MPLS VPN Vol1 PDF
MPLS VPN Vol1 PDF
Junos
and VPNs
10.a
Student Guide
Volume 1
Junl e[
NETWORKS
Worldwide Education Services
In
USA.
Revision History:
Revision 10.a-December 20.10
The information in this document is current as of the <late listed above.
The mformation in this document !las been carefully verified and is believed to be accurate for software Release 10.3Rl.9. Juniper Networks assumes no
responsibihtles for any inaccuracies that may appear in this document. In no event will Juniper Networks be hable for direct, indirect, special, exemplary,
Incidental. or consequential damages resulting from any defect or omission in this document, even if advised of the possibility of such damages.
Juniper Networks reserves tile right to change, modify, transfer, or otllerWlse revise this publication without notice.
SOFTWARE LICENSE
The terms and conditions for using Juniper Networks software are described in the software license provided with tl1e software, or to the extent applicable, in an
agreement executed between you and Juniper Networks, or Juniper Networks agent. By using Juniper Networks software, you indicate that you understand and
agree to be bound by its license terms and conditions, Generally speaking, the software license restricts tile manner in Wl1ich you are permitted to use the Juniper
Networks software, may contain prohibitions agains: certain uses, and may state conditions under which the license is automatlcaliy terminated. You stlOuld
consult the software license for further details.
Document Conventions
Description
Usage Example
Franklin Gothic
Normal text.
Courier New
Console text:
Screen captures
Noncommand-related
syntax
GUI text elements:
Menu names
commit complete
Exiting configuration mode
Description
Usage Example
Normal CLI
No distinguishing variant.
Physical interface:fxpO,
Enabled
Normal GUI
GUI Input
Description
Usage Example
CLI variable
policy my-peers
GUI Variable
GUI Undefined
www.juniper.net
lO.O.~
Document Conventions ix
Additional Information
Education Services Offerings
You can obtain information on the latest Education Services offerings, course dates, and class
locations from the World Wide Web by pointing your Web browser to:
http://www.juniper.net/training/education/.
Technical Publications
You can print technical manuals and release notes directly from the Internet in a variety of formats:
Go to http:;/www.juniper,netjtechpubs/.
Locate the specific software or hardware release and title you need, and choose the
format in which you want to view or print the document.
Documentation sets and CDs are available through your local Juniper Networks sales office or
account representative.
x Additional Information
www.juniper.net
Junt8v~[
Junos MPLS and VPNs
Chapter 1: Course Introduction
II
www.juniper.net
Contents
Chapter 1:
Chapter 2:
Chapter 3:
Chapter 4:
Chapter 5:
Chapter 6:
www.juniper.net
Contents' iii
Chapter 7:
Chapter 8:
Chapter 9:
Chapter 11: Layer 3 VPN Scaling and Internet Access .................................. 11-1
Scaling Layer 3 VPNs ......................................................... 11-3
Public Internet Access Options .................................................11-24
Lab 8: Route Reflection and Internet Access .....................................11-36
iv Contents
www.juniper.net
www.juniper.net
Contents v
vi Contents
www.juniper.net
Intended Audience
This course benefits individuals responsible for configuring and monitoring devices running the
Junos OS.
Course Level
Junos MPLS and VPNs (JMV) is an advanced-level course.
Prerequisites
Students should have intermediate-level networking knowledge and an understanding of the Open
Systems Interconnection (OSI) model and the TCPjlP protocol suite. Students should also have
familiarity with the Protocol Independent Multicast-Sparse Mode (PIM-SM) protocol. Students
should also attend the Introduction to the Junos Operating System (IJOS), Junos Routing Essentials
(JRE), and Junos Service Provider Switching (JSPX) courses prior to attending this class.
www.juniper.net
Course Agenda
Day 1
Chapter 1:
Course Introduction
Chapter 2:
MPLS Fundamentals
Lab 1: MPLS Fundamentals
Chapter 3:
Chapter 4:
Lab 3: CSPF
Day 2
Chapter 5:
Chapter 6:
Chapter 7:
VPN Review
Chapter 8:
Layer 3 VPNs
Day 3
Chapter 9:
Day 4
Chapter 13: Multicast VPNs
Chapter 14: BGP Layer 2 VPNs
Lab 10: BGP Layer 2 VPNs
Chapter 15: Layer 2 VPN Scaling and COS
Chapter 16: LOP Layer 2 Circuits
Lab 11: Circuit Cross Connect and LOP Layer 2 Circuits
Chapter 17: Virtual Private LAN Service
Day 5
Chapter 18: VPLS Configuration
Lab 12: Virtual Private LAN Service
Chapter 19: Interprovider VPNs
Lab 13: Carrier-of-Carrier VPNs
www.juniper.net
Course Overview
This five-day course is designed to provide students with MPLS-based virtual private network (VPN)
knowledge and configuration examples. The course includes an overview of MPLS concepts such
as control and forwarding plane, RSVP Traffic Engineering, LDP, Layer 3 VPNs, next-generation
multicast virtual private networks (MVPNs), BGP Layer 2 VPNs, LDP Layer 2 Circuits, and virtual
private LAN service (VPLS). This course also covers Junos operating system-specific
implementations of Layer 2 control instances and active interface for VPLS. This course is based on
the Junos OS Release 10.3Rl.9.
Through demonstrations and hands-on labs, students will gain experience in configuring and
monitoring the Junos OS and in device operations.
Objectives
After successfully completing this course, you should be able to:
Explain common terms relating to MPLS.
Explain routers and the way they forward MPLS packets.
Explain packet flow and handling through a label-switched path (LSP).
Describe the configuration and verification of MPLS forwarding.
Understand the information in the Label Information Base.
Explain the two label distribution protocols used by the Junos OS.
Configure and troubleshoot RSVP-signaled and LDP-signaled LSPs.
Explain the constraints of both RSVP and LDP.
Explain the path selection process of RSVP without the use of the Constrained
Shortest Path First (CSPF) algorithm.
Explain the Interior Gateway Protocol (IGP) extensions used to build the Traffic
Engineering Database (TED).
Describe the CSPF algorithm and its path selection process.
Describe administrative groups and how they can be used to influence path selection.
Describe the default traffic protection behavior of RSVP-Signaled LSPs.
Explain the use of primary and secondary LSPs.
Explain LSP priority and preemption.
Describe the operation and configuration of fast reroute.
Describe the operation and configuration of link and node protection.
Describe the LSP optimization options.
Explain the purpose of several miscellaneous MPLS features.
Explain the definition of the term "Virtual Private Network".
Describe the differences between prOVider-provisioned and customer-provisioned
VPNs.
Describe the differences between Layer 2 VPNs and Layer 3 VPNs.
Explain the features of provider-provisioned VPNs supported by the Junos OS.
Explain the roles of Provider (P) routers, Provider Edge (PE) routers, and Customer
Edge (CE) routers.
Describe the VPN-IPv4 address formats.
Describe the route distinguisher use and formats.
Explain the RFC 4364 control flow.
www.juniper.net
Course Overview v
Create a routing instance, assign interfaces, create routes, and import and export
routes within the routing instance using route distinguishers and route targets.
Explain the purpose of BGP extended communities and how to configure and use
these communities.
Describe the steps necessary for proper operation of a PE to CE dynamic routing
protocol.
Configure a simple Layer 3 VPN using a dynamic CE-PE routing protocol.
Describe the routing-instance switch.
Explain the issues with the support of traffic originating on multiaccess VPN routing
and forwarding table (VRF table) interfaces.
Use operational commands to view Layer 3 VPN control exchanges.
Use operational commands to display Layer 3 VPN VRF tables.
Monitor and troubleshoot PE-CE routing protocols.
Describe the four ways to improve Layer 3 VPN scaling.
Describe the three methods for providing Layer 3 VPN customers with Internet access.
Describe how the auto-export command and routing table groups can be used to
support communications between sites attached to a common PE router.
Describe the flow of control and data traffic in a hub-and-spoke topology.
Describe the various Layer 3 VPN class-of-service (CoS) mechanisms supported by
the Junos OS.
Explain the Junos OS support for generic routing encapsulation (GRE) and IP Security
(IPsec) tunnels in Layer 3 VPNs.
Describe the flow of control traffic and data traffic in a next-generation MVPN.
Describe the configuration steps for establishing a next-generation MVPN.
Monitor and verify the operation of next-generation MVPNs.
Describe the purpose and features of a BGP Layer 2 VPN.
Describe the roles of a CE device, PE router, and P router in a BGP Layer 2 VPN.
Explain the flow of control traffic and data traffic for a BGP Layer 2 VPN.
Configure a BGP Layer 2 VPN and describe the benefits and requirements of
over-provisioning.
Monitor and troubleshoot a BGP Layer 2 VPN.
Explain the BGP Layer 2 VPN scaling mechanisms and route reflection.
Describe the Junos OS BGP Layer 2 VPN CoS support.
Describe the flow of control and data traffic for an LOP Layer 2 circuit.
Configure an LOP Layer 2 circuit.
Monitor and troubleshoot an LOP Layer 2 circuit.
Describe and configure circuit cross-connect (CCC) MPLS interface tunneling.
Describe the difference between Layer 2 MPLS VPNs and VPLS.
Explain the purpose of the PE device, the CE device, and the P device.
Explain the provisioning of CE and PE routers.
Describe the signaling process of VPLS.
Describe the learning and forwarding process of VPLS.
Describe tile potential loops in a VPLS environment.
vi Course Overview
www.juniper.net
Introductions
The slide asks several questions for you to answer during class introductions.
www.juniper.net
II1II
Contents:
Chapter 1: Course Introduction
Chapter 2: MPLS Fundamentals
Chapter 3: Label Distribution Protocols
Chapter 4: Constrained Shortest Path First
Chapter 5: Traffic Protection and LSP Optimization
Chapter 6: Miscellaneous MPLS Features
Chapter 7: VPN Review
Chapter 8: Layer 3 VPNs
www.juniper.net
III
Contents: (contd.)
.. Chapter 9: Basic Layer 3 VPN Configuration
.. Chapter 10: Troubleshooting Layer 3 VPNs
.. Chapter 11: Layer 3 VPN Scaling and Internet Access
Chapter 12: Layer 3 VPNs-Advanced Topics
Chapter 13: Multicast VPNs
Chapter 14: BGP Layer 2 VPNs
Chapter 15: Layer 2 VPN Scaling and CoS
Chapter 16: LOP Layer 2 Circuits
Chapter 17: Virtual Private LAN Service
" Chapter 18:VPLS Configuration
Chapter 19: Interprovider Backbones
www.juniper.net
III
Prerequisites
The slide lists the prerequisites for this course.
www.juniper.net
III
The basics:
Sign-in sheet
Schedule
Class times
Breaks
Lunch
www.juniper.net
III
III
www.juniper.net
III
Juniper
Networ~<s
books
http://www.juniper.netjtraining/jnbooksj
Certification resources
http:jjwww.juniper.netjtraining/certificationjresources.lltml
Additional Resources
The slide provides links to additional resources available to assist you in the installation,
configuration, and operation of Juniper Networks products.
www.juniper.net
G'2i
G'2i
5t'i
5t'i
5t'i
5t'i
5t'i
Fee,jl1ach
5t'i
5t'i
==
III
Satisfaction Feedback
Juniper Networks uses an electronic survey system to collect and analyze your comments and
feedback. Depending on the class you are taking, please complete the survey at the end of the class,
or be sure to look for an e-mail about two weeks from class completion that directs you to complete
an online survey form. (Be sure to provide us with your current e-mail address.)
Submitting your feedback entitles you to a certificate of class completion. We thank you in advance
for taking the time to help us improve our educational offerings.
www.juniper.net
III
Formats:
Classroom-based instructor-led technical courses
Online instructor-led technical courses
Hardware installation eLearning courses as well as technical
eLearning courses
III
Course List
You can access the latest Education Services offerings covering a wide range of platforms at
http://www.juniper.netjtrainingjtechnical_education/.
www.juniper.net
II
CERTIFICATION
PROGRAM
www.juniper.net
www.juniper.net
III
III
On-the~ob
experience
www.juniper.net
Any Questions?
If you have any questions or concerns about the class you are attending, we suggest that you voice
them now so that your instructor can best address your needs during class.
www.juniper.net
www.juniper.net
III
www.juniper.net
~ MPLS
Foundation
.. Terminology
.. MPLS Configuration
III
MPLS Foundation
The slide lists the topics we cover in this chapter. We discuss the highlighted topic first.
www.juniper.net
IIIIGP Forwarding
Traffic is routed based on the IGP's best path selection
Rl
IGP Forwarding
This slide shows metric-based traffic engineering in action. When sending traffic from a network
connected to Rl to a network connected to R6, traffic is routed through R3 because it has a lower
overall cost (3, as opposed to 4, through R4). Note that not only the traffic destined for networks
connected to R6 follow the upper path, but also all traffic for networks connected to R7 and any routers
downstream from these routers.
www.juniper.net
III
Rl
1
Redirecting Traffic
At some point, sending all of the traffic for R6 and R7 and points beyond through the R3 might not be
the best idea. For example, a lot of local traffic to the R3 might exist, and this traffic might delay the
traffic to R6 and R7 while the path through R4 is underutilized. Whatever the actual cause, you might
want to route at least some of the traffic to some destinations over the lower links and through R4.
Suppose traffic for R7 needs to be rerouted onto this lower path.
Rerouting traffic for R7 by raising metrics along the current path, as shown in the slide, has the desired
effect. Traffic to R7 now follows the path with cost 4 instead of cost 5. But forcing the traffic to use R4,
by raising the metric on the upper path, has the unintended effect of causing traffic destined for R6 to
do the same and flow through R4.
Because interior gateway protocol (IGP) route calculation is topology driven and based on a simple
additive metric, such as the hop count or an administrative value, the traffic patterns on the network are
not taken into account when the IGP calculates its forwarding table. As a result, traffic will not be evenly
distributed across the network's links, causing inefficient use of expensive resources. Some links may
become congested, while other links remain underutilized. This result might be satisfactory in a smaller
network with less traffic, but in larger networks or networks with many connections, you must control the
paths that traffic takes in order to balance the traffic load. In other words, you need more control for
realistic traffic engineering than the usual IGP method of sending al/ traffic to a group of destinations
over the same, single best path.
www.juniper.net
III
.. Lacks control
All traffic flows over the IG P shortest path
Possible Destabilization
Changing of IGP metric to force traffic path movements has more drawbacks than just moving the traffic
to downstream destinations along with the target to the new path. Adjusting metrics manually can have
a severe destabilizing effect on a network, especially a large one. As Internet service provider (ISP)
networks became more richly connected, it became more difficult to ensure that a metric adjustment in
one part of the network did not cause problems in another part of the network. Adjusting metrics just
tended to move problems around. The low-cost links and paths became saturated, wllile the higher-cost
links and paths remained almost devoid of traffic.
There was little to no real control over the process. All traffic followed the path with the lowest IGP metric
because no other standard mechanism to distribute traffic flow existed. There were no rules and few
guidelines to follow about which metrics to adjust and by how much to adjust them. Traffic engineering
based on metric manipulation offered a trial-and-error approach, rather than a scientific solution to an
increasingly complex problem.
www.juniper.net
l1li
Network
l1li
l1li
Downsides of ATM
Maintain separate infrastructure
ATM cell overhead
Scalability issues
Not well integrated
Benefits of ATM
ATM switches use what are called virtual circuits (VCs) to logically connect the routers and forward
traffic. From the perspective of the routers these VCs are viewed as pOint-to-point connections, but as
you can see the physical topology can be much more complicated. If a section within the network is
deemed to be overutilized then the VCs can be altered, moving traffic to a less utilized section, without
changing the topology from the routers perspective. Another benefit for using an ATM network is the
ability to gather statistics on a per-VC basis. With standard IGP routing there was no way to gather
relevant statistics because all traffic either entering or leaving the router was counted. Being able to
count the traffic entering or leaving a VC allowed the ISPs to evaluate the network load of each VC and
engineer their network accordingly.
Continued on next page.
www.juniper.net
Downsides of ATM
One of the downsides to running an ATM overlay network is that each of the different core technologies
(ATM and IP) required separate expert engineers and support staff to address the problems in their
platforms.
Another downside is that, ATM cell overhead (often called the ATM cell tax) is introduced when
packet-oriented protocols, such as IP, are carried over an ATM infrastructure. ATM overhead is never less
than about 10% and sometimes as high as 62% (a 40-byte TCP/IP acknowledgement packet requires
106 bytes of ATM on the wire when using ML 5 and multi protocol encapsulation). Assuming 20%
overhead for ATM running on a 2.488-Gbps OC-48 link, 1.99 Gbps is available for customer data, and
498 Mbps-almost a full OC-12-is required for the ATM overhead. On a 10-Gbps OC-192 interface,
some 1.99 Gbps-almost a full OC-48 of the link's capacity-is consumed by ATM overhead!
A network that deploys a full mesh of ATM VCs exhibits the traditional n2 problem for the number of links
to be maintained (n x (n-1))/2) where n is the number of routers. For relatively small or moderately sized
networks, this problem is not a major issue. However, for core ISPs with hundreds of attached routers,
the challenge is quite significant. For example, when expanding a network from five to six routers, an ISP
must increase the number of VCs from 20 to 30. However, increasing the number of attached routers
from 200 to 201 requires the addition of 400 new VCs-an increase from 39,800 to 40,200 VCs. These
numbers do not include backup VCs or additional VCs for networks running multiple services that
require more than one VC between any two routers.
ATM VCs are not integrated with the IGP either. Thus, deploying full-mesh of VCs also stresses the IGP.
This stress results from the number of peer IGP relationships that must be maintained, the challenge of
processing n 3 link-state updates in the event of a failure, and the complexity of performing the Dijkstra
calculation over a topology containing a significant number of logical links. As an ATM core expands, the
n2 stress on the IGP compounds.
www.juniper.net
III
www.juniper.net
III
R6
Rl
www.juniper.net
III
www.juniper.net
III
32-Bit
MPLSshim Header
www.juniper.net
www.juniper.net
II
..
MPLSHeader
Data
32 bits
20-bit label: Identifies the packet to a particular LSP. This value changes as the packet
flows on the LSP from LSR to LSR.
Class of service (CoS) (experimental): Indicates queuing priority through the network. This
field was initially just the CoS field, but lack of standard definitions and use led to the
current designation of this field as experimental. In other words, this field was always
intended for CoS, but which type of CoS is still experimental. At each hop along the way, the
CoS value determines which packets receive preferential treatment within the tunnel.
Bottom of stack bit: Indicates whether this MPLS packet has more than one label
associated with it. The MPLS implementation in the Junos OS supports unlimited label
stack depths for transit LSR operations. At ingress up to three labels can be pushed onto a
packet. The bottom of the stack of MPLS labels is indicated by a 1 bit in this field; a setting
of 1 tells the LSR that after popping the label stack an unlabeled packet will remain.
Time to five (TTL): Contains a limit on the number of router hops this MPLS packet can
travel through the network. It is decremented at each hop, and if the TIL value drops below
1, the packet is discarded. The default behavior is to copy the value of the IP packet into
this field at the ingress router.
www.juniper.net
III
Things to Remember
The following are some of the key things to remember about working with MPLS labels:
MPLS labels can be either assigned manually or set up by a signaling protocol running in
each LSR along the path of the LSP. Once the LSP is set up, the ingress router and all
subsequent routers in the LSP do not examine the IP routing information in the labeled
packet-they use the label to look up information in their label forwarding tables. Changing
Labels by Segment
Much as with ATM VCls, MPLS label values change at each segment of the LSP. A single
router can be part of multiple LSPs. It can be the ingress or egress router for one or more
LSPs, and it also can be a transit router of one or more LSPs. The functions that each router
supports depend on the network design.
The LSRs replace the old label with a new label in a swap operation and then forward the
packet to the next router in the path. When the packet reaches the LSP's egress point, it is
forwarded again based on longest-match IP forwarding.
There is nothing unique or special about most of the label values used in MPLS. We say
that labels have local significance, meaning that a label value of 10254, for example,
identifies one LSP on one router, and the same value can identify a different LSP on
another router.
www.juniper.net
III
= IPv4Explicit NULL
-1 = Router Alert Label
-2 = IPv6 Explicit NULL
-3 = Implicit NULL
-0
www.juniper.net
www.juniper.net
III
metric 1
metric 1
metric 1
metric 1
via ge-1/0/6.0, Swap 1000515
www.juniper.net
~Terminology
Terminology
The slide highlights the topic we discuss next.
www.juniper.net
II
III
Rl
Label-8witching Routers
An LSR understands and forwards MPLS packets, which flow on, and are part of, an LSP. In addition, an
LSR participates in constructing LSPs for the portion of each LSP entering and leaving the LSR. For a
particular destination, an LSR can be at the start of an LSP, the end of an LSP, or in the middle of an
LSP. An individual router can perform one, two, or all of these roles as required for various LSPs.
However, a single router cannot be both entrance and exit points for any individual LSP.
Router = LSR
This course uses the terms LSR and
being an LSR.
www.juniper.net
III
LSP
" Unidirectional path through netwol-k
"Generally within a single MPLS domain
Label-Switched Path
An LSP is a one-way (unidirectional) flow of traffic, carrying packets from beginning to end. Packets must
enter the LSP at the beginning (ingress) of the path, and can only exit the LSP at the end (egress).
Packets cannot be injected into an LSP at an intermediate hop.
Generally, an LSP remains within a single MPLS domain. That is, the entrance and exit of the LSP, and all
routers in between, are ultimately in control of the same administrative authority. This ensures that
MPLS LSP traffic engineering is not done haphazardly or at cross purposes but is implemented in a
coordinated fashion.
www.juniper.net
II
Ingress router
.. Packets enter LSP at ingress
Also called a head-end router
.. Upstream from other routers
Performs label push operation
R3
R6
www.juniper.net
III
Transit router
.. There can be zero or more transit routers
.. Perform label swap operations
.. Forward traffic to next hop in LSP
www.juniper.net
III
Penultimate router
.. Second-to-Iast router
.. Normally pops the label stack
.. Unlabeled packets sent to egress
www.juniper.net
III
Egress router
.. Packets exit LSP at egress
.. Also called tail-end router
.. Downstream from other routers
.. Forwards packets based on IP address
R3
Rl
www.juniper.net
~MPLS Configuration
MPLS Configuration
The slide highlights the topic we discuss next.
www.juniper.net
III
Interface Configuration
Default behavior of an interface is to accept only I P packets.
Protocol family inet
I family
mpls;j
Interface Configuration
The default behavior of an interface is to accept IP packets. In the Junos OS, this is done by adding the
protocol family inet with an IP address to tile interface you are working with. In order for the interface to
recognize and accept MPLS packets we have to also configure the MPLS protocol family under the
interfaces that will be participating in your MPLS domain. Sample output demonstrates an interface
configuration with both families applied.
www.juniper.net
III
www.juniper.net
III
www.juniper.net
III
The transit static LSP is added to the mpls.O routing table. You should configure each static LSP using a
unique name and at least one unique incoming label on the router. Each transit static LSP can have one
or more incoming labels configured. If a transit LSP has more than one incoming label. each would
effectively operate as an independent LSP, meaning you could configure all of the related LSP attributes
for each incoming label. The range of incoming labels available is limited to the standard static LSP
range of labels (1,000,000 through 1,048.575). To verify that a static LSP has been added to the
routing table, issue the show route table mpls.O command.
Since we must configure the pop action at the penultimate router we do not need to configure the static
LSP on the egress router. The packet coming into the egress router will be routed based on its Layer 3
information.
www.juniper.net
III
II
Additional Information
It is best practice make your LSP names unique to the path. This allows you to quickly identify the path
you are looking for when troubleshooting or making alterations to the configuration.
In the Junos as you can configure your outgoing label with values from 0 to 1,048,575 but will only
accept a incoming label between 1,000,000 and 1,048,575 on the transit router. The Junos as allows
the outgoing label to be configured this way to allow interoperability with other vendor equipment that
may not have the same static label restriction on the transit routers.
The Junos as will also allow the static label to be swapped and sent with a label value of 0 from the
penultimate router. This will allow the egress router to honor the EXP bits when queuing traffic through
the static LS P.
www.juniper.net
l1li
III
www.juniper.net
Route Resolution
The example in the next series of slides shows how a router uses the information learned by BGP to
forward transit traffic into a LSP. We begin by examining how traffic is forwarded to the 64.25.1/24
network from the perspective of the Core.
Things start with the 64.25.1/24 prefix being learned by the R5 router through its EBGP session to
Site2. The R1 router then learns about 64.25.1/24 through its internal BGP (IBGP) session to R5. R1
installs the prefix as active and readvertises the prefix to the Site1 router, again using EBGP.
In this example, routers in Site1 begin sending traffic to 64.25.1/24 prefixes through R1. When this
transit traffic arrives at the R1 router, it must decide how to forward this transit traffic to 64.25.1/24.
So far, nothing in this example has anything to do with MPLS or traffic engineering. This has simply been
a recap of conventional BGP operation.
www.juniper.net
Site 1
AS65510
84251/24
64.25.1. 0/24
(12 active,
= Both
0 holddown,
1 hidden)
www.juniper.net
III
www.juniper.net
III
Suggested Resolution
This slide solves the 64.25.1/24 hidden route problem at R1 through a next-hop self policy applied at
the R5 router. A next-hop self solution is one of several viable ways to correct unreachable BGP next
hops.
Setting next-hop self on the R5 router results in the route advertisement for 64.25.1/24 arriving at the
R1 router with a BGP next hop that represents the R5 router's loopback address. The R1 router can
resolve the R5 router's loopback address because the IGP running throughout the autonomous system
(AS) advertises that information.
At this stage, transit connectivity to 64.25.1/24 destinations is now provided by the core. This
connectivity is based on IGP forwarding.
www.juniper.net
III
www.juniper.net
www.juniper.net
l1li
www.juniper.net
!*[OSPF/10] 01:34:3?~:~~tcic 3
> to 172.20.0.2 via ge-1/0/6.0
[BGP/1701 00:46:34, localpcef 100, fcom 192.168.1.5
AS path: I
> to 172.20.0.2 via ge-1/0/6.0, Push 1000050
www.juniper.net
www.juniper.net
III
Ingress router
.. RSVP/LOP/Static:
Signal LSPs to egress router
InstalilP prefix to egress router into the inet. 3 routing table
- Specifies LSP' s egress interface and label assigned by the
downstream router
IP
Routing Tallie
(inet.O)
IvlPLS
Routing Tallie
(inet.3)
Ingress Router
The previous example demonstrated how signaled LSPs are installed in the inet. 3 routing table.
RSVP, LDP, and Static LSPs install the I P prefix to the egress router into the inet . 3 table on the ingress
router. We will discuss RSVP and LDP in later chapters.
The next-hop data for entries in the inet . 3 table consist of the LSP's egress interface and the label
value assigned by the LSP's first downstream router.
Note that the various routing protocols continue to use the inet. 0 IP routing table to determine the
current active route to IP destinations.
Continued on next page.
www.juniper.net
www.juniper.net
I
III
--,
I
,.
MPLS
IP
RoutingTable
RoutingTable
(inet.O)
(inet.3)
Contains IP
prefix to egress
router with LSP
nexthop.
On Iy BG P uses
this routing
table.
www.juniper.net
III
III
-.
.
I
inet.O
inet.3
to: 64,25.~
192.168.1.5 ~ my-lsp
Push label 1000050
192.168.1.5 ~ my-lsp
Push label 1000050
64.25.1/24.
www.juniper.net
III
www.juniper.net
III
inet.3
MPLS routing table
Houses signaled LSPs at ingress node
Can install additional prefixes per LSP with
ins tall preix;
mpls. 0
MPLS label-switching table
Used by transit and egress routers
www.juniper.net
www.juniper.net
III
Ingress router
Performs forwarding lookup based on destination IP address
Resolves in inet. 3 or inet. 0 routing table
After the next hop is determined to be the LSP ,the MPLS
header is added and the packet is forwarded with the
corresponding label
user@R2> show route table inet.3
inet.3: 1 destinations, 1 routes (1 active, 0 holddo,Vll, 0 hidden)
Push 1000050
www.juniper.net
III
Transit router
... Performs forwarding lookup based on incoming label
Resolves in mpls . 0 routing table
Egress router
.. Performs forwarding lookup based on destination IP address
Resolves in the inet. 0 or inet. 3 routing table
www.juniper.net
III
Receive
www.juniper.net
III
www.juniper.net
III
Implicit NULL
Default operation in the Junos OS
Egress router signals the penultimate to perform the label
pop
III
Explicit NULL
Configured on the egress router
Signals the penultimate router to forward the packet with a
MPLS header
Egress router pops the label before forwarding it in its native
IP form
Implicit NULL
Implicit Null is the default behavior in the Junos OS from the perspective of the egress router. This
operation tells the upstream router (penultimate) tllat they should pop the label and forward the packet
without a MPLS header.
Explicit NULL
Explicit Null can be configured on the egress router under the [edit protocols mpls] hierarchy. This
operation tells the upstream router (penultimate) they it needs to forward the packets on to the egress
router with a MPLS header and the egress router will handle the pop action.
www.juniper.net
II
www.juniper.net
Review Questions
1.
2.
3.
www.juniper.net
III
II
iii
II
www.juniper.net
Juntf2I~[
Junos MPLS and VPNs
Chapter 3: Label Distribution Protocols
III
www.juniper.net
~ Label
III
RSVP
III
LDP
Distribution Protocols
www.juniper.net
Chapter 3-3
III
www.juniper.net
III
RSVP
Is used for traffic engineering
Internet standard for reserving resources
Extended to support:
Explicit path configuration
Path numbering
Route recording
LOP
LDP always follows the IGP best path
Executes hop by hop
Does not support engineered paths
RSVP
The Junos OS uses RSVP as the label distribution protocol for traffic engineered LSPs.
RSVP was designed to be the resource reservation protocol of the Internet and "provide
a general facility for creating and maintaining distributed reservation state across a set
of multicast or unicast delivery paths" (RFC 2205). Reservations are an important part
of traffic engineering. so it made sense to continue to use RSVP for this purpose rather
than reinventing the whee/.
RSVP was explicitly designed to support extensibility mechanisms by allowing it to carry
what are called opaque objects. Opaque objects make no real sense to RSVP itself but
are carried with the understanding that some adjunct protocol (such as MPLS) might
find the information in these objects useful. This encourages RSVP extensions that
create and maintain distributed state for information other than pure resource
reservation. The designers believed that extensions could be developed easily to add
support for explicit routes and label distribution.
Continued on the next page.
www.juniper.net
RSVP (contd.)
Extensions do not make the enhanced version of RSVP incompatible with existing RSVP
implementations. An RSVP implementation can differentiate between LSP signaling and
standard RSVP reservations by examining the contents of each message.
With the proper extensions, RSVP provides a tool that consolidates the procedures for a
number of critical signaling tasks into a single message exchange:
Extended RSVP can establish an LSP along an explicit path that would not have
been chosen by the interior gateway protocol (IGP);
Extended RSVP can distribute label-binding information to LSRs in the LSP;
Extended RSVP can reserve network resources in routers comprising the LSP (the
traditional role of RSVP); and
Extended RSVP permits an LSP to be established to carry best-effort traffic
without making a specific resource reservation.
Thus, RSVP provides MPLS-signaled LSPs with a method of support for explicit routes ("go here, then
here, finally here ... "), path numbering through label assignment, and route recording (where the LSP
actually goes from ingress to egress, which is very handy information to have).
RSVP also gives MPLS LSPs a keepalive mechanism to use for visibility ("this LSP is still here and
available") and redundancy ("this LSP appears dead ... is there a secondary path configured?").
LDP
LDP associates a set of destinations (prefixes) with each data link layer LSP. This set of destinations
is called the FEC. These destinations all share a common data LSP path egress and a common
unicast routing path. LDP supports topology-driven MPLS networks in best-effort, hop-by-hop
implementations. The LDP signaling protocol always establishes LSPs that follow the contours of the
IGP's shortest path. Traffic engineering is not possible with LDP.
www.juniper.net
~RSVP
RSVP
The slide lists the topics we cover in this chapter. We discuss the highlighted topic next.
www.juniper.net
III
RSVP:
.. A generic quality of service (QoS) signaling protocol
.. An Internet control protocol-uses IP as its network layer
.. Designed originally for host-to-host usage
.. Not a data transport protocol
.. Not a routing protocol
Uses the IG P to determine paths
RSVP
RSVP is a generic signaling protocol designed originally to be used by applications to request and
reserve specific quality-of-service (QoS) requirements across an internetwork. Resources are
reserved hop by hop across the internetwork; each router receives the resource reservation request,
establishes and maintains the necessary state for the data flow (if the requested resources are
available), and forwards the resource reservation request to the next router along the path. As this
behavior implies, RSVP is an internetwork control protocol, similar to Internet Control Message
Protocol (ICMP). Internet Group Management Protocol (IGMP), and routing protocols.
RSVP does not transport application data, nor is it a routing protocol. It is simply a label distribution
protocol. RSVP uses unicast and multicast IGP routing protocols to discover paths through the
internetwork by consulting existing routing tables.
www.juniper.net
II
II
Soft state
www.juniper.net
www.juniper.net
III
III
www.juniper.net
www.juniper.net
(Site 1
Ingress LSR
www.juniper.net
l1li
III
www.juniper.net
1111
Optional:
EXP LI CIT_RO UTE object (ERO): Specify predeterm ined path.
independent of IG P path
Strict Hop: Informs tile network of exact path to use
Loose Hop: LSP must be transited in order. IG P is used
RECORD _ROUTE object(RRO): Listing of the LSRs that the LSP
tunnel traverses
SESSION_A TTRI BUTE object: Aids in session identification and also
controls patll setup priority. Ilolding priority. and local-rerouting
features
RSVP-HOP object: Contains the previous 110P IP address
www.juniper.net
III
Site3
www.juniper.net
www.juniper.net
III
Optional:
RECORD _ROUTE object: returns the LSPs path to the sender of the
path message
HOP object: contains the previous IIOP IP address
www.juniper.net
III
R4 and R2:
Store outbound label, allocate an inbound label
Transmit resv with inbound label to upstream LSR
www.juniper.net
www.juniper.net
III
Rl
Site3
R4cannot2;ignal LSP
Reservation Error
Rl
www.juniper.net
III
ResvTear
I find resvtear
Jun 16 01:05:55.511991 RSVP send ResvTear 65.115.1.2->65.115.1.1 Len=56 ge-O/O/O.O
PATH
ERO= fR2, R4, R5)
R1
R5
Site 1
Site3
www.juniper.net
III
Request for a label that does not specify a specific label range: This is the common
case in which the MPLS label is carried in a standard MPLS shim header that sits
between the data link and network layer headers. The Junos OS always uses this type of
label request, as shown in the trace output on the slide.
Request for a label with an ATM label range that specifies both the minimum and
maximum virtual path identifier (VPI) and virtual channel identifier (VCI) values: This
type of request is useful when the MPLS label is carried in a Layer 2 Asynchronous
Transfer Mode (ATM) header.
Request for a label with a Frame Relay label range that specifies the minimum and
maximum data-link connection identifier (OLCI) values: This type of request is useful
when the MPLS label is carried in a Layer 2 Frame Relay header.
Continued on the next page.
www.juniper.net
www.juniper.net
www.juniper.net
The use of EROs can lead to loops in the forwarding of the RSVP path message. Such a loop will
cause LSP setup to fail. Loops are detected with the RRO. as described on the next page.
www.juniper.net
III
Jun
Jun
Jun
Jun
Jun
Jun
Jun
17
17
17
17
17
17
17
Jun 17 17:48:49.895316
Jun
Jun
Jun
Jun
17
17
17
17
17:48:49.895642
17:48:49.895813
17:48:49.895917
J.7:48:49.896023
Sender7
Tspec
ADspec
jRecRoute
Len
Len
Len
Len
(7,0)
12 192.168.1.1(port/1sp ID 13)
36 rate Obps size Ohps peak Infbps m 20 M 9192
48 HTU 1500
12 65.J.15.1.1!
www.juniper.net
III
Jun
Jun
Jun
Jun
Jun
Jun
Jun
Jun
Jun
I find "recv
Resv"
1.7 20: 1.4: 20.381.741. RSVP rec'? Res'? 65.1.1.5.1.. 2->65 .1.1.5.1..1. Le:fn:=~1.4~422e~m~3~.O~~!.:!~~!:!:rr:E~~~
1.7 20: 1.4: 20.381.871.
;;;;
.1..3.) Proto 0
17 20:1.4:20.382069
1.7 20: 1.4: 20.3821.72
17 20: 1.4: 20.382270
17 20: 1.4: 20.382433
rate Obps size Obps peak Infhps m 20 M 1.186
1.7 20: 1.4: 20.382542
Filter?
1.92.1.68.1..1.(port/1.sp ID 1.3)
17 20: 1.4: 20.382638
17 20: 1.4: 20.382777
www.juniper.net
III
Traceoptions
Configured under the [edi t
hierarchy
protocols rsvp]
Traceoptions
Traceoptions are configured under the protocol that you want to troubleshoot. Because the
information gathered can be very extensive it is recommended that you only turn on traceoptions
when troubleshooting a specific issue. The more specific you can make the flag options, the easier it
is to locate the information you need to review. As displayed in earlier slides you can also use match
and find conditions to narrow down the information displayed when looking at the file. In our
example we capture all available information for RSVP communication. We also included the detailed
tag to increase the detail of information captured in the RSVP-traceoptions file.
www.juniper.net
III
www.juniper.net
www.juniper.net
III
ation-key "$9$m5z6hclK!1X"; ## SE
useL@R1> show rsvp interface ge-O/O/O.O detail
ge-O/O/O.O Index 72, State Ena/up
IAuthentication,1 NoAggLegate, NoReliable, NoLinkPLotection
HelloInteLval 9(second)
AddLess 65.115.1.1
ActiveResv 1, PLeemptioncnt 0, Update thLeshold 10%
SUbSCLiption 100%, StaticBW 1000Mbps, AvailableBW 1000Mbps
ReseLvedBW [0] Obps[1] Obps[2] Obps[3] Obps[4] Obps[5] Obps [6] Obps[7] Obps
www.juniper.net
www.juniper.net
III
Maximum
Restact time:
cecovecy time:
60000 msec
www.juniper.net
R1 = 192.168.1.1
R2 = 192.168.1.2
R3 = 192.168.1.3
R4 = 192.168.1.4
Configuration Example
As noted in the slide, all configuration examples will be from the perspective of the ingress router
(Rl). We will use the topology and IP addressing illustrated on this slide to demonstrate the
configuration required to create an LSP that egresses at R5.
All verification and show commands will be displayed from the ingress router (Rl) or one of the
transit routers (R2).
www.juniper.net
l1li
41
[edit interfaces)
user@R1# show ge-O/O/O
unit 0 {
family inet {
address 65.115.1.1/30;
to 192.168.1.5;
family mpls;
www.juniper.net
III
III
www.juniper.net
III
R5
Point-to-Multipoint LSPs
A point-to-multipoint MPLS LSP is an RSVP LSP with multiple destinations. By taking advantage of
the MPLS packet replication capability of the network, point-to-multipoint LSPs avoid unnecessary
packet replication at the ingress router.
Lets walk through the packet processing detailed on the slide. Router Rl is configured with a
point-to-multipoint LSP to routers R3 and R5. When router Rl sends a packet through the
point-to-multipoint LSP, router R2 replicates the packet and forwards it on to routers R3 and R5.
www.juniper.net
III
P2MP LSPs
A P2MP LSP allows you to use MPLS to carry data from one
ingress point to multiple egress points.
Add and remove branch LSPs from a main LSP without
disrupting traffic
Configure a router to be both a transit and an egress router
for different branch
Supports link protection (no fast-I-eroute)
Configure branch LSPs either statically, dynamically, or as a
combination of static and dynamic LSPs
Supports Graceful Routing Engine Switchover (GRES) and
graceful restart for LSPs at ingress and egress routers.
Point-to-Multipoint Details
A point-to-multipoint LSP allows you to use MPLS for point-to-multipoint data distribution. This
functionality is similar to that provided by IP multicast. A branch can be added or removed from the
main point-to-multipoint LSP without disrupting traffic. The unaffected parts of the LSP continue to
function normally. A router can be configured as both a transit and an egress router for different
branch LSPs of the same point-to-multipoint LSP. Link protection can also be used with
point-to-multipoint LSPs. Link protection can provide a bypass LSP for each of the branch LSPs that
make up the LSP. If any of the primary paths fail, traffic can be quickly switched to the bypass.
Point-to-multipoint LSPs can be configured either statically, dynamically, or as a combination of static
and dynamic LSPs. You can enable graceful Routing Engine switchover (GRES) and graceful restart
for point-to-multipoint LSPs at ingress and egress routers.
www.juniper.net
II
I S-IP
SA
1224 .7 7.7IM-castDat3
DA
Label
MPLS
! S-IP !224.7.7.7IM-castDat3
SA
.MP"w........... _
S-IPI224.7.771
SA
M-CaStDat~
DA
Multicast Example
One of the obvious benefits of using point-to-multipoint LSPs is that its forwarding properties are very
mUlticast-like. The Junos OS allows for the configuration of point-to-multipoint LSPs as a
replacement for multicast routing protocols in the core of a network. In the example on this slide and
the next. P1 is configured for a point-to-multipoint that terminates on both R3 and R5. A multicast
source is attached to R1 and a receiver is attached to both R3 and R5. As multicast data arrives from
the source to R1. R1 encasulates the multicast traffic into an MPLS header and sends the MPLS
packet into the core. R2 will then receive that traffic. replicate the traffiC. swap the labels. and send
the traffic out of its two outgoing interfaces. R3 and R5 will eventually receive the multicast traffic
even without a multicast routing protocol running in the core.
www.juniper.net
II
p2m p
[edit routing-options]
user@Rl# show
static {
route 224.7.7.7/32
p2mp-Isp-next-hop
'---=--1
1-.._"'-_-1
label-switched-path sub_lsp_tO_R3
{
multicast
interface ge-l/l/S.0;
p2mp ........._~_-'
www.juniper.net
II
clear rsvp session: This command is used to clear the named RSVP session, or
all RSVP sessions (ingress, transit, and egress) when no session name is specified.
show rsvp session: Displays current RSVP session status. Use the ingress, egress,
or transit switch to limit command output to the type of session that is of interest.
clear ropls lsp: Used to clear the named LSP session. You can only clear ingress
LSPs with this command.
show ropls lsp: Many operators prefer the show ropls lsp extensive
command when troubleshooting LSP establishment problems because the command's
output provides additional error information when compared to the output ofthe show
rsvp session detail command.
show rsvp interface: Use this command to display RSVP-enabled interfaces,
along with their operational status and reservation state. Any link coloring
(administrative groups) associated with RSVP interfaces is also displayed.
www.juniper.net
www.juniper.net
192.168.1.5
From: 192.168.1.1, State: Up, ActiveRoute: 4, LSPname: Rl-to-R5
ActivePath: ERO-through-R3 (primary)
LoadBalance: Random
Encoding type: Packet, SWitching type: Packet, GPID: IPv4
*Primary
ERO-through-R3
State: Up
Priorities: 7 0
SmartoptimizeTimer: 180
Received RRO (ProtectionFlag l=Available 2=InUse 4=s/w 8=Node 10=SoftPreempt 20=Nocie-ID):
65.115.1.2 65.115.1.6 65.115.1.14 65.115.1.18
65.115.1.2 65.115.1.665.115.1.14 65.115.1.18
1.5 oun 16 18:07:26.889 Record Route:
14 oun 16 18:07:26.884 Up
1.3 oun 16 18:07:26.654 Originate Call
12 oun 16 18:07:26.630 Clear Call
11 oun 16 17:40:04.936 Selected as active path
65.115.1.2 65.115.1.10 65.115.1.18
10 oun 16 17:40:04.935 Record Route:
oun 16 17:40:04.933 Up
oun 16 17:40:04.852 Origin.te Call
oun 16 17:40:04.840 Clear Call
oun 16 17:40:04.838 Deselected as active
oun 16 17:38:12.317 Selected as active path
oun 16 17:38:12.316 Record Route: 65.115.1.2 65.115.1.6 65.115.1.14 65.115.1.18
oun 16 17: 38: 12.314 Up
2 oun 16 17:38:~.740 Originate Call
1 oun 16 17:37:44.0i9 CSPF: could not determine self
Created: ~~ed oun 16 17:37:43 2010
Total 1 displayed, Up 1, Down 0
www.juniper.net
~LDP
LDP
The slide lists the topics we cover in this chapter. We discuss the highlighted topic next.
www.juniper.net
III
Purpose of LDP
Creates forwarding equivalence class (FEC)
A group of IP packets tl1at are forwarded in tile same manner
R5
Purpose of LDP
LDP associates a set of destinations (prefixes) with each LSP. This set of destinations is called the
FEC. These destinations share a common LSP path and egress router, as well as a common unicast
routing path.
LDP maps groups of prefixes to an egress router at the end of an LSP. LDP manages the LSP to the
egress router for each FEC. LDP is not related to RSVP or traffic engineering concepts from previous
lectures.
LDP maps the FECs (prefixes) to label values. The LSP forwarding paths look like a unicast
forwarding path, in that MPLS traffic for the ultimate destination is forwarded along the unicast
forwarding tree.
LDP allows multiple prefixes to share the same label mapping. No constraints are allowed when
signaling the LSPs. The LSPs must follow the IGP best path. LDP merges together traffic from
different tunnels, which results in fewer total tunnels than would be required with RSVP.
LDP will create a LSP tree for each FEC from every possible ingress point in the LDP network to the
egress point. Each LDP speaking router will advertise the addresses reachable via a MPLS label into
the LDP domain. The label information is exchanged in a hop by hop fashion so every LSR in the
domain will become an ingress router to all other routers in the network. This process creates a full
mesh LDP environment. The slide displays what LSPs will be generated for the FEC egressing at R5.
www.juniper.net
Downstream
LDP peer
'0!4t_~~~ll~~~~1
~[!t{k!!~~~ll!~'~~l\l!k~~s~Ji\~~l
Aclv8r'tisem8l1t
www.juniper.net
www.juniper.net
III
R2
R1
10.0.1.2
Neighbor Discovery
The discovery process can either send a hello message to 224.0.0.2 (basic discovery) or to a specific
address (extended discovery), in both cases using UDP encapsulation and port 646. 224.0.0.2 is the
aI/ routers on this subnet multicast address. Note that a station's response to a hello message
indicates its desire to establish an LOP session with the neighboring router.
Transport Address
The transport address is used to determine which side is active. The transport address is placed into
the Hello message as a transport address object. If the transport address object is not specified, the
source address of the hello packet is used to determine the active router.
www.juniper.net
R1
R2
(paSSive):-:-:-:-:-:-:-:::-:-:-:-:-:-:-:::-i.(Active)
10.0.1.2
100.1.1
Session Initialization
.of -
<1- -
-~-=-;:.-:::...-=.":..
- - -
- - -
- - - - -
-+
-+
www.juniper.net
III
Limitations:
LSPs follow the conventionallG P patll
Does not support explicit routing
Upstream
LDP Peer
FEe: 1000.1/32
label: 17
............................ ,
----------ge-DjO/O
ge-DjO/O
Advertise
Incoming
label
LSR
FEe 100.0.1/32
label: 52
.............................
Downstream
LDP Peer
----------ge-D/O/3
ge-D/O/3
FEe: 10.0.01/32
label: 3
............................ ,
-------..
ge-D/2/0
Receive
Outgoing
label
www.juniper.net
II
Session Maintenance
LDP session requires at least 1 hello adjacency
Hello interval: 5-second default
Hold timer: 15-second default
If hold timer expires. LSR deletes hello adjacency
Can be asymmetric
Session Maintenance
An LDP peer must receive an LDP packet every keepalive period to prevent the tear down of neighbor
state. Any LDP protocol message is acceptable for keepalive purposes, so keepalive messages are
sent only in the absence of other LDP traffic. Either end can shut down the session by issuing a
shutdown message. If a router has multiple links to an LDP peer then hellos are sent across all of the
links. As long as one of the links can continue to exchange hellos, the LDP session remains active.
See the last section on the next page for more detail on choosing an LDP transport address.
The LDP hello messages enable LDP routers to discover one another and to detect the failure of a
neighbor, or the link, to that neighbor. Hello messages are sent periodically on all interfaces on which
LDP is enabled. By default. LDP sends hello messages every 5 seconds. This value can be
configured depending on the network requirements.
The hold time determines how long a router can wait for a hello message before declaring the
neighbor lost. The configured value is sent inside of hello messages to inform the receiving router
how often it should expect to receive a hello; this mechanism means that hello intervals do not be
the same between neighbors. The default hold time is 15 seconds; this value represents the
recommended setting of three times the hello interval.
www.juniper.net
www.juniper.net
III
www.juniper.net
III
LOP Tunneling
You can tunnel LDP LSPs over RSVP-signaled LSPs using label stacking. Note that you must enable
LDP on the 100. a interface to support extended neighbor discovery needed for this application.
Additionally, you must configure the LSPs over which you want LDP to operate by including the
Idp-tunneling statement as sllown.
www.juniper.net
II
II
www.juniper.net
III
www.juniper.net
III
It
www.juniper.net
III
www.juniper.net
III
Loopbacks
Rl = 192.168.1.1
R2 = 192.168.1.2
R3 = 192.168.1.3
Rl
R3
R2
.1
65.115.10;30
ge-G/O/O
.2
ge-G/o;o
.5
ge-O;O/1
65.115.1.4;30
.6
ge-G/o/1
www.juniper.net
III
[edit]
use!:@R2i1 show protocols Idp
inte!:face ge-O/O/O.O;
inte!:face ge-0/0/1.0;
inte!:face 100.0;
[edit]
use!:@R2i1 show protocols mpls
inte!:face all;
[edit]
useL@R2# show interfaces ge-O/O/O
unit 0 {
family inet {
add!:ess 65.115.1.2/30;
family mpls;
www.juniper.net
II
l1li
Nbt: count
1
1
0
Next hello
1
2
0
Label space ID
192 .168.1.1: 0
192.168.1.3:0
Hold time
11
14
www.juniper.net
III
Connection
Open
Open
Hold time
29
26
www.juniper.net
III
0 hidden)
192.168.1.1/32
192.168.1.3/32
II
www.juniper.net
III
1
2
299792
299792 (S=O)
299840
299840 (S=O)
Pop
Pop
Pop
Pop
www.juniper.net
database, 192.168.1.2:0--192.168.1.3:0
prefix
192.168.1.1/32
192.168.1.2/32
192.168.1.3/32
www.juniper.net
III
www.juniper.net
1. Which router requires you to define the labelswitched-path when configuring RSVP?
2. What are 3 RSVP objects that we discussed in this
chapter?
3. Does the Junos OS support traffic engineering on
LDP LSPs?
Review Questions
1.
2.
3.
www.juniper.net
II
II
II
III
II
www.juniper.net
www.juniper.net
Junt~v~[
Junos MPLS and VPNs
Chapter 4: Constrained Shortest Path First
III
www.juniper.net
CSPF Algorithm
III
l1li
Administrative Groups
www.juniper.net
III
www.juniper.net
l1li
Explicit Route Object specifies the path the session will take
When an ERO has not been configured the path message is sent
with no ERO along the IG P'sshortest calculated path
For a non-empty ERO, the administrator of the ingress LSR must
manually configure the explicit path [edit]
user@R1i1 ShOI~ protocols mpls
label-switched-path r1-to-r2
to 192.168,2,2;
www.juniper.net
111
LSRs will not police the traffic that enters an LSP, by default
By default. each LSR along tIle path checks only to see if there is
enough rsvp reservable bandwidtll available (no policing)
Use the auto-policing statement or apply a policer configured
under [edi t firewall] directly to the LSP
[edit]
user@R1# show protocols rnpls
auto-policing {
class all drop;
label-switched-path r1-to-r2 {
to 192.168.2.2;
bandwidth 35m;
no-cspf;
[edit]
user@R1# show protocols mp1s
label-switched-path r1-to-r2
to 192.168.2.2;
bandwidth 35m;
no-cspf;
policing filter eXample;
Bandwidth Reservation
It is possible for an LSP to be configured to reserve bandwidth along the path of the LSP. During the
setup process for an LSP configured for bandwidth (as shown in slide), each downstream router will
receive a request to reserve bandwidth for the LSP in the form of the traffic specification (TSpec)
object. Each router along the path will make its own individual decision as whether it has enough
available bandwidth on its egress interface for the LSP. To determine whether or not there is enough
available bandwidth, a router will sum the bandwidth of all LSPs traversing the egress interface and
subtract it from the total bandwidth for the interface. If there is not enough available bandwidth, the
LSP will fail to be instantiated and the upstream routers will be informed with a PathErr message.
By default, the bandwidths described on the slide are only logical and used for LSP setup. The
amount of traffic that actually traverses an LSP is not enforced. It is possible, however, to override
the default behavior and have the ingress router police the traffic that enters an LSP however. This
can be done by configuring auto-policing or configuring a firewall filter an applying directly to
the specific LSP.
www.juniper.net
1\1
Available
Resecved
BiN
BiN
1000Mbps
1000Mbps
Obps
Obps
Highwatec
mack
Obps
Obps
va~ue
RSVP Bandwidth
Whether or not the CSPF algorithm is being used, when RSVP is being used for LSP signaling in a a
network, every interface on every router will have an associated available bandwidth associated with
it. By default. the available bandwidth for LSP reservation is equivalent to the physical speed of the
interface. This can be overridden by one of the methods shown on the slide.
www.juniper.net
~CSPF Algorithm
CSPF Algorithm
The slide highlights the topic we discuss next.
www.juniper.net
www.juniper.net
www.juniper.net
User
Constraints
1.
2.
TED.
3.
User Constraints: The user specifies constraints for a specific LSP through configuration
settings.
4.
Physical Path Calculation: The CSPF algorithm finds the shortest path based on links
that comply with user-provided constraints.
www.juniper.net
5.
Explicit Route Generation: The router forms a complete list of EROs that describes the
sequence of nodes and links representing the shortest compliant path between ingress
and egress LSRs.
6.
RSVP-signaling: The router passes the computed ERO list to RSVP for LSP signaling.
Note that because the TED contains a relatively up-to-date view of the entire network's
current state, a high probability exists that the RSVP-signaled LSP will succeed. Put
another way, if no path in the network meets a provided constraint, CSPF does not
compute an ERO list, and RSVP does not even attempt to signal an LSP that would be
doomed to failure anyway. Last minute changes in the state of the network might result
in the TED being slightly out of date, and this can lead to RSVP path signaling failures
until the TED is again synchronized with the true state of the network.
www.juniper.net
l1li
l1li
Infor/11ation propagated:
Bandwidth available
Administrative Groups (link colors)
Router ID
IGP Extensions
Both OSPF and IS-IS can propagate additional information through some form of extension. IS-IS
carries different parameters in type/length/value (TLV) tuples, which are propagated within a level;
these TLVs do not propagate between levels. OSPF, on the other hand, uses Type 10 opaque LSAs to
carry traffic engineering extensions. Type 10 LSAs have an area flooding scope, meaning that the
information is propagated within a given area only; OSPF traffic engineering extensions do not cross
area border routers (ABRs). The MPLS Traffic Engineering Information carried by these IGP
extensions is defined in RFCs 3630 and 4203 for OSPF, and RFCs 3784 and 4205 for IS-IS.
Information Propagated
The TLVs listed here are based on IS-IS traffic engineering extensions. OSPF supports more or less
the same parameters; the primary difference is how the extended information is propagated (TLV
versus opaque LSA).
Router ID (TLV 134): Single stable address, regardless of node's interface state. The
/32 prefix for router ID should not be installed into the forwarding table or it can lead to
forwarding loops for systems that do not support this TLV.
Extended IP Reachability (TLV 135): One bit used for route leaking (up/down bit);
extends metrics from 6 bits to 32 bits.
www.juniper.net
www.juniper.net
Ox80000002
Ox22 Oxe2c
124
www.juniper.net
III
thresho~d
% (1 .. . 20)
www.juniper.net
III
III
Contains:
Up-to-date network topology information
Current unreserved bandwidth of links
Link administrative groups (colors)
Link priority information
TED Contents
CSPF uses the TED to calculate explicit paths across the physical topology. It is similar to IGP
link-state database (LSDB) and relies on extensions to the IGP, but it is stored independently of the
IGP database.
Traffic engineering requires detailed knowledge about the network topology as well as dynamic
information about network loading. The information distribution component is implemented by
defining relatively simple extensions to the IGPs so that link attributes are included as part of each
router's link-state advertisement (LSA). The standard flooding algorithm used by the link-state IGPs
ensures that link attributes are distributed to all routers in the routing domain. Some of the traffic
engineering extensions to be added to the IGP link-state advertisement include maximum link
bandwidth, maximum reserved link bandwidth, current bandwidth reservation levels, and link
coloring.
www.juniper.net
1000Mbps
1000Mbps
1000Mbps
1000Mbps
www.juniper.net
www.juniper.net
r
II
User-defined constraints
influence path selection
Bandwidth requirements*
Hop count limitations (for fast
reroute)
Administrative groups (colors)
Priority (setup and hold)*
Explicit route (strict or loose)*
User-Provided Constraints
You can influence the outcome of the CSPF path selection process by specifying one of more of the
following constraints when defining an RSVP-signaled LSP:
Bandwidth: The bandwidth to reserve forthis LSP. The reserved bandwidth is calculated
against each link's available bandwidth. The available bandwidth is the bandwidth
remaining after the subscription factor is applied to the link and all existing link
subscriptions are removed.
Hop count: The maximum number of hops to extend the path to bypass the next
downstream node when creating a fast-reroute detour.
Link color: Administrative groups, also known as link coloring or resource class, are
manually assigned attributes that describe the color of links, such that links with the
same color conceptually belong to the same class. You can use administrative groups to
implement a variety of policy-based LSP routing controls.
Priority: Specifies the setup and hold priority for the LSP. New setup priorities are
compared with existing hold values. When not enough bandwidth is available to satisfy
all LSPs concurrently, a given link is considered in the path only when the new LSP's
setup priority is stronger tilan the hold priority of existing LSPs.
EROs: Both CSPF and non-CSPF LSPs can be constrained with one or more ERO routing
directives.
www.juniper.net
III
Prune the topology database (TED) of all the links that are not full duplex and do not
have sufficient reservable bandwidth.
2.
If the LSP configuration contains an include-any statement, prune all links that do
not have at least one of the included colors assigned, including those links with no color
assigned. If the LSP configuration contains an include -all statement, prune all
links that do not have all of the included colors assigned.
3.
Ifthe LSP configuration contains an exclude statement, prune all links that contain
excluded colors; links with no color are not pruned.
4.
Find the shortest path towards the LSP's egress router, taking into account ERO
constraints. For example, if the path must pass through Router A, two separate SPFs
are computed, one from the ingress router to Router A, the other from Router A to the
egress router.
www.juniper.net
If several paths Ilave equal cost, choose the one whose last hop address is the same as
the LSP's destination.
6.
If several equal-cost paths remain, select the one with the fewest number of hops. If
equal-cost paths still remain, apply the CSPF load-balancing rule configured on the LSP
(least fill, most fill, or random).
7.
When a path is chosen, pass the complete ERO list to RSVP for signaling.
www.juniper.net
III
Negative Feedback
Junos os automatically retains knowledge of RSVP Path Err messages for a short period oftime. This
knowledge prevents the TED from resignaling in the same direction that caused the original error. By
default, the system maintains knowledge of Path Err messages for 20 seconds, configurable from
o to 240 seconds in the [edit protocols mplsJ hierarchy with the
rsvp-error-hold-time command.
www.juniper.net
www.juniper.net
II
Available bandwidth
Reservable bandwidth minus the sum of the LSP bandwidths
traversing the link
www.juniper.net
III
Random:
Default behavior; chooses a path at random from set of
equal-cost alternatives
.. Tends to balance total number of LSPs over all available
paths
III
Least fill:
.. Finds the path with the largest minimum available
bandwidth ratio
III
Most fill:
.. Prefers the path with the smallest minimum available
bandwidth ratio
l1li
Random
If more than one path is available after running the CSPF algorithm, a tie-breaking rule is applied to
choose the path for the LSP. Three tie-breaking rules are available: random, least fill, and most fill.
The actual rule used depends on the specifics of your configuration. The default tie-breaking method
is random, which, as you might surmise, chooses one of the qualifying paths at random. This rule
tends to place an equal number of LSPs on each link, regardless of the available bandwidth.
Least Fill
The least-fill option chooses the path with the largest minimum available bandwidth ratio. This rule
tries to equalize the reservation levels on each link. This form of load balancing might be preferred
when the goal is to minimize the total number of LSPs that are disrupted when a link failure occurs.
www.juniper.net
Most Fill
The most-fill option prefers the path with the smallest minimum available bandwidth ratio. This rule
tries to fill a link before moving traffic to alternative link and might be preferred in certain
usage-based billing environments where bulk discounts are gained by consolidating as much traffic
onto as few links as possible. The most-fill option tends to fully pack your lower bandwidth links first.
such that your highest bandwidth links remain available for LSPs with large bandwidth requirements,
which is another possible motivation for using this type of load balancing.
Configuration
To explicitly configure a tie-breaking behavior, include the random, least - fill, or most- fill
statement atthe [edit protocols mpls label-switched-path path-name] hierarchy
level. Note that you do not have to explicitly configure random load balancing as this is the default.
www.juniper.net
IGP= IS-IS
AIIIGP path metrics equal
III
Which path
will a new LSP
with a 12-Mbps
bandwidth request take?
www.juniper.net
IS-IS
III
65J
Which path
will a new LSP
with a 12-Mbps
bandwidth request take?
www.juniper.net
III
Using
least-fill load
balancing, which 430M
path will a new LSP
with a 12-Mbps bandwidth
request take?
An Interesting Question
Step 6 of the CSPF algorithm, as explained on a previous page, indicates that if no decision is
reached after the router processes the first five steps of the algorithm, the paths with the smaller
hop count are selected. When multiple paths remain, the tie-breaking algorithm moves on to
consider fill-related criteria.
Because least fill looks for the largest available bandwidth ratio, you might expect the middle links to
be selected because they have 95 and 85 available bandwidth ratios. However, these links are not
chosen because they have more hops. The two outer paths have their available bandwidth ratios
compared because they have lower (and equal) hop counts. Therefore, the bottom path, which has
an available bandwidth ratio of 57 ((1000-430)11000) is selected over the top link, which has an
available bandwidth ratio of 50 ((1000-500)/1000).
Note that the same logic is followed regardless of the actual bandwidth available on a link. For
example, if the outer paths were Fast Ethernet links with lower available bandwidth ratios than the
two middle paths-which could be Gigabit Ethernet with really high available bandwidth ratios-the
CSPF hop count rule will still eliminate the middle links due to their higher hop-counts. Even if the
Gigabit Ethernet links have huge amounts of percentage or actual bandwidth available, the hop
count rule holds sway over what paths are considered equal, and therefore subject to a
load-balancing decision.
www.juniper.net
II
Using
least-fill load
balancing, which
path will a new LSP
with a 4-Mbps bandwidth
request take?
www.juniper.net
-7 Administrative
Groups
Administrative Groups
The slide highlights the topic we discuss next.
www.juniper.net
III
.;::::::------.".
S;I~c I
San
,~
Francisco'
'\,
Bronze
-----.
'-----jr-----:;~
............
www.juniper.net
III
III
IGP Advertisements
A traffic engineering aware IGP communicates the administrative group of each interface as a 32-bit
(4 bytes) bit mask. Each of the bit values in 32-bit sequence represents a different administrative
group.
Color Assignments
Each bit value is correlated through configuration to a human-friendly name within Junos OS. This
capability helps to simplify router management, as the name silver often means more to the typical
human than the hexadecimal value of Ox02, for example.
These names are often assigned as colors, but they do not have to be a color; they can be any
descriptive term you want. Each link can have one or more bits enabled, and can therefore be
associated with one or more colors simultaneously. The colors advertised by each link are displayed
in both hexadecimal and in symbolic form in the output of show ted database extensive
command. When multiple bits are set in the TED, the order of the colors displayed correlates to the
order of the bits that are set. When no colors are assigned, the 32 bits default to all zeros
(OxOOOOOOOO).
www.juniper.net
[edit protocols 1
u5er@R1# show
mp15 {
admin-groups
gold 1;
silver: 2;
br:onze 3;
manageme n t 30;
internal 31;
Colors
defined
--~
- l j Uj u.nO {
admin-group [g",old manageme ntJl
interface ge-1/0/1.221 {
admin-group silver:;
interface ge-1/0/2.222 {
admin-group gold;
(
Colors
assigned
interface ge-1/0/3.223 {
admin-group gold;
www.juniper.net
III
use
go
admin-gl:'oup {
Logical AND
}
path
use-fargo {
10.0.1.2 loose;
Logical OR
www.juniper.net
III
state
Administcative gcoups
ge-1/0/0.220
Up
gold
ge-1/0/1. 221
Up
gold
www.juniper.net
III
www.juniper.net
II
www.juniper.net
III
j;
www.juniper.net
www.juniper.net
III
www.juniper.net
III
www.juniper.net
III
www.juniper.net
II
www.juniper.net
III
www.juniper.net
III
www.juniper.net
III
www.juniper.net
III
www.juniper.net
Review Questions
1.
2.
3.
4.
www.juniper.net
III
III
Lab 3: CSPF
The slide provides the objectives for this lab.
www.juniper.net
www.juniper.net
Junl~f~r
Junos MPlS and VPNs
Chapter 5: Traffic Protection and LSP Optimization
III
www.juniper.net
l1li
Fast Reroute
III
Bypass LS Ps
III
LSP Optimization
www.juniper.net
Chapter 5-3
II
Rl
{Site 1
Site 2
R5
Network Failures
When a network failure occurs along the path of an RSVP-signaled LSP, traffic that is currently
traversing the LSP will be dropped. In the example, at the instant that the link between R3 and R4
fails, traffic that has already encapsulated in an MPLS header by Rl and forwarded downstream will
be dropped. Also, until Rl receives PathTear message forthe LSP, Rl may continue forwarding traffic
using the LSP. That traffic will also be dropped. The time that it takes for traffic flow to be restored
depends on the time it takes Rl to be notified of the failure followed as well as resignal a new LSP
that will bypass the failed link. There are several features, like fast reroute and link protection which
are described later in this chapter, that can significantly reduce down time.
www.juniper.net
IIiI
------1>
"'......................
ResvTear
R5
www.juniper.net
Chapter 5-5
l1li
Rl
Link Failure
R1 Receives PathTear
When Rl receives the PathTear, it considers the LSP down and deletes the Path and Resv state
block. The LSP is no longer a valid next-hop for routes in inet.3 (or any other routing table) so the /32
route associate with the LSP in inet3 is removed. Also, any BGP routes that had been using the LSP
as a next-hop will need to have their next-hop recalculated. Now at this point, if the LSP was only
being used to forward standard IP traffic (non-VPN traffic) packet drops may stop and new packets
could be forwarded using next hops learned by using interior gateway protocol (IGP) routes in the
inet.O table. However, in a virtual private network (VPN) scenario as described in future chapters, a
route in inet.3 must exist to forward traffic for a VPN between Site 1 and Site 2. Traffic between VPN
sites might still continue to be dropped due to the lack of a valid route in the inet.3 table.
Along with the churn that occurs in the routing tables as described above, Rl will also attempt to
reestablish the failed LSP by sending a Path message downstream towards the egress router.
www.juniper.net
III
PATH
ERO= {R2, R3)
Rl
------ ..
R5
www.juniper.net
www.juniper.net
III
III
Revertive capability
Modified with retry-timer, retry-limit, and
revert-timer
retry-timer:
Time between attempts to bring up failed primary path
Default is 30 seconds
retry-limit:
Number of failed attempts to bring up primary path
Default is 0 (unlimited retries)
If limit reached. human intervention required
revert - timer:
Minimum time the primary must be up and stable before traffic is
reverted to it
Default is 60 seconds
If set to 0 the LSP does not revert
Primary Physical Paths
Primary paths are optional. Only one primary path is permitted per LSP definition. The primary physical
path can specify loose or strict Explicit Route Object (ERO) values under the named path hierarchy.
Within the primary physical path you can specify parameters, like bandwidth or priority, that affect only
the primary physical path. As a side note, the same parameters specified at the
label-switched-path hierarchy affect both the primary and secondary physical path.
www.juniper.net
www.juniper.net
l1li
l1li
Standby option:
Preestablishes and maintains secondary path
Eliminates LSP signaling delays when active path fails
Additional state information must be maintained
www.juniper.net
Standby
You can specify the standby command for a secondary path. This command causes the router to
signal the secondary path, even though the secondary path is not currently needed, that is, the primary
path has not yet failed. Note that standby secondaries result in routers having to maintain additional
state in the form of the preestablished standby LSPs. When the standby option is specified at the
label-switched-path lsp-name hierarchy, the router maintains standby state for all secondary
paths. To place only selected secondaries into the standby state, specify the standby keyword at the
secondary name hierarchy, as shown here:
[edit]
user@rl# show protocols mpls 1abel-switched-path green
to 192.168.24.1;
primary one {
bandwidth 35m;
priority 6 6;
secondary two
standby;
www.juniper.net
bandwidth 35m;
priority 6 6;
cems
172.22.220.2 strict;
!path two {
172.22.221.2 strict;
172.22.203.2 strict;
172.22.204.2 strict;
www.juniper.net
III
III
select manual:
Path is selected as active if up and stable
Traffic reverts to this patll based on retry- timer,
retry-limit, and revert-timer
www.juniper.net
www.juniper.net
www.juniper.net
Irevert-timer ~:~: I
primary one;
secondary bNO;
path one {
172.22.220.2 strict;
path two {
172.22.221.2 strict;
l1li
www.juniper.net
II
interface all;
www.juniper.net
www.juniper.net
192.168.2.2
From: 192.168.2.1,
Acti vePath: two
(secondary)
0, LSPname: green
Encoding type:
Primary
one
State: Dn
Prio rities: 6 6
Bandwidth: 1000Nbps
smartOptimizeTimer: 180
computed ERa (S [L] denotes strict [loose] hops):
(CSPF metric: 5)
82 Sap 14 20:32:18.968 Up
81 Sep 14 20:32:18.954 Originate Call
Monitoring Preemption
This slide shows that at 20:36:39, the green LSP's primary path, path one, was preempted and the
secondary path, path two, became active. This scenario uses equal setup and hold values for each LSP,
with the priority values set to 6 for the green LSP. In this example, another LSP with a higher priority 0
has caused the preemption of the green LSP's primary path, path one, which in turn results in the
establishment of a secondary path, path two. The green LSP's secondary path is configured with a
lower bandwidth requirement to allow it to establish in the event the primary path is preempted. There is
no reference to the LSP with 0 0 priority in the screen captures because this is a priori knowledge. The
truncated capture below continues the output shown on the slide. The output confirms that the
secondary path, path two, became active at the same time the primary path was preempted:
*Secondary two
State: up
Priorities: 7 0
SmartOptimizeTimer: 180
Computed ERO (S [L] denotes strict [loose] hops): (CSPF metric: 4)
172.22.221.2 S 172.22.203.2 S 172.22.204.2 S 172.22.223.1 S
Received RRO (protectionFlag l=Available 2=InUse 4=B!W 8=Node 10=SoftPreempt 20=Node-ID):
172.22.221.2 172.22.203.2 172.22.204.2 172.22.223.1
83 Sep 14 20:36:39.286 Selected as active path
82 Sep 14 20:36:39.284 Record Route:
172.22.221.2 172.22.203.2 172.22.223.1
81 Sep 14 20:36:39.284 Up
www.juniper.net
_L9"E,Gr,~~nwl.o J;Jj!NI~P Qm
IS-IS Metrio 20
label-5witched-path Red
to 192.168.24.1;
priority 6 6;
bandwidth 10M;
III
Given that all links with existing LSPs have less than 10 M
available, which LSPs can be preempted by LSP Red?
Test Understanding
You can assume in this example that all links with existing LSPs have less than 10 M available.
Therefore, the only way to establish LSP Red is for it to preempt one of the existing LSPs. Can you
determine which LSP will be preempted by LSP Red?
The setup priority for Red is 6 (the first number). The hold priority (the second number) for LSPs Green
and Purple are both less than 6, which gives these LSPs a stronger hold priority that will prevent their
preemption. In contrast, LSP Bl ue has a hold a priority of 7, which is weaker that LSP Red's setup
priority. Thus, LSP Red can on Iy preempt LSP Bl ue. Note the IS-IS metric has no effect on LSP
preemption.
Question: What if LSP Red had priority [3 7J?
Answer: This is a trick question because such a priority setting is not allowed. Recall that an LSP
cannot have a setup priority that is stronger than its hold setting.
www.juniper.net
~ Fast Reroute
Fast Reroute
The slide highlights the topic we discuss next.
www.juniper.net
III
www.juniper.net
III
www.juniper.net
III
III
General characteristics:
Configured on ingress router only
Detours around node or link failure
~~ 100s of
www.juniper.net
General Characteristics
By default, the router uses the traffic engineering database (TED) to calculate a detour path. These
detours can add up to an additional six hops to the LSP path in an attempt to bypass the downstream
node. Use the hop-count parameter to change the default number of hops the router will support
when calculating a detour.
When a router with a fast reroute detour available recognizes a link or node failure, it immediately
begins to detour the traffic. The Packet Forwarding Engine (PFE) maintains precomputed fast reroute
detours to provide convergence times that, in some cases, rival SONET Automatic Protection Switching
(APS)!
Each downstream node originates its own detour path messages. It is possible that a given node will not
be able to establish a detour path. The result is that some portions of the LSP might have fast reroute
protection while other portions do not. An LSP will never be torn down just because fast reroute detours
cannot be established.
You configure fast reroute at the label-switched-path lap-name hierarchy, which causes all
primary and secondary physical paths to signal fast reroute.
www.juniper.net
III
LA creates detour to NY
r
NY
rto NY
San
www.juniper.net
}
path use-seattle {
192.168.8.1 loose;
www.juniper.net
III
II
Miami
www.juniper.net
l1li
bandwidth 1m;
path top
172.22.220.2 strict;
path bottom {
172.22.221.2 strict;
secondary bottom
standby;
www.juniper.net
J;;;..;.~;';;;';;';;"''';;;';''';;;';';'';
192 .168.2 .2
FLom: 192.168.2.1, state: up, ActiveRoute: 0, LSPname: test
ActivePath: top (pLimaLY)
LoadBalance: Random
Encoding type: Packet, switching type: Packet, GPID: IPv4
*PLimaLY
top
state: up
pdoLities: 7 0
Bandwidth: 1000kbps
SmaLtoptimizeTimeL: 180
Computed ERO (S [L] denotes stLict [loose] hops): (CSPF metric: 4)
172.22.220.2 S 172.22.201.2 S 172.22.206.2 S 172.22.222.1 S
Received RRO (ProtectionFlag 1=l\.vailable 2=InUse 4=B/W 8=Node ... ):
172.22.220.2 (flag=9) 172.22.201. 2 (flag=9) 172.22.206.2 (flag=1) 172.22.222.1
www.juniper.net
www.juniper.net
III
36
dscd
34
1
1
192.168.2.0/24 user
www.juniper.net
III
r------------pu-s-h--3-00-8-1-6---6-2-4--1----------~
Push 300240
625
www.juniper.net
~ Bypass LS Ps
Bypass LSPs
The slide highlights the topic we discuss next.
www.juniper.net
III
PrimaryLSP
Bypass LSP
(Link Protection)
Protects Interfaces
Link protection is the Junos OS nomenclature for the facility backup feature defined in RFC 4090. The
link protection feature is interface based, rather than LSP based. The slide shows how the R2 node is
protecting its interface and link to R3 through a bypass LSP that is calculated using CSPF and the node's
TED.
While fast reroute attempts to protect the entire path of a given LSP, you can apply link protection on
a per-interface basis as needed. LSPs must be tagged for them to make use of a bypass LSP, and
you can provide an ERO list to influence the CSPF-based routing of the bypass LSP. Note that a
bypass LSP must terminate on the adjacent downstream node, but the bypass LSP can transit other
nodes as shown on the slide.
www.juniper.net
III
Egress LSR
Site2 '
Node Protection
Node protection is the Junos OS nomenclature for the facility backup feature defined in RFC 4090. Node
protection uses the same messaging as link protection. The slide shows that R2 is protecting against the
complete failure of R3 through a bypass LSP that is calculated using CSPF.
LSPs must be tagged for node-link protection to make use of the bypass LSPs, and you can provide
an ERO list to influence the CSPF-based routing of the bypass LSP.
www.juniper.net
III
www.juniper.net
III
www.juniper.net
l1li
uBer@p1# show
interface ge-O/O/O.O;
uBer@Bf# show
label-Bwitched-path to-NY
to 192.168.2.2;
interface ge-O/O/1.0;
interface ge-O/O/3.0;
'nterface ge-1/0/4.201
4 - - - - 0r node-link-protection
~--~--------~
primary uBe-auBtin;
link-protection;
path uBe-auBtin
192.168.1.2 looBe;
interface all;
www.juniper.net
www.juniper.net
-7 LSP Optimization
LSP Optimization
The slide highlights the topic we discuss next.
www.juniper.net
III
l1li
LSP Rerouting
Once an LSP is established, changes in topology or available resources might result in the existing path
becoming suboptimal. A subsequent CSPF recomputation might result in the determination that a better
path is now available. When optimization is enabled, LSPs can be rerouted as a result of periodic CSPF
recomputations. Without optimization the LSP has a fixed path and cannot take advantage of newly
available network resources, at least until the next topology change or operator induced clearing breaks
the LSP and forces recomputation of a new path. Note that optimization is not related to failover; a new
path is always computed when topology failures occur that disrupt an established path.
Enable Optimization
Because of the potential system overhead involved, you should carefully consider the frequency at
which routers perform optimization runs. By default, the optimize-timer is set to 0 (that is, it is
disabled). LSP optimization is only meaningful for CSPF LSPs. Due to statistical characteristics that arise
in large topologies, a network can effectively synchronize and end up trying to recalculate all LSPs at the
same time when all reoptimization timers are set the same. To prevent this behavior, the LSP
reoptimization timer is modified to include a randomization factor when recalculating LSPs. The
randomization factor is fixed and cannot be modified.
Note that you can manually trigger optimization with the operational mode clear mpls lsp
optimize command.
www.juniper.net
II
Optimization Rules
By default, an LSP can only have its path optimized when all of the following criteria are met. These rules
are intentionally conservative as stability is better than being optimal in many cases:
1.
The new path is not higher in CSPF metric. (The metric for the old path is updated during
computation, so if a recent link metric changed somewhere along the old path, it is
accounted for.)
2.
If the new path has the same CSPF metric, it must not have more hops.
3.
The new path does not cause preemption. (This is to reduce the ripple effect of one
preemption causing yet more preemption.)
4.
The new path does not worsen congestion overall. This is determined by comparing the
percentage of available bandwidth on each link traversed by the new and old paths,
starting from the most congested links.
When all the above conditions are met. then if the new path has a lower CSPF metriC, it is accepted. If
the new path has an equal CSPF metric and lower hop count, it is accepted. If you choose least fill as a
load-balancing algorithm and if the new path reduces congestion by at least 10 percent aggregated over
all links it traversed, it is accepted. For random or most-fill algorithms, this rule does not apply.
Otherwise, the new path is rejected.
Continued on next page.
www.juniper.net
www.juniper.net
II
l1li
www.juniper.net
Configuration
To define an adaptive LSP, include the adaptive statement when defining the LSP, as shown on the
slide. When adaptive is specified at the label-switched-path lsp-name hierarchy and
sufficient resources exist to establish both LSPs, the primary and all secondary paths share the same
bandwidth reservation (the higher of all bandwidths defined). When adaptive is included at the
primary or secondary hierarchy level, the SE-style reservation behavior is enabled only for the path
(primary or secondary) that is so configured. When specified at the primary and secondary level, the
corresponding primary and secondary paths are considered as separate adaptive settings, and
therefore, their resources are double-counted.
www.juniper.net
Egress
LSR
When used with MPLS, the FF style allows the establishment of multiple, parallel, unicast, point-to-point
LSPs to support load balancing. If the LSPs share a common link, the total amount of reserved
bandwidth for the shared link is the sum of the reservations for the individual senders. By default,
Junos OS uses the FF style.
Shared Explicit (SE): SE reservations share the bandwidth of the largest request across any shared
links. The SE-style reservation is critical for supporting the ability to reroute an LSP with the
make-before-break capability because on shared links, if reservations are counted twice, the router's
admission control function could reject the new LSP due to a lack of resources. The SE reservation style
permits the old and new LSPs to share resources over shared links. You can configure SE-style
reservations with the adaptive keyword under the LSP or primary/secondary path configuration
hierarchy.
Continued on next page.
www.juniper.net
Establishing the Initial LSP Tunnel: In the initial Path message, the ingress LSR:
1.
Forms a LSP3UNNEUPv4 SESSION object that uniquely identifies the LSP tunnel. The
LSP_TUNNEUPv4 SESSION object contains: a) IP version 4 (IPv4) address of the egress
node for the LSP tunnel, b) TunneUD that remains constant for the life of the LSP tunnel
between the ingress and egress LSRs, and c) the Extended_TunneUD that identifies the
ingress node of the tunnel (that is, the ingress router's IPv4 address).
2.
Sets the ingress node might reroute bit of the SESSION_ATIRI BUTE object to request that
the egress LSR use the SE reservation style.
3.
Forms a SENDER_TEMPLATE object that contains: a) The IPv4 address of the sender
(ingress) node, and b) an LSP_ID that can be changed in the future to allow the ingress LSR
to appear as a different sender so it can share resources with itself if the LSP needs to be
rerouted (see the LSP_ID field of the LSP_TUNNEL_IPv4 C-type extension for the
SENDER3EMPLATE and FILTER_SPEC objects).
4.
Upon receipt of the Path message, the egress LSR sends a Resv message with a SE
reservation style toward the ingress node. When the ingress LSR receives the Resv
message, the initial LSP tunnel is established with an SE reservation style.
Establishing the Rerouted LSP Tunnel: When the ingress LSR wants to increase the bandwidth or
change tile path for an existing LSP, it transmits a new Path message. During the reroute operation, the
ingress LSR must appear as two different senders to the RSVP session. This is achieved by including a
new LSPJD in the SENDER_TEMPLATE and the FILTER_SPEC objects. In the new Path message, the
ingress LSR:
1.
2.
Uses the existing LSP_TUNNEUPv4 SESSION object to identify the LSP that will be
rerouted.
3.
Picks a new LSP_ID and creates a new SENDER_TEMPLATE. By selecting a new LSP_ID for
the SENDER_TEMPLATE, the ingress LSR appears as a different sender to tile RSVP
session.
4.
The ingress LSR transmits the new Path message toward the egress LSR. (However, the
ingress LSR continues to use the old LSP tunnel to forward traffic and continues to refresh
the original Path message.)
5.
The egress LSR responds to the receipt of the new Path message with a Resv message that
contains a number of RSVP objects, including: a) A LABEL object to support the upstream
on demand label distribution process, and b) an SE reservation style object.
www.juniper.net
www.juniper.net
II
secondary Green
standby;
adaptive;
III
www.juniper.net
Review Questions
1.
2.
3.
www.juniper.net
III
III
III
www.juniper.net
Junt~v~[
Junos MPLS and VPNs
Chapter 6: Miscellaneous MIPLS Features
III
www.juniper.net
Forwarding Adjacencies
III
fill
LSP Metrics
fill
Automatic Bandwidth
fill
TTL Handling
fill
fill
MPLS Pings
www.juniper.net
III
www.juniper.net
l1li
to 192.168.1.4;
primary thru-R2;
path thru-R2 {
192.168.1.2 loose;
www.juniper.net
III
Route Review
Route Review
Start by looking at your EBGP routes to determine what the next hop is. As displayed on the slide, we
do have an active route. The protocol next hop for this route is 10.0.11.2 and you can tell that the
next hop was resolved in the inet . 0 table. You can also see that there is not an entry in the inet.3
routing table. This is because the LSP terminates at the loopback address of R4. Because BGP will
first try to resolve the next hop in the inet . 3 table, we need to add this prefix in order to route the
traffic through the LSP.
www.juniper.net
III
Configuration
Add the next hop using the install prefix option under
the [edit protocols mpls label-switchedpath lsp-name] hierarchy
.. Prefix can be a single host or an entire network
www.juniper.net
i
l1li
0 hidden)
0 hidden)
192.168.1. 4/32
www.juniper.net
l1li
Default behavior
LDP and RSVP routes are stored in inet. 3
Table inet. 0 is not aware of routes installed in inet. 3
user@R1> show route 10.0.11.2
inet.O: 36 destinations, 36 routes (36 active,
= Active Route, - = Last Active, * = Both
0 holddown,
0 hidden)
10.0.11.0/24
10.0.11.2/32
www.juniper.net
II
III
Verifying changes
user@R1> show route 10.0.11.2
destinations, 37 routes
Route, - ~ Last Active,
www.juniper.net
II
www.juniper.net
III
MPLS Forwarding
Another option for traffic engineering is mpls - forwarding. The mpls- forwarding option is
designed to overcome some of the problems associated with the use of traffic-engineering
bgp- igp. Specifically, the option is designed to prevent the overshadowing of IGP routes in the
inet.O routing table when RSVP or LOP-signaled LSPs are copied from inet. 3 into inet . 0 so
that LSPs can be used when forwarding to internal destinations.
By keeping the IGP routes active, your export policies continue to operate as expected, even though
forwarding might occur over an LSP next hop. Unlike the bgp- igp option, mpls - forwarding
maintains copies of the LSPs in the inet . 3 routing table where they can still be used for normal
VPN or BGP next-hop resolution.
www.juniper.net
III
inet.O: 37
holddown,
0 hidden)
ct1ve Route,
192.168.1. 4/32
1@[OSPF/10]100:00:58, metric 4
> to 172.22.2Q1.6 via ge-1/0/0.0
1#[RSVP/7/1]J 00: 00:53, metric 4
> to 172.22.201.2 via ge-O/O/O.O, label-switched-path LSP-to-R4
* [RSVP/7/1]
00:00:53, metric 4
www.juniper.net
~ Forwarding
Adjacencies
IIIIl
Forwarding Adjacencies
The slide highlights the topic we discuss next.
www.juniper.net
[edit]
user@R4# show protocols
rsvp {
interface all;
mpls {
label-switched-path green
to 192.168.5.6;
primary R4-to-R6;
path R4-to-R6 {
192.168.5.5 loose;
interface all;
ospf {
traffic-engineering;
area 0.0.0.0 {
interface all;
_---,--~-'I
label-switched-path green (
metric 1;
Forwarding
adjacencies
announce LSPs
as pointtopoint
interfaces into
the IGP routing
table
www.juniper.net
www.juniper.net
192.168.5.8 (192.168.5.8)
ms
1.420 ms
www.juniper.net
0 ho1ddown,
0 hidden)
172.22.240.0/24
172 .22 .241.0/24
192.168.5.1/32
192.168.5.2/32
192.168.5.3/32
192.168.5.4/32
192.168.5.5/32
192.168.5.6/32
192 .168.5.8/32
224.0.0.5/32
www.juniper.net
www.juniper.net
III
~sp-nam.e
action in a
routing-options
term second-route
from {
route-filter 192.168.49.0/24 exact;
www.juniper.net
0 hidden)
www.juniper.net
~LSP Metrics
LSP Metrics
The slide highlights the topic we discuss next.
www.juniper.net
811
811
www.juniper.net
-7 Automatic Bandwidth
Automatic Bandwidth
The slide highlights the topic we discuss next
www.juniper.net
II
ma~\e-before-break
capability
www.juniper.net
[edit]
uset:@R1# show protocols mpls
statistics {
file Auto-Example;
auto-bandwidth;
label-switched-path LSP-to-R4 {
to 192 .168.1.4;
metLic 4;
auto-bandwidth;
interface all;
interface fxpO. 0
disable;
Option
adjust-interval
Meaning
Time to adjust LSP bandwidth (300 .. 4294967295
seconds)
adjust-threshold
maximum-bandwidth
minimum-bandwidth
moni tor-bandwidth
www.juniper.net
www.juniper.net
~TTL
Handling
TIL Handling
The slide higillights the topic we discuss next.
www.juniper.net
II
www.juniper.net
l1li
r"""""~~~~1
L"_m"m,,_,,,,_~m"_-.!
www.juniper.net
www.juniper.net
III
www.juniper.net
www.juniper.net
www.juniper.net
III
www.juniper.net
~MPLS
Pings
MPLS Pings
The slide highlights the topic we discuss next.
www.juniper.net
l1li
192.168.1.4
127.0.0.1
-> 0/0
-->
0/0
www.juniper.net
www.juniper.net
III
www.juniper.net
auto-bandwidth?
3. What are the primary differences between nodecrement-ttl and no-propagate-ttl?
Review Questions
1.
2.
3.
www.juniper.net
www.juniper.net
www.juniper.net
Juntf2v'~[
Junos MPLS and VPNs
Chapter 7: VPN Review
III
www.juniper.net
-7 Overview of VPNs
l1li
ePE-Based VPNs
l1li
Provider-Provisioned
Overview of VPNs
The slide lists the topics we cover in this chapter. We discuss the highlighted topic first.
www.juniper.net
III
Branch Office
www.juniper.net
III
Uses IP infrastructure
Can be shared with Internet services
III
III
III
Provider benefits:
Multiservice infrastructure
Creates additional source of revenue
Uses IP Infrastructure
Most companies today provide their employees with access to the Internet for e-mail and web
browsing services. The Internet has become part of everyday life in today's society. By utilizing the
Internet as the public infrastructure for building VPNs. companies can use their existing equipment
to reduce costs.
Subscriber Benefits
VPNs deployed over the Internet can lower operational expenses for companies by making it possible
to use a single network connection to provide multiple services. A company no longer needs a Frame
Relay network to provide VPN services and Internet connectivity for e-mail services; it can all be done
using one Internet connection.
Provider Benefits
VPNs can also create an additional source of revenue for the provider. ISPs can now offer not only
Internet service but also value-added VPN services. Everybody wins!
www.juniper.net
III
CPE-VPNs:
L2TP and PPTP
IPsectunnel mode
III
PP-VPNs:
BGP/MPLS-based VPNs (RFC 4364)
RFC 4364 was formerly
draft-ietf-13vpn-rfc2547 bis
Virtual routers
<& Layer 2 M PLS VPNs
"Site 1
VPLS
BG P signaled VPLS
LDP signaled VPLS
www.juniper.net
~ CPE-Based
VPNs
CPE-8ased VPNs
The slide highlights the topic we discuss next.
www.juniper.net
III
www.juniper.net
III
III
Applications:
"Strong security requirements, across one or multiple ISPs
" Customer responsible for key management
III
Applications
For a customer with a strong security requirement, IPsec is a perfect fit. However, key management
and routing between sites are the customer's responsibility.
Security Services
Security services include the following:
Access control;
Data origin authentication;
Replay protection;
Data integrity;
Data privacy (encryption); and
Key management.
www.juniper.net
II!I
!III
l1li
Site 1
www.juniper.net
~ Provider-Provisioned
Provider-Provisioned
The slide highlights the topic we discuss next.
www.juniper.net
III
Layer 3 characteristics
Provider's routers participate in customer's Layer 3 routing
Provider's routers manage VPf\/-specific routing tables,
distributes routes to remote sites
CE routers advertise their routes to the provider
III
Layer 2 characteristics
Customer maps its Layer 3 routing to the circuit mesh
Provider delivers Layer 2 circuits to the customer, one for
each remote site
Customer routes are transparent to provider
www.juniper.net
III
CE
Outsourced VPNs
MPLS-based VPNs make it possible for a service provider to offer value-added services to new and
existing customers using its existing network infrastructure.
The Junos OS supports Layer 3 provider-provisioned VPNs based on RFC 4364. In this model, the
provider edge (PE) routers maintain VPN-specific routing tables called VPN route and forwarding
(VRF) tables for each of their directly connected VPNs. To populate these forwarding tables, the CE
routers advertise routes to the PE routers using conventional routing protocols like RIP, OSPF and
EBGP.
The PE routers then advertise these routes to other PE routers with Multiprotocol Border Gateway
Protocol (MP-BGP) using extended communities to differentiate traffic from different VPN sites.
Traffic forwarded from one VPN site to another is tunneled across the service provider's network
using MPLS. The MPLS-based forwarding component allows support for overlapping address space
and private addressing.
www.juniper.net
III
III
III
www.juniper.net
III
Virtual Routers
A virtual router functions much like an RFC 4364 PE router in that it maintains site-specific routing
instances and tables for use in the forwarding of IP-based VPN traffic. A significant difference,
however, is that in the virtual router approach. the PE router does not terminate the routing protocol
used by the CE device. In effect, the two PE routers create a sham link representing the connection
between the PE routers for use in the flooding of OSPF LSAs across the provider's backbone.
www.juniper.net
III
Subscriber:
.. Offload routing complexity to provider
.. Suits enterprises that do not want to build core routing
competency into their organizations
IiII
Provider:
VPN-specific routing information is not maintained on all
backbone routers
.. Value-added service (revenue opportunity)
www.juniper.net
III
III
www.juniper.net
III
www.juniper.net
II
III
II
www.juniper.net
III
List of
CCC Drawbacks
The following list details some of the drawbacks of CCC:
CE and PE router configuration can be complex, especially during adds, moves, and
changes. The customer must coordinate with the service provider.
Each data-link connection identifier (DLCI)/PVC requires a dedicated set of MPLS LSPs.
There can be no sharing of the LSP when using CCC.
CCC as a Layer 2 VPN solution is only appropriate for small numbers of individual
private connections.
Interface types must be the same at all CE device locations. For instance, if Frame Relay
is used at one VPN site then Frame Relay must be used at all other sites. However, the
Junos OS has a feature called translational cross-connect (TCC) that can be used when
there are different interfaces types at the CE locations.
www.juniper.net
eee and
III
III
M PLS
eE to eE
Routing Is CE to CE
Because the provider delivers Layer 2 circuits to the customer, the routing forthe customer's private
network is entirely in the hands of the customer. From the perspective of the attached eE device,
there is no operational difference between a Frame Relay service, eee, and a BGP Layer 2 VPN
solution.
www.juniper.net
fII
l1li
III
fII
LSP1
www.juniper.net
III
l1li
www.juniper.net
II
Subscriber:
Can outsource circuits
Maintains control of routing
Uses any Layer 3 protocol
II
Provider:
Complements RFC 4364
Operates over tile same core. using tile same outer LSP
Subscriber Advantages
With Layer 2 VPNs the customer can outsource Layer 2 circuits to the provider over an existing
Internet access circuit while maintaining control over the routing of its traffic. Also, because the
provider is encapsulating Layer 2 traffic for transport using MPLS, the customer can use any Layer 3
protocol-not only IP-based protocols.
Provider Advantages
Layer 2 and Layer 3 VPNs can coexist by using the same MPLS transport and Signaling protocols. The
provider can now sell Frame Relay or ATM circuits to different customers using its existing IP core.
Automatic provisioning of Layer 2 circuits simplifies the processes of adds, moves, and changes.
Also, the use of label stacking greatly improves efficiency and scalability.
www.juniper.net
II
III
l1li
www.juniper.net
II1II
www.juniper.net
Review Questions
1.
2.
3.
www.juniper.net
www.juniper.net
Juntr2v~[
Junos MPLS and VPNs
Chapter 8: Layer 3 VPNs
lIB
www.juniper.net
III
Operational Characteristics
Policy-Based Routing Information Exchange
Traffic Forwarding
www.juniper.net
III
CE routers:
Located at customer premises
.. Provide access to the service provider network
.. Can use any access technology or routing protocol for the
CEjPE connection
www.juniper.net
III
PE routers:
Maintain VPN-specific forwarding tables
Exchange VPN routing information with other PE routers
using BGP
Use MPLS LSPs to forward VPN traffic
www.juniper.net
l1li
P routers:
(I
Provider Routers
Provider (P) routers are located in the provider's core. These routers do not carry VPN customer
routes, nor do they interface in the VPN control and signaling planes. This is a key aspect of the RFC
4364 scalability model; only PE routers are aware of VPN customer routes, and no single PE router
must hold all VPN customer state information.
P routers are involved in the VPN forwarding plane where they act as label-switching routers (LSRs)
performing label swapping (and popping) operations.
www.juniper.net
III
III
VPN Sites
A VPN site is a collection of devices that can communicate with each other without the need to
transit the provider's backbone. A site can range from a single location with one router to a network
consisting of many geographically diverse routers.
Mapped to a VRF
Each VPN site is attached to at least one PE router and can be dual-homed with multiple connections
to different PE routers. Each site is associated with a site-specific VRF table in the PE routers. It is
here that the PE router maintains the routes specific to that site and. based on policy. the routes for
remote sites to which this location can communicate.
www.juniper.net
A VRF is created
www.juniper.net
III
III
Site Separation
When a packet is received from a given site, the PE router performs a longest-match Layer 3 lookup
against only the entries housed in that site's VRF table. This separation permits duplicate addressing
among VPN customers with no chance of routing ambiguity.
www.juniper.net
an
www.juniper.net
III
www.juniper.net
(1 byte)
II
(3 bytes)
(0-4 bytes)
II
................
Distributed by MP-BGP
Labeled VPN routes are exchanged over the MP-BGP sessions, which terminate on the PE routers.
www.juniper.net
(Type)
(Adm)
L-..
Mmi!Jj~tiQ!J.Fi.Glq:
2-Byte Tyoo Field: Oeterm ines the len gthsofthe other two fields
ill
= 2 bytes,
AN field
= 4 bytes
Examples: 10458:22:10.1.0.0/16 or
1.1.1.1:33:10.1.0.0 16
Type 0: This format uses a 2-byte administration field that codes the provider's
autonomous system number, followed by a 4-byte assigned number field. The assigned
number field is administered by the provider and should be unique across the autonomous
system.
Type 1: This format uses a 4-byte administration field that is normally coded with the router
10 (RID) of the advertising PE router, followed by a 2-byte assigned number field that caries
a unique value for each VRF table supported by the PE router.
The examples on the slide show both the Type 0 and Type 1 route distinguisher formats. The first
example shows the 2-byte administration field with the 4-byte assigned number field (Type 0).
www.juniper.net
II
fill
1/1
II
VPN-IPv4 Routes
The ingress PE router adds (or prepends) the route distinguisher to the IPv4 prefix of routes received
from each CE router. These VPNIPv4 routes are then exchanged between PE routers using MpBGP. The
egress router converts the VPNIPv4 routes back into IPv4 routes before inserting them into the site's
routing table.
www.juniper.net
III
www.juniper.net
~ Operational Characteristics
~ Policy-Based
www.juniper.net
VPNB
Site 2
VPNA
Site3
III
III
Control Flow
VPN control flows exist at various places in the RFC 4364 environment. First, we have the signaling
exchange between CE and PE routers that can take the form of OSPF, RIP, BGP, or even static routing.
The control exchanges between PE and CE routers are totally independent, due to the PE routers
terminating the local CE-PE signaling flows. The PE routers then use MP-BGP to convey routes from
site-specific VRF tables for the purposes of populating the VRF tables on remote PE routers.
Finally, the need for LSPs in the provider's networks results in the presence of MPLS-related signaling in
the form of either RSVP or LDP.
Data Flow
Data flow relates to the actual forwarding of VPN traffic from CE router to CE router using MPLS
label-based switching through the provider's core.
www.juniper.net
II1II
III
Administrative Policy
The use of policy in the PE routers determines the connectivity that results between VPN sites. While site
connectivity requirements are defined by the VPN customers, the act of implementing this policy is the
job of the service provider.
Mistakes made by the provider when defining and implementing VPN policy can lead to security
breaches at worst and broken VPN connectivity at best.
www.juniper.net
l1li
Type 1:
4-byte global administrator subfield (lANA-assigned IP Address)
www.juniper.net
III
III
l1li
Route Advertisements
Each VPN-IPv4 route advertised by a PE router contains one or more route target communities. These
communities are added using VRF export policy or explicit configuration.
Receiving Routes
When a PE router receives route advertisements from remote PE routers, it determines whether the
associated route target matches one of its local VRF tables. Matching route targets cause the PE router
to install the route into all VRF tables whose configuration matches the route target.
www.juniper.net
".c"'(
l"'2,
l VPN
B"'CE-l
\
-.
';Sitel
"'~\"h+"""".,.#"",
_110~;~~1
(0
III
Routing Exchange
The following sequence of slides discusses the end-to-end exchange of routing information between
CE routers belonging to the same VPN.
CE-4 sends tile routes associated with VPN A Site 2 to its attached PE router. The 10.1/16 prefix can be
exchanged using OSPF, RIP, or BGP. Static routing can also place a site's routes into the local PE router's
VRFtable.
Whatever protocol is used between CE-4 and PE-2, the operation of this protocol is terminated by the
PE router. This termination provides isolation of the VPN site's routing protocol and the MP-BGP
protocols used to convey the routes between PE routers. This isolation improves scalability and
stability as malfunctions in the PE-CE routing protocol tend to be limited to that PE-CE pairing.
www.juniper.net
III
www.juniper.net
III
www.juniper.net
/jV';~~
,,~ite2i)
'Y"""W'~'"I"v5"J'
"VP
"'-:'110.1;161
N 1\"'\
" Site2,)
IiII
www.juniper.net
.(',~~""q,,\
/*VPNg'\
Site2/~.)
V~~'A'\
n.
MP-BGP
III
Site2.
_1 10.1/16 1
www.juniper.net
MP-BGP
_110.1/ 16 1
l1li
Label Association
When VPN routes are advertised, part of the NLRI is the VRF label chosen by the advertising PE router.
This label is often called the inner label because it is always found at the bottom of the label stack. The
purpose of this label is to associate received packets with the correct VRF table.
The receiving PE router must be able to resolve the RID of the advertising route to an MPLS LSP stored
in the inet . 3 table. If an LSP does not exist to the advertising PE router, the route is hidden due to an
unusable next hop. VPN traffic can only be forwarded across the provider's backbone using MPLS
switching. If an LSP to the egress PE router does not exist, the VPN route can never be used.
The result of this process is a two-level label stack used to forward packets across the provider's
backbone, and then to associate the traffic with a specific VRF table on the receiving PE router.
Common Labels
RFC 4364 allows the PE router to issue a single VRF label for all routes belonging to a common VRF
interface orto allocate a unique label for each route being advertised. The Junos OS takes the former
approach because it drastically reduces the number of VRF labels that must be managed. Compliant
implementations that use per-route VRF label assignment are interoperable with this
one-Iabel-per-VRF-interface approach, however.
www.juniper.net
III
www.juniper.net
~ Operational Characteristics
I
~Traffic
Forwarding
Traffic Forwarding
The slide highlights the topic we discuss next.
www.juniper.net
CE-2/0VPNa\
Site2)
',""S\,
""""",,<,,?
10.1{16
III
www.juniper.net
l1li
www.juniper.net
PE-1
1) Lookup route in Red VRF
2) Push BGP label (z)
3) Push outerlabel(x)
lIP!
10_1116
Two labels are derived from the VRF route lookup and
are pushed onto the packet
www.juniper.net
PE-1
1) Look u p route in Red VRF
2) Push BG P label (z)
3) Push outer la bel (x)
III
www.juniper.net
/'
10.1/16
III
www.juniper.net
10.1.2.3
l1li
www.juniper.net
IIPl
~10.1/16
II
III
www.juniper.net
II
www.juniper.net
2.
3.
www.juniper.net
5.
www.juniper.net
JUIlOS
iii
www.juniper.net
www.juniper.net
www.juniper.net
VC .......................................................................................virtual circuit
VCI ............................................................................ virtual channel identifier
VCT .............................................................................. VPN connection table
VFT ............................................................................... VPN forwarding table
VLAN ...................................................................................... virtual LAN
VPI ............................................................................... virtual path identifier
VPLS .......................................................................... virtual private LAN service
VPN ..............................................................................virtual private network
VRF table ................................................................ VPN routing and forwarding table
WF ..................................................................................... wildcard filter
WRR ..............................................................................weighted round-robin
www.juniper.net
www.juniper.net
Course Introduction
This chapter contains no review questions.
Chapter 2:
MPLS Fundamentals
1.
The ingress router uses the destination IP address of the packet to make its forwarding decision. It will
consult the inet.O and inet.3 routing table to resolve the next-hop.
2.
The default behavior in the Junos OS is for the egress router to signal the penultimate hop router to pop
the mpls header and send the packet downstream without a mpls header. This is known as penultimate
hop popping.
3.
The transit router will use the mpls.O routing table to make its forwarding decisions. These decisions are
made based on the incoming label value.
Chapter 3:
2.
There are many RSVP Objects. We discussed the SESSION, LABEL_REQUEST, EXPLICIT_ROUTE (ERO),
RECORD_ROUTE (RRO), SESSION_ATIRIBUTE, RSVP-HOP, LABEL, and the STYLE objects within this
chapter.
3.
No. The Junos OS does not support traffic engineering for LDP signaled LSPs. You can 110wever, us LDP
tunneling over RSVP traffic engineered LSPs to apply traffic engineering to the LDP traffic.
Chapter 4:
2.
Some possible user inputs are bandwidth requirement, administrative group requirement, explicit route,
and priority.
3.
The default CSPF tie-breaking algorithm is random.
4.
When configuring an LSP an administrator can specify which administrative groups the LSP can traverse.
The administrator can specify several administrative group constraints for an LSP by using the
include-any, include-all, and the exclude statements.
www.juniper.net
Chapter 5:
2.
Fast reroute protects an entire LSP from failures along the path. Link protection provides protection forthe
failure of a single link.
3.
Aggressive optimization only takes IGP metric into consideration. Normal optimization also takes into
consideration number of hops, congestion, and preemption.
Chapter 6:
2.
The default resignaling interval is 24 hours when using the auto-bandwidth feature.
3.
First no-decrement- t t l is only configured on the ingress router and no-propagate-ttl must be
configured on all LSRs in the path. Second, uSingno-decrement-ttl allows you to change default
behavior on a per LSP basis while no-propagate-ttl is only allowed at the global level and applies to
all LSPs.
Chapter 7:
VPN Review
1.
A VPN is a private network that is constructed over a shared, public infrastructure such as Frame Relay,
an ATM network, or the Internet.
2.
The primary difference is that the CPE VPN requires the customer equipment to create and manage
tunnels for the private IP traffic. A provider-provisioned VPN solution is a VPN that relies on the provider's
equipment to create and manage tunnels for the private traffic using MPLS as the enabling technology.
3.
The first and most notable difference is with a Layer 2 VPN solution, the backbone routing is the
responsibility of the customer. With a Layer 3 VPN solution, the backbone routing is handled by the
provider. Another difference is that with a Layer 2 VPN solution, non-IP traffic can be passed from site to
site. With a Layer 3 VPN solution the traffic has to be IP.
www.juniper.net
Chapter 8:
Layer 3 VPNs
1.
The CE router is located at the customer's VPN site and only participates in the customer's routing. The
PE router is located on the edge of the provider network and participates in both the customer's routing
and the provider's network. The PE maintains all of the customer specific VRF tables. The P routers
participate in the core network and is able to forward VPN traffic using MPLS LSPs without knowledge of
the customer's network.
2.
The VPN-IPv4 NLRI consists of an MPLS label, a route distinguisher, an IPv4 address, and a 120 bit mask.
3.
The route distinguisher is used to disambiguate overlapping IPv4 addresses.
4.
Some routing method (OSPF, BGP, static routing) is used to share routes between the customer VPN sites
and the PE routers. MP-BGP is used by PE routers to pass customer routes learned from CE routers to other
PE routers. PE routers will then pass VPN routes learned from other PE routers to the associated
CE routers.
5.
A CE router will forward IPv4 packets to the locally connected PE router. The PE router will perform an route
lookup using the VRFtable associated with the incoming interface. The PE router will then encapsulate the
packets in 2 MPLS headers: the innermost will be the label learned from MP-BGP while the outermost will
be the label associated with the LSP that ends at the remote PE. The P routers along the LSP will perform
label swapping on the outermost header as the packet traverses the provider's network. The penultimate
router along the LSP will pop the outermost label and send a singly labeled packet to the remote PE. The
remote PE will analyze the packets label in order to map the packet to a particular routing table, VRF. The
remote PE pops the MPLS label and forwards the IPv4 packet to the remote CE router.
Chapter 9:
2.
The four required options for creating a Layer 3 VPN instance are instance- type, interfaces.
route-distinguisher, and vrf - target or vrf - import/vrf - export policies.
3.
The protocol match criteria required when exporting OSPF routes across your Layer 3 VPN to a remote PE
is OSPF.
Chapter 10:
2.
By default, an egress PE that has an Ethernet VRF interface cannot perform both a pop of the MPLS label
and an ARP for packets that come from the core. Therefore, an ARP must be performed by the egress
router prior to receiving packet from the core. This can be achieved simply by receiving at least one route
from the connected CE (which causes an ARP to occur to determine next hop). Also, a static route can be
www.juniper.net
configured within the VRF instance that points to the connected CEo This is generally sufficient. However,
if it is necessary to ping the VRF interface without adding routes to the VRF table, vrf - table-label or
a VT interface can be used to allow for both a pop and ARP operation by the egress router.
3.
ICMP tunneling can be configured which allows for P router hops to be revealed.
4.
To view PE to PE control flow use the show route receive-protocol bgp and show route
advertise-protocol bgp commands which show received and sent BGP routes. Routes that are
located in the bgp .l3vpn. 0 table have been accepted by at least one vrf-import policy with a matching
route target.
5.
To view a VRF table, use the show route table vpn-name command.
6.
To view the status of the PE-CE routing protocols, use the standard protocol troubleshooting commands
modified with the instance switch.
Chapter 11:
2.
First there is Option 1 which provides Internet access through a non-VRF interface (PE router has no
Internet routes). Second there is Option 2 which provides Internet access through a VRF interface (the
PE router has some or all Internet routes). And finally there is Option 3 which provides Internet access
til rough a central CE device.
Chapter 12:
2.
Routes from Spoke PEs and CEs are received by and accepted by the Spoke instance on the Hub PE. The
HUB PE passes those route to the HUB CEo The HUB CE then advertises those routes to the Hub instance
on the Hub PE. The Hub PE then advertises those routes to the Spoke sites.
3.
The Junos as supports firewall filtering and rate limiting. It also support the setting of the experimental
bits on botll the inner and outer headers of an MPLS packet.
4.
GRE and IPsec tunnels are support from CE to CE, PE to PE, and CE to PE using the Junos
Appendix B-4 Answer Key
as.
www.juniper.net
Chapter 13:
Multicast VPNs
1.
The draft-Rosen required that the provider network be running PIM for signaling. The next-generation
approach uses BGP to signal the providers network and does not require PIM be configured in the core.
2.
Type 1:
Type 2:
Type 3:
Type 4:
Type 5:
Type 6:
Type 7:
3.
The first hop deSignated router, the candidate rendezvous points, and all PE routers participating in the
multicast network, unless using vrf-table-Iabel option, require the use of a tunnel services interface.
Chapter 14:
2.
Over-provisioning is when you configure more logical connection to a site than are needed for current site
connections. This allows you to easily and quickly add additional sites to the network.
3.
On a PE router with a site ID of one, the first interface configured will be associated with the remote site
ID oftwo. The next interface configured will be associated with three. Each additional interface configured
will add one on to the previous site association.
Chapter 15:
2.
The EXP bits of the VRF label can be set by using an input firewall filter. The EXP bits of the outer
RSVP-signalled label can be set with the class-af-service setting on the LSP definition.
www.juniper.net
Chapter 16:
2.
The virtual circuit label is used to send circuit information to targeted remote PE routers. The remote router
uses this label value as its output label when forwarding traffic associated with this FEC back to the
originating router.
3.
The command to display the operational status of a LOP Layer 2 circuit is show 12circui t
connections.
2.
Adding and removing sites from a BGP VPLS requires the configuration of only one PE. All other PE's will
automatically discover the added or removed site.
3.
In a BGP VPLS, PEs advertise label blocks to remote PEs. The label blocks have enough labels to reach
and be reached by all currently configured sites in the VPLS. In an LOP VPLS, individual labels are
advertised using an LDP extended neighbor relationship to all remote PEs participating in the VPLS.
2.
To prevent a layer 2 loop when a CE is multihomed to multiple PEs, you must use BGP for signaling which
automatically prevents a loop or when using LDP for VPLS signaling specify a neighbor and a backup
neighbor.
3.
When tunnel services are not available (no Tunnel PIC) the command no-tunnel-services can be enabled
to use LSI interfaces instead of vt interfaces.
4.
The flooding behavior on a PE is based upon the interface that BUM traffic arrives on. If BUM traffic arrives
from a locally connect CE, then the traffic needs to be flooded to all local CEs (except the one the traffic
came from) and to all remote PEs. If BUM traffic arrives from a remote PE, then the traffic needs to be
flooded to only local CEs, not to any remote PE (because of PE full-mesh). If BUM traffic arrives from the
RE, then the traffic needs to be flooded to all local CEs and to all remote PEs. There should be a flood route
for each of the 3 scenarios.
Appendix B-6 Answer Key
www.juniper.net
Chapter 19:
Interprovider VPNs
1.
In a carrier-of-carrier application the customer routers maintain both customer internal and external
routes. In an interprovider VPN, except forthe ASBRs connect to VPN sites, the customer routers maintain
customer internal routes only.
2.
Option A specifies the use of separate VRFs for everyVPN on the ASBRs. Option B specifies the used ofthe
EBGP exchange of VPN routes between ASBRs. Option C specifies the use of multihop EBGP (or IBGP) to
exchange VPN routes between PEs in remote autonomous systems.
3.
The labeled-unicast address family is used between PE and CEo
www.juniper.net
www"juniper.net