Cisco Nexus 7000 Series NX-OS MPLS Configuration Guide
Index
Downloads: This chapterpdf (PDF - 476.0KB) The complete bookPDF (PDF - 7.58MB) | The complete bookePub (ePub - 1.96MB) | The complete bookMobi (Mobi - 2.83MB) | Feedback

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - V -

Index

Numerics

6PE

description 1-7

6VPE

description 1-8, 22-4

example 22-55

A

adjacency 19-2

attribute list 15-1, 15-6

attributes

bandwidth 15-1

flags 15-2

LSP 15-1

priority 15-1

audience i-xxxi

authentication key 13-6

automatic bandwidth

adjustment 12-1

configuration examples 12-7

verifying configuration 12-5

automatic bandwidth adjustment on platform, enabling 12-3

autoroute announce 17-3

B

backup bandwidth 20-3, 20-8

backup bandwidth protection 20-1, 20-5

backup tunnel 20-2, 20-19

backup tunnel support 20-1

bandwidth 15-1

bandwidth override 15-3

bandwidth path option override 15-12

basic discovery 3-2

BFD 13-6, 19-2, 20-1, 20-28

BGP

configuring 22-23

example 22-49

PIC 22-5

redistributing 22-29

send community 22-31

BGP advertisement method for MVPNs 32-5

BGP MDT SAFI 32-5

Bidirectional Forwarding Detection. See BFD

bundle message 13-8

C

CBTS 18-1

CE router 22-2

checkpointing 13-10

Cisco In-Service Software Upgrade. See ISSU

class-based tunnel selection. See CBTS

class of service (See CoS)

Common Link(s) field 19-7

Common Node(s) field 19-7

configuration examples

MVPNs 32-15

constrained shortest path first. See CSPF

constraint-based routing 15-2

CoS 18-1, 18-8

cost community

configuring 24-8

description 24-4

example 24-11

CSPF 13-4

customized echo packets 34-5

D

database 13-11

data MDT, configuring 32-13

data MDT, initializing (figure) 32-4

default MDT, configuring for a VRF 32-9

default multicast distribution tree overview (figure) 32-3

default settings

LDP 3-6

autoconfiguration 4-2

graceful restart 10-4

IGP synchronization 6-4

label filtering 8-6

lossless MD5 session authentication 7-5

session protection 5-2

static label binding 9-3

MPLS feature set 2-2

definitions

FEC 1-2

LDP 1-1

LER 1-2

LFIB 1-2

LSP 1-2

LSR 1-2

MPLS 1-1

PE 1-2

demotion 20-5

destination 11-1

differentiated services code point. See DSCP

DiffServ 18-8

DiffServ policy 18-2

Disposition 21-2

document

audience i-xxxi

conventions i-xxxiii

organization i-xxxi

documentation

additional publications i-xxxiv

DSCP 20-27

E

end-point control 13-2

explicit null labels 3-5

explicit path 13-4

explicit routing

loose 13-5

strict 13-5

EXP mutation 21-4

extended discovery 3-3

F

failure detection mechanism 19-2

Fast Reroute. See FRR

fast reroute link 20-1

features, new and changed (table) i-xxxvii

FEC 1-3

definition 1-2

forward equivalence class, see FEC

forwarding adjacency 17-1, 17-3

FRR 13-2, 18-8, 19-2

G

generic routing encapsulation. See GRE

global pool 20-10

global-pool bandwidth 20-10

graceful restart 13-9

GRE 11-3, 14-2, 16-2, 17-3

guidelines and limitations 29-9

EVCs 29-9

EFPs 29-9

pseudowires 29-9

H

HA 11-2

MPLS Layer 3 VPNs 22-8

headend 11-1

Hello-Ack 13-5

hello message 13-5

Hello-Request 13-5

Hello State Timer. See HST

high availability

see HA 22-8

high availability. See HA

HMAC-MD5 13-6

HMAC-SHA1 13-6

HST 13-12

hub-and-spoke

configuring eBGP on hub CE 22-36

configuring eBGP on hub PE 22-34

configuring eBGP on spoke PE 22-40

configuring VRFs on hub 22-31

configuring VRFs on spoke PE 22-38

description 22-8

example 22-56

I

IGP 11-2, 14-1, 16-1, 19-2

IGP link metric 14-1

Imposition 21-2

ingress label switching router, function 1-4

In-Service Software Upgrade. See ISSU

interface down notification 20-6

interior gateway. See IGP

Interior Gateway Protocol. See IGP

Intermediate System-to-Intermediate System. See IS-IS

internal Border Gateway Protocol 18-6

IS-IS 11-2, 14-1, 17-1

ISSU 11-2, 19-2

K

keyed-hash algorithm 13-6

L

L3VPN label allocation

configuring default VRF 23-6

configuring per-VRF 23-4

default settings 23-3

description 23-1

guidelines and limitations 23-3

ipV6 labels 23-2

per-VRF labels 23-2

prerequisites 23-3

L3VPN load balancing

configuring 24-7

default settings 24-6

eBGP 24-2

example 24-11

feature history 24-12

guidelines and limitations 24-6

iBGP 24-2

load balancing 24-1

prerequisites 24-6

route reflectors 24-3

verifying 24-11

label 1-3

label binding 1-6

distribution 1-6

label bindings 3-3

label disposition 1-6

label distribution protocol, see LDP

label edge router, see LER

label forwarding information base, see LFIB

label imposition 1-4

label spaces 3-3

label stack 1-4

label swap 1-5

label-switched path 17-1

label switched path. See LSP

label-switched protocol 15-1

label switching

high availability 1-9

routing 1-7

virtualization support 1-9

label switch path, see LSP

label switch router, see LSR

Layer 3 11-1

Layer 3 VPNs

configuring default VRFs 22-18

configuring EIGRP 22-27

configuring MBGP 22-16

defaults 22-14

description 22-1

EIGRP example 22-54

examples 22-47

feature history 22-60

guidelines and limitations 22-14

MIBs 22-59

prerequisites 22-13

route target 22-3

verifying 22-46

VRF 22-3

Layer3 VPNs

importing default VRF routes 22-3

LDP

configuring a fallback password within a keychain 7-10

configuring a transport address 3-16

configuring backoff intervals 3-12

configuring hold time 3-13

default settings 3-6

definition 1-1

description 3-1

directly connected sessions

description 3-2

enabling 3-9

enabling globally 3-7

enabling on an interface 3-8

enabling the display of password changes 7-10

explicit-null labels 3-5

feature history 3-24

guidelines 3-6

high availability 3-5

identifiers 3-3

inbound label filtering 8-4

label bindings 3-3

label spaces 3-3

licensing requirements 3-5

limitations 3-6

nondirectly connected sessions

description 3-3

enabling 3-11

outbound label filtering 8-4

prerequisites 3-5

preserving QoS settings with an explicit-null label 3-17

resolving password problems 7-4

shutting down sessions 3-18

specifying the router ID 3-14

transport address 3-4

verifying configuration 3-19

LDP autoconfiguration

configuration examples 4-6

configuring for IS-IS interfaces 4-4

configuring for OSPF interfaces 4-3

default settings 4-2

description 4-1

disabling 4-5

feature history 4-8

guidelines 4-2

licensing requirements 4-2

limitations 4-2

prerequisites 4-2

verifying configuration 4-6

LDP graceful restart

configuration examples 10-6

configuring 10-4

default settings 10-4

description10-1to 10-3

feature history 10-7

licensing requirements 10-4

prerequisites 10-4

verifying configuration 10-6

LDP IGP synchronization

configuration examples 6-9

configuring delay timer 6-6

configuring for IS-IS interfaces 6-5

configuring for OSPF interfaces 6-4

default settings 6-4

delay timer 6-2

description 6-1

disabling 6-7

feature history 6-10

guidelines 6-3

licensing requirements 6-3

limitations 6-3

prerequisites 6-3

process 6-2

verifying configuration 6-8

with IGP nonstop forwarding 6-2

with LDP graceful restart 6-3

LDP inbound label filtering

configuration example 8-19

configuring 8-11

LDP label filtering

configuration examples 8-13

configuring8-6to 8-12

creating a prefix list 8-6

default settings 8-6

description 8-1

feature history 8-20

guidelines 8-5

licensing requirements 8-5

limitations 8-5

prerequisites 8-5

verifying configuration 8-12

LDP link hello 5-1

LDP link hello adjacency 5-2

LDP local label allocation filtering

configuration example 8-14

configuring 8-9

description 8-1

prefix lists

configuration example 8-13

description 8-3

sample configuration example 8-14

LDP lossless MD5 session authentication

benefits 7-2

common misconfigurations 7-18

configuration examples 7-16

configuring 7-5

default settings 7-5

description 7-1

feature history 7-21

guidelines 7-5

keychain use 7-3

licensing requirements 7-4

limitations 7-5

prerequisites 7-4

verifying configuration 7-15

LDP outbound label filtering

configuration example 8-19

configuring 8-10

LDP session, clearing 5-4

LDP session protection

configuration examples 5-5

configuring 5-2

default settings 5-2

description 5-1

feature history 5-6

licensing requirements 5-2

prerequisites 5-2

verifying configuration 5-4

LDP static label binding

configuration examples9-7to 9-8

configuring9-3to 9-6

default settings 9-3

description 9-1

feature history 9-9

guidelines 9-3

licensing requirements 9-2

limitations 9-3

prerequisites 9-2

verifying configuration 9-6

LDP targeted hello 5-1

LER

definition 1-2

LERs 21-2, 21-6

LFIB

definition 1-2

licensing

MPLS Layer 3 VPNs 22-13

licensing requirements

LDP 3-5

autoconfiguration 4-2

graceful restart 10-4

IGP synchronization 6-3

label filtering 8-5

lossless MD5 session authentication 7-4

session protection 5-2

static label binding 9-2

MPLS feature set 2-1

link delay 14-6

link-management 13-2

link metric 14-2

load balancing 20-4, 20-7, 34-2

load-sharing 15-2

loose hop 13-5

loose path 13-4

LSP 11-1, 12-2, 13-1, 16-1, 18-6

attribute list 15-6

definition 1-2

LSP attribute list 15-1

LSP attributes 15-1

LSR

definition 1-2

LSRs 21-2

M

make-before-break 13-4

many-to-one protection 20-4

mapping tunnels 20-3

MDT address family, configuring in BGP for MVPNs 32-10

MDT SAFI, enforcing for a VRF 32-10

message

bundle 13-8

hello 13-5

refresh 13-6

MIB

Layer 3 VPN 22-59

misordering of packets 18-8

modular quality of service command-line interface. See MQC

MPLS 1-1

benefits

MVPNs 32-5

traffic engineering 1-2

VPN 1-2

definition 1-1

echo reply packets 33-1

echo request packets 33-1

experimental field 21-3

functions 1-3

label 1-3, 1-4

label disposition 1-6

label imposition 1-4

label stack 1-4

label swap 1-5

packets 1-4

ping 33-1

ping process 33-2

TE 11-1

traceroute 33-1

traceroute process 33-4

tree trace 34-1

MPLS feature set

allowing in a VDC 2-4

configuration examples 2-5

default settings 2-2

description 2-1

enabling 2-3

feature history 2-7

guidelines 2-2

licensing requirements 2-1

limitations 2-2

prerequisites 2-2

verifying configuration 2-5

MPLS path protection 19-1

MPLS QoS

Classification 21-2

Class of Service 21-2

configuring a class map 21-15

configuring a policy map 21-16

Differentiated Services Code Point 21-2

E-LSP 21-2

EXP bits 21-2

IP Precedence 21-2

MQC 21-2

QoS Tags 21-2

MPLS QoS configuration

class map to classify MPLS packets 21-15

MPLS-TE

forwarding adjacency 17-1

MPLS traffic engineering tunnel, configuring 11-8

MPS feature set

installing 2-3

MQC 18-2

multicast distribution trees 32-2

multicast tunnel interface 32-4

Multiprotocol Label Switching, see MPLS

MVPNs

additional references 32-16

benefits 32-5

BGP advertisement method 32-5

configuration examples 32-15

configuring 32-7

configuring the MDT address family in BGP 32-10

default settings 32-6

enabling features 32-7

enabling PIM on interfaces 32-8

feature history 32-17

guidelines 32-6

limitations 32-6

prerequisites 32-6

verifying configuration 32-13, 32-14

N

neighbor down notification 20-6

network resources 11-1

network topology 11-1

new and changed information i-xxxvii

next-hop. See NHOP

next-next-hop 20-4

next-next-hop. See NNHOP

NHOP 20-2, 20-7

NHOP backup tunnel 20-2

NNHOP 20-2, 20-7

NNHOP backup tunnel 20-2

node protection 20-1, 20-4

Nonstop Forwarding. See NSF

nonstop forwarding. See NSF

nonstop routing. See NSR

NSF 11-2, 19-2

NSR 13-12

O

OIR 19-2

one-to-one protection 20-4

online insertion and removal. See OIR

Open Shortest Path First. See OSPF

OSPF 11-2, 14-1, 17-1

configuring 22-26

configuring sham link 22-27

example 22-53

LSA throttling 22-7

sham link 22-7

P

path option selection 15-2

path protection 19-1, 19-2

path reoptimization 13-4

path selection metric 14-1

path selection metric, configuration examples 14-6

PBR 18-6

PE

definition 1-2

function 1-4

penultimate hop popping, see PHP

PE router 22-2

PHP 1-6

PIM 11-5

PIM, enabling on interfaces 32-8

ping mpls command 33-2

PLR 20-15

Point of Local Repair. See PLR

policy-based routing. See PBR

preface i-xxxi

prefix lists

avoiding configuration problems 7-21

configuration example for LDP local label allocation filtering 8-13

creating for LDP label filtering 8-6

for LDP local label allocation filtering 8-3

priority 15-1

promotion 20-11

propagation delay 19-2

protocol

Interior Gateway 19-2

Interior Gateway. See IGP

internal Border Gateway 18-6

Resource Reservation 20-15

Resource Reservation. See RSVP

Protocol-Independent Multicast. See PIM

protocols

Interior Gateway 11-2

Intermediate System-to-Intermediate System. See IS-IS

Open Shortest Path First. See OSPF

Resource Reservation Protocol. See RSVP

provider edge routers

also see LER

see PE

Pseudowires have the following configuration guidelines and limitations

29-9

Q

QoS 13-1, 18-2

QoS mapping

DSCP markdown values 21-14

quality of service. See QoS

R

redundancy 20-4, 20-7

refresh message 13-6

related documents i-xxxiv

reoptimization 15-3

reservation message. See RESV

Resource Reservation Protocol 15-2, 20-15

resource reservation protocol, see RSVP

Resource Reservation Protocol. See RSVP

restartability 13-12

RESV message 13-2

RFCs B-1

RIPv2

configuring 22-25

example 22-50

route distinguisher

description 22-4

routers

packet headers, analyzing 1-3

route target

configuring 22-19

description 22-3

route target, configuring 32-12

RSVP 11-2, 13-1, 15-2, 16-1, 20-15

traffic engineering 1-6

S

semidynamic backup tunnel paths 20-5

semidynamic NHOP backup tunnel path 20-5

service request, submitting i-xxxv

shared-explicit reservation 13-4

shared secret authentication key 13-6

Shortest Path First. See SPF

site-of-origin

description 22-6

source 11-1

SPF 16-1, 17-1

Srefresh message 13-6

SSO 19-2, 20-15

stateful switchover. See SSO

state synchronization 13-6

static

example 22-51

static labels

configuration example 9-7

configuring 9-4

description 9-2

static route

configuring 22-21

strict path 13-4, 13-5

summary refresh message 13-6

Swapping 21-3

switch fabric latency 19-2

switchover 13-12, 19-2

T

tailend 11-1

teardown 19-2

TE link metric 14-2

traceroute mpls command 33-4

traffic engineering 1-2, 11-1

RSVP 1-6

tunnel

destination 11-1

headend 11-1

load-sharing factor 15-2

path option selection 15-3

reoptimization 15-3

source 11-1

tailend 11-1

tunnel default attribute value 15-9

tunnels

enabling 27-9

V

VDC 11-4, 11-5

verbatim path 16-1

virtual private network. See VPN

virtual private network routing and forwarding 18-2

virtual private network routing and forwarding. See VRF

virtual private networks, see VPN

VPN 1-2, 18-2

VRF 18-2

Layer 3 VPNs 22-3

VRF-aware static labels

configuration example 9-8

configuring 9-5

description 9-2