0% found this document useful (0 votes)
164 views115 pages

Sample

Uploaded by

kartiksinghal224
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
164 views115 pages

Sample

Uploaded by

kartiksinghal224
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 115

CCNP SPCOR 350-501 Official Cert Guide

Companion Website and Pearson Test Prep Access Code


Access interactive study tools on this book’s companion website, including practice test software,
review exercises, Key Term flash card application, a study planner, and more!

To access the companion website, simply follow these steps:

1. Go to www.ciscopress.com/register by December 31, 2027.

2. Enter the print book ISBN: 9780135324806.


3. Answer the security question to validate your purchase.

4. Go to your account page.

5. Click on the Registered Products tab.

6. Under the book listing, click on the Access Bonus Content link.

When you register your book, your Pearson Test Prep practice test access code will automati-
cally be populated with the book listing under the Registered Products tab. You will need
this code to access the practice test that comes with this book. You can redeem the code at
PearsonTestPrep.com. Simply choose Pearson IT Certification as your product group and log
into the site with the same credentials you used to register your book. Click the Activate New
Product button and enter the access code. More detailed instructions on how to redeem your
access code for both the online and desktop versions can be found on the companion website.

If you have any issues accessing the companion website or obtaining your Pearson Test Prep
practice test access code, you can contact our support team by going to pearsonitp.echelp.org.
This page intentionally left blank
CCNP
SPCOR
350-501
Official Cert Guide

BRADLEY RIAPOLOV, CCIE No. 18921


MOHAMMAD KHALIL, CCDE No. 2023::57, CCIE No. 35484

Cisco Press
iv CCNP SPCOR 350-501 Official Cert Guide

CCNP SPCOR 350-501 Official Cert Guide


Bradley Riapolov

Mohammad Khalil

Copyright© 2025 Cisco Systems, Inc.

Published by:
Cisco Press
Hoboken, New Jersey

All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any information storage and retrieval
system, without written permission from the publisher, except for the inclusion of brief quotations in a
review.

For information regarding permissions, request forms, and the appropriate contacts within the Pearson
Education Global Rights & Permissions department, please visit www.pearson.com/global-permission-
granting.html.

$PrintCode
Library of Congress Control Number: 2024947468

ISBN-13: 978-0-13-532480-6

ISBN-10: 0-13-532480-7

Warning and Disclaimer


This book is designed to provide information about the Implementing and Operating Cisco Service
Provider Network Core Technologies (SPCOR 350-501) exam. Every effort has been made to make this
book as complete and as accurate as possible, but no warranty or fitness is implied.

The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc.
shall have neither liability nor responsibility to any person or entity with respect to any loss or damages
arising from the information contained in this book or from the use of the discs or programs that may
accompany it.

The opinions expressed in this book belong to the author and are not necessarily those of
Cisco Systems, Inc.

Please contact us with concerns about any potential bias at https://www.pearson.com/report-bias.html.

Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been
appropriately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this
information. Use of a term in this book should not be regarded as affecting the validity of any trademark
or service mark.
v

Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book
is crafted with care and precision, undergoing rigorous development that involves the unique expertise of
members from the professional technical community.

Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we
could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us
through email at [email protected]. Please make sure to include the book title and ISBN in your
message.

We greatly appreciate your assistance.

GM K12, Early Career and Professional Learning: Copy Editor: CAH Editorial
Soo Kang
Technical Editor: Brad Edgeworth
Alliances Manager, Cisco Press: Caroline Antonio
Editorial Assistant: Cindy Teeters
Director, ITP Product Management: Brett Bartow
Cover Designer: Chuti Prasertsith
Executive Editor: James Manly
Composition: codeMantra
Managing Editor: Sandra Schroeder
Indexer: Timothy Wright
Development Editor: Christopher A. Cleveland
Proofreader: Jennifer Hinchliffe
Senior Project Editor: Tonya Simpson
vi CCNP SPCOR 350-501 Official Cert Guide

About the Authors


Bradley Riapolov is a seasoned technical solutions architect at Cisco Systems, currently
serving in the MassScale Infrastructure Group. Since joining Cisco in 2008, he has been
at the forefront of designing and deploying cutting-edge networking solutions, leveraging
his extensive expertise to meet the complex demands of today’s technology landscape.

Before his tenure at Cisco, Bradley gained invaluable experience working with various
Fortune 500 companies, where he was instrumental in designing and operating small,
medium, and large networks. His 20-year career is marked by a diverse background in
successfully implementing technical campaigns across multiple industries, including
transport, service provider, enterprise, industrial, and mobility networking.

In addition to his role at Cisco, Bradley is a recognized thought leader and educator. As
a Cisco Press author and a distinguished speaker at Cisco Live, he has contributed to the
body of knowledge in networking, sharing his insights and expertise through various
publications. Moreover, his dedication to education is widely demonstrated, not only
within Cisco but also through his role as a NetAcad instructor, where he has mentored
and guided aspiring network professionals.

Bradley’s dedication to excellence and his ability to simplify complex concepts have made
him a respected figure in the networking community. His contributions continue to shape
the future of networking, driving innovation and excellence in the industry. Bradley’s
refreshing no-nonsense approach to problem-solving has earned him a credible reputation
among customers and peers alike.

Mohammad Khalil is an experienced service provider and enterprise expert, having


worked in several service provider networks within the MENA region. Currently, he is a
leader with the Cisco Competitive Win Center team covering enterprise architecture and
working closely with Cisco sales/technical teams on designing their solutions.

Mohammad is a passionate networking expert, following technology trends and


certifications development by writing several work labs and design scenarios. He was
honored to be one of the SMEs for the CCIE Service Provider blueprint, SME for
updated content of the CCIE Enterprise, and president of the Jordan IPv6 Council
(part of the IPv6FORUM).

About the Technical Reviewer


Brad Edgeworth, CCIE No. 31574 (R&S and SP), is an SD-WAN technical solutions
architect at Cisco Systems. Brad is a distinguished speaker at Cisco Live, where he has
presented on various topics. Before joining Cisco, Brad worked as a network architect
and consultant for various Fortune 500 companies. Brad’s expertise is based on enterprise
and service provider environments, with an emphasis on architectural and operational
simplicity. Brad holds a bachelor of arts degree in computer systems management from
St. Edward’s University in Austin, Texas. Brad can be found on X (formerly Twitter) as
@BradEdgeworth.
vii

Dedications
To my beautiful wife, Evelina, who has supported me throughout the development of this
book. You have challenged my assumptions, sharpened my ideas, and made some parts
truly exceptional.

—Bradley Riapolov

I want to dedicate this book with affection to my wife, Qamar, and my precious children,
Sireen and Saeed, who have supported me and motivated me to accomplish this effort. To
my wise father, who believed in me and encouraged me all the way. Lastly, to my second
home Estarta, which provided me with the support and environment to walk through.
—Mohammad Khalil
viii CCNP SPCOR 350-501 Official Cert Guide

Acknowledgments
I would like to thank the Cisco Press team, especially James Manly and Christopher
Cleveland, for their patience, guidance, and consideration.

I would like to thank the technical editor, colleague, and friend, Brad Edgeworth, for his
time, technical expertise, and readiness to generously share knowledge without expecting
anything in return.

I would like to thank Bikram Gandhok, Cisco Certification Program Manager, for driving
Cisco Certifications to stay relevant and impactful.
I would like to thank Kent Dailey, my steadfast accomplice, who has navigated both
challenges and victories with equal zeal.

I would like to thank my mentors, Marty Fierbaugh and Emerson Moura, for helping me
gain insights that extend beyond my own perceptions.

Finally, I would like to thank my co-author, Mohammad, for sharing the burden of this
challenging endeavor.

—Bradley Riapolov

I would like to massively thank our development editor, Chris Cleveland, for his guidance
and the contribution he provided. James Manly’s support was remarkable; a big thanks for
his kindness.

I want to thank our technical editor, Brad, for his great insights, patience, and kindness
for sharing his amazing practical experience and guiding us throughout the content
development.

And I don’t want to forget to thank my friend, Adeeb Al-Husseini, for his time sharing his
practical experience and insights.

Finally, I would like to thank my partner, Bradley, for his seamless cooperation,
contribution, and kindness to share his ideas and thoughts with me.
—Mohammad Khalil
ix

Contents at a Glance
Introduction xxx

Part I Architectures
Chapter 1 Service Provider Architectures 2

Chapter 2 Software Architectures 40

Chapter 3 Service Provider Virtualization 60

Part II Routing
Chapter 4 Routing Fundamentals 72

Chapter 5 IS-IS 108

Chapter 6 OSPF 158

Chapter 7 BGP Fundamentals 228

Chapter 8 BGP Optimization and Convergence 316

Chapter 9 Multicast 352

Part III Transport Protocols


Chapter 10 MPLS Fundamentals 452

Chapter 11 MPLS L2VPNs 494

Chapter 12 MPLS L3VPNs 554

Chapter 13 Advanced MPLS Services 622

Chapter 14 MPLS Traffic Engineering 666

Chapter 15 Segment Routing 724

Part IV Service Provider Security


Chapter 16 Securing Control Plane 764

Chapter 17 Securing Management Plane 836

Chapter 18 Securing Data Plane 854


x CCNP SPCOR 350-501 Official Cert Guide

Part V Critical Operational Elements


Chapter 19 IPv6 Transitions 882

Chapter 20 High Availability Designs 904

Chapter 21 Quality of Service 936

Part VI Automation and Orchestration


Chapter 22 Automation and Assurance 976

Part VII Final Preparation


Chapter 23 Final Preparation 1012

Chapter 24 CCNP SPCOR (350-501) Exam Updates 1014

Part VIII Appendix


Appendix A Answers to the “Do I Know This Already?” Quizzes and
Review Questions 1018

Index 1032

Online Elements
Appendix B Memory Tables

Appendix C Memory Tables Answer Key

Appendix D Study Planner

Glossary of Key Terms


xi

Contents
Introduction xxx

Part I Architectures

Chapter 1 Service Provider Architectures 2


“Do I Know This Already?” Quiz 2
Foundation Topics 4
Network Core Architectures 4
Metro Ethernet 5
E-Line (Ethernet Line Service) 5
E-LAN (Ethernet LAN Service) 7
E-Tree (Ethernet Tree Service) 7
Metro Ethernet Forum (MEF) 8
MPLS 8
Unified MPLS 10
Segment Routing 13
Segment Routing Traffic Engineering (SRTE) 14
SRv6 (Segment Routing IPv6) 15
Transport Technologies 16
DOCSIS 16
xDSL 17
TDM 19
Dense Wavelength-Division Multiplexing (DWDM) 21
xPON 24
Routed Optical Networking 27
Mobility (Packet Core, RAN xhaul Transport for 5G vRAN and ORAN
Transport) 31
Packet Core 32
xHaul 33
Functional Splits Options 34
O-RAN 36
Exam Preparation Tasks 37
Review All Key Topics 38
Define Key Terms 38
Review Questions 38
Bibliography 39
xii CCNP SPCOR 350-501 Official Cert Guide

Chapter 2 Software Architectures 40


“Do I Know This Already?” Quiz 40
Foundation Topics 41
Software Architectures 41
IOS 42
IOS XE 42
IOS XR 47
Exam Preparation Tasks 58
Review All Key Topics 58
Define Key Terms 58
Command Reference to Check Your Memory 58
Review Questions 59

Chapter 3 Service Provider Virtualization 60


“Do I Know This Already?” Quiz 60
Foundation Topics 61
Virtualization Technologies 61
NFV Infrastructure 61
VNF Workloads 63
Containers 63
Application Hosting 68
Exam Preparation Tasks 70
Review All Key Topics 70
Define Key Terms 70
Command Reference to Check Your Memory 70
Review Questions 71

Part II Routing

Chapter 4 Routing Fundamentals 72


“Do I Know This Already?” Quiz 72
Foundation Topics 74
IP Routing 74
Changing Natural Routing Protocol Behaviors 76
Route Maps 77
Route Policy Language (RPL) 88
Prefix Lists 100
Prefix Sets 103
Exam Preparation Tasks 105
Contents xiii

Review All Key Topics 105


Define Key Terms 105
Command Reference to Check Your Memory 106
Review Questions 107

Chapter 5 IS-IS 108


“Do I Know This Already?” Quiz 109
Foundation Topics 110
Implement IS-IS (IPv4 and IPv6) 110
IS-IS Topology 111
Basic IS-IS Configuration 112
IS-IS Single Topology and Multitopology 121
IS-IS Adjacencies 129
IS-IS Network Types 131
IS-IS Metrics 137
Route Advertisement 141
Overload Bit 146
Authentication 148
Back to IS-IS Areas 152
Troubleshooting IS-IS 155
Exam Preparation Tasks 155
Review All Key Topics 155
Define Key Terms 156
Command Reference to Check Your Memory 156
Review Questions 157
Bibliography 157

Chapter 6 OSPF 158


“Do I Know This Already?” Quiz 158
Foundation Topics 160
Implement OSPFv2 160
OSPF Overview 162
Designated Router and Backup Designated Router 169
DR and BDR Priorities 176
OSPF Timers 179
OSPF Network Types 181
Route Advertisement 186
OSPF Stubby Areas 193
OSPF Totally Stubby Areas 196
xiv CCNP SPCOR 350-501 Official Cert Guide

OSPF Not-So-Stubby Areas (NSSAs) 196


OSPF Totally Not-So-Stubby Areas 199
OSPF Multi-Area Adjacencies 200
OSPF Virtual Links 206
Implement OSPFv3 209
Configuring OSPFv3 211
Implementing OSPFv3 Authentication 218
OSPFv3 Multiple Instances 221
Troubleshooting OSPF 225
Exam Preparation Tasks 226
Review All Key Topics 226
Define Key Terms 226
Command Reference to Check Your Memory 226
Review Questions 227
Bibliography 227

Chapter 7 BGP Fundamentals 228


“Do I Know This Already?” Quiz 228
Foundation Topics 231
Introduction to BGP 231
Autonomous System (AS) 231
BGP ASN Representation 236
BGP Messages 238
BGP Neighbor States 239
BGP Address Families 244
BGP Prefix Advertisement 246
BGP Path Attributes 248
BGP Path Selection 255
Weight 261
Locally Originated 263
AS Path 263
Origin 267
MED 268
BGP Multipath 273
eBGP vs. iBGP 274
IGP Next Hop 275
Oldest Route 275
Router ID 275
Accumulated IGP (AIGP) 275
Contents xv

Aggregate Address 277


Redistribution 280
Communities 282
Community Lists 290
BGP Peer Templates 291
Cost Community 292
Regular Expressions 294
Filter Lists 295
Mitigating the Split-Horizon Rule with Route Reflection
and Confederations 297
Route Reflection 297
Confederations 304
BGP Loop Prevention 306
Allowas-in 307
AS Override 308
Troubleshooting 308
ACL/Firewalls 308
TTL 309
Authentication 310
Autonomous System 310
Different Address Families 310
MTU 311
Exam Preparation Tasks 311
Review All Key Topics 311
Define Key Terms 312
Command Reference to Check Your Memory 312
Review Questions 314
Bibliography 314

Chapter 8 BGP Optimization and Convergence 316


“Do I Know This Already?” Quiz 316
Foundation Topics 317
Minimum Route Advertisement Interval (MRAI) 317
Fast Peering Session Deactivation 319
Next-Hop Tracking 322
BGP and IGP Interaction 326
BGP Route Dampening 328
Prefix Independent Convergence 333
xvi CCNP SPCOR 350-501 Official Cert Guide

BGP Shadow Route Reflector 340


BGP Best External 341
High Availability: BGP Graceful Restart 344
High Availability: BGP Non-Stop Routing 347
Exam Preparation Tasks 348
Review All Key Topics 348
Define Key Terms 349
Command Reference to Check Your Memory 349
Review Questions 350
Bibliography 350

Chapter 9 Multicast 352


“Do I Know This Already?” Quiz 352
Foundation Topics 354
Multicast 354
IGMP 356
IGMPv1 357
IGMPv2 357
IGMPv3 358
Implementing IGMP 358
MLD 379
Multicast Routing Protocol Types 392
PIM-SM Multicast Distribution Trees 392
Rendezvous Points 410
PIM Auto-RP 410
PIM Bootstrap Router (BSR) 416
Bidirectional PIM 418
Source-Specific Multicast (SSM) 424
PIMv6 433
MLD 434
PIMv2 437
Static RP 439
BSR 442
Exam Preparation Tasks 447
Review All Key Topics 447
Define Key Terms 448
Command Reference to Check Your Memory 448
Review Questions 450
Bibliography 451
Contents xvii

Part III Transport Protocols

Chapter 10 MPLS Fundamentals 452


“Do I Know This Already?” Quiz 452
Foundation Topics 454
MPLS Fundamentals 454
Reserved Labels 455
Ethertype 455
Additions of MPLS 456
MPLS Label Operations 456
MPLS Label Types 457
Label Assignment 458
MPLS LDP Autoconfig 465
MPLS Label Assignment 467
MPLS Advertise Labels 469
MPLS LDP Session Protection 477
MPLS LDP Session Authentication 480
MPLS LDP IGP Synchronization 483
MPLS OAM 488
Exam Preparation Tasks 491
Review All Key Topics 491
Define Key Terms 492
Command Reference to Check Your Memory 492
Review Questions 493
Bibliography 493

Chapter 11 MPLS L2VPNs 494


“Do I Know This Already?” Quiz 494
Foundation Topics 496
Metro Ethernet 496
E-Line (Ethernet Line Services) 496
E-LAN (Ethernet LAN Services) 497
E-Tree (Ethernet Tree Services) 497
E-Access 498
MPLS AToM 498
VPLS 502
Discovery and Signaling 505
VPLS Signaled with LDP (Manual) 505
VPLS Signaled with LDP (Autodiscovery) 509
VPLS Signaled with BGP 513
xviii CCNP SPCOR 350-501 Official Cert Guide

H-VPLS 519
ITU-T G.8032 Ethernet Ring Protection Switching 525
CFM Protocols and Link Failures 526
Ethernet Connectivity Fault Management 526
Customer Service Instance 527
Maintenance Domain 528
Ethernet CFM Maintenance Domain 528
Maintenance Point 529
Maintenance Association 529
Maintenance Endpoints 530
CFM Messages 531
Cross-Check Function 532
Ethernet CFM and Ethernet OAM Interaction 533
Provider Bridges (802.1ad) 535
802.1ad Ports 537
Service Provider Bridges 538
S-Bridge Component 538
C-Bridge Component 539
NNI Port 539
Provider Backbone Bridging (PBB) 539
PBB-EVPN Components 541
EVPN 543
Next-Generation Solutions for L2VPN 545
CE Multihoming 545
Frame Duplication 545
MAC Flip-Flopping 545
MPLS-Based Data Plane EVPN 547
Exam Preparation Tasks 550
Review All Key Topics 550
Define Key Terms 551
Command Reference to Check Your Memory 551
Review Questions 552
Bibliography 552

Chapter 12 MPLS L3VPNs 554


“Do I Know This Already?” Quiz 554
Foundation Topics 556
MPLS L3VPN 556
Contents xix

Virtual Routing and Forwarding (VRF) 557


MPLS LDP 562
Multiprotocol-BGP (MP-BGP) 564
MPLS L3VPN Static PE-CE Routing 567
MPLS L3VPN OSPF PE-CE Routing 577
MPLS L3VPN OSPF Routing, Backdoor Link 585
OSPF Down Bit 589
MPLS L3VPN EIGRP PE-CE Routing 591
MPLS L3VPN BGP PE-CE Routing 595
BGP Allowas-in 596
BGP AS-Override 597
Route Target Filtering Mechanisms 598
Import and Export Maps 601
Route Target Constraint 604
MPLS L3VPN Route Reflector Deployment 607
Multicast VPN 610
Multicast VPN Service Types 611
Multicast Distribution Trees 611
Draft-Rosen 611
PIM/GRE mVPN: Routing Information Distribution Using PIM
C-instances 613
NG Multicast for L3VPN–BGP/MPLS mVPN (NG mVPN) 614
Requirements for Support of PIM-SM SSM in an mVPN 614
BGP/MPLS mVPN: Carrying Multicast mVPN Routing Information Using
C-Multicast Routes 615
Exam Preparation Tasks 617
Review All Key Topics 617
Define Key Terms 618
Command Reference to Check Your Memory 618
Review Questions 619
Bibliography 620

Chapter 13 Advanced MPLS Services 622


“Do I Know This Already?” Quiz 622
Foundation Topics 624
Unified MPLS 624
MPLS L3VPN Shared Services (Internet) 629
xx CCNP SPCOR 350-501 Official Cert Guide

MPLS L3VPN Internet Access Option 1: VRF-Specific Default Route 629


MPLS L3VPN Internet Access Option 2: Separate PE-CE Interface 634
MPLS L3VPN Internet Access Option 3: Extranet with Internet-VRF 635
MPLS L3VPN Internet Access Option 4: VRF-Aware NAT 639
MPLS Inter-AS L3VPN 640
Inter-AS Option A 641
Inter-AS Option B 643
Inter-AS Option C 649
Inter-AS Option AB 652
Carrier Supporting Carrier (CsC) 654
Quality of Service (QoS) 659
MPLS QoS 660
Uniform Mode 661
Pipe Mode 661
Short Pipe Mode 662
Exam Preparation Tasks 662
Review All Key Topics 662
Define Key Terms 663
Command Reference to Check Your Memory 663
Review Questions 664
Bibliography 664

Chapter 14 MPLS Traffic Engineering 666


“Do I Know This Already?” Quiz 666
Foundation Topics 667
MPLS Traffic Engineering Fundamentals 667
OSPF Extensions for MPLS TE 670
IS-IS Extensions for MPLS TE 671
Constrained Shortest Path First 672
Resource Reservation Protocol (RSVP) Operation in MPLS TE 673
RSVP PATH Message 674
RSVP RESV Message 675
RSVP Error Messages 676
RSVP Tear Messages 676
How to Place Traffic into a TE Tunnel 678
Forwarding Adjacency 687
MPLS Fast Reroute (FRR) 695
FRR Terminology 696
Contents xxi

Link Protection 697


Node Protection 697
FRR on IOS XR 703
MPLS TE QoS 712
The DiffServ-TE Solution 712
Maximum Allocation Model (MAM) 713
Russian Dolls Model (RDM) 714
DiffServ for DS-TE 715
DS-TE Modes 715
Class-Based Tunnel Selection (CBTS) 716
Policy-Based Tunnel Selection 720
Exam Preparation Tasks 721
Review All Key Topics 721
Define Key Terms 722
Command Reference to Check Your Memory 722
Review Questions 723
Bibliography 723

Chapter 15 Segment Routing 724


“Do I Know This Already?” Quiz 724
Foundation Topics 726
Segment Types 728
Global Segments 728
Local Segments 730
IGP Segments 731
IGP Prefix Segments 731
IGP Adjacency Segment 733
Combining IGP Segments 734
Segment Routing Control Plane 735
IS-IS Control Plane 735
OSPFv2 Control Plane 737
BGP Control Plane 739
SRv6 Control Plane 742
SRv6 (Segment Routing over IPv6) Header 742
SRv6 Node Roles 744
SRv6 Micro-Segment SID (uSID) 744
SRv6/MPLS L3 Service Interworking Gateway 745
Co-existence with LDP 746
xxii CCNP SPCOR 350-501 Official Cert Guide

Segment Routing Traffic Engineering 748


Segment Routing Policies 749
SR Policies and Candidate Paths 750
Binding-SID (BSID) 750
Flex-Algo 751
TI-LFA 753
Terms from Remote LFA Technology 754
Classic LFA Limitations 756
PCE-PCC Architecture 757
Exam Preparation Tasks 760
Review All Key Topics 760
Define Key Terms 760
Command Reference to Check Your Memory 760
Review Questions 762
Bibliography 763

Part IV Service Provider Security

Chapter 16 Securing Control Plane 764


“Do I Know This Already?” Quiz 764
Foundation Topics 766
CoPP 768
LPTS 772
Keeping LDP Safe 778
LDP Authentication 778
Label Advertisement Control (Outbound Filtering) 781
Label Acceptance Control (Inbound Filtering) 781
Label Allocation Filtering 783
Keeping BGP Safe 789
BGP Authentication 790
BGP TTL-Security 793
BGP Route Filtering 803
BGP Maximum-prefix 811
BGP Prefix Suppression 812
BGPsec 815
BGP Flowspec 822
Exam Preparation Tasks 830
Review All Key Topics 830
Contents xxiii

Define Key Terms 831


Command Reference to Check Your Memory 831
Review Questions 833
Bibliography 833

Chapter 17 Securing Management Plane 836


“Do I Know This Already?” Quiz 836
Foundation Topics 838
Management Plane Protection Fundamentals 838
Tracebacks 843
AAA and TACACS 846
REST APIs 847
DDoS 849
Exam Preparation Tasks 851
Review All Key Topics 851
Define Key Terms 851
Command Reference to Check Your Memory 851
Review Questions 852
Bibliography 852

Chapter 18 Securing Data Plane 854


“Do I Know This Already?” Quiz 854
Foundation Topics 855
Unicast Reverse Path Forwarding (uRPF) 855
Access Control Lists (ACLs) 865
Remote Triggered Black Hole (RTBH) Filtering 866
Media Access Control Security (MACsec) 872
Exam Preparation Tasks 879
Review All Key Topics 879
Define Key Terms 879
Command Reference to Check Your Memory 879
Review Questions 880
Bibliography 880

Part V Critical Operational Elements

Chapter 19 IPv6 Transitions 882


“Do I Know This Already?” Quiz 882
Foundation Topics 884
Introduction 884
NAT44 884
xxiv CCNP SPCOR 350-501 Official Cert Guide

CGNAT 887
NAT64 888
Stateless NAT64 889
Stateful NAT64 892
DNS64 895
DS-Lite 897
MAP-E 898
MAP-T 899
Exam Preparation Tasks 900
Review All Key Topics 900
Define Key Terms 900
Command Reference to Check Your Memory 900
Review Questions 901
Bibliography 901

Chapter 20 High Availability Designs 904


“Do I Know This Already?” Quiz 904
Foundation Topics 905
NSF 906
IS-IS NSF 907
OSPF NSF 910
NSR 913
BFD 917
Link Aggregation 921
Exam Preparation Tasks 933
Review All Key Topics 933
Define Key Terms 933
Command Reference to Check Your Memory 933
Review Questions 934
Bibliography 935

Chapter 21 Quality of Service 936


“Do I Know This Already?” Quiz 936
Foundation Topics 938
Traffic Classification 940
Traffic Policing 946
Traffic Shaping 958
Contents xxv

Congestion Avoidance 961


Traffic Marking 966
IPv6 Flow Label 971
Exam Preparation Tasks 972
Review All Key Topics 972
Define Key Terms 973
Command Reference to Check Your Memory 973
Review Questions 973
Bibliography 974

Part VI Automation and Orchestration

Chapter 22 Automation and Assurance 976


“Do I Know This Already?” Quiz 976
Foundation Topics 978
REST APIs 978
What Is SOAP? 980
What Is RPC? 981
Model-Driven Programmability 982
Client/Server Model 984
Clients and Servers with NETCONF 985
Understanding Transport Protocols and Data Models 985
NETCONF 988
NETCONF Capabilities 988
Understanding NETCONF Operations 989
YANG 990
gRPC 991
Network Services Orchestrator (NSO) 992
How Does It Work? 993
Benefits 993
NSO Use Cases 994
Network Service Orchestration Tools 995
Secure ZTP 995
Secure ZTP Components 996
Initial Setup 996
How Secure ZTP Works 997
NetFlow/IPFIX 999
xxvi CCNP SPCOR 350-501 Official Cert Guide

Streaming Telemetry 1001


SNMP 1004
SNMPv2c 1005
SNMPv3 1005
Ansible and Terraform 1008
Exam Preparation Tasks 1009
Review All Key Topics 1009
Define Key Terms 1009
Command Reference to Check Your Memory 1009
Review Questions 1010
Bibliography 1010

Part VII Final Preparation

Chapter 23 Final Preparation 1012


Hands-on Activities 1012
Suggested Plan for Final Review and Study 1012
Summary 1013

Chapter 24 CCNP SPCOR (350-501) Exam Updates 1014


The Purpose of This Chapter 1014
About Possible Exam Updates 1015
Impact on You and Your Study Plan 1015
News About the Next Exam Release 1016
Updated Technical Content 1016

Part VIII Appendix

Appendix A Answers to the “Do I Know This Already?” Quizzes and


Review Questions 1018

Index 1032

Online Elements
Appendix B Memory Tables

Appendix C Memory Tables Answer Key

Appendix D Study Planner

Glossary of Key Terms


xxvii

Command Syntax Conventions


The conventions used to present command syntax in this book are the same conventions
used in the IOS Command Reference. The Command Reference describes these conven-
tions as follows:

■ Boldface indicates commands and keywords that are entered literally as shown. In
actual configuration examples and output (not general command syntax), boldface
indicates commands that are manually input by the user (such as a show command).

■ Italic indicates arguments for which you supply actual values.


■ Vertical bars (|) separate alternative, mutually exclusive elements.

■ Square brackets ([ ]) indicate an optional element.

■ Braces ({ }) indicate a required choice.

■ Braces within brackets ([{ }]) indicate a required choice within an optional element.
xxviii CCNP SPCOR 350-501 Official Cert Guide

Preface
I’m not an academic or engineer with a PhD, just an ordinary person like many of you.
Back in 2000, when I lost my job, my college roommate’s brother-in-law handed me a
book on networking (The CCNA Certification Guide). I started my career at the very
bottom, shlepping printers. I worked with various customers for eight years, thinking I
was a pretty smart engineer until I joined Cisco, where smart engineers were as common
as raindrops in a storm. Throughout my career, I’ve been fortunate to work with many
networks, from small to massive, for over a quarter of a century. The insights in this book
come from someone who’s built real networks and learned from clever mentors, mistakes,
and experiences.

While my writing style might not adhere to academic conventions, it remains practical,
mirroring my approach to problem-solving. It offers an opportunity to assess your
problem-solving approach and perhaps discover new perspectives. I aim to help you pass
a particularly challenging exam and impart valuable skills to those who build networks,
not just academics, whom I deeply respect. So, expect my approach to differ from what
you’re used to, with a focus on hands-on, real-world scenarios.

What makes this exam so tough? Having worked across various networking domains, I
find that service provider networks are especially complex compared to their enterprise,
data center, or mobility counterparts. Cisco acknowledges this complexity in its exam
structure. Expect tough questions, and be pleasantly surprised when you encounter the
ones easier than that.

As you prepare, pay close attention to the exam blueprint and how its sections are
worded. Questions deliberately fall into four categories: Describe, Compare, Config-
ure, and Troubleshoot. “Describe” sections assume a solid grasp of general knowledge
and concepts. “Compare” sections probe deeper, expecting candidates to differentiate
between similar topics. “Configure” sections require advanced familiarity to configure
or spot errors accurately. “Troubleshoot” sections demand the highest skill level, testing
your ability to solve complex problems with twists.

What’s my top tip for acing the exam on your first attempt? Practice. I have structured
my portions of the content for you to follow in the book and the command line. In
theory, there is no difference between theory and practice. I can tell you that in practice,
there is. There’s no substitute for hands-on keyboard time in mastering service provider
networks.

Once, at a networking convention, I spotted someone wearing a humorous T-shirt


defining “engineer” as “someone who does precision guesswork based on unreliable data
provided by those of questionable knowledge.” During the exam and throughout your
career, you might feel like that. But remember, you’re not alone. This book is dedicated to
those who’ve tackled the seemingly impossible in the past, those fixing networks along-
side me today, and those learning to do the same in the near future. May some of us meet
and recognize each other.

—Bradley Riapolov
xxix

To add to what Bradley mentioned, we tried our best to add new terms within the book
from brainstorming and use cases to make it more realistic from practical experience and
to assist with some design guidelines for the service provider technologies.

—Mohammad Khalil
xxx CCNP SPCOR 350-501 Official Cert Guide

Introduction
The Implementing and Operating Cisco Service Provider Network Core Technologies
(SPCOR 350-501) exam is the required “core” exam for the CCNP Service Provider certi-
fications. This exam tests your knowledge of implementing core service provider network
technologies including architecture, services, networking, automation, quality of service,
security, and network assurance.

Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR
350-501) is a 120-minute exam.

TIP You can review the exam blueprint from Cisco’s website at https://
learningnetwork.cisco.com/s/spcor-exam-topics.

This book gives you the foundation and covers the topics necessary to start your CCNP
Service Provider or CCIE Service Provider journey.

The CCNP Service Provider Certification


The CCNP Service Provider certification is one of the industry’s most respected
certifications. In order for you to earn the CCNP Service Provider certification, you
must pass two exams: the SPCOR exam covered in this book (which covers core security
technologies) and one of four available service provider concentration exams of your
choice, so you can customize your certification to your technical area of focus.

TIP The SPCOR core exam is also the qualifying exam for the CCIE Service Provider
certification. Passing this exam is the first step toward earning both of these certifications.

The following are the CCNP Service Provider concentration exams:

■ Implementing Cisco Service Provider Advanced Routing Solutions (300-510 SPRI)

■ Implementing Cisco Service Provider VPN Services (300-515 SPVI)

■ Automating Cisco Service Provider Solutions (300-535 SPAUTO)

■ Designing and Implementing Cisco Service Provider Cloud Network Infrastructure


(300-540 SPCNI)

The CCIE Service Provider Certification


The CCIE Service Provider certification is one of the most admired, elite, and challenging
certifications in the industry. The CCIE Service Provider program prepares you to be a
recognized technical leader. In order to earn the CCIE Service Provider certification, you
must pass the SPCOR 350-501 exam and an eight-hour, hands-on lab exam. The lab exam
covers very complex network service provider network scenarios. These scenarios range
from designing through implementing, operating, and optimizing dual-stack solutions
(IPv4 and IPv6) of complex service provider networks.
Introduction xxxi

Cisco considers ideal candidates to be those who possess the following:

■ Extensive hands-on experience with Cisco’s Service Provider portfolio

■ Experience deploying Cisco’s wide assortment of legacy and modern service


provider technologies

■ Deep understanding of multiple transport protocols and multitenant segmentation


solutions

■ Hands-on experience with MPLS networks and VPN solutions

■ Configuring and troubleshooting QoS, mobility networking, device hardening, and


general and access control

■ Deep understanding of network automation and orchestration constructs

The Exam Objectives (Domains)


The Implementing and Operating Cisco Service Provider Network Core Technologies
(SPCOR 350-501) exam is broken down into five major domains. The contents of this
book cover each of the domains and the subtopics included in them, as illustrated in the
following descriptions.

The following table breaks down each of the domains represented in the exam.

Domain Percentage of Representation in Exam


1: Architecture 15%
2: Networking 30%
3: MPLS and Segment Routing 20%
4: Services 20%
5: Automation and Assurance 15%

Total 100%

Here are the details of each domain:

Domain 1: Architecture: This domain is covered in Chapters 1–3, 14, 16–18, and 21.

1.1 Describe service provider architectures


1.1.a Core architectures (Metro Ethernet, MPLS, unified MPLS, SR, SRTE, SRv6)
1.1.b Transport technologies (xDSL, DWDM, DOCSIS, TDM, and xPON)
1.1.c Mobility (packet core, RAN xhaul transport for 5G vRAN and ORAN
transport)
1.1.d Routed optical network
1.2 Describe Cisco network software architecture
1.2.a IOS
1.2.b IOS XE
1.2.c IOS XR
xxxii CCNP SPCOR 350-501 Official Cert Guide

1.3 Describe service provider virtualization


1.3.a NFV infrastructure
1.3.b VNF workloads
1.3.c Containers
1.3.d Application hosting
1.4 Describe QoS architecture
1.4.a MPLS QoS models (Pipe, Short Pipe, and Uniform)
1.4.b MPLS TE QoS (MAM, RDM, CBTS, PBTS, and DS-TE)
1.4.c DiffServ and IntServ QoS models
1.4.d Trust boundaries between enterprise and SP environments
1.4.e IPv6 flow label
1.5 Configure and verify control plane security
1.5.a Control plane protection techniques (LPTS and CoPP)
1.5.b BGP-TTL security and protocol authentication
1.5.c BGP prefix suppression
1.5.d LDP security (authentication and label allocation filtering)
1.5.e BGP sec
1.5.f BGP flowspec
1.6 Describe management plane security
1.6.a Traceback
1.6.b AAA and TACACS
1.6.c RestAPI security
1.6.d DDoS
1.7 Implement data plane security
1.7.a uRPF
1.7.b ACLs
1.7.c RTBH
1.7.d MACsec

Domain 2: Networking: This domain is covered in Chapters 4–8, 19, and 20.

2.1 Implement IS-IS (IPv4 and IPv6)


2.1.a Route advertisement
2.1.b Area addressing
2.1.c Single/Multitopology
2.1.d Metrics
2.2 Implement OSPF (v2 and v3)
2.2.a Neighbor adjacency
2.2.b Route advertisement
Introduction xxxiii

2.2.c Multiarea (addressing and types)


2.2.d Metrics
2.3 Describe BGP path selection algorithm
2.4 Implement BGP (v4 and v6 for IBGP and EBGP)
2.4.a Neighbors
2.4.b Prefix advertisement
2.4.c Address family
2.4.d Path selection
2.4.e Attributes
2.4.f Redistribution
2.4.g Additional Paths
2.4.h PIC
2.5 Implement routing policy language and route maps (BGP, OSPF, IS-IS)
2.6 Troubleshoot routing protocols
2.6.a Neighbor adjacency (BGP, OSPF, IS-IS)
2.6.b Route advertisement (BGP, OSPF, IS-IS)
2.7 Describe IPv6 transition (NAT44, NAT64, CGNAT, MAP-T and DS Lite)
2.8 Implement high availability
2.8.a NSF / graceful restart
2.8.b NSR
2.8.c BFD
2.8.d Link aggregation

Domain 3: MPLS and Segment Routing: This domain is covered in Chapters 10, 14, and 15.

3.1 Implement MPLS


3.1.a LDP sync
3.1.b LDP session protection
3.1.c LDP neighbors
3.1.d Unified MPLS
3.1.e MPLS OAM
3.2 Describe traffic engineering
3.2.a IS-IS and OSPF extensions
3.2.b RSVP functionality
3.2.c FRR
3.3 Describe segment routing
3.3.a Segment types
3.3.b SR control plane (BGP, OSPF, IS-IS)
3.3.c Segment routing traffic engineering
xxxiv CCNP SPCOR 350-501 Official Cert Guide

3.3.d TI-LFa
3.3.e PCE-PCC architectures
3.3.f Flexible algorithm
3.3.g SRv6 (locator, micro-segment, encapsulation, interworking gateway)

Domain 4: Services: This domain is covered in Chapters 9, 11–13, and 21.

4.1 Describe VPN services


4.1.a EVPN
4.1.b Inter-AS VPN
4.1.c CSC
4.1.d mVPN
4.2 Configure L2VPN and Carrier Ethernet
4.2.a Ethernet services (E-Line, E-Tree, E-Access, E-LAN)
4.2.b IEEE 802.1ad, IEEE 802.1ah, and ITU G.8032
4.2.c Ethernet OAM
4.2.d VLAN tag manipulation
4.3 Configure L3VPN
4.3.a Intra-AS VPN
4.3.b Shared services (extranet and Internet)
4.4 Implement multicast services
4.4.a PIM (PIM-SM, PIM-SSM, and PIM-BIDIR, PIMv6)
4.4.b IGMP v1/v2/v3 and MLD
4.5 Implement QoS services
4.5.a Classification and marking
4.5.b Congestion avoidance, traffic policing, and shaping

Domain 5: Automation and Assurance: This domain is covered in Chapter 22.

5.1 Describe the programmable APIs used to include Cisco devices in network
automation
5.2 Interpret an external script to configure a Cisco device using a REST API
5.3 Describe the role of Network Services Orchestration (NSO)
5.4 Describe the high-level principles and benefits of a data modeling language, such as
YANG
5.5 Describe configuration management tools, such as Ansible and Terraform
5.6 Describe Secure ZTP
5.7 Configure dial-in/out, TCP, TLS, and mTLS certificates using gRPC and gNMI
5.8 Configure and verify NetFlow/IPFIX
5.9 Configure and verify NETCONF and RESTCONF
5.10 Configure and verify SNMP (v2c/v3)
Introduction xxxv

Steps to Pass the SPCOR Exam


There are no prerequisites for the SPCOR exam. However, students must have an
understanding of networking and cybersecurity concepts.

Signing Up for the Exam


The steps required to sign up for the Implementing and Operating Cisco Service Provider
Network Core Technologies (SPCOR 350-501) exam:

1. Create a Certiport account at https://www.certiport.com/portal/SSL/Login.aspx.

2. Once you have logged in, make sure that “Test Candidate” from the drop-down
menu is selected.

3. Click the Shop Available Exams button.

4. Select the Schedule exam button under the exam you wish to take.

5. Verify your information and continue throughout the next few screens.

6. On the Enter payment and billing page, click the Add Voucher or Promo Code
button if applicable. Enter the voucher number or promo/discount code in the field
below and click the Apply button.

7. Continue through the next two screens to finish scheduling your exam.

Facts About the Exam


The exam is a computer-based test. The exam consists of multiple-choice questions
only. You must bring a government-issued identification card. No other forms of ID
will be accepted. You can take the exam at a Pearson Vue center or online via the
OnVUE platform. Visit the OnVUE page for your exam program: https://
home.pearsonvue.com/Test-takers/OnVUE-online-proctoring/View-all.aspx

Once there, navigate to the FAQs section of the page, where you’ll find helpful informa-
tion on everything from scheduling your exam to system requirements, testing policies,
and more.

NOTE Refer to the Cisco Certification site at https://cisco.com/go/certifications for more


information regarding this, and other, Cisco certifications.

About the CCNP SPCOR 350-501 Official Cert Guide


This book maps directly to the topic areas of the SPCOR exam and uses a number of
features to help you understand the topics and prepare for the exam.

Objectives and Methods


This book uses several key methodologies to help you discover the exam topics that need
more review, to help you fully understand and remember those details, and to help you
prove to yourself that you have retained your knowledge of those topics. The book does
not try to help you pass the exam only by memorization; it seeks to help you to truly
xxxvi CCNP SPCOR 350-501 Official Cert Guide

learn and understand the topics. This book is designed to help you pass the Implement-
ing and Operating Cisco Service Provider Network Core Technologies (SPCOR 350-501)
exam by using the following methods:

■ Helping you discover which exam topics you have not mastered

■ Providing explanations and information to fill in your knowledge gaps

■ Supplying exercises that enhance your ability to recall and deduce the answers to
test questions

■ Providing practice exercises on the topics and the testing process via test questions
on the companion website

How to Use This Book


To help you customize your study time using this book, the core chapters have several
features that help you make the best use of your time:

■ Foundation Topics: These are the core sections of each chapter. They explain the
concepts for the topics in that chapter.

■ Brainstorming: These encourage you to actively apply their knowledge. You are
invited to take a step beyond mere fact retrieval and engage deeply with the mate-
rial you’ve covered. This is your opportunity to think critically about what you’ve
learned and attempt to apply it on your own. Most of the time, we guide you
through the process, but these exercises are designed to help you assess an exam
question and provide an educated, well-reasoned answer. By participating in these
sessions, you’ll develop the skills to approach challenges with confidence and creativ-
ity, ensuring you’re prepared to succeed independently.

■ Exam Preparation Tasks: After the “Foundation Topics” section of each chapter, the
“Exam Preparation Tasks” section lists a series of study activities that you should do
at the end of the chapter:

■ Review All Key Topics: The Key Topic icon appears next to the most important
items in the “Foundation Topics” section of the chapter. The Review All Key
Topics activity lists the key topics from the chapter, along with their page
numbers. Although the contents of the entire chapter could be on the exam, you
should definitely know the information listed in each key topic, so you should
review these.

■ Define Key Terms: Although the Implementing and Operating Cisco Service
Provider Network Core Technologies (SPCOR 350-501) exam may be unlikely to
ask a question such as “Define this term,” the exam does require that you learn
and know a lot of cybersecurity terminology. This section lists the most impor-
tant terms from the chapter, asking you to write a short definition and compare
your answer to the glossary at the end of the book.
Introduction xxxvii

■ Review Questions: Confirm that you understand the content you just covered by
answering these questions and reading the answer explanations in Appendix A.

■ Web-based practice exam: The companion website includes the Pearson Cert
Practice Test engine, which allows you to take practice exam questions. Use it to
prepare with a sample exam and to pinpoint topics where you need more study.

How This Book Is Organized


This book contains 22 core chapters—Chapters 1 through 22. Chapter 23 includes prepa-
ration tips and suggestions for how to approach the exam. Each core chapter covers a
subset of the topics on the Implementing and Operating Cisco Service Provider Network
Core Technologies (SPCOR 350-501) exam. The core chapters map to the SPCOR topic
areas and cover the concepts and technologies you will encounter on the exam.

The Companion Website for Online Content Review


All the electronic review elements, as well as other electronic components of the book,
exist on this book’s companion website.

To access the companion website, which gives you access to the electronic content that
accompanies this book, start by establishing a login at www.ciscopress.com and register-
ing your book by December 31, 2027. To do so, simply go to www.ciscopress.com/
register and enter the ISBN of the print book: 9780135324806. After you have registered
your book, go to your account page and click the Registered Products tab. From there,
click the Access Bonus Content link to get access to the book’s companion website.

Note that if you buy the Premium Edition eBook and Practice Test version of this book
from Cisco Press, your book will automatically be registered on your account page.
Simply go to your account page, click the Registered Products tab, and select Access
Bonus Content to access the book’s companion website.

Please note that many of our companion content files can be very large, especially image
and video files.

If you are unable to locate the files for this title by following these steps, please visit
www.pearsonITcertification.com/contact and select the Site Problems/Comments option.
Our customer service representatives will assist you.

How to Access the Pearson Test Prep (PTP) App


You have two options for installing and using the Pearson Test Prep application: a web
app and a desktop app. To use the Pearson Test Prep application, start by accessing the
registration code that comes with the book. You can access the code in these ways:

■ You can get your access code by registering the print ISBN 9780135324806 on
https://www.ciscopress.com/register. Make sure to use the print book ISBN, regard-
less of whether you purchased an eBook or the print book. After you register the
book, your access code will be populated on your account page under the Registered
Products tab. Instructions for how to redeem the code are available on the book’s
companion website by clicking the Access Bonus Content link.
xxxviii CCNP SPCOR 350-501 Official Cert Guide

■ If you purchase the Premium Edition eBook and Practice Test directly from the
Pearson IT Certification website, the code will be populated on your account page
after purchase. Just log in at https://www.ciscopress.com, click Account to see
details of your account, and click the Digital Purchases tab.

NOTE After you register your book, your code can always be found in your account
under the Registered Products tab.

Once you have the access code, to find instructions about both the PTP web app and the
desktop app, follow these steps:
Step 1. Open this book’s companion website, as was shown earlier in this
Introduction under the heading “The Companion Website for Online Content
Review.”

Step 2. Click the Practice Exams button.

Step 3. Follow the instructions listed there both for installing the desktop app and for
using the web app.

Note that if you want to use the web app only at this point, just navigate to
www.pearsontestprep.com, establish a free login if you do not already have one, and
register this book’s practice tests using the registration code you just found. The process
should take only a couple of minutes.

Customizing Your Exams


Once you are in the exam settings screen, you can choose to take exams in one of three
modes:

■ Study mode: Allows you to fully customize your exams and review answers as you
are taking the exam. This is typically the mode you would use first to assess your
knowledge and identify information gaps.

■ Practice Exam mode: Locks certain customization options, as it is presenting a


realistic exam experience. Use this mode when you are preparing to test your exam
readiness.

■ Flash Card mode: Strips out the answers and presents you with only the question
stem. This mode is great for late-stage preparation when you really want to challenge
yourself to provide answers without the benefit of seeing multiple-choice options.
This mode does not provide the detailed score reports that the other two modes do,
so you should not use it if you are trying to identify knowledge gaps.

In addition to these three modes, you will be able to select the source of your questions.
You can choose to take exams that cover all of the chapters or you can narrow your
selection to just a single chapter or the chapters that make up specific parts in the book.
All chapters are selected by default. If you want to narrow your focus to individual
Introduction xxxix

chapters, simply deselect all the chapters and then select only those on which you wish
to focus in the Objectives area.

You can also select the exam banks on which to focus. Each exam bank comes complete
with a full exam of questions that cover topics in every chapter. The two exams printed
in the book are available to you as well as two additional exams of unique questions.
You can have the test engine serve up exams from all four banks or just from one
individual bank by selecting the desired banks in the exam bank area.

There are several other customizations you can make to your exam from the exam set-
tings screen, such as the time of the exam, the number of questions served up, whether
to randomize questions and answers, whether to show the number of correct answers for
multiple-answer questions, and whether to serve up only specific types of questions. You
can also create custom test banks by selecting only questions that you have marked or
questions on which you have added notes.

Updating Your Exams


If you are using the online version of the Pearson Test Prep software, you should always
have access to the latest version of the software as well as the exam data. If you are using
the Windows desktop version, every time you launch the software while connected
to the Internet, it checks if there are any updates to your exam data and automatically
downloads any changes that were made since the last time you used the software.

Sometimes, due to many factors, the exam data may not fully download when you
activate your exam. If you find that figures or exhibits are missing, you may need to
manually update your exams. To update a particular exam you have already activated and
downloaded, simply click the Tools tab and click the Update Products button. Again,
this is only an issue with the desktop Windows application.

If you wish to check for updates to the Pearson Test Prep exam engine software,
Windows desktop version, simply click the Tools tab and click the Update Application
button. This ensures that you are running the latest version of the software engine.

Figure Credits
Figure 1-15 © ITU 2024

Figure 7-2, baranoski.ca

Figures 17-1 and 17-2 © 2024 Postman, Inc.

Cover, insta_photos/shutterstock
CHAPTER 15

Segment Routing

This chapter covers the following exam topics:


3.3 Describe segment routing
■ 3.3.a Segment types
■ 3.3.b SR control plane (BGP, OSPF, IS-IS)
■ 3.3.c Segment routing traffic engineering
■ 3.3.d TI-LFA
■ 3.3.e PCE-PCC architectures
■ 3.3.f Flexible algorithm
■ 3.3.g SRv6 (locator, micro-segment, encapsulation, interworking gateway)

Segment Routing represents a cutting-edge technology designed to enhance and optimize


the use of MPLS-based and IPv6 networks. This innovative approach introduces a suite of
tools and concepts that not only simplify network operations but also significantly enhance
the flexibility available to network operators. By allowing for more granular control over
packet paths, Segment Routing empowers network operators to efficiently navigate the
intricacies of modern networks, adapt to dynamic requirements, and minimize the challenges
associated with traditional MPLS-based architectures.
In essence, Segment Routing is a beacon of progress in the networking realm, offering a
robust set of solutions to meet the most demanding network requirements. Its advent marks
a transformative shift in how networks are managed, providing operators with a versatile
toolkit to navigate the complexities of traffic engineering, and ensuring that networks can
dynamically respond to changing conditions in real time. By simplifying the routing para-
digm and enhancing the scalability of MPLS-based networks, Segment Routing emerges
as a pivotal technology, poised to play a crucial role in the evolution of modern network
architectures.

“Do I Know This Already?” Quiz


The “Do I Know This Already?” quiz allows you to assess whether you should read this
entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in
doubt about your answers to these questions or your own assessment of your knowledge
of the topics, read the entire chapter. Table 15-1 lists the major headings in this chapter and
their corresponding “Do I Know This Already?” quiz questions. You can find the answers in
Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes and Review Questions.”
Table 15-1 “Do I Know This Already?” Section-to-Question Mapping
Foundation Topics Section Questions
Segment Types 1–2
Segment Routing Control Plane 3–4
Segment Routing Traffic Engineering 5–8
PCE-PCC Architecture 9–10

CAUTION The goal of self-assessment is to gauge your mastery of the topics in this chap-
ter. If you do not know the answer to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the self-assessment. Giving yourself
credit for an answer you correctly guess skews your self-assessment results and might pro-
vide you with a false sense of security.

1. Which of the following are viable options for assigning SRGB ranges? (Select all that
apply.)
a. Globally
b. Per IGP
c. Dynamically
d. Statically
2. Which labels cannot be a part of SRGB? (Select all that apply.)
a. 15999
b. 16000
c. 24999
d. 1,048,576
3. Which TLVs play an important role in Segment Routing? (Select all that apply.)
a. 22
b. 41
c. 135
d. 163
4. Which of the following is not an option for the SR Control Plane?
a. RSVP-TE
b. IS-IS
c. OSPF
d. BGP
5. Which of the following is not a viable option to supply SR policy to the ingress
router?
a. NETCONF
b. FIB
726 CCNP SPCOR 350-501 Official Cert Guide

c. CLI
d. PCEP
6. Which behavior properly describes an SR policy?
a. An SR policy uses Network Service Orchestrator (NSO) to program its data plane.
b. SR-PCE will use BGP-LS to program an SR policy into the ingress node.
c. An SR policy encodes the list of constraints into the MPLS headers.
d. An SR policy will use BSID entries to program its forwarding table.
7. Which of the following describes TI-LFA functionality? (Select all that apply.)
a. TI-LFA must rely on LDP functionality to provide double-segment protection.
b. TI-LFA uses next-hop neighbor as the point of local repair.
c. TI-LFA preprograms the post-convergence path into a router’s data plane.
d. TI-LFA can use P space to calculate the post-convergence path.
8. Viable repair tunnel endpoints are found at which intersections?
a. At midpoints of extended spaces
b. At the intersection of point of local repair and double segments
c. At the intersection of PQ nodes
d. At the intersection of P and Q spaces
9. Which component serves the needs of long-term network engineering and capacity
planning?
a. Crosswork Network Controller
b. Crosswork Optimization Engine
c. WAN Automation Engine
d. Crosswork Cloud
10. Which of the following protocols are used by PCEP to calculate network paths?
(Select all that apply.)
a. IS-IS
b. BGP-LS
c. RSVP-TE
d. OSPF

Foundation Topics
Over time, a skilled engineer learns to make the most of the available resources. Over the
past three decades, various strategies have been explored to maximize the potential of com-
puter networks. The traditional approach to steering network traffic has been to manipulate
the Interior Gateway Protocol (IGP) and rely solely on destination-based routing strategies.
This only provided a restricted range of options for directing traffic within the network. The
main limitation of using IGP metrics has been the “all or nothing” approach. Some of the
links inevitably become congested while other links remain underutilized even though they
are high bandwidth or low latency. IGP metrics simply lack optimization capabilities because
they do not allow you to map different services to different paths. Despite years of featured
improvements, such challenges persist and remain unsolvable with conventional IGP manipu-
lations and destination-based routing strategies.
Chapter 15: Segment Routing 727

Thus, in the 1990s, the development of the Label Distribution Protocol (LDP) and
Resource Reservation Protocol with Traffic Engineering extensions (RSVP-TE) marked a sig-
nificant advancement in networking. These capable adjunct protocols effectively addressed
specific challenges and provided network operators with crucial Traffic Engineering tools to
overcome a wide variety of traffic-steering issues. Network operators could now manipulate
how traffic flowed through the network to make the most of the available paths. Never-
theless, while providing network optimization, these protocols also introduced intricate
challenges.
In the case of LDP, an additional process had to be created and maintained on the network,
which led to a complex interaction with the Interior Gateway Protocol. LDP-IGP synchroni-
zation problems would cause traffic disruptions until these two protocols could settle on an
agreement regarding the best way to forward traffic.
When dealing with RSVP-TE, reserving bandwidth accurately involves placing traffic within
RSVP-TE tunnels. While this approach is feasible in smaller networks with minimal traffic 15
engineering needs, it becomes exceedingly intricate on a larger scale. Managing hundreds of
tunnels, their backup paths, and upkeep of a pertinent set of rules in the face of a dynami-
cally evolving network posed formidable challenges, demanding considerable time and
effort. Such scaling issues led many operators to limit their RSVP-TE deployments to the fast
reroute (FRR) use cases. RSVP-TE is also not “ECMP-friendly,” so it can never use all IGP-
derived paths, forcing the operator to create more tunnels. An additional aspect to consider
is that RSVP-TE generates a persistent “always-on” network state where every router must
account for available bandwidth and that state must be constantly monitored. This incurs a
cost in terms of network compute resources and the hardware required to sustain this con-
tinuous state irrespective of whether the network experiences congestion or not.
Could network optimization be further improved? These were the experiences and thoughts
of the designers behind Segment Routing. They proposed that a properly designed network
should have enough capacity to effectively handle an expected volume of traffic without
congestion, even in the presence of a probable set of independent failures. IGP coupled with
ECMP can competently absorb the majority of the traffic volume. In less frequent instances
of congestion, traffic engineering tools would address applications intolerant of such net-
work bottlenecks. This represented a simpler and more resource-efficient approach, both in
terms of hardware and human efforts.
They proposed that it is better to distribute labels associated with IGP-signaled prefixes
within the IGP framework itself, rather than relying on a separate protocol such as LDP to
perform this task. This would solve the LDP-IGP synchronization problem during network
failures because there now would be a single source of truth (IGP) to find available network
paths. The network would precalculate such paths even before the failure occurred. IGP can
have such “preknowledge”—think of an EIGRP-feasible successor—which is aware of the
best available network route even before the failure occurs.
Second, why not give the network operator the power to direct any packet to any path at
the ingress router only (where the packet enters the network), without having to maintain the
expensive and complex “always-on” state throughout the entire network domain? This would
lower control plane pressure, conserve network resources, and give the operator the full flex-
ibility to force any packet anywhere.
728 CCNP SPCOR 350-501 Official Cert Guide

Cisco engineers formulated the Segment Routing concept, obtained approval from their
management in 2012, presented the idea to IETF in March 2013, authored numerous IETF
drafts, and significantly influenced the industry in 2015 with the introduction of Segment
Routing on IOS XR platforms (IOS and NX-OS carry some of the SR features). The mar-
ket positively responded with other vendors supporting this capable technology. It is also
referred to as Source Routing outside of Cisco. As of the present moment, Cisco alone has
documented more than 1200 operational Segment Routing production deployments.
Segment Routing can be deployed on two data planes:

■ MPLS data plane where segments will be encoded with MPLS labels.

■ IPv6 data plane where segments will be encoded with IPv6 addresses.

Segment Types
Think of segments as a set of instructions. In Segment Routing, a source (an ingress router,
as an example) chooses a certain path through the network and encodes the path in the
packet header as an ordered list of instructions. These instructions are termed segments
because they describe components of a divided whole.
In SR-MPLS (Segment Routing based on MPLS data plane), such an identifier refers
to an ordered list of segments represented by a stack of MPLS labels. When you instruct
routers to follow these labels in a given sequence, the packets will take this path through the
network. In SRv6 (Segment Routing based on IPv6 data plane), it refers to an ordered
list of segments encoded into a routing extension header. When you instruct routers to fol-
low this list, the packets will flow via this path. In Figure 15-1, assigning such identifiers to
routers can provide instructions for a specific path to send packets.

Service Provider

16002 16004 16006

PE2 P4 PE6

CE1 CE8

16003 16005 16007

PE3 P5 PE7

Figure 15-1 Assigning Segments to Network

Global Segments
Every router in a Segment Routing, or SR, domain understands such instruction and installs it
in its forwarding table. This instruction is a domain-wide (watch the misleading name global
because it is not known globally around the world) unique label value (a numerical number)
that comes from the Segment Routing Global Block (SRGB) database. Table 15-2 shows
how the Label Switching Database (LSD) carves the following default ranges (some can
be changed) on Cisco routers running Segment Routing–capable software.
Chapter 15: Segment Routing 729

Table 15-2 LSD Label Ranges


Label Range Reserved for Examples
0–15 Base special-purpose MPLS 0—IPv4 Explicit NULL
labels 3—Implicit NULL
16–15,999 Static MPLS labels LDP assigned
16,000–23,999 SRGB Global Segments (i.e., SR)
24,000–1,048,575 Dynamic allocation Adjacency Segments

In Figure 15-1, every node in the domain knows that label 16002 always and uniquely rep-
resents Router PE2, 16003 always represents Router PE3, and so on. These are referred to as
Node SIDs (Segment Identifiers).
A Node SID is a type of Prefix SID, as it represents any prefix linked to a node. To send a
set of segment routing instructions is to specify these labels (Node SIDs); 16002, 16003 15
literally means “send this traffic via shortest ECMP path to PE2, then same to PE3.” If the
“uniqueness” rule is broken (two distinct routers are assigned the same label value), there will
be an issue on your network because the nodes will not be able to accurately determine the
appropriate path for routing traffic. (Technically, what happens is that IS-IS will prioritize the
“first programmed” label and ignore the “second” one. This can get complex as to what “first
programmed” means, as in when a router reboots or has failed, which router becomes “first
programmed”? OSPF, on the other hand, will withdraw both SIDs. Don’t worry about this
because this topic is highly unlikely to show up on the exam, but good to know.)
Global Segments are always distributed as a unique value via IGP (remember that SR no
longer relies on LDP as the label distribution mechanism). This value must be unique and
comes from a combination of a label range (SRGB) + index. The default SRGB range for
Cisco routers is 16000–23999 (notice how it does not overlap with the LDP range) and the
index is zero based (the first index = 0). In our scenario, we start adding index values to our
routers (index 2 for PE2, index 3 for PE3), so we will come up with globally known unique
values of 16002 and 16003 for these routers. Cisco gives an option to also define these as an
absolute value. There is no difference in daily operations whether absolute or relative indexes
are used.
There are two minimum requirements to enable Segment Routing:

■ Configure the Segment Routing Global Block (SRGB)

■ Enable Segment Routing and Node SID in the IGP (shown later in the chapter under
respective protocols)

Example 15-1 demonstrates SRGB assignment on both IOS XE as well as IOS XR operating
systems.
Example 15-1 SRGB Verification on IOS XE and IOS XR

IOS
PE2# show running-config segment routing
!
730 CCNP SPCOR 350-501 Official Cert Guide

segment-routing
global-block 16000 23999
!
PE2#

IOS XR
RP/0/0/CPU0:PE4# show running-config segment-routing
!
segment-routing
global-block 16000 23999
!
RP/0/0/CPU0:PE4#

When you’re configuring an SRGB block, the recommendation is to configure it globally


(again misleading, in the global, i.e., router-wide configuration), not per individual IGP; this
way, all IGP instances as well as BGP can use the global (i.e., router-wide) SRGB. This is
important because, later on, if you choose to add another protocol and the SRGB range has
to change, you will have to reload the router. To avoid this, it is better to assign the SRGB
block globally in the router so that multiple protocols (including BGP) can use it, not just a
specific IGP. You should have a homogenous SRGB block (same SRGB range) on all routers
on the network. If you do not, you will have fun times building end-to-end LSPs.

Local Segments
This instruction is allocated and understood by the originating node. It is locally significant
only (which aligns with the intended meaning regarding the local router). A locally allocated
MPLS label would be a good example of a local segment. Sometimes a router has more
than a single link for forwarding traffic. The operator can prefer one of these paths over
the other. In Figure 15-2, a packet arrives at PE3 (via label 16003). PE3 intends to send this
packet to PE6, and there are two shortest available paths—through P4 and P5. These links
are identified with local labels 24100 and 24150. Selecting one of them will instruct the
local router to pick the appropriate link.

Service Provider

PE2 P4 PE6

CE1 CE8
00
16003
241

24150
PE3 P5 PE7

Figure 15-2 Assigning Local Segments to Network


Chapter 15: Segment Routing 731

IGP Segments
Segments construct a path through a network. There are two building blocks distributed by
IGP: Prefix Segments and Adjacency Segments.

IGP Prefix Segments


Think of an IGP Prefix Segment as a shortest path to the IGP prefix. Note that it is

■ Known as Prefix-SID

■ Associated with an IP prefix

■ Represents an ECMP (Equal Cost Multi-Path)-aware shortest path to a prefix

■ Likely a multihop path

■ A Global Segment—known uniquely on the SR domain


15
■ A Label (16000 + Index) that is advertised as an index

■ Distributed via IGP (ISIS/OSPF)

Observe this behavior in Figure 15-3 (note that we removed two links to better illustrate our
example), where different routers are used to forward traffic to P5 based on label 16005,
destined to the loopback address of 10.1.100.5. For this Segment Routing domain, PE3,
P4, PE6, and PE7 send traffic directly to P5 because when these routers look at the MPLS
forwarding table, label 16005 will be associated with the one interface directly connecting
to P5. The only exception is PE2 which will have two equal paths available due to ECMP.
How did all the routers learn that prefix 10.1.100.5/32 is associated with label 16005? R5 has
generated this value from the combination of the SRGB label base 16000, added its operator
assigned index +5, and advertised this label via IGP.

Service Provider

PE2 P4 PE6
16005 05
0
16005

16

CE1 CE8

16005
16005 16005

PE3 P5 PE7
10.1.100.5/32

Figure 15-3 IGP Prefix Segment Behavior


I need to point something out here. Technically, there is a difference between a Node SID
(which we just showed you) and a Prefix SID. A Node SID points to a router that can be a
visiting point on the network. A Prefix SID is a label for a network prefix that is advertised
by a router. This causes a point of confusion at times. Note that a special N flag is set to
indicate that a SID represents a router (node) on the network. This is advanced and is unlikely
732 CCNP SPCOR 350-501 Official Cert Guide

to show up on the exam, but we include Example 15-2 to clear up any confusion regarding
the difference.
Example 15-2 Node SID and the N Flag

RP/0/0/CPU0:R2# show isis database R1.00-00 detail verbose


Thu May 9 13:03:44.757 UTC
IS-IS lab (Level-1) Link State Database
LSPID LSP Seq Num LSP Checksum LSP Holdtime/Rcvd ATT/P/OL
The requested LSP R1.00-00 was not found in the IS-IS lab Level-1 LSP Database
IS-IS lab (Level-2) Link State Database
LSPID LSP Seq Num LSP Checksum LSP Holdtime/Rcvd ATT/P/OL
R1.00-00 0x00000007 0xf6b7 1108 /1199 0/0/0
Area Address: 49.0001
NLPID: 0xcc
NLPID: 0x8e
IP Address: 1.1.1.1
Metric: 10 IP-Extended 10.1.12.0/24
Prefix Attribute Flags: X:0 R:0 N:0
Metric: 10 IP-Extended 10.1.13.0/24
Prefix Attribute Flags: X:0 R:0 N:0
Metric: 0 IP-Extended 1.1.1.1/32
Prefix-SID Index: 1, Algorithm:0, R:0 N:1 P:0 E:0 V:0 L:0
Prefix Attribute Flags: X:0 R:0 N:1
Hostname: R1
IPv6 Address: 2001:1:1:1::1
Metric: 10 MT (IPv6 Unicast) IPv6 2001:10:1:12::/64
Prefix Attribute Flags: X:0 R:0 N:0
Metric: 10 MT (IPv6 Unicast) IPv6 2001:10:1:13::/64
Prefix Attribute Flags: X:0 R:0 N:0
Metric: 0 MT (IPv6 Unicast) IPv6 2001:1:1:1::1/128
Prefix-SID Index: 1001, Algorithm:0, R:0 N:1 P:0 E:0 V:0 L:0
Prefix Attribute Flags: X:0 R:0 N:1
MT: Standard (IPv4 Unicast)
MT: IPv6 Unicast 0/0/0
Metric: 10 IS-Extended R2.07
Interface IP Address: 10.1.12.1
Link Maximum SID Depth:
Label Imposition: 10
LAN-ADJ-SID: F:0 B:0 V:1 L:1 S:0 P:0 weight:0 Adjacency-sid: 24001 System ID:R2
Metric: 10 MT (IPv6 Unicast) IS-Extended R2.07
Interface IPv6 Address: 2001:10:1:12::1
Link Maximum SID Depth:
Label Imposition: 10
LAN-ADJ-SID: F:1 B:0 V:1 L:1 S:0 P:0 weight:0 Adjacency-sid: 24003 System ID:R2
Router Cap: 1.1.1.1 D:0 S:0
Chapter 15: Segment Routing 733

Segment Routing: I:1 V:1, SRGB Base: 16000 Range: 8000


SR Local Block: Base: 15000 Range: 1000
SR Algorithm:
Algorithm: 0
Algorithm: 1
Node Maximum SID Depth:
Label Imposition: 10
RP/0/0/CPU0:R2#

This example from IS-IS shows the R2 is receiving SR information from R1, which has IPv4
(1.1.1.1/32) and IPv6 (2001:1:1:1::1/128) prefixes advertised with the N (Node) flag set to 1—a
Node SID, not a Prefix SID.

IGP Adjacency Segment


15
An IGP Adjacency Segment is an identifier that describes a particular link between two
routers. It is used to direct traffic over a specific link within the IGP routing domain. Routers
can be given an instruction to forward based on the IGP adjacency. Note that adjacency
segment is

■ Known as Adj-SID

■ Represents a hop over a specific link between two IGP-speaking routers

■ Likely a one-hop path

■ A Local Segment—significant only on a particular router

■ Advertised as a label value

■ Distributed via IGP (ISIS/OSPF)

Figure 15-4 illustrates this. Now, the packet has arrived at P5 and needs to travel further to
PE6 (10.1.100.6). The operator has a choice to impose a local decision on P5 on which links
to use—the direct link to PE6 or two-hop link via PE7. In this case, the link to PE7 is pre-
ferred (higher bandwidth, lower latency, encryption—take your pick), and label 24150 steers
the traffic toward PE7.

Service Provider

PE2 P4 PE6
E

CE1 0
10
CE8
24
24150

PE3 P5 PE7

Figure 15-4 IGP Prefix Segment Behavior with Adjacency Segments


734 CCNP SPCOR 350-501 Official Cert Guide

Combining IGP Segments


By combining segment IDs, you can groom traffic on any path in the network:

1. Specify the sequential list of segment IDs in the packet header, known as a label stack
with the top label being read first.
2. Path is not signaled, and per flow state is not created (as in RSVP-TE).
3. A single protocol (IS-IS, OSPF, BGP) distributes this instruction.
In Figure 15-5, a network operator instructs PE2 to steer traffic to PE6 by sending it to P5
first via two available ECMP paths. Once P5 gets the packet, the top label 16005 is removed,
and P5 uses the direct link to PE6 by looking up this interface in the forwarding table where
it is associated with the dynamic adjacency label 24100.

16005
24100 Service Provider
Packet to 10.1.100.5/32
PE6
PE2 P4 PE6

CE1 CE8
24100
Packet to
PE6

PE3 P5 PE7

Figure 15-5 Combining IGP Segment IDs for Traffic Steering


By combining segment IDs (Prefix-SID and Adj-SID) in this way, you can put a packet on any
path through the network, no matter how complex or unnatural this path may be. That is the
power and essence of Segment Routing. At each hop, the top segment identifies the next
hop. Segment IDs are stacked in sequential order at the top of the packet header. When the
top segment ID contains the identity of another router, the receiving node uses equal cost
multipaths (ECMP) to move the packet to the next hop. When the identity is the receiving
router itself, the router will pop the top segment and perform the task required by the next
segment.

NOTE Please note that I (Brad) am simplifying the mechanics of Segment Routing to its
basic elements to facilitate a clear understanding of the fundamental concepts. In practice,
multiple labels may be used, including transport labels and service labels that carry L3VPN
traffic along with traffic engineering. Additionally, the number of labels a platform can
handle depends on its hardware capabilities. Generally, Segment Routing can accommodate
multiple labels in the label-switched path (LSP), with some platforms supporting up to 6, 9,
or even 12 labels. However, most networks do not typically construct such elaborate paths,
although it is possible and some customers have implemented them. Figure 15-6 shows a
simple example of a label stack where PE2 assigns the inner service label 24192 for VPN
traffic between CE1 and CE8. Labels are disposed along the way with PE6 associating this
VPN label with the connection to CE8.
Chapter 15: Segment Routing 735

16005
24100 Service Provider
24192 24192
Pac
PE2 P4 PE6 ket t
CE8 o

CE1 CE8
24100
24192

PE3 P5 PE7

Figure 15-6 Label Stack Example


15
Segment Routing Control Plane
The control plane in Segment Routing (SR) plays a crucial role in managing how segment ID
information is shared among network devices. Link-state Interior Gateway Protocol mecha-
nisms distribute segment IDs on Segment Routing networks. Both OSPF and IS-IS include
protocol extensions to support the distribution of segment IDs. These extensions enable
routers to maintain a comprehensive database containing information about all nodes and
adjacency segments. Because IGPs are now responsible for distributing segment IDs, and
labels in the case of the MPLS data plane, there’s no need for a separate label distribution
protocol, as mentioned earlier. Our control plane has become far simpler because it is work-
ing with only one source of truth—IGP—instead of having to reconcile both IGP and LDP
information during failure events. It is important to note that the Segment Routing control
plane can be applied to both MPLS and IPv6 data planes. In Cisco’s documentation, this is
referred to as SR-MPLS and SRv6, the former running on MPLS labels and the latter on IPv6
routing. Let’s start by examining SR-MPLS and learn the details behind protocols that pro-
vide this unified well-organized improvement.

IS-IS Control Plane


The IS-IS control plane disseminates Segment Routing information within an autonomous
system. Because LDP is not necessary, IS-IS will distribute both the prefixes and labels in
the extensions built into IS-IS itself. This allows for seamless deployment of Segment Rout-
ing in existing MPLS networks. Rather than modifying the protocol itself, the designers
“extended” its use by providing these additional protocol add-ons to carry information not
originally intended by protocol designers. Think of a train of railway cars where the locomo-
tive does not know the load being carried inside each car it is pulling. This way, new func-
tionalities can be added to the protocol by adding new TLVs. IS-IS works exactly this way,
because it understands how to transport such values for the use of Segment Routing. It uses
Type-Length-Value (TLV) triplets along with sub-TVLs to encapsulate various information in
its advertisements. It can support both IPv4 and IPv6 control planes and extends its reach to
level-1, level-2, and multilevel routing. It is capable of providing MPLS penultimate hop pop-
ping (PHP) and explicit-null signaling as well. Several RFCs, including RFC 8667 and RFC
8402, describe the process of how Prefix-SID and Adj-SID are carried in sub-TLVs in great
detail. Figure 15-7 shows the format of the Prefix-SID sub-TLV.
736 CCNP SPCOR 350-501 Official Cert Guide

0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

Type Length Flags Algorithm

SID/Index/Label (Variable)

Figure 15-7 IS-IS Prefix-SID Format


Table 15-3 shows the most significant TLVs you should be able to recognize on the exam.

Table 15-3 IS-IS TLVs


TLV Name Description Reference
2 IIS Neighbors Shows all running interfaces to which IS-IS is ISO 10589
connected, has a maximum metric of 6 with only 6
out of 8 bits used.
10 Authentication The information is used to authenticate IS-IS PDUs. ISO 10589
22 Extended IS Increases the maximum metric to 3 bytes (24 bits), RFC 5305
Reachability addressing TLV 2 metric limitation.
134 TE Router ID MPLS Traffic Engineering router ID. RFC 5305
135 Extended IP Provides a 32-bit metric with an “up/down” bit for RFC 5305
Reachability the route-leaking of L2 Ð L1.
149 Segment Advertises prefixes to SID/Label mappings. This RFC 8867
Identifier/Label functionality is called the Segment Routing Mapping
Binding Server (SRMS).
222 MT-ISN Allows for multiple-topology adjacencies. RFC 5120
236 IPv6 Describes network reachability through the RFC 5308
Reachability specification of a routing prefix.
242 IS-IS Router Allows a router to announce its capabilities within an RFC 7981
CAPABILITY IS-IS level or the entire routing domain.

IS-IS allocates the SRGB along with the Adjacency-SIDs and advertises both in IS-IS for
the enabled address-families. IS-IS enables MPLS forwarding for all non-passive interfaces.
Example 15-3 shows commands necessary to turn on Segment Routing in IS-IS.
Example 15-3 Commands to Turn on Segment Routing in IS-IS

IOS XR
RP/0/0/CPU0:PE4# show running-config router isis
router isis CCNP
set-overload-bit on-startup 300
is-type level-2-only
net 49.0001.0000.0000.0004.00
distribute link-state
nsf ietf
Chapter 15: Segment Routing 737

log adjacency changes


lsp-gen-interval maximum-wait 10000 initial-wait 20 secondary-wait 200 level 2
lsp-refresh-interval 65000
max-lsp-lifetime 65535
address-family ipv4 unicast
metric-style wide
metric 100 level 2
microloop avoidance
mpls traffic-eng level-2-only
mpls traffic-eng router-id Loopback0
spf-interval maximum-wait 2000 initial-wait 50 secondary-wait 200
router-id Loopback0
segment-routing mpls
! 15
address-family ipv6 unicast
metric-style wide
spf-interval maximum-wait 2000 initial-wait 50 secondary-wait 200
!
interface Loopback0
passive
address-family ipv4 unicast
prefix-sid index 4
!
!
mpls traffic-eng
RP/0/0/CPU0:PE4#

OSPFv2 Control Plane


Much like in IS-IS, OSPF does not rely on LDP to transmit prefix label information. It uses
protocol extensions to distribute Segment Routing labels in the OSPFv2 control plane.
OSPF relies on fixed-length link-state advertisements (LSAs) for its fundamental operations.
Later, Opaque LSAs were introduced to expand to new protocol capabilities, accommodat-
ing features like Segment Routing and Traffic Engineering. These advertisements are flooded
to OSPF neighbors opaquely, implying that even if a transit router lacks comprehension of
this information (perhaps due to running older software), it will nonetheless indiscriminately
transmit it to its neighboring routers. Multi-area functionality is supported, host loopback
prefixes are advertised as IPv4 Prefix Segment IDs (Prefix-SIDs), and Adjacency Segment IDs
(Adj-SIDs) are used for adjacencies. MPLS penultimate hop popping (PHP) and explicit-null
signaling are also supported.
Note the format of Opaque LSAs in Figure 15-8.
738 CCNP SPCOR 350-501 Official Cert Guide

0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

LS age Options 9, 10, or 11

Opaque Type Opaque ID

Advertising Router

LS Sequence Number

LS Checksum Length

Opaque Information

Figure 15-8 Opaque LSA Format


Opaque LSA types are identified by the topology flooding scope in Table 15-4. The most
known of these (when it comes to Segment Routing) is type 10 LSAs, which distribute Traf-
fic Engineering (TE) link attributes. It is often referred to as the TE LSA, yet it has other
applications as well.

Table 15-4 OSPF Opaque LSAs


LSA type LSA Scope Topology Flooding Scope Reference
9 Link-local Local network only RFC 5250
10 Area-local Only within an area RFC 5250
11 Autonomous Domain-wide, same as AS-External type-5 LSAs RFC 5250
System

Similar to IS-IS, OSPF will allocate and advertise the SRGB to its neighbors. It activates
MPLS forwarding on all OSPF interfaces, excluding loopback interfaces, and assigns Adja-
cency-SIDs to these interfaces. Example 15-4 shows commands necessary to turn on OSPF
for Segment Routing.
Example 15-4 Commands to Turn on OSPF for Segment Routing

IOS XR
RP/0/0/CPU0:PE4# show running-config router ospf
router ospf CCNP
nsr
distribute link-state
log adjacency changes detail
router-id 10.1.100.10
segment-routing mpls
segment-routing forwarding mpls
fast-reroute per-prefix
Chapter 15: Segment Routing 739

fast-reroute per-prefix ti-lfa enable


affinity-map
RED bit-position 0
!
nsf ietf
! Output omitted for brevity
address-family ipv4 unicast
area 0
mpls traffic-eng
segment-routing mpls
interface Loopback0
passive enable
prefix-sid index 10
! 15
interface HundredGigE0/0/0/0
bfd minimum-interval 20
bfd fast-detect
bfd multiplier 3
cost 200
network point-to-point
!
interface HundredGigE0/0/0/1
bfd minimum-interval 20
bfd fast-detect
bfd multiplier 3
cost 200
network point-to-point
!
!
mpls traffic-eng
RP/0/0/CPU0:PE4#

What about OSPFv3? While OSPFv3 has the potential to accommodate Segment Routing
for IPv6 and utilize a native IPv6 data plane, specific extensions outlined in an IETF draft are
required for implementation. It’s worth noting that, at press time, these extensions have not
been integrated into Cisco IOS XR and IOS XE.

BGP Control Plane


BGP also has the capability to function as the control plane for Segment Routing (SR),
enabling prefix distribution throughout the network. In the context of Segment Routing, the
BGP control plane distributes segment routing information between routers, enabling them
to make forwarding decisions based on predefined segments. While seen less frequently
than IS-IS and OSPF, BGP has been effectively used in practice in multiple large-scale web
data centers. Such data centers can support over 100,000 services, profoundly influenc-
ing and challenging the scalability and operational efficiency of the underlying network
740 CCNP SPCOR 350-501 Official Cert Guide

architectures. To meet the demands of high-intensity east-west traffic found in these com-
pute clusters, operators frequently opt for variations of Clos or Fat-tree topologies. In these
massive data center networks, symmetrical topologies with numerous parallel paths con-
necting two server-attachment points are common. It is in this context that BGP excels and
arguably surpasses the IGP approach. The assertion that “BGP is a better IGP” challenges
traditional viewpoints and has sparked conversations.
What would make BGP an attractive choice? Remember that these massive data centers seek
maximum bandwidth to be transferred across the midpoint of the system. Such network
structures are designed to be both highly scalable, cost-effective, and are constructed from
affordable, low-end access-level switches. To maintain this level of scale, the designs call for
a single protocol with simple behavior and wide vendor support. With the above in mind,
when it comes to simplicity, BGP certainly has its advantages because it has less of a state
machine and fewer data structures. This may not appear intuitive at first glance, but it does
not take long to realize that the BGP RIB structure is simpler than those of Link-State Data-
bases (LSDBs). There is a very clear picture of “which routing information is sent where.”
There is a RIB-In and RIB-Out, a far easier construct for tracing exact routing paths than
following link-state topology constraints with areas and levels. When it comes to operational
troubleshooting, this is definitely a strength. Also, event propagation is more constrained in
BGP because link failures have limited propagation scope. We can argue that BGP has more
stability due to the reduced “event-flooding” domains. When it comes to traffic steering,
BGP allows for per-hop Traffic Engineering that can be used for unequal cost Anycast load-
balancing. In addition, BGP is widely supported by practically all vendors, so from the per-
spective of interoperability, BGP beats IGPs. We have been conditioned to perceive BGP as
slow and suitable primarily for inter-domain routing, but it has no issues with demonstrating
its adaptability and effectiveness in modern topologies. Therefore, it is advisable to approach
BGP with an open mind, recognizing its potential to perform as well as, or even better than,
traditional IGP alternatives in contemporary implementations.
BGP will advertise a BGP Prefix-SID associated with a prefix via BGP Labeled Unicast (BGP-
LU) IPv4/IPv6 Labeled Unicast address-families. BGP Prefix-SID is a global SID, and the
instruction forwards the packet over the ECMP-aware BGP best path to the associated pre-
fix. RFC 8277 specifies that Label-Index TLV must be present in the BGP Prefix-SID attri-
bute attached to IPv4/IPv6 Labeled Unicast prefixes. This 32-bit value represents the index
value in the SRGB space and has the format illustrated in Figure 15-9.

0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

Type Length RESERVED

Flags Label Index

Label Index

Figure 15-9 BGP Prefix SID Advertised Format


Chapter 15: Segment Routing 741

The Prefix-SID for a locally originated BGP route can be set with a route-policy.
Example 15-5 shows how to attach a label-index with network and redistribute commands.
Example 15-5 Attaching a Label-Index via a Route-Policy

IOS XR configuration with network command

route-policy SIDs($SID)
set label-index $SID
end-policy
!
router bgp 100
address-family ipv4 unicast
network 10.1.100/4/32 route-policy SID(1)
allocate-label all 15

IOS XR configuration with redistribute command

route-policy SIDs
if destination in (10.1.100.4/32) then
set label-index 1
endif end-policy
!
router bgp 100
address-family ipv4 unicast
redistribute connected route-policy SIDs
allocate-label all

One last thing regarding having BGP for a Segment Routing control plane. Remember the
Anycast load-balancing I mentioned earlier in this section? Anycast allows different nodes to
advertise the same BGP prefix. It is an application of Prefix SIDs to achieve anycast opera-
tions. Look at Figure 15-10, where I again moved some links around to represent a data
center’s spine-and-leaf architectures, with spines located at the top. PE2 and P4, while adver-
tising their individual BGP Prefix-SIDs (16002 and 16004, respectively), have been made
members of the same unicast set. Both of them advertise anycast prefix 10.1.100.24/32 with
BGP-Anycast SID 20001. PE3 wants to send traffic to PE7 but would like to exclude spine
PE6. BGP-Anycast SID 20001 will load-balance the traffic to any member of the Anycast set
and then forward it to PE7.
Additionally, due to BGP Prefix-SID global label usage, BGP-LU local labels are going to
be the same across all of the network’s ASBRs. As a result, these Anycast loopbacks can be
used as the next-hop for BGP-LU prefixes. That is pretty good resiliency! Nothing to scoff
at, for sure.
742 CCNP SPCOR 350-501 Official Cert Guide

20001

10.1.100.24/32
PE2 P4 PE6

20001
16007 16007

PE3 P5 PE7
Figure 15-10 BGP-SR Anycast Load-Balancing

SRv6 Control Plane


The SRv6 control plane manages the signaling, routing, and forwarding information for
Segment Routing over IPv6 (SRv6) networks. It serves as the Segment Routing architec-
ture tailored for the IPv6 data plane and extends to the value of IPv6, influencing future IP
infrastructure deployments, whether in data centers, large-scale aggregation, or backbone
networks. SRv6 functions as an extension of the Segment Routing architecture specifically
designed for IPv6 networks. It introduces a source-routing mechanism by encoding instruc-
tions within the IPv6 packet header.
The use of IPv6 addresses to identify objects, content, or functions applied to objects opens
up significant possibilities, particularly in the realm of chaining microservices within distrib-
uted architectures or optimizing content networking. Notably, stable networks, particularly
in the Asia-Pacific region, have embraced SRv6, boasting tens of thousands of nodes on a
single network as of the time of writing this book.
Fundamentally, SRv6 encodes topological and services paths into the packet header. The
SRv6 domain does not hold any per-flow state for Traffic Engineering or network function
virtualization (NFV). Sub-50ms path protection is delivered with TI-LFA. It natively delivers
all services in the packet header, without any shims or overlays. IPv4’s limitations have forced
the industry to create extra tools to deal with its challenges. When IPv4 lacked sufficient
address space, NAT was created to hide and conserve addresses. For engineered load-
balancing, we have had to invent MPLS Entropy Label and VxLAN UDP. For separating dis-
crete networks, MPLS VPNs along VxLAN were created. Since Traffic Engineering functions
were missing in IPv4, RSVP-TE and SR-TE MPLS appeared. Network Service Header (NSH)
overcame IPv4 service chaining limitations. All of the above is done natively in IPv6 and why
so many service providers are turning to this technology.

SRv6 (Segment Routing over IPv6) Header


At the heart of SRv6 is the IPv6 Segment Routing Header (SRH). Figure 15-11 shows the
IPv6 SRH replicated from RFC 8754. This header is added to IPv6 packets to implement
Segment Routing on the IPv6 forwarding plane. SRH specifies an IPv6 explicit path, list-
ing one or more intermediate nodes the packet should visit on the way to its final destina-
tion. The Segment Left field provides the number of transit nodes before traffic reaches its
Chapter 15: Segment Routing 743

destination. Then, the Segment List fields indicate the sequence of nodes in 128-bit IPv6
addresses to be visited from bottom to top. Segment List [n] shows the first node in the path;
Segment List [0] shows the last node in the path.

IPv6 Packet Header Segment Routing Header IPv6 Payload

0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

Next Header Hdr Ext Len Routing Type Segments Left


15
Last Entry Flags Tag

Segment List [0] (128-Bit IPv6 Address)

...

Segment List [n] (128-Bit IPv6 Address)

Optional Type Length Value Objects (Variable)

Figure 15-11 IPv6 Segment Routing Header Format


In SRv6, each segment is represented by an IPv6 address known as a segment identifier
(SID). These SIDs play a crucial role in defining specific paths or instructions for forwarding
packets throughout the network. It looks a lot like a 128-bit IPv6 address, but has different
semantics because it consists of two parts, with Figure 15-12 providing the visualization:

■ Locator: Represents an address of a specific SRv6 node performing the function.

■ Function: Represents any possible network instruction bound to the node that gen-
erates the SRv6 SID (network instruction) and is executed locally on that particular
node, specified by the locator bits.

1111:2222:3333:4444:5555:6666:7777:8888

Locator Function
Figure 15-12 IPv6 Segment Identifier

You now have the ability to send packets to a node (locator) and then instruct the node to
execute an action (function). This is not a subtle difference! In SR-MPLS, IGP with exten-
sions advertised the transport mechanism, and services (L2VPNs, L3VPNs) were signaled
independently via LDP or MP-BGP. You could change your transport (from MPLS to SR)
without affecting the upper protocols that ran on top of it. For the first time in the indus-
try, transport and services instructions are coupled and signaled in the SID. You will see an
example of this coming up shortly where an L3VPN is written into the SID.
744 CCNP SPCOR 350-501 Official Cert Guide

SRv6 Node Roles


In the context of SRv6 (Segment Routing over IPv6) networks, different nodes play distinct
roles in facilitating packet forwarding and processing. These roles include

■ Source Node: This node has the capability to generate an IPv6 packet incorporating a
Segment Routing Header (SRH), essentially forming an SRv6 packet. Alternatively, it
serves as an ingress node that can apply an SRH to an existing IPv6 packet.

■ Transit Node: Found along the SRv6 packet’s path, the transit node functions without
inspecting the SRH. The destination address of the IPv6 packet does not align with
the transit node, and its role is primarily to forward the packet.

■ Endpoint Node: Located within the SRv6 domain, this node acts as the termination
point for the SRv6 segment. The destination address of the IPv6 packet containing an
SRH corresponds to the endpoint node. The endpoint node executes the specific func-
tion associated with the SID bound to the segment.

SRv6 Micro-Segment SID (uSID)


Often referred to as Micro-SID or Compressed SID, the uSID feature is an extension of the
SRv6 architecture. In SRv6, the micro segment identifier, or uSID, is a specialized form of
Segment Routing where packets are marked with a compact identifier for precise forwarding.
Unlike traditional SRv6, which might use longer segment identifiers for various purposes,
uSID is specifically designed for efficient and granular traffic steering. It provides a more
streamlined approach to segment routing, particularly useful for scenarios requiring fine-
grained control and scalability enhancements.
Using the established SRv6 Network Programming framework, it can encode up to six SRv6
Micro-SID (uSID) instructions within a singular 128-bit SID address, termed a uSID Carrier.
Moreover, this extension seamlessly integrates with the existing SRv6 data plane and control
plane, requiring no modifications. Notably, it ensures minimal MTU overhead. For instance,
when incorporating six uSIDs within a uSID carrier, it yields 18 source-routing waypoints
with just 40 bytes of overhead in the Segment Routing Header. Look at Figure 15-13, which
illustrates the usage of uSID. Pay attention to how the highlighted uSIDs correspond to
router numbering/naming.

IPv6 Packet with DA =


2001:db8:0600::/48
2001:db8:0600:0700:0300:f001:0000:0000

SRv6 uSID Carrier


CE1 PE2 P4 PE6

2001:db8:0600:0700:0300:f001:0000:0000

SRV6 uSID uSID uSID uSID uSID EoC


Block 1 2 3 4 5

CE8
PE3 P5 PE7

2001:db8:0300::/48 2001:db8:0700::/48

Figure 15-13 uSID in Action


The customer at CE1 is using the VPNv4 SP service to connect to a remote site CE8. Router
PE2 sends traffic to VPNv4 CE8 to router PE3 via a traffic-engineered path visiting routers
Chapter 15: Segment Routing 745

PE6 and PE7 using a single (!) SRv6 SID (note that without uSID, a sequential Segment List
would have to be specified). Let’s unpack this:

1. PE2, PE6, PE7, and PE3 are SRv6 capable and are configured with 32-bit SRv6 block
2001:db8.
2. P4 and P5 run classic IPv6 forwarding and do not change the Destination Address.
3. PE6, PE7, and PE3 advertise their corresponding 2001:db8:0600::/48,
2001:db8:0700::/48, and 2001:db8:0300::/48 routes.
4. PE2 receives an IPv4 packet from CE1, encapsulates it, and sends an IPv6 packet with
the destination address 2001:db8:0600:0700:0300:f001:0000:0000. This is an SRv6
uSID Carrier that contains a sequence of micro-SIDs (instructions 0600, 0700, 0300,
f001, and 0000).
5. The 0600, 0700, and 0300 uSIDs are used to construct a traffic engineering path
to PE3 with two stops along the way—PE6 and PE7. uSID f001 is a BGP-signaled 15
instruction sent by PE3 indicating the VPNv4 service. uSID 0000 indicates the end of
instructions.
6. What happens at P4? P4, running only classic IPv6, forwards the packet along the
shortest path to PE6.
7. PE6 receives the packet, pops its own uSID 0600, and advances the micro-program by
looking up the shortest path to the next Destination Address (DA) 2001:db8:0700::/48.
Now the DA is 2001:db8:0700:0300:f001:0000:0000:0000. This behavior is called shift
and forward.
8. PE7 receives the packet, pops its own uSID 0700, and advances the micro-program by
looking up the shortest path to the next Destination Address (DA) 2001:db8:0300::/48.
Now the DA is 2001:db8:0300:f001:0000:0000:0000:0000. Shift and forward again.
9. P5 forwards the packet to PE3, just like P4 did.
10. PE2 receives the packet and executes the VPNv4 function based on this own instruc-
tion f001. It decapsulates the IPv6 packet, performs IPv4 table lookup, and forwards
the IPv4 packet to CE8.

SRv6/MPLS L3 Service Interworking Gateway


The SRv6/MPLS L3 Service Interworking Gateway facilitates the seamless extension of L3
services between MPLS and SRv6 domains, ensuring continuity in service delivery across both
control and data planes. This feature enables interoperability between SRv6 L3VPN and existing
MPLS L3VPN domains, offering a pathway for transitioning from MPLS to SRv6 L3VPN.
At the gateway node, the SRv6/MPLS L3 Service Interworking Gateway performs both
transport and service termination tasks. It generates SRv6 VPN SIDs and MPLS VPN labels
for all prefixes within the configured VRF for re-origination, as illustrated in Figure 15-14.
The gateway supports traffic forwarding from the MPLS domain to the SRv6 domain by
removing the MPLS VPN label, performing a destination prefix lookup, and applying the
appropriate SRv6 encapsulation. Conversely, for traffic from the SRv6 domain to the MPLS
domain, the gateway removes the outer IPv6 header, performs a destination prefix lookup,
and applies the VPN and next-hop MPLS labels.
PE3 is the interworking gateway that has one leg in the SR-MPLS domain and the other in
the SRv6 domain. It performs a translation service by popping the MPLS VPN label and
looking up the destination prefix in the SRv6 domain. It encapsulates the payload in the
746 CCNP SPCOR 350-501 Official Cert Guide

outer IPv6 header with P4’s destination address. In the opposite direction, PE3 removes the
outer IPv6 header, looks up the destination prefix, and pushes MPLS label 16002 for the
BGP next-hop of PE2.

SR-MPLS SRv6

Prefix SID 16002 Prefix SID 16003 SRv6 Locator 2001:db8:0::3/48 SRv6 Locator 2001:db8:0::4/48
10.1.100.2/32 10.1.100.3/32 2001:db8:0::3/128 2001:db8:0::4/128

PE2 P4
PE3

Interworking Gateway

Figure 15-14 SR-MPLS SRv6 Interworking Gateway


Co-existence with LDP
It would be nice to never worry about LDP and RSVP, but the reality is that many of today’s
engineers will have to touch these older MPLS networks. A Segment Routing control plane
can co-exist with the label-switched paths (LSPs) constructed with LDP or RSVP. The MPLS
architecture allows for the simultaneous use of multiple label distribution protocols, includ-
ing LDP, RSVP-TE, and others. The SR control plane can coexist alongside these protocols
without any interaction. In Figure 15-15, we have removed some links in our network and
have thus completely flattened it. This network runs a mix of both Segment Routing (SR)
and Label Distribution Protocol (LDP). It is possible to establish an end-to-end seamless
Multiprotocol Label Switching (MPLS) LSP, which will ensure interoperability between these
two domains. To accomplish this, one or more nodes function as Segment Routing Mapping
Servers (SRMS). These SRMS entities take on the responsibility of advertising SID mappings
on behalf of nodes that are not SR-capable. This mechanism enables SR-capable nodes to
learn about the SIDs assigned to non-SR-capable nodes without the need for explicit indi-
vidual node configurations. Let’s unpack this.

SR Domain LDP Domain


16002 16002 24036 24020 24016
30001 30001 30001 30001 30001 30001

172.16.1.0/24 172.16.2.0/24
PE2 P4 PE6
Lo1 10.1.100.2/32 PE3 P5 PE7
Lol 10.1.100.7/32

Figure 15-15 SR and LDP Domain Interoperability


Notice that this network runs both SR and LDP, which can be typical during network transi-
tions and upgrades. PE2 and PE7 are exchanging BGP VPNv4 routes. PE2, PE3, and P4 are
SR-capable. PE4, P5, PE6, and PE7 use LDP. How do these two domains talk to each other
end to end? First, let’s start from the LDPÐSR direction, which is quite easy because SR-
capable routers will automatically translate between LDP- and SR-based labels:
1. PE7 learns a service route (L3VPN route, for example) for customer prefix
172.16.1.0/24 with a service/VPN label of 30001.
2. PE7’s BGP next-hop for this service label is associated with PE2’s lo1 10.1.100.2/32.
Chapter 15: Segment Routing 747

3. PE7 finds LDP label binding 24016 from its neighbor PE6 for PE2’s Forwarding Equiv-
alence Class (FEC) of 10.10.100.2/32 and forwards the packet to PE6.
4. PE6 finds LDP label binding 24020 from its neighbor PE5 for PE2’s FEC of
10.10.100.2/32, swaps 24016 for 24020, and forwards the packet to PE5.
5. PE5 finds LDP label binding 24036 from its neighbor PE4 for PE2’s FEC of
10.10.100.2/32, swaps 24020 for 24046, and forwards the packet to P4.
6. P4 lacks an LDP binding originating from its next-hop PE3 for the FEC associated
with PE1. What it does carry, though, is an SR node segment pointing to an IGP route
leading to PE2. P4 engages in label merging, wherein it replaces its local LDP label
(24036) for FEC PE2 with the corresponding SR node segment label, which is 16002.
7. PE3 pops label 16002 (assuming penultimate hop popping function is used) and for-
wards the packet to PE2.
8. PE2 receives the packet, looks up its service label of 30001, and drops the packet into 15
the appropriate customer VRF.
We now have an end-to-end LDPÐSR path. Simple. What about in the opposite direction?
This is where we will encounter a problem going from SRÐLDP. Can you take a moment to
think what the problem would be by looking at Figure 15-14 before you examine Figure
15-15? PE2 needs to send traffic to 172.16.2.0/24 with service label 40001 that it received
with the BGP next-hop of 10.1.100.7/32. Since PE2 only speaks SR, when it looks up the
node segment for 10.1.100.7/32, what will it find in its label database? Nothing. Why?
Because such label mapping does not exist on the network, since the operator has never con-
figured it; therefore, no router advertises or receives this label mapping. There must be some-
thing to associate PE7’s loopback with SR label mapping. The better answer here is Segment
Routing Mapping Server (SRMS). All analogies finally break down, but it is possible to think
of SRMS as a sort of route reflector for SR labels. Just as in BGP, we can centrally instruct all
routers in our SR domain. Look at Figure 15-16.

SR Domain LDP Domain


16007 16007 24011 24022 24033
40001 40001 40001 40001 40001 40001

172.16.1.0/24 172.16.2.0/24
PE2 P4 PE6
Lo1 10.1.100.2/32 PE3 P5 PE7
SRMS Lol 10.1.100.7/32
16007 = 10.1.100.7/32

Figure 15-16 SR and LDP Domain Interoperability with SRMS


Walking back in the opposite direction looks like this:
1. PE3 is chosen as a Segment Routing Mapping Server (SRMS). In practice, it is recom-
mended to have a redundant SRMS.
2. As PE7 lacks Segment Routing (SR) capability, you must create a mapping policy on
the SRMS, which associates label 16007 with PE7’s lo1 10.1.100.7/32.
3. Now, PE2 learns a service route (L3VPN route via BGP) for customer pre-
fix 172.16.1.0/24 with a service/VPN label of 40001 with the BGP next-hop of
10.1.100.7/32.
748 CCNP SPCOR 350-501 Official Cert Guide

4. PE2 finds an SR label binding 16007 it has received from the SRMS PE3 for PE7’s FEC
of 10.10.100.7/32 and forwards the packet to PE3 as the IGP next-hop.
5. PE3 finds an SR label binding 16007 pointing to its neighbor P4 as the IGP next-hop,
swaps 16007 for 16007, and forwards to P4.
6. P4 does not have an SR label for PE7’s IGP route, but it holds LDP label 24011 for this
FEC. It swaps 16007 for 24011 (remember the process is called label merge) and for-
wards to P5.
7. P5 swaps 24011 for 24022 and forwards to PE6.
8. PE6 pops the label (due to PHP in this setup) and forwards to PE7.
9. PE7 receives the packet, looks up its service label of 40001, and drops the packet into
the appropriate customer VRF.
What should you remember here? Segment Routing Mapping Server labels are only neces-
sary in the SRÐLDP direction. SR and LDP labels come from separate label database ranges
(16000–23999 for SR and 24000+ for LDP), so unless the operator has deliberately violated
this guidance, there is not a chance the network will be in a state of confusion, since the SR
and LDP labels do not overlap each other. The network must maintain continuous SR con-
nectivity in the SR domain. The network must also maintain continuous LDP connectivity in
the LDP domain. If you understood the packet walkthrough, these points should be clear.
One last thing to know for completeness. By default, Cisco routers prefer LDP as the label
imposition mechanism when the MPLS features are turned on. The way to enable SR for
label imposition is shown in Example 15-6.
Example 15-6 Segment Routing Label Imposition Preferred

IS-IS

router isis 100


address-family ipv4|6 unicast
segment-routing mpls sr-prefer

OSPF

router ospf 100


segment-routing mpls
segment-routing sr-prefer

Segment Routing Traffic Engineering


RSVP-TE, despite its powerful Traffic Engineering capabilities, poses challenges in practi-
cal deployments due to its complexity. Managing backup tunnels, intricate configurations
at scale, the absence of seamless inter-domain intelligence, and the complexities of steering
traffic through methods like PBR or autoroute have resulted in various issues and limited
widespread adoption. Simplifying these aspects is crucial for enhancing the usability and
deployment scope of Traffic-Engineered networks. Enter Segment Routing policies. They are
simple, automated, scalable, and carry support for a wide variety of functionalities includ-
ing multidomain intelligence, which is provided by Path Computation Element (PCE) and
Binding-SID (BSID)—more on this later.
Chapter 15: Segment Routing 749

Segment Routing Policies


In Segment Routing, there are no tunnels (the closest possible thing is Circuit-Style Seg-
ment Routing, which has policies to put traffic on the same A–Z path, akin to bidirectional
co-routed LSPs—this is outside of the current exam’s scope). Instead, Segment Routing
introduces the concept of Segment Routing Policies. These are typically deployed at ingress
routers at the edge of the network and can force the packet to follow any desired path.
An SR Policy is fundamentally a sequence of segments. In its most basic structure, it is a
sequence of IP waypoints presented in either SR-MPLS or SRv6 format (SID list), with the
initial entry as the first destination to be visited. An SR Policy is uniquely identified by these
attributes:

■ Headend: An ingress router where the policy is implemented.

■ Tailend: An egress router where the policy ends.


15
■ Color: A numeric value that uniquely identifies multiple SR Traffic Engineering
policies between the same pair of routers.

Figure 15-17 illustrates this best. PE2 needs to send traffic for prefixes 172.16.100.0/24 and
172.16.200.0/24 to the same PE7 router, since it is the egress point connecting these two net-
works. However, traffic destined for 172.16.100.0/24 must follow the top low-delay path due
to latency requirements, and traffic for 172.16.200/24 must take the bottom low-cost path
because the customer is not paying for the premium service. Try doing this with IGP alone!
SR policies, on the other hand, easily differentiate traffic between the same pair of routers
by steering them into differently colored policies (different numeric values) that properly
groom traffic onto the desired paths.

SR Policy “Gray” for Low-Delay Paths:


1) Headend = PE2
2) Tailend = PE7
3) Color = Gray (Numeric Value 100)

PE2 P4 PE6

172.16.100.0/24
172.16.200.0/24
PE3 P5 PE7
SR Policy “Black” for Low-Cost Paths:
1) Headend = PE2
2) Tailend = PE7
3) Color = Black (Numeric Value 200)
Figure 15-17 Segment Routing Policy Places Traffic on Diverse Paths
750 CCNP SPCOR 350-501 Official Cert Guide

SR Policies and Candidate Paths


An SR Policy consists of one or more Candidate Paths. Each Candidate Path has a single
SID-list or a set of weighted SID-list. Things to consider regarding a Candidate Path (the
order is not important here):
1. Can be explicitly defined. The operator will provide the exact sequence of SIDs to be
visited along the way to the destination.
2. Can be dynamically defined. The operator will provide optimization objectives (select
only encrypted links) and constraints, a set of rules to follow (exclude links certain
attributes, such as not meeting minimum delay).
3. Has a preference value (numeric, higher is preferred).
4. Is associated with a single Binding-SID (BSID, more on this later).
5. Can be supplied to the headend via
a. CLI
b. NETCONF
c. PCEP (Path Computation Element Protocol)
d. BGP
6. An SR Policy will select a single best Candidate Path and program it via BSID into the
router’s RIB/FIB forwarding table.

Binding-SID (BSID)
Binding Segment Identifier (BSID) is a SID value that is an opaque representation of a
Segment Routing Policy. BSID shows a chosen path to upstream routers. It provides isolation
and decoupling between distinct source-routed domains while increasing overall network
scalability. Do not forget that SR Policies use BSID to program a router’s forwarding table
(just mentioned in point 6).
Note how in Figure 15-18 different routing/SR domains are involved. The list of SIDs to steer
traffic onto the imagined low-delay path between DC1 and DC5 (DC2, PE2, P4, P4-ADJ-
SID, PE7, DC5) can be long. A single BSID can represent the entire Segment Routing Policy
sending it through the WAN Core domain, requiring only three SIDs (DC Primary, WAN
Core SR Policy, DC Secondary). This reduces the number of segments imposed by the
source.

DC Primary WAN Core DC Secondary


BSID
DC2 PE2 P4 PE6 DC4

DC1 DC6

DC3 DC5
PE3 P5 PE7

Figure 15-18 Multidomain Use of Binding-SID


Chapter 15: Segment Routing 751

Additionally, this approach keeps one domain unaffected by routing changes in another
domain, since BSID does not change during these events. Domain internal operations can be
thus hidden (opaque) from each other, which can be beneficial to service providers who do
not want to disclose the details of how they provide services to their customers.

Flex-Algo
Flex-Algo is the best way to do traffic engineering today. Flex-Algo, short for Flexible
Algorithm, enhances Segment Routing Traffic Engineering (SRTE) by introducing additional
segments with distinct properties compared to the Interior Gateway Protocol Prefix seg-
ments. It expands the SRTE capabilities by including customizable, user-defined segments in
the toolbox. It can also use Segment Routing on-demand next hop (ODN) and Automated
Steering to create traffic-engineered paths based on user intentions; these are outside of the
scope of this book.
IETF has standardized algorithms 0 through 127. Routers run the default algorithm 0 as the 15
IGP shortest path derived from the IGP metric. Additional algorithms 128 through 255 can
be customized by network operators. They are known as SR IGP Flexible Algorithms, or
Flex-Algo as the shorter version. It is called flexible because you can decide which metric
you want to use in your intent.
In our earlier discussion of Prefix-SID in this chapter, we focused solely on explaining the
default aspect of Prefix-SID behavior, specifically the one linked to algorithm 0. When you
read (you really should) RFC 8867 and RFC 8665, you will notice that both IS-IS and OSPF
include Prefix-SID sub-TLV algorithm field in the formats illustrated in Figure 15-19 and
Figure 15-20.

0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

Type Length Flags Algorithm

SID/Index/Label (Variable)

Figure 15-19 Algorithm Field in Prefix-SID Sub-TLV for IS-IS

0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

Type Length

Flags Reserved MT-ID Algorithm

SID/Index/Label (Variable)

Figure 15-20 Algorithm Field in Prefix-SID Sub-TLV for OSPF


This means that the operator can change the default algorithm 0 (IGP shortest-path) behavior
on routers that are assigned to use a different algorithm (128–255) as different constraints
(logical rules) will be imposed on the part of the network that participates in this algorithm.
Let’s look at Figure 15-21, where we break from the familiar-to-us topology.
752 CCNP SPCOR 350-501 Official Cert Guide

Algo 128
R2 R4

R1 R2 R3

R5 R8 R9

R6 R7
Algo 129

Figure 15-21 Flex-Algo Network Slicing


Suppose the operator wanted to impose different type behaviors on this network. Instead
of using the default algo 0 (IGP shortest-path), the operator can define other algorithms that
can minimize metrics other than shortest path, such as delay, for example. The operator can
also combine this with rules to exclude links with certain properties (link-affinity, SRLG,
encryption, etc.). Here is one example of what can be done:

1. The operator can define Flex-Algo 128 to prioritize IGP metric and avoid link-affinity
“dark-gray” on the bottom.
2. The operator can define Flex-Algo 129 to delay metric and avoid link-affinity “light-
gray” on the top.
3. Routers R1 and R9 would be added to participate in algo 0, 128, and 129.
4. Routers R1, R2, R3, and R4 would be added to participate in algo 0, 128.
5. Routers R5, R6, R7, and R8 would be added to participate in algo 0, 129.
Consider how powerful the network has become. The operator has bisected the network
into two distinct profiles. The top part has routes based on the shortest path according to
the IGP. The bottom half will route delay-sensitive traffic through the part of the network
that uses dynamic link-delay measurement, which will be advertised by the IGP. Someone
reroutes your optical underlay path? Does not matter. Someone moves a circuit without
bothering to notify your department? Does not matter. The network will recalculate the
best path according to the intent you had in mind. If you see the beauty of this approach,
you will understand that the limitation of what can be done on a network at scale exists
only in the minds of its architects. Low-cost delay-optimized paths (my personal SP opera-
tor nirvana, because this is where I make money) have now become a reality because we can
now finally differentiate services on our infrastructure. It is my opinion that while SR poli-
cies are effective for carving dynamic paths on the network, the simplicity and flexibility
of Flex-Algo allow the operator to easily slice the network into multiple planes that can be
used to carry encrypted, application-dependent, dynamic delay-based, low-cost, and other
intent-based traffic. You can even drain all network traffic to the bottom dark-gray plane of
the network, run upgrades on the top light-gray plane of the network, and repeat the process
again in the other direction—accomplishing zero downtime for your customers.
That is the power of Flex-Algo—operational simplicity and scale. You can finally manage
massive networks with a simple picture in mind, rather than constructing hundreds of SR
Policies for individual applications. Flex-Algo is applicable to SR-MPLS and SRv6. In the
Chapter 15: Segment Routing 753

case of SR-MPLS, you will get an extra label for the router’s loopback. In SRv6, you get a
different locator (recall our earlier discussion on this topic). SP operators are really beginning
to heavily use this approach with SRv6 (IPv6).
Something you need to be aware of that is directly called out in the exam blueprint is encap-
sulation. SR-MPLS uses SRTE policies (on-demand or manual) to steer traffic into Flex-
Algo. If you want traffic to follow a particular path, you specify a list of SIDs. When you
specify the SID associated with Flex-Algo, the traffic takes that specific Flex-Algo plane.
In contrast, SRv6 does not use policies. In SRv6, the ingress PE will directly encapsulate
traffic based on the Service SID advertised in BGP. That Service SID (remember locator +
function?) is a combination for the Algo locator and decapsulation function. Transport and
Service become blended and are encoded into the transport intent (Algo locator). Transport
intent and Service function are encapsulated into the same instruction. SRv6 is a much sim-
pler approach to driving traffic intent.
15
TI-LFA
To date, TI-LFA is the number one reason why network operators deploy SR: they want an
automated way to compute a backup path by IGP. No need to do MPLS-TE (traffic engineer-
ing tunnels) for fast reroute (FRR). Topology-independent loop-free alternate (TI-LFA)
provides a simple, automatic, optimal, and topology-independent sub-50ms per-prefix pro-
tection to the network. It can protect Segment Routing, LDP, and IP traffic without relying
on the construction of backup tunnels of any sort, as is the case in RSVP-TE. Whether IS-IS
or OSPF is used, these protocols precompute a backup path for each active path per IP pre-
fix destination. They run an SPF algorithm for the primary path and then automatically run
the SPF again, excluding the primary path—deriving the backup path. IGP pre-installs this
path in the data plane and immediately uses it once the active destination path is impacted.
Be careful with analogies, because they all finally breakdown, but it can be helpful to think
of how an EIGRP-feasible successor works. The router already knows what the post-
convergence path will look like even before the failure occurs.
Figure 15-22 shows a fundamental TI-LFA operation from router PE2’s perspective; once
the protected PE4–P2 link fails, traffic is rerouted over the post-convergence path, which is
known and preprogrammed before the link failure occurs. The recommendation is to enable
this functionality on all routers in your Segment Routing domain. This approach creates
automatic backup paths throughout the network without the burden of manually provision-
ing backup tunnel paths.

PE2 P4 PE6

PE3 P5 PE7
Figure 15-22 TI-LFA Operation
754 CCNP SPCOR 350-501 Official Cert Guide

Terms from Remote LFA Technology


RFC 7490 describes the following architectural reference areas to understand repair tunnel
endpoints for link protection. While there is no concept of tunnels in Segment Routing (they
have been replaced by policies), the same reference areas apply and are important for this
exam.

P-Space
In Figure 15-23, we return to our topology and remove some of the internal links to create a
ring topology to better understand these reference areas.

PE2 P4 PE6

P-Space

PE3 P5 PE7

Figure 15-23 P-Space Reference Area


Reference areas are always seen from a perspective of a certain router with respect to a par-
ticular failed link. The way to look at reference areas depends on which router we’re consid-
ering and the specific link it is protecting. In this example, router PE2 would like to protect
the link between itself and router P4. The protected space (P-Space) of a router concern-
ing a protected link refers to routers that PE2 can reach through the shortest paths without
having to use the protected link. Which routers would those be? All link costs being equal
here, only PE3 and P5 will be in P-Space. What about PE7? Not quite, as it is possible, due
to ECMP, that PE2 can send a packet to PE7 through the top of the diagram through the
protected link, thus disqualifying from being the shortest path. What would be the point of
using a link that can potentially fail? Expressed in cost terms, P-Space contains a set of rout-
ers found on a shorter path than the path cost going through the protected link. In the case
of PE7, it is equal and not shortest—thus, not a part of P-Space.

Q-Space
Q-space refers to a set of backup paths or alternate next hops that are precomputed for use
during a failure. Figure 15-24 shows the other side of the protected PE2–P4 link from router
P4’s perspective, and the same rules apply again. When following the same rules, the set of
routers reachable from P4 via the shortest path without possibly going through the protected
link only include PE6 and PE7.

PQ Node
Viable repair tunnel endpoints are found at intersections of P- and Q-Spaces. In
Figure 15-25, there is no common node that belongs to both reference areas and hence no
viable repair tunnel endpoint is present.
Chapter 15: Segment Routing 755

PE2 P4 PE6

Q-Space

PE3 P5 PE7 15

Figure 15-24 Q-Space Reference Area

PE2 P4 PE6

Q-Space

P-Space

PE3 P5 PE7

Figure 15-25 P-Space and Q-Space Reference Area

Extended P-Space
Because PE4 needs to repair the protected PE4–P2 link and reach any router in this ring
topology without using the protected link, the concept of Extended P-Space was intro-
duced. Extended P-Space is the union of each of PE4’s neighbors. In this case, this is router
PE3 in Figure 15-26, whose P-Space contains routers P5 and PE7. By combining P-Spaces
of PE2 and PE3, we extend PE2’s reach, and PE7 becomes a common point for P- and
Q-Spaces. A PQ node of a node PE2, in relation to a protected link PE2–P4, is a node that
belongs to both the P-space (or extended P-space) of PE2 for that link and the Q-space of P4
for the same link. PE7 is chosen as the repair tunnel endpoint. Why? Because repair tunnels
are chosen from a set of PQ nodes.
756 CCNP SPCOR 350-501 Official Cert Guide

PE2 P4 PE6

Extended P-Space
PQ Node
Q-Space

PE2’s
P-Space

PE3 P5 PE3’s PE7


P-Space

Figure 15-26 PQ Node and Extended P-Space


Classic LFA Limitations
Now, with the understanding of the reference points, Classic LFA’s (loop-free alternate fast
reroute, aka LFA-FRR) limitations become obvious. Note that I am not discussing LFA-FRR
because it is not a part of the exam blueprint. I reference it here to highlight the advantages
of TI-LFA. Figure 15-27 considers two such limitations.

PE2 P4 PE6

Q-Space

P-Space

PE3 P5 PE7

P9

Figure 15-27 Classic LFA Limitations Examples


First, LFA-FRR suffers from incomplete coverage, which makes it topology dependent (as
opposed to TI-LFA, which is topology independent). Recall our discussion about the PQ
node. PE2 protects the PE2–P4 link and sends traffic to PE6. When the PE2–P4 link fails,
PE2 will send traffic to PE3. Before the network converges via IGP, PE3 has a problem, since
the shortest path to PE8 is still through the failed PE2–P4 link and PE3 will send the traffic
Chapter 15: Segment Routing 757

back to PE2, looping the doomed packets. This is a real problem that, in the rLFA (Remote
LFA) cases, can sometimes be solved by a Targeted LDP session, where PE2 would establish
a remote LDP session with PE7, but this approach also has limitations that are outside of
the scope of this exam. TI-LFA handles this topology though a “double-segment” coverage,
where two labels are pushed (PE3, PE3-R5 ADJ-SID) to overcome this problem.
Second, notice the additional P9 router. Let’s suppose it is not a part of the network core
or planned for capacity. Classic LFA will steer the traffic on this suboptimal backup path.
Additional case-specific operator involvement would be necessary to avoid such undesired
backup paths.
In contrast, a topology-independent loop free alternate (TI-LFA) provides 100 percent cover-
age and uses the post-convergence path as the fast reroute (FRR) backup path.
TI-LFA delivers significant improvements over the traditional loop-free alternate fast reroute
(LFA-FRR) approach. TI-LFA uses a post-convergence path after a link failure occurs. This 15
path is known before a failure occurs and is preprogrammed into the data plane. TI-LFA uses
PQ nodes, or a combination of P and Q nodes located on the post-convergence path to com-
pute backup paths. Traffic will be rerouted in sub-50ms on any topology.
While the blueprint does not focus on configuration of Segment Routing features, you
need to know how to configure TI-LFA. So, here is your homework for this section: return
to Example 15-3, which I took from a massive production lab we have within Cisco to show
the latest technologies. Study it and locate the two highlighted commands that start with
fast-reroute. I recommend you enable this on all provider facing links; they will provide
“automagic” protection mechanisms for your entire network without having to build backup
tunnels. Know that TI-LFA works seamlessly with Flex-Algo we discussed in the previous
section.

NOTE One last thing that will not come up on the exam (as TI-LFA is positioned as a bet-
ter alternative). Be aware that the TI-LFA concept is not new. RFC 4090 (Fast Reroute Exten-
sions to RSVP-TE for LSP Tunnels) described this very technique in 2005, 10 years before
Segment Routing hit the street) in Section 3.1 (One-to-one Backup method), albeit RSVP
used signaling for tunnels and Segment Routing uses a label stack to guide the packet onto
the new path. I’m here to assist you in preparing for your exam and provide valuable back-
ground information, without engaging in debates over differing viewpoints.

PCE-PCC Architecture
PCE-PCC architecture involves a Path Computation Element (PCE) that centrally com-
putes optimal network paths and a Path Computation Client (PCC) that requests these paths,
enabling efficient and scalable traffic engineering across the network. To take a step back,
Segment Routing Traffic Engineering (SRTE) allows the network operator to force a packet
anywhere on the network. The ingress router will contain the policy containing the opera-
tor’s intent. If the network is small like the basic topology we have been using for our exam-
ples, there are only a handful for routers that we have to individually configure with such
policies. A great majority of service provider networks you are likely to encounter in your
career will contain dozens, hundreds, or maybe thousands of nodes. The task of deploying a
758 CCNP SPCOR 350-501 Official Cert Guide

uniform policy on such a distributed network domain becomes laborious and operationally
costly. How do you scale this type of rollout? There are many other limitations operators
have encountered on distributed SR (or RSVP-TE for that matter) networks. Among the more
notable ones is stale policies, in which operators define a set of policies and in six months
traffic patterns change, which leads to continuous “rinse-and-repeat” of policy redeploy-
ment. Another one would be applications requesting the best available path in real time—not
something that can by automatically done with the SRTE approach we have described thus
far. What about being able to offer paths that meet certain SLAs? There are many other ones.
From the beginning of Traffic Engineering, the need for a centralized optimization element
that can dynamically adjust policies based on current network conditions was apparent.
Enter Path Computation Element Protocol (PCEP). It was initially specified to support
the classic RSVP-TE protocol. With the introduction of Segment Routing, PCEP has been
extended to support SRTE. RFC 4655 defines multiple terms that support PCEP-based archi-
tecture. Of immediate interest to us are the following terms:

■ Path Computation Element (PCE), which is “an entity that can compute a network
path or route based on a network graph, and of applying computational constraints
during the computation. The PCE entity is an application that can be located within a
network node or component, on an out-of-network server, etc.…” (RFC 4655)

■ Path Computation Client (PCC), which is “a client application requesting a path


computation to be performed by the Path Computation Element…” (RFC 4655)

■ Path Computation Element Protocol (PCEP), which is north-bound API capable,


meaning that it can ingest information coming from the network routers (via BGP-LS
updates, for example) and make real-time Traffic Engineering decisions based on cur-
rent network conditions. This is extremely powerful and desired on modern networks.

Notice that you can run PCE on the router itself or can rely on another adjunct processor to
perform this function. In the case of Cisco products, that would be the Crosswork Network
Controller, which provides a wide assortment of functionalities that helps customers to sim-
plify and automate intent-based network service provisioning, visualization, monitoring, and
optimization in a multivendor network environment with a common GUI and API. In Cisco’s
documentation, you will often encounter references to SR-PCE. When you see these, it will
either be a router running PCE or the Crosswork Network Controller. It can also think of
PCE as a BGP Route-Reflector for Segment Routing and associated services. The following is
a partial list of its capabilities (get the overall picture, do not memorize these for the exam):

■ Segment Routing (SR) policy provisioning with explicit intent (for example, bandwidth
constraints, latency minimization, etc.).

■ Services provisioning (for example, L2VPN, L3VPN services with associated segment
routing policy).

■ Collection of real-time performance information and network optimization to maintain


the intent of the associated segment routing policy.

■ Tactical optimization of the network during times of congestion.


Chapter 15: Segment Routing 759

■ Assistance with migration to next-generation networks and technologies (for example,


migration from RSVP-TE to SR-TE, implementing multicast with SR Tree-SID, embrac-
ing 5G network slicing, etc.).

■ Monitoring and troubleshooting the health of L2VPN and L3VPN services through
empirical data plane verification.

■ Streamlining and automating network-focused Method of Procedure (MOP) for reme-


diation and maintenance tasks.

What makes the SR-PCE controller so powerful is that it provided centralized SRTE visibil-
ity into multidomain topologies, something that SRTE routers are not able to deliver. North-
bound APIs allow SR-PCE to compute paths in real time. Because of the above, the SR-PCE
can construct SLA-aware path computations even across network domains while delivering
end-to-end network topology awareness. Again, you should not view SR-PCE as a single all-
overseeing device but rather think of a BGP Route-Reflector deployment model where intent 15
is centrally disseminated.
Figure 15-28 shows a screenshot taken from the Crosswork Network Controller’s GUI
console.

Figure 15-28 Crosswork Network Controller

The Cisco Crosswork Optimization Engine stands as a key element within the Crosswork
Automation Suite, offering real-time network optimization capabilities. Network operators
can enhance network utility and accelerate service deployment through dynamic Traffic
Engineering and proactive optimization. Working seamlessly with the Crosswork Optimi-
zation Engine, the WAN Automation Engine (WAE) caters to diverse aspects of capacity
management. It spans from long-term network engineering to capacity planning and Traffic
Engineering, ensuring optimal network operation under various conditions. Furthermore, the
WAN Automation Engine serves a valuable role in simulation analysis, aiding in the identifi-
cation of potential network hotspots during failure scenarios.
760 CCNP SPCOR 350-501 Official Cert Guide

Exam Preparation Tasks


As mentioned in the section “How to Use This Book” in the Introduction, you have a few
choices for exam preparation: the exercises here, Chapter 23, “Final Preparation,” and the
exam simulation questions in the Pearson Test Prep Software Online.

Review All Key Topics


Review the most important topics in this chapter, noted with the Key Topic icon in the
margin of the page. Table 15-5 lists a reference of these key topics and the page numbers
on which each is found.

Table 15-5 Key Topics for Chapter 15


Key Topic Description Page
Element Number
Table 15-2 LSD Label Ranges 729
Table 15-3 IS-IS TLVs 736
Example 15-3 Commands to Turn on Segment Routing in IS-IS 736
Table 15-4 OSPF Opaque LSAs 738
Figure 15-11 IPv6 Segment Routing Header Format 743
Figure 15-12 IPv6 Segment Identifier 743
Paragraph, Segment Routing Policy construction 749
Figure 15-17
Section Binding-SID (BSID) 750
Paragraph SRv6 encapsulation 753
Section Terms from Remote LFA Technology 754
Paragraph TI-LFA improvements 757
Paragraph Crosswork considerations 759

Define Key Terms


Define the following key terms from this chapter and check the answers in the glossary:

BGP control plane, Binding Segment Identifier (BSID), Candidate Paths, Extended
P-Space, Flex-Algo, Global Segments, IGP Adjacency Segment, IGP Prefix Segment, IS-IS
Control Plane, Label Distribution Protocol (LDP), Label Switching Database (LSD), Local
segment, OSPFv2 Control Plane, P-Space, Path Computation Client (PCC), Path Computa-
tion Element (PCE), Path Computation Element Protocol (PCEP), PCE-PCC architecture,
PQ node, Q-space, Segment Routing, Segment Routing Control Plane, Segment Rout-
ing Global Block (SRGB), SR-MPLS (Segment Routing based on MPLS data plane), SRv6
(Segment Routing based on IPv6 data plane), SRv6 control plane, Topology-Independent
Loop-free Alternate (TI-LFA)

Command Reference to Check Your Memory


This section includes the most important configuration and EXEC commands covered in this
chapter. You might not need to memorize the complete syntax of every command, but you
should be able to remember the basic keywords that are needed.
Chapter 15: Segment Routing 761

To test your memory of the commands, cover the right side of Table 15-6 with a piece of
paper, read the description on the left side, and then see how much of the command you can
remember.
The 350-501 exam focuses on practical, hands-on skills that are used by networking profes-
sionals. Therefore, you should be able to identify the commands needed to configure and
test. Note that not all commands are fully covered in the chapter, but their presence in the
table below should lead you to investigate them further to understand this technology.

Table 15-6 CLI Commands to Know


Task Command Syntax
Define Segment Routing Global Block RP/0/0/CPU0:P3(config)# segment-routing
Range global-block
Configure IS-IS advertisements to RP/0/0/CPU0:P3(config-isis)# distribute link-state
BGP-LS 15
Configure IS-IS to generate and accept RP/0/0/CPU0:P3(config-isis-af)# metric-style wide
only new-style type-length-value [transition] [ level { 1 | 2 } ]
(TLV) objects
Enable Segment Routing for IPv4 RP/0/0/CPU0:P3(config-isis-af)# segment-routing
addresses with MPLS data plane mpls
Enable topology-independent loop- RP/0/0/CPU0:P3(config-isis-if)# fast-reroute
free alternate (TI-LFA) path using the per-prefix
IP fast reroute (FRR) mechanism RP/0/0/CPU0:P3 (config-isis-if)# fast-reroute
per-prefix ti-lfa
Configure the Segment Routing RP/0/0/CPU0:P3(config)# segment-routing
Mapping Server (SRMS) mapping-server prefix-sid-map address-family ipv4
10.1.100.4/32 17000 range 100
Trace the routes to a destination in a RP/0/0/CPU0:P3# traceroute sr-mpls 10.1.100.2/32
Segment Routing network
Set the preference of Segment RP/0/0/CPU0:P3(config-isis-af)# segment-routing
Routing (SR) labels over Label mpls [sr-prefer]
Distribution Protocol (LDP) labels
Specify or advertise the prefix (node) RP/0/0/CPU0:P3(config)# router isis 100
segment ID (SID) as an index value in RP/0/0/CPU0:P3(config-isis)# interface loopback0
IS-IS
RP/0/0/CPU0:P3(config-isis-if)# address-family ipv4
unicast
RP/0/0/CPU0:P3(config-isis-if-af)# prefix-sid index 3
Specify or advertise the prefix (node) RP/0/0/CPU0:P3# configure
segment ID (SID) as an absolute value RP/0/0/CPU0:P3(config)# router ospf 1
in OSPF
RP/0/0/CPU0:P3(config-ospf)# area 0
RP/0/0/CPU0:P3(config-ospf-ar)# interface
loopback0
RP/0/0/CPU0:P3(config-ospf-ar-if)# prefix-sid
absolute 16003
762 CCNP SPCOR 350-501 Official Cert Guide

Task Command Syntax


Specify the Binding SID (BSID) RP/0/0/CPU0:P3# configure
allocation behavior RP/0/0/CPU0:P3(config)# segment-routing
RP/0/0/CPU0:P3(config-sr)# traffic-eng
RP/0/0/CPU0:P3(config-sr-te)# binding-sid explicit
fallback-dynamic
RP/0/0/CPU0:P3(config-sr-te)# policy SAMPLE
RP/0/0/CPU0:P3(config-sr-te-policy)# binding-sid
mpls 1000
Configure SRv6-TE locator and RP/0/0/CPU0:P3# configure
Binding SID (BSID) behavior RP/0/0/CPU0:P3(config)# segment-routing
traffic-eng
RP/0/0/CPU0:P3(config-sr-te)# srv6 locator loc1
binding-sid dynamic behavior ub6-encaps-reduced
Globally enable SRv6 RP/0/0/CPU0:P3(config)# segment-routing srv6
Configure the SRv6 Locator RP/0/0/CPU0:P3(config-srv6)# locators
RP/0/0/CPU0:P3(config-srv6-locators)# locator
myLoc1
RP/0/0/CPU0:P3(config-srv6-locator)# micro-segment
behavior unode psp-usd
RP/0/0/CPU0:P3(config-srv6-locator)# prefix
2001:0:8::/48

Review Questions
As a part of the review, we encourage you to provide a single-sentence answer (keep your
answers as short as possible) to the following questions. If you struggle to complete this
answer in a single sentence, this may indicate a lack of clarity or reveal gaps in your under-
standing. We have constructed these questions to help you consolidate this chapter’s infor-
mation and extract the essence of the covered content.
The answers to these questions appear in Appendix A. For more practice with exam format
questions, use the Pearson Test Prep Software Online.

1. How does the implementation of Segment Routing enhance network scalability and
simplify Traffic Engineering compared to traditional routing protocols?
2. In what ways can Segment Routing contribute to improved network resiliency and
faster convergence times, especially in the face of dynamic changes or failures?
3. How can Segment Routing adapt to support emerging trends such as 5G networks,
edge computing, and the increasing demand for network automation?
4. What specific scenarios or network topologies benefit the most from using the TI-LFA
loop-free backup path mechanism?
5. Can you name one key benefit of integrating SRv6 to meet the evolving demands of
modern applications, services, and emerging technologies?
Chapter 15: Segment Routing 763

Bibliography
S. Bryant, C. Filsfils, S. Previdi, M. Shand, and N. So. RFC 7490, Remote Loop-Free Alter-
nate (LFA) Fast Reroute (FRR), https://www.ietf.org/rfc/rfc7490.txt, IETF, April 2015.
P. Camarillo, Ed. RFC 8986, Segment Routing over IPv6 (SRv6) Network Programming,
https://www.ietf.org/rfc/rfc8986.txt, IETF, February 2021.
D. Dukes, Ed. RFC 8754, IPv6 Segment Routing Header (SRH), https://www.ietf.org/rfc/
rfc8754.txt, IETF, March 2020.
A. Farrel, J.-P. Vasseur, and J. Ash. RFC 4655, A Path Computation Element (PCE)-Based
Architecture, https://www.ietf.org/rfc/rfc4655.txt, IETF, August 2006.
C. Filsfils. Segment Routing, Part II: Traffic Engineering, Self-published, 2019 (ISBN:
978-1095963135).
C. Filsfils, K. Talaulikar, Ed., D. Voyer, A. Bogdanov, and P. Mattes. RFC 9256, Segment
Routing Policy Architecture, https://www.ietf.org/rfc/rfc9256.txt IETF, July 2022. 15
L. Ginsberg, Ed. RFC 8667, IS-IS Extensions for Segment Routing, https://www.ietf.org/
rfc/rfc8667.txt, IETF, December 2019.
LabN. RFC 5250, The OSPF Opaque LSA Option, https://www.ietf.org/rfc/rfc5250.txt,
IETF, July 2008.
J. Liste. A Guide to a Successful Segment Routing Deployment, Cisco Live Presentation,
2023.
S. Litkowski, A. Bashandy, C. Filsfils, P. Francois, and B. Decraene. Internet Draft, Topol-
ogy Independent Fast Reroute Using Segment Routing, https://www.ietf.org/archive/id/
draft-ietf-rtgwg-segment-routing-ti-lfa-11.html, IETF, June 2023.
P. Pan, G. Swallow, and A. Atlast, Eds. RFC 4090, Fast Reroute Extensions to RSVP-TE
for LSP Tunnels, https://www.ietf.org/rfc/rfc4090.txt, IETF, May 2005.
S. Previdi, Ed. RFC 8665, OSPF Extensions for Segment Routing, https://www.ietf.org/
rfc/rfc8665.txt, IETF, December 2019.
S. Previdi. RFC 8670, BGP Prefix Segment in Large-Scale Data Centers, https://
www.ietf.org/rfc/rfc8670.txt, IETF, December 2019.
S. Previdi and L. Ginsberg, Eds. RFC 8402, Segment Routing Architecture, https://
www.ietf.org/rfc/rfc8402.txt, IETF, July 2018.
Redback Networks, Inc. RFC 5305, IS-IS Extensions for Traffic Engineering, https://
www.ietf.org/rfc/rfc5305.txt, IETF, October 2008.
E. Rosen. RFC 8277, Using BGP to Mind MPLS Labels to Address Prefixes, https://
www.ietf.org/rfc/rfc8277.txt, IETF, October 2017.
A. Roy. Internet Draft, OSPFv3 LSA Extendibility, https://datatracker.ietf.org/doc/html/
draft-ietf-ospf-ospfv3-lsa-extend-23, IETF, January 2018.
Segment Routing website: https://www.segment-routing.net
This page intentionally left blank
Index

Numerics debugging, 135


IS-IS, 129–131
4G/5G, 31, 32–33 multi-area
802.1ad, 535–537 intra-area routing, 201–202
C-bridge component, 539 on IOS, 203–204
NNI ports, 539 on IOS XR, 204
PBB (provider backbone bridging), OSPF auto-cost reference, 202
539–541 OSPF costs, 202–203
ports, 537–538 states, 163
S-bridge component, 538–539 AFI (address family identifier), 111,
service provider bridges, 538 244
AFRINIC (African Network
Information Centre), 233
A aggregate-address command, 278–280
AAA (authentication, authorization, AIGP (Accumulated IGP) path
and accounting), 846–847 attribute, 275–276
abort command, 56 algorithm
constraint-based routing, 668
ABR (area border router), 11, 12
Dijkstra’s Shortest Path First, 162
AC (attachment circuit), 504
SPF, 110
ACL (access control list), 865–866,
946 Ansible, 1008
classification, 844–845 API (application programming
interface), 978–979
troubleshooting, 308–309
asynchronous, 979
address families
northbound, 979, 985
BGP, 244–246
REST (Representational State Transfer),
troubleshooting, 310–311
847–848, 979–980, 980
address-family command, 115, 246 security, 979
adjacency/ies. See also IS-IS; OSPF SOAP (Simple Object Access
(Open Shortest Path First) Protocol), 980–981
authentication southbound, 980, 985
on IOS, 185 synchronous, 979
on IOS XR, 184–185 APNIC (Asia-Pacific Network
Information Centre), 233
application hosting, 68–70 token-based, 848–849
archiving configurations, 45–46 automation. See also model-driven
areas programmability
IS-IS, 129, 152–155 Ansible, 1008
OSPF, 160–161 gRPC, 991–992
nonbackbone, 162 NSO (Network Services Orchestrator),
992–995
not-so-stubby, 196–199
RON (Routed Optical Networking), 31
stubby, 193–196
Secure ZTP (Zero Touch Provisioning),
totally not-so-stubby, 199–200 995–996
ARIN (American Registry for Internet components, 996
Numbers), 232
how it works, 997–998
ASBR (autonomous system boundary
initial setup, 996–997
router), 328, 624
AS (autonomous system), 231–232
ASM (Any Source Multicast), 424
iBGP vs. eBGP, 233–234
ASN (autonomous system number),
236–237 key characteristics, 232
Asdot format, 237–238 override, 308
asplain to asdot+ conversion, 237 troubleshooting, 310
asynchronous API, 979 Auto-RP, 410–416
AToM (Any Transport over MPLS),
498–500 B
LFIB (Label Forwarding Information
Base) backbone carrier, 654
verifying output, 501–502 backhaul, 34
xconnect endpoints, 502 BBU (baseband unit), 33
validating Layer 2 bindings, 502 BD (bridge domain), 541
VPWS validation, 500–501 BDR (backup designated router), 162,
xconnect configuration, 500 169–171
attach bit, 143–145 elections, 171–175
attack, DDoS (distributed denial-of- interface priority, 176–179
service), 849–851 Best Effort, 659
authentication Best External feature, BGP, 341–344
BGP, 310, 790–793 BFD (Bidirectional Forwarding
IS-IS, 148 Detection), 327, 917–918
configuring in IOS, 148–149 configurations, 919–921
configuring in IOS XR, 149–150 Echo function, 918
LSP, 150–152 BGP (Border Gateway Protocol), 76,
LDP, 778–780 231, 458
LDP session protection, 480–483 ABR (area border router), 12
OSPFv3, 218–221 ACL/firewalls, troubleshooting,
308–309
1034 BGP (Border Gateway Protocol)

Add-Path, 13 messages, 238–239, 344


address families, 244–246, 310–311 MRAI (Minimum Route
AFI (address family identifier), 244 Advertisement Interval), 317–319
ASN (autonomous system number), multipath, 273–274
236–237 neighbor states, 239–243
Asdot format, 237–238 Established, 243
Asplain to Asdot+ conversion, Idle, 243–244
237 next-hop tracking, 322–326
as-path prepending, 263–266 next-hop-self, 257–258
inbound, 267 NSR (non-stop routing), 347–348
outbound, 266–267 Origin Validation, 816
authentication, 790–793 path attributes, 248–249
authentication, troubleshooting, 310 AIGP (Accumulated IGP),
AS (autonomous system), 231–232 275–276
key characteristics, 232 local preference, 262–263
troubleshooting, 310 MED, 268–273
Best External feature, 341–344 origin, 267–268
community list, 290–291 weight, 261–263
community/ies, 282–284 path selection, 255–261, 274–275
cost, 292–293 peer template, 291–292
GSHUT, 290 PIC (Prefix-Independent Convergence),
Internet, 289 13, 333–340
no-advertise, 285–286 prefix advertisement, 246–248
no-export, 285, 296–297 using network statement, 250
user-defined, 286–289 using redistribution, 253–255
confederations, 304–306 prefix exchange, 89
eBGP, neighbor relationship, 235–236 prefix suppression, 812–815
EOR (End-of-RIB) message, 326 redistribution, 280
fast peering session deactivation, route aggregation, 277–280
319–322 route dampening, 328–333
GR (Graceful Restart), 344–346 route filtering, 803
Graceful Restart extensions, 912–913 base BGP configuration,
hold and keepalive timers, 320 803–805
iBGP, 233–234 distribute list with IOX XE,
805–807
and IGP interaction, 326–328
route map using IOS XE,
label mapping, 11–12 807–809
loop prevention, 306–307 RPL (Route Policy Language),
Allow As, 307 809–811
AS override, 308 route map, 76, 84–86
maximum-prefix, 811–812 route policy, 89–91, 251–253
CLNS (Connectionless Network Service) 1035

route reflection, 297–304 traffic filtering actions, 829


routing table, 256, 258 bgp graceful-restart command,
scalability, 297 345–346, 912–913
scanner, 322 bgp rpki server command, 816
security, 789–790 bgp safe-ebgp-policy command, 89
Segment Routing, control plane, bgp suppress-inactive command,
739–741 814–815
shadow route reflector, 340–341 BGP-Free Core, 476–477
speaker, 235 BGPsec, 821–822
table validation, 250–251 BiDir-PIM, 418–424
TTL (time to live), troubleshooting, Boolean operators, 100
309
botnet, 849–850
TTL security, 235–236, 793–794,
bridge group, 541
799–802
one hop, 796 broadcast network, IS-IS, 133–134
three hops, 798–799 BSID (Binding-SID), 750–751
two hops, 795–798 BSR (Bootsrap Router), 416, 442–447
verifying EBGP multihop, 795
update message, 514 C
VPLS signaling, 513–515, 517
bridge domain definition, 516 Candidate Path, 750
L2 instance verification, carrier-delay command, 327–328
517–518 CBTS (Class-Based Tunnel Selection),
label assignment, 518–521 716–720
learned routes, 516–517 CCMs (continuity check messages),
peering establishment, 515–516 532
service instance interface CDN (content delivery networks), 5
association, 516 CE (customer edge device), 456–457
bgp always-compare-med command, certification, MEF (Metro Ethernet
268–272 Forum), 8
bgp asnotation dot command, 238 CGNAT (Carrier-Grade NAT), 887–888
bgp deterministic-med command, channel, 21
270–271 Cisco Crosswork Optimization Engine,
BGP Flowspec, 822–824, 830 759
on the client, 828 Cisco IOS, 42
configuration before and after on the Cisco NOS, 40
client, 824–825 classic IOS XR, 49
configuration before and after on the
classification ACL, 844–845
server, 825–827
client/server model, 984
IOS XE client, 828–829
NLRI types, 829 CLNS (Connectionless Network
Service), 110
1036 cloud, virtualization

cloud, virtualization, 61 do show ip route, 153, 198–199


combining, IGP segments, 734–735 do show ip route isis, 80–82
command/s do show ip route ospf, 195–197
abort, 56 do show isis database, 153–154
address-family, 115, 246 do show isis neighbor, 137
aggregate-address, 278–280 do show policy-map interface,
BGP advertisement interval, 319 967–968
bgp always-compare-med, 268–272 do show running-config, 79, 85
bgp asnotation dot, 238 Docker, 65–68
bgp deterministic-med, 270–271 domain-id type, 582
bgp graceful-restart, 345–346, exit, 55
912–913 fast-external-fallover, 320–321
bgp rpki server, 816 fast-reroute, 757
bgp safe-ebgp-policy, 89 flush-delay-time, 911–912
bgp suppress-inactive, 814–815 interface loopback0, 138
Boolean operators, 98–100 ip access-list standard, 631
carrier-delay, 327–328 ip as-path access-list, 295
commit, 58 ip explicit-path, 680
commit replace, 54 ip igmp join-group, 362
copy startup-config running-config, 45 ip nat inside source list, 631
debug bgp ipv4 unicast updates, ip nat pool, 631
258–259 ip ospf area, 167–168
debug bgp ipv4 updates, 301–303 ip ospf network point-to-point, 460
debug ip bgp, 323 ip pim dr-priority, 409–410
debug ip igmp, 369–372 ip pim sparse-mode, 362
debug ip igmp snooping, 361–362 ip prefix-list, 101–103
debug ip ospf adjacency, 171–174 ip vrf vrf-name, 558–559
debug ip packet, 372–373 iperf, 69
debug ip pim, 428–429 ipv6 ospf authentication, 218–219
debug ip routing, 342–343 log-adjacency changes, 115
debug ip rsvp dump-messages path, max-metric router-lsa, 609
677–678 mpls bgp forwarding, 648, 657–658
debug ipv6 mld, 383–386 mpls ip, 465
debug isis adj-packets, 131, 135–137 mpls label protocol, 460
debug mpls traffic-eng forwarding- mpls ldp autoconfig, 465–466
adjacency, 691
mpls ldp discovery targeted-hello
do, 57 accept, 479
do debug ip igmp, 373–376 mpls traffic-eng reoptimize, 684
do show ip igmp groups, 377–379 mpls traffic-eng tunnels, 679
do show ip mroute, 407 neighbor ebgp-multihop, 235
command/s 1037

neighbor send-community, 291, 511 show clns, 113–114, 118


no bgp default route-target filter, 647 show configuration commit, 52
ping, 431, 633–634, 637–646 show configuration failed, 55–56
ping mpls ipv4, 488–489 show install active summary, 41–51
platform qos marker-statistics, 968 show install active summary
pwd, 55 command, 41–51
queue-limit, 961 show ip bgp, 812
redistribute connected, 575–576 show ip bgp vpnv4 vrf, 638
root, 55 show ip igmp groups, 430–431
router bgp 100, 233–236, 624–625, show ip igmp snooping groups,
637, 644–646, 650 363–364
router bgp autonomous system, 233 show ip igmp snooping querier, 362
router isis, 83 show ip interface brief, 168
send-rp-announce, 411 show ip mfib, 432–433
send-rp-discovery, 411 show ip mroute, 398, 403–405,
407–409, 432
service-policy input, 967–968
show ip nat translations, 640
show, 58
show ip ospf database, 199
show access-lists, 845
show ip ospf interface, 180
show bfd interfaces location, 921
show ip ospf interface brief, 168–169,
show bfd session, 919–921 205, 464
show bgp ipv4 unicast, 342–343 show ip ospf mpls ldp interface, 465,
show bgp ipv4 unicast longer prefixes, 466
261 show ip ospf neighbors, 174–175, 179,
show bgp l2vpn evpn summary, 549 206
show bgp l2vpn vpls all, 513 show ip pim, 397
show bgp nexthops, 325–326 show ip pim rp, 412, 419–421
show bgp summary, 236 show ip route, 82, 138, 141, 142,
show bgp vpnv4 unicast all, 626, 146–151, 148, 464
627–628, 637 show ip route isis, 83
show bgp vpnv4 unicast all command, show ip route ospf, 86, 471–472, 582
627–628 show ip route vrf, 463
show bgp vpnv4 unicast all summary, show ipv6 interface, 128
566–567
show ipv6 interface brief, 211
show bpg ipv4 unicast, 258, 334–340,
626 show ipv6 ospf neighbors, 219–220,
223–224
show bpg ipv4 unicast dampening
parameters, 330–333 show ipv6 route, 127, 128
show bpg ipv4 unicast summary, show ipv6 route ospf, 214
791–793 show isis adjacency, 130
show bridge-domain, 508, 523 show isis brief, 116
show bundle, 922 show isis database, 133–134
1038 command/s

show isis database detail, 125–127, show route isis, 142


143–145, 151–152 show rpl route-policy, 98
show isis hostname, 130 show running-config, 77, 124–125,
show isis instance, 117–118 222–223, 395–397
show isis interface, 118–120, 132 show running-config router bgp,
show isis neighbor, 116 800–802
show isis neighbor detail, 120, show version, 50
128–129, 150 show vfi, 522
show isis nsr, 913–917 show vrf, 560
show isis protocol, 113, 138 show xconnect all, 500
show isis protocols, 115–116 suppress-signaling-protocol ldp,
show isis topology, 139 515–516
show log, 116–117 traceroute mpls, 490
show mld groups, 386–387, 435–437 tunnel mpls traffic-eng forwarding-
adjacency, 689
show mpls forwarding, 571
tunnel mpls traffic-eng path-option
show mpls forwarding table, 463, 469, command, 683
471, 501, 570, 626–627
vrf definition, 559
show mpls l2transport binding, 508
xconnect encapsulation mpls, 499
show mpls l2transport vc, 507, 512,
523 commit commands, 58
show mpls label range, 467 commit replace command, 54
show mpls ldp bindings, 784–785 community list, 290–291
show mpls ldp bindings local, 467–468 community/ies, 282–284
show mpls ldp discovery, 461, 507 cost, 292–293
show mpls ldp igp sync, 485–486 GSHUT, 290
show mpls ldp neighbor, 478–479, Internet, 289
501, 779–780 no-advertise, 285–286
show mpls traffic-eng forwarding- no-export, 285, 296–297
adjacency, 690–691 user-defined, 286–289
show mpls traffic-eng tunnels,
conditional statement, route policy,
681–682, 686
91–94
show ospf database, 186, 188–189
confederations, BGP, 304–306
show ospf database router, 187–188
congestion avoidance, 961
show ospf virtual-links, 208–209
RED (Random Early Detection),
show ospfv3 database router, 214–216 962–964
show ospfv3 neighbors, 213 WRED (Weighted Random Early
show pim ipv6 group-map, 445–447 Detection), 964–966
show pim ipv6 neighbor, 438–439 constraint-based routing, 668
show pim ipv6 topology, 439–442 container/s, 63–64
show pim ipv6 tunnel info all, 439 application hosting, 68–70
show policy-map control-plane, 769 Docker, 65–68
data plane protection 1039

control plane eBGP neighborship building, 657


LDP, 778 enabling MPLS on interface, IOS XR,
Segment Routing, 735 658
BGP, 739–741 IOS XR host route, 657
IS-IS, 735–737 traceroute output and label
assignment, 658–659
OSPFv2, 737–739
CSPF (Constraint-based SPF),
SRv6, 742
672–673
conversion, Asplain to Asdot+, 237
customer carrier, 655
CoPP (Control Plane Policing), 768,
customer service instance, 527
769
C-VLAN (customer VLAN), 536
policy, 768–769
template, 770–772 CWDM (coarse wavelength-division
multiplexing), 22
verifying, 769
copy startup-config running-config
command, 45 D
core architecture
data center, 5
Metro Ethernet, 5
E-LAN, 7 data model, YANG, 986–987, 990–991
E-Line, 5–6 data plane protection, 854. See
also uRPF (Unicast Reverse Path
E-Tree, 7 Forwarding)
MPLS, 8–9 ACLs (access control lists), 865–866
intermediate LSR, 10 MACsec, 872–873
IP packet structure with MPLS configuration and verification,
encapsulation, 9 875–878
labels, 9–10 enabling on the first peer,
LSP (label switched path), 10 874–875
LSR (label switch router), 10 header, 873–874
Unified, 10–13 tags, 873
CoS (Class of Service), 944–945 RTBH (Remote Triggered Black Hole)
cost community, 292–293 filtering, 866–867
CPE (customer-premises equipment), bit bucket routes configured,
17 867–868
CPRI (Common Public Radio Interface), CE router verification, 870
33–34 PE router verification, 870–871
CPU, protecting, 767–768 source-based, 871–872
CsC (Carrier Supporting Carrier), trigger router configuration on
654–656 IOS XR, 868–869
BGP configuration from PE and CE, trigger router in action, 869–870
656 uRPF (Unicast Reverse Path
BGP VPNv4 output, 657 Forwarding), 855–856, 864
connectivity verification, 656 interface verification, 864–865
1040 data plane protection

Loose Mode, 856–857 VPLS (Virtual Private LAN Service),


operational modes, 856 505
setup, 858–861 distance-vector routing protocols, 75
Strict Mode, 857–858, 863–864 distribute list, IOS XE, 805–807
verification, 861–863 DNS64, 895–897
VRF Mode, 865 do command, 57
database do debug ip igmp command, 373–376
FRR (Fast Reroute), 700, 707 do show ip igmp groups command,
label switching, 728–729 377–379
LSA, Type 2, 188–189 do show ip mroute command, 407
DDoS (distributed denial-of-service) do show ip route command, 153,
attack, 849–851 198–199
debug bgp ipv4 updates command, do show ip route isis command, 80–82
301–303 do show ip route ospf command,
debug ip bgp command, 323 195–197
debug ip igmp command, 369–372 do show isis database command, 153,
154
debug ip igmp snooping command,
361–362 do show isis neighbor command, 137
debug ip ospf adjacency command, do show policy-map interface
171–174 command, 967–968
debug ip packet command, 372–373 do show running-config command, 79,
85
debug ip pim command, 428–429
Docker, 65–68
debug ip routing command, 342–343
DOCSIS (Data over Cable Service
debug ip rsvp dump-messages path
Interface Specification), 16
command, 677–678
architecture, 16
debug ipv6 mld command, 383–386
CPE (customer-premises equipment),
debug isis adj-packets, 131 17
debug isis adj-packets command, HFC (hybrid fiber coaxial) network,
135–137 17
debug mpls traffic-eng forwarding- standards, 17
adjacency command, 691
domain-id type command, 582
Dense mode, 392
DR (designated router), 162, 169–171
DevOps, 982, 1008
elections, 171–175
DiffServ, 660, 712–713, 715–716 interface priority, 176–179
Dijkstra’s Shortest Path First (SPF) Draft-Rosen model, 611–613
algorithm, 162
D-RAN (Distributed Radio Access
DIS (Designated Intermediate System), Network), 33
131–133
DS1 line, 21
discovery
DS3 line, 21
LDP, 461–462
FHR (First Hop Router) 1041

DSCP (Differentiated Services Code Ethernet, 5. See also Metro Ethernet


Point), 943–945 Ethernet CFM (Connectivity Fault
DSL (Digital Subscriber Line), 17–18 Management), 526–527
architecture, 18–19 CCMs (continuity check messages),
service provider offerings, 19 532
DS-Lite, 897–898 cross-check function, 532–533
Dual-Rate Three-Color Marker, customer service instance, 527
954–956 Ethernet, 526
dual-stack, single-topology IS-IS, loopback messages, 532
126–129 maintenance association, 529–536
DWDM (dense wavelength-division maintenance domain, 528–529
multiplexing), 5, 21–24 maintenance point, 529
dynamic NAT (Network Address MEPs (maintenance endpoints), 530
Translation), 886 inward-facing, 530
dynamic routing protocols, 75 outward-facing, 530–531
OAM interaction, 533–535
E traceroute messages, 532
Ethertype, 455–456, 539
E-Access, 498 E-Tree, 7, 497–498
eBGP (external Border Gateway E-UTRA (Evolved UMTS Terrestrial
Protocol), 233–234 Radio Access), 34
loop prevention, 306–307
EVC (Ethernet Virtual Circuit),
neighbor relationship, 235–236 496–497, 533
peering session deactivation, 319–322 Evolved IOS XR, 49
ttl-security feature, 235–236 EVPN (Ethernet VPN), 541–544
egress LSR, 10 MPLS-based data plane, 547–550
EIGRP (Enhanced Interior Gateway next-generation solutions for L2VPN,
Routing Protocol), 75 545–547
E-LAN, 7 route types, 546–547
elections, DR/BDR, 171–175 exit command, 55
E-Line, 5–6, 496 explicit join, 393
multiple point-to-point service, 6 Extended P-Space, 755–756
point-to-point service, 6
encapsulation, 753
enhanced distance-vector routing
F
protocols, 75 fast-external-fallover command,
EOR (End-of-RIB) message, 326 320–321
ERP (Ethernet Ring Protection), 525 fast-reroute commands, 757
error messages, RSVP, 676 FEC (Forwarding Equivalence Class),
Established neighbor state, 243 463
FHR (First Hop Router), 356
1042 FIB (Forwarding Information Base)

FIB (Forwarding Information Base),


462, 464–465 G
filter list, 295–296
G.8032 ERP (Ethernet Ring Protection)
firewall, interaction with BGP,
CFM (Connectivity Fault Management).
troubleshooting, 308–309 See also CFM (Connectivity Fault
flapping route, 328–329 Management)
Flex-Algo, 751–753. See also algorithm CCMs (continuity check
flows, 773–775, 999 messages), 532
flush-delay-time command, 911–912 inward-facing MEPs, 530
fronthaul, 33–34 loopback messages, 532
FRR (Fast Reroute), 14, 668, 695–696. maintenance association,
See also MPLS TE (MPLS Traffic 529–530
Engineering) maintenance domain, 528
backup tunnel, 697, 699–700 maintenance point, 529
database, 700 MEPs, 530
on IOS XR, 703, 710 MIPs, 531
backup tunnel configuration, 706 outward-facing MEPs, 530–531
CEs connectivity via traceroute, customer service instance, 527
705 Ethernet CFM, 526–529
database, 707, 711 instance, 526
label, 707–708 loop avoidance, 525
label stacking, 706, 708–710 R-APS (Ring Automatic Protection
LDP enable, 704–705 Switching), 525
LFIB validation, 705–706 RPL types, 525
MPLS TE configuration, global configuration mode, 44
703–704 global segments, 728–730
next hop resolving via static group filtering, IGMPv3, 376–379
route, 704
gRPC, 984, 991–992
traceroute output, 707
GSHUT community, 290
traceroute outputs before and
after failure, 711
label tracking, 703 H
Link Protection, 697
MP (Merger Point), 696 HCL (Hashicorp Config Language),
1008
NHOP (Next-Hop) backup tunnel, 696
headend, 679
NNHOP (Next-Next-Hop backup
tunnel), 696 header
Node Protection, 697–698 MACsec, 873–874
PLR (Point of Local Repair), 696 MPLS, 455
traffic reroute, 700–702 Hello messages, 459
tunnel configuration, 698–699 HFC (hybrid fiber coaxial) network, 17
Internet access, MPLS L3VPN 1043

hierarchical command-line structure, multipath, 274


IOS XR, 54–55 ICMP (Internet Control Message
hierarchical MPLS. See Unified MPLS Protocol), traffic policing, 947–953
hierarchical policing, 956–958 Idle neighbor state, 243–244
high availability, 905–906 IEEE 802.1ad. See 802.1ad
BFD (Bidirectional Forwarding IGMP (Internet Group Management
Detection), 917–918 Protocol), 354
configurations, 919–921 basic routing setup, 358–359
Echo function, 918 Leave message, 367–369
BGP GR (Graceful Restart), 344–346 Membership Query message, 362
BGP NSR (non-stop routing), 347–348 membership report, 364–366
NSF (Non-Stop Forwarding), 906–907 reference diagram, 358
Graceful Restart extensions for snooping, 359–366
BGP, 912–913 IGMPv1, 357
IS-IS, 907–910 IGMPv2, 357
OSPF, 910–913
IGMPv3, 358
NSR (non-stop routing), 913–917
group filtering, 376–379
H-VPLS (Hierarchical VPLS), turning on, 372–376
519–521
IGP (interior gateway protocol), 11
architecture, 522
and BGP interaction, 326–328
bridge domain
metric, 325
definition, 522
segments, 731
verifying, 523
Adjacency, 733
CE-to-CE connectivity, 524–525
combining, 734–735
checking VC l2transport, 523
Prefix, 731–733
core layer, 519
implicit null label, 474
edge layer, 520
inbound as-path prepending, 267
L2 VFI instance configuration, 523
label assignment, 524 infrastructure, 2, 17
split-horizon, 521–522 inside global address, 885
VFI definition, 521 inside local address, 885
hypervisor, 61 Inter-AS MPLS L3VPN
option A, 641–643

I option AB, 652–654


option B, 643–648
IANA (Internet Assigned Numbers option C, 649–652
Authority), 355 interface loopback0 command, 138
iBGP (internal Border Gateway intermediate LSR, 10
Protocol), 233–234 Internet access, MPLS L3VPN
versus eBGP, 306–307 extranet with Internet-VRF, 635–638
separate PE-CE interface, 634–635
1044 Internet access, MPLS L3VPN

VRF-aware NAT, 639–640 weight attribute configuration,


VRF-specific default route, 629–634 262
Internet community, 289 command options, 53–54
intra-area routing, 201–202 commit labels, 53
intradomain LSP (label switched path), Evolved, 49
12–13 exiting the configuration mode, 56–57
IntServ, 659 export-map configuration, 604
inward-facing MEPs, 530 FRR (Fast Reroute), 703, 710
IOS backup tunnel configuration, 706
IS-IS CEs connectivity via traceroute,
705
authentication, 148–149
database, 707, 711
multitopology, enabling, 124
label, 707–708
LDP configuration, 562–563
label stacking, 706, 708–710
OSPF
LDP enable, 704–705
adjacency authentication, 185
LFIB validation, 705–706
multi-area adjacencies, 203–204
MPLS TE configuration,
starting, 164–168 703–704
IOS XE, 45 next hop resolving via static
archiving and replacing configurations, route, 704
45–46 traceroute output, 707
BGP Flowspec client, 828–829 traceroute outputs before and
BGP route filtering after failure, 711
distribute list, 805–807 hierarchical command-line structure,
route map, 807–809 54–55
copying and pasting, 45 IS-IS
global configuration mode, 44 authentication, 149–150
IS-IS configuration, 113–115, 121 configuration, 115–120, 121
MPP (Management Plane Protection), single-topology, enabling, 124
838–840 l2transport interface configuration,
as-path prepending, 264 509
PIEs (package installation envelopes), LNT, 50–51
48 microkernel architecture, 47
privileged EXEC mode, 44 MPP (Management Plane Protection),
reverting configurations with a revert 840–843
timer, 47 OSPF
user EXEC mode, 43 adjacency authentication,
IOS XR, 47 184–185
BGP multi-area adjacencies, 204
prefix exchanges, 89 starting, 164
route filtering, 809–811 as-path prepending, 264–265
IS-IS 1045

SMU (software maintenance upgrade), MAP-E, 898–899


49 MAP-T, 899–900
software packages, 48 NAT, 884–886
two-stage commit, 51–54 NAT64, 888
virtualized, 49 outside NAT, 887–888
VPLS L2VPN configuration, 509 PAT, 886–887
VPLS validation, 509 stateful NAT64, 892–895
VRF configuration, 560–561 stateless NAT64, 8892
IoT (Internet of Things), 4 ipv6 ospf authentication command,
ip access-list standard command, 631 218–219
ip as-path access-list command, 295 i-SID (service instance identifier), 541
ip explicit-path command, 680 IS-IS, 108–109
ip igmp join-group command, 362 adjacencies, 129–131, 135
ip nat inside source list command, 631 areas, 129, 152–155
ip nat pool command, 631 attach bit, 143–145
ip ospf area command, 167–168 authentication, 148
ip ospf network point-to-point configuring in IOS, 148–149
command, 460 configuring in IOS XR, 149–150
ip pim dr-priority command, 409–410 broadcast network, 133–134
ip pim sparse-mode command, 362 CLNS (Connectionless Network
IP Precedence, 943–944 Service), 110
ip prefix-list command, 101–103 configuration, 112–113
desired results, 121
ip vrf vrf-name command, 558–559
IOS XE, 113–115
iperf command, 69
IOS XR, 115–120
IPFIX (IP Flow Information Export),
999–1000 control plane, 735–737
Exporter Map configuration, 1000 DIS (Designated Intermediate System),
131–133
interface attachment, 1001
extensions for MPLS TE, 671–672
Monitor Map configuration,
999–1000 hierarchical design, 110
Sampler Map configuration, 1000 interface MTU mismatch,
troubleshooting, 136–137
validation, 1001
levels, 141
IPv6, 884
metrics, 137–141
Flow Label, 971–972
multitopology, enabling on IOS, 124
segment routing over, 15–16
NET (Network Entity Title) address,
transitions 111
CGNAT (Carrier-Grade NAT), network types, 131
887–888
NSF (Non-Stop Forwarding), 907–910
DNS64, 895–897
overload bit, 146–148
DS-Lite, 897–898
point-to-point network, 134
1046 IS-IS

pseudonode, 132 switch router, 455


route advertisement, 141–146 transport, 564
route map, 77, 80–83 types, 457
Segment Routing, turning on, 736–737 VPN, 564
single-topology LACNIC (Latin America and Caribbean
dual-stack, 126–129 Network Information Centre), 233
enabling on IOS, 124 LACP (Link Aggregation Control
enabling on IOS XR, 124–126 Protocol), 925–933
single-topology transition mode, LAG (Link Aggregation Group),
122–123 921–924
SPF algorithm, 110 lambda, 21
TLV (Type/Length/Value) extensions, LDP (Label Distribution Protocol), 12,
110 458, 505, 562, 727
troubleshooting, 155 authentication, 778–780
ISP (Internet service providers), autoconfig, 465–467
services, 4–5 co-existence with SRv6, 746–748
ITY-T G.8032 Ethernet Ring Protection configuring on IOS, 562–563
Switching. See G.8032 ERP configuring on IOS XR, 563–564
(Ethernet Ring Protection) control plane, 778
discovery parameters, 461
J-K Hello messages, 459
IGP synchronization, 483–488
join-group message, 356 inbound filtering, 781–783
JSON (JavaScript Object Notation), inbound label control, 471
986, 987
label allocation filtering, 783–789
JWT (JSON Web Token), 848–849
manipulating the router ID, 461
Keepalive message, BGP, 238
outbound filtering, 781
kernel architecture, 42 outbound label control, 469
session establishment, 459–461
L session protection, 477–483
verifying discovery, 462
label mapping, BGP, 11–12 VPLS signaling
label/s, 9–10 autodiscovery, 509–513
advertisement, 469–476 manual, 502–509
assignment, 458–464, 467–468 Leave message, IGMP, 367–369
FRR (Fast Reroute), 707–708 LER (label edge router), 457
header fields, 455
levels, IS-IS, 141
implicit null, 474
LFIB (Label Forwarding Information
reserved, 455 Base), 462
stacking, 457–458 output, 469, 470
verifying output, 501–502
message/s 1047

LHR (Last Hop Router), 356 egress, 10


LIB (Label Information Base), 462 intermediate, 10
Link Protection, 694–697
link-state routing protocols, 75–76,
108. See also IS-IS; OSPF (Open
M
Shortest Path First) MACsec, 872–873
Linux kernel, IOS XE, 42 configuration and verification,
local paths, BGP, 263 875–878
local preference attribute, 262–263 enabling on the first peer, 874–875
local segments, 730 header, 873–874
log-adjacency changes command, 115 tags, 873
loop avoidance, ERP (Ethernet Ring maintenance association, 529–530
Protection), 525 maintenance point, 529
loop prevention, BGP, 306–307 MAM (Maximum Allocation Model),
Allow As, 307 713–714
AS override, 308 MAP-E (Mapping of Address and Port
loopback messages, 532 Encapsulated), 898–899
loopback network, OSPF, 183–185 MAP-T (Mapping of Address and Port
Translated), 899–900
Loose uRPF, 856–857
max-metric router-lsa command, 609
LPTS (Local Packet Transport
Services), 772–773 MDT (multicast distribution tree), 611
configuring policer, 7778 MED (Multi-Exit Discriminator)
attribute, 268–273
default policing, 7777
MEF (Metro Ethernet Forum), 8
flows, 773–775
identification, 775–777 Membership Query message, 362
keeping LDP safe, 778 membership report, IGMP, 364–366
LSA (link-state advertisement), MEPs (maintenance endpoints)
160–161, 162 inward-facing, 530
Opaque, 737–738 outward-facing, 530–531
OSPFv3, 210 message/s
Type 1 router links, 186–188 BGP, 238–239
Type 3, 189 EOR (End-of-RIB), 326
Type 4, 191–192 Open, 344
Type 5, 190–191 BGP update, 514
LSD (Label Switching Database), CFM (Connectivity Fault
728–729 Management)
LSP (label switched path), 10, 12, 624 CCMs (continuity check
messages), 532
intradomain, 12–13
loopback, 532
MD5 authentication, 150–152
traceroute, 532
LSR (label switch router), 10, 457
Hello, 459
1048 message/s

IGMP XML elements, 989


Leave, 367–369 RESTCONF, 984
Membership Query, 362 YANG, 984
join-group, 355 MP (Merger Point), 696
MLDv1, 379–380 MP-BGP, 564–565
traceback, 843–844 BGP VPNv4 configuration
metrics on IOS, 565
IGP, 325 on IOS XR, 566
IS-IS, 137–141 ICMP connectivity, 565
Metro Ethernet, 496 VRF definition and interface
E-Access, 498 interaction on IOS XR, 566
E-LAN, 7, 497 MPLS (Multiprotocol Label Switching),
E-Line, 5–6, 496 8–9, 454. See also AToM (Any
Transport over MPLS)
multiple point-to-point service, 6
CE (customer edge device), 456–457
point-to-point service, 6
enabling on a physical interface, 460
E-Tree, 7, 497–498
Ethertype, 455–456
midhaul, 34
FEC (Forwarding Equivalence Class),
MIPS (maintenance intermediate 463
points), 531
FIB (Forwarding Information Base),
MLD (Multicast Listener Discovery), 462, 464–465
379 header, 455
messages, 379–380 IP packet structure with MPLS
reference diagram, 380–381 encapsulation, 9
MLDv2 label/s, 9–10, 14–15, 455
enabling on IOS routers, 381–382, advertisement, 469–476
395–397 assignment, 458–464, 467–468
joining multicast groups, 382–392 header fields, 455
mobility radio technology implicit null, 474
4G/5G, 31 reserved, 455
differences between 4G and 5G, 32–33 stacking, 457–458
packet core, 32 types, 457
xHaul, 33–35 LDP, 562
model-driven programmability, 982 autoconfig, 465–467
client/server model, 984 configuring on IOS, 562–563
gRPC, 984 configuring on IOS XR, 563–564
NETCONF, 984, 988 discovery parameters, 461
agent, 985 IGP synchronization, 483–488
capabilities, 988–989 inbound label control, 471
client/server communication, manipulating the router ID, 461
985
session establishment, 459–461
MPLS L3VPN 1049

session protection, 477–480 enabling MPLS on interface, IOS


verifying discovery, 462 XR, 658
LER (label edge router), 457 IOS XR host route, 657
LFIB (Label Forwarding Information traceroute output and label
Base), 462, 469, 470 assignment, 658–659
LIB (Label Information Base), 462 EIGRP PE-CE routing
LSP (label switched path), 10 EIGRP configuration, 591
LSR (label switch router), 457 EIGRP routing table output,
591–592
OAM (Operation, Administration, and
Maintenance), 488–491 EIGRP topology output,
592–593
PHP (penultimate hop popping),
473–476 SoO (Site of Origin), 593–594
ping, 488–489 import/export maps, 601
QoS, 660–661 export-map configuration on
IOS XR, 604
Pipe mode, 661–662
route-target import/export
Short Pipe mode, 662 validation, 601–603
Uniform mode, 661 Inter-AS
RIB (Routing Information Base), 462, option A, 641–643
464–465
option AB, 652–654
seamless, 277
option B, 643–648
traceroute, 490
option C, 649–652
Unified, 10–13. See also Unified
MPLS Internet access, 629
VPLS (Virtual Private LAN Service), extranet with Internet-VRF,
505 635–638
mpls bgp forwarding command, 648, separate PE-CE interface,
657–658 634–635
MPLS EXP field, 945–946 VRF-aware NAT, 639–640
VRF-specific default route,
mpls ip command, 465
629–634
MPLS L3VPN, 556, 576–577
NG mVPN, 614
BGP PE-CE routing, 595–596
OSPF PE-CE routing, 577–578
BGP allowas-in, 596–597
BGP routing table for VRF
BGP AS-override, 597 SPCOR, 584
BGP AS-PATH loop prevention, BGP VPN v4 output, 580–581
596
connectivity verification,
CsC (Carrier Supporting Carrier), 579–580
654–656
down bit, 589–591
BGP configuration from PE and
mutual redistribution, 579
CE, 656
OSPF basic configuration,
BGP VPNv4 output, 657
577–578
connectivity verification, 656
OSPF database output, 581
eBGP neighborship building, 657
1050 MPLS L3VPN

OSPF domain ID manipulation, connectivity verification, 570


582–583 default route configuration, 569
OSPF domain-ID configuration FIB output, 571–572, 573
on IOS XR, 584–585
ICMP failure, 573–575
OSPF instance per VRF
label assignment for VPNv4, 572
definition, 578
LFIB output, 570–571
OSPF process ID and domain ID
verification, 580 LFIB verification for a certain
prefix, 572–573
OSPF process ID verification,
583 redistribution under BGP for a
specific VRF, 569
OSPF router-ID configuration,
584 RIB output, 569–570
route table for OSPF output, static route under VRF
581–582 configuration, 568
route table OSPF output traceroute output, 555–573
verification, 583 verifying connectivity through
VRF related verification VRF, 568
commands, 578–579 mpls label protocol command, 460
OSPF PE-CE routing with backdoor MPLS label stacking, 612
link, 585–586
mpls ldp autoconfig command,
OSPF metric manipulation, 588 465–466
OSPF neighbors output, 587 mpls ldp discovery targeted-hello
OSPF network advertisement, accept command, 479
585–587 MPLS TE (MPLS Traffic Engineering),
sham-link establishment, 667–670
586–587 constraint-based routing, 668
router reflector deployment, 607–610 CSPF (Constraint-based SPF),
RT (route target) filtering, 598 672–673
BGP VPN, route reflector, Forwarding Adjacency, 687–688
600–601 configuration, 689
debug BGP VPNv4 updates debug output, 691–692
output, 598
detailed output, 690–691
IOS XR BGP retain route target,
599 holdtime, 691
turning off BGP default route- traceroute output, 688
target filter, 598–600 FRR (Fast Reroute), 668, 695–696
RTC (Route Target Constraint), 604 backup tunnel, 697
BGP rtfilter neighborship backup tunnel configuration,
establishment, 606–607 699–700
debug BGP VPNv4 unicast backup tunnel configuration, IOS
update output, 605–606 XR, 706
static PE-CE routing, 567 CEs connectivity via traceroute,
BGP VPNv4 output verification, IOS XR, 705
571 database, 700, 707, 711
mpls traffic-eng tunnels command 1051

on IOS XR, 703 interface tunnel with explicit


IOS XR, 710 path, IOS XR, 680
label, 707–708 IPG TE-related commands, 679
label stacking, 706 MPLS forwarding table output,
686–687
label stacking, IOS XR, 708–710
OSPF learned routes, 684
label tracking, 703
path option manipulation,
LDP enable, IOS XR, 704–705 683–684
LFIB validation, IOS XR, path options, 683
705–706
RSVP configurations, 679m
Link Protection, 697
static routes for placing traffic on
MP (Merger Point), 696 the tunnel, 685–686
MPLS TE configuration, IOS tailend, 679
XR, 703–704
traceroute outputs between CEs,
next hop resolving via static 685
route, IOS XR, 704
traffic engineeering tunnel
NHOP (Next-Hop) backup details, 681–683
tunnel, 696
tunnel configuration, 684–685
NNHOP (Next-Next-Hop backup
tunnel), 696 tunnel details, 683
Node Protection, 697–698 QoS (Quality of Service), 712
PLR (Point of Local Repair), 696 CBTS (Class-Based Tunnel
Selection), 716–720
traceroute output, IOS XR, 707
DiffServ, 715–716
traceroute outputs before and
after failure, IOS XR, 711 DS-TE, 712–713
traffic reroute, 700–702 MAM (Maximum Allocation
Model), 713–714
tunnel configuration, 698–699
PBTS (Policy-Based Tunnel
IS-IS extensions, 671–672 Selection), 717–720
OSPF extensions, 670–671 RDM (Russian Dolls Model),
PCE (Path Computation Element), 668 714–715
Per-VRF, 692–693, 694–695 resource reservation, 668
placing traffic in a tunnel, 678, 686 RSVP (Resource Reservation
Autoroute Announce, 678 Protocol), 673–674
connectivity validation between error messages, 676
CEs, 681 PATH message, 674–675
end-to-end connectivity, RESV message, 675
678–679 tear messages, 676–678
forcing soft optimization, 684 tunnels, 668
Forwarding Adjacency, 678
mpls traffic-eng reoptimize command,
headend, 679 684
interface tunnel with explicit mpls traffic-eng tunnels command, 679
path, IOS and IOS XE,
679–680
1052 MPP (Management Plane Protection)

MPP (Management Plane Protection), MLD (Multicast Listener Discovery),


838 379
in IOS XE, 838–840 messages, 379–380
in IOS XR, 840–843 reference diagram, 380–381
MQC (Modular Quality of Service MLDv2
Command-Line Interface), 939–940. enabling on IOS routers,
See also QoS (Quality of Service) 381–382
hierarchical policing, 956–958 joining multicast groups,
tail drop, 961–962 382–392
MRAI (Minimum Route Advertisement turning on, 395–397
Interval), 317–319 PIM (Protocol-Independent Multicast),
MTU (maximum transmission unit), 354
troubleshooting, 311 Auto-RP, 410–416
multi-access network, OSPF, 169–170 Bidirectional, 418–424
multi-area adjacencies, 200–201 BSR (Bootsrap Router), 416,
442–447
costs, 202–203
mapping a group to a certain RP,
intra-area routing, 201–202
418
on IOS, 203–204
SPT switchover, 405–410
OSPF auto-cost reference, 202
PIM-SM, 392
multicast, 352, 354, 354–355. See also
connecting the multicast receiver,
MVPN (multicast VPN) 400–402
Any Source, 424 connecting the multicast source,
Dense mode, 392 398–400
FHR (First Hop Router), 356 multicast trees, 392–395
IGMP (Internet Group Management PIM SPT switchover, 405–410
Protocol), 356–357 RP trees, 395
basic routing setup, 358–359 RPs, 410
Leave message, 367–369 PIMv6, 433–437
membership report, 364–366 Source-Specific, 424–425
reference diagram, 358 initializing, 427–428
snooping, 359–366 launching traffic from source,
IGMPv1, 357 431–433
IGMPv2, 357 turning on, 425–427
IGMPv3, 358 static RP, 439–442
group filtering, 376–379 mVPN (multicast VPN), 610–611
turning on, 372–376 BGP/MPLS, 615–617
important address ranges, 355 Draft-Rosen model, 611–613
join-group message, 356 MDTs (multicast distribution trees),
LHR (Last Hop Router), 356 611
MAC-to-IP address mapping, 355 NG multicast, 614
NOS (network operating systems) 1053

PIM/GRE, 613–614 gRPC, 984


service types, 611 NETCONF, 984, 988–989
RESTCONF, 984
N YANG, 984
orchestration and monitoring systems,
NAT (Network Address Translation) 984–985
Carrier-Grade, 887–888 security, 766
dynamic, 886 streaming telemetry, 1001–1004
inside global address, 885 network statement, 164–168,
249–250, 253, 267, 576
inside local address, 885
outside, 887–888 network types, OSPF, 181–185
outside global address, 885 next-hop tracking, BGP, 322–326
outside local address, 885 next-hop-self statement, 257–258
static, 885–886 NFV (network function
virtualization), 4
VRF-aware, 639–640
NFVI (Network Functions
NAT64, 888
Virtualization Infrastructure),
stateful, 892–895 61–63
stateless, 8892 NHOP (Next-Hop) backup tunnel, 696
NCS 540 Fronthaul router, 37 NNHOP (Next-Next-Hop backup
neighbor ebgp-multihop command, 235 tunnel), 696
neighbor send-community command, no bgp default route-target filter
291, 511 command, 647
neighbor states, BGP, 239–243 no-advertise community, 285–286
Established, 243 Node Protection, 697–698
Idle, 243–244 Node SID (Segment Identifier), 729
NET (Network Entity Title) address, no-export community, 285, 296–297
111 nonbackbone areas, OSPF, 162
NETCONF, 984, 988 northbound API, 979, 985
agent, 985
NOS (network operating systems), 40.
capabilities, 988–989 See also IOS; IOS XE; IOS XR
client/server communication, 985 Cisco IOS, 42
XML elements, 989 IOS XE, 45
NetFlow, 845–846, 999. See also archiving and replacing
IPFIX (IP Flow Information Export) configurations, 45–46
network copying and pasting, 45
data model, YANG, 986 global configuration mode, 44
flows, 999 Linux kernel, 42
model-driven programmability, privileged EXEC mode, 44
982. See also model-driven user EXEC mode, 43
programmability
IOS XR, 47
client/server model, 984
1054 NOS (network operating systems)

classic, 49 Open message, 238, 344


command options, 53–54 O-RAN (Open Radio Access Network),
commit labels, 53 36–37
Evolved IOS XR, 49 origin attribute, 267–268
exiting the configuration mode, OSPF (Open Shortest Path First),
56–57 75–76, 108–109, 193
hierarchical command-line adjacency/ies
structure, 54–55 authentication, 184–185
LNT, 50–51 multi-area, 200–206
microkernel architecture, 47 states, 163
PIEs (package installation areas, 160–161
envelopes), 48
not-so-stubby, 196–199
SMU (software maintenance
stubby, 193–196
upgrade), 49
totally not-so-stubby, 199–200
software packages, 48
BDR (backup designated router),
two-stage commit, 51–54
169–171
virtualized, 49
elections, 171–175
kernel architecture, 42
interface priority, 176–179
Notification message, BGP, 238 DR (designated router), 169–171
not-so-stubby areas, 196–199 elections, 171–175
NSEL (NSAP Selector), 111 interface priority, 176–179
NSF (Non-Stop Forwarding), 906–907 extensions for MPLS TE, 670–671
Graceful Restart extensions for BGP, LSA
912–913
Opaque, 737–738
IS-IS, 907–910
Type 1, 186–188
OSPF, 910–913
Type 2, 188–189
NSO (Network Services Orchestrator),
Type 3, 189
992–995
Type 4, 191–192
NSR (non-stop routing), 347–348,
913–917 Type 5, 190–191
LSAs (link-state advertisements), 162

O multi-access network, 169–170


network types, 181–185
OADM (optical add/drop multiplexer), nonbackbone areas, 162
22 NSF (Non-Stop Forwarding), 910–913
OAM (Operation, Administration, packet types, 162–163
and Maintenance), 526–527. See route advertisement, 186–193
also CFM (Connectivity Fault route map, 76, 86
Management)
SPF tree, 162
OAM manager, 533–535 starting
Opaque LSAs, 737–738 with interface-specific
commands, 168–169
PIM-SM 1055

on IOS, 164–168 as-path prepending, 263–266


on IOS XR, 164 inbound, 267
tiebreaker for equal-cost external outbound, 266–267
routes, 192–193 path selection, BGP, 255, 274, 275
timers, 179–181 path vector routing algorithm, 76. See
topology, 161 also BGP
troubleshooting, 225 PBB (provider backbone bridging),
virtual links, 206–209 539–541
OSPFv2, control plane, 737–739 configuration, 542–543
OSPFv3, 209–210 EVPN (Ethernet VPN) components,
authentication, 218–221 541–543
configuring, 211–214 verifying, 543
LSA types, 210 PBTS (Policy-Based Tunnel Selection),
717–720
LSDB view, 216–217
PCE (Path Computation Element), 668
multiple instances, 221–224
PCEP (Path Computation Element
Options field bits, 214–216
Protocol) controller, 15
Router LSA bits, 217–218
PCE-PCC architecture, 757–759
outbound as-path prepending,
peer template, 291–292
266–267
Per-VRF MPLS TE, 692–693,
outside global address, 885
694–695
outside local address, 885
PHP (penultimate hop popping), 455,
outside NAT (Network Address 473–476
Translation), 887–888
PIC (Prefix-Independent Convergence),
outward-facing MEPs, 530–531 333–340
overload bit, IS-IS, 146–148 PIEs (package installation envelopes),
48
P PIM (Protocol-Independent Multicast),
354
PAT (Port Address Translation), Auto-RP, 410–416
886–887 Bidirectional, 418–424
path attributes, 248–249 BSR (Bootsrap Router), 416, 442–447
AIGP (Accumulated IGP), 275–276 mapping a group to a certain RP, 418
local, 263 SPT switchover, 405–410
local preference, 262–263 PIM-SM, 412
MED (Multi-Exit Discriminator), connecting the multicast receiver,
268–273 400–402
origin, 267–268 connecting the multicast source,
as-path prepending, 263–267 398–400
weight, 261–263 explicit join, 393
PATH message, RSVP, 674–675 multicast trees, 392–393
shared, 394–395
1056 PIM-SM

source-based, 393–394
requirements for support in an mVPN,
Q
614
Q-in-Q encapsulation, 535
RP trees, 395
QoS (Quality of Service), 659,
RPs (rendezvous points), 410 938–939
PIMv2, 437–439 Best Effort, 659
PIMv6, 433–437 CBTS (Class-Based Tunnel Selection),
ping, 431, 633–634, 637–646 716–720
ping mpls ipv4 command, 488–489 congestion avoidance, 961
platform qos marker-statistics RED (Random Early Detection),
command, 968 962–964
PLE (Prive Line Emulation), 21 WRED (Weighted Random Early
Detection), 964–966
PLR (Point of Local Repair), 696
DiffServ, 660
point-to-point network, IS-IS, 134
IntServ, 659
policy. See also QoS (Quality of
Service) IPv6 Flow Label, 971–972
-based QoS, 660 MPLS, 660–661
CoPP, 768–769 Pipe mode, 661–662
route, 251–253 Short Pipe mode, 662
Segment Routing, 749, 750 Uniform mode, 661
trigger, 869 MPLS TE
ports, 802.1ad, 537–538 DiffServ-TE solution, 712–713
MAM (Maximum Allocation
POTS (plain old telephone service), 18
Model), 713–714
PQ Node, 754–755
RDM (Russian Dolls Model),
prefix advertisement, BGP, 246–248 714s-716
using network statement, 250 PBTS (Policy-Based Tunnel Selection),
using redistribution, 253–255 717–720
prefix list, 100–103 policy-based, 660
prefix set, 103–105 priority queuing, 958
priority queuing, 958 traffic classification, 940–942
privileged EXEC mode, 44 802.1Q VLAN tag, 942
provider bridge, 535–537 CoS (Class of Service), 944–945
pseudonode, 132 DSCP (Differentiated Services
Code Point), 943–945
pseudowire, 6
IP Precedence, 943–944
P-Space, 754
matching on access-lists, 946
punt a packet, 491
MPLS EXP field, 945–946
pwd command, 55 ToS (Type of Service) byte,
943–945
route map 1057

values for class of service, RESV message, RSVP, 675


942–943 RFC 1195, 138
traffic marking, 966–967 RFC 1918, 866
imposing multiple markings, RFC 2827, 866
968–969
RFC 3032, 476
internal marking, 969–971
RFC 3107, 11, 12, 624
marking packets directly on the
policy map, 967–968 RFC 3330, 866
traffic policing, 946–947 RFC 3535, 983
Dual-Rate Three-Color Marker, RFC 3787, 143
954–956 RFC 3810, 380
hierarchical, 956–958 RFC 4655, 758
ICMP traffic, 947–953 RFC 5575, 829
Single-Rate Three-Color Marker, RFC 7490, 754
953–954
RFC 8955, 829
Single-Rate Two-Color Marker,
953 RIB (Routing Information Base), 462,
464–465
traffic shaping, 958–960
ring ports, 525
Q-Space, 754–755
RIPE NCC (Réseaux IP Européens
queue-limit command, 961
Network Coordination Centre), 232
RIR (Regional Internet Registry),
R 232–233
ROA (Route Origin Authorization)
RAN (Radio Access Network) records, 815–816
O-RAN (Open Radio Access ROADM (reconfigurable optical
Network), 36–37 add-drop multiplexer), 22
split points, 35 RON (Routed Optical Networking),
ranging, xPON, 25–26 27–31
R-APS (Ring Automatic Protection root command, 55
Switching), 525 route advertisement
RD (route distinguisher), 557–558 IS-IS, 141–146
RDM (Russian Dolls Model), 714–715 OSPF, 186–193
RED (Random Early Detection), route aggregation, BGP, 277–280
962–964 route dampening, BGP, 328–333
redistribute connected command, route map, 77
575–576
applying, 81–82
redistribution, 280
BGP, 84–86, 261–262
regular expressions, 294–295
conditional matching, 78–79
reserved labels, 455
IOS XE, 807–809
REST API, 847–848, 979, 980
IS-IS, 80–83
RESTCONF, 984 modifying, 82–83
1058 route map

OSPF, 86 routing, 74–75


RPKI, 820–821 routing protocol/s, 155
sequence numbers, 77–78 distance-vector, 75
taking action on matched components, dynamic, 75
79–80 enhanced distance-vector, 75
template, 77 link-state, 75–76, 108. See also IS-IS;
route policy, 251–253 OSPF (Open Shortest Path First)
BGP, 89–91 path vector, 76. See also BGP
conditional statement, 91–94 routing table, BGP, 256
in configuration mode, 100 RP (rendezvous point), 410, 418
with an inline set, 95 RP trees, PIM-SM, 395
prefix lists, 100–103 RPC (remote procedure call), 981–982
with a prefix set, 95–97 RPKI (Resource Public Key
prefix sets, 103–105 Infrastructure), 815
route reflection, 297–304 architecture, 817
MPLS L3VPN, 607–610 prefix download, 819
shadow, 340–341 prefix marking and usage, 819–820
router. See also NOS (network ROA (Route Origin Authorization)
operating systems) records, 815–816
area border, 12 route map, 820–821
autonomous system boundary, 328, router configuration, 818–819
624 servers, 818
Bootstrap, 416 RPL (ring protoection link), 525
CPU, protecting, 767–768 RPL (Route Policy Language), 88,
First Hop, 356 809–811. See also route policy
label edge, 457 RPs (rendezvous points), 410,
label switch, 10, 455, 457 439–442
egress, 10 RSVP (Resource Reservation Protocol),
intermediate, 10 458, 673–674, 727
Last Hop, 356 error messages, 676
NCS 540 Fronthaul, 37 PATH message, 674–675
OSPF, 162 RESV message, 675
streaming telemetry, 1001–1004 tear messages, 676–678
tracebacks, 843–844 RT (route target), 558, 598–601. See
also MPLS L3VPN, RT (route target)
router bgp 100 command, 233,
filtering
234–235, 236, 624–625, 637,
644–646, 650 RTBH (Remote Triggered Black Hole)
filtering, 866–867
router bgp autonomous system
command, 233 bit bucket routes configured, 867–868
router isis command, 83 CE router verification, 870
PE router verification, 870–871
Segment Routing 1059

source-based, 871–872 configuring policer, 7778


trigger router configuration on IOS default policing, 7777
XR, 868–869 flows, 773–775
trigger router in action, 869–870 identification, 775–777
RTC (Route Target Constraint), 604. keeping LDP safe, 778
See also MPLS L3VPN, RTC (Route
management plane, 838. See also MPP
Target Constraint) (Management Plane Protection)
run-to-completion scheduler, 42 network, 766
REST API, token-based authentication,
S 848–849
Segment Routing, 13–14, 727–728. See
scalability, BGP, 297 also SRTE (Segment Routing Traffic
scanner, BGP, 322 Engineering); SRv6 (segment routing
over IPv6)
SDH (Synchronous Digital Hierarchy),
20–21 BSID (Binding-SID), 750–751
classic LFA limitations, 756–757
SDN (software-defined networking), 4,
14–15, 660 control plane, 735
seamless MPLS, 277 BGP, 739–741
Secure ZTP (Zero Touch Provisioning), IS-IS, 735–737
995–996 OSPFv2, 737–739
components, 996 SRv6, 742
how it works, 997–998 Flex-Algo, 751–753
initial setup, 996–997 Global Block, 728
security. See also authentication; data global segments, 728–730
plane protection IGP Adjacency segment, 733
API (application programming IGP Prefix segment, 731–733
interface), 979 IGP segments, 731, 734–735
BGP, 789–790. See also BGP (Border IS-IS, turning on, 736–737
Gateway Protocol)
local segments, 730
maximum-prefix, 811–812
minimum requirements, 729
prefix suppression, 812–815
Node SID (Segment Identifier), 729
route filtering, 803–811
OSPF, turning on, 738–739
TTL, 235–236, 793–802
over IPv6, 15–16
BGPsec, 821–822
policy, 749, 750
classification ACL, 844–845
terms from remote LFA technology
CoPP, 768, 769
Extended P-Space, 755–756
policy, 768–769
PQ Node, 754–755
template, 770–772
P-Space, 754
verifying, 769
Q-Space, 754–755
LPTS (Local Packet Transport
Services), 772–773 TI-LFA (topology-independent
loop-free alternate), 753
1060 Segment Routing

Traffic Engineering, 748 show clns command, 113–114, 118


send-rp-announce command, 411 show commands, 58
send-rp-discovery command, 411 show configuration commit command,
sequence numbers, route map, 77–78 52
service provider networks, 2 show configuration failed command,
55–56
Service Provider Tag, 536
show install active summary command,
service-policy input command,
48
967–968
show ip bgp command, 812
shadow route reflector, 340–341
show ip bgp vpnv4 vrf command, 638
sham-link, 586–587
show ip igmp groups command,
shared infrastructure, 17
430–431
shared tree, 394–395
show ip igmp snooping groups
show access-lists command, 845 command, 363–364
show app-hosting detail command, show ip igmp snooping querier
68–69 command, 362
show bfd interfaces location command, show ip interface brief command, 168
921
show ip mfib command, 432–433
show bfd session command, 919–921
show ip mroute command, 398,
show bgp ipv4 unicast command, 403–405, 407–409, 432
342–343
show ip nat translations command, 640
show bgp ipv4 unicast longer prefixes
show ip ospf database command, 199
command, 261
show ip ospf interface brief command,
show bgp l2vpn evpn summary
168–169, 205, 464
command, 549
show ip ospf interface command, 180
show bgp l2vpn vpls all command, 513
show ip ospf mpls ldp interface
show bgp nexthops command,
command, 465, 466
325–326
show ip ospf neighbors command,
show bgp summary command, 236
174–175, 179, 206
show bgp vpnv4 unicast all command,
show ip pim command, 397
626, 637
show ip pim rp command, 412,
show bgp vpnv4 unicast all summary
419–421
command, 566–567
show ip route bgp command, 813
show bpg ipv4 unicast command, 258,
334–340, 626 show ip route command, 82, 138,
141–142, 146–151, 148, 464
show bpg ipv4 unicast dampening
parameters command, 330–333 show ip route isis command, 83
show bpg ipv4 unicast summary show ip route ospf command, 86, 186,
command, 791–793 471–472, 582
show bridge-domain command, 508, show ip route vrf command, 463
523 show ipv6 interface brief command,
show bundle command, 922 211
Single-Rate Three-Color Marker 1061

show ipv6 interface command, 128 show mpls traffic-eng forwarding-


show ipv6 ospf neighbors command, adjacency command, 690–691
219–220, 223–224 show mpls traffic-eng tunnels
show ipv6 route command, 127, 128 command, 681–682, 686
show ipv6 route ospf command, 214 show ospf database command, 186,
188–189
show isis adjacency command, 130
show ospf database router command,
show isis brief command, 116
187–188
show isis database command, 133, 134
show ospf virtual-links command,
show isis database detail command, 208–209
125–127, 143–145, 151–152
show ospfv3 database router
show isis hostname command, 130 command, 214–216
show isis instance command, 117–118 show ospfv3 neighbors command, 213
show isis interface command, 118–120, show pim ipv6 bsr election command,
132 4445
show isis neighbor command, 116 show pim ipv6 group-map command,
show isis neighbor detail command, 445–447
120, 128–129, 150 show pim ipv6 neighbor command,
show isis nsr command, 913–917 438–439
show isis protocol command, 113, 138 show pim ipv6 topology command,
show isis protocols command, 115–116 439–442
show isis topology command, 139 show pim ipv6 tunnel info all
command, 439
show mld groups command, 386–387,
435–437 show policy-map control-plane
command, 769
show mpls forwarding command, 571
show route isis command, 142
show mpls forwarding table command,
463, 469, 471, 501, 570, 626–627 show rpl route-policy command, 98
show mpls l2transport binding show running-config command, 77,
command, 508 124–125, 222–223, 395–397
show mpls l2transport vc command, show running-config router bgp
507, 512, 523 command, 800–802
show mpls label range command, 467 show version command, 50
show mpls ldp bindings command, show vfi command, 522
784–785 show vrf command, 560
show mpls ldp bindings local command, show xconnect all command, 500
467–468 SID (segment identifier), 15
show mpls ldp discovery command, signaling, VPLS (Virtual Private LAN
461, 507 Service), 505
show mpls ldp igp sync command, single topology transition mode,
485–486 122–123
show mpls ldp neighbor command, Single-Rate Three-Color Marker,
478, 501, 779–780 953–954
1062 Single-Rate Two-Color Marker

Single-Rate Two-Color Marker, 953 node roles, 744


single-topology IS-IS SRH (Segment Routing Header),
dual-stack, 126–129 742–743
enabling on IOS, 123 uSID (micro segment identifier),
744–745
enabling on IOS XR, 124–126
SSM (Source-Specific Multicast),
Slammer worm, 766 424–425, 428–431
SMU (software maintenance upgrade), initializing, 427–428
49
launching traffic from source, 431–433
SNMP (Simple Network Management
turning on, 425–427
Protocol), 983, 1004–1005
standards
SNMPv2c, 1005
DOCSIS, 17
SNMPv3, 1005–1008
DS-TE, 716
SOAP (Simple Object Access Protocol),
980–981 xPON (Passive Optical Network), 24
SONET (Synchronous Optical stateful NAT64, 892–895
Networking), 20–21 stateless NAT64, 8892
SoO (Site of Origin), 593–594 statement. See also command/s
source-based RTBH, 871–872 network, 164–168, 249–250, 253, 267,
source-based tree, 393–394 576
next-hop-self, 257–258
southbound API, 980, 985
static NAT (Network Address
Sparse mode, 392
Translation), 885–886
SPCOR 3501 exam
static routing, 75
suggested plan for final review and
study, 1012 static RP, 439–442
updates, 1014–1016 STP (Spanning Tree Protocol), 7, 503
speaker, BGP, 235 streaming telemetry, 1001–1004
SPF algorithm, 110 Strict uRPF, 857–858, 863–864
SPF tree, 162 stubby areas, 193–196
split-horizon rule, 297, 503 suppress-signaling-protocol ldp
command, 515–516
SRGB (Segment Routing Global Block),
728 switch, IGMP snooping, 359–366
SR-MPLS (Segment Routing based on synchronous API, 979
MPLS data plane), 728
SRTE (Segment Routing Traffic
Engineering), 14–15
T
SRv6 (segment routing over IPv6), TACACS (Terminal Access Controller
15–16, 728 Access Control System), 846–847
co-existence with LDP, 746–748 tail drop, 961–962
control plane, 742 tailend, 679
–MPLS L3 Service Interworking
Gateway, 745–746
transport technology 1063

TDM (time-division multiplexing), CoS (Class of Service), 944–945


19–21 DSCP (Differentiated Services Code
tear messages, RSVP, 676–678 Point), 943–945
telcos, 4 IP Precedence, 943–944
template matching on access-lists, 946
BGP peer, 291–292 MPLS EXP field, 945–946
CoPP, 770–772 ToS (Type of Service) byte, 943–945
route map, 77 values for class of service, 942–943
Terraform, 1008 traffic engineeering. See SRTE
(Segment Routing Traffic
TI-LFA (topology-independent loop-
Engineering)
free alternate), 753, 756–757
traffic marking, 966–967
timer/s
imposing multiple markings, 968–969
BGP hold and keepalive, 320
internal marking, 969–971
MPLS LDP session protection, 480
marking packets directly on the policy
MRAI (Minimum Route
map, 967–968
Advertisement Interval), 317–319
OSPF (Open Shortest Path First), traffic policing, 946–947
179–181 Dual-Rate Three-Color Marker,
954–956
TLV (Type/Length/Value) extensions,
110, 736 hierarchical, 956–958
token-based authentication, 848–849 ICMP traffic, 947–953
tools Single-Rate Three-Color Marker,
953–954
Ansible, 1008
Single-Rate Two-Color Marker, 953
NetFlow, 999
traffic shaping, 958–960
Terraform, 1008
transport labels, 564
topology
transport technology, 16
IS-IS, 111–112. See also IS-IS
DOCSIS, 16
enabling single and
multitopology TLV exchange, architecture, 16
122–123 CPE, 17
multi-, 124 HFC (hybrid fiber coaxial)
single, 123 network, 17
OSPF, 161 standards, 17
ToS (Type of Service) byte, 943–945 DSL (Digital Subscriber Line), 17–18
totally not-so-stubby areas, 199–200 architecture, 18–19
tracebacks, 843–844 service provider offerings, 19
traceroute messages, 532 DWDM (dense wavelength-division
multiplexing), 21–24
traceroute mpls ipv4 command, 490
TDM (time-division multiplexing),
traffic classification, 940–942 19–21
802.1Q VLAN tag, 942
1064 transport technology

xPON (Passive Optical Network), 24,


25, 27 U
network protection modes,
26–27 UMMT (Unified MPLS Mobile
Transport), 628–629
ranging, 25–26
Unified MPLS, 10–13, 624, 624
standards, 24
BGP configuration, 624–625
troubleshooting
BGP table output, 626
BGP
BGP VPNv4 output, 625–626,
ACL/firewalls, 308–309 627–628
address families, 310–311 LFIB output, 626–627
authentication, 310 traceroute output, 625
AS (autonomous system), 310 LSP (label switched path), 624
TTL (time to live), 309 Mobile Transport, 628–629
IS-IS, 155 Update message, BGP, 238
adjacencies, 135
updates, SPCOR 3501 exam,
interface MTU mismatch, 1014–1016
136–137
uRPF (Unicast Reverse Path
MTU (maximum transmission unit), Forwarding), 855–856, 864
311
interface verification, 864–865
TSP (Tag Switching Protocol), 460
Loose Mode, 856–857
TTL (time to live)
operational modes, 856
BGP security, 235–236, 793–794,
setup, 858–861
799–802
Strict Mode, 857–858, 863–864
one hop, 796
verification, 861–863
three hops, 798–799
VRF Mode, 865
two hops, 795–798
verifying EBGP multihop, 795 user EXEC mode, 43
troubleshooting, 309 user-defined community, 286–289
tunnel mpls traffic-eng forwarding- uSID (micro segment identifier),
adjacency command, 689 744–745
tunnel mpls traffic-eng path-option
command, 683 V
tunnels, MPLS TE, 668
two-stage commit, 51–54 VC (virtual circuit), 504
Type 1 LSA, 186–188 VFI (Virtual Forwarding Instance),
503–504
Type 2 LSA, 188–189
virtual links, 206–209
Type 3 LSA, 189
virtualization, 61
Type 4 LSA, 191–192
container/s, 63–64
Type 5 LSA, 190–191
application hosting, 68–70
YANG 1065

Docker, 65–68 -aware NAT, 639–640


hypervisor, 61 configuration, 558–561
NFVI (Network Functions membership, 561–562
Virtualization Infrastructure), RD (route distinguisher), 557–558
61–63
RT (route target), 558
VNF (virtual network function)
verifying interface connectivity, 559
workload, 63
vrf definition command, 559
virtualized XR, 49
VRF Mode, uRPF, 865
VLAN stacking, 535
VSI (Virtual Switching Instance), 504
VNF (virtual network function)
workload, 63
VPLS (Virtual Private LAN Service), 7,
497. See also H-VPLS (Hierarchical
W
VPLS) wavelength, 21
AC (attachment circuit), 504 WDM (wavelength-division
BGP signaling, 513–515, 517 multiplexing), 21–22
bridge domain definition, 516 weight attribute, 261–263
L2 instance verification, Wi-FI, 5
517–518 workload, VNF, 63
label assignment, 518–521
WRED (Weighted Random Early
learned routes, 516–517 Detection), 964–966
peering establishment, 515–516
service instance interface
association, 516 X-Y-Z
discovery and signaling, 505
x-auth-token, 848
LDP signaling
xconnect (cross-connect), 6
autodiscovery, 509–513
xconnect encapsulation mpls
manual, 505–509 command, 499
limitations, 545–546
xDSL. See DSL (Digital Subscriber
MPLS, 505 Line)
scale-limiting factors, 520 xHaul, 33–35
STP (Spanning Tree Protocol), 503 XML (Extensible Markup Language),
VC (virtual circuit), 504 986, 987
VFI (Virtual Forwarding Instance), xPON (Passive Optical Network), 24,
503–504 25, 27
VSI (Virtual Switching Instance), 504 network protection modes, 26–27
VPN labels, 564 ranging, 25–26
VRF (Virtual Routing and Forwarding), standards, 24
557 YANG, 984, 986–987, 990–991
attaching an interface, 559

You might also like