Vpls Configuration Ios XR With BGP and LDP Autodiscovery
Vpls Configuration Ios XR With BGP and LDP Autodiscovery
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2017–2018 Cisco Systems, Inc. All rights reserved.
• To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
• To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
• To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
• To obtain general networking, training, and certification titles, visit Cisco Press.
• To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products
and software. BST provides you with detailed defect information about your products and software.
© 2017–2018 Cisco Systems, Inc. All rights reserved.
CONTENTS
PREFACE Preface ix
Changes to This Document ix
Obtaining Documentation and Submitting a Service Request ix
Running Configuration 14
Verify the Ethernet Local Management Interface (E-LMI) Configuration 15
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
v
Contents
Configuration 44
MAC Address-related Parameters 47
MAC Address Flooding 47
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
vi
Contents
Storm Control 75
Supported Traffic Types for Storm Control 76
Storm Control Thresholds 76
Restrictions 76
Configure Storm Control 76
Related Topics 77
Associated Commands 77
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
vii
Contents
CHAPTER 9 References 89
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
viii
Preface
This product has reached end-of-life status. For more information, see the End-of-Life and End-of-Sale Notices.
This preface contains these sections:
• Changes to This Document, on page ix
• Obtaining Documentation and Submitting a Service Request, on page ix
Date Summary
September 2017 Initial release of this document.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
ix
Preface
Obtaining Documentation and Submitting a Service Request
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
x
CHAPTER 1
New and Changed VPN Features
This table summarizes the new and changed feature information for the L2VPN and Ethernet Services
Configuration Guide for Cisco NCS 5000 Series Routers, and tells you where they are documented.
• New and Changed VPN Features, on page 1
Traffic Storm Control Traffic Storm Control Release 6.3.1 Storm Control, on page
provides Layer 2 port 75
security under a Virtual
Private LAN Services
(VPLS) bridge by
preventing excess traffic
from disrupting the
bridge.
Multiple Spanning Tree The Multiple Spanning Release 6.3.1 Configure Multiple
Protocol Tree Protocol (MSTP) is Spanning Tree Protocol,
a Spanning Tree Protocol on page 79
(STP) variant that allows
multiple and independent
spanning trees to be
created over the same
physical network.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
1
New and Changed VPN Features
New and Changed VPN Features
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
2
CHAPTER 2
Configure Gigabit Ethernet for Layer 2 VPNs
This chapter introduces you to Layer 2 features and standards, and describes how you can configure L2VPN
features.
The distributed Gigabit Ethernet (including 10-Gigabit and 100-Gigabit) architecture and features deliver
network scalability and performance, while enabling service providers to offer high-density, high-bandwidth
networking solutions designed to interconnect the router with other systems in POPs, including core and edge
routers and Layer 2 and Layer 3 switches.
• Introduction to Layer 2 Virtual Private Networks, on page 3
• Introduction to Layer 2 VPNs on Gigabit Ethernet Interfaces, on page 4
• Configure Gigabit Ethernet Interfaces for Layer 2 Transport, on page 5
• Configure Link Loss Forwarding for Layer 2 Transport, on page 6
• Ethernet Data Plane Loopback, on page 6
• Ethernet Local Management Interface (E-LMI), on page 11
• E-LMI Messaging, on page 12
• E-LMI Operation, on page 12
• Configure Ethernet Local Management Interface (E-LMI) , on page 13
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
3
Configure Gigabit Ethernet for Layer 2 VPNs
Introduction to Layer 2 VPNs on Gigabit Ethernet Interfaces
Note BOOTP traffic (dst UDP 68) over any type of pseudowire is unsupported.
Cisco IOS XR software supports a point-to-point end-to-end service, where two Ethernet circuits are connected
together. An L2VPN Ethernet port can operate in one of two modes:
• Port Mode—In this mode, all packets reaching the port are sent over the pseudowire, regardless of any
VLAN tags that are present on the packets. In Port mode, the configuration is performed under the
l2transport configuration mode.
• VLAN Mode—Each VLAN on a CE (customer edge) or access network to PE (provider edge) link can
be configured as a separate L2VPN connection (using either VC type 4 or VC type 5). To configure
L2VPN on VLANs, see The Carrier Ethernet Model chapter in this manual. In VLAN mode, the
configuration is performed under the individual sub-interface.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
4
Configure Gigabit Ethernet for Layer 2 VPNs
Configure Gigabit Ethernet Interfaces for Layer 2 Transport
Note • If your network requires that packets are transported transparently, you may need to modify the packet’s
destination MAC (Media Access Control) address at the edge of the Service Provider (SP) network. This
prevents the packet from being consumed by the devices in the SP network.
• The encapsulation dot1ad vlan-id and encapsulation dot1ad vlan-id dot1q any commands cannot
co-exist on the same physical interface or bundle interface. Similarly, the encapsulation dot1q vlan-id
and encap dot1q vlan-id second-dot1q any commands cannot co-exist on the same physical interface
or bundle interface. If there is a need to co-exist, it is recommended to use the exact keyword in the single
tag encapsulation. For example, encap dot1ad vlan-id exact or encap dot1q vlan-id exact.
• In an interface which already has QinQ configuration, you cannot configure the QinQ Range sub-interface
where outer VLAN range of QinQ Range overlaps with outer VLAN of QinQ. Attempting this
configuration results in the splitting of the existing QinQ and QinQ Range interfaces. However, the
system can be recovered by deleting a recently configured QinQ Range interface.
• In an interface which already has QinQ Range configuration, you cannot configure the QinQ Range
sub-interface where outer VLAN range of QinQ Range overlaps with inner VLAN of QinQ Range.
Attempting this configuration results in the splitting of the existing QinQ and QinQ Range interfaces.
However, the system can be recovered by deleting a recently configured QinQ Range interface.
You can use the show interfaces command to display AC and pseudowire information.
Running Configuration
configure
interface TenGigE 0/0/0/10
dot1q tunneling ethertype 0x9100
l2transport
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
5
Configure Gigabit Ethernet for Layer 2 VPNs
Verification
Verification
Verify that the 10-Gigabit Ethernet interface is up and operational.
Running Configuration
/* Configuring propagation remote-status */
interface TenGigE 0/0/0/5
l2transport
propagate remote-status
!
!
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
6
Configure Gigabit Ethernet for Layer 2 VPNs
Ethernet Data Plane Loopback
You can use this feature to test the throughput of an ethernet port remotely. You can verify the maximum rate
of frame transmission with no frame loss.
This feature allows for bidirectional or unidirectional throughput measurement, and on-demand or out-of-service
(intrusive) operation during service turn-up.
Two types of Ethernet loopback are supported:
• External loopback - Traffic loopback occurs at the Ingress interface. Traffic does not flow into the router
for loopback.
• Internal loopback - Traffic loopback occurs at the Egress interface. Traffic loopback occurs after the
traffic flows into the router to the other interface.
Ethernet data traffic can be looped back on per port basis. This feature supports a maximum of 100 concurrent
Ethernet data plane loopback sessions per system. Filters based on frame header can be used for initiating the
loopback session. This ensures that only a subset of traffic that is received on an interface is looped back. You
can use Source MAC, Destination MAC, and VLAN Priority (COS bits) as filters.
• Only the following combination of filters are supported for external loopback:
• Source MAC
• Source MAC and Destination MAC
• Source MAC, Destination MAC, and VLAN priority
• Destination MAC
• Destination MAC and VLAN priority
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
7
Configure Gigabit Ethernet for Layer 2 VPNs
Configure Ethernet Data Plane Loopback
Configuration Example
/* Configuring Ethernet Data Plane External Loopback */
/* On physical interface */
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)# interface tenGigE 0/0/0/0 l2transport
RP/0/RSP0/CPU0:router((config-if-l2)# ethernet loopback permit external
/* On physical sub-interface */
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)# interface tenGigE 0/2/0/0/0.1 l2transport
RP/0/RSP0/CPU0:router(config-subif)# encapsulation dot1q 100
RP/0/RSP0/CPU0:router((config-if-l2)# ethernet loopback permit external
/* On physical interface
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)# interface tenGigE 0/0/0/1 l2transport
RP/0/RSP0/CPU0:router((config-if-l2)# ethernet loopback permit internal
/* On physical sub-interface */
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)# interface tenGigE 0/2/0/0/0.1 l2transport
RP/0/RSP0/CPU0:router(config-subif)# encapsulation dot1q 100
RP/0/RSP0/CPU0:router(config-if-l2)# ethernet loopback permit internal
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
8
Configure Gigabit Ethernet for Layer 2 VPNs
Running Configuration
Similarly, you can configure the Ethernet Data Plane Loopback session for bundle interface and bundle
sub-interface.
Running Configuration
This section shows Ethernet Data Plane Loopback running configuration.
/* External Loopback */
/* On physical interface */
configure
interface interface tenGigE 0/0/0/0 l2transport
ethernet loopback permit external
!
/* On physical sub-interface */
configure
interface interface tenGigE 0/2/0/0/0.1 l2transport
encapsulation dot1q 100
ethernet loopback permit external
!
/* Internal Loopback */
/* On physical interface */
configure
interface interface tenGigE 0/0/0/1 l2transport
ethernet loopback permit internal
!
/* On physical sub-interface */
configure
interface interface tenGigE 0/2/0/0/0.1 l2transport
encapsulation dot1q 100
ethernet loopback permit internal
!
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
9
Configure Gigabit Ethernet for Layer 2 VPNs
Verification
Verification
The following example displays the loopback capabilities per interface. The output shows internal loopback
has been permitted on Ten Gigabit Ethernet 0/0/0/1 interface and external loopback has been permitted on
Ten Gigabit Ethernet 0/0/0/0 interface.
--------------------------------------------------------------------------------
Interface Dot1q(s) Direction
--------------------------------------------------------------------------------
tenGigE 0/0/0/1.1 100 Internal
tenGigE 0/0/0/0.1 100 External
---------------------------------------------------------------------------------
Related Topics
• Ethernet Data Plane Loopback, on page 6
Associated Commands
• ethernet loopback
• show ethernet loopback
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
10
Configure Gigabit Ethernet for Layer 2 VPNs
Related Topics
Related Topics
• Ethernet Data Plane Loopback, on page 6
Associated Commands
• ethernet loopback
• show ethernet loopback
E-LMI is an asymmetric protocol whose basic operation involves the User-facing PE (uPE) device providing
connectivity status and configuration parameters to the CE using STATUS messages in response to STATUS
ENQUIRY messages sent by the CE to the uPE.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
11
Configure Gigabit Ethernet for Layer 2 VPNs
E-LMI Messaging
E-LMI Messaging
The E-LMI protocol as defined by the MEF 16 standard, defines the use of only two message types—STATUS
ENQUIRY and STATUS.
These E-LMI messages consist of required and optional fields called information elements, and all information
elements are associated with assigned identifiers. All messages contain the Protocol Version, Message Type,
and Report Type information elements, followed by optional information elements and sub-information
elements.
E-LMI messages are encapsulated in 46- to 1500-byte Ethernet frames, which are based on the IEEE 802.3
untagged MAC-frame format. E-LMI frames consist of the following fields:
• Destination address (6 bytes)—Uses a standard MAC address of 01:80:C2:00:00:07.
• Source address (6 bytes)—MAC address of the sending device or port.
• E-LMI Ethertype (2 bytes)—Uses 88-EE.
• E-LMI PDU (46–1500 bytes)—Data plus 0x00 padding as needed to fulfill minimum 46-byte length.
• CRC (4 bytes)—Cyclic Redundancy Check for error detection.
For more details about E-LMI messages and their supported information elements, refer to the Metro Ethernet
Forum, Technical Specification MEF 16, Ethernet Local Management Interface (E-LMI), January 2006.
E-LMI Operation
The basic operation of E-LMI consists of a CE device sending periodic STATUS ENQUIRY messages to the
PE device, followed by mandatory STATUS message responses by the PE device that contain the requested
information. Sequence numbers are used to correlate STATUS ENQUIRY and STATUS messages between
the CE and PE.
The CE sends the following two forms of STATUS ENQUIRY messages called Report Types:
• E-LMI Check—Verifies a Data Instance (DI) number with the PE to confirm that the CE has the latest
E-LMI information.
• Full Status—Requests information from the PE about the UNI and all EVCs.
The CE device uses a polling timer to track sending of STATUS ENQUIRY messages, while the PE device
can optionally use a Polling Verification Timer (PVT), which specifies the allowable time between transmission
of the PE’s STATUS message and receipt of a STATUS ENQUIRY from the CE device before recording an
error.
In addition to the periodic STATUS ENQUIRY/STATUS message sequence for the exchange of E-LMI
information, the PE device also can send asynchronous STATUS messages to the CE device to communicate
changes in EVC status as soon as they occur and without any prompt by the CE device to send that information.
Both the CE and PE devices use a status counter (N393) to determine the local operational status of E-LMI
by tracking consecutive errors received before declaring a change in E-LMI protocol status.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
12
Configure Gigabit Ethernet for Layer 2 VPNs
Configure Ethernet Local Management Interface (E-LMI)
E-LMI is not supported on physical sub-interfaces and bundle main and sub- interfaces. E-LMI is configurable
on Ethernet physical interfaces only.
In order to ensure the correct interaction between the CE and the PE, each device has two configurable
parameters. The CE uses a Polling Timer (PT) and a Polling Counter; the PE uses a Polling Verification Timer
(PVT) and a Status Counter.
To configure Ethernet LMI, complete the following tasks:
• Configure EVCs for E-LMI (required)
• Configure Ethernet CFM for E-LMI (required)
• Enable E-LMI on the Physical Interface (required)
• Configure the Polling Verification Timer (optional)
• Configure the Status Counter (optional)
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)# interface TenGigE0/3/0/9/1.1 l2transport
RP/0/RSP0/CPU0:router(config-subif)# encapsulation dot1q 1
RP/0/RSP0/CPU0:router(config-subif)# xconnect group evpn
RP/0/RSP0/CPU0:router(config)# l2vpn
RP/0/RSP0/CPU0:router(config-l2vpn)# xconnect group evpn
RP/0/RSP0/CPU0:router(config-l2vpn-xc)# p2p p1
RP/0/RSP0/CPU0:router(config-l2vpn-xc-p2p)# interface TenGigE0/3/0/9/1.1
RP/0/RSP0/CPU0:router(config-l2vpn-xc-p2p)# neighbor evpn evi 1 target 3001 source 1
RP/0/RSP0/CPU0:router(config-l2vpn-xc-p2p)#commit
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)#interface TenGigE0/3/0/9/1.1 l2transport
RP/0/RSP0/CPU0:router(config-subif)# encapsulation dot1q 1
RP/0/RSP0/CPU0:router(config-subif)# ethernet cfm
RP/0/RSP0/CPU0:router(config-if-cfm)# mep domain irf_evpn_up service up_mep_evpn_1 mep-id
3001
RP/0/RSP0/CPU0:router(config-if-cfm-mep)#exit
RP/0/RSP0/CPU0:router(config)#ethernet cfm
RP/0/RSP0/CPU0:router(config-cfm)# domain irf_evpn_up level 3 id null
RP/0/RSP0/CPU0:router(config-cfm-dmn)#service up_mep_evpn_1 xconnect group evpn p2p p1 id
number 1
RP/0/RSP0/CPU0:router(config-cfm-dmn-svc)# mip auto-create all ccm-learning
RP/0/RSP0/CPU0:router(config-cfm-dmn-svc)# continuity-check interval 1m loss-threshold 3
RP/0/RSP0/CPU0:router(config-cfm-dmn-svc)#continuity-check archive hold-time 10
RP/0/RSP0/CPU0:router(config-cfm-dmn-svc)#mep crosscheck
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
13
Configure Gigabit Ethernet for Layer 2 VPNs
Running Configuration
RP/0/RSP0/CPU0:router(config-cfm-xcheck)# mep-id 1
RP/0/RSP0/CPU0:router(config-cfm-xcheck)#ais transmission interval 1m cos 6
RP/0/RSP0/CPU0:router(config-cfm-dmn-svc)#log ais
RP/0/RSP0/CPU0:router(config-cfm-dmn-svc)#log continuity-check errors
RP/0/RSP0/CPU0:router(config-cfm-dmn-svc)#log crosscheck errors
RP/0/RSP0/CPU0:router(config-cfm-dmn-svc)#log continuity-check mep changes
RP/0/RSP0/CPU0:router(config-cfm-dmn-svc)#commit
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)#interface TenGigE0/3/0/9/1
RP/0/RSP0/CPU0:router(config-if)# ethernet lmi
RP/0/RSP0/CPU0:router(config-if-elmi)#commit
The MEF T392 Polling Verification Timer (PVT) specifies the allowable time between
transmission of a STATUS message and receipt of a STATUS ENQUIRY from the UNI-C before
recording an error. The default value is 15 seconds.
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)#interface gigabitethernet 0/0/0/0
RP/0/RSP0/CPU0:router(config-if)# ethernet lmi
RP/0/RSP0/CPU0:router(config-if-elmi)#polling-verification-timer 30
RP/0/RSP0/CPU0:router(config-if-elmi)#commit
The MEF N393 Status Counter value is used to determine E-LMI operational status by tracking
receipt of consecutive good packets or successive expiration of the PVT on packets. The
default counter is four, which means that while the E-LMI protocol is in Down state, four
good packets must be received consecutively to change the protocol state to Up, or while
the E-LMI protocol is in Up state, four consecutive PVT expirations must occur before the
state of the E-LMI protocol is changed to Down on the interface.
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)#interface gigabitethernet 0/0/0/0
RP/0/RSP0/CPU0:router(config-if)# ethernet lmi
RP/0/RSP0/CPU0:router(config-if-elmi)#status-counter 5
RP/0/RSP0/CPU0:router(config-if-elmi)#commit
Running Configuration
This section shows E-LMI running configuration.
/* Configure EVCs for E-LMI */
configure
interface TenGigE0/3/0/9/1.1 l2transport
encapsulation dot1q 1
l2vpn
xconnect group evpn
p2p p1
interface TenGigE0/3/0/9/1.1
neighbor evpn evi 1 target 3001 source 1
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
14
Configure Gigabit Ethernet for Layer 2 VPNs
Verify the Ethernet Local Management Interface (E-LMI) Configuration
commit
!
configure
interface TenGigE0/3/0/9/1.1 l2transport
encapsulation dot1q 1
ethernet cfm
mep domain irf_evpn_up service up_mep_evpn_1 mep-id 3001
!
configure
ethernet cfm
domain irf_evpn_up level 3 id null
service up_mep_evpn_1 xconnect group evpn p2p p1 id number 1
mip auto-create all ccm-learning
continuity-check interval 1m loss-threshold 3
continuity-check archive hold-time 10
mep crosscheck
mep-id 1
!
ais transmission interval 1m cos 6
log ais
log continuity-check errors
log crosscheck errors
log continuity-check mep changes
!
configure
interface TenGigE0/3/0/9/1
ethernet lmi
!
configure
interface gigabitethernet 0/0/0/0
ethernet lmi
polling-verification-timer 30
!
configure
interface gigabitethernet 0/0/0/0
ethernet lmi
status-counter 5
!
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
15
Configure Gigabit Ethernet for Layer 2 VPNs
Verify the Ethernet Local Management Interface (E-LMI) Configuration
Interface: TenGigE0/3/0/9/1
Ether LMI Link Status: Up
Line Protocol State: Up
MTU: 1514 (1 PDU reqd. for full report)
CE-VLAN/EVC Map Type: Service Multiplexing with no bundling (1 EVC)
Configuration: Status counter 4, Polling Verification Timer 15 seconds
Last Data Instance Sent: 130
Last Sequence Numbers: Sent 179, Received 108
Reliability Errors:
Status Enq Timeouts 0 Invalid Sequence Number 0
Invalid Report Type 0
Protocol Errors:
Malformed PDUs 0 Invalid Protocol Version 0
Invalid Message Type 0 Out of Sequence IE 0
Duplicated IE 0 Mandatory IE Missing 0
Invalid Mandatory IE 0 Invalid non-Mandatory IE 0
Unrecognized IE 0 Unexpected IE 0
Full Status Enq Received 00:03:17 ago Full Status Sent 00:03:17 ago
PDU Received 00:00:07 ago PDU Sent 00:00:07 ago
LMI Link Status Changed 01:59:54 ago Last Protocol Error never
Counters Cleared never
Sub-interface: TenGigE0/3/0/9/1.1
VLANs: 1
EVC Status: Active
EVC Type: Point-to-Point
OAM Protocol: CFM
CFM Domain: irf_evpn_up (level 3)
CFM Service: up_mep_evpn_1
Make sure:
• The protocol (Ether LMI Link Status) is 'Up'.
• The output does not have "local UNI (UNI Id)" and also it is in provisioned state.
• The interface (Line Protocol State) is 'Up'.
• The CE-VLAN/EVC Map Type is as expected and shows the correct number of EVCs.
• The error counters are all 0.
• The LMI Link Status Changed timer shows the time since the protocol started.
• The sub-interface name(s) corresponds to the EFP(s) configured.
• The VLANs on each interface are as configured.
• The EVC Status is 'Active'.
• The CFM Domain and CFM Service match the provisioning.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
16
Configure Gigabit Ethernet for Layer 2 VPNs
Verify the Ethernet Local Management Interface (E-LMI) Configuration
Related Topics
• Ethernet Local Management Interface (E-LMI), on page 11
• E-LMI Messaging, on page 12
• E-LMI Messaging, on page 12
Associated Commands
• ethernet lmi
• show ethernet lmi interfaces
• show ethernet cfm peer meps
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
17
Configure Gigabit Ethernet for Layer 2 VPNs
Verify the Ethernet Local Management Interface (E-LMI) Configuration
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
18
CHAPTER 3
Configure Virtual LANs in Layer 2 VPNs
The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services
to geographically disparate customer sites.
A virtual local area network (VLAN) is a group of devices on one or more LANs that are configured so that
they can communicate as if they were attached to the same wire, when in fact they are located on a number
of different LAN segments. The IEEE's 802.1Q specification establishes a standard method for inserting
VLAN membership information into Ethernet frames.
VLANs are very useful for user and host management, bandwidth allocation, and resource optimization. Using
VLANs addresses the problem of breaking large networks into smaller parts so that broadcast and multicast
traffic does not consume more bandwidth than necessary. VLANs also provide a higher level of security
between segments of internal networks.
The 802.1Q specification establishes a standard method for inserting VLAN membership information into
Ethernet frames. Cisco IOS XR software supports VLAN sub-interface configuration on Gigabit Ethernet and
10-Gigabit Ethernet interfaces.
The configuration model for configuring VLAN Attachment Circuits (ACs) is similar to the model used for
configuring basic VLANs, where the user first creates a VLAN sub-interface, and then configures that VLAN
in sub-interface configuration mode. To create an Attachment Circuit, you need to include the l2transport
keyword in the interface command string to specify that the interface is a L2 interface.
VLAN ACs support the following modes of L2VPN operation:
• Basic Dot1Q Attachment Circuit—The Attachment Circuit covers all frames that are received and sent
with a specific VLAN tag.
• QinQ Attachment Circuit—The Attachment Circuit covers all frames received and sent with a specific
outer VLAN tag and a specific inner VLAN tag. QinQ is an extension to Dot1Q that uses a stack of two
tags.
Each VLAN on a CE-to-PE link can be configured as a separate L2VPN connection (using either VC type 4
or VC type 5).
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
19
Configure Virtual LANs in Layer 2 VPNs
Configure VLAN Sub-Interfaces
• Pseudowires can run in VLAN mode or in port mode. A pseudowire running in VLAN mode always
carries Dot1Q or Dot1ad tag(s), while a pseudowire running in port mode may or may NOT carry tags.
To connect these different types of circuits, popping, pushing, and rewriting tags is required.
• The Attachment Circuits on either side of an MPLS pseudowire can be of different types. In this case,
the appropriate conversion is carried out at one or both ends of the Attachment Circuit to pseudowire
connection.
• You can program a maximum number of 16 virtual MAC addresses on your router.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
20
Configure Virtual LANs in Layer 2 VPNs
Configure VLAN Sub-Interfaces
Configuration Example
Configuring VLAN sub-interface involves:
• Creating a Ten Gigabit Ethernet sub-interface
• Enabling L2 transport mode on the interface
• Defining the matching criteria (encapsulation mode) to be used in order to map ingress frames on an
interface to the appropriate service instance
Router# configure
Router(config)# interface TenGigE 0/0/0/10.1 l2transport
Router(config-if)# encapsulation dot1q 10
Router(config-if)# no shutdown
Running Configuration
configure
interface TenGigE 0/0/0/10.1
l2transport
encapsulation dot1q 10
!
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
21
Configure Virtual LANs in Layer 2 VPNs
Introduction to Ethernet Flow Point
Verification
Verify that the VLAN sub-interface is active:
...
TenGigE0/0/0/10.1 is up, line protocol is up
Interface state transitions: 1
Hardware is VLAN sub-interface(s), address is 0011.1aac.a05a
Layer 2 Transport Mode
MTU 1518 bytes, BW 10000000 Kbit (Max: 10000000 Kbit)
reliability Unknown, txload Unknown, rxload Unknown
Encapsulation 802.1Q Virtual LAN,
Outer Match: Dot1Q VLAN 10
Ethertype Any, MAC Match src any, dest any
loopback not set,
...
Associated Commands
• encapsulation dot1ad dot1q
• encapsulation dot1q
• encapsulation dot1q second-dot1q
• l2transport (Ethernet)
• encapsulation dot1ad
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
22
Configure Virtual LANs in Layer 2 VPNs
Identify Frames of an EFP
Limitations of EFP
Egress EFP filtering is not supported on Cisco IOS XR.
You can use wildcards while defining frames that map to a given EFP. EFPs can distinguish flows based on
a single VLAN tag, a stack of VLAN tags or a combination of both (VLAN stack with wildcards). It provides
the EFP model, a flexibility of being encapsulation agnostic, and allows it to be extensible as new tagging or
tunneling schemes are added.
Apply Features
After the frames are matched to a particular EFP, any appropriate features can be applied. In this context,
“features” means any frame manipulations specified by the configuration as well as things such as QoS and
ACLs. The Ethernet infrastructure provides an appropriate interface to allow the feature owners to apply their
features to an EFP. Hence, IM interface handles are used to represent EFPs, allowing feature owners to manage
their features on EFPs in the same way the features are managed on regular interfaces or sub-interfaces.
The only L2 features that can be applied on an EFP that is part of the Ethernet infrastructure are the L2 header
encapsulation modifications. The L2 features are described in this section.
Encapsulation Modifications
EFP supports these L2 header encapsulation modifications on both ingress and egress:
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
23
Configure Virtual LANs in Layer 2 VPNs
Define Data-Forwarding Behavior
Note This modification can only pop tags that are matched as part of the EFP.
Note For tag rewrites, the CoS bits from the previous tag should be preserved in the same way as the DEI bit for
802.1ad encapsulated frames.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
24
Configure Virtual LANs in Layer 2 VPNs
Configure VLAN Header Rewrite
Note This rewrite can only pop tags that are matched as part of the EFP.
Various combinations of ingress, egress VLAN rewrites with corresponding tag actions during ingress and
egress VLAN translation, are listed in the following sections:
• Valid Ingress Rewrite Actions, on page 27
• Valid Ingress-Egress Rewrite Combinations, on page 28
Configuration Example
This topic covers VLAN header rewrites on various attachment circuits, such as:
• L2 single-tagged sub-interface
• L2 double-tagged sub-interface
Router# configure
Router(config)# interface TenGigE 0/0/0/10.1 l2transport
Router(config-if)# encapsulation dot1q 10
Router(config-if)# rewrite ingress tag push dot1q 20 symmteric
Running Configuration
configure
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
25
Configure Virtual LANs in Layer 2 VPNs
Configure VLAN Header Rewrite
/* PUSH 1 */
interface TenGigE0/0/0/0.1 l2transport
encapsulation dot1q 10
rewrite ingress tag push dot1q 20 symmteric
!
!
/* POP 1 */
interface TenGigE0/0/0/0.1 l2transport
encapsulation dot1q 10
rewrite ingress tag pop 1
!
!
/* TRANSLATE 1-1 */
/* TRANSLATE 1-2 */
/* PUSH 1 */
interface TenGigE0/0/0/0.1 l2transport
encapsulation dot1q 10 second-dot1q 11
rewrite ingress tag push dot1q 20 symmteric
!
!
/* TRANSLATE 1-1 */
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
26
Configure Virtual LANs in Layer 2 VPNs
Valid Ingress Rewrite Actions
/* TRANSLATE 1-2 */
/* TRANSLATE 2-1 */
interface TenGigE0/0/0/0.1 l2transport
encapsulation dot1q 10 second-dot1q 11
rewrite ingress tag translate 2-to-1 dot1q 20
/* TRANSLATE 2-2 */
Associated Commands
• encapsulation dot1ad dot1q
• encapsulation dot1q
• encapsulation dot1q second-dot1q
• l2transport (Ethernet)
• rewrite ingress tag
dot1q No rewrite
dot1q Pop 1
dot1q Push 1
dot1q Push 2
dot1q Translate 1 to 1
dot1q Translate 1 to 2
QinQ No rewrite
QinQ Pop 1
QinQ Push 1
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
27
Configure Virtual LANs in Layer 2 VPNs
Valid Ingress-Egress Rewrite Combinations
QinQ Translate 1 to 1
QinQ Translate 1 to 2
QinQ Translate 2 to 1
Untagged No rewrite
The following notations are used for the rewrite actions mentioned in the table:
• Translate 1-to-1 tag: Translates the outermost tag to another tag.
• Translate 1-to-2 tags: Translates the outermost tag to two tags.
• Translate 2-to-1 tags: Translates the outermost two tags to a single tag.
• Translate 2-to-2 tags: Translates the outermost two tags to two other tags.
Ingress Interface Ingress Interface Rewrite Action Egress Egress Interface Rewrite
Configuration Interface Action
Configuration
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
28
Configure Virtual LANs in Layer 2 VPNs
Valid Ingress-Egress Rewrite Combinations
Ingress Interface Ingress Interface Rewrite Action Egress Egress Interface Rewrite
Configuration Interface Action
Configuration
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
29
Configure Virtual LANs in Layer 2 VPNs
Valid Ingress-Egress Rewrite Combinations
Ingress Interface Ingress Interface Rewrite Action Egress Egress Interface Rewrite
Configuration Interface Action
Configuration
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
30
Configure Virtual LANs in Layer 2 VPNs
Valid Ingress-Egress Rewrite Combinations
Ingress Interface Ingress Interface Rewrite Action Egress Egress Interface Rewrite
Configuration Interface Action
Configuration
The following notations are used for the rewrite actions mentioned in the table:
• Translate 1-to-1 tag: Translates the outermost tag to another tag
• Translate 1-to-2 tags: Translates the outermost tag to two tags
• Translate 2-to-2 tags: Translates the outermost two tags to two other tags
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
31
Configure Virtual LANs in Layer 2 VPNs
Valid Ingress-Egress Rewrite Combinations
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
32
CHAPTER 4
Configure Link Bundles for Layer 2 VPNs
An ethernet link bundle is a group of one or more ports that are aggregated together and treated as a single
link. Each bundle has a single MAC, a single IP address, and a single configuration set (such as ACLs or
QoS).
The advantages of link bundling are:
• Redundancy - Because bundles have multiple links, the failure of a single link does not cause a loss of
connectivity.
• Increased bandwidth - On bundled interfaces traffic is forwarded over all available members of the bundle
aggregating individual port capacity.
There are two types of link bundling supported depending on the type of interface forming the bundle:
• Ethernet interfaces
• VLAN interfaces (bundle sub-interfaces)
For more information, see References for Configuring Link Bundles, on page 37.
This section describes the configuration of ethernet and VLAN link bundles for use in Layer 2 VPNs.
• Configure Gigabit Ethernet Link Bundle, on page 33
• Configure VLAN Bundle, on page 36
• References for Configuring Link Bundles, on page 37
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
33
Configure Link Bundles for Layer 2 VPNs
Configure Gigabit Ethernet Link Bundle
• A combination of 10G and 100G links is not supported in the same ethernet link bundle.
• MAC accounting is not supported on Ethernet link bundles.
• The maximum number of supported links in each ethernet link bundle is 32 .
• The maximum number of supported ethernet link bundles is 64 .
Configuration Example
To create a link bundle between two routers, you must complete the following configurations:
1. Create a bundle instance
2. Map physical interface (s) to the bundle.
For an Ethernet bundle to be active, you must perform the same configuration on both connection endpoints
of the bundle.
Configuration
/* Enter the global configuration mode and create the ethernet link bundle */
Router# configure
Router(config)# interface Bundle-Ether 3
Router(config-if)# ipv4 address 10.1.2.3 255.0.0.0
Router(config-if)# bundle maximum-active links 32 hot-standby
Router(config-if)# bundle minimum-active links 1
Router(config-if)# bundle minimum-active bandwidth 30000000
Router(config-if)# exit
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
34
Configure Link Bundles for Layer 2 VPNs
Configure Gigabit Ethernet Link Bundle
Running Configuration
Verification
Verify that interfaces forming the bundle are active and the status of the bundle is Up.
Router# show bundle bundle-ether 3
Tue Feb 4 18:24:25.313 UTC
Bundle-Ether1
Status: Up
Local links <active/standby/configured>: 3 / 0 / 3
Local bandwidth <effective/available>: 30000000 (30000000) kbps
MAC address (source): 1234.1234.1234 (Configured)
Inter-chassis link: No
Minimum active links / bandwidth: 1 / 1 kbps
Maximum active links: 32
Wait while timer: 2000 ms
Load balancing: Default
LACP: Not operational
Flap suppression timer: Off
Cisco extensions: Disabled
Non-revertive: Disabled
mLACP: Not configured
IPv4 BFD: Not configured
------------------------------------------------------------------------
Associated Commands
• bundle maximum-active links
• interface Bundle-Ether
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
35
Configure Link Bundles for Layer 2 VPNs
Configure VLAN Bundle
Configuration Example
To configure VLAN bundles, complete the following configurations:
• Create a bundle instance.
• Create a VLAN interface (bundle sub-interface).
• Map the physical interface(s) to the bundle.
For a VLAN bundle to be active, you must perform the same configuration on both end points of the VLAN
bundle.
Configuration
Running Configuration
configure
interface Bundle-Ether2
ipv4 address 50.0.0.1 255.255.255.0
mac-address 1212.1212.1212
bundle maximum-active links 32 hot-standby
bundle minimum-active links 1
bundle minimum-active bandwidth 30000000
!
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
36
Configure Link Bundles for Layer 2 VPNs
References for Configuring Link Bundles
interface Bundle-Ether2.201
ipv4 address 12.22.1.1 255.255.255.0
encapsulation dot1q 201
!
interface TenGigE0/0/0/14
bundle id 2 mode on
!
interface TenGigE0/0/0/15
bundle id 2 mode on
!
interface TenGigE0/0/0/16
bundle id 2 mode on
!
interface TenGigE0/0/0/17
bundle id 2 mode on
!
Verification
Verify that the VLAN status is UP.
Associated Commands
• bundle maximum-active links
• interface Bundle-Ether
• show bundle Bundle-Ether
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
37
Configure Link Bundles for Layer 2 VPNs
Characteristics of Link Bundles
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
38
Configure Link Bundles for Layer 2 VPNs
Link Aggregation Through LACP
This information is used to form the link aggregation group identifier (LAG ID). Links that share a
common LAG ID can be aggregated. Individual links have unique LAG IDs.
The system identifier distinguishes one router from another, and its uniqueness is guaranteed through
the use of a MAC address from the system. The bundle and link identifiers have significance only to the
router assigning them, which must guarantee that no two links have the same identifier, and that no two
bundles have the same identifier.
The information from the peer system is combined with the information from the local system to determine
the compatibility of the links configured to be members of a bundle.
Bundle MAC addresses in the routers come from a set of reserved MAC addresses in the backplane. This
MAC address stays with the bundle as long as the bundle interface exists. The bundle uses this MAC
address until the user configures a different MAC address. The bundle MAC address is used by all
member links when passing bundle traffic. Any unicast or multicast addresses set on the bundle are also
set on all the member links.
Note It is recommended that you avoid modifying the MAC address, because changes
in the MAC address can affect packet forwarding.
• EtherChannel—Cisco proprietary technology that allows the user to configure links to join a bundle, but
has no mechanisms to check whether the links in a bundle are compatible.
LACP transmits frames containing the local port state and the local view of the partner system’s state. These
frames are analyzed to ensure both systems are in agreement.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
39
Configure Link Bundles for Layer 2 VPNs
Link Aggregation Through LACP
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
40
CHAPTER 5
Configure Multipoint Layer 2 Services
This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services,
also called Virtual Private LAN Services (VPLS).
Note VPLS supports Layer 2 VPN technology and provides transparent multipoint Layer 2 connectivity for customers.
This approach enables service providers to host a multitude of new services such as broadcast TV and Layer
2 VPNs.
Note The loopback interface is not needed in all cases. For example, tunnel selection
does not need a loopback interface when Multipoint Layer 2 Services are directly
mapped to a TE tunnel.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
41
Configure Multipoint Layer 2 Services
Information About Implementing Multipoint Layer 2 Services
Note Multipoint Layer 2 services are also called as Virtual Private LAN Services.
Bridge Domain
The native bridge domain refers to a Layer 2 broadcast domain consisting of a set of physical or virtual ports
(including VFI). Data frames are switched within a bridge domain based on the destination MAC address.
Multicast, broadcast, and unknown destination unicast frames are flooded within the bridge domain. In addition,
the source MAC address learning is performed on all incoming frames on a bridge domain. A learned address
is aged out. Incoming frames are mapped to a bridge domain, based on either the ingress port or a combination
of both an ingress port and a MAC header field.
Pseudowires
A pseudowire is a point-to-point connection between pairs of PE routers. Its primary function is to emulate
services like Ethernet over an underlying core MPLS network through encapsulation into a common MPLS
format. By encapsulating services into a common MPLS format, a pseudowire allows carriers to converge
their services to an MPLS network.
l2vpn
bridge group bg1
bridge-domain l2vpn
interface TenGigE0/0/0/13.100
!
vfi 1
neighbor 192.0.2.1 pw-id 12345
pw-class mpls_csr
!
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
42
Configure Multipoint Layer 2 Services
Virtual Forwarding Instance
!
!
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
43
Configure Multipoint Layer 2 Services
Interoperability Between Cisco IOS XR and Cisco IOS on VPLS LDP Signaling
Interoperability Between Cisco IOS XR and Cisco IOS on VPLS LDP Signaling
The Cisco IOS Software encodes the NLRI length in the fist byte in bits format in the BGP Update message.
However, the Cisco IOS XR Software interprets the NLRI length in 2 bytes. Therefore, when the BGP neighbor
with VPLS-VPWS address family is configured between the IOS and the IOS XR, NLRI mismatch can happen,
leading to flapping between neighbors. To avoid this conflict, IOS supports prefix-length-size 2 command
that needs to be enabled for IOS to work with IOS XR. When the prefix-length-size 2 command is configured
in IOS, the NLRI length is encoded in bytes. This configuration is mandatory for IOS to work with IOS XR.
This is a sample IOS configuration with the prefix-length-size 2 command:
router bgp 1
address-family l2vpn vpls
neighbor 5.5.5.2 activate
neighbor 5.5.5.2 prefix-length-size 2 --------> NLRI length = 2 bytes
exit-address-family
Pseudowire Redundancy
Pseudowire redundancy allows you to configure a backup pseudowire in case the primary pseudowire fails.
When the primary pseudowire fails, the PE router can switch to the backup pseudowire. You can elect to have
the primary pseudowire resume operation after it becomes functional. The primary pseudowire fails when the
PE router fail or due to any network related outage.
Figure 3: Pseudowire Redundancy
Configuration
This section describes how you can configure pseudowire redundancy.
/* Configure PE1 */
Router# configure
Router(config)# l2vpn
Router(config-l2vpn)# xconnect group XCON1
Router(config-l2vpn-xc)# p2p xc1
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
44
Configure Multipoint Layer 2 Services
Running Configuration
Running Configuration
/* On PE1 */
!
l2vpn
xconnect group XCON1
p2p XCON1_P2P2
interface GigabitEthernet 0/1/0/0.1
neighbor ipv4 2.2.2.2 pw-id 1
backup neighbor 3.3.3.3 pw-id 1
!
/* On PE2 */
!
l2vpn
xconnect group XCON1
p2p XCON1_P2P2
interface GigabitEthernet 0/1/0/0.1
neighbor ipv4 1.1.1.1 pw-id 1
/* On PE3 */
!
l2vpn
xconnect group XCON1
p2p XCON1_P2P2
interface GigabitEthernet 0/1/0/0.1
neighbor ipv4 1.1.1.1 pw-id 1
Verification
Verify that the configured pseudowire redundancy is up.
/* On PE1 */
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
45
Configure Multipoint Layer 2 Services
Verification
/* On PE2 */
/* On PE3 */
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
46
Configure Multipoint Layer 2 Services
MAC Address-related Parameters
Note Static MAC move is not supported from one port, interface, or AC to another port, interface, or AC. For
example, if a static MAC is configured on AC1 (port 1) and then, if you send a packet with the same MAC
as source MAC on AC2 (port 2), then you can’t attach this MAC to AC2 as a dynamic MAC. Therefore, do
not send any packet with a MAC as any of the static MAC addresses configured.
The number of learned MAC addresses is limited through configurable per-port and per-bridge domain MAC
address limits.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
47
Configure Multipoint Layer 2 Services
MAC Address Limit
If hosts on a bridged network are likely to move, decrease the aging-time to enable the bridge to adapt to the
change quickly. If hosts do not transmit continuously, increase the aging time to record the dynamic entries
for a longer time, thus reducing the possibility of flooding when the hosts transmit again.
Note Though you can modify the MAC address limit under the bridge domain, due to hardware limitation, the
modification does not take effect.
Note By default, the LDP MAC Withdrawal feature is enabled on Cisco IOS XR.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
48
Configure Multipoint Layer 2 Services
Multipoint Layer 2 Services Configuration for Provider Edge-to-Provider Edge: Example
vfi 1
neighbor 10.1.1.1 pw-id 1
neighbor 10.3.3.3 pw-id 1
!
!
interface loopback 0
ipv4 address 10.2.2.2 255.255.255.255
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
49
Configure Multipoint Layer 2 Services
Displaying MAC Address Withdrawal Fields: Example
no ipv4 address
no ipv4 directed-broadcast
negotiation auto
no cdp enable
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
50
Configure Multipoint Layer 2 Services
Displaying MAC Address Withdrawal Fields: Example
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
51
Configure Multipoint Layer 2 Services
Bridging on IOS XR Trunk Interfaces: Example
Configuration Example
RP/0/RSP0/CPU0:router#config
RP/0/RSP0/CPU0:router(config)#interface Bundle-ether10
RP/0/RSP0/CPU0:router(config-if)#l2transport
RP/0/RSP0/CPU0:router(config-if-l2)#interface GigabitEthernet0/2/0/5
RP/0/RSP0/CPU0:router(config-if)#bundle id 10 mode active
RP/0/RSP0/CPU0:router(config-if)#interface GigabitEthernet0/2/0/6
RP/0/RSP0/CPU0:router(config-if)#bundle id 10 mode active
RP/0/RSP0/CPU0:router(config-if)#interface GigabitEthernet0/2/0/0
RP/0/RSP0/CPU0:router(config-if)#l2transport
RP/0/RSP0/CPU0:router(config-if-l2)#interface GigabitEthernet0/2/0/1
RP/0/RSP0/CPU0:router(config-if)#l2transport
RP/0/RSP0/CPU0:router(config-if-l2)#interface TenGigE0/1/0/2
RP/0/RSP0/CPU0:router(config-if)#l2transport
RP/0/RSP0/CPU0:router(config-if-l2)#l2vpn
RP/0/RSP0/CPU0:router(config-l2vpn)#bridge group examples
RP/0/RSP0/CPU0:router(config-l2vpn-bg)#bridge-domain test-switch
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#interface Bundle-ether10
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-ac)#exit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#interface GigabitEthernet0/2/0/0
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-ac)#exit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#interface GigabitEthernet0/2/0/1
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-ac)#exit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#interface TenGigE0/1/0/2
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-ac)#commit
RP/0/RSP0/CPU0:Jul 26 10:48:21.320 EDT: config[65751]: %MGBL-CONFIG-6-DB_COMMIT :
Configuration committed by user 'lab'. Use 'show configuration commit changes 1000000973'
to view the changes.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
52
Configure Multipoint Layer 2 Services
Bridging on IOS XR Trunk Interfaces: Example
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-ac)#end
RP/0/RSP0/CPU0:Jul 26 10:48:21.342 EDT: config[65751]: %MGBL-SYS-5-CONFIG_I : Configured
from console by lab
RP/0/RSP0/CPU0:router#show bundle Bundle-ether10
Bundle-Ether10
Status: Down
Local links <active/standby/configured>: 0 / 0 / 2
Local bandwidth <effective/available>: 0 (0) kbps
MAC address (source): 0024.f71e.22eb (Chassis pool)
Minimum active links / bandwidth: 1 / 1 kbps
Maximum active links: 64
Wait while timer: 2000 ms
LACP: Operational
Flap suppression timer: Off
mLACP: Not configured
IPv4 BFD: Not configured
RP/0/RSP0/CPU0:router#
RP/0/RSP0/CPU0:router#show l2vpn bridge-domain group examples
Bridge group: examples, bridge-domain: test-switch, id: 2000, state: up, ShgId: 0, MSTi: 0
Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslog
Filter MAC addresses: 0
ACs: 4 (1 up), VFIs: 0, PWs: 0 (0 up), PBBs: 0 (0 up)
List of ACs:
BE10, state: down, Static MAC addresses: 0
Gi0/2/0/0, state: up, Static MAC addresses: 0
Gi0/2/0/1, state: down, Static MAC addresses: 0
Te0/5/0/1, state: down, Static MAC addresses: 0
List of VFIs:
RP/0/RSP0/CPU0:router#
This table lists the configuration steps (actions) and the corresponding purpose for this example:
SUMMARY STEPS
1. configure
2. interface Bundle-ether10
3. l2transport
4. interface GigabitEthernet0/2/0/5
5. bundle id 10 mode active
6. interface GigabitEthernet0/2/0/6
7. bundle id 10 mode active
8. interface GigabitEthernet0/2/0/0
9. l2transport
10. interface GigabitEthernet0/2/0/1
11. l2transport
12. interface TenGigE0/1/0/2
13. l2transport
14. l2vpn
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
53
Configure Multipoint Layer 2 Services
Bridging on IOS XR Trunk Interfaces: Example
DETAILED STEPS
Step 1 configure
Enters global configuration mode.
Step 3 l2transport
Changes Bundle-ether10 from an L3 interface to an L2 interface.
Step 9 l2transport
Change GigabitEthernet0/2/0/0 from an L3 interface to an L2 interface.
Step 11 l2transport
Change GigabitEthernet0/2/0/1 from an L3 interface to an L2 interface.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
54
Configure Multipoint Layer 2 Services
Bridging on IOS XR Trunk Interfaces: Example
Step 13 l2transport
Changes TenGigE0/1/0/2 from an L3 interface to an L2 interface.
Step 14 l2vpn
Enters L2VPN configuration mode.
Step 18 exit
Exits bridge domain AC configuration submode, allowing next AC to be configured.
Step 20 exit
Exits bridge domain AC configuration submode, allowing next AC to be configured.
Step 22 exit
Exits bridge domain AC configuration submode, allowing next AC to be configured.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
55
Configure Multipoint Layer 2 Services
Bridging on Ethernet Flow Points: Example
Configuration Example
RP/0/RSP1/CPU0:router#configure
RP/0/RSP1/CPU0:router(config)#interface Bundle-ether10
RP/0/RSP1/CPU0:router(config-if)#interface Bundle-ether10.999 l2transport
RP/0/RSP1/CPU0:router(config-subif)#encapsulation dot1q 999
RP/0/RSP1/CPU0:router(config-subif)#interface GigabitEthernet0/6/0/5
RP/0/RSP1/CPU0:router(config-if)#bundle id 10 mode active
RP/0/RSP1/CPU0:router(config-if)#interface GigabitEthernet0/6/0/6
RP/0/RSP1/CPU0:router(config-if)#bundle id 10 mode active
RP/0/RSP1/CPU0:router(config-if)#interface GigabitEthernet0/6/0/7.999 l2transport
RP/0/RSP1/CPU0:router(config-subif)#encapsulation dot1q 999
RP/0/RSP1/CPU0:router(config-subif)#interface TenGigE0/1/0/2.999 l2transport
RP/0/RSP1/CPU0:router(config-subif)#encapsulation dot1q 999
RP/0/RSP1/CPU0:router(config-subif)#l2vpn
RP/0/RSP1/CPU0:router(config-l2vpn)#bridge group examples
RP/0/RSP1/CPU0:router(config-l2vpn-bg)#bridge-domain test-efp
RP/0/RSP1/CPU0:router(config-l2vpn-bg-bd)#interface Bundle-ether10.999
RP/0/RSP1/CPU0:router(config-l2vpn-bg-bd-ac)#exit
RP/0/RSP1/CPU0:router(config-l2vpn-bg-bd)#interface GigabitEthernet0/6/0/7.999
RP/0/RSP1/CPU0:router(config-l2vpn-bg-bd-ac)#exit
RP/0/RSP1/CPU0:router(config-l2vpn-bg-bd)#interface TenGigE0/1/0/2.999
RP/0/RSP1/CPU0:router(config-l2vpn-bg-bd-ac)#commit
RP/0/RSP1/CPU0:router(config-l2vpn-bg-bd-ac)#end
RP/0/RSP1/CPU0:router#
RP/0/RSP1/CPU0:router#show l2vpn bridge group examples
Fri Jul 23 21:56:34.473 UTC Bridge group: examples, bridge-domain: test-efp, id: 0, state:
up, ShgId: 0, MSTi: 0
Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslog
Filter MAC addresses: 0
ACs: 3 (0 up), VFIs: 0, PWs: 0 (0 up), PBBs: 0 (0 up)
List of ACs:
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
56
Configure Multipoint Layer 2 Services
Bridging on Ethernet Flow Points: Example
This table lists the configuration steps (actions) and the corresponding purpose for this example:
SUMMARY STEPS
1. configure
2. interface Bundle-ether10
3. interface Bundle-ether10.999 l2transport
4. encapsulation dot1q 999
5. interface GigabitEthernet0/6/0/5
6. bundle id 10 mode active
7. interface GigabitEthernet0/6/0/6
8. bundle id 10 mode active
9. interface GigabitEthernet0/6/0/7.999 l2transport
10. encapsulation dot1q 999
11. interface TenGigE0/1/0/2.999 l2transport
12. encapsulation dot1q 999
13. l2vpn
14. bridge group examples
15. bridge-domain test-efp
16. interface Bundle-ether10.999
17. exit
18. interface GigabitEthernet0/6/0/7.999
19. exit
20. interface TenGigE0/1/0/2.999
21. Use the commit or end command.
DETAILED STEPS
Step 1 configure
Enters global configuration mode.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
57
Configure Multipoint Layer 2 Services
Bridging on Ethernet Flow Points: Example
Step 13 l2vpn
Enters L2VPN configuration mode.
Step 17 exit
Exits bridge domain AC configuration submode, allowing next AC to be configured.
Step 19 exit
Exits bridge domain AC configuration submode, allowing next AC to be configured.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
58
Configure Multipoint Layer 2 Services
Bridging on Ethernet Flow Points: Example
commit - Saves the configuration changes and remains within the configuration session.
end - Prompts user to take one of these actions:
• Yes - Saves configuration changes and exits the configuration session.
• No - Exits the configuration session without committing the configuration changes.
• Cancel - Remains in the configuration mode, without committing the configuration changes.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
59
Configure Multipoint Layer 2 Services
Bridging on Ethernet Flow Points: Example
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
60
CHAPTER 6
Configure L2VPN Autodiscovery and Signaling
This chapter describes the L2VPN Autodiscovery and Signaling feature which enables the discovery of remote
Provider Edge (PE) routers and the associated signaling in order to provision the pseudowires.
• L2VPN Autodiscovery and Signaling, on page 61
• BGP-based VPLS Autodiscovery, on page 61
• BGP-based VPWS Autodiscovery, on page 66
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
61
Configure L2VPN Autodiscovery and Signaling
Configuring BGP and LDP for BGP-based Autodiscovery
• A means for a PE to learn the pseudowire label expected by a given remote PE for a given VPLS. This
process is known as signaling.
The BGP Network Layer Reachability Information (NLRI) takes care of the above two components
simultaneously. The NLRI generated by a given PE contains the necessary information required by any other
PE. These components enable the automatic setting up of a full mesh of pseudowires for each VPLS without
having to manually configure those pseudowires on each PE.
Figure 4: Discovery and Signaling Attributes
Configuration Example:
Router(config)# interface loopback-interface
Router(config-if)# ipv4 address ipv4-address subnet-mask
Router(config-if)# exit
Router(config)# mpls ldp
Router(config-ldp)# router-id ipv4-address
Router(config-ldp-if)# interface interface-name
Router(config-ldp-if)# exit
Router(config-ldp)# exit
Router(config)# router bgp as-number
Router(config-bgp)# address-family l2vpn vpls-vpws
Router(config-bgp-af)# exit
Router(config-bgp)# neighbor loopback ipv4 address of neighbor
Router(config-bgp-nbr)# remote-as remote-as-number
Router(config-bgp-nbr)# update-source loopback-interface
Router(config-bgp-nbr)# address-family l2vpn vpls-vpws
Running Configuration
The following figure illustrates an example of LDP and BGP network topology that is required for enabling
BGP based autodiscovery.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
62
Configure L2VPN Autodiscovery and Signaling
Configuring BGP-based VPLS Autodiscovery with BGP Signaling
Configuration at PE1:
interface Loopback1
ipv4 address 1.1.1.10 255.255.255.255
!
mpls ldp
router-id 1.1.1.1
interface GigabitEthernet0/1/0/0
!
router bgp 120
address-family l2vpn vpls-vpws
!
neighbor 2.2.2.20
remote-as 120
update-source Loopback1
address-family l2vpn vpls-vpws
Configuration at PE2:
interface Loopback1
ipv4 address 2.2.2.20 255.255.255.255
!
mpls ldp
router-id 2.2.2.2
interface GigabitEthernt0/1/0/0
!
router bgp 120
address-family l2vpn vpls-vpws
!
neighbor 1.1.1.10
remote-as 120
update-source Loopback1
address-family l2vpn vpls-vpws
Configuration Example:
Router(config)# l2vpn
Router(config-l2vpn)# bridge group bridge-group-name
Router(config-l2vpn-bg)# bridge-domain bridge-domain-name
Router(config-l2vpn-bg-bd)# vfi vfi-name
Router(config-l2vpn-bg-bd-vfi)# autodiscovery bgp
Router(config-l2vpn-bg-bd-vfi-ad)# vpn-id vpn-id
Router(config-l2vpn-bg-bd-vfi-ad)# rd auto
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
63
Configure L2VPN Autodiscovery and Signaling
BGP-based VPLS Autodiscovery with LDP Signaling
Running Configuration:
Figure 6: BGP-based VPLS Autodiscovery with BGP signaling
Configuration at PE1:
l2vpn
bridge group gr1
bridge-domain bd1
interface GigabitEthernet0/1/0/1.1
vfi vf1
! AD independent VFI attributes
vpn-id 100
! Auto-discovery attributes
autodiscovery bgp
rd auto
route-target 2.2.2.2:100
! Signaling attributes
signaling-protocol bgp
ve-id 3
Configuration at PE2:
l2vpn
bridge group gr1
bridge-domain bd1
interface GigabitEthernet0/1/0/2.1
vfi vf1
! AD independent VFI attributes
vpn-id 100
! Auto-discovery attributes
autodiscovery bgp
rd auto
route-target 2.2.2.2:100
! Signaling attributes
signaling-protocol bgp
ve-id 5
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
64
Configure L2VPN Autodiscovery and Signaling
Configuring BGP-based VPLS Autodiscovery with LDP Signaling
The signaling of pseudowires between provider edge devices, uses targeted LDP sessions to exchange label
values and attributes. Forwarding Equivalence Class (FEC) 129 is used for the signaling. The information
carried by FEC 129 includes the VPLS ID, the Target Attachment Individual Identifier (TAII) and the Source
Attachment Individual Identifier (SAII).
The LDP advertisement also contains the inner label or VPLS label that is expected for the incoming traffic
over the pseudowire. This enables the LDP peer to identify the VPLS instance with which the pseudowire is
to be associated and the label value that it is expected to use when sending traffic on that pseudowire.
Figure 7: Discovery and Signaling Attributes
Configuration Example:
The below code block shows the basic configuration steps required for BGP-based VPLS autodiscovery with
LDP Signaling.
Router(config)# l2vpn
Router(config-l2vpn)# bridge group {bridge group name}
Router(config-l2vpn-bg)# bridge-domain {bridge domain name}
Router(config-l2vpn-bg-bd)# vfi {vfi name}
Router(config-l2vpn-bg-bd-vfi)# autodiscovery bgp
Router(config-l2vpn-bg-bd-vfi-ad)# vpn-id 10
Router(config-l2vpn-bg-bd-vfi-ad)# rd auto
Router(config-l2vpn-bg-bd-vfi-ad)# route-target 1.1.1.1:100
Router(config-l2vpn-bg-bd-vfi-ad)# signaling-protocol ldp
Router(config-l2vpn-bg-bd-vfi-ad-sig)# vpls-id 120:200
Router(config-l2vpn-bg-bd-vfi-ad-sig)# commit
Running Configuration:
The following figure illustrates an example of configuring VPLS with BGP autodiscovery (AD) and LDP
Signaling.
Figure 8: VPLS with BGP autodiscovery and LDP signaling
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
65
Configure L2VPN Autodiscovery and Signaling
BGP-based VPWS Autodiscovery
Configuration at PE1:
l2vpn
router-id 10.10.10.10
bridge group bg1
bridge-domain bd1
vfi vf1
vpn-id 100
autodiscovery bgp
rd 1:100
router-target 12:12
signaling-protocol ldp
vpls-id 120:200
Configuration at PE2:
l2vpn
router-id 20.20.20.20
bridge group bg1
bridge-domain bd1
vfi vf1
vpn-id 100
autodiscovery bgp
rd 2:200
router-target 12:12
signaling-protocol ldp
vpls-id 120:100
Configuration Example:
The below code block shows the basic configuration steps required for BGP-based VPWS autodiscovery with
BGP Signaling.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
66
Configure L2VPN Autodiscovery and Signaling
Configuring BGP-based VPWS Autodiscovery with BGP Signaling
Router(config)# l2vpn
Router(config-l2vpn)# xconnect group {xconnect group name}
Router(config-l2vpn-xc)# mp2mp {instance name}
Router(config-l2vpn-xc-mp2mp)# vpn-id {vpn-id}
Router(config-l2vpn-xc-mp2mp)# l2-encapsulation vlan
Router(config-l2vpn-xc-mp2mp)# autodiscovery bgp
Router(config-l2vpn-xc-mp2mp-ad)# rd auto
Router(config-l2vpn-xc-mp2mp-ad)# route-target 2.2.2.2:100
Router(config-l2vpn-xc-mp2mp-ad)# signaling-protocol bgp
Router(config-l2vpn-xc-mp2mp-ad-sig)# ce-id 1
Router(config-l2vpn-xc-mp2mp-ad-sig-ce)# interface GigabitEthernet0/1/0/1.1 remote-ce-id 2
Running Configuration:
The following figure illustrates an example of configuring VPWS with BGP autodiscovery and BGP Signaling.
Figure 9: VPWS with BGP autodiscovery and BGP signaling
Configuration at PE1:
l2vpn
xconnect group gr1
mp2mp mp1
vpn-id 100
l2 encapsulation vlan
autodiscovery bgp
rd auto
route-target 2.2.2.2:100
! Signaling attributes
signaling-protocol bgp
ce-id 1
interface GigabitEthernet0/1/0/1.1 remote-ce-id 2
Configuration at PE2:
l2vpn
xconnect group gr1
mp2mp mp1
vpn-id 100
l2 encapsulation vlan
autodiscovery bgp
rd auto
route-target 2.2.2.2:100
! Signaling attributes
signaling-protocol bgp
ce-id 2
interface GigabitEthernet0/1/0/2.1 remote-ce-id 1
Verification:
PE1:
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
67
Configure L2VPN Autodiscovery and Signaling
Configuring BGP-based VPWS Autodiscovery with BGP Signaling
Status Vector: 9f ff
Status Vector: 7f ff
L2 Encapsulation: VLAN
2.2.2.2:100
2.2.2.2:100
Signaling protocol:BGP
CE Range:10
….
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
68
Configure L2VPN Autodiscovery and Signaling
Configuring BGP-based VPWS Autodiscovery with BGP Signaling
CE-ID 1 2
...
i - internal, S stale
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
69
Configure L2VPN Autodiscovery and Signaling
Configuring BGP-based VPWS Autodiscovery with BGP Signaling
PE2:
PE2# show l2vpn discovery xconnect
Status Vector: 7f ff
Status Vector: 7f ff
Status Vector: 9f ff
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
70
Configure L2VPN Autodiscovery and Signaling
Configuring BGP-based VPWS Autodiscovery with BGP Signaling
L2 Encapsulation: VLAN
2.2.2.2:100
2.2.2.2:100
Signaling protocol:BGP
CE Range:10
...
CE-ID 2 1
...
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
71
Configure L2VPN Autodiscovery and Signaling
BGP-based VPWS Autodiscovery with LDP Signaling
i - internal, S stale
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
72
Configure L2VPN Autodiscovery and Signaling
Configuring BGP-basedased VPWS Autodiscovery with LDP Signaling
Configuration Example:
The below code block shows the basic configuration steps required for BGP based VPWS autodiscovery with
LDP Signaling.
Router(config)# l2vpn
Router(config-l2vpn)# xconnect group {xconnect group name}
Router(config-l2vpn-xc)# mp2mp {instance name}
Router(config-l2vpn-xc-mp2mp)# vpn-id {vpn-id}
Router(config-l2vpn-xc-mp2mp)# l2-encapsulation vlan
Router(config-l2vpn-xc-mp2mp)# autodiscovery bgp
Router(config-l2vpn-xc-mp2mp-ad)# rd auto
Router(config-l2vpn-xc-mp2mp-ad)# route-target 2.2.2.2:100
Router(config-l2vpn-xc-mp2mp-ad)# signaling-protocol ldp
Router(config-l2vpn-xc-mp2mp-ad-sig)# ce-id 1
Router(config-l2vpn-xc-mp2mp-ad-sig-ce)# interface GigabitEthernet0/1/0/1.1 remote-ce-id 2
Running Configuration:
The following figure illustrates an example of configuring VPWS with BGP autodiscovery and LDP Signaling.
Figure 10: VPWS with BGP autodiscovery and LDP signaling
Configuration at PE1:
l2vpn
xconnect group gr1
mp2mp mp1
vpn-id 100
l2 encapsulation vlan
autodiscovery bgp
rd auto
route-target 2.2.2.2:100
! Signaling attributes
signaling-protocol ldp
ce-id 1
interface GigabitEthernet0/1/0/1.1 remote-ce-id 2
Configuration at PE2:
l2vpn
xconnect group gr1
mp2mp mp1
vpn-id 100
l2 encapsulation vlan
autodiscovery bgp
rd auto
route-target 2.2.2.2:100
! Signaling attributes
signaling-protocol ldp
ce-id 2
interface GigabitEthernet0/1/0/2.1 remote-ce-id 1
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
73
Configure L2VPN Autodiscovery and Signaling
Configuring BGP-basedased VPWS Autodiscovery with LDP Signaling
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
74
CHAPTER 7
Storm Control
Storm Control provides Layer 2 port security under a Virtual Private LAN Services (VPLS) bridge by preventing
excess traffic from disrupting the bridge. This module describes how to configure traffic storm control.
• Storm Control, on page 75
• Supported Traffic Types for Storm Control, on page 76
• Storm Control Thresholds , on page 76
• Restrictions, on page 76
• Configure Storm Control, on page 76
• Related Topics, on page 77
• Associated Commands, on page 77
Storm Control
A traffic storm occurs when packets flood a VPLS bridge, creating excessive traffic and degrading network
performance. Storm control prevents VPLS bridge disruption by suppressing traffic when the number of
packets reaches configured threshold levels. You can configure separate threshold levels for different types
of traffic on an access circuit (AC) under a VPLS bridge.
Storm control monitors incoming traffic levels on a port and drops traffic when the number of packets reaches
the configured threshold level during any 1-second interval. The 1-second interval is set in the hardware and
is not configurable. On Cisco NCS 5000 Series Router, the monitoring interval is always one second. The
number of packets allowed to pass during this interval is configurable, per port, per traffic type. During this
interval, it compares the traffic level with the storm control level that the customer configures. When the
incoming traffic reaches the storm control level configured on the bridge port, storm control drops traffic until
the end of storm control interval. At the beginning of a new interval, traffic of the specified type is allowed
to pass on the port. The thresholds are configured using a packets-per-second (pps) and kilobit-per-second
(kbps) rate.
Storm control has little impact on router performance. Packets passing through ports are counted regardless
of whether the feature is enabled. Additional counting occurs only for the drop counters, which monitor
dropped packets. Storm control counts the number of packets dropped per port. The drop counters are cumulative
for all traffic types.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
75
Storm Control
Supported Traffic Types for Storm Control
Restrictions
• Storm control parameters must be configured only at the bridge-domain level. Interface or AC level
configurations are not supported.
• Storm control rates can be applied at the physical port level and not at the sub-interface level. Hence,
the same storm control rates are applied to the sub-interfaces on the given physical port.
• Storm control is not supported for forwarding pseudowires (VFI PWs).
• No alarms are generated when packets are dropped.
• Only kbps rate is supported by hardware. Though the pps configuration is allowed, it is converted to
kbps. The pps rate is calculated as 1 pps = 8 kbps.
Configuration Example
RP/0/RSP0/CPU0:router# configure
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
76
Storm Control
Related Topics
RP/0/RSP0/CPU0:router(config)# l2vpn
RP/0/RSP0/CPU0:router(config-l2vpn)# bridge group csco
RP/0/RSP0/CPU0:router(config-l2vpn-bg)# bridge-domain abc
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# interface GigabitEthernet0/1/0/0.100
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-ac)# storm-control broadcast kbps 4500
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-ac)# commit
Running Configuration
configure
l2vpn
bridge group csco
bridge-domain abc
interface GigabitEthernet0/1/0/0.100
storm-control broadcast kbps 4500
!
Related Topics
• Storm Control, on page 75
• Supported Traffic Types for Storm Control, on page 76
Associated Commands
• storm-control
Related Topics
• Storm Control, on page 75
• Supported Traffic Types for Storm Control, on page 76
Associated Commands
• storm-control
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
77
Storm Control
Associated Commands
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
78
CHAPTER 8
Configure Multiple Spanning Tree Protocol
This chapter introduces you to Multiple Spanning Tree Protocol (MSTP) which is one of the variants of
Spanning Tree Protocol (STP) and describes how you can configure the MSTP feature.
• Overview of Spanning Tree Protocol, on page 79
• Overview of MSTP, on page 80
• MSTP Support on Cisco NCS 5000 Series Routers, on page 80
• Configuring MSTP, on page 82
• Configuring MSTP BPDU Guard, on page 84
• References for Spanning Tree Protocol, on page 86
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
79
Configure Multiple Spanning Tree Protocol
Overview of MSTP
• The only type of STP that is supported on Cisco NCS 5000 Series Routers is Multiple Spanning Tree
Protocol (MSTP).
• Per vlan Spanning Tree(PVST/PVST+/PVRST) is not supported on Cisco NCS 5000 Series Routers.
• Access gateway feature is not supported.
Overview of MSTP
The Multiple Spanning Tree Protocol (MSTP) is an STP variant that allows multiple and independent spanning
trees to be created over the same physical network. The parameters for each spanning tree can be configured
separately, so as to cause a different network devices to be selected as the root bridge or different paths to be
selected to form the loop-free topology. Consequently, a given physical interface can be blocked for some of
the spanning trees and unblocked for others.
Having set up multiple spanning tree instances, the set of VLANs in use can be partitioned among them; for
example, VLANs 1 - 100 can be assigned to spanning tree instance 1, VLANs 101 - 200 can be assigned to
spanning tree instance 2, VLANs 201 - 300 can be assigned to spanning tree instance 3, and so on. Since each
spanning tree has a different active topology with different active links, this has the effect of dividing the data
traffic among the available redundant links based on the VLAN—a form of load balancing.
Note In order to enable the MSTP BPDU Guard feature for an interface, the command portfast bpduguard must
be configured on it.
Port Fast
The Port Fast feature manage the ports at the edge of the switched Ethernet network. For devices that only
have one link to the switched network (typically host devices), there is no need to run MSTP, as there is only
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
80
Configure Multiple Spanning Tree Protocol
Flush Containment
one available path. Furthermore, it is undesirable to trigger topology changes (and resultant MAC flushes)
when the single link fails or is restored, as there is no alternative path.
By default, MSTP monitors ports where no BPDUs are received, and after a timeout, places them into edge
mode whereby they do not participate in MSTP. When portfast is explicitly configured on an interface, MSTP
considers that interface to be an edge port and removes it from consideration when calculating the spanning
tree. And hence the convergence time for the whole network is improved when portfast is configured.
Note MSTP BPDU Guard feature is supported by configuring interfaces in port fast mode. BPDU guard feature
will error-disable the port on receiving BPDU packets.
Flush Containment
Flush containment is a Cisco feature that helps prevent unnecessary MAC flushes due to unrelated topology
changes in other areas of a network. This is best illustrated by example. The following figure shows a network
containing four devices. Two VLANs are in use: VLAN 1 is only used on device D, while VLAN 2 spans
devices A, B and C. The two VLANs are in the same spanning tree instance, but do not share any links.
Figure 11: Flush Containment
If the link AB goes down, then in normal operation, as C brings up its blocked port, it sends out a topology
change notification on all other interfaces, including towards D. This causes a MAC flush to occur for VLAN
1, even though the topology change which has taken place only affects VLAN 2.
Flush containment helps deal with this problem by preventing topology change notifications from being sent
on interfaces on which no VLANs are configured for the MSTI in question. In the example network this would
mean no topology change notifications would be sent from C to D, and the MAC flushes which take place
would be confined to the right hand side of the network.
Note Flush containment is enabled by default, but can be disabled by configuration, thus restoring the behavior
described in the IEEE 802.1Q standard.
Bringup Delay
Bringup delay is a Cisco feature that stops MSTP from considering an interface when calculating the spanning
tree, if the interface is not yet ready to forward traffic. This is useful when a line card first boots up, as the
system may declare that the interfaces on that card are Up before the dataplane is fully ready to forward traffic.
According to the standard, MSTP considers the interfaces as soon as they are declared Up, and this may cause
it to move other interfaces into the blocking state if the new interfaces are selected instead.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
81
Configure Multiple Spanning Tree Protocol
Configuring MSTP
Bringup delay solves this problem by adding a configurable delay period which occurs as interfaces that are
configured with MSTP first come into existence. Until this delay period ends, the interfaces remain in blocking
state, and are not considered when calculating the spanning tree.
Bringup delay only takes place when interfaces which are already configured with MSTP are created, for
example, on a card reload. No delay takes place if an interface which already exists is later configured with
MSTP.
Configuring MSTP
The different steps involved in configuring MSTP are as follows:
1. Configure VLAN interfaces
Router# configure
Router(config)# interface TenGigE0/0/0/2.1001 l2transport
Router(config-subif)# encapsulation dot1q 1001
Router(config)# interface TenGigE0/0/0/3.1001 l2transport
Router(config-subif)# encapsulation dot1q 1001
Router(config)# interface TenGigE0/0/0/14.1001 l2transport
Router(config-subif)# encapsulation dot1q 1001
Router(config)# interface TenGigE0/0/0/2.1021 l2transport
Router(config-subif)# encapsulation dot1q 1021
Router(config)# interface TenGigE0/0/0/3.1021 l2transport
Router(config-subif)# encapsulation dot1q 1021
Router(config)# interface TenGigE0/0/0/14.1021 l2transport
Router(config-subif)# encapsulation dot1q 1021
Router(config-subif)# commit
2. Configure L2VPN bridge-domains with the VLAN interfaces configured in the previous step.
Router# configure
Router(config)# l2vpn bridge group mstp
Router(config-l2vpn-bg)# bridge-domain mstp1001
Router(config-l2vpn-bg-bd)# int TenGigE 0/0/0/2.1001
Router(config-l2vpn-bg-bd-ac)# exit
Router(config-l2vpn-bg-bd)# int TenGigE 0/0/0/3.1001
Router(config-l2vpn-bg-bd-ac)# exit
Router(config-l2vpn-bg-bd)# int TenGigE 0/0/0/14.1001
Router(config-l2vpn-bg-bd-ac)# exit
Router(config-l2vpn-bg-bd)# exit
Router(config-l2vpn-bg)# exit
Router(config-l2vpn-bg)# bridge-domain mstp1021
Router(config-l2vpn-bg-bd)# int TenGigE 0/0/0/2.1021
Router(config-l2vpn-bg-bd-ac)# exit
Router(config-l2vpn-bg-bd)# int TenGigE 0/0/0/3.1021
Router(config-l2vpn-bg-bd-ac)# exit
Router(config-l2vpn-bg-bd)# int TenGigE 0/0/0/14.1021
Router(config-l2vpn-bg-bd-ac)# commit
3. Configure MSTP.
Router# configure
Router(config)# spanning-tree mst abc
Router(config-mstp)# name mstp1
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
82
Configure Multiple Spanning Tree Protocol
Running Configuration for MSTP
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
83
Configure Multiple Spanning Tree Protocol
Verification for MSTP
instance 1021
vlan-ids 1021-1040
!
interface TenGigE0/0/0/2
!
interface TenGigE0/0/0/3
!
interface TenGigE0/0/0/14
MSTI 121:
Router# configure
Router(config)# l2vpn bridge group bg1
Router(config-l2vpn-bg)# bridge-domain bd1
Router(config-l2vpn-bg-bd)# int TenGigE 0/0/0/7
Router(config-l2vpn-bg-bd-ac)# root
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
84
Configure Multiple Spanning Tree Protocol
Running Configuration with MSTP BPDU Guard
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
85
Configure Multiple Spanning Tree Protocol
References for Spanning Tree Protocol
STP Operation
All variants of STP operate in a similar fashion: STP frames (known as bridge protocol data units (BPDUs))
are exchanged at regular intervals over Layer 2 LAN segments, between network devices participating in
STP. Such network devices do not forward these frames, but use the information to construct a loop free
spanning tree.
The spanning tree is constructed by first selecting a device which is the root of the spanning tree (known as
the root bridge), and then by determining a loop free path from the root bridge to every other device in the
network. Redundant paths are disabled by setting the appropriate ports into a blocked state, where STP frames
can still be exchanged but data traffic is never forwarded. If a network segment fails and a redundant path
exists, the STP protocol recalculates the spanning tree topology and activates the redundant path, by unblocking
the appropriate ports.
The selection of the root bridge within a STP network is determined by the lowest Bridge ID which is a
combination of configured bridge priority and embedded mac address of each device. The device with the
lowest priority, or with equal lowest priority but the lowest MAC address is selected as the root bridge.
The selection of the active path among a set of redundant paths is determined primarily by the port path cost.
The port path cost represents the cost of transiting between that port and the root bridge - the further the port
is from the root bridge, the higher the cost. The cost is incremented for each link in the path, by an amount
that is (by default) dependent on the media speed. Where two paths from a given LAN segment have an equal
cost, the selection is further determined by the lowest bridge ID of the attached devices, and in the case of
two attachments to the same device, by the configured port priority and port ID of the neighboring attached
ports.
Once the active paths have been selected, any ports that do not form part of the active topology are moved to
the blocking state.
Topology Changes
Network devices in a switched LAN perform MAC learning; that is, they use received data traffic to associate
unicast MAC addresses with the interface out of which frames destined for that MAC address should be sent.
If STP is used, then a recalculation of the spanning tree (for example, following a failure in the network) can
invalidate this learned information. The protocol therefore includes a mechanism to notify topology changes
around the network, so that the stale information can be removed (flushed) and new information can be learned
based on the new topology.
A Topology Change notification is sent whenever STP moves a port from the blocking state to the forwarding
state. When it is received, the receiving device flushes the MAC learning entries for all ports that are not
blocked other than the one where the notification was received, and also sends its own topology change
notification out of those ports. In this way, it is guaranteed that stale information is removed from all the
devices in the network.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
86
Configure Multiple Spanning Tree Protocol
Variants of STP
Variants of STP
There are many variants of the Spanning Tree Protocol:
• Legacy STP (STP)—The original STP protocol was defined in IEEE 802.1D-1998. This creates a single
spanning tree which is used for all VLANs and most of the convergence is timer-based.
• Rapid STP (RSTP)—This is an enhancement defined in IEEE 802.1D-2004 to provide more event-based,
and hence faster, convergence. However, it still creates a single spanning tree for all VLANs.
• Multiple STP (MSTP)—A further enhancement was defined in IEEE 802.1Q-2005. This allows multiple
spanning tree instances to be created over the same physical topology. By assigning different VLANs
to the different spanning tree instances, data traffic can be load-balanced over different physical links.
The number of different spanning tree instances that can be created is restricted to a much smaller number
than the number of possible VLANs; however, multiple VLANs can be assigned to the same spanning
tree instance. The BPDUs used to exchange MSTP information are always sent untagged; the VLAN
and spanning tree instance data is encoded inside the BPDU.
• Per-Vlan STP (PVST)—This is an alternative mechanism for creating multiple spanning trees; it was
developed by Cisco before the standardization of MSTP. Using PVST, a separate spanning tree is created
for each VLAN. There are two variants: PVST+ (based on legacy STP), and PVRST (based on RSTP).
At a packet level, the separation of the spanning trees is achieved by sending standard STP or RSTP
BPDUs, tagged with the appropriate VLAN tag.
• Per-Vlan Rapid Spanning Tree (PVRST)— This feature is the IEEE 802.1w (RSTP) standard implemented
per VLAN, and is also known as Rapid PVST or PVST+. A single instance of STP runs on each configured
VLAN (if you do not manually disable STP). Each Rapid PVST+ instance on a VLAN has a single root
switch. You can enable and disable STP on a per-VLAN basis when you are running Rapid PVST+.
PVRST uses point-to-point wiring to provide rapid convergence of the spanning tree. The spanning tree
reconfiguration can occur in less than one second with PVRST (in contrast to 50 seconds with the default
settings in the 802.1D STP).
• Resilient Ethernet Protocol (REP)— This is a Cisco-proprietary protocol for providing resiliency in rings.
It is included for completeness, as it provides MSTP compatibility mode, using which, it interoperates
with an MSTP peer.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
87
Configure Multiple Spanning Tree Protocol
Variants of STP
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
88
CHAPTER 9
References
This section provides additional information on understanding and implementing Layer 2 VPNs.
• Gigabit Ethernet Protocol Standards, on page 89
• Carrier Ethernet Model References, on page 89
• Default Configuration Values for Gigabit Ethernet and 10-Gigabit Ethernet, on page 91
• References for Configuring Link Bundles, on page 92
• Ethernet standards
• Ethernet II framing also known as DIX
• IEEE 802.3 framing also includes LLC and LLC/SNAP protocol frame formats
• IEEE 802.1q VLAN tagging
• IEEE 802.1ad Provider Bridges
For more information, see Carrier Ethernet Model References, on page 89.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
89
References
Carrier Ethernet Model References
Ethernet MTU
The Ethernet Maximum Transmission Unit (MTU) is the size of the largest frame, minus the 4-byte Frame
Check Sequence (FCS), that can be transmitted on the Ethernet network. Every physical network along the
destination of a packet can have a different MTU.
Cisco NCS 5000 Series Routers support two types of frame forwarding processes:
• Fragmentation for IPV4 packets—In this process, IPv4 packets are fragmented as necessary to fit within
the MTU of the next-hop physical network.
• MTU discovery process determines largest packet size—This process is available for all IPV6 devices,
and for originating IPv4 devices. In this process, the originating IP device determines the size of the
largest IPv6 or IPV4 packet that can be sent without being fragmented. The largest packet is equal to the
smallest MTU of any network between the IP source and the IP destination devices. If a packet is larger
than the smallest MTU of all the networks in its path, that packet will be fragmented as necessary. This
process ensures that the originating device does not send an IP packet that is too large.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
90
References
Default Configuration Values for Gigabit Ethernet and 10-Gigabit Ethernet
Jumbo frame support is automatically enable for frames that exceed the standard frame size. The default value
is 1514 for standard frames and 1518 for 802.1Q tagged frames. These numbers exclude the 4-byte FCS.
Note You must use the shutdown command to bring an interface administratively down. The interface default is
no shutdown. When a modular services card is first inserted into the router, if there is no established
preconfiguration for it, the configuration manager adds a shutdown item to its configuration. This shutdown
can be removed only be entering the no shutdown command.
Table 5: Gigabit Ethernet and 10-Gigabit Ethernet Modular Services Card Default Configuration Values
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
91
References
References for Configuring Link Bundles
1. The restrictions are applicable to L2 main interface, L2 subinterface, L3 main interface, interflex L2
interface etc.
2. burned-in address
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
92
References
Methods of Forming Bundles of Ethernet Interfaces
• Multicast traffic is load balanced over the members of a bundle. For a given flow, internal processes
select the member link and all traffic for that flow is sent over that member.
This information is used to form the link aggregation group identifier (LAG ID). Links that share a
common LAG ID can be aggregated. Individual links have unique LAG IDs.
The system identifier distinguishes one router from another, and its uniqueness is guaranteed through
the use of a MAC address from the system. The bundle and link identifiers have significance only to the
router assigning them, which must guarantee that no two links have the same identifier, and that no two
bundles have the same identifier.
The information from the peer system is combined with the information from the local system to determine
the compatibility of the links configured to be members of a bundle.
Bundle MAC addresses in the routers come from a set of reserved MAC addresses in the backplane. This
MAC address stays with the bundle as long as the bundle interface exists. The bundle uses this MAC
address until the user configures a different MAC address. The bundle MAC address is used by all
member links when passing bundle traffic. Any unicast or multicast addresses set on the bundle are also
set on all the member links.
Note It is recommended that you avoid modifying the MAC address, because changes
in the MAC address can affect packet forwarding.
• EtherChannel—Cisco proprietary technology that allows the user to configure links to join a bundle, but
has no mechanisms to check whether the links in a bundle are compatible.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
93
References
Link Aggregation Through LACP
LACP transmits frames containing the local port state and the local view of the partner system’s state. These
frames are analyzed to ensure both systems are in agreement.
L2VPN and Ethernet Services Configuration Guide for Cisco NCS 5000 Series Routers, IOS XR Release 6.3.x
94