1. Trang chủ
  2. » Giáo Dục - Đào Tạo

mp 12 2sr book kho tài liệu bách khoa

2.2K 912 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Cấu trúc

  • Cisco IOS Multiprotocol Label Switching Configuration Guide

    • Using the Command-Line Interface in Cisco IOS Software

      • Initially Configuring a Device

      • Using the CLI

        • Understanding Command Modes

        • Using the Interactive Help Feature

        • Understanding Command Syntax

        • Understanding Enable and Enable Secret Passwords

        • Using the Command History Feature

        • Abbreviating Commands

        • Using Aliases for CLI Commands

        • Using the no and default Forms of Commands

        • Using the debug Command

        • Filtering Output Using Output Modifiers

        • Understanding CLI Error Messages

      • Saving Changes to a Configuration

      • Additional Information

    • About Cisco IOS Software Documentation

      • Documentation Objectives

      • Audience

      • Documentation Conventions

        • Typographic Conventions

        • Command Syntax Conventions

        • Software Conventions

        • Reader Alert Conventions

      • Documentation Organization

        • Cisco IOS Documentation Set

        • Cisco IOS Documentation on Cisco.com

        • Configuration Guides, Command References, and Supplementary Resources

      • Additional Resources and Documentation Feedback

    • Basic MPLS

      • MPLS Static Labels

        • Contents

        • Feature Overview

          • Benefits

          • Restrictions

        • Prerequisites

        • Configuration Tasks

          • Configuring MPLS Static Prefix/Label Bindings

          • Verifying MPLS Static Prefix/Label Bindings

          • Configuring MPLS Static Crossconnects

          • Verifying MPLS Static Crossconnect Configuration

        • Monitoring and Maintaining MPLS Static Labels

        • Configuration Examples

          • Configuring MPLS Static Prefixes/Labels Example

          • Configuring MPLS Static Crossconnects Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Glossary

      • NetFlow MPLS Label Export

        • Contents

        • Prerequisites for NetFlow MPLS Label Export

        • Restrictions for NetFlow MPLS Label Export

        • Information About NetFlow MPLS Label Export

          • MPLS Label Information Gathering and Exporting

          • Labels Allocated by VPNs, BGP IPv4, or BGP VPNv4 in the MPLS PAL Table

          • MPLS PAL Table Record Export

          • MPLS PAL and NetFlow Statistics Correlation on a NetFlow Collector

          • MPLS Label Mapping on a Line Card

        • How to Configure NetFlow MPLS Label Export

          • Configuring NetFlow MPLS Label Export and MPLS PAL Table Export

          • Displaying Information About the MPLS PAL Table

          • Configuring the Export of MPLS VPN Version 4 Label Information from the MPLS PAL Table to a NetFlow Collector

            • Prerequisites

        • Configuration Examples for NetFlow MPLS Label Export

          • Configuring NetFlow MPLS Prefix/Application/Label Table Export: Examples

          • Configuring the Export of MPLS VPNv4 Label Information from the MPLS PAL Table: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for NetFlow MPLS Label Export

        • Glossary

      • ATM PVC Bundle Enhancement-MPLS EXP-Based PVC Selection

        • Finding Feature Information

        • Contents

        • Prerequisites for ATM PVC Bundle Enhancement-MPLS EXP-Based PVC Selection

        • Restrictions for ATM PVC Bundle Enhancement-MPLS EXP-Based PVC Selection

        • Information About ATM PVC Bundle Enhancement-MPLS EXP-Based PVC Selection

          • ATM VC Bundle Management

          • ATM VC Bundle Configuration

          • Benefits of ATM VC Bundle Management

          • VC Bundle Management Supported Features

        • How to Configure ATM PVC Bundle Enhancement-MPLS EXP-Based PVC Selection

          • Configuring MPLS and Creating a VC Bundle

            • What to Do Next

          • Configuring the Bundle-Level Protocol

          • Configuring Parameters on a VC Bundle Member Directly

          • Configuring a VC Class and Applying Parameters to a Bundle

            • Commands Ignored in a VC Class Bundle

          • Attaching a Class to a Bundle

          • Configuring a VC Bundle at the Subinterface Level

          • Assigning VC and Bundle Attributes

          • Verifying ATM PVC Bundle Enhancement-MPLS EXP-Based PVC Selection Configuration

        • Configuration Examples for ATM PVC Bundle Enhancement-MPLS EXP-Based PVC Selection

          • Configuring MPLS: Example

          • Defining ATM VC Classes and Parameters: Example

          • Associating an ATM VC Bundle with the Interface: Example

          • Creating a VC Class: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for ATM PVC Bundle Enhancement-MPLS EXP-Based PVC Selection

    • MPLS Label Distribution Protocol

      • MPLS Label Distribution Protocol (LDP)

        • Contents

        • Prerequisites for MPLS LDP

        • Information About MPLS LDP

          • Introduction to MPLS LDP

          • MPLS LDP Functional Overview

          • LDP and TDP Support

          • Introduction to LDP Sessions

            • Directly Connected MPLS LDP Sessions

            • Nondirectly Connected MPLS LDP Sessions

          • Introduction to LDP Label Bindings, Label Spaces, and LDP Identifiers

        • How to Configure MPLS LDP

          • Enabling Directly Connected LDP Sessions

            • Examples

          • Establishing Nondirectly Connected MPLS LDP Sessions

            • Prerequisites

            • Example

          • Saving Configurations: MPLS/Tag Switching Commands

          • Specifying the LDP Router ID

            • Prerequisites

            • Example

          • Preserving QoS Settings with MPLS LDP Explicit Null

            • Examples

          • Protecting Data Between LDP Peers with MD5 Authentication

            • Examples

        • MPLS LDP Configuration Examples

          • Configuring Directly Connected MPLS LDP Sessions: Example

          • Establishing Nondirectly Connected MPLS LDP Sessions: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Label Distribution Protocol

      • MPLS LDP Session Protection

        • Contents

        • Information About MPLS LDP Session Protection

        • How to Configure MPLS LDP Session Protection

          • Enabling MPLS LDP Session Protection

            • Prerequisites

            • Restrictions

          • Customizing MPLS LDP Session Protection

            • Specifying How Long an LDP Targeted Hello Adjacency Should Be Retained

            • Specifying Which Routers Should Have MPLS LDP Session Protection

          • Verifying MPLS LDP Session Protection

          • Troubleshooting Tips

        • Configuration Examples for MPLS LDP Session Protection

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

      • MPLS LDP-IGP Synchronization

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS LDP-IGP Synchronization

        • Restrictions for MPLS LDP-IGP Synchronization

        • Information About MPLS LDP-IGP Synchronization

          • How MPLS LDP-IGP Synchronization Works

          • MPLS LDP-IGP Synchronization with Peers

          • MPLS LDP-IGP Synchronization Delay Timer

          • MPLS LDP-IGP Synchronization Incompatibility with IGP Nonstop Forwarding

          • MPLS LDP-IGP Synchronization Compatibility with LDP Graceful Restart

        • How to Configure MPLS LDP-IGP Synchronization

          • Configuring MPLS LDP-IGP Synchronization with OSPF Interfaces

          • Disabling MPLS LDP-IGP Synchronization on Some OSPF Interfaces

          • Verifying MPLS LDP-IGP Synchronization with OSPF

          • Configuring MPLS LDP-IGP Synchronization with IS-IS Interfaces

            • Configuring MPLS LDP-IGP Synchronization on All IS-IS Interfaces

            • Configuring MPLS LDP-IGP Synchronization on an IS-IS Interface

          • Disabling MPLS LDP-IGP Synchronization on Some IS-IS Interfaces

          • Verifying MPLS LDP-IGP Synchronization with IS-IS

            • Troubleshooting Tips

        • Configuration Examples for MPLS LDP-IGP Synchronization

          • MPLS LDP-IGP Synchronization with OSPF: Example

          • MPLS LDP-IGP Synchronization with IS-IS: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature History for MPLS LDP-IGP Synchronization

      • MPLS LDP Autoconfiguration

        • Finding Feature Information

        • Contents

        • Restrictions for MPLS LDP Autoconfiguration

        • Information About MPLS LDP Autoconfiguration

          • MPLS LDP Autoconfiguration on OSPF and IS-IS Interfaces

        • How to Configure MPLS LDP Autoconfiguration

          • Configuring MPLS LDP Autoconfiguration with OSPF Interfaces

          • Disabling MPLS LDP Autoconfiguration from Selected OSPF Interfaces

          • Verifying MPLS LDP Autoconfiguration with OSPF

          • Configuring MPLS LDP Autoconfiguration with IS-IS Interfaces

          • DETAILED STEPS

          • Disabling MPLS LDP Autoconfiguration from Selected IS-IS Interfaces

          • Verifying MPLS LDP Autoconfiguration with IS-IS

            • Troubleshooting Tips

        • Configuration Examples for MPLS LDP Autoconfiguration

          • MPLS LDP Autoconfiguration with OSPF: Example

          • MPLS LDP Autoconfiguration with IS-IS: Examples

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS LDP Autoconfiguration

      • MPLS-LDP MD5 Global Configuration

        • Contents

        • Prerequisites for MPLS-LDP MD5 Global Configuration

        • Restrictions for MPLS-LDP MD5 Global Configuration

        • Information About MPLS-LDP MD5 Global Configuration

          • Enhancements to LDP MD5 Protection for LDP Messages Between Peers

          • LDP MD5 Password Configuration Information

          • LDP MD5 Password Configuration for Routing Tables

        • How to Configure the MPLS-LDP MD5 Global Configuration Feature

          • Password Requirements for LDP Sessions

          • Identifying LDP Neighbors for LDP MD5 Password Protection

            • Prerequisites

          • Configuring an LDP MD5 Password for LDP Sessions

            • Configuring an LDP MD5 Password for a Specified Neighbor

            • Configuring an LDP MD5 Password for LDP Sessions with Peers from a Specified VRF

            • Configuring an LDP MD5 Password for LDP Sessions with a Selected Group of Peers

          • Verifying the LDP MD5 Configuration

        • Configuration Examples for Configuring the MPLS-LDP MD5 Global Configuration Feature

          • Configuring an LDP MD5 Password for LDP Sessions: Examples

            • Configuring an LDP MD5 Password for LDP Sessions for a Specified Neighbor: Example

            • Configuring an LDP MD5 Password for LDP Sessions with Peers from a Specified VRF: Example

            • Configuring an LDP MD5 Password for LDP Sessions with a Selected Group of Peers: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS-LDP MD5 Global Configuration

        • Glossary

      • MPLS LDP-Lossless MD5 Session Authentication

        • Contents

        • Prerequisites for MPLS LDP-Lossless MD5 Session Authentication

        • Restrictions for MPLS LDP-Lossless MD5 Session Authentication

        • Information About MPLS LDP-Lossless MD5 Session Authentication

          • How MPLS LDP Messages in MPLS LDP-Lossless MD5 Session Authentication are Exchanged

          • The Evolution of MPLS LDP MD5 Password Features

          • Keychains Use with MPLS LDP-Lossless MD5 Session Authentication

          • Application of Rules to Overlapping Passwords

          • Password Rollover Period Guidelines

          • Resolving LDP Password Problems

        • How to Configure MPLS LDP-Lossless MD5 Session Authentication

          • Configuring MPLS LDP-Lossless MD5 Session Authentication Using a Keychain

          • Enabling the Display of MPLS LDP Password Rollover Changes and Events

          • Changing MPLS LDP-Lossless MD5 Session Authentication Passwords

        • Configuration Examples for MPLS LDP-Lossless MD5 Session Authentication

          • Configuring MPLS LDP-Lossless MD5 Session Authentication Using a Keychain (Symmetrical): Example

          • Configuring MPLS LDP-Lossless MD5 Session Authentication Using a Keychain (Asymmetrical): Example

          • Changing MPLS LDP-Lossless MD5 Session Authentication Password: Example

          • Changing MPLS LDP-Lossless MD5 Session Authentication Password Using a Rollover Without Keychain: Example

          • Changing MPLS LDP-Lossless MD5 Session Authentication Password Using a Rollover with a Keychain: Example

          • Changing MPLS LDP-Lossless MD5 Session Authentication Password Using a Fallback Password With a Keychain: Example

          • Changing MPLS LDP-Lossless MD5 Session Authentication: Common Misconfiguration Examples

            • Incorrect Keychain LDP Password Configuration: Example

            • Avoiding Access List Configuration Problems

          • Changing MPLS LDP-Lossless MD5 Session Authentication Using a Second Key to Avoid LDP Session Failure: Examples

            • TCP Authentication and LDP Sessions Can Fail When a Second Rollover Period Is Missing: Example

            • Reconfigure a Keychain to Prevent TCP Authentication and LDP Session Failures: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS LDP-Lossless MD5 Session Authentication

      • MPLS LDP Inbound Label Binding Filtering

        • Contents

        • Information about MPLS LDP Inbound Label Binding Filtering

        • How to Configure MPLS LDP Inbound Label Binding Filtering

          • Configuring MPLS LDP Inbound Label Binding Filtering

            • Restrictions

          • Verifying that MPLS LDP Inbound Label Bindings are Filtered

        • Configuration Examples for MPLS LDP Inbound Label Binding Filtering

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Glossary

      • MPLS LDP-Local Label Allocation Filtering

        • Contents

        • Prerequisites for MPLS LDP-Local Label Allocation Filtering

        • Restrictions for MPLS LDP-Local Label Allocation Filtering

        • Information About MPLS LDP-Local Label Allocation Filtering

          • MPLS LDP Local Label Allocation Filtering Overview

          • Prefix Lists for MPLS LDP Local Label Allocation Filtering: Benefits and Description

          • Local Label Allocation Changes Introduced in Cisco IOS Release 12.2(33)SRC and LDP Actions

          • LDP Local Label Filtering and BGP Routes

        • How to Configure MPLS LDP-Local Label Allocation Filtering

          • Creating a Prefix List for MPLS LDP Local Label Allocation Filtering

          • Configuring MPLS LDP Local Label Allocation Filtering

            • Restrictions

          • Verifying MPLS LDP-Local Label Allocation Filtering Configuration

        • Configuration Examples for MPLS LDP-Local Label Allocation Filtering

          • Creating a Prefix List for MPLS LDP Local Label Allocation Filtering: Examples

          • Configuring MPLS LDP Local Label Allocation Filtering: Examples

          • Sample MPLS LDP Local Label Allocation Filtering Configuration: Example

            • Routing Table on Router R1

            • Local Label Bindings on Router R1, Router R 2, and Router R3

            • Local Label Allocation Filtering Configuration on Router R1

            • Local Label Allocation Filtering Changes Label Bindings on Router R1, Router R 2, and Router R3

            • Command to Display the Local Label Allocation Filter

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS LDP-Local Label Allocation Filtering

        • Glossary

    • MPLS Traffic Engineering: Path Calculation and Setup

      • MPLS Traffic Engineering-LSP Attributes

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Traffic Engineering-LSP Attributes

        • Restrictions for MPLS Traffic Engineering-LSP Attributes

        • Information About MPLS Traffic Engineering-LSP Attributes

          • MPLS Traffic Engineering-LSP Attributes Benefits

          • Traffic Engineering Bandwidth and Bandwidth Pools

          • LSP Attribute Lists Usage and Management

            • Tunnel Attributes and LSP Attributes

            • LSP Attributes and the LSP Attribute List

            • LSP Attribute Lists Management

          • Autobandwidth and Path Option for Bandwidth Override

          • Path Option Selection for MPLS TE Tunnel LSPs

            • Constraint-Based Routing and Path Option Selection

            • Tunnel Reoptimization and Path Option Selection

            • Path Option Selection with Bandwidth Override

        • How to Configure MPLS Traffic Engineering-LSP Attributes

          • Configuring MPLS Traffic Engineering LSP Attribute Lists

            • Configuring an LSP Attribute List

            • Adding Attributes to an LSP Attribute List

            • Removing an Attribute from an LSP Attribute List

            • Modifying an Attribute in an LSP Attribute List

            • Deleting an LSP Attribute List

            • Verifying Attributes Within an LSP Attribute List

            • Verifying All LSP Attribute Lists

            • Associating an LSP Attribute List with a Path Option for an MPLS TE Tunnel

            • Modifying a Path Option to Use a Different LSP Attribute List

            • Removing a Path Option for an LSP for an MPLS TE Tunnel

            • Verifying that LSP Is Signaled Using the Correct Attributes

          • Configuring a Path Option for Bandwidth Override

            • Configuring Fallback Bandwidth Path Options for TE Tunnels

            • Modifying the Bandwidth on a Path Option for Bandwidth Override

            • Removing a Path Option for Bandwidth Override

            • Verifying that LSP Is Signaled Using the Correct Bandwidth

        • Configuration Examples for MPLS Traffic Engineering-LSP Attributes

          • Configuring LSP Attribute List: Examples

            • Configuring an LSP Attribute List: Example

            • Adding Attributes to an LSP Attribute List: Example

            • Removing an Attribute from an LSP Attribute List: Example

            • Modifying an Attribute in an LSP Attribute List: Example

            • Deleting an LSP Attribute List: Example

            • Associating an LSP Attribute List with a Path Option for a TE Tunnel: Example

            • Modifying a Path Option to Use a Different LSP Attribute List: Example

            • Removing a Path Option for an LSP for an MPLS TE Tunnel: Example

          • Configuring a Path Option for Bandwidth Override: Examples

            • Path Option for Bandwidth Override and LSP Attribute List Configuration Command Examples

            • Configuring Fallback Bandwidth Path Options for TE Tunnels: Example

            • Modifying the Bandwidth on a Path Option for Bandwidth Override: Example

            • Removing a Path Option for Bandwidth Override: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Traffic Engineering-LSP Attributes

        • Glossary

      • MPLS Traffic Engineering-Autotunnel Primary and Backup

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Traffic Engineering-Autotunnel Primary and Backup

        • Restrictions for MPLS Traffic Engineering-Autotunnel Primary and Backup

        • Information About MPLS Traffic Engineering-Autotunnel Primary and Backup

          • Overview of MPLS Traffic Engineering-Autotunnel Primary and Backup

          • Benefits of MPLS Traffic Engineering-Autotunnel Primary and Backup Feature

          • MPLS Traffic Engineering

          • MPLS Traffic Engineering Backup Autotunnels

            • Link Protection

            • Node Protection

            • Explicit Paths

            • Range for Backup Autotunnels

          • MPLS Traffic Engineering Primary Autotunnels

            • Explicit Paths

            • Range for Autotunnels

          • MPLS Traffic Engineering Label-Based Forwarding

          • Benefits of MPLS Traffic Engineering Protection

            • Delivery of Packets During a Failure

            • Multiple Backup Tunnels Protecting the Same Interface

            • Scalability

            • RSVP Hello

          • SSO Redundancy Overview

        • How to Configure MPLS Traffic Engineering-Autotunnel Primary and Backup

          • Establishing MPLS Backup Autotunnels to Protect Fast Reroutable TE LSPs

          • Establishing MPLS One-Hop Tunnels to All Neighbors

        • Configuration Examples for MPLS Traffic Engineering-Autotunnel Primary and Backup

          • Establishing MPLS Backup Autotunnels to Protect Fast Reroutable TE LSPs: Example

          • Establishing MPLS One-Hop Tunnels to Neighbors: Example

        • Additional References

          • Additional References

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS Traffic Engineering-Autotunnel Primary and Backup

        • Glossary

      • MPLS Traffic Engineering-AutoTunnel Mesh Groups

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Traffic Engineering-AutoTunnel Mesh Groups

        • Restrictions for MPLS Traffic Engineering-AutoTunnel Mesh Groups

        • Information About MPLS Traffic Engineering-AutoTunnel Mesh Groups

          • AutoTunnel Mesh Groups Description and Benefits

          • Access Lists for Mesh Tunnel Interfaces

          • AutoTunnel Template Interfaces

          • OSPF Flooding of Mesh Group Information

        • How to Configure MPLS Traffic Engineering-AutoTunnel Mesh Groups

          • Configuring a Mesh of TE Tunnel LSPs

            • Enabling Autotunnel Mesh Groups Globally

            • Creating an Access List Using a Name

            • Creating an Autotunnel Template Interface

          • Specifying the Range of Mesh Tunnel Interface Numbers

          • Displaying Configuration Information About Tunnels

          • Monitoring the Autotunnel Mesh Network

            • Troubleshooting Tips

          • Configuring IGP Flooding for Autotunnel Mesh Groups

        • Configuration Examples for MPLS Traffic Engineering-Autotunnel Mesh Groups

          • Configuring a Mesh of TE Tunnel LSPs: Examples

            • Enabling Autotunnel Mesh Groups Globally: Example

            • Creating an Access List Using a Name: Example

            • Creating an AutoTunnel Template Interface: Example

          • Specifying the Range of Mesh Tunnel Interface Numbers: Example

          • Configuring IGP Flooding for Autotunnel Mesh Groups: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS Traffic Engineering-AutoTunnel Mesh Groups

        • Glossary

      • MPLS Traffic Engineering-Verbatim Path Support

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Traffic Engineering-Verbatim Path Support

        • Restrictions for MPLS Traffic Engineering-Verbatim Path Support

        • Information About MPLS Traffic Engineering-Verbatim Path Support

        • How to Configure and Verify MPLS Traffic Engineering-Verbatim Path Support

          • Configuring MPLS Traffic Engineering-Verbatim Path Support

          • Verifying Verbatim LSPs for MPLS TE Tunnels

            • Examples

        • Configuration Example for MPLS Traffic Engineering-Verbatim Path Support

          • Configuring MPLS Traffic Engineering-Verbatim Path Support

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Traffic Engineering-Verbatim Path Support

        • Glossary

      • MPLS Traffic Engineering-RSVP Hello State Timer

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Traffic Engineering-RSVP Hello State Timer

        • Restrictions for MPLS Traffic Engineering-RSVP Hello State Timer

        • Information About MPLS Traffic Engineering-RSVP Hello State Timer

          • Hellos for State Timeout

            • Nonfast-Reroutable TE LSP

            • Hello Instance

            • Fast-Reroutable TE LSP with Backup Tunnel

            • Fast-Reroutable TE LSP Without Backup Tunnel

        • How to Configure MPLS Traffic Engineering-RSVP Hello State Timer

          • Enabling the Hello State Timer Globally

          • Enabling the Hello State Timer on an Interface

          • Setting a DSCP Value on an Interface

          • Setting a Hello Request Interval on an Interface

          • Setting the Number of Hello Messages that can be Missed on an Interface

          • Verifying Hello for State Timer Configuration

        • Configuration Examples for MPLS Traffic Engineering-RSVP Hello State Timer

          • MPLS Traffic Engineering-RSVP Hello State Timer: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Traffic Engineering-RSVP Hello State Timer

        • Glossary

      • MPLS Traffic Engineering Forwarding Adjacency

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Traffic Engineering Forwarding Adjacency

        • Restrictions for MPLS Traffic Engineering Forwarding Adjacency

        • Information About MPLS Traffic Engineering Forwarding Adjacency

          • MPLS Traffic Engineering Forwarding Adjacency Functionality

          • MPLS Traffic Engineering Forwarding Adjacency Benefits

        • How to Configure MPLS Traffic Engineering Forwarding Adjacency

          • Configuring a Tunnel Interface for MPLS TE Forwarding Adjacency

          • Configuring MPLS TE Forwarding Adjacency on Tunnels

          • Verifying MPLS TE Forwarding Adjacency

        • Configuration Examples for MPLS Traffic Engineering Forwarding Adjacency

          • MPLS TE Forwarding Adjacency: Example

            • Usage Tips

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Traffic Engineering Forwarding Adjacency

        • Glossary

      • MPLS Traffic Engineering : Class-based Tunnel Selection

        • Contents

        • Prerequisites for MPLS Traffic Engineering : Class-based Tunnel Selection

        • Restrictions for MPLS Traffic Engineering : Class-based Tunnel Selection

        • Information About MPLS Traffic Engineering : Class-based Tunnel Selection

          • Incoming Traffic Supported by MPLS TE Class-based Tunnel Selection

          • CoS Attributes for MPLS TE Class-based Tunnel Selection

          • Routing Protocols and MPLS TE Class-based Tunnel Selection

          • Tunnel Selection with MPLS TE Class-based Tunnel Selection

            • EXP Mapping Configuration

            • Tunnel Selection for EXP Values

            • Tunnel Failure Handling

            • Misordering of Packets

          • Fast Reroute and MPLS TE Class-based Tunnel Selection

          • DS-TE Tunnels and MPLS TE Class-based Tunnel Selection

          • Reoptimization and MPLS TE Class-based Tunnel Selection

          • Interarea and Inter-AS and MPLS TE Class-based Tunnel Selection

          • ATM PVCs and MPLS TE Class-based Tunnel Selection

        • How to Configure MPLS Traffic Engineering : Class-based Tunnel Selection

          • Creating Multiple MPLS TE or DS-TE Tunnels from the Same Headend to the Same Tailend

          • Configuring EXP Values to Be Carried by Each MPLS TE or DS-TE Tunnel

          • Making the MPLS TE or DS-TE Tunnels Visible for Routing

          • Verifying That the MPLS TE or DS-TE Tunnels Are Operating and Announced to the IGP

          • Configuring a Master Tunnel

        • Configuration Examples for MPLS Traffic Engineering : Class-based Tunnel Selection

          • Creating Multiple MPLS TE or DS-TE Tunnels from the Same Headend to the Same Tailend: Example

          • Configuring EXP Values to Be Carried by Each MPLS TE or DS-TE Tunnel: Example

          • Making the MPLS TE or DS-TE Tunnels Visible for Routing: Example

          • Verifying That the MPLS TE or DS-TE Tunnels Are Operating and Announced to the IGP: Example

          • Configuring a Master Tunnel: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Traffic Engineering : Class-based Tunnel Selection

        • Glossary

      • MPLS Traffic Engineering: Interarea Tunnels

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Traffic Engineering: Interarea Tunnels

        • Restrictions for MPLS Traffic Engineering: Interarea Tunnels

        • Information About MPLS Traffic Engineering: Interarea Tunnels

          • Interarea Tunnels Functionality

          • Autoroute Destination Functionality

            • CBTS Interaction with Autoroute Destination

            • Manually Configured Static Routes Interaction with Autoroute Destination

            • Autoroute Announce Interaction with Autoroute Destination

            • Forwarding Adjacency Interaction with Autoroute Destination

          • MPLS Traffic Engineering Interarea Tunnels Benefits

        • How to Configure MPLS Traffic Engineering: Interarea Tunnels

          • Configuring OSPF for Interarea Tunnels

            • Configuring OSPF for ABR Routers

            • Configuring OSPF for Non-ABR Routers

          • Configuring IS-IS for Interarea Tunnels

            • Configuring IS-IS for Backbone Routers

            • Configuring IS-IS for Nonbackbone Routers

            • Configuring IS-IS for Interfaces

          • Configuring MPLS and RSVP to Support Traffic Engineering

          • Configuring an MPLS Traffic Engineering Interarea Tunnel

            • Configuring an MPLS Traffic Engineering Interarea Tunnel to Use Explicit Paths

            • Configuring Explicit Paths

          • Configuring an MPLS Traffic Engineering Tunnel with Autoroute Destination

        • Configuration Examples for MPLS Traffic Engineering: Interarea Tunnels

          • Configuring OSPF for Interarea Tunnels: Example

          • Configuring IS-IS for Interarea Tunnels: Example

          • Configuring MPLS and RSVP to Support Traffic Engineering: Example

          • Configuring an MPLS Traffic Engineering Interarea Tunnel: Example

          • Configuring an MPLS Traffic Engineering Tunnel with Autoroute Destination: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS Traffic Engineering: Interarea Tunnels

        • Glossary

      • MPLS TE: Bundled Interface Support

        • Contents

        • Prerequisites for MPLS TE: Bundled Interface Support

        • Restrictions for MPLS TE: Bundled Interface Support

        • Information About MPLS TE: Bundled Interface Support

          • MLP Overview

          • Cisco EtherChannel Overview

          • Load Balancing and Min-Links in MLP and EtherChannel

        • How to Configure MPLS TE: Bundled Interface Support

          • Configuring MPLS TE on an MLP Interface

          • Configuring MPLS TE on an EtherChannel Interface

        • Configuration Examples for MPLS TE: Bundled Interface Support

          • Configuring MPLS TE on an MLP Interface: Example

          • Configuring MPLS TE on an EtherChannel Interface: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS TE: Bundled Interface Support

        • Glossary

      • MPLS Traffic Engineering (TE)-Automatic Bandwidth Adjustment for TE Tunnels

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS TE-Automatic Bandwidth Adjustment for TE Tunnels

        • Restrictions for MPLS TE-Automatic Bandwidth Adjustment for TE Tunnels

        • Information About MPLS TE-Automatic Bandwidth Adjustment for TE Tunnels

          • MPLS TE-Automatic Bandwidth Adjustment for TE Tunnels Overview

          • MPLS TE-Automatic Bandwidth Adjustment for TE Tunnels Benefits

        • How to Configure MPLS TE-Automatic Bandwidth Adjustment for TE Tunnels

          • Configuring a Device to Support Traffic Engineering Tunnels

          • Configuring IS-IS or OSPF for MPLS Traffic Engineering

            • Configuring IS-IS for MPLS Traffic Engineering

            • Configuring OSPF for MPLS Traffic Engineering

          • Configuring Bandwidth on Each Link That a Tunnel Crosses

          • Configuring an MPLS Traffic Engineering Tunnel

            • Troubleshooting Tips

          • Enabling Automatic Bandwidth Adjustment on a Platform

          • Enabling Automatic Bandwidth Adjustment for a Tunnel

          • Configuring the Interval for Computing the Tunnel Average Output Rate

          • Verifying Automatic Bandwidth Configuration

        • Configuration Examples for MPLS TE-Automatic Bandwidth Adjustments for TE Tunnels

          • Configuring MPLS Traffic Engineering Automatic Bandwidth: Example

          • Tunnel Configuration for Automatic Bandwidth: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS TE-Automatic Bandwidth Adjustment for TE Tunnels

      • MPLS Point-to-Multipoint Traffic Engineering

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Point-to-Multipoint Traffic Engineering

        • Restrictions for MPLS Point-to-Multipoint Traffic Engineering

        • Information About MPLS Point-to-Multipoint Traffic Engineering

          • MPLS Point-to-Multipoint Traffic Engineering Overview

          • How P2MP TE Sub-LSPs Are Signaled

          • How P2MP TE Traffic Is Forwarded

          • Computing the IGP Path Using Dynamic Paths or Explicit Paths

            • Remerge Events

            • Crossover Events

          • Benefits of MPLS Point-to-Multipoint Traffic Engineering

          • MPLS Point-to-Multipoint Traffic Engineering-Re-optimizing Traffic

          • P2P TE Tunnels Coexist with P2MP TE Tunnels

          • Using Fast Reroute to Protect P2MP TE Links

            • FRR Failure Detection Mechanisms

          • Bandwidth Preemption for P2MP TE

          • NSF/SSO Support for MPLS P2MP TE

        • How to Configure MPLS Point-to-Multipoint Traffic Engineering

          • Configuring the Headend Routers

            • Restrictions

          • Configuring the Midpoint Routers

          • Configuring the Tailend Routers

          • Configuring Fast Reroute with P2MP TE Tunnels

          • Enabling MPLS Traffic Engineering System Logging of Events

          • Verifying the Configuration of MPLS Traffic Engineering Point-to-Multipoint Tunnels

            • Verifying the Configuration of the Headend Router

            • Verifying the Configuration of the Midpoint Routers

            • Verifying the Configuration of the Tailend Routers

        • Configuration Examples for MPLS Point-to-Multipoint Traffic Engineering

          • Configuration of the Headend Router (PE5): Example

          • Configuration of the Midpoint Router (P1): Example

          • Configuration of the Tailend Router (PE1): Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Glossary

        • Feature Information for MPLS Point-to-Multipoint Traffic Engineering

    • MPLS Traffic Engineering: DiffServ

      • MPLS Traffic Engineering - DiffServ Aware (DS-TE)

        • Background and Overview

          • Benefits

          • Related Features and Technologies

          • Related Documents

        • Supported Standards

        • Prerequisites

        • Configuration Tasks

          • From Traditional to IETF-Standard Commands

            • The ip rsvp bandwidth command

            • The tunnel mpls traffic-eng bandwidth command

            • The mpls traffic-eng ds-te commands

          • Transitioning a Network to the IETF Standard

          • Configuring DS-TE Tunnels

            • Level 1: Configuring the Device

            • Level 2: Configuring the Physical Interface

            • Level 3: Configuring the Tunnel Interface

            • Verifying the Configuration

        • Configuration Examples

          • Tunnel Head

          • Midpoint Devices

          • Tail-End Device

          • Guaranteed Bandwidth Service Configuration

          • Guaranteed Bandwidth Service Examples

          • Example with Single Destination Prefix

            • Configuring Tunnel Head-1

            • Configuring Tunnel Head-2

            • Tunnel Midpoint Configuration [Mid-1]

            • Tunnel Midpoint Configuration [Mid-2]

            • Tunnel Tail Configuration

          • Example with Many Destination Prefixes

            • Configuration of Tunnel Head-1

            • Configuration of Tunnel Head-2

            • Tunnel Midpoint Configuration [Mid-1]

            • Tunnel Midpoint Configuration [Mid-2]

            • Tunnel Tail Configuration

        • Command Reference

        • Glossary

    • MPLS Traffic Engineering: Path, Link, and Node Protection

      • MPLS Traffic Engineering: Inter-AS TE

        • Contents

        • Prerequisites for MPLS Traffic Engineering: Inter-AS TE

        • Restrictions for MPLS Traffic Engineering: Inter-AS TE

        • Information About MPLS Traffic Engineering: Inter-AS TE

          • MPLS Traffic Engineering Tunnels

          • Multiarea Network Design

          • Fast Reroute

          • ASBR Node Protection

          • Loose Path Reoptimization

          • ASBR Forced Link Flooding

          • Link Flooding

        • How to Configure MPLS Traffic Engineering: Inter-AS TE

          • Configuring Loose Hops

            • Configuring an Explicit Path on the Tunnel That Will Cross the Inter-AS Link

            • Configuring a Route to Reach the Remote ASBR

          • Configuring a Static Route from the MP to the PLR

          • Configuring ASBR Forced Link Flooding

            • Configuring the Inter-AS Link as a Passive Interface Between Two ASBRs

            • Creating LSPs Traversing the ASBRs

            • Configuring Multiple Neighbors on a Link

          • Verifying the Inter-AS TE Configuration

        • Configuration Examples for MPLS Traffic Engineering: Inter-AS TE

          • Configuring Loose Hops: Examples

            • Configuring an Explicit Path on the Tunnel That Will Cross the Inter-AS Link: Example

            • Configuring a Route to Reach the Remote ASBR in the IP Routing Table: Example

          • Configuring a Static Route from the MP to the PLR: Example

          • Configuring ASBR Forced Link Flooding: Examples

            • Configuring the Inter-AS Link as a Passive Interface: Example

            • Creating LSPs Traversing the ASBRs: Example

            • Configuring Multiple Neighbors on a Link: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Traffic Engineering: Inter-AS TE

        • Glossary

      • MPLS Traffic Engineering: Shared Risk Link Groups

        • Contents

        • Prerequisites for MPLS Traffic Engineering: Shared Risk Link Groups

        • Restrictions for MPLS Traffic Engineering: Shared Risk Link Groups

        • Information About MPLS Traffic Engineering: Shared Risk Link Groups

          • MPLS Traffic Engineering Brief Overview

          • MPLS Traffic Engineering Shared Risk Link Groups

          • Fast Reroute Protection for MPLS TE SRLGs

          • Autotunnel Backup for MPLS TE SRLGs

        • How to Configure MPLS Traffic Engineering: Shared Risk Link Groups

          • Configuring MPLS TE SRLG Membership of Each Link That Has a Shared Risk with Another Link

          • Configuring the Routers That Automatically Create Backup Tunnels to Avoid MPLS TE SRLGs of Their Protected Interfaces

          • Verifying the MPLS Traffic Engineering: Shared Risk Link Groups Configuration

        • Configuration Examples for MPLS Traffic Engineering: Shared Risk Link Groups

          • Configuring the SRLG Membership of Each Link That Has a Shared Risk with Another Link: Example

          • Configuring the Routers That Automatically Create Backup Tunnels to Avoid SRLGs of Their Protected Interfaces: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Traffic Engineering: Shared Risk Link Groups

        • Glossary

      • MPLS Traffic Engineering (TE): Path Protection

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Traffic Engineering (TE): Path Protection

        • Restrictions for MPLS Traffic Engineering (TE): Path Protection

        • Information About MPLS Traffic Engineering (TE): Path Protection

          • Traffic Engineering Tunnels

          • Path Protection

          • Enhanced Path Protection

          • ISSU

          • NSF/SSO

        • How to Configure MPLS Traffic Engineering (TE): Path Protection

          • Regular Path Protection Configuration Tasks

            • Configuring Explicit Paths for Secondary Paths

            • Assigning a Secondary Path Option to Protect a Primary Path Option

            • Verifying the Configuration of MPLS Traffic Engineering Regular Path Protection

          • Enhanced Path Protection Configuration Tasks

            • Creating a Path Option List

            • Assigning a Path Option List to Protect a Primary Path Option

            • Verifying the Configuration of MPLS TE Enhanced Path Protection

        • Configuration Examples for MPLS Traffic Engineering (TE): Regular Path Protection

          • Configuring Explicit Paths for Secondary Paths: Example

          • Assigning a Secondary Path Option to Protect a Primary Path Option: Example

          • Configuring Tunnels Before and After Path Protection: Example

        • Configuration Examples for MPLS Traffic Engineering (TE): Enhanced Path Protection

          • Creating a Path Option List: Example

          • Assigning a Path Option List to Protect a Primary Path Option: Example

          • Configuring Tunnels Before and After Path Protection: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS Traffic Engineering (TE): Path Protection

        • Glossary

      • MPLS Traffic Engineering-Fast Reroute Link and Node Protection

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Traffic Engineering-Fast Reroute Link and Node Protection

        • Restrictions for MPLS Traffic Engineering-Fast Reroute Link and Node Protection

        • Information About MPLS Traffic Engineering-Fast Reroute Link and Node Protection

          • Fast Reroute

          • Link Protection

          • Node Protection

          • Bandwidth Protection

          • RSVP Hello

            • RSVP Hello Operation

            • Hello Instance

          • Features of MPLS Traffic Engineering-Fast Reroute Link and Node Protection

            • Backup Tunnel Support

            • Backup Bandwidth Protection

            • RSVP Hello

            • Fast Reroute Operation

            • Fast Reroute Activation

            • Backup Tunnels Terminating at Different Destinations

            • Backup Tunnels Terminating at the Same Destination

            • Backup Tunnel Selection Procedure

            • Bandwidth Protection

            • Load Balancing on Limited-Bandwidth Backup Tunnels

            • Load Balancing on Unlimited-Bandwidth Backup Tunnels

            • Pool Type and Backup Tunnels

            • Tunnel Selection Priorities

            • Bandwidth Protection Considerations

        • How to Configure MPLS Traffic Engineering-Fast Reroute (FRR) Link and Node Protection

          • Enabling Fast Reroute on LSPs

          • Creating a Backup Tunnel to the Next Hop or to the Next-Next Hop

          • Assigning Backup Tunnels to a Protected Interface

          • Associating Backup Bandwidth and Pool Type with a Backup Tunnel

          • Configuring Backup Bandwidth Protection

          • Configuring an Interface for Fast Link and Node Failure Detection

          • Verifying That Fast Reroute Is Operational

            • Troubleshooting Tips

        • Configuration Examples for MPLS Traffic Engineering-Fast Reroute (FRR) Link and Node Protection

          • Enabling Fast Reroute for all Tunnels: Example

          • Creating an NHOP Backup Tunnel: Example

          • Creating an NNHOP Backup Tunnel: Example

          • Assigning Backup Tunnels to a Protected Interface: Example

          • Associating Backup Bandwidth and Pool Type with Backup Tunnels: Example

          • Configuring Backup Bandwidth Protection: Example

          • Configuring an Interface for Fast Link and Node Failure Detection: Example

          • Configuring RSVP Hello and POS Signals: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Traffic Engineering-Fast Reroute Link and Node Protection

        • Glossary

      • MPLS TE: Link and Node Protection, with RSVP Hellos Support (with Fast Tunnel Interface Down Detection)

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS TE: Link and Node Protection, with RSVP Hellos Support (with Fast Tunnel Interface Down Detection)

        • Restrictions for MPLS TE: Link and Node Protection, with RSVP Hellos Support (with Fast Tunnel Interface Down Detection)

        • Information About MPLS TE: Link and Node Protection, with RSVP Hellos Support (with Fast Tunnel Interface Down Detection)

          • Fast Reroute

          • Link Protection

          • Node Protection

          • Bandwidth Protection

          • Fast Tunnel Interface Down Detection

          • RSVP Hello

            • RSVP Hello Operation

            • Hello Instance

            • Hello Commands

          • Features of MPLS TE: Link and Node Protection, with RSVP Hellos Support (with Fast Tunnel Interface Down Detection)

            • Backup Tunnel Support

            • Backup Bandwidth Protection

            • RSVP Hello

          • Fast Reroute Operation

            • Fast Reroute Activation

            • Backup Tunnels Terminating at Different Destinations

            • Backup Tunnels Terminating at the Same Destination

            • Backup Tunnel Selection Procedure

            • Bandwidth Protection

            • Load Balancing on Limited-bandwidth Backup Tunnels

            • Load Balancing on Unlimited-bandwidth Backup Tunnels

            • Pool Type and Backup Tunnels

            • Tunnel Selection Priorities

            • Bandwidth Protection Considerations

        • How to Configure MPLS TE: Link and Node Protection, with RSVP Hellos Support (with Fast Tunnel Interface Down Detection)

          • Enabling Fast Reroute on LSPs

          • Creating a Backup Tunnel to the Next Hop or to the Next-Next Hop

          • Assigning Backup Tunnels to a Protected Interface

          • Associating Backup Bandwidth and Pool Type with a Backup Tunnel

          • Configuring Backup Bandwidth Protection

          • Configuring an Interface for Fast Link and Node Failure Detection

          • Configuring an Interface for Fast Tunnel Interface Down

          • Verifying That Fast Reroute Is Operational

            • Troubleshooting Tips

        • Configuration Examples for MPLS TE: Link and Node Protection, with RSVP Hellos Support (with Fast Tunnel Interface Down Detection)

          • Enabling Fast Reroute for All Tunnels: Example

          • Creating an NHOP Backup Tunnel: Example

          • Creating an NNHOP Backup Tunnel: Example

          • Assigning Backup Tunnels to a Protected Interface: Example

          • Associating Backup Bandwidth and Pool Type with Backup Tunnels: Example

          • Configuring Backup Bandwidth Protection: Example

          • Configuring an Interface for Fast Link and Node Failure Detection: Example

          • Configuring an Interface for Fast Tunnel Interface Down: Example

          • Configuring RSVP Hello and POS Signals: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS TE: Link and Node Protection, with RSVP Hellos Support (with Fast Tunnel Interface Down Detection)

        • Glossary

      • MPLS Traffic Engineering: BFD-triggered Fast Reroute

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Traffic Engineering: BFD-triggered Fast Reroute

        • Restrictions for MPLS Traffic Engineering: BFD-triggered Fast Reroute

        • Information About MPLS Traffic Engineering: BFD-triggered Fast Reroute

          • BFD

          • Fast Reroute

          • Link Protection

          • Node Protection

          • Bandwidth Protection

        • How to Configure MPLS Traffic Engineering: BFD-triggered Fast Reroute

          • Enabling BFD Support on the Router

          • Enabling Fast Reroute on LSPs

          • Creating a Backup Tunnel to the Next Hop or to the Next-Next Hop

          • Assigning Backup Tunnels to a Protected Interface

          • Enabling BFD on the Protected Interface

          • Associating Backup Bandwidth and Pool Type with a Backup Tunnel

          • Configuring Backup Bandwidth Protection

          • Verifying That Fast Reroute Is Operational

        • Configuration Examples for MPLS Traffic Engineering: BFD-triggered Fast Reroute

          • Enabling BFD Support on the Router: Example

          • Enabling Fast Reroute on LSPs: Example

          • Creating a Backup Tunnel to the Next Hop: Example

          • Creating an NNHOP Backup Tunnel: Example

          • Assigning Backup Tunnels to a Protected Interface: Example

          • Enabling BFD on the Protected Interface: Example

          • Associating Backup Bandwidth and Pool Type with Backup Tunnels: Example

          • Configuring Backup Bandwidth Protection: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Traffic Engineering: BFD-triggered Fast Reroute

        • Glossary

    • MPLS Layer 2 VPNs

      • Any Transport over MPLS

        • Finding Feature Information

        • Contents

        • Prerequisites for Any Transport over MPLS

        • Restrictions for Any Transport over MPLS

        • Information About Any Transport over MPLS

          • How AToM Transports Layer 2 Packets

          • AToM Configuration Commands Prior to Cisco IOS Release 12.0(25)S

          • Benefits of AToM

          • MPLS Traffic Engineering Fast Reroute

          • Maximum Transmission Unit Guidelines for Estimating Packet Size

            • Estimating Packet Size: Example

            • mpls mtu Command Changes

          • Frame Relay over MPLS and DTE, DCE, and NNI Connections

            • Local Management Interface and Frame Relay over MPLS

          • QoS Features Supported with AToM

        • How to Configure Any Transport over MPLS

          • Configuring the Pseudowire Class

          • Changing the Encapsulation Type and Removing a Pseudowire

          • Configuring ATM AAL5 over MPLS on PVCs

            • Restrictions

            • Examples

          • Configuring ATM AAL5 over MPLS in VC Class Configuration Mode

            • Restrictions

            • Examples

          • Configuring OAM Cell Emulation for ATM AAL5 over MPLS

            • Configuring OAM Cell Emulation for ATM AAL5 over MPLS on PVCs

            • Examples

            • Configuring OAM Cell Emulation for ATM AAL5 over MPLS in VC Class Configuration Mode

          • Configuring ATM Cell Relay over MPLS in VC Mode

            • Examples

          • Configuring ATM Cell Relay over MPLS in VC Mode Using VC Class Configuration Mode

          • Configuring ATM Cell Relay over MPLS in PVP Mode

            • Examples

          • Configuring ATM Cell Relay over MPLS in Port Mode

            • Examples

            • Troubleshooting Tips

          • Configuring ATM Single Cell Relay over MPLS

          • Configuring ATM Packed Cell Relay over MPLS

            • Restrictions

            • Configuring ATM Packed Cell Relay over MPLS in VC Mode

            • Configuring ATM Packed Cell Relay over MPLS in VC Mode Using VC Class Configuration Mode

            • Configuring ATM Packed Cell Relay over MPLS in VP Mode

            • Configuring ATM Packed Cell Relay over MPLS in Port Mode

            • Examples

          • Configuring Ethernet over MPLS in VLAN Mode

          • Configuring Ethernet over MPLS in Port Mode

            • Examples

          • Configuring Ethernet over MPLS with VLAN ID Rewrite

            • Guidelines for Configuring Ethernet over MPLS with VLAN ID Rewrite for the Cisco 12000 Series Routers for Cisco IOS Releases 12.0(29)S and Earlier Releases

            • Configuring Ethernet over MPLS with VLAN ID Rewrite for the Cisco 12000 Series Routers for Cisco IOS Releases 12.0(30)S and Later Releases

          • Configuring per-Subinterface MTU for Ethernet over MPLS

            • Restrictions

          • Configuring Frame Relay over MPLS with DLCI-to-DLCI Connections

          • Configuring Frame Relay over MPLS with Port-to-Port Connections

          • Configuring HDLC and PPP over MPLS

            • Restrictions

          • Configuring Tunnel Selection

            • Examples

            • Troubleshooting Tips

          • Setting Experimental Bits with AToM

            • Restrictions

          • Setting the Frame Relay Discard Eligibility Bit on the Cisco 7200 and 7500 Series Routers

          • Matching the Frame Relay DE Bit on the Cisco 7200 and 7500 Series Routers

          • Enabling the Control Word

        • Configuration Examples for Any Transport over MPLS

          • ATM AAL5 over MPLS: Examples

          • OAM Cell Emulation for ATM AAL5 over MPLS: Examples

          • ATM Cell Relay over MPLS: Examples

          • ATM Single Cell Relay over MPLS: Examples

          • Ethernet over MPLS: Examples

          • Tunnel Selection: Examples

          • Setting Frame Relay Discard Eligibility Bit on the Cisco 7200 and 7500 Series Routers: Examples

          • Matching Frame Relay DE Bit on the Cisco 7200 and 7500 Series Routers: Examples

          • ATM over MPLS: Examples

          • Ethernet over MPLS with MPLS Traffic Engineering Fast Reroute: Examples

          • Configuring per-Subinterface MTU for Ethernet over MPLS: Example

          • Configuring MTU Values in xconnect Configuration Mode for L2VPN Interworking: Example

          • Removing a Pseudowire: Examples

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for Any Transport over MPLS

      • MPLS MTU Command Changes

        • Contents

        • Information About MPLS MTU Command Changes

          • MPLS MTU Values During Upgrade

          • Guidelines for Setting MPLS MTU and Interface MTU Values

          • MPLS MTU Values for Ethernet Interfaces

        • How to Configure MPLS MTU Values

          • Setting the Interface MTU and MPLS MTU Values

          • Setting the MPLS MTU Value on an Ethernet Interface

        • Configuration Examples for Setting the MPLS MTU Values

          • Setting the Interface MTU and MPLS MTU: Example

          • Setting the MPLS MTU Value on an Ethernet Interface: Example

        • Feature Information for MPLS MTU Command Changes

      • AToM Static Pseudowire Provisioning

        • Finding Feature Information

        • Contents

        • Restrictions for AToM Static Pseudowire Provisioning

        • Information About AToM Static Pseudowire Provisioning

          • Pseudowire Provisioning

          • Benefits of Statically Provisioned Pseudowires

        • How to Provision an AToM Static Pseudowire

          • Provisioning an AToM Static Pseudowire

          • Verifying the AToM Static Pseudowire Configuration

        • Configuration Examples for AToM Static Pseudowire Provisioning

          • Provisioning an AToM Pseudowire: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for AToM Static Pseudowire Provisioning

      • MPLS Pseudowire Status Signaling

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS Pseudowire Status Signaling

        • Restrictions for MPLS Pseudowire Status Signaling

        • Information About MPLS Pseudowire Status Signaling

          • How MPLS Pseudowire Status Signaling Works

            • When One Router Does Not Support MPLS Pseudowire Status Signaling

            • Status Messages Indicating That the Attachment Circuit Is Down

            • Message Codes in the Pseudowire Status Messages

        • How to Configure MPLS Pseudowire Status Signaling

          • Enabling MPLS Pseudowire Status Signaling

        • Configuration Examples for MPLS Pseudowire Status Signaling

          • MPLS Pseudowire Status Signaling: Example

          • Verifying That Both Routers Support Pseudowire Status Messages: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Pseudowire Status Signaling

      • L2VPN Interworking

        • Finding Feature Information

        • Contents

        • Prerequisites for L2VPN Interworking

        • Restrictions for L2VPN Interworking

          • General Restrictions

          • Cisco 7600 Series Routers Restrictions

          • Cisco 12000 Series Router Restrictions

          • ATM AAL5 Interworking Restrictions

          • Ethernet/VLAN Interworking Restrictions

          • L2VPN Interworking: VLAN Enable/Disable Option for AToM Restrictions

          • Frame Relay Interworking Restrictions

          • PPP Interworking Restrictions

        • Information About L2VPN Interworking

          • Overview of L2VPN Interworking

          • L2VPN Interworking Modes

            • Ethernet (Bridged) Interworking

            • IP (Routed) Interworking

            • VLAN Interworking

          • L2VPN Interworking: Support Matrix

          • Static IP Addresses for L2VPN Interworking for PPP

        • How to Configure L2VPN Interworking

          • Configuring L2VPN Interworking

          • Verifying the L2VPN Interworking Configuration

          • Configuring L2VPN Interworking: VLAN Enable/Disable Option for AToM

            • Restrictions

            • Prerequisites

            • Examples

        • Configuration Examples for L2VPN Interworking

          • Ethernet to VLAN over L2TPV3 (Bridged): Example

          • Ethernet to VLAN over AToM (Bridged): Example

          • Frame Relay to VLAN over L2TPV3 (Routed): Example

          • Frame Relay to VLAN over AToM (Routed): Example

          • Frame Relay to ATM AAL5 over AToM (Routed): Example

          • VLAN to ATM AAL5 over AToM (Bridged): Example

          • Frame Relay to PPP over L2TPv3 (Routed): Example

          • Frame Relay to PPP over AToM (Routed): Example

          • Ethernet/VLAN to PPP over AToM (Routed): Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for L2VPN Interworking

      • L2VPN Pseudowire Redundancy

        • Finding Feature Information

        • Contents

        • Prerequisites for L2VPN Pseudowire Redundancy

        • Restrictions for L2VPN Pseudowire Redundancy

        • Information About L2VPN Pseudowire Redundancy

          • Introduction to L2VPN Pseudowire Redundancy

        • How to Configure L2VPN Pseudowire Redundancy

          • Configuring the Pseudowire

          • Configuring L2VPN Pseudowire Redundancy

            • Prerequisites

          • Forcing a Manual Switchover to the Backup Pseudowire VC

          • Verifying the L2VPN Pseudowire Redundancy Configuration

        • Configuration Examples for L2VPN Pseudowire Redundancy

          • L2VPN Pseudowire Redundancy and AToM (Like to Like): Examples

          • L2VPN Pseudowire Redundancy and L2VPN Interworking: Examples

          • L2VPN Pseudowire Redundancy with Layer 2 Local Switching: Examples

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for L2VPN Pseudowire Redundancy

      • L2VPN Pseudowire Switching

        • Finding Feature Information

        • Contents

        • Prerequisites for L2VPN Pseudowire Switching

        • Restrictions for L2VPN Pseudowire Switching

        • Information About L2VPN Pseudowire Switching

          • How L2VPN Pseudowire Switching Works

          • How Packets Are Manipulated at the L2VPN Pseudowire Switching Aggregation Point

        • How to Configure L2VPN Pseudowire Switching

          • Prerequisites

          • Restrictions

            • Examples

        • Configuration Examples for L2VPN Pseudowire Switching

          • L2VPN Pseudowire Switching in an Inter-AS Configuration: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for L2VPN Pseudowire Switching

      • VPLS Autodiscovery: BGP Based

        • Finding Feature Information

        • Contents

        • Prerequisites for VPLS Autodiscovery: BGP Based

        • Restrictions for VPLS Autodiscovery: BGP Based

        • Information About VPLS Autodiscovery: BGP Based

          • How the VPLS Feature Works

          • How the VPLS Autodiscovery: BGP Based Feature Works

          • How Enabling VPLS Autodiscovery Differs from Manually Configuring VPLS

          • Show Commands Affected by VPLS Autodiscovery: BGP Based

          • BGP VPLS Autodiscovery Support on a Route Reflector

        • How to Configure VPLS Autodiscovery: BGP Based

          • Enabling VPLS Autodiscovery: BGP Based

            • Prerequisites

          • Configuring BGP to Enable VPLS Autodiscovery

          • Customizing the VPLS Autodiscovery Settings

        • Configuration Examples for VPLS Autodiscovery: BGP Based

          • VPLS Autodiscovery: BGP Based: Basic Example

          • BGP VPLS Autodiscovery Support on Route Reflector: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for VPLS Autodiscovery: BGP Based

      • H-VPLS N-PE Redundancy for QinQ and MPLS Access

        • Contents

        • Prerequisites for H-VPLS N-PE Redundancy for QinQ and MPLS Access

        • Restrictions for H-VPLS N-PE Redundancy for QinQ and MPLS Access

        • Information About H-VPLS N-PE Redundancy for QinQ and MPLS Access

          • How H-VPLS N-PE Redundancy for QinQ and MPLS Access Works

            • H-VPLS N-PE Redundancy with QinQ Access Based on MSTP

            • H-VPLS N-PE Redundancy with MPLS Access Based on Pseudowire Redundancy

          • MAC Address Withdrawal

            • How MAC Address Withdrawal Works with H-VPLS N-PE Redundancy with QinQ Access

            • How MAC Address Withdrawal Works with H-VPLS N-PE Redundancy with MPLS Access

        • How to Configure H-VPLS N-PE Redundancy for QinQ and MPLS Access

          • Configuring the VPLS Pseudowire Between the N-PE Routers

            • Prerequisites

          • Configuring the SVI for the Native VLAN

          • Verifying the H-VPLS N-PE Redundancy for QinQ and MPLS Access Configuration

        • Configuration Examples for H-VPLS N-PE Redundancy for QinQ and MPLS Access

          • H-VPLS N-PE Redundancy for QinQ Access: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for H-VPLS N-PE Redundancy for QinQ and MPLS Access

        • Glossary

      • L2VPN Multisegment Pseudowires

        • Finding Feature Information

        • Contents

        • Prerequisites for L2VPN Multisegment Pseudowires

        • Restrictions for L2VPN Multisegment Pseudowires

        • Information About L2VPN Multisegment Pseudowires

          • L2VPN Pseudowire Defined

          • L2VPN Multisegment Pseudowire Defined

        • How to Configure L2VPN Multisegment Pseudowires

          • Configuring L2VPN Multisegment Pseudowires

          • Displaying Information About the L2VPN Multisegment Pseudowires

          • Performing ping mpls and trace mpls Operations on L2VPN Multisegment Pseudowires

            • Restrictions

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for L2VPN Multisegment Pseudowires

      • QoS Policy Support for L2VPN ATM PVPs

        • Finding Feature Information

        • Contents

        • Prerequisites for QoS Policy Support for L2VPN ATM PVPs

        • Restrictions for QoS Policy Support for L2VPN ATM PVPs

        • Information About QoS Policy Support for L2VPN ATM PVPs

          • MQC Structure

          • Elements of a Traffic Class

          • Elements of a Traffic Policy

        • How to Configure QoS Policy Support for L2VPN ATM PVPs

          • Enabling a Service Policy in ATM PVP Mode

            • Restrictions

          • Enabling Traffic Shaping in ATM PVP Mode

            • Restrictions

          • Enabling Matching of ATM VCIs

            • Restrictions

        • Configuration Examples for QoS Policy Support for L2VPN ATM PVPs

          • Enabling Traffic Shaping in ATM PVP Mode: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for QoS Policy Support for L2VPN ATM PVPs

      • L2VPN: Pseudowire Preferential Forwarding

        • Finding Feature Information

        • Contents

        • Prerequisites for L2VPN: Pseudowire Preferential Forwarding

        • Restrictions for L2VPN: Pseudowire Preferential Forwarding

        • Information About L2VPN: Pseudowire Preferential Forwarding

          • Overview of L2VPN: Pseudowire Preferential Forwarding

        • How to Configure L2VPN: Pseudowire Preferential Forwarding

          • Configuring the Pseudowire

            • Prerequisites

        • Configuration Examples for L2VPN: Pseudowire Preferential Forwarding

          • L2VPN: Pseudowire Preferential Forwarding Configuration: Example

          • Displaying the Status of the Pseudowires: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for L2VPN: Pseudowire Preferential Forwarding

    • MPLS Layer 3 VPNs

    • Configuring MPLS Layer 3 VPNs

      • MPLS VPN Half-Duplex VRF

        • Contents

        • Prerequisites for Configuring MPLS VPN Half-Duplex VRF

        • Restrictions for MPLS VPN Half-Duplex VRF

        • Information About Configuring MPLS VPN Half-Duplex VRF

          • MPLS VPN Half-Duplex VRF Overview

          • Upstream and Downstream VRFs

          • Reverse Path Forwarding Check

        • How to Configure MPLS VPN Half-Duplex VRF

          • Configuring the Upstream and Downstream VRFs on the Spoke PE Router

          • Associating a VRF with an Interface

          • Configuring the Downstream VRF for an AAA Server

          • Verifying MPLS VPN Half-Duplex VRF Configuration

        • Configuration Examples for MPLS VPN Half-Duplex VRF

          • Configuring the Upstream and Downstream VRFs on the Spoke PE Router: Example

          • Associating a VRF with an Interface: Example

          • Configuring MPLS VPN Half-Duplex VRF: Example Using Static CE-PE Routing

          • Configuring MPLS VPN Half-Duplex VRF: Example Using RADIUS Server and Static CE-PE Routing

          • Configuring MPLS VPN Half-Duplex VRF: Example Using Dynamic CE-PE Routing

        • Additional References

        • Related Documents

        • Standards

        • MIBs

        • RFCs

        • Technical Assistance

        • Feature Information for MPLS VPN Half-Duplex VRF

      • MPLS VPN-Show Running VRF

        • Contents

        • Prerequisites for MPLS VPN-Show Running VRF

        • Restrictions for MPLS VPN-Show Running VRF

        • Information About MPLS VPN-Show Running VRF

          • Configuration Elements Displayed for the MPLS VPN-Show Running VRF Feature

          • Display of VRF Routing Protocol Configuration

          • Display of Configuration Not Directly Linked to a VRF

        • How to Configure MPLS VPN-Show Running VRF

        • Configuration Examples for MPLS VPN-Show Running VRF

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS VPN-Show Running VRF

        • Glossary

      • MPLS VPN-VRF CLI for IPv4 and IPv6 VPNs

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS VPN-VRF CLI for IPv4 and IPv6 VPNs

        • Restrictions for MPLS VPN-VRF CLI for IPv4 and IPv6 VPNs

        • Information About MPLS VPN-VRF CLI for IPv4 and IPv6 VPNs

          • VRF Concepts Similar for IPv4 and IPv6 MPLS VPNs

          • Single-Protocol VRF to Multiprotocol VRF Migration

          • Multiprotocol VRF Configurations Characteristics and Examples

            • Multiprotocol VRF Configuration: Single Protocol with Noncommon Policies Example

            • Multiprotocol VRF Configuration: Multiprotocol with Noncommon Policies Example

            • Multiprotocol VRF Configuration: Multiprotocol with Common Policies Example

            • Multiprotocol VRF Configuration: Multiprotocol with Common and Noncommon Policies

        • How to Configure MPLS VPN-VRF CLI for IPv4 and IPv6 VPNs

          • Configuring a VRF for IPv4 and IPv6 MPLS VPNs

          • Associating a Multiprotocol VRF with an Interface

          • Verifying the MPLS VPN-VRF CLI for IPv4 and IPv6 VPNs Configuration

          • Migrating from a Single-Protocol IPv4-Only VRF to a Multiprotocol VRF Configuration

        • Configuration Examples for MPLS VPN-VRF CLI for IPv4 and IPv6 VPNs

          • Configuring a VRF for IPv4 and IPv6 VPNs: Example

          • Associating a Multiprotocol VRF with an Interface: Example

          • Migrating from a Single-Protocol IPv4-Only VRF Configuration to a Multiprotocol VRF Configuration: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS VPN-VRF CLI for IPv4 and IPv6 VPNs

        • Glossary

      • MPLS VPN-BGP Local Convergence

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS VPN-BGP Local Convergence

        • Restrictions for MPLS VPN-BGP Local Convergence

        • Information About MPLS VPN-BGP Local Convergence

          • How Link Failures Are Handled with BGP

          • How Links Are Handled with the MPLS VPN-BGP Local Convergence Feature

          • How Link Failures Are Detected

        • How to Enable MPLS VPN-BGP Local Convergence

          • Configuring MPLS VPN-BGP Local Convergence with IPv4

            • Prerequisite

          • Configuring MPLS VPN-BGP Local Convergence with IPv6

            • Prerequisite

            • Examples

          • Troubleshooting Tips

        • Configuration Examples for MPLS VPN-BGP Local Convergence

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS VPN-BGP Local Convergence

      • MPLS VPN-Route Target Rewrite

        • Contents

        • Prerequisites for MPLS VPN-Route Target Rewrite

        • Restrictions for MPLS VPN-Route Target Rewrite

        • Information About MPLS VPN-Route Target Rewrite

          • Route Target Replacement Policy

          • Route Maps and Route Target Replacement

        • How to Configure MPLS VPN-Route Target Rewrite

          • Configuring a Route Target Replacement Policy

          • Applying the Route Target Replacement Policy

            • Associating Route Maps with Specific BGP Neighbors

            • Refreshing BGP Session to Apply Route Target Replacement Policy

            • Troubleshooting Tips

          • Verifying the Route Target Replacement Policy

          • Troubleshooting Your Route Target Replacement Policy

        • Configuration Examples for MPLS VPN-Route Target Rewrite

          • Configuring Route Target Replacement Policies: Examples

          • Applying Route Target Replacement Policies: Examples

            • Associating Route Maps with Specific BGP Neighbor: Example

            • Refreshing the BGP Session to Apply the Route Target Replacement Policy: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS VPN-Route Target Rewrite

        • Glossary

      • MPLS VPN-Per VRF Label

        • Finding Feature Information

        • Contents

        • Prerequisites for the Per VRF Label Feature

        • Restrictions for the Per VRF Label Feature

        • Information About the Per VRF Label Feature

          • MPLS VPN-Per VRF Label Functionality

        • How to Configure the Per VRF Label Feature

          • Configuring the Per VRF Label Feature

            • Examples

        • Configuration Examples for the Per VRF Label feature

          • No Label Mode (Cisco 6500 Router Default): Example

          • Mixed Mode (with Global Per-Prefix): Example

          • Mixed Mode (with Global Per-VRF): Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS VPN-Per VRF Label

      • MPLS VPN 6VPE per VRF Label

        • Finding Feature Information

        • Contents

        • Prerequisites for the MPLS VPN 6VPE per VRF Label feature

        • Restrictions for the MPLS VPN 6VPE per VRF Label feature

        • Information About the MPLS VPN 6VPE per VRF Label feature

          • MPLS VPN 6VPE per VRF Label Functionality

        • How to Configure the MPLS VPN 6VPE per VRF Label Feature

          • Configuring the MPLS VPN 6VPE per VRF Label Feature

            • Examples

            • Troubleshooting Tips

        • Configuration Examples for MPLS VPN 6VPE per VRF Label

          • 6VPE No Label Mode (Cisco 7600 Router Default): Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS VPN 6VPE per VRF Label

      • MPLS Multi-VRF (VRF-Lite)

        • Contents

        • Prerequisites for MPLS Multi-VRF

        • Restrictions with MPLS Multi-VRF

        • Information About MPLS Multi-VRF

          • How the MPLS Multi-VRF Feature Works

          • How Packets Are Forwarded in a Network Using the MPLS Multi-VRF Feature

        • How to Configure MPLS Multi-VRF

          • Configuring VRFs

            • Restrictions

            • Default VRF Configuration

          • Configuring BGP as the Routing Protocol (Recommended)

          • Configuring PE-to-CE MPLS Forwarding and Signalling with BGP (Recommended)

          • Configuring a Routing Protocol Other Than BGP

            • Restrictions

          • Configuring PE-to-CE MPLS Forwarding and Signalling with LDP

        • Configuration Examples for MPLS Multi-VRF

          • Configuring MPLS Multi-VRF on the PE Router: Example

          • Configuring MPLS Multi-VRF on the CE Router

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Multi-VRF

      • BGP Best External

        • Finding Feature Information

        • Contents

        • Prerequisites for BGP Best External

        • Restrictions for BGP Best External

        • Information About BGP Best External

          • BGP Best External Overview

          • What the Best External Route Means

          • How the BGP Best External Feature Works

          • Configuration Modes for Enabling BGP Best External

        • How to Configure BGP Best External

          • Enabling the BGP Best External Feature

            • Prerequisites

          • Verifying the BGP Best External Feature

        • Configuration Examples for BGP Best External

          • Configuring the BGP Best External Feature: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for BGP Best External

      • BGP PIC Edge for IP and MPLS-VPN

        • Finding Feature Information

        • Contents

        • Prerequisites for BGP PIC

        • Restrictions for BGP PIC

        • Information About BGP PIC

          • How BGP Converges Under Normal Circumstances

          • How BGP PIC Improves Convergence

            • BGP Fast Reroute’s Role in the BGP PIC Feature

          • How a Failure Is Detected

          • How BGP PIC Can Achieve Subsecond Convergence

          • How BGP PIC Improves Upon the Functionality of MPLS VPN-BGP Local Convergence

          • Configuration Modes for Enabling BGP PIC

          • BGP PIC Scenarios

            • IP PE-CE Link and Node Protection on the CE Side (Dual PEs)

            • IP PE-CE Link and Node Protection on the CE Side (Dual CEs and Dual PE Primary and Backup Nodes)

            • IP MPLS PE-CE Link Protection for the Primary or Backup/Alternate Path

            • IP MPLS PE-CE Node Protection for Primary or Backup/Alternate Path

          • Cisco Express Forwarding Recursion

        • How to Configure BGP PIC

          • Enabling BGP PIC

            • Prerequisites

        • Configuration Examples for BGP PIC

          • Configuring BGP PIC: Example

          • Displaying Backup/Alternate Paths for BGP PIC: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for BGP PIC

      • MPLS VPN-L3VPN over GRE

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS VPN-L3VPN over GRE

        • Restrictions for MPLS VPN-L3VPN over GRE

        • Information About MPLS VPN-L3VPN over GRE

          • PE-to-PE Tunneling

          • P-to-PE Tunneling

          • P-to-P Tunneling

        • How to Configure MPLS VPN-L3VPN over GRE

          • Configuring the MPLS VPN-L3VPN over GRE Tunnel Interface

            • Prerequisites

            • Examples

        • Configuration Examples for MPLS VPN-L3VPN over GRE

          • MPLS Configuration with MPLS VPN-L3VPN over GRE: Example

          • Display of Unicast Routes: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS VPN-L3VPN over GRE

      • Dynamic Layer 3 VPNs with Multipoint GRE Tunnels

        • Finding Feature Information

        • Contents

        • Prerequisites for Dynamic L3 VPNs with mGRE Tunnels

        • Restrictions for Dynamic L3 VPNs with mGRE Tunnels

        • Information About Dynamic L3 VPNs with mGRE Tunnels

          • Layer 3 mGRE Tunnels

            • Interconnecting Provider Edge Routers Within an IP Network

            • Packet Transport Between IP and MPLS Networks

            • BGP Next Hop Verification

          • MPLS VPN over mGRE

            • Route Maps

            • Tunnel Endpoint Discovery and Forwarding

            • Tunnel Decapsulation

            • Tunnel Source

            • IPv6 VPN

        • How to Configure L3 VPN mGRE Tunnels

          • Creating the VRF and mGRE Tunnel

            • Prerequisites

          • Setting Up BGP VPN Exchange

          • Enabling the MPLS VPN over mGRE Tunnels and Configuring L3VPN Encapsulation Profile

            • Prerequisites

          • Defining the Address Space and Specifying Address Resolution for MPLS VPNs over mGRE

            • What to Do Next

        • Configuration Examples for Dynamic L3 VPNs Support Using mGRE Tunnels

          • Configuring Layer 3 VPN mGRE Tunnels: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for Dynamic L3 VPNs with mGRE Tunnels

      • Finding Feature Information

      • Contents

      • Prerequisites for MPLS Layer 3 VPNs

      • Restrictions for MPLS Layer 3 VPNs

      • Information about MPLS Layer 3 VPNs

        • MPLS VPN Definition

        • How an MPLS VPN Works

          • How Virtual Routing/Forwarding Tables Work in an MPLS VPN

          • How VPN Routing Information Is Distributed in an MPLS VPN

          • BGP Distribution of VPN Routing Information

          • MPLS Forwarding

        • Major Components of MPLS VPNs

        • Benefits of an MPLS VPN

      • How to Configure MPLS Layer 3 VPNs

        • Configuring the Core Network

          • Assessing the Needs of MPLS VPN Customers

          • Configuring Routing Protocols in the Core

          • Configuring MPLS in the Core

          • Determining if CEF Is Enabled in the Core

          • Configuring Multiprotocol BGP on the PE Routers and Route Reflectors

        • Connecting the MPLS VPN Customers

          • Defining VRFs on the PE Routers to Enable Customer Connectivity

          • Configuring VRF Interfaces on PE Routers for Each VPN Customer

          • Configuring Routing Protocols Between the PE and CE Routers

        • Verifying the VPN Configuration

        • Verifying Connectivity Between MPLS VPN Sites

          • Verifying IP Connectivity from CE Router to CE Router Across the MPLS Core

          • Verifying that the Local and Remote CE Routers are in the Routing Table

      • Configuration Examples for MPLS VPNs

        • Configuring an MPLS VPN Using BGP: Example

        • Configuring an MPLS VPN Using RIP: Example

        • Configuring an MPLS VPN Using Static Routes: Example

        • Configuring an MPLS VPN Using OSPF: Example

        • Configuring an MPLS VPN Using EIGRP: Example

      • Additional References

        • Related Documents

        • Standards

        • MIBs

        • RFCs

        • Technical Assistance

      • Feature Information for MPLS Layer 3 VPNs

    • MPLS Layer 3 VPNs: InterAutonomous Systems and Carrier Supporting Carrier

      • MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

        • Restrictions for MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

        • Information About MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

          • MPLS VPN Inter-AS Introduction

          • Benefits of MPLS VPN Inter-AS

          • Use of Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

          • Information Exchange in an MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

            • Transmission of Information in an MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

            • Exchange of VPN Routing Information in an MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

            • Packet Forwarding Between MPLS VPN Inter-AS Systems with ASBRs Exchanging VPN-IPv4 Addresses

            • Use of a Confederation for MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

        • How to Configure MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

          • Configuring the ASBRs to Exchange VPN-IPv4 Addresses

          • Configuring EBGP Routing to Exchange VPN Routes Between Subautonomous Systems in a Confederation

          • Verifying Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

            • Examples

        • Configuration Examples for MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

          • Configuring MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses: Example

            • Configuration for Autonomous System 1, CE1: Example

            • Configuration for Autonomous System 1, PE1: Example

            • Configuration for Autonomous System 1, P1: Example

            • Configuration for Autonomous System 1, EBGP1: Example

            • Configuration for Autonomous System 2, EBGP2: Example

            • Configuration for Autonomous System 2, P2: Example

            • Configuration for Autonomous System 2, PE2: Example

            • Configuration for Autonomous System 2, CE2: Example

          • Configuring MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses in a Confederation: Example

            • Configuration for Autonomous System 1, CE1: Example

            • Configuration for Autonomous System 1, PE1: Example

            • Configuration for Autonomous System 1, P1 Example

            • Configuration for Autonomous System 1, CEBGP1: Example

            • Configuration for Autonomous System 2, CEBGP2: Example

            • Configuration for Autonomous System 2, P2: Example

            • Configuration for Autonomous System 2, PE2: Example

            • Configuration for Autonomous System 2, CE2: Example

        • Command Reference

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

      • MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels

        • Restrictions for MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels

        • Information About MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels

          • MPLS VPN Inter-AS Introduction

          • Benefits of MPLS VPN Inter-AS

          • Information About Using MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels

          • Benefits of MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels

          • How the Inter-AS Works When ASBRs Exchange IPv4 Routes with MPLS Labels

            • BGP Routing Information

            • Types of BGP Messages and MPLS Labels

            • How BGP Sends MPLS Labels with Routes

        • How to Configure MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels

          • Configuring the ASBRs to Exchange IPv4 Routes and MPLS Labels

          • Configuring the Route Reflectors to Exchange VPN-IPv4 Routes

          • Configuring the Route Reflector to Reflect Remote Routes in Its Autonomous System

          • Verifying the MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels Configuration

            • Verifying the Route Reflector Configuration

            • Verifying that CE1 Can Communicate with CE2

            • Verifying that PE1 Can Communicate with CE2

            • Verifying that PE2 Can Communicate with CE2

            • Verifying the ASBR Configuration

        • Configuration Examples for MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels

          • Configuring MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels over an MPLS VPN Service Provider: Examples

            • Route Reflector 1 Configuration Example (MPLS VPN Service Provider)

            • ASBR1 Configuration Example (MPLS VPN Service Provider)

            • Route Reflector 2 Configuration Example (MPLS VPN Service Provider)

            • ASBR2 Configuration Example (MPLS VPN Service Provider)

          • Configuring MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels over a Non-MPLS VPN Service Provider: Examples

            • Route Reflector 1 Configuration Example (Non-MPLS VPN Service Provider)

            • ASBR1 Configuration Example (Non-MPLS VPN Service Provider)

            • Route Reflector 2 Configuration Example (Non-MPLS VPN Service Provider)

            • ASBR2 Configuration Example (Non-MPLS VPN Service Provider)

            • ASBR3 Configuration Example (Non-MPLS VPN Service Provider)

            • Route Reflector 3 Configuration Example (Non-MPLS VPN Service Provider)

            • ASBR4 Configuration Example (Non-MPLS VPN Service Provider)

        • Command Reference

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS VPN Inter-AS with ASBRs Exchanging IPv4 Routes and MPLS Labels

      • MPLS VPN Carrier Supporting Carrier Using LDP and an IGP

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS VPN CSC with LDP and IGP

        • Restrictions for MPLS VPN CSC with LDP and IGP

        • Information About MPLS VPN CSC with LDP and IGP

          • MPLS VPN CSC Introduction

          • Benefits of Implementing MPLS VPN CSC

          • Configuration Options for MPLS VPN CSC with LDP and IGP

            • Customer Carrier Is an ISP

          • Customer Carrier Is a BGP/MPLS VPN Service Provider

        • How to Configure MPLS VPN CSC with LDP and IGP

          • Configuring the Backbone Carrier Core

            • Prerequisites

            • Verifying IP Connectivity and LDP Configuration in the CSC Core

            • Configuring VRFs for CSC-PE Routers

            • Configuring Multiprotocol BGP for VPN Connectivity in the Backbone Carrier

          • Configuring the CSC-PE and CSC-CE Routers

            • Prerequisites

            • Configuring LDP on the CSC-PE and CSC-CE Routers

            • Enabling MPLS Encapsulation on the CSC-PE and CSC-CE Routers

          • Verifying the Carrier Supporting Carrier Configuration

        • Configuration Examples for MPLS VPN CSC with LDP and IGP

          • MPLS VPN CSC Network with a Customer Who Is an ISP: Example

            • CSC-CE1 Configuration

            • CSC-PE1 Configuration

            • CSC-PE2 Configuration

            • CSC-CE2 Configuration

          • MPLS VPN CSC Network with a Customer Who Is an MPLS VPN Provider: Example

            • CE1 Configuration

            • PE1 Configuration

            • CSC-CE1 Configuration

            • CSC-PE1 Configuration

            • CSC-PE2 Configuration

            • CSC-CE2 Configuration

            • PE2 Configuration

            • CE2 Configuration

          • MPLS VPN CSC Network That Contains Route Reflectors: Example

            • Backbone Carrier Configuration

            • Customer Carrier Site 1 Configuration

            • Customer Carrier Site 2 Configuration

          • MPLS VPN CSC Network with a Customer Who Has VPNs at the Network Edge: Example

            • Backbone Carrier Configuration

            • Customer Carrier Site 1 Configuration

            • Customer Carrier Site 2 Configuration

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS VPN CSC with LDP and IGP

        • Glossary

      • MPLS VPN Carrier Supporting Carrier with BGP

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS VPN CSC with BGP

        • Restrictions for MPLS VPN CSC with BGP

        • Information About MPLS VPN CSC with BGP

          • MPLS VPN CSC Introduction

          • Benefits of Implementing MPLS VPN CSC

          • Benefits of Implementing MPLS VPN CSC with BGP

          • Configuration Options for MPLS VPN CSC with BGP

            • Customer Carrier Is an ISP with an IP Core

            • Customer Carrier Is an MPLS Service Provider With or Without VPN Services

        • How to Configure MPLS VPN CSC with BGP

          • Identifying the Carrier Supporting Carrier Topology

          • Configuring the Backbone Carrier Core

            • Prerequisites

            • Verifying IP Connectivity and LDP Configuration in the CSC Core

            • Configuring VRFs for CSC-PE Routers

            • Configuring Multiprotocol BGP for VPN Connectivity in the Backbone Carrier

          • Configuring the CSC-PE and CSC-CE Routers

            • Configuring CSC-PE Routers

            • Configuring CSC-CE Routers

            • Verifying Labels in the CSC-PE Routers

            • Verifying Labels in the CSC-CE Routers

          • Configuring the Customer Carrier Network

            • Prerequisites

            • Verifying IP Connectivity in the Customer Carrier

            • Configuring a Customer Carrier Core Router as a Route Reflector

          • Configuring the Customer Site for Hierarchical VPNs

            • Defining VPNs on PE Routers for Hierarchical VPNs

            • Configuring BGP Routing Sessions on the PE Routers for Hierarchical VPNs

            • Verifying Labels in Each PE Router for Hierarchical VPNs

            • Configuring CE Routers for Hierarchical VPNs

            • Verifying IP Connectivity in the Customer Site

        • Configuration Examples for MPLS VPN CSC with BGP

          • Configuring the Backbone Carrier Core: Examples

            • Verifying IP Connectivity and LDP Configuration in the CSC Core: Example

            • Configuring VRFs for CSC-PE Routers: Example

            • Configuring Multiprotocol BGP for VPN Connectivity in the Backbone Carrier: Example

          • Configuring the Links Between CSC-PE and CSC-CE Routers: Examples

            • Configuring the CSC-PE Routers: Examples

            • Configuring the CSC-CE Routers: Examples

            • Verifying Labels in the CSC-PE Routers: Examples

            • Verifying Labels in the CSC-CE Routers: Examples

          • Configuring the Customer Carrier Network: Examples

            • Verifying IP Connectivity in the Customer Carrier: Example

            • Configuring a Customer Carrier Core Router as a Route Reflector: Example

          • Configuring the Customer Site for Hierarchical VPNs: Examples

            • Configuring PE Routers for Hierarchical VPNs: Examples

            • Verifying Labels in Each PE Router for Hierarchical VPNs: Examples

            • Configuring CE Routers for Hierarchical VPNs: Examples

            • Verifying IP Connectivity in the Customer Site: Examples

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS VPN CSC with BGP

        • Glossary

      • Load Sharing MPLS VPN Traffic

        • Finding Feature Information

        • Contents

        • Prerequisites for Load Sharing MPLS VPN Traffic

        • Restrictions for Load Sharing MPLS VPN Traffic

        • Information About Load Sharing MPLS VPN Traffic

          • Load Sharing Using BGP Multipath Options

            • Internal BGP Multipath Load Sharing

            • BGP Multipath for eBGP and iBGP

            • eBGP Multipath Load Sharing

          • Load Sharing Using Directly Connected Loopback Peering

        • How to Configure Load Sharing

          • Configuring BGP Multipath Load Sharing for eBGP and iBGP

            • Restrictions

          • Verifying BGP Multipath Load Sharing for eBGP and iBGP

          • Configuring eBGP Multipath Load Sharing with MPLS VPN Inter-AS

            • Restrictions

          • Configuring eBGP Multipath Load Sharing with MPLS VPN Carrier Supporting Carrier

            • Configuring eBGP Multipath Load Sharing on the CSC-PE Routers

            • Configuring eBGP Multipath Load Sharing on the CSC-CE Routers

          • Configuring Directly Connected Loopback Peering for MPLS VPN Inter-AS using ASBRs to Exchange VPN-IPv4 Addresses

            • Configuring Loopback Interface Addresses for Directly Connected ASBRs

            • Configuring /32 Static Routes to the eBGP Neighbor Loopback

            • Configuring Forwarding on Connecting Loopback Interfaces

            • Configuring an eBGP Session Between the Loopbacks

            • Verifying That Load Sharing Occurs Between Loopbacks

          • Configuring Directly Connected Loopback Peering for MPLS VPN Inter-AS Using ASBRs to Exchange IPv4 Routes and Labels

            • Configuring Loopback Interface Addresses for Directly Connected ASBRs

            • Configuring /32 Static Routes to the eBGP Neighbor Loopback

            • Configuring Forwarding on Connecting Loopback Interfaces

            • Configuring an eBGP Session Between the Loopbacks

            • Verifying That Load Sharing Occurs Between Loopbacks

          • Configuring Directly Connected Loopback Peering on MPLS VPN Carrier Supporting Carrier

            • Configuring Loopback Interface Addresses on CSC-PE Routers

            • Configuring Loopback Interface Addresses for CSC-CE Routers

            • Configuring /32 Static Routes to the eBGP Neighbor Loopback on the CSC-PE Router

            • Configuring /32 Static Routes to the eBGP Neighbor Loopback on the CSC-CE Router

            • Configuring Forwarding on CSC-PE Interfaces That Connect to the CSC-CE Loopback

            • Configuring Forwarding on CSC-CE Interfaces That Connect to the CSC-PE Loopback

            • Configuring an eBGP Session Between the CSC-PE Router and the CSC-CE Loopback

            • Configuring an eBGP Session Between the CSC-CE Router and the CSC-PE Loopback

            • Verifying That Load Sharing Occurs Between Loopbacks

        • Configuration Examples for Load Sharing MPLS VPN Traffic

          • Configuring a Router to Select eBGP or iBGP Paths as Multipaths: Example

          • Configuring a /32 Static Route from an ASBR to the Loopback Address of Another ASBR: Examples

          • Configuring BGP/MPLS Forwarding on the Interfaces Connecting ASBRs: Example

          • Configuring VPNv4 Sessions on an ASBR: Example

          • Verifying VPN NLRI for a Specified Network: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for Load Sharing MPLS VPN Traffic

      • MPLS VPN-Inter-AS Option AB

        • Contents

        • Prerequisites for MPLS VPN-Inter-AS Option AB

        • Restrictions for MPLS VPN-Inter-AS Option AB

        • Information About MPLS VPN-Inter-AS Option AB

          • MPLS VPN-Inter-AS Option AB Introduction

          • Benefits of MPLS VPN-Inter-AS Option AB

          • MPLS VPN-Inter-AS Option AB Route Distribution and Packet Forwarding in Non-CSC Networks

            • Route Distribution for VPN 1

            • Packet Forwarding for VPN 1

            • Route Distribution for VPN 2

          • MPLS VPN-Inter-AS Option AB Route Distribution and Packet Forwarding for CSC

            • Route Distribution for VPN 1

            • Packet Forwarding for VPN 1

        • How to Configure Inter-AS Option AB

          • Configuring an Inter-AS Option AB Connection

            • Configuring the VRFs on the ASBR Interface for Each VPN Customer

            • Configuring the MP-BGP Session Between ASBR Peers

            • Configuring the Routing Policy for VPNs that Need Inter-AS Connections

          • Changing an Inter-AS Option A Deployment to an Option AB Deployment

        • Configuration Examples for MPLS VPN-Inter-AS Option AB

          • Inter-AS AB Network Configuration: Examples

            • CE1: Example

            • CE2: Example

            • PE1: Example

            • Route Reflector 1: Example

            • ASBR1: Example

            • ASBR 3: Example

            • PE2: Example

            • CE3: Example

            • CE 4: Example

          • Inter-AS AB CSC Configuration: Examples

            • CE1: Example

            • CE2: Example

            • CE3: Example

            • CE 4: Example

            • PE1: Example

            • CSC-CE1: Example

            • CSC-PE1: Example

            • PE 2: Example

            • CSC-CE2: Example

            • ASBR1: Example

            • CSC-PE 3: Example

            • CSC-CE3: Example

            • CSC-CE 4: Example

            • PE 3: Example

            • PE 4: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for MPLS VPN-Inter-AS Option AB

        • Glossary

    • MPLS Embedded Management and MIBs

      • MPLS EM-MPLS LSP Multipath Tree Trace

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS EM-MPLS LSP Multipath Tree Trace

        • Restrictions for MPLS EM-MPLS LSP Multipath Tree Trace

        • Information About MPLS EM-MPLS LSP Multipath Tree Trace

          • Overview of MPLS LSP Multipath Tree Trace

          • Discovery of IPv4 Load Balancing Paths by MPLS LSP Multipath Tree Trace

          • Echo Reply Return Codes Sent by the Router Processing Multipath LSP Tree Trace

        • How to Configure MPLS EM-MPLS LSP Multipath Tree Trace

          • Customizing the Default Behavior of MPLS Echo Packets

            • MPLS Embedded Management Configuration

            • Prerequisites

          • Configuring MPLS LSP Multipath Tree Trace

            • Prerequisites

          • Discovering IPv4 Load Balancing Paths Using MPLS LSP Multipath Tree Trace

            • MPLS Multipath LSP Traceroute Path Discovery

          • Monitoring LSP Paths Discovered by MPLS LSP Multipath Tree Trace Using MPLS LSP Traceroute

          • Using DSCP to Request a Specific Class of Service in an Echo Reply

          • Controlling How a Responding Router Replies to an MPLS Echo Request

            • Reply Modes for an MPLS LSP Multipath Tree Trace Echo Request Response

          • Specifying the Output Interface for Echo Packets Leaving a Router for MPLS LSP Multipath Tree Trace

            • Echo Request Output Interface Control

          • Setting the Pace of MPLS Echo Request Packet Transmission for MPLS LSP Multipath Tree Trace

          • Enabling MPLS LSP Multipath Tree Trace to Detect LSP Breakages Caused by an Interface That Lacks an MPLS Configuration

            • Explicit Null Label Shimming Tests LSP Ability to Carry MPLS Traffic

          • Requesting That a Transit Router Validate the Target FEC Stack for MPLS LSP Multipath Tree Trace

          • Setting the Number of Timeout Attempts for MPLS LSP Multipath Tree Trace

        • Configuration Examples for MPLS EM-MPLS LSP Multipath Tree Trace

          • Customizing the Default Behavior of MPLS Echo Packets: Example

          • Configuring MPLS LSP Multipath Tree Trace: Example

          • Discovering IPv4 Load Balancing Paths Using MPLS LSP Multipath Tree Trace: Example

          • Using DSCP to Request a Specific Class of Service in an Echo Reply: Example

          • Controlling How a Responding Router Replies to an MPLS Echo Request: Example

          • Specifying the Output Interface for Echo Packets Leaving a Router for MPLS LSP Multipath Tree Trace: Example

          • Setting the Pace of MPLS Echo Request Packet Transmission for MPLS LSP Multipath Tree Trace: Example

          • Enabling MPLS LSP Multipath Tree Trace to Detect LSP Breakages Caused by an Interface That Lacks an MPLS Configuration: Example

          • Requesting That a Transit Router Validate the Target FEC Stack for MPLS LSP Multipath Tree Trace: Example

          • Setting the Number of Timeout Attempts for MPLS LSP Multipath Tree Trace: Example

        • Additional References

        • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS EM-MPLS LSP Multipath Tree Trace

        • Glossary

      • MPLS Enhancements to Interfaces MIB

        • Contents

        • Prerequisites for MPLS Enhancements to Interfaces MIB

        • Restrictions for MPLS Enhancements to Interfaces MIB

        • Information About MPLS Enhancements to Interfaces MIB

          • Feature Design of the MPLS Enhancements to Interfaces MIB

            • ifStackTable Objects

            • ifRcvAddressTable Objects

          • Interfaces MIB Scalar Objects

          • Stacking Relationships for MPLS Layer Interfaces

          • Stacking Relationships for Traffic Engineering Tunnels

          • MPLS Label Switching Router MIB Enhancements

          • Benefits of the MPLS Enhancements to Interfaces MIB

        • How to Configure MPLS Enhancements to Interfaces MIB

          • Enabling the SNMP Agent

        • Configuration Examples for the MPLS Enhancements to Interfaces MIB

          • MPLS Enhancements to Interfaces MIB: Examples

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Glossary

      • MPLS Label Switching Router MIB

        • Contents

        • Information About MPLS Label Switching Router MIB

          • MPLS-LSR-MIB Elements

            • MPLS-LSR-MIB Tables

            • Information from Scalar Objects

          • Linking Table Elements

          • Interface Configuration Table and Interface MIB Links

          • Using the MPLS-LSR-MIB

            • MPLS-LSR-MIB Structure

            • CLI Commands and the MPLS-LSR-MIB

          • Benefits

        • How to Configure the MPLS LSR MIB

          • Prerequisites

          • Enabling the SNMP Agent

          • Verifying That the SNMP Agent Has Been Enabled

        • Configuration Examples for the MPLS LSR MIB

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Glossary

      • MPLS Label Distribution Protocol MIB Version 8 Upgrade

        • Contents

        • Prerequisites for MPLS LDP MIB Version 8 Upgrade

        • Restrictions for MPLS LDP MIB Version 8 Upgrade

        • Information About MPLS LDP MIB Version 8 Upgrade

          • Feature Design of MPLS LDP MIB Version 8 Upgrade

          • Enhancements in Version 8 of the MPLS LDP MIB

          • Benefits of MPLS LDP MIB Version 8 Upgrade

        • Description of MPLS LDP MIB Elements for MPLS LDP MIB Version 8 Upgrade

          • LDP Entities

          • LDP Sessions and Peers

          • LDP Hello Adjacencies

        • Events Generating MPLS LDP MIB Notifications in MPLS LDP MIB Version 8 Upgrade

        • MIB Tables in MPLS LDP MIB Version 8 Upgrade

          • mplsLdpEntityTable

          • mplsLdpEntityConfGenLRTable

          • mplsLdpEntityAtmParmsTable

          • mplsLdpEntityConfAtmLRTable

          • mplsLdpEntityStatsTable

          • mplsLdpPeerTable

          • mplsLdpHelloAdjacencyTable

          • mplsLdpSessionTable

          • mplsLdpAtmSesTable

          • mplsLdpSesStatsTable

          • VPN Contexts in MPLS LDP MIB Version 8 Upgrade

          • SNMP Contexts

          • VPN Aware LDP MIB Sessions

          • VPN Aware LDP MIB Notifications

        • How to Configure MPLS LDP MIB Version 8 Upgrade

          • Enabling the SNMP Agent

          • Enabling Cisco Express Forwarding

          • Enabling MPLS Globally

          • Enabling LDP Globally

          • Enabling MPLS on an Interface

          • Enabling LDP on an Interface

          • Configuring a VPN Aware LDP MIB

            • Configuring SNMP Support for a VPN

            • Configuring an SNMP Context for a VPN

            • What to Do Next

            • Associating an SNMP VPN Context with SNMPv1 or SNMPv2

          • Verifying MPLS LDP MIB Version 8 Upgrade

        • Configuration Examples for MPLS LDP MIB Version 8 Upgrade

          • MPLS LDP MIB Version 8 Upgrade Examples

          • Configuring a VPN Aware SNMP Context for SNMPv1 or SNMPv2: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Glossary

      • MPLS Traffic Engineering MIB

        • Finding Feature Information

        • Contents

        • Restrictions for the MPLS Traffic Engineering MIB

        • Information About the MPLS Traffic Engineering MIB

          • MPLS Traffic Engineering MIB Cisco Implementation

            • MPLS Traffic Engineering Overview

          • Capabilities Supported by the MPLS Traffic Engineering MIB

          • Notification Generation Events

          • Notification Implementation

          • Benefits of MPLS Traffic Engineering MIB

          • MPLS Traffic Engineering MIB Layer Structure

          • Features and Technologies Related to MPLS Traffic Engineering MIB

          • Supported Objects in the MPLS Traffic Engineering MIB

          • CLI Access to MPLS Traffic Engineering MIB Information

            • Retrieving Information from the MPLS Traffic Engineering MIB

        • How to Configure the MPLS Traffic Engineering MIB

          • Enabling the SNMP Agent to Help Manage Various MPLS TE Tunnel Characteristics of Tunnels on the Local Router

          • Verifying the Status of the SNMP Agent

            • Examples

        • Configuration Examples for the MPLS Traffic Engineering MIB

          • Enabling the SNMP Agent to Help Manage Various MPLS TE Tunnel Characteristics of Tunnels on the Local Router: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for the MPLS Traffic Engineering MIB

        • Glossary

      • MPLS Traffic Engineering-Fast Reroute MIB

        • Finding Feature Information

        • Contents

        • Prerequisites for the MPLS Traffic Engineering-Fast Reroute MIB

        • Restrictions for the MPLS Traffic Engineering-Fast Reroute MIB

        • Information About the MPLS Traffic Engineering-Fast Reroute MIB

          • Feature Design of the MPLS Traffic Engineering-Fast Reroute MIB

          • Functional Structure of the MPLS Traffic Engineering-Fast Reroute MIB

          • System Flow of SNMP Protocol Requests and Response Messages

          • FRR MIB Scalar Objects

          • FRR MIB Notifications

            • Notification Generation Events

            • Notification Specification

            • Notification Monitoring

          • MIB Tables in the MPLS Traffic Engineering-Fast Reroute MIB

            • cmplsFrrConstTable

            • cmplsFrrLogTable

            • cmplsFrrFacRouteDBTable

        • How to Configure the MPLS Traffic Engineering-Fast Reroute MIB

          • Enabling the SNMP Agent for FRR MIB Notifications

          • Enabling Cisco Express Forwarding

          • Enabling TE Tunnels

          • Enabling MPLS FRR on Each TE Tunnel

          • Enabling a Backup Tunnel on an Interface

        • Configuration Examples for the MPLS Traffic Engineering-Fast Reroute MIB

          • Enabling an SNMP Agent on a Host NMS: Example

          • Enabling Cisco Express Forwarding: Example

          • Enabling TE Tunnels: Example

          • Enabling MPLS FRR on Each TE Tunnel: Example

          • Enabling a Backup Tunnel on an Interface: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS Traffic Engineering-Fast Reroute MIB

        • Glossary

      • MPLS VPN-MIB Support

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS VPN-MIB Support

        • Restrictions for MPLS VPN-MIB Support

        • Information About MPLS VPN-MIB Support

          • MPLS VPN Overview

          • MPLS VPN MIB Overview

          • MPLS VPN MIB and the IETF

          • Capabilities Supported by PPVPN-MPLS-VPN MIB

          • Functional Structure of the PPVPN-MPLS-VPN MIB

          • Supported Objects in PPVPN-MPLS-VPN MIB

            • Scalar Objects

            • MIB Tables

            • Notifications

          • Unsupported Objects in PPVPN-MPLS-VPN MIB

        • How to Configure MPLS VPN-MIB Support

          • Configuring the SNMP Community

          • Configuring the Router to Send SNMP Traps

          • Configuring Threshold Values for MPLS VPN-SNMP Notifications

        • Configuration Examples for MPLS VPN-MIB Support

          • Configuring the SNMP Community: Examples

          • Configuring the Router to Send SNMP Traps: Example

          • Configuring Threshold Values for MPLS VPN-SNMP Notifications: Examples

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS VPN-MIB Support

        • Glossary

      • MPLS EM-MPLS LDP MIB-RFC 3815

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS EM-MPLS LDP MIB - RFC 3815

        • Restrictions for MPLS EM-MPLS LDP MIB - RFC 3815

        • Information About MPLS EM-MPLS LDP MIB - RFC 3815

          • Label Distribution Protocol Overview

          • MPLS EM-MPLS LDP MIB - RFC 3815 Feature Design and Use

          • Benefits of Using the MPLS EM-MPLS LDP MIB - RFC 3815 Feature

          • MPLS LDP MIB (RFC 3815) Elements

            • LDP Entities

            • LDP Sessions and Peers

            • LDP Hello Adjacencies

          • Events Generating MPLS LDP MIB Notifications

          • Scalar Objects in the MPLS LDP MIB Modules (RFC 3815)

          • MIB Tables in the MPLS-LDP-STD-MIB Module (RFC 3815)

            • MPLS LDP Entity Table (mplsLdpEntityTable) Objects and Descriptions

            • MPLS LDP Entity Statistics Table (mplsLdpEntityStatsTable) Objects and Descriptions

            • MPLS LDP Peer Table (mplsLdpPeerTable) Objects and Descriptions

            • MPLS LDP Session Table (mplsLdpSessionTable) Objects and Descriptions

            • MPLS LDP Session Statistics Table (mplsLdpSessionStatsTable) Objects and Descriptions

            • MPLS LDP Hello Adjacency Table (mplsLdpHelloAdjacencyTable) Objects and Descriptions

          • MIB Tables in the MPLS-LDP-ATM-STD-MIB Module (RFC 3815)

            • MPLS LDP Entity ATM Table (mplsLdpEntityAtmTable) Objects and Descriptions

            • MPLS LDP Entity ATM Label Range Table (mplsLdpEntityAtmLRTable) Objects and Descriptions

            • MPLS LDP ATM Session Table (mplsLdpAtmSessionTable) Objects and Descriptions

          • MIB Table in the MPLS-LDP-GENERIC-STD-MIB Module (RFC 3815)

            • MPLS LDP Entity Generic Label Range Table (mplsLdpEntityGenericLRTable) Objects and Descriptions

          • VPN Contexts in the MPLS LDP MIB

            • SNMP Contexts

            • VPN Aware LDP MIB Sessions

            • VPN Aware LDP MIB Notifications

          • Differences Between the MPLS-LDP-STD-MIB and the MPLS-LDP-MIB

            • MPLS-LDP-MIB and MPLS-LDP-STD-MIB Scalar Object Differences

            • MPLS-LDP-MIB and MPLS-LDP-STD-MIB Table Object Differences

            • MPLS-LDP-MIB and MPLS-LDP-STD-MIB Notification Changes

          • Differences Between the MPLS-LDP-MIB and the MPLS-LDP-ATM-STD-MIB (RFC 3815)

          • Differences Between the MPLS-LDP-MIB and the MPLS-LDP-GENERIC-STD-MIB (RFC 3815)

        • How to Configure SNMP for MPLS EM-MPLS LDP MIB - RFC 3815

          • Configuring Access to an SNMP Agent on a Host NMS Workstation

            • Examples

          • Configuring the Router to Send SNMP Notifications to a Host for Monitoring LDP

            • Prerequisites

          • Configuring a VPN-Aware LDP MIB

            • Configuring SNMP Support for a VPN

            • Configuring an SNMP Context for a VPN

            • Configuring a VPN-Aware SNMP Context for SNMPv1 or SNMPv2

        • Configuration Examples for MPLS EM-MPLS LDP MIB - RFC 3815

          • Configuring Access to an SNMP Agent on a Host NMS Workstation: Example

          • Configuring the Router to Send SNMP Notifications to a Host for Monitoring LDP: Example

          • Configuring a VPN-Aware LDP MIB: Example

            • Configuring SNMP Support for a VPN: Example

            • Configuring an SNMP Context for a VPN: Example

            • Configuring a VPN-Aware SNMP Context for SNMPv1 or SNMPv2: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS EM-MPLS LDP MIB - RFC 3815

        • Glossary

      • MPLS EM-MPLS LSR MIB - RFC 3813

        • Contents

        • Prerequisites for MPLS EM-MPLS LSR MIB - RFC 3813

        • Restrictions for MPLS EM-MPLS LSR MIB - RFC 3813

        • Information About MPLS EM-MPLS LSR MIB - RFC 3813

          • MPLS-LSR-STD-MIB Benefits

          • Label Switching Information Managed by the MPLS-LSR-STD-MIB

          • MPLS-LSR-STD-MIB Elements

          • Brief Description of MPLS-LSR-STD-MIB Tables

          • MPLS LSR Information Available Through the MPLS-LSR-STD-MIB

            • MPLS Interface Table (mplsInterfaceTable)

            • MPLS Interface Performance Table (mplsInterfacePerfTable)

            • MPLS In-Segment Table (mplsInSegmentTable)

            • MPLS In-Segment Performance Table (mplsInSegmentPerfTable)

            • MPLS Out-Segment Table (mplsOutSegmentTable)

            • MPLS Out-Segment Performance Table (mplsOutSegmentPerfTable)

            • MPLS Cross-Connect Table (mplsXCTable)

            • MPLS Label Stack Table (mplsLabelStackTable)

            • MPLS In-Segment Map Table (mplsInSegmentMapTable)

          • Information from MPLS-LSR-STD-MIB Scalar Objects

          • MPLS-LSR-STD-MIB Indexing-Linking Table Elements

          • Interface Configuration Table and Interface MIB Links

          • MPLS-LSR-STD-MIB Structure

          • CLI Commands and the MPLS-LSR-MIB

          • VPN Aware LSR MIB

            • SNMP Contexts

          • Major Differences Between the MPLS-LSR-STD-MIB and the MPLS-LSR-MIB

            • MPLS-LSR-MIB and the MPLS-LSR-STD-MIB Scalar Object Differences

            • MPLS-LSR-MIB and the MPLS-LSR-STD-MIB Table Object Differences

            • MPLS-LSR-MIB and MPLS-LSR-STD-MIB Notification Differences

            • MPLS-LSR-MIB and MPLS-LSR-STD-MIB Indexing Differences

        • How to Configure SNMP for the MPLS EM-MPLS LSR MIB - RFC 3813

          • Prerequisites

          • Enabling the SNMP Agent

          • Verifying That the SNMP Agent Is Enabled

          • Configuring a VPN-Aware LSR MIB

            • Configuring SNMP Support for a VPN

            • Configuring an SNMP Context for a VPN

            • What to Do Next

            • Configuring a VPN-Aware SNMP Context for SNMPv1 or SNMPv2

        • Configuration Examples for the MPLS EM-MPLS LSR MIB - RFC 3813

          • Enabling the SNMP Agent: Examples

          • Configuring a VPN-Aware LSR MIB: Example

            • Configuring SNMP Support for a VPN: Example

            • Configuring an SNMP Context for a VPN: Example

            • Configuring a VPN-Aware SNMP Context for SNMPv1 or SNMPv2: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS EM-MPLS LSR MIB - RFC 3813

        • Glossary

      • MPLS EM-MPLS VPN MIB RFC 4382 Upgrade

        • Contents

        • Prerequisites for MPLS EM-MPLS VPN MIB RFC 4382 Upgrade

        • Restrictions for MPLS EM-MPLS VPN MIB RFC 4382 Upgrade

        • Information About MPLS EM-MPLS VPN MIB RFC 4382 Upgrade

          • MPLS Layer 3 VPN Overview

          • MPLS-L3VPN-STD-MIB Benefits

          • Capabilities Supported by the MPLS-L3VPN-STD-MIB

          • Supported Objects in the MPLS-L3VPN-STD-MIB

          • MPLS-L3VPN-STD-MIB Scalar Objects

          • MPLS-L3VPN-STD-MIB MIB Tables

            • VRF Configuration Table (mplsL3VpnVrfTable)

            • VPN Interface Configuration Table (mplsL3VpnIfConfTable)

            • VRF Route Target Table (mplsL3VpnVrfRTTable)

            • VRF Security Table (mplsL3VpnVrfSecTable)

            • VRF Performance Table (mplsL3VpnVrfPerfTable)

            • VRF Routing Table (mplsL3VpnVrfRteTable)

          • MPLS-L3VPN-STD-MIB Notification Events

            • SNMP Notification Specification for the MPLS-L3VPN-STD-MIB

            • MPLS-L3VPN-STD-MIB Notifications Display on Network Management Station

          • MPLS-L3VPN-STD-MIB Support for IPv6 VPNs over MPLS

            • MPLS-L3VPN-STD-MIB Tables and Objects Support for IPv6 VPNs over MPLS

            • MPLS-L3VPN-STD-MIB Notifications Support for IPv6 VPNs over MPLS

            • Information About Setting Maximum Routes for IPv6 Address-Family VRF Route Limits

          • MPLS-L3VPN-STD-MIB Data Security

          • Major Differences Between the MPLS-VPN-MIB and the MPLS-L3VPN-STD-MIB

            • Global Name Changes for the MPLS-L3VPN-STD-MIB Objects

            • MPLS-VPN-MIB and MPLS-L3VPN-STD-MIB Scalar Object Differences

            • MPLS-VPN-MIB and MPLS-L3VPN-STD-MIB Table Object Differences

            • Tables Not Supported in the MPLS-L3VPN-STD-MIB

            • MPLS-VPN-MIB and MPLS-L3VPN-STD-MIB Notification Differences

        • How to Configure MPLS EM-MPLS VPN MIB RFC 4382 Upgrade

          • Configuring the SNMP Community

          • Configuring the Router to Send MPLS Layer 3 VPN SNMP Notifications to a Host

          • Configuring Threshold Values for MPLS Layer 3 VPN SNMP Notifications

          • Configuring SNMP Controls for MPLS VPN Notification Thresholds

        • Configuration Examples for MPLS EM-MPLS VPN MIB RFC 4382 Upgrade

          • Configuring the SNMP Community: Examples

          • Configuring the Router to Send MPLS Layer 3 VPN SNMP Traps: Example

          • Configuring Threshold Values for MPLS Layer 3 VPN SNMP Notifications: Examples

          • Configuring SMNP Controls for MPLS Layer 3 VPN Notification Thresholds: Examples

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS EM-MPLS VPN MIB RFC 4382 Upgrade

        • Glossary

      • Pseudowire Emulation Edge-to-Edge MIBs for Ethernet, Frame Relay, and ATM Services

        • Finding Feature Information

        • Contents

        • Prerequisites for Pseudowire Emulation Edge-to-Edge MIBs for Ethernet, Frame Relay, and ATM Services

        • Restrictions for Pseudowire Emulation Edge-to-Edge MIBs for Ethernet, Frame Relay, and ATM Services

        • Information About Pseudowire Emulation Edge-to-Edge MIBs for Ethernet, Frame Relay, and ATM Services

          • The Function of a Pseudowire in the PWE3 MIBs

          • PWE3 MIBs Architecture

          • Components and Functions of the PWE3 MIBs

          • Tables in the PW-MIB

            • cpwVcTable

            • cpwVcPerfTotalTable

            • cpwVcIdMappingTable

            • cpwVcPeerMappingTable

          • Tables in the PW-MPLS-MIB

            • cpwVcMplsTable

            • cpwVcMplsOutboundTable

            • cpwVcMplsInboundTable

            • cpwVcMplsNonTeMappingTable

            • cpwVcMplsTeMappingTable

          • Tables in the PW-ENET-MIB

            • cpwVcEnetTable

          • Tables in the PW-FR-MIB

            • cpwVcFrTable

          • Tables in the PW-ATM-MIB

            • cpwVcAtmTable

            • cpwVcAtmPerfTable

          • Objects in the PWE3 MIBs

          • Scalar Objects in the PWE3 MIBs

          • Notifications in the PWE3 MIBs

          • Benefits of the PWE3 MIBs

        • How to Configure Pseudowire Emulation Edge-to-Edge MIBs for Ethernet, Frame Relay, and ATM Services

          • Enabling the SNMP Agent for the PWE3 MIBs

          • Configuring AToM, Frame Relay, or ATM Circuits Across a Network for the PWE3 MIBs

          • Configuring the Pseudowire Class

            • What to Do Next

        • Configuration Examples for the Pseudowire Emulation Edge-to-Edge MIBs for Ethernet, Frame Relay, and ATM Services

          • PWE3 MIBs: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for Pseudowire Emulation Edge-to-Edge MIBs for Ethernet, Frame Relay, and ATM Services

        • Glossary

      • MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV

        • Finding Feature Information

        • Contents

        • Prerequisites for MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV

        • Restrictions for MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV

        • Information About MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV

          • MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV Functionality

          • MPLS LSP Ping Operation

          • MPLS LSP Traceroute Operation

          • MPLS Network Management with MPLS LSP Ping and MPLS LSP Traceroute

          • Any Transport over MPLS Virtual Circuit Connection

            • AToM VCCV Signaling

            • Selection of AToM VCCV Switching Types

            • Information Provided by the Router Processing LSP Ping or LSP Traceroute

          • IP Does Not Forward MPLS Echo Request Packets

        • How to Configure MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV

          • Enabling Compatibility Between the MPLS LSP and Ping or Traceroute Implementation

          • Validating an FEC by Using MPLS LSP Ping and MPLS LSP Traceroute

            • Validating an LDP IPv4 FEC by Using MPLS LSP Ping and MPLS LSP Traceroute

            • Validating a Layer 2 FEC by Using MPLS LSP Ping and MPLS LSP Traceroute

          • Using DSCP to Request a Specific Class of Service in an Echo Reply

          • Controlling How a Responding Router Replies to an MPLS Echo Request

            • Reply Modes for an MPLS LSP Ping and LSP Traceroute Echo Request Response

          • Preventing Loops when Using MPLS LSP Ping and LSP Traceroute Command Options

            • Using MPLS LSP Ping to Discover Possible Loops

            • Using MPLS LSP Traceroute to Discover Possible Loops

          • Detecting LSP Breaks

            • Tracking Packets Tagged as Implicit Null

            • Tracking Untagged Packets

            • Determining Why a Packet Could Not Be Sent

            • Detecting LSP Breaks when Load Balancing Is Enabled for IPv4 LDP LSPs

            • Specifying the Interface Through Which Echo Packets Leave a Router

            • Pacing the Transmission of Packets

            • Interrogating the Transit Router for Its Downstream Information by Using Echo Request request-dsmap

            • Interrogating a Router for Its DSMAP

            • Requesting that a Transit Router Validate the Target FEC Stack

            • Enabling LSP Ping to Detect LSP Breakages Caused by Untagged Interfaces

            • Viewing the AToM VCCV Capabilities Advertised to and Received from the Peer

        • Configuration Examples for MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV

          • Enabling Compatibility Between the MPLS LSP and Ping or Traceroute Implementation: Example

          • Validating an FEC by Using MPLS LSP Ping and LSP Traceroute: Example

            • Validating an LDP IPv4 FEC by Using MPLS LSP Ping and MPLS LSP Traceroute: Example

            • Validating a Layer 2 FEC by Using MPLS LSP Ping: Example

          • Using DSCP to Request a Specific Class of Service in an Echo Reply: Example

          • Controlling How a Responding Router Replies to an MPLS Echo Request: Example

          • Preventing Loops when Using MPLS LSP Ping and LSP Traceroute Command Options: Example

            • Possible Loops with MPLS LSP Ping: Example

            • Possible Loop with MPLS LSP Traceroute: Example

          • Detecting LSP Breaks: Example

            • Troubleshooting with LSP Ping or Traceroute: Example

            • MTU Discovery in an LSP: Example

            • Tracking Packets Tagged as Implicit Null: Example

            • Tracking Untagged Packets: Example

            • Determining Why a Packet Could Not Be Sent: Example

            • Detecting LSP Breaks when Load Balancing Is Enabled for IPv4 LSPs: Example

            • Specifying the Interface Through Which Echo Packets Leave a Router: Example

            • Pacing the Transmission of Packets: Example

            • Interrogating the Transit Router for Its Downstream Information: Example

            • Interrogating a Router for Its DSMAP: Example

            • Requesting that a Transit Router Validate the Target FEC Stack: Example

            • Enabling LSP Ping to Detect LSP Breakages Caused by Untagged Interfaces: Example

          • Viewing the AToM VCCV Capabilities Advertised to and Received from the Peer: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS LSP Ping/Traceroute for LDP/TE, and LSP Ping for VCCV

        • Glossary

      • MPLS EM - TE MIB RFC 3812

        • Finding Feature Information

        • Contents

        • Restrictions for the MPLS EM - TE MIB RFC 3812

        • Information About the MPLS EM - TE MIB RFC 3812

          • MPLS Traffic Engineering MIB Cisco Implementation

            • MPLS Traffic Engineering Overview

          • Capabilities Supported by the MPLS EM TE MIB RFC 3812

          • Notification Generation Events

          • Notification Implementation

          • Benefits of MPLS EM - TE MIB RFC 3812

          • MPLS Traffic Engineering MIB Layer Structure

          • Features and Technologies Related to MPLS EM - TE MIB RFC 3812

          • Supported Objects in the MPLS EM - TE MIB RFC 3812

          • CLI Access to MPLS EM - TE MIB RFC 3812 Information

            • Retrieving Information from the MPLS EM - TE MIB RFC 3812

        • How to Configure the MPLS EM - TE MIB RFC 3812

          • Enabling the SNMP Agent to Help Manage Various MPLS TE Tunnel Characteristics of Tunnels on the Local Router

          • Verifying the Status of the SNMP Agent

            • Examples

        • Configuration Examples for the MPLS EM - TE MIB RFC 3812

          • Enabling the SNMP Agent to Help Manage Various MPLS TE Tunnel Characteristics of Tunnels on the Local Router: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for the MPLS EM - TE MIB RFC 3812

        • Glossary

    • MPLS High Availability

      • MPLS High Availability: Overview

        • Contents

        • Restrictions for MPLS High Availability

        • Information About MPLS High Availability

          • MPLS High Availability Overview

          • MPLS High Availability Features

            • NSF/SSO-MPLS VPN

            • NSF/SSO-MPLS LDP and LDP Graceful Restart

            • NSF/SSO: Any Transport over MPLS and Graceful Restart

          • MPLS High Availability Infrastructure Changes

            • Cisco Express Forwarding Scalability Enhancements

          • MPLS Applications That Coexist with SSO

            • MPLS Traffic Engineering

            • MPLS Quality of Service Applications

            • IPv6 over MPLS

            • MPLS Label Switching Router MIB

            • MPLS TE MIB

            • MPLS Enhancements to Interfaces MIB

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS High Availability: Overview

      • MPLS High Availability: Command Changes

        • Contents

        • Information About MPLS High Availability: Command Changes

          • MPLS Replacement Commands for Tag-Switching Commands

          • New Command Defaults

          • MPLS MTU Command Changes

          • Deleted Commands

          • Replaced Commands

        • How to Configure MPLS High Availability: Command Changes

        • Configuration Examples for MPLS High Availability: Command Changes

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for MPLS High Availability: Command Changes

      • MPLS LDP Graceful Restart

        • Contents

        • Information About MPLS LDP Graceful Restart

          • How MPLS LDP Graceful Restart Works

          • How a Route Processor Advertises That It Supports MPLS LDP Graceful Restart

          • What Happens If a Route Processor Does Not Have LDP Graceful Restart

        • How to Configure MPLS LDP Graceful Restart

          • Configuring MPLS LDP Graceful Restart

            • Restrictions

          • Verifying the Configuration

        • Configuration Example for MPLS LDP Graceful Restart

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

      • NSF/SSO - MPLS LDP and LDP Graceful Restart

        • Contents

        • Prerequisites for NSF/SSO - MPLS LDP and LDP Graceful Restart

        • Restrictions for NSF/SSO - MPLS LDP and LDP Graceful Restart

        • Information About NSF/SSO - MPLS LDP and LDP Graceful Restart

          • How NSF/SSO - MPLS LDP and LDP Graceful Restart Works

            • What Happens During an LDP Restart and an LDP Session Reset

          • How a Route Processor Advertises That It Supports NSF/SSO - MPLS LDP and LDP Graceful Restart

            • What Happens if a Route Processor Does Not Have LDP Graceful Restart

          • Checkpointing

            • Troubleshooting Tips

        • How to Configure and Use NSF/SSO - MPLS LDP and LDP Graceful Restart

          • Configuring MPLS LDP Graceful Restart

            • Prerequisites

          • Verifying the Configuration

        • Configuration Examples for LDP NSF

          • Configuring NSF/SSO - MPLS LDP and LDP Graceful Restart: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for NSF/SSO - MPLS LDP and LDP Graceful Restart

      • NSF/SSO-MPLS VPN

        • Contents

        • Prerequisites for NSF/SSO-MPLS VPN

        • Restrictions for NSF/SSO-MPLS VPN

        • Information About NSF/SSO-MPLS VPN

          • Elements That Enable NSF/SSO-MPLS VPN to Work

          • How VPN Prefix Information Is Checkpointed to the Backup Route Processor

          • How BGP Graceful Restart Preserves Prefix Information During a Restart

          • What Happens If a Router Does Not Have NSF/SSO-MPLS VPN Enabled

        • How to Configure NSF/SSO-MPLS VPN

          • Configuring NSF Support for Basic VPNs

            • Prerequisites

          • Configuring NSF Support for MPLS VPN Interfaces That Use BGP as the Label Distribution Protocol

            • Prerequisites

          • Verifying the NSF/SSO-MPLS VPN Configuration

        • Configuration Examples for NSF/SSO-MPLS VPN

          • NSF/SSO-MPLS VPN for a Basic MPLS VPN: Example

            • CE1 Router

            • PE1 Router

            • PE2 Router

            • CE2 Router

          • NSF/SSO-MPLS VPN for a CSC Network with a Customer Carrier Who Is an ISP: Example

            • CSC-CE1 Configuration

            • CSC-PE1 Configuration

            • CSC-PE2 Configuration

            • CSC-CE2 Configuration

          • NSF/SSO-MPLS VPN for a CSC Network with a Customer Who Is an MPLS VPN Provider: Example

            • CE1 Configuration

            • PE1 Configuration

            • CSC-CE1 Configuration

            • CSC-PE1 Configuration

            • CSC-PE2 Configuration

            • CSC-CE2 Configuration

            • PE2 Configuration

            • CE2 Configuration

          • NSF/SSO-MPLS VPN for a CSC Network That Uses BGP to Distribute MPLS Labels: Example

            • CE1 Configuration

            • PE1 Configuration

            • CSC-CE1 Configuration

            • CSC-PE1 Configuration

            • CSC-PE2 Configuration

            • CSC-CE2 Configuration

            • PE2 Configuration

            • CE2 Configuration

          • NSF/SSO-MPLS VPN for an Inter-AS Network Using BGP to Distribute Routes and MPLS Labels: Example

            • RR1 Configuration

            • ASBR1 Configuration

            • RR2 Configuration

            • ASBR2 Configuration

          • NSF/SSO-MPLS VPN for an Inter-AS Network That Uses BGP to Distribute Routes and MPLS Labels over a Non-MPLS VPN Service Provider: Example

            • RR1 Configuration

            • ASBR1 Configuration

            • RR2 Configuration

            • ASBR2 Configuration

            • ASBR3 Configuration

            • RR3 Configuration

            • ASBR4 Configuration

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for NSF/SSO-MPLS VPN

      • AToM Graceful Restart

        • Finding Feature Information

        • Contents

        • Information About AToM Graceful Restart

          • How AToM Graceful Restart Works

        • How to Configure AToM Graceful Restart

          • Configuring AToM Graceful Restart

            • Prerequisites

            • Restrictions

        • Configuration Examples for AToM Graceful Restart

          • AToM Graceful Restart: Configuration Example

          • AToM Graceful Restart: Recovering from an LDP Session Disruption Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for AToM Graceful Restart

      • NSF/SSO-Any Transport over MPLS and AToM Graceful Restart

        • Finding Feature Information

        • Contents

        • Prerequisites for AToM NSF

          • Supported Hardware

          • Neighbor Routers in the MPLS HA Environment

          • Stateful Switchover

          • Nonstop Forwarding for Routing Protocols

        • Restrictions for AToM NSF

        • Information About AToM NSF

          • How AToM NSF Works

          • AToM Information Checkpointing

            • Checkpointing Troubleshooting Tips

          • ISSU Support

          • Configuring MPLS LDP Graceful Restart

        • Configuration Examples for AToM NSF

          • Ethernet to VLAN Interworking with AToM NSF: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for AToM NSF

      • NSF/SSO-MPLS TE and RSVP Graceful Restart

        • Finding Feature Information

        • Content

        • Prerequisites for NSF/SSO-MPLS TE and RSVP Graceful Restart

        • Restrictions for NSF/SSO-MPLS TE and RSVP Graceful Restart

        • Information About NSF/SSO-MPLS TE and RSVP Graceful Restart

          • Overview of MPLS TE and RSVP Graceful Restart

          • MPLS TE Autotunnel and SSO Coexistence

          • Benefits of MPLS TE and RSVP Graceful Restart

        • How to Configure NSF/SSO-MPLS TE and RSVP Graceful Restart

          • Enabling RSVP Graceful Restart Globally

          • Enabling RSVP Graceful Restart on an Interface

          • Setting a DSCP Value

          • Setting a Value to Control the Hello Refresh Interval

          • Setting a Value to Control the Missed Refresh Limit

          • Verifying the RSVP Graceful Restart Configuration

        • Configuration Examples for NSF/SSO-MPLS TE and RSVP Graceful Restart

          • Configuring NSF/SSO-MPLS TE and RSVP Graceful Restart: Example

          • Verifying the NSF/SSO-MPLS TE and RSVP Graceful Restart Configuration: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for NSF/SSO-MPLS TE and RSVP Graceful Restart

        • Glossary

      • NSF/SSO/ISSU Support for VPLS

        • Contents

        • Prerequisites for NSF/SSO/ISSU Support for VPLS

        • Restrictions for NSF/SSO/ISSU Support for VPLS

        • Information About NSF/SSO/ISSU Support for VPLS

          • How NSF/SSO Works with VPLS

          • How ISSU Works with VPLS

        • How to Configure NSF/SSO/ISSU Support for VPLS

          • Configuring VPLS

          • Configuring NSF/SSO: Any Transport over MPLS

          • Configuring NSF/SSO Router support

          • Configuring ISSU Router Support

          • Verifying and Troubleshooting NSF/SSO/ISSU Support for VPLS

        • Configuration Examples for NSF/SSO/ISSU Support for VPLS

          • NSF/SSO/ISSU VPLS: Example

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Command Reference

        • Feature Information for NSF/SSO/ISSU Support for VPLS

      • NSF/SSO and ISSU-MPLS VPN 6VPE and 6PE

        • Finding Feature Information

        • Contents

        • Prerequisites for NSF/SSO and ISSU-MPLS VPN 6VPE and 6PE

        • Restrictions for NSF/SSO and ISSU-MPLS VPN 6VPE and 6PE

        • Information About NSF/SSO and ISSU-MPLS VPN 6VPE and 6PE

          • Elements Supporting NSF/SSO and ISSU-MPLS VPN 6VPE and 6PE Features

          • How BGP Graceful Restart Works for MPLS VPN 6vPE and 6PE

          • How BGP Graceful Restart Preserves Prefix Information During a Restart

          • ISSU Support for MPLS VPN 6vPE and 6PE

          • NSF/SSO Support for MPLS VPN 6VPE and 6PE

          • BGP Graceful Restart Support for MPLS VPN Configurations

            • Graceful Restart Support for a Basic 6VPE Setup

            • Graceful Restart for 6VPE in Carrier Supporting Carrier and Interautonomous System Setups

          • What Happens If a Router Does Not Support NSF/SSO and ISSU-MPLS VPN 6VPE and 6PE

        • How to Configure NSF/SSO and ISSU-MPLS VPN 6VPE and 6PE

          • Configuring NSF/SSO for Basic MPLS 6VPEs and 6PEs

            • Prerequisites

          • Verifying NSF/SSO and ISSU Support for MPLS VPN 6VPE and 6PE

        • Configuration Examples for Configuring NSF/SSO and ISSU-MPLS VPN 6VPE and 6PE

          • Configuring NSF/SSO for a Basic 6VPE Setup: Example

            • PE1 Configuration in a Basic 6VPE Setup

          • Configuring NSF/SSO for a Basic 6PE Setup: Example

            • PE1 Configuration in a Basic 6PE Setup

        • Additional References

          • Related Documents

          • Standards

          • MIBs

          • RFCs

          • Technical Assistance

        • Feature Information for NSF/SSO and ISSU-MPLS VPN 6VPE and 6PE

        • Glossary

Nội dung

Cisco IOS Multiprotocol Label Switching Configuration Guide Release 12.2SR Americas Headquarters Cisco Systems, Inc 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system All rights reserved Copyright © 1981, Regents of the University of California NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Nurse Connect, Cisco Pulse, Cisco SensorBase, Cisco StackPower, Cisco StadiumVision, Cisco TelePresence, Cisco Unified Computing System, Cisco WebEx, DCE, Flip Channels, Flip for Good, Flip Mino, Flipshare (Design), Flip Ultra, Flip Video, Flip Video (Design), Instant Broadband, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn, Cisco Capital, Cisco Capital (Design), Cisco:Financed (Stylized), Cisco Store, Flip Gift Card, and One Million Acts of Green are service marks; and Access Registrar, Aironet, AllTouch, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Lumin, Cisco Nexus, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, Continuum, EtherFast, EtherSwitch, Event Center, Explorer, Follow Me Browsing, GainMaker, iLYNX, IOS, iPhone, IronPort, the IronPort logo, Laser Link, LightStream, Linksys, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, PCNow, PIX, PowerKEY, PowerPanels, PowerTV, PowerTV (Design), PowerVu, Prisma, ProConnect, ROSA, SenderBase, SMARTnet, Spectrum Expert, StackWise, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc and/or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company (0910R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses Any examples, command display output, and figures included in the document are shown for illustrative purposes only Any use of actual IP addresses in illustrative content is unintentional and coincidental Cisco IOS Multiprotocol Label Switching Configuration Guide © 2010 Cisco Systems, Inc All rights reserved Using the Command-Line Interface in Cisco IOS Software Last Updated: October 14, 2009 This document provides basic information about the command-line interface (CLI) in Cisco IOS software and how you can use some of the CLI features This document contains the following sections: • Initially Configuring a Device, page i • Using the CLI, page ii • Saving Changes to a Configuration, page xi • Additional Information, page xii For more information about using the CLI, see the “Using the Cisco IOS Command-Line Interface” section of the Cisco IOS Configuration Fundamentals Configuration Guide For information about the software documentation set, see the “About Cisco IOS Software Documentation” document Initially Configuring a Device Initially configuring a device varies by platform For information about performing an initial configuration, see the hardware installation documentation that is provided with the original packaging of the product or go to the Product/Technologies Support area of Cisco.com at http://www.cisco.com/go/techdocs After you have performed the initial configuration and connected the device to your network, you can configure the device by using the console port or a remote access method, such as Telnet or Secure Shell (SSH), to access the CLI or by using the configuration method provided on the device, such as Security Device Manager i Using the Command-Line Interface in Cisco IOS Software Using the CLI Changing the Default Settings for a Console or AUX Port There are only two changes that you can make to a console port and an AUX port: Note • Change the port speed with the config-register 0x command Changing the port speed is not recommended The well-known default speed is 9600 • Change the behavior of the port; for example, by adding a password or changing the timeout value The AUX port on the Route Processor (RP) installed in a Cisco ASR 1000 series router does not serve any useful customer purpose and should be accessed only under the advisement of a customer support representative Using the CLI This section describes the following topics: • Understanding Command Modes, page ii • Using the Interactive Help Feature, page v • Understanding Command Syntax, page vi • Understanding Enable and Enable Secret Passwords, page vii • Using the Command History Feature, page viii • Abbreviating Commands, page ix • Using Aliases for CLI Commands, page ix • Using the no and default Forms of Commands, page x • Using the debug Command, page x • Filtering Output Using Output Modifiers, page x • Understanding CLI Error Messages, page xi Understanding Command Modes The CLI command mode structure is hierarchical, and each mode supports a set of specific commands This section describes the most common of the many modes that exist Table lists common command modes with associated CLI prompts, access and exit methods, and a brief description of how each mode is used ii Using the Command-Line Interface in Cisco IOS Software Using the CLI Table CLI Command Modes Command Mode Access Method Prompt Exit Method User EXEC Log in Router> Issue the logout or exit command Privileged EXEC From user EXEC mode, issue the enable command Router# Issue the disable command or the exit command to return to user EXEC mode Mode Usage • Change terminal settings • Perform basic tests • Display device status • Issue show and debug commands • Copy images to the device • Reload the device • Manage device configuration files • Manage device file systems Global configuration From privileged EXEC Router(config)# mode, issue the configure terminal command Issue the exit command Configure the device or the end command to return to privileged EXEC mode Interface configuration From global configuration mode, issue the interface command Router(config-if)# Issue the exit command Configure individual to return to global interfaces configuration mode or the end command to return to privileged EXEC mode Line configuration From global configuration mode, issue the line vty or line console command Router(config-line)# Issue the exit command Configure individual to return to global terminal lines configuration mode or the end command to return to privileged EXEC mode iii Using the Command-Line Interface in Cisco IOS Software Using the CLI Table CLI Command Modes (continued) Command Mode Access Method Prompt Exit Method ROM monitor From privileged EXEC mode, issue the reload command Press the Break key during the first 60 seconds while the system is booting rommon # > Issue the continue command Diagnostic (available only on Cisco ASR 1000 series routers) Router(diag)# The router boots or enters diagnostic mode in the following scenarios When a Cisco IOS process or processes fail, in most scenarios the router will reload • iv The # symbol represents the line number and increments at each prompt A user-configured access policy was configured using the transport-map command, which directed the user into diagnostic mode • The router was accessed using an RP auxiliary port • A break signal (Ctrl-C, Ctrl-Shift-6, or the send break command) was entered, and the router was configured to enter diagnostic mode when the break signal was received If a Cisco IOS process failure is the reason for entering diagnostic mode, the failure must be resolved and the router must be rebooted to exit diagnostic mode If the router is in diagnostic mode because of a transport-map configuration, access the router through another port or use a method that is configured to connect to the Cisco IOS CLI If the RP auxiliary port was used to access the router, use another port for access Accessing the router through the auxiliary port is not useful for customer purposes Mode Usage • Run as the default operating mode when a valid image cannot be loaded • Access the fall-back procedure for loading an image when the device lacks a valid image and cannot be booted • Perform password recovery when a Ctrl-Break sequence is issued within 60 seconds of a power-on or reload event • Inspect various states on the router, including the Cisco IOS state • Replace or roll back the configuration • Provide methods of restarting the Cisco IOS software or other processes • Reboot hardware (such as the entire router, an RP, an ESP, a SIP, a SPA) or other hardware components • Transfer files into or off of the router using remote access methods such as FTP, TFTP, and SCP Using the Command-Line Interface in Cisco IOS Software Using the CLI EXEC commands are not saved when the software reboots Commands that you issue in a configuration mode can be saved to the startup configuration If you save the running configuration to the startup configuration, these commands will execute when the software is rebooted Global configuration mode is the highest level of configuration mode From global configuration mode, you can enter a variety of other configuration modes, including protocol-specific modes ROM monitor mode is a separate mode that is used when the software cannot load properly If a valid software image is not found when the software boots or if the configuration file is corrupted at startup, the software might enter ROM monitor mode Use the question symbol (?) to view the commands that you can use while the device is in ROM monitor mode rommon > ? alias boot confreg cont context cookie rommon > set and display aliases command boot up an external process configuration register utility continue executing a downloaded image display the context of a loaded image display contents of cookie PROM in hex The following example shows how the command prompt changes to indicate a different command mode: Router> enable Router# configure terminal Router(config)# interface ethernet 1/1 Router(config-if)# ethernet Router(config-line)# exit Router(config)# end Router# Note A keyboard alternative to the end command is Ctrl-Z Using the Interactive Help Feature The CLI includes an interactive Help feature Table describes the purpose of the CLI interactive Help commands Table CLI Interactive Help Commands Command Purpose help Provides a brief description of the Help feature in any command mode ? Lists all commands available for a particular command mode partial command? Provides a list of commands that begin with the character string (no space between the command and the question mark) partial command Completes a partial command name (no space between the command and ) command ? Lists the keywords, arguments, or both associated with the command (space between the command and the question mark) command keyword ? Lists the arguments that are associated with the keyword (space between the keyword and the question mark) v Using the Command-Line Interface in Cisco IOS Software Using the CLI The following examples show how to use the help commands: help Router> help Help may be requested at any point in a command by entering a question mark '?' If nothing matches, the help list will be empty and you must backup until entering a '?' shows the available options Two styles of help are provided: Full help is available when you are ready to enter a command argument (e.g 'show ?') and describes each possible argument Partial help is provided when an abbreviated argument is entered and you want to know what arguments match the input (e.g 'show pr?'.) ? Router# ? Exec commands: access-enable access-profile access-template alps archive Create a temporary access-List entry Apply user-profile to interface Create a temporary access-List entry ALPS exec commands manage archive files partial command? Router(config)# zo? zone zone-pair partial command Router(config)# we webvpn command ? Router(config-if)# pppoe ? enable Enable pppoe max-sessions Maximum PPPOE sessions command keyword ? Router(config-if)# pppoe enable ? group attach a BBA group Understanding Command Syntax Command syntax is the format in which a command should be entered in the CLI Commands include the name of the command, keywords, and arguments Keywords are alphanumeric strings that are used literally Arguments are placeholders for values that a user must supply Keywords and arguments may be required or optional Specific conventions convey information about syntax and command elements Table describes these conventions vi Using the Command-Line Interface in Cisco IOS Software Using the CLI Table CLI Syntax Conventions Symbol/Text Function Notes < > (angle brackets) Indicate that the option is an argument Sometimes arguments are displayed without angle brackets A.B.C.D Indicates that you must enter a dotted decimal IP address Angle brackets (< >) are not always used to indicate that an IP address is an argument WORD (all capital letters) Indicates that you must enter one word Angle brackets (< >) are not always used to indicate that a WORD is an argument LINE (all capital letters) Indicates that you must enter more than one word Angle brackets (< >) are not always used to indicate that a LINE is an argument (carriage return) Indicates the end of the list of — available keywords and arguments, and also indicates when keywords and arguments are optional When is the only option, you have reached the end of the branch or the end of the command if the command has only one branch The following examples show syntax conventions: Router(config)# ethernet cfm domain WORD domain name Router(config)# ethernet cfm domain level Router(config)# ethernet cfm domain maintenance level number Router(config)# ethernet cfm domain ? dname ? dname level ? dname level ? Router(config)# snmp-server file-transfer access-group 10 ? protocol protocol options Router(config)# logging host ? Hostname or A.B.C.D IP address of the syslog server ipv6 Configure IPv6 syslog server Understanding Enable and Enable Secret Passwords Some privileged EXEC commands are used for actions that impact the system, and it is recommended that you set a password for these commands to prevent unauthorized use Two types of passwords, enable (not encrypted) and enable secret (encrypted), can be set The following commands set these passwords and are issued in global configuration mode: • enable password • enable secret password vii Using the Command-Line Interface in Cisco IOS Software Using the CLI Using an enable secret password is recommended because it is encrypted and more secure than the enable password When you use an enable secret password, text is encrypted (unreadable) before it is written to the config.text file When you use an enable password, the text is written as entered (readable) to the config.text file Each type of password is case sensitive, can contain from to 25 uppercase and lowercase alphanumeric characters, and can start with a numeral Spaces are also valid password characters; for example, “two words” is a valid password Leading spaces are ignored, but trailing spaces are recognized Note Both password commands have numeric keywords that are single integer values If you choose a numeral for the first character of your password followed by a space, the system will read the number as if it were the numeric keyword and not as part of your password When both passwords are set, the enable secret password takes precedence over the enable password To remove a password, use the no form of the commands: no enable password or no enable secret password For more information about password recovery procedures for Cisco products, see http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/ products_tech_note09186a00801746e6.shtml Using the Command History Feature The command history feature saves, in a command history buffer, the commands that you enter during a session The default number of saved commands is 10, but the number is configurable within the range of to 256 This command history feature is particularly useful for recalling long or complex commands To change the number of commands saved in the history buffer for a terminal session, issue the terminal history size command: Router# terminal history size num A command history buffer is also available in line configuration mode with the same default and configuration options To set the command history buffer size for a terminal session in line configuration mode, issue the history command: Router(config-line)# history [size num] To recall commands from the history buffer, use the following methods: • Press Ctrl-P or the Up Arrow key—Recalls commands beginning with the most recent command Repeat the key sequence to recall successively older commands • Press Ctrl-N or the Down Arrow key—Recalls the most recent commands in the history buffer after they have been recalled using Ctrl-P or the Up Arrow key Repeat the key sequence to recall successively more recent commands Note • viii The arrow keys function only on ANSI-compatible terminals such as the VT100 Issue the show history command in user EXEC or privileged EXEC mode—Lists the most recent commands that you entered The number of commands that are displayed is determined by the setting of the terminal history size and history commands NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE How to Configure NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE How to Configure NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE Perform the following tasks to configure NSF/SSO for MPLS 6VPE and 6PE: • Configuring NSF/SSO for Basic MPLS 6VPEs and 6PEs, page (required) • Verifying NSF/SSO and ISSU Support for MPLS VPN 6VPE and 6PE, page (optional) For information on how to configure ISSU, see the Cisco IOS In Service Software Upgrade Process module Configuring NSF/SSO for Basic MPLS 6VPEs and 6PEs Perform this task to configure NSF/SSO for basic MPLS 6VPE and 6PEs Note You can use the bgp graceful-restart command to configure BGP Graceful Restart for all available address families Prerequisites Route Processors must be configured for SSO See Stateful Switchover for more information If you use LDP in the core, you must enable the MPLS LDP: NSF/SSO Support and Graceful Restart feature See NSF/SSO-MPLS LDP and MPLS LDP Graceful Restart for more information You must enable nonstop forwarding on the routing protocols running between the P, PE, and CE routers The routing protocols between the CE router and the PE router are Static and BGP See Cisco Nonstop Forwarding for more information Before enabling the NSF/SSO—MPLS VPN feature, you must have a supported MPLS VPN network configuration See configuration information included in the following: Configuring MPLS Layer VPNs, Implementing IPv6 over MPLS, and Implementing IPv6 VPN over MPLS SUMMARY STEPS enable configure terminal ip cef distributed ipv6 unicast-routing ipv6 cef distributed redundancy mode sso exit router bgp autonomous-system-number 10 bgp graceful-restart restart-time seconds 11 bgp graceful-restart stalepath-time seconds 12 bgp graceful-restart 13 end NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE How to Configure NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE DETAILED STEPS Step Command or Action Purpose enable Enables privileged EXEC mode • Enter your password if prompted Example: Router> enable Step configure terminal Enters global configuration mode Example: Router# configure terminal Step ip cef distributed Enables distributed Cisco Express Forwarding Example: Router(config)# ip cef distributed Step ipv6 unicast-routing Enables the forwarding of IPv6 unicast datagrams Example: Router(config)# ipv6 unicast-routing Step ipv6 cef distributed Enables distributed Cisco Express Forwarding for IPv6 Example: Router(config)# ipv6 cef distributed Step redundancy Enters redundancy configuration mode Example: Router(config)# redundancy Step mode sso Sets the redundancy configuration mode to SSO Example: Router(red-config)# mode sso Step exit Exits to global configuration mode Example: Router(red-config)# exit Step router bgp autonomous-system-number Example: Router(config)# router bgp 1000 Enters router configuration mode and configures the BGP routing process • The autonomous-system-number argument is the number of an autonomous system that identifies the router to other BGP routers and tags the routing information that is passed along Number is in the range from to 65535 NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE How to Configure NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE Step 10 Command or Action Purpose bgp graceful-restart restart-time seconds Enables the BGP graceful restart timer capability globally for all BGP neighbors • Example: Router(config-router)# bgp graceful-restart restart-time 180 Step 11 bgp graceful-restart stalepath-time seconds Enables the BGP graceful restart stale path timer capability globally for all BGP neighbors • Example: Router(config-router)# bgp graceful-restart stalepath-time 420 Step 12 bgp graceful-restart The restart-time seconds keyword and argument sets the maximum time period that the local router will wait for a graceful-restart-capable neighbor to return to normal operation after a restart event occurs The default value for the seconds argument is 120 The configurable range of values is from to 3600 The stalepath-time seconds keyword and argument sets the maximum time period that the local router will hold stale paths for a restarting peer All stale paths are deleted after this timer expires The default value for the seconds argument is 360 The configurable range of values is from to 3600 Enables the BGP graceful restart capability globally for all BGP neighbors Example: Router(config-router)# bgp graceful-restart Step 13 Exits to privileged EXEC mode end Example: Router(config-router)# end Verifying NSF/SSO and ISSU Support for MPLS VPN 6VPE and 6PE Perform this task to verify NSF/SSO and ISSU support for 6VPE and 6PE SUMMARY STEPS enable show ip bgp neighbor show ip bgp vpnv6 unicast vrf vrf-name show ip bgp ipv6 unicast show mpls forwarding show ipv6 cef vrf-name DETAILED STEPS Step enable Use this command to enable privileged EXEC mode Enter your password if prompted For example: Router> enable Router# NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE How to Configure NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE Step show ip bgp neighbor Use this command to verify that the IPv6 address family and VPNv6 address family entries are preserved For example: Router# show ip bgp neighbor BGP neighbor is 10.2.2.2, remote AS 100, internal link BGP version 4, remote router ID 10.2.2.2 BGP state = Established, up for 00:02:42 Last read 00:00:36, last write 00:00:36, hold time is 180, keepalive Neighbor capabilities: Graceful Restart Capability: advertised and received Remote Restart timer is 120 seconds Address families advertised by peer: IPv6 Unicast (was preserved), VPNv6 Unicast (was preserved) IPv6 Unicast (was preserved), VPNv6 Unicast (was preserved) is displayed in the Graceful Restart Capability section of the output only after the peer restarts Step show ip bgp vpnv6 unicast vrf vrf-name Use this command to verify that VPNv6 entries are marked as staled during switchover For example: Router# show ip bgp vpnv6 unicast vrf vpn1 BGP table version is 10, local router ID is 10.4.4.4 Status codes: s suppressed, d damped, h history, * valid, > best, i - internal, r RIB-failure, S Stale Origin codes: i - IGP, e - EGP, ? - incomplete Network Next Hop Metric LocPrf Weight Path Route Distinguisher: 1:1 (default for vrf vpn1) S>iA::1/128 ::FFFF:10.2.2.2 100 200 ? *> A::5/128 A::4:5:5 0 200 ? S>iA::1:2:0/112 ::FFFF:10.2.2.2 100 ? * A::4:5:0/112 A::4:5:5 0 200 ? Step show ip bgp ipv6 unicast Use this command to verify that VPNv6 entries are marked as staled during switchover For example: Router# show ip bgp ipv6 unicast BGP table version is 9, local router ID is 10.1.1.1 Status codes: s suppressed, d damped, h history, * valid, > best, i - internal, r RIB-failure, S Stale Origin codes: i - IGP, e - EGP, ? - incomplete Network *> A::1/128 S A::1:2:0/112 *> S> A::4:5:0/112 Router# Next Hop :: A::1:2:2 :: A::1:2:2 Metric LocPrf Weight Path 32768 ? 0 100 ? 32768 ? 100 ? NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE How to Configure NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE Step show mpls forwarding Use this command to show preserved forwarding entries for IPv6 and VPNv6 prefixes The sample output is from a PE router in a CSC configuration Enter the command on the active and the standby router Compare the sample output from the active router with the sample output from the standby router Following is sample output from the active router; Router# show mpls forwarding Local Outgoing Prefix Bytes Label Label Label or Tunnel Id Switched 18 Pop Label 10.3.3.3/32 19 Pop Label 10.3.4.0/24 20 17 10.4.4.4/32 21 Pop Label 10.1.2.1/32[V] 22 Pop Label A::1:2:0/112[V] 23 Pop Label A::1:2:1/128[V] 24 Pop Label 10.1.2.0/24[V] 25 Pop Label A::1:2:2/128[V] 26 18 A::1/128[V] FE80::A8BB:CCFF:FE03:2101 27 26 10.4.5.5/32[V] 28 25 10.4.5.0/24[V] 29 22 A::4:5:5/128[V] 30 21 A::4:5:0/112[V] 31 23 A::4:5:4/128[V] 32 24 A::5/128[V] 33 Pop Label 10.1.2.2/32[V] 34 Pop Label 10.1.1.1/32[V] 35 27 10.4.5.4/32[V] Local Outgoing Prefix Bytes Label Label Label or Tunnel Id Switched 36 28 10.5.5.5/32[V] Outgoing Next Hop interface Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et0/0 10.1.2.1 aggregate/vpn1 Et0/0 A::1:2:1 aggregate/vpn1 aggregate/vpn1 Et0/0 Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et1/0 10.2.3.3 aggregate/vpn1 Et0/0 10.1.2.1 Et1/0 10.2.3.3 Outgoing Next Hop interface Et1/0 10.2.3.3 Following is sample output from the standby router: Standby-Router# show mpls forwarding Local Outgoing Prefix Bytes Label Label Label or Tunnel Id Switched 18 Pop Label 10.3.3.3/32 19 Pop Label 10.3.4.0/24 20 17 10.4.4.4/32 21 Pop Label 10.1.2.1/32[V] 22 Pop Label A::1:2:0/112[V] 23 Pop Label A::1:2:1/128[V] 24 Pop Label 10.1.2.0/24[V] 25 Pop Label A::1:2:2/128[V] 26 18 A::1/128[V] FE80::A8BB:CCFF:FE03:2101 27 26 10.4.5.5/32[V] 28 25 10.4.5.0/24[V] 29 22 A::4:5:5/128[V] 30 21 A::4:5:0/112[V] 31 23 A::4:5:4/128[V] 32 24 A::5/128[V] 33 Pop Label 10.1.2.2/32[V] 34 Pop Label 10.1.1.1/32[V] 35 27 10.4.5.4/32[V] Local Outgoing Prefix Bytes Label Label Label or Tunnel Id Switched 36 28 10.5.5.5/32[V] 10 Outgoing Next Hop interface Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et0/0 10.1.2.1 aggregate/vpn1 Et0/0 A::1:2:1 aggregate/vpn1 aggregate/vpn1 Et0/0 Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et1/0 10.2.3.3 Et1/0 10.2.3.3 aggregate/vpn1 Et0/0 10.1.2.1 Et1/0 10.2.3.3 Outgoing Next Hop interface Et1/0 10.2.3.3 NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE How to Configure NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE Step show ipv6 cef vrf vrf-name Use this command to show preserved forwarding entries for IPv6 and VPNv6 prefixes This sample output is also from a PE router in a CSC configuration Enter the command on the active and the standby router Compare the sample output from the active router with the sample output from the standby router Following is the output from the active router: Router# show ipv6 cef vrf vrf1 ::/0 no route ::/127 discard A::1/128 nexthop FE80::A8BB:CCFF:FE03:2101 Ethernet0/0 label 18 A::5/128 nexthop 10.2.3.3 Ethernet1/0 label 17 24 A::1:2:0/112 attached to Ethernet0/0 A::1:2:1/128 attached to Ethernet0/0 A::1:2:2/128 receive for Ethernet0/0 A::4:5:0/112 nexthop 10.2.3.3 Ethernet1/0 label 17 21 A::4:5:4/128 nexthop 10.2.3.3 Ethernet1/0 label 17 23 A::4:5:5/128 nexthop 10.2.3.3 Ethernet1/0 label 17 22 FE80::/10 Following is sample output from the standby router: Standby-Router# show ipv6 cef vrf vrf1 ::/0 no route ::/127 discard A::1/128 nexthop FE80::A8BB:CCFF:FE03:2101 Ethernet0/0 label 18 A::5/128 nexthop 10.2.3.3 Ethernet1/0 label 17 24 A::1:2:0/112 attached to Ethernet0/0 A::1:2:1/128 attached to Ethernet0/0 A::1:2:2/128 receive for Ethernet0/0 A::4:5:0/112 nexthop 10.2.3.3 Ethernet1/0 label 17 21 A::4:5:4/128 nexthop 10.2.3.3 Ethernet1/0 label 17 23 A::4:5:5/128 nexthop 10.2.3.3 Ethernet1/0 label 17 22 FE80::/10 11 NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE Configuration Examples for Configuring NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE Configuration Examples for Configuring NSF/SSO and ISSU—MPLS VPN 6VPE and 6PE This section provides the following configuration examples for PE1 Routers • Configuring NSF/SSO for a Basic 6VPE Setup: Example, page 12 • Configuring NSF/SSO for a Basic 6PE Setup: Example, page 14 Configuring NSF/SSO for a Basic 6VPE Setup: Example This section shows the NSF/SSO configuration for a basic 6VPE setup Figure show a sample basic 6VPE network configuration Sample Basic 6VPE Network Configuration 59525 Figure CE1 PE1 P PE2 CE2 PE1 Configuration in a Basic 6VPE Setup Following is a configuration example for a PE1 router (see Figure 1) in a basic 6VPE setup that includes VPNv6 and VPNv6 address families: vrf definition vpn1 rd 1:1 route-target export 1:1 route-target import 1:1 ! address-family ipv4 exit-address-family ! address-family ipv6 exit-address-family ! ! ip cef distributed ! ipv6 unicast-routing ipv6 cef distributed mpls ldp graceful-restart !

Ngày đăng: 09/11/2019, 00:59