Click here to load reader

MPLS: Layer 3 VPNs Configuration Guide, Cisco IOS Release 15M&T · PDF file IPv6VPNNextHop 60 MPLSForwarding 60 VRFConcepts 60 IPv6VPNScalability 61 AdvancedIPv6MPLSVPNFunctionality

  • View
    3

  • Download
    0

Embed Size (px)

Text of MPLS: Layer 3 VPNs Configuration Guide, Cisco IOS Release 15M&T · PDF file IPv6VPNNextHop...

  • MPLS: Layer 3 VPNs Configuration Guide, Cisco IOS Release 15M&T First Published: 2012-11-21

    Last Modified: 2013-03-15

    Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

    800 553-NETS (6387) Fax: 408 527-0883

  • THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

    THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

    The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

    NOTWITHSTANDING ANY OTHERWARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

    IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

    Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

    All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.

    Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.

    Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)

    © 2012–2013 Cisco Systems, Inc. All rights reserved.

    www.cisco.com/go/trademarks www.cisco.com/go/trademarks

  • C O N T E N T S

    MPLS Virtual Private Networks 1C H A P T E R 1

    Finding Feature Information 1

    Prerequisites for MPLS Virtual Private Networks 1

    Restrictions for MPLS Virtual Private Networks 2

    Information About MPLS Virtual Private Networks 4

    MPLS Virtual Private Network Definition 4

    How an MPLS Virtual Private Network Works 5

    How Virtual Routing and Forwarding Tables Work in an MPLS Virtual Private Network 5

    How VPN Routing Information Is Distributed in an MPLS Virtual Private Network 6

    MPLS Forwarding 6

    Major Components of an MPLS Virtual Private Network 6

    Benefits of an MPLS Virtual Private Network 7

    How to Configure MPLS Virtual Private Networks 9

    Configuring the Core Network 9

    Assessing the Needs of MPLS Virtual Private Network Customers 9

    Configuring MPLS in the Core 10

    Connecting the MPLS Virtual Private Network Customers 10

    Defining VRFs on the PE Devices to Enable Customer Connectivity 10

    Configuring VRF Interfaces on PE Devices for Each VPN Customer 11

    Configuring Routing Protocols Between the PE and CE Devices 12

    Verifying the Virtual Private Network Configuration 16

    Verifying Connectivity Between MPLS Virtual Private Network Sites 16

    Verifying IP Connectivity from CE Device to CE Device Across the MPLS Core 16

    Verifying That the Local and Remote CE Devices Are in the PE Routing Table 17

    Configuration Examples for MPLS Virtual Private Networks 18

    Example: Configuring an MPLS Virtual Private Network Using RIP 18

    MPLS: Layer 3 VPNs Configuration Guide, Cisco IOS Release 15M&T iii

  • Example: Configuring an MPLS Virtual Private Network Using Static Routes 20

    Additional References 21

    Feature Information for MPLS Virtual Private Networks 21

    Multiprotocol BGP MPLS VPN 23C H A P T E R 2

    Finding Feature Information 23

    Prerequisites for Multiprotocol BGP MPLS VPN 23

    Information About Multiprotocol BGP MPLS VPN 24

    MPLS Virtual Private Network Definition 24

    How an MPLS Virtual Private Network Works 25

    How Virtual Routing and Forwarding Tables Work in an MPLS Virtual Private Network 25

    How VPN Routing Information Is Distributed in an MPLS Virtual Private Network 26

    MPLS Forwarding 26

    BGP Distribution of VPN Routing Information 26

    Major Components of an MPLS Virtual Private Network 27

    How to Configure Multiprotocol BGP MPLS VPN 27

    Configuring Multiprotocol BGP Connectivity on the PE Devices and Route Reflectors 27

    Troubleshooting Tips 29

    Configuring BGP as the Routing Protocol Between the PE and CE Devices 29

    Verifying the Virtual Private Network Configuration 31

    Verifying Connectivity Between MPLS Virtual Private Network Sites 31

    Verifying IP Connectivity from CE Device to CE Device Across the MPLS Core 32

    Verifying That the Local and Remote CE Devices Are in the PE Routing Table 32

    Configuration Examples for Multiprotocol BGP MPLS VPN 34

    Example: Configuring an MPLS Virtual Private Network Using BGP 34

    Additional References 35

    Feature Information for Multiprotocol BGP MPLS VPN 35

    MPLS VPN OSPF PE and CE Support 37C H A P T E R 3

    Finding Feature Information 37

    Prerequisites for MPLS VPN OSPF PE and CE Support 37

    Information About MPLS VPN OSPF PE and CE Support 38

    Overview of MPLS VPN OSPF PE and CE Support 38

    How to Configure MPLS VPN OSPF PE and CE Support 38

    MPLS: Layer 3 VPNs Configuration Guide, Cisco IOS Release 15M&T iv

    Contents

  • Configuring OSPF as the Routing Protocol Between the PE and CE Devices 38

    Verifying Connectivity Between MPLS Virtual Private Network Sites 40

    Verifying IP Connectivity from CE Device to CE Device Across the MPLS Core 40

    Verifying That the Local and Remote CE Devices Are in the PE Routing Table 41

    Configuration Examples for MPLS VPN OSPF PE and CE Support 42

    Example: Configuring an MPLS VPN Using OSPF 42

    Additional References 43

    Feature Information for MPLS VPN OSPF PE and CE Support 43

    MPLS VPN Support for EIGRP Between PE and CE 45C H A P T E R 4

    Finding Feature Information 45

    Prerequisites for MPLS VPN Support for EIGRP Between PE and CE 45

    Information About MPLS VPN Support for EIGRP Between PE and CE 46

    Overview of MPLS VPN Support for EIGRP Between PE and CE 46

    How to Configure MPLS VPN Support for EIGRP Between PE and CE 46

    Configuring EIGRP as the Routing Protocol Between the PE and CE Devices 46

    Configuring EIGRP Redistribution in the MPLS VPN 48

    Verifying Connectivity Between MPLS Virtual Private Network Sites 50

    Verifying IP Connectivity from CE Device to CE Device Across the MPLS Core 50

    Verifying That the Local and Remote CE Devices Are in the PE Routing Table 51

    Configuration Examples for MPLS VPN Support for EIGRP Between PE and CE 52

    Example: Configuring an MPLS VPN Using EIGRP 52

    Additional References 54

    Feature Information for MPLS VPN Support for EIGRP Between PE and CE 54

    IPv6 VPN over MPLS 57C H A P T E R 5

    Finding Feature Information 57

    Prerequisites for IPv6 VPN over MPLS 57

    Restrictions for IPv6 VPN over MPLS 58

    Information About IPv6 VPN over MPLS 58

    IPv6 VPN over MPLS Overview 58

    Addressing Considerations for IPv6 VPN over MPLS 58

    Basic IPv6 VPN over MPLS Functionality 59

    IPv6 VPN Architecture Overview 59

    MPLS: Layer 3 VPNs Configuration Guide, Cisco IOS Release 15M&T v

    Contents

  • IPv6 VPN Next Hop 60

    MPLS Forwarding 60

    VRF Concepts 60

    IPv6 VPN Scalability 61

    Advanced IPv6 MPLS VPN Functionality 62

    Internet Access 62

    Multiautonomous-System Backbones 63

    Carrier Supporting Carriers 64

    How to Configure IPv6 VPN over MPLS 64

    Configuring a Virtual Routing and Forwarding Instance for IPv6 64

    Binding a VRF to an Interface 66

    Configuring a Static Route for PE-to-CE Routing 67

    Configuring eBGP PE-to-CE Routing Sessions 68

    Configuring the IPv6 VPN Address Family for iBGP 69

    Configuring Route Reflectors for Improved Scalability 70

    Configuring Internet Access 77

    Configuring the Internet Gatewa

Search related