A L2VPN network
enables service providers (SPs) to provide L2 services to geographically
disparate customer sites. Typically, a SP uses an access network to connect the
customer to the core network. This access network may use a mixture of L2
technologies, such as Ethernet and Frame Relay. The connection between the
customer site and the nearby SP edge router is known as an attachment circuit
(AC). Traffic from the customer travels over this link to the edge of the SP
core network. The traffic then tunnels through a pseudowire over the SP core
network to another edge router. The edge router sends the traffic down another
AC to the customer's remote site.
The L2VPN feature
enables the connection between different types of L2 attachment circuits and
pseudowires, allowing users to implement different types of end-to-end
BOOTP traffic (dst UDP 68) over any type of pseudowire is unsupported.
Cisco IOS XR software
supports a point-to-point end-to-end service, where two Ethernet circuits are
connected together. An L2VPN Ethernet port can operate in one of two modes:
Port Mode—In this mode, all packets reaching the port are sent over the pseudowire, regardless of any VLAN tags that are present
on the packets. In Port mode, the configuration is performed under the l2transport configuration mode.
VLAN Mode—Each VLAN on a CE (customer edge) or access network to PE (provider edge) link can be configured as a separate L2VPN
connection (using either VC type 4 or VC type 5). To configure L2VPN on VLANs, see The Carrier Ethernet Model chapter in this manual. In VLAN mode, the configuration is performed under the individual sub-interface.
Switching can take
place in the following ways:
AC-to-PW—Traffic reaching the PE is tunneled over a PW (pseudowire) (and conversely, traffic arriving over the PW is sent
out over the AC). This is the most common scenario.
Local switching—Traffic arriving on one AC is immediately sent out of another AC without passing through a pseudowire.
PW stitching—Traffic arriving on a PW is not sent to an AC, but is sent back into the core over another PW.
If your network requires that packets are transported transparently, you may need to modify the packet’s destination MAC (Media
Access Control) address at the edge of the Service Provider (SP) network. This prevents the packet from being consumed by
the devices in the SP network.
The encapsulation dot1ad
vlan-id and encapsulation dot1ad
dot1q any commands cannot co-exist on the same physical interface or bundle interface. Similarly, the encapsulation dot1q
vlan-id and encap dot1q
second-dot1q any commands cannot co-exist on the same physical interface or bundle interface. If there is a need to co-exist, it is recommended
to use the exact keyword in the single tag encapsulation. For example, encap dot1ad
exact or encap dot1q
In an interface which already has QinQ configuration, you cannot configure the QinQ Range sub-interface where outer VLAN range
of QinQ Range overlaps with outer VLAN of QinQ. Attempting this configuration results in the splitting of the existing QinQ
and QinQ Range interfaces. However, the system can be recovered by deleting a recently configured QinQ Range interface.
In an interface which already has QinQ Range configuration, you cannot configure the QinQ Range sub-interface where outer
VLAN range of QinQ Range overlaps with inner VLAN of QinQ Range. Attempting this configuration results in the splitting of
the existing QinQ and QinQ Range interfaces. However, the system can be recovered by deleting a recently configured QinQ Range
You can use the
command to display AC and pseudowire information.