Foreword xix
Introduction xxi
Part 1 IP/MPLS VPN Service Network Overview 1
Chapter 1 Building Converged Service Networks with IP/MPLS VPN Technology 3
1.1 The Increasing Demands on Service Provider Networks 4
1.2 MPLS Overview 6
1.3 The MPLS Value Proposition 8
1.4 MPLS Enables Converged Multi-Service Networks 11
1.5 MPLS-Enabled Business VPN Services 13
Summary 17
Chapter 2 IP/MPLS VPN Multi-Service Network Overview 19
2.1 IP/MPLS Layer 2 VPN Requirements 20
2.2 IP/MPLS Layer 2 VPN Services 21
2.3 Meeting the Service Network Requirements Using IP/MPLS VPN Architecture 26
2.4 IP/MPLS VPN-Enabled Applications 30
Summary 34
Part II IP/MPLS VPN Protocol Fundamentals 37
Chapter 3 Using MPLS Label Switched Paths as Service Transport Tunnels 39
3.1 Basic MPLS Concepts Review 40
3.2 Label Switch Path Types 51
3.3 LDP-LSP LDP Label Distribution 54
3.4 RSVP-TE LSPs 64
3.5 Configuring RSVP-TE LSP 81
Summary 90
Chapter 4 Routing Protocol Traffi c Engineering and CSPF 91
4.1 Introducing Traffi c Engineering 92
4.2 Introducing OSPF-TE 97
4.3 Introducing IS-IS TE 112
4.4 The CSPF Algorithm 119
4.5 RSVP-TE LSP Policy Control: Administrative Groups and SRLG Groups 125
Summary 135
Chapter 5 RSVP-TE Protocol 137
5.1 RSVP and RSVP-TE 138
5.2 RSVP-TE Signaling Procedure 141
5.3 RSVP-TE Messages and Objects 150
5.4 Make-Before-Break (MBB) 176
5.5 The RSVP-TE Hello Protocol 191
5.6 Reducing RSVP Refresh Overhead 196
5.7 RSVP MD5 Authentication 206
Summary 207
Chapter 6 MPLS Resiliency Secondary LSP 209
6.1 Ensuring Reliability with MPLS Resiliency 210
6.2 An Overview of Primary and Secondary LSPs 211
6.3 What Affects Convergence Performance? 217
6.4 Rules for Selecting Secondary LSPs 222
6.5 Case Study: Using Administrative Groups in Secondary LSPs 226
Summary 228
Chapter 7 MPLS Resiliency RSVP-TE LSP Fast Reroute 231
7.1 RSVP-TE LSP Resiliency 232
7.2 Fast Reroute Overview 235
7.3 Fast Reroute Architecture 244
7.4 One-to-One Backup 259
7.5 Facility Backup 267
7.6 Manual Bypass Tunnel 283
Summary 288
Chapter 8 Label Distribution Protocol 291
8.1 LDP Overview 292
8.2 LDP Session Establishment and Management 292
8.3 Using T-LDP to Signal Pseudowires for Layer 2 VPN Services 299
8.4 LDP Messages and TLVs 304
8.5 LDP over RSVP-TE Tunneling 307
Summary 334
Part III Ethernet VPN Services 337
Chapter 9 IP/MPLS VPN Service Routing Architecture 339
9.1 IP/MPLS VPN Service Network Infrastructure 340
9.2 Alcatel-Lucent Service Routing Architecture 347
9.3 Service Access Point and SAP Components 360
9.4 Service Distribution Paths and Transport Tunnels 365
9.5 Multiple Forwarding Paths in the Same SDP 378
9.6 Maximum Transmission Unit in a Service Network 391
9.7 IP/MPLS VPN Service Implementation Overview 412
Summary 414
Chapter 10 Virtual Leased Line Services 415
10.1 VLL Services Overview 416
10.2 VLL Services Architecture 420
10.3 Pseudowire Switching for VLL Services 434
10.4 VLL Example: Epipe Ethernet P2P VPN 445
10.5 VLL Connection Admission Control 453
Summary 461
Chapter 11 Virtual Private LAN Service 463
11.1 VPLS Service Overview 464
11.2 VPLS Architecture 467
11.3 VPLS Mesh-Pseudowires 476
11.4 VPLS Service Access Points 487
11.5 VPLS Forwarding Database Management 504
Summary 506
Chapter 12 Hierarchical VPLS 509
12.1 Hierarchical-VPLS Overview 510
12.2 Spoke-Pseudowire Details 517
12.3 H-VPLS Topologies 527
12.4 H-VPLS Design Case Study Where to Break the Mesh? 531
Summary 541
Chapter 13 High Availability in an IP/MPLS VPN Network 543
13.1 Building a Network with High Availability 544
13.2 Bidirectional Forwarding Detection 548
13.3 Link Aggregation Group Overview 557
13.4 Multi Chassis Link Aggregation Group 566
13.5 Traffic Load Balancing in Link Aggregation Groups 579
Summary 595
Chapter 14 VLL Service Resiliency 597
14.1 VLL Service Resiliency Overview 598
14.2 VLL Service Resiliency Using Pseudowire Redundancy 603
14.3 VLL Network Design Using MC-LAG with Pseudowire Redundancy 615
Summary 634
Chapter 15 VPLS Service Resiliency 635
15.1 Introduction to VPLS Service Resiliency 636
15.2 Access Resiliency 637
15.3 H-VPLS Backbone Resiliency 640
15.4 Using MAC-Flush to Avoid Blackholes 651
Summary 673
Part IV Advanced Ethernet VPN Topics 675
Chapter 16 VPLS BGP Auto-Discovery 677
16.1 VPLS BGP-AD Overview 678
16.2 BGP Auto-Discovery for LDP-VPLS 678
16.3 SDPs, Transport Tunnels, and Pseudowires Created Using BGP-AD 692
16.4 Using Pre-Provisioned SDPs 698
16.5 Using BGP-AD Import and Export Policies to Control the Forwarding Topology of VPLS 699
Summary 704
Chapter 17 PBB-VPLS 707
17.1 Provider Backbone Bridge Overview 708
17.2 PBB-VPLS Architecture 716
17.3 PBB-VPLS Learning and Forwarding 733
17.4 Controlling Flooding in PBB-VPLS 741
17.5 FDB Management in I-VPLS and B-VPLS 755
17.6 OAM in a PBB-VPLS Network 758
17.7 Service Resiliency in PBB-VPLS Networks 760
17.8 MAC-Flush in PBB-VPLS 762
17.9 PBB Epipe 766
Summary 770
Chapter 18 OAM in a VPLS Service Network 773
18.1 OAM Functional Overview 774
18.2 Ethernet in the First Mile (EFM) OAM (802.3ah) 776
18.3 Ethernet Connectivity Fault Management 787
18.4 OAM in an IP/MPLS VPN Service Network 804
18.5 OAM in VPLS Services 818
Summary 837
Appendix A Spanning Tree Protocol 839
A.1 Spanning Tree Protocol 841
A.2 Spanning Tree Protocol Variations 855
A.3 VPLS Service Loop Prevention with STP 869
A.4 Altered STP Behavior in the VPLS Core 876
A.5 Using VPLS STP to Eliminate Customer Forwarding Loops 880
A.6 Using VPLS STP to Block Redundant Spoke-Pseudowires in H-VPLS 883
A.7 LDP MAC-Flush in STP Convergence 884
A.8 Management VPLS 885
Appendix B RFC and IEEE Standards 897
Glossary 901
Index 917