routed through the
EoMPLS tunnel to CE-H on VLAN100. Then routing back to the CE-S, but through
VLAN100.
C:\Users\Guest>tracert 10.1.1.10
We now know that our EoMPLS operations and traffic flow is working correctly with our
configuration.
2.3.1 Concepts
Virtual Private LAN Service (VPLS) is a L2VPN technology that provides L2 multipoint
services over a L3 network running MPLS. VPLS is viewed as a very big virtual switch or
bridge network from the perspective of the client.
Using L2 services allows extending VLANs (broadcast domains), BPDU, and VTP messages
between sites. Clients can run different routing protocols or technologies such as IPv6, IPX,
OSPF and EIGRP managed by the client.
Targeted LDP:
Like EoMPLS, VPLS builds LDP tunnels between the PE routers used for exchanging VC
labels for the pseudo wires.
The VSI also prevents loops on the L2 network by using split horizon. It does this by doing
the following:
Each router in a VPLS sees itself as the root bridge of the network. The other PE
routers are seen as spokes in the point-to-multipoint Ethernet network.
VSI participates with flooding and forwarding of unknown MAC addresses to all ports very
much like a L2 switch.
H-VPLS
Using VPLS alone with multiple with PE routers requires a full mesh of PW terminated
between all PE routers. This creates heavy overhead and concerns for scalability and
management. This is a common issues with IBGP which require full-mesh peering,
therefore, its recommended to use a Route Reflector. Well with VPLS its recommended to
use a H-VPLS deployment.
In a H-VPLS solution, some of the VPLS roles are pushed down to another PE router (U-PE)
or Edge PE router. Leaving our Core PE router with full-mesh PWs with other Core PE
routers limiting the number of PW peers.
For the WAN, we will use Layer 2 over an existing Layer 3 network (using MPLS on the
Service Provider). To overlay layer 2 across the L3 network between multiple sites (more
than 2) our Provider will use VPLS to carry VLANs, BPDUs, and VTP messages between our
three client locations. Using EoMPLS will not work for our design since we are dealing with a
point-to-multipoint design and EoMPLS deals with L2 point-to-point tunnels.
Client A will extend three VLANs across the WAN. One will be for Internal Users (VLAN10,
on the 10.1.1.0 /24 subnet) and the other will be for Guest Users (VLAN100, 192.168.1.0 /24
subnet). We will also extend a third VLAN used for Network Management (VLAN199,
10.254.1.0 /24 subnet). This VLAN used between the three sites will be used for
management purposes device access via Telnet or SSH.
Our CE-H site will use a Cisco Catalyst 3750 L3-switch and our two CE-S sites will use a
Cisco Catalyst 2960 L2-switch. We will have one computer from each network (Internal User
VLAN and the Guest User VLAN) connected to each CE-S site as shown in the network
diagram. The computers default gateway will be the IP address that will be configured on
VLAN Layer 3 interface on our CE-H L3-switch.
Our Service Provider will implement VPLS using a VLAN-based deployment, meaning each
VLAN that will be used for Client A must be configured on each PE router, the VFI group
must be associated to each VLAN, and 802.1Q allowing the three VLANs must be
configured. This also creates some complexity if there are other clients who want to use
VLAN10. It would need to be some other VLAN ID tag.
Our MPLS routers (PE and P) will be Cisco 7600 Series Routers running 12.4 (Service
Provider feature set) to support the feature VPLS.
ROUTEHUB-P
hostname ROUTEHUB-P1
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface Loopback0
ip address 1.1.1.1 255.255.255.255
interface p3/1
ip address 10.1.2.1 255.255.255.0
mpls ip
no shutdown
interface p3/2
ip address 10.1.3.1 255.255.255.0
mpls ip
no shutdown
interface p3/3
ip address 10.1.4.1 255.255.255.0
mpls ip
no shutdown
router ospf 1
log-adjacency-changes
network 1.1.1.1 0.0.0.0 area 1
network 10.1.2.0 0.0.0.255 area 0
network 10.1.3.0 0.0.0.255 area 0
network 10.1.4.0 0.0.0.255 area 0
hostname ROUTEHUB-PE1
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface Loopback0
ip address 2.2.2.2 255.255.255.255
interface p3/1
ip address 10.1.2.2 255.255.255.0
mpls ip
no shutdown
router ospf 2
log-adjacency-changes
network 2.2.2.2 0.0.0.0 area 2
network 10.1.2.0 0.0.0.255 area 0
ROUTEHUB-PE2
hostname ROUTEHUB-PE2
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface Loopback0
ip address 3.3.3.3 255.255.255.255
interface p3/1
ip address 10.1.3.3 255.255.255.0
mpls ip
no shutdown
router ospf 3
log-adjacency-changes
network 3.3.3.3 0.0.0.0 area 3
network 10.1.3.0 0.0.0.255 area 0
ROUTEHUB-PE3
hostname ROUTEHUB-PE3
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface Loopback0
ip address 4.4.4.4 255.255.255.255
router ospf 4
log-adjacency-changes
network 4.4.4.4 0.0.0.0 area 4
network 10.1.4.0 0.0.0.255 area 0
Below is the configuration that is needed. As a recap from the network diagram PE1 is
connecting to CE-H, PE2 is connecting to CE-S1, and PE3 is connecting to CE-S2.
1. First we configure the VSI interface, which in IOS is represented as the VFI interface
followed by a unique name to identify this group as CLIENTA because there will be
other clients added to the VPLS network in the future.
ROUTEHUB-PE1
2. Second we will specify a unique VC ID or VPN ID that would be used among all PE
routers connected to a CE device for CLIENTA. Treat the VPN ID very much like a
VLAN ID. This would essentially build the pseudo-wires for each VLAN through an
LSP.
3. Next we will configure direct LDP tunnel between our PE routers that will carry
pseudo-wire (PW) for each VLAN:
vlan 10
name CEA-RHG-VLAN10
5. Next we will associate the configured VFI to the VLAN SVI interface and activate it
under the VLAN ID itself for each user VLAN.
interface Vlan10
xconnect vfi VPLS-CLIENTA
vlan 10
state active
6. For the downlink interface connected to the CE device, we will enabled the interface
for 802.1Q and specify what VLANs are allowed.
interface FastEthernet4/1
switchport
switchport mode trunk
switchport trunk encapsulation dot1q
switchport allowed vlan 10,100,199
no shutdown
ROUTEHUB-PE1
vlan 10
name CEA-RHG-VLAN10
vlan 100
name CEA-RHG-VLAN100
vlan 199
name CEA-RHG-VLAN199
interface Vlan10
xconnect vfi VPLS-CLIENTA
vlan 10
state active
vlan 100
state active
interface Vlan199
xconnect vfi VPLS-CLIENTA
vlan 199
state active
interface FastEthernet4/1
switchport
switchport mode trunk
switchport trunk encapsulation dot1q
switchport allowed vlan 10,100,199
no shutdown
ROUTEHUB-PE2
vlan 10
name CEA-RHG-VLAN10
vlan 100
name CEA-RHG-VLAN100
vlan 199
name CEA-RHG-VLAN199
interface Vlan10
xconnect vfi VPLS-CLIENTA
vlan 10
state active
interface Vlan100
xconnect vfi VPLS-CLIENTA
vlan 100
state active
interface Vlan199
xconnect vfi VPLS-CLIENTA
vlan 199
state active
interface FastEthernet4/1
switchport
switchport mode trunk
ROUTEHUB-PE3
vlan 10
name CEA-RHG-VLAN10
vlan 100
name CEA-RHG-VLAN100
vlan 199
name CEA-RHG-VLAN199
interface Vlan10
xconnect vfi VPLS-CLIENTA
vlan 10
state active
interface Vlan100
xconnect vfi VPLS-CLIENTA
vlan 100
state active
interface Vlan199
xconnect vfi VPLS-CLIENTA
vlan 199
state active
interface FastEthernet4/1
switchport
switchport mode trunk
switchport trunk encapsulation dot1q
switchport allowed vlan 10,100,199
no shutdown
1. Configure the three VLANs for Internal Users, Guest users, and our Management
VLAN.
ROUTEHUB-CE-H
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
3. We will configure Layer 3 interfaces for our VLANs called SVI interfaces, which
allows our VLANs to be routable. The IP address configured on these SVI interfaces
will be the default gateway for our computers at the remote site respectively to
access other network resources including the L2 switches.
interface Vlan 10
description RHG VLAN SVI INTERNAL
ip address 10.1.1.1 255.255.255.0
no shutdown
interface FastEthernet1/0/1
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 10,100,199
switchport nonegotiate
spanning-tree portfast trunk
no shutdown
ROUTEHUB-CE-H
hostname ROUTEHUB-CE-H
ip routing
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
interface FastEthernet1/0/1
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 10,100,199
switchport nonegotiate
spanning-tree portfast trunk
no shutdown
interface Vlan 10
description RHG VLAN SVI INTERNAL
ip address 10.1.1.1 255.255.255.0
no shutdown
1. Configure the three VLANs for Internal Users, Guest users, and our Management
VLAN.
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
3. We will assign one port for the Internal User VLAN (VLAN 10) and another port for
the Guest User VLAN (VLAN100).
interface FastEthernet0/2
description RHG INTERNAL USER PORT
switchport access vlan 10
switchport mode access
spanning-tree portfast
no shutdown
interface FastEthernet0/3
description RHG GUEST USER PORT
switchport access vlan 100
switchport mode access
spanning-tree portfast
no shutdown
ip default-gateway 10.254.1.1
5. We will configure 802.1Q on our uplink interface to the MPLS network to carry the
VLAN tags for the three VLANs created on our network.
interface FastEthernet0/1
description TO: RHG EOMPLS PE2
switchport trunk allowed vlan 10,100,199
switchport mode trunk
switchport nonegotiate
spanning-tree portfast trunk
no shutdown
ROUTEHUB-CE-S1
hostname ROUTEHUB-CE-S1
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
interface FastEthernet0/1
description TO: RHG EOMPLS PE2
switchport trunk allowed vlan 10,100,199
switchport mode trunk
interface FastEthernet0/2
description RHG INTERNAL USER PORT
switchport access vlan 10
switchport mode access
spanning-tree portfast
no shutdown
interface FastEthernet0/3
description RHG GUEST USER PORT
switchport access vlan 100
switchport mode access
spanning-tree portfast
no shutdown
ip default-gateway 10.254.1.1
ROUTEHUB-CE-S2
hostname ROUTEHUB-CE-S2
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
interface FastEthernet0/1
description TO: RHG EOMPLS PE3
switchport trunk allowed vlan 10,100,199
switchport mode trunk
switchport nonegotiate
spanning-tree portfast trunk
no shutdown
interface FastEthernet0/2
description RHG INTERNAL USER PORT
switchport access vlan 10
interface FastEthernet0/3
description RHG GUEST USER PORT
switchport access vlan 100
switchport mode access
spanning-tree portfast
no shutdown
ip default-gateway 10.254.1.1
We can view L2VPN VPLS tunnels that was configured on our network:
For the WAN, we will use Layer 2 over an existing Layer 3 network (using MPLS on the
Service Provider). To overlay layer 2 across the L3 network between multiple sites (more
than 2) our Provider will use VPLS to carry VLANs, BPDUs, and VTP messages between our
three client locations. Using EoMPLS will not work for our design since we are dealing with a
point-to-multipoint design and EoMPLS deals with L2 point-to-point tunnels.
Client A will extend three VLANs across the WAN. One will be for Internal Users (VLAN10,
on the 10.1.1.0 /24 subnet) and the other will be for Guest Users (VLAN100, 192.168.1.0 /24
subnet). We will also extend a third VLAN used for Network Management (VLAN199,
10.254.1.0 /24 subnet). This VLAN used between the three sites will be used for
management and for device access using Telnet or SSH.
Our CE-H site will use a Cisco Catalyst 3750 L3-switch and our two CE-S sites will use a
Cisco Catalyst 2960 L2-switch. We will have one computer from each network (Internal User
VLAN and the Guest User VLAN) connected at each CE-S site as shown in the network
diagram. The computers default gateway will be the IP address that will be configured on the
VLAN Layer 3 interface on our CE-H L3-switch.
Our Service Provider will implement VPLS using a Port-based or QinQ deployment, meaning
all VLANs used for Client A will be tunneled inside a dedicated 802.1Q tunnel using a
unique VLAN for that client. On each PE router we still need to configure the VFI group that
will be associated to that unique VLAN, VLAN900 This avoids the complexity where clients
can continue to use their unique VLANs through the Service Provider network.
Our MPLS routers (PE and P) will be Cisco 7600 Series Routers running 12.4 (Service
Provider feature set) to support the feature VPLS).
ROUTEHUB-P
hostname ROUTEHUB-P1
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface Loopback0
ip address 1.1.1.1 255.255.255.255
interface p3/1
ip address 10.1.2.1 255.255.255.0
mpls ip
no shutdown
interface p3/2
ip address 10.1.3.1 255.255.255.0
mpls ip
no shutdown
interface p3/3
ip address 10.1.4.1 255.255.255.0
mpls ip
no shutdown
router ospf 1
log-adjacency-changes
network 1.1.1.1 0.0.0.0 area 1
network 10.1.2.0 0.0.0.255 area 0
network 10.1.3.0 0.0.0.255 area 0
network 10.1.4.0 0.0.0.255 area 0
ROUTEHUB-PE1
hostname ROUTEHUB-PE1
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface p3/1
ip address 10.1.2.2 255.255.255.0
mpls ip
no shutdown
router ospf 2
log-adjacency-changes
network 2.2.2.2 0.0.0.0 area 2
network 10.1.2.0 0.0.0.255 area 0
ROUTEHUB-PE2
hostname ROUTEHUB-PE2
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface Loopback0
ip address 3.3.3.3 255.255.255.255
interface p3/1
ip address 10.1.3.3 255.255.255.0
mpls ip
no shutdown
router ospf 3
log-adjacency-changes
network 3.3.3.3 0.0.0.0 area 3
network 10.1.3.0 0.0.0.255 area 0
ROUTEHUB-PE3
hostname ROUTEHUB-PE3
ip cef
mpls ip
mpls label protocol ldp
mpls ldp router-id Loopback0 force
interface Loopback0
ip address 4.4.4.4 255.255.255.255
interface p3/1
ip address 10.1.4.4 255.255.255.0
mpls ip
no shutdown
router ospf 4
log-adjacency-changes
network 4.4.4.4 0.0.0.0 area 4
network 10.1.4.0 0.0.0.255 area 0
Below is the configuration that is needed. As a recap from the network diagram PE1 is
connecting to CE-H, PE2 is connecting to CE-S1, and PE3 is connecting to CE-S2.
1. First we configure the VSI interface, which in IOS is represented as the VFI interface
followed by a unique name to identify this group as CLIENTA because there will be
other clients added to the VPLS network in the future.
ROUTEHUB-PE1
2. Second we will specify a unique VC ID or VPN ID that would be used among all PE
routers connected to a CE device for CLIENTA. Treat the VPN ID very much like a
VLAN ID. This would essentially build the pseudo-wires for each VLAN through an
LSP.
3. Next we will configure direct LDP tunnel between our PE routers that will carry
pseudo-wire (PW) for each VLAN:
4. Next we will associate the configured VFI to the VLAN SVI interface and activate it
under the VLAN ID itself for each user VLAN.
interface Vlan900
xconnect vfi VPLS-CLIENTA
vlan 900
state active
5. Enabled 802.1Q tunnel (QinQ) where all VLANs from Client A (assigned to
VLAN900) through the VPLS. This is configured on the directly connected interface
to one of the CE devices for Client A.
interface FastEthernet4/1
switchport
ROUTEHUB-PE1
vlan 900
state active
interface Vlan900
xconnect vfi VPLS-CLIENTA
interface FastEthernet4/1
switchport
switchport mode dot1qtunnel
switchport access vlan 900
l2protocol-tunnel-stp
no shutdown
ROUTEHUB-PE2
vlan 900
state active
interface Vlan900
xconnect vfi VPLS-CLIENTA
interface FastEthernet4/1
switchport
switchport mode dot1qtunnel
switchport access vlan 900
l2protocol-tunnel-stp
no shutdown
ROUTEHUB-PE3
interface Vlan900
xconnect vfi VPLS-CLIENTA
interface FastEthernet4/1
switchport
switchport mode dot1qtunnel
switchport access vlan 900
l2protocol-tunnel-stp
no shutdown
1. Configure the three VLANs for Internal Users, Guest users, and our Management
VLAN.
ROUTEHUB-CE-H
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
3. We will configure Layer 3 interfaces for our VLANs called SVI interfaces, which
allows our VLANs to be routable. The IP address configured on these SVI interfaces
will be the default gateway for our computers at the remote site respectively to
access other network resources including the L2 switches.
interface Vlan 10
description RHG VLAN SVI INTERNAL
4. We will configure 802.1Q on our uplink interface to the MPLS network to carry the
VLAN tags for the three VLANs created on our network.
interface FastEthernet1/0/1
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 10,100,199
switchport nonegotiate
spanning-tree portfast trunk
no shutdown
ROUTEHUB-CE-H
hostname ROUTEHUB-CE-H
ip routing
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
interface FastEthernet1/0/1
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 10,100,199
interface Vlan 10
description RHG VLAN SVI INTERNAL
ip address 10.1.1.1 255.255.255.0
no shutdown
1. Configure the three VLANs for Internal Users, Guest users, and our Management
VLAN.
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
3. We will assign one port for the Internal User VLAN (VLAN 10) and another port for
the Guest User VLAN (VLAN100).
interface FastEthernet0/2
description RHG INTERNAL USER PORT
switchport access vlan 10
switchport mode access
spanning-tree portfast
interface FastEthernet0/3
description RHG GUEST USER PORT
switchport access vlan 100
switchport mode access
spanning-tree portfast
no shutdown
4. We will configure the interface for VLAN199 to allow us to manage the two remote L2
switches from the HQ site. It's default gateway would be the IP configured for the
VLAN199 SVI interface on the CE-H router.
ip default-gateway 10.254.1.1
5. We will configure 802.1Q on our uplink interface to the MPLS network to carry the
VLAN tags for the three VLANs created on our network.
interface FastEthernet0/1
description TO: RHG EOMPLS PE2
switchport trunk allowed vlan 10,100,199
switchport mode trunk
switchport nonegotiate
spanning-tree portfast trunk
no shutdown
ROUTEHUB-CE-S1
hostname ROUTEHUB-CE-S1
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
interface FastEthernet0/1
description TO: RHG EOMPLS PE2
switchport trunk allowed vlan 10,100,199
switchport mode trunk
switchport nonegotiate
spanning-tree portfast trunk
no shutdown
interface FastEthernet0/2
description RHG INTERNAL USER PORT
switchport access vlan 10
switchport mode access
spanning-tree portfast
no shutdown
interface FastEthernet0/3
description RHG GUEST USER PORT
switchport access vlan 100
switchport mode access
spanning-tree portfast
no shutdown
ip default-gateway 10.254.1.1
ROUTEHUB-CE-S2
hostname ROUTEHUB-CE-S2
vlan 10
name RHG-CEA-INTERNAL
vlan 100
name RHG-CEA-GUEST
vlan 199
name RHG-CEA-MGMT
interface FastEthernet0/1
description TO: RHG EOMPLS PE3
switchport trunk allowed vlan 10,100,199
interface FastEthernet0/2
description RHG INTERNAL USER PORT
switchport access vlan 10
switchport mode access
spanning-tree portfast
no shutdown
interface FastEthernet0/3
description RHG GUEST USER PORT
switchport access vlan 100
switchport mode access
spanning-tree portfast
no shutdown
ip default-gateway 10.254.1.1
We can view L2VPN VPLS tunnels that was configured on our network:
Identifying the root cause and resolving it are two separate things. Fixing a problem will
usually involve one or more of the following
A reboot may do it or a software upgrade may be needed where a bug has emerged and/or a
hardware replacement may be needed, though is very rare.
4.1 L2TPv3
ROUTEHUB-P
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTEHUB-P
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
memory-size iomem 5
!
!
ip cef
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
archive
log config
hidekeys
!
!
!
!
!
!
!
!
interface Loopback0
ip address 1.1.1.1 255.255.255.255
!
interface FastEthernet0/0
ip address 10.1.2.1 255.255.255.0
ROUTEHUB-PE1
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTEHUB-PE1
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
memory-size iomem 5
!
!
ip cef
!
!
!
l2tp-class manual
cookie size 4
!
ROUTEHUB-PE2
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTEHUB-PE2
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
memory-size iomem 5
!
!
ip cef
!
!
!
l2tp-class manual
cookie size 4
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
archive
log config
hidekeys
!
!
!
!
pseudowire-class manual
encapsulation l2tpv3
protocol none
ip local interface Loopback0
!
!
!
!
ROUTEHUB-CE1
!
version 12.1
no service single-slot-reload-enable
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname ROUTEHUB-CE1
!
!
!
!
!
ROUTEHUB-CE2
!
version 12.1
no service single-slot-reload-enable
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname ROUTEHUB-CE2
!
!
!
!
!
!
memory-size iomem 15
ip subnet-zero
!
ip audit notify log
ip audit po max-events 100
!
ROUTEHUB-P
!
upgrade fpd auto
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTEHUB-P1
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
!
no aaa new-model
ip source-route
ip cef
!
!
!
!
no ipv6 cef
multilink bundle-name authenticated
mpls label protocol ldp
!
!
voice dsp waitstate 0
!
!
!
!
!
!
!
!
!
!
!
!
!
memory-size iomem 0
archive
log config
hidekeys
!
!
!
!
ROUTEHUB-PE1
!
upgrade fpd auto
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTEHUB-PE1
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
!
no aaa new-model
ip source-route
ip cef
!
!
!
!
no ipv6 cef
multilink bundle-name authenticated
mpls label protocol ldp
!
!
voice dsp waitstate 0
!
!
!
!
!
!
!
!
!
!
!
!
ROUTEHUB-PE2
!
upgrade fpd auto
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTEHUB-PE2
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
!
no aaa new-model
ip source-route