JL3V 19 A Student Guide
JL3V 19 A Student Guide
NETWORKS
Education Services
Engineering
Simplicity
Student Guide
Juniper University
un1Per NETWORKS Education Services
1133 Innovation Way
Sunnyvale, CA 94089 USA
408-745-2000
www.jun iper.net
Juniper Networks reserves t he right to change, modify, t ransfer, or otherwise revise t his publication without notice.
YEAR 2000 NOTICE
Juniper Networks hardware and software products do not suffer from Year 2000 problems and hence are Year 2000 compliant. The Junos operating system has no known
t ime-related limitations through t he year 2038. However, the NTP application is known t o have some difficulty in t he year 2036.
SOFTWARE LICENSE
The terms and condit ions for using Juniper Networks software are described in t he software license provided with the software, or t o the extent applicable, in an agreement
executed between you and Juniper Net works, or Juniper Net works agent. By using Juniper Networks software, you indicat e that you understand and agree t o be bound by its
license t erms and condit ions. Generally speaking, the software license rest ricts t he manner in which you are permitted t o use t he Juniper Net works software, may contain
prohibitions against certain uses, and may state condit ions under which t he license is automat ically terminated. You should consult t he software license for further det ails.
Contents
Chapter 2: MPLS VPNs . ... . ..... .. ... . ............ . ................... . . . .......... . .. 2-1
Overview of MPLS VPNs . . ..... . .... . ..... . ... .. .... .. ... . ..... .. .... .. ... ... ... . ... 2-3
Provider-Provisioned VPNs . ... ... ... . ..... .. ......... . ... . . . .............. . . . ... . .. 2-11
iv • Contents www.juniper.net
Course Overview
Th is three-day course is designed to provide students with MPLS-based Layer 3 virtual private network (VPN) knowledge
and configuration examples. The course includes an overview of MPLS Layer 3 VPN concepts, scaling Layer 3 VPNs,
Internet access, lnterprovider Layer 3 VPNs, and Multicast for Layer 3 VPNs. Th is course also covers Junos operating
system-specific implementations of Layer 3 VPNs.
The concepts are put into practice with a series of hands-on labs, which allow partic ipants to gain experience in
configuring and monitoring Layer 3 VPNs on Junos OS devices. These hands-on labs utilize Juniper Networks vMX Series
devices using the Ju nos OS Release 19.4R1.10 and are also applicable to other MX Series devices.
Course Level
Junos Layer 3 VPNs (JL3V) is an advanced-level course.
Intended Audience
This course benefits individuals respons ible for configuring and monitoring devices running the Junos OS.
Prerequisites
The prerequisites for this course include the following:
• Intermediate-level networking knowledge and an understanding of OSPF, IS-IS, BGP, and Junos policy;
Objectives
After successfully completing this course, you should be able to:
• List the provider-provisioned MPLS VPN features supported by the Junos OS software .
• Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN .
• Describe the format of the BGP routing information, including VPN-1Pv4 addresses and route distinguishers .
• List the BGP design constraints to enable Layer 3 VPNs within a provider network .
• Explain the operation of the Layer 3 VPN data plane within a provider network.
• Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and
import/export routes from a routing instance using route distingu ishers/route targets.
• Describe the purpose of BGP extended communities, configure extended BGP extended commun it ies, and
use BGP extended communities.
• List the steps necessary for proper operation of a PE-CE dynamic routing protocol.
• List the troubleshooting and monitoring techn iques for routing instances .
• Explain the difference between the bgp.13vpn table and the inet.O table of a routing instance .
• Explain the operation of a PE multi-access interface in a Layer 3 VPN and list commands to modify that
behavior.
• Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN.
• Describe the flow of control traffic and data traffic in a draft-rosen multicast VPN.
• Describe the flow of control traffic and data traffic in a next-generation multicast VPN.
• Describe the flow of control traffic and data traffic when using MVPNs for Internet multicast.
• Describe the configuration steps for enabling Internet multicast using MVPNs.
• Monitor and verify the operation of MVPN Internet multicast.
Day1
Chapter 1 : Course Introduction
Day2
Chapter 6 : Layer 3 VPNs - Advanced Topics
Day3
Chapter 9 : Multicast Review and Draft Rosen
Lab 6: MVPNs
Franklin Gothic Normal text. Most of what you read in the Lab Guide
and Student Guide.
CLI Input Text that you must enter. l ab@San Jose> sho w r o ute
CLI Va r iable Text where variable va lue is already pol icy my - pee r s
assigned.
GUI Va r iable Click my- peer s in the dia log.
CLI Undefi ned Text where t he variable's va lue is Type set p o l i c y policy-name.
the user's discretion or text where
ping 1 0 . 0 .x . y
the va riable's va lue as shown in
GUI Unde f i ned the lab guide might d iffer from the Select Fi le > Save, and type
value the user must input filename in the Fi l ename f ield .
according to the lab topology.
Technical Publications
You can print technical manuals and re lease notes directly f rom the Internet in a variety of formats:
• Go to http://www.juniper.net/techpubs/.
• Locate the specific software or hardware release and title you need, and choose the format in which you
want to view or print the document.
Documentation sets and CDs are avai lable thro ugh you r loca l Juniper Networks sales office or account representative .
Engineering Simplicity
Junos Layer 3 VPNs
Objectives
We Will Discuss:
• Objectives and course content information;
Introductions
Introductions
The slide asks several quest ions for you t o answer during c lass introductions.
Prerequisites
Prerequisites
The slide lists the prerequ isites f or this course.
Course Contents
■ Contents:
• Chapter 1: Course Introduction
• Chapter 2: MPLS VPNs
• Chapter 3: Layer 3 VPNs
• Chapter 4: Basic Layer 3 VPN Configuration
• Chapter 5: Layer 3 VPN Scaling and Internet Access
• Chapter 6: Layer 3 VPNs - Advanced Topics
• Chapter 7: lnterprovider Backbones for Layer 3 VPNs
• Chapter 8: Troubleshooting Layer 3 VPNs
• Chapter 9: Multicast Review and Draft Rosen
• Chapter 10: Next-Generation Multicast VPNs
Course Contents
The slide lists the topics we discuss in this course.
Course Administration
■ The basics:
• Sign-in sheet
• Schedule
• Class times
• Breaks
• Lunch
• Break and restroom facilities
• Fire and safety procedures
• Communications
• Telephones and wireless devices
• Internet access
Education Materials
• Available materials for classroom-based
and instructor-led online classes:
• Lecture material
• Lab guide
• Lab equipment
• Self-paced online courses also available
• www.juniper.net/ondemand
Additional Resources
Additional Resources
The slide provides links to additional resources available to assist you in the installation, configuration, and operation of
Juniper Networks products.
Satisfaction Feedback
~
~
Class
r
"' ~
~
Feedback
►
~
~
.,>, ~
~
-
■
., ~
-- ~
~
I II I
i1
Satisfaction Feedback
Juniper Networks uses an electronic survey system to col lect and analyze yo ur comments and feedback. Depending on the
class you are ta king, please complete the survey at t he end of the class, or be sure to look for an e-mail about two weeks
from class completion that directs you to complete an online survey form . (Be sure to provide us with you r current e-ma il
address.)
Submitting your feedback entit les you to a certificate of c lass completion. We thank you in advance for taking the time to
help us improve our educationa l offerings.
Certification
Service Provider Routing & Switching Enterprise Routing & Switching Data Center Junos Security
JNCIE-SP JNCIE-DC
JNCIE-SP Self-Study Bundle JNCIE- ENT Self-Study Bundle JNCIE-DC Self-Study Bundle JNCIE-SEC Self-Study Bundle
JNCIS-ENT
Ju nos MPLS Fundamentals (JMF) Junos Enterprise Switching (JEX) Juniper Security (JSEC)
Junos Service Provider Switching (JSPX) Junos Intermediate Routing (JIR)
Introduction to the Junos Operating System (IJOS) Introduction to Juniper Security (IJSEC)
Networking Fundamentals
Note s: Information current as of February 2020. Course and exam information (length , availability, content, etc.) is subject to change; refer to www.iuniper.neUtraining for the most current information.
Courses
Juniper Networks courses are available in the following formats:
Find the latest Education Services offerings covering a wide range of platforms at www.juniper.net/tra ining
Education Services
CERTIFICATION PROGRAM
.,
t::
JNCIE•
a.
)(
UJ C loud
-
Cl!
C
0
JNCIP-
"'8l
... C loud
-
0
CL
.!2
----:t•••••••·••••••• • 0 JNCIS-ENT
.!!! JNCIS•
.,
0
C loud
a.
(J)
$
.!!!
0
0
- •- •- - - - JNCIA-
1/1 C loud
"'
ct:
Information as of February 2020. * In planning. Refer to www 1uniper net/cert1f1cat1on for the most current 1nformat1on.
Each JNCP track has one to four certification levels- Associate-level, Specia list-level, Professional-level, and Expert-level. The
Associate-leve l, Specialist-level, and Professional-level exams are computer-based exams composed of multiple choice
questions administered at Pearson VU E testing centers worldwide.
Expert-level exams are composed of hands-on lab exercises administered at select Juniper Networks testing centers. Please
visit t he JNCP website at http://www.jun iper.net;certification for detailed exam information, exam pricing, and exam
registration .
Certification Preparation
Training and Study Resources
Juniper Networks Certification Program website www.juniper.net/certification
Community
J-Net http ://forums.juniper. net/t5/Training-Certification-
and/bd-p/Trai ni ng and Certification
Twitter @JuniperCertify
Junos Genius
The Ju nos Genius mobile learning platform (www.junosgenius.net) helps you learn Juniper technologies and prepare for
Juniper certification exams on your sc hedule. An app for iOS and Android devices, along with laptops and desktops, Junos
Genius provides certification preparation resources, practice exams, and e-learning courses developed by experts in Juniper
tec hnology. Courses cover automation, routing, switching, security, and more.
Find Us Online
J-n~ http://www.juniper.net/jnet
http://www.juniper.net/facebook
I http://www.juniper.net/youtube
http://www.juniper.net/twitter
Find Us Online
The slide lists some on line resources to learn and share information about Juniper Networks.
Questions
Any Questions?
If you have any questions or concerns about the class you are attending, we suggest that you vo ice them now so that your
instructor can best address your needs during class.
Engineering Simplicity
Junos Layer 3 VPNs
Objectives
We Will Discuss:
• The purpose and features of M PLS virtual private networks (VPNs);
• The principles of provider-provisioned MPLS Layer 3 VPNs, and MPLS Layer 2 VPNs; and
• Advantages and d isadvantages of MPLS Layer 3 VPNs and MPLS Layer 2 VPNs.
What Is a VPN?
.... --
EBII II
_ __,
....
...
Shared Public Infrastructure
---------- -... Iii
Home
-- -
Corporate
Office Office
II
Branch Office
■ Virtual private network:
• A private network constructed over a shared infrastructure
• Virtual: Not a separate physical network
• Private: Separate addressing and routing
• Network: A collection of devices that communicate
• Constraints are key-restricted connectivity is the goal
A VPN is designed so that on ly devices intended to communicate with each other can do so. For instance, as shown on the
slide, a VPN can be the network infrastructure that provides communication between the corporate headquarters, branch
offices, mobile users, data centers, suppliers, and customers, while ensuring that unwanted devices cannot gain access to
this private network.
• Topology requ irements: Traditionally VPN solutions can provide full mesh or partial mesh (including hub and
spoke) connectivity. Fu ll mesh was typically more expensive and less scalable.
• Bandwidth and Cos requirements: Bandwidth requirements have changed over time from as little as 64Kb/ s to
10Gb/ s nowadays depending on application requirements. The CoS mechanisms are s imilar to internal
networks.
• Provisioning: Depending on the topology and technology, the provisioning of VPNs can vary greatly. It is
preferred not to have to provis ion every site when there are move/ add/ changes.
• Security: Security is a major concern for VPNs. MPLS VPNs are not inherently secure as they don't offer any
encryption like IPsec VPNs. The security offered by MPLS VPNs is primarily separation between different VPNs.
• Buy or build: When choosing a VPN there are two options, to build your own VPN or to buy the VPN from a
service provider. The routing requirements will determine the preference for Layer 2 VPN or Layer 3 VPN.
LegacyVPNs
MPLS
ATM core TDM
Frame Relay
Voice IP/Internet
MPLS
ATM core TOM
Single management
and provisioning infrastructure
■ Benefits
• Flexible service offerings
• Lower CapEx / OpEx
• Simplify provisioning and management
C2020 Juniper Networks, Inc .All R,ghlS Resenie<I.
Jon1per8usiness Use Only
One of the advantages of MPLS VPN offerings is that multiple services can be used even on a single physical network
connection. By using the f lexibl e-ethe rnet-se r vices encapsulation the Ju nos platforms can offer Layer 2 and
Layer 3 services on a single physical interface.
Site2 e CE Site2 $ cE
CP-VPN - wa PP-VPN
Site 1 PE
.__I---.> $--+-$
Site 1 Site 3
~ --
~- CE
- --- CE CE PE
IP/MPLS
SP Network
~eP CE
Site-to-site MPLS
VPN tunnels Provider-provisioned VPN
■ Customer benefits
• Lower operational costs
• Higher bandwidth offerings from service providers
• Easy transition from legacy VPNs
• Layer 2 VPNs offer very similar features
C/2020 Juniper Networks, Inc .All Rights Resenie<I.
Jon1per8usinessUse Only
Customer Benefits
The lower costs at the service provider result in lower prices for the cust omer offerings. Tec hnologies like ADSL and Ethernet
allow higher bandwidth connections, beyond what was possible with t raditiona l Customer-Provisioned VPNs.
For existing customers it is relatively easy to tra nsition to the new MPLS VPNs as they offer similar (or better) f eatures,
allowing a smooth migration path without the need of a redes ign.
Site 1 PE Site 3
FW
CE
IP/MPLS
SP Network
~ eCE
NAT
MPLS
Provider-provisioned VPN
This is attractive for service providers as it opens up new revenue generation possibilities. But it is also attractive to
customers, who can offload the complexity of operating these services to the provider and simultaneously achieve service
consistency and uniformity across all their sites.
Provider-Provisioned VPNs
The slide lists the topic we will discuss next.
Provider-Provisioned VPNs
■ Provider-Provisioned VPN (PP-VPN):
• BGP/MPLS-based Layer 3 VPNs (RFC 4364)
• Circuit cross-connect (CCC)
• LOP Layer 2 circuits (RFC 444 7)
• VPWS
• BGP Layer 2 VPN (RFC 6624)
• VPLS
• FEC 129 BGP autodiscov eryforVPWS (RFC 6074)
i Site2
I PP-VPN I
• BGP signaled VPLS (RFC 4761 )
)-
~
PE
• LOP signaled VPLS (RFC 4762)
• EVPN (RFC 7432) c:~e~, CE
IP/MPLS
SP Network
Provider-Provisioned VPNs
The provider-provisioned VPNs are a category of VPNs that are mainly controlled by the service provider, on t heir PE rout ers.
Another category of VPNs are called customer-provisioned VPNs, which are controlled from the CPE devices, examples of this
cat egory are PPTP, L2TP, and IPsec VPNs.
The provider-provis ioned VPNs cover a range of different solutions. They differ in approach (Layer 2 versus Layer 3 ), topology
(point-to-point vs point-to-multipoint), and signa ling protocols (LOP versus BGP).
• Layer 2 MPLS VPNs: Circuit-Cross Connect and LOP Layer 2 Circu its (RFC444 7).
• Virtual Private Wire Service: BGP Layer 2 VPN, (RFC 6624) and FEC 129 BGP Autodiscovery (RFC607 4 ).
• Virtual Private LAN Service: BGP signaled VPLS (RFC 4 761), and LOP signaled VPLS (RFC 4 762).
VPNA VPNA
e
CE
SP Network
Site 1 Site 2
VPNB
~
p VPNB
e
CE
e
CE
Site 1 Site 2
The service provider PE rout er is the workhorse in this solution. As multiple cust omers will connect to a specific PE, it wil l
need to keep the different customer routing information private by having mu ltiple VPN-specific routing tables. By separati ng
the customer route information, MPLS Layer 3 VPNs support overlapp ing address space between cust omers.
e~
VPNA VPNA
CE CE
Site 1 SP Network Site 2
'
VPNB
CE CE
Site 1 Route Reflector Site2
The main role of the service provider is to ensure connectivity and privacy of the different customer VPNs. This is mainly
done by the use of administrative policies to control the exchange of route information.
Site 1
Site 2
Site 3
Outsourced VPNs
MPLS-based VPNs make it possible for a service provider to offer value-added services to new and existing customers using
its existing network infrastructure.
The Junos OS supports Layer 3 provider-provisioned VPNs based on RFC 4364. In th is model, the PE routers maintain
VPN-specific routing tables ca lled VPN route and forwarding (VRF) tables for each of their directly connected VPNs. To
populate these forward ing tables, the CE routers advertise routes to the PE routers using conventional routing protocols like
RIP, OSPF and EBGP.
The PE routers then advertise these routes to other PE routers with MP-BGP using extended communities to differentiate
traffic from different VPN sites. Traffic forwarded from one VPN site to another is tunneled across the service provider's
network using MPLS. The MPLS-based forwarding component allows support for overlapping address space and private
addressing.
--
CE (
LOP or RSVP
for LSP establishment •• •'"EB
: VRF : CE
MP-BGP
r
CE VRF
- to distribute VPN routes
1 CE
Site 3 ~-~R~~ • \......__ _ _ __.~~ ~
~ -VR
FL~
- I ~
Site 1
•.......... : PE
MP-BGP
•• •• ' " '
Site 1
IP/MPLS
Infrastructure
) CE
• \......__ _ _ ___.~~ ~
~ -VR
FL~
- I ~
Site 1
VPN provisioning mistakes can be costly, especially when considering that the provider cou ld become liable f or the security
of the customer's networks.
Point to point connections are provided by CCC, LOP Layer 2 circu its, and both virtual private w ire service (VPWS)
implementations.
The Laye r 2 VPN connections allow any type of Layer 3 protocol so it is not limited to IP-only applications.
The exchange of the customer virtual circuits can be done by MP-BGP or by using LDP signaling.
The main role of the service provider is to ensure connectivity and privacy of the different customer VPNs. This is mainly
done by the use of administrative policies to control the exchange of virtual circuit information .
Circuit Cross-Connect
■ Provides the foundation for MPLS-based Layer 2 VPNs
• Broad support of PE-CE interface types
• ATM, Frame Relay, VLAN, PPP, and HDLC
■ Service provider maintains LSPs between PE routers
• One LSP per virtual circuit being serviced
• Ingress PE maps each inbound PVC to a dedicated LSP
• Egress PE maps incoming LSP to outbound PVC
■ CE routes VPN traffic based on subnet/PVC mappings
Routing Table
In Out CCC Table Site 3
10/ 8 DLCI 600 DLCI 600 LSP 1 -+ ~ Network
DLCI 610 LSP 2
5·~0'8"~
~LC~I 20.0.0.0/8
20/8 DLCI 610
CE
• CE and PE router configuration can be complex, especially during adds, moves, and c hanges. The customer
must coordinate with t he service provide r.
• Each data-link connection identifier (DLCl)/PVC requires a dedicated set of MPLS LSPs. There can be no sha ring
of the LSP when using CCC.
• CCC as a Layer 2 VPN sol ution is only appropriate for small numbers of individua l private connections.
Interface types must be the same at all CE device locations. For instance, if Frame Relay is used at one VPN s ite then Frame
Relay m ust be used at all other s ites . However, the Ju nos OS has a feature ca lled translationa l cross-connect (TCC) that can
be used when there are different interface types at the CE locations.
Site 1 Site 2
Routing Is CE to CE
Because the provider delivers Layer 2 circuits to the customer, the routing for the customer's private network is entirely in
the hands of the customer. From the perspective of the attached CE device, there is no operational difference between a
Frame Relay service, CCC, and a BGP Layer 2 VPN solution.
~
....._....;:.....__ _ _. ,~
DLCl608aCE
Site 3
-......____.,
Site 2
Ethernet VPN
■ As with VPLS, the VPN appears to customers as a single LAN
segment
• EVPN improves on VPLS in a number of ways
• A more complex BGP-based control plane helps achieve overall better forwarding
performance (less flooding)
• Support for advanced features
• Unlike VPLS, PE devices learn remote IP/MAC address through MP-BGP
Site 3
PE P I
--Cl)-11~ -1
I
I
Site 2
Ethernet VPN
The latest Layer 2 service that can be provided to customers is Ethernet VPN (EVPN). Exactly as in VPLS, EVPNs appear to
customers as a s ingle LAN, which all CEs are connected.
EVPNs address some of the limitation of VPLS and provide a number of advanced features wh ile improving forwarding
performance by reducing the need of flooding traffic. Today, EVPNs are becoming the preferred solution for data center
interconnect (DCI), i.e. to provide any-to-any Layer 2 and Layer 3 connectivity between data centers.
One of the differences between VPLS and EVPN is a relative ly more complex control plane based on MP-BGP, which (un like
VPLS) is also used for advertising MAC addresses.
• Great er scalab ility: Control plane for IP/ MAC address learning instead of data plane f looding.
• Int egrated Layer 2 and Layer 3 services : Optimal intra-subnet, and int er-subnet t raffic f lows.
• Active/ Active mult i-homing support: Improves load-sharing and high availability.
• Virtual Machine (VM ) mobility support: Improved MAC move detection and optimal default gateway usage.
Subscriber Advantages
With Layer 2 VPNs the customer can outsource Layer 2 circuits to the provider over an existing Internet access circu it while
maintaining contro l over the routing of its traffic. Also, because the provider is encapsulating Layer 2 traffic for transport
using MPLS, the customer can use any Layer 3 protocol- not on ly IP-based protocols.
Provider Advantages
Layer 2 and Layer 3 VPNs can coexist by using the same MPLS transport and signa ling protocols. The provider can now se ll
Frame Relay or ATM circuits to different customers using its existing IP core. Automatic provisioning of Layer 2 circuits
simplifies the processes of adds, moves, and changes. Also, the use of label stacking greatly improves efficiency and
sea la bi Iity.
Summary
We Discussed:
• The purpose and features of MPLS VPNs;
• The principles of provider-provisioned MPLS Layer 3 VPNs, and MPLS Layer 2 VPNs; and
• Advantages and d isadvantages of MPLS Layer 3 VPNs and MPLS Layer 2 VPNs.
Review Questions
Review Questions
1.
2.
3.
2.
Business drivers for the deployment of MPLS VPNs are lower CapEx/ OpEx, flexib le service offerings, easy transition from
legacy VPNs, and higher bandwidth offerings.
3.
The first and most notable difference is with a Layer 2 VPN solution, the backbone routing is the respons ibility of the
customer. With a Layer 3 VPN solution, the backbone routing is handled by the provider. Another difference is that with a
Layer 2 VPN solution, non-IP traffic can be passed from s ite to site. With a Layer 3 VPN solution, the traffic has to be IP.
Engineering Simplicity
Ju nos Layer 3 VPNs
Objectives
We Will Discuss:
• The roles of provider (P), provider edge (PE), and customer edge (CE) routers;
■ CE routers:
• Located at customer premises
• Provide access to the service provider network
• Can use any access technology or routing protocol for the CE/PE connection
Customer Edge
PE
VPNA E
~-~ VPNA
~p
~
PE CE
VPN B
- VPN B
■ PE routers:
• Maintain VPN-specific forwarding tables
• Exchange VPN routing information with other PE routers using BGP
• Use MPLS LSPs to forward VPN traffic
Provider Edge
PE
p p e
VPNA ICE
~ '
~e -~ - VPNA
~
PE "' CE
VPN B e VPN B
Routes learned from the CE routers (and stored in the PE router's VRF table) are sent to remote PE routers using
Multiprotocol Border Gateway Protocol (MP-BGP).
PE routers use MPLS LSPs when forwarding customer VPN traffic between sites. LSP tunnels in the provider's network
separate VPN traffic in the same fashion as PVCs in a legacy ATM or Frame Relay network.
Provider Routers
■ P routers:
• Forward VPN data transparently over established LSPs
• Do not maintain VPN-specific routing information
Provider Routers
'"-- PE
VPNA
~
--.....__,
~ - e --~p~------~ ~-,E+3_____,
~
VPNA
VPN B CE VPN B
Provider Routers
Provider (P) routers are located in the provider's core. These routers do not carry VPN customer routes, nor do they interface
in the VPN control and s ignaling planes. This is a key aspect of the RFC 4 364 scalability model; only PE routers are aware of
VPN customer routes, and no single PE router must hold all VPN customer state information .
P routers are involved in the VPN forwarding plane where they act as label-switching routers (LSRs) perform ing label
swapping (and popping) operations.
VPN Sites
PE
p p e
VPN A
~ ~e -0 ~ ',~~
'
VPNA
· / 0 PE ~ CE
VPN B ~ E e VPN B
VPN Sites
A VPN site is a collect ion of devices that can communicate with each other without the need to transit the provider's
backbone. A site can range from a single location with one router to a network consisting of many geographically diverse
routers.
Mapped to a VRF
Each VPN site is attached to at least one PE router and can be dual-homed with multiple connections to different PE routers.
Each site is associated with a site-specific VRF tab le in the PE routers. It is here that the PE router maintains the routes
specific to that site and, based on policy, the routes for remote sites to which t his location can commun icate.
p p PE 3 .--,----::~. ~ ,. ,.,., ~
.
---~
BGP ~ - ',,~
.......,__,. . _ ~ ~ Routing
CE-B3
VPN C
-- - -<.,
Site 1
VPN B ~ ~--. ~
-- -
Site 3 !!!
On th is slide, PE 1 has three VRF tables-one for each of its attached VPN sites. The VRF tables store routes learned from the
attached site, as well as routes learned through MP-BGP interaction with remote PE routers. In the latter case, VPN po licy
determines which routes are cop ied into which VRF tables based on the presence of a VPN-1Pv4 route attribute known as a
route target.
VRF Tables
Site Separation
When a packet is rece ived from a given site, the PE router performs a longest-match Layer 3 lookup against only the entries
housed in that site 's VR F tab le. This separation permits duplicate addressing among VPN customers with no chance of
routing ambiguity.
r- - - - VPNA
L 1_E.~1! ~ ~ Site2
PE 1
VPN B 10.1/16
Site 1
CE- 8 2 VPN B
I
~-~- - ~~
In th is example, VPN Site A is using the 10.1/16 addresses space, which is also being used by VPN customer B. However,
housing these overlapping routes in separate VRF tab les on PE routers is only half of the solution. A mechanism is needed to
allow the PE routers to exchange these routes with remote PE routers without any chance of one address stepping on the
other.
For example, when PE 1 advertises routes from its two VRF tables to PE 2, they arrive over a common MP-BGP connection
that is not inherently associated with a particular VRF table . How can we assure that PE 2 interprets these routes as being
independent and unrelated? The answer lies in the structure of a VPN-1Pv4 address containing a route distinguisher
designed to fix the very problem posed here.
VPN network layer reachability information (NLRI) conta ins a 24-bit MPLS label, which is sometimes called a VRF label
because the label's function is to associate packets with a particular VRF instance in the receiving PE router. VPN addresses
also contain a route distinguisher field, which is used to disambiguate VPN routes. In other words, two identical IP prefixes
are cons idered as different, and therefore incomparable, when they carry different route distinguisher values.
Distributed by MP-BGP
Labeled VPN routes are exchanged over the MP-BGP sessions, which term inate on the PE routers.
• Type O: This format uses a 2-byte administration field that codes the provider's autonomous system number,
fol lowed by a 4-byte assigned number field . The assigned number field is adm inistered by the provider and
should be unique across the autonomous system.
• Type 1 : This format uses a 4-byte administration field that is norma lly coded with the router ID (RID) of the
advertising PE rout er, fol lowed by a 2-byte assigned number field that caries a un ique value for each VRF table
supported by the PE router.
The examples on t he sl ide show bot h t he Type O and Type 1 route distinguisher format s. The f irst example shows the 2-byte
adm inistration f ield with the 4-byte assigned n umber f ield (Type 0).
VPNA
. - . Site2
VPN A
Site 1
VPN B
Site 1
••••••••••••••••
: 10.1 /16 :
• • ••••••••••••
••••
The sole purpose of the rout e disti nguisher is to make what would otherwise be identica l addresses incomparable. The PE
routers do not int erpret or act on the fields in the route distinguisher for any other reason.
VPNA
p Site 3
Control Flow
VPN control flows exist at various places in the RFC 4364 environment. First, we have the signaling exchange between CE
and PE routers that can take the form of OSPF, RIP, BGP, or even static routing. The control exchanges between PE and CE
routers are totally independent, due to the PE routers terminating the local CE-PE signa ling flows. The PE routers then use
MP-BGP to convey routes from site-specific VR F tables for the purposes of populating the VRF tables on remote PE routers.
Finally, the need for LSPs in the provider's networks resu lts in the presence of MPLS-related signaling in the form of either
RSVP or LDP.
Data Flow
Data flow relates to the actual forwarding of VPN traffic from CE router to CE router using MPLS label-based switch ing
through the provider's core.
Administrative Policy
The use of pol icy in the PE routers determines the connectivity that results between VPN sites. While site connect ivity
requirements are defined by the VPN customers, the act of implementing this policy is the job of the service provider.
Mistakes made by the provider when defining and implementing VPN policy can lead to security breaches at worst and
broken VPN connectivity at best.
The most important extended community is the route target, which is used to convey a route's association with a given VPN/
VR F table. The site of origin (SoO) commun ity is used in certain corner cases to prevent the unnecessary advertisement of
routes back to a site that originated it.
Route Advertisements
Each VPN-1Pv4 route advertised by a PE router contains one or more route target communities. These communities are
added using VRF export po licy or explicit configuration.
Receiving Routes
When a PE router receives route advertisements from remote PE routers, it determines whether the associated route target
matches one of its local VRF tables. Matching route targets cause the PE router to install the route into al l VRF tables whose
configuration matches the route target.
- - 1 10.1/161
Routing Exchange
The following sequence of slides discusses the end-to-end exchange of routing information between CE routers belonging to
the same VPN.
CE-4 sends the routes associated with VPN A Site 2 to its attached PE router. The 10.1/ 16 prefix can be exchanged using
OSPF, RIP, or BGP. Static routing can also place a site 's routes into the local PE router's VRF table.
Whatever protocol is used between CE-4 and PE-2, the operation of this protocol is term inated by the PE router. Th is
termination provides isolation of the VPN site's routing protocol and the MP-BGP protocols used to convey the routes
between PE routers. Th is isolation improves scalability and stability as malfunctions in the PE-CE routing protocol tend to be
limited to that PE-CE pairing.
10458:23:10.1/16
IP Prefix 10.1/1 6
CE-1 CE-2
p 1 MP-BGP Sessio E2
Site 2
.. .. .. .
VPN A
Site 1
e - VRF:1
CE 3 · · · · .
-:-:-:-,.,
~
.
• - - - -
. - -~ ~
-
:-,-~,.,::;::
.,_,~
iYRffl
CE-4
OSPF
VPN
Site 2
,:::: ~ 10458:23:10.1/16
VPN RED Export - -I 10.1,1s J
........._ _ _-:r,
10~458:23:10.1 /16
VPN RED Import MP-BGP VPN RED Export
LabelZ
If no local configuration matches the route target, the PE router silently d iscards the route. Thus, a PE router must only carry
VPN routes when it has one or more loca lly attached sites belonging to the same VPN. Should the remote PE router's import
policy or VRF target change, BGP route refresh is used to solicit a retransmission of previously advertised routes, because
route target matches can now occur due to the policy modifications. Use of BGP route refresh means that BGP sessions do
not have to be disrupted when adds, moves, or changes to the VPN topology occur.
When the received route's target does match a VRF table's route target configuration, the PE router copies the VPN route
into the b gp . 1 3vpn. o table. This table houses all received VPN routes whose route target matched at least one VPN 's
configuration. The route is also copied into one or more local VRF tables after having the route distingu isher removed. The
result is that prefix 10.1/ 16 is now present in PE-i's random early detection (RED) VRF table in a native 1Pv4 format.
PE-1 now associates the RID of PE-2 as the next hop for 10.1/ 16 when forwarding traffic that matches the prefix and was
received on its RED VRF interface.
0
MP-BGP
6 GP Label (Inner) Label ( 2 ' - - - - - LabelZ
MPLS (Outer) Label (y) Next Hop PE-2
Label Association
When VPN routes are advertised, part of the NLRI is the VRF label chosen by the advertising PE router. Th is label is often
ca lled the inner label because it is always found at the bottom of the label stack. The p urpose of this label is to associate
received packets with the correct VRF tab le.
The receiving PE router m ust be able to resolve the RID of the advertising route to an MPLS LSP stored in the i ne t. 3 table.
If an LSP does not exist to the advertising PE ro uter, the route is hidden due to an unusable next hop. VPN traffic can only be
forwarded across the provider's backbone using MPLS switching. If an LSP to the egress PE router does not exist, the VPN
route can never be used.
The result of t his process is a two-level label stack used to forward packets across the provider's backbone, and then to
associate t he traffic with a specific VRF table on the receiving PE router.
Common Labels
RFC 4364 allows the PE router to issue a single VRF label for al l routes belonging to a common VRF interface or to allocate a
unique label for each route being advertised . The Ju nos OS takes the former approach because it drastically reduces the
number of VRF labels that must be managed. Compliant implementations that use per-route VRF label assignment are
interoperable with this one-label-per-VRF-interface approach, however.
These routes can be exchanged using any supported PE-CE routing protocol, or they can be defined statically on the CE
device. The CE device associates the PE router's VRF interface as the next hop for the routes learned from the PE router.
Because the local PE-CE routing protocol is terminated by the PE router's VRF table, in this examp le, CE-4 can run EBGP,
whi le CE-3 might be running OSPF or RIP.
Where wanted, you can use routing policy to control or refine the route exchange between PE and CE routers further. This
policy would function in addition to the VRF import and export policy discussed in this section.
Traffic Forwarding
The slide highlights the topic we d iscuss next.
Data Flow (1 of 7)
10.1 /1 6
RSVP or LDP can establish the PE-to-PE LSP. The PE-to-PE LSPs can involve PE routers run ning LDP with the resulting LDP
LSPs tunne led over a traffic engineered RSVP LSP.
Data Flow (2 of 7)
IP
10.1.2.3
Data Flow (3 of 7)
■ The PE router consults the appropriate VRF table for the inbound
interface
■ Two labels are derived from the VRF route lookup and are pushed
onto the packet
PE-1
1) Look up route in Red VRF
2) Push BGP label (z)
3) Push outer label (x)
CE-1
Site 2
Site 1 0·~ -:vRF~ ~1
VPN A
Site 1 e CE-
3
,\iij#,:
,- , : < -: .
- 1......,. .... . CE-4
Data Flow (4 of 7)
• Packets are forwarded using two-level label stack
• Outer (MPLS) label: • Inner (MP-BGP) label:
• Identifies the LSP to egress • Ident ifies outgoing
PE router interface from egress PE
• Resolves BGP next hop to CE
th rough inet · 3 • Communicated in MP-BGP
• Distributed by RSVP
_ o_
r_LD
_P_ _ _ _ _ updates (control plane)
PE-1
Data Flow (5 of 7)
■ After packets exit the ingress PE router, the outer label is used to
traverse the service provider
• P routers are not VPN aware
--..,uuter label (x
BGP label (z)
10.1/16
IP
10.1.2.3
The use of exact match MPLS forwarding allows the P routers to forward the packet toward the egress PE router correctly,
without any awareness of the labeled packet's contents. This concept is key to RFC 4364 scalabi lity, because th is MPLS
capability is what allows P routers to rema in unaware of the VPN .
Data Flow (6 of 7)
Data Flow (7 of 7)
Site 1 - =~'-
1
.__~....__ _ _ __,,,,.
--..
OSPF
IP 10.1/16
10.1.2.3
Summary
■ In th is content, we:
• Defined the roles of P, PE, and CE routers
• Described the format of VPN-1Pv4 addresses
• Explained the role of the route distinguisher
• Described the flow of RFC 4364 control information
• Explained the operation of the RFC 4364 forwarding plane
We Discussed:
• The roles of P, PE, and CE routers;
Review Questions
Review Questions
1.
2.
3.
4.
5.
2.
The VPN-1Pv4 NLRI consists of an MPLS label, a route distinguisher, an 1Pv4 address, and a 120 bit mask.
3.
The route distingu isher is used to disambiguate overlapp ing 1Pv4 addresses.
4.
Some routing method (OSPF, BGP, static routing) is used to share routes between the customer VPN sites and the PE routers.
MP-BGP is used by PE routers to pas.s customer routes learned from CE routers to other PE routers. PE routers will then pass
VPN routes learned from other PE routers to the associated CE routers.
5.
A CE router will forward 1Pv4 packets to the locally connected PE router. The PE router will perform an route lookup using the
VRF table associated with the incom ing interface. The PE router will then encapsulate the packets in 2 MPLS headers: the
innermost will be the label learned from MP-BGP wh ile the outermost will be the label associated with the LSP that ends at
the remote PE. The P routers along the LSP will perform label swapping on the outermost header as the packet traverses the
provider's network. The penultimate router along the LSP will pop the outermost label and send a singly labeled packet to
the remote PE. The remote PE will ana lyze the packets label in order to map the packet to a particu lar routing table, VRF. The
remote PE pops the MPLS label and forwards the 1Pv4 packet to the remote CE router.
Engineering Simplicity
Junos Layer 3 VPNs
Objectives
We Will Discuss:
• Creating a routing instance, assigning interfaces, creating routes, and importing/exporting routes within the
routing instance using route distinguishers and route targets;
• The purpose of BGP extended communities and how to configure and use these communities;
• The steps necessary for proper operation of a provider edge (PE) to customer edge (CE) dynamic routing
protocol;
• Configuring a simple Layer 3 virtual private network (VPN) using a dynamic CE-PE routing protocol; and
➔ Preliminary Steps
■ PE Router Configuration
■ Basic Layer 3 VPN Verification
Preliminary Steps
The slide lists the topics we will discuss. We wi ll discuss the highlighted topic first.
■ Preliminary steps:
1. Choose and configure the IGP for PE and P routers
2. Configure MP-BGP peering among PE routers
• Must include VPN-1Pv4 NLRI capability
3. Enable the label-switched path signaling protocols
4. Establish LSPs between PE routers
■ The PE routers perform VPN-specific configuration
Preliminary Steps
The following steps are needed to establish an IP infrastructu re capable of supporting a Layer 3 VPN :
1. The provider core must have a functional interior gateway protocol (IGP) provisioned on the PE and provider (P)
routers. Generally speaking, neither internal BGP (IBGP) nor MPLS signal ing protocols function without a
working IGP. If Constrained Shortest Path First (CSPF) label-switched paths (LSPs) are used, the IGP must
support traffic engineering extensions.
2. Next, the Multi protocol Border Gateway Protocol (MP-BGP) peering sessions should be established between the
loopback addresses of the PE routers. PE routers not sharing VPN membership do not have to peer with
MP-BGP. However, havi ng the sessions in place can simplify operations later, should the PE routers f ind
themselves attached to sites that are to form a VPN. Because these MP-BGP sessions are used to advertise
VPN routes, the VPN-1Pv4 address family must be configured and successfully negotiated.
3. You shou ld now decide on an MPLS signal ing protocol and provision it on all PE and P routers involved in VPN
signaling or traffic forwarding. Wh ile it is possible to use a static LSP, the degree of manual labor and lack of
operational status makes a static LSP difficult in large-scale networks.
4. Once you have completed the previous steps, configure LSPs between all PE routers that are expected to
support a given VPN. The use of RSVP requires that you manually configure each LSP at the ingress node. In
contrast, just enabling LDP results in LSP connectivity among all routers.
• i n et . o: Stores rout es learned by the IGP and IBGP sessions between the PE routers. To provide Internet
access to the VPN sites, configure the vpn . inet . O routing tab le to conta in a default route to the i ne t. O
routing tab le.
• i n et . 3 : Stores all MPLS routes learned from LDP and RSVP signaling done for VPN traffic. VPN IBGP (family
i n et-vpn ) re lies on next hops in t he inet . 3 tab le.
• mpl s . o: Stores MPLS swit ch ing information. Th is table contains a list of the next label-switching router (LSR) in
each LSP. It is used on trans it routers to route packets t o the next rout er along an LSP.
• b gp .1 3vp n . o: Stores all VPN-1Pv4 un icast routes rece ived f rom other PE routers. This table is present only on
PE routers. When a PE router receives a route from another PE router, it places t he route into its b gp. l 3vp n . o
routing table after evaluating th is route against the configured VR F parameters. The route is resolved using the
information in the i ne t. 3 routing table. The resu ltant route is converted into IP version 4 (1Pv4) format and
redistributed to the v pn-name . inet . O tab les on the PE router if it meets the configured criteria.
[edit]
user@Rli show protocols bgp
group my- int- group {
type internal ;
local - address 192 . 168 . 1 . 1 ;
family inet {
unicast ;
}
family inet- vpn {
unicast ;
}
neighbor 192 . 168 . 1 . 3 ;
}
This slide shows the configuration syntax used to support the VPN-1Pv4 network layer reachability information (NLRI) for a
BGP session.
Once an address family is explicitly configured on a BGP session, you must also explicitly configure the default address
fami ly of i net un icast if the PE router is expected to receive both conventiona l IP as well as VPN routes. Many providers
try to keep full Internet routing feeds off their PE routers by using a default route in i net . o that points to a P router with a
comp lete BGP table. In such a network, your PE-to-PE MP-BGP peering sessions might not need the i n et un icast family.
... ________
Peer : 192 . 168 . 1 . 3+50833 AS 65512 Local : 192 . 168 . 1 . 1+179 AS 65512
Routes with matching route targets are also copied into one or more local VRF tables. In this examp le, all received routes
with a matching route target were cop ied into the vpn-a . i net . o VRF table. The sum of all VRF table entries should match
the total number of routes stored in the bgp . l 3vpn . o table.
■ Preliminary Steps
➔ PE Router Configuration
■ Basic Layer 3 VP1\I Verification
PE Router Configuration
The slide highlights the topic we d iscuss next.
PE Router Configuration
Virtual ly all VPN-specif ic configuration and operational monitoring occurs on the PE routers.
PE Routing Instance
VR F tables are created as separate rout ing instances within the Ju nos OS. You must associate each inst ance with one or
more logical interfaces. Configuration of the route distinguisher is another mandatory aspect of VR F instances.
You must also link the VRF inst ance with either the v rf-target statement or VR F import and export policy statements.
Finally, you must conf igure the VRF instance with a set of routing protocol properties compat ible with the configuration of the
attached CE routers.
VPN Policy
In the case where VRF import and export pol icies are used, the Junos OS does not allow you to commit your VPN
configuration until the po licy statements to wh ich t he VRF table is linked are created.
Minimum policy configuration involves the definition of route target community and the VRF import and export policies t hat
use the route target to associate the route with a particular set of VR F tables.
rSite 1 ~ 1 .. t1
I .1 .
-
.1
-..
R2 .2
.2 ~
" 6 .1
_
.1 .
AS 65101
~ t
Site 2
~ ) 10.0. 10.0124 · 172.22.21 0.0,24 ·' 1, 172.22.212.0124 10.0.11.0124 C'i!r
CE-A PE p • PE .., ~ CE-B
loO 192.168.11 .1 loO 192.168.1.1
The IGP in use is Open Shortest Path First (OSPF), and a single area (Area 0) is configured . This example does not rely on the
functionality of CSPF, so traffic engineering extensions are not enabled.
RSVP is deployed as the MPLS signa ling protocol, and an LSP is configured between the R1 and R3 PE routers .
An MP-BGP peering session is configured between the loopback addresses of the PE routers . The VPN-1Pv4 and ine t
u n i cast address fam ilies are configured.
In th is example, the CE routers run EBGP. This results in the need for the PE routers to also run EBGP with in their VRF routing
instance.
The overal l goal of this network is to provide ful l-mesh (which is point-to-point in th is case) connectivity between the two CE
routers shown. This application is considered ful l mesh as the resulting configuration read ily accommodates the additional
sites with any-to-any connectivity.
RF Instances
VR F routing instances are configured under the [e dit r out ing- i ns t a n ces i nstance - name ] portion of the
configuration hierarchy.
This slide reflects the required parameters for a VRF instance called vpn-a using the vrf-target option. Additional
details about each requ ired option is outlined in the following section:
• instanc e-type: Defines the type of routing instance being created and what parameters you have available
to configure;
• i nterface: Identifies the logical, private interface between the PE router and the CE router on the PE side;
• route-distinguisher: An identifier attached to a route, enabling you to distinguish to which VPN the route
belongs. Each routing instance must have a un ique route distinguisher configured; and
vrf-impo rt/ vrf-expo rt policies: Defines how routes are imported and exported for the local PE
router's VR F table.
You configure the PE-CE routing protocol under the p r otoco l s subhierarchy; you configure static routing under the
r o uti ng-op t ion s sub-hierarchy.
For multihomed sites, connected to two or more PEs, it is required to use unique route distinguishers (typical ly type 1 ) on
each PE to allow for load-sharing traffic toward these sites. By using unique route distinguishers, the BGP selection algorithm
will always see the routes as different, for example on route reflectors.
As reflected on the slide, we configured a single VRF interface (ge-1/ 0/ 4.100). You should take care to specify the correct
logical unit, especially when non-default unit numbers are in use.
We assigned th is VRF table a route distinguisher of 192.168.1.1:1, wh ich is an examp le of the Type 1 route distinguisher
format. In this case, the PE router's loopback address is used as the administration fie ld. Using the PE's router ID (RID) in the
route distinguisher can assist with troubleshooting. You can easily track route advertisements back to the PE that generated
them, based on the route distinguisher. The assigned number for this VRF table is 1. As mentioned previously, each unique
instance of a VRF table on th is PE router must be given a unique assigned number to ensure that overlapping addresses
from multiple VPN customers remain separate.
We linked this VRF instance to a VRF target community. This method is the easiest way to configure advertisements of Layer
3 VPN routes between PE routers. Another method that can be used is to specify the import community and export
community independently (not shown). The import statement causes all received Layer 3 VPN MP-BGP routes tagged with
the correct target community to be placed into the vpn - a . i n et . O table. The export statement causes al l routes in the
vpn - a . i net . o table to be advertised and tagged with the listed target community to all MP-BGP peers.
Finally, the slide shows a standard EBGP configuration under the pro t ocols hierarchy of the VRF instance's configuration.
PE-CE routing protocols are configured for VRF instances the same way as they are configured under the main instance, with
the only differences being their association with a VRF instance. If needed, BGP import and export policies can be applied to
the BGP instance to refine and control the exchange of BGP routes on the PE-CE routing instance (not shown).
AnotherVRF Example
The example on the slide shows the use of vrf-import and vrf-export policies rathe r than the vrf-target
statement. This methodology gives an administrator more control over the routes advertised between PE routers, but it
requires more configuration.
We lin ked th is VR F instance to VRF policy statements. The router does not allow a commit until the i mpor t - vpn - a and
export - vpn - a policy statements are c reated under the [edi t pol i cy-opt i ons J hiera rchy. We will define these
policies next.
The te r m 1 of policy i mpo r t-vp n-a matches BGP routes containing the community string defined under the community
name vpn-a. You can also see that the commun ity associated with t his name is a route target extended community. When
a match occurs in te r m 1, the rout e is accepted and installed into the VRF tables linked t o th is policy.
The t e r m 2 of policy impo r t-vp n -a serves as an explicit definition of t he defau lt policy for VRF import; that is, the PE
router rej ects all VPN routes by def ault. Put anot her way, a PE router on ly accepts a VPN route when an explicit rout e target
match occurs in conjunction with an accept action . When dealing with security, it is usually better t o use explicit rather
t han implicit ru les, as explicit ru les tend to avoid the misinterpret ations, which can lead to unexpected connectivity.
accept ;
}
}
term 2 {
then reject ;
}
}
community vpn-a members target : 65512 : 101 ;
Term 1 of the policy matches routes learned from BGP, and direct routes (PE-CE interface). Because in this example the
PE-CE routing protocol is BGP, all routes learned f rom the CE router match term 1 of the policy.
Matching routes have the community associated with the named community vpn-a added before being accepted for
advertisement to the remote PE routers. Aga in, you can see that the community being added to the route is a route target
BGP extended community.
As with the VRF import policy, term 2 provides explicit decla ration of the default VRF policy action. Together, the two terms
ensu re that only routes learned from the CE route r using EBGP are accepted for transmission to the remote PE routers with
the proper parameters.
The route target community is critical to the operation of Layer 3 VPNs because only routes with matching route targets can
be installed into a particular VRF table. This example shows a route target community using the Type O format, which uses a
2-byte administration field-set to the provider's autonomous system (AS) number- followed by a 4-byte assigned number
field.
All members of a VPN setting and matching the same route target is common, but not mandatory.
The site of origin commun ity in the example on the slide uses the Type 1 format using a 4-byte administration field followed
by a 2-byte assigned number field. In th is case, the community is coded with the RID of the PE router that attaches to the CE
device. The community uses the number 101 to distinguish this site from other sites th is PE router might also serve.
PE-CE Policy
You can also use route filter statements to accept or rej ect routes explicitly based on the prefix and mask lengths.
AS Override
■ Use the as-override option when CE routers belong to the same
AS
• Causes the PE router to overwrite CE' s AS number with the provider's AS
number (two provider AS numbers in AS path)
■ The autonomous-system loops n option can also be used on
the CE router -
• advertise-peer-as needs to be configured on the PE
■ remove-private can also work if private AS numbers are in use
Provider Core
AS 65512
Site 1 )I'---~
AS 65101
OSPF Area O
R2
- Site 2
AS 65101
Site1 ~ -· ·1 .1 .2 ~ -2 .1 .1
~ ) 10.0.10.0/24 • 172.22.210.0/24 'i!r 172.22.212.0/24 0.0.11.0/24
eE p PE
_______,,~
CE-
lo ~i.-f68.11 .1
---~
..........__..._
C> 2020 J uniper Networks, Inc All Rights Reserved
Juniper Bu si ness Use On ly
Allowing AS Loops
The Ju nos OS a lso supports the explicit all owance of AS loops by setting the auto nomous-system loops B. pa rameter
under the BGP routing instance. When configured on the CE router, this parameter allows the CE router to install the
VPN-learned routes in its routing table by ignoring up to Q instances of its own AS in the AS path attribute of rece ived routes.
By default, t he Ju nos OS does not advertise routes whose AS path attribute contains t he peer's AS. Because of th is default
behavior, the auto nomous-system loops B. solution also requi res that the PE router be configured with the
adv ertise-peer-as parameteratthe [edit p r otoco l s b gp group group - name n e i ghbor x . x . x . x ]
hiera rchy. This parameter causes t he PE router to include routes whose AS path attribute contains the CE router's AS number
in its advertisements the CE router.
Remove Private
The remo ve-private option provides yet another way of solving the problem, but only when the customer sites use AS
number f rom the private-use AS numbering space. In this case, you co uld enable remove-priv ate under the PE router's
main BGP routing instance. Enabl ing remove-private causes the PE router to remove any private AS numbers from the
front of the AS path when sending MP-BGP updates to remote PE routers.
Site of Origin
■ Use site of origin when CE router is dual-homed and as-override
is required (corner case)
• as-override needed to exchange routes between sites
■ Site of origin (and policy) prevents advertising routes back to the
source
• Advertising these routes back to the CE router can cause forwarding loops
with equipment that prefers EBGP over !GP-learned routes
Provider Core Routes advertised with SoO
AS65512
OSPF Area O
R2 ,,,, - - -
community192.168.1.3:1
_____ ! R3
·1- @ 3 ·1
.
1 0/2 ,
crs
.1 2 ~J 22
212.0/24 . 10.0.1 .
172.22.210.0/24 • . 172· · PE Site 2
PE p , 1?2_-,,., R4 AS65101
.... <<.213
Provider Loopbacks
192.168.1 .x
............... :._0124
8
......... .,.
· .4 .1
PE
10
.O. 12.012
4
Routes rejected by
R4' s VRF import policy
The resulting scenario is one example of a corner case where you might use the site of origin community.
The VR F import policy statements of R4, match and reject routes having th is particular community. The result is that routes
learned f rom Site 2, CE-B, are filtered upon receipt by R4, so they are not sent back to Site 2 . To comp lete the application,
similar VRF export and import pol icies are applied on the R4 and R3 routers so that both PE ro uters prevent routes from
being sent back to Site 2.
In some cases, the use of site of origin as shown in this application just makes t hings more efficient in that it elim inates the
unnecessary transmission of route updates to Site 2 . This elimination of unnecessary transmission in turn prevents t he BGP
speakers in Site 2 from having to ca rry duplicate BG P routing information. In other cases, t he use of site of origin can be
necessary to prevent forwarding loops. Some vendors prefer EBGP routes over IGP routes (the Junos OS does not), wh ich
co uld resu lt in a fo rwarding loop when routes learned from a site are redistributed back to that site using EBGP.
OSPF Routing
The support of OSPF routing on the PE-CE link requires a sepa rate OSPF process for each VRF t ab le. You conf igure t hese
processes under the pro t ocol s portion of a VRF table conf iguration. The actua l steps required to conf igure an OSPF
inst a nce in th is case are no different from the steps needed to configure t he main OSPF routing instance.
Sham Link
RFC 4577 allows f or a sham link to advertise OSPF routes between CE routers t hat are ru nning OSPF with their loca l PE
routers. We wi ll d iscuss t h is method next.
Provider Network
PE PE
·- CI,-
OSPF Sham Link
Although a PE router learns routes from the remote PE router using OSPF, it cannot use the OSPF routes for forwarding and
instead must use MP-BGP learned routes to forward traffic to the remote site. Thus, a PE router must not only learn the
routes using OSPF, but it must also learn the same routes using MP-BGP.
user@Rl> show ospf database instance vpn-a Router LSA for local CE. local PE.
remote PE. and remote CE routers
OSPF database , Area 0 . 0 . 0 . 0
Tvoe ID Adv Rtr Sen Ane Ont Cksum Len
Router 192 . 168 . 11 . 1 192 . 168 . 11 . 1 Ox80000006 2386 Ox22 Oxf799 48
Router 192 . 168 . 11 . 2 192 .1 68 . 11 . 2 Ox80000007 59 Ox22 Ox1279 48
Router *192 . 168.11 . 3 192 .1 68 . 11 . 3 Ox80000006 2376 Ox22 Ox9a6f 48
Router 192 . 168 . 11 . 4 192 . 168 . 11 . 4 Ox80000006 2377 Ox22 Ox8a7c 48
Network 10 . 0 . 10 . 2 192 . 168 . 11 . 1 Ox80000002 450 Ox22 Oxlba5 32
Network 10 . 0 . 11 . 2 192 .1 68 . 11 . 2 Ox80000002 343 Ox22 Ox229a 32
[edit policy-options]
user@Rl# show
fpolicy- statement e xport - cust- a ! {
term 1 {
from protocol bgp ;
then accept ;
}
}
As indicated, you must specify an export policy under the OSPF instance to allow the red istribution of BGP into OSPF. This
policy is needed because, between PE routers, al l routes are learned through the BGP protocol, regardless of what protocol is
being used on the PE-CE link.
The actual configuration of the OSPF instance is really no d ifferent from the configuration of a main OSPF routing instance.
You must specify the OSPF area number and list the VR F interfaces belonging to that area.
These two policies get the routes to and from the PE routers, but remember that a BGP redistribution policy is needed to get
the BGP routes learned from remote PE routers sent to the local CE device running OSPF.
As a result, the remote CE router's externa l routes (the 200.200 .200/ 24 and 201.201.201/ 24 prefixes), which are being
redistributed from static into OSPF, are presented as externa l LSAs (Type 5s), wh ile the remote CE router's internal OSPF
routes (the 192.168.11.2 loopback address, the 10.10.10/ 24, and the 10.10.10.11/ 24 OSPF interface routes not shown on
the topology) appear in the receiving CE router as OSPF summary routes (LSA Type 3s).
Subsequent slides detail the operation of the OSPF domain ID and show the effect of mismatched domain IDs on these
same routes.
• Preliminary Steps
• PE Router Configuration
➔ Basic Layer 3 VPN Verification
A Shortcut
By issuing a sho w r oute pro t ocol bgp command, you can view all BGP routes, regardless of the table in which they
are placed . This approach proves helpful when you cannot recall the exact name of a particular VPN's routing instance. You
can include a prefix and mask pair to filter some of the output; you also can use the pipe command in conjunction with the
match or fi n d arguments.
10 . 0 . 20 . 0/24 *[Direct/OJ 23 : 29 : 10
> via ge- 1/0/4 . 620
[BG P/170 J 22 : 48 : 41 , localpref 100
AS path : 65201 I , validation-state : unverified
> to 10 . 0 . 20 . 2 via ge - 1/0/4 . 620
10 . 0 . 20 . 1/32 *[Local/OJ 23 : 29 : 10
Local via ge-1/0/4 . 620
10 . 0 . 21 . 0/24 *[BGP/170J 22 : 59 : 10 , localpref 100 , from 193 . 168 . 2 . 2
AS path : I , validation- state : unverified
> t o 172 . 22 . 220 . 2 via ge - 1/0/0 . 220 , label - switched- path lspl
172 . 20 . 0 . 0/24 *[BG P/170] 22 : 4 8 : 41 , localpref 100
AS path : 65201 I , validation-state : unverified
> to 10 . 0 . 20 . 2 via ge - 1/0/4 . 620
172 . 20 . 1 . 0/24 *[BG P/170] 22 : 4 8 : 41 , localpref 100
AS path : 65201 I , validation-state : unverified
> to 10 . 0 . 20 . 2 via ge-1/0/4 . 620
Here, the 1 72.20.4.0/ 24 rout e is associated with two labels. The BGP next hop is the PE2 router (193.168.2 .2). This next
hop is associated with an LSP named lspl .
The keep al 1 option forces the PE router to retain all VPN route advertisements, which can assist with route target-related
troubleshooting. Route reflectors have t he keep all option enabled by default because t hey do not maintain VRF tables
and can therefore never be expected to fi nd rout e t arget matches. When using confederations, t he C-EBGP speakers must
have this option explicitly set so that all VPN routes are exchanged across sub-confederation boundaries.
The example here is from the PE1 router. The route distinguisher indicates that the PE2 router originated the routes because
the route distinguisher is coded based on the originating PE router's loopback address in these examples.
The resulting output displays the route distinguisher, the assigned VR F label, and the communities attached to the route.
In th is example, the loca l PE router has received the 172.20.4.0/ 24 prefix from 193.1 68.2 .2 . Because th is route has a
matching route target, it is copied into both the bgp .13vpn. o tab le and the vpn-a VRF table, wh ich matches that route
ta rget.
The resulting output shows local forwarding tab le entries as well as entries for routes learned from remote PE routers .
■ The show arp command displays both inet. O and VRF ARP
entries
BGP Tracing
When needed, you can configure standard protocol tracing under the VRF table's BGP instance to provide additional
debugging information.
OSPF Tracing
When needed, you can configure standard protocol tracing under the VRF table's OSPF instance to provide additional
debugging information.
On the slide, the first ping attempt from the PE1 router to CE-A fa ils with a No r o ute t o h o st error message. When the
operator includes the correct VPN instance as an argument to the ping command, the ping succeeds.
Point-to-Point= No Problem
By default, PE routers runn ing the Ju nos OS can advertise directly-connected VRF interface routes using export policy or the
vr f - t a r get statement. Because of th is, t here is no issue with the support of traffic either originating or terminating on
point-to-point VRF interfaces.
Without learning a route from the local CE device, another way of f ixing this problem is to configure vrf- tabl e - label on
the local PE route r. Use of this feature elim inates the need for the routes described above, because the Internet Processor II
can now perform ARP operations as needed to determine the MAC address of the correct CE device.
When VPN packets arrive on the egress PE, they are encapsulated in a single MPLS label (the VPN label). The forwarding
procedure, in the case of per next hop label allocation, is to pop the MPLS label and forward it to the next hop that was
learned as described earlier. The IP header is not evaluated for forward ing purposes.
The Trio chipset al lows for usage of a maximum of 4000 table labels. Therefore, it is recommended to almost always
configure VRFs with v rf -table-labe l on Trio ch ipset platforms. Other platforms will generally support a smaller number
of table labels.
With the Trio chipset, the packet parsing, key generation, and lookup are all performed on the same chip. Although #1 in the
slide applies to Trio, #2 does not apply to the Trio chipset as egress f iltering is always available for VPN traffic without any
special configuration.
There are two methods of f ixing the two problems. You can either change the label allocation method to (per VRF table with
vr f - t ab l e- l abel) or apply a VPN Tunnel interface to a VRF.
vrf-table-label Configuration
Resulting Behavior
When per table label al location is enabled, the router will advertise (or readvertise) its VPN routes to its MP-BGP peers with
labels in the ranges listed in the slides. Arriving MPLS encapsu lated packets with labels in those ranges, will have their MPLS
header processed by a ch ip early in the packets path through the router. On the T640, it is the L ch ip that pops the MPLS
header, associates the rema ining IP packet with a VRF table, and passes the IP header-based key to the R-ch ip. The lookup
will now be performed based on the destination IP address of the packet using the correct VRF table.
vrf-table-label Caveats
• Caveats:
• For Trio, only ~4000 table labels available
• Might be less depending on the platform
• Only ~4000 VRF tables can be configured with this setting
• No bandwidth limitations
• VT interfaces can be used once table labels have been exhausted
• Only certain core-facing interface types supported
• Consult the documentation for your software version
• Not supported for MP-BGP-labeled routes (carrier of carriers/interprovider)
• Operational display changes
Feature Restrictions
The vr f -tab l e- l a b e l feature is only supported on certain core-facing interfaces types. Consult the documentation fo r
your software version for a list of supported interface types. Table labels are not used for MP-BGP label routes to avoid
operational problems with carrier-of-carriers and interprovider applications.
Th is feature makes use of the LSP sub-interface (LSI) abstract that allows an LSP to be treated as an interface. When you
configure the vr f -table-label option under a VRF routing instance, an LSI is created for that VRF tab le. You can view
LSls with the s h o w i n terf aces command. Also, a dummy route is added to the ma in mp l s . O table, which shows the
LSl-to-VRF mapping. This route is never used, however, because the inner label is now stripped prior to the lookup chip.
Juniper Networks, starting with Ju nos OS Release 5 .2, added support for Internet Processor II functions for egress PE routers
running the Junos OS with a new VRF table configuration option called vr f -table-label .
Summary
We Discussed:
• Creating a routing instance, assigning interfaces, creating routes, and importing/exporting routes within the
routing instance using route distinguishers and route targets;
• The purpose of BGP extended communities and how to configure and use these communities;
• The steps necessary for proper operation of a PE-CE dynamic routing protocol;
• Configuring a simple Layer 3 VPN using a dynamic CE-PE routing protocol; and
Review Questions
Review Questions
1.
2.
3.
4.
5.
2.
The four requ ired options for creating a Layer 3 VPN inst ance are instanc e-type, interfaces,
r o ute-distinguisher, and vrf-target or vrf-impo rt/ vrf-expo rt policies.
3.
The protocol match criteria required when exporting OSPF routes across your Layer 3 VPN to a remote PE is OSPF.
4.
The Layer 3 VPN routes are initially rece ived in the b gp .1 3vpn . o t ab l e , based on at least 1 match ing route-target of any
of the VPN customers on that given PE. The specific rout es for a given customer (vpn-A) will be installed in the
routing-instance table vpn -A . i ne t. O
5.
The vrf-table-label command solves two potentia l issues. The fi rst is to advertise t he local PE-CE int erface regardless of any
Layer 2 issues (no routes, no ARP info), the second is to al low packet inspect ion (filtering, policing) on non-Trio ch ipset
platforms. Remember the original issue is the single lookup limitation.
Engineering Simplicity
Junos Layer 3 VPNs
Objectives
We Will Discuss:
• Four ways t o improve Layer 3 virtua l private network (VPN) scaling; and
• Three methods for providing Layer 3 VPN customers with Internet access.
www .j uniper.net Layer 3 VPN Scaling and Internet Access • Chapter 5-3
Junos Layer 3 VPNs
Additional PE ro uter sca ling factors include memory, processing power, limits on total numbers of labels, and limits on logical
interface counts.
Route Reflection
A key aspect of the RFC 4364 model is that no single PE router has to carry all VPN state fo r the provider's network. This
concept can be extended to route reflection by deploying multiple route reflectors that are responsible fo r different pieces of
the total VPN customer base. Route reflection has the added advantage of minimizing the number of Multi protocol Border
Gateway Protocol (M P-BGP) peering sessions in the provider's network .
www .juniper.net Layer 3 VPN Scaling and Internet Access • Chapter 5-5
Junos Layer 3 VPNs
Route Reflection
The use of route reflection could result in a single router (the route reflector) having to store all VPN states. To eliminate this
serious scaling issue, it is possible to deploy multiple route reflectors with each reflector servicing a subset of the tota l VPN
population. You must ensure, however, that PE routers are configured correctly to peer with all route reflectors serving VPN
customers for which th is PE router has locally attached sites.
Based on these methods, Layer 3 VPNs can be scaled virtually without bounds, as no single device must ever carry the total
VPN states for the provider's VPN service.
We recommend using one or more P routers to provide VPN-related reflection services. If possible, you should not use the
VPN route reflectors for conventiona l (non-VPN) reflection duties.
Th is slide illustrates how you can deploy multiple route reflectors so that no s ingle reflector is required to carry all VPN
routes. A PE router with local VPN sites ranging from 1 through 99 MP-BGP peers with the reflector on the left, while a PE
router with local sites in the 100-199 space peers with the reflector on the right. A PE router must peer with both reflectors
if it has local sites belonging to both VPN spaces.
The route reflector configuration must include the VPN IP version 4 (1Pv4) fam ily because it receives and reflects VPN routes.
A BGP route can on ly be active when it has a resolvable next hop. Also, because VPN routes must resolve to a label-switched
path (LSP), the route reflector requires LSPs terminating at each PE router to avoid h idden routes and the resulting problems
these hidden routes cause with regards to reflection . When running LOP in the provider core, all routers are connected to all
other routers with LSPs, so this requirement is not an issue. The use of RSVP generally requires that an LSP be defined from
the route reflector to each of its client PE routers. Workarounds to th is requirement do exist, for example, placing a static
default route into i ne t. 3 .
Route Reflector
For a P router to become a VPN route reflector, the only things needed are the configuration of a cluster ID, the declaration of
PE routers with which it peers, and configuration of the i ne t -vpn address fami ly. These steps accommodate the BGP
peering and VPN route reflector functionality, but remember that LSPs are also needed to ensure that routes are considered
usable by the route reflector.
When a PE router peers with a VPN route reflector, it is sent all routes contained in the reflector's b gp . 13vpn. o table. The
PE router uses its VRF import policies to match and keep the routes relating to its locally attached sites.
BG P Is Statefu I
Unlike most routing protocols, BGP uses the reliable delivery services of Transmission Control Protocol (TC P). As a result,
once a BGP speaker receives a TCP acknowledgment for network layer reachability information (NLRI) updates sent to a
peer, it does not advertise the same routes aga in unless it must modify the NLRI or the path attributes, or the BGP session
itself is disrupted.
BGP Refresh
The so lution is using the BGP refresh capability as defined in RFC 2918, Route Refresh Capabi lity for BGP-4. BGP refresh
allows a BGP speaker to request that its BGP peer readvertise all NLRI associated with the session . Support of BGP refresh
is critica l to the Layer 3 VPN model, as it al lows for non-disruptive changes to VPN membership. The Junos OS supports BGP
refresh by default.
www .juniper.net Layer 3 VPN Scaling and Internet Access • Chapter 5-9
Junos Layer 3 VPNs
The BGP route target fi ltering functional ity is defined by RFC 4684.
external-paths X; ♦:-----------1
advertise-de fault ; _ This setting is used for interprovider VPNs Option B. Allows for
· multiple EBGP peers to receive VPN routes (default= 1)
proxy- generate {
route- taraet- oolicy oolicv-name ; Usually configured on route reflector only
) Create route target membership on behalf of
) peers that do not have the route target filtering functionality
• prefix-l imit: Limits the number of route-target advertisements that can be received from a peer router. By
default, when the limit is reached, the router stops accepting route-target advertisements from the peer. Using
the optional tea r down statement causes the neighbor re lationsh ip with a peer to be torn down when the
max i mum limit is reached . The diagram also shows the usage of the optional percentage and idle-ti meo u t
configuration . The a ccepted-prefix-l i mit setting is similar except that it tracks the number of accepted
routes as opposed to received routes .
• external-paths (default va lue=1): Affects EBGP Layer 3 VPN route advertisements between autonomous
system (AS) boundary routers when perform ing interprovider VPNs Option B (described in a future chapter).
When a router learns the same r oute-target advertisement from multiple EBGP peers, this option allows
for Layer 3 VPN advertisements to be sent to more t han only one of those EBGP peers.
• adverti se-default: Causes the router to advertise the default route target route (0 :0 :0/ 0) and suppress
all routes that are more specific. A router reflector can use this on BGP groups consisting of neighbors that act
as PE routers only. PE routers often must advertise al l routes to the route reflector. Suppressing all route target
advertisements other than the default route reduces the amount of information exchanged between the route
reflector and the PE routers.
• pro xy-generate: Enables proxy BGP route target f iltering (also known as proxy route target constrain, or
proxy RTC). This feature is useful if you have a network environment where route target filtering is not widely
deployed or fully supported. When configured for proxy BGP route target filtering, the device creates route target
membership (RT membership) on behalf of its peers that do not have the route target filtering functionality. The
device then distributes the RT membersh ip advertisements from incoming BGP VPN routes to other devices in
the network that need them . An optional route-target policy may be specified to select a subset of the VPN
routes that are learned from this peer (or group) to be used as contributors for proxy RT-Constrain route
generation .
po l icy-op t ion s {
p o l icy-s t ateme n t statemen t {
term ter m {
+ from p r otocol r o ut e- t a r get ;
+ from rtf - pre fi x- li st tes t - li st ;
t he n accep t ;
}
}
}
'1
192.168.1.3
VPN-A ~ VPN-8
-1
.168.1.1
p -2
192.168.1.2
Hs
AS 65512
VPN-A
PE-2
68.1.1 192.168.1.
AS 65512
~ VPN-8
~B
68 .1.1
AS 65512
target:65512:100 target: 65512 : 200
user@RR- 1> show route receive-protocol bgp 192.168.1.1 detail table bgp.rtarget.O
Notice that the route reflector reflects the route target advertisement to all c lients, including the client that originally sent the
advertisement. The d iagram only shows the route reflector reflecting PE-i's advertisement, but it also reflects PE-2 's
advertisement in a similar fashion .
••
VPN-A VPN-8
PE-2 -8
68.1.1 192.168.1.
AS 65512
VPN-A
e
CE-A ~ p -
192,168,1,2
' -- ~
Ct:-B
VPN-B
AS 65512
target: 2:100 target: :200
Ifamily ; l~~-i----J
keep allinet- vpn { Causes PE-1 to place all received Layer 3 VPN routes into
bgp . 13vpn . 0 table. regardless of configured vrf- targets
unicast ;
}
family route-target ;
RR-1 does not send VPN-B's Layer 3 VPN routes to PE-1
. . .
In the example on the s lide, t he keep a l l statement is used to force PE-1 to store all Layer 3 VPN routes received f rom the
route reflector in its bgp . l 3vpn . O table. Notice that the bgp. l 3vpn . O table is empty on PE-1. The empty table shows
t hat route target fi ltering is working because the route reflector is not sending the Layer 3 VPN ro utes learned from PE-2 to
PE-1.
Packet Labels:
RFC 4364 requ ires t hat the PE router support the LDP signaling protocol; RSVP is optional. As a resu lt, some non-Juniper
Networks equipment might only support LDP at the PE router. Because LDP does not support traffic engineering, it might
seem that all hope for traffic engineered VPNs is lost. With the Junos OS, you can tunnel LOP-based LSPs over an RSVP
traffic engineered LSP. Therefore, traffic engineering across the core is still possible, even though the PE routers might only
support LDP signa ling.
Th is slide shows how the tunneling of LDP over RSVP results in a three-level label stack for VPN traffic. The ingress PE router
pushes both a VRF label (inner) and LDP label (middle) before forwarding the labeled packet to the Pi router. The Pi route r
now pushes a third label (outer) to be swapped as the packet traverses the RSVP core. Penultimate-hop popping (PHP)
resu lts in a two-level label stack when the packet arrives at the P3 router. The P3 router also performs PHP so that the PE-2
router receives a packet with a single-level label stack. PE-2 uses the remaining VRF label to associate the packet with the
correct VRF interface.
[edit J
user@Pl# show protocols mpls
label-switched-path Pl-to-P3 {
to 192 . 168 . 5 . 3 ;
l dp- tunne l ing ;
no - cspf ;
}
interface all ;
[edit]
user@Pl# show protocols ldp
interface ge - 0/0/0 . 0 ;
interface lo0 . 0 ;
LDP Tunneling
Th is slide shows the key configuration steps requ ired for LDP tunneling over RSVP. In this case, the P1 router has an RSVP
session to the P3 router that includes the ldp- tunneling statement. This router is also configured to run LDP on the
PE-facing interface (ge-0/ 0/ 0 ) as well as on its loO interface, because you must run LDP on the router's loO interface when
performing tunneling.
The following capture is from a core P router, where LDP tunne ling over RSVP is configured. It clearly shows the three-level
label stack that results from LDP tunnel ing:
If ful l MP-BGP and MPLS connectivity is not preprovisioned among the PE routers, the remote PE routers requ ire changes;
the remote PE routers must then establish LSP and MP-BGP sessions to the PE router serving the new VPN site.
The Junos OS allows you to limit t he number of prefixes received from the CE router using a dynamic routing protocol. When
the prefix limit is reached, you can choose to have warning messages logged, or to stop accepting additional routes. The
maximum- routes option is configured under the rou t ing-opt i ons portion of a routi ng instance's configuration. Take
care when opting to ignore CE routes in excess of t he limit, as the results can lead to some interesting troubleshooting!
With the above guidelines in mind, you must also consider other factors that can affect the processing and resource loads on
a PE router. For example, does the PE router serve double duty by providing non-VPN Internet access services? Does it carry
a full BGP table? Is the CE routing protocol stable? Instability (route f lap) within a VPN site can result in substantial
processing loads on t he PE router. Have valued-added services such as firewall filtering been deployed on the PE router?
Because so many variables exist, it is difficult to provide a concrete rule defining how much is too much. Adhering to these
scaling recommendations should result in successful VPN deployment.
VRF localization provides a mechanism for localizing routes of VRFs to specific lineca rds, the reby increasing the amount of
VRF routes supported on that PE ro uter.
Core-Facing Interfaces
The Core-facing interfaces can be configured as two types:
• vpn-core-facing-default; FPC installs all the routes and next-hops of the VRF routes.
• vpn-core-facing-only; FPC installs all the routes of the VRF, but NOT the next-hops (results in greater scalabi lity).
The VRF localization feature is supported on MX240, MX480, MX960, MX2010, and MX2020 in Junos 15.1 re lease.
Use the below commands to verify VRF localization for Layer 3 VPNs:
• One label for all L3VPN routes learned on same CE-facing interface.
Other vendors can allocate 1 label per advertised Layer 3 VPN prefix, wh ich results in millions of advertised labels in large
multivendor Layer 3 VPN deployments. This wou ld result in slower system processing and slower convergence.
Ju nos uses next-hop-chaining, a lso called chained composite next hops to limit the number of route updates and individual
states a Ju nos OS router must ma inta in, resulting in enhanced sca ling and faster convergence. The chained composite next
hops allow the router to direct sets of routes sharing the same destination to a common forwarding next-hop, instead of each
route having its own individual, but identical, next-hop.
■ Configuring for more than one million Layer 3 VPN route labels
[edit routing- options forwarding - table chained- composite- next - hop ingress]
user@Rl# set 13vpn
[edit chassis]
user@Rl* set network-services enhanced-ip
Configuring for Allowing Increased Unique Inner Labels for Multivendor Layer 3 VPNs
Depending on the scale of the multivendor Layer 3 VPN, more or less than 1 m illion ind ividual Layer 3 VPN labels used, the
slide above shows the configuration commands to enable this enh anced scaling.
For high scale implementations (> 1 m illion) 64-bit route-engines are strongly recommended .
The feature only benefits indirectly connected PE routers, so not if the Ju nos OS PE is directly connected to the multivendor
PE.
If you need to change the network services mode, a reboot might be required .
• Option 1 : RFC 4364 defines several Internet access options. In Option 1 , the PE router does not exchange
routes between its main routing instance and the instances associated with its VR F tab les. Option 1 solutions
are often referred to as non-VRF Internet access because Internet traffic ultimately crosses a non-VRF interface
before leaving or entering a VPN site.
• Option 2 : Option 2 defines Internet access options in which the PE router maintains partia l or full Internet
routes in its main routing table and has the ability to redistribute routes between the VRF tables and the main
routing instance. Option 2 solutions can provide VRF interface-based Internet access, depending on
implementation specifics. Option 2 might requi re the PE ro uter to place some or all of the VPN's routes into the
main forward ing table to accommodate return traffic. The routes copied into the main forwarding table must
represent globally unique addresses.
• Option 3 : Option 3 defines Internet access options in which a central CE location is used to provide Internet
access to other sites using both a VRF and non-VRF interface. Option 3 solutions are referred to as VRF-based
Internet access, beca use remote CE locations use a VR F interface to connect to the central site providing
Internet access.
In operation, the central site advertises a default route placed into the VRF tables of the remote locations. When the central
CE device receives nonlocal traffic, it t urns the traffic around and sends it to the PE router using a non-VRF interface.
www .juniper.net Layer 3 VPN Scaling and Inte rnet Access • Chapter 5 - 27
Junos Layer 3 VPNs
Public Internet
Customer
Site 1 Provider VPN
Customer
,--,--i Customer
Site 3
Site 2
Option 1.1
In Option 1.1, the VPN service provider and PE router provide no Internet access functionality. The customer sites have
separate connections for Internet access, so the PE router never rece ives nor transmits Internet traffic.
Customer
Site 1 ~~,cf.:~
~
- -=-: - ~ - -
P1
-"1>'-
P2
''~--~ ----~
~ - -~ - - -
P3 PE-
Option 1.2
In Option 1.2, the PE router provides a Layer 2 connection to an Internet-aware router. This Layer 2 VPN connection does not
require a separate physical interface, as it can function over a second logical unit on the interface used for VPN access. Each
CE router can be connected to the same Internet-aware device or can be attached to separate Internet-aware provider
routers.
The Ju nos OS supports Option 1.2 using either circuit cross-connect (CCC) or Layer 2 VPN technology.
Customer
Site 1
With this option, the CE router attaches to the PE router using both a VRF and a non-VRF interface. Traffic rece ived over the
non-VR F interface is matched against the main routing table, while traffic received over the VRF interface is matched against
the VRF table.
The VPN site's global addresses are associated with the non-VR F interface. These routes are placed into the main routing
table to attract reverse traffic. Because all VPN customers have the non-VRF interface traffic matched against a common
routing table, the result is homogeneous routing for Internet access.
■ Option 2.2:
• Some or all Internet routes maintained in VRF table on PE
• Routes matching non-VPN addresses are directed to the main routing table for lookup
using the n ext- t abl e operation
• Requires a separate logical link between CE and PE router for carrying return
traffic from the Internet (which presents scaling problems if VRF tables
maintain a full set of routes)
• PE probably maintains a 0/0 plus a small number of other Internet routes per VRF table
with this option
C> 2020 Juniper Networks, Inc All Rights Reserved
Juni per Bu si ness Use On ly
Jun1Per
N £TWOkl<S
31
Traffic returning from the Internet is matched against the main routing instance and delivered to the customer using the
non-VRF interface. All the global addresses associated with the VPN site must be added to the ma in routing table to allow
reverse traffic.
Internet traffic
Customer Customer
Site 1 Site 2
VPN Provider
VPN/Internet traffic VPN traffic t---------...-
■ Option 2.3:
• Single interface for VPN and Internet access
• Requires that:
• Either VPN has no private addresses or that it uses BGP with community tagging
• VRF routes be copied into i net . o using RIB groups
• Non-VPN routes be matched against the main routing table using the next-table
operation
C/2020 Juniper Networks, Inc .All Rights Resenie<J.
Jon1per8usiness Use Onty
Option 2.3: Single VRF Interface for VPN and Internet Access
If the VPN does not use private addresses space, both VPN and Internet access can be ach ieved with a single VRF interface
by copying the routes from the VRF table into the main routing table using RIB groups. This option also requ ires that the VRF
tab le carry a default route using the next- table option to direct non matching packets to the main routing table for
longest-match lookup.
When the PE-CE protocol is BGP, Option 2 .3 can be achieved when the VPN site is using a mix of private and global
addressing. In this case, BGP community tags differentiate between global and private addressing. By sorting out the global
from private addresses from the tags values, the global routes that are to be copied into the main routing instance can be
determined.
Customer Customer
Site 1 Site 2
VPN/Internet traffic
■ Option 3.x:
• Central CE device sends lnterneUdefault routes to remote sites
• Remote sites access both VPN and Internet using their single VRF interface
• Central CE device turns Internet packets around and sends them to PE router
over a non-VRF interface
In operation, the central CE route normally connects to the PE router using both a VRF and a non-VRF interface. The VPN 's
global addresses are associated with the non-VRF interface. These routes are placed in the main routing table . The central
CE router then redistributes Internet routes (th is can be a default route) to the remote CE locations.
Therefore, the central CE device receives both VPN and Internet traffic over its VRF interface. In the case of Internet traffic,
the central CE device turns the packets around and sends them back to the PE router using its non-VRF interface.
Chapter 5-34 • Layer 3 VPN Scaling and Internet Access www.j uniper.net
Junos Layer 3 VPNs
Summary
■ In th is content, we:
• Described four ways to improve Layer 3 VPN scaling
• Describe three methods for providing Layer 3 VPN customers with Internet
access
We Discussed:
• Several ways to improve Layer 3 VPN sca ling; and
• Three methods for providing Laye r 3 VPN customer with Internet Access.
Review Questions
Review Questions
1.
2.
2.
Option 1 provides Internet access through a non-VRF interface (PE router has no Internet routes). Option 2 provides Internet
access through a VRF interface (the PE router has some or all Internet rout es). Option 3 provides Internet access through a
centra l CE device.
Engineering Simplicity
Junos Layer 3 VPNs
Objectives
We Will Discuss:
• How the auto-export command and routing table groups can be used to support communications between sites
attached to a common provider edge (PE) router;
• The various Layer 3 virtua l private network (VPN) class of service (CoS) mechanisms supported by the Ju nos
operating system;
• Junos OS support for generic routing encapsulation (GRE) and IP Security (IPsec) tunnels in Layer 3 VPNs. and
■ Seamless MPLS
VRF-8
VPN-8/A
Routes
CE-A
VPN-A
Allowing Communication
At t his point, you should be we ll versed in the procedures used to populate VPN routing and forwarding tables (VRFs) with routes
learned from local custome r edge (CE) devices and with the routes learned from remote PE routers. However, what if you want to
all ow comm unications between two different VPN sites t hat attach to the same PE router?
A common example why this m ight be necessary is a provider's network management system requiring communications with CE
routers at customer sites that are attached to the same PE router. In some cases, it might be possible to resolve th is dilemma by
simply combining the two VRF tables into one VRF table by placing both CE routers into the same VPN. Unfortunately, this
straightforward sol ut ion does not work well for the example on the slide because administrative boundaries (which are the
whole purpose of VPNs) are difficult to maintain when different VPNs sudden ly merge into one VPN.
VRF policy does not solve th is problem either. VR F policy normally only affects routes exchanged between PE routers.
Because t he sites shown on the slide are attached to the same PE router, no Multi protocol Border Gateway Protoco l
(MP-BGP) session exists to which you could even apply VR F policy. However, if you configure the auto-export command in
each VRF table, the import and export VR F policies are evaluated witho ut the need for MP-BGP sessions to exist, as
descri bed in the following pages.
auto-export Example
auto-export Example
This slide provides an example of how to use the auto-export command to leak routes between VR F tables in the same PE
router. The d rawing on the slide s hows the PE router that now has CE-8 attached to its ge-0/ 0/ 3 interface. In each VRF table on
the PE, the auto-export command is enabled . This command ca uses the router to analyze some combination of the
vr f -import pol icy, vr f -exp o r t policy, and the vr f -tar ge t statements of each VRF table t hat has the auto-export
command configured . Any routes with the correct target communities are then copied between these VRF t ables.
In the example on the s lide, because both VRF tables use the same import and export VRF target, all ro utes in the vpn-a
table are copied into the vpn-b table, an d contra riwise.
routing- options {
interface-routes {
rib- group inet a - to- b ;
}
/
protocols {
bgp {
group ext {
type external ;
familv inet I
unicast {
rib- nroun a - to- b ;
)
}
When listing the i mport-r i b variables, the first routing tab le listed is considered the owner of the routing table group.
Therefore, the vpn - a . i ne t. O is listed before the vpn - b . inet . O in the a - t o - b routing table group. This order prevents the
a - to - b routing table group from functioning if it is applied later to t he vpn - b routing instance.
The next code snippet shows the re levant portions of the vpn-a VRF table . While the VRF tab le configuration fo r vpn-b is
not shown, that instance requires similar configuration steps. In th is case, the VRF instance has its routing-options
configured to place t he VRF interface routes into the a-to-b routing table group. This configuration is required so t hat the
interface routes associated with each VRF tab le are copied into the VRF tables of the other sites with wh ich it is to
communicate. If the VR F interface routes are not copied into the other VRF tables, the routes that are copied will be
unresolvable (and therefore unusable) by virtue of their pointing to an unknown interface as part of the packet's next hop.
The last relevant portion of vpn - a's VRF configu ration is the need to link t he CE-PE routing protocol to the a - to - b routing
table group. This step ca uses the BGP routes learned from CE-A to be copied into both the vpn - a and vpn - b VRF tables. EBGP,
OSPF, and RI P support routing table groups. You can define static routes in each site's VRF table, or they can be specified in a
routing table group that imports into the VRF tables.
The Ju nos OS a lso allows the use of pol icy to control the exchange of routes between routing tab le groups. To use th is feature,
include the i mport-po licy option when defining the routing table groups:
10 . 0 . 21 . 0/24 *[Direct/OJ 03 : 21 : 27 -
> via ge - 0/0/0 . 0
[BGP/170] 03 : 21 : 27 , l ocalpref 100 VRF routes
AS path : 65001 I (local and BGP) from
> to 10.0 . 21 . 2 via ge - 0/0/0 . 0 VPN-A are now in
10.0 . 21 . 1/32 *[ Local/OJ 03 : 21 : 27
Local
-----t-
•
VPN-B's VRF table
10 . 0 . 50 . 0/24 *[Direct/O J 00 : 16 : 48
> via ge-0/0/3 . 0
10 . 0 . 50 . 1/32 *[Local/OJ 00 : 16 : 48
Local
• • • •
The 10.0.21/ 24 interface route is listed twice because it is both a direct route and a route learned through BGP (the CE-A router
has a BGP policy to redistribute direct routes). Because pol icy is not used in th is rout ing table group example, both routes are
copied from the vpn - a VRF ta ble to the vpn - b VRF table even though only the direct ro ute is current ly active in t he vpn - a VRF
t able.
Alt hough not shown on the sl ide, the conf iguration steps performed under the vpn - b routing instance cause the interface and
BGP routes in the vpn - b VRF tab le t o be copied into the vpn - a VRF table.
• VRF export policy for vpn-b matches the routes learned from
interface ge - 0 / O/ 3
• Routes copied from the vpn - a VRF table are not sent to remote PE routers
C> 2020 Juniper Networks, Inc All Rights Reserved
The example shows vpn-b's VR F export pol icy, which now includes an interface condition in term l 's from clause. The
result is that on ly routes learned from the ge-0/0/ 3 interface are accepted for export to remote PE route rs. This result
prevents the vpn-b instance from advertising routes leaked from the vpn-a VR F table.
Hub-and-Spoke Topologies
The slide highlights the topic we d iscuss next.
Hub-and-Spoke Topologies
■ Reduces the number of BGP sessions and LSPs required, but the
cost is an extra CE router hop
• Spoke-to-spoke communications must transit hub site
■ Requires two VRF instances in the hub PE router
• Spoke VRF table contains routes received from spoke sites
• Hub VRF table contains routes received from the hub CE device
■ Requires two VRF interfaces at the hub CE/PE link
• Can be logical units on the same interface
■ Requires two route targets and possibly two route distinguishers
when supporting route reflectors
■ Watch for AS path loop detection and OSPF domain ID problems
■ Issues might arise when hub PE router has locally connected spokes,
or when multiple spoke sites attach to the same spoke PE router
C/2020 Jun,per Networks, Inc .All R,ghlS Resenie<I. Jun1Per 10 ~ETWORKS
Hub
CE
ge-0/0/0.0 4 ge-0/0/0. 1
--- 3
Spoke ~
---
--- Hub PE_..____.i-.1 Hub
VRF VRF
Target: Target:
Spoke Hub
2 5
Spoke Spoke
CE-1
. .. CE-2
1 6
2. Spoke PE-1 advertises this route to the spoke instance on the hub PE router using the spoke route target.
3. The spoke instance in the hub PE router sends the route to the hub CE router using the ge-0/ 0/ 0.0 VRF interface.
4. The hub CE router either re-advertises the route or generates an aggregate for all spoke sites, which is sent to the
hub PE ro uter's hub instance using the ge-0/ 0/ 0.1 VRF interface.
5. The hub instance in the hub PE router advertises this route to t he spoke sites using the hub route target.
The spoke sites match the routes with the hub route target and install the route in their VRF table. For spoke PE-2, the route
is sent to the attached spoke CE router (CE-2).
Hub
CE
4 3
ge-0/0/0 .1_ __
--.....;;,.
ge-0/0/0 .0
5 2
Spoke
CE-1 6
2. PE-2 has learned the routes for Site 1 through the hub instance, so it forwards the packet to the hub PE router.
3. The packet is received by the hub PE router's hub instance. It is forwarded out the
ge-0/ 0/ 0 .1 VRF interface, because the hub instance has learned these routes from the hub CE router.
4. The hub CE router has learned about Site l 's routes from the hub PE router's spoke instance. Therefore, the packet
is turned around by the hub CE router and is sent back to the hub PE router on the ge-0/ 0/ 0 .0 VRF interface.
5. The spoke instance in the hub PE router forwards the packet to spoke PE-1.
■ A spoke site's VRF import policy that accepts route tagged as coming
from the hub route target:
pol i cy- options {
policy-statement vpna-import {
term 1 {
from {
protocol bgp ;
community hub;
}
then accept ;
}
term 2 {
then reject ;
}
}
community origin-pel members origin : 192 . 168 . 16 . 1 : 1 ;
community hub members target:65412:100;
community spoke members target : 654 12:1 01 ;
}
This example also shows the extended community definitions, including both a hub and a spoke route target.
■ The hub instance exports routes learned from the hub CE device to
the remote spokes:
routing-instances {
hub {
instance-type vrf ;
interface ge-0/0/0 . 1 ;
route-distinguisher 192 . 168 . 24.1 : 1 ;
vrf-import null ;
vrf-export hub-out ;
protocols {
bgp {
group extl {
type external ;
peer - as 65001 ;
neighbor 10 . 0 . 30 . 2 ;
}
}
}
}
Because spoke routes are learned by the hub site's spoke VRF instance, the hub instance uses a null VRF import policy. As
shown on subsequent slides, this policy requires that a policy statement named null be configured with a single then
reject statement.
spoke {
instance - type vrf ;
interface ge - 0/0/0 . 0 ;
route - distingu i sher 192 . 168 . 24 . 1 : 1 ;
vrf - import spoke -i n ;
vrf - export nul l;
protoco l s {
bgp {
group ext {
type external ;
peer-as 65001 ;
as - override ;
neighbor 10 . 0 . 29 . 2 ;
}
}
Because the hub site 's hub VRF instance advertises spoke routes, the spoke instance is using a nu l l VRF export policy. As
shown on subsequent s lides, this policy requires that a policy statement named null be configured with a s ingle the n
r e j ect statement.
Because EBGP is used on the hub's PE-CE link, AS-path loop detection is a prob lem . In this case, the use of the as-ove rr ide
knob prevents loop detection problems as the spoke routes are delivered to the hub CE router through the spoke instance.
However, because the provider's AS number is now at the front of the AS path, when the hub CE router readvertises the routes
back to the hub PE router's hub instance, the hub PE router detects an AS loop and discard the routes. Therefore, you should
observe the following guidel ine:
Configure the hub CE router with static routes (which can be aggregates) redistributed into the hub CE device's hub instance
EBGP session . Because these routes originate at the hub CE router, the provider's AS number is not present in the AS path.
Hub-and-Spoke Troubleshooting
While complex in its entirety, breaking down the signaling into discrete steps makes signaling verification a manageable task.
For example, if the spoke route is in the local spoke CE device's VRF table but not in the hub PE router's spoke instance, the
problem must relate to either that spoke router's advertisements (VR F export) or the hub PE router's reception (VR F import).
By exam ining the hub PE router's spoke VR F instance f irst, you can verify nearly one half of the total signaling exchange in one
step. El iminating half of all possible causes with each test is a prime way of expediting the fau lt isolation process.
Because of the requ irement for two route targets, and the like lihood of AS loop detection when EBGP is provisioned at the
hub PE-CE link, you always should suspect these two areas as likely causes for operational problems.
With an Enhanced FPC, both labels can be written independently. Th us, the queuing decisions made by the ingress PE router
can be mirrored in the transit LSRs and at the egress PE router.
Load Balancing
You can load-balance VPN traffic across multiple LSPs by applying a load-balancing policy to t he main forwarding instance.
The most common techn ique for prefix-to-LSP mapping involves routing policy at t he LSP ingress node. This policy maps
traffic to a particular LSP using community-based match criteria. Th is technique assumes that t he LSP egress node tags VPN
prefixes with the correct community value as the routes are advertised to PE routers using multiprotocol lBGP. Note that this
tec hn ique currently does not support route f ilter match conditions at the LSP ingress node.
You can also map prefixes to LSPs by manipulating the BGP next hop at the LSP egress node as the routes are advertised to
PE routers. When establishing the two LSPs, you must use care to ensure that each is defined to terminate on the correct IP
address at the LSP egress node. The result is that the LSP ingress node reso lves some of the VPN routes to one of the BGP
next hops and t he remai ning routes to the other BGP next hop. When the LSP egress node resolves these BGP next hops
th rough its inet . 3 routing tab le, it selects the LSP that matches the route 's BGP next hop for installation in the forwarding
tab le.
The policy uses the i nstall-next h op l s p action modifier to direct matching routes to a specific RSVP session. Term 3
accepts all nonmatching routes for the default action of per-p refix load ba lancing across equal-cost LSPs.
l 192 . 168 . 53 . 0/24 user 0 10 . 0 . 16 . 2 Push 100001 , Push 100030(top ) (4] 9e - 01011 . o I
192 . 168 . 53 . 1/32 user 0 10 . 0 . 16 . 2 Push 100001, Push 100030(top) [4] ge-0/0/1 . 0
GRE Tunnel
••... ••• Between PE • ••
..tt
• •••
.. ······....................... R OU ter-s·· ··················· ····· ····· ········... •••• •
To support GRE tunnels, a tunnel services must be enabled as described in previous slides. GRE-encapsulated packets are
not forwarded over MPLS tunne ls.
On the slide, uni t o of the Tunnel Services interface is configured with tunnel properties such as the tunnel's source and
destination addresses. In this case, the addresses represent the va lues assigned to the PE router's loopback interfaces. This
example shows an unnumbered GR E tunnel, and therefore no IP address is specified. Because this tunnel will be used to
support MPLS, f ami l y mpls must also be specified .
As illustrated on the slide you need to configure a static route with the next-hop of the GRE interface in the i ne t. 3
routing table. This is route is configured under the [edi t r o ut i n g-op t ion s r ib i n e t. 3 J h ierarchy.
Note that you must also include the routing instance destination under the tunnel hierarchy if the GRE-encapsulating
interface is also configured under the VRF table. In the example on the slide, the VRF table does not include the PE router's
encapsulating interface.
Provider C ore
PE
OSPFArea 0 2 loO: 192.168.24.1
1 2 192.168.9.97
1/24 1 24/24
( ) PrivateAddresses ( : )
To support GRE tunnels, tunne l services must be enable on routers runn ing the Junos OS. The new r outi ng-i n stan ce
configuration is used to place a GRE tunnel into the correct routing instance:
g r -1/0/0 {
u ni t O {
t u n nel {
source 192 .1 68 . 9 . 98 ;
des t i nat i o n 192 .1 68 . 9 . 97 ;
r o ut i ng- i ns t a n ce {
d est i na t ion v r f - name ;
}
}
}
}
Normally, static routing is used to populate the PE router's VRF table, because running a routing protocol over a GRE tunnel
can lead to low speeds or a complete halt.
You can also provide Layer 3 BGP/ MPLS VPN service without an MPLS backbone by configuring GRE and IPsec tunnels
between the PE routers . The MPLS information for the VPN (the VPN label) is encapsulated within an IP header and an IPsec
header. The source address of the IP header is the address of the ingress PE router, whi le the destination address has the
BGP next hop, the address of the egress PE router.
BGP Prefix-Independent Convergence (PIC) Edge allows you to install a Layer 3 VPN route in the forwarding table as an
alternate path, enabling fast failover when a PE router fails or you lose connectivity to a PE router. Th is already installed path
is used until global convergence through the IGP is resolved. Using the alternative VPN route for forwarding unti l global
convergence is complete reduces traffic loss.
BGP PIC Edge supports multi protocol BGP 1Pv4 or 1Pv6 VPN network layer reachability information (NLRI) resolved using any
of these IGP protocols:
• OSPF
• IS-IS
• LOP
■ Example topology
• PE1 has BGP PIC edge configured
• Routes via PE2 are protected
• PE3 provides alternate path
• CE2 loO configured with 172.16.1.5/24 for testing
loO 192.168.0. 1
CE1
Site 1
AS 101
Prov~der Core
AS 100
OSPF
Example Topology
Th is example shows two customer edge (CE) routers, Device CE1 and Device CE2. Devices PE1, PE2, and PE3 are PE routers.
Device Pl is a provider core router. Only Device PE1 has BGP PIC edge configured. The example uses the P1-PE2 link (P-PE)
link to simulate the loss of a section of the network.
For testing, the address 172.16.1.5/ 24 is added as a loop back interface address on Device CE2. The address is announced
to Device PE2 and Device PE3 and is relayed by way of internal BGP (IBGP) IBGP to Device PE1. On Device PE1, there are two
paths to the 172.16.1.5/ 24 network. These are the primary and a backup path.
Example Configuration
Before the BGP PIC Edge in an MPLS Layer 3 VPN configuration ma ke sure you have configu red
1. Configure LOP
7. Apply the per-packet load balancing policy to all routes exported from the routing tab le to t he fo rwarding tab le
Verification of Protection
BGP routing information displays load balancing availability to the destination via both PE2 and PE3.
The Indirect next hop output lines that contain weight follow next hops that the software can use to repair paths where a link
failure occurs.
A protection path can be selected only if the best path has already been installed by BGP in the forward ing table. This is
because a protection path cannot be used as the best path. There are two conditions under which the protection path wi ll
not work :
Note: The option v rf-table-label must be configured under the [ r outi ng-i n stan ces instan ce-name ]
hierarchy for the routers that have protected PE-CE links. This applies to Ju nos OS Releases 12.3 through 13.2 inclusive.
■ Example topology
• Routes through PE2 are protected
• PE3 provides protection for inet unicast routes
loO 1.1.1.3
loO 1.1.1.1 . Protected PE
- 1 Primary Data Path PE2 ,,cc2
~ _ ~')1~ -- ~ ~910.11'.24/30 .3,0 ~
~ r 0 _,) -~ ~ 'i!rge-1/2/3 ,
.... _. -.. .14 '\ _.. ----......... 2~
~~ - - - - - - - ~ .-9Je- ~1017- 7-Atl'~o · Stt---
'ilr ~ / 109e-112io11 ~ 9Je~ ,o-'·'· AS 464498
PEL P . · -16130 - ~.25
loO t::lJ. .2 loO 1.1.1.5 -1~
,_ _ _ _,_✓ --PE3
Protector PE
loO 192.168.0.6
Example Topology
This example shows the customer edge CE2 router being dua l homed to PE2, and PE3 routers. Device P is a provider core
router. Only Device PE3 has the Provider Edge Link Protection configured.
To minimize packet loss when the protected path is down, also use the per-prefix-label statement at the [ edi t
r o u t i ng-i n stan ces instance-name pro t ocols bgp f amil y inet labe l e d - u nicast ] hierarchy level.
Configure this statement on every PE router within the AS containing the protected path.
The sho w r o ute 1. 1. 1. 6 extensive output verifies that the protection path is correctly co nfigured by confirm ing that
the weight for the active path being protected is Ox1 (lower), and the we ight for the protection ca ndidate path is Ox4000
(greater).
Seamless MPLS
The slide highlights the topic we discuss next.
Seamless MPLS
I, ---------------------------------------------------------------------------------------,'
I
I
I
I
I
I
00 00 00
I
''
I
I
I
Metro-1 Region WAN Backbone Region Metro-2 Region I
.. ______ I
------- ,
., I
Seamless MPLS
A seam less MPLS network is one in which all forwarding packets within the network, from the time a packet enters the
network until it leaves t he network, are based on MPLS. Seamless MPLS introd uces a systematic way of enabling MPLS
end-to-end across all segments- access, pre-aggregation, aggregation, and co re. In a seamless MPLS network, t here are
effectively no boundaries, which allows very flexible models of service delivery and decoupling of network and service
architectures, which in turn can present a scaling cha llenge.
RSVP and LDP rely heavily on IGP, which can create prob lems in large networks. In systems with many d istribution systems,
the leaking of routes can lead to problems scaling.
Several different types of nodes appear in an MPLS network, each with a different function . A physical device can combine
several of t hese functions. Conve rsely, a single function can require multiple physical devices for its execution.
• Service node (SN)- Nodes that apply services to customer packets. Examples include Layer 2 PE routers, Layer
3 PE routers, and SONET Clock Generators (SCGs).
• Transport node (TN)- Nodes that connect access nodes to service nodes, and service nodes to service nodes.
Ideally, transport nodes do not have a customer-specific or service-specific configuration .
• Border node (BN)- Nodes that enable inter-region packet transport (s imilar to area border routers and
autonomous system [AS] boundary routers).
• Service helper (SH)- Nodes that enable or scale the service control plane. Service helpers do not forward
custome r data. Examples include service route reflecto rs.
• Access Node (AN)- Nodes where t raffic enters into t he MPLS Network. For example PE, DSLAM or Cell-Site
Router.
~G
· ~
::J ~ ,-...i- -1-1.::J
:-lG,--' 0
Edge Region 2
Edge Region 1 Transport Region
ASx ASy ASz
■ RSVP and LOP are not used to signal LSPs between regions (ASBR
to ASBR)
• BGP labeled unicast routes are used to advertise the loopbacks from other
regions between PEs and ASBRs
• Each labeled unicast route is associated with an MPLS label
• Essentially stitches together the LSPs between regions at the ASBRs by adding another
level of MPLS labeling (end-to-end)
AS2
AS 1
VRF VRF
LSP
l
Outer
Pop Push Swap
~
:1--te: Push
Ill
ei=,:a :~go:
~
II Ill
320. Swap :fff}:
ID
11 Swap
mPop m BGP-LU Label
Inner
Service Label ■
LOP LSP • LOP LSP • LOP LSP • L3VPN Label
Advertisment
- - ►
BGP LSP
• No IGP route is propagated from the aggregation layer to the core. IGP area has routes for that area only plus
routes to the core ASBRs. Only the core ASBRs are propagated from ISIS L2 to Li.
• LOP labels are used to traverse within each domain and reach the core ASBRs.
• BGP labels are used by Labeled BGP PEs & ASBRs to reach Labeled BGP PEs in remote areas.
The slide provides an example of how the L3 VPN prefix and label exchange operates and how the MPLS label stack is
created to have the end-to-end path information for the traffic flow between both PEs.
The network example is partitioned as three independent IGP/ LOP domains. The reduced s ize of routing and forwarding
tables on the routers enables better stability and faster convergence. LOP is used to bui ld intradomain LSPs within each
doma in. BGP LU labels are used as interdomain label d istribution protocol in order to build hierarchical BGP LSPs across
doma ins. BGP LU inserts one extra label in the forwarding label stack in the Seamless MPLS architecture.
• On PE1, service label 12 is known via BGP session with PE2 as next-hop PE2 and PE2 is recursively reachab le
via ASBR10 with BGP label 110. PE1 received 1Pv4 + Label information from ASBR10 as BGP updates because
it is enabled with the BGP LU feature in order to send the 1Pv4 + Label information.
• P1 is reachable from PE1 through an intradomain LDP LSP and it adds another LDP label on top of the BGP
label. Finally, the packet goes out of the PE1 node with three labels. For example, the 12 L3VPN service label,
the 100 BGP label, and the 210 LDP IGP label.
• The LDP top label continues to swap in intradomain LDP LSP and the packet reaches ASBR10 with two labels
after penultimate hop popping.
• ASBR10 is configured as inline Route Reflector (RR ) with next-hop self and it joins two IGP domains or LDP LSP.
• On ASBRIO, the next hop for PE2 is changed to ASBR20 and the update is received via BGP LU. The BGP label is
swapped with new label because next-hop is changed and the IGP label is pushed on top.
• The packet goes out of the ASBR10 node with three labels and service label 12 is untouched. That is, the 12
L3VPN service label, 120 BGP label, and 300 LDP label.
• The LDP top label swaps in intradomain LDP LSP and the packet reaches ASBR20 with two labels after
penultimate hop popping.
• On ASBR20, the next hop for PE2 is changed again and it is reachable via IGP. The BGP label is removed as an
implicit-null BGP label is received from PE2 for penultimate hop popping.
• The packet leaves with two labels. For example, the 12 L3VPN service label and the 400 LDP label.
• On PE2, the packet arrives with one label after PHP of the LDP label and based on the service label 12. The
unlabeled packet is forwarded to the CE2 destination under Virtua l Routing and Forwarding (VRF).
Summary
We Discussed:
• How the auto-export command and routing table groups can be used to support communications between sites
attached to a common provider edge (PE) router;
• The various Layer 3 virtua l private network (VPN) class of service (CoS) mechanisms supported by the Ju nos
operating system;
• Junos OS support for generic routing encapsulation (GRE) and IP Security (IPsec) tunnels in Layer 3 VPNs; and
Review Questions
Review Questions
1.
2.
3.
4.
2.
Routes from Spoke PEs and CEs are received by and accepted by the Spoke instance on the Hub PE. The HUB PE pas.s es
those route to the HUB CE. The HUB CE then advertises those routes to the Hub instance on the Hub PE. The Hub PE then
advertises those routes to the Spoke sites.
3.
The Ju nos OS supports f irewall filtering and rate limiting. It also support the setting of the experimental bits on both the inner
and outer headers of an MPLS packet.
4.
GRE and IPsec tunnels are support from CE to CE, PE to PE, and CE to PE using the Junos OS.
Engineering Simplicity
Junos Layer 3 VPNs
Objectives
We Will Discuss:
• Ju nos operating system support for carrier of carriers;
Agenda:
lnterprovider Backbones for Layer 3 VPNs
➔ Hierarchical VPN Models
■ Junos Support of Carrier-of-Carriers Model
■ Junos Support of Carrier-of-Carriers VPN Applications
■ lnterprovider VPN Option C
■ Carrier-of-carriers model
Customer Customer External
External Site 1 Site 2 Routes
Routes Provider A
C. 0-0~~~,~,-,,,~,~i----L.0,-1
-~ SBR CE LSP CE AS R
...__'- !1-C-1--Al~Si;:,BR1-~--------------I-A~
, --P-E,
, 2
LSP [S~
Carrier-of-Carriers Model
This model allows service provider A to offer a backbone service to the customer, another service provider. Assume the
customer is a new service provider that has a point of presence (POP) in a few sparse locations with no backbone network to
interconnect those POPs. The customer (the new service provider) can purchase the carrier-of-carriers service f rom the
service provider A to interconnect its sites ma king the custome r network appear as a single autonomous system (AS) without
service provider A having to carry the external routes learned by the customer. The details of this model are discussed in the
subsequent slides.
lnterprovider VPN
This model allows for a Layer 3 VPN, BG P Layer 2 VPN, or a BGP virtua l private LAN service (VPLS) to extend between
autonomous system or service providers.
External External
Customer Customer VPN
VPN Site 1 Site 2
Routes Routes
Provider
Carrier-of-Carriers VPN
Th is model is a combination of the two models d iscussed on the previous slide. In th is model, the customers of service
provider A will be providing VPN service to its own customers. The details of this model are described in subsequent slides.
VPNA SP 1 SP 2 VPNA
Site 1 Site 2
Option A
RFC 4364 describes three methods of providing mult iple AS backbones. Option A is the least scalable of t he options. This
option requ ires that t he autonomous system boundary routers (ASBRs) maintain separate VPN routing and forwarding tables
(VRFs) and store all of the associated routes for every one of its customers. Although th is option is supported by the Ju nos
OS, it is not a recommended solution.
ASBR-2q6
P-1 P-2 PE-2
•
•• • .....-..... • ••
EBGP •
MP-EBGP
VPNA
SP 1 SP 2 VPN A
Site 1 Site 2
Option B
With option B, the ASBRs do not need to maintain separate VRF instances for each VPN. However, the ASBR wi ll still have to
keep VPN routes in a single routing table, bgp.13vpn.O for L3VPN routes. Through an EBGP session between one another, the
ASBRs wi ll then exchange VPN routes as label routes. The EBGP advertised labels are used to stitch together the
label-switched paths (LSPs) that term inate between provider edge (PE) and ASBR .
Option C
Th is option is generally accepted as the most scalable solution for interprovider VPNs. Th is option allows the PE routers in
different autonomous systems to exchange VPN routes (Layer 3 VPN, BGP Layer 2 VPN, or BGP VPLS) using a multi hop BGP
session. The ASBRs do not need to store any VPN routes in this case. Instead, the ASBRs will exchange the internal networks
of each service provider (most importantly the loopback addresses of the PEs) using labeled IP version 4 (1Pv4) routes. The
labels associated with the internal networks will be used to stitch together the MPLS LSPs that exist between PE and ASBR in
the service provider networks.
Agenda:
lnterprovider Backbones for Layer 3 VPNs
• Hierarchical VPN Models
➔ Junos Support of Carrier-of-Carriers Model
• Junos Support of Carrier-of-Carriers VPN Applications
• lnterprovider Option C
Carrier-of-Carriers: Operation
■ Service provider routers:
• P routers maintain only provider internal routes
• PE routers maintain provider internal and customer internal routes
• PE routers do not carry customer external routes
■ Customer routers:
• CE routers maintain internal routes and external routes learned from their
customers
• ASBRs interface to downstream subscribers to exchange internal routes
(subscriber internal = customer external)
Customer Customer External
External Site 1 Site 2 Routes
Routes Provider
CI)
LSP
Customer Routers
The customer's routers must maintain both customer internal and external routes. The customer's external routes are those
learned from the customer's downstream subscribers.
Carrier-of-Carriers: Signaling
■ Provider network requires LSP signaling
■ MP-BGP signaling between CE and PE routers
• Uses labeled- unicast address family
■ IBGP/EBGP signaling between ASBRs
• Full mesh (except CE routers) for IBGP, multihop for EBGP
• Route reflection possible to improve scalability
• BGP sessions between ASBRs are tunneled over LSP in provider' s backbone
:- • E~ G·P~~lt; o·p - • 1 · - · - · - MP~BGP • - • - • - • - • - • - • - • - • ~ \
~ s ession::____; Site 2 Internal Route Label 101 1 External
External I Servic~ 3 • Route x
Route . ~ 4- Provider ~ . I To Site 1
I Customer Site 1 Customer Site 2 . (EBGP)
X AS=64512 --. I 6
External
8 Route x
C - 4
MP-EBGP ~ 30 LSP MP-EBGP
5
IBGP Site 2 Internal Site 2 Internal
Site 2 Internal Rou te Label 300 Route Label 200
1. The IGP at customer Site 2 exchanges interna l reachabi lity with CE-2. ASBR-2 establishes an IBGP neighbor
relationsh ip with CE-2.
2. CE-2 selectively advertises Site 2 's internal routes to the provider's PE-2 router using multi protocol EBGP
(MP-EBGP) with the support of l a b e l ed-u ni cas t routes. These routes are advertised with a valid label,
which is 200 in th is example.
3. PE-2 houses Site 2 's internal routes in a VRF table and uses MP-IBGP to send labeled VPN-1Pv4 routes to PE-1.
The route to ASBR-2 is assigned Label 101 in this example.
4. PE-1 uses MP-EBGP to send Site 2 's internal routes to CE-1. PE-1 changes the BGP next hop. Therefore, it must
assign a new label to the prefix advertised (Label 300 in th is example).
5. After receiving the labeled route, CE-1 distributes Site 2's internal routes to ASBR-1 using IBGP. No labels are
needed, because conventional IP forwarding is used within the customer sites. At this point, the ASBRs can
establ ish an EBGP multihop session through the provider's backbone. This session is tunneled through the LSP
in the provider's network.
6. ASBR-2 learns an external route x from one of its subscribers. IBGP conveys external routes from ASBR-2 to
CE-2. PE-1, PE-2, and P routers never become aware of the external route advertisement x.
7. The external route x is now advertised to ASBR-1 using the EBGP session established at Step 5. No labels are
associated with this route due to the lack of MPLS forwarding in the customer networks.
8. External route xis advertised by ASBR-1 to its downstream subscribers as well as to CE-1.
1 .
•
: ·
.•
BR 1 .....
- 2
... 0
C -
~•.: -t-- - '
3.. ••··•·• ..
p ..........
6
~
ASBR-
••.. 7 ....-.
• •••••
•
: -..........:.._, MP-EBGP •
\ IBGP Site 2 Internal ••••••• 4 ••••••••..Site 2 Internal IBGP
Route = x
~ Site 2 Internal Route Label 300 •••• • •••• Route Label 200
••
• 30 200
I ID~ X
300
DA=x
10 1
DA=x
101
DA=x
DA=x I DA XI I I DA X
2. ASBR-1 forwards this unlabeled packet towards CE-1 using the IGP's shortest path.
3. CE-1 pushes Label 300 onto the packet and forwards it to PE-1.
4. PE-1 swaps the top label wit h the va lue received from PE-2, and pushes an MPLS label (30 in this example)
onto the stack. The P router pops this top label (PHP) such t hat PE-2 rece ives a packet with a single label.
5. PE-2 swaps the VRF label with the label advertised by CE-2 and forwards t he packet out the VRF interface to
CE-2.
6. CE-2 pops the MPLS label and routes the native packet using Site 2's interior gateway protocol (IGP).
7. ASBR-2 performs a longest-match lookup and routes the packet toward destination x.
Carrier-of-Carriers: Example
■ Sample network:
• AS 65512 provides carrier-of-carriers services to its customers in AS 10 and
AS 11
• LSP established between PE routers
• Policy exists on CE routers to advertise /32 loopback addresses to provider
• EBGP with labeled-unicast NLRI between CE and PE routers
• ASBR-1 and ASBR-2 routers establish a multihop EBGP session to advertise
external routes (200.0.0/24)
Provider Core 200.0.0/24
AS 65512
AS 10 OSPF Area 0 Site 2 As 1 1
OSPF Area 0 Site 1 OSPFArea 0
• Provider network: The provider's network is assigned AS 65512 and has already establ ished an LSP between
PE-1 and PE-2 using RSVP. The PE routers have a VRF table configured, along with the necessary VRF target
community and route distinguishers.
• Policy on CE routers: The CE routers are configured to run MP-EBGP with the PE routers and have a policy in
place to ensure that only internal prefixes are advertised to the PE routers.
• ASBR-1 and ASBR-2 routers exchange external routes: A multihop EBGP session is configured between the
ASBRs because the customer networks are assigned differing AS numbers. ASBR-2 advertises the external
route 200.0.0/ 24 to ASBR-1 using this EBGP session .
ASBR-2 Configuration
This slide lists the key aspects of ASBR-2's configu ration . An IBGP session is configured to CE-2, and a multihop EBGP
session is configu red for ASBR-1 at Site 1 .
The 2 oo po licy in ASBR-2 ensures that only external routes (200.0 .0/ 24 in th is example) are sent to ASBR-1. The default
IBGP po licy causes all external routes ASBR-2 learns through EBGP to be sent to CE-2.
This policy is rather simple and requires changes for each new externa l route. A more scalable solution involves an AS path
regex that blocks all internal routes and only accepts routes whose AS-path attribute does not begin with 11.
group e xt I t he n accept ;
type externa l ; )
family i net { term 20 I
labeled- unicast ; t hen reject ;
) )
e xport i nt ernals ; }
CE-2 Configuration
This slide lists the key aspects of CE-2's configuration. An IBGP session is configured to ASBR-2, and an MP-EBGP session is
configured for communications with PE-2.
The MP-EBGP session has the labe l e d - u n i cast fami ly configured, which is required for the exchange of labeled routes
between CE and PE routers .
CE-2 has an EBGP export policy in place that causes it to only advertise the / 32 routes associated with Site 2 's loopback
addresses. The leaking of other internal routes (that is, OSPF and direct connect) are not strictly required but can aid in
troubleshooting. With this configuration, we must take care to source pings and traceroutes for the loopback add resses of
customer site routers.
PE-2 Configuration
Th is slide lists the key aspects of PE-2's configuration. An MP-EBGP VRF routing instance is configured for communications
with CE-2. Also shown is an LSP that terminates on PE-1.
After PHP, PE-2 receives a packet with Label 299904, which it swaps with the label learned from CE-2 (labeled unicast route)
before forward ing the singly labeled packet to CE-2.
In th is example, the external route is a static route on ASBR-2, so hops beyond ASBR-2 are not present. Also, because the
provider core routers (main routing instances) do not have routes associated with the customer networks, core router hops
show up as timeouts.
Agenda:
lnterprovider Backbones for Layer 3 VPNs
■ Hierarchical VPN Models
■ Junos Support of Carrier-of-Carriers Model
➔ Junos Support of Carrier-of-Carriers VPN Applications
■ lnterprovider VPN Option C
C -1 LSP p PE-
LSP
• Service provider routers:
• P routers maintain only P-internal routes
• PE routers maintain P-internal and C-internal routes
• Customer routers:
• CE routers maintain C-internal routes
• PE routers maintain both C-internal and C-external routes (VRF tables house
C-external routes)
• LSPs required between customer PE and CE routers
• ASBRs interconnect with other autonomous systems
• Three-level label stack in provider and customer networks
• MP-1/EBGP needed for labeled route exchange
C/2020 Juniper Networl<s, Inc .All R,ghlS Resenie<I.
Customer Routers
The customer's routers must maintain both C-internal and C-external routes. External routes are those learned from the
customer's downstream subscribers and are now stored in site-specific VRF tables. Unlike the previous examples, the
support of VPN routes requires that LSPs be established between customer PE and CE routers. These can be established
using either RSVP or LDP. The use of LSP-based forward ing within the customer networks accommodates private/ local use
addressing.
ASBRs
ASBRs can be PE or CE routers and are used to connect with other autonomous systems. ASBRs advertise labeled routes
between autonomous systems and maintain switching tables that allow them to stitch together LSPs existing in adjacent
networks.
1. The bottom label is the VRF label assigned using MP-BGP. This label does not change as the packet is
forwarded .
2. The middle label is assigned by the downstream ASBR (CE-1, in the case of PE-1) and is used by the ASBR to
associate the packet with the LSP leading to the next ASBR in the path.
3. The top label associates t he packet with t he LSP connecting PE-1 to CE-1 and is assigned by RSVP or LDP.
Because an LSP must be established across AS boundaries to interconnect customer PE routers, labels must be
commu nicated along with t he NLRI advertised by ASBRs. Although a protocol such as LDP cou ld be used f or th is purpose,
the Junos OS currently supports MP-BGP for this pu rpose.
RFC 3107, Carrying Label Information in BGP-4, specifies labeled routes. Labeled route advertisements use SAFI 4 and
differ f rom VPN-labe led routes in t hat there is no ro ute distinguisher or route t arget commu nit ies in the advertised NLRI.
Simply put, labeled routes allow the binding of an MPLS label to the advertised 1Pv4 NLRI. ASBRs use the advertised labels
t o build MPLS switch ing t ables t hat result in an end-to-end LSP spanning mu ltiple autonomous networks.
Within an AS, labeled routes are sent using MP-IBGP whi le MP-EBGP is used across AS boundaries.
To improve sca lability, t he customer net works can use route reflection. The two route reflectors peer using MP-EBGP. A
comma nd called no-nexthop-change is required to tell the route ref lectors to pass- u nchanged- t he third party next
hops to their clients.
1. The IGP at customer Site 2 exchanges internal reachability with CE-2. Externa l (VRF) routes are not sent to PE-3.
2. CE-2 selectively advertises Site 2 's internal routes to the provider's PE-3 router using MP-EBGP with the support
of l abe l ed-u ni cas t routes. The route to PE-4 is sent with a label value used to associate packets with the
LSP to PE-4 in Site 2 (1 020 in th is example).
3. PE-3 houses Site 2 's interna l routes in a VR F table and uses MP-IBGP to send labeled VPN-1 Pv4 routes to PE-2 .
The route to PE-4 is assigned Label 1001 in this example.
4. PE-2 uses M P-EBGP to send Site 2's internal routes to CE-1. Because PE-2 has changed the BGP next hop (as is
always the case with ASBRs), it must assign a new label to the prefix advertised (Label 1007 in this example).
5. After receiving the labeled route, CE-1 distributes Site 2's internal routes to PE-1 using MP-IBGP. Unlike the
carrie r-of-carriers application, this exchange involves labeled-unicast routes, and therefore requ ires MP-IBG P.
Because CE-1 is also an AS BR, it rewrites the BGP next hop and must the refore assign a new label (Label 1020
in this example).
At this point, the ASBRs (PE-1 and PE-4) establ ish an MP-EBGP multihop session through the provider's backbone. This BGP
session is tunne led through the LSP in the provider's network and is used to carry labeled VPN routes. This session should
be contrasted to the carrier-of-carriers application, in wh ich MP-1/ EBGP was not needed due to native IP forward ing within
the customer networks.
6. Here, PE-4 learns an external route x from one of its VPN subscribers.
7. The external route xis now advertised to PE-1 using the MP-EBGP session established at Step 5 . This NLRI
advertisement includes the VR F label that PE-4 expects to rece ive for routes associated with this particular VR F
instance.
I • External Route x
• ·t I Route Label 1004
I Customer Site 1 6 Customer S I e 2 •
AS=64512 I
' AS=10
1 ,2L~:,. ~-..~=j~
PE-1'. C
~i'; -,
MP-1 8 · MP-EBGP •
Site 2 Internal ••••• • ••• •·"
MP-EBGP
Site 2 Internal
--Ill!! bS~ --
IGP Intern als
9
Site 2 Internal
Route Label 1007 •• •• • .. ·" •• • Route Label 1020
Route Label 1020
5
I DA X I
1007
1004
1008
1001
1001
1004
1020
1004 1004 1004 I DA X I
DA=x 111114 DA=x DA=x DA=x DA=x Native packet
Packet@ PE1 delivered to
addressed to x CE1 Swaps DA=x PHPby PE3 swaps CE2 pops PE4 pops
subscriber x
top label P router top label top label VRF label
1020 PE2 swaps top
label, and (PHP) 8
1004
2 pushesMPLS
DA=x
label 1008
PE1 pushes
label 1004 and 1020 ■ Requires three-level label stack
(PHP = no top label)
2. PE-1 pushes two labels onto the packet: the inner label is the VRF label assigned by PE-4, and a second label
assigned by CE-1 (to associate the packet with the LSP to PE-4). In this one-hop LSP example, PHP results in t he
absence of a third RSVP/ LSP label used to associate the packet with the LSP between PE and CE routers.
3. CE-1 receives the labeled packet and swaps the top label.
4. PE-2 receives the labeled packet and swaps the top label with the value received from PE-3 while also pushing
the MPLS label (Label 1008 in this example) onto the stack.
5. The P router pops the top label (PHP) so that PE-3 rece ives a packet with only two labels.
6. PE-3 also performs a swap on the top label before forwarding the packet to CE-2.
7. Being the penultimate router for the LSP to PE-4, CE-2 pops t he label stack and sends the resulting VR F-labeled
packet to PE-4.
8. PE-4 pops the VRF label and consults the corresponding VRF table to perform a longest-match lookup on the
now unlabeled packet.
9. The native packet is forwarded out PE-4 's VR F interface toward the subscriber to wh ich it is addressed .
The provider's network is assigned AS 65512. It already has established an LSP between PE-2 and PE-3 using RSVP. The PE
routers have a VRF table configured, along with the necessary VR F ta rget and route distinguishers. PE-2 and PE-3 function
as ASBRs in this application .
Policy on CE Routers
The CE routers are configured to run MP-EBGP (family inet labeled-unicast) with the PE routers and have a policy
in place to ensure that only internal prefixes are advertised to the provider's PE routers .
PE-1 Configuration
PE-1 Configuration
This slide shows the key aspects of PE-1's configuration. Fami ly l a b e l ed-u ni cast is configured for its MP-IBGP session
to CE-1, and family inet-vpn is configured for the multihop MP-EBGP session to PE-4.
resolve-vpn
The r e sol ve-vp n option causes PE-1 to copy the l abe l ed-u n icas t routes it receives from CE-1 into i net . 3 , wh ich
allows VPN routes to resolve through the interprovider LSPs. Without this option, all the VPN routes received would be
hidden, due to unusable next hops.
CE-1 Configuration
• Redistributes internal routes to PE-2; family inet labeled-
un i cast needed on BGP peering session
user@ce - 1# show p r otocol s
bgp {
group int {
type internal ;
local - address 192 . 168 . 12 . 1 ;
famil y inet {
!labeled- unicast 4
)
export nhs ;
neighbor 192 . 168 . 12 . 3 ;
)
group ext {
type external ;
familv inet f
~abeled-unicast ;
)
export internals ;
peer - as 65512 ;
neighbor 10 . 0 . 20 . 1;
CE-1 Configuration
Th is slide displays key portions of the configuration on CE-1. RSVP is enabled, and an LSP is defined back to PE-1 (not
shown). The MP-IBGP session to PE-1 has the l abe l ed- u n i cast fam ily configured. This configuration is needed so that
CE-1 can include l a b e l ed-un icast routes along with the advertisements for Site 2 's internal routes.
CE-1 also has an MP-EBGP session configured for its connection to PE-2. Th is session must also support
l abe l ed- u ni cast routes.
The following policy is applied to CE-i's MP-EBGP session to PE-2. This policy ensures that Site 1 sends on ly internal routes
to the provider:
The l abele d - u n i cas t routes received by PE-1 are copied into the main routing table (i net . O) as well as the i net . 3
tab le. This copying is the result of the r e so l ve-vpn option on PE-1 and is critical to the operation of t his network.
Normally, VPN routes must resolve to an LS P that term inates on t he egres.s PE router. Beca use PE-1 does not have an LSP
terminating d irectly on PE-4, the VPN ro utes are un usable without the labe l ed- un icast entries to the remote PE routers
in i ne t. 3, w hich indicate a multinetwork LSP between PE-1 and PE-4 exists.
The top label is popped by the provider P router (PHP), such that PE-3 receives a packet with a two-leve l label stack. PE-3
swaps the top label with the va lue assigned to t he LSP to PE-4 by CE-2. PE-3 's label operation is shown here:
• • •
299904 * [VPN/ 1 70 ] 19 : 07 : 27
> to 1 0 . 0 . 2 1. 2 via ge- 1 /0/4 . 0 , Pop
299904(S= O) * [VPN/ 1 70 ] 19 : 07 : 27
> to 1 0 . 0 . 2 1. 2 via g e- 1 /0/4 . 0 , Pop
300080 * [VPN/ 1 70 ] 0 1: 15 : 43
> to 1 0 . 0 . 2 1. 2 via g e- 1 /0/4 . 0 , Swap 299872
The result is that CE-2 receives a packet with a two-level label stack (VRF-label- 299872). CE-2 then swaps t he top label with
the va lue it associates with the LSP to the egress PE router. In t his example, CE-2 pops the stack because it is the
penu ltimate router for th is LSP.
5 * * *
6 10 . 0 . 60 . 2 (10 . 0 . 60 . 2 ) 0 . 797 ms 0 . 515 ms 0 . 502 ms
MPLS Label=299808 CoS=O TTL=l S=l
7 10 . 0 . 61 . 2 (1 0 . 0 . 61 . 2) 0 . 50 1 ms O. 5 0 7 ms O. 4 8 7 ms
• Customer PE-to-PE:
user@pe-1> t r a ceroute 192. 1 68. 12. 4 s ource 192.168.12.3
traceroute t o 192 . 168 . 12 . 4 (192 . 168 . 12 . 4) from 192 . 168 . 12 . 3, 30 hops max , 40 byte packets
1 10 . 0 . 5 0 . 1 (10 . 0 . 5 0 . 1 ) 0 . 510 ms O. 3 91 ms O. 3 61 ms
MPLS Label=299856 CoS=O TTL=l S=l
2 10 . 0 . 20 . 1 (10 . 0 . 20 . 1 ) 0 . 383 ms 0 . 379 ms 0 . 373 ms
MPLS Label=300208 CoS=O TTL=l S=l
3 * * *
4 * * *
5 10 . 0 . 21 . 2 (10 . 0 . 21 . 2) 0 . 606 ms 0 . 478 ms 0 . 466 ms
MPLS Label=299792 CoS=O TTL=l S=l
6 192 . 168 . 12 . 4 (1 92 . 168 . 12 . 4) 0 . 477 ms 0 . 475 ms 0 . 457 ms
All other rout er hops in the c ustomer and provider netwo rks are seen as t racero ute timeouts.
The traceroute between PE-1 and PE-4 shows the outer MPLS label for the various hops in the path, except for t he provider's
routers, wh ich appear as t imeouts. The provider routers are not able to generate t raceroute responses, owing to their not
ca rrying customer externa l or internal rout es.
Agenda:
lnterprovider Backbones for Layer 3 VPNs
• Hierarchical VPN Models
■ Junos Support of Carrier-of-Carriers Model
AS100 AS200
• PE routers mainta in the internal routes from its own AS (AS-internal), the loopback address from the other AS
PE's (AS-external), and the L3VPN routes.
• ASB R routers ma inta in the internal routes from its own AS (AS-internal), and the loopback addresses from the
other AS PE's (AS-external). It does not maintain L3VPN routes, which makes this sol ution scalable.
ASBR Routers
The ASB R routers interconnect t he providers. To ensure that the L3VPN traffic is sent labeled across the interprovider link
l abe l ed-u ni cast routes are exchanged across the EBGP session .
CE Routers
CE ro uters are unaware of the interprovider setup so just as for single provider L3VPNs they only care about their own ci rcu it
information and their loca l routing (if used at all).
1. The bottom label is the L3VPN label assigned using multihop MP-EBGP. This label does not change as the
packet is forwarded .
2. The m iddle label is assigned by the downstream ASBR1 and is used by the ASBR1 to associate the packet with
the LSP lead ing to the remote PE This is a labeled unicast learned label.
3. The top label associates the packet with t he LSP connecting PE1 to ASBR1 and is assigned by RSVP or LOP.
Because an LSP must be established across AS boundaries to interconnect customer PE routers, labels must be
communicated along with t he NLRI advertised by ASBRs. Although a protocol such as LOP cou ld be used fo r th is purpose,
the Junos OS currently supports MP-BGP for this purpose.
RFC 3107, Carrying Label Information in BGP-4, specifies labeled routes. Labeled route advertisements use SAFI 4 and
differ from VPN-labeled routes in t hat there is no route distinguisher or route ta rget communities in the advertised NLRI.
Simply put, labeled routes allow the binding of an MPLS label to the advertised 1Pv4 NLRI. ASBRs use the advertised labels
to build MPLS switching tables that result in an end-to-end LSP spanning multiple autonomous networks.
Within an AS, labeled routes are sent using MP-IBGP while MP-EBGP is used across AS boundaries.
To improve scalabi lity for large deployments, the provider networks can use route reflection. The two or more ro ute reflectors
peer using multhop M P-EBGP. A command called no-nexth o p -chan ge is required to te ll the route reflecto rs to pass-
unchanged- the third party next hops to t heir cl ients.
1. A packet for the L3VPN between CE-Ai and CE-A2 arrives at PE1.
2. PE1 pushes three labels onto the packet: the inner label (3004) is t he L3VPN label assigned by PE2, and a
second label (2007) assigned by ASBR1 (to associate the packet with the extended LSP to PE2). The top label
(1020) is pushed to use the LOP LSP to reach ASBR1.
3. Pi receives the labeled packet and pops the top label (PHP).
4. ASBR1 receives the labeled packet and swaps the top label with the value rece ived from ASBR2 (2007
->2008)
5. ASBR2 receives the labeled packet and swaps the top label with the value of the LOP LSP towards PE2 (2008
-> 1010).
6. Being the penultimate router for the LOP LSP to PE2, P2 pops the label stack and sends the resulting
L3VPN-labeled packet to PE2.
7. PE2 pops the L3VPN label and consults the corresponding table to forward the traffic out of the correct
CE-facing interface.
8. The native packet is forwarded out PE2's L3VPN interface toward the CE to which it is addressed .
Within each provider's network the IGP and LOP protocols already have been configured so that within each AS there is an
end-to-end LSP to each loopback.
PE1 Configuration
PE1 Configuration
Th is slide shows the key aspects of PE1's configuration. Fam ily l a b e l ed-u ni cast is configured for its MP-IBGP session to
ASBR1, and family i ne t -vpn un icast is configured for the multihop MP-EBGP session to PE2.
resolve-vpn
The re sol ve-vpn option causes PE1 to copy the labe l e d - un icast ro utes it receives from ASBR1 into i n e t. 3, which
allows L3VPN routes to resolve through the interprovider LSPs. Without this option, all the VPN routes received would be
hidden, due to unusable next hops.
The s lide also shows the L3VPN routing-instance configuration that is identical as used for s ingle provider L3VPNs.
ASBR1 Configuration
• Redistributes internal routes to ASBR2; family inet labeled-
un i cast needed on BGP peering session
user@ASBRl# show protocols user@ASBRl# show prot ocols mpl s
traffic-engineering {
bgp { mpls- forwarding ;
group int ( }
ASBR1 Configuration
Th is slide shows the key aspects of ASBR1's conf iguration. Fami ly l abe l ed- u n i cas t is configured f or its MP-IBGP
session to ASBR1, and for its MP-EBGP session to ASBR2.
Notice the export policy called interna ls that cont ains the local PE's loopback addresses.
The l abele d - u n i cas t routes received by PE1 are cop ied into the main routing table (i net . O) as wel l as the i net . 3
table. Th is copying is the result of the re so l ve-vpn option on PE1 and is critica l to the operation of this network. Normally,
L3VPN routes must resolve to an LSP that term inates on the egress PE router. Because PE1 does not have an LSP
terminating d irectly on PE2, the VPN routes are unusable without the l abe l ed-u ni cast entries to the remote PE routers
in i ne t. 3, which indicate a multinetwork LSP between PE1 and PE2 exists.
• Label 299776 (L3VPN label received from PE2 across MP-EBGP session )
• Label 300064 (Label received from the labeled unicast MP-IBGP sessio n with ASBR1)
• 299824 = Top label (Label received from P1 router using the LDP protocol )
To verify the data-plane connectivity you can use a pi ng from one CE toward the remote CE. As shown in the slide the ping is
successful.
Summary
We Discussed:
• Junos support for carrier of carriers;
Review Questions
Review Questions
1.
2.
3.
3.
The labeled-unica st address family is used between PE and CE.
Engineering Simplicity
Junos Layer 3 VPNs
Objectives
We Will Discuss
• Using a structured approach to troubleshoot Layer 3 VPN issues;
• Useful commands and tools to check both the signaling and the forwa rding plane; and
➔ TroubleshootingOverview
■ Verifying PE-CE Routing Protocols
■ MPLS Transport and Label Distribution Protocols
■ MP-BGP
■ Troubleshooting MVPNs
Troubleshooting Overview
The slide lists the top ics we will discuss. We wi ll discuss t he highlighted topic first.
The Layer 3 VPN signaling plane includes such components as the PE-CE dynamic routing protocols, the MP-BGP IBGP
session used to advertise VPN routes to other PEs and the label distribution protocols used to signa l the transport LSPs.
Checking the forwarding plane, instead, typically means sending test traffic (even with tools such as ping mpls) to detect
forward ing problems.
Troubleshooting in many cases starts with checking the state of the signaling plane. The first steps are driven by the problem
description: for example, in case of tota l loss of connectivity between a single CE and all the others, a natural starting point
would be the PE-CE routing protocol used on the CE side. If a whole previously-working VPN suddenly goes down and no site
can reach any other site, a natura l starting point wou ld be the IBGP infrastructure (e.g. route reflectors) or the label
distribution protocols used.
Some typical signal ing issues are missing ro utes or unreachable sites. Even if the actual root cause is hardware, e.g. a failed
interface on the PE-CE link, the s ignaling plane will be able to help pinpoint where the problem is. More comp lex signa ling
issues are suboptimal routing or routing loops within a VPN. These problems are however not specific to Layer 3 VPNS, and
are essentially routing pol icy or redistribution issues.
When it comes to forwarding issues, some typical examples are partial or total packet loss between sites, or fa ilure to
forward multicast streams even when t he m ulticast s ignaling plane appears correct. These problems are generally more
complex to troubleshoot, and may involve other features and functionalities as Class of Service .
e protocol
+----------• •
-" _ - -
Labe:~~;ribution·, ;
_ ~ ,.,. protocol
+----------+ e
CE1 PE1 . Protocols I , -E2 CE2
3. The MPLS label-distribution protocols used for establish ing label-switched paths in the core
We will now look at several useful commands to check each of these components.
• Troubleshooting Overview
➔ Verifying PE-CE Routing Protocols
• MPLS Transport and Label Distribution Protocols
• MP-BGP
• The Forwarding Plane
• Troubleshooting MVPNs
VPN- B . inet . 0 : 4127 destinations , 4127 routes ( 4127 active , 0 holddown , 0 hidden)
Direct : 1 routes , 1 active
Local : 1 routes , 1 active
RIP : 1 routes , 1 active
BGP : 4124 routes , 4124 active
Th is wil l summarize the amount of rout es present in each routing instance, divided by protocol, and it is often a good first
st ep t o check t he overall signaling plane. The command will also display the number of hidden rout es wh ich - in a Layer 3
VPN envi ronment- are typica lly caused by lack of MPLS reachability to remote PEs.
In the picture, you can see two VPNs (VPN-A and VPN-8). There are no hidden routes, but while the output for VPN-8 appears
normal, VPN-A does not show any BGP routes. This means no routes f rom remote PEs are being received, and could indicate
a target/ VRF policy problem.
■ Useful commands
•show bgp summary
•show bgp neighbor <ce address>
•show route advertising-protocol bgp <ce address>
•show route receive-protocol bgp <ce address>
■ BGP commands show sessions in all VRFs
• No need to specify the instance name
e 1~~!'!~-~~~ • ·- -M-~:.~G
.:;.;=-~-~-r:-E+3-.. . ;+:_l~G--!'_!:__~G.....:_~- E ~
CE1 PE1 ---.,,.. CE2
BGP export policies are still needed when distributing routes between instances using a uto -expo rt or a rib-gro up, or
in general whenever you need to advertise any non-BGP route (e.g. statics) to the local CE.
■ Useful commands
•show ospf interface instance <vpn>
•show ospf neighbor instance <vpn>
•show ospf database instance <vpn> • • •
A problem in VRF po licies or a wrong domain-id configuration ca n cause VPN routes to be advertised as Type-5 rather tha n
Type-3. Th is can potentially cause routing problems for multi-homed sites, due to t he different protocol preference of OSPF
externa l (150) and internal routes (10).
A second, less common configuration option is the use of sham-l inks, which behave similarly to virtual links, con necting
multiple parts of the same OSPF doma in through the provider MPLS infrastructure. Sham-links are typically used when a
Layer 3 VPN is used to extend an OSPF domai n, for example connecting multiple OSPF sites or regio ns.
However, the output of show ospf database needs to be interpreted, as it on ly returns LSAs, not prefixes. For example,
here is the output of show ospf database instance <VPN> external advertising-ro uter self on a PE
router:
user@PE> s ho w o spf database i nstance VPN-A external advertis i ng-ro uter self
OSPF AS SCOPE l i n k sta t e datab ase
Typ e ID Ad v Rt r Seq Age Op t Ck s u m Len
Ex t ern *1 0 . 3 . 0 . 0 1 0 . 1. 0 . 2 Ox80000 2 01 1 932 Ox a2 Oxf a6 1 36
Ex t er n *1 0 . 3 . 0 . 3 1 0 . 1. 0 . 2 Ox80000201 1 075 Ox a2 Oxca9 1 36
Ex t er n *1 0 . 3 . 0 . 255 1 0 . 1. 0 . 2 Ox80000201 15 03 Ox a2 Oxf a6 1 36
Ex t er n *1 0 . 3 .1. 0 1 0 .1. 0 . 2 Ox80000 2 01 646 Ox a2 Oxe f 6b 36
Ex t er n *1 0 . 3 . 2 . 0 1 0 .1. 0 . 2 Ox80000201 218 Ox a2 Oxe475 36
Ex t er n *1 0 . 3 . 3 . 0 1 0 .1. 0 . 2 Ox80000200 2 789 Ox a2 Oxdb7e 36
From this output alone it is not possible to f ind out which prefixes are being advertised. This requires examining each LSA in
detail and checking its network and netmask., as shown below:
user@PE> sho w o spf database i nstance VPN-A external lsa-id 10.3. 0 .0 detai l
OSPF AS SCOPE l i n k sta t e datab ase
Typ e ID Ad v Rt r Seq Age Op t Ck s u m Len
Ex t er n *1 0 . 3 . 0 . 0 1 0 .1. 0 . 2 Ox 80000 2 01 2654 Ox a2 Oxf a6 1 36
mask 255 .2 5 5 . 0 . 0
Top o l ogy de f a u lt ( I D 0)
Type : 2 , Me t r i c : 0 , Fwd addr: 0 . 0 . 0 . 0 , Tag: 2 08 . 0 .2 5 5. 23 2
user@PE> show o spf database instance VPN-A external lsa-id 10. 3 . 0 .255 detail
OSPF AS SCOPE l i nk sta t e datab ase
Typ e ID Ad v Rt r Seq Age Op t Ck s u m Len
Ex t er n *1 0 . 3 . 0 . 255 1 0 . 1. 0 . 2 Ox80000 2 01 2 233 Ox a2 Oxf a6 1 36
mask 255 .2 5 5. 2 5 5 . 0
Top o l ogy de f a u lt ( I D 0)
Type : 2 , Me t r i c : 0 , Fwd addr: 0 . 0 . 0 . 0 , Tag : 208 . 0 . 25 5 . 232
In th is example, the first LSA (Isa-id 10 .3 .0 .0) is for 1 0 .3 .0 .0/16, and the th ird (Isa-id 10 .3 .0 .255) is for the 10.0 .3 .0/ 24
prefix.
0 +--~~_P~-♦
CE1
One special case is the use of sham-links; in this case, the PEs will not re-distribute M P-BGP VPN routes into OSPF, but just
transport using sham-links OSPF LSAs generated by remote sites. When using sham-links, you cannot easily check which
routes you are advertis ing to the CE without examining in detail the link-state database . Still, you can check if the sham-link
is operating correctly with show ospf neighbor instance vpn.
■ Useful commands
•show route advertising-protocol rip <local ip> instance
<vpn>
•show route receive-protocol rip <local ip> instance <vpn>
• RIP does not have the concept of "adjacency"
• Commands take the local interface address as argument
• The default policy is accept everything, advertise nothing
• Export policies are always needed
e +--~~---• e -, -~-~.~G
:.: . =.:.-;~-o-r:-"l~~.. . ;•:. ._-~
_--~----=-•-Ee~
CE1 PE CE2
RIP does not have the concept of "neighbor" or "adj acency", and because of this RIP-related commands are typical ly not very
intuitive. For example, the show rip neighbor instance <vpn>command takes as argument a local interface, not
a neighbor address as with other protocols.
•
user@ r outer> show rip neighbor instance VPN-B ge-1 /0/8 .0
Loca l Sou r ce Desti na t ion Send Receive In
Ne i g h bor State Address Address Mo d e Mode Met
-------- ----- ------- ----------- ---- ------- ---
ge-1/0/8 . 0 Up 10 . 2 . 0 . 2 224 . 0 . 0 . 9 mcast both 1
Note also that a neighbor in Up state just means your local end is up and RIP is running; but this does not tell you anything
about the state of the CE.
■ Troubleshooting Overview
■ Verifying PE-CE Routing Protocols
➔ MPLS Transport and Label Distribution Protocols
■ MP-BGP
■ Troubleshooting MVPNs
For destinations internal to the local AS, the LSPs between PE routers are usually created by the LDP or RSVP label
distribution protocol. Inter-domain applications instead typical ly use BGP labeled-unicast; in this case, the command
r e so l ve-vpn may be needed in order to get labeled-unicast routes installed also in inet.3 in addition to inet.O.
Using re so l ve-vpn is not the only way to install MPLS egress points in i ne t. 3 ad well as in i net . O. There are also
other possibilities, including changing the default Junos traffic engineering behavior by enabl ing t r a ffi c-e n g inee r i ng
mpl s- f o r wa rding at the [ edit protoco l s mpl s ] level. Still, the MP-BGP next-hops for i ne t -vpn routes need to
be reso lvable through an entry in i ne t. 3 . This makes checking this table a fundamenta l and useful troubleshooting step.
• RSVP • LOP
• show rsvp interface •show ldp interface
•
• show rsvp session •show ldp neighbor
•
• show rsvp statistics •show ldp session
• show mpls lsp •show ldp statistics
• show ldp database
• Detailed RSVP and LOP troubleshooting are outside the scope of this
course
From troub leshooting the point of view, one advantage of RSVP is that it gives ingress routers fu ll visibility of the state of
LSPs, including errors along the path. With LDP it is easy to detect a LSP-down event, due to the missing route in inet . 3 .
However, f inding the root cause often means checking hop-by-hop from the ingress to the egress, until the fai lure is found .
Detailed RSVP and LDP troubleshooting is covered in other Juniper Education courses.
■ Troubleshooting Overview
■ Verifying PE-CE Routing Protocols
■ MPLS Transport and Label Distribution Protocols
➔ MP-BGP
■ The Forwarding Plane
■ Troubleshooting MVPNs
MP-BGP
The slide highlights the topic we discuss next.
■ Useful commands
show bgp summary
show bgp neighbor <neighbor>
show route table bgp.13vpn.O
show route receive-protocol bgp <neighbor>
show route advertising-protocol bgp <neighbor>
~ - - -~ ..........
. . --8 ---..,. . . . .
Route Reflector ...........~ i-. _ _ _.,.
,~ --
For examp le, to allow a reflector outside the MPLS domain to reflect VPN routes th is static entry could be added to the inet.3
table:
The presence of a static route to MP-BGP next-hops is enough to al low the correct reflection of VPN routes.
On the slide, you can see a BGP neighbor in Established state. Apparently everything seems correct, but if you check the
add ress families advertised by each peer, you can see that the remote end (probably a route reflector) is advertising also
fami ly r o u te-ta r ge t, wh ile the loca l end only inet- u ni cast and inet-vp n - u ni cast. On a big setup, this means
that a large number of unnecessary updates can be sent from the reflecto r to the local ro uter, only to be discarded on
receipt.
One common misconception is that examining the bgp.13vpn.0 table can be used to detect policy problems, e.g. target
mismatch. Unfortunately this is not the case, as target mismatches will result in routes being dropped, not stored or hidden.
It is possible to override this behavior by configuring the keep-a ll keyword at the BGP neighbor level, but th is is typical ly
not recommended in any rea listic deployment due to its potential negative side effects (increased resource utilization).
In the s lide, you can see a sample output showing four hidden routes; those should be investigated, as they usually indicate
MPLS reachability problem to one or several PEs
lab@mxA-1>
■ Troubleshooting Overview
■ Verifying PE-CE Routing Protocols
■ MPLS Transport and Label Distribution Protocols
■ MP-BGP
To troubleshoot PE-CE commun ications, both the ping and the traceroute commands accept the
r o uting-instance modifier, and can be used in the same way as for ordinary IP forwarding troub leshooting. Similarly,
show arp can be used to verify IP-to-MAC resolution on Ethernet interfaces.
To troub leshoot the MPLS core, instead, you can use the ping mpls and traceroute mpls commands specific to your
label distribution protocol. In addition to these, you can also use the Layer 3 VPN specific command ping mpls 13vpn.
Finally, it is possible to enable i cmp-tu nne li ng to allow traceroute through the M PLS core from with in the VPN. It is
important to be aware of the limitations of th is functiona lity, as it can be very misleading. Specifically, if there is a forwarding
failure in the MPLS backbone anywhere between two PEs. traceroute originating from the CE will show a loss at the first hop,
regardless where the real problem is. This is because the TTL-expired ICMP messages need to be forwarded al l the way to the
remote PEs and then back. Any failure in the path will still be perceived as loss immediately after the local PE.
This example shows a case where the core MTU of an Ethernet-based network was left as 1500 bytes. The ping mpls
command attempts to find the actual MTU by sending packets with different sizes, in an attempt to discover the larger
packet that can be sent on the MPLS path.
In th is example, the command reports a usable MTU of 1488, due to the 12 bytes being used for 3 labels (transport, VPN
and LDP tunneling/protection label).
■ Troubleshooting Overview
■ Verifying PE-CE Routing Protocols
■ MPLS Transport and Label Distribution Protocols
■ MP-BGP
Troubleshooting MVPNs
The slide highlights the topic we discuss next.
----------
'..'P-BGP fami ly n vpn""'",--.....
e : a --- e e
C-Multicast , ,.. .- ........ C-Multicast
PMSI ......
Th is last point is typically implemented with point-to-mu ltipoint LSPs (either with RSVP or LDP). The older, deprecated
draft-rosen version of MVPN used GRE tunne ls to multicast destinations as a multicast service interface, but t hese
architectures are typical ly plagued by several limitations and are today considered obsolete.
A natural way of approach ing tro ubleshooting MVPNs is to follow t his order, first verifying if the customer multicast domain is
working up until the PE, then checking if multicast state is correctly re layed by MP-BGP, and finally investigate the Provider
Multicast Service Interface, based on LDP or RSVP (next-generation MVPN) or PIM and GRE tunnels (the original, obsolete
draft-rosen). It is also worth mentioning that sometimes problems that appear at a first look to be forwarding issues are in
fact signaling issues in the PMSI. For example, a branch of a point-to-multipoint LSP flapping will result in intermittent packet
loss affecting on one or more PEs, but the actual root cause might be tied to RSVP, LDP or even the IGP.
In addit ion to PIM-related commands, the show mvpn c-mu l t i cast i ns t a n ce- n ame <vp n> can be used to check
customer multicast state on the PE. The use of th is command will be illustrated in the next slide.
MVPN instance :
Legend for provider tunnel
S- Selective provider tunnel
F- Flood NH forwarding NH
M- Multicast Composite NH
C- Cloned NH
Instance : VPN-A
MVPN Mode : SPT - ONLY
MVPN Forwarding Entry uses hierarchical nexthop : No
MVPN Forwarding Entry share tunnel nexthop : Yes
C-mcast IPv4 r s : Gl Provider Tunne l St FwdNh
0 . 0 . 0 . 0/0 : 224 . 7 . 7 . 1/32 Primary unbound
10 . 0 . 101 . 2/32 : 224 . 7 . 7 . 1/32 RSVP- TE P2MP : 10 . 210 . 14 . l , 10441 , 10 . 210 . 14 . l M- OxO
Type
1 1-PMSI Autodiscovery Sent by every PE
2 Inter-AS 1-PMSI AD Route Used for interdomain multicast
-
3 S-PMSI AD Route Sent by the root PE when creating a S-PMSI
-
4 S-PMSI leaf AD Route Sent by receiver PEs, to join a S-PMSI
-
5 Source Active AD Route Propagated information on active sources
-
6 Shared tree join route Equivalent to pimjoin( * ,g)
7 Source tree join route Equivalent to pim join(s,g)
An initial check might involve verifying if every PE is advertising a type-1 route (1-PMSI autodiscovery). Types 5, 6 and 7 are a
translation of (respectively) PIM register source, j o in-to-RP and join-to-source messages. When running MVPN in SPT-only
mode, checking for type-5 routes is a good way to verify quickly if a PE has knowledge of sources registered elsewhere, while
types 6 and 7 are useful when following PIM state from the receiving CE towards the source CE (for type 7) or towards the RP
(for type 6 ). Finally, type 3 and 4 are useful for checking selective PMSls; a type-3 route should be advertised by each PE
which wants to set up a selective tree, and interested receiving PEs should 'answer' with a type-4 route in order to be
included in the multicast distribution tree .
For more information of the encodings and functions of the different MVPN route types, please see the document "NG-MVPN
route types and encodings " ava ilable on the Juniper Networks Knowledge Base with document-id TN-115.
Group : 224 . 7 . 7 . 1
Source : 10 . 0 . 101 . 2/32
Upstream interface : lsi . 33554432
Downstream interface list :
ge-1/0/9 . 200
Number of outgoing interfaces : 1
Session descrintion : Unknown
Statistics : 138 kBps , 262 pps , 998294 packets
Next- hop ID : 1048579
Upstream protocol : MVPN
Route state : Active
Forwarding state : Forwarding
Cache lifetime/timeout : forever
Wrong incoming interface notifications : 0
Uptime : 01 : 03 : 27
The command also shows the number of packets discarded due to Reverse Path Forwarding Check Fai lure, in the line titled
''Wr ong i ncomi ng i nter f ace no t i fi cati o n".
Summary
■ In th is content, we:
• Used a structured approach to troubleshoot Layer 3 VPNs
• Became familiar with commands and tools to check both the signaling and the
forwarding plane
• Troubleshot MVPNs
We Discussed:
• Using a structured approach to troubleshoot Layer 3 VPN issues;
• Usef ul commands and tools to check both the signaling and the forwarding plane; and
Review Questions
Review Questions
1.
2.
3.
2.
The show bgp neighbor command will display the address f amily configured on both the local and the remote end of
the BGP session.
3.
The typical cause of hidden routes in the bgp.13vpn.O table is the lack of a LSP to the advertising PE.
Engineering Simplicity
Junos Layer 3 VPNs
Objectives
We Will Discuss:
• IP multicast traffic flow;
• Components of IP multicast;
➔ Multicast Overview
■ Reverse Path Forwarding
■ Internet Group Management Protocol
■ Draft Rosen Overview
■ Draft Rosen Limitations
■ Address types
• Unicast addresses: one-to-one
• Broadcast addresses: one-to-all
• Multicast addresses: one-to-many
Multicast: A single data stream from the server is needed to reach all clients
Single Data
.,_--. Strl m.---..c-- Network
-----
Server
Clients
Address Types
In IP networking three types of addressing are typ ically used for the communication between hosts:
• Unicast addressing: Unicast addresses are used when a host wants to send traffic to another specific host.
Each host requ ires its own unique IP address for this type of traffic.
• Broadcast addressing: Broadcast addresses are used when a host wants to send traffic to all hosts on a given
subnet. Each subnet has its own broadcast IP address. Traffic to the broadcast address is typica lly not
forwa rded by the router. Some types of broadcast traffic (for example, DHCP) might need to be forwarded to
other parts of the network.
• Multicast addressing: Multicast addresses are used when a host wants to communicate with a group of hosts
that are interested in t hat specific traffic. Different types of multicast applications exist, such as where one host
sends traffic to many interested receivers (one to many), and other applications that send traffic between all
the interested hosts (many to many).
A more recent type of addressing that is used in IP networking is the anycast address. The concept of anycast addressing is
that a group of receivers a ll share the same address. When traffic m ust be delivered to the anycast address, it is delivered to
the nearest member of the group. An example of where anycast addressing is used is Domain Name System (DNS) anycast.
In mu lticast it is also used in a featu re called anycast RP. An advantage of anycast addressing is that it provides a very fast
convergence in case one of the members of the group disappears.
Multicast Components (1 of 2)
■ Components:
• Source: Originator of multicast IP packets
• Multicast IP packet: An IP packet destined for a multicast group address
• Group address: An IP address in the range of 224/4
• Receivers: IP hosts interested in receiving data destined for a particular group
address (also called group members)
• DR: Router closest to the source that forwards multicast
IP packets
• Multicast IP packet: A multicast packet is any IP packet that is destined to a multicast group address. The same
packet should have a unicast source address. Generally, a multicast packet uses UDP, the Real-Time Transport
Protocol (RTP), or both as its transport protocols. No gua rantees exist t hat packets will be received by all
members of a group. One protocol, the Pragmatic General Multicast (PGM) protocol, has been developed to add
loss detection and retransmission capabilities to multicast.
• Designated router (DR) : The DR is the router closest to the source that forwards multicast packets into the
network. If two or more routers are attached to the source, only one ever becomes the DR based on an election
algorithm t hat depends on the multicast ro uting protocol in use.
Multicast Components (2 of 2)
Group
Network Membership
Protocol
._/
Source Multicast Routing Receivers
---:i....... Protocol
No special protocol
needed
■ Components (contd.):
• Group membership protocol: Protocol used by receivers to communicate
group membership to the closest attached router
• IGMP for 1Pv4
• Multicast routing protocol: Protocol used between routers in the network to
build and maintain the multicast forwarding trees between sources and
•
receivers
• PIM and DVMRP
C/ 2020 Juniper Networks, Inc .All Rights Resenie<I.
Jon1per 8us1ness Use Onty
• Group membership protocol: Receivers use a group membership protocol to inform the directly connected
router of their interest in receiving packets for one or more multicast group addresses. That is, the host receiver
is informing the router of its desire to become a member of a multicast group. IGMP is used by IP version 4
(1Pv4) hosts and routers for this purpose. Th is materia l focuses on 1Pv4 multicast.
• Multicast routing protocol: A multicast routing protocol is used between routers to build and maintain the
multicast forwarding trees between source and receiver. The fo llowing slides describe the basic functionality of
a multicast routi ng protocol. The two most common multicast routing protocols are Protocol Independent.
Multicast Terminology (1 of 4)
■ Service models:
• Any-source multicast:
• Supports one-to-many and many-to-many applications
• Source-specific multicast:
• Supports only one-to-many applications
Service Models
We use t he following terminology for multicast service models:
• Any-source multicast (ASM ): This delivery model was designed into the origina l specifications for multicast in
RFC 1 1 12. The model supports both one-to-many applications like Internet Protocol Television (IPTV), as well as
many-to-many applications like white boarding or video conferencing. ASM gets its name from receivers being
able to j oin a group without specifying from wh ich so urce they want to receive traffic, so they accept it from any
source.
• Sou rce-specific multicast (SSM): In SSM, the rece iver specifies the sources from which it wants to rece ive the
traffic. It can also specify from which sou rces it does not want to receive traffic. So for SSM to work, the source
information must be known . SSM makes deployment of multicast less complex and also makes allocating
mult icast addresses easier.
Multicast Terminology (2 of 4)
■ Distribution modes:
• Dense mode:
• Flood and prune
• Prune signals no interest in receiving multicast traffic
• Graft overrides previous prune messages
• Sparse mode:
• Explicit subscriptions only
• Join message signals interest in receiving multicast traffic (subscribe)
• Prune sent to unsubscribe from multicast traffic
• Sparse-dense mode:
• Router interface performs either mode for individual multicast groups
• Uses dense-mode and sparse-mode rules
Distribution Modes
We use t he following terminology for multicast distribution modes:
• Dense mode: In dense mode, traffic is forwa rded to all parts of the network (wh ich is known as flooding). The
parts of the network that are not interested in receiving the traffic send prune messages to thei r neighboring
routers asking them to stop forwarding traffic. In case a receive r subscribes after sending the prune, the router
sends a graft message asking for the traffic to be forwa rded again.
• Sparse mode: In sparse mode, traffic is forwarded only into parts of the network with interested receive rs. The
routers send j oin messages to indicate their wi llingness to receive traffic. If a receive r is no longer interested,
the ro uter sends prune messages to the neighbor asking it to stop forwarding the t raffic.
• Sparse-dense mode: Sparse-dense mode allows the router interface to operate on a per-group basis in either
sparse or dense mode. A group specified as dense is not mapped to an RP. Instead, data packets destined for
that group are forwarded by means of PIM dense-mode rules. A group specified as sparse is mapped to an RP,
and data packets are forwarded by means of PIM sparse-mode rules.
Multicast Terminology (3 of 4)
■ Distribution trees:
• Source tree or shortest-path tree
• Known source
• S, G forwarding state
• Used in dense mode and in sparse mode
• Shared tree or rendezvous point tree
• Unknown source
• *, G forwarding state
• Used only in sparse mode
Distribution Trees
We use the following terminology for multicast distribution trees:
• Source tree or shortest-path tree (SPn: A source tree is the forwarding path for the traffic from a specific source
all the way up to the router that is closest to the receiver. A source tree is the shortest path between source and
receiver and can on ly be used when the router next to the receiver knows about the source. The routers keep
the forwarding path from the receiver to the source in the follow ing state: S, G (S comma G) . S indicates source
address and G indicates group address. In dense mode a source tree is always used. In sparse mode a source
tree is used after the receiver router learns about the source.
• Shared tree or rendezvous point tree : If the source is not known, a source tree cannot yet be built. In the ASM
model, the receivers subscribe to a group address using IGMP. In the subscription request, they do not indicate
the source. The routers must build a tree toward an unknown source. The solution to this problem is to have a
meeting point for sources and receivers in the network. This meeting point is called a rendezvous point (RP).
The tree built from the receiver to the RP in the network is called a shared tree (because it is shared by all
receivers) . The routers keep the forwarding path from the receiver router to the RP in the following state: * ,G (*
comma G). The* indicates any source and the G indicates the group address.
Multicast Terminology (4 of 4)
■ Multicast forwarding:
• Source is considered upstream (root of tree)
• Receiver is considered downstream (leaf on branch of tree)
Multicast Forwarding
In multicast forward ing, the path between source and receiver is called a tree. The source is the root of the tree. The tree
branches out into the network, and at the end of the branches are the receivers (or leaves). The source is considered
upstream and the receivers are downstream. Branches of the tree are created when receivers join, and are torn down when
receivers leave. In the case of a shared tree, the RP is considered upstream and the root of the tree .
I
I
I
"- I RP
I
I 10.1.1.1
R3 R4
Source Tree
{S, G) State ~
Group: 224.7.7.7 Shared RPT Tree
Source: 192.168.100.10 f (
I (*,G) State
,..I I
I • Group: 224.7.7.7
•
'
♦ Source: *
Q Receiver
224.7 .7.7
---►
• Source Tree: The source tree, or shortest-path tree, bu ilds the forwarding path from source directly toward the
receiver. The forwarding state kept in the routers between source and receiver uses the S,G notation.
In dense mode, the shortest-path tree is always used between the source and any router in the network during
the f looding process. Any part of the network that does not have receivers prunes the distribution tree. The
resu lt is a source tree with branches to the parts of the network that actually have receivers.
To join a shortest-path tree in sparse mode, S,G join mes.s ages are exchanged . In case a rece iver is no longer
interested in receiving traffic from the source, S,G prune messages are sent by the router closest to the
'
receiver.
• Shared Tree : The shared tree is used if the source address is not known . In that case the only option is to
enable the forward ing state up to the RP. The forwarding state toward the rendezvous point uses the * ,G
notation.
Once the source starts sending traffic, the router closest to the source sends the traffic to the RP, and from
there it can be sent to the receiver. All routers in the network must agree on which router is the RP, so source
and receivers can be connected in the network.
The advantage of using shared trees is that they typically generate less state information in the network,
because it is not necessary to create a unique source tree for each session in the network. The disadvantage is
that the path between source and receiver across a shared tree is often not optima l. This issue is especially
important for delay-sensitive traffic.
• Multicast Overview
➔ Reverse Path Forwarding
• Internet Group Management Protocol
• Draft Rosen Overview
• Draft Rosen Limitations
Multicast Forwarding
When forwarding unicast traffic, the router is primarily concerned with the destination address. The goal of unicast
forwarding is to send the packet in the direction of the destination. A route lookup is performed to find the best route toward
the destination, and the packet is sent in that direction. Multicast forwarding is not initially concerned about the destination
address of a multicast packet.
Multicast forwarding bases its decisions primarily on the source address of the incoming packet. The goals of multicast
forwarding are to make sure traffic sent toward the receivers does not loop in the network and also to avoid packet
duplication. To make sure no loops or duplicated packets exist, multicast routing sends only a single packet down each
branch of the distribution tree .
To determine which incoming packets are sent down the distribution tree, multicast forwarding uses the reverse path
forwarding (RPF) check. The RP F mechanism basically selects packets to forward down the distribution tree only if the
packet was rece ived on the interface that is nearest to the source.
The RPF check looks into the routing table to determine the best route back to the source. The next-hop interface of that
route must be the incoming interface of the multicast packet. If the interfaces match, the packet pas.s es the RPF check and
can be forwarded down the tree. If the incoming interface does not match the route back to the source, the RPF check fa ils
and the packet is d iscarded.
172.18.1.1
·--.------·
••••••••••••••••••••••••••••••••
•
••
• •
•
••
ge-0/0/4.125
R1
Packet from Source 1 arrives on wrong interface: : •• ■ •••••• , -
Multicast Traffic
•••••••••••• ♦
I
C/2020 Juniper Networks, Inc .All Rights ReseM!<I.
Jon1per8us1ness Use Onty
ge-0/0/4.1
◄· ..........
♦
♦
R1 ♦
••
•
Packet f rom Source 1 arrives on correct interface: ♦
• Forwarding plane: A successful RPF check allows traffic from an incoming interface to be forwarded down the
distribution tree. The incoming interface is considered the upstream interface because the source is upstream.
The receivers are downstream on the tree so the interfaces to which the traffic can be forwarded are called
downstream interfaces. The group of interfaces with downstream receive rs is ca lled the outgoing interface list
(OIL). The result of a successful RPF check is cached in table i ne t. 1.
• Control plane: The RPF check is also used in the control plane. If a router must receive traffic because of
downstream receivers, it signa ls only to upstream routers on the interface that would pass the RPF check.
Therefore, join and prune messages are on ly exchanged with neighboring routers on the interface to the
upstream router nearest to the source. The receipt of IGMP or PIM join mes.sages moves those interfaces to the
OIL, so packets are forwarded to these interfaces toward the receivers.
• inet . o: The default table used by the RPF check process is the same as the unicast forward ing table. Thus,
the unicast topology and multicast topology are identical.
• inet . 1 : The results of successful RPF checks for forwardi ng traffic are cached in a separate i ne t. 1 table.
• inet . 2: If you must have a separate topology for multicast forwa rding, you can achieve this sepa rate topology
by changing the table the RPF check uses. Therefore, instead of looking in the default i net . o tab le, the RPF
check ca n be directed to look in i net . 2. The inet . 2 table must be fi lled with routing information to build the
alternate topo logy used by t he RPF check:
Routing protocols like multiprotocol BGP (M-BGP) and multi-topology IS-IS ca n place routes into ine t. 2
directly; or
Other protocols must use routing information base (RIB) groups to place routes into i ne t. 2 .
To direct the multicast routing protocols to use inet . 2 for t he RPF check, RIB groups are requ ired .
Multicast Preferred
inet . 0 M ED= 100
ine t . 2 MED= 50
---------- , RPF
RPF
Unicast Preferred
i net . 0 MED= 50
AS 65011 AS 65013
inet . 2 MED = 100
When AS 65013 sends unicast t raffic toward AS 65011, it prefers the bottom link. For the multicast traffic coming from AS
65011, the RPF check prefers the top link. If the multicast and unicast topo logies had been identical, the mu lticast RPF
check would have also preferred the bottom link.
■ Multicast Overview
■ Reverse Path Forwarding
➔ Internet Group Management Protocol
■ Draft Rosen Overview
Q Q[___II_I
---+
t t
I I
I I
Q I
-• ♦ - -4
I
I
Q
I
r:J T
I i
Normally, you do not have to run IGMP between routers because routers normally do not join multicast groups.
o ~---- Report:
OA=224.10.1.1
Group=224.10.1. 1
Querier Non-Querier
The routers on the segment cache the IGMP report information to keep track of the receivers on that segment per multicast
group address.
• Query-response process:
1. Querier router sends general query to all-hosts multicast group (224.0.0.1)
2. Host 2 sends its report for group 224.10.1.1 first
3. Host 1 hears the response from Host 2 and suppresses its report
4. Host 3 sends its report for the group 224.20.1.1
General
G) Query
The router must keep track of the receivers to make sure at least one receiver remains on any of the outgoing interfaces
because it is wasting resources if it is forwarding traffic to interfaces without downstream receivers. To check if the receivers
are still interested, the router sends periodic IGMP query messages asking if interested receivers still exist. The IGMP query
message is sent to 224 .0.0.1 (all systems). The goal of the query mes.sage is to receive a sol icited report message back from
at least one receiver per group. Therefore, it is not useful if more than one receiver responds per group as the router only
needs one to keep the interface in the outgoing interface list.
To avoid dupl icate answers to the query message, the response from the receivers is controlled by a randomized timer
mechanism. Each host waits a random time before sending a report message as an answer. In case another receiver in your
group has already answered (shorter timer), the other receivers in that group suppress their responses. Th is mechanism
results in one report answer per group to the query message from the router.
If more than one router exists on a given segment, the routers elect one active querier router. Each router starts out th inking
it must start querying, but as soon as it sees queries from another router with a lower IP address, it stops. These non-querier
routers that lose the querier election still keep track of the IGM P cache.
Host 3
G)
Leave-group
Q
Group=224.10.1.1
Group-Specific
Query
Group=224.10.1. 1
Router A
(Querier) ....~ - - - - - -
In IGMP version 2, this problem is solved by having a specific IGMP leave message that a host should send when it is no
longer interested in traffic for a specific group. The leave group mes.s age is sent to the group's multicast address. When a
router receives a leave message, it sends a group-specific query to find out if other receivers for that group are still on the
interface. The remaining receivers should respond to the group-specific query to indicate that there is at least one receiver
remaining on the interface. The advantage of this method is that the leave latency is greatly reduced because the timers in
use are much lower.
■ Multicast Overview
■ Reverse Path Forwarding
■ Internet Group Management Protocol
\ ,I
I
L3VPN
L2VPN VPLS ?•
(unicast only)
Note: Legacy draft-rosen L3VPN multicast schem e does not conform to this model.
Multiservice Network
Th is slide illust rates the general model for multiservice network.
Draft Rosen
There was a time when draft-Rosen was the standard by which multicast was transported between Layer 3 VPN (L3VPN)
sites. This method does not rely on either MPLS or BGP. Instead, not only does the customer need to run a multicast routing
protocol like Protocol Independent Multicast (PIM) but the service provider network must also use PIM to signal the end to
end path of the L3VPN multicast traffic. Also, MPLS is not used to transport the multicast data between sites, instead,
multicast generic routing encapsulation (GRE) tunnels are used.
------
• •
•• ••
Source • •
.....
□
:
···········-
...........•
···········-
\
• P-RP
Provider Core
OSPF Area 0
PE-2
loO: 192.168.24.1
0
+--1.1.1.1 : •
■- ■ ■
• •
• •
•
••• •
••
• •• .............
............
............
PE-1 AS 65412
•
•
••
·-··
Rece1ver
1 loO: 192.168.16.1 ••
• •
•
239.1.1.1 1.1.1.1 224.7.7.7 M-cast Dal - - - ~f 1.1.1 1224 7 7 7 IM-cast Dal~
11.1.1.1 1224 7 7 7 E -cast Datf- -
SA DA :
- • 192.168.16.1
GRE-SA GRE-DA SA DA
•
: SA DA
•
CE2 CE4
• CE3
• -
CE2 CE4
CE1 ••
••
•
♦
••
Multicast
Domain (M__
D_) Default MDT
239.10.11 .11
10.1.1.2
•• • •••• • •• • ••• • •
•• ••
CE3
••
MC Source •·•.
•• •• ... ...
... ......... MC Receiver
... ......
•• ••
•• ••• ---,-
----==--
-- --
••••••••••
• •• • •••
••• ••
CE2 CE4
MC Receiver
Draft-rosen MVPNs with service provider tunnels start by send ing all mu lticast traffic over a default MDT, as described in
section 2 of the IETF Internet draft draft-rosen-vpn-mcast-06.txt and section 7 of the IETF Internet
draft draft-rosen-vpn-mcast-07.txt. Th is default mapping results in the delivery of packets to each provider edge (PE) router
attached to the provider router even if the PE router has no receive rs for the multicast group in that VPN. Each PE router
processes the encapsu lated VPN traffic even if the mu lticast packets are then discarded.
Let's say that the Customer in the diagram above having routers CE1, CE2, CE3, and CE4 has Multicast address
239.10.11.11 in the ISP Core. Each of the PE routers wi ll attempt to form a GRE tunnel with the other PE route rs. The PE
routers will also j oin the Mu lt icast group 239.10.11.11 in the ISP core. The result is that the PE routers now will send GRE
tunne led traffic which will end up at all other PE routers since the destination address is the Multicast IP address.
-~-----------,.- p
---- -- ~
PE1 New Data Mor"j;;; Tl-- - ~ ~- ;- ~- ;-
V sent ~
- - -~
_ ~ ~ ~~ 10.1.1.3
MDT (S,NG). (S,GJ. over Default MDT - - - - -
in VRF instance T!.V - - - - CE4
CE2 UDP
Not receiving
• PE routers connected to receivers in the VRF instance for the current multicast group cache the contents of the
MDT join TLV, adding a 180-second timeout value to the cache entry, and a lso j oin the new data MDT group.
• PE routers not connected to receivers listed in the VRF instance for the current multicast group also cache the
contents of the MDT j oin TLV, adding a 180-second timeout value to the cache entry, but do not join the new
data MDT group at this time.
When a remote PE router joins the new data M DT group, it sends a PIM j oin message for the new group directly to the source
PE router from the remote PE routers by means of a PIM (S,G) join.
To display the information cached from MDT join TLV packets received by all PE routers in a PIM-enabled VRF instance, use
the show pim mdt data-mdt-joins operational mode command .
MC Source
- Exceeds transmit rate
• • • • • • • • • • • • • • • • Multicast traffic
- - - - - - - - GRE tunnel
Default MDT Data MDT new group
Multicast 239.10.11.11 (NG) 10.1.1.2
Domain (MD) •• ••
CE1
239.10.11 .12
-- -- - •
r .... ••
• • •••••• CE3
----- -- -- PE2
MC Receiver
---------- -- - ------
PE1
---- ---- ----
CE2
- - --- -- --
PE1
New Data
CE2
• Draft-rosen multicast VPNs with service provider tunnels operating in any-source multicast (ASM ) mode (also
referred to as rosen 6 Layer 3 VPN multicast)- Described in RFC 4364,BGP/ MPLS IP Virtua l Private Networks
(VPNs) and based on Section 2 of the IETF Internet draft draft-rosen-vpn-mcast-06.txt, Multicast in MPLS/ BGP
VPNs (expired April 2004).
• Draft-rosen multicast VPNs with service provider tunnels operating in source-specific multicast (SSM) mode
(also referred to as rosen 7 Layer 3 VPN multicast)- Described in RFC 4364,BGP/ MPLS IP Virtua l Private
Networks (VPNs) and based on the IETF Internet draft draft-rosen-vpn-mcast-07.txt, Multicast in MPLS/ BGP IP
VPNs. Draft-rosen multicast VPNs with service provider tunnels operating in SSM mode do not require that the
provider (P) routers maintain any VPN-specific Protocol-Independent Multicast (PIM) information .
■ Prerequisites:
• Functional routing protocols in provider network
• Functional VPN configuration
• VPN import and export policies
• Routers to support multicast tunnel (mt) interfaces
• PE routers
• P routers acting RP
• CE routers acting as a Source's DR or as a RP
• Check how many mt interfaces your tunnel capable PIC supports
- Default MDT uses 2 (encapsulation and decapsulation)
Make sure that the routing devices support multicast tunnel (mt) interfaces for encapsulating and de-encapsulating data
packets into tunnels. For multicast to work on draft rosen Layer 3 VPNs, each of the following routers must have tunnel
interfaces:
• Any customer edge (CE) router that is acting as a source's DR or as an RP. A receiver's designated router does
not need a Tunnel Services PIC.
Each PE sends an MDT subsequent address family identifier (MDT-SAFI) BGP network layer reachability information (NLRI)
advertisement. The advertisement contains the following information:
• Route distinguisher
• Unicast address of the PE router to which the source site is attached (usually the loopback)
MDT-SAFI updates are BGP messages distributed between intra-AS internal BGP peer PEs. Thus, receipt of an MDT-SAFI
update enables a PE to autodiscover the identity of other PEs with sites for a given VPN and the default MDT {S,G ) routes to
join for each. Autodiscovery provides the next-hop address of each PE, and the VPN group address for the tunnel rooted at
that PE for the given route distinguisher ( RD) and route-target extended community attribute.
Each remote PE router imports the MDT-SAFI advertisements from each of the other PE routers if the route target matches.
Each PE router then joins the (S,G) tree rooted at each of the other PE routers.
After a PE router discovers the other PE routers, the source and group are bound to the VPN routing and forwarding (VRF)
through the multicast tunnel de-encapsulation interface.
■ Prerequisites:
• Functional routing protocols in network
• BGP and IGP
• Functional VPN configuration
• VPN import and export policies
• Routers to support multicast tunnel (mt) interfaces
• PE routers
• P routers acting RP
• CE routers acting as a Source's DR or as a RP
• Check how many mt interfaces your tunnel capable PIC supports
- Default MDT uses 2 (encapsulation and decapsulation)
- Eventual data MDTs add on top of the default MDTs
• Any customer edge (CE) router that is acting as a source's DR or as an RP. A receiver's designated router does
not need a Tunnel Services PIC.
■ Multicast Overview
■ Reverse Path Forwarding
■ Internet Group Management Protocol
■ Draft Rosen Overview
➔ Draft Rosen Limitations
By sending the Multicast traffic by default over the default MDT forces all participating PE routers to rece ive the traffic no
matter whether they have active receivers or not. It also means that both control plane and data plane share the same
tunnel.
Since the Multicast trees in the SP Core are set up as default MDTs per customer there is a scalability issue in running a
large number of Multicast streams through the network. without a simple way of providing aggregation of the trees.
ASM uses GRE tunne ls for the Multicast distribution between the PE routers which adds on both protocol overhead and
encapsulation/ decapsulation. It a lso requires PICs supporting tunneling protocols.
One VRF on a PE router must mainta in PIM adjacencies with all other VRFs of that MVPN, i.e. PIM adjacency is maintained
per MVPN per PE, not j ust per PE. In addition to PE adjacencies the VR F also must maintain PIM adjacencies with all of its
locally connected CEs of the VR F's MVPN.
Inter-AS or inter-provider deployment requires PE routers in different ASs (provider networks) to have peering between the PE
routers and have at least one VPN in common.
Summary
We Discussed:
• IP multicast traffic flow;
Review Questions
Review Questions
1.
2.
3.
2.
To verify that packets are received via the shortest path between the multicast source and the local router.
3.
IGMP is used to inform the directly connected routers that the local router desires to receive specific multicast packets.
Engineering Simplicity
Junos Layer 3 VPNs
Objectives
We Will Discuss:
• The flow of control traffic and data traffic in a next-generation multicast virtual private network (MVPN);
■ Monitoring
MPLS forwarding has evolved as well. With the advent of the point-to-m ultipoint LSP, an MPLS-based network can provide
multicast-like forwarding capabi lities without the need for running multicast protocols.
The draft-Rosen method of delivering mu lticast content has some scaling limitations. For example, cons ider an example
where a PE has 1,000 VRFs, and each of these VR Fs co rresponds to an MVPN that is present on 100 PEs. The PE would
need to maintain 100,000 PIM adjacencies with other PEs. The rate of PIM Hellos that t he PE would need to process is
3,300 per second.
• I ' . ~
L3VPN
I tIPTV
• (unicast and L2VPN VPLS ?•
multicast)
The PIM adjacency problem between PEs that was found in draft-Rosen no longer exists. Instead, a PE router m ight on ly
need a few BGP neighbor relationships with route-reflectors, wh ich might also be the same route-reflectors used for the
L3VPN.
■ Terms
• PMSI: Type of tunnel to use to transport multicast data across the provider
core (also called provider tunnel)
• RSVP point to multipoint LSPs
• Provider instance PIM distribution trees (similar to draft-Rosen)
• MLDP
• 1-PMSI
• Multidirectional: All PEs in an MVPN can transmit multicast packets to all other PEs
participating in MVPN
• Unidirectional: Enables only a particular PE to transmit multicast packets to other PEs
• S-PMSI
• A particular PE can transmit multicast packets to a subset of PEs
• Provider-Multicast Service Interface (PMSI): Tunnel used to transport multicast data from PE to PE. It is also
ca lled a provider tunnel. Provider tunnels can take several forms including RSVP-traffic engineered
point-to-multipoint label-switched paths (LSPs), provider instance PIM distribution trees, and Multipoint Label
Distribution Protocol (mLDP).
Multidirectional 1-PMSI: Allows all PEs of a multicast VPN (MVPN) to transmit multicast data between
each other (one point-to-multipoint LSP from al l PEs to al l other PEs).
Unidirectional 1-PMSI: Allows a single PE to transmit multicast data to other PEs (one point-to-multipoint
LSP from a single PE to all other PEs).
• Selective-PMS! (S-PMSI): A PE can transm it multicast packets to on ly those PEs of an MVPN that have
expressed interest in being part of the multicast forwarding tree.
• AFI 1/SAFI 5
• Routes tagged with correct route target community are placed into the bgp . mvpn . o and
routing-instance . mvpn . 0 table
• New MVPN BGP attributes
• P-Multicast Service Interface Tunnel (PMSI Tunnel) attribute
...--
MP -----
........ ------
LS label that receiving PE should
expect as an inner label for incoming
RSVP Session ID or LOP P2MP
FEC for ooint to multiooint LSPs
MVPN traffic (0 = No label)
MCAST-VPN NLRI
The NLRI format fo r next-generation MVPN signal ing can be fo und in RFC 6514. The MCAST-VPN NLRI is carried in M P-BGP
extensions with an AFI of 1 and SAFI of 5 . When t hese type of routes are received from remote PEs and accepted by a policy
t hat matches on the route ta rget community (same as L3VPNs), the receiving PE will place the routes in t he MVPN routing
t able-IN cal led bgp. mvpn. O and then into the correspond ing VR Fs MVPN routing table, routing-instance . mvpn. 0.
Type 1 NLRI
The Intra-autonomous system (AS) 1-PMSI autodiscovery route is the initial route type that is advertised between PEs of the
same MVPN allowing them to autodiscover one another. It is distributed to other PEs that attach to sites of the MVPN. The
routes carry the sending PE's route distingu isher (RD), the sending PE's loopback address, and a route target community to
allow for import into a VRF. In the case of an inclusive provider tunnel, the route will also be tagged with the PMSI Tunnel
attribute.
Type 2 NLRI
The Inter-AS 1-PMSI autodiscovery route is used to discover members of an MVPN in different ASs. Inter-AS MVPNs are
outside the scope of this course.
Type 3 NLRI
Selective MVPN Autod iscovery rout es are used t o help build an S-PMSI. This route is advertised by the multicast source's PE
in response to rece ivi ng a Type 6 or Type 7 route (described in subsequent sl ides), which are essentially requests to join the
multicast forwarding tree (BGP version of a PIM join). The slide shows t he details of what is carried in the Type 3 route. Even
though the source PE learns that the remote PE wants to receive a particular multicast stream from a type 7 advertisement,
t he sou rce PE sends the type 3 as a request to the receiver PE to j oin the S-PMSI. The most important reason for th is
message is because it is tagged with the PMSI t unnel attribute al lowing the receive r PEs t o know the deta ils of the provider
t unnel.
Type 4 NLRI
The Selective MVPN autodiscovery route is sent by an interested receiver PE (in t he case of an RSVP-signalled LSP in the
data plane) in response to receiving a type 3 route from a source PE.
5:10.255.170.100:1:32:192.168.194.2:32:224.1.2.3
t ....____ --..J t ,_________, t ■ f •
Type Sending C-S C-G
C-S C-G
PE's RD
Mask Mask
Type 5 NLRI
The Source Active autodiscovery route is advertised by a PE that discovers a source that is attached to a locally connected
site. The PE learns of t he source either from Pl M register messages, Multicast Source Discovery Protocol (MSDP) source
active messages, or a locally connected source. The source PE sends this advertisement to all other PEs participating in the
MVPN.
Type 6 NLRI
The Shared Tree Join route is advertised by a receiver PE to al l other PEs partic ipating in the MVPN in response to receiving a
PIM (* ,G) join from the local CE. It serves a similar purpose to the Pl M (* ,G) join in that it is a request to join the shared
multicast tree .
Type 7 NLRI
The Source Tree Join route is advertised by a receiver PE to all other PEs participating in the MVPN in response to receiving a
PIM (S,G) join from the local CE. It serves a similar purpose to the PIM (S,G) join in that it is a request to join the source
multicast tree .
P2
e
PE5
0PE4 0 PE3
C/2020 Juniper Networks, Inc .All Rights ReseM!<I.
Jon1per8us1ness Use Only
1. The burden of data replication is taken off of the ingress PE. Instead, each router along the path of the LSP can
help in that responsibility.
2. Multicast traffic can be protected using the standard methods of MPLS protection like fast-reroute (RSVP only)
and link protection.
3. Certain levels of performance can be guaranteed with the use of traffic engineering and bandwidth reservation
(RSVP only).
4. The service provider network does not need to run PIM to support multicast routing. Multicast routing of
customer traffic can occur on the same IP/MPLS design that was used to build the un icast L3VPNs.
■ Inclusive trees
• Each tree serves one MVPN only PE1
• All the multicast traffic in that
MVPN arriving at an ingress PE is
mapped to that same tree to get
from the ingress PE to all the
other PEs in the same MVPN
- -
PES PE2
• Analogous to default-MDT in
draft-Rosen
0PE4
Inclusive Trees
The simplest form of provider tunnel is the inclusive tree (1-PMSI). An inclusive tree serves an entire MVPN. In the diagram,
there is one inclusive tree that serves the blue VPN and one that serves the red VPN. Any mult icast traffic arriving at the
source PE (PE-1 ) wi ll be sent to all other PEs in the same MVPN. This works well when al l remote PEs need to receive the
multicast traffic but th is form of tree can be wastefu l of resources (bandwidth, packet processing, and so on ) when on ly a
few of the remote PEs need to receive multicast traffic. The solution to this problem is the use of selective trees described in
subsequent sl ides.
■ Selective trees
PE1
• Serves particular selected I
I
multicast groups from a given ,'- _Jielective Tre3
I
MVPN I
I
1'.'.?I~
; -: .:::.·
Selective Tree
Selective trees can be used to forward traffic for particular source and group combinations to the remote PE that specifically
request to rece ive that traffic. The dotted line in the diagram shows that a point-to-multipoint LSP has been built to send
multicast traffic for the red VPN to PE2 and PE4 on ly.
■ Example which shows the use of inclusive trees with P2MP LSPs
• Prior to enabling an MVPN, the PE routers have an existing L3VPN
established using LOP to signal LSPs
• The provider core does not have PIM enabled
•• ••
•
- customer PIM domai~: :+-
•
Customer PIM domain--+
•• •
•• ••
Source • •
•
•
••
Provider Core PE-2
---
••
• OSPFArea 0 loO: 192.168.2.1
• •
--1 0.0.101.2 .
:
•
•
•
••
•
• •
•
PE-1
AS 65512
1
,
loO: 192.168.6.1
C-RP
:
•
:
PE-3
•• 100: 192.168.2.2
• •
• •
• •
2. There is an existing L3VPN between all customer sites using LDP to signal the un icast LSPs;
3. PE-1 will be acting as the customer rendezvous point (RP) (with in the VRF);
4. CE-A will be acting as the customer designated router (DR) closest to the source; and
•
• Provider Core PE-2
••
•• OSPF Area 0
• •
• •
••
••• ••
•
PE-1 : •
loO: 192.168.6.1
AS 65512 •
•
•
"
•
:•: PE-3
C-RP loO: 192.168.2 .2
••
• •
• •
• •
With no source and receivers in the network, an MVPN is enabled on all t hree PEs. Once enabled, each PE will advertise its
membership to the MVPN using a Type 1 route tagged with the PMSI tunnel attribute. Each PE will automatically bui ld an
RSVP-signaled point-to-multipoint LSP to all other PEs. In the network shown on t he slide, there will only ever be a single
source attached to PE-1. Because PE-2 and PE-3, will never be attached to a source site, the point-to-multipoint LSP that
each of them insta ntiated as themselves as ingress route rs will never be used. It is possible to configure PE-2 and PE-3 as
receiver-o nly sites so that they do not bu ild the unnecessary point-to-multipoint LSPs.
When PE-2 and PE-3 eventually receive multicast traffic from PE-1 using the point-to-multipoint LSP, they wi ll need to use the
incoming MPLS label encapsulating t he multicast packets to determine which VRF to use for forward ing. Normally a
point-to-multipoint LSP is signalled with a label of 3 on the penultimate hops meaning that there would be no label
encapsulating the incoming traffic. Therefore, a virtua l tunnel interface or vrf-table-label must be configured within the VRF
to allow for a non-implicit-null label to be used on the penultimate hops.
••
.,_Customer PIM --♦ l+- Customer PIM
•
domain :• domain
•
PE-2
CE
I
PE-1
•
•
.• ~
........
Label, LSP ID - t
•
•
••
A 1 loO: 192.168.6.1 Label, LSP ID •
•
Jl •
•
•
AS 65512 PE-3
C-RP ••
•
•
100: 192.168.2.2
• •
•• ••
With no source and rece ivers in the network, an MVPN is enabled on all t hree PEs. Once enabled, each PE will advertise the ir
membership to the MVPN using a Type 1 route tagged with the PMSI tunnel attribute. Each PE will automatically build an
LOP-signaled point-to-multipoint LSP to the source as advertised in the received Type 1 PMSI attribute. In the network shown
on the sl ide, there will only ever be a single source attached to PE-1. Because PE-2 and PE-3, wi ll never be attached to a
source site, the point-to-multipoint LSP that is built to each of them with t hemselves as ingress routers will never be used. It
is possible to configure PE-2 and PE-3 as receiver-only sites so that point-to-multipoint LSPs and not built to t hem .
When PE-2 and PE-3 eventually receive multicast traffic from PE-1 using the point-to-multipoint LSP, they will need to use the
incoming MPLS label encapsulating t he multicast packets to determine which VRF to use for forward ing. Normally a
point-to-multipoint LSP is signaled with a label of 3 on the penultimate hops meaning that the re would be no label
encapsulating the incoming traffic. Therefore, a virtual tunnel interface or vrf-table-label must be configured within the VRF
to allow for a non-implicit-null label to be used on the penultimate hops.
•• •
• •
+ :• :+-
•
Customer PIM
•• : domain
• •
• •
••
••
Provider Core PE-2
•
•
•• OSPF Area 0 loO: 192.168.2 .1
•
•
•
•
•
••
PE-1
1 loO: 192.168.6.1 AS 65512
~ :•
----
PIM
Registers
C-RP
- -►
:
.••
•
•
•
••
PE-3
loO: 192.168.2 .2
••
•
CE
Provider Core PE-2
. B
•
···········-
.............
·-··
••
•• OSPF Area 0 loO: 192.168.2.1
~ 10.0.101.2
I
•
•
•••
•
•
•-
Receivers
CE PE-1
AS 65512
A 1 loO: 192.168.6.1
"
C-RP ::•
•
•
PE-3
100: 192.168.2.2
• •
• •
• •
C/2020 Juniper Networks, Inc .All Rights Resenie<I.
Jon1per8usiness Use Onty
Jun1Per
.iETWOffKS
21
1-PMSI Forwarding
■ After multicast forwarding tree is built
• CE-A sends native multicast packets to PE-1
• PE-1 encapsulates packets in a single MPLS header
• Outbound MPLS label is derived from the point to multipoint LSP
• P2 sends copies of packets to both PE-2 and PE-3
• Receiver PE's pop outer label and send traffic based on VRF
I S-IP , 224.7.7.7 I M-castData !
SA DA :
__ - + I Label
MPLS
I S-IP , 224.7.7.7 I M-castData l
SA DA
- - - ►
• SA
I S-I P , 224.7.7.7 I M-castData !
DA
.,_customer PIM domain -= •
•
•
l+- Customer PIM domain
•
•
-♦
•• •
□
• •
•• •
• Provider Core
• PE-2
•
-··..-
···········- •
·······--
···········-
· •• OSPF Area 0
~
•
••
♦ ..... s -l P=10.0.101 .2 •
•
•
••
Receivers
1
PE-1
loO: 192. 168.6.1
•
AS 65512
~
~ ••
C-RP • PE-3
•
• loO: 192.168.2.2
•
•• •
• ••
1-PMSI Forwarding
Now that the multicast forwarding tree is complete, mu lticast traffic can be sent from end to end. From the source to PE-1,
multicast packets are forwarded in the ir native format. From PE-1 to Pl, multicast packets are encapsulated in the MPLS
header that is associated with the point-to-multipoint LSP that uses PE-1 as the ingress router. Pl simply performs a label
swap. At P2, because of the behavior of point-to-multipoint LSP, the data traffic is repl icated, the label is swapped, and then
sent to both remote PEs. The receiving PEs pop the incoming label and use the label to determine the VRF to use for
forward ing. The receiving PE then sends the multicast traffic in its native format toward the receivers.
PE-1
1 loO: 192.168.6.1 AS 65512
JI :• PE-3
C-RP :
•
•
loO: 192.168.2.2
•• ••
• •
2. There is an existing L3VPN between all customer sites using LDP to signal the un icast LSPs;
PE-1 AS 65512
loO: 192.168.6.1
•
"
•
• PE-3
C-RP •
••
• loO: 192.1 68. 2.2
• •
• •
• •
C2020 Juniper Networks, Inc .All Rights ReseM!<I.
Jon1per8us1ness Use Onty
•
•• ••
~ Customer PIM domain- : ;+- Customer PIM domain ...,.
•• •
•
•• ••
• •
•
• Provider Core
• PE-2
•
. ---10.0.101.2
••
•
••
•
•
•
OSPF Area 0
PE-1 AS 65512
1 lo0: 192.168.6.1
"
C-RP :;• PE-3
-1P
- IM- R-eg-ist-ers--1- - ► j loO: 192.168.2.2
•
•
•
"
C-RP ::•
••
PE-3
loO: 192.168.2.2
• •
•• •
•
• 0 OSPF Area 0
--10.0.101.2 :•
••
•
•
~
Receiver
PE- 1 AS 65512
loO: 192.168.6.1
JI :• PE-3
C-RP :
• loO: 192.168.2.2
•
••
•
••
•
C2020 Jun,perNetworl<s, Inc .All Rights Resenie<I.
Jon1perausiness use Only
Upon receiving the Type 7 advertisement from the PE-2, PE-1 sends a Type 3 S-PMSI autod iscovery route tagged with PMSI
Tunnel attribute with t he leaf information required bit set. PE-2 now knows the RSVP session ID of the point-to-multipoint LSP
that will be used for forwarding. PE-2 then responds to PE-1 with a Type 4 Leaf autodiscovery route. PE-1 builds a
point-to-multipoint RSVP-signaled LSP to all PEs that responded with a Type 4 . In this case. PE-1 bui lds a point-t o-multipoint
LSP to a single end-point, PE-2. Finally, PE-1 sends a PIM (S, G) join upstream to the cust omer's DR router, CE-A. At the point
the mu lticast forwarding tree is complete and multicast traffic forwarded from the source to receivers.
+-
---- :
....
- - - -- - . •
PIM (S,G) Join : .0 ~--------~~---~-~ =
LOP PMSI -P2MP, Root IP Address (PE- 1), LSP ID
.+- Customer PIM domain --+
•
•
. -c ustomer PIM domain + : •
•
•
Provider Core PE-2
>oi::.
.
Label, LS~P~I
OSPF AreaO (D too: 192.168.2.1
- 10.0.1 01.2
~ - ~
Receiver
PE-1 Label, LSP ID
loO: 192.168.6.1 Label, LSP ID AS 65512
"
C-RP
:•:
•
PE-3
loO: 192.168.2.2
•
• ••
•
• •
C2020 Jun,perNetworl<s, Inc .All R,ghlS Resenie<I.
Jon1per8usiness Use Only
Upon receiving the Type 7 advertisement from the PE-2, PE-1 sends a Type 3 S-PMSI autod iscovery route tagged with PMSI
Tunnel attribute which includes a PMSI type of P2MP, IP address of the root (PE-1), and the LSP ID. PE-2 now knows
everything it needs to know to build an LOP signa led point-to-multipoint LSP that will be used for multicast data forward ing.
PE-2 then responds by sending a P2MP FEC to its upstream neighbor in the direction of source. This process continues until
a complete P2MP lsp is setup fro PE-2 (an egress PE) to PE-1 (ingress and root PE for the LSP). Finally, PE-1 sends a PIM (S,
G) j oin upstream to the customer's DR router, CE-A. At the point the multicast forwarding tree is complete and mu lticast
traffic forwarded from the source to rece ivers.
Tunnel Services
Assuming every router is runn ing the Ju nos OS, tunnel services must be enabled on certain routers. Some routers require a
Tunnel Service PIC or Adaptive Service PIC to provide tunnel services . In the case of the MX Series device, the feature j ust
needs to be enabled as shown on the slide.
• DR closest to source - Tunnel services are needed because the DR must encapsulate multicast traffic in unicast
messages ca lled register messages;
• Customer's cand idate RP - Tunnel services are needed because the RP must de-encapsulate the register
messages received from the DR; and
• All MVPN PE routers - Tunnel services are needed because it allows the PE to pop the incoming MPLS header
from the incoming multicast traffic, perform an RPF check on the multicast traffic, and then forward the traffic
out of the VRF interface. This is assuming that a virtual tunnel interface is used. Optionally,
v rf - t ab l e- l a b e l can be configured without the need for tunnel services.
■ Junos OS supports:
• Provider Tunnel Types
• Ingress Replication (using P2P LSPs)
• RSVP P2MP
• LOP P2MP
• PIM- ASM Tunnels
• PIM-SSM Tunnels
• Data MDT Tunnels
• PIM features
• Pl M Sparse Mode
• PIM Dense Mode
• Auto-RP
• Bootstrap Protocol
C/2020 Juniper Networks, Inc .All Rights Resenie<I.
Jon1per8us1ness Use Only
Jun1Per
.iETWOffKS
30
Junos OS Support
The slide shows the protocols that are supported when enabling next-generation MVPNs using Ju nos OS.
Configuration
The slide highlights the topic we d iscuss next.
MP-BGP Configuration
To allow for BGP neighbors to exchange the new MVPN NLRI, f a mil y inet-mvpn sign a ling must be enabled on all
participating PE routers.
.. . provider- tunnel {
provider- tunnel { selective {
ldp- p2mp ; group 224 . 7 . 7 . 7/32 {
} source 10 . 0 . 103 . 2/32 {
• • •
l dp -p2mp ;
vrf- table- l abe l ; }
.. . }
}
Customer Pl M Configuration
Within the VR F, you must configure mult icast routing that is specific to the customer's multicast domain. This configuration is
shown as the PIM configuration in the s lide. Also, you must enable the mvpn using the mvpn statement. There are several
settings available under the mvpn hierarchy. The sl ide shows the configuration of the mvpn -mode. There are two options for
the mode. First is the sp t -on ly mode, which allows for only shortest path trees to be bui lt from receiver PEs toward the
source (Type 7s only). The second mode is r p t -spt mode which allows for both rendezvous point based trees and shortest
path trees to be built from receiver PE to source (Type 6s and Type 7s allowed ). Subsequent slides will show more options
that are available under the mvpn hierarchy.
VRF Configuration
Th is slide shows the full, working VRF configuration for PE1.
■ Provider tunnels
[edit routing-instances mcast-pe-vrf)
user@pel i s e t provider-tun nel ?
Possible completions :
■ MVPN settings
[edit routing- instances mcast- pe- vrf]
user@peli set p r o tocols mvpn ?
Possible completions :
Provider Tunnels
There are several options available for provider tunnels.
• i ngr ess-repl icat i on: point to point LSPs (RSVP or LDP) are used for multicast data transport. Ingress PE
performs all mu lt icast rep lication;
• l s p -p2mp: Used to configure an 1-PMSI between PEs using LDP point-to-multipoint LSPs;
• mdt: Used to configure Multicast Data Tunne ls as provider tunnels;
• p i m-asm: Used to configure PIM any source provider tunnels;
• p i m-s sm: Use t o configure PIM source specific provider tunnels;
• r svp-te : Used to configure an 1-PMSI between PEs using RSVP-traffic engineered point-to-multipoint LSPs;
and
• select i ve: Used to configure an S-PMSI between PEs using either RSVP or LDP point-to-multipoint LSPs.
MVPN Settings
It is under the MVPN settings that you can specify whether a s ite is a sender-only site or receiver-only site. By default, every
site is both a sender and rece iver site. You can also configure the MVPN mode, traceoptions, and the upstream multicast
hop settings.
Monitoring
The slide highlights the topic we d iscuss next.
Gro up : 224 . 7 . 7 . 7
Source : 10 . 0 . 101 . 2
Flags : sparse
Upstream interface : ge-1/0/9 . 251
Upstream neighbor : 10 . 0 . 50 . 2
Upstream state : Local RP , Join to source
Keepalive timeout :
Downstream neighbors :
I nte rface : Pseudo - MVPN
PIM Status
To verify the status of PIM within the customer network using the s h ow p i m commands using a modifier of instance
instance-name. The command on the slide shows the (S, G) state of the PE router.
Group : 224 . 7 . 7 . 7
Source : 10 . 0 . 101 . 2/32
Upstream interface : ge-1/0/ 9 . 251
Session description : Unknown
!statistics : 139 kBps , 263 pps , 532482 packets !
Next-hop ID : 3638
Upstream protocol : MVPN
Route state : Active
Forwarding state : Forwardi ng
Cache lifetime/timeout : fo rever
Wrong i ncoming interface not i fica t i on s : 0
Family : I NET6
MVPN RIB-IN
mcast - pe - vrf . mvpn . 0 : 5 desti na tion s , 6 r out es (5 act ive , 1 holddown, 0 h i dde n)
+ =Act i ve Route , - = La st Active , * = Both
l : 192 . 1 68 . 2 . l : 65535 : 1 92 . 168 . 2 . l /240
*[ BGP/170] 18 : 13 : 29 , l ocalpr ef 100 , from 192 . 168 . 2 . 1
AS path : I
> to 172 . 22 . 250 . 2 via ge - 1/0/4 . 250 , Push 2998 88
l : 192 . 1 68 . 2 . 2 : 65535 : 1 92 . 168 . 2 . 2/2 40
* (BG P/ 170] 18 : 26 : 31 , l oca l pref 100 , from 192 . 168 . 2 . 2
AS path : I
> to 172 . 22 . 250 . 2 via ge - 1 /0/ 4 . 250 , Pu sh 299808
l : 192 . 168 . 6 . 1 : 5 : 19 2 . 168 . 6 . l /2 40
* [MVPN / 70 ) 00 : 4 1 : 29 , me tric2 1
I ndirect
5 : 192 . 168 . 6 . l : 5 : 32 : 10 . 0 . 10 1 . 2 : 32 : 224 . 7 . 7 . 7 /2 40
* [ PI M/ 10 5) 1 8 : 2 3 : 21
Mul t i cas t ( IPv 4)
7 : 192 . 1 68 . 6 . l : 5 : 65512 : 32 : 10 . 0 . 1 01 . 2 : 32 : 224 . 7 . 7 . 7/240
*[ PI M/ 105] 00 : 1 8 : 31
Mul t icas t ( IPv4)
[BGP/ 170 ] 00 : 1 8 : 31 , l oca l pref 100 , from 192 . 168 . 2 . 1
AS path : I
> to 172 . 22 . 250 . 2 via ge - 1 /0/ 4 . 250 , Pu sh 2998 88
Point-to-Multipoint LSP
Use the sho w rsvp sessio n or sho w ldp database com mand to determ ine the st at us of t he point-t o-m ult ipoi nt LSP.
In t he output of t he RSVP comm and, you can see t hat t he outbound label for t he point-t o-multipoint LSP is 300096. For the
LDP com mand, t he output shows t hat t he outbound label for t he P2M P LSP is 300208.
Forwarding Table
The co mmand on the slide shows t he ro utes in PE1's f orwarding t able associat ed wit h the mult icast group of 224.7 .7 .7 with
a source of 10.0.101.2 . Notice t hat all mult icast packet s of th is type will be sent out of t he ge-1/ 0/ 4 .250 interf ace with a
single MPLS label of 300096.
Monitoring
➔ MVPN Internet Multicasting
The i ng r ess- r e plica t ion provider tunnel type uses unicast tunnels between routers to create a multicast distribution
tree .
The mp l s- i nter net-mu l t icast routing instance type uses ingress replication provider tunnels to carry IP multicast
data between routers through an MPLS cloud, using MBGP (or Next Gen)MVPN. Ingress replication can also be configured
when using MVPN to carry multicast data between PE routers.
The mpl s- inte rnet-mul t i cas t routing instance is a non-forwarding instance used on ly for control plane procedures. It
does not support any interface configurations. Only one mpls-internet-multicast routing instance can be defined for a logical
system . All multicast and unicast routes used for IP multicast are associated only with the default routing instance
(i net . 0), not with a configured routing instance. The mp l s- inte r ne t -mul t i cas t routing instance type is configured
for the default master instance on each router, and is also included at the [e dit p r otoco l s pim J hierarchy level in the
default instance.
Ingress Replication
■ Basic configuration
• For each mpls - internet - mul ti cast routing instance
• ingress-replication statement required under
• provider - tunnel statement
• [edit routing-instances routing-instance-name provider-tunnel
selective group source] hierarchy
• A new destination can be added in two ways
• Create a new tunnel
• Use an LSP template
When a new destination needs to be added to the ingress replication provider tunnel, the resulting behavior diff ers
depending on how the ingress replication provider tunnel is configured :
• c r ea t e- n ew- u cast- t u n nel : When t his statement is configured, a new unicast tunne l to the destination is
created, and is deleted when the destination is no longer needed. Use t his mode for RSVP LSPs using ingress
rep Iication.
• l a b e l -switched-p a t h- t emp l a te : When this statement is configured, an LSP template is used f or the for
the point-to-multipoint LSP for ingress replication .
traffic
e
- Replication tunnels for data plane
Multicast ........
.., ...,
................ ....~ -.. Multicast traffic in
IP 7 -~ ~ , Unicast LSP tunn-,, el_s ....... ~ - '- IP
Router 1 / "'- /,-'_, B , "'- Router 3
Border MPLS .. , -,.-:; order
e. /
Ip
, t rf Router 1 , t rf - - ----- , ivt i PrfLS Router 3 , lrfP
me ace me ace 1..,.... 1n e ace 1nte ace
,,,l ................ ............
~ --
-- e ------------- ~ MPLS Core ..........................'. __-:_
Multicast ◄ -----
traffic
---
·---- ----- Border
Router 2
Border
Router 4
--------~@·---+ Multicast
traffic
IP IP
Router2 Router4
Summary
■ In this content, we:
• Described the flow of control traffic and data traffic in a
next-generation multicast VPN
• Described the configuration steps for establishing a
next-generation multicast VPN
• Monitored and verified the operation of next-generation multicast VPNs
• Described the function of MVPN Internet Multicasting with Ingress Replication
We Discussed:
• The flow of control traffic and data t raffic in a next-generation MVPN;
Review Questions
Review Questions
1.
2.
3.
Lab: MVPNs
Lab: MVPNs
The slide provides the objectives for th is lab.
2.
Type 1: Intra-AS Inclusive MVPN Membership Discovery
3.
The first hop designated router, the candidate rendezvous point s, and all PE routers participating in t he multicast network,
unless using vrf-table-label option, requ ire the use of a tunne l services interface.
Pathfinder http://pathfinder.juniper.net
• Pathfinder: An information experience hub that provides centralized prod uct details.
• Content Explorer: Ju nos OS and ScreenOS software feature information to find t he right software release and
hardware platform for yo ur network.
• Feature Explorer: Technical documentation for Junos OS-based products by product, task, and software
release, and downloadable documentation PDFs.
• Learning Bytes: Concise tips and instructions on specif ic features and functions of Jun iper technologies.
• Installation and configuration courses: Over 60 f ree Web-based t raining co urses on product installation and
configuration Uust choose eLearn ing under Delivery Modality).
• J-Net Forum: Train ing, certification, and career topics to discuss with your peers.
• Juniper Networks Certification Program: Complete details on the certification program, including tracks, exam
details, promotions, and how to get started.
• Technical courses : A complete list of instructor-led, hands-on courses and se lf-paced, eLearning courses.
• Translation tools: Several online translation tools to help s implify migration tasks.
www.juniper.net
Junos Layer 3 VPNs
www.juniper.net
un1Pe[
NETWORKS
Education Services
Engineering Simplicity
Junos Layer 3 VPNs
Objectives
We Will Discuss:
• Ju nos OS support for different types of egress protection.
Fast Restoration
Link and node protection works well on transit routers of MPLS LSPs. However, it doesn't work so well in the context of a
Layer 3 VPN when dealing with the failure of an egress PE router. As you know, it is the PE routers that store the VPN routing
and forwarding information. It is obviously not an easy task to protect against a PE node failure in a Layer 3 VPN scenario.
The Junos OS supports the protection of a Layer 3 VPN egress PE. The scenario on the slide shows a multihomed CE. It is
connected to PE2, ca lled the Protected PE, as all traffic between sites traverses PE2 . PE3 provides a backup path to site 2 . It
will be PE3 that will need to receive and store Layer 3 VPN state from PE2. PE3 wil l be referred to as the Protector PE. It will
be the P router that will f irst detect a failure in PE2 . The router wi ll act as the Point of Local Repair (PLR). To perform this
function, the PLR must have precalculated a loop free alternate (LFA) path to an anycast address (called the context ID) that
will be shared by both the Protected and Protector PE routers.
■ Configuration
• Node-link protection
• Per prefix calculation for backup paths
• Load balancing per-packet
[edit) [edit]
user@p2i s h o w protocols user@p2# show policy- options
mpls { policy-statement load-balance {
interface all ; term 10 {
} then (
isis { load-balance per-packet ;
""'jb...
a -,
ck_u_p - s-p ,f..._-o..,
p t-.
i -on_s_ p_e_r - p-r -e f...i-x-- c-a .,..
lc_u.,..
l a..,.t...
io---.
nJ
accept ;
level 1 disable ; ~ )
interface all { )
I n ode-link-protecti on ; )
}
I [ ed it]
ldp { user@p2t show routing - options f orwar di ng - table
track- igp-met ric ; I export load- balance ;
interface all ;
)
IGP can calculate an LFA path Lowest cost next hop as well as
to all learned destinat ions LFA nexthop installed in forwarding table
It is important to keep in m ind that Junos LFA is per-prefix by default but that the configuration option
backu p-spf-op t ion s pe r -p r e fi x-ca l c u la t ion is needed to allow calculation of backup next hops for non-best
prefix originators in combination with node-link-protection LFA.
The next few slides will show the change in forwarding table due to th is configuration .
~
user@p2> s h ow isis d ataba se e x tensive
IS - IS leve l 2 link- state database :
pe3 . 00-00 Sequence : Ox9, Checksum : Oxf7df , Lifet ime : 862 secs
I S neighbor : pe3 . 02 Metric : 10
Two-way fragment : pe3 . 02-00, Two-way first fragment : p e3 . 02-00
IP prefix : 10 . 0 . 0 . 3/32 ! Me tric : 63 I Internal Up
Anycast Address
The slide shows how to configure the context ID to be used as an anycast address by both the Protected and Protector PE. As
a result of this configuration, the PE2 and PE3 will use ISIS to advertise that this network is attached to it. The slide shows
the resu lting ISIS database on the P2 router.
Next-Hop-Self
The configuration of the PE2 router (the Protected PE) causes the router to begin advertising its VRF routes with a BGP next
hop of the context identifier (10.0.0.3 ). The configuration of the PE3 router causes it to treat any rece ived L3VPN routes in a
special manner if the BGP next hop is the same as the configured context identifier (these are called protected routes). The
next few slides wi ll show how PE3 treats protect ed routes from PE2 in a special way. You can optionally configure an import
policy t o f ilter the protected routes.
!
Destination : 299792 (S=O ) !
Route type : use r
Route reference : 0 Route interf ace- i ndex : 0
Flags : sent to PFE, rt nh decoupled
Next -hop type : u nili s t Inde x : 10 48575 Refe r e nce : 2
r.N~e~xt
nh~o::::
p~: -,1~ .u
.u:"" . ;:,~o . :lr-- - - - - - - - - - - - - - - - - - , .- - Towards PE2
l'I"'""!
Next - hop type : Pop Index : 1030 Reference : 1
Next -hon i nterface : ne -1 /0/8 . 300 We iaht : Ox l
Nexthop : l U. U. ~o . 2
Next - hop type : Swap 299776 Index : 1017 Reference : 2..--- Backup towards PE3
Next-hop i nterface : fo e-1/0/8 . 100 Weight : OxfOOO
/
Remember this label for later!!!
PE2's Routes
The slide shows the protect ed routes being advertised by PE2 . Notice that the next hop is the context identifier. Also, notice
that the label is 16. This will be the inner label of all VPN packets sent from PE1. It is important for PE3 to be aware of this
label so that it wi ll be able to deal with protected traffic (inner label 16) during a fa ilure.
l Protector PE I
user@pe3> show route t able mpls.O
0 *[MPLS/0] 00 : 18 : 17 , metric 1
Receive
1 *[MPLS/0] 00 : 18 : 17 , metric l
Receive
2 *[MPLS/0] 00 : 18 : 17 , metric 1
Receive
13 *[MPLS/0] 00 : 18 : 17 , metric l
Receive
16 *[VPN/OJ 00 : 18 : 13
to table vpnl . inet . O, Pop
299776(S=O) *[MPLS/0] 00 : 15 : 53
During Failure
to table _ 10 . 0 . 0 . 3_ . mpls . O
...__ Label is popped, leaving one more
label, and packet is directed to another
table fo r lookup on inner label
■ Protector performs a label lookup, pop, and then one last IP routing
table lookup
I Protector PE I
user@pe3 > show route table _10 . 0.0.3_.mpls.O
Final Lookups
Remember, that all of these tables are set up prior to a failure. The sl ide shows t hat PE3 performs a lookup on the singly
labeled packet, pops the last label leaving an IP packet, and directs the packet to an IP based ro uting table f or a final lookup.
The final IP lookup wil l cause t he router to finally send the rema ining IP packet out of the VRF interface.
A new configuration statement, adve rti se-mode, enables you to set the method for the interior gateway protocol (IGP) to
advertise egress protection availability
IS-IS advertises context IDs into the TED through an IP address TLV. IS-IS imports this TLV into the TED as extended
information. IS-IS advertises the protector TLV routes in the inet.5 route for the context ID with protocol next hop being the
protector's router ID. If the protector TLV has a label, the label is added to the route in the inet.5 routing table for LDP to use.
With the stub alias model, the protector LSP setup does not require any changes in any nodes. But bypass LSP setup for
node protection requires changes in the penultimate-hop router and the protector router.
LDP is useful in the case when the network supports 100 percent LFA coverage but does not support 100 percent per-prefix
LFA coverage. LDP sets up a backup path with the protector with the context label advertised by the protector to the service
point. In networks in which 100 percent LFA coverage is not available, it is useful to have backup LSP LFAs with RSVP-based
tunnels.
PLR candidate
PLR candidate
Based on this information, all routers that might be a PLR in the network create routing entries in inet.5. The bottom label of
this entry is the label advertised in TLV 149 and the top is the LDP label used at the PLR to reach the protector. So we are
tunneling the 149 label in LDP.
PLR pushes the TLV149 label on the traffic and then another LDP label on top that gets the traffic to the protector node. This
second label (the LDP one) is picked from the LDP database based on it being a label able to reach the protector node
announcing the context id with TLV149. in the stub-link style the LDP label would be toward the context ID IP. In an LFA
topo logy with coverage problems this label would not exist. The PLR on the other hand will always have an LDP label towards
any other routers' router ID.
When the traffic gets to the protector node and the LDP label is popped, the remaining TLV149 label lets the protector node
understand wh ich context ID the protected traffic relates to and should be forwarded by.
loO 193.168.1 1. 1
'
1
'
CE1
,.., ;J.O.o_ 7-, 0
<.~
....
9e-11016 - - -
PE1
_ _,,,-
~ ·t15- -ge-0101-2
-
- - -
e-- -....
-
p
loO 193.168.1. 1 -
egress-protection { egress-protection {
context-identifier 6 . 6 . 6 . 6 { context-identifier 6 . 6 . 6 . 6 {
primary; protector ;
advertise-mode stub-alias ; advertise-mode stub-alias;
)
) )
) )
bgp
[edit routing - instances vpn] group int {
user@pe2i show
instance - type vrf ; family inet-vpn {
egress-protection { u nicast {
context-identifier { egress-protection;
6 . 6 . 6 . 6;
*[Egress-Protection/170] 00 : 22 : 57
to table _ 6 . 6 . 6 . 6-vpn_ . inet . O
• Checking the route to 10.10.50/24 in PE1 revea ls an active route using the ge-0/0/2.0 interface pushing label
16 on the packet and an additional label 300064 on top.
• Checking the PE2 router's label space we can find out that label 16 can be found in the context ID's LSP table
_6.6 .6 .6_.mpls.O. It shows being used for Egress Protection having its next hop to table
_6.6 .6 .6-vpn_.inet.O.
Table _6.6 .6 .6-vpn_.inet.O is for the routing instance vpn protected routes and it shows that destination 10.10.50.0/24
can now be reached using PE2 's ge-3/ 2/4.0 interface using next hop 10.10.30.2, which is the PE2 facing interface on router
PE3.
l+ -
ine t . 5 : t1 destinations ,
Ac t ive Route , - =
1 r outes (1 active , 0 ho l ddown , 0 hidde n)
Last Active, *= Both
In RSVP, the behavior changes are only in the protector and primary routers. RSVP terminates the LSP and the bypass LSP to
the context ID. If the context ID is the protector, a non-null label is signaled. Otherwise, it will be based on the configuration or
the requested label type. RSVP verifies the Explicit Route Object (ERO) from the path for itself and the context ID. RSVP sends
the Resv message with two Record Route Object (RRO) obj ects-one for the context ID and one for itself. Th is simulates the
penultimate-hop router to do node protection with the protector for the primary for context ID LSP. As the fast reroute
(FRR)-required bypass, the LSP has to merge back to the protector LSP penultimate-hop router setup bypass to context ID
through the protector by avoiding the primary.
LDP cannot use the stub proxy method due to the inflated metric advertised in the IGP.
The context ID is represented as a node in the traffic engineering (TE) and IGP databases. The primary PE device advertises
the context node into the IGP and TE databases. The primary PE device and the protected PE device support one link to the
context node with a bandwidth and a TE metric. Other TE characteristics of TE links are not advertised by Junos OS.
PLR candidate
PLR cand idate
- _,,,. Protector
The virtual node in the IS-IS LSDB announces the context ID with a TLV 135, e.g. the same used in the stub-link style.
Now all PLR routers (candidates to eventually handle PLR function depending on how the network topology might change)
see two paths to the context ID. One via the low metric virtual link between Protected node and the virtual context ID node
and another high metric path between the Protector node and the virtual context ID node.
It is important to note that virtual context ID node is set to overload in ISIS, it is fake so it would not be much good to forward
any traffic.
The reason LOP doesn't work here is because we are not doing any tunneling. If there is a coverage problem and the PLR
path to the protector goes back on itself then the path to the protector is still infeasible for LFA, so no LOP label will be
available, so RSVP is the on ly option.
RSVP can tunne l the traffic instead. Because the context ID the PLR node is trying to get to is no longer advertised as
attached to the Protected (primary PE) but instead appear to be attached to the virtual context ID node reachable behind the
Protected or the Protector nodes the PLR can do RSVP bypass (node protection) LSP to reach it. Basically the PLR builds a
node protection bypass LSP that goes to the virtual context ID node via the protector, ready for the failure of the Protected.
" ' ·e • e-
. 1.0 01,, • _.,.
. < 4 2 .-. ~ , ,. 2
::::eE ,.1 .--,_..· E2
10 2 0124
9e' 11<10 - - -- ~ -- - - - 10 .7 .0 .0/24 .......... 17.10 C)\'2;0. ----
PE1 ·2 -; P E 3 ~ 9,e·' ,09.0 ·
10 5
100172.16.1 83.55 P1 · - .o.0;24 2~ 1
..__ ...., ~ o 112.1 6.0 .39 _,,.. ~ _
1 183 59
_
Protector PE
• Type: Shows the type of the VRF. It can be either the local-vrf or remote-vrf
• Route Target: Shows the route target associated with the routing instance
NLRI configured with egres.s protection shows the BGP family configured with egress protection. The Egr ess-protection
NLRI inet-vpn - uni cast , keep- i mport : [ remote-vr f ] shows the egress protection routing policy for the BGP
group.
6. 6. 6 .6
From : 172 . 16 . 183 . 55 , State : Up, ActiveRoute : O, LSPname : toPE26 . 6 . 6 . 6
ActivePath : (primary)
*Primary State : Up
Co uted ERO (S [L] denotes strict [loose ] h ops ) : (CSPF metric : 16777234 )
10 . 2 . 0 . 2 S 10 . 5 . 0 . 2 S 6 . 6 . 6 . 6 S (l ink-id=2 )
6. 6. 6 .6
From : 172 . 16 . 183 . 55 , LSPstate : Up , ActiveRoute : 0
LSPname : t oPE26 . 6 . 6 . 6 , LSPpath : Primary
Suggested label received : - , Su ested label sent : -
Recovery label received : - , Recovery label sent : 299920
Resv s tyle : 1 FF, Labe l in : 299904 , Labe l out : 299920
Time left : 141 , Since : Mon Jun 10 13 : 10 : 11 2013
Tspec : rate Obps size Obps peak Infbps m 20 M 1500
Port number : sender 2 receiver 17060 protocol 0
Attrib flags : Non-PHP 00B
PATH rcvfrom : 10 . 2 . 0 . l (ge-1/2/1 . 0 ) 106 pkts
Adspec : r eceived MTU 1500 sent MTU 1500
!PATH sentto : 10 . 5 . 0 . 2, (ge-1/2/2 . 0 ) 105 pkt s
RESV rcv f rom : l0 . 5.0. 2 (ge-1/2/2 . 0 ) 105 pkts
Explct route : 10 . 5 . 0 . 2 6 . 6 . 6 . 6 (link-id=2 )
Record r out e : 10 . 2 . 0 . 1 <sel f > 10 . 5 . 0 . 2
Checking the Transit LSP in P1 router shows us the above mentioned LSP transiting P1 router. We can also see t hat a
Recovery label was sent from P1, which was the case when a failure occurs (penultimate ro uter would signal for a bypass
path to avoid the primary context ID router).
6.6.6.6
From : 172 . 16 . 183 . 55 , LSPstate : Up , ActiveRoute : 0
LSPname : toPE26 . 6 . 6 . 6 , LSl?path : Primary
Suggested label received : - , Suggested label sent : -
Recovery label received : - , Recovery label sent : -
Resv styl e : 1 FF, Label in : 299920, Label out : 3
Time left : 141 , Since : Mon Jun 10 13 : 10 : 11 2013
Tspec : rate Obps size Obps peak Infbps m 20 M 1500
Port number : sender 2 receiver 17060 protocol 0
Attrib f l ags : Non-PHP 00B
PATH rcvfrom: 10 . 5 . 0 . 1 (ge- 1/2/2 . 0) 105 pkts
Adspec : received MTU 1500
PATH sentto : localclient
RESV rcvfrom : localclient
Record route : 10 . 2 . 0 . 1 10 . 5 . 0 . 1 <self>
6.6.6.6
From : 172 . 16 . 183 . 56 , LSPstate : Up , ActiveRoute : O
LSPname : toPE26 . 6 . 6 . 6 , LSl?path : Primary
Suggested l abel received : - , Suggested l abe l sent : -
Recovery l abe l received : - , Recovery l abe l sent : -
Resv styl e : 1 FF, Label in : 299936, Label out : 3
Time le f t : 152 , Since : Mon Jun 10 13 : 10 : 11 2013
Tspec : rate Obps size Obps peak Infbps m 20 M 1 500
Port number : sender 2 receiver 59957 protocol 0
Attrib flags : Non-PHP 00B
PATH rcvfrom : 10 . 7 . 0 . 1 (ge-1/2/1 . 0) 106 pkts
Adspec : received MTU 1500
PATH sentto : l ocalclient
RESV rcvfrom : localclient
Record route : 10 . 7 . 0 . 1 <se l f>
Total 2 d i spl ayed, Up 2 , Down 0
Summary
■ In th is content, we:
• Described Layer 3 VPN Egress Protection
We Discussed:
• Ju nos OS support for different types of egress protection.
Engineering Simplicity
Junos Layer 3 VPNs
e
Virtual Desktop
Console and
VNC Connections
mxB
Physical
Desktops
e mxD
Student
Management Addressing
e
customer
Virtual Environment mxA:
mxB:
mxC:
mxD:
customer:
Virtual
Desktop:
~""
.13 .14
• .. lo,
..,.,S ' ,9$ ~
0
. .. lo,
~
-'>'% oo
AS 65512 N
.., 'b Q) ~
Q.
C, !SIS level 2 .,.> o,q Q.
C,
.«'.; ,9(9 0
-
CXl Area 49.451O CXl
w ·s=? V MM
w
%>?~ a~
..'
00
mxA N Q)
~ v
~ 7
~o
VPN-A Q~
oo
PE-1
target:65512:1 ., <'i.
'N
PE-2
VPN-8 Q)
lo0.1 172.17.20.1 N lo0.6 172.17.20.6
target:65512:2 M ,._;
0
- N
""".
N 'i' ....
.,
2i ~
"' mxD
-o
.,_
'i'M
c,,0
•,S "'
q
•
!
__ __
.• •....................
CE1·1
~
~.; ....... ..
•
•
:
P3
ge-0/0/5 ge-0/0/5
172.17.23.16/30
P5 ••
:
__ __
.·········••I J ••········.
.........._
~
CE1·2 :
••
·------ ·
•
I
••••••••••••••••••••••••
customer
•
•
·------ ·.
;
•
• •••••••••••••••••••••••
customer
Lab Network Diagram: Layer 3 VPN with Static and BGP Routing
The slide diagram is referenced in the lab.
·'·.-.-..-.-..-.....-.-..-.-..-."'...:
: VPN-B : : VPN-8 :
lo0.2 172.17.20.2 lo0.4 172.1 7.20.4
~
g
-... Route Reflector i,, ·
13
-- ...._······
.................. ....
.14
Route Reflector
. . -~ ' •
:.
.,. _ ••
00
en q
(")
a.
(!)
\ 0,
,l •••
'
· ••~ •••
,
•••
AS 65512
ISIS level 2
...
.. ...
♦
...... ♦
••
.....
t'I
••
••
•
•
••
.$'
•• a.
(!)
mxA ..
en
"!
~ .•• ~
~o •
•
Q!2 •
qo •
•
PE-1 Q> N • PE-2
en,..; ••
lo0.1 172.17.20.1 l "!
(") ,-..
•• lo0.6 172.17.20.6
•
I 0 ~ •
~
g
qo
N
I •
••• VPN-A '
.•• target:65512:1 \
VPN-8
- N
q ,-..
.,en - •
•
•
•
••
~<s ~
., ~',
05 'V
~
N mxD
.. SQ I target:65512:2 •
•
,~ §l'" '\.'V
en q •' \
0 I •• VPN-C ••
• • ~'),"
••
target:65512:3 \ ••
___ __
.• •......... - . ""' .•
I
-
0 ••
,.
•
\
.. t
N
N
f ........... ~-..........
r
..._
~--········ ge-0/0/5 ge-0/0/5
172.17.23.16/30 ' ••
·
• ,.;.;.;.;.;.;.;;.;a;.;;.;.;.;.;.;.;.;,;: •
•
- _____.,
•
••
•• P3 P5 •
CE1·1 • lo0.3 172.1 7.20.3 : CE1~ :
• •• .17 .18 lo0.5 172.17.20.5 •
••
. ....._ VPN-A
. • VPN-A :
:•
customer
.
•••••••••••••••••••• •••
• ....
VPN-C VPN-C ·-------
•
' ·.
• •••••••••••••••••••••••
customer
•
Lab Network Diagram: LDP over RSVP Tunnels and Public Internet Access, Part 1-2
The slide diagram is referenced in the lab.
-..-.--..-.-.-....
: AS65532
: AS65532 :
P2 172.17.23.12/30 P4 ••
: VPN-8 : : VPN-8 :
'•••••• • •••• lo0.2 172.17.20.2
.13 .14
lo0.4 172.17.20.4
~-'..-.-..-.-.-.. ,:
a.
'l,
Route Reflector
, ' •• •• ••••
•••••••••••••••••
•••• ..
Route Reflector
-
N
a.
(!)
en •• •••• LSP P2-to-P4 •• • ••• • • (!)
I ••••••••••••• ♦ en
mxA
w
I I
I LSP P4-to-P2
' \
•
w
N I RSVP-TE \ N
Core ~o
g SQ
oo
PE•1 .,
' N.
PE•2
en <'i
lo0.1 172.1 7.20.1
2i
N
AS 65512
ISIS level 2
Area 49.451 O
--
(") r.:
Q
.. -
q~
en
N
I
lo0.6 172.17.20.6
~ mxD
-q o(")
., _ •
enO \ LSP P3-to-PS
q
•
\ LSP PS-to-P3
\
·._._.._._._.......-._._.·-·----·,·.
N
"!
•••••••••••
••
••••••••• •
••
ge-0/0/5 ge-0/0/5
172.17.23.16/30
..·~
•
~
• P3
•• CE1·1 • P5 •• CE1·2 •••
______
•• • lo0.3 172.1 7.20.3 lo0.5 172.1 7.20.5 ••
• .17 .18 ••
·-------·
VPN-A VPN-A
•
• ••• , •
• _, .••
•••••••••••••••••••••••• VPN-C VPN-C • • ••••••••••••••••••••••
customer customer
Lab Network Diagram: LDP Over RSVP Tunnels and Public Internet Access, Part 3
The slide diagram is referenced in the lab.
--..........~-....:··-······
••••••••
--
N-
0
9
.
0
., 1:2
O>o
z
a.. Oo
> O>o.
.,,- -.
-.,,,.,-
0
Route Reflector
\
0)
· 111 •••
'
i,.
•••
-
13
AS 65512
- .14
._ -...••
Route Reflector
•
..•
a..'
0
CJ .., ~
~
- .. ••
1••••• '
\
ISIS level2
Area 49.451 O •
•••• .._, ""
-- •
(')
o en ao ~
-g_
.,
'i'
w
.,
'i' ,i .. ••
•• •
' .• ••
--
♦
l5g
PE-1
" ; •••
"'-
JJt ···
..
/f •• aaN o~
ci,~
O)(f')
'' '
•
, •••
••· ,
••
oo
' N•
<I)
"'<"i
•
•
•
•
•
• PE-2
lo0.1 172.17.20.1 t ••• lo0.6 172.17.20.6
--
N • N
("') ,..._ .• (') ..:
a- 'I"".:N •
I
mXA C:!
g
q~
N
·,S
o9c9
? '0~
?. ?.>";,
QN
.,
"'
-
'i' .....
I "
•••VPN-A \,
.•• target:65512:1 ,
VPN-8
9,-...
<I) -
"'
••
••
•
•
•
"' mxD
., '-' •.,, o9c9
I target:65512:2 ••
•
"'CC!
0 i.i'V. -q
:.;:,o 7
I
I
••
♦
••
VPN-C
target:65512:3 ' '\
••
•••
..
,. ••
ge-0/0/5 ge-0/0/5
172.17.23.16/30
\
◄ N
N
___ ___
.• ···········..._~-·-········
. . •
. ______ .
•
• • P3 P5 • •
• CE1-1 •• : CE1~ :
• • lo0.3 172.1 7.20.3 .17 .1 8 lo0.5 172.17.20.5
•
••
I
VPN-A
•
•
••
:
•
••
VPN-A
., • :
•
♦
•••••••••••••••••••••• •• VPN-C •••••••••••••••••••••••
customer customer
Lab Network Diagram: LDP Over RSVP Tunnels and Public Internet Access, Part 4
The slide diagram is referenced in the lab.
-..-.-.....-.-.-....
AS65532 172.17.23.12/30 : AS65532 •
•• ••
•• VPN-8 : VPN-8
~.'..-.-..-.-.-..
• P2 P4 •
lo0.2 172.17.20.2 .13 .14 lo0.4 172. 17.20.4 ,:
'\,
AS 65512
ISIS level 2 a..
CJ
Area 49.451 O en
w
•••••••••••••••••••••••••••••
mxA N •••••
••• • • • ••• • • • MP-BGP •• • • • • • • • •.
PE•1
····· ( GRE Tunnel ( )
·--~ PE-2
lo0.1 172.1 7.20.1 lo0.6 172.17.20.6
N
mxD
2i o
-'i' (') VPN-A
N
.,c,0_ target:65512: 1
VPN-8
--
-q ~
CC!
oo.
target:65512:2
.•·------,
•••
.,
....."'.... -.·........ .·
~
•
• •• r
___ ___
.·········••I..._J-••········.
•
•
!•
•, _______, . CE1·1
VPN-A
••••••••••••••••••••••••
••
••
•
•
••
••
,••
♦
CE1·2
_______, .
VPN-A
••••••••••••••••••••••
•
:
:
••
customer customer
Lab Network Diagram: GRE Tunnels and Route Redistribution, Part 1-2
The slide diagram is referenced in the lab.
mxA
..
en
VPN-A
target:65512: 1
PE-1 PE-2
VPN-B
lo0.1 172.17.20.1 lo0.6 172.17.20.6
target:65512:2
N N
~
g mxD
qo
., SQ Management
en q
0 Station
Q El
~---········•• .•..,.......... ~.·...........
•••••••••••
.
;;.;.;.;.;.;.;.;;.;.;.;.;.;.;.;.;.,:
.
•
• •• M-1 •
• CE1-1 ••
-- - -- - -
Reflector ••
C-P1
lo0.2 172.17.20.2
•
J.
1
.
-- --
- - ,..no-nexthop-change L
---- -- -- - - --- •
C-P2
lo0.2 172.1 7.22.2
•• .I ••
- •• .
I • ~-
-"' .
~
~ - •• ••
oo
a• SQ ••
.
I
••
oO
o• -O
(")
0
"'en..,
. •• .
I
••
N ••
:,
-t ~
C:
.
I ..,• ~
'")
•••
en.,,
"!
--
<') ,.._
0 .
•••
• Q. •
Cl-
co!
.
I
.'
a. .t-
c.,
- t
••
•• --
<') ,.._
o- N·
"' -
-0 ,.._
N
., - •• - .
I
CD
••
0 ,.._
•
•• .
I
en N. •• enN.
•• . ••
I
______
C-PE1 I S-CE1 S-CE2 C•PE2
lo0.3 172.17.20.3 . AS65532 AS65532 lo0.3 172.1 7.22.3
.
I
..... ,.
I
•i\ ..... ,...1
' ·•........................... , ............ , ...............·
--·-·-·- -·-·-·-·-·--
..
l •
• ••• ■■■■■■■ I !" ■ ■ ■ ■ ■ ■ ■■ ■■ • lo0.2 172.1 7.20.2 .13 .14 lo0.4 172.17.20.4 ••••••••••• •••••••••••
C!
~
, ..,
-. ' A ~
- .,.
. ;s, ' ,9<!>
,,._,,'0~
<')
-
0
- A ~
00
Q) -
o,q
q
a.
(!)
0,
AS 65512
!SIS level 2
N
. ,.>'t]
. ,,._,, !~ a.
(!)
~
- o
'i' <')
Q) -
o,O u. u.
0 a. a.
.
(/) (/)
0 0
.,,
-
. , - - -....---~
N
"!
'
••••••••••• ••••••••••• ge-0/0/5 ge-0/0/5 ••••••••••• • •••••••••••
172.17.23.1 6/30 •• •
______., .
• • P3
: CE1-1 : lo0.3 172.17.20.3
P5 •• •••
CE1-2
•
• VPN-A •• .17 .18 lo0.5 172.17.20.5 •• VPN-A ••
•• •
I
••• •I ••
••••••••••••••••••••••• • ••••••••••••••••••••••••
customer customer
Lab: MVPNs
~
I \
I S ource 1 source2 ISource VM
I
' I N -
..,.
- cir' -- J
•Q
:
:
:
·• -,:tece,ver
······$·····································~
10.0.23.0/24
ge-0/0/1
CE2
lo0.2 172.17.20.6
VPN-A
:'
: .~
ge-0/0/3 ge-0/0/3 "-
10.0.22.0/24 VPN-A
lo0.12172.17.20.12
• •
C!
- - - - - - -•••
l• •••• •••••••••••••••••••••••••••••••••••••••••••
--' -.
q
<O
o_
Oo. customer
PE-2
lo0.4172.1 7.20.4
-
0
Q)
O>-
VPN-A
lo0.11172.17.20.11
ge-01010 ge-01010 ge-0/0/4 ge-0/0/4
172.17.23.0/30 172.17.23.12/30
PE-1 P2
lo0. 1 172.17.20.1 lo0.2 172.17.20.2
.1 .2 .13 .1 4
mxA mxB
PE-3
: •. "R8C8ive8r3•••••••••••••••••••••••••••••••••••• ••. ge•0/0/4 ge-01012 lo0.5172.17.20.5
:•
.••
:
,
---.
10.0.34.0/24 CE3
______ .
1-- ~ - - - - 1 lo0.3172.17.20.7
ge-0/0/2 VPN-A
•••••••••••••••••••••••••••••••••••••••••••••••• •
:•
., .: ·-
•
10.0.33.0/24
.
VPN-A
lo0.13 172.17.20.13
customer
mxD
AS • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • . . . .. autonomous system
ASB R • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • .autonomous syst em boundary routers
cos • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • . class-of-service
DR • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • . designated router
FPC • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • Flexible PIC Concentrator
GRE • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • .generic routing encapsulation
1Pv4 . • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • . IP version 4
RP • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • rendezvous point
SA • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • security assoc iation
• •
Engineering
Simplicity
EDU-JUN-JL3V, Revision V19A