VC 42 Vpls
VC 42 Vpls
VC 42 Vpls
This module provides the conceptual and configuration information for Virtual Private LAN Services
(VPLS) on Cisco IOS XR software. VPLS supports Layer 2 VPN technology and provides transparent
multipoint Layer 2 connectivity for customers.
This approach enables service providers to host a multitude of new services such as broadcast TV,
Layer 2 VPNs.
For MPLS Layer 2 virtual private networks (VPNs), see Implementing MPLS Layer 2 VPNs module.
Note For more information about MPLS Layer 2 VPN on Cisco IOS XR software and for descriptions of the
commands listed in this module, see the Related Documents section. To locate documentation for
other commands that might appear while executing a configuration task, search online in the
Cisco IOS XR software master command index.
Feature History for Implementing Virtual Private LAN Services on Cisco IOS XR Configuration Module
Release Modification
Release 3.8.0 This feature was introduced.
Support for the bridging funtionality feature (VPLS based) and pseudowire
redundancy was added.
Release 3.9.0 The following features were added:
Blocking unknown unicast flooding.
Disabling MAC flush.
Release 4.0 The following features were added:
H-VPLS with MPLS Access pseudowire
H-VPLS with Ethernet Access
MAC Address withdrawal
Release 4.0.1 Support for the BGP Autodiscovery with LDP Signaling feature was added.
Release 4.1.0 Support for Pseudowire Headend feature was added.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-75
Implementing Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-76 OL-26113-03
Implementing Virtual Private LAN Services
Contents
Contents
Before you configure VPLS, ensure that the network is configured as follows:, page VPC-77
Restrictions for Implementing Virtual Private LAN Services, page VPC-77
Information About Implementing Virtual Private LAN Services, page VPC-78
How to Implement Virtual Private LAN Services, page VPC-90
Configuration Examples for Virtual Private LAN Services, page VPC-145
Additional References, page VPC-158
Note The loopback interface is not needed in all cases. For example, tunnel selection does not
need a loopback interface when VPLS is directly mapped to a TE tunnel.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-77
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
For the Engine 5 line card, version 1 of the Ethernet SPA does not support QinQ mode and QinAny mode.
Note For the Engine 5 line card, version 2 of the Ethernet SPA supports all VLAN modes, such as VLAN
mode, QinQ mode, or QinAny mode. The Cisco CRS-1 router supports only the Ethernet port mode and
the 802.1q VLAN mode.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-78 OL-26113-03
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
service provider network. The network-facing provider edge devices learn the source MAC addresses as
the packets are flooded. The traffic is unicasted to the customer edge device for all the learned MAC
addresses.
VPLS requires the provider edge device to be MPLS-capable. The VPLS provider edge device holds all
the VPLS forwarding MAC tables and Bridge Domain information. In addition, it is responsible for all
flooding broadcast frames and multicast replications.
Hierarchical VPLS
Hierarchical VPLS (H-VPLS) is an extension of basic VPLS that provides scaling and operational
benefits. H-VPLS provides a solution to deliver Ethernet multipoint services over MPLS. H-VPLS
partitions a network into several edge domains that are interconnected using an MPLS core. The use of
Ethernet switches at the edge offers significant technical and economic advantages. H-VPLS also allows
Ethernet point-to-point and multipoint Layer 2 VPN services, as well as Ethernet access to high-speed
Internet and IP VPN services.
Two flavors of H-VPLS are:
Ethernet access in the edge domain
MPLS access in the edge domain
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-79
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
QinQ/QinAny
ACs Core PWs
CE1 U-PE1 N-PE2
N-PE1
Ethernet Access VPLS Core
Network Network
279529
CE2 U-PE2 N-PE3
P2P AC1
CE1 U-PE1 N-PE2
N-PE1
Ethernet Access VPLS Core
Network Network
Ethernet
CE2 U-PE2 AC N-PE3
P2P AC2
279534
Access PWs/P2P
CE Core PWs
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-80 OL-26113-03
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
L2-VPN Multipoint
Discovery BGP
249881
Tunneling Protocol MPLS
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-81
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
MPLS Core
249875
Traffic Flow
Length (2 octets)
VE ID (2 octets)
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-82 OL-26113-03
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
MPLS Core
249877
Traffic Flow
A PE router advertises an identifier through BGP for each VPLS instance. This identifier is unique
within the VPLS instance and acts like a VPLS ID. The identifier enables the PE router, receiving the
BGP advertisement, to identify the VPLS associated with the advertisement, and import it to the correct
VPLS instance. In this manner, for each VPLS, a PE router learns which other PE routers are members
of the VPLS.
The LDP protocol is used to configure a pseudowire to all other PE routers. The FEC 129 standard is
used for signaling. The information carried by FEC 129 includes the VPLS ID, the Target Attachment
Individual Identifier (TAII) and the Source Attachment Individual Identifier (SAII).
The LDP advertisement also contains the inner label or VPLS label that is expected for incoming traffic
over the pseudowire. This enables the LDP peer to identify the VPLS instance with which the
pseudowire is to be associated, and the label value that it is expected to use when sending traffic on that
pseudowire.
NLRI:
Length (2 octets)
Ext Comms:
VPLS-ID (8 octets)
249879
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-83
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
Interoperability Between Cisco IOS XR and Cisco IOS on VPLS LDP Signaling
The Cisco IOS Software encodes the NLRI length in the fist byte in bits format in the BGP Update
message. However, the Cisco IOS XR Software interprets the NLRI length in 2 bytes. Therefore, when
the BGP neighbor with VPLS-VPWS address family is configured between the IOS and the IOS XR,
NLRI mismatch can happen, leading to flapping between neighbors. To avoid this conflict, IOS supports
prefix-length-size 2 command that needs to be enabled for IOS to work with IOS XR. When the
prefix-length-size 2 command is configured in IOS, the NLRI length is encoded in bytes. This
configuration is mandatory for IOS to work with IOS XR.
This is a sample IOS configuration with the prefix-length-size 2 command:
router bgp 1
address-family l2vpn vpls
neighbor 5.5.5.2 activate
neighbor 5.5.5.2 prefix-length-size 2 --------> NLRI length = 2 bytes
exit-address-family
Bridge Domain
The native bridge domain refers to a Layer 2 broadcast domain consisting of a set of physical or virtual
ports (including VFI). Data frames are switched within a bridge domain based on the destination MAC
address. Multicast, broadcast, and unknown destination unicast frames are flooded within the bridge
domain. In addition, the source MAC address learning is performed on all incoming frames on a bridge
domain. A learned address is aged out. Incoming frames are mapped to a bridge domain, based on either
the ingress port or a combination of both an ingress port and a MAC header field.
By default, split horizon is enabled on a bridge domain. In other words, any packets that are coming on
either the attachment circuits or pseudowires are not returned on the same attachment circuits or
pseudowires. In addition, the packets that are received on one pseudowire are not replicated on other
pseudowires in the same VFI.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-84 OL-26113-03
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
Note In this case, split horizon forwarding applies; for example, frames that are coming in on an attachment
circuit or pseudowire are not sent out of the same attachment circuit or pseudowire. The pseudowire
frames, which are received on one pseudowire, are replicated on to other attachment circuits, VFI
pseudowires and access pseudowires.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-85
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
Action Description
Limit flood Discards the new MAC addresses.
Limit no-flood Discards the new MAC addresses. Flooding of unknown unicast packets is
disabled.
Shutdown Disables the bridge domain or bridge port. When the bridge domain is
down, none of the bridging functions, such as learning, flooding,
forwarding, and so forth take place for the bridge domain. If a bridge port
is down as a result of the action, the interface or pseudowire representing
the bridge port remains up but the bridge port is not participating in the
bridge. When disabled, the port or bridge domain is manually brought up
by using an EXEC CLI.
When a limit is exceeded, the system is configured to perform the following notifications:
Syslog (default)
Simple Network Management Protocol (SNMP) trap
Syslog and SNMP trap
None (no notification)
To clear the MAC limit condition, the number of MACs must go below 75 percent of the configured
limit.
Note On the Cisco CRS-1 router, MAC address limit action is supported only on the ACs and not on core
pseudowires.
Note By default, the LDP MAC Withdrawal feature is enabled on Cisco IOS XR.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-86 OL-26113-03
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
The LDP MAC Withdrawal feature is generated due to the following events:
Attachment circuit goes down. You can remove or add the attachment circuit through the CLI.
MAC withdrawal messages are received over a VFI pseudowire and are not propagated over access
pseudowires. RFC 4762 specifies that both wildcards (by means of an empty Type, Length and Value
[TLV]) and a specific MAC address withdrawal. Cisco IOS XR software supports only a wildcard
MAC address withdrawal.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-87
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
Note This feature is supported only for an AToM instance on the Cisco XR 12000 Series Router, and for an
EoMPLS instance on the Cisco CRS-1 router.
Pseudowire Headend
Pseudowires (PWs) enable payloads to be transparently carried across IP/MPLS packet-switched
networks (PSNs). Service providers are now extending PW connectivity into the access and aggregation
regions of their networks. PWs are regarded as simple and manageable lightweight tunnels for returning
customer traffic into core networks.
The PW headend (PWHE) feature provides a Layer 3 (L3) virtual interface representation of a PW on
an service provider edge (PE), that allows the backhaul of customer packets over PWs and the
application of L3 features, such as QoS (for example: policing and shaping), and access lists (ACLs) on
customer packets on the PW.
The PWHE virtual interface originates as a PW on an access node (the Layer 2 PW feeder node) and
terminates on a Layer 3 service instance, such as a VRF instance, on the service provider router (Cisco
CRS Router). At the service PE, IP traffic on the PW (from a remote customer PE via the access network)
is forwarded onto the IP/MPLS backbone and traffic from the IP/MPLS backbone, is forwarded onto the
PWHE L3 interface towards the customer PE (via the access network).
L2 PE, e.g.
CPE DSLAM P1 S-PE
Global IP/MPLS
Network
Access Network
AC
282420
PW
Note that the PW is from L2 PE node to the Service PE (S-PE), but the L3 adjacency on each PWHE
interface is configured between the service PE and the customer PE.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-88 OL-26113-03
Implementing Virtual Private LAN Services
Information About Implementing Virtual Private LAN Services
The PWHE feature allows you to replace a two node solution with a single node. Figure 19 illustrates a
scenario wherein, without PWHE, an L2 PE node is required. The L2 PE node terminates the PW and
connects to the service PE (from the L2 PE) via an attachment circuit (AC) that terminates as an L3
interface on the service PE.
Global IP/MPLS
Network
Access Network
AC AC
282421
PW
PWHE Interfaces
The virtual circuit (VC) types supported for the PW are types 4, 5 and 11. The PWHE acts as broadcast
interface with VC types 4 (VLAN tagged) and 5 (Ethernet port/Raw), whereas with VC type 11 (IP
Interworking), the PWHE acts as a point-to-point interface.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-89
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge-group-name
4. bridge-domain bridge-domain-name
5. end
or
commit
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-90 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge-group-name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain-name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Step 5 end Saves configuration changes.
or
When you issue the end command, the system
commit prompts you to commit changes:
Uncommitted changes found, commit them
Example: before exiting(yes/no/cancel)?
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# end [cancel]:
or
Entering yes saves configuration changes to
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# commit the running configuration file, exits the
configuration session, and returns the
router to EXEC mode.
Entering no exits the configuration session
and returns the router to EXEC mode
without committing the configuration
changes.
Entering cancel leaves the router in the
current configuration session without
exiting or committing the configuration
changes.
Use the commit command to save the
configuration changes to the running
configuration file and remain within the
configuration session.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-91
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Configuring a Pseudowire
Perform this task to configure a pseudowire under a bridge domain.
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. vfi {vfi name}
6. exit
7. neighbor {A.B.C.D} {pw-id value}
8. end
or
commit
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-92 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)# exit
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Step 7 neighbor {A.B.C.D} {pw-id value} Adds an access pseudowire port to a bridge domain
or a pseudowire to a bridge virtual forwarding
interface (VFI).
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# neighbor Use the A.B.C.D argument to specify the IP
10.1.1.2 pw-id 1000 address of the cross-connect peer.
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-pw)#
Use the pw-id keyword to configure the
pseudowire ID and ID value. The range is 1 to
4294967295.
Step 8 end Saves configuration changes.
or
When you issue the end command, the system
commit prompts you to commit changes:
Uncommitted changes found, commit them
Example: before exiting(yes/no/cancel)?
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-pw)# end [cancel]:
or
Entering yes saves configuration changes to
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-pw)# commit the running configuration file, exits the
configuration session, and returns the
router to EXEC mode.
Entering no exits the configuration session
and returns the router to EXEC mode
without committing the configuration
changes.
Entering cancel leaves the router in the
current configuration session without
exiting or committing the configuration
changes.
Use the commit command to save the
configuration changes to the running
configuration file and remain within the
configuration session.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-93
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Note Unless pseudowire status TLV is explicitly enabled under L2VPN configuration, the default signaling
method is Label Withdrawal. Pseudowire status TLV must be enabled on both local and remote PEs. If
only one provider edge router is configured with the pw-status tlv command, then label withdrawal
method is used.
SUMMARY STEPS
1. configure
2. l2vpn
3. pw-status tlv
4. end
or
commit
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-94 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# pw-status tlv
Step 4 end Saves configuration changes.
or
When you issue the end command, the system
commit prompts you to commit changes:
Uncommitted changes found, commit them
Example: before exiting(yes/no/cancel)?
RP/0/RP0/CPU0:router(config-l2vpn)#end [cancel]:
or
Entering yes saves configuration changes to
RP/0/RP0/CPU0:router(config-l2vpn)# commit the running configuration file, exits the
configuration session, and returns the
router to EXEC mode.
Entering no exits the configuration session
and returns the router to EXEC mode
without committing the configuration
changes.
Entering cancel leaves the router in the
current configuration session without
exiting or committing the configuration
changes.
Use the commit command to save the
configuration changes to the running
configuration file and remain within the
configuration session.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-95
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. xconnect group group name
4. p2p xconnect name
5. neighbor ip-address pw-id number
6. backup neighbor ip-address pw-id number
7. end
or
commit
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 xconnect group group name Enters the name of the cross-connect group.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# xconnect group A
RP/0/RP0/CPU0:router(config-l2vpn-xc)#
Step 4 p2p xconnect name Enters a name for the point-to-point cross-connect.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-xc)# p2p
rtrX_to_rtrY
RP/0/RP0/CPU0:router(config-l2vpn-xc-p2p)#
Step 5 neighbor ip-address pw-id number Configures the pseudowire segment for the
cross-connect.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-xc-p2p)# neighbor
1.1.1.1 pw-id 2
RP/0/RP0/CPU0:router(config-l2vpn-xc-p2p-pw)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-96 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-97
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. pw-class class name
4. backup disable delay seconds
5. exit
6. xconnect group group name
7. p2p xconnect name
8. neighbor ip-address pw-id number
9. pw-class class name
10. backup neighbor ip-address pw-id number
11. end
or
commit
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 pw-class class_1 Configures the pseudowire class name.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# pw-class class_1
RP/0/RP0/CPU0:router(config-l2vpn-pwc)#
Step 4 backup disable delay seconds Specifies how long a backup pseudowire virtual
circuit (VC) should wait before resuming operation
after the primary pseudowire VC becomes
Example:
RP/0/RP0/CPU0:router(config-l2vpn-pwc)# backup
nonfunctional.
disable delay 20
RP/0/RP0/CPU0:router(config-l2vpn-pwc)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-98 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Example:
RP/0/RP0/CPU0:router(config-l2vpn-pwc)# exit
Step 6 xconnect group group name Enters the name of the cross-connect group.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# xconnect group A
RP/0/RP0/CPU0:router(config-l2vpn-xc)#
Step 7 p2p xconnect name Enters a name for the point-to-point cross-connect.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-xc)# p2p
rtrX_to_rtrY
RP/0/RP0/CPU0:router(config-l2vpn-xc-p2p)#
Step 8 neighbor ip-address pw-id number Configures the pseudowire segment for the
cross-connect.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-xc-p2p)# neighbor
1.1.1.1 pw-id 2
RP/0/RP0/CPU0:router(config-l2vpn-xc-p2p-pw)#
Step 9 pw-class class_1 Configures the pseudowire class name.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-xc-p2p-pw)#
pw-class class_1
RP/0/RP0/CPU0:router(config-l2vpn-xc-p2p-pw)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-99
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-100 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge-group-name
4. bridge-domain bridge-domain-name
5. interface type interface-path-id
6. static-mac-address {MAC-address}
7. end
or
commit
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge-group-name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain-name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-101
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-102 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. flooding disable
6. mtu bytes
7. end
or
commit
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters l2vpn configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters l2vpn bridge
group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-103
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. shutdown
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-104 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
6. end
or
commit
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge-group-name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain-name Establishes a bridge domain and enters l2vpn bridge
group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-105
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-106 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. vfi {vfi name}
6. end
or
commit
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-107
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. vfi {vfi name}
6. neighbor A.B.C.D {pw-id value}
7. end
or
commit
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-108 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Step 5 vfi {vfi name} Configures virtual forwarding interface (VFI)
parameters and enters L2VPN bridge group bridge
domain VFI configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-109
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. vfi {vfi name}
6. neighbor {A.B.C.D} {pw-id value}
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-110 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Step 5 vfi vfi name Configures virtual forwarding interface (VFI)
parameters and enters L2VPN bridge group bridge
domain VFI configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)#
Step 6 neighbor A.B.C.D {pw-id value} Adds an access pseudowire port to a bridge domain
or a pseudowire to a bridge virtual forwarding
interface (VFI).
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)# Use the A.B.C.D argument to specify the IP
neighbor 10.1.1.2 pw-id 1000 address of the cross-connect peer.
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)#
Use the pw-id keyword to configure the
pseudowire ID and ID value. The range is 1 to
4294967295.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-111
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. vfi {vfi name}
6. neighbor {A.B.C.D} {pw-id value}
7. pw-class {class name}
8. end
or
commit
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-112 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Step 5 vfi {vfi name} Configures virtual forwarding interface (VFI)
parameters and enters L2VPN bridge group bridge
domain VFI configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)#
Step 6 neighbor {A.B.C.D} {pw-id value} Adds an access pseudowire port to a bridge domain
or a pseudowire to a bridge virtual forwarding
interface (VFI).
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)# Use the A.B.C.D argument to specify the IP
neighbor 10.1.1.2 pw-id 1000 address of the cross-connect peer.
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)#
Use the pw-id keyword to configure the
pseudowire ID and ID value. The range is 1 to
4294967295.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-113
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. vfi {vfi name}
6. neighbor {A.B.C.D} {pw-id value}
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-114 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Step 5 vfi {vfi name} Configures virtual forwarding interface (VFI)
parameters and enters L2VPN bridge group bridge
domain VFI configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)#
Step 6 neighbor {A.B.C.D} {pw-id value} Adds an access pseudowire port to a bridge domain
or a pseudowire to a bridge virtual forwarding
interface (VFI).
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)# Use the A.B.C.D argument to specify the IP
neighbor 10.1.1.2 pw-id 1000 address of the cross-connect peer.
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)#
Use the pw-id keyword to configure the
pseudowire ID and ID value. The range is 1 to
4294967295.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-115
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. vfi {vfi name}
6. shutdown
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-116 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
7. end
or
commit
8. show l2vpn bridge-domain [detail]
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Step 5 vfi {vfi name} Configures virtual forwarding interface (VFI)
parameters and enters L2VPN bridge group bridge
domain VFI configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)#
Step 6 shutdown Disables the virtual forwarding interface (VFI).
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)#
shutdown
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-117
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-118 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. mac
6. learning disable
7. end
or
commit
8. show l2vpn bridge-domain [detail]
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Step 5 mac Enters L2VPN bridge group bridge domain MAC
configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-119
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-120 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. mac
6. withdraw { access-pw disable | disable }
7. end
or
commit
8. show l2vpn bridge-domain [detail]
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Step 5 mac Enters L2VPN bridge group bridge domain MAC
configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-121
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
The following sample output shows the MAC address withdrawal fields:
RP/0/0/CPU0:router# show l2vpn bridge-domain detail
Bridge group: siva_group, bridge-domain: siva_bd, id: 0, state: up, ShgId: 0, MSTi: 0
MAC Learning: enabled
MAC withdraw: enabled
Flooding:
Broadcast & Multicast: enabled
Unknown Unicast: enabled
MAC address aging time: 300 s Type: inactivity
MAC address limit: 4000, Action: none, Notification: syslog
MAC limit reached: no
Security: disabled
DHCPv4 Snooping: disabled
MTU: 1500
MAC Filter: Static MAC addresses:
ACs: 1 (1 up), VFIs: 1, PWs: 2 (1 up)
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-122 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
List of ACs:
AC: GigabitEthernet0/4/0/1, state is up
Type Ethernet
MTU 1500; XC ID 0x5000001; interworking none; MSTi 0 (unprotected)
MAC Learning: enabled
MAC withdraw: disabled
Flooding:
Broadcast & Multicast: enabled
Unknown Unicast: enabled
MAC address aging time: 300 s Type: inactivity
MAC address limit: 4000, Action: none, Notification: syslog
MAC limit reached: no
Security: disabled
DHCPv4 Snooping: disabled
Static MAC addresses:
Statistics:
packet totals: receive 6,send 0
byte totals: receive 360,send 4
List of Access PWs:
List of VFIs:
VFI siva_vfi
PW: neighbor 1.1.1.1, PW ID 1, state is down ( local ready )
PW class not set, XC ID 0xff000001
Encapsulation MPLS, protocol LDP
PW type Ethernet, control word enabled, interworking none
PW backup disable delay 0 sec
Sequencing not set
MPLS Local Remote
------------ ------------------------------ -------------------------
Label 30005 unknown
Group ID 0x0 0x0
Interface siva/vfi unknown
MTU 1500 unknown
Control word enabled unknown
PW type Ethernet unknown
------------ ------------------------------ -------------------------
Create time: 19/11/2007 15:20:14 (00:25:25 ago)
Last time status changed: 19/11/2007 15:44:00 (00:01:39 ago)
MAC withdraw message: send 0 receive 0
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-123
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Note MAC Address Limit action is supported only on the ACs and not on the core pseudowires.
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. mac
6. limit
7. maximum {value}
8. action {flood | no-flood | shutdown}
9. notification {both | none | trap}
10. end
or
commit
11. show l2vpn bridge-domain [detail]
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-124 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-125
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Example:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain
detail
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge group name
4. bridge-domain bridge-domain name
5. mac
6. aging
7. time {seconds}
8. type {absolute | inactivity}
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-126 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
9. end
or
commit
10. show l2vpn bridge-domain [detail]
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge group name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain name Establishes a bridge domain and enters L2VPN
bridge group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Step 5 mac Enters L2VPN bridge group bridge domain MAC
configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)#
Step 6 aging Enters the MAC aging configuration submode to set
the aging parameters such as time and type.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)# aging
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-aging)#
Step 7 time {seconds} Configures the maximum aging time.
Use the seconds argument to specify the
Example: maximum age of the MAC address table entry.
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-aging)# The range is from 300 to 30000 seconds. Aging
time 300 time is counted from the last time that the switch
saw the MAC address. The default value is 300
seconds.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-127
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Example:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain
detail
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-128 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge-group name
4. bridge-domain bridge-domain name
5. mac
6. port-down flush disable
7. end
or
commit
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)#
Step 3 bridge group bridge-group-name Creates a bridge group so that it can contain bridge
domains and then assigns network interfaces to the
bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
csco
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Step 4 bridge-domain bridge-domain-name Establishes a bridge domain and enters l2vpn bridge
group bridge domain configuration mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain
abc
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-129
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-130 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. bridge group bridge-group-name
4. bridge-domain bridge-domain-name
5. vfi {vfi-name}
6. vpn-id vpn-id
7. autodiscovery bgp
8. rd {as-number:nn | ip-address:nn | auto}
9. route-target {as-number:nn | ip-address:nn | export | import}
10. route-target import {as-number:nn | ip-address:nn}
11. route-target export {as-number:nn | ip-address:nn}
12. signaling-protocol bgp
13. ve-id {number}
14. ve-range {number}
15. commit
or
end
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
Step 3 bridge group bridge-group-name Enters configuration mode for the named bridge group.
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
metroA
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-131
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
bridge-domain east
Step 5 vfi {vfi-name} Enters virtual forwarding instance (VFI) configuration
mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi
vfi-east
Step 6 vpn-id vpn-id Specifies the identifier for the VPLS service. The VPN ID
has to be globally unique within a PE router; that is the
same VPN ID cannot exist in multiple VFIs on the same
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)#
PE router. In addition, a VFI can have only one VPN ID.
vpn-id 100
Step 7 autodiscovery bgp Enters BGP autodiscovery configuration mode where all
BGP autodiscovery parameters are configured.
Example: This command is not provisioned to BGP until the VPN
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)# ID and the signaling protocol is configured.
autodiscovery bgp
Step 8 rd {as-number:nn|ip-address:nn|auto} Specifies the route distinguisher (RD) under the VFI.
The RD is used in the BGP NLRI to identify VFI. Only
Example: one RD can be configured for each VFI, and except for rd
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-ad)# auto, the same RD cannot be configured in multiple VFIs
rd auto on the same PE.
When rd auto is configured, the RD value is:
{BGP Router ID}:{16 bits auto-generated unique index}.
Step 9 route-target {as-number:nn|ip-address:nn} Specifies the route target (RT) for the VFI.
At least one import and one export route target (or just
Example: one route target with both roles) need to be configured in
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-ad)# each PE in order to establish BGP autodiscovery between
route-target 500:99 PEs.
If no export or import keyword is specified, it means that
the RT is both import and export. A VFI can have multiple
export or import RTs. However, the same RT is not
allowed in multiple VFIs in the same PE.
Step 10 route-target import {as-number:nn|ip-address:nn} Specifies the import route target for the VFI.
The PE compares import route target with the RT in the
Example: received NLRI: the RT in the received NLRI must match
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-ad)# the import RT to determine that the RTs belong to the
route-target import 200:20 same VPLS service.
Step 11 route-target export {as-number:nn|ip-address:nn} Specifies the export route target for the VFI.
Export route target is the RT that will be in the NLRI
Example: advertised to other PEs.
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-ad)#
route-target export 100:10
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-132 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-133
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
SUMMARY STEPS
1. configure
2. l2vpn
3. route-id
4. bridge group bridge-group-name
5. bridge-domain bridge-domain-name
6. vfi {vfi-name}
7. autodiscovery bgp
8. vpn-id vpn-id
9. rd {as-number:nn | ip-address:nn | auto}
10. route-target {as-number:nn | ip-address:nn | export | import}
11. route-target import {as-number:nn | ip-address:nn}
12. route-target export {as-number:nn | ip-address:nn}
13. signaling-protocol ldp
14. vpls-id {as-number:nn | ip-address:nn}
15. commit
or
end
DETAILED STEPS
Example:
RP/0/RP0/CPU0:router# configure
Step 2 l2vpn Enters L2VPN configuration mode.
Example:
RP/0/RP0/CPU0:router(config)# l2vpn
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-134 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Example:
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group
metroA
Step 5 bridge-domain bridge-domain-name Enters configuration mode for the named bridge domain.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
bridge-domain east
Step 6 vfi {vfi-name} Enters virtual forwarding instance (VFI) configuration
mode.
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi
vfi-east
Step 7 vpn-id vpn-id Specifies the identifier for the VPLS service. The VPN ID
has to be globally unique within a PE router; that is the
same VPN ID cannot exist in multiple VFIs on the same
Example:
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)#
PE router. In addition, a VFI can have only one VPN ID.
vpn-id 100
Step 8 autodiscovery bgp Enters BGP autodiscovery configuration mode where all
BGP autodiscovery parameters are configured.
Example: This command is not provisioned to BGP until the VPN
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)# ID and the signaling protocol is configured.
autodiscovery bgp
Step 9 rd {as-number:nn|ip-address:nn|auto} Specifies the route distinguisher (RD) under the VFI.
The RD is used in the BGP NLRI to identify VFI. Only
Example: one RD can be configured for each VFI, and except for rd
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-ad)# auto, the same RD cannot be configured in multiple VFIs
rd auto on the same PE.
When rd auto is configured, the RD value is:
{BGP Router ID}:{16 bits auto-generated unique index}.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-135
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-136 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-137
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Summary Steps
1. configure
2. interface pw-ether id
3. attach generic-interface-list interface_list_name
4. end
or
commit
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-138 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Detailed Steps
Example:
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)#
Step 2 interface pw-ether id Configures the PWHE interface and enters the interface
configuration mode.
Example:
RP/0/0/CPU0:router(config)# interface
pw-ether <id>
Step 3 attach generic-interface-list Attaches the interface to a specified interface list.
interface_list_name
Example:
RP/0/0/CPU0:router(config-if)# attach
generic-interface-list interfacelist1
Step 4 end Saves configuration changes.
or
When you issue the end command, the system prompts you to
commit commit changes:
Uncommitted changes found, commit them before
Example: exiting(yes/no/cancel)?
RP/0/RSP0/CPU0:router(config-if)# end [cancel]:
or
Entering yes saves configuration changes to the running
RP/0/RSP0/CPU0:router(config-if)# commit configuration file, exits the configuration session, and
returns the router to EXEC mode.
Entering no exits the configuration session and returns the
router to EXEC mode without committing the
configuration changes.
Entering cancel leaves the router in the current
configuration session without exiting or committing the
configuration changes.
Use the commit command to save the configuration changes to
the running configuration file and remain within the
configuration session.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-139
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Summary Steps
1. configure
2. interface pw-ether id
3. attach generic-interface-list interface_list_name
4. l2overhead bytes
5. load-interval seconds
6. dampening decay-life
7. logging events link-status
8. mac-address MAC address
9. mtu interface_MTU
10. end
or
commit
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-140 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Detailed Steps
Example:
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)#
Step 2 interface pw-ether id Configures the PWHE interface and enters the interface
configuration mode.
Example:
RP/0/0/CPU0:router(config)# interface
pw-ether <id>
Step 3 attach generic-interface-list Attaches the interface to a specified interface list.
interface_list_name
Example:
RP/0/0/CPU0:router(config-if)# attach
generic-interface-list interfacelist1
Step 4 l2overhead bytes Sets layer 2 overhead size.
Example:
RP/0/0/CPU0:router(config-if)#l2overhead
20
Step 5 load-interval seconds Specifies interval, in seconds, for load calculation for an interface.
The number of seconds:
Example: Can be set to 0 [0 disables load calculation]
RP/0/0/CPU0:router(config-if)#load-interv
al 90 If not 0, interval must be specified in multiples of 30 between
30 and 600.
Step 6 dampening decay-life Configures state dampening on the given interface (in minutes).
Example:
RP/0/0/CPU0:router(config-if)#dampening
10
Step 7 logging events link-status Configures per interface logging.
Example:
RP/0/0/CPU0:router(config-if)#logging
events link-status
Step 8 mac-address MAC address Sets the MAC address (xxxx.xxxx.xxxx) on an interface.
Example:
RP/0/0/CPU0:router(config-if)#mac-address
aaaa.bbbb.cccc
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-141
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Example:
RP/0/0/CPU0:router(config-if)#mtu 128
Step 10 end Saves configuration changes.
or
When you issue the end command, the system prompts you to
commit commit changes:
Uncommitted changes found, commit them before
Example: exiting(yes/no/cancel)?
RP/0/RSP0/CPU0:router(config-if)# end [cancel]:
or
Entering yes saves configuration changes to the running
RP/0/RSP0/CPU0:router(config-if)# commit configuration file, exits the configuration session, and
returns the router to EXEC mode.
Entering no exits the configuration session and returns the
router to EXEC mode without committing the
configuration changes.
Entering cancel leaves the router in the current
configuration session without exiting or committing the
configuration changes.
Use the commit command to save the configuration changes to
the running configuration file and remain within the
configuration session.
Summary Steps
1. configure
2. l2vpn
3. xconnect group group-name
4. p2p xconnect-name
5. interface pw-ether id
6. neighbor A.B.C.D pw-id value
7. pw-class class-name
8. end
or
commit
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-142 OL-26113-03
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Detailed Steps
Example:
RP/0/RSP0/CPU0:router# configure
RP/0/RSP0/CPU0:router(config)#
Step 2 l2vpn Enters Layer 2 VPN configuration mode.
Example:
RP/0/RSP0/CPU0:router(config)# l2vpn
Step 3 xconnect group group-name Configures a cross-connect group name using a free-format
32-character string.
Example:
RP/0/RSP0/CPU0:router(config-l2vpn)#
xconnect group MS-PW1
Step 4 p2p xconnect-name Enters P2P configuration submode.
Example:
RP/0/RSP0/CPU0:router(config-l2vpn-xc)#
p2p ms-pw1
Step 5 interface pw-ether id Configures the PWHE interface.
Example:
RP/0/RSP0/CPU0:router(config-l2vpn-xc-p2p
)# interface pw-ether 100
Step 6 neighbor A.B.C.D pw-id value Configures a pseudowire for a cross-connect.
The IP address is that of the corresponding PE node.
Example: The pw-id must match the pw-id of the PE node.
RP/0/RSP0/CPU0:router(config-l2vpn-xc-p
2p)# neighbor 10.165.200.25 pw-id 100
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-143
Implementing Virtual Private LAN Services
How to Implement Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-144 OL-26113-03
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-145
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
configure
interface GigabitEthernet0/0
l2transport
exit
no ipv4 address
no ipv4 directed-broadcast
negotiation auto
no cdp enable
end
configure
interface GigabitEthernet0/0
l2transport
exit
no ipv4 address
no ipv4 directed-broadcast
negotiation auto
no cdp enable
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-146 OL-26113-03
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
The following example shows how a backup delay is configured for point-to-point PW where the backup
disable delay is never:
l2vpn
pw-class class_1
backup disable never
exit
xconnect group_A
p2p rtrX_to_rtrY
neighbor 1.1.1.1 pw-id 2
pw-class class_1
backup neighbor 2.2.2.2 pw-id 5
commit
The following example shows how to disable the MAC flush at the bridge port level:
configure
l2vpn
bridge-group group1
bridge-domain domain1
interface POS 0/1/0/1
mac
port-down flush disable
end
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-147
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
The following example shows how to disable the MAC flush at the access pseudowire level:
configure
l2vpn
bridge-group group1
bridge-domain domain1
neighbor 10.1.1.1 pw-id 1000
mac
port-down flush disable
end
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-148 OL-26113-03
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
!
vfi core-pws
neighbor 6.6.6.6 pw-id 10
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-149
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
pw-class vpls
vfi core1
neighbor 5.5.5.5 pw-id 100 --> Core PW to N-PE1
MPLS Core
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-150 OL-26113-03
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
Configuration at PE1:
interface Loopback0
ipv4 address 1.1.1.100 255.255.255.255
!
interface Loopback1
ipv4 address 1.1.1.10 255.255.255.255
!
mpls ldp
router-id 1.1.1.1
interface GigabitEthernt0/1/0/0
!
router bgp 120
address-family l2vpn vpls-vpws
!
neighbor 2.2.2.20
remote-as 120
update-source Loopback1
address-family l2vpn vpls-vpws
signaling bgp disable
Configuration at PE2:
interface Loopback0
ipv4 address 2.2.2.200 255.255.255.255
!
interface Loopback1
ipv4 address 2.2.2.20 255.255.255.255
!
mpls ldp
router-id 2.2.2.2
interface GigabitEthernt0/1/0/0
!
router bgp 120
address-family l2vpn vpls-vpws
!
neighbor 1.1.1.10
remote-as 120
update-source Loopback1
address-family l2vpn vpls-vpws
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-151
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
249873
MPLS Core
Configuration at PE1:
l2vpn
bridge group gr1
bridge-domain bd1
interface GigabitEthernet0/1/0/1.1
vfi vf1
! AD independent VFI attributes
vpn-id 100
! Auto-discovery attributes
autodiscovery bgp
rd auto
route-target 2.2.2.2:100
! Signaling attributes
signaling-protocol bgp
ve-id 3
Configuration at PE2:
l2vpn
bridge group gr1
bridge-domain bd1
interface GigabitEthernet0/1/0/2.1
vfi vf1
! AD independent VFI attributes
vpn-id 100
! Auto-discovery attributes
autodiscovery bgp
rd auto
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-152 OL-26113-03
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
route-target 2.2.2.2:100
! Signaling attributes
signaling-protocol bgp
ve-id 5
249878
MPLS Core
Discovery attributes
NLRI sent at PE1:
Length = 19
Router Distinguisher = 3.3.3.3:32770
VE ID = 3
VE Block Offset = 1
VE Block Size = 10
Label Base = 16015
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-153
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
249882
MPLS Core
Configuration at PE1:
l2vpn
router-id 10.10.10.10
bridge group bg1
bridge-domain bd1
vfi vf1
vpn-id 100
autodiscovery bgp
rd 1:100
router-target 12:12
Configuration at PE2:
l2vpn
router-id 20.20.20.20
bridge group bg1
bridge-domain bd1
vfi vf1
vpn-id 100
autodiscovery bgp
rd 2:200
router-target 12:12
signaling-protocol ldp
vpls-id 120:100
GigabitEthernet0/1/0/0 GigabitEthernet0/1/0/0
MPLS Core
Configuration at PE1:
LDP Router ID - 1.1.1.1
BGP Router ID - 1.1.1.100
Peer Address - 1.1.1.10
L2VPN Router ID - 10.10.10.10
Route Distinguisher - 1:100
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-154 OL-26113-03
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
Configuration at PE2:
LDP Router ID - 2.2.2.2
BGP Router ID - 2.2.2.200
Peer Address - 2.2.2.20
L2VPN Router ID - 20.20.20.20
Route Distinguisher - 2:200
Discovery Attributes
Access MPLS/TP
Network Network
L1, L2
CEs A-PE S-PE PE PE CEx
P1
P2
L3, L4
ACs
PWs
282419
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-155
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
CE Configuration
Consider two CEs connected using GigabitEthernet0/3/0/0 (CE1 and A-PE) and GigabitEthernet0/3/0/1
(CE2 and A-PE).
At CE1:
interface Gig0/3/0/0
ipv4 address 10.1.1.1/24
router static
address-family ipv4 unicast
110.110.110.110 Gig0/3/0/0
A.B.C.D/N 110.110.110.110
At CE2:
interface Gig0/3/0/1
ipv4 address 10.1.2.1/24
router static
address-family ipv4 unicast
110.110.110.110 Gig0/3/0/1
A.B.C.D/N 110.110.110.110
A-PE Configuration
At A-PE, one xconnect is configured for each CE connection. Here, CE connections are L2 links, which
are in xconnects. Each xconnect has a pseudowire connected to S-PE, though connected to different
neighbor addresses, depending on where the pseudowire is to be pin downed: [L1, L4] or [L2, L3].
interface Gig0/3/0/0
l2transport
interface Gig0/3/0/1
l2transport
l2vpn
xconnect group pwhe
p2p pwhe_spe_1
interface Gig0/3/0/0
neighbor 111.111.111.111 pw-id 1
p2p pwhe_spe_2
interface Gig0/3/0/1
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-156 OL-26113-03
Implementing Virtual Private LAN Services
Configuration Examples for Virtual Private LAN Services
P Router Configuration
Static routes are required on P routers for Rx pindown on S-PE to force PWs configured with a specific
address to be transported over certain links.
At P1:
router static
address-family ipv4 unicast
111.111.111.111 Gig0/1/0/0
112.112.112.112 Gig0/2/0/0
At P2:
router static
address-family ipv4 unicast
111.111.111.111 Gig0/2/0/1
112.112.112.112 Gig0/1/0/1
S-PE Configuration
At S-PE, two PWHE interfaces (one for each PW) is configured, and each uses a different interface list
for Tx pin-down. (This must match the static configuration at P routers for Rx pin-down). Each PWHE
has the PW connected to A-PE (The pw-id must match the pw-id at A-PE.)
generic-interface-list il1
interface gig0/1/0/0
interface gig0/2/0/0
generic-interface-list il2
interface gig0/1/0/1
interface gig0/2/0/1
interface pw-ether1
ipv4 address 10.1.1.2/24
attach generic-interface-list il1
interface pw-ether2
ipv4 address 10.1.2.2/24
attach generic-interface-list il2
l2vpn
xconnect group pwhe
p2p pwhe1
interface pw-ether1
neighbor 100.100.100.100 pw-id 1
p2p pwhe2
interface pw-ether2
neighbor 100.100.100.100 pw-id 2
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-157
Implementing Virtual Private LAN Services
Additional References
Additional References
For additional information related to implementing VPLS, refer to the following references:
Related Documents
Standards
Standards1 Title
No new or modified standards are supported by this
feature, and support for existing standards has not been
modified by this feature.
1. Not all supported standards are listed.
MIBs
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-158 OL-26113-03
Implementing Virtual Private LAN Services
Additional References
RFCs
RFCs Title
RFC 3931 Layer Two Tunneling Protocol - Version 3 (L2TPv3)
RFC 4447 Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP), April 2006
RFC 4448 Encapsulation Methods for Transport of Ethernet over MPLS Networks, April 2006
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/techsupport
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
OL-26113-03 VPC-159
Implementing Virtual Private LAN Services
Additional References
Cisco IOS XR Virtual Private Network Configuration Guide for the Cisco CRS Router
VPC-160 OL-26113-03