00399153-configuration guide - vpn(v300r003_03).pdf

1462
Quidway NetEngine80E/40E Core Router V300R003 Configuration Guide - VPN Issue 03 Date 2008-09-22 Part Number 00399153 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.

Upload: nguyen-thi-thuy-anh

Post on 08-Feb-2016

56 views

Category:

Documents


2 download

TRANSCRIPT

  • Quidway NetEngine80E/40E Core RouterV300R003

    Configuration Guide - VPN

    Issue 03Date 2008-09-22Part Number 00399153

    Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

  • Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For anyassistance, please contact our local office or company headquarters. Huawei Technologies Co., Ltd.Address: Huawei Industrial Base

    Bantian, LonggangShenzhen 518129People's Republic of China

    Website: http://www.huawei.comEmail: [email protected] Copyright Huawei Technologies Co., Ltd. 2008. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior writtenconsent of Huawei Technologies Co., Ltd. Trademarks and Permissions

    and other Huawei trademarks are the property of Huawei Technologies Co., Ltd.All other trademarks and trade names mentioned in this document are the property of their respective holders. NoticeThe information in this document is subject to change without notice. Every effort has been made in thepreparation of this document to ensure accuracy of the contents, but the statements, information, andrecommendations in this document do not constitute a warranty of any kind, express or implied.

    Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

  • Contents

    About This Document.....................................................................................................................11 VPN Tunnel Management Configuration.............................................................................1-1

    1.1 Overview.........................................................................................................................................................1-21.1.1 Introduction to VPN Tunnels.................................................................................................................1-21.1.2 VPN Tunnel Features Supported by theNE80E/40E.............................................................................1-3

    1.2 Configuring Tunnel Interfaces........................................................................................................................1-41.2.1 Establishing the Configuration Task......................................................................................................1-41.2.2 Creating Tunnel Interfaces.....................................................................................................................1-51.2.3 Configuring a Tunnel Interface..............................................................................................................1-61.2.4 Checking the Configuration...................................................................................................................1-7

    1.3 Configuring Tunnel Policies in Select-Sequence Mode for L3VPN..............................................................1-81.3.1 Establishing the Configuration Task......................................................................................................1-81.3.2 Configuring a Tunnel Policy..................................................................................................................1-91.3.3 Applying a Tunnel Policy to L3VPN...................................................................................................1-101.3.4 Checking the Configuration.................................................................................................................1-10

    1.4 Configuring Tunnel Policies in Select-Sequence Mode for L2VPN............................................................1-111.4.1 Establishing the Configuration Task....................................................................................................1-121.4.2 Configuring a Tunnel Policy................................................................................................................1-121.4.3 Applying the Tunnel Policy to L2VPN................................................................................................1-131.4.4 Checking the Configuration.................................................................................................................1-15

    1.5 Configuring L3VPN Primary Tunnel Binding..............................................................................................1-161.5.1 Establishing the Configuration Task....................................................................................................1-161.5.2 Enabling the VPN Binding for a Tunnel..............................................................................................1-171.5.3 Configuring the Tunnel Binding in the Tunnel Policy.........................................................................1-181.5.4 Applying the Tunnel Policy to L3VPN................................................................................................1-181.5.5 Checking the Configuration.................................................................................................................1-19

    1.6 Configuring L2VPN Primary Tunnel Binding..............................................................................................1-201.6.1 Establishing the Configuration Task....................................................................................................1-201.6.2 Enabling the VPN Binding for a Tunnel..............................................................................................1-211.6.3 Configuring the Tunnel Binding in the Tunnel Policy.........................................................................1-221.6.4 Applying the Tunnel Policy to the Martini L2VPN.............................................................................1-231.6.5 Checking the Configuration.................................................................................................................1-23

    1.7 Maintaining a Tunnel....................................................................................................................................1-24

    Quidway NetEngine80E/40E Core RouterConfiguration Guide - VPN Contents

    Issue 03 (2008-09-22) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    i

  • 1.7.1 Monitoring the Running Status of a Tunnel.........................................................................................1-241.7.2 Debugging a Tunnel.............................................................................................................................1-25

    1.8 Configuration Examples................................................................................................................................1-261.8.1 Example for Configuring a Tunnel Policy for L3VPN........................................................................1-261.8.2 Example for Configuring Martini VLL by Using MPLS TE Tunnels.................................................1-361.8.3 Example for Configuring the Martini L2VPN Primary Tunnel Binding.............................................1-45

    2 GRE Configuration....................................................................................................................2-12.1 Introduction.....................................................................................................................................................2-2

    2.1.1 GRE........................................................................................................................................................2-22.1.2 GRE Features Supported by the NE80E/40E.........................................................................................2-2

    2.2 Configuring a GRE Tunnel.............................................................................................................................2-52.2.1 Establishing the Configuration Task......................................................................................................2-52.2.2 Configuring the Loopback Interface Bound to GRE..............................................................................2-62.2.3 Configuring a Tunnel Interface..............................................................................................................2-72.2.4 Configuring Routes for the Tunnel........................................................................................................2-82.2.5 Configuring GRE Security Options.......................................................................................................2-82.2.6 Checking the Configuration...................................................................................................................2-9

    2.3 Configuring a GRE Tunnel Between CE and PE..........................................................................................2-102.3.1 Establishing the Configuration Task....................................................................................................2-102.3.2 Configuring the GRE Tunnel Interface on CE.....................................................................................2-112.3.3 Configuring the GRE Tunnel Interface on PE.....................................................................................2-122.3.4 Binding the Tunnel with VPN to Which CE belongs on PE................................................................2-132.3.5 Checking the Configuration.................................................................................................................2-14

    2.4 Configuring the Keepalive Function.............................................................................................................2-152.4.1 Establishing the Configuration Task....................................................................................................2-152.4.2 Enabling the Keep-alive Function........................................................................................................2-162.4.3 Checking the Configuration.................................................................................................................2-16

    2.5 Configuration Examples................................................................................................................................2-172.5.1 Example for Configuring Static Routes for GRE.................................................................................2-182.5.2 Example for Configuring a Dynamic Routing Protocol for GRE........................................................2-222.5.3 Example for Configuring CE Users to Access a MPLS VPN Through a GRE Tunnel Traversing the PublicNetwork.........................................................................................................................................................2-252.5.4 Example for Configuring CE Users to Access an MPLS VPN Through a GRE Tunnel Traversing AnotherVPN...............................................................................................................................................................2-352.5.5 Example for Configuring the Keepalive Function for GRE.................................................................2-45

    3 BGP/MPLS IP VPN Configuration.........................................................................................3-13.1 Introduction.....................................................................................................................................................3-3

    3.1.1 Overview of BGP/MPLS IP VPN..........................................................................................................3-33.1.2 BGP/MPLS IP VPN Features Supported by the NE80E/40E................................................................3-4

    3.2 Configuring VPN Instances............................................................................................................................3-63.2.1 Establishing the Configuration Task......................................................................................................3-63.2.2 Creating a VPN Instance........................................................................................................................3-7

    ContentsQuidway NetEngine80E/40E Core Router

    Configuration Guide - VPN

    ii Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 3.2.3 Configuring Route Attributes of a VPN Instance..................................................................................3-73.2.4 (Optional) Applying a Tunnel Policy to the VPN Instance...................................................................3-83.2.5 Configuring MPLS Label Allocation Based on the VPN Instance........................................................3-93.2.6 Checking the Configuration...................................................................................................................3-9

    3.3 Configuring Basic BGP/MPLS IP VPN........................................................................................................3-103.3.1 Establishing the Configuration Task....................................................................................................3-103.3.2 Configuring a VPN Instance................................................................................................................3-113.3.3 Binding an Interface with a VPN Instance...........................................................................................3-113.3.4 Configuring MP-IBGP Between PEs...................................................................................................3-123.3.5 Configuring a Routing Protocol Between PE and CE..........................................................................3-123.3.6 Checking the Configuration.................................................................................................................3-20

    3.4 Configuring Hub&Spoke..............................................................................................................................3-203.4.1 Establishing the Configuration Task....................................................................................................3-213.4.2 Creating a VPN Instance......................................................................................................................3-223.4.3 Configuring Route Attributes of the VPN Instance.............................................................................3-233.4.4 Binding an Interface with the VPN Instance........................................................................................3-243.4.5 Configuring MP-IBGP Between Hub-PE and Spoke-PE....................................................................3-253.4.6 Configuring a Routing Protocol or Static Routes Between PE and CE...............................................3-253.4.7 Checking the Configuration.................................................................................................................3-26

    3.5 Configuring Inter-AS VPN Option A...........................................................................................................3-273.5.1 Establishing the Configuration Task....................................................................................................3-273.5.2 Configuring Inter-AS VPN Option A..................................................................................................3-283.5.3 Checking the Configuration.................................................................................................................3-28

    3.6 Configuring Inter-AS VPN Option B............................................................................................................3-293.6.1 Establishing the Configuration Task....................................................................................................3-293.6.2 Configuring MP-IBGP Between PE-ASBRs.......................................................................................3-303.6.3 Configuring MP-EBGP Between ASBRs............................................................................................3-313.6.4 Controlling the Receiving and Sending of VPN Routes......................................................................3-323.6.5 Storing Information About the VPN Instance on the ASBR PE..........................................................3-333.6.6 Configuring the Routing Protocol Between CE and PE......................................................................3-343.6.7 Checking the Configuration.................................................................................................................3-34

    3.7 Configuring Inter-AS VPN Option C............................................................................................................3-353.7.1 Establishing the Configuration Task....................................................................................................3-353.7.2 Enabling the Labeled IPv4 Route Exchange........................................................................................3-363.7.3 Configuring a Routing Policy to Control Label Distribution...............................................................3-383.7.4 Establishing the MP-EBGP Peer Between PEs....................................................................................3-393.7.5 Configuring the Routing Protocol Between CE and PE......................................................................3-403.7.6 Checking the Configuration.................................................................................................................3-40

    3.8 Configuring Carrier's Carrier........................................................................................................................3-413.8.1 Establishing the Configuration Task....................................................................................................3-413.8.2 Configuring Level 2 Carrier CE to Access Level 1 Carrier PE (Intra-AS)..........................................3-423.8.3 Configuring Level 2 Carrier CE to Access Level 1 Carrier PE (Inter-AS)..........................................3-44

    Quidway NetEngine80E/40E Core RouterConfiguration Guide - VPN Contents

    Issue 03 (2008-09-22) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    iii

  • 3.8.4 Configuring Level 2 Carrier's Customer to Access Level 2 Carrier PE...............................................3-483.8.5 Configuring External Route Exchanges Between Level 2 Carrier PEs...............................................3-483.8.6 Checking the Configuration.................................................................................................................3-50

    3.9 Configuring HoVPN.....................................................................................................................................3-503.9.1 Establishing the Configuration Task....................................................................................................3-513.9.2 Specifying UPE....................................................................................................................................3-513.9.3 Advertising Default Routes of a VPN Instance...................................................................................3-523.9.4 Checking the Configuration.................................................................................................................3-52

    3.10 Configuring OSPF Sham Link....................................................................................................................3-533.10.1 Establishing the Configuration Task..................................................................................................3-533.10.2 Configuring the Loopback Address of the Sham Link......................................................................3-543.10.3 Advertising Routes of End Address of the Sham Link......................................................................3-543.10.4 Creating a Sham Link.........................................................................................................................3-553.10.5 Checking the Configuration...............................................................................................................3-56

    3.11 Configuring Multi-VPN-Instance CE.........................................................................................................3-563.11.1 Establishing the Configuration Task..................................................................................................3-573.11.2 Configuring the OSPF Multi-Instance on the PE...............................................................................3-573.11.3 Configuring the OSPF Multi-Instance on the Multi-Instance CE......................................................3-583.11.4 Canceling the Loop Detection on the Multi-Instance CE..................................................................3-593.11.5 Checking the Configuration...............................................................................................................3-59

    3.12 Configuring PBR to VPN............................................................................................................................3-603.12.1 Establishing the Configuration Task..................................................................................................3-603.12.2 Creating a VPN Group.......................................................................................................................3-613.12.3 Setting a Traffic Behavior for the Unicast Policy-based Route.........................................................3-623.12.4 Applying the Policy-based Route.......................................................................................................3-623.12.5 Configuring the Route for Returned IP Packets.................................................................................3-633.12.6 Checking the Configuration...............................................................................................................3-64

    3.13 Connecting VPN and the Internet...............................................................................................................3-653.13.1 Establishing the Configuration Task..................................................................................................3-653.13.2 Configuring the Static Route on the CE.............................................................................................3-653.13.3 Configuring the Static Route on the PE and Import the Static Route to VPN...................................3-663.13.4 Configuring the Static Route to VPN on the Device of the Public Network.....................................3-663.13.5 Checking the Configuration...............................................................................................................3-67

    3.14 Configuring IP FRR of a Private Network..................................................................................................3-673.14.1 Establishing the Configuration Task..................................................................................................3-673.14.2 Configuring a Routing Policy............................................................................................................3-683.14.3 Enabling IP FRR in a Private Network..............................................................................................3-683.14.4 Checking the Configuration...............................................................................................................3-69

    3.15 Configuring VPN FRR................................................................................................................................3-693.15.1 Establishing the Configuration Task..................................................................................................3-693.15.2 Configuring a Routing Policy............................................................................................................3-703.15.3 Enabling VPN FRR............................................................................................................................3-70

    ContentsQuidway NetEngine80E/40E Core Router

    Configuration Guide - VPN

    iv Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 3.15.4 Checking the Configuration...............................................................................................................3-713.16 Configuring VPN GR..................................................................................................................................3-72

    3.16.1 Establishing the Configuration Task..................................................................................................3-723.16.2 Configuring the IGP GR on the Backbone Network..........................................................................3-733.16.3 Configuring the MPLS GR on the Backbone Network......................................................................3-743.16.4 Configuring the GR of the Routing Protocol Between PEs and CEs.................................................3-763.16.5 Configuring BGP GR for MP-BGP...................................................................................................3-783.16.6 Checking the Configuration...............................................................................................................3-78

    3.17 Configuring Route Reflection to Optimize the VPN Backbone Layer.......................................................3-793.17.1 Establishing the Configuration Task..................................................................................................3-793.17.2 Configuring the Client PEs to Establish MP IBGP Connections with the RR..................................3-803.17.3 Configuring the RR to Establish MP IBGP Connections with the Client PEs..................................3-803.17.4 Configuring Route Reflection for BGP IPv4 VPN routes.................................................................3-823.17.5 Checking the Configuration...............................................................................................................3-83

    3.18 Configuring Route Reflection to Optimize the VPN Access Layer............................................................3-833.18.1 Establishing the Configuration Task..................................................................................................3-843.18.2 Configuring All Client CEs to Establish IBGP Connections with the RR.........................................3-843.18.3 Configuring the RR to Establish MP IBGP Connections with All Client CEs..................................3-853.18.4 Configuring Route Reflection for the Routes of the BGP VPN Instance..........................................3-863.18.5 Checking the Configuration...............................................................................................................3-87

    3.19 Configuring Convergence Priorities for VPN Routes.................................................................................3-883.19.1 Establishing the Configuration Task..................................................................................................3-893.19.2 Configuring a Routing Policy Differentiating Convergence Priorities..............................................3-893.19.3 Applying the Routing Policy..............................................................................................................3-903.19.4 Checking the Configuration...............................................................................................................3-91

    3.20 Maintaining BGP/MPLS IP VPN...............................................................................................................3-913.20.1 Taking Statistics of L3VPN Traffic...................................................................................................3-913.20.2 Checking L3VPN Traffic...................................................................................................................3-923.20.3 Clearing L3VPN Traffic.....................................................................................................................3-923.20.4 Displaying BGP/MPLS IP VPN Information....................................................................................3-923.20.5 Checking the Network Connectivity and Reachability......................................................................3-933.20.6 Resetting BGP Statistics of VPN instance.........................................................................................3-943.20.7 Resetting BGP Connections...............................................................................................................3-943.20.8 Debugging the BGP/MPLS IP VPN Information..............................................................................3-95

    3.21 Configuration Examples..............................................................................................................................3-963.21.1 Example for Configuring BGP/MPLS IP VPN..................................................................................3-963.21.2 Example for Configuring BGP/MPLS IP VPN with a GRE Tunnel...............................................3-1063.21.3 Example for Configuring the BGP AS Number Substitution..........................................................3-1143.21.4 Example for Configuring Hub&Spoke............................................................................................3-1203.21.5 Example for Configuring Inter-AS VPN Option A.........................................................................3-1283.21.6 Example for Configuring Inter-AS VPN Option B..........................................................................3-1363.21.7 Example for Configuring Inter-AS VPN Option C..........................................................................3-142

    Quidway NetEngine80E/40E Core RouterConfiguration Guide - VPN Contents

    Issue 03 (2008-09-22) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    v

  • 3.21.8 Example for Configuring Carrier's Carrier in the Same AS.............................................................3-1483.21.9 Example for Configuring the Carrier's Carrier (Inter-AS)...............................................................3-1593.21.10 Example for Configuring HoVPN..................................................................................................3-1703.21.11 Example for Configuring OSPF Sham Link..................................................................................3-1763.21.12 Example for Configuring Multi-VPN-Instance CE.......................................................................3-1863.21.13 Example for Configuring PBR to VPN..........................................................................................3-1953.21.14 Example for Connecting VPN and Internet...................................................................................3-2043.21.15 Example for Configuring a Dual-Homed CE.................................................................................3-2093.21.16 Example for Configuring Load Balancing Among EBGP and IBGP Routes When CEs Are Dual-Homed.....................................................................................................................................................................3-2273.21.17 Example for Configuring the IP FRR of the Private Network.......................................................3-2343.21.18 Example for Configuring VPN FRR..............................................................................................3-2383.21.19 Example for Configuring VPN GR................................................................................................3-2463.21.20 Example for Configuring the VPN with Double Reflectors..........................................................3-2553.21.21 Example for Configuring VPN-Route Convergence Priorities......................................................3-263

    4 BGP/MPLS IPv6 VPN Configuration.....................................................................................4-14.1 Overview.........................................................................................................................................................4-2

    4.1.1 Introduction to BGP/MPLS IPv6 VPN..................................................................................................4-24.1.2 BGP/MPLS IPv6 VPN Features Supported by the NE80E/40E............................................................4-3

    4.2 Configuring IPv6 VPN Instances....................................................................................................................4-34.2.1 Establishing the Configuration Task......................................................................................................4-44.2.2 Creating an IPv6 VPN Instance............................................................................................................. 4-44.2.3 Configuring Route Related Attributes of an IPv6 VPN Instance...........................................................4-54.2.4 Configuring MPLS Label Allocation Based on the IPv6 VPN Instance............................................... 4-64.2.5 Checking the Configuration...................................................................................................................4-7

    4.3 Configuring Basic BGP/MPLS IPv6 VPN......................................................................................................4-74.3.1 Establishing the Configuration Task......................................................................................................4-84.3.2 Configuring an IPv6 VPN Instance........................................................................................................4-94.3.3 Binding an IPv6 VPN Instance with an Interface..................................................................................4-94.3.4 Configuring MP-IBGP Between PEs.....................................................................................................4-94.3.5 Configuring a Routing Protocol Between PE and CE..........................................................................4-104.3.6 Checking the Configuration.................................................................................................................4-16

    4.4 Configuring Hub&Spoke..............................................................................................................................4-164.4.1 Establishing the Configuration Task....................................................................................................4-164.4.2 Creating IPv6 VPN Instances...............................................................................................................4-174.4.3 Configuring Route Related Attributes of an IPv6 VPN Instance.........................................................4-184.4.4 Binding an IPv6 VPN Instance with an Interface................................................................................4-204.4.5 Configuring MP-IBGP Between Hub-PE and Spoke-PE....................................................................4-214.4.6 Configuring Routing Between PE and CE...........................................................................................4-224.4.7 Checking the Configuration.................................................................................................................4-22

    4.5 Configuring Inter-AS IPv6 VPN-Option A..................................................................................................4-234.5.1 Establishing the Configuration Task....................................................................................................4-23

    ContentsQuidway NetEngine80E/40E Core Router

    Configuration Guide - VPN

    vi Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 4.5.2 Configuring Inter-AS IPv6 VPN Option A..........................................................................................4-244.5.3 Checking the Configuration.................................................................................................................4-24

    4.6 Configuring Inter-AS IPv6 VPN-Option B...................................................................................................4-254.6.1 Establishing the Configuration Task....................................................................................................4-254.6.2 Configuring MP-IBGP Between PE and ASBR PE.............................................................................4-264.6.3 Configuring MP-EBGP Between ASBR PEs......................................................................................4-274.6.4 Controlling the Receiving and Sending of VPN Routes......................................................................4-284.6.5 Storing Information About the IPv6 VPN Instance on the ASBR PEs................................................4-294.6.6 Configuring Routing Between PE and CE...........................................................................................4-304.6.7 Checking the Configuration.................................................................................................................4-30

    4.7 Configuring Inter-AS IPv6 VPN-Option C...................................................................................................4-304.7.1 Establishing the Configuration Task....................................................................................................4-314.7.2 Enabling the Exchange of Labeled IPv4 Routes..................................................................................4-324.7.3 Configuring a Routing Policy to Control Label Distribution...............................................................4-334.7.4 Establishing the MP-EBGP Peer Between PEs....................................................................................4-344.7.5 Configuring Routing Between PE and CE...........................................................................................4-354.7.6 Checking the Configuration.................................................................................................................4-35

    4.8 Configuring Carrier's Carrier........................................................................................................................4-364.8.1 Establishing the Configuration Task....................................................................................................4-364.8.2 Configuring Level 2 Carrier CE to Access Level 1 Carrier PE (Intra-AS)..........................................4-374.8.3 Configuring Level 2 Carrier CE to Access Level 1 Carrier PE (Inter-AS)..........................................4-404.8.4 Configuring Level 2 Carrier's Customer to Access Level 2 Carrier PE...............................................4-444.8.5 Configuring External Route Exchanges Between Level 2 Carrier PEs...............................................4-444.8.6 Checking the Configuration.................................................................................................................4-45

    4.9 Configuring Route Reflection for BGP IPv6 VPN Routes...........................................................................4-464.9.1 Establishing the Configuration Task....................................................................................................4-464.9.2 Configuring the Client PEs to Establish MP IBGP Connections with the RR....................................4-474.9.3 Configuring the RR to Establish MP IBGP Connections with All Client PEs....................................4-484.9.4 Configuring Route Reflection for BGP IPv6 VPN Routes..................................................................4-494.9.5 Checking the Configuration.................................................................................................................4-50

    4.10 Maintaining BGP/MPLS IPv6 VPN...........................................................................................................4-514.10.1 Displaying BGP/MPLS IPv6 VPN Information................................................................................4-514.10.2 Checking the Network Connectivity and Reachability......................................................................4-524.10.3 Resetting BGP Statistics of IPv6 VPN Instance................................................................................4-534.10.4 Resetting BGP Connections...............................................................................................................4-534.10.5 Debugging BGP/MPLS IPv6 VPN....................................................................................................4-54

    4.11 Configuration Examples..............................................................................................................................4-544.11.1 Example for Configuring BGP/MPLS IPv6 VPN..............................................................................4-554.11.2 Example for Configuring Hub and Spoke (BGP4+ Between the PE and the CE).............................4-664.11.3 Example for Configuring Hub and Spoke (Default Route Between the Hub-PE and the Hub-CE).......................................................................................................................................................................4-764.11.4 Example for Configuring Inter-AS VPN Option A...........................................................................4-874.11.5 Example for Configuring Inter-AS VPN Option B............................................................................4-96

    Quidway NetEngine80E/40E Core RouterConfiguration Guide - VPN Contents

    Issue 03 (2008-09-22) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    vii

  • 4.11.6 Example for Configuring Inter-AS VPN Option C..........................................................................4-1034.11.7 Example for Configuring Carrier's Carrier in a Same AS................................................................4-1114.11.8 Example for Configuring the Carrier's Carrier (Inter-AS)...............................................................4-1224.11.9 Example for Configuring Route Reflector in an IPv6 VPN.............................................................4-133

    5 VLL Configuration.....................................................................................................................5-15.1 Overview.........................................................................................................................................................5-2

    5.1.1 Introduction to VLL...............................................................................................................................5-25.1.2 VLL Features Supported by the NE80E/40E.........................................................................................5-4

    5.2 Configuring CCC VLL....................................................................................................................................5-95.2.1 Establishing the Configuration Task......................................................................................................5-95.2.2 Enabling the MPLS L2VPN.................................................................................................................5-105.2.3 Creating a Local CCC Connection.......................................................................................................5-105.2.4 Creating a Remote CCC Connection...................................................................................................5-115.2.5 Checking the Configuration.................................................................................................................5-12

    5.3 Configuring the SVC VLL............................................................................................................................5-125.3.1 Establishing the Configuration Task....................................................................................................5-135.3.2 Enabling MPLS L2VPN.......................................................................................................................5-145.3.3 Creating an SVC VLL Connection......................................................................................................5-145.3.4 Checking the Configuration.................................................................................................................5-14

    5.4 Configuring Martini VLL..............................................................................................................................5-155.4.1 Establishing the Configuration Task....................................................................................................5-155.4.2 Enabling MPLS L2VPN.......................................................................................................................5-165.4.3 Creating a Martini VLL Connection....................................................................................................5-175.4.4 Checking the Configuration.................................................................................................................5-18

    5.5 Configuring Kompella VLL..........................................................................................................................5-195.5.1 Establishing the Configuration Task....................................................................................................5-195.5.2 Enabling MPLS L2VPN.......................................................................................................................5-205.5.3 Configuring BGP/MPLS L2VPN.........................................................................................................5-205.5.4 Configuring a VPN...............................................................................................................................5-215.5.5 Creating a CE Connection....................................................................................................................5-225.5.6 (Optional) Configuring BGP L2VPN Features....................................................................................5-245.5.7 Checking the Configuration.................................................................................................................5-25

    5.6 Configuring VLL IP Interworking................................................................................................................5-275.6.1 Establishing the Configuration Task....................................................................................................5-275.6.2 Configuring Local CCC Connection IP-Interworking.........................................................................5-285.6.3 Configuring Remote CCC Connection IP-Interworking......................................................................5-285.6.4 Configuring Martini L2VPN IP-Interworking.....................................................................................5-295.6.5 Configuring Kompella L2VPN IP-Interworking.................................................................................5-305.6.6 Configuring the PE to Access the CE Through Ethernet or VLAN.....................................................5-305.6.7 Checking the Configuration.................................................................................................................5-32

    5.7 Configuring Inter-AS Martini VLL...............................................................................................................5-345.7.1 Establishing the Configuration Task....................................................................................................5-34

    ContentsQuidway NetEngine80E/40E Core Router

    Configuration Guide - VPN

    viii Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 5.7.2 Configuring Inter-AS Option A...........................................................................................................5-355.7.3 Configuring Inter-AS Option C............................................................................................................5-355.7.4 Checking the Configuration.................................................................................................................5-38

    5.8 Configuring the Inter-AS Kompella VLL.....................................................................................................5-395.8.1 Establishing the Configuration Task....................................................................................................5-395.8.2 Configuring the Inter-AS Kompella VLL Option A............................................................................5-405.8.3 Configuring the Inter-AS Kompella VLL Option C............................................................................5-415.8.4 Checking the Configuration.................................................................................................................5-44

    5.9 Configuring VLL FRR..................................................................................................................................5-465.9.1 Establishing the Configuration Task....................................................................................................5-465.9.2 Configuring BFD for PW.....................................................................................................................5-475.9.3 Configuring OAM Mapping.................................................................................................................5-495.9.4 (Optional) Configuring the Revertive Switchover Policy....................................................................5-505.9.5 Checking the Configuration.................................................................................................................5-51

    5.10 Maintaining VLL.........................................................................................................................................5-555.10.1 Resetting BGP L2VPN TCP Connections.........................................................................................5-555.10.2 Monitoring the Running Status of L2VPN........................................................................................5-565.10.3 Debugging VLL.................................................................................................................................5-56

    5.11 Configuration Examples..............................................................................................................................5-575.11.1 Example for Configuring a Local CCC Connection..........................................................................5-585.11.2 Example for Configuring a Remote CCC Connection.......................................................................5-605.11.3 Example for Configuring SVC VLL..................................................................................................5-665.11.4 Example for Configuring Martini VLL..............................................................................................5-715.11.5 Example for Configuring a Local Kompella VLL Connection..........................................................5-775.11.6 Example for Configuring a Remote Kompella VLL Connection......................................................5-795.11.7 Example for Configuring VLL Internetworking (Interconnecting Ethernet with PPP by Using the RemoteCCC Connection)..........................................................................................................................................5-855.11.8 Example for Configuring VLL Internetworking (Interconnecting Ethernet with HDLC in Martini Mode).......................................................................................................................................................................5-915.11.9 Example for Configuring VLL Internetworking (Interconnecting VLAN with ATM by Using the LocalKompella Connection)..................................................................................................................................5-975.11.10 Example for Configuring VLL Internetworking (Interconnecting VLAN with PPP by Using the RemoteKompella Connection)................................................................................................................................5-1015.11.11 Examples for Configuring ACs of L2VPN IP-interworking.........................................................5-1095.11.12 Example for Configuring the Inter-AS Martini VLL Option A.....................................................5-1125.11.13 Example for Configuring the Inter-AS Martini VLL Option C.....................................................5-1195.11.14 Example for Configuring the Inter-AS Kompella VLL Option A.................................................5-1275.11.15 Example for Configuring the Inter-AS Kompella VLL Option C.................................................5-1365.11.16 Example for Configuring Martini VLL FRR (Symmetrically Dual-homed CEs).........................5-1455.11.17 Example for Configuring Martini VLL FRR (Asymmetrically Connected CEs)..........................5-1605.11.18 Example for Configuring Kompella VLL with Two Reflectors....................................................5-178

    6 PWE3 Configuration..................................................................................................................6-16.1 Introduction.....................................................................................................................................................6-3

    Quidway NetEngine80E/40E Core RouterConfiguration Guide - VPN Contents

    Issue 03 (2008-09-22) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    ix

  • 6.1.1 PWE3.....................................................................................................................................................6-36.1.2 PWE3 Features Supported by the NE80E/40E......................................................................................6-4

    6.2 Configuring Attributes of a PW Template....................................................................................................6-166.2.1 Establishing the Configuration Task....................................................................................................6-166.2.2 Creating PW Template.........................................................................................................................6-176.2.3 Setting Attributes for the PW Template...............................................................................................6-176.2.4 Checking the Configuration.................................................................................................................6-18

    6.3 Configuring Static PWs.................................................................................................................................6-186.3.1 Establishing the Configuration Task....................................................................................................6-196.3.2 Enabling MPLS L2VPN.......................................................................................................................6-196.3.3 Creating Static PW Connection............................................................................................................6-206.3.4 Checking the Configuration.................................................................................................................6-20

    6.4 Configuring Dynamic PWs...........................................................................................................................6-216.4.1 Establishing the Configuration Task....................................................................................................6-216.4.2 Enabling MPLS L2VPN.......................................................................................................................6-226.4.3 Creating Dynamic PW.........................................................................................................................6-226.4.4 Checking the Configuration.................................................................................................................6-23

    6.5 Configuring PW Switching...........................................................................................................................6-246.5.1 Establishing the Configuration Task....................................................................................................6-246.5.2 Configuring PW Switching..................................................................................................................6-256.5.3 Checking the Configuration.................................................................................................................6-27

    6.6 Configuring a Backup PW............................................................................................................................6-286.6.1 Establishing the Configuration Task....................................................................................................6-286.6.2 Configuring Backup PWs.....................................................................................................................6-296.6.3 Checking the Configuration.................................................................................................................6-30

    6.7 Configuring Static BFD for PW....................................................................................................................6-326.7.1 Establishing the Configuration Task....................................................................................................6-326.7.2 Enabling Global BFD...........................................................................................................................6-336.7.3 Configuring BFD for PW.....................................................................................................................6-336.7.4 Checking the Configuration.................................................................................................................6-34

    6.8 Configuring Dynamic BFD for PW..............................................................................................................6-356.8.1 Establishing the Configuration Task....................................................................................................6-356.8.2 Enabling Glocal BFD...........................................................................................................................6-366.8.3 Configuring Attributes of the PW Template........................................................................................6-366.8.4 (Optional) Adjusting BFD Parameters.................................................................................................6-366.8.5 Configuring PWs..................................................................................................................................6-376.8.6 Tiggering Dynamic BFD for PW.........................................................................................................6-376.8.7 Checking the Configuration.................................................................................................................6-38

    6.9 Configuring PW FRR....................................................................................................................................6-396.9.1 Establishing the Configuration Task....................................................................................................6-396.9.2 Configuring BFD for PW.....................................................................................................................6-416.9.3 Configuring OAM Mapping.................................................................................................................6-41

    ContentsQuidway NetEngine80E/40E Core Router

    Configuration Guide - VPN

    x Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 6.9.4 (Optional) Configuring the Revertive Switchover...............................................................................6-426.9.5 Checking the Configuration.................................................................................................................6-43

    6.10 Configuring Heterogeneous Transport in PWE3........................................................................................6-476.10.1 Establishing the Configuration Task..................................................................................................6-476.10.2 Configuring PWE3 to Support IP-Interworking................................................................................6-476.10.3 Checking the Configuration...............................................................................................................6-49

    6.11 Configuring Inter-AS PWE3.......................................................................................................................6-516.11.1 Establishing the Configuration Task..................................................................................................6-516.11.2 Configuring Inter-AS PWE3-Option A..............................................................................................6-526.11.3 Configuring Inter-AS PWE3-Option C..............................................................................................6-526.11.4 Checking the Configuration...............................................................................................................6-55

    6.12 Configuing ATM Cell Transport.................................................................................................................6-566.12.1 Establishing the Configuration Task..................................................................................................6-566.12.2 Configuring the ATM Interface Connecting a CE to a PE.................................................................6-576.12.3 Configuring ATM Cell Transport......................................................................................................6-586.12.4 Configuring PWE3.............................................................................................................................6-626.12.5 (Optional) Deleting ATM Cell Transport..........................................................................................6-626.12.6 Checking the Configuration...............................................................................................................6-66

    6.13 Maintaining a PW........................................................................................................................................6-666.13.1 Verifying the Connectivity of a PW...................................................................................................6-676.13.2 Debugging a PW................................................................................................................................6-676.13.3 Debugging a PWE3............................................................................................................................6-69

    6.14 Configuration Examples..............................................................................................................................6-706.14.1 Example for Configuring Dynamic SH-PW (Using the LSP Tunnel)...............................................6-716.14.2 Example for Configuring Dynamic SH-PW (Using the GRE Tunnel)..............................................6-766.14.3 Example for Configuring Static PWs Switching................................................................................6-826.14.4 Example for Configuring Dynamic PWs Switching..........................................................................6-896.14.5 Example for Configuring Mixed PWs Switching............................................................................6-1016.14.6 Example for Configuring the PWE3 Convergence..........................................................................6-1086.14.7 Example for Configuring a Static BFD That Checks PWs..............................................................6-1166.14.8 Example for Configuring a Dynamic BFD That Checks SH-PW....................................................6-1326.14.9 Example for Configuring a Dynamic BFD That Checks MH-PW..................................................6-1406.14.10 Example for Configuring PW FRR CEs Are Symmetrically Connected to PEs Through POS Links.....................................................................................................................................................................6-1526.14.11 Example for Configuring PW FRR CEs Are Asymmetrically Connected to PEs Through POS Links.....................................................................................................................................................................6-1676.14.12 Example for Configuring PW FRR - CEs Are Symmetrically Connected to PEs Through EthernetLinks, Dynamic BFD Is Used to Detect PWs, EFM Is Used to Detect ACs..............................................6-1896.14.13 Example for Configuring PW FRR - CEs Are Unsymmetrically Connected to PEs Through EthernetLinks, Dynamic BFD Is Used to Detect PWs, EFM Is Used to Detect ACs..............................................6-2056.14.14 Example for Configuring PW FRR - CEs Are Unsymmetrically Connected to PEs Through EthernetLinks, Dynamic BFD Is Used to Detect PWs, CFM Is Used to Detect ACs..............................................6-2256.14.15 Example for Configuring PW FRR - CEs Are Unsymmetrically Connected to PEs Through EthernetLinks, Static BFD Is Used to Detect PWs, CFM Is Used to Detect ACs...................................................6-246

    Quidway NetEngine80E/40E Core RouterConfiguration Guide - VPN Contents

    Issue 03 (2008-09-22) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xi

  • 6.14.16 Example for Configuring the PWE3 Internetworking...................................................................6-2676.14.17 Example for Configuring Inter-AS PWE3-Option A.....................................................................6-2736.14.18 Example for Configuring Inter-AS PWE3-OptionC......................................................................6-2796.14.19 Example for Configuring Interface-based Remote ATM Cell Transport......................................6-2886.14.20 Example for Configuring 1-to1 VCC ATM Cell Transport...........................................................6-2966.14.21 Example for Configuring N-to-1 VCC ATM Cell Transport........................................................6-3016.14.22 Example for Configuring N-to-1 VCC ATM Cell Transport with VPI/VCI Mapping.................6-3076.14.23 Example for Configuring 1-to-1 VPC ATM Cell Transport..........................................................6-3136.14.24 Example for Configuring N-to-1 VPC ATM Cell Transport.........................................................6-3186.14.25 Example for Configuring N-to-1 VPC ATM Cell Transport with VPI Mapping..........................6-3246.14.26 Example for Configuring ATM AAL5 SDU Transport.................................................................6-330

    7 VPLS Configuration..................................................................................................................7-17.1 Introduction.....................................................................................................................................................7-3

    7.1.1 VPLS......................................................................................................................................................7-37.1.2 VPLS Features Supported by the NE80E/40E.......................................................................................7-4

    7.2 Configuring Kompella VPLS........................................................................................................................7-107.2.1 Establishing the Configuration Task....................................................................................................7-117.2.2 Enabling the BGP Peer to Exchange VPLS Information.....................................................................7-117.2.3 Creating a VSI and Configuring BGP Signaling.................................................................................7-127.2.4 (Optional) Configuring Huawei Devices to Communicate with Non-Huawei Devices......................7-147.2.5 Binding the VSI to the Interface Connected with CE..........................................................................7-157.2.6 (Optional) Configuring Route Reflection for BGP VPLS...................................................................7-197.2.7 Checking the Configuration.................................................................................................................7-20

    7.3 Configuring Martini VPLS............................................................................................................................7-217.3.1 Establishing the Configuration Task....................................................................................................7-217.3.2 Creating a VSI and Configuring LDP Signaling..................................................................................7-227.3.3 Binding the VSI to the Interface Connected with CE..........................................................................7-237.3.4 Checking the Configuration.................................................................................................................7-27

    7.4 Configuring LDP HVPLS.............................................................................................................................7-287.4.1 Establishing the Configuration Task....................................................................................................7-287.4.2 Configuring SPE..................................................................................................................................7-297.4.3 Configuring UPE..................................................................................................................................7-307.4.4 Checking the Configuration.................................................................................................................7-30

    7.5 Configuring Loop Detection of ACs in a VPLS Network............................................................................7-317.5.1 Establishing the Configuration Task....................................................................................................7-317.5.2 Enabling Loop Detection Globally......................................................................................................7-327.5.3 Configuring Loop Detection................................................................................................................7-327.5.4 Checking the Configuration.................................................................................................................7-33

    7.6 Configuring a VLL to Access the VPLS.......................................................................................................7-347.6.1 Establishing the Configuration Task....................................................................................................7-347.6.2 Configuring a Dynamic VLL to Access the VPLS..............................................................................7-357.6.3 Configuring a Static VLL to Access the VPLS....................................................................................7-36

    ContentsQuidway NetEngine80E/40E Core Router

    Configuration Guide - VPN

    xii Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 7.6.4 Checking the Configuration.................................................................................................................7-377.7 Configuring the Static VLL to Access the VPLS Network in Dual-homed Mode.......................................7-40

    7.7.1 Establishing the Configuration Task....................................................................................................7-407.7.2 Configuring L2VPN and OAM to Detect PSN Tunnels......................................................................7-417.7.3 Configuring Static LSPs Between the UPE and the SPE.....................................................................7-427.7.4 Configuring the Primary Tunnel, Protection Tunnel, and Reverse LSP of MPLS TE........................7-427.7.5 Configuring the Tunnel Policy.............................................................................................................7-437.7.6 Configuring UPEs to Access SPEs Through Static VLLs...................................................................7-447.7.7 Configuring MPLS OAM.....................................................................................................................7-447.7.8 Configuring HVPLS for the SPE.........................................................................................................7-457.7.9 Checking the Configuration.................................................................................................................7-46

    7.8 Configuring Inter-AS Kompella VPLS.........................................................................................................7-497.8.1 Establishing the Configuration Task....................................................................................................7-497.8.2 Configuring Inter-AS Kompella VPLS Option A................................................................................7-507.8.3 Configuring Inter-AS Kompella VPLS Option C................................................................................7-517.8.4 Checking the Configuration.................................................................................................................7-54

    7.9 Configuring Inter-AS Martini VPLS.............................................................................................................7-557.9.1 Establishing the Configuration Task....................................................................................................7-567.9.2 Configuring Inter-AS Martini VPLS Option A....................................................................................7-567.9.3 Configuring Inter-AS Martini VPLS Option C....................................................................................7-577.9.4 Checking the Configuration.................................................................................................................7-59

    7.10 Configuring Dual-homed Kompella VPLS.................................................................................................7-617.10.1 Establishing the Configuration Task..................................................................................................7-617.10.2 Creating VSIs and Configuring BGP Signaling.................................................................................7-617.10.3 Configuring the Multi-homed Preference for a VSI..........................................................................7-637.10.4 Binding a VSI to an AC Interface......................................................................................................7-647.10.5 Checking the Configuration...............................................................................................................7-64

    7.11 Configuring Related Parameters of a VSI...................................................................................................7-657.11.1 Establishing the Configuration Task..................................................................................................7-657.11.2 Configuring General Parameters of the VSI......................................................................................7-657.11.3 Configuring MAC Address Learning.................................................................................................7-667.11.4 Configuring Delay Processing on VPLS............................................................................................7-67

    7.12 Maintaining VPLS.......................................................................................................................................7-687.12.1 Collecting the Statistics of the Traffic on a VPLS PW......................................................................7-687.12.2 Checking the Traffic on a VPLS PW.................................................................................................7-697.12.3 Clearing the Traffic Statistics.............................................................................................................7-697.12.4 Debugging VPLS...............................................................................................................................7-697.12.5 Enabling or Disabling VSI.................................................................................................................7-707.12.6 Clearing MAC Address Entries..........................................................................................................7-70

    7.13 Configuration Examples..............................................................................................................................7-717.13.1 Example for Configuring Kompella VPLS........................................................................................7-717.13.2 Example for Configuring Martini VPLS............................................................................................7-77

    Quidway NetEngine80E/40E Core RouterConfiguration Guide - VPN Contents

    Issue 03 (2008-09-22) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xiii

  • 7.13.3 Example for Configuring VPLS over TE in Martini Mode...............................................................7-827.13.4 Example for Configuring LDP HVPLS.............................................................................................7-917.13.5 Example for Configuring Loop Detection of ACs in a VPLS Network............................................ 7-967.13.6 Example for Configuring a dynamic VLL to Access the VPLS......................................................7-1047.13.7 Example for Configuring the Static VLL to Access the VPLS Network.........................................7-1127.13.8 Example for Configuring the Static VLL to Access the VPLS Network in Dual-homed Mode.....7-1217.13.9 Example for Configuring Inter-AS Kompella VPLS Option A.......................................................7-1427.13.10 Example for Configuring Inter-AS Kompella VPLS Option C.....................................................7-1517.13.11 Example for Configuring the Inter-AS Martini VPLS Option A...................................................7-1607.13.12 Example for Configuring Inter-AS Martini VPLS Option C.........................................................7-1677.13.13 Example for Configuring Dual-homed Kompella VPLS...............................................................7-1767.13.14 Example for Configuring Kompella VPLS with Two Reflectors..................................................7-185

    8 Access of L2VPN to L3VPN Configuration...........................................................................8-18.1 Overview.........................................................................................................................................................8-2

    8.1.1 L2VPN to L3VPN..................................................................................................................................8-28.1.2 Access of L2VPN to L3VPN Implemented on the NE80E/40E............................................................8-3

    8.2 Configuring the Access of VLL to the Public Network or L3VPN................................................................8-48.2.1 Establishing the Configuration Task......................................................................................................8-48.2.2 Creating an L2VE Interface...................................................................................................................8-68.2.3 Creating an L3VE Interface...................................................................................................................8-68.2.4 Associating the L2VE Interface with a VLL..........................................................................................8-78.2.5 Configuring the Access to the Public Network or L3VPN....................................................................8-78.2.6 Checking the Configuration...................................................................................................................8-8

    8.3 Configuring the Access of VPLS to the Public Network or L3VPN..............................................................8-98.3.1 Establishing the Configuration Task......................................................................................................8-98.3.2 Creating an L2VE Interface................................................................................................................. 8-118.3.3 Creating an L3VE Interface................................................................................................................. 8-118.3.4 Binding a VSI to the L2VE Interface...................................................................................................8-128.3.5 Configuring the Access to the Public Network or an L3VPN............................................................. 8-128.3.6 Checking the Configuration.................................................................................................................8-13

    8.4 Configuring an L2VPN to Access Multiple L3VPNs Through Sub-interfaces for QinQ VLAN Tag Termination.............................................................................................................................................................................8-14

    8.4.1 Establishing the Configuration Task....................................................................................................8-148.4.2 Creating an L2VE Interface................................................................................................................. 8-168.4.3 Creating an L3VE Interface................................................................................................................. 8-168.4.4 Setting the L3VE Interface to User Termination Mode.......................................................................8-178.4.5 Creating the L3VE Sub-interface Terminated by QinQ.......................................................................8-178.4.6 Associating the L3VE Sub-interface Terminated by QinQ with an L3VPN Instance.........................8-188.4.7 Binding the L2VE to VLL or VPLS.................................................................................................... 8-198.4.8 Checking the Configuration.................................................................................................................8-19

    8.5 Configuration Examples................................................................................................................................8-198.5.1 Example for Configuring a Martini VLL to Access an L3VPN.......................................................... 8-20

    ContentsQuidway NetEngine80E/40E Core Router

    Configuration Guide - VPN

    xiv Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 8.5.2 Example for Configuring the Access of Martini VLL to the Public Network.....................................8-298.5.3 Example for Configuring the Access of Martini VPLS to L3VPN......................................................8-358.5.4 Example for Configuring the Dual-homing Access of Dynamic Master/Backup VPLS to an L3VPN.......................................................................................................................................................................8-478.5.5 Example for Configuring an L2VPN to Access Multiple L3VPNs Through Sub-interfaces for QinQVLAN Tag Termination................................................................................................................................8-78

    9 VPLS Convergence Configuration..........................................................................................9-19.1 Introduction.....................................................................................................................................................9-2

    9.1.1 Overview................................................................................................................................................9-29.1.2 VPLS Convergence Features Supported in theNE80E/40E...................................................................9-2

    9.2 Configuring mVSIs.........................................................................................................................................9-89.2.1 Establishing the Configuration Task......................................................................................................9-99.2.2 Creating an mVSI.................................................................................................................................9-109.2.3 Binding a Service VSI to the mVSI.....................................................................................................9-119.2.4 Checking the Configuration.................................................................................................................9-11

    9.3 Configuring VPLS Convergence..................................................................................................................9-129.3.1 Establishing the Configuration Task....................................................................................................9-129.3.2 Configuring the VE Group...................................................................................................................9-149.3.3 Configuring the mVRRP Virtual Router..............................................................................................9-149.3.4 Configuring the mVRRP Virtual Router over the mVSI.....................................................................9-159.3.5 Configuring the mVRRP Binding........................................................................................................9-169.3.6 Configuring the mVSI Binding............................................................................................................9-189.3.7 Checking the Configuration.................................................................................................................9-19

    9.4 Maintaining VPLS.........................................................................................................................................9-219.4.1 Clearing the Statistics of the Packets Sent and Received by the VRRP Virtual Router......................9-219.4.2 Debugging VPLS.................................................................