Professional Documents
Culture Documents
Document History
Edition
Date
Author
Remarks
01
YYYY-MM-DD
First edition
Page
1 Seamless MPLS Overview
1.1 Why Seamless MPLS?
1.2 Decouple Transport Layer from Services
1.3 Inter-Region Transport Layer for Seamless MPLS
1.4 Creating an end-to-end Transport Layer using Seamless MPLS
1.5 Implementing Services with Seamless MPLS
1.6 Extending IP/MPLS to the access node with LDP DoD
1.7 Extending IP/MPLS to the access node with LDP FEC to BGP Stitching
1.8 LDP DoD and LDP FEC to BGP Stitching
14
3 Configuration
3.1 Seamless-MPLS Enabling Technologies
3.2 Set Up Requirements
3.3 OSPF Configuration
3.4 Verify OSPF Configuration
3.5 LDP Configuration
3.6 Verify LDP Configuration
3.7 Verify LDP FRR Configuration
3.8 RSVP and LSP Configuration
3.9 Verify LSP Configuration
3.10 RSVP FRR Configuration
3.11 Verify RSVP FRR Configuration
3.12 Core Policy Configuration
3.13 Verify Policy Configuration
3.14 Core BGP Configuration
3.15 BGP Configuration with RSVP
3.16 Verify BGP Configuration
3.17 Verify BGP Configuration with LDP in the Core
3.18 Verify BGP Configuration with RSVP in the Core
3.19 Verify Tunnel Configuration
3.20 Metro Policy and BGP Configuration
3.21 SDP Configuration
3.22 Verify SDP and Targeted LDP Configuration
3.23 Epipe Configuration
3.24 Verify Epipe Configuration
3.25 Epipe PW Redundancy Configuration
3.26 Verify Epipe Configuration
24
59
The figure above depicts a multi-region network with two metro regions (Metro 1 and Metro 2)
interconnected by a Core region. Typically, each region is operated independently. Depending on the
service deployed, the service end-points may be within the same metro region or across different
regions. Deploying a service from one metro region to another requires provisioning at several
intermediate points in the end-to-end network, making troubleshooting and fault recovery more complex.
For instance, deploying a Layer 2 point-to-point service from one metro region to another may require
provisioning of multiple segments within the metro-core regions, with appropriate mappings at the
region boundaries. A preferred approach would be to deploy a single end-to-end service with minimal
coordination between regions.
Additionally, service providers are constantly challenged by the evolving needs of their services mix:
Fixed-Mobile Convergence (FMC) and evolution to LTE
Integrated business services (Internet, VPNs)
Cloud services: seamless access to the datacenter
Based on a set of fairly common assumptions, the Seamless MPLS draft (draft-ietf-mpls- seamless-mpls)
is one of the architecture options available to extend MPLS networks to integrate metro and core
regions into a single MPLS domain. It provides a robust frame- work which enables service providers to
deploy scalable and flexible end-to-end services.
Seamless MPLS offers the following key attributes:
Scalability and resiliency (recognizing some nodes have limited capabilities): Access nodes can scale
in number up to the thousands and are typically optimized for simplicity and lower cost. Seamless
MPLS helps scale the end-to-end network to more than 100,000 MPLS devices, recognizing that some
nodes (e.g., access) have limited capabilities.
As shown in the figure above, a Seamless MPLS network consists of multiple regions: Metro1,
Core and Metro 2. With other end-to-end MPLS options (e.g., end-to-end Label Distribution Protocol
(LDP) in a flat network) Interior Gateway Protocol (IGP) or MPLS signaling information is not
contained within the region and is exchanged across regions. This increases the size of
routing/forwarding tables as well as the MPLS state within individual routers. The Seamless MPLS
model addresses this challenge by introducing a hierarchy of transport and service layers. The
Seamless MPLS transport layer consists of an inter-region tunnel and an intra-region tunnel.
Inter-region border gateway protocol (BGP) transport tunnel
The inter-region transport tunnel must minimize scaling constraints on routing nodes within the
end-to-end network. This requires controlling how reachability information is propagated across
region boundaries. Each region communicates using end-to-end transport tunnels set up by RFC
3107 (carrying label information in BGP). BGP was built to handle boundary control and is
therefore the best choice to create the inter-region transport tunnel.
RFC 3107 (carrying label information in BGP) specifies how the label mapping information for a
particular route is piggybacked in the same BGP update message used to distribute the route itself.
When BGP is used to distribute a particular route, it can also be used to distribute an MPLS label
mapped to that route, as part of Network Layer Reachability Information(NLRI) in the multiprotocol
extensions attributes :
NLRI is encoded as one or more triples of the form <length, label, prefix>
A region may represent an Open Shortest Path First (OSPF) area, Intermediate System to
Intermediate System (IS-IS) level, OSPF/IS-IS instance, or even an autonomous system (AS). The
Area Border Router (ABR) nodes act as Route Reflectors (RRs) for the region and act as a RR client
to the core RRs (P1). The network represents an inter- area scenario and hence uses iBGP between
RRs and RR clients. Provider Edge (PE) loopbacks and label bindings are advertised by Labeled
BGP.
Copyright 2014 Alcatel-Lucent. All Rights Reserved.
TER36075_V3.1-AX-English-Ed1 Module 1.1 Edition 1
Appendix 1 Module 1 Page 8
As described earlier, the initial configuration creates the inter-region tunnels between PE nodes and
intra-region tunnels between BGP peers. This forms the transport layer of the hierarchy. Once the
transport layer is created, services can be provisioned end-to-end.
The figure above shows two service examples,
1. A Layer 2 Virtual Private LAN Service (VPLS) between PE-11 and PE-21. This may be a business
service offered across metro 1 and metro 2. The service label for the VPLS is created using
targeted LDP (tLDP) between PE-11 and PE-21.
2. A Layer 3 IP-VPN service between PE-12 and PE-S. This may be a cell site to mobile gateway
connection. The service label for the IP-VPN service is created using multiprotocol BGP (MPBGP) for IP-VPN between PE-12 and PE-S.
Decoupling transport and services layers within the Seamless MPLS framework allows services to
be provisioned wherever they are needed, independent of the underlying transport layer. Further,
services can be established between any two endpoints, without per-service configuration in
intermediate nodes.
config>router>ldp>peer-parameters>peer>dod-label-distribution
When this option is enabled, LDP will set the A-bit in the Label Initialization message when the
LDP session to the peer is established. When both peers set the A-bit, they will both use the DoD
label distribution method over the LDP session.
As shown in the figure above, Seamless MPLS provides end-to-end resiliency at the transport and
service layers. The framework supports Pseudowire (PW) redundancy at the service layer. The
transport layer supports protection of the inter-region transport tunnel (BGP tunnel), as well as the
intra-region (LDP or RSVP tunnel) transport tunnel. During failures, this ensures local fast
protection (i.e., LDP FRR, RSVP FRR or BGP FRR) is initiated while end-to-end protocol convergence
occurs, which eventually results in a new set of BGP transport tunnels being created end-to-end.
The SR-OS supports the endpoint concept, which allows the provisioning of objects through which the
service moves traffic. Two endpoints can be configured in a VLL service instance on each router. On this
slide, the endpoints are called x and y, but they can have any name (of maximum 32 characters).
You can provision two types of endpoint objects in the SR-OS:
SAP objects (can be implicit)
Spoke SDP objects (explicit)
An endpoint facing the access side can contain maximum one SAP object and one ICB Spoke SDP object
(the SAP needs to be part of a LAG if the ICB is already present).
An endpoint facing the network side can contain maximum 4 Spoke SDP objects, any combination of the
following:
primary Spoke SDP (maximum 1 per endpoint, set to revertive, precedence set to 0 or primary)
secondary Spoke SDP (maximum 4 per endpoint, not revertive, precedence non-zero)
ICB (inter-chassis backup) Spoke SDP (maximum 1 per endpoint)
Traffic can be forwarded only between two endpoints. Objects that are associated with the same
endpoint cannot forward traffic to each other. The VLL service forms a path following the LAGs that are
active and the endpoint components.
1.
Primary Spoke-SDP: The VLL service always uses this PW and only switches to a secondary PW
when it is down
The PW service switches the path to the primary PW when it is back up. User configurable timer
for reverting back to the primary or to never revert is available
2.
Secondary spoke-SDP: There can be a maximum of three secondary spoke-SDPs per endpoint in
addition to the Primary Spoke-SDP. The user can configure the precedence of a secondary PW to
indicate the order in which a secondary PW is made active upon a failure
Each upstream node sets up a backup LSP that avoids only the immediate downstream node (
by default node protection is enabled)
The Point of Local Repair (PLR) looks for the backup path which merges back to the protected
LSP sooner
The backup LSP may take one or more hops merging back to the main LSP or it may only merge
at the eLER
If it is not possible to set up a backup LSP that avoids the immediate downstream node, a
backup can be set up to the downstream node on a different interface
In case of failure, traffic is immediately rerouted by the PLR onto the pre-computed backup LSP,
minimizing packet-loss.
When the upstream node (iLER) is informed by the PLR that a downstream router is using its
backup LSP, the iLER switches traffic to a standby path if one was set up for the LSP.
A locally repaired LSP (i.e., using the backup path) will try to globally revert back when the retry
timer expires.
The diagram above depicts a facility backup (see next slide for what a facility backup is).
RSVP FRR can be accomplished using two methods, both of which can be used to protect links and
nodes during network failure:
1.
The one-to-one backup method, which creates detour LSPs for each protected LSP at each
potential point of local repair.
2.
The facility backup method creates a bypass tunnel to protect a potential failure point; by
taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have
similar backup constraints
Seamless MPLS can be implemented with different designs, but it requires the basic set up shown in
the slide above. For example, IGPs in the core and metro areas can be configured with different
combinations such as:
using OSFP with area 0 (backbone area) in the core and area 1 and area 2 in the metro areas
using IS-IS with instance 0 and level 2 in the core and level 1 in the metro areas
using IS-IS with different instance in the core and metro areas
using OSPF in the core and IS-IS in the metro areas or vice versa
LDP or RSVP is used for intra-area label distribution. The core and metro areas can be implemented
with either all LDP or all RSVP or a combination of LDP in one area and RSVP in a different area.
L- BGP is labeled BGP (RFC 3107) for inter-area label distribution.
Note that the word RSVP follows the word tunneled to show that RSVP-TE is the intra-region tunnel.
BGP FRR or PIC is a resiliency feature that will speed up convergence. It operates by having a backup route
installed and ready to be used in cases of failure. As visible in the image above, this feature can be used for
resiliency both at the core and edge, as long as there are redundant routes/paths available. These redundant
routes/paths need to have a different next hop than the best path available. In order to determine the selection
process for best path, please continue on to the next slide.
It is important to review the BGP route selection process in order to aid troubleshooting/deployment of this
service. BGP will select and use the best route, while not using the more inferior routes based on the selection
process above. The backup route will be the second best route that does not use the same next-hop as the
primary path.
Looking at the legend from the command show router bgp routes X.X.X.X, we can see:
- First route is the best and used.
- Second route is the backup (not used unless primary path fails).
- Third route is not used.
From the command available, can you tell the criteria that BGP used to select the best and backup path?
Unfortunately, there is not enough detail, and a more detailed command might be needed.
It is important to understand the output of valuable commands, in this case, show router bgp routes X.X.X.X
detail.
Observations:
- We can see that the best route chosen has a lower peer router identifier.
- The backup path, indicated by the flags, has the next lowest peer router identifier AND a different next-hop
In case you are not familiar with ECMP (Equal-Cost Multi-Path), it is a feature that allows, as the name suggests,
to load share among multiple paths as long as their cost is the same. The functionality of ECMP, can be carried
over into BGP, when multipath is enabled. In this case, the MED will represent our metrics (as our MED represents
the igp metrics), and we can see that the first two routes have an equal cost of 1000. Traffic will be load
balanced between the first two routes, as they are the best or primary paths. Now, per the selection process, the
third route is the backup path as it is the next best to the primary paths.
: [0..16]
A:SR-7750>config>router>bgp# multipath
- multipath <max-paths>
- no multipath
<max-paths>
: [1..16]
Copyright 2014 Alcatel-Lucent. All Rights Reserved.
TER36075_V3.1-AX-English-Ed1 Module 1.1 Edition 1
Appendix 1 Module 1 Page 65
When will the backup path be used? As stated before, the backup path will be used when the primary path fails.
Now do we know under what conditions the primary path will be considered as failed? This slide gives us most
scenarios in which the primary path will be considered as failed.
1.
If the BGP session is terminated, routes received from that peer will be cleared. BFD may be used to improve
failure detection on BGP peers, as well as peer-tracking BGP feature.
2.
If the next-hop cannot be resolved, the primary path is considered as failed, and the backup will be used.
PE1 will receive the routes from PE6 advertised by both PE2 and PE3. As we discussed earlier, BGP will select one
path as primary, and also the second best path as backup. The primary path will be utilized as long as there are
no failure conditions. In case of any detected fault, the backup path will be chosen as best path until the primary
path is recovered. Once the primary path is recovered, traffic will again be redirected through it.
If multiple paths are being used as best, through ECMP and BGP Multipath, traffic will be load balanced between
the primary paths. Now, if one of the primary paths fails, the backup path will not be used. In order for a backup
path to be used for this particular scenario, all primary/best paths should be down. Needless to say, the backup
path will not load balance with the primary paths that are still functional.
A simple CLI command is used to enable this feature. Remember that the backup path will only come active if,
there are multiple paths for the same prefix and one of these paths should have a different next-hop than the
one used for the primary.
There are no restrictions for the command backup-path ipv4 to be used. Although, in order for a path to be
selected as backup, points 1 and 2 will be a major factor. The third option is simply to improve fault detection of
the BGP session. When the BGP session is brought down, all the routes associated with that session will also be
removed. PE1 will receive routes from AS64400 from both PE2 and PE3, therefore point 1 is met. Also, PE1 has
two next-hops for this route (PE1 and PE2). Meeting the requirements of point 1 and 2, indicate that PE1 will
have a primary and backup path for these prefixes.
By enabling the CLI command, enable-bgp-vpn-backup, the BGP routes learned via bgp-vpn, will be taken into
consideration for the selection process for the backup route. The next slide will explain in more detail how these
two features interact in a L3VPN environment.
Through a L3VPN, routes are learned either through the PE-CE eBGP session or through bgp-vpn routes from other
PEs participating in the same VRF. Backup-path ipv4 as in previous examples, will add resiliency for ipv4 and ipv6
routes which in this case are learned from the PE-CE peering. In some cases, a PE may receive the same prefix
from different sources (ie. redundant Route Reflectors), but BGP FRR feature will not be included for bgp-vpn
routes unless enable-bgp-vpn-backup is used.
In RFC 3107, BGP carry labels associated with each route. Backup-path will also provided resiliency for these
labeled routes.
Different solutions make use of this technology, BGP 3107. It is not necessary to know all the solutions listed in
the slide above, just know that it is an essential component.
This scenario is similar to the first one where ipv4 or ipv6 BGP routes are being protected. The exception is that
backup-path has also been extended to protected labeled ipv4/ipv6 routes which are needed for Model C L3VPN
environments.
The slide above simply shows the output of a bgp command where labels are assigned to a prefix. An in depth
analysis of BGP-3107 is not contained within this module, as focus is BGP FRR resiliency feature
Document History
Edition
Date
Author
Remarks
01
YYYY-MM-DD
First edition
Page
1 Interface Setup
1.1 Seamless MPLS Lab Infrastructure
1.2 Configure Network Interfaces
10
14
21
26
Objective:
Create and verify the configuration of the metro and core regions in building a Seamless MPLS solution.
Lab Exercises:
In order to build a seamless MPLS across metro and core regions, the following tasks are required:
BGP infrastructure
Seamless MPLS
Using the commands and physical diagram provided on the next slides, students will verify configuration and thus
become familiar with the general lab layout and functionality.
Objective: Configure and verify the system name and network interfaces for each of the devices in the network
as assigned by the instructor.
Configure System Name and Network Interfaces
Using the commands below and the tables on the next slide, configure and verify the system name and network
interface for each node according to the diagram above. For example on Core 1, this is the configuration:
configure system name P1(CORE1)
configure router interface system address 10.10.10.1/32
configure router interface toCORE4 address 10.1.14.1/28
configure router interface toCORE4 port 1/1/1
configure router interface toCORE2 address 10.1.12.1/28
configure router interface toCORE2 port 1/1/2
configure router interface toCORE3 address 10.1.13.1/28
configure router interface toCORE3 port 1/1/3
configure router interface toEdge1 address 10.1.15.1/28
configure router interface toEdge1 port 1/1/5
Note: if port 1/1/5 is a dot1q encapsulated port, assign a VLAN ID that is not in use. For example, port
1/1/5:11.
System
name
Interfaces
to other
nodes
Core 1
Core 2
Core 3
Core 4
Edge 1
Edge 2
Edge 3
Edge 4
P1(CORE1)
P2(CORE2)
P3(CORE3)
P4(CORE4)
PE1(EDGE1)
PE2(EDGE2)
PE3(EDGE3)
PE4(EDGE4)
toCORE2
toCORE1
toCORE1
toCORE1
toCORE1
toCORE2
toCORE3
toCORE4
toCORE3
toCORE3
toCORE2
toCORE2
toEdge2
toEdge1
toEdge4
toEdge3
toCORE4
toCORE4
toCORE4
toCORE3
toEdge1
toEdge2
toEdge3
toEdge4
LoopBack
address
55.55.55.55
/32
LoopBack
address
66.66.66.66/
32
LoopBack
address
77.77.77.77
/32
LoopBack
address
88.88.88.88
/32
Loopback
interface
and
address
Objective: Configure and verify IGP and MPLS protocol for each of the devices in the network as assigned by the
instructor.
Configure OSPFv2
Using the following commands, configure OSPF with multiple areas for each node according to the diagram above
and the table below. For example on Core 1, this is the configuration:
configure
configure
configure
configure
router
router
router
router
ospf
ospf
ospf
ospf
OSPF
Area and
Interface
Core 1
Core 2
Core 3
Core 4
Edge 1
Edge 2
Edge 3
Edge 4
Area 0:
toCORE2
toCORE3
toCORE4
Area 0:
toCORE1
toCORE3
toCORE4
Area 0:
toCORE1
toCORE2
toCORE4
Area 0:
toCORE1
toCORE2
toCORE3
Area 2:
toCORE1
toEdge2
Area 2:
toCORE2
toEdge1
Area 1:
toCORE3
toEdge4
Area 1:
toCORE4
toEdge3
Area 2:
toEdge1
Area 2:
toEdge2
Area 1:
toEdge3
Area 1:
toEdge4
LDP Verification
show router ldp bindings
show router ldp bindings active
show router ldp discovery
show router ldp interface
show router ldp parameters
show router ldp peer
show router ldp session
show router ldp status
show router route-table
show router route-table alternative
not, verify the protocol configuration to identify the problem. Make the appropriate corrections and reaffirm
that the interfaces are operational.
2. How many LDP sessions are on a core router? How many are on an edge router?
3. How many routes are found in the routing table of the core and edge routers?
at the results of the show router route-table and show router route-table alternative commands)
Objective: Configure and verify a routing policy for each of the devices in the network as assigned by the
instructor.
Configure Policy On Core Routers
Using the following commands, create a policy on the core routers (which are the ABRs in this set up) to
redistribute the edge routers system and loopback address as well as set the next-hop self. A prefix list is first
created for the edge routers system and loopback addresses and then used in the policy to redistribute into BGP.
These addresses will be used later for service creation. A second prefix list is created for the remote ABR system
addresses which will be used for route redistribution.
Core 1 and 2
Core 3 and 4
configure router policy-options prefix-list "PE_Sys_loop_Out" configure router policy-options prefix-list "PE_Sys_loop_Out"
prefix 10.10.10.5/32 exact
prefix 10.10.10.7/32 exact
prefix 10.10.10.6/32 exact
exit
exit
exit
exit
Copyright 2014 Alcatel-Lucent. All Rights Reserved.
TER36075_V3.1-AX-English-Ed1 Module 1.2 Edition 1
Appendix 1 Module 2 Page 15
Redistribute the loopback and system addresses of the Edge routers into BGP setting next hop to the ABR on all the
core routers. Configure the following on all the core routers:
configure router policy-options policy-statement "expNHS"
entry 10
from
prefix-list "PE_Sys_loop_Out"
family ipv4
exit
to
protocol bgp
exit
action accept
next-hop-self
exit
exit
exit
The following is to allow BGP routes from the remote ABR into the IGP. Configure the following on all the core
routers:
configure router policy-options policy-statement "remoteABR"
entry 10
from
prefix-list "remoteABR"
exit
action accept
exit
exit
exit
configure router policy-options commit
Policy Verification
show router policy admin
For Seamless MPLS to function, BGP need to be enabled on all provider routers supporting the
following family:
ms-pw Exchanges dynamic MS-PW related information
vpn-ipv4 Exchanges IPv4 VPN routing information
ipv4 Provisions support for IPv4 routing information (exchange LDP FEC prefixed as RFC 3107
Core 3
Using the following commands, create a policy on the edge routers to export the loopbacks and system addresses.
A prefix list is first created for the edge routers system and loopback addresses and then used in the policy to
redistribute into BGP.
For each edge router, set the prefix list applicable to that router. See table below. On Edge 1, this is the
configuration:
configure router policy-options begin
configure router policy-options prefix-list "PE_Sys_loop_Out"
prefix 10.10.10.5/32 exact
prefix 55.55.55.55/32 exact
exit
Edge 1
Edge 2
Edge 3
Edge 4
prefix 10.10.10.5/32 exact prefix 10.10.10.6/32 exact prefix 10.10.10.7/32 exact prefix 10.10.10.8/32 exact
prefix 55.55.55.55/32 exact prefix 66.66.66.66/32 exact prefix 77.77.77.77/32 exact prefix 88.88.88.88/32 exact
Policy Verification
show router policy admin
BGP Verification
show router bgp summary
show router bgp neighbor 10.10.10.1 advertised-routes
show router route-table 55.55.55.55/32
show router bgp routes 77.77.77.77/32 detail
show router route-table
show router tunnel-table
Verification of BGP:
1. From viewing the route table on a core router, what is the size of the routing table?
2. What do you noticed about the system addresses of the edge routers? What is the type and protocol of these
addresses?
3. What do you noticed about the loopback addresses of the edge routers? What is the type and protocol of these
addresses?
4. From viewing the route table on an edge router, what is the size of the routing table?
5. What do you noticed about the system addresses of the edge routers? What is the type and protocol of these
addresses?
6. What do you noticed about the loopback addresses of the edge routers? What is the type and protocol of these
addresses?
Configure Epipe
Using the following commands, create an Epipe service between Edge 1 and Edge 3. On Edge 1, this is the
configuration:
configure service epipe 57 customer 1 create
sap 1/1/5:1.57 create
exit
spoke-sdp 57:57 create
exit
no shutdown
On Edge 3, this is the configuration:
configure service epipe 57 customer 1 create
sap 1/1/5:1.57 create
exit
spoke-sdp 75:57 create
exit
no shutdown
Note: if port 1/1/5 on Edge 1 and Edge 3 have not been configured to an access port with qinq encap, execute
the following command and then create the service:
configure port 1/1/5
shutdown
ethernet
mode access
encap-type qinq
exit
no shutdown
exit
Verify service configuration
Service Verification
show router ldp session
show service sdp
show service id 57 base
show service id 57 all
show service id 57 labels
show service id 57 sap
show service id 57 sdp
Verification:
1. Verify the status of each of the components. Are they operationally Up? If not, verify the service configuration
to identify the problem. Make the appropriate corrections and reaffirm that the service is operational.
2. What type of LSP is used by the SDPs and how are they signalled?
Verify
service Verification
configuration
Service
show router ldp session
show service sdp
show service id 578 base
show service id 578 endpoint
show service endpoint-using
Verification:
1. On Edge 1, how many SDPs are found in the epipe? Which one is active?
Copyright 2014 Alcatel-Lucent. All Rights Reserved.
TER36075_V3.1-AX-English-Ed1 Module 1.2 Edition 1
Appendix 1 Module 2 Page 25
Objective: Change the IGP protocol from OSPF to IS-IS in metro region 1 and ensure that seamless MPLS is
operational.
Shut down OSPF
Shutdown OSPF in metro region 1 by shutting down OSPF on Edge 1 and Edge 2 and shutting down OSPF Area 2 on
Core 1 and Core 2. On Core 1, this is the configuration:
configure router ospf area 2 interface toEdge1 shutdown
On Core 2:
configure router ospf area 2 interface toEdge2 shutdown
On Edge 1 and Edge 2, this is the configuration:
configure router ospf shutdown
Configure IS-IS
Configure IS-IS instance 0 and level 2 on Edge 1 and Edge 2 and on Core 1 and Core 2. On Core 1, this is the
configuration:
configure router isis level-capability level-2
area-id 49.0001
traffic-engineering
interface "system
interface toCORE2 interface-type point-to-point
interface toEdge1 interface-type point-to-point
Verification:
1. From viewing the route table on Core 3 router, what is the size of the routing table?
2. What do you noticed about the system addresses of Edge 1 and Edge2 routers? What is the type and
entries missing?
5. What is the status of the epipes configured in previous exercises? Why?
Next, in order for the BGP tunnel to exchange labels in the IS-IS domain to the edge routers, a new policy
statement has to be created and configured in BGP on Core 1 and Core 2.
Note: whenever a routing policy is modified start by entering configure router policy-options begin and at
the end commit the changes by entering policy-options commit.
configure router policy-options prefix-list "PE_Sys_loop_Out-farend"
prefix 10.10.10.7/32 exact
prefix 10.10.10.8/32 exact
prefix 77.77.77.77/32 exact
prefix 88.88.88.88/32 exact
configure router policy-options policy-statement "expNHS-2"
entry 10
from
prefix-list "PE_Sys_loop_Out-farend"
family ipv4
exit
to
protocol bgp
exit
action accept
next-hop-self
exit
exit
configure router bgp group Area2 export expNHS-2
Verification:
1. Now view the route table on Edge 1 again. What changed?
2. What do you noticed about the system addresses and loopback addresses of Edge 3 and Edge 4 routers?
Objective: Change the MPLS protocol from LDP to RSVP-TE in metro region 2 and ensure that seamless MPLS is
operational.
Shut down LDP
Shutdown LDP in metro region 2 by shutting down LDP interfaces on Edge 3, Edge 4, Core 3 and Core 4. On Core
3, this is the configuration:
configure router ldp interface-parameters interface toEdge3 shutdown
On Edge 3:
configure router ldp interface-parameters interface toCORE3 shutdown
configure router ldp interface-parameters interface toEdge4 shutdown
On Core 4:
configure router ldp interface-parameters interface toEdge4 shutdown
On Edge 4:
configure router ldp interface-parameters interface toCORE4 shutdown
configure router ldp interface-parameters interface toEdge3 shutdown
Configure RSVP
Enable MPLS and RSVP on Edge 3, Edge 4, Core 3, and Core 4 routers. Create LSPs between Edge3 and Core
3, and LSPs between Edge 4 and Core 4.
configure router mpls no shutdown
configure router rsvp no shutdown
configure router ospf traffic-engineering (for FRR)
On Core 3, this is the configuration:
configure router mpls interface toEdge3
configure router mpls path toEdge3
lsp "to7
to 10.10.10.7
cspf
fast-reroute
primary "toEdge3"
exit
no shutdown
exit
On Edge 3:
configure router mpls interface toCORE3
configure router mpls path toCore3
lsp "to3
to 10.10.10.3
cspf
fast-reroute
primary "toCore3"
exit
no shutdown
exit
On Core 4, this is the configuration:
configure router mpls interface toEdge4
configure router mpls path toEdge4
lsp "to8
to 10.10.10.8
cspf
fast-reroute
primary "toEdge4"
exit
no shutdown
exit
On Edge 4:
configure router mpls interface toCORE4
configure router mpls path toCore4
lsp "to4
to 10.10.10.4
cspf
fast-reroute
primary "toCore4"
exit
no shutdown
exit
and Edge 4 routers? What is the type and protocol of these addresses?
2. What do you noticed about the loopback addresses of Edge 3 and Edge 4 routers? What is the type and
missing?
4. What is the status of the epipes configured in previous exercises? Why?
Objective: Make changes in the network by shutting down port or interfaces and see that seamless MPLS is
still operational.
Shut down ports
Select a port such as the ones in the core region connecting the core routers and shut it down.
View the services created in the network.
View the route tables in the core routers and edge routers.
Verification:
1. Did any service go down?
2. Were there any changes in the route tables?
Document History
Edition
Date
Author
Remarks
01
YYYY-MM-DD
First edition
Page
1 Versatile Services Module
Provides roughly the equivalent connectivity as looping back external ports, but with various improvements:
- The interconnect function is performed internally eliminating the need for the physical port MAC, PHY,
cable and other MDA specific components
producing a more reliable adaptor.
- Bandwidth is utilized in a more efficient manner than with externally cabled ports. Typically, the offered
load presented to each side of the cross connect port pair is asymmetric in nature. When physical ports are
used to cross connect services, each service is egress bandwidth limited to the link speed of the TX-RX path
it is using. If one TX-RX path is underutilized, egress services on the other path cannot make use of the
available bandwidth. Since the VSM is forwarding all services over the same path, all the available bandwidth
may be used up to the 10 Gbps (half duplex) capability.
The MDA is called a vsm-cca in the CLI to tie together the Cross-Connect Aggregation Group concepts
underlying the VSM. VSM-CCAs may be placed into CCAGs (Cross Connect Aggregation Groups). A CCAG
provides a mechanism to aggregate multiple vsm-ccas into a single forwarding group. The CCAG uses
conversation hashing to dynamically distribute cross connect traffic to the active CCAs in the aggregation
group. In the event that an active CCA fails or is removed from the group, the conversation hashing function
will redistribute the traffic over the remaining active CCAs within the group.
Ordering Information:
3HE01197AA
3HE01198AA
With the R9.0 platforms of the 7750 SR and 7450 ESS, the Alcatel-Lucent Versatile Services
Module-XP (also called VSM-CCA-XP ) enables new service offerings by internally connecting
services with centralized Quality of Service (QoS) enforcement.
Each Alcatel-Lucent VSM-XP occupies half a slot in an IOM and can interconnect up to 25 Gb/s
(half-duplex) of services when installed in an IOM3-XP and 10 Gb/s when installed in an IOM2 or
IOM1.
Performance and Scalability
IOM3-XP: Up to 25 Gb/s half-duplex per VSM-XP
IOM2 and IOM1: Up to 10 Gb/s half-duplex per VSM-XP
At least eight logical groups of VSM-XP for interconnect bandwidth scaling
At least eight VSM-XPs per logical group
Limits on logical groups and VSM-XP per logical group are chassis and software-release
dependent
Part No.: 3HE05942AA
This slide shows the data flow for a single Versatile Services Module (VSM) (or vsm-cca in the CLI).
When multiple VSMs are installed, the cross connect traffic can be distributed across the VSMs.
The VSMs can be spread across IOMs. Each VSM support 10 Gbps of half-duplex service
interconnect traffic.
The VSM can be used to interconnect services with Ethernet encapsulations (e.g. no Frame Relay
or ATM encapsulated SAPs)
Virtual Paths
The function of the VSM is to connect an egress forwarding path directly to an ingress forwarding
path, allowing a packet to exit and reenter the system on the same MDA interface. This creates a
half duplex forwarding environment for all cross connected objects using the VSM and differs from
the full duplex nature of externally cross connected ports which support two distinct forwarding
paths. VSM provisioning emulates full duplex provisioning with two logical Path A and Path B
constructs which each emulate a TX-RX path for the CCAG.
Although Path A and Path B use the same TX bandwidth at the hardware level (represented by the
shared egress forwarding path for a given VSM), defining these distinct paths within a CCAG allows
for optional provisioning of rate limiting on each path. When enabled, rate limiting on a path is
spread across all the VSMs in the CCAG.
SAPs are defined as belonging to either Path A or Path B when the SAP is created on the CCID. An
IP interface is assigned to Path A or Path B when it is bound to a CCAG. A Path A object can only
be paired with a Path B object and vice versa.
VSM Configuration
Note: Ue the Versatile Services Modules (VSM) installed in the MLS routers to build cross-connections
between local Layer 2 and 3 services. Using the VSM, you can provide members of a VPLS server access to
a local Layer 3 services, either an IES or VPRN, through which the VPLS members can route traffic to
other network segments.
You may combine VSMs for additional bandwidth and redundancy. They may be located in the same or
different IOMs. You may assign bandwidth to each path, and set optional bandwidth constraints on a per
path basis.
In a live network, you would use at least two VSMs. In a lab environment, there can be one member per
Cross Connect Aggregate Group (CCAG). Only one CCAG per router would be configured.
1. Configure the VSM:
MLSx# configure card <iom slot> mda <mda slot> mda-type vsm-cca
MLSx# configure vsm
MLSx>config>vsm# ccag 1 create
MLSx>config>vsm>ccag# description "Service Cross Connect group L2 to L3"
MLSx>config>vsm>ccag# member-cca <iom>/<mda>
MLSx>config>vsm>ccag# path a sap-sap mtu 9212
MLSx>config>vsm>ccag# path b sap-sap mtu 9212
MLSx>config>vsm>ccag# exit all
MLSx#
Document History
Edition
Date
Author
Remarks
01
YYYY-MM-DD
First edition