1-2
MPLS L2VPN transfers Layer 2 user data transparently on the MPLS network. For users, the MPLS
network is a Layer 2 switched network and can be used to establish Layer 2 connections between
nodes.
Consider ATM as an example. Each customer edge device (CE) can connect to the MPLS network
through an ATM virtual circuit (VC) to communicate with another CE. This is similar to that on an ATM
network.
Figure 1-1
Network diagram for MPLS L2VPN
Comparison with MPLS L3VPN
Compared with MPLS L3VPN, MPLS L2VPN has the following advantages:
z
High scalability: MPLS L2VPN establishes only Layer 2 connections. It does not involve the routing
information of users. This greatly reduces the load of the PEs and even the load of the whole
service provider network, enabling carriers to support more VPNs and to service more users.
z
Guaranteed reliability and private routing information security: As no routing information of users is
involved, MPLS L2VPN neither tries to obtain nor processes the routing information of users,
guaranteeing the security of the user VPN routing information.
z
Support for multiple network layer protocols, such as IP, IPX, and SNA.
Basic concepts of MPLS L2VPN
In MPLS L2VPN, the concepts and principles of CE, PE and P are the same as those in MPLS L3VPN:
z
Customer edge device (CE): A CE resides on a customer network and has one or more interfaces
directly connected with service provider networks. It can be a router, a switch, or a host. It cannot
"sense" the existence of any VPN, neither does it need to support MPLS.
z
Provider edge router (PE): A PE resides on a service provider network and connects one or more
CEs to the network. On an MPLS network, all VPN processing occurs on the PEs.
z
Provider (P) router: A P router is a backbone router on a service provider network. It is not directly
connected with any CE. It only needs to be equipped with basic MPLS forwarding capability.
MPLS L2VPN uses label stacks to implement the transparent transmission of user packets in the MPLS
network.
z
Outer label, also called tunnel label, is used to transfer packets from one PE to another.
z
Inner label, also called VC label, is used to identify different connections between VPNs.
Содержание S7906E - Switch
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45...
Страница 598: ...ii...
Страница 1757: ...4 9...
Страница 1770: ...6 4...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20...