Concepts Related to VPLS
637
PW signaling
PW signaling (pseudowire signaling) protocol on which VPLS bases is used to
establish and maintain PW. It can also be used to automatically discover peer PEs
of VSIs. Currently, PW signaling protocol includes label distribution protocol (LDP)
and border gateway protocol (BGP).
Service quality
Service quality maps priority information in the headers of user’s layer 2 packets
and QoS information carried by VSI instances to QoS priority of the public network
before the forwarding of the packets. This feature generally requires the MPLS
network to support traffic-engineering.
As shown in Figure 154, CE3 transmits uplink layer 2 packets to PE1 through AC.
When PE1 receives the packets, the forwarder chooses PW to forward them.
According to PW forwarding entries, the system generates two layers of MPLS
labels (private network labels are used to mark the PWs, and public network labels
are used to pass through tunnels to PE2) and the Ethernet headers of the public
network. After the packets reach PE2 through public network tunnel, the system
pops out private network labels (public network labels have already been popped
out on P device through PHP). PE2 forwarder chooses an AC to forward layer 2
packets from CE3 to CE1.
Concepts Related to
VPLS
MPLS L2VPN
An MPLS L2VPN is a VPN that transparently transmits user’s layer 2 packets over
MPLS network. In user’s perspective, an MPLS network is a layer 2 switching
network, over which layer 2 connections can be set up among different sites.
MPLS L2VPN includes VLL and VPLS.
VPLS
This is a kind of point-to-multipoint L2VPN service provided on public networks.
VPLS can connect user sites in different areas together over MAN/WAN as if they
are in a single LAN.
VLL
This is a kind of point-to-point L2VPN service provided on public networks. VLL
can connect two sites with each other as if they are directly connected by cables.
However, it cannot provide switching directly between multiple points at the
service provider level.
CE
It is a user device that is directly connected with a service provider’s device.
PE
It is an edge router in backbone network connected with CEs. PE is responsible for
VPN service access, it implement packet mapping and forwarding from private
networks to public network tunnels, and vice versa. It has two types: UPE and NPE.
UPE
It is a user-facing PE device, a kind of convergence device for users to access the
VPN.
Summary of Contents for Switch 8807
Page 14: ......
Page 32: ...32 CHAPTER 2 COMMAND LINE INTERFACE...
Page 50: ...50 CHAPTER 5 MANAGEMENT INTERFACE CONFIGURATION...
Page 54: ...54 CHAPTER 6 CONFIGURATION FILE MANAGEMENT...
Page 64: ...64 CHAPTER 8 SUPER VLAN CONFIGURATION...
Page 70: ...70 CHAPTER 9 ISOLATE USER VLAN CONFIGURATION...
Page 78: ...78 CHAPTER 10 IP ADDRESS CONFIGURATION...
Page 82: ...82 CHAPTER 11 IP PERFORMANCE CONFIGURATION flag ACK window 16079...
Page 100: ...100 CHAPTER 13 ETHERNET PORT CONFIGURATION...
Page 114: ...114 CHAPTER 15 PORT ISOLATION CONFIGURATION...
Page 158: ...158 CHAPTER 18 DIGEST SNOOPING CONFIGURATION...
Page 162: ...162 CHAPTER 19 FAST TRANSITION...
Page 219: ......
Page 220: ...220 CHAPTER 24 VLAN ACL CONFIGURATION...
Page 234: ...234 CHAPTER 25 802 1X CONFIGURATION...
Page 284: ...284 CHAPTER 28 IP ROUTING PROTOCOL OVERVIEW...
Page 290: ...290 CHAPTER 29 STATIC ROUTE CONFIGURATION...
Page 338: ...338 CHAPTER 31 OSPF CONFIGURATION...
Page 392: ...392 CHAPTER 33 BGP CONFIGURATION...
Page 404: ...404 CHAPTER 34 IP ROUTING POLICY CONFIGURATION...
Page 406: ...406 CHAPTER 35 ROUTE CAPACITY CONFIGURATION...
Page 408: ...408 CHAPTER 36 RECURSIVE ROUTING CONFIGURATION...
Page 416: ...416 CHAPTER 37 IP MULTICAST OVERVIEW...
Page 430: ...430 CHAPTER 39 IGMP SNOOPING CONFIGURATION...
Page 454: ...454 CHAPTER 42 IGMP CONFIGURATION...
Page 462: ...462 CHAPTER 43 PIM DM CONFIGURATION...
Page 506: ...506 CHAPTER 46 MBGP MULTICAST EXTENSION CONFIGURATION...
Page 528: ...528 CHAPTER 48 MPLS BASIC CAPABILITY CONFIGURATION...
Page 632: ...632 CHAPTER 51 MPLS VLL...
Page 652: ...652 CHAPTER 52 VPLS CONFIGURATION...
Page 666: ...666 CHAPTER 53 VRRP CONFIGURATION...
Page 680: ...680 CHAPTER 56 ARP TABLE SIZE CONFIGURATION...
Page 718: ...718 CHAPTER 59 NETSTREAM CONFIGURATION...
Page 728: ...728 CHAPTER 61 POE CONFIGURATION...
Page 736: ...736 CHAPTER 63 UDP HELPER CONFIGURATION...
Page 746: ...746 CHAPTER 64 SNMP CONFIGURATION...
Page 792: ...792 CHAPTER 68 FILE SYSTEM MANAGEMENT...
Page 800: ...800 CHAPTER 69 DEVICE MANAGEMENT...
Page 810: ...810 CHAPTER 70 FTP TFTP CONFIGURATION...
Page 840: ...840 CHAPTER 72 SYSTEM MAINTENANCE AND DEBUGGING...
Page 844: ...844 CHAPTER 74 PACKET STATISTICS CONFIGURATION...
Page 846: ...846 CHAPTER 75 ETHERNET PORT LOOPBACK DETECTION...
Page 860: ...860 CHAPTER 76 QINQ CONFIGURATION...
Page 866: ...866 CHAPTER 77 NQA CONFIGURATION...
Page 876: ...876 CHAPTER 78 PASSWORD CONTROL CONFIGURATION...