Escolar Documentos
Profissional Documentos
Cultura Documentos
AR100&AR120&AR150&AR160&AR200&AR1200&AR
1600&AR2200&AR3200&AR3600 Series Enterprise
Routers
CLI-based Configuration Guide - VPN Configuration 13 PWE3 Configuration
13 PWE3 Configuration
NOTE
This section describes how to maintain PWE3, including verifying connectivity of a PW and
locating a fault on a PW.
13.10 Configuration Examples
This section describes PWE3 configuration examples including the networking requirements,
and configuration roadmap, configuration procedure, and configuration files.
13.11 References
This section provides references for the PWE3 feature.
Definition
Pseudo-Wire Emulation Edge to Edge (PWE3) is a point-to-point (P2P) technology that
transmits Layer 2 services on a multiprotocol label switching Layer 2 virtual private network
(MPLS L2VPN). PWE3 simulates essential attributes of a service such as Asynchronous
Transfer Mode (ATM), Frame Relay (FR), Ethernet, low-speed Time Division Multiplexing
(TDM) circuit, Synchronous Optical Network (SONET), or Synchronous Digital Hierarchy
(SDH) on a Packet Switched Network (PSN). PWE3 complies with RFC 4447 (only FEC 128
is supported currently), which is developed based on draft-martini-l2circuit-trans-mpls.
Purpose
The IP network has rapidly developed in recent years because of its flexible upgrade,
scalability, and interoperability. Limited by the transmission mode and services, the traditional
communications network has low flexibility. To make full use of existing or public network
resources during upgrade and expansion of the traditional communications network, PWE3 is
used to integrate the traditional communications network and PSN.
PWE3 often applies to the broadband metro access network (MAN) or mobile bearer network
to transmit various services including Ethernet, ATM, TDM, FR, and PPP. As shown in
Figure 13-1, the headquarters of company A and its branch are located on the traditional
communications network such as ATM or FR. PWE3 is used to establish a PW between PE1
and PE2 so that the headquarters of company A and its branch can communicate over the
MPLS network. PWE3 integrates original access modes with existing IP backbone network to
reduce repetitious network construction, saving operation costs.
Headquarters Branch of
of enterprise IP/MPLS enterprise A
A Backbone
MPLS Tunnel
AC AC
CE1 PE1 PE2 CE2
PWE3 allows various services to be transmitted and supports migration from the mobile
network to Long Term Evolution (LTE). PWE3 protects carrier investments when ATM and
TDM services are migrated to the IP network.
PWE3 is extended Martini and has the same signaling process as Martini.
Signaling Extension
PWE3 advertises the PW status using LDP signaling Notification messages. A PW is torn
down only when PW configurations are deleted or the LDP session is interrupted. PWE3
reduces control packets exchanged between PEs and signaling costs. LDP signaling used by
PWE3 is compatible with common LDP and Martini.
Multi-Segment Extension
Multi-segment PWE3 extends networking modes.
l Multi-segment PWE3 has low requirements for the number of LDP sessions supported
by an access device. That is, the costs of LDP sessions on the access device are reduced.
l The access node on a multi-segment PW provides PW aggregation. This allows for more
flexible networking and easily divides a network into access, aggregation, and core
layers.
Other Extensions
PWE3 has the following extensions at the control plane:
13.3 Principles
This section describes the implementation of PWE3.
PWE3 Architecture
PWE3 uses the Label Distribution Protocol (LDP) as the signaling protocol, and transmits
Layer 2 packets of Customer Edges (CEs) through tunnels such as MPLS LSPs, Generic
Routing Encapsulation (GRE) tunnels, or multiprotocol label switching traffic engineering
(MPLS TE) tunnels. As shown in Figure 13-2, PWE3 uses the following entities:
VPN1 VPN1
Site1 CE1 CE3 Site2
Forwarder Forwarder
AC
AC
PE1 P PE2
IP/MPLS
CE2 Backbone CE4 VPN2
VPN2
Site1 Site2
AC
PW
PW Signal
Tunnel
The following uses the flow direction of VPN1 packets from CE1 to CE3 as an example to
show the basic direction of data flows.
PWE3 Classification
PWs are classified into the following types:
PE1 P PE2
CE1 CE2
IP/MPLS
Backbone
SPE
PW2 PW2
Segment1 Segment2
NOTE
If a P exists between PEs, a remote LDP session is established between the PEs. If PEs are directly
connected, a common LDP session is established.
After PWE3 configuration is complete on two PEs of the PW and an LDP session is
established between PE1 and PE2, PE1 and PE2 start to establish a dynamic PW, as shown in
Figure 13-4.
1. PE1 sends a Request message and a Mapping message that contain the local private
network label and relevant attributes to PE2.
2. After receiving the Request message from PE1, PE2 sends a Mapping message to PE1.
3. After receiving the Mapping message, PE2 checks whether the same PW parameters as
those in the Mapping message are configured locally. If the configured PW parameters
such as the VC ID, VC type, MTU, and control word status are the same, PE2 sets the
local PW in Up state.
4. After receiving the Mapping message from PE2, PE1 checks whether the locally
configured PW parameters are the same as those in the Mapping message. If they are the
same, PE1 sets the local PW in Up state. A dynamic PW is set up between PE1 and PE2.
5. After the PW is set up, PE1 and PE2 send Notification messages to report their status.
PE1 PE2
Parameter match, VC up
ing
Mapp
Parameter match, VC up
Notification
AC/Tunnel state changed AC/Tunnel state changed
When the AC or the tunnel is Down, Martini and PWE3 take different measures:
l Martini sends a Withdraw message to the peer, requesting to tear down the PW. After the
AC or tunnel becomes Up, two PEs need to perform negotiation again to establish a PW.
l PWE3 sends a Notification message to notify the peer that packets cannot be forwarded.
The PW is not torn down. When the AC or tunnel becomes Up, PWE3 sends a
Notification message to notify the peer that packets can be forwarded.
Both PEs tear down the PW only when the PW configuration is deleted or the signaling
protocol is interrupted, for example, the public network or PW is Down. On an unstable
network, Notification messages can be sent to prevent repeated PW setup and deletion due to
link flapping.
PE1 PE2
Release
Release
VC Deletion
1. After the PW configuration on PE1 is deleted, PE1 deletes the local VC label and sends
Withdraw and Release messages to PE2.
NOTE
A Withdraw message is used to inform the peer to withdraw labels. A Release message is used to
respond to a Withdraw message and request the peer to send a Withdraw message to withdraw labels.
To tear down a PW more quickly, PE1 sends a Withdraw message and a Release message consecutively.
2. After receiving Withdraw and Release messages from PE1, PE2 delete the remote VC
label and sends a Release message to PE1.
3. After PE1 receives a Release message from PE2, the PW between PE1 and PE2 is torn
down.
As shown in Figure 13-6, one or more SPEs are deployed between two PEs for a multi-
segment PW. PE1 and PE2 establish connections with the SPE and the SPE combines two
segments of the PW.
During signaling negotiation, the SPE forwards parameters in the Mapping message from
UPE1 to UPE2. Similarly, the SPE forwards parameters in the Mapping message from UPE2
to UPE1. If parameters on UPE1 and UPE2 are the same, the PW status becomes Up. Similar
to the Mapping message, Release, Withdraw, and Notification messages are transmitted
segment by segment.
Mapping
mpls l2vc 2.2.2.2 100
Request
Mapping
Switch PW
Request
Request
Mapping parameters match
parameters match Mapping VC up
VC up
13.3.3 VCCV
As MPLS is widely deployed and the MPLS network transmits various types of traffic, the
ISP must provide the capability to monitor the label switched path (LSP) status and locate
MPLS forwarding faults. Virtual Circuit Connectivity Verification (VCCV) provides the
service capability.
VCCV is an end-to-end PW fault detection and diagnosis mechanism, and tests and checks
connectivity of the PW forwarding path. VCCV provides the control channel through which
connectivity verification (CV) messages are sent between the PW ingress and egress.
Two VCCV modes are available: VCCV ping and VCCV tracert.
l VCCV ping, as an extension of LSP ping, is used to manually test connectivity of a
virtual circuit (VC). VCCV ping sends MPLS Echo Request messages through a PW to
determine connectivity of the PW. VCCV defines a series of messages transmitted
between PEs to verify connectivity of PWs. VCCV ping can be performed in control
word channel mode or label alert channel mode:
– Control word channel: End-to-end detection between UPEs is supported.
– Label alert channel: Segment by segment detection between the UPE and SPE and
end-to-end detection are supported.
l VCCV tracert, as an extension of LSP tracert, is used to locate the faulty node on a PW.
VCCV tracert sends MPLS Echo Request messages through a PW to collect information
about nodes on the PW. VCCV tracert is classified into PWE3 single-segment tracert and
PWE3 multi-segment tracert.
To ensure that both VCCV packets and PW packets are transmitted along the same path,
VCCV packets must be encapsulated in the same way and transmitted in the same channel as
PW packets.
Switchover Mechanism
A fault on the PWE3 FRR network triggers traffic switchover. The device where traffic is
switched also reports the fault and terminates fault notification.
The node that performs fault switchover and terminates fault notification varies with the
networking:
l In a networking with asymmetrically connected CEs as shown in Figure 13-8, PE1 and
CE2 terminate fault propagation. When PE1 detects a fault, it switches traffic and does
not send a fault notification to CE1. CE2 receives the fault notification from PE2 and
switches traffic to the secondary link.
P1 PE2
PE1
AC2
IP/MPLS
Backbone CE2
CE1
AC1
AC3
PE3
Site1 P2 Site2
PW
PW secondary
l As shown in Figure 13-9, two tunnels back up each other on a backbone network. PE1
and PE2 terminate fault notification, and only need to switch the tunnel.
l Figure 13-9 Tunnel backup on a backbone network
P1
PE1
IP/MPLS PE2
Backbone CE2
CE1
AC1 AC2
Tunnel 1
Tunnel 2
When a CE detects a fault on the primary link, the CE checks whether the secondary link is
available. If so, the CE switches traffic to the secondary link. If not, the CE sends an alarm
about the service fault.
In a networking with asymmetrically connected CEs as shown in Figure 13-8, when PE1
detects a fault on the primary PW, it processes the fault as follows:
l If PE1 also detects a local AC fault, it reports a service fault. In this case, the fault cannot
be rectified.
l If PE1 does not detect a local AC fault or a secondary PW fault, it switches traffic to the
secondary PW.
l If PE1 does not detect a local AC fault but detects a secondary PW fault, it reports a
service fault, but does not switch traffic.
Inter-AS Option A
With Option A, ASBRs of two ASs are directly connected and function as PEs in their
respective ASs. The two ASBRs regard each other as a CE.
CE-1
IP/MPLS IP/MPLS
Backbone Backbone
AS 100 AS 200
PE-1 PW ASBR1
ASBR2
PW AC
PE-2
LSP1
CE-2
In Figure 13-10, ASBR1 in AS 100 regards ASBR2 in AS 200 as a CE. Similarly, ASBR2
regards ASBR1 a CE.
Option A has the following advantages:
Inter-AS Option A is easy to implement. The two PEs used as ASBRs perform IP forwarding
but not MPLS forwarding. In addition, the two PEs do not require special configurations.
Option A has low scalability.
l The PE needs to manage all L2VPN information, which occupies many resources.
l As the ASBR works as the PE in an AS, each PW requires an AC interface, which can be
a sub-interface, physical interface, or bundled logical interface.
l If a VPN spans multiple ASs, intermediate ASs must support VPN services. As a result,
the configuration workload is heavy and the intermediate ASs are affected.
Therefore, inter-AS Option A is applicable only when there are a small number of inter-AS
L2VPNs.
13.4 Applications
This section describes applications of the PWE3 feature.
Usage Scenario
Figure 13-11 shows a typical single-segment PWE3 networking. A carrier establishes a MAN
to provide PWE3 services. A customer has two branches far from each other. If the customer
use leased lines to connect the branches, it will result in high costs. The customer can request
the carrier to establish a PWE3 connection between PE1 in branch A and PE2 in branch B.
PWE3 Deployment
1. IP addresses and IGPs are configured on the carrier MPLS backbone network so that PEs
can communicate.
2. MPLS is enabled on the carrier MPLS backbone network, and a TE tunnel is configured
between PE1 and PE2. Usually, two TE tunnels are configured to provide tunnel
protection.
3. MPLS L2VPN is enabled on PE1 and PE2 and a remote MPLS LDP session is set up
between them.
4. PWE3 is configured on AC interfaces of PE1 and PE2 so that PE1 and PE2 can
communicate over an MPLS L2VC.
Configure PWE3 When configuring PWE3, you can l 13.8.1 Configuring a Static
configure static PW, dynamic PW, PW
TDM PWE3, or PW switching. l 13.8.2 Configuring a
The application scenario of each is Dynamic PW
as follows:
l 13.8.3 Configuring PW
l Configuring static PW: does Switching
not require signaling
negotiation or exchange of l 13.8.4 Configuring TDM
control packets; therefore, it PWE3
consumes few resources and is
easy to configure. However, it
requires manual configuration,
which makes network
maintenance and expansion
difficult. Static PW applies to
small-scale MPLS networks
with simple topologies.
l Configuring dynamic PW:
applies to large-scale
enterprises or local area
networks (LANs) of small-
scale carriers.
l Configuring PW switching:
PW labels need to be
exchanged during multi-
segment PW forwarding.
PW switching applies to the
following scenarios:
– Two PEs are not in the
same AS, and no signaling
connection or tunnel can be
set up between the two PEs.
– The signaling of two PEs
differs from each other.
– If the access device
supports MPLS, but is
incapable of setting up a
large number of LDP
sessions, you can use User
Facing Provider Edge
(UFPE) as the UPE. In
addition, you can use the
SPE as the switching node
of LDP sessions, which is
similar to a signaling
reflector.
Configure PWE3 When you transmit key services l 13.8.5 Configuring Static
reliability over the PWE3 network, the BFD for PWs
following reliability solutions can l 13.8.6 Configuring PWE3
be used: FRR
l Configuring BFD for PW:
BFD for PW can rapidly detect
a fault on the PW and notify
the forwarding plane of the
fault, ensuring fast traffic
switchover.
l Configuring PWE3 FRR:
PWE3 FRR ensures link-layer
reliability for the PWE3
network.
Configure and This task is required when PWE3 13.8.8 Configuring and
apply a tunnel services need to be transmitted Applying a Tunnel Policy
policy over TE tunnels or when multiple
tunnels need to perform load
balancing to fully use network
resources.
License Support
The L2VPN function is used with a license. By default, the PWE3 function cannot be used on
the device. To use the L2VPN function, apply for and purchase the following license from the
Huawei local office:
Version Support
Router V200R005C10
NOTE
The AR100&AR120&AR150&AR160&AR200
series do not support PWE3.
MTU 1500
VCCV Enabled
Pre-configuration Tasks
Before configuring a static PW, complete the following tasks:
l Configuring an IGP protocol on PEs and Ps on the MPLS backbone network to ensure IP
connectivity
l Enabling MPLS on PEs and Ps
l Setting up a tunnel (GRE tunnel, LSP tunnel, or TE tunnel) between the PEs
You also need to configure tunnel policies when PWE3 services need to be transmitted
over TE tunnels or when PWE3 services need to be load balanced among multiple
tunnels to fully use network resources. For details, see step 1 in 13.8.8 Configuring and
Applying a Tunnel Policy.
Configuration Process
To configure a static PW, perform the following operations on the device. Creating a PW
template and setting attributes for the PW template is optional.
Context
Before configuring a static PW, you must enable MPLS L2VPN.
Procedure
Step 1 Run:
system-view
Step 2 Run:
mpls l2vpn
----End
Context
A PW template defines common attributes for PWs, so it can be shared by different PWs. You
can run the pw-template command to define some common attributes in a PW template to
simplify PW configuration. After creating a PW on an interface, you can apply a PW template
to the interface.
On the device, you can bind a PW template to a PW or reset the PW.
You can set the attributes for a PW through commands or a PW template. The attributes
include the peer, tunnel policy, and control word. Importing the PW template can simplify the
configuration of PWs with similar attributes.
NOTE
l Some PW attributes such as the MTU, PW type, and encapsulation type are obtained from the
interface connecting the PE to the CE.
l If you specify a PW attribute through a command, the same PW attribute specified in the PW
template does not take effect on the PW to which this PW template is applied.
Procedure
1. Run:
system-view
NOTICE
After modifying the attributes of a PW template, run the reset pw pw-template command in
the user view to make the modification take effect. This may cause PW disconnection and
reconnection. If multiple PWs use this template simultaneously, system operation is affected.
Context
When creating a static PW, specify the VC label.
Perform the following operations on the PEs at both ends of a PW.
Procedure
Step 1 Run:
system-view
NOTE
l When the AC interfaces are Ethernet interfaces, you can specify the parameters raw and tagged.
l You can create a secondary PW only after a primary PW is created.
l The combination of the VC ID and VC type must be unique on each node. The VC IDs at both ends of a
switching PW can be the same. Primary and secondary PWs must have different VC IDs.
l Primary and secondary PWs must use the same control word; otherwise, many packets may be lost during
service switching.
----End
Prerequisites
The configurations of the static PW are complete.
Procedure
l (Optional) Run the display pw-template [ pw-template-name ] command to check
information about the PW template.
l Run the display mpls static-l2vc [ vc-id | interface interface-type interface-number |
state { down | up } ] command to check the information about static VCs.
l Run the display tunnel-info { tunnel-id tunnel-id | all | statistics [ slots ] } command to
check information about tunnels in the system.
l Run the display tunnel-policy [ tunnel-policy-name ] command to check information
about the specified tunnel policy.
----End
Pre-configuration Tasks
Before configuring a dynamic PW, complete the following tasks:
l Configuring an Interior Gateway Protocol (IGP) protocol on PEs and Ps on the
Multiprotocol Label Switching (MPLS) backbone network to ensure IP connectivity
l Configuring basic MPLS functions on the backbone network
l Setting up a tunnel (GRE tunnel, LSP tunnel, or TE tunnel) between the PEs
You also need to configure tunnel policies when Pseudo-Wire Emulation Edge to Edge
(PWE3) services need to be transmitted over TE tunnels or when PWE3 services need to
be load balanced among multiple tunnels to fully use network resources. For details, see
step 1 in 13.8.8 Configuring and Applying a Tunnel Policy.
l Setting up a remote LDP session between the PEs
Configuration Process
To configure a dynamic PW, perform the following operations on the device. Creating a PW
template and setting attributes for the PW template is optional.
Context
Before configuring a PW, you must enable MPLS L2VPN.
Perform the following operations on the PEs or UPEs at both ends of a PW.
Procedure
Step 1 Run:
system-view
NOTE
If the non-Huawei device does not have the capability of processing L2VPN label requests, you need to run
the mpls l2vpn no-request-message command on the Huawei device to enable the two devices to
communicate.
----End
Context
A PW template defines common attributes for PWs, so it can be shared by different PWs. You
can run the pw-template command to define some common attributes in a PW template to
simplify PW configuration. After creating a PW on an interface, you can apply a PW template
to the interface.
On the device, you can bind a PW template to a PW or reset the PW.
You can set the attributes for a PW through commands or a PW template. The attributes
include the peer, tunnel policy, and control word. Importing the PW template can simplify the
configuration of PWs with similar attributes.
NOTE
l Some PW attributes such as the MTU, PW type, and encapsulation type are obtained from the
interface connecting the PE to the CE.
l If you specify a PW attribute through a command, the same PW attribute specified in the PW
template does not take effect on the PW to which this PW template is applied.
Procedure
1. Run:
system-view
NOTICE
After modifying the attributes of a PW template, run the reset pw pw-template command in
the user view to make the modification take effect. This may cause PW disconnection and
reconnection. If multiple PWs use this template simultaneously, system operation is affected.
Context
To create a dynamic PW, VCs using the same encapsulation type must have different IDs.
Perform the following operations on the PEs.
Procedure
Step 1 Run:
system-view
NOTE
l When the AC interfaces are Ethernet interfaces, you can specify the parameters raw and tagged.
l A dynamic PW requires that the IDs of VCs using the same encapsulation type are different. Changing
the encapsulation type may cause a VC ID collision.
l You can create a secondary PW only after a primary PW is created.
l The combination of the VC ID and VC type must be unique on each node. The VC IDs at both ends of a
switching PW can be the same. Primary and secondary PWs must have different VC IDs.
l Primary and secondary PWs must use the same control word configuration; otherwise, many packets may
be lost during service switching.
----End
Prerequisites
The configurations of the dynamic PW are complete.
Procedure
l Run the display pw-template [ pw-template-name ] command to check information
about the PW template.
l Run the display mpls l2vc [ vc-id | interface interface-type interface-number | remote-
info [ vc-id | verbose ] | state { down | up } ] command to check the information about
virtual circuits in LDP mode.
l Run the display tunnel-info { tunnel-id tunnel-id | all | statistics [ slots ] } command to
check information about tunnels in the system.
l Run the display tunnel-policy [ tunnel-policy-name ] command to check information
about the specified tunnel policy.
----End
Context
To forward packets through a multi-segment PW, configure PW switching so that PW labels
can be exchanged. PW switching must be configured on the Superstratum PE (SPE) where a
large number of MPLS LDP sessions can be established.
In the following cases, PW switching is required:
l Two PEs are in different ASs, and no signaling connection or tunnel can be set up
between the two PEs.
l Two PEs use different signaling.
l If the access device can run MPLS but does not support a large number of LDP sessions,
the User Facing Provider Edge (UFPE) can be used as a UPE and the SPE as a node for
switching LDP sessions. The SPE is similar to a signaling reflector.
PW switching supports three modes: static mode, dynamic mode, and mixed mode:
l When static PWs are used between the SPE and two connected PEs, configure static PW
switching.
l When dynamic PWs are used between the SPE and two connected PEs, configure
dynamic PW switching.
l When a static PW and a dynamic PW are used between the SPE and two connected PEs,
configure mixed PW switching.
Pre-configuration Tasks
Before configuring multi-segment PW switching, complete the following tasks:
l Enabling MPLS L2VPN on PEs
l Setting up a tunnel (GRE tunnel, LSP tunnel, or TE tunnel) between the PEs
You also need to configure tunnel policies when PWE3 services need to be transmitted
over TE tunnels or when PWE3 services need to be load balanced among multiple
tunnels to fully use network resources. For details, see step 1 in 13.8.8 Configuring and
Applying a Tunnel Policy.
l Configuring a Static PW on UPEs if PW switching is performed between two static
PWs
l Configuring a Dynamic PW on UPEs if PW switching is performed between two
dynamic PWs
Procedure
l Configuring static PW switching
Perform the following operations on the SPE.
a. Run:
system-view
n On the UPE, when the AC status is Up and the PSN tunnel exists, the PW
status is Up.
n On the SPE, as long as the PSN tunnels exist on both sides, the PW is in Up
state even if the SPE and UPE use different PW encapsulation types.
It is recommended that you set the same PW encapsulation type by specifying the
encapsulation-type parameter on the SPE and UPE to facilitate management.
l Configuring dynamic PW switching
Perform the following operations on the SPE.
a. Run:
system-view
When you configure mixed PW switching, ip-address vc-id before between specifies the VC ID of
a dynamic PW and ip-address vc-id after between specifies the VC ID of a static PW. The two
values cannot be interchanged.
a. Run:
system-view
In mixed PW switching, the MTUs of the interfaces on the two ends must be the same and
cannot be greater than 1500 bytes.
----End
Pre-configuration Tasks
Before configuring TDM PWE3, complete the following tasks:
l Configuring an IGP protocol on the Ps and PEs on the MPLS backbone network to
implement IP connectivity
l Configuring basic MPLS capabilities on the backbone network
l Installing a 8SA, 6E&M, 8E1T1-M, or 8E1T1-F interface card on the device and
ensuring that it is registered successfully
l Setting up a tunnel (GRE tunnel, LSP tunnel, or TE tunnel) between the PEs
You also need to configure tunnel policies when PWE3 services need to be transmitted
over TE tunnels or when PWE3 services need to be load balanced among multiple
tunnels to fully use network resources. For details, see step 1 in 13.8.8 Configuring and
Applying a Tunnel Policy.
NOTE
Only the AR2204XE, AR2220, AR2240 (using SRU40, SRU60, SRU80, SRU200, or SRU200E, or
SRU400), AR3200 (using SRU40, SRU60, SRU80, SRU200, or SRU200E, or SRU400), and AR3600
(using SRUX5) series routers support this function.
Configuration Process
To configure TDM PWE3, you need to perform the following configurations, among which
creating a PW template and setting attributes for the PW template is optional.
Context
You can configure an AC interface to transparently transmit TDM cells, so that after receiving
TDM packets, the AC interface encapsulates the packets and transmits the packets through a
PW.
Perform the following operations on the PEs.
Procedure
Step 1 Use either of the following methods to configure AC interface parameters based on the
interface card type:
l 8SA interface card: Configure interface parameters such as a working mode for serial
interfaces. Ensure that the parameters are the same as those of a CE's interface connected
to the AC interface.
NOTE
For the detailed configuration of a serial interface, see Synchronous Serial Interface Configuration in
Huawei AR100&AR120&AR150&AR160&AR200&AR1200&AR1600&AR2200&AR3200&AR3600
Series Enterprise Routers Configuration Guide - Interface Management.
l 6E&M interface card: Configure interface parameters for E&M interfaces. Ensure that
the parameters are the same as those of a CE's interface connected to the AC interface.
NOTE
For the detailed configuration of an E&M interface, see Configuring Line Attributes for an E&M
Interface in Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR1600&AR2200&AR3200&AR3600 Series
Enterprise Routers Configuration Guide - Interface Management.
l 8E1T1-M interface card: Configure interface parameters such as a working mode for
CE1/PRI interfaces. Ensure that the parameters are the same as those of a CE's interface
connected to the AC interface. To ensure that CEs exchange data successfully, the AC
interfaces must work in clock synchronization state.
NOTE
For the detailed configuration of a CE1/PRI interface, see Configuring CE1/PRI Interface in Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR1600&AR2200&AR3200&AR3600 Series
Enterprise Routers Configuration Guide - Interface Management.
l 8E1T1-F interface card: Configure interface parameters such as a working mode for E1-
F interfaces. Ensure that the parameters are the same as those of a CE's interface
connected to the AC interface. To ensure that CEs exchange data successfully, the AC
interfaces must work in clock synchronization state.
NOTE
For the detailed configuration of an E1-F interface, see Configuring E1-F Interface in Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR1600&AR2200&AR3200&AR3600 Series
Enterprise Routers Configuration Guide - Interface Management.
The link layer protocol used for packet encapsulation on the serial interface is set to
TDM.
----End
Context
A PW template defines common attributes for PWs, so it can be shared by different PWs. The
PW template simplifies PW configuration. You can use the PW template to create a PW on an
interface.
On the device, the PW can be bound to a PW template and can be reset.
You can set the attributes for a PW through commands or a PW template. The attributes
include the peer, tunnel policy, and control word. Importing the PW template can simplify the
configuration of PWs with similar attributes.
NOTE
l Some PW attributes such as the MTU, PW type, and encapsulation type are obtained from the
interface connecting the PE to the CE.
l If you specify a PW attribute through commands, the same PW attribute specified in the PW
template does not function on the PW to which this PW template is applied.
Procedure
Step 1 Run:
system-view
Step 3 Run:
peer-address ip-address
The number of encapsulated TDM frames in Circuit Emulation Services over Packet Switch
Network (CESoPSN) or Structure-Agnostic Time Division Multiplexing over Packet (SAToP)
packets in the TDMoPSN application is set.
By default, the number of encapsulated TDM frames in a CESoPSN or SAToP packet is 8.
When the interface card where the AC interface locates is 8SA, 8E1T1-M or 8E1T1-F, the
interface can encapsulate a maximum of 16 TDM frames in a packet. If the value is larger
than 16, the interface only encapsulates 16 TDM frames in a packet.
You can determine the number of TDM frames encapsulated into each PW packet. The
smaller the number of frames encapsulated into a packet, the shorter the encapsulation and
transmission delay but the more the encapsulation overhead. The larger the number of frames
encapsulated into a packet, the higher the bandwidth utilization but the longer the
encapsulation delay.
Step 8 Run:
idle-code idle-code-value
The device is configured to fill idle codes when a jitter buffer underflow occurs.
By default, the system fills idle codes to FF.
A jitter buffer underflow occurs when the device needs to read packets but there are not
sufficient packets in the buffer. The idle code has no significance, and can be set to any value.
Step 9 Run:
tnl-policy policy-name
Configure a tunnel policy before you can apply this policy. If no tunnel policy is configured,
an LSP tunnel is used and load balancing is not implemented. For details on the tunnel policy
configuration, see step 1 in 13.8.8 Configuring and Applying a Tunnel Policy.
----End
Follow-up Procedure
After modifying the attributes of a PW template, run the reset pw pw-template command in
the user view to make the modification take effect. This may cause PW disconnection and
reconnection. If multiple PWs use this template simultaneously, system operation is affected.
13.8.4.3 Configuring PW
Context
When configuring TDM PWE3, you can create static PWs, dynamic PWs, or PW switching.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface serial interface-number
NOTE
NOTE
NOTE
When different PW encapsulation modes are selected, the parameters to be specified are as
follows:
n If encapsulation-type is set to satop-e1, the following parameters can be specified: [no-
control-word ] [ cc alert cv lsp-ping ].
n If encapsulation-type is set to cesopsn-basic, the following parameters can be specified:
control-word [ cc { alert | cw } * cv lsp-ping ], [no-control-word ] [ cc alert cv lsp-
ping ].
The timeslotnum timeslotnum needs to be configured.
– To configuring a dynamic PW switching, run:
mpls switch-l2vc ip-address vc-id [ tunnel-policy policy-name ] between
ip-address vc-id [ tunnel-policy policy-name ] encapsulation
encapsulation-type [ control-word-transparent ]
NOTE
n When you configure mixed PW switching, ip-address vc-id before between specifies the
VC ID of a dynamic PW and ip-address vc-id after between specifies the VC ID of a
static PW. The two values cannot be interchanged.
n In mixed PW switching, the MTUs of the interfaces on the two ends must be the same
and cannot be greater than 1500 bytes.
n When different PW encapsulation modes are selected, the parameters to be specified are
as follows:
○ If encapsulation-type is set to satop-e1, the following parameters can be specified:
mtu mtu-value, control-word, no-control-word, and tdm-encapsulation number.
○ If encapsulation-type is set to cesopsn-basic, the following parameters can be
specified: mtu mtu-value, control-word, no-control-word, timeslotnum
timeslotnum, and tdm-encapsulation number.
The timeslotnum timeslotnum needs to be configured.
The statistics collection function for PWs on the TDM interface is disabled.
After PW is configured on a TDM interface, the statistics collection function for PWs on the
TDM interface is enabled by default. The system collects statistics on sent and received
packets of the primary PW at an interval of 15 minutes. To improve statistics collection
efficiency for system performance or other performance, you can perform this step to disable
the statistics collection function for PWs on the TDM interface.
----End
Prerequisites
The configurations of the TDM PWE3 are complete.
NOTE
After a PW with the encapsulation type being TDM is configured on the AC side, PW performance statistics
collection is enabled on the related TDM interface by default. Run the undo mpls l2vpn pw performance
disable command can enable the function of PW performance information collection on a TDM interface.
Procedure
l Run the display pw-template [ pw-template-name ] command to check information
about the PW template.
l Run the display mpls static-l2vc [ vc-id | interface interface-type interface-number |
state { down | up } ] command to check the information about static VCs.
l Run the display mpls l2vc [ vc-id | interface interface-type interface-number | remote-
info [ vc-id | verbose ] | state { down | up } ] command to check the information about
virtual circuits in LDP mode.
l Run the display mpls switch-l2vc [ ip-address vc-id encapsulation encapsulation-type |
state { down | up } ] command on the SPE to view information about PW switching.
l Run the display tunnel-info { tunnel-id tunnel-id | all | statistics [ slots ] } command to
check information about tunnels in the system.
l Run the display tunnel-policy [ tunnel-policy-name ] command to check information
about the specified tunnel policy.
l Run the display mpls l2vpn interface interface-type interface-number performance
command to check PW performance information on a TDM interface.
----End
Pre-configuration Tasks
Before configuring static BFD for PWs, complete the following tasks:
Configuration Process
The following configurations are mandatory and must be performed in sequence.
Context
Before configure BFD for PWs, enable BFD globally. Perform the following operations on
the PEs at both ends of a PW.
Procedure
Step 1 Run:
system-view
BFD is enabled globally on the local node and the BFD view is displayed.
----End
Context
You must configure or delete BFD for PWs on the two PEs of a PW simultaneously;
otherwise, the PW status on the two PEs may be different. Perform the following operations
on the two PEs of the PW to be detected.
Procedure
Step 1 Run:
system-view
The local discriminator at the local end must be the same as the remote discriminator at the peer end,
and the remote discriminator at the local end must be the same as the local discriminator at the peer end.
Step 4 Run:
commit
When the PW status is Down, a BFD session can be set up but cannot go Up.
NOTE
l The local and remote BFD discriminators cannot be modified once being configured. To modify the
local or remote BFD discriminator, run the undo bfd bfd-name command in the system view to
delete the configuration of BFD for PWs, and then reconfigure the local or remote BFD
discriminator.
l After the PW is deleted, the related BFD session and configuration are deleted.
Step 5 (Optional) Set the encapsulation type for BFD CV packets to be sent to remote peers.
1. Run:
quit
----End
Prerequisites
The configurations of static BFD for PWs are complete.
Procedure
l Run the display bfd configuration pw interface interface-type interface-number
[ secondary ] [ verbose ] command to check the BFD configuration.
l Run the display bfd session pw interface interface-type interface-number [ secondary ]
[ verbose ] command to check information about the BFD session.
----End
Context
On the network where CEs are asymmetrically connected to PEs, the secondary PW cannot
transmit data when the primary path and secondary path work properly. If the AC interface of
the secondary PW borrows the IP address of the AC interface of the primary PW, note the
following points:
l The switching policy No revertive switchover cannot be configured.
l The local CE has two equal-cost and direct routes to the remote CE. The destination
addresses and next hops of the two routes are the same. The route that passes through the
secondary PW is unreachable.
l If the CEs exchange routing information using routing protocols, change the cost or
metric value of the AC interface of the secondary path to a value greater than that of the
AC interface of the primary path. The local CE may be unable to communicate with the
remote CE, but can communicate with other remote user devices.
l If CEs use static routes and the AC links are Ethernet links, BFD for static routes needs
to be configured on CEs.
Pre-configuration Tasks
Before configuring PWE3 FRR, complete the following tasks:
l Configuring primary and secondary PWs of the same type on the network where CEs are
asymmetrically connected to PEs
l Configuring CEs to exchange routing information using routing protocols or static routes
l Setting up a tunnel (GRE tunnel, LSP tunnel, or TE tunnel) between the PEs
You also need to configure tunnel policies when PWE3 services need to be transmitted
over TE tunnels or when PWE3 services need to be load balanced among multiple
tunnels to fully use network resources. For details, see step 1 in 13.8.8 Configuring and
Applying a Tunnel Policy.
Configuration Process
Perform the operations in the following sequence. You can determine whether to perform
optional operations based on site requirements.
Context
You can configure primary and secondary PWs to protect services on the PWs.
l On the network where CEs are symmetrically dual-homed to PEs, configure one primary
PW for each of the primary and secondary paths. The primary and secondary paths can
be configured with different types of PWs.
l On the network where CEs are asymmetrically connected to PEs, configure primary and
secondary PWs for the primary and secondary paths respectively. The primary and
secondary PWs must be of the same type.
Devices support only dynamic primary and secondary PWs.
Perform the following operations on the two PEs of a PW.
Procedure
Step 1 Configure dynamic primary and secondary PWs on the PEs. For details, see 13.8.2
Configuring a Dynamic PW.
NOTE
The primary and secondary PWs are configured to receive packets simultaneously.
When PWE3 FRR is configured on a network, you must configure the primary and
secondary PWs to receive packets simultaneously on the PE to which the PWs are
single-homed, preventing packet loss during PW revertive switchover.
----End
Context
OAM mapping expedites the fault detection and notification on the AC end. OAM mapping
can be configured on various types of links. To configure OAM mapping on Ethernet links,
the PE and CE devices must support the Ethernet OAM function.
Choose either of the following procedures to configure OAM mapping according to the AC
types.
Procedure
Step 1 Run:
system-view
Step 3 Run:
mpls l2vpn oam-mapping 3ah
NOTE
----End
Context
BFD for PW is recommended because it speeds up fault detection.
Procedure
For details, see the following topics.
l 13.8.5 Configuring Static BFD for PWs
NOTE
l BFD for PW on both PEs at the two ends must be configured or deleted simultaneously. Otherwise,
the statuses of PWs on the PEs are inconsistent.
l To monitor statuses of tunnels that carry PWs, configure BFD for tunnel. For detailed
configurations, see "MPLS LDP Configuration" and "MPLS TE Configuration" in Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR1600&AR2200&AR3200&AR3600 Series
Enterprise Routers Configuration Manual MPLS.
Context
Revertive switching policies are classified into the following types:
l Immediate revertive switchover: When the primary PW recovers from a fault, the local
PE switches traffic back to the primary PW immediately and notifies the peer PE on the
secondary PW of the fault. In FRR mode, the local PE notifies the peer PE on the
secondary PW of the recovery after a delay of resume-time. In PW redundancy master/
slave mode, the parameter resume-time is not supported.
This revertive switchover applies to scenarios in which users hope traffic to be restored
as soon as possible.
l Delayed revertive switchover: When the primary PW recovers from a fault, traffic is
switched back to the primary PW after a period specified by delay-time. After traffic is
switched back, the local device immediately notifies the peer device on the secondary
PW of the fault. If resume-time is configured in FRR mode, the local device notifies the
peer device on the secondary PW of the recovery after a delay of resume-time.
On a large-scale network, packet loss caused by incomplete route convergence may
occur during the switchback. To prevent this problem, configure traffic to be switched
back after a delay.
l None revertive switchover: When the primary PW recovers from a fault, traffic is not
switched back to the primary PW until the secondary PW becomes faulty.
If you do not want traffic to be frequently switched between the primary and secondary
PWs, you can use the non-revertive switchover.
Perform the following operations on the PE (where traffic is switched) to which the CE is
connected through a single link.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
mpls l2vpn reroute { { delay delay-time | immediately } [ resume resume-time ] |
never }
For an asymmetric networking with ACs of the Ethernet type, if the Ethernet OAM function
is configured on the PE interface connected to a CE, and a revertive switching policy is also
configured, do not set resume-time to 0 seconds. Set resume-time to 1 second or longer.
NOTE
On the network where CEs are asymmetrically connected to PEs, the secondary PW cannot transmit data
when the primary and secondary paths work normally. On the CE in the dual-homed site, if the interface
of the secondary PW borrows the IP address of the interface of the primary PW, you cannot configure
revertive switchover.
----End
Prerequisites
All configurations about PWE3 FRR are complete.
After PWE3 FRR is configured, you can view information about the local and remote PWs,
BFD sessions, L2VPN forwarding, and OAM mapping. You can also run the manual-set pw-
ac-fault command to simulate faults on a PW to verify whether the switchover between the
primary and secondary PWs is normal.
Procedure
l Run the manual-set pw-ac-fault command on the interface of the primary PW to
simulate faults on it to verify whether the switchover between the primary and secondary
PWs is normal.
l Run the display mpls l2vc [ vc-id | interface interface-type interface-number ]
command to check information about the local PWs.
l Run the display mpls l2vc remote-info [ vc-id ] command to check information about
the remote PWs.
l Run the display bfd session pw interface interface-type interface-number [ secondary ]
[ verbose ] command to check information about the BFD session.
l Run the display mpls l2vpn forwarding-info [ vc-label ] interface interface-type
interface-number command to check the MPLS L2VPN forwarding information.
----End
Context
The devices support inter-AS PWE3 Option A. Option A is easy to implement; however, each
ASBR must provide a dedicated interface for each inter-AS VC. The interface can be a sub-
interface, physical interface, or logical interface. If the number of inter-AS VCs is small, this
solution can be used.
Pre-configuration Tasks
Before configuring inter-AS PWE3, complete the following tasks:
l Configuring an IGP protocol for the MPLS backbone network in each AS to ensure IP
connectivity of the backbone network within an AS
l Configuring basic MPLS functions on the MPLS backbone network in each AS
l Configuring MPLS LDP and establishing the LDP LSP for the MPLS backbone in each
AS
Procedure
The configurations of inter-AS PWE3 Option A are as follows:
l Configure the ASBRs. Each ASBR considers the peer ASBR as its CE.
NOTE
You do not need to perform any additional configuration for inter-AS implementation on ASBRs and do
not need to configure IP addresses for the directly connected interfaces between ASBRs.
Context
Service data on the PWE3 network is transmitted over tunnels. By default, LSP tunnels are
used to transmit data, and each service is transmitted by only one LSP tunnel.
If the default tunnel configuration cannot meet PWE3 service requirements, apply tunnel
policies to VPNs. You can configure either of the following types of tunnel policies based on
service requirements:
l Tunnel type prioritization policy: This policy can change the type of tunnels selected for
PWE3 data transmission or select multiple tunnels for load balancing.
l Tunnel binding policy: This policy can bind multiple TE tunnels to provide QoS
guarantee for PWE3.
Pre-configuration Tasks
Before configuring and applying a tunnel policy, complete the following task:
l For details on how to create a GRE tunnel, see GRE Configuration in the Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR1600&AR2200&AR3200&AR36
00 Series Enterprise Routers Configuration Guide - VPN.
l For details on how to create an LSP tunnel, see MPLS LDP Configuration in the Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR1600&AR2200&AR3200&AR36
00 Series Enterprise Routers Configuration Guide - MPLS.
l For details on how to create a TE tunnel, see MPLS TE Configuration in the Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR1600&AR2200&AR3200&AR36
00 Series Enterprise Routers Configuration Guide - MPLS.
Perform the following operations on the PEs that need to use a tunnel policy.
Procedure
Step 1 Configure a tunnel policy.
By default, no tunnel policy is configured. LSP tunnels are used to transmit PWE3 data and
each VPN service is transmitted over one LSP tunnel.
1. Run:
system-view
The sequence in which each type of tunnel is selected and the number of tunnels
participating in load balancing are set.
Configure a tunnel binding policy.
1. Run:
system-view
8. Run:
tunnel binding destination dest-ip-address te { tunnel interface-number }
&<1-16> [ ignore-destination-check ] [ down-switch ]
NOTE
– If the PE has multiple peers, you can run the tunnel binding command multiple times to
specify different destination IP addresses in a tunnel policy.
– If down-switch is specified in the command, the system selects available tunnels in an order
of LSP, CR-LSP, and GRE when the bound tunnels are unavailable.
NOTE
n When the AC interfaces are Ethernet interfaces, you can specify the parameters raw and
tagged.
n When the AC interfaces are serial interfaces, CE1/PRI interfaces, or E1-F interfaces, you can
specify the parameters idle-code, jitter-buffer, tdm-encapsulation, and tdm-sequence-
number.
– To create a dynamic PW, run:
mpls l2vc { ip-address | pw-template pw-template-name } * vc-id tunnel-
policy policy-name [ [ control-word | no-control-word ] | [ raw |
tagged ] | mtu mtu-value | idle-code idle-code-value | jitter-buffer
depth | tdm-encapsulation-number number | tdm-sequence-number |
secondary ] *
NOTE
n When the AC interfaces are Ethernet interfaces, you can specify the parameters raw and
tagged.
n When the AC interfaces are serial interfaces, CE1/PRI interfaces, or E1-F interfaces, you can
specify the parameters idle-code, jitter-buffer, tdm-encapsulation-number, and tdm-
sequence-number.
– To create static PW switching, run:
mpls switch-l2vc ip-address vc-id trans trans-label recv received-label
[ tunnel-policy policy-name ] between ip-address vc-id trans trans-label
recv received-label [ tunnel-policy policy-name ] encapsulation
encapsulation-type [ control-word [ cc { alert | cw } * cv lsp-ping ] |
----End
Context
Before using the ping vc and tracert vc commands to check connectivity of a PW, ensure that
the PWE3 network is correctly configured.
l VCCV ping can be performed in control word channel mode or Label alert channel
mode:
– Control word channel: supports detection between UPEs.
– Label alert channel: supports detection between CEs and per-hop detection between
the UPE and SPE.
By default, VCCV in Label Alert mode is enabled. Before using the control word channel, run
the control-word command to enable the control word function. VCCV in control word
channel mode is then enabled.
When locating faults on the PW, you can use either VCCV in control word channel mode or
normal mode.
l SPEs do not support the ping vc and tracert vc command (these commands are
supported only by UPEs).
l Multiple users cannot run the command simultaneously. That is, the devices on the two
ends cannot ping a VC at the same time. On a device serving as both a UPE and an SPE,
if the PW serving as an SPE is performing VCCV ping, the PW serving as a UPE will be
unable to perform VCCV ping. That is, two VCCV pings cannot be performed on a same
device at the same time.
l The MTU check of the VC is not supported.
In the control word mode, if VC IDs are different, the VC ID of the remote UPE needs to be
specified. In the MPLS Label Alert mode, the addresses of the remote peer SPEs or UPEs
need to be specified.
Because a static PW does not support signaling negotiation, configurations of the UPE control
word on both ends of the PW are different, with the control word being enabled on one end,
but disabled on the other. When the MPLS Label Alert mode is enabled on both ends, the PW
can be Up and the ping vc command can work. CEs, however, cannot communicate with each
other because the control words are different.
Procedure
l Check the connectivity of the PW.
– Control word channel
ping vc pw-type pw-id [ -c echo-number | -m time-value | -s data-bytes | -t timeout-
value | -exp exp-value | -r reply-mode | -v ] * control-word [ remote remote-ip-
address peer-pw-id | draft6 ] * [ ttl ttl-value ] [ uniform ]
To check the connectivity of a PW switching, run the following commands:
ping vc pw-type pw-id [ -c echo-number | -m time-value | -s data-bytes | -t timeout-
value | -exp exp-value | -r reply-mode | -v ] * control-word remote remote-ip-
address peer-pw-id sender sender-address [ ttl ttl-value ] [ uniform ]
– Label Alert channel
ping vc pw-type pw-id [ -c echo-number | -m time-value | -s data-bytes | -t timeout-
value | -exp exp-value | -r reply-mode | -v ] * label-alert [ no-control-word ]
[ remote remote-ip-address | draft6 ] * [ uniform ]
– Normal mode
ping vc pw-type pw-id [ -c echo-number | -m time-value | -s data-bytes | -t timeout-
value | -exp exp-value | -r reply-mode | -v ] * normal [ no-control-word ] [ remote
remote-ip-address peer-pw-id ] [ ttl ttl-value ] [ uniform ]
l Locate a fault on the PW.
– Control word channel
tracert vc pw-type pw-id [ -exp exp-value | -f first-ttl | -m max-ttl | -r reply-mode | -
t timeout-value ] * control-word [ draft6 ] [ full-lsp-path ] [ uniform ]
Context
After PWE3 is configured, you can locate any PW faults. To locate a fault on a PW, configure
basic PWE3 functions using a PW template, and then run the following commands on U-PEs.
Procedure
Step 1 Run the system-view command to enter the system view of the U-PE.
Step 2 Run the pw-template pw-template-name command to enter the PW template view.
Step 3 Run the control-word command to enable the control word function.
Step 4 Run either of the following commands to collect information about each LSR along the PW
and information about the egress PE.
l The SPEs do not support this command. You can run this command on UPEs only.
l You can use this command to tracert a single-segment PW and a multi-segment PW
created using LDP.
l When tracerting a multi-segment PW, specify the remote PW ID in addition to the local
PW ID and PW type.
When the tracert vc command is run, the tracert operation is terminated in the following
cases:
l The PE that initiates tracert receives an MPLS Echo Reply packet from the egress PE.
l The TTL in the label of the previous MPLS Echo Request packet sent by the PE that
initiates tracert reaches the configured or default maximum number of hops.
l A user presses Ctrl+C on the PE that initiates tracert.
----End
Networking Requirements
As shown in Figure 13-12, the MPLS network of an ISP provides the L2VPN service for
users. Many users connect to the MPLS network through PE1 and PE2, and users on the PEs
change frequently. A proper VPN solution is required to provide secure VPN services for
users, save network resources, and simplify configuration when new users connect to the
network.
P
GE1/0/0 GE1/0/0
PW
GE1/0/0 GE1/0/0
10.3.1.1/24 10.3.1.2/24
CE1 CE2
Configuration Roadmap
Because users on the two PEs change frequently, manual configuration is inefficient and may
cause configuration errors. In this scenario, the two PEs can set up a remote LDP session and
use the LDP protocol to synchronize user information through a dynamic PW. Compared with
Martini, PWE3 reduces the signaling cost and defines the multi-segment negotiation mode,
making networking more flexible. PWE3 is recommended if network resources need to be
saved.
The configuration roadmap is as follows:
1. Configure an IGP protocol on the backbone network so that backbone network devices
can communicate.
2. Configure basic MPLS functions and establish LSP tunnels on the backbone network.
Then establish the remote MPLS LDP peer relationship between the PEs at both ends of
the PW.
3. Create MPLS L2VC connections on the PEs.
Procedure
Step 1 Configure an IP address for each interface on the CEs, PEs, and the P according to Figure
13-12.
# Configure CE1. The configuration on PE1, P, PE2, and CE2 is similar to the configuration
on CE1 and is not mentioned here.
<Huawei> system-view
[Huawei] sysname CE1
[CE1] interface gigabitethernet 1/0/0
[CE1-GigabitEthernet1/0/0] ip address 10.3.1.1 255.255.255.0
[CE1-GigabitEthernet1/0/0] quit
Step 2 Configure an IGP protocol and Loopback address on the MPLS backbone network.
# Configure PE1. The configuration on P and PE2 is similar to the configuration on PE1 and
is not mentioned here.
[PE1] interface loopback 0
[PE1-LoopBack0] ip address 10.10.1.1 255.255.255.255
[PE1-LoopBack0] quit
[PE1] ospf 1
[PE1-ospf-1] area 0
[PE1-ospf-1-area-0.0.0.0] network 10.10.1.1 0.0.0.0
[PE1-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[PE1-ospf-1-area-0.0.0.0] quit
[PE1-ospf-1] quit
After the configuration is complete, run the display ip routing-table command. The
command out shows that PE1 and PE2 have learnt the routes to each other's Loopback0
interface through OSPF, and that PE1 and PE2 can ping each other.
Step 3 Enable MPLS, and set up tunnels and remote LDP sessions.
Enable MPLS on the MPLS backbone network, and set up an LSP tunnel and remote LDP
sessions between the PEs.
# Configure PE1.
[PE1] mpls
[PE1-mpls] mpls ldp
[PE1-mpls-ldp] quit
# Configure P.
[P] mpls
[P-mpls] mpls ldp
[P-mpls-ldp] quit
[P] interface gigabitethernet 1/0/0
[P-GigabitEthernet1/0/0] ip address 10.1.1.2 255.255.255.0
[P-GigabitEthernet1/0/0] mpls
[P-GigabitEthernet1/0/0] mpls ldp
[P-GigabitEthernet1/0/0] quit
[P] interface gigabitethernet 2/0/0
[P-GigabitEthernet2/0/0] ip address 10.2.2.1 255.255.255.0
[P-GigabitEthernet2/0/0] mpls
[P-GigabitEthernet2/0/0] mpls ldp
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] mpls
[PE2-mpls] mpls ldp
[PE2-mpls-ldp] quit
[PE2] interface gigabitethernet 2/0/0
[PE2-GigabitEthernet2/0/0] ip address 10.2.2.2 255.255.255.0
[PE2-GigabitEthernet2/0/0] mpls
[PE2-GigabitEthernet2/0/0] mpls ldp
[PE2-GigabitEthernet2/0/0] quit
[PE2] mpls ldp remote-peer 10.10.1.1
[PE2-mpls-ldp-remote-10.10.1.1] remote-ip 10.10.1.1
[PE2-mpls-ldp-remote-10.10.1.1] quit
After the configuration is complete, run the display mpls ldp session command on the
devices. The command output shows that LDP sessions are established between the PEs and
between the P and PEs, and the session status is Operational.
Step 4 Create VCs.
Enable MPLS L2VPN on PE1 and PE2, and create a VC on each PE.
# Configure PE1.
[PE1] mpls l2vpn
[PE1-l2vpn] quit
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] mpls l2vc 10.10.3.1 100
[PE1-GigabitEthernet1/0/0] quit
# Configure PE2.
[PE2] mpls l2vpn
[PE2-l2vpn] quit
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] mpls l2vc 10.10.1.1 100
[PE2-GigabitEthernet1/0/0] quit
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 2/15/31 ms
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
interface GigabitEthernet1/0/0
ip address 10.3.1.1 255.255.255.0
#
return
interface LoopBack0
ip address 10.10.2.1 255.255.255.255
#
ospf 1
area 0.0.0.0
network 10.10.2.1 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.2.2.0 0.0.0.255
#
return
St
GE2/0/0 t GE1/0/0
ta
at
S 40.1.1.2/24
ic
10.1.1.1/24
PW
GE1/0/0 GE2/0/0
GE1/0/0 GE1/0/0
100.1.1.1/24 100.1.1.2/24
CE1 CE2
Configuration Roadmap
Because the enterprise will not increase sites in the future and wants to use exclusive VPN
resources, you can configure a static PW to meet the customer requirements. To use
hierarchical networking, configure a static multi-segment PW.
The configuration roadmap is as follows:
1. Configure a common routing protocol on the backbone network so that backbone
network devices can communicate.
2. Configure basic MPLS functions and establish LSPs on the backbone network.
3. Establish static MPLS L2VC connections on U-PEs.
4. Configure PW switching on the S-PE for a multi-segment PW.
Procedure
Step 1 Configure an IP address for each interface on the devices according to Figure 13-13.
# Configure CE1. The configuration on U-PE1, P1, S-PE, P2, U-PE2, and CE2 is similar to
the configuration on CE1 and is not mentioned here.
<Huawei> system-view
[Huawei] sysname CE1
[CE1] interface gigabitethernet 1/0/0
[CE1-GigabitEthernet1/0/0] ip address 100.1.1.1 255.255.255.0
[CE1-GigabitEthernet1/0/0] quit
Step 2 Configure an IGP protocol and Loopback address on the MPLS backbone network.
# Configure U-PE1. The configuration on P1, S-PE, P2, and U-PE2 is similar to the
configuration on U-PE1 and is not mentioned here.
# Configure S-PE.
[S-PE] mpls l2vpn
[S-PE-l2vpn] quit
[S-PE] mpls switch-l2vc 5.5.5.9 100 trans 200 recv 200 between 1.1.1.9 100 trans
100 recv 100 encapsulation ethernet
# Configure U-PE2.
[U-PE2] mpls l2vpn
[U-PE2-l2vpn] quit
[U-PE2] pw-template pwt
[U-PE2-pw-template-pwt] peer-address 3.3.3.9
[U-PE2-pw-template-pwt] quit
[U-PE2] interface gigabitethernet 1/0/0
[U-PE2-GigabitEthernet1/0/0] mpls static-l2vc pw-template pwt 100 transmit-vpn-
label 200 receive-vpn-label 200
[U-PE2-GigabitEthernet1/0/0] quit
NOTE
The transmit-vpn-label configured on the U-PE must be the same as the recv label on the S-PE, and the
receive-vpn-label configured on the U-PE must be the same as the trans label on the S-PE. Otherwise,
CEs cannot communicate.
# Run the following command on the PEs to check the L2VPN connections. The command
output shows that an L2VC connection is set up and is in Up state.
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
interface GigabitEthernet1/0/0
ip address 100.1.1.1 255.255.255.0
#
return
l Configuration file of P1
#
sysname P1
#
interface GigabitEthernet1/0/0
ip address 30.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
ip address 40.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 4.4.4.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 4.4.4.9 0.0.0.0
network 30.1.1.0 0.0.0.255
network 40.1.1.0 0.0.0.255
#
return
Networking Requirements
As shown in Figure 13-14, the MPLS network of an ISP provides the L2VPN service for
users. The S-PE has powerful functions, and U-PE1 and U-PE2 function as access devices
and cannot directly establish remote LDP sessions. Many users connect to the MPLS network
through U-PE1 and U-PE2, and users on the U-PEs change frequently. A proper VPN solution
is required to provide secure VPN services for users and simplify configuration and
maintenance when new users connect to the network.
1.1.1.9/32 PW 5.5.5.9/32
10
GE2/0/0 GE1/0/0
PW
U-PE1 20 U-PE2
10.1.1.1/24 0 40.1.1.2/24
GE1/0/0 GE2/0/0
GE1/0/0 GE1/0/0
100.1.1.1/24 100.1.1.2/24
CE1 CE2
Configuration Roadmap
Because the S-PE has powerful functions, and U-PE1 and U-PE2 cannot directly establish
remote LDP sessions, you can configure a multi-segment PW and PW switching on the S-PE
to meet the customer requirements. To simplify maintenance, configure a dynamic multi-
segment PW.
The configuration roadmap is as follows:
1. Configure an IGP protocol on the backbone network so that backbone network devices
can communicate.
2. Configure basic MPLS functions and establish LSPs on the backbone network. Establish
remote MPLS LDP peer relationships between U-PE1 and the S-PE, and between U-PE2
and the S-PE.
3. Create PW templates and enable the control word function and LSP ping.
4. Configure a dynamic PW on the S-PE.
Procedure
Step 1 Configure an IP address for each interface on the devices according to Figure 13-14.
# Configure CE1. The configuration on U-PE1, P1, S-PE, P2, U-PE2, and CE2 is similar to
the configuration on CE1 and is not mentioned here.
<Huawei> system-view
[Huawei] sysname CE1
[CE1] interface gigabitethernet 1/0/0
[CE1-GigabitEthernet1/0/0] ip address 100.1.1.1 255.255.255.0
[CE1-GigabitEthernet1/0/0] quit
Step 2 Configure an IGP protocol and Loopback address on the MPLS backbone network.
# Configure U-PE1. The configuration on P1, S-PE, P2, and U-PE2 is similar to the
configuration on U-PE1 and is not mentioned here.
[U-PE1] interface loopback 0
[U-PE1-LoopBack0] ip address 1.1.1.9 255.255.255.255
[U-PE1-LoopBack0] quit
[U-PE1] ospf 1
[U-PE1-ospf-1] area 0
[U-PE1-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[U-PE1-ospf-1-area-0.0.0.0] network 1.1.1.9 0.0.0.0
[U-PE1-ospf-1-area-0.0.0.0] quit
[U-PE1-ospf-1] quit
After the configuration is complete, run the display ip routing-table command on the U-PEs,
Ps or S-PE. The command output shows that these devices have learnt the routes of each
other.
Step 3 Enable MPLS and set up LSP tunnels and remote LDP sessions.
Configure basic MPLS functions on the MPLS backbone network, and set up LSP tunnels and
remote LDP sessions between U-PE1 and the S-PE, and between the S-PE and U-PE2.
# Configure U-PE1.
[U-PE1] mpls lsr-id 1.1.1.9
[U-PE1] mpls
[U-PE1-mpls] quit
[U-PE1] mpls ldp
[U-PE1-mpls-ldp] quit
[U-PE1] interface gigabitethernet 2/0/0
[U-PE1-GigabitEthernet2/0/0] ip address 10.1.1.1 255.255.255.0
[U-PE1-GigabitEthernet2/0/0] mpls
[U-PE1-GigabitEthernet2/0/0] mpls ldp
[U-PE1-GigabitEthernet2/0/0] quit
[U-PE1] mpls ldp remote-peer 3.3.3.9
[U-PE1-mpls-ldp-remote-3.3.3.9] remote-ip 3.3.3.9
[U-PE1-mpls-ldp-remote-3.3.3.9] quit
# Configure P1.
[P1] mpls lsr-id 2.2.2.9
[P1] mpls
[P1-mpls] quit
[P1] mpls ldp
[P1-mpls-ldp] quit
[P1] interface gigabitethernet 1/0/0
[P1-GigabitEthernet1/0/0] mpls
[P1-GigabitEthernet1/0/0] mpls ldp
[P1-GigabitEthernet1/0/0] quit
# Configure P2.
[P2] mpls lsr-id 4.4.4.9
[P2] mpls
[P2-mpls] quit
[P2] mpls ldp
[P2-mpls-ldp] quit
[P2] interface gigabitethernet 1/0/0
[P2-GigabitEthernet1/0/0] mpls
[P2-GigabitEthernet1/0/0] mpls ldp
[P2-GigabitEthernet1/0/0] quit
[P2] interface gigabitethernet 2/0/0
[P2-GigabitEthernet2/0/0] mpls
[P2-GigabitEthernet2/0/0] mpls ldp
[P2-GigabitEthernet2/0/0] quit
# Configure U-PE2.
[U-PE2] mpls lsr-id 5.5.5.9
[U-PE2] mpls
[U-PE2-mpls] quit
[U-PE2] mpls ldp
[U-PE2-mpls-ldp] quit
[U-PE2] interface gigabitethernet 1/0/0
[U-PE2-GigabitEthernet1/0/0] mpls
[U-PE2-GigabitEthernet1/0/0] mpls ldp
[U-PE2-GigabitEthernet1/0/0] quit
[U-PE2] mpls ldp remote-peer 3.3.3.9
[U-PE2-mpls-ldp-remote-3.3.3.9] remote-ip 3.3.3.9
[U-PE2-mpls-ldp-remote-3.3.3.9] quit
After the configuration is complete, run the display mpls ldp session command on the U-
PEs, Ps, or S-PE. The command output shows that the LDP sessions are established and the
status is Operational. Run the display mpls ldp peer command. The command output shows
that LDP peer relationships are established. Run the display mpls lsp command. The
command output shows that LSPs are established.
Step 4 Create and configure PW templates.
Create PW templates on the U-PEs, and enable the control word function.
# Configure U-PE1.
# Configure U-PE2.
[U-PE2] mpls l2vpn
[U-PE2-l2vpn] quit
[U-PE2] pw-template pwt
[U-PE2-pw-template-pwt] peer-address 3.3.3.9
[U-PE2-pw-template-pwt] control-word
[U-PE2-pw-template-pwt] quit
NOTE
You can also configure a dynamic PW without using the PW template. If the PW template is not used,
PW connectivity cannot be verified and path information of the PW cannot be collected. That is, you
cannot run the ping vc or tracert vc command.
# Configure U-PE2.
[U-PE2] interface gigabitethernet 2/0/0
[U-PE2-GigabitEthernet2/0/0] mpls l2vc pw-template pwt 200
[U-PE2-GigabitEthernet2/0/0] quit
--- FEC: FEC 128 PSEUDOWIRE (NEW). Type = vlan, ID = 100 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 90/256/740 ms
3. Check connectivity between the CEs and information about the paths between the CEs.
CE1 and CE2 can ping each other.
[CE1] ping 100.1.1.2
PING 100.1.1.2: 56 data bytes, press CTRL_C to break
Reply from 100.1.1.2: bytes=56 Sequence=1 ttl=255 time=180 ms
Reply from 100.1.1.2: bytes=56 Sequence=2 ttl=255 time=120 ms
Reply from 100.1.1.2: bytes=56 Sequence=3 ttl=255 time=160 ms
Reply from 100.1.1.2: bytes=56 Sequence=4 ttl=255 time=160 ms
Reply from 100.1.1.2: bytes=56 Sequence=5 ttl=255 time=130 ms
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
interface GigabitEthernet1/0/0
ip address 100.1.1.1 255.255.255.0
#
return
peer-address 3.3.3.9
control-word
#
mpls ldp
#
mpls ldp remote-peer 3.3.3.9
remote-ip 3.3.3.9
#
interface GigabitEthernet1/0/0
mpls l2vc pw-template pwt 100
#
interface GigabitEthernet2/0/0
ip address 10.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 1.1.1.9 0.0.0.0
#
return
l Configuration file of P1
#
sysname P1
#
mpls lsr-id 2.2.2.9
mpls
#
mpls ldp
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
ip address 20.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 2.2.2.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 2.2.2.9 0.0.0.0
network 10.1.1.0 0.0.0.255
network 20.1.1.0 0.0.0.255
#
return
l Configuration file of the S-PE
#
sysname S-PE
#
mpls lsr-id 3.3.3.9
mpls
#
mpls l2vpn
#
mpls switch-l2vc 1.1.1.9 100 between 5.5.5.9 200 encapsulation ethernet
#
mpls ldp
#
mpls ldp remote-peer 1.1.1.9
remote-ip 1.1.1.9
#
mpls ldp remote-peer 5.5.5.9
remote-ip 5.5.5.9
#
interface GigabitEthernet1/0/0
ip address 20.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
ip address 30.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 3.3.3.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 3.3.3.9 0.0.0.0
network 20.1.1.0 0.0.0.255
network 30.1.1.0 0.0.0.255
#
return
l Configuration file of P2
#
sysname P2
#
mpls lsr-id 4.4.4.9
mpls
#
mpls ldp
#
interface GigabitEthernet1/0/0
ip address 30.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
ip address 40.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 4.4.4.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 4.4.4.9 0.0.0.0
network 30.1.1.0 0.0.0.255
network 40.1.1.0 0.0.0.255
#
return
l Configuration file of U-PE2
#
sysname U-PE2
#
mpls lsr-id 5.5.5.9
mpls
#
mpls l2vpn
#
pw-template pwt
peer-address 3.3.3.9
control-word
#
mpls ldp
#
mpls ldp remote-peer 3.3.3.9
remote-ip 3.3.3.9
#
interface GigabitEthernet1/0/0
ip address 40.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
mpls l2vc pw-template pwt 200
#
interface LoopBack0
ip address 5.5.5.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 5.5.5.9 0.0.0.0
network 40.1.1.0 0.0.0.255
#
return
0
10
St
1.1.1.9/32 5.5.5.9/32
a
PW
tic
GE2/0/0 GE1/0/0
PW
U-PE1 U-PE2
ic
10.1.1.1/24 40.1.1.2/24
20
a
yn
0
D
GE1/0/0 GE2/0/0
GE1/0/0 GE1/0/0
100.1.1.1/24 100.1.1.2/24
CE1 CE2
Configuration Roadmap
Because the S-PE has powerful functions, and U-PE1 and U-PE2 cannot directly establish
remote LDP sessions, you can configure a multi-segment PW and PW switching on the S-PE
to meet the customer requirements. U-PE2 supports only static PWs, so a mixed multi-
segment PW is used.
1. Configure an IGP protocol on the backbone network so that backbone network devices
can communicate.
2. Configure basic MPLS functions and establish LSP tunnels on the backbone network.
3. Set up a remote LDP session between U-PE1 and the S-PE.
4. Set up static or dynamic MPLS L2VC connections on the U-PEs.
5. Configure PW switching on the S-PE.
Procedure
Step 1 Configure an IP address for each interface on the devices according to Figure 13-15.
# Configure CE1. The configuration on U-PE1, P1, S-PE, P2, U-PE2, and CE2 is similar to
the configuration on CE1 and is not mentioned here.
<Huawei> system-view
[Huawei] sysname CE1
[CE1] interface gigabitethernet 1/0/0
[CE1-GigabitEthernet1/0/0] ip address 100.1.1.1 255.255.255.0
[CE1-GigabitEthernet1/0/0] quit
Step 2 Configure an IGP protocol and Loopback address on the MPLS backbone network.
# Configure U-PE1. The configuration on P1, S-PE, P2, and U-PE2 is similar to the
configuration on U-PE1 and is not mentioned here.
[U-PE1] interface loopback 0
[U-PE1-LoopBack0] ip address 1.1.1.9 255.255.255.255
[U-PE1-LoopBack0] quit
[U-PE1] ospf 1
[U-PE1-ospf-1] area 0
[U-PE1-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
[U-PE1-ospf-1-area-0.0.0.0] network 1.1.1.9 0.0.0.0
[U-PE1-ospf-1-area-0.0.0.0] quit
[U-PE1-ospf-1] quit
Step 3 Enable MPLS, set up tunnels, and set up a remote LDP session between U-PE1 and the S-PE.
Configure basic MPLS functions and set up tunnels on the MPLS backbone network. In this
example, the LSP tunnel is used.
You need to set up a remote LDP session between U-PE1 and the S-PE. U-PE1 is used as an
example.
# Configure U-PE1.
[U-PE1] mpls lsr-id 1.1.1.9
[U-PE1] mpls
[U-PE1-mpls] quit
[U-PE1] mpls ldp
[U-PE1-mpls-ldp] quit
[U-PE1] interface gigabitethernet 2/0/0
[U-PE1-GigabitEthernet2/0/0] ip address 10.1.1.1 255.255.255.0
[U-PE1-GigabitEthernet2/0/0] mpls
[U-PE1-GigabitEthernet2/0/0] mpls ldp
[U-PE1-GigabitEthernet2/0/0] quit
[U-PE1] mpls ldp remote-peer 3.3.3.9
[U-PE1-mpls-ldp-remote-3.3.3.9] remote-ip 3.3.3.9
[U-PE1-mpls-ldp-remote-3.3.3.9] quit
# Configure P1
[P1] mpls lsr-id 2.2.2.9
[P1] mpls
[P1-mpls] quit
[P1] mpls ldp
[P1-mpls-ldp] quit
[P1] interface gigabitethernet 1/0/0
[P1-GigabitEthernet1/0/0] mpls
[P1-GigabitEthernet1/0/0] mpls ldp
[P1-GigabitEthernet1/0/0] quit
[P1] interface gigabitethernet 2/0/0
[P1-GigabitEthernet2/0/0] mpls
[P1-GigabitEthernet2/0/0] mpls ldp
[P1-GigabitEthernet2/0/0] quit
# Configure P2
[P2] mpls lsr-id 4.4.4.9
[P2] mpls
[P2-mpls] quit
[P2] mpls ldp
[P2-mpls-ldp] quit
[P2] interface gigabitethernet 1/0/0
[P2-GigabitEthernet1/0/0] mpls
[P2-GigabitEthernet1/0/0] mpls ldp
[P2-GigabitEthernet1/0/0] quit
[P2] interface gigabitethernet 2/0/0
[P2-GigabitEthernet2/0/0] mpls
[P2-GigabitEthernet2/0/0] mpls ldp
[P2-GigabitEthernet2/0/0] quit
# Configure U-PE2
[U-PE2] mpls lsr-id 5.5.5.9
[U-PE2] mpls
[U-PE2-mpls] quit
[U-PE2] mpls ldp
[U-PE2-mpls-ldp] quit
[U-PE2] interface gigabitethernet 1/0/0
[U-PE2-GigabitEthernet1/0/0] mpls
[U-PE2-GigabitEthernet1/0/0] mpls ldp
[U-PE2-GigabitEthernet1/0/0] quit
[U-PE2] mpls ldp remote-peer 3.3.3.9
[U-PE2-mpls-ldp-remote-3.3.3.9] remote-ip 3.3.3.9
[U-PE2-mpls-ldp-remote-3.3.3.9] quit
NOTE
When you configure mixed PW switching, ip-address vc-id before between specifies the VC ID of a
dynamic PW and ip-address vc-id after between specifies the VC ID of a static PW. The two values
cannot be interchanged.
# Configure U-PE2.
# View information about L2VPN connections on the PEs. The command output shows that
an L2VC is set up and the VC status is Up.
Service Class : --
Color : --
DomainId : --
Domain Name : --
BFD for PW : unavailable
[S-PE] display mpls switch-l2vc
Total Switch VC : 1, 1 up, 0 down
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
interface GigabitEthernet1/0/0
ip address 100.1.1.1 255.255.255.0
#
return
#
mpls lsr-id 1.1.1.9
mpls
#
mpls l2vpn
#
mpls ldp
#
mpls ldp remote-peer 3.3.3.9
remote-ip 3.3.3.9
#
interface GigabitEthernet1/0/0
mpls l2vc 3.3.3.9 100
#
interface GigabitEthernet2/0/0
ip address 10.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 1.1.1.9 0.0.0.0
#
return
l Configuration file of P1
#
sysname P1
#
mpls lsr-id 2.2.2.9
mpls
#
mpls ldp
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
ip address 20.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 2.2.2.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 20.1.1.0 0.0.0.255
network 2.2.2.9 0.0.0.0
#
return
l Configuration file of the S-PE
#
sysname S-PE
#
mpls lsr-id 3.3.3.9
mpls
#
mpls l2vpn
#
mpls switch-l2vc 1.1.1.9 100 between 5.5.5.9 200 trans 200 recv 100
encapsulation ethernet
#
mpls ldp
#
mpls ldp remote-peer 1.1.1.9
remote-ip 1.1.1.9
#
mpls ldp remote-peer 5.5.5.9
remote-ip 5.5.5.9
#
interface GigabitEthernet1/0/0
ip address 20.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
ip address 30.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 3.3.3.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 20.1.1.0 0.0.0.255
network 30.1.1.0 0.0.0.255
network 3.3.3.9 0.0.0.0
#
return
l Configuration file of P2
#
sysname P2
#
mpls lsr-id 4.4.4.9
mpls
#
mpls ldp
#
interface GigabitEthernet1/0/0
ip address 30.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
ip address 40.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 4.4.4.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 4.4.4.9 0.0.0.0
network 30.1.1.0 0.0.0.255
network 40.1.1.0 0.0.0.255
#
return
l Configuration file of U-PE2
#
sysname U-PE2
#
mpls lsr-id 5.5.5.9
mpls
#
mpls l2vpn
#
pw-template pwt
peer-address 3.3.3.9
#
mpls ldp
#
mpls ldp remote-peer 3.3.3.9
remote-ip 3.3.3.9
#
interface GigabitEthernet1/0/0
ip address 40.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
mpls static-l2vc pw-template pwt 200 transmit-vpn-label 100 receive-vpn-
label 200
#
interface LoopBack0
ip address 5.5.5.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 5.5.5.9 0.0.0.0
network 40.1.1.0 0.0.0.255
#
return
#
return
GE1/0/0 GE1/0/0
100.1.1.1/24 100.1.1.2/24
CE1 CE2
MPLS backbone networks in the same AS use IS-IS as the IGP protocol.
Configuration Roadmap
The PEs connect to different ASs (AS 100 and AS 200) of the ISP, so an inter-AS VPN
solution is required. To simplify configuration when new users connect to the network and
save network resources, PWE3 Option A is recommended to meet the customer requirements.
Procedure
Step 1 Configure an IP address for each interface on the devices according to Figure 13-16. CE1 is
used as an example.
# Configure CE1. The configuration on PE1, ASBR-PE1, ASBR-PE2, PE2, and CE2 is
similar to the configuration on CE1 and is not mentioned here.
<Huawei> system-view
[Huawei] sysname CE1
[CE1] interface gigabitethernet 1/0/0
[CE1-GigabitEthernet1/0/0] ip address 100.1.1.1 255.255.255.0
[CE1-GigabitEthernet1/0/0] quit
Step 2 Configure an IGP protocol and Loopback address on the MPLS backbone network.
After the configuration is complete, the IS-IS neighbor relationship can be established
between the ASBR-PE and PE in the same AS. Run the display isis peer command. The
command output shows that the neighbor relationship is Up.
Run the display ip routing-table command. The command output shows that the PE and
ASBR-PE in the same AS can learn the routes to the loopback interface of each other.
The ASBR-PE and PE in the same AS can ping each other successfully.
Step 3 Enable MPLS and configure a dynamic LSP.
Configure basic MPLS functions on the MPLS backbone network. Establish a dynamic LDP
LSP between the PE and ASBR-PE in the same AS.
# Configure PE1. The configuration on ASBR-PE1, ASBR-PE2,and PE2 is similar to the
configuration on PE1 and is not mentioned here.
[PE1] mpls lsr-id 1.1.1.9
[PE1] mpls
[PE1-mpls] quit
[PE1] mpls ldp
[PE1-mpls-ldp] quit
[PE1] interface gigabitethernet 2/0/0
[PE1-GigabitEthernet2/0/0] ip address 10.1.1.1 255.255.255.0
[PE1-GigabitEthernet2/0/0] mpls
[PE1-GigabitEthernet2/0/0] mpls ldp
[PE1-GigabitEthernet2/0/0] quit
After this step is performed, an LSP tunnel is established between the PE and ASBR-PE in
the same AS.
Step 4 Configure MPLS L2VCs.
Configure the L2VC on the PE and ASBR-PE and connect the PE to the CE.
# Configure PE1.
[PE1] mpls l2vpn
[PE1-l2vpn] quit
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] mpls l2vc 2.2.2.9 100
[PE1-GigabitEthernet1/0/0] quit
# Configure ASBR-PE1.
[ASBR-PE1] mpls l2vpn
[ASBR-PE1-l2vpn] quit
[ASBR-PE1] interface gigabitethernet 2/0/0
[ASBR-PE1-GigabitEthernet2/0/0] mpls l2vc 1.1.1.9 100
[ASBR-PE1-GigabitEthernet2/0/0] quit
# Configure ASBR-PE2.
[ASBR-PE2] mpls l2vpn
[ASBR-PE2-l2vpn] quit
[ASBR-PE2] interface gigabitethernet 1/0/0
# Configure PE2.
[PE2] mpls l2vpn
[PE2-l2vpn] quit
[PE2] interface gigabitethernet 2/0/0
[PE2-GigabitEthernet2/0/0] mpls l2vc 3.3.3.9 100
[PE2-GigabitEthernet2/0/0] quit
# Run the following command to check information about the L2VPN connection on the PEs.
The command output shows that an L2VC is set up and the VC status is Up.
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
interface GigabitEthernet1/0/0
ip address 100.1.1.1 255.255.255.0
#
return
l Configuration file of PE1
#
sysname PE1
#
mpls lsr-id 1.1.1.9
mpls
#
mpls l2vpn
#
mpls ldp
#
isis 1
network-entity 10.0000.0000.0001.00
#
interface GigabitEthernet1/0/0
mpls l2vc 2.2.2.9 100
#
interface GigabitEthernet2/0/0
ip address 10.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 1.1.1.9 255.255.255.255
isis enable 1
#
return
l Configuration file of ASBR-PE1
#
sysname ASBR-PE1
#
mpls lsr-id 2.2.2.9
mpls
#
mpls l2vpn
#
mpls ldp
#
isis 1
network-entity 10.0000.0000.0002.00
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
mpls l2vc 1.1.1.9 100
#
interface LoopBack0
ip address 2.2.2.9 255.255.255.255
isis enable 1
#
return
l Configuration file of ASBR-PE2
#
sysname ASBR-PE2
#
mpls lsr-id 3.3.3.9
mpls
#
mpls l2vpn
#
mpls ldp
#
isis 1
network-entity 10.0000.0000.0003.00
#
interface GigabitEthernet1/0/0
mpls l2vc 4.4.4.9 100
#
interface GigabitEthernet2/0/0
ip address 30.1.1.1 255.255.255.0
isis enable 1
mpls
mpls ldp
#
interface LoopBack0
ip address 3.3.3.9 255.255.255.255
isis enable 1
#
return
l Configuration file of PE2
#
sysname PE2
#
mpls lsr-id 4.4.4.9
mpls
#
mpls l2vpn
#
mpls ldp
#
isis 1
network-entity 10.0000.0000.0004.00
#
interface GigabitEthernet1/0/0
Only the AR2220, AR2240 (using SRU40, SRU60, SRU80, SRU200, or SRU400), AR3200 (using SRU40,
SRU60, SRU80, SRU200, or SRU400), and AR3600 (using SRUX5) series routers can be used in this
scenario.
As shown in Figure 13-17, the carrier MPLS network provides the L2VPN service for users
who access the network through low-speed TDM links. The backbone devices are connected
through the 4GECS interface cards on which the Combo interfaces work as electrical
interfaces with a rate of 1000 Mbit/s. Many users connect to the network through PE1 and
PE2, and users on the PEs change frequently. (This example lists only two user devices CE1
and CE2, and they are connected to the PEs which have 8E1T1-M interface cards installed.) A
proper VPN solution is required to provide secure VPN services for users, save network
resources, and simplify configuration when new users connect to the network.
Figure 13-17 Configuring TDM PWE3 using the 8E1T1-M interface card
Loopback1 Loopback1 Loopback1
1.1.1.9/32 2.2.2.9/32 3.3.3.9/32
Serial2/0/0:0 P Serial2/0/0:0
Serial1/0/0:0 PW Serial1/0/0:0
192.168.1.1/24 192.168.1.2/24
CE1 CE2
Configuration Roadmap
Because users on the PEs change frequently, manual configuration is inefficient and may
cause configuration errors. In this scenario, the two PEs can set up a remote LDP session and
use the LDP protocol to synchronize user information through a dynamic PW. Compared with
Martini, PWE3 reduces signaling costs and defines the multi-hop negotiation mode, making
networking more flexible. PWE3 is recommended if network resources need to be saved.
TDM PWE3 can be used to meet user requirements based on users' access modes.
The configuration roadmap is as follows:
1. Run an IGP protocol on the backbone network so that backbone devices can
communicate.
2. Enable basic MPLS capabilities, set up an LSP tunnel on the backbone network, and
establish a remote MPLS LDP peer relationship between the PEs at two ends of the PW.
3. Create an MPLS L2VC connection between CE1/PRI interfaces on the PEs to implement
TDM PWE3, so that users can communicate with each other.
4. Configure all the devices to work in clock synchronization state to ensure that CEs can
accurately exchange data with each other. In this example, the system clock of PE1 is
used as the clock source.
Procedure
Step 1 Configure IP addresses for the interfaces on the MPLS backbone network.
# Configure PE1. The configuration on P and PE2 is similar to the configuration on PE1 and
is not mentioned here.
<Huawei> system-view
[Huawei] sysname PE1
[PE1] interface loopback 1
[PE1-LoopBack1] ip address 1.1.1.9 255.255.255.255
[PE1-LoopBack1] quit
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] ip address 172.1.1.1 255.255.255.0
[PE1-GigabitEthernet1/0/0] quit
After the configuration is complete, run the display ip routing-table command. You can view
that the devices have learnt routes to Loopback1 of each other.
Step 3 Enable MPLS, and set up LSPs and remote LDP sessions.
Enable MPLS on the MPLS backbone network and set up a remote MPLS peer relationship
between the PEs.
# Configure PE1.
# Configure P.
[P] mpls lsr-id 2.2.2.9
[P] mpls
[P-mpls] quit
[P] mpls ldp
[P-mpls-ldp] quit
[P] interface gigabitethernet 1/0/0
[P-GigabitEthernet1/0/0] mpls
[P-GigabitEthernet1/0/0] mpls ldp
[P-GigabitEthernet1/0/0] quit
[P] interface gigabitethernet 2/0/0
[P-GigabitEthernet2/0/0] mpls
[P-GigabitEthernet2/0/0] mpls ldp
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] mpls lsr-id 3.3.3.9
[PE2] mpls
[PE2-mpls] quit
[PE2] mpls ldp
[PE2-mpls-ldp] quit
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] mpls
[PE2-GigabitEthernet1/0/0] mpls ldp
[PE2-GigabitEthernet1/0/0] quit
[PE2] mpls ldp remote-peer 1.1.1.9
[PE2-mpls-ldp-remote-1.1.1.9] remote-ip 1.1.1.9
[PE2-mpls-ldp-remote-1.1.1.9] quit
After the configuration is complete, run the display mpls ldp session command. You can
view that LDP sessions are established between PEs and between PEs and P, and the session
status is Operational.
Step 4 Configure user devices to access the PEs.
Configure interface parameters on the CEs and PEs because user devices access the PEs
through low-speed TDM links.
# Configure CE1.
<Huawei> system-view
[Huawei] sysname CE1
[CE1] controller e1 1/0/0
[CE1-E1 1/0/0] using e1
[CE1-E1 1/0/0] quit
[CE1] interface serial 1/0/0:0
[CE1-Serial1/0/0:0] link-protocol ppp
[CE1-Serial1/0/0:0] ip address 192.168.1.1 255.255.255.0
[CE1-Serial1/0/0:0] quit
# Configure PE1.
[PE1] controller e1 2/0/0
[PE1-E1 2/0/0] using e1
# Configure PE2.
[PE2] controller e1 2/0/0
[PE2-E1 2/0/0] using e1
[PE2-E1 2/0/0] quit
[PE2] interface serial 2/0/0:0
[PE2-Serial2/0/0:0] link-protocol tdm
[PE2-Serial2/0/0:0] quit
# Configure CE2.
<Huawei> system-view
[Huawei] sysname CE2
[CE2] controller e1 1/0/0
[CE2-E1 1/0/0] using e1
[CE2-E1 1/0/0] quit
[CE2] interface serial 1/0/0:0
[CE2-Serial1/0/0:0] link-protocol ppp
[CE2-Serial1/0/0:0] ip address 192.168.1.2 255.255.255.0
[CE2-Serial1/0/0:0] quit
Enable MPLS L2VPN on PE1 and PE2, and create a VC connection between them.
# Configure PE1.
[PE1] mpls l2vpn
[PE1-l2vpn] quit
[PE1] pw-template pe2pe
[PE1-pw-template-pe2pe] peer-address 3.3.3.9
[PE1-pw-template-pe2pe] jitter-buffer depth 8
[PE1-pw-template-pe2pe] tdm-encapsulation-number 8
[PE1-pw-template-pe2pe] quit
[PE1] interface serial 2/0/0:0
[PE1-Serial2/0/0:0] mpls l2vc pw-template pe2pe 100
[PE1-Serial2/0/0:0] quit
# Configure PE2.
[PE2] mpls l2vpn
[PE2-l2vpn] quit
[PE2] pw-template pe2pe
[PE2-pw-template-pe2pe] peer-address 1.1.1.9
[PE2-pw-template-pe2pe] jitter-buffer depth 8
[PE2-pw-template-pe2pe] tdm-encapsulation-number 8
[PE2-pw-template-pe2pe] quit
[PE2] interface serial 2/0/0:0
[PE2-Serial2/0/0:0] mpls l2vc pw-template pe2pe 100
[PE2-Serial2/0/0:0] quit
Configure all the devices to work in clock synchronization state; otherwise, CEs cannot
accurately exchange data with each other. The system clock of PE1 is used as the clock source
for all the devices.
# Configure PE1.
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] clock master
[PE1-GigabitEthernet1/0/0] quit
[PE1] controller e1 2/0/0
# Configure CE1.
[CE1] controller e1 1/0/0
[CE1-E1 1/0/0] clock slave
[CE1-E1 1/0/0] quit
# Configure the P.
[P] interface gigabitethernet 1/0/0
[P-GigabitEthernet1/0/0] clock slave
[P-GigabitEthernet1/0/0] quit
[P] clock source 0 1/0/0
[P] interface gigabitethernet 2/0/0
[P-GigabitEthernet2/0/0] clock master
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] clock slave
[PE2-GigabitEthernet1/0/0] quit
[PE2] clock source 0 1/0/0
[PE2] controller e1 2/0/0
[PE2-E1 2/0/0] clock system
[PE2-E1 2/0/0] quit
# Configure CE2.
[CE2] controller e1 1/0/0
[CE2-E1 1/0/0] clock slave
[CE2-E1 1/0/0] quit
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
controller E1 1/0/0
using e1
#
interface Serial1/0/0:0
link-protocol ppp
ip address 192.168.1.1 255.255.255.0
#
return
Only the AR2220, AR2240 (using SRU40, SRU60, SRU80, SRU200, or SRU400), AR3200 (using SRU40,
SRU60, SRU80, SRU200, or SRU400), and AR3600 (using SRUX5) series routers can be used in this
scenario.
As shown in Figure 13-18, the MPLS network of an Internet service provider (ISP) provides
the L2VPN service for users who access the network through low-speed TDM links. Many
users connect to the network through PE1 and PE2, and users on the PEs change frequently.
(This example lists only two user devices CE1 and CE2, and they are connected to the PEs
which have 8SA interface cards installed.) A proper VPN solution is required to provide
secure VPN services for users, save network resources, and simplify configuration when new
users connect to the network.
Figure 13-18 Configuring TDM PWE3 using the 8SA interface card
Loopback1 Loopback1 Loopback1
1.1.1.9/32 2.2.2.9/32 3.3.3.9/32
Serial2/0/0 P Serial2/0/0
Serial1/0/0 PW Serial1/0/0
192.168.1.1/24 192.168.1.2/24
CE1 CE2
Configuration Roadmap
Because users on the PEs change frequently, manual configuration is inefficient and may
cause configuration errors. In this scenario, the two PEs can set up a remote LDP session and
use the LDP protocol to synchronize user information through a dynamic PW. Compared with
Martini, PWE3 reduces signaling costs and defines the multi-hop negotiation mode, making
networking more flexible. PWE3 is recommended if network resources need to be saved.
TDM PWE3 can be used to meet user requirements based on users' access modes.
The configuration roadmap is as follows:
1. Run an IGP protocol on the backbone network so that backbone devices can
communicate.
2. Enable basic MPLS capabilities, set up an LSP tunnel on the backbone network, and
establish a remote MPLS LDP peer relationship between the PEs at two ends of the PW.
3. Create an MPLS L2VC connection between CE1/PRI interfaces on the PEs to implement
TDM PWE3, so that users can communicate with each other.
Procedure
Step 1 Configure IP addresses for the interfaces on the MPLS backbone network.
# Configure PE1. The configuration on P and PE2 is similar to the configuration on PE1 and
is not mentioned here.
<Huawei> system-view
[Huawei] sysname PE1
[PE1] interface loopback 1
[PE1-LoopBack1] ip address 1.1.1.9 255.255.255.255
[PE1-LoopBack1] quit
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] ip address 172.1.1.1 255.255.255.0
[PE1-GigabitEthernet1/0/0] quit
After the configuration is complete, run the display ip routing-table command. You can view
that the devices have learnt routes to Loopback1 of each other.
Step 3 Enable MPLS, and set up LSPs and remote LDP sessions.
Enable MPLS on the MPLS backbone network and set up a remote MPLS peer relationship
between the PEs.
# Configure PE1.
[PE1] mpls lsr-id 1.1.1.9
[PE1] mpls
[PE1-mpls] quit
[PE1] mpls ldp
[PE1-mpls-ldp] quit
[PE1] interface gigabitethernet 1/0/0
[PE1-GigabitEthernet1/0/0] mpls
[PE1-GigabitEthernet1/0/0] mpls ldp
[PE1-GigabitEthernet1/0/0] quit
[PE1] mpls ldp remote-peer 3.3.3.9
[PE1-mpls-ldp-remote-3.3.3.9] remote-ip 3.3.3.9
[PE1-mpls-ldp-remote-3.3.3.9] quit
# Configure P.
[P] mpls lsr-id 2.2.2.9
[P] mpls
[P-mpls] quit
[P] mpls ldp
[P-mpls-ldp] quit
[P] interface gigabitethernet 1/0/0
[P-GigabitEthernet1/0/0] mpls
[P-GigabitEthernet1/0/0] mpls ldp
[P-GigabitEthernet1/0/0] quit
[P] interface gigabitethernet 2/0/0
[P-GigabitEthernet2/0/0] mpls
[P-GigabitEthernet2/0/0] mpls ldp
[P-GigabitEthernet2/0/0] quit
# Configure PE2.
[PE2] mpls lsr-id 3.3.3.9
[PE2] mpls
[PE2-mpls] quit
[PE2] mpls ldp
[PE2-mpls-ldp] quit
[PE2] interface gigabitethernet 1/0/0
[PE2-GigabitEthernet1/0/0] mpls
[PE2-GigabitEthernet1/0/0] mpls ldp
[PE2-GigabitEthernet1/0/0] quit
[PE2] mpls ldp remote-peer 1.1.1.9
[PE2-mpls-ldp-remote-1.1.1.9] remote-ip 1.1.1.9
[PE2-mpls-ldp-remote-1.1.1.9] quit
After the configuration is complete, run the display mpls ldp session command. You can
view that LDP sessions are established between PEs and between PEs and P, and the session
status is Operational.
Step 4 Configure user devices to access the PEs.
Configure interface parameters on the CEs and PEs because user devices access the PEs
through low-speed TDM links.
# Configure CE1.
<Huawei> system-view
[Huawei] sysname CE1
[CE1] interface serial 1/0/0
[CE1-Serial1/0/0] link-protocol ppp
[CE1-Serial1/0/0] ip address 192.168.1.1 255.255.255.0
[CE1-Serial1/0/0] physical-mode async
[CE1-Serial1/0/0] quit
# Configure PE1.
[PE1] interface serial 2/0/0
[PE1-Serial2/0/0] link-protocol tdm
[PE1-Serial2/0/0] physical-mode async
[PE1-Serial2/0/0] quit
# Configure PE2.
[PE2] interface serial 2/0/0
[PE2-Serial2/0/0] link-protocol tdm
[PE2-Serial2/0/0] physical-mode async
[PE2-Serial2/0/0] quit
# Configure CE2.
<Huawei> system-view
[Huawei] sysname CE2
[CE2] interface serial 1/0/0
[CE2-Serial1/0/0] link-protocol ppp
[CE2-Serial1/0/0] ip address 192.168.1.2 255.255.255.0
[CE2-Serial1/0/0] physical-mode async
[CE2-Serial1/0/0] quit
# Configure PE2.
[PE2] mpls l2vpn
[PE2-l2vpn] quit
[PE2] pw-template pe2pe
[PE2-pw-template-pe2pe] peer-address 1.1.1.9
[PE2-pw-template-pe2pe] jitter-buffer depth 8
[PE2-pw-template-pe2pe] tdm-encapsulation-number 8
[PE2-pw-template-pe2pe] quit
[PE2] interface serial 2/0/0
[PE2-Serial2/0/0] mpls l2vc pw-template pe2pe 100
[PE2-Serial2/0/0] quit
# Check the L2VPN connections on PEs. You can see that an L2VC connection has been set
up and is in the Up state.
----End
Configuration Files
l Configuration file of CE1
#
sysname CE1
#
interface Serial1/0/0
link-protocol ppp
ip address 192.168.1.1 255.255.255.0
physical-mode async
#
return
remote-ip 3.3.3.9
#
interface Serial2/0/0
link-protocol tdm
mpls l2vc pw-template pe2pe 100
physical-mode async
#
interface GigabitEthernet1/0/0
ip address 172.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 1.1.1.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.1.9 0.0.0.0
network 172.1.1.0 0.0.0.255
#
return
l Configuration file of the P device
#
sysname P
#
mpls lsr-id 2.2.2.9
mpls
#
mpls ldp
#
interface GigabitEthernet1/0/0
ip address 172.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet2/0/0
ip address 172.2.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 2.2.2.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 2.2.2.9 0.0.0.0
network 172.1.1.0 0.0.0.255
network 172.2.1.0 0.0.0.255
#
return
l Configuration file of PE2
#
sysname PE2
#
mpls lsr-id 3.3.3.9
mpls
#
mpls l2vpn
#
pw-template pe2pe
peer-address 1.1.1.9
#
mpls ldp
#
mpls ldp remote-peer 1.1.1.9
remote-ip 1.1.1.9
#
interface Serial2/0/0
link-protocol tdm
mpls l2vc pw-template pe2pe 100
physical-mode async
#
interface GigabitEthernet1/0/0
ip address 172.2.1.2 255.255.255.0
mpls
mpls ldp
#
interface LoopBack1
ip address 3.3.3.9 255.255.255.255
#
ospf 1
area 0.0.0.0
network 3.3.3.9 0.0.0.0
network 172.2.1.0 0.0.0.255
#
return
13.11 References
This section provides references for the PWE3 feature.
The following table lists the RFC standards related to the PWE3 feature.