Information About Implementing 802.1ah Provider Backbone Bridge
To implement 802.1ah, you must understand these concepts:
Benefits of IEEE 802.1ah standard
The benefits of IEEE 802.1ah provider backbone bridges are as follows:
- Increased service instance scalability—Enables a service provider to scale the number of services (service VLANs or service instances) in a Provider Bridged Network (PBN).
- MAC address scalability—Encapsulates the customer packet, including MAC addresses, into a new ethernet frame with new MAC addresses (the backbone bridge MAC addresses). This eliminates the need for backbone core bridges to learn all MAC addresses of every customer and also eases the load on backbone edge bridges.
- VPLS pseudowire reduction and mesh scalability—The number of pseudowires in an IP/MPLS core can be significantly reduced. This is because a single VPLS service can now transport several customer service instances thereby allowing a fewer number of pseudowires in the IP/MPLS core to transport a large number of customer services.
- Layer 2 backbone traffic engineering—Enables explicit controls for Layer 2 traffic engineering by separating service discrimination function and moving it to the I-tags thereby leaving the backbone VLAN to be available for Layer 2 traffic engineering functions.
- Point-to-point service scalability and optimization—Enables point-to-point service implementation that includes multiple options for service multiplexing as well as end point discovery.
- Backbone flood traffic reduction—Since there are fewer MAC addresses in the core of the network, the amount of flood traffic in the core network is reduced as there are fewer MAC addresses to be relearnt when MAC tables get flushed due to topology changes.
IEEE 802.1ah Standard for Provider Backbone Bridging Overview
The IEEE 802.1ah Provider Backbone Bridge feature encapsulates or decapsulates end-user traffic on a Backbone Edge Bridge (BEB) at the edge of the Provider Backbone Bridged Network (PBBN). A Backbone Core Bridge (BCB) based network provides internal transport of the IEEE 802.1ah encapsulated frames within the PBBN. Figure 1 shows a typical 802.1ah PBB network.
Figure 1 IEEE 802.1ah Provider Backbone Bridge
Figure 2 shows a typical provider backbone network topology.
Figure 2 Provider Back Bone Network Topology
Backbone Edge Bridges
Backbone edge bridges (BEBs) can contain either an I-Component or a B-Component. The I-Component maps service VLAN identifiers (S-VIDs) to service instance identifiers (I-SIDs) and adds a provider backbone bridge (PBB) header without a backbone VLAN tag (B-Tag). The B-Component maps I-SIDs to backbone VIDs (B-VIDs) and adds a PBB header with a B-Tag.
The IEEE 802.1ah standard specifies these three types of BEBs:
- The B-BEB contains the B-Component of the MAC-in-MAC bridge. It validates the I-SIDs and maps the frames onto the backbone VLAN (B-VLAN). It also switches traffic based on the B-VLANS within the core bridge.
- The I-BEB contains the I-Component of the MAC-in-MAC bridge. It performs B-MAC encapsulation and inserts the I-SIDs based on the provider VLAN tags (S-tags), customer VLAN tags (C-tags), or S-tag/C-tag pairs.
- The IB-BEB contains one or more I-Components and a single B-Component interconnected through a LAN segment.
Note
Only IB-BEBs are supported on Cisco ASR 9000 Series Routers. Cisco IOS XR supports IB-BEB bridge type at the Edge node.
IB-BEB
The IB-BEB contains both the I-Component and the B-Component. The bridge selects the B-MAC and inserts the I-SID based on the provider VLAN tag (S-tag), the customer VLAN tag (C-tag), or both the S-tag and the C-tag. It validates the I-SIDs and it transmits and receives frames on the B-VLAN.
The IEEE 802.1ah on Provider Backbone Bridges feature supports all services mandated by the IEEE 802.1ah standard and extends the services to provides these additional functionalities:
–
In multiplexed environments each S-tag maps to an I-SID and may be retained or removed.
–
In bundled environments multiple S-tags map to the same I-SID and the S-tags must be retained.
–
In multiplexed environments each C-tag maps to an I-SID and may be retained or removed.
–
In bundled environments multiple C-tags map to the same I-SID and the C-tags must be retained.
–
In multiplexed environments each S-tag/C-tag pair maps to an I-SID. The S-tag or the S-tag/C-tag pair may be retained or removed.
–
In bundled environments multiple S-tag/C-tags pairs map to the same I-SID and the S-tag/C-tag pair must be retained.
–
A port-based service interface is delivered on a Customer Network Port (CNP). A port-based service interface may attach to a C-VLAN Bridge, 802.1d bridge, router or end-station. The service provided by this interface forwards all frames without an S-Tag over the backbone on a single backbone service instance. A port-based interface discards all frames with an S-Tag that have non-null VLAN IDs.
This example shows how to configure a port-based service:
interface GigabitEthernet0/0/0/10.100 l2transport
--> Creates an EFP for untagged frames.
interface GigabitEthernet0/0/0/10.101 l2transport
encapsulation dot1ad priority-tagged
--> Creates an EFP for null S-tagged frames.
interface GigabitEthernet0/0/0/10.102 l2transport
encapsulation dot1q priority-tagged
--> Creates an EFP for null C-tagged frames:
interface GigabitEthernet0/0/0/10.103 l2transport
--> Creates an EFP for C-tagged frames:
Note
To configure a port-based service, all the above EFPs must be added to the same edge bridge domain.
Figure 3 shows the PBB bridge component topology on the Cisco ASR 9000 Series Routers.
Figure 3 PBB Bridge Component Topology on Cisco ASR 9000 Series Routers
Multiple I-SID Registration Protocol Lite
The 802.1Qbe—Multiple I-SID Registration Protocol (MIRP) standard provides the ability to flush learned MAC address registration entries held in the filtering database of an I-component on a per I-SID basis. The backbone service instance identifier (I-SID) is a field in the backbone service instance tag which identifies the backbone service instance of a frame. MIRP defines mechanisms for I-SID flushing, and has the required capabilities to handle topology changes that occur in networks attached to a provider backbone bridged network. A backbone edge bridge (BEB) signals to other potentially affected BEBs, the need to alter certain learned associations between customer MAC addresses and backbone MAC addresses. In the absence of MIRP, customer connections across a provider backbone network can take several minutes to restore connectivity after a topology change in an access network.
In prior releases, PBB traffic was dropped for a MAC aging cycle when bridge forwarding topology changes occurred (due to unavailable ports or spanning tree topology changes) in a PBB edge bridge domain. This resulted in severe limitations for the use of PBB bridges.
Cisco ASR 9000 Series Aggregation Services Routers now support a simplified implementation of the MIRP protocol known as the Multiple I-SID Registration Protocol Lite (MIRP-Lite). The MIRP-Lite feature enables detection of a topology change at a site. A specially defined packet is flooded to all remote edge sites of the PBB network when a site detects a topology change. At the sender site, I-SID of the I-component is placed in the I-TAG of the frame header to specify the I-SID that needs a MAC flush. At the receiver site, each PBB edge switch performs I-SID checking. If the I-SID matches one of the I-components, the MAC in the I-component is flushed.
The use of MIRP in 802.1ah networks is illustrated in Figure 4.
Figure 4 MIRP in 802.1ah Networks
Device DHD1 is dual-homed to two 802.1ah backbone edge bridges (BEB1 and BEB2). Assume that initially the primary path is through BEB1. In this configuration BEB3 learns that the host behind DHD1 (with MAC address CM1) is reachable via the destination B-MAC M1. If the link between DHD1 and BEB1 fails and the host behind DHD1 remains inactive, the MAC cache tables on BEB3 still refer to the BEB1 MAC address even though the new path is now via BEB2 with B-MAC address M2. Any bridged traffic destined from the host behind DHD2 to the host behind DHD1 is wrongly encapsulated with B-MAC M1 and sent over the MAC tunnel to BEB1, where the traffic drops.
To circumvent the dropping of traffic when the link between DHD1 and BEB1 fails, BEB2 performs two tasks:
- Flushes it’s own MAC address table for the service or services.
- Requests the remote PE that receives the MIRP packet to clear it’s own MAC table. The MIRP message is transparent to the backbone core bridges (BCBs). The MIRP message is processed on a BEB because only BCBs learn and forward, based on B-MAC addresses and they are transparent to C-MAC addresses.
Note
MIRP triggers C-MAC address flushing for both native 802.1ah and PBB over VPLS.
Figure 5 shows the operation of the MIRP.
Figure 5 MIRP Operation
Provider Backbone Bridging Ethernet VPN
The Provider Backbone Bridging Ethernet VPN (PBB-EVPN) is a next generation L2VPN solution that addresses resiliency and forwarding policy requirements. This feature also introduces advanced multihoming options, support for multipath and user-defined BGP policy capabilities to Ethernet L2VPNs. PBB-EVPN uses BGP for MAC address distribution and learning over the packet-switched network (PSN). PBB-EVPN is a combination of the capabilities of PBB and Ethernet VPN that addresses these Carrier Ethernet and data centre interconnect requirements:
- All-active Redundancy and Load Balancing
- Simplified Provisioning and Operation
- Optimal Forwarding
- Fast Convergence
- MAC Address Scalability
Ethernet VPN
Ethernet Virtual Private Network (EVPN) is a solution for secure and private connectivity of multiple sites within an organization. The EVPN service extends the benefits of Ethernet technology to the Wide Area Network (WAN). This service is delivered over MPLS networks.
EVPN allows you to manage routing over a virtual private network, providing complete control and security. EVPN introduces a solution for multipoint L2VPN services, with advanced multi-homing capabilities, using BGP for distributing customer or client MAC address reachability information over the MPLS/IP network. EVPN advertises each customer MAC address as BGP routes, therefore allowing BGP policy control over MAC addresses.
Figure 6 shows the MAC address distribution in BGP.
Figure 6 MAC Distribution in BGP (EVPN)
In Figure 6, the provider edge (PE) routers run multi-protocol BGP to advertise and learn MAC addresses over MPLS. The customer MAC addresses are learnt in the data plane over attachment circuits (links connecting customer devices to the PEs). Then, the MAC addresses are distributed over MPLS using BGP with an MPLS label identifying the EVPN instance.
PBB-EVPN Overview
The PBB-EVPN solution combines Ethernet Provider Backbone Bridging (PBB - IEEE 802.1ah) with Ethernet VPN where, PEs perform as PBB Backbone Edge Bridge (BEB). The PEs receive 802.1Q Ethernet frames from their attachment circuits. These frames are encapsulated in the PBB header and forwarded over the IP/MPLS core. On the egress side (EVPN PE), the PBB header is removed after MPLS disposition, and the original 802.1Q Ethernet frame is delivered to the customer equipment.
Figure 7 illustrates a PBB-EVPN network.
Figure 7 PBB-EVPN Network
The PE routers perform these functions:
- Learns customer or client MAC addresses (C-MACs) over the attachment circuits in the data-plane, per normal bridge operation.
- Learns remote C-MAC to backbone MAC (B-MAC) bindings in the data-plane from traffic ingress from the core.
- Advertises local B-MAC address reachability information in BGP to all other PE nodes in the same set of service instances. Note that every PE has a set of local B-MAC addresses that uniquely identify the device.
- Builds a forwarding table from the received remote BGP advertisements, associating remote B-MAC addresses with remote PE IP addresses.
PBB-EVPN scales well for large network with millions of customer MAC addresses by constraining customer MAC address in access. Only B-MAC addresses are advertised in core, making the number of BGP routes exchanged manageable.
EVPN Instance
E-VPN Instance (EVI) identifies a VPN in the MPLS/IP network. There can only be one EVI per core bridge.
Ethernet Segment
Ethernet Segment is a site connected to one or more PEs. The Ethernet Segment could be a single device (i.e. Customer Edge (CE)) or an entire network, such as:
- Single-Homed Device (SHD)
- Multi-Homed Device (MHD) using Ethernet Multi-chassis Link Aggregation Group
- Single-Homed Network (SHN)
- Multi-Homed Network (MHN)
The Ethernet segment is uniquely identified by a 10-byte global Ethernet Segment Identifier (ESI). Figure 8 illustrates an example of Ethernet segment and ESI.
Figure 8 Ethernet Segment
PBB-EVPN BGP Routes
PBB-EVPN defines a single new BGP network layer reachability information (NLRI) used to advertise different types of routes along with new attributes.
Designated Forwarder Election
The Designated Forwarder (DF) election mechanism is used to determine a designated forwarder in dual-homed or multi-homed devices or networks. The election is performed on a per service basis. The DF filtering function for MHN differs from that for MHD in:
- Directionality—DF filtering for MHN is applied for traffic both ingress and egress on the access-facing Ethernet interfaces; whereas, DF filtering for MHD is applied only to traffic that egress the access-facing interfaces.
- Traffic Type—DF filtering for MHN impacts both unicast as well as flooded multi-destination traffic; whereas, DF filtering for MHD only applies to flooded multi-destination traffic.
Figure 9 shows the various DF filtering rules for MHN and MHD.
Figure 9 DF Filtering Comparison for MHN/MHD
Access Auto-Sensing
PEs connected to a multi-homed or dual-homed device may support active-active per flow also known as flow-based load balancing. PE services CEs via physical or bundle ports. An Ethernet segment identifier is assigned per port. This value is calculated from the connected CE using information such as, CE system priority, CE system ID and CE port key. The PE must auto-detect the access topology to determine the type of load balancing. The load balancing could be active-active per flow load-balancing, per service load-balancing or simply no load balancing.
How to Implement 802.1ah Provider Backbone Bridge
This section contains these procedures:
Restrictions for Implementing 802.1ah Provider Backbone Bridge
These features are not supported:
- Cross-connect based point to point services over MAC-in-MAC
- One Edge bridge to multiple Core bridge mapping
- I type backbone edge bridge (I-BEB) and B type backbone edge bridge (B-BEB)
- IEEE 802.1ah over VPLS
- Multiple source B-MAC addresses per chassis
- Direct encapsulation of 802.1ah formatted packets natively over an MPLS LSP encapsulation
Configuring Ethernet Flow Points on CNP and PNP Ports
Perform this task to configure an Ethernet flow point (EFP) on the customer network port (CNP) or the provider network port (PNP).
SUMMARY STEPS
1.
configure
2.
interface type interface-path-id.subinterface l2transport
3.
encapsulation dot1q vlan-id
or
encapsulation dot1ad vlan-id
or
encapsulation dot1ad vlan-id dot1q vlan-id
4.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
interface type interface-path-id.subinterface l2transport
RP/0/RSP0/CPU0:router(config)# interface GigabitEthernet0/0/0/10.100 l2transport |
Configures an interface for L2 switching. |
Step 3 |
encapsulation dot1q vlan-id or encapsulation dot1ad vlan-id or encapsulation dot1ad vlan-id dot1q vlan-id
RP/0/RSP0/CPU0:router(config-subif)# encapsulation dot1q 100 or encapsulation dot1ad 100 or encapsulation dot1ad 100 dot1q 101 |
Assigns the matching VLAN ID and Ethertype to the interfac |
Step 4 |
end or commit
RP/0/RSP0/CPU0:router(config-subif)# end or RP/0/RSP0/CPU0:router(config-subif)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring PBB Edge Bridge Domain and Service Instance ID
Perform this task to configure a PBB edge domain and the service ID.
Note
To configure the PBB feature, login with admin user privileges and issue the
hw-module profile feature l2 command to select an ASR 9000 Ethernet line card ucode version that supports the PBB feature. The PBB feature will not be supported on the ASR 9000 Ethernet line card unless you make this configuration. For more information on configuring the feature profile, refer to the Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide.
SUMMARY STEPS
1.
configure
2.
l2vpn
3.
bridge group group-name
4.
bridge-domain domain-name
5.
interface type interface-path-id.subinterface
6.
pbb edge i-sid service-id core-bridge core-bridge-name
7.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
l2vpn
RP/0/RSP0/CPU0:router(config)# l2vpn |
Enters L2VPN configuration mode. |
Step 3 |
bridge group bridge-group-name
RP/0/RSP0/CPU0:router(config-l2vpn)#bridge group pbb |
Enters configuration mode for the named bridge group. This command creates a new bridge group or modifies the existing bridge group if it already exists. A bridge group organizes bridge domains. |
Step 4 |
bridge-domain domain-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg)#bridge- domain pbb-edge |
Enters configuration mode for the named bridge domain. This command creates a new bridge domain or modifies the existing bridge domain, if it already exists. |
Step 5 |
interface type interface-path-id.subinterface
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#interface GigabitEthernet0/5/0/0.20 |
Assigns the matching VLAN ID and Ethertype to the interface. This EFP is considered as the CNP for the Edge bridge. |
Step 6 |
pbb edge i-sid service-id core-bridge core-bridge-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# pbb edge i-sid 1000 core-bridge pbb-core |
Configures the bridge domain as PBB edge with the service identifier and the assigned core bridge domain, and enters the PBB edge configuration submode. This command also creates the Virtual instance port (VIP) that associates the PBB Edge bridge domain to the specified Core bridge domain. All the interfaces (bridge ports) under this bridge domain are treated as the customer network ports (CNP). |
Step 7 |
end or commit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- edge)# end or RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- edge)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring the PBB Core Bridge Domain
Perform this task to configure the PBB core bridge domain.
SUMMARY STEPS
1.
configure
2.
l2vpn
3.
bridge group group-name
4.
bridge-domain domain-name
5.
interface type interface-path-id.subinterface
6.
pbb core
7.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
l2vpn
RP/0/RSP0/CPU0:router(config)# l2vpn |
Enters L2VPN configuration mode. |
Step 3 |
bridge group bridge-group-name
RP/0/RSP0/CPU0:router(config-l2vpn)#bridge group pbb |
Enters configuration mode for the named bridge group. This command creates a new bridge group or modifies the existing bridge group, if it already exists. A bridge group organizes bridge domains. |
Step 4 |
bridge-domain domain-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg)#bridge- domain pbb-core |
Enters configuration mode for the named bridge domain. This command creates a new bridge domain or modifies the existing bridge domain if it already exists. |
Step 5 |
interface type interface-path-id.subinterface
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#interface GigabitEthernet0/5/0/0.20 |
Assigns the matching VLAN ID and Ethertype to the interface. |
Step 6 |
pbb core
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# pbb core |
Configures the bridge domain as PBB core and enters the PBB core configuration submode. This command also creates an internal port known as Customer bridge port (CBP). All the interfaces (bridge ports) under this bridge domain are treated as the provider network ports (PNP). |
Step 7 |
end or commit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- core)# end or RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- core)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring Backbone VLAN Tag under the PBB Core Bridge Domain
Perform this task to configure the backbone VLAN tag under the PBB core bridge domain.
SUMMARY STEPS
1.
configure
2.
l2vpn
3.
bridge group group-name
4.
bridge-domain domain-name
5.
interface type interface-path-id.subinterface
6.
interface type interface-path-id.subinterface
7.
pbb core
8.
rewrite ingress tag push dot1ad vlan-id symmetric
9.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
l2vpn
RP/0/RSP0/CPU0:router(config)# l2vpn |
Enters L2VPN configuration mode. |
Step 3 |
bridge group bridge-group-name
RP/0/RSP0/CPU0:router(config-l2vpn)#bridge group pbb |
Enters configuration mode for the named bridge group. This command creates a new bridge group or modifies the existing bridge group if it already exists. A bridge group organizes bridge domains. |
Step 4 |
bridge-domain domain-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg)#bridge- domain pbb-core |
Enters configuration mode for the named bridge domain. This command creates a new bridge domain or modifies the existing bridge domain if it already exists. |
Step 5 |
interface type interface-path-id.subinterface
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#interface GigabitEthernet0/5/0/0.20 |
Assigns the matching VLAN ID and Ethertype to the interface. |
Step 6 |
interface type interface-path-id.subinterface
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-ac)#interface GigabitEthernet0/5/0/1.15 |
Adds an interface to a bridge domain that allows packets to be forwarded and received from other interfaces that are part of the same bridge domain. The interface now becomes an attachment circuit on this bridge domain. |
Step 7 |
pbb core
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# pbb core |
Configures the bridge domain as PBB core and enters the PBB core configuration submode. This command also creates an internal port known as Customer bridge port (CBP). All the interfaces (bridge ports) under this bridge domain are treated as the provider network ports (PNP). |
Step 8 |
rewrite ingress tag push dot1ad vlan-id symmetric
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- core)# end |
Configures the backbone VLAN tag in the Mac-in-MAC frame and also, sets the tag rewriting policy. Note All PNPs in a Core bridge domain use the same backbone VLAN. |
Step 9 |
end or commit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- core)# end or RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- core)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring Backbone Source MAC Address
The backbone source MAC address (B-SA) is a unique address for a backbone network. Each Cisco ASR 9000 Series Router has one backbone source MAC address. If B-SA is not configured, then the largest MAC in the EEPROM is used as the PBB B-SA.
Note
The backbone source MAC address configuration is optional. If you do not configure the backbone source MAC address, the Cisco ASR 9000 Series Routers allocate a default backbone source MAC address from the chassis backplane MAC pool.
Perform this task to configure the backbone source MAC address.
SUMMARY STEPS
1.
configure
2.
l2vpn
3.
pbb
4.
backbone-source-mac mac-address
5.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
l2vpn
RP/0/RSP0/CPU0:router(config)# l2vpn |
Enters L2VPN configuration mode. |
Step 3 |
pbb
RP/0/RSP0/CPU0:router(config-l2vpn)# pbb |
Enters PBB configuration mode. |
Step 4 |
backbone-source-address mac-address
RP/0/RSP0/CPU0:router(config-l2vpn-pbb)# backbone-source-address 0045.1200.04 |
Configures the backbone source MAC address. |
Step 5 |
end or commit
RP/0/RSP0/CPU0:router(config-l2vpn-pbb)# end or RP/0/RSP0/CPU0:router(config-l2vpn-pbb)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring Unknown Unicast Backbone MAC under PBB Edge Bridge Domain
Perform this task to configure the unknown unicast backbone MAC under the PBB edge bridge domain.
SUMMARY STEPS
1.
configure
2.
l2vpn
3.
bridge group group-name
4.
bridge-domain domain-name
5.
interface type interface-path-id.subinterface
6.
pbb edge i-sid service-id core-bridge core-bridge-name
7.
unknown-unicast-bmac mac-address
8.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
l2vpn
RP/0/RSP0/CPU0:router(config)# l2vpn |
Enters L2VPN configuration mode. |
Step 3 |
bridge group bridge-group-name
RP/0/RSP0/CPU0:router(config-l2vpn)#bridge group pbb |
Enters configuration mode for the named bridge group. This command creates a new bridge group or modifies the existing bridge group if it already exists. A bridge group organizes bridge domains. |
Step 4 |
bridge-domain domain-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg)#bridge- domain pbb-edge |
Enters configuration mode for the named bridge domain. This command creates a new bridge domain or modifies the existing bridge domain if it already exists. |
Step 5 |
interface type interface-path-id.subinterface
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#interface GigabitEthernet0/5/0/0.20 |
Assigns the matching VLAN ID and Ethertype to the interface. |
Step 6 |
pbb edge i-sid service-id core-bridge core-bridge-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# pbb edge i-sid 1000 core-bridge pbb-core |
Configures the bridge domain as PBB edge with the service identifier and the assigned core bridge domain and enters the PBB edge configuration submode. This command also creates the Virtual instance port (VIP) that associates the PBB Edge bridge domain to the specified Core bridge domain. All the interfaces (bridge ports) under this bridge domain are treated as the customer network ports (CNP). |
Step 7 |
unknown-unicast-bmac mac-address
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb-edge)# unknown-unicast-bmac 1.1.1 |
Configures unknown unicast backbone MAC address. Note On Trident line cards, once you configure the unknown unicast BMAC, the BMAC is used to forward customer traffic with multicast, broadcast and unknown unicast destination MAC address. |
Step 8 |
end or commit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- edge)# end or RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- edge)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring Static MAC addresses under PBB Edge Bridge Domain
Perform this task to configure the static MAC addresses under the PBB edge bridge domain.
SUMMARY STEPS
1.
configure
2.
l2vpn
3.
bridge group group-name
4.
bridge-domain domain-name
5.
interface type interface-path-id.subinterface
6.
interface type interface-path-id.subinterface
7.
pbb edge i-sid service-id core-bridge core-bridge-name
8.
static-mac-address cda-mac-address bmac bda-mac-address
9.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
l2vpn
RP/0/RSP0/CPU0:router(config)# l2vpn |
Enters L2VPN configuration mode. |
Step 3 |
bridge group bridge-group-name
RP/0/RSP0/CPU0:router(config-l2vpn)#bridge group pbb |
Enters configuration mode for the named bridge group. This command creates a new bridge group or modifies the existing bridge group if it already exists. A bridge group organizes bridge domains. |
Step 4 |
bridge-domain domain-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg)#bridge- domain pbb-edge |
Enters configuration mode for the named bridge domain. This command creates a new bridge domain or modifies the existing bridge domain if it already exists. |
Step 5 |
interface type interface-path-id.subinterface
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#interface GigabitEthernet0/5/0/0.20 |
Assigns the matching VLAN ID and Ethertype to the interface. |
Step 6 |
interface type interface-path-id.subinterface
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-ac)#interface GigabitEthernet0/5/0/1.15 |
Adds an interface to a bridge domain that allows packets to be forwarded and received from other interfaces that are part of the same bridge domain. The interface now becomes an attachment circuit on this bridge domain. |
Step 7 |
pbb edge i-sid service-id core-bridge core-bridge-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# pbb edge i-sid 1000 core-bridge pbb-core |
Configures the bridge domain as PBB edge with the service identifier and the assigned core bridge domain and enters the PBB edge configuration submode. This command also creates the Virtual instance port (VIP) that associates the PBB Edge bridge domain to the specified Core bridge domain. All the interfaces (bridge ports) under this bridge domain are treated as the customer network ports (CNP). |
Step 8 |
static-mac-address cda- mac-address bmac b da- mac-address
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb-edge)#static-mac-address 0033.3333.3333 bmac 0044.4444.4444 |
Configures the static CMAC to BMAC mapping under the PBB Edge submode. |
Step 9 |
end or commit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- edge)# end or RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- edge)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring PBB VPLS
Perform these tasks to configure PBB VPLS:
Configuring Access Pseudowire in I-Component
Perform this task to configure the static MAC addresses under the PBB edge bridge domain.
SUMMARY STEPS
1.
configure
2.
l2vpn
3.
bridge group group-name
4.
bridge-domain domain-name
5.
mac withdraw state-down
6.
exit
7.
interface type interface-path-id.subinterface
8.
interface type interface-path-id.subinterface
9.
neighbor { A.B.C.D } pw-id value
10.
exit
11.
pbb edge i-sid service-id core-bridge core-bridge-name
12.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
l2vpn
RP/0/RSP0/CPU0:router(config)# l2vpn |
Enters L2VPN configuration mode. |
Step 3 |
bridge group bridge-group-name
RP/0/RSP0/CPU0:router(config-l2vpn)#bridge group pbb |
Enters bridge group configuration mode. This command creates a new bridge group or modifies the existing bridge group if it already exists. A bridge group organizes bridge domains. |
Step 4 |
bridge-domain domain-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg)#bridge- domain pbb-edge |
Enters bridge domain configuration mode. This command creates a new bridge domain or modifies the existing bridge domain if it already exists. |
Step 5 |
mac withdraw state-down
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# mac withdraw state-down |
(Optional) Enables MAC withdrawal. |
Step 6 |
exit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-mac)# exit |
Exits the current configuration mode. |
Step 7 |
interface type interface-path-id.subinterface
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)#interface GigabitEthernet0/5/0/0.20 |
Assigns the matching VLAN ID and Ethertype to the interface. |
Step 8 |
interface type interface-path-id.subinterface
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-ac)#interface GigabitEthernet0/5/0/1.15 |
Adds an interface to a bridge domain that allows packets to be forwarded and received from other interfaces that are part of the same bridge domain. The interface now becomes an attachment circuit on this bridge domain. |
Step 9 |
neighbor { A.B.C.D } pw-id value
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# neighbor 10.1.1.2 pw-id 1000 RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pw)# |
Adds an access pseudowire port to a bridge domain.
- Use the A.B.C.D argument to specify the IP address of the cross-connect peer.
Note A.B.C.D can be a recursive or non-recursive prefix.
- Use the pw-id keyword to configure the pseudowire ID and ID value. The range is 1 to 4294967295.
|
Step 10 |
exit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pw)# exit |
Exits the current configuration mode. |
Step 11 |
pbb edge i-sid service-id core-bridge core-bridge-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# pbb edge i-sid 1000 core-bridge pbb-core |
Configures the bridge domain as PBB edge with the service identifier and the assigned core bridge domain and enters the PBB edge configuration submode. All the interfaces (bridge ports) under this bridge domain are treated as the customer network ports (CNP). |
Step 12 |
end or commit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- edge)# end or RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- edge)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring Core Pseudowire in B-Component
Perform this task to configure the static MAC addresses under the PBB edge bridge domain.
SUMMARY STEPS
1.
configure
2.
l2vpn
3.
bridge group group-name
4.
bridge-domain domain-name
5.
vfi { vfi-name }
6.
neighbor { A.B.C.D } { pw-id value }
7.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
l2vpn
RP/0/RSP0/CPU0:router(config)# l2vpn |
Enters L2VPN configuration mode. |
Step 3 |
bridge group bridge-group-name
RP/0/RSP0/CPU0:router(config-l2vpn)#bridge group pbb |
Enters configuration mode for the named bridge group. This command creates a new bridge group or modifies the existing bridge group if it already exists. A bridge group organizes bridge domains. |
Step 4 |
bridge-domain domain-name
RP/0/RSP0/CPU0:router(config-l2vpn-bg)#bridge- domain pbb-core |
Enters configuration mode for the named bridge domain. This command creates a new bridge domain or modifies the existing bridge domain if it already exists. |
Step 5 |
vfi { vfi-name }
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# vfi PBB-core-vfi |
Configures the virtual forwarding interface (VFI) parameters and enters L2VPN bridge group bridge domain VFI configuration mode.
- Use the vfi-name argument to configure the name of the specified virtual forwarding interface.
|
Step 6 |
neighbor { A.B.C.D } { pw-id value }
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# neighbor 10.1.1.2 pw-id 1000 RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pw)# |
Adds an access pseudowire port to a bridge domain or a pseudowire to a bridge virtual forwarding interface (VFI).
- Use the A.B.C.D argument to specify the IP address of the cross-connect peer.
Note A.B.C.D can be a recursive or non-recursive prefix.
- Use the pw-id keyword to configure the pseudowire ID and ID value. The range is 1 to 4294967295.
|
Step 7 |
end or commit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pw)# end or RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pw)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring PBB-EVPN
This section provides information on:
Configuring PBB Core Bridge Domains
Perform this task to create the PBB Core bridge domain and assign it’s corresponding EVPN EVI ID.
SUMMARY STEPS
1.
configure
2.
l2vpn
3.
bridge group group_name
4.
bridge-domain bridge_domain_name
5.
pbb core
6.
evpn evi evi_id
7.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
l2vpn
RP/0/RSP0/CPU0:router(config)# l2vpn |
Enters L2VPN configuration mode. |
Step 3 |
bridge group group_name
RP/0/RSP0/CPU0:router(config-l2vpn)# bridge group group1 |
Enters bridge group configuration mode. This command creates a new bridge group. A bridge group organizes bridge domains. |
Step 4 |
bridge-domain bridge_domain_name
RP/0/RSP0/CPU0:router(config-l2vpn-bg)# bridge-domain sample-pbb-core# |
Enters bridge group domain configuration mode. This command creates a new bridge domain. |
Step 5 |
pbb core
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd)# pbb core |
Configures the bridge domain as PBB core and enters the PBB core configuration submode. This command also creates an internal port known as Customer bridge port (CBP). All the interfaces (bridge ports) under this bridge domain are treated as the provider network ports (PNP). |
Step 6 |
evpn evi evi_id
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- core)# evpn evi 100 |
Enters EVPN configuration mode and configures the Ethernet VPN ID. The EVI ID range is from 1 to 65534. |
Step 7 |
end or commit
RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- core)# end or RP/0/RSP0/CPU0:router(config-l2vpn-bg-bd-pbb- core)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring PBB Edge Bridge Domains
As a pre-requisite, a PBB-EVPN provider edge (PE) must be configured with PBB Edge Bridge Domains which in one side are associated to ethernet flow points matching traffic from access interfaces and on the other side are linked to PBB Core Bridge Domains for traffic forwarding through the core.
For more information on configuring Edge Bridge Domains, see Configuring PBB Edge Bridge Domain and Service Instance ID.
Configuring EVPN Ethernet Segment
Explicit configuration of Ethernet Segment parameters such as ESI and service carving behaviors (manual or dynamic) is required only for Dual Homed scenarios with Active/Active per Service load-balancing.
Note
By default, Dual Homed scenarios with Active/Active per Flow load-balancing auto-sense ESI values from CE's LACP information.
Note
PBB-EVPN configuration allows to create only 24 ICCP-groups.
Perform this task to configure the EVPN Ethernet segment.
SUMMARY STEPS
1.
configure
2.
evpn
3.
interface type interface-path-id
4.
ethernet-segment
5.
backbone-source-mac H.H.H
6.
force single-homed
7.
identifier system-priority priority-value system-id system-id port-key port_key
8.
load-balancing-mode per-service
9.
service-carving manual primary { isid } secondary { isid }
10.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
evpn
RP/0/RSP0/CPU0:router(config)# evpn |
Enters EVPN configuration mode. |
Step 3 |
interface type interface-path-id
RP/0/RSP0/CPU0:router(config-evpn)# interface gigabitEthernet 0/1/0/4 |
Enters the physical port interface or the bundle interface configuration mode. |
Step 4 |
ethernet-segment
RP/0/RSP0/CPU0:router(config-evpn-ac)# ethernet-segment |
Enters the EVPN ethernet-segment configuration mode. |
Step 5 |
backbone-source-mac mac_address
RP/0/RSP0/CPU0:router(config-evpn-ac)# backbone-source-mac 0045.1200.04 |
Configures the backbone source MAC address. |
Step 6 |
force single-homed
RP/0/RSP0/CPU0:router(config-evpn-ac-es)# force single-homed |
Specifies forced attributes for this Ethernet Segment. |
Step 7 |
identifier system-priority priority-value system-id system-id port-key port_key
RP/0/RSP0/CPU0:router(config-evpn-ac-es)# identifier system-priority 2 system-id 0301.1.1 port-key ffff |
Configures the Ethernet segment identifier (ESI) of an interface. Note The ESI system ID requires that the multicast and admin bits are set. |
Step 8 |
load-balancing-mode per-service
RP/0/RSP0/CPU0:router(config-evpn-ac-es)# load-balancing-mode per-service |
Specifies the load balancing mode. |
Step 9 |
service-carving manual primary { isid } secondary { isid }
RP/0/RSP0/CPU0:router(config-evpn-ac-es)# service-carving manual primary 100 secondary 200 |
Specifies a list of service identifiers (isid) as active and standby services. The isid range is from 256 to 16777216. |
Step 10 |
end or commit
RP/0/RSP0/CPU0:router(config-evpn-ac-es)# end or RP/0/RSP0/CPU0:router(config-evpn-ac-es)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring BGP Route Target
By default, these parameters are auto-derived from the PE's configuration:
- Route Distinguisher (RD) for global Ethernet Segment table
Default: Auto-generated RD based on loopback IP address
- EVI’s BGP Route Distinguisher (RD)
Default: Auto-generated RD based on loopback IP address
- EVI’s BGP Route Target. Default: Auto-generated RT based on EVI ID
Perform this task to overwrite the auto-generated BGP RD/RT values.
SUMMARY STEPS
1.
configure
2.
evpn
3.
bgp
4.
rd { 2-byte as_number | 4-byte as_number | IP_address | none } : { nn }
5.
exit
6.
evpn
7.
evi evi_id
8.
bgp
9.
route-target [ import |export] { 2-byte as_number | 4-byte as_number | IP_address | none } : { nn }
10.
rd { 2-byte as_number | 4-byte as_number | IP_address | none } : { nn }
11.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
evpn
RP/0/RSP0/CPU0:router(config)# evpn |
Enters EVPN configuration mode. |
Step 3 |
bgp
RP/0/RSP0/CPU0:router(config-evpn)# bgp |
Enters EVPN BGP configuration mode and configures static BGP settings for the Ethernet Segment ES:GLOBAL EVI, which is used for handling ES routes. |
Step 4 |
rd { 2-byte as_number | 4-byte as_number | IP_address | none } : { nn }
RP/0/RSP0/CPU0:router(config-evpn-bgp)# rd 200:50 |
Configures the route distinguisher. |
Step 5 |
exit
RP/0/RSP0/CPU0:router(config-evpn-bgp)# exit |
Returns to the global configuration mode. |
Step 6 |
evpn
RP/0/RSP0/CPU0:router(config)# evpn |
Enters EVPN configuration mode. |
Step 7 |
evi evi_id
RP/0/RSP0/CPU0:router(config-evpn)# evi 100 |
Configures Ethernet VPN ID. The EVI ID range is from 1 to 65534. |
Step 8 |
bgp
RP/0/RSP0/CPU0:router(config-evpn-evi)# bgp |
Enters the BGP configuration mode for the specific EVI. |
Step 9 |
route-target [ import |export ] { 2-byte as_number | 4-byte as_number | IP_address | none } : { nn }
RP/0/RSP0/CPU0:router(config-evpn-evi-bgp)# route-target 10:20 |
Creates a route-target extended community.
- The import keyword imports routing information from the target VPN extended community.
- The export keyword exports routing information to the target VPN extended community.
|
Step 10 |
rd { 2-byte as_number | 4-byte as_number | IP_address | none } : { nn }
RP/0/RSP0/CPU0:router(config-evpn-evi-bgp)# rd 25:30 |
Configures the route distinguisher. |
Step 11 |
end or commit
RP/0/RSP0/CPU0:router(config-evpn-evi-bgp)# end or RP/0/RSP0/CPU0:router(config-evpn-evi-bgp)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring Global EVPN Timers
Perform this task to configure global EVPN timers.
SUMMARY STEPS
1.
configure
2.
evpn
3.
timers [ flushagain | peering | programming | recovery ]
4.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
evpn
RP/0/RSP0/CPU0:router(config)# evpn |
Enters the EVPN configuration mode. |
Step 3 |
timers [ flushagain | peering | programming | recovery ]
RP/0/RSP0/CPU0:router(config-evpn)# timers flushagain 40 |
Configures global EVPN timers.
- Flush-again timer (for AApS only): When a MAC flush is sent, usually at the end of the programming timer expiration, a flush-again timer is started for the flush-again timer value. When it expires, another MAC flush message (MVRP or STP-TCN) is sent to the CE. This timer can be configured per segment-interface.
Range: 0 to 120 seconds, 0 means disabled Default: 60 seconds
- Peering timer: Once all conditions are met to advertise to BGP, the PE waits for the peering timer value before advertising its RT, ESI and, Local MAC if it is Single-Home.
Range: 0 to 300 seconds, 0 means disabled Default: 45 seconds
- Programming timer: Indicated time required by the HW to apply the carving results. At the end of the programming timer expiration, the next Ethernet Segment route object will be processed.
Range: 0 to 100000 microseconds Default: 1500 microseconds
- Recovery timer (for AApS only): Once the interface is up, the PE waits for the recovery timer value in order to allow the CE running STP protocol to converge. This timer can be configured per segment-interface.
Range: 20 to 3600 seconds Default: 20 seconds Note Changing timers is only useful for scale configurations. |
Step 4 |
end or commit
RP/0/RSP0/CPU0:router(config-evpn-timers)# end or RP/0/RSP0/CPU0:router(config-evpn-timers)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring EVPN Timers Per Ethernet Segment and CE flushing mechanism
Perform this task to configure per Ethernet segment timers.
SUMMARY STEPS
1.
configure
2.
evpn
3.
interface type interface-path-id
4.
ethernet-segment
5.
mac-flush mvrp
6.
timers [ flushagain | recovery ]
7.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
evpn
RP/0/RSP0/CPU0:router(config)# evpn |
Enters the EVPN configuration mode. |
Step 3 |
interface type interface-path-id
RP/0/RSP0/CPU0:router(config-evpn)# interface gigabitEthernet 0/1/0/4 |
Enters the physical port interface or the bundle interface configuration mode. |
Step 4 |
ethernet-segment
RP/0/RSP0/CPU0:router(config-evpn-ac)# ethernet-segment |
Enters the EVPN ethernet-segment configuration mode. |
Step 5 |
mac-flush mvrp
RP/0/RSP0/CPU0:router(config-evpn-ac)# |
Specifies MAC flush mode for this Ethernet Segment. |
Step 6 |
timers [ flushagain | recovery ]
RP/0/RSP0/CPU0:router(config-evpn-ac)# timers flushagain 40 |
Configures per Ethernet segment timers.
- Flush-again timer (for AApS only): When a MAC flush is sent, usually at the end of the programming timer expiration, a flush-again timer is started for the flush-again timer value. When it expires, another MAC flush message (MVRP or STP-TCN) is sent to the CE. This timer can be configured per segment-interface.
Range: 0 to 120 seconds, 0 means disabled Default: 60 seconds
- Recovery timer (for AApS only): Once the interface is up, the PE waits for the recovery timer value in order to allow the CE running STP protocol to converge. This timer can be configured per segment-interface.
Range: 20 to 3600 seconds
Note Changing timers is only useful for scale configurations. |
Step 7 |
end or commit
RP/0/RSP0/CPU0:router(config-evpn-ac-timers)# end or RP/0/RSP0/CPU0:router(config-evpn-ac-timers)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|
Configuring Multichassis Link Aggregation
Multichassis Link Aggregation (MCLAG) is used in scenarios involving Multi Homed Devices. You must create an ICCP redundancy group in order to specify relevant MLACP parameters, such as, mlacp system mac, mlacp system priority, mlacp node id and backbone interfaces.
Note
Even though the redundancy group is created under the redundancy-iccp-group sub-mode, the solution does not rely on an actual ICCP session between PEs connected to the same site. The mode singleton command has been introduced to alert ICCP module.
For more information on configuring MCLAG, refer to the Configuring Link Bundling on the Cisco ASR 9000 Series Router module in the Cisco ASR 9000 Series Aggregation Services Router Interface and Hardware Component Configuration Guide.
Configuring BGP Routing Process
A prerequisite of PBB-EVPN involves enabling the new EVPN address family under the BGP routing process and under BGP neighbor submode. For more information on BGP, refer to the Implementing BGP module in the Cisco ASR 9000 Series Aggregation Services Router Routing Configuration Guide.
Perform this task to enable EVPN address family under BGP routing process and BGP neighbor submode.
SUMMARY STEPS
1.
configure
2.
router bgp asn_id
3.
address-family l2vpn evpn
4.
exit
5.
neighbor peer_ip_add
6.
address-family l2vpn evpn
7.
end
or
commit
DETAILED STEPS
|
|
|
Step 1 |
configure
RP/0/RSP0/CPU0:router# configure |
Enters global configuration mode. |
Step 2 |
router bgp asn_id
RP/0/RSP0/CPU0:router(config)# router bgp 100 |
Specifies the BGP AS number and enters the BGP configuration mode, allowing you to configure the BGP routing process. |
Step 3 |
address-family l2vpn evpn
RP/0/RSP0/CPU0:router(config-bgp)# address-family l2vpn evpn |
Enables EVPN address family under BGP routing process and enters EVPN address family configuration submode. |
Step 4 |
exit
RP/0/RSP0/CPU0:router(config-bgp)# exit |
Exits the current configuration mode. |
Step 5 |
neighbor peer_ip_add
RP/0/RSP0/CPU0:router(config-bgp)# neighbor 10.1.1.1 |
Places the router in neighbor configuration mode for BGP routing and configures the neighbor IP address as a BGP peer. |
Step 6 |
address-family l2vpn evpn
RP/0/RSP0/CPU0:router(config-bgp-nbr)# address-family l2vpn evpn |
Enables EVPN address family under BGP routing process and enters EVPN address family configuration submode. |
Step 7 |
end or commit
RP/0/RSP0/CPU0:router(config-bgp-nbr-af)# end or RP/0/RSP0/CPU0:router(config-bgp-nbr-af)# commit |
Saves configuration changes.
- When you issue the end command, the system prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. – Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. – Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
- Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session.
|