cc/td/doc/product/vpn/solution/rampls2
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Solution Overview
Introduction
MPLS Summary
MPLS VPN Summary
Cisco MPLS VPN Solution Center Summary
Equipment and Software Selection
Cisco IOS Software Fundamentals

Solution Overview


This section provides component overviews and a technological perspective of a remote access to Multiprotocol Label Switching (MPLS) virtual private network (VPN) end-to-end solution, implemented over a shared infrastructure.

Introduction

Using MPLS VPN technology, a service provider can create scalable and efficient VPNs across the core of its network for each customer. This solution integrates various access VPN services with MPLS VPN in the service provider's core. This permits the service provider to offer bundled end-to-end VPN service to their ISP customers and enterprise customers.

Remote access technologies in the remote access to MPLS VPN solution include dial, DSL (digital subscriber line), cable, and wireless.

Methods of Dial access covered in this integration solution include:

Methods of DSL access covered in this integration solution include:

Methods of cable access covered in this integration solution include:

Technology Overviews

This chapter includes an overview of the basic core MPLS technology:

Overviews of access technologies are covered in their own sections or chapters:

The Cisco IOS Command Line Interface (CLI) overview is summarized in the following section:

MPLS Summary

Multiprotocol Label Switching (MPLS) is an emerging IETF protocol standard, pioneered by Cisco as tag switching between layer 2 and 3. The key element of MPLS is that packet/cell forwarding is performed using labels, or label values, instead of IP header information, regardless of the network type. When troubleshooting MPLS, network packet forwarding uses labels, hop by hop, so you must look to the label tables for routing information. Labels are assigned a particular destination at the ingress, or entry point, of the MPLS network. They are placed on top of or in front of the IP packet. Each router along the path will forward the "tagged" or MPLS packets based on label value, not IP information.

Refer to the Cisco IOS documentation suite for conceptual MPLS overview and configuration details at http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/switch_c/xcprt4/index.htm

IP Forwarding

IP forwarding is a hop by hop routing process where every node, or router, in the network, has to maintain packet destination information in local routing tables. Each router has to have a routing entry for any given IP packet destination, or the packet gets dropped.

With IP forwarding, the following process takes place:

1. A routing protocol (e.g. OSPF, IS-IS, BGP) establishes reachability to destination networks.


Note    Transit providers do not do default routing. They need a full routing table in every core router, full BGP mesh, route reflectors or confederations.

2. An ingress router receives a packet, and performs a lookup in the IP forwarding table at each hop.

3. The packet is delivered to destination.

IP Forwarding is performed based on the longest prefix match of the destination address. A longest match, or a default route, should be present in the forwarding table

MPLS Forwarding

IP forwarding is a hop by hop routing process where every node, or router, in the network, has to maintain packet destination information in local routing tables. Each router has to have a routing entry for any given IP packet destination, or the packet gets dropped.

With MPLS forwarding, the following process takes place:

1. Existing routing protocols (e.g. OSPF, IS-IS) establish reachability to destination networks.

2. Label Distribution Protocol (LDP) establishes tag to destination network mappings.

3. Ingress label edge router receives packet, performs layer 3 value-added services, and "label" packets.

4. Label switches, switch tagged packets, using label swapping.

5. Label edge router, at egress, removes the tag, and delivers the packet.

MPLS VPN Summary

Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) is an IP network infrastructure delivering private network services over a public infrastructure using a layer 3 backbone which:

Refer to the Cisco IOS documentation for conceptual MPLS VPN overview and configuration details at http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/switch_c/xcprt4/index.htm

Cisco MPLS VPN Solution Center Summary

Cisco Virtual Private Network (VPN) Solutions Center offers Multiprotocol Label Switching (MPLS) VPN service providers a customized service and network layers FCAPS (fault, configuration management, accounting, performance, security) management solution facilitating rapid service deployment. It provides a carrier-grade network and service management solution integrated with CSM applications and consisting of functional modules developed to support:

Cisco VPN Solutions Center is integrated with third-party applications to provide planning, security, and other management functions for the following benefits:

Cisco VPN SC Installation

During installation, the install script checks for VPNSC required solaris patches and prompts you to install them if they are not in place. Ensure these patches are installed before using the install script again. These patches can be downloaded from the sun site.

The install script also prompts you for Orbix software and requires the name and path of the browser. It also prompts you for the e-mail address for mailing watchdog alerts. Use the default port of 7500 for the TIBCO Rendezvous.

Cisco MPLS VPN SC Initialization

Every VPN created by VPNSC is created and deleted using a Service Request that has a request ID.

Before creating a Service Request:

1. Define network elements (Targets)

Targets are any device to be managed by the VPNSC. Typically these will be of type Cisco router, whether CE or PE.

    a. Import the router (target) configuration files from a directory:

VPNConsole > Setup > Create Targets from Router Configurations

    b. Specify the directory containing configurations, the network name (a container for targets), and a domain name (optional).

    c. Complete the target definitions by adding description and password information in the Network window.

This operation can be performed for individual targets, or multiple targets can be updated simultaneously. Targets can be added or deleted from the Networks window.

2. Define provider admin domain

The PAD is made up of all the "Regions" managed by VPN SC. To define a PAD,

    a. Specify a BGP autonomous region number, the PE routers with each region, and the IP address pools for numbered and unnumbered links.

VPN Console > Setup > New Provider Administrative Domain

3. Create VPN customer definition.

    a. Specify customer information, customer sites, and associated CE devices to define a VPN customer.

VPNConsole > Setup > New VPN Customer

    b. Specify name and contact information in the VPN Customer window.

    c. Title each site and "Add" CE devices in the Customer Site window.

4. Define the VPN.

    a. Select a VPN name and topology to define a VPN. Typically, the VPN named is relative to the customer.

VPNConsole > Setup > New VPN Definition

    b. CERC tab creation of a hub-and-spoke or full mesh topology.

Cisco MPLS VPN SC Provisioning

To provision using the Cisco MPLS VPN SC you create and deploy service requests.

VPNSC is task schedule oriented. These tasks are saved and can be reused. Task examples are:

Creating Service Requests

To create a service request, perform the following:

1. Initialize the VPN Solution Center PAD, Region, IP address pool, PEs, Customer, Sites, CEs, VPNs, and CE routing communities.

2. Create a PE to CE Service Request.

3. Add the VPN Service Wizard to define the service.

    a. Choose a CE

    b. Choose a PE

    c. Define the VPN membership of the CE

    d. Choose the routing protocol between PE-CE

    e. Select a protocol if redistributed on this link

    f. Choose the PE and CE interfaces

    g. Enter layer 2 information (i.e. DLCI)

    h. Choose an addressing scheme

    i. Select a CoS profile if required

    j. Verify the service information

4. Configure routing protocols.

Static between PE and CE

    a. Specify subnets on PE to reach CE addresses

    b. Specify subnets on CE to reach other Customer Sites

    c. Optional - Default routing on CE to other Sites

RIP between PE and CE

    a. Optional - Specify default route from PE to CE

    b. Redistribute routing protocols from Customer into VPN

BGP between PE and CE

    a. Specify BGP AS on CE

    b. Redistribute routing protocols from Customer into VPN

    c. Redistribute connected option

OSPF

    a. OSPF Process ID

    b. OSPF Area Number

Redistributed Connected and Static by Default from VRF into VPN

5. Exporting configlets.

    a. Configlets can be saved as text files

Provision > Export SR configlets

    b. Review configlets prior to deployment as verification

Deploying Service Requests

Defined service requests are queued and wait in the "Requested" state. Requested SRs can be deployed in batches, or individually, by a scheduled task, or immediately.

    a. Provisioning > List all Service Requests

    b. Select an SR from list and deploy

    a. Provisioning > Deploy Service Requests

    a. Upload PE Configuration (read from network)

    b. Upload CE Configuration

    c. Create MPLS/VPN Configlet based on uploaded configuration

    d. Download CE configuration (write to network)

    e. Download PE configuration

    f. Upload PE Configuration (read from network)

    g. Upload CE Configuration

    h. After Deployment List all Service Requests - requests in "Pending State" if not audited upon deployment

Equipment and Software Selection

The following Cisco remote access to MPLS VPN Integration solution hardware elements are supported. Refer to the "Reference Documentation" section for platform specific documentation URLs, IOS configuration URLs, MPLS VPNSC reference URLs, and technology overview URLs.

The following Cisco remote access to MPLS VPN Integration solution software elements are supported.

Cisco IOS Software Fundamentals

Cisco MPLS VPN access provider, service provider, and customer CPE, CE, PE, concentrator, access server, aggregation, gateway, and headend hardware components use Cisco IOS software. Cisco IOS software provides the capability to configure Cisco routers and switches using command-line interface (CLI) commands.

Keep in mind the following when configuring your Cisco IOS software:


Note    Cisco IOS software is feature specific and licensed on an "as is" basis without warranty of any kind, either expressed or implied. The version of Cisco IOS software used in this guide varies depending on configuration requisites for presentation purposes, and should not be construed as the Cisco IOS software version of choice for your system or internetwork environment. Consult your Cisco sales representative regarding your Cisco IOS requirements.

User Interface Command Modes

Cisco routers/servers are configured from user interfaces, known as ports, which provide hardware connectivity. They are accessed from the console port on a router or Telnet into a router interface from another host. Typical interfaces are Serial 0 (S0), Serial 1 (S1), and Ethernet (E0). Token Ring interfaces are referenced as (T0) and FDDI interfaces use (F0).

Command Modes

When using the CLI, a command interpreter, called EXEC, is employed by the operating system to translate any command and execute its operation. This command interpreter has two access modes, user and privileged, which provide security to the respective command levels. Each command mode restricts you to a subset of mode-specific commands.

User mode provides restricted access and limits router configuration or troubleshooting. At this level, miscellaneous functionality is performed, such as viewing system information, obtaining basic router status, changing terminal settings, or establishing remote device connectivity.

Privileged mode includes user mode functionality and provides unrestricted access. It is used exclusively for router configuration, debugging, setting operating system (OS) parameters, and retrieving detailed router status information.

There are many modes of configuration within privileged mode that determine the type of configuration desired, such as interface configuration (AS5800(config-if)#), line configuration (AS5800(config-line)#), and controller configuration (AS5800(config-controller)#). Each configuration command mode restricts you to a subset of mode specific commands.

In the following command sequence, command prompts are automatically modified to reflect command mode changes. A manual carriage return is implied at the end of each line item.

AS5800> enable
AS5800# configure terminal
AS5800(config)# interface ethernet 0/0
AS5800(config-if)# line 0/0
AS5800(config-line)# controller e1 0/0
AS5800(config-controller)# exit
AS5800(config)# exit
AS5800#
%SYS-5-CONFIG_I: Configured from console by console
AS5800#

The last message is an example of a system response. Press Enter to get the AS5800# prompt.

Table 1-1lists common configuration modes. Configure global parameters in global configuration mode, interface parameters in interface configuration mode, and line parameters in line configuration mode.

Table 1-1   Common Command Modes

Command Mode Prompt Access Method Escape Method

User EXEC

AS5800>

Log in.

Use the exit or logout command to leave the command line interface.

Privileged EXEC

AS5800#

From user EXEC mode, enter the enable command.

Use the disable command to escape back to user EXEC mode. Use the exit or logout command to leave the command line interface.

Global configuration

AS5800(config)#

From privileged EXEC mode, enter the configure terminal command.

Use the exit or end (Ctrl-Z) command to escape to privileged EXEC mode.

Interface configuration

AS5800(config-if)#

Enter the interface type and number command, such as interface ethernet 0/0/0.

Use the exit command to escape to global configuration mode. Use the end (Ctrl-Z) command to escape directly to privileged EXEC mode.

Line configuration

AS5800(config-line)#

Enter the line start-number end-number command, such as line 0/0/1 0/0/48.

Use the exit command to escape to global configuration mode. Use the end (Ctrl-Z) command to escape directly to privileged EXEC mode.

Controller configuration

AS5800(config-control)#

Enter the controller name and number command, such as controller t1 0/0/0.

Use the exit command to escape to global configuration mode. Use the end (Ctrl-Z) command to escape directly to privileged EXEC mode.

Context-Sensitive Help

Context-sensitive help is available at any command prompt. Enter a question mark (?) for a list of complete command names, semantics, and command mode command syntax. Use arrow keys at command prompts to scroll through previous mode-specific commands for display.


Note   Cycle through mode specific commands at a mode specific prompt.

AS5800> ?
AS5800> s?
AS5800> show ?

Refer to the chapter "Configuring the User Interface" in the Configuration Fundamentals Configuration Guide for more information about working with the user interface in the Cisco IOS software.


Note   You can press Ctrl-Z in any mode to immediately return to enable mode (AS5800#), instead of entering exit, which returns you to the previous mode.

Saving Configurations

To prevent losing the Cisco AS5800 configuration, save it to NVRAM using the following steps:


Step 1   Enter the enable command and password. You are in privileged EXEC mode when the prompt changes to AS5800#.

AS5800> enable
Password: password
AS5800# 

Note    Press Ctrl-Z to return to privileged EXEC mode. Any subsequent system response message is normal and does not indicate an error.

Step 2   Execute the copy running-config startup-config command to save configuration changes to nonvolatile random-access memory (NVRAM) so configuration data will not be lost during a system reload, power cycle or outage.

AS5800# copy running-config startup-config
Building configuration...

The following message and prompt appears after a successful configuration copy.

[OK]
AS5800#

Undoing a Command

To undo a command or disable a feature, enter the keyword no before the command; for example, no ip routing.

Passwords

Several passwords are used when configuring your Cisco IOS software. Passwords are used to identify user authorization and permission rights, virtual terminal configuration, and network management software initialization. Most passwords can use the same notation.

You need the following types of passwords when configuring Cisco IOS software:


Note    The enable password and enable secret password should be different. In both cases, you cannot use a number cannot be the first character. Spaces are also valid password characters, but only when following valid characters; lead spaces are ignored.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Mar 28 15:56:14 PST 2003
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.